Solved

enabling Hosts file on OS/2 Warp 4

Posted on 1998-09-17
2
559 Views
Last Modified: 2013-12-23
How do you enable hosts file on OS/2 Warp 4.  What directory you put it in.  is c:\tcpip\etc?  How can you save the file in ASCII.  I know that it prompt you to save the file either in text, OS/2 command prompt, or DOS command prompt.  Any suggestions??? help...
0
Comment
Question by:JNGIN
2 Comments
 

Accepted Solution

by:
jpmcdon earned 20 total points
ID: 1558386
The hosts file is always "enabled" in OS/2, unlike in Windows where you need to rename the "hosts.sam" file to "hosts" in order to "enable" it.

However, the hosts file is empty by default.

The way to add a host to your hosts list:
1) Open an OS/2 command prompt
2) Type TCPCFG and press Enter
3) In a few seconds the TCP/IP Configuration window will open
4) Click on the HOSTNAMES tab on the right of the window
5) Go to "page 2" of the HOSTNAMES tab by clicking the right-arrow in the lower right corner of the window
6) The list of hostnames that are defined on your system will be displayed in a box, with a series of buttons below it.  By default, the box only contains <NO ENTRIES>
7) Click the ADD button
8) Fill in the IP Address field with the IP number (i.e. 9.91.4.10), the Hostname field with the full host hame (i.e. www.ibm.com).  You can optionally add a short "alias" for the hostname (like "IBM"), as well as a comment that will be displayed in the listing.  These two parameters are not required, however.
9) Click the ADD button.  You should see your new hostname in the list.
10) Exit TCP/IP configuration by double-clicking the icon in the upper-left corner of the window (close the program).  You will be asked if you want to SAVE or DISCARD your changes - click SAVE.11) The program may tell you it needs to make changes to the CONFIG.SYS file - click YES if asked
12) The program may also ask you if you want to configure SENDMAIL.  Click NO when asked.

You will likely not need to reboot the system for this change - test it by using your still-open command window to "ping" your new hostname.
0
 

Author Comment

by:JNGIN
ID: 1558387
Good answer.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
networking details on centos 6.6 4 52
Booster, Repeater, or Wireless Access Point 9 45
SOFS cluser offline 3 43
Sonicwall blocks a site 49 57
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now