Solved

Ghost bootdisk for 3COM cards

Posted on 2004-08-12
3
430 Views
Last Modified: 2012-08-13
Hi guys,

I am attempting to create a Ghost Boot Disk for some 3COM cards.
I am currently using Ghost 8.0
I wish to create a bootdisk for a either a 3CCFE575BT or a 3CCFE575CT CardBus card.

Whenever I attempt to boot, the driver loads correctly and I insert the second bootdisk.
Ghost attempts to load, but will crash out.
I have tried this with 4 different cards, all of which works in Windows. Do you have any idea what may be going wrong and how I fix it?

Alternatively, I have access to a 3CCFEM556B card, but this reports a 'Divide Overflow Error' when attempting to load either the driver or EMENABLE.

Do you know what is causing this?

BTW, I am using this on a Toshiba Tecra 8100 Laptop, but have had this issue with others.

Thanks.
0
Comment
Question by:InteraX
3 Comments
 
LVL 2

Accepted Solution

by:
Drew Lake earned 250 total points
ID: 11935684
InteraX,

Are you using a driver that came with ghost or one you made.  If its not one you made then:  Try this.  Goto this webiste: http://www.3com.com/products/en_US/result.jsp?selected=5&sort=effdt&order=desc&sku=3CCFE575BT and download the first link.  You then want to creat a ghost boot disk and use the NDIS2 drivers from the extracted file.  That should fix it.  I hope this helps.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
hosts.ini- can it be made to block all websites? 14 81
Question to Zip 8 90
Batch file output 20 90
msdos loop until a variable value changes 5 29
The following is a collection of cases for strange behaviour when using advanced techniques in DOS batch files. You should have some basic experience in batch "programming", as I'm assuming some knowledge and not further explain the basics. For some…
Introduction: Recently, I got a requirement to zip all files individually with batch file script in Windows OS. I don't know much about scripting, but I searched Google and found a lot of examples and websites to complete my task. Finally, I was ab…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question