Solved

PS2 model 80 (getting it into selftest) this one's for the nestagic(sp)

Posted on 2000-04-27
5
262 Views
Last Modified: 2010-04-29
A IBM PS2 model 80 has lost it's cookies.  In other words it can't remember what it's cmos configuration was.  There is a way during reboot to get it into self test.  This will setup the microchannel, memory and other configurations so that it can boot properly.   Any of you old timers out there remember what the three fingered salute was to start the process.  I have a few of these machines that are just fine for mail and the web but I can't remember what the key sequence was.  HELP.. If you remember this will be an easy 300 points
0
Comment
Question by:graber
  • 3
  • 2
5 Comments
 
LVL 1

Accepted Solution

by:
chev earned 300 total points
ID: 2755485
If it is possible on your machine it is Ctrl-Alt-Ins after Ctrl-Alt-Del. If nothing happens when you hit Ctrl-Alt-Ins at the prompt then you must use the reference disk to change CMOS values. Take a look here: Http://www.computercraft.com/docs/ps2sect.html.. Have Fun !!! Good Luck !!!

0
 
LVL 2

Author Comment

by:graber
ID: 2755998
Hey Chev thanks for responding. I will attempt this tonight and get back to ya.  I think you are right.  At least the salute sound familiar.  Again thanks.  And the people that will get the computer thanks you.
GARaber
0
 
LVL 1

Expert Comment

by:chev
ID: 2763513
So did you get it all to happen ?.. I would like to bring close to this question..

Cheers
Chev
0
 
LVL 1

Expert Comment

by:chev
ID: 2763643
So did you get it all to happen ?.. I would like to bring close to this question..

Cheers
Chev
0
 
LVL 2

Author Comment

by:graber
ID: 2764666
Been out for a while Chev.  Herniated Disk.  Thanks.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
I have Eikon Upek fingerprint Code:A1H6A3 9 38
Calibrating x & y screen  pixel coordinates 1 41
new laptop new users 8 47
Uniden UDW20055 3 31
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question