Solved

Cannot find the file 'RCONSOLE.EXE"

Posted on 1998-05-01
4
750 Views
Last Modified: 2008-02-01
Greetings,

I am not able to run remote console from nwadmin. It prompted:

Cannot find the file 'RCONSOLE.EXE". Make sure that the file exists on your system and that the path and filename are correct.

As checked with the windows explorer, there is already a Y search drive to the public directory which contains console.exe.

Pls advise on the above resolution.

TIA
0
Comment
Question by:danfoo
  • 2
4 Comments
 
LVL 2

Expert Comment

by:calger
ID: 1592321
In you question you said that there is a Y search drive to the public directory which contains CONSOLE.EXE - did you mean to type Rconsole.exe?
0
 

Author Comment

by:danfoo
ID: 1592322
Yes, rconsole.exe not console.exe, a typo error.

0
 

Accepted Solution

by:
radtke_j earned 50 total points
ID: 1592323
NWAdmin invokes rconsole.exe via a pif file called nwrcon.pif. Nwrcon.pif resides normaly in the same directory as your NWAdmin. The pif file can contain volume and path to define location of rconsole.exe.

Check if nwrcon.pif exists at expected place and contains valid values.
0
 

Author Comment

by:danfoo
ID: 1592324
Path the y:\win95\rconsole.exe in the nwrcon.pif.

Copied IBM_RUN.OVL from login directory to Y:\WIN95 directory which contains nwrcon.pif and nwadmn95.exe when an error occurred   about not having "IBM_RUN.OVL" during execution of RCONSOLE from NWADMIN.

Able to run rconsole but could not see any server after selecting SPX as the protocol. When tried to select by IPX internal network number which I know from the server startup file, error msg prompted:

RCONSOLE-4.10-113: The server connection was terminated by AllocateConnection. Press <ENTER> to continue.

Pls advise on the above resolution.

TIA

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

What does UTC stand for?  “Coordinated Universal Time” – Think of this as the true time on Planet Earth that never changes with the exception of minor leap seconds here and there to account for the changes in the planet's rotation.   What does th…
An analysis of the phishing scam that has been affecting Google users, along with steps to take for protection, as well as what to do if you receive one of the emails.
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now