?
Solved

Damaged Partition Table after install of RedHat 8

Posted on 2003-02-22
5
Medium Priority
?
155 Views
Last Modified: 2010-04-26
Hi,

I have a Western Digital 100GB HD.  I recently installed Red Hat 8 and configured it to dual boot with my win98 partition.  Prior to the red hat install I had 3 20GB FAT32 partitions setup using partition magic 7.  Then while installing Red hat I gave 10GB to linux aswell as a boot partition and a swap partition.  The rest I made 5 GB fat32 partitions.
That was fine for a while, I was able to use Win98 and linux side by side, but then I tried to run partition magic 7.  It threw up a few errors to me saying there were some incorrect values in the partition table and asking if I wanted to fix them, so I said fine.  Then after fixing all them I got a 117 error message saying it couldn't get a drives letter.  And then whenever I tried to start PM it gave me that 117 message.  I tried to run fdisk, but it wouldn't let me run, it just hung.  So I upgraded to PM 8, and that made no difference, I still got the 117 error.  So then I decided to delete my linux partitions, so I started linux in rescue mode and deleted all the linux partitions. Then in windows again I was still getting the 117 error in PM, but could run fdisk, so I deleted all the empty partitions, which left me with 3 20GB partitions and a 5 GB one.  The drives were C,D,E and F, but my zip drive was registering as drive I, and my 2 CD drives were J and K.  So I started up Iomegas drive mapper and changed the drives to run consequetivly C-I.  And now I'm left with a machine that hangs when starting windows.  Although I can get it to start in Safe Mode, my zip drive isn't recognized, so I can't use drive mapper to go back to the C-F,I-K mapping that was booting for me.  While in safe mode I thought I'd try and remove as many of the partitions as I could, so I tried to copy stuff from the 5GB partition to my C drive, and I started to get access violations, so I ran scandisk and I got loads of errors about directories and lost files etc.
Thats about it, I hope I've given enough detail to give someone an idea as to what is wrong.  I would really appreciate a fast answer to this that doesn't requiere reinstalling Win98 as I have a programming assignment to have done for Tuesday (3 days away) and I  need to use my computer.

Thanks
0
Comment
Question by:amcgin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 

Author Comment

by:amcgin
ID: 7998537
Turns out that if I disable the line in my autoexec that starts my virus scan software (McAffee 7) it boots up, and now with just the 3 20GB partitions I can start PM 8, however only 2 of the partitions show in PM, but I can still access the 3 partitions in Windows Explorer.
0
 
LVL 12

Accepted Solution

by:
public earned 300 total points
ID: 8000303
Run the red hat installation to the point where it offers to manually partition the disk with fdisk. Run fdisk, and it will give you some idea of what is happening. Write down the partition start and end values, so that if you make changes you can go back.
0
 

Expert Comment

by:CleanupPing
ID: 9569414
amcgin:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0

Featured Post

Four New Appliances. Same Industry-leading Speeds.

But don't take it from us.  The Firebox M370 is Miercom tested and Miercom approved, outperforming its competitors for stateless and stateful traffic throughput scenarios.  Learn more about the M370, M470, M570 and M670 and find the right solution for your organization today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

pc, laptop  monitor connection configurations
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question