X
Business

Firmware password changes in the latest MacBook Air, MacBook Pro

Mac managers will want to check out a recent Apple support note that points out some important changes for recovering firmware passwords in the MacBook Air (Late 2010) and MacBook Pro (Early 2011).
Written by David Morgenstern, Contributor

Mac managers will want to check out a recent Apple support note that points out some important changes for recovering firmware passwords in the MacBook Air (Late 2010) and MacBook Pro (Early 2011).

According to MacBook Air (Late 2010) and MacBook Pro (Early 2011): Recovering a lost firmware password, only a technician at an Apple retail store or an authorized service provider can recover the password.

A number of theft recovery services ask users to set this firmware password, which for Intel-based Macs is based on the Extensible Firmware interface (EFI) and older PowerPC machines on the Apple Open Firmware. Either way, by locking the firmware, users can prevent the machine, notebook or desktop, from booting from an external hard drive, DVD, NetBoot server or even from another partition on the main startup drive. It also prevents starting up in various modes, such as Target Disk Mode (where your notebook works as an external disk to another system), Safe Boot, Single-user and Verbose modes.

A support note with a full list and instructions can be found here.

To set the the firmware password, you pull down the Firmware Password Utility from the Utilities menu on your startup disc then run it.

I appreciated a post by Jim Miller about the Firmware password in the Apple Support Discussions. He said if you're going to the trouble to set the firmware password, it might be advisable to disable automatic login in the Accounts Preferences Pane (this is a good idea anyway).

With these options running together, you gain some protection if your Mac is stolen:

1: Thief runs off with your machine. 2: Thief tries to start your machine, and gets the Mac OS login screen. 3: Thief gets a startup DVD that he can boot from and reset the user password. 4: Thief holds down the OPTION key on boot so he can select the DVD as the startup volume. 5: Oops: Thief gets the Firmware Password screen. Fail. 6: Thief restarts the machine, this time holding down the "C" key to force the boot sequence to start from the DVD. 7: The machine ignores the "C" key, and proceeds to the Mac OS login screen. Fail again. 8: Information safe!

Now, this combo doesn't provide complete protection by someone who really knows what they're doing. But will stop a casual thief from cracking into your machine.

Editorial standards