2021-05-03 GTX650刷入UEFI模块

GTX650刷入UEFI模块

gtx650黑苹果需要关闭csm模式,但是微软规定csm模式关闭必须得所有pcie设备开启uefi模式,但是老的gtx650中vbios没有uefi模块,所以需要先刷vbios,刷入方法在我的资源解压后的Inno3D UEFI Updater中的readme中,前提需要开启主板uefi模式,最好用gpuz备份好原来的bios。下面是简单的步骤,仅供参考,目前是实现了华硕GTX650-FMLII-1GD5的UEFI刷入,其他的显卡并没有实物卡测试。 下载地址,需要5个C币。
 

打开主板UEFI模式:

进行以下前提是主板已开启UEFI启动模式,各个厂家的设置方式不一样,大部分位于“启动”选项卡中

使用GPUZ备份原BIOS:

使用我提供的资料中的GPUZ或者下载最新版本的GPUZ查看UEFI是否开启,如果开启则不需要后续步骤,说明显卡已支持UEFI模式。如果没有打上勾,则按旁边的 分享按钮->Save to file->保存到桌面。

刷入UEFI:

在win10的搜索框中键入cmd,然后右键“以管理员权限打开”,cd 到下载并解压的目录中 cd C:\Users\wangyl\Downloads\Inno3D UEFI Updater

运行 nvuefiupdate.exe kepleruefi.efr 即可,期间注意不要断电,不要关机。1-2分钟刷完后需要重启电脑,然后再次打开GPUZ就可以看到UEFI前面的框已经勾选。

最终效果:

windows上打开GPUZ显示UEFI已勾上,如果需要安装黑苹果,那么需要进bios关闭“CSM模式”,关闭“快速启动”,关闭“安全模式”,打开“4G以上地址解析”,黑苹果可以完美驱动。效果如下:

如果有需要借鉴的小伙伴可以尝试,bootargs上增加shikigva=40 ,然后mac版本号选为:MacPro7,1。上述图像是使用OpenCore0.6.8制作的黑苹果,官网教程链接

 

  • 1
    点赞
  • 5
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
BIOS-UEFI安全培训包 Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives This repository contains materials for a hands-on training Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives A variety of attacks targeting system firmware have been discussed publicly, drawing attention to the pre-boot and firmware components of the platform such as BIOS and SMM, OS loaders and secure booting. This training will detail and organize objectives, attack vectors, vulnerabilities and exploits against various types of system firmware such as legacy BIOS, SMI handlers and UEFI based firmware, mitigations as well as tools and methods available to analyze security of such firmware components. It will also detail protections available in hardware and in firmware such as Secure Boot implemented by modern operating systems against bootkits. The training includes theoretical material describing a structured approach to system firmware security analysis and mitigations as well as many hands-on exercises to test system firmware for vulnerabilities. After the training you should have basic understanding of platform hardware components and various types of system firmware, security objectives and attacks against system firmware, mitigations available in hardware and firmware. You should be able to apply this knowledge in practice to identify vulnerabilities in BIOS and perform forensic analysis of the firmware. Materials Module 0 Introduction to Firmware Security Module 1 BIOS and UEFI Firmware Fundamentals Module 2 Bootkits and UEFI Secure Boot Module 3 Hands-On Platform Hardware and Firmware Module 4 System Firmware Attack Vectors Module 5 Hands-On EFI Environment Module 6 Mitigations Module 7 System Firmware Forensics Miscellaneous Materials

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值