Solved

format Hard Drive?

Posted on 1998-11-23
3
195 Views
Last Modified: 2012-05-04
I am trying to reformat my hard drive but when I try to windows tells me that I cant because C drive contains files in use by Windows. I do not know how to re-install Windows as I had to get someone else to do this as I am a newbie!
I have a CD-RW that I can back up to and I also have a 1-gig SCSI hard drive waiting to go into my machine but I dont want to put windows on it!  Idealy I would like to COMPLEATLY clear my existing 4.3 hard drive and then partition it so I can keep better control of it!
CAN ANYONE HELP?
0
Comment
Question by:BobSinclair
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
rmarotta earned 50 total points
ID: 1129580
Bob,
First, backup your important files.
Then, you need to create a bootable floppy disk with your CD-ROM drivers on it.
Using FDISK and FORMAT, you can then partition and format the drive as you wish.
When that's done, you run setup from the Windows CD to imstall.
Let me know what details you need, and I can step you through it.
Regards,
Ralph
0
 

Author Comment

by:BobSinclair
ID: 1129581
Also, How can I partition my drive if it is 4.3 gig,  does this not mean that it is FAT32 and cant be partitioned?

0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1129582
FAT32 is an option if you have a recent release of Win95 or 98.
It can partition the drive's full capacity into a single partition if you wish.
Early Win95 (before OSR2) does not have FAT32, so using FAT16, your partition size will be limited to approximately 2GB each.
Run FDISK, and if it asks you if you want large disk support (FAT32), then you know it's available.
Let me know what you want to do.
Ralph
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The Rasberry PI is a low cost piece of hardware that you can have a lot of fun with through experimenting and building/working on projects like media players, running a low cost computer, build data loggers etc. - see: https://www.raspberrypi.org
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.
Suggested Courses

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question