What is the Default Bios password for a Gateway Solo 5300 with a phoenix Bios ?

Posted on 2004-11-11
Last Modified: 2008-01-09
We are working on a Gateway Solo 5300 laptop that we can no longer get to boot beyond the bios password. Our customer requested a new OS reinstall and had a bios password of "jake" on the machine. A tech went into bios and changed the bios password, instead of entering a password he left the new password blank and pressed enter thinking it would just disable the bios password. Now using "jake" or just pressing enter does not work so we are assuming it has been set to the default password. If anyone knows this password please help. Also on this laptop the password is stored on the eeprom so disconnecting the cmos password will not work.
Question by:TheLaptopGuy
    LVL 65

    Expert Comment

    Hello TheLaptopGuy =)

    Have you tried using the PHOENIX BIOS backdoor passwords ??
    these are,

    phoenix, PHOENIX, CMOS, BIOS
    LVL 1

    Author Comment

    none of those passwords worked but thanks anyway
    LVL 65

    Expert Comment

    hmmmmmm have you tried contacting Gateway support and told them the situation to check if they can give any hint or help you to get out of this trouble :-?

    Expert Comment

    Iamsorry to say this but it looks like you are going to have to send it in to Gateway.

    This is the from the Gateway's website......

    Frequently Asked Questions

    Q: What can I do if I forget my BIOS password on my notebook computer?

    When you created the BIOS password, you were prompted to create a backup floppy disk that enables you to enter the BIOS Setup utility in the event you forget your password or need to clear it. If you did not elect this option when instructed and do not have the password, the only way to clear the BIOS password is to have the computer sent in for out-of-warranty service.



    Accepted Solution

    or you could open up the notebook and take off a jumper that allows you to enter bios config as soon as the system boots up.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Introduction For the past 15 years, mobility has been a top priority for employers, employees, students and all kind of people. Having more and more in your portable phone or "smartphone" is a priority and being able to work while on a plane, bus o…
    In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
    It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now