Solved

Setup Boot Floppy

Posted on 1999-01-20
6
182 Views
Last Modified: 2013-12-16
How does one create the Window 95/98 Setup Boot Floppy?
0
Comment
Question by:rwberger
  • 3
  • 2
6 Comments
 
LVL 9

Accepted Solution

by:
larbel earned 100 total points
ID: 1761641
Go to Control Panel>Add/Remove Programs>Startup disk and click on create disk...
0
 
LVL 9

Expert Comment

by:larbel
ID: 1761642
You must have your Win95/98 CD ready BTW.
0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1761643
rberger,
Do you have Windows presently installed?
If not, the procedure will be somewhat different......
Regards,
Ralph

0
Why do Marketing keep bothering you?

Is your marketing department constantly asking for new email signature updates? Are they requesting a different design for every department? Do they need yet another banner added? Don’t let it get you down! There is an easy way to manage all of these requests...

 

Author Comment

by:rwberger
ID: 1761644
I want to know how to create the Setup Boot floppy, not a startup disk. For example, on Windows NT, the Setup Boot floppies are created by running Setup from the Windows NT Workstation CD with the /ox switch.

%cdrom%\i386\winnt32 /ox

This creates the 3 NT Setup floppies. Is there something similar for Windows 95/98?

Thanks
0
 
LVL 9

Expert Comment

by:larbel
ID: 1761645
Unlike NT, there's no setup floppies that guide you step by step to install Win95/98.  The Startup disk created using this method is pretty much the same as the setup disk that comes with Win95/98 OEM version.  Win95 doesn't provide CDRom driver while Win98 does have the driver so you should also have a CDRom driver installation disk if you're to setup Win95.
0
 

Author Comment

by:rwberger
ID: 1761646
Thanks. This is what I needed to know.

Ramon
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
antivirus on mac 8 64
Read-only access for auditors 5 43
network copying issue 4 39
how to copy from computer to usb drive 7 66
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now