I've been looking in to this recently.
XP uses LAN Manager (LM) for storing and hashing passwords, it's crypto is really weak because it splits the hash up into smaller pieces making attacks really fast, you can find the plaintext password of LM hashes a 16 length password using full 95char set in next to no time.
NT onwards (NT/2k/Vista/Win7) all use NT LAN Manager (NTLM) which does away with the stupidities of LM and is a bit stronger, but it still doesn't use a salted hash so short passwords of about 4-5 charcaters using full 95char set can be brute forced very fast.
Character lengths of 5-8 (again full 95char set) can be brute forced with the aid of Rainbow Tables, rainbow tables essentially use a space/calculation time trade off by pre-computing lots of values, rainbow tables for are widely available for NTLM hashing, although if you want to crack up to 8 length you'll need about 1.5Tb of space.
Rainbow tables exist for 9 length passwords in places, although at this point the tables get very large and you have to start reducing the character sets to things like just alpha numeric or other "smarter" subsets like X alpha + Y numeric on the end is common, or X alpha with uppercase first letter only.
Anything past length 9 is basically past the average cracker, you need server farms and super computers, so I'd say right now that 9 length password using upper/lower/special character is pretty safe. Having said that it depends how valuable your data is to an attacker, it's a process that works very well with distributed computing so someone with access a super computer, or someone with say a botnet under their control of thousands of PCs could feasibly crack slightly larger hashes using brute force.
Length is by far the best safety measure here, it's better to have a long but easy to remember phrase for example "thispasswordiseasytoremember" than to have something like L62^nk8
I'm actually in the process of downloading the Rainbow Tables for 8 length full 95charset, for all lengths 1 through 8 is abotu 1.5Tb total. I've already got len7 and generated my own for len6 and below. There's a great free app called Cryptohaze which runs the brute force attack using rainbow tables on a GPU which MASSIVELY speeds up the brute force, I've done real world testing with Windows 7 passwords and I can break a 6 length full 95Charset password somewhere between 3 and 5 seconds on my GTX 580.
Most decent security systems relying on passwords already use salts which stop this kind of attack, at least until space/calculation speed increases significantly, I'm not sure about phpbb because I don't work with it, I work with the ASP.NET security tables mostly and they support salted passwords by default. I know Linux uses salted passwords as well. A cursory search of phpbb it looks like it does use salted passwords.