Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


AnotherQ: what about hostnames in win98

Posted on 2001-08-17
Medium Priority
Last Modified: 2010-04-13
I got to know of an idea, how to make my public, Class A STATICALLY ASSIGNED ip address be assigned to hostname using my win2k.

ex.   or     or

and how do i change it when i like to change it? where in win2k is that!?!

coz now in my win2k advance server, what i have configured is the which my ISP told me is configured in by default as i am directly connected to them via modem (yeah modem...) ,(i can verify that coz i got my webserver running for half a year now), and the ISP sys admin told me that i should install DNS in my win2k server to have what i need. but the guides and white papers that i have gone havent had details regarding this. or maybe what is in the book are just too complicated than my set-up. my set-up is particularly specific i guess. and take note too, i dont have control with my ISP and they're using SunOS and other Linux distro combos, no win2k they said. how do i make this possible.


Question by:sir_giatay
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Author Comment

ID: 6398487
and by the way these machines are win98 original not win98SE


Accepted Solution

gregcmcse earned 800 total points
ID: 6403965
I'm not entirely clear on your question.  If you're asking, "How do I assign static IP addresses to specific Windows 98 machines", the best answer is to use DHCP and configure reservations for each machine.  You create a reservation by using the MAC address on the network card as the DHCP unique identifier and then specifying the address you want it to have.  You can also specify the hostname and use DHCP server options to assign domain name, DNS servers, WINS server, etc.

Expert Comment

ID: 6855456

Question(s) below appears to have been abandoned. Your options are:
1. Accept a Comment As Answer (use the button next to the Expert's name).
2. Close the question if the information was not useful to you. You must tell the participants why you wish to do this, and allow for Expert response.
3. Ask Community Support to help split points between participating experts, or just comment here with details and we'll respond with the process.
4. Delete the question. Again, please comment to advise the other participants why you wish to do this.

For special handling needs, please post a zero point question in the link below and include the question QID/link(s) that it regards.
Please click the Help Desk link on the left for Member Guidelines, Member Agreement and the Question/Answer process.

Please click you Member Profile to view your question history and keep them all current with updates as the collaboration effort continues, to track all your open and locked questions at this site.  If you are an EE Pro user, use the Power Search option to find them.

To view your open questions, please click the following link(s) and keep them all current with updates.

To view your locked questions, please click the following link(s) and evaluate the proposed answer.

------------>  EXPERTS:  Please leave any comments regarding your closing recommendations if this item remains inactive another seven (7) days.  Also, if you are interested in the cleanup effort, please click this link
Thank you everyone.
Moderator @ Experts Exchange

P.S.  For any year 2000 questions, special attention is needed to ensure the first correct response is awarded, since they are not in the comment date order, but rather in Member ID order.

Expert Comment

ID: 6972521
Force-accepted by
CS Moderator

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : All lightning effects with instructions : http://www.mediaf…
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…

664 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question