Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

installing a slave harddrive

Posted on 1998-06-16
5
304 Views
Last Modified: 2010-04-26
i want to take the 1.2 gig samsung hardrive, which is running windows98 beta. out of my old computer and install it to my new one which already has a 7.0 gig maxtor harddrive which is running windows95... i installed it and hooked up the cables but i don't know how to get the system to reconize that i have a second harddrive or or set it up so that it is lable drive D:/  so my cd-rom can be labeled drive E:/  .. i tried to use the add new hardware in windows95 but it did not detect any new hardware ... help me please =(
0
Comment
Question by:skillz
  • 3
5 Comments
 
LVL 9

Expert Comment

by:rmarotta
ID: 1019262
skillz,
Have you set the jumpers on each drive correctly for master/slave operation?  Data cables oriented correctly?
Please post your autoexec.bat & config.sys files here, if any.
Regards,
Ralph

0
 
LVL 1

Accepted Solution

by:
jmcguir earned 20 total points
ID: 1019263
Here are the steps that you must go through to hook up the drive:

1: Set the jumpers on the master and slave drives accordingly.
2: Hook the drives up on the EIDE chain.
3: Boot the computer and enter the bios.
4: If the bios has an "Auto Detect Hard Drives" option, select it. Otherwise, set Primary Master and Secondary Master drives to the correct drive types.
5: Boot the computer and edit the AUTOEXEC.BAT. Ensure that the MSCDEX line has the option /L:E. This will set your CD-ROM drive to E:.
6: Format the new D: drive.

Hope this helps!
0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1019264
MSCDEX.EXE assigns the next drive letter automatically after physical hard drives are detected.
But, the MSCDEX ststement is unecessary for configuring the CDROM to be used in Windows95, and will probably cause Dos compatibility mode problems.
Skillz, we need some feedback from you.
Ralph

0
 

Author Comment

by:skillz
ID: 1019265
j mcguir you answers was on the money .. even tho i didn't know any ms dos commands, after i figured out that i had to set the CMOS to reconize that second harddrive o was on a roll ... i even was looking at the harddrives in dos mode something i've never done because of my limited know of it..  
   rmarotta   you confussed me a little bit .. i guess you assume that i knew what i was doing .. after the drive wasn't detected i was lost... but i needed to changed the CMOS you was right about auto detection i think because i don't remember doing nothing =)
0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1019266
I'm glad you got it going.
Just to make sure everything is satisfactory, right-click My Computer icon and then click performance tab.
It should tell you that the computer is configured for optimal performance.
Then click Device Manager tab to see if any conflicts are listed. (! on a yellow circle)
Regards,
Ralph

0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is it worth it to buy an Echo? In a word, yes! For me it was definitely worth it. I use mine on a daily basis. Prologue & Privacy At first, I was very skeptical about the Amazon Echo. In general, I don't like voice assistants. I don't li…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question