Solved

formatting a floppy using assembly

Posted on 2004-04-04
5
876 Views
Last Modified: 2008-03-10
hi
i want to know how can i format a floppy disk using assembly language the code will be very useful to me
thanks alot
0
Comment
Question by:rania12345
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 6

Expert Comment

by:joghurt
ID: 10753266
You can either
- use the int 13h BIOS interrupt with the 05h function to low-level format a track, then put a boot sector and an empty FAT on the disk; or
- use the int 21h DOS interrupt with the 4Bh function to execute an external command, "FORMAT A:" in this case. The advantage is this second method that it's a magnitude simpler and you can specify commands to the formatting (such as "/S", "/Q" or "/U").


0
 
LVL 11

Accepted Solution

by:
dimitry earned 500 total points
ID: 10753314
As a reference you can use this utility in assembly:
http://www.brillianet.com/programming/assembly/source_code/fmt130.zip
0
 
LVL 3

Expert Comment

by:Dancie
ID: 10755312
Look at my web site at www.reevessoft.com.
The program smartcop.exe has all the source code for formating and copy routines in asembler.
There are enough comments in the asm file to see how it works
0
 

Author Comment

by:rania12345
ID: 10756350
hi i want to thank dancie but the smatrtcop.zip link can not be open
0
 

Expert Comment

by:jjkola
ID: 10878628
hi, the right link for smartcop.exe is http://www.reevessoft.com/dos-etc/smartcop/SMARTCOP.ZIP. I think they are using linux as their webserver and it doesn't work well with case differencies.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Binary Bomb Phase 2 5 1,510
query on RISC/CISC binary on single hardware 5 557
memory mapped I/O query 6 154
T-SQL and CLR parameter strings 9 28
While it may be true that the internet is a place of possibilities, it is also a hostile environment lurking with many dangers. By clicking on the wrong link, trusting the wrong person or using a weak password, you are virtually inviting hackers to …
Original post  on Monitis Blog. Web performance monitoring is broken into two camps: passive and active. Passive monitoring is defined as looking at real-world historical performance by monitoring actual log-ins, site hits, clicks, requests for…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question