Solved

Access Windows Partition

Posted on 2002-07-20
2
216 Views
Last Modified: 2013-12-06
I have 20 Gb Hard Disk, equally partitioned into 4 segments. Windows XP resides on C: and Linux Red Hat 7.2 on D: while E: and F: are for mp3s and video songs plus backups.

C:, E:, F:(All Fat32)
D: (Converted to ex2/3 dont remember while linux installation)

Now how to make all the C:, E: and F: available under linux? Is there any way that I can do that permanently?

As I am a novice user of Linux, so please explain it in detail.... also the possible error and their handeling.

Thank you.

Deepesh


0
Comment
Question by:deepeshp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Accepted Solution

by:
veeraganesh earned 100 total points
ID: 7167169
ok
the best way to access ur windows partion is go to the console(i hope u know this which is like command prompt).then type su(no need if u login as root)after typing su enter the roots password.
then issue the folloeing commands

$mkdir /mnt/ur_dir(ur_dir means in this place u can type ur liking directory for example i made ur_dir u can make /mnt/win_c)
then
$mount -t vfat /dev/hda6 /mnt/ur_dir

this
is something confusing which drive u want to mount u should know its number
suppose i am having c: d: e: f: drives
as hda1 becomes c: drive know d: drive i am using for linux so hda5 will be linux (after 1 5 why?because primary partions can be 4 that why)so e: becomes hda6 similarly f: hda7 so depending on u r requiremnets mount hda 6 or 7.


IF U HAVE ANY QUETIONS SEND THEM BACK
0
 

Author Comment

by:deepeshp
ID: 7167947
Thank you anyway... but I made it ther way...
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

1. Introduction As many people are interested in Linux but not as many are interested or knowledgeable (enough) to install Linux on their system, here is a safe way to try out Linux on your existing (Windows) system. The idea is that you insta…
The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Suggested Courses

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question