I heard this on another article...and I improved on it..
Make the BIOS's partially hard coded partially flashable...
Two duplicates (the original unflashable one) and the one that is flashable..
If for some reason the BIOS gets infected press button or sensor on top of the BIOS chip, and switch on computer...the first thing the mainboard does is restore the flashable part to the original (default) form...
Since that is an actual ROM (not shielded EEPROM or EPROM) it would ALWAYS be the same..
Then when that's done the system would boot to the BIOS and simply ask "Secure Erase all hard drives ?" (And yes that would include the HPA's)...
Then answer Yes to have the system completely securely wiped...
Then you wake up from a bad dream, and start the reverse backup of all you OS crap, that oughta be hardwritten on DVD or blueray as well, in order to prevent changes there also..
btw...if the virus was hidden in the backup...well..ur screw-ed...
Make the BIOS's partially hard coded partially flashable...
Two duplicates (the original unflashable one) and the one that is flashable..
If for some reason the BIOS gets infected press button or sensor on top of the BIOS chip, and switch on computer...the first thing the mainboard does is restore the flashable part to the original (default) form...
Since that is an actual ROM (not shielded EEPROM or EPROM) it would ALWAYS be the same..
Then when that's done the system would boot to the BIOS and simply ask "Secure Erase all hard drives ?" (And yes that would include the HPA's)...
Then answer Yes to have the system completely securely wiped...
Then you wake up from a bad dream, and start the reverse backup of all you OS crap, that oughta be hardwritten on DVD or blueray as well, in order to prevent changes there also..
btw...if the virus was hidden in the backup...well..ur screw-ed...