Solved

Why do i get BOOT FAIL when making a MANDRAKE 8.2 LINUX bootable floppy?

Posted on 2004-09-07
3
244 Views
Last Modified: 2013-12-15
I'm trying to install Mandrake Linux 8.2 on a "clean" harddrive.  The computer won't let me boot from the CD first, so I am trying to make a boot disk for the A: drive.  I've been successful in using RAWRITE to make the CDROM.img to make the floppy.  When I turn the computer off, and try to boot from the floppy, i get BOOT FAIL.   I have the appropriate equipment:  PIV, 1 gig of RAM, 80 Gig hard drive.

I've tried:
-many different disks
-using the cdrom.img, hd.img, other.img etc...
-copying files to the new c: hard drive
-executing fdisk /mbr

the only thing that the computer will boot to is an old Windows ME disk.

any help?


dt
0
Comment
Question by:darrellthomas
  • 2
3 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 500 total points
ID: 11996286
Can you use that boot floppy on some other machine successfully?

Sometime back I ran into a machine whos BIOS would only boot from a windows boot floppy. I don't know if this was intentional or simply a screwed up BIOS implementation, but no non-windows floppy would work.
0
 
LVL 1

Author Comment

by:darrellthomas
ID: 11997085
I found the solution:  I needed to flash the BIOS.  It was corrupted.   Here's what I did:

-Looked at the p4B website, and sure enough there were updated BIOS programs:
http://www.asus.com.tw/support/download/item.aspx?ModelName=P4B&Type=BIOS

-I downloaded those (along with the AFLASH utility program) and used it to re flash my BIOS.

-specifically version 1010.bin says that it corrects the "won't boot to LINUX disks" problem.

-this fixed a bunch of other problems that my computer was having too.

-Hope this helps anyone else with the same problem.
dt
0
 
LVL 40

Expert Comment

by:jlevie
ID: 11997231
That makes sense.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
The purpose of this article is to demonstrate how we can use conditional statements using Python.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now