Solved

Files not placed in folders.

Posted on 1997-11-05
3
170 Views
Last Modified: 2013-12-29
When looking at the contents of my C drive I notice there are alot of files that are not placed in folders, but instead are listed after the folder.  I don't know how they got there and I suspect they aren't especially necessary.
Can anything be done to clean up there lose ends. I have over 40 entrys.
0
Comment
Question by:jconover
3 Comments
 
LVL 9

Expert Comment

by:magigraf
ID: 1699667
They might be necessary, not all of them but some..
Is it too much to list them here??

Regards
0
 
LVL 2

Accepted Solution

by:
Dane Pickering earned 50 total points
ID: 1699668
The following files are all needed. The others may be needed depending on what and where you have installed applications to.

autoexec.bat
bootlog.prv
bootlog.txt
command.com
config.sys
dblspace.bin
drvspace.bin
io.sys
msdos.sys
suhdlog.---
suhdlog.dat
system.1st
wina20.386


If you are booting into your old version of dos then there will be the following files.

autoexec.dos
command.dos
config.dos
io.dos
msdos.dos


0
 

Author Comment

by:jconover
ID: 1699669
Autoexec.000   Autoexec.000   Autoexec   Autoexec.nu  Autoexec.org   Autoexec.osi  Autoexec.pif  Bookmark.htm  bootlog.prv    Bootlog.txt   Config.sys   Cookies.txt  
Cwsdpmi.swp  Dderr.txt   Clworks.gid   Command.com  Config.org
Config.osi   DelsL1.isu   Dell.sdr  Detlog.txt  Drvspace.bin  File0001._dd  File0002._dd   H2h.bat   Image.bak  Image.dat
Image.idx  lo.sys  Lcache00.tmp  Priv_msg.com   Program  Refresh.exe  Scandisk.log  license   Msdos.--  Msdos.sys  Netscape.hst  Oemlog.txt   __ofidx.ffa  __ofidx0.ffl   __ofidxT.ffl   Address.txt  
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
use subinacle for permission translation on Win 10 machine 3 50
virus question? 6 75
domain controllers numbers 4 76
Cygwin - GNU GPL License 1 24
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
If you need to start windows update installation remotely or as a scheduled task you will find this very helpful.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question