[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/diy/ - Do It Yourself


View post   

File: 515 KB, 1280x720, Screenshot_2019-01-09-15-55-59.png [View same] [iqdb] [saucenao] [google]
1533450 No.1533450 [Reply] [Original]

Found out recently that computer systems from the 80s-90s used physical keys and locks to prevent access from strangers. So that's cool. I would like to integrate this into my build.
The more money I am spending on my PC, the more fearful I am of hackers and malware. My family's income isn't really stable, so I when I can, I have to do one-time inversions. Monthly payments aren't an option.
Instead of having an antivirus or a locking software with flash drives, I would prefer a physical key.
I don't want to do anything sophisticated, just a system that shuts off the network card if the key is not there. I got this idea seeing that IBM computers with tubular locks either locked down the keyboard, power button, or hard drive, with circuits or pieces of metal.
Is this idea even possible? I got months of vacations ahead of me, but I'm confused about the specifics, so sorry if this post infringes the rules.
Pic related... no it's not my PC.

>> No.1533453

just plug out your patch cable. wtf dude what a cheap bait. you must be high as fuck

>> No.1533455

>>1533453

How does that help with one-time inversions?

>> No.1533457

>>1533453
My PC is hooked up to my TV. I literally have to squeeze myself between the wall and the furniture to change any cable in the back. Will consider it though.

>> No.1533459
File: 167 KB, 256x384, 1516303911163.png [View same] [iqdb] [saucenao] [google]
1533459

>oh look theres a pc in this house I broke into
>oh no its locked with a key, I will just steal the computer and bypass the key later

>> No.1533460

>>1533450
simply turn off the computer when you are not using it.
if i didn't know any better i'd say this was shitposting troll.

>> No.1533461

>>1533460
I do but ok

>> No.1533462

>>1533459
Never mentioned robbers were a problem.

>> No.1533465
File: 14 KB, 444x354, F0562561-01.jpg [View same] [iqdb] [saucenao] [google]
1533465

>>1533450
There's usually an eyelet on the back poking through a small slot in the side panel fold, that's meant for a key. For actually booting the pc, just drill a hole in an empty disk drive slot and put in pic related. Cut pwr on switch cable in half and solder each end to a contact point. 15 minute job and that's if you are very slow.

>> No.1533467

>>1533465
Where I said 'key' I meant small padlock or a cable with a padlock attached to a wall mounted eyelet. Of course everything is relative, if someone really means business, he'll just cut the case eyelet loose, slide of the side panel, pull loose the pwr switch cable ends and twist them together but it should scare off the most casual of thieves/'hackers'.

>> No.1533469
File: 187 KB, 720x630, FB_IMG_15184845224989266.jpg [View same] [iqdb] [saucenao] [google]
1533469

>>1533465
Ahhh, perfect
Thanks Anon

>> No.1533472

>>1533459
>hey you're a criminal with a gun, didn't you read the gun free zone sign on the door?

>> No.1533473

>>1533450
That computer is A S T H E T I C as fuck desu

>> No.1533474

>>1533469
no prob m9

>>1533473
It really is. Inspiring to make an '80s case mod with wood stickers

>> No.1533475

nice skin my dude, looks like an old ford fairmont

>> No.1533479

>>1533450
Is the PC in a place where people you don't trust can access ?
If not, a key-hole wouldn't prevent any intrusion.
If your PC is indeed in a place where strangers can go, I guess that the easiest way to do what you want would be to connect the lock to a switch that disconnects the power block.

>> No.1533484

>>1533479
>, I guess that the easiest way to do what you want would be to connect the lock to a switch that disconnects the power block.
You splice the green wire coming from the main connector through a lock, since its the trigger line to power up the PC, then it will still work like normal when your lock is turned on.

>> No.1533499

I guess none of you were around n the 80s and 90s.. the KEY that came on most PCs back then only cut off the KEYBOARD, it did not prevent anyone from turning or off the computer. it stopped access to the KEYBOARD so someone couldnt use the computer.... it was NOT wired tot he power switch, compuer power supplies back then had a seperate power switch to turn the computer on and off, there was no "on off" like on modern motherboards. there was a physical switch attached directy to the power supply, you could power it on without a compiter attached. that was the only good thing about those. you could use it for shit without needing to jump wires like you do with atx power supplies.

so in reality the only way to use the switch today is to wire it inline with the power switch on the mb. but if your computer is already on that wont stop anyone from using it unless you nigger rig a way to have it disable the keyboard and mouse...

