Feeds
65%
Codeweavers CrossOver

Codeweavers CrossOver Mac

Run Windows apps - minus Windows

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Regardless of finer technical details, the two versions work in a very similar fashion. To install the program you simply download the CrossOver disk image file from the Codeweavers web site, open it, and then drag and drop the CrossOver application onto your hard disk.

Codeweavers CrossOver

Prime CrossOver with the name of the app you want to install

When you launch CrossOver it presents you with a simple Welcome screen that prompts you to insert the installer disk for the Windows program that you want to install. It’s also possible to install software that you’ve downloaded from the Internet as long as you’ve got the full installer required for that piece of software.

Rather than simply copying the program files onto your Mac’s hard disk, CrossOver creates a "bottle" – a file that Codeweavers describes as a "virtual Windows environment" – and then installs the program into it. The bottle contains elements – such as a virtual Windows registry – that, in effect, fool the program into thinking that it's running on Windows.

This approach can be very effective – but only if CrossOver is compatible with the specific Windows programs that you want to use. Codeweavers maintains a compatibility database that rates hundreds of Windows apps according to a rather convoluted system of "medals". For instance, my copy of Microsoft Publisher 2003 gets a gold medal rating, which means that it should run well enough for everyday use.

Codeweavers CrossOver

Check for app compatibility first

However, Word 2003 and Excel 2003 only get a silver medal - more or less OK, but there may be occasional bugs - while the more recent Microsoft Office 2007 just gets a bronze. The database also lists a large number of programs as "untested" or "known not to work".

Intelligent flash storage arrays

Next page: Verdict

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.