Jay West wrote:
Jay,
I'm not aware of any obvious ways to break in if the password are set. One can
bring up a disk editor, and with a knowlege of the drive, can edit the sysprog
or some
other account passsword to have no password, then log in.
The holes that were there went away in the 2.x days, long before the code upon
which the R83 release was based on. This release was the descendent of Pick
R80, and was a "peer" in quality and features to the Royale 3.0 releases on
microdata hardware.
The encryption was pretty schlocky and actually resulted in not the obfuscation
that unix got by introducing doing a "crypt()" function on their password, but
lost information. That meant that there were many possible "alias" passwords
that could work. I doubt that a password guesser would figure it out though.
With a file stats listing, or a file save tape (the stats are t-dumped at the
end of a normal file save) we could possibly break in. It would take a raw
disk editor tht booted from dos, such as norton old utilities, or such, and a
lot of finagling to find the system dictionary and byte fiddle it.
If he has the install goods on a release as old as it sounds, maybe replacing
the
hard drive and installing the system again would give him a tste of pick.
He could install an IDE ISA adapter, and a 1gb disk for probably under $10
given prices of small drives now, and have a huge pick ssytem for his pleasure.
2.2gb was the max on later bios versions and 3.1m release. Dont know
about the one he mentioned. it might be restricted to 525mb, due to int13
considerations.
Jim