i had read on the cia.vc, it is a writing on a Mountmanager..
now my suggestion.. humm, manny peoples had call for lock the data carrier ..
and i did not forget that.. and now, now it is the possible here who can write it direcktly in the Mountmanager of Reactos.. with an Stiki bit, Locked or not locked..
and by side, why not a Cripting-bit with AES or something else on it.. to say,
this carrier iss crypted.
ROSM=Letter/artofpart|writing/nowriting|Crypting/ nocrypting | Cryptingmetode | Cryptedpass
ROSM=C/boot/system|0/1|0/1|AES|%§$%§&$%"%&$§%$%&§$$%"§§%§&%&$%(()=/$%GDFGHG/%&Z
So can Read the Mountmanager wich Metode it is Mounted..
writeprotected, Crypted,pass
Ma by can write this outside of the normal Primary,Extended,Secundary Patitions.. without partitions as a string, direcktly on the harddisk behind the first informations like mbr and so on.. this it is checking the Montmanager too and can work with it..
I think, that's just the right time, to programmin this into... for support
writeprotections and the newest possibilitys of Crypting and Security.
And it is possibility with all mounted Partitins and DataCarriers..
to set writepotections,Crypting and so on.. i think on usb-sticks and so on..
(edit and past 2nd text(more suggestions))
Reactos by self can make a 100MB for booting Partition like W7 and can crypted
the System by self and can call for Pass by Booting if store the (exemple) aes.dll on the 100MB-Partitions and load at the 1.st Stage Boot like Hardwaredrivers and so..
this drivers can store at the 100MB Partition for Boot Reactos..
like bootmgr | /boot/inifiles | /drivers/Sys |/drivers/inf |/drivers/dll
and Change this bootpartition to no-see-partition or get by booting the last drive-letter like Z and the System as own have the C:
Winnt dont need an Swap-partition, make it on the files therefor can Reactos take a "Boot-Partition"(swap)...
the User shold tell wich partition it is the "Boot-Partition" and the "C:\-Partition" for Reactos as Extended Partitioning..
normal partitioning for first Installation can make this automaticly...
(edit and past 3rd text(more suggestions))
and the part of boot can take a mountmanager.dll who look and set the
right partitions automatical and can call the(exemple) aes.dll to call the User
for an Passwort grafikal on bootscreen for decrypting the Systempartition
and get it furter with right passwort to Systempartition to boot
the rest of the SystemPartition,swapfiles and Desktop furter.
the Cryptingsystem mus hold changeable with an dll to use TrueCrypt, blowfish
or other cryptingsystems, newer ones if it is possible... more uncrackable..
Greetings To aNoNyMoUS.... Let be the Human more save him self

best regards
Blacky