Solved

Capacity of Hard Drive

Posted on 2000-05-12
2
177 Views
Last Modified: 2010-04-27
I have a 3 GB hard drive that when I do a fdisk on later model PC I can see and access the whole hard drive.  When I take the hard drive out and put it in an older model PC (486 66mhz), I can only access 500 MBs of disk space.  Is there anything I can do or software I can run so I can see the whole hard drive in the older PC.  The hard drive has Windows 98 and other software on it, but I cannot access it in the older PC.
0
Comment
Question by:paseo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Accepted Solution

by:
steventia13 earned 75 total points
ID: 2804378
In the CMOS setting, you must set the hardisk detection to LBA mode (no normal mode) or to enable the >540Mb mode. So the PC can access the data but you must have win95b or win98 boot disk to boot it. Do not use the win95a or dos to boot your PC.
0
 
LVL 13

Expert Comment

by:oldgreyguy
ID: 2806208
Most likely the BIOS in your 486 will not understand the size of the drive, you can go to the hard drives manufacturer website and download their version of EZ-Drive (or whatever they call their disk overlay program). But in using this you will probable lose what information you currently have on the drive

www.quantum.com
www.fujitsu.com
www.westerndigital.com
www.seagate.com
www.ibm.com
www.maxtor.com
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question