installing Fedora Core via a boot floppy

Posted on 2006-03-26
Last Modified: 2013-12-15
I have a toshiba portege ct3110 laptop that has a pcmcia cd rom drive
it also has a usb port where I have a DVD burner connected to.
I cannot make it directly boot off the dvd burner, however if I start from Fedora Core CD1, I can get it to recognize the usb burner and start reading the CDs off of it. The problem is that it says the 2nd CD I put in is not a Fedora Core installation CD.

I am looking for a boot floppy, that would allow me to install the OS from the Fedora Core DVD (not the CD.) via the USB port
Please help.
Question by:eggster34
    LVL 3

    Expert Comment

    Just looked at fc4 dvd -- no boot floppy images....

    Do you have another machine with a network connection?   I've found install off NFS to be
    an effective way when dealing with floppy/CD/DVD issues....


    Author Comment

    I have many many machines..
    please let me know what I should be doing,  step by step if possible.
    LVL 2

    Accepted Solution

    AS Leisner told you, a network installation is a good idea to try. Let see how I installed 5 statios concurrenlty with just one copy of FC4. I used HTTP based installation:

    1. On one computer I turned on the http server.
    2. I copied all the contents of the 4 CDs in: /var/www/html/fc4 (BTW all the RMPS are in the same directory.) If you have the DVD distribution It's easy, just copy the content of the DVD in the same directory.
    3.  Boot the other computer (with CD1 or a copy of a installation boot diskette).
    4. Choose the Network installation, especially the HTTP method.
    5. Configure network device in the computer (in your case the laptop).
    6. Point to the computer you are using as the HTTP server, and identify the address where you copied the content of the distro.
    7. Continue normally the installation procedure

    Thats all...

    Good luck

    Author Comment

    sorry for the late reply man.
    I tried your method and it worked.
    thanks again.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    How many times have you wanted to quickly do the same thing to a list but found yourself typing it again and again? I first figured out a small time saver with the up arrow to recall the last command but that can only get you so far if you have a bi…
    SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
    Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
    Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    12 Experts available now in Live!

    Get 1:1 Help Now