{"id":263,"date":"2014-02-06T23:27:24","date_gmt":"2014-02-06T23:27:24","guid":{"rendered":"http:\/\/tomas.papp.me.uk\/?p=263"},"modified":"2014-02-10T09:09:34","modified_gmt":"2014-02-10T09:09:34","slug":"ako-zistit-mac-firmware-password","status":"publish","type":"post","link":"https:\/\/tomas.papp.me.uk\/?p=263","title":{"rendered":"Ako zistit Mac firmware password"},"content":{"rendered":"<p style=\"text-align: center;\">\n<pre>sudo nvram security-password<\/pre>\n<pre style=\"text-align: center;\"><\/pre>\n<pre>security-password %fa%cb%d9%d9%dd%c5%d8%ce<\/pre>\n<p style=\"text-align: center;\">\n<p>In the password string, count the number of percent symbols, which are separators for the hex codes that represent a character of your password, where two hex code characters together represent one ASCII text character. Since the Calculator can only handle words up to 8 characters (16 hex characters), if there are more than 8 symbols, then you will have to split the password up and convert in sections.<\/p>\n<p style=\"text-align: center;\">\n<p>Therefore, copy the security password output from the Terminal to a text editor and delete the percent symbols in it, followed by splitting the password string at every 16th character. After this, perform the following steps on each 16-character section:<\/p>\n<p style=\"text-align: center;\">\n<p>Open the Calculator and set it to Programmer mode in the View menu or by pressing Command-3.<br \/>\nCopy one 16-character section of your password and paste it into the calculator. You should see its binary equivalent shown below the yellow-green display, and also see its ASCII-text representation at the bottom-left of the display (you may have to click the &#8220;ASCII&#8221; button to reveal this).<br \/>\nStarting with the first bit in the binary output (the one furthest from the blue zero at the right), reverse every other bit by clicking its corresponding 1 or 0. For example, if you see &#8220;1010 0101&#8221; then change it to &#8220;0000 1111.&#8221;Each ASCII character of the password will be a group of eight bits (a &#8220;byte&#8221;). Each of the two hex values that represents one of these characters is a group of four bits (a &#8220;nibble&#8221;), giving 16 possible combinations for a nibble. Hexadecimal numbering goes from 0 through 9 and then continues with A through F, giving 16 possible values to represent the combinations of a nibble.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/tomas.papp.me.uk\/wp-content\/uploads\/2014\/02\/CalculatorFirmwarePassword.png\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-265\" alt=\"CalculatorFirmwarePassword\" src=\"http:\/\/tomas.papp.me.uk\/wp-content\/uploads\/2014\/02\/CalculatorFirmwarePassword.png\" width=\"379\" height=\"379\" srcset=\"https:\/\/tomas.papp.me.uk\/wp-content\/uploads\/2014\/02\/CalculatorFirmwarePassword.png 474w, https:\/\/tomas.papp.me.uk\/wp-content\/uploads\/2014\/02\/CalculatorFirmwarePassword-150x150.png 150w, https:\/\/tomas.papp.me.uk\/wp-content\/uploads\/2014\/02\/CalculatorFirmwarePassword-300x300.png 300w\" sizes=\"auto, (max-width: 379px) 100vw, 379px\" \/><\/a><\/p>\n<p>http:\/\/reviews.cnet.com\/8301-13727_7-57521667-263\/use-the-calculator-to-reveal-a-macs-firmware-password\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>sudo nvram security-password security-password %fa%cb%d9%d9%dd%c5%d8%ce In the password string, count the number of percent symbols, which are separators for the hex codes that represent a character of your password, where two hex code characters together represent one ASCII text character. Since the Calculator can only handle words up to 8 characters (16 hex characters), if [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,7,6],"tags":[],"class_list":["post-263","post","type-post","status-publish","format-standard","hentry","category-uncategorized","category-hardware","category-security"],"_links":{"self":[{"href":"https:\/\/tomas.papp.me.uk\/index.php?rest_route=\/wp\/v2\/posts\/263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tomas.papp.me.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tomas.papp.me.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tomas.papp.me.uk\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tomas.papp.me.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=263"}],"version-history":[{"count":6,"href":"https:\/\/tomas.papp.me.uk\/index.php?rest_route=\/wp\/v2\/posts\/263\/revisions"}],"predecessor-version":[{"id":271,"href":"https:\/\/tomas.papp.me.uk\/index.php?rest_route=\/wp\/v2\/posts\/263\/revisions\/271"}],"wp:attachment":[{"href":"https:\/\/tomas.papp.me.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tomas.papp.me.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tomas.papp.me.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}