Solved

Hard drive installation problem

Posted on 1998-02-16
2
194 Views
Last Modified: 2010-04-12
Helped a friend install a 1.2 gig Quantum fireball hard drive on his system, a 486dx4-100. When his old drive, a 210 meg Connor, was set to master, the system wouldn't recognize the new drive, even though the Quantum jumper was on slave and the Connor on master. When the Quantum was set on master, set-up quickly recognized both and showed the correct settings.
Only problem, the operating system (Win95) is on the Connor, and we couldn't get the system to read it -- kept saying 'no operating system present.'
What's the next step? We thought of installing win95 to the Quantum, but it's on cd, and the driver is on the Connor! We are stumped!
0
Comment
Question by:sherm
2 Comments
 

Accepted Solution

by:
dreadlux013098 earned 100 total points
ID: 1018310
Sherm,
The answer to your problem us to first replace the conner drive as master.  After doing so create a boot disk and copy off all the relevant drivers.  Set up your autoexec.bat and config.sys files so that they point to the drivers on the floppy.  Restore the drives to their original configuration with the conner as slave.  Boot up the machine with the diskette.  The  CD should now be available for the installation.

Hope this helps you!

Dreadlux
0
 

Author Comment

by:sherm
ID: 1018311
Thanks Dreadlux

We'll try that. One more thing -- I'm not used to changing the autoexec and config files. Could you give me a few pointers on what and how to change them?


0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

26 Experts available now in Live!

Get 1:1 Help Now