Feeds
65%
Codeweavers CrossOver

Codeweavers CrossOver Mac

Run Windows apps - minus Windows

  • alert
  • submit to reddit

Intelligent flash storage arrays

Regardless of finer technical details, the two versions work in a very similar fashion. To install the program you simply download the CrossOver disk image file from the Codeweavers web site, open it, and then drag and drop the CrossOver application onto your hard disk.

Codeweavers CrossOver

Prime CrossOver with the name of the app you want to install

When you launch CrossOver it presents you with a simple Welcome screen that prompts you to insert the installer disk for the Windows program that you want to install. It’s also possible to install software that you’ve downloaded from the Internet as long as you’ve got the full installer required for that piece of software.

Rather than simply copying the program files onto your Mac’s hard disk, CrossOver creates a "bottle" – a file that Codeweavers describes as a "virtual Windows environment" – and then installs the program into it. The bottle contains elements – such as a virtual Windows registry – that, in effect, fool the program into thinking that it's running on Windows.

This approach can be very effective – but only if CrossOver is compatible with the specific Windows programs that you want to use. Codeweavers maintains a compatibility database that rates hundreds of Windows apps according to a rather convoluted system of "medals". For instance, my copy of Microsoft Publisher 2003 gets a gold medal rating, which means that it should run well enough for everyday use.

Codeweavers CrossOver

Check for app compatibility first

However, Word 2003 and Excel 2003 only get a silver medal - more or less OK, but there may be occasional bugs - while the more recent Microsoft Office 2007 just gets a bronze. The database also lists a large number of programs as "untested" or "known not to work".

Intelligent flash storage arrays

Next page: Verdict

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?