Solved

PnP Sound chip

Posted on 2006-06-12
7
12,082 Views
Last Modified: 2013-11-09
A new problem - new to me at any rate - newly installed XP on an ASUS ME-99 motherboard picks up the sound card as a PnP sound chip with the large yellow question mark.
Any help as to what driver to use?
I've tried Intel AC97, Windows and Soundblaster "generics"...
0
Comment
Question by:keithbraithwaite
  • 4
  • 3
7 Comments
 
LVL 69

Expert Comment

by:Callandor
ID: 16885354
The motherboard is too old to for Asus to have a WinXP sound card driver: http://support.asus.com/download/download.aspx?SLanguage=en-us

I only see Win95 and WinNT drivers here: http://www.driverscollection.com/?H=ME99-VM&By=ASUS
0
 

Author Comment

by:keithbraithwaite
ID: 16885481
it isn't an onboard card...
It seems to be a A381-F20 TJ-2 94V0 9936, FCC ID: LWHA381F20, Micro Express International
0
 
LVL 69

Accepted Solution

by:
Callandor earned 500 total points
ID: 16885505
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Author Comment

by:keithbraithwaite
ID: 16885572
I do have everest - I'll try that. (there isn't a free version of everest anymore?)
0
 
LVL 69

Expert Comment

by:Callandor
ID: 16885640
The link I posted is a free version, but the main website no longer offers free versions anymore.  A victim of their own success, I guess.
0
 

Author Comment

by:keithbraithwaite
ID: 16885662
I forgot that I'd already taken the card out. I won't have the box here anymore (I've rebuilt it for a friend) but I'll try to identify the card on another box with Everest.
Thanks for the tip - I don't have the right reflexes anymore!
0
 

Author Comment

by:keithbraithwaite
ID: 16888870
I got the box back, found the maker's name on the FCC site and the driver on the driverguide site - all is well.

It's an Advance Logic ALS120

Thanks again
Keith
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now