VOGONS


Windows 3.x security

Topic actions

First post, by computergeek92

User metadata
Rank Oldbie
Rank
Oldbie

How was security in Win3.x vs Win9x? I know that in 9x you can't password protect Windows, you just press the cancel button to bypass login. Can I block access to Win3.x from dos? (Where dos boots before you type "win" to load Windows) What about Keylock? some old computer cases had these Keylock slots on the front panel. I heard they disable the function of the keyboard through shorting a jumper on the motherboard. I could be safe by doing that and putting a padlock on the back of the PC case? (So no one can disconnect the keylock cable inside) Can you still find replacement Keylock Keys or replacement Keylock sets complete with a Keylock cable to hook to the motherboard and a set of physical keys?

On a different note, how was the Windows NT before version 4.0? I’ve read in NT4.0 you can reliably password protect with a login password. Did the same apply to NT3.1 and NT3.5?

If I can find out these things then I can use some of my retro PCs for more than just old games, I can instead feel safe using them with offline personal data. A possible alternative to an offline vintage Windows XP computer perhaps.

Dedicated Windows 95 Aficionado for good reasons:
http://toastytech.com/evil/setup.html

Reply 1 of 54, by psychz

User metadata
Rank Member
Rank
Member

An offline Windows XP setup with something like VeraCrypt is as secure you can get... As for older OSes, either use as recent encryption software as you can get if the CPU can handle it in reasonable time, or just err... restrict the physical access!

Stojke wrote:

Its not like components found in trash after 20 years in rain dont still work flawlessly.

:: chemical reaction :: athens in love || reality is absent || spectrality || meteoron || the lie you believe

Reply 2 of 54, by computergeek92

User metadata
Rank Oldbie
Rank
Oldbie

I just password protect my offline Windows XP machines and i'm fine. The only other way I know data can be taken is to unplug the hard drive and plug it as a second drive to another PC. A padlock will stop that from happening though.

Dedicated Windows 95 Aficionado for good reasons:
http://toastytech.com/evil/setup.html

Reply 3 of 54, by psychz

User metadata
Rank Member
Rank
Member

NTLM/user account password protection can be circumvented via means of booting from a CD and either resetting the password (to get into Windows) or using tools such as l0phtcrack to crack it. Plain unencrypted files can also be dragged out of the HDD to a USB stick with the use of a boot CD. Check Hiren's Boot CD or FalconFour's. They have just too many software for this (recovery?) purpose.

Stojke wrote:

Its not like components found in trash after 20 years in rain dont still work flawlessly.

:: chemical reaction :: athens in love || reality is absent || spectrality || meteoron || the lie you believe

Reply 4 of 54, by computergeek92

User metadata
Rank Oldbie
Rank
Oldbie

Well i'm still safer in general. I guess they can still hack you with floppy disks too?

Last edited by computergeek92 on 2016-07-13, 13:25. Edited 2 times in total.

Dedicated Windows 95 Aficionado for good reasons:
http://toastytech.com/evil/setup.html

Reply 5 of 54, by psychz

User metadata
Rank Member
Rank
Member

With software targeting what's installed, yes! When one has physical access to a computer, crazy things can happen 🤣

Stojke wrote:

Its not like components found in trash after 20 years in rain dont still work flawlessly.

:: chemical reaction :: athens in love || reality is absent || spectrality || meteoron || the lie you believe

Reply 6 of 54, by computergeek92

User metadata
Rank Oldbie
Rank
Oldbie

At least the old early Pentium and 486 computers did not support booting from a CD... You had to use boot disks for everything. I can't boot modern Linux distros on an old PC with floppy disks cause there is no boot floppies even available.

Dedicated Windows 95 Aficionado for good reasons:
http://toastytech.com/evil/setup.html

Reply 7 of 54, by psychz

User metadata
Rank Member
Rank
Member

One can always boot DOS from a floppy with NTFS4DOS, grab the samfiles and take them elsewhere... There is always a way.

Stojke wrote:

Its not like components found in trash after 20 years in rain dont still work flawlessly.

:: chemical reaction :: athens in love || reality is absent || spectrality || meteoron || the lie you believe

Reply 9 of 54, by Jorpho

User metadata
Rank l33t++
Rank
l33t++
computergeek92 wrote:

I can't boot modern Linux distros on an old PC with floppy disks cause there is no boot floppies even available.