>> No.1533527

>>1533499
I've worked with computers in the '90s but I've never even seen a key on one

>> No.1533537

>>1533499
I remember them.

>disable the keyboard and mouse...

Most things have multiple USB or bluetooth access. Each has its own power. Like front USB vs rear USB.

>tfw still using a mobo that has an functioning PS/2 mouseport that isn't actually a hardwired PS/2 to USB converter.

I even have a PS/2 IBM mouse plugged in with a USB mouse plugged in at the same time. Sometimes the USB mouse takes a long while to load its drivers so I use the PS/2 one until it is ready.

>> No.1533539

>>1533527

you are an idiot then.

>> No.1533541

>>1533539
What? They weren't a thing in the Netherlands I guess. Never seen a regular computer with a lock, only industrial computer systems. At least as far as I can remember. I didn't live in a coloured ghetto like you did

>> No.1533542
File: 125 KB, 1280x720, maxresdefault.jpg [View same] [iqdb] [saucenao] [google]
1533542

>>1533527
You probably didn't know what you were looking at. Many used a round key thing.

>> No.1533545

>>1533541
>I didn't live in a coloured ghetto like you did

The lock restricts access in an office setting. They show up in home PCs because parent's didn't want their kids accessing newsgroups unrestricted.

>> No.1533546

>>1533542
Yeah I saw a lot of those but only on systems in a factory, never at school or at home. Same for the 'regular key' ones

>> No.1533547

>>1533545
We were connected to the internet a lot later than burgers. We had internet at home around 1996-7 which was years before it even got remotely mainstream here as my father needed it for work. Internet was only available after 1994 in NL and the first couple of years afterwards it was a super niche thing for a select few IT workers and hobbyist tech geeks.

>> No.1533557
File: 855 KB, 704x480, Snake Byte Gameplay Video.webm [View same] [iqdb] [saucenao] [google]
1533557

>>1533547
Apple donated a ton to schools all the time way back when. I used to take my dad's key from home and use it on the computers at school when skipping class so we could play Snake Byte and Oregon Trail.

>tfw hitting the TURBO button on the computer while playing a game

>> No.1533570

>>1533453
It could hold deception key.

>> No.1533581

>>1533473
Was thinking the same

>> No.1533590
File: 266 KB, 816x408, turbo-and-keylock-thumbmail.png [View same] [iqdb] [saucenao] [google]
1533590

>>1533557
>When you realized that TURBO actually slowed down the CPU clock to prevent frame skipping
>When it was two decades later before you noticed

Lies. Lies everywhere.

>> No.1533594

>>1533590
The ones those Apple computers had made the games unplayable because they were too fast for people to react when it was turned on. But, yeah, they throttled the CPU when they turbo was off.

>> No.1533607
File: 92 KB, 800x531, IMGP5702[1].jpg [View same] [iqdb] [saucenao] [google]
1533607

>>1533527
you didnt work with proper fucking computers, is your problem. Keys are still prevalent on server-level shit, and near standard on a lot of NAS stuff - anything you can take a disk out of. Naturally, you can bypass these with a spare mouse tail, but, a determined thief is just going to take the lot, and worry about the details later.
>Pic: An HP Microserver, #1 of 1 still-non-shit HP products

>> No.1533609

>>1533607
True, I never worked IT, just worked with and around computers. I did see server racks with locks, they are still around like you said

>> No.1533620

>>1533607
I'm looking at my rack right now and the only thing that has a key on it is the rack itself.
I have seen hotswap caddies with tumbler locks but never in person. If you allow someone physical access to a server a pissy little tumbler lock isn't going to stop them.

>> No.1533623

>>1533590
I had one of these, defs used it to ramp up my warcraft 3 play.

>> No.1533632

>>1533450
It's not worth getting a physical lock to prevent system startup, if you want to keep people from running shit on your computer, use the boot password function in your BIOS settings. If your goal is to prevent hardware theft, modification, and/or resetting of the boot password, you can use a lock on the back of the computer to keep it from being opened up. If you want to keep the entire machine from walking, you'll need to put it in a locked cage.
>I want to use physical keys to protect against software threats
That's... not how it works, anon. It is seriously best to use antivirus, if for some reason or another, you just refuse to, then you should at least use a good adblocker, scriptblocker and a browser that allows a high level of control over the settings; along with not downloading sketchy files and programs.

>> No.1533641

>>1533450
There are pins on most motherboards just for a lockout key.
I've got about five of the silly round locks in my parts bin.
Last time I used one was on a SCSI drive as a write protect lock.

>> No.1533643

>>1533632
Berry tru.

