字幕列表 影片播放 列印英文字幕 Why, UEFI? Hi, everyone! Leo Notenboom for askleo.com. One of the really common frustrations I hear from people are their attempt to reboot their computer from something other than its internal hard disk – CD or DVD or more recently, USB sticks. The issue is with newer machines that come with what's called the UEFI BIOS replacement. Technically, it's just UEFI but I think everybody more or less refers to it as the UEFI BIOS. BIOS is the software that is actually on your machine the instant you turn it on. It's the software that is in charge of starting the thing up; booting the machine; knowing how to load the initial operating machine or whatever. UEFI is a replacement for the original BIOS that's been with us for probably a quarter of a century. UEFI allows the manufacturers to take more advantage of the capabilities of their machine; capabilities that just didn't exist 25 years ago. So, one of the things that they've done, actually, a couple of the things that they've done, have been to increase the security associated with rebooting your machine. It boils down to a couple of different problems. The most interesting problem, the most risky problem if you want to call it that is that with an older BIOS, or with a UEFI configured to run in what's called “Legacy” mode to mimic the behavior of an older BIOS, anybody can walk up to your computer, turn it off, insert a USB stick, CD, or DVD, reboot it and then have complete control over your machine. In other words, physical presence is all they need to be able to access pretty much anything on your machine through one means or another. What UEFI does is it restricts what happens when you reboot your machine. You may notice that on newer machines that come with things like Windows 8 or Windows 10, the process to get into the BIOS, the process to get into the different settings that may be present in the UEFI, is different. You don't do it by holding down a key when you reboot the machine. Instead, you actually have to reboot the machine into Windows and then using the Windows settings app, go through and have it then reboot into whatever your manufacturer provides. What that means, and the reason that's done is that insures that only people who actually have administrative access to the machine can in fact, reboot into the UEFI configuration. Somebody can't just walk up to your machine and do things like change the boot order. By restricting UEFI access to going through this path where you have to go through Windows or the installed operating system in order to be able to see those settings, you basically increased the security of the machine. One of the other settings that comes into play is this thing called secure boot. What that does is it prevents you from booting into something that isn't authorized, if you will. Something that isn't an official signed, allowed copy of an operating system. Now many people think that this is a Windows thing but Microsoft is all about this, but that's not the case. This is actually something that's implemented by the hardware manufacturers that is something that is implement in the BIOS that is in the all of these machines in UEFI BIOS that's in all these machines. But in reality, it has nothing to do with Windows specifically. Windows just happens to be one of the operating systems that conforms to this specification. It does mean that when it comes time to reboot your machine, if secure boot is turned on, it won't boot from just anything. It will actually only boot from things that it is allowed to boot from, which means you can't just download a random operating system from the internet and expect your machine to boot into if secure boot is turned on. So, unfortunately, what most people then ask is, “Great, how do I turn secure boot off? How do I return my machine to a configuration that allows me to do the things I need to do to that machine?” The answer is, as so many times comes, it depends. You may not be able to. That's a situation I'm in as far as I can tell with my original Microsoft Surface Pro. For the life of me, I cannot get it to boot from anything other than its internal hard disk. The UEFI BIOS is configured for this secure boot mode. It is configured in such a way that I do not have access to the actual UEFI settings and that's a choice that the computer manufacturer (Microsoft in this case) happened to make. That's the way that machine works. If that machine's hard disk fails, to be honest, I'm not sure what I'll do. In other cases, it depends, again, on exactly the permissions that your computer manufacturer has given you. You would start with the settings app but where you go will depend on exactly what your computer manufacturer has allowed for and pre-configured. Even then, when you reboot into the UEFI settings, like the BIOS before it, UEFI varies from machine to machine, from manufacturer to manufacturer. It's incredibly capable. They're many things you can do with it but exactly which UEFI implementation is being used by your computer manufacturer will vary. What that really boils down to, the bottom line here is that I can't tell you for your machine exactly what steps you need to take undo or to go back to a Legacy type scenario or to a not secure boot scenario. You need to check with the documentation that came with your computer or you need to check with the computer manufacturer to find out what capabilities are available to you and then exactly what steps you need to take to make the configuration changes that will allow you to do what you want. So, UEFI, it really is all about protecting you from random, what I'll call “drive-by reboots” where someone can just walk up to your machine and take control by rebooting it randomly into whatever they happen to have in their pocket. Is that a good thing? In some environments it is. In home environments – maybe not so much. It's hard to say. What do you do? How do you react to all of this security that's being implemented by UEFI? Is it an issue for you? If it is an issue for you, how have you been working around it? Have you been working around it? Let me know. As always, here's a link to this article posted on Ask Leo! That's where all the comments are read; that's where all the comments are moderated. I'd love to hear your experience with UEFI. Again, until next time, I'm Leo Notenboom for askleo.com. Remember, stay safe, have fun, and don't forget to back up. I'll see you again next week. Take care. Hey, if you found this video valuable, I could use your support. Visit patreon.com/askleo and pledge a couple of bucks a month or more depending on what kind of a reward you like. Yep, there's rewards associated with it and what it will allow me to do is to focus on creating more valuable content like the video you just saw. Regardless of whether you do or not, thanks again for watching. I'm Leo Notenboom for askleo.com.