Solved

Warm/Cold Reset

Posted on 2004-08-26
6
727 Views
Last Modified: 2006-11-17
Depending upon the type of reset (Warm/Cold), the OS writes perticular code at a fixed address. I am not getting information about that address. I need to know (once PC is up), was it a warm reset or a cold reset?  How to siove this issue? Note that i am working on DOS os.

Dhaval

0
Comment
Question by:dhavalshah
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
6 Comments
 
LVL 10

Accepted Solution

by:
For-Soft earned 25 total points
ID: 11903021
You can try to check status of two BIOS variables 40h:15h and 40h:16h.
POST uses those variables. In case of cold boot post will change those variables. If you put some value in them POST should change them.

In theory those variables are unused after POST, but some BIOSes can use them in another way.
0
 
LVL 11

Assisted Solution

by:dimitry
dimitry earned 25 total points
ID: 11904057
Bios Area: 40h:0072h  Size: 2bytes
  1234H means Ctrl+Alt+Del reboot is in progress.  BIOS checks  this to avoid doing a "cold boot" with the time-consuming POST
  4321H means reset, preserving memory, 5678H, 9abcH, and abcdH (are internal PC Convertible codes)

However, as For-Soft mentioned, different BIOSes can behave realy different....
0
 
LVL 10

Expert Comment

by:For-Soft
ID: 11904617
The 40h:72h variable is to set what action BIOS should take when CTRL+ALT+DEL is used. It will not contain an information about how PC was boot.
With this variable we can tell BIOS what to do if CTRL+ALT+DEL is pressed.
0
 
LVL 9

Expert Comment

by:gtkfreak
ID: 11915921
INT 19h can be used to warm boot the system.
U can create dummy.com using debug.exe / debug.com and key in the bytes CD and 19
Then save your file
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Being a system administrator some time we require to do things remotely, one of them is installing software. Here I am going to tell you how to install software through wmic (Windows management instrument console). I am not at all saying that this i…
Introduction: Recently, I got a requirement to zip all files individually with batch file script in Windows OS. I don't know much about scripting, but I searched Google and found a lot of examples and websites to complete my task. Finally, I was ab…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question