BIOS lock
HD lock (especially on removable drives)
Bitlocker (providing your OS supports it)

Used to have TrueCrypt, but I dunno if that is trustworthy anymore or not. questionable shit happened.

>> No.1533655

You could use a key lock switch? Modify the network card so only the key being turned compeltes the circuit or something. Or just needing a key to turn on the pc?

https://www.amazon.com/Philmore-Switch-Lock-Removable-30-10078/dp/B00B7N8FOW/ref=sr_1_3?ie=UTF8&qid=1547079144&sr=8-3&keywords=Key+Lock+Switch

>> No.1533668

>>1533632
>password
seems like the most obvious answer out there, its like a physical but you cant hotwire it

or just run linux as main boot an no one will want to use your pc

>> No.1533675

>>1533668
>Can't hotwire it
Actually, you effectively can, which is why it should be used in combination with a case lock to keep people from getting to the motherboard.

>> No.1533683

>>1533632
>bios password
>not just full disk encryption
why? if you can't be bothered replacing the bios chip directly then you are in luck because of bios manufacturer master passwords that leak or just someone can take your hdd out.
even a headless server you can leave an unencrypted partition to run something minimal like e.g. busybox to listen for a decryption key via ssh to continue booting.

>> No.1533702

>>1533450
>File: Screenshot_2019-01-09-15-55-59.png
https://www.youtube.com/watch?v=y0zZqHOZq7M

>> No.1533828

>>1533643
>Used to have TrueCrypt, but I dunno if that is trustworthy anymore or not. questionable shit happened.

Psyop more than anything. Truecrypt is likely still solid, just the devs were warded off.

>> No.1533861

>>1533683
>bios manufacturer master passwords that leak
...remove CMOS battery, no more bios password.

>> No.1533896

My Thermaltake Tsunami Dream case had a key to open the door at the front. You had to open the door to access the power button.

>> No.1533916
File: 1.55 MB, 360x640, comp_lock.webm [View same] [iqdb] [saucenao] [google]
1533916

>>1533499
>>1533527
>>1533537
>>1533542
>>1533546
>>1533590
I feel both old, and a need to visit the recycling center. Vid possibly related. Young me just turned the locks with a pocket clip snapped off a cheap pen or mechanical pencil.

>> No.1533934

>>1533828
True crypt is solid because you can compile yourself from the provided readable source code.

>> No.1533956

>>1533934
>True crypt is solid because you can compile yourself from the provided readable source code.

https://www.win.tue.nl/~aeb/linux/hh/thompson/trust.html

"No amount of source-level verification or scrutiny will protect you from using untrusted code."

>> No.1534703

My Lenovo workstation has a key but it's for locking the case itself.

Funny sidenote- I have a friend (from Texas) who was selling high end computers in Sweden in the 80s-90s. On request from a client he set up a system that would zap the internals with some ridiculously high voltage if the computer was physically moved. I think there was like a 3 minute window to disarm it. Pretty overkill security but it was for sensitive data.

>> No.1536038
File: 9 KB, 267x200, 1526530989575.jpg [View same] [iqdb] [saucenao] [google]
1536038

>>1533450
What about a chipcard lock ?
>Get a chipcard reader
>enable it in OS
>???
>tfw you have to manually insert card and pincode to access your desktop, and removing card insta-lock computers

>> No.1536147

Wire the main AC power (before power brick) through the key lock. Make sure its hot and not the ground one, so if someone tried to lockpick it he would get zapped

>> No.1536222

put your computer in a safe and drill holes for the cables inside. faraday cage it for extra hacker points

>> No.1536240

>>1533450
Why don't you just use a USB dongle?

>> No.1536353

>>1533450
Just use a fucking bios password. Only way to get passed it is to physically replace the bios chip. Computers are pretty easy to get into. Even if you had a bios pw i would just mirror your hdds and sift through the data. In this case you have to have a raid array, since the thieves don't know what kind of array you have, all the data that was copied is junk.

So bios pw, and raid array, preferably a raid 0 with 4 disks. That would be the hardest to get to. But still anything is hackable.

>> No.1536376

Wire your nuts to the mainframe. Turn on the power and feel your balls fry.

>> No.1536378

>>1536353
>raid 0 with 4 disks.
so you want 4 times the possibility of a drive failure and unrecoverable data. also raid isn't difficult to recover if you have enough volume members, i have cards that will recognize and utilize quite happily disk sets from different vendors, never mind cards. with the rise of software raid i can't see it being any more difficult to probe an open source topology.
never hear of disk level encryption before ffs.

