MacOS File - 2 Gig Limit?

Posted on 2003-02-20
Medium Priority
Last Modified: 2010-04-29
I have a movie file thats 3.8 gigs is there a way to get around the MacOS 2 gig filesize limit so I can move it to that computer?
Question by:mruncola
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
LVL 30

Expert Comment

ID: 7988186
Sounds like you're something less than OS 9. Under OS 9 and OS X the file size limits are significantly higher. Somewhere around 2TB.

Author Comment

ID: 7990724
Im on OS 9.2.
LVL 30

Accepted Solution

weed earned 200 total points
ID: 7996249
Perhaps you're running into Appleshare transfer size limits. Try using FTP instead.

Featured Post

Limited time offer using promo code EXPERTS30

Designed with a wealth of functionality and convenience, ATEN's new Thunderbolt™ 2 Sharing Switch takes your Thunderbolt setup to the next level. Now through September 15, 2017, Experts Exchange members get 30% off the US7220 on the ATEN USA eShop using promo code EXPERTS30.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Create a default user profile for Mac OS X 10.7/10.8 Create a user account on OS X that will be a template for every other user of that computer. I usually call it “profile” and make it an administrator account for the time being. 1. Install a…
There is a security feature on iOS devices that is nearly impenetrable when it has been activated.  This article will provide some possible solutions as well as necessary steps to take to ensure you do not end up with a locked device.
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question