There's a tool called "tomsrtbt" that fits on a floppy and allows root Linux access, if that counts. Puppy Linux also has a utility called "wakepup" that fits on a floppy and can be used to start Puppy Linux on computers that can't boot from a CD or USB.

Reply 10 of 54, by psychz

User metadata
Rank Member
Rank
Member

Yup. So your best bet is encryption, but that would require some CPU power (or a lot of patience) 😵

Stojke wrote:

Its not like components found in trash after 20 years in rain dont still work flawlessly.

:: chemical reaction :: athens in love || reality is absent || spectrality || meteoron || the lie you believe

Reply 11 of 54, by computergeek92

User metadata
Rank Oldbie
Rank
Oldbie

And then what when the encryption software is so obsolete and full of holes? Then that's it then, right?

I wonder what good encryption tools are for Win3.x...

Dedicated Windows 95 Aficionado for good reasons:
http://toastytech.com/evil/setup.html

Reply 12 of 54, by psychz

User metadata
Rank Member
Rank
Member

Encryption, if not for keeping your files secure, should at least make the process of cracking a lot slower. It's all mathematics though, you never know. Several algorithms have already been proved not to be secure. As for encryption tools for Win3x, that, I don't know.

Stojke wrote:

Its not like components found in trash after 20 years in rain dont still work flawlessly.

:: chemical reaction :: athens in love || reality is absent || spectrality || meteoron || the lie you believe

Reply 13 of 54, by PeterLI

User metadata
Rank l33t
Rank
l33t

Securing any old OS is completely nonsensical. The only security is to have no data of value on the machine.

Reply 14 of 54, by keenerb

User metadata
Rank Oldbie
Rank
Oldbie

There may be a PGP version that runs in 16-bit pure dos, but that won't do full disk encryption.

Reply 15 of 54, by Joey_sw

User metadata
Rank Oldbie
Rank
Oldbie

in dos age there was Norton's Diskreet, which i believe do not make it into win9x version of Norton Utilities Suite.

-fffuuu

Reply 17 of 54, by Jorpho

User metadata
Rank l33t++
Rank
l33t++
computergeek92 wrote:

And then what when the encryption software is so obsolete and full of holes? Then that's it then, right?

If you're that concerned about the security of your data (and what sort of data could you possibly have that you think anyone else would care about, really?), then switching to Windows 3.x is not the answer. Disconnect your computer from the network and store it in a bank vault, or something.

The way I see it, for the vast majority encryption is like a bicycle lock. There's really nothing you can do to stop a sufficiently-determined thief from walking off with your bike (or even just parts of your bike); the best you can hope for is to be sufficiently discouraging as to make the thieves want to target someone else.

Reply 18 of 54, by Joey_sw

User metadata
Rank Oldbie
Rank
Oldbie
psychz wrote:

correct, the implementation only uses max 32 bits for key which less than what DES supposed to 56.
the 32 are theoretical maximum as most users won't bother using high ascii characters as password, leaving at most 28 bits key.
Converting the key to all uppercase (very likely for the sake non-case senstive password friendliness) weaken it a bit not as much as the 32 of 56 bits weirdness.

But to be fair, it was made when US govt are restricting export of any encryption techniques that using more than 56 bits key.
So diskreet developer choose the possible best known method at that time for such limitation, the DES method.

DIskreet did offer a somewhat whole-disk encryption which most of other encryption program at that time did not.

-fffuuu

Reply 19 of 54, by Zup

User metadata
Rank Oldbie
Rank
Oldbie
Jorpho wrote:

The way I see it, for the vast majority encryption is like a bicycle lock. There's really nothing you can do to stop a sufficiently-determined thief from walking off with your bike (or even just parts of your bike); the best you can hope for is to be sufficiently discouraging as to make the thieves want to target someone else.

Not exactly. The goal is to get some time.

On a online environment, that time may be enough to alert the admins (and identify and stop the threat before any damage is done).

If you lose a pendrive with passwords, you get enough time to change your passwords, lock accounts and secure important data before the cracker get to your data.

But if you lose a laptop/pendrive, there are few chances that it will fall in hands of an experienced hacker. In most cases, failure to access your data will prompt you thief to format your disk (thus *almost* protecting you valuable data).

I have traveled across the universe and through the years to find Her.
Sometimes going all the way is just a start...

I'm selling some stuff!