Solved

Adapters installed but nothing in network connections

Posted on 2004-09-05
8
163 Views
Last Modified: 2010-04-12
Dont know exactly whats going on here, may be a corruption in win 2k but adapters installed but nothing I mean Nothing in network connections, not even an adapter with a dissconected icon thru it.

This has worked perfect in the past so i dont get it, any ideas

andy
0
Comment
Question by:novender
8 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 11986112
does device manager report any problems on your network connections?
0
 
LVL 65

Accepted Solution

by:
SheharyaarSaahil earned 500 total points
ID: 11986113
Hello novender =)

Check if it can help u or not ??

How do I troubleshoot missing Network and Dial-Up Connections icons in Windows 2000?
http://www.jsiinc.com/SUBN/tip6500/rh6523.htm

!! GOOD LUCK !!
0
 
LVL 21

Expert Comment

by:jvuz
ID: 11987437
Have you tried another working adapter?
0
 
LVL 1

Expert Comment

by:aded
ID: 11987999
I had the same problem a few time ago..
The driver was bad for the network adapter, try to update or change the adapter
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 

Author Comment

by:novender
ID: 11988433
2 adapters 1 wireless and the other is onboard. will have a look at that jsiinc link and get back to u.

I have changed the card and the slot, finds the card etc etc. device manage is clean as can be but zero in network connections

weird

andy
0
 
LVL 65

Expert Comment

by:SheharyaarSaahil
ID: 11988835
>> will have a look at that jsiinc link and get back to u.
no problem and good luck :)
0
 

Author Comment

by:novender
ID: 11991146
network connections service was at manual for some silly reason.

Great link

thanks all

andy
0
 
LVL 65

Expert Comment

by:SheharyaarSaahil
ID: 11991164
Great ^_^
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this article, I will show you HOW TO: Suppress Configuration Issues and Warnings Alert displayed in Summary status for ESXi 6.5 after enabling SSH or ESXi Shell.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now