Feeds

Slash your way inside Apple's Mac Mini

Putty knife adventure

3 Big data security analytics techniques

Opening the new Mac Mini, as was true with its previous incarnations, takes mildly inflated cojones. To do so requires that you insert a putty knife between the case and the bottom housing and pry up the innards, bit by bit, moving around the case.

We strongly suggest that you read iFixit's full instructions before attempting this and any further disassembly - and if you break something, don't come crying to us.

Mac mini teardown: the three antennae

Two antennae on the right for MIMO 802.11n, one on the left for Bluetooth

Once you remove the case, you'll see three antennae. You'll need to remove them before you can go any further in your disassembly efforts.

Mac mini teardown: four hidden screws

Black screws in a black case are hard to spot

Four well-hidden Phillips screws fasten the Mac mini's internal frame to the bottom housing. If you want to go further - if, for example, you're in there to install RAM, swap your hard drive, or perform an optical-drivectomy and add another hard drive - you'll need to remove them, then separate the bottom housing from the frame.

Mac mini teardown: installing RAM

RAM is easily installed in the bottom housing (hairy forearms not essential)

The bottom housing contains the Mac mini's logic board and SO-Dimm slots. Swapping Ram is as easy as, well, swapping Ram - there are two SO-Dimm slots that support up to 4GB of 1066MHz DDR 3 SDRam Swapping the CPU is different matter - it appears to be soldered in place.

The other half contains the hard drive and optical drive, both of which as simple to remove and replace - simple, that is, if you follow the instructions.

Mac mini teardown: all the pieces

Now it's time to put it all back together again

The iFixit folks call this disassembly "a lot simpler than the iMac." The first time we did it, however, the putty-knife step was nerve-wracking - we greatly prefer good old-fashioned screws over plastic pressure-clips. Your mileage - and cojones - may vary.

Still and all, Apple engineers managed a slick bit of manufacturing design to fit all of the Mac Mini's components into its 2 x 6.5 x 6.5in (5 x 16.5 x 16.5cm) body. ®

Photos produced with permission from iFixit.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.