Solved

Transferring software from cd to floppy

Posted on 1997-11-18
2
194 Views
Last Modified: 2010-04-12
Is it possible to take the data from a software cd and transfer it to (many) floppies that will then load to hard drive? I have a couple of computers that do not have cd drives installed.....
0
Comment
Question by:chinman
  • 2
2 Comments
 
LVL 4

Accepted Solution

by:
johnt082197 earned 50 total points
ID: 1016587
Though it'd be easier to use Interlink with a parallel cable, yes, it is possible.
All you need is a software for backing up this data.
There's a backup with DOS and Windows, but it tends to not be compatible between different verions of the software. So if you don't have the exact same OS version on all the systems, don't use that.
Rather, send me an E mail at johnt@mail.club-internet.fr and I'll send you ARJ.EXE that'll do the job perfectly
0
 
LVL 4

Expert Comment

by:johnt082197
ID: 1016588
In your E mail, you asked:
"Can you explain more about the parallel hook-up?"

So my answer is: Sure...

You need a regular parallel cable, like the one you use with a printer, but with 2 parallel ends, not one parallel and one centronic.

having that, you plug the cable in the parallel ports of 2 computers.
From DOS, you type: INTERSVR  on computer 1
On computer 2, edit config.sys and add the following line:
device=c:\dos\interlnk.exe
Then reboot.
The link is made, you have some extra drive on computer 2.
Check computer 1's screen to see information about this

0

Featured Post

Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

Join & Write a Comment

Upper back Pain: My back hurt for months. Upper back, mostly my neck, spine and across my shoulder blades. I was getting headaches too, that felt like they were caused by tension in my shoulders, but now I feel fine! I'm sharing this hoping someone…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now