We've conducted computer forensics investigations for a dozen years, back when we would boot a system into a DOS prompt with a floppy. Of course, that diskette was write-protected by sliding the plastic tab at the top to reveal that square hole. Safety first. Time progressed, technology evolved, and diskettes are collector's items. And MS-DOS? [...]