Solved

Cannot find the file 'RCONSOLE.EXE"

Posted on 1998-05-01
4
737 Views
Last Modified: 2008-02-01
Greetings,

I am not able to run remote console from nwadmin. It prompted:

Cannot find the file 'RCONSOLE.EXE". Make sure that the file exists on your system and that the path and filename are correct.

As checked with the windows explorer, there is already a Y search drive to the public directory which contains console.exe.

Pls advise on the above resolution.

TIA
0
Comment
Question by:danfoo
  • 2
4 Comments
 
LVL 2

Expert Comment

by:calger
ID: 1592321
In you question you said that there is a Y search drive to the public directory which contains CONSOLE.EXE - did you mean to type Rconsole.exe?
0
 

Author Comment

by:danfoo
ID: 1592322
Yes, rconsole.exe not console.exe, a typo error.

0
 

Accepted Solution

by:
radtke_j earned 50 total points
ID: 1592323
NWAdmin invokes rconsole.exe via a pif file called nwrcon.pif. Nwrcon.pif resides normaly in the same directory as your NWAdmin. The pif file can contain volume and path to define location of rconsole.exe.

Check if nwrcon.pif exists at expected place and contains valid values.
0
 

Author Comment

by:danfoo
ID: 1592324
Path the y:\win95\rconsole.exe in the nwrcon.pif.

Copied IBM_RUN.OVL from login directory to Y:\WIN95 directory which contains nwrcon.pif and nwadmn95.exe when an error occurred   about not having "IBM_RUN.OVL" during execution of RCONSOLE from NWADMIN.

Able to run rconsole but could not see any server after selecting SPX as the protocol. When tried to select by IPX internal network number which I know from the server startup file, error msg prompted:

RCONSOLE-4.10-113: The server connection was terminated by AllocateConnection. Press <ENTER> to continue.

Pls advise on the above resolution.

TIA

0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

This article will show you how to create an ISO CD-ROM/DVD-ROM image (*.iso), and MD5 checksum signature, for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5). It's a good idea to compare checksums, because many installations fail because of a corr…
We have come a long way with backup and data protection — from backing up to floppies, external drives, CDs, Blu-ray, flash drives, SSD drives, and now to the cloud.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now