?
Solved

How to map path to drive letter?  c:\foldername\folder = R:\

Posted on 2007-12-05
3
Medium Priority
?
825 Views
Last Modified: 2008-02-01
I would like to take a path on my C:\Big\Long\Path\Name and map it to another drive letter such as r:\   WITHOUT networking the folder.
I do not wish to share these files, I just want it to appear as drive R:\

Thank you for any help that you might have!!!
0
Comment
Question by:duank
3 Comments
 
LVL 6

Accepted Solution

by:
CasUK earned 1200 total points
ID: 20413102
Use SUBST:

subst r: C:\Big\Long\Path\Name
0
 
LVL 3

Assisted Solution

by:cforant
cforant earned 800 total points
ID: 20413104
subst x: C:\{pathname}\foldername}
0
 

Author Comment

by:duank
ID: 20413157
I initially got an error message of "Invalid parameter -r:"
until I realized that r: was already taken by a network drive.

Thank you for your help guys!
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Disclosure: Use this tutorial only when no other options helps to get Windows XP running without any problems and you don't want to format the drive. The back up of the data is the responsible of the user, however there is a description of how t…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses
Course of the Month16 days, 17 hours left to enroll

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question