Solved

formatted C now can't boot a start up floppy

Posted on 1998-12-30
15
143 Views
Last Modified: 2013-12-16
wiped off win98 from C drive as heaps of problems now it says the start up disk is not a system disk ? i have another p.c as you can see runnin win95 and have followed instructions from other faults with no cd-rom but it says "loading boot record from IDE-0..ok"
"invalid system disk ...replace the disk then press any key"
what do i do NOW???????????????
0
Comment
Question by:kiwiborn
  • 8
  • 7
15 Comments
 

Author Comment

by:kiwiborn
ID: 1760895
and this is just the start.........lolololol
0
 
LVL 10

Accepted Solution

by:
rbr earned 40 total points
ID: 1760896
Enter the Bios and change the boot sequence to A,C
0
 

Author Comment

by:kiwiborn
ID: 1760897
so the first is to be A not IDE-0 is that correct.............as the sequence is now
1st IDE-0
2nd A
3rd CD-rom
0
 
LVL 10

Expert Comment

by:rbr
ID: 1760898
Yes you have to boot from a disc after you have delete your Windows. If you have a bootable CD you can also try to boot from CD. It looks like your BIOS supports this.
0
 

Author Comment

by:kiwiborn
ID: 1760899
ok.  have loaded boot from floppy starting windows 95...  
Then it says -  ATAPI IDE CD ROM device driver version V1.53 etc warning invalid paramater ignored: /e:mscd000
1 drive detected
unit 0, slave, irq 14, i/o address 0x01f0

a:\>mscdex.exe/e:mscd000/m:15/v
expanded memory not present or not usuable
illegal option
usuage:mscdex [/e/k/s/v] [/d:>driver< ... ] [/l:<letter>] [/m:>buffers<]
a:\>e:
invalid drive specification

so what have I done wrong?  Why cant I use my CD rom which is in drive e because I have two hard drives c and d.
0
 
LVL 10

Expert Comment

by:rbr
ID: 1760900
First you change /e:mscd000 to /d:mscd000
and change
mscdex.exe/e:mscd000/m:15/v
to
mscdex.exe/d:mscd000/m:15/l:e/v
0
 
LVL 10

Expert Comment

by:rbr
ID: 1760901
First you change /e:mscd000 to /d:mscd000
and change
mscdex.exe/e:mscd000/m:15/v
to
mscdex.exe/d:mscd000/m:15/l:e/v
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:kiwiborn
ID: 1760902
Do I change these on my boot disk? as this is the only way I know how!
0
 
LVL 10

Expert Comment

by:rbr
ID: 1760903
Sorry I don`t understand your question?
0
 

Author Comment

by:kiwiborn
ID: 1760904
ok change them but still has error saying
a:\>mscdex.exe/d:mscd000/m:15/l:e/v
illegal option
usage :mscdex [/e/k/s/v] [/d:<driver>...] [/l:<letter>] [/m:<buffers>]

these numbers I got from expert exchange from reading other peoples problems, are they correct for my pc?
0
 
LVL 10

Expert Comment

by:rbr
ID: 1760905
Try to put blanks between the options
mscdex.exe /d:mscd000 /m:15 /l:e /v
0
 

Author Comment

by:kiwiborn
ID: 1760906
Sorry but do not understand what you mean by BLANKS?  Can you write it as you want me to please.

PS, if we get this fixed, you will be getting a lot more points!!!!!!!!
0
 
LVL 10

Expert Comment

by:rbr
ID: 1760907
Blank=Space The long key at the bottom of your keyboard.
0
 

Author Comment

by:kiwiborn
ID: 1760908
As soon as I can get some more points as this is all I have, I will find some way to give you more.  Thanks VERY much for all your help, I hope the installation goes sweet from here.  All the best for '99.  Its proving to be a great year as we are already in it in New Zealand.  Once again thanks heaps.
0
 
LVL 10

Expert Comment

by:rbr
ID: 1760909
You don't need to give me more points. Was an easy question.
Thx and Happy New Year from Austria at the other side of the earth.
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Suggested Solutions

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now