Carlton,
Thanks for the OS2 reference. Clears a lot up. Appears NT is indeed
a separate OS creation from OS/2, though they shared the name at one
time.
Whoa... that could be interpreted way differently than what I
intended... OS/2 originated at IBM, was a collaborative project with
MS for a brief time, and then MS took OS/2 version 3 for their own and
called it NT. IBM retained version 2 and skipped a rev to version 4.
No DOS in the mix except for the runtime application emulator.
That's just for the 32-bit family beginning with NT. All 16-bit OS
products run on some mutation of DOS, some better hidden than others.
As another piece of trivia... nobody's yet mentioned that NT (up to
4.0) supported HPFS, which is an OS/2 file format. One might even
argue that NTFS is just an improved version of HPFS. Yet of course we
wouldn't argue that NT is OS/2 merely because it supports HPFS. You
could just as well say that it's a CD player because it supports CDFS.
And yes, to confirm what was said about FAT12, it is true that all
floppies are FAT12 - and this is true of every system I know of,
including Mac and even Solaris (where it is called PCFS). Although
it's true that FAT originated with DOS, it's important not to confuse
the disk formatting with the runtime operating system. Linux can read
FAT disks although nobody of course would be foolhardy enough to call
Linux DOS.
Regarding boot disks... Purl Gurl is correct, NTFS has way too much
overhead to go on a floppy, although I don't think anyone contested
that fact. If you think about it, NTFS (and UFS for that matter) are
inappropriate for floppies because they are too portable for FS
security to be practical and too small for performance to be a
significant concern. Floppies are on the way out, anyway.
Regarding whether NTFS security can be bypassed by a boot floppy -
yes. File-level security is only as good as physical security
protocols. This isn't what file security is intended to defend
against. If your system is compliant with DoD security specs, then it
will physically secured, and boot disk access won't be an issue.
Encryption is the only way to guard against boot disk bypass, on any
system. If someone has physical access to the disk or even the
network cable, and the data isn't encrypted, it's only a matter of
time.
Finally, regarding whether you can create an "NTFS boot disk" - it is
possible to create an NT-only bootstrapping disk that will allow you
to bypass a damaged boot sector. However, due to logical
contradictions noted before, Microsoft obviously isn't going to give
you a boot disk with a shell escape to bypass their security. Here
are the instructions here:
http://is-it-true.org/nt/utips/utips3.shtml
Your installation disk also serves as an emergency boot disk for
restoring a damaged registry, which you've hopefully backed up at some
point. Before someone says that an installation disk isn't the same
as a boot disk, I'd remind them that disk 1 of the DOS kit was a boot
disk.
Finally... the windows NT install disks do contain the entire kernel
and all drivers required to launch the install routine and they can be
created with the command winnt /ox. This of course does not transfer
you to a navigable shell because, as mentioned before, it would be a
logical contradiction to the concept of file security.
I hope this clears a few things up... before switching to Solaris, I
started out as a Microsoft sysadmin, at a time when this file system
interoperability mess was at its worst, and I had to deal with format
problems like this pretty often.