How to run Mac OS X on a generic PC

No need for hacked software

The essential guide to IT transformation

Eighteen months ago, if you wanted to run Apple's Mac OS X on a generic Intel box your only option was to fish around on the internet for a hacked version that modified all the relevant low-level calls.

And then hope it worked on your hardware.

EFiX Mac About panel

Not snapped on a Mac

Even if you managed to get it up and running, Apple's frequent operating system updates were to be dreaded and avoided. You needed to stay in touch with the Hackintosh community on sites like Insanely Mac and Hackint0sh for news of specially modified updates and drivers. For those not endowed with a deep understanding of hardware and software it was a perilous path. But rewarding, if you were lucky enough to make it work.

Towards the end of last year the tide began to turn. The key to making a generic Intel Mac that can handle updates lies in the fact that the 'uniqueness' of Apple hardware is really dependent only on the mechanism the Mac substitutes for the venerable Bios (Basic Input/Output System), the firmware interface between the operating system and the hardware. The Bios replacement Apple uses is in fact an open standard, EFI (Extended Firmware Interface), introduced a decade ago by Intel as part of its attempt to get its Itanium chip off the ground.

Calling the Bios and EFI "boot mechanisms" is an over-simplification. The traditional Bios only uses 16-bit drivers, which modern operating systems tend to replace with much richer 32-bit equivalents as soon as they are loaded. So in this sense the Bios is really only used for lift-off, although its original intention was to offer ongoing support to the operating system.

EFI goes much further. In simple terms, it's a small computer with its own operating system, providing a firmware connection between the main operating system and the various hardware components like disks, optical drives, graphics cards and so on. Unlike the BIOS, these drivers can be full featured and may be used passim rather than being discarded after booting. And - crucially - they are totally independent of whatever main operating system is running, as long as the operating system is 'EFI aware' - it understands the various low-level calls that EFI expects. Modern operating systems like Linux, Windows 7 and, of course, Mac OS X all fit that bill.

EFiX unit

This gadget persuades Leopard it's running on a real Mac

Understanding EFI immediately opened up the possibility of a software hack that withstands updates, and the Hackintosh community has latched onto this with an open source initiative called Chameleon. The setup process is described on several sites, for example here. The community has done amazing work, but it's true to say that getting it all up and running still falls into the the 'pretty hairy' category of DIY computing.

The essential guide to IT transformation

More from The Register

next story
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
China: You, Microsoft. Office-Windows 'compatibility'. You have 20 days to explain
Told to cough up more details as antitrust probe goes deeper
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story


Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.