Solved

Hook on Areca ARC-1210 board

Posted on 2013-11-17
6
650 Views
Last Modified: 2013-11-18
Hello,

I have an Areca ARC-1210 card that I have been using for a number of years.  I've been wanting to ask this question for sometime but haven't got around to it.  On the card, there is a hook across from the connector pins.

What I want to know is why that hook is there, and can it be removed?  If it can be removed, what is the ideal tool to use and how do I get that tool?  Reason I ask is this hook prevents me from using the IPMI module for my server board.

See screenshot below.

areca screenshot
0
Comment
Question by:bigeven2002
  • 3
  • 2
6 Comments
 
LVL 87

Accepted Solution

by:
rindi earned 350 total points
ID: 39654855
The x16 PCI Express slots which are usually used for the video card of mainboards usually have a retaining mechanism so the card is secured properly. That's what that hook is for, if you use it in an x16 full length slot. You could remove it, there are no conductors at that point, but if it has been used for so long that means it already fits properly, so why would you want to remove it?

You could use a wire saw or wire cutter.
0
 
LVL 17

Author Comment

by:bigeven2002
ID: 39654917
Thanks for the reply, I had forgotten about the X16 retainer.  I have the card in a native x8 slot on the server board.  The server board model is ASUS P5BV-M (not to be mistaken for P5B-VM).

As indicated in the question, the reason for the removal is the way the board is designed, the IPMI slot is right next to the X8 slot so the hook interferes.  Without the IPMI card, the raid card fits fine.

Below is a screenshot of the board with the arrow pointing to the IPMI slot.  You'll see that both X8 slots are next to the IPMI slot and the hook rests right next to the IPMI connector where you see the small black chip.

asus board
0
 
LVL 91

Assisted Solution

by:nobus
nobus earned 50 total points
ID: 39655690
if there are no connections on that part, you can just saw the hook off with an iron saw
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 17

Author Comment

by:bigeven2002
ID: 39655776
Ok cool, so I can use a wire cutter or an iron saw.  Is there an inexpensive iron saw for this purpose?  This is just a one time thing and the ones I am finding online are quite expensive.
0
 
LVL 87

Expert Comment

by:rindi
ID: 39655794
Don't you have anything lying around you can use? This doesn't take much and I don't think you should need to go shopping for things just to remove that part.
0
 
LVL 17

Author Comment

by:bigeven2002
ID: 39655838
Probably, but I just wanted to make sure I did this correctly.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

The Rasberry PI is a low cost piece of hardware that you can have a lot of fun with through experimenting and building/working on projects like media players, running a low cost computer, build data loggers etc. - see: https://www.raspberrypi.org
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now