Solved

Dual Boot Windows 2000 and server

Posted on 2004-04-02
8
316 Views
Last Modified: 2010-04-13
Hi experts, i have a computer with 2 operating systems, when i first turn on the computer i get the optinons:

1. Windows 2000 Professional
2. Windows 2000 Server

I want to completely get rid of the Windows 2000 Server and just keep windows 2000 professional.

How can i delete all of the files from WIndows 2000 Server and just keep windows 2000 pro?? thank for your help
0
Comment
Question by:James Hilloya
  • 3
  • 2
  • 2
  • +1
8 Comments
 
LVL 30

Expert Comment

by:Gareth Gudger
ID: 10742876
Are they on different partitions or the same partitions?

You can remove the SERVER boot entry by modifying the BOOT.INI.....

But need to know if on different partitions and which one is on what.
0
 
LVL 1

Author Comment

by:James Hilloya
ID: 10743083
they are on different physical drives,  windows 2k pro in the  cdrive and windows 2k server in the d drive........and by just modidying the boot.ini it wont  wont delete the windows 2000 server files .........i want to remove totally windows 2000 server to include deleting all of its files
0
 
LVL 15

Accepted Solution

by:
sr75 earned 50 total points
ID: 10743160
Since my DSL provider bites, I couldn't say what diggisaur said because I lost my connection.  So let me add an addendum

(diggisaur should get the points).  

In the Windows 2000 Professional's Disk Management (right click My Computer and click Manage), delete the partition that the SERVER is on and then recreate it and format it.  Then it will be gone.
0
 
LVL 7

Expert Comment

by:Chatable
ID: 10743396
Here's how to complete the task in a few steps:
1) Edit your boot.ini file. Remove the line that ends with "Microsoft Windows 2000 Server".
2) If your default OS is the Windows Server, you should edit the line starting with "default=". Everything AFTER the equal-sign should be replaced with everything BEFORE the equal sign in the line that ends with "Microsoft Windows 2000 Professional".
3) Boot the Windows 2000 Pro and simply erase the Windows 2000 Server folder.
That's all.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 1

Author Comment

by:James Hilloya
ID: 10743433
oopps i meant for diggisaur to get the points im sorry
0
 
LVL 30

Expert Comment

by:Gareth Gudger
ID: 10743491
You can post in the community to get the answer changed...however I am willing to split the points 50/50 with sr75 :)
0
 
LVL 30

Expert Comment

by:Gareth Gudger
ID: 10743519
Ok....I looked again...a whole 50 points....doesn't matter sr75 can keep em :)
0
 
LVL 15

Expert Comment

by:sr75
ID: 10744649
Thanks Diggisaur.  But I meant for you to have them as you beat me to the punch.
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article explains how to prepare an HTML email signature template file containing dynamic placeholders for users' Azure AD data. Furthermore, it explains how to use this file to remotely set up a department-wide email signature policy in Office …
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now