?
Solved

Points for CrazyOne

Posted on 2003-03-01
3
Medium Priority
?
158 Views
Last Modified: 2010-04-26
For the fdisk tip on the MBR on a second disk in question

http://www.experts-exchange.com/Hardware/Q_20534541.html

Now that I needed to know.  And if you can make the primary partition active or inactive on the second disk then there's even more points.
0
Comment
Question by:dbrunton
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 44

Accepted Solution

by:
CrazyOne earned 400 total points
ID: 8048554
Hmmm I wonder if this will do it

First go to this page to see the options which I am sure you already know what the FDISK options are

http://www.computerhope.com/sfdisk3.htm

Click on Option 5
or on  Change current fixed disk drive

and get this page

http://www.computerhope.com/sfdisk8.htm

BTW thanks dbrunton :>)
0
 
LVL 49

Author Comment

by:dbrunton
ID: 8048614
Doesn't work.  I have to use Ranish to set partitions active on second disks in systems.  And DR-DOS's fdisk might do it as well.
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 8048642
Oh well fdisk is a bit primitive to say the least but it still has its usefulness. :>)
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question