Ive run out of IDE ports so I have bought is PCI IDE 133 card is this correct?

Posted on 2005-05-15
Last Modified: 2013-11-09
I have bought this card to add extra IDE for a zip drive but it seems to go on about raid a lot and to install drivers within XP the disk is just full of folders with numbers etc and the instructions tell me to install the raid controller at boot up.

Any advice?


Question by:auraorange
    LVL 14

    Expert Comment

    Sounds like you've bought a PCI IDE RAID Controller rather than a simple PCI IDE Controller...needless to say most RAID controllers of this type only work with hard drives.
    LVL 95

    Expert Comment

    by:Lee W, MVP
    To follow up on tmj883's comment, consider rearranging your drives so you can put the ZIP drive on the motherboard IDE and one or more of the hard drives is moved over to the new controller.
    LVL 3

    Assisted Solution

    you can check if you have the right one here
    you need to have one like this
    LVL 5

    Expert Comment

    throw out the card, and buy this:
    usb-ide converter
    it is only usd10 in my country.
    LVL 32

    Accepted Solution

    A Zip drive should work just fine on an IDE RAID controller.  You do not have to configure the RAID array.

    Simply connect the Zip drive, boot PC and install drivers for card in windows.

    Note:  Card BIOS will probably run configuration on each bootup and return a message saying that controller BIOS is not installed.  That is normal if no hard disks are attached to controller.

    LVL 2

    Author Comment

    OK problem solved:

    I was trying to frantically install the drivers from the installation cd that came with the card, but I went to add new hardware in control panel and selected to install an IDE controller.  It installed automatically and I actually un-installed the drivers that I had installed off the disk that were throwing errors.  Finally, I have the zip drive on the new PCI IDE Controller card and it works fine.

    Thanks for all the great feedback and help!


    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    Internet Business Fax to Email Made Easy - With eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now