Solved

Network Boot Rom

Posted on 2007-04-09
3
430 Views
Last Modified: 2013-11-09
How do you store change the boot rom of a network card built in to a newer botherboard.  The network chip is a RTL8100(c), and I have tried the RTFlash program on realtek's website, but it does not seem to work.  It says Flash Device :Unknown Manufacturer ID=00 Device Code = 00 Unknown Flash size.  Unable to dump flash

The motherboard is a GA-6VLE
http://www.gigabyte-usa.com/Products/Barebone/Products_Spec.aspx?ProductID=2019&ProductName=TA3

The onboard lan chip is a Realtek RTL8100BL  

Where do I get the tools to load the ROM on to the network card?


0
Comment
Question by:Tom_Hickerson
  • 2
3 Comments
 
LVL 57

Expert Comment

by:giltjr
ID: 18879518
First question is why are you attempting to update boot rom?
0
 
LVL 1

Author Comment

by:Tom_Hickerson
ID: 18890113
Because I would like to extract one from an identical (hardware) computer, and put it on this one.
0
 
LVL 57

Accepted Solution

by:
giltjr earned 500 total points
ID: 18890287
Are you having a problem with the current level?  Normally vendors tell you not to update unless you are having a specific problem that a specific updates fixes.

If Realtek's utilities do not work, then it is possible that Gigabyte has loaded some OEM version of code and Realtek's utility will not work.  I would check with Gigabyte to see if they have some custom utilities and code.

What OS are you attempting to update the flash with?  Sometimes you need to do this under DOS.  I know that Windows at times will not allow these types of utilities to run.
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Best Quad port Gigabit Network card for Hyper-V 2 83
CPU at 100% usage, why? 27 130
Raid 0 2 61
Repairing a physically broken flash drive 4 35
Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question