Feeds

How to run Mac OS X on a generic PC

No need for hacked software

Choosing a cloud hosting partner with confidence

Once the operating system is installed on the hard drive, reboot into the Bios and turn AHCI on. Among other effects, this allows the boot mechanism to find Sata drives beyond the IDE range of 0-3. EFiX can now act as a boot selector, allowing you to boot between, say, Windows, Linux and Mac OS X, provided each is installed on a separate physical drive.

EFiX boot screen

The EFiX boot screen. It's found five drives: the left-most is Linux-bootable, then two Apple-bootable. The next is unbootable and the fifth is a Windows-bootable drive. The current boot (selected with the cursor keys) is the central highlighted icon, and the small rectangles above it represent the countdown.

I probably need to correct any impression that EFI is open-ended and wholly wonderful. An alternative view is set out here, where it's argued that EFI is effectively a DRM'd Bios.

ASEM itself takes advantage of the fact that "a core value of EFI is the preservation of intellectual property", and appears to be near-paranoid that its development effort will be stolen by others, making full use of EFI's support for cryptography to obscure its code and prevent interception of its updates.

Would-be hackers are not the only losers here. Ordinary EFiX users have complained that the one-way, over-the-net update process offers no option to step back to a previous update if, as actually happened earlier this year, an EFiX firmware update negatively impacts (in this case, network) performance.

But is it Legal?

There's plenty of room for discussion here. ASEM maintains that it's using an open standard, has developed its proprietary extension software in-house and is in breach of no copyright or patents. It sees the EFiX as broadening Apple's market, helping sales of Leopard into the built-it-yourself gaming sector, hitherto almost exclusively the domain of Windows.

Leopard installer

Success: Retail Leopard installing

However, a clause in Leopard's End User Licence Agreement (EULA), which everyone installing Leopard is supposed to read and accept, says: "This Licence allows you to install, use and run one (1) copy of the Apple Software on a single Apple-labeled computer at a time. You agree not to install, use or run the Apple Software on any non-Apple-labeled computer, or to enable others to do so."

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Bada-Bing! Mozilla flips Firefox to YAHOO! for search
Microsoft system will be the default for browser in US until 2020
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?