26 Facts About Legacy BIOS

1.

The Legacy BIOS firmware comes pre-installed on an IBM PC or IBM PC compatible's system board and exists in UEFI-based systems too.

FactSnippet No. 1,261,364
2.

Originally, Legacy BIOS firmware was stored in a ROM chip on the PC motherboard.

FactSnippet No. 1,261,365
3.

In later computer systems, the Legacy BIOS contents are stored on flash memory so it can be rewritten without removing the chip from the motherboard.

FactSnippet No. 1,261,366
4.

Legacy BIOS uses the boot devices set in Nonvolatile Legacy BIOS memory, or, in the earliest PCs, DIP switches.

FactSnippet No. 1,261,367
5.

At boot time, all Legacy BIOS services are available, and the memory below address 0x00400 contains the interrupt vector table.

FactSnippet No. 1,261,368
6.

Motherboard Legacy BIOS typically contains code for initializing and bootstrapping integrated display and integrated storage.

FactSnippet No. 1,261,369
7.

Once an option ROM returns, the Legacy BIOS continues searching for more option ROMs, calling each as it is found, until the entire option ROM area in the memory space has been scanned.

FactSnippet No. 1,261,370
8.

Legacy BIOS ROM is customized to the particular manufacturer's hardware, allowing low-level services to be provided in a standardized way to programs, including operating systems.

FactSnippet No. 1,261,371
9.

Since the AT-compatible Legacy BIOS ran in Intel real mode, operating systems that ran in protected mode on 286 and later processors required hardware device drivers compatible with protected mode operation to replace Legacy BIOS services.

FactSnippet No. 1,261,372
10.

In modern PCs running modern operating systems the Legacy BIOS interrupt calls is used only during booting and initial loading of operating systems.

FactSnippet No. 1,261,373
11.

The Legacy BIOS contain patches to the processor microcode that fix errors in the initial processor microcode; microcode is loaded into processor's SRAM so reprogramming is not persistent, thus loading of microcode updates is performed each time the system is powered up.

FactSnippet No. 1,261,374
12.

Some Legacy BIOS implementations allow overclocking, an action in which the CPU is adjusted to a higher clock rate than its manufacturer rating for guaranteed capability.

FactSnippet No. 1,261,375
13.

Legacy BIOS interrupt calls are not used by modern multitasking operating systems after they initially load.

FactSnippet No. 1,261,376
14.

Since 2010, Legacy BIOS technology is in a transitional process toward UEFI.

FactSnippet No. 1,261,377
15.

Early Legacy BIOS versions did not have passwords or boot-device selection options.

FactSnippet No. 1,261,378
16.

The Legacy BIOS was hard-coded to boot from the first floppy drive, or, if that failed, the first hard disk.

FactSnippet No. 1,261,379
17.

In modern PCs the Legacy BIOS is stored in rewritable EEPROM or NOR flash memory, allowing the contents to be replaced and modified.

FactSnippet No. 1,261,380
18.

Original IBM PC Legacy BIOS was stored on mask-programmed read-only memory chips in sockets on the motherboard.

FactSnippet No. 1,261,381
19.

The effect of the publication of the Legacy BIOS listings is that anyone can see exactly what a definitive Legacy BIOS does and how it does it.

FactSnippet No. 1,261,382
20.

In May 1984 Phoenix Software Associates released its first ROM-Legacy BIOS, which enabled OEMs to build essentially fully compatible clones without having to reverse-engineer the IBM PC Legacy BIOS themselves, as Compaq had done for the Portable, helping fuel the growth in the PC-compatibles industry and sales of non-IBM versions of DOS.

FactSnippet No. 1,261,383
21.

New standards grafted onto the Legacy BIOS are usually without complete public documentation or any Legacy BIOS listings.

FactSnippet No. 1,261,384
22.

Former major Legacy BIOS vendors included American Megatrends, Insyde Software, Phoenix Technologies, Byosoft, Award Software, and Microid Research.

FactSnippet No. 1,261,385
23.

Legacy BIOS Meningitis has relatively harmless, compared to a virus like CIH.

FactSnippet No. 1,261,386
24.

Second Legacy BIOS virus was CIH, known as the "Chernobyl Virus", which was able to erase flash ROM Legacy BIOS content on compatible chipsets.

FactSnippet No. 1,261,387
25.

Third Legacy BIOS virus was a technique presented by John Heasman, principal security consultant for UK-based Next-Generation Security Software.

FactSnippet No. 1,261,388
26.

Researchers Anibal Sacco and Alfredo Ortega, from Core Security Technologies, demonstrated how to insert malicious code into the decompression routines in the Legacy BIOS, allowing for nearly full control of the PC at start-up, even before the operating system is booted.

FactSnippet No. 1,261,389