26 Facts About BIOS

1.

The BIOS firmware comes pre-installed on an IBM PC or IBM PC compatible's system board and exists in UEFI-based systems too.

FactSnippet No. 1,243,441
2.

Originally, BIOS firmware was stored in a ROM chip on the PC motherboard.

FactSnippet No. 1,243,442
3.

In later computer systems, the BIOS contents are stored on flash memory so it can be rewritten without removing the chip from the motherboard.

FactSnippet No. 1,243,443
4.

BIOS uses the boot devices set in Nonvolatile BIOS memory, or, in the earliest PCs, DIP switches.

FactSnippet No. 1,243,444
5.

At boot time, all BIOS services are available, and the memory below address 0x00400 contains the interrupt vector table.

FactSnippet No. 1,243,445
6.

Motherboard BIOS typically contains code for initializing and bootstrapping integrated display and integrated storage.

FactSnippet No. 1,243,446
7.

Once an option ROM returns, the BIOS continues searching for more option ROMs, calling each as it is found, until the entire option ROM area in the memory space has been scanned.

FactSnippet No. 1,243,447
8.

BIOS ROM is customized to the particular manufacturer's hardware, allowing low-level services to be provided in a standardized way to programs, including operating systems.

FactSnippet No. 1,243,448
9.

Since the AT-compatible BIOS ran in Intel real mode, operating systems that ran in protected mode on 286 and later processors required hardware device drivers compatible with protected mode operation to replace BIOS services.

FactSnippet No. 1,243,449
10.

In modern PCs running modern operating systems the BIOS interrupt calls is used only during booting and initial loading of operating systems.

FactSnippet No. 1,243,450
11.

The BIOS contain patches to the processor microcode that fix errors in the initial processor microcode; microcode is loaded into processor's SRAM so reprogramming is not persistent, thus loading of microcode updates is performed each time the system is powered up.

FactSnippet No. 1,243,451
12.

Some BIOS implementations allow overclocking, an action in which the CPU is adjusted to a higher clock rate than its manufacturer rating for guaranteed capability.

FactSnippet No. 1,243,452
13.

BIOS interrupt calls are not used by modern multitasking operating systems after they initially load.

FactSnippet No. 1,243,453
14.

Since 2010, BIOS technology is in a transitional process toward UEFI.

FactSnippet No. 1,243,454
15.

Early BIOS versions did not have passwords or boot-device selection options.

FactSnippet No. 1,243,455
16.

The BIOS was hard-coded to boot from the first floppy drive, or, if that failed, the first hard disk.

FactSnippet No. 1,243,456
17.

In modern PCs the BIOS is stored in rewritable EEPROM or NOR flash memory, allowing the contents to be replaced and modified.

FactSnippet No. 1,243,457
18.

Original IBM PC BIOS was stored on mask-programmed read-only memory chips in sockets on the motherboard.

FactSnippet No. 1,243,458
19.

The effect of the publication of the BIOS listings is that anyone can see exactly what a definitive BIOS does and how it does it.

FactSnippet No. 1,243,459
20.

In May 1984 Phoenix Software Associates released its first ROM-BIOS, which enabled OEMs to build essentially fully compatible clones without having to reverse-engineer the IBM PC BIOS themselves, as Compaq had done for the Portable, helping fuel the growth in the PC-compatibles industry and sales of non-IBM versions of DOS.

FactSnippet No. 1,243,460
21.

New standards grafted onto the BIOS are usually without complete public documentation or any BIOS listings.

FactSnippet No. 1,243,461
22.

Former major BIOS vendors included American Megatrends, Insyde Software, Phoenix Technologies, Byosoft, Award Software, and Microid Research.

FactSnippet No. 1,243,462
23.

BIOS Meningitis has relatively harmless, compared to a virus like CIH.

FactSnippet No. 1,243,463
24.

Second BIOS virus was CIH, known as the "Chernobyl Virus", which was able to erase flash ROM BIOS content on compatible chipsets.

FactSnippet No. 1,243,464
25.

Third BIOS virus was a technique presented by John Heasman, principal security consultant for UK-based Next-Generation Security Software.

FactSnippet No. 1,243,465
26.

Researchers Anibal Sacco and Alfredo Ortega, from Core Security Technologies, demonstrated how to insert malicious code into the decompression routines in the BIOS, allowing for nearly full control of the PC at start-up, even before the operating system is booted.

FactSnippet No. 1,243,466