Solved

2.5" to 3.5" IDE Hard Drive HDD Adapter - Modified?

Posted on 2007-11-25
2
472 Views
Last Modified: 2010-05-18
I just picked up a 2.5" to 3.5" IDE Hard Drive HDD Adapter. I can connect the hard drive from the laptop to the 2.5" to 3.5" IDE Hard Drive HDD Adapter, the hard drive appears to connect to the converter perfectly.
Attempting to connect the hard drive that is connected to the adapter to an IDE cable in a PC, it appears that the adapter has more teeth than necessary.  

The IDE cable has a row of lets say approximately 40 holes. On the first row there are 40 holes. On the second row one of the holes is missing, it is the hole in the middle of the connector.  In some ways it reminds me of some sort key. Check out h**p://en.wikipedia.org/wiki/Image:Ata_20070127_002.jpg to see what I am describing.

What I am trying to find out is if they make this adapter with that œtooth on the second row removed?
Thanks!
0
Comment
Question by:Elton Brown
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 1

Accepted Solution

by:
jcsrepair earned 500 total points
ID: 20347508
Yes they do make the adapter with that pin removed.  I just recently purchased a few off ebay for around $3 a piece.  I purchased mine from http://stores.ebay.com/COLORDRIVES.  You can email the seller prior to them shipping it if you would like as well. If it was me though, I would just take some small needle nose pliers and remove that pin.  It probably is not even actually connected to anything on the circuit board  Just make sure you remove the proper pin.  
0
 
LVL 1

Author Comment

by:Elton Brown
ID: 20348566
Thank you jcsrepair!
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
Finding original email is quite difficult due to their duplicates. From this article, you will come to know why multiple duplicates of same emails appear and how to delete duplicate emails from Outlook securely and instantly while vital emails remai…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question