>> No.1536392

>>1533607
Pretty sure the lock in your picture is to prevent access to the inside of the case whereas the lock in op's picture is an actual electrical component that doesn't allow the pc to be powered on unless the key is turned to the correct position.

>> No.1536393

>>1534703
Kek, was there a capacitor for several farads with size of a cup?

>> No.1536396

>>1536353
>using replication feature as a security feature because muh thieves are stupid
Are you actually mentally challenged?

>> No.1536417

>>1536393
no there was nothing, it didn't happen, the story was made up.

>> No.1536427

>>1536417
Well back in the day when I had zx spectrum it had this issue called the refrigerator. Each time that piece of sh~ equipment turned on the computer simply hanged. So my dad added a big ass capacitor that stood in the open, with wires attached. If was like 5 inch in diameter, and held charge like bitch. He used to discharge it with a screwdriver for sparking fun. Man those were times.

>> No.1536474
File: 346 KB, 492x491, tismcat.png [View same] [iqdb] [saucenao] [google]
1536474

>>1536378
Hey im just spitballing here

But.....
>unrecoverable data
>also raid isn't difficult to recover

Im assuming op is trying to hide cp, so im guessing backup would be retarded. So i guess raid 0 with 4 disks is out.

>>1536396
Well it doesn't hurt does it? shithead.
Also pic related

>> No.1536752
File: 88 KB, 334x334, 1529543048369.jpg [View same] [iqdb] [saucenao] [google]
1536752

>>1536427
>Well back in the day when I had zx spectrum
No you hadn't, post pic or it never happened

>> No.1536754

>>1533450
>using a key to hide your loli in current year
top jej

>> No.1536766

>>1536474
In actually does hurt, as you increase your chances of losing data.

>> No.1536783

Op are you handicapped? You connect the lock switch to the wire that connects to your button. All you do is splice it in between your motherboard and case. If you can build a computer you can splice a wire right? Also it's fucking stupid and pointless because software is able to "lock" the computer, and those lock switches are easily bypassed by "un-splicing" the wire. Carry on faggot homo.

>> No.1536797

>>1536396
>using replication feature
Raid 0 is for striping, there is no replication.

>>1536474
>Im assuming op is trying to hide cp, so im guessing backup would be retarded. So i guess raid 0 with 4 disks is out.
Raid 0 is not backup

Just forget the raid stuff, nothing about raid helps this situation.
The answer was already in another post, disk-level encryption.

>> No.1536817
File: 34 KB, 480x300, 1536004735612.jpg [View same] [iqdb] [saucenao] [google]
1536817

>>1533450
THREAD DERAIL PROPOSAL :

Considering :
1- OP is a faggot
2- That cold-war era computer case is so aesthetic I want to downgrade mine now

Let's turn this gay thread into a legit real /diy/ one.
As wood stickers can't be an option as the overall will look >>>/g/ay as fuck, I started looking at mahogany sheets.
Right now, I'm considering builing a new case on the ruin of an old one : first problem I see is how do I bend/arch a mahogany sheet to form a round-squared U "cover" like in OP pic.
Has any of you dealt with such material ?

Second part will be making a similar 2 buttons+freq.display : so far I'm considering making a simple SMbus-to-4digitsdisplay adapter and replacing the original reset+turbo setup by a power+reset one as, so far I know, there isn't any way to enable such a turbo mode through a wire in modern motherboard

What are your thoughts /diy/ ?

>> No.1536930

>>1536392
>non 'lectrical lock
yeah, entirely, it had turned into more of a general 'locks on PCs' thread by then tho. 'Electrical' (I believe the correct terminology is key switch) are less common nowadays, but, as said, NAS n shit, mechanicals often used to lock disks up, prob for no other reason than tradition, cant be that many retards still pulling disks from running systems to chew on. Either type, electrical or mechanical, still be wired to 230v to increase effectiveness. Take That, Jamal.

>> No.1538388

Does anyone know where LGR gets his woodgrain laminate?
I'm the sort of total degenerate who loves 80's fake woodgrain, and his stuff is fucking great.

>> No.1538412

>>1533450
No "hacker" gives a shit about your computer. They want big data from big companies to ransom. A keylock doesn't have a damn thing to do with malware. And a keylock doesn't do a damn think to prevent anything other than casual family members / coworkers from dicking with your computer. They are easily defeated by anyone determined who has a couple brain cells. Also: don't spend a bunch of money of a PC. If you are poor just throw together something for cheap. Computers literally litter the planet, and 10 year old machines work fine for shitposting.

>> No.1540870

nice