Feeds

The Sandy Bridge Hackintosh

Run Mac OS X on Intel's new Core i

  • alert
  • submit to reddit

Internet Security Threat Report 2014

My challenge from Reg Hardware: build a PC, install Mac OS X on it, and explain how you can do it too.

Today's Macs use standard Intel-type components. A key difference from Windows is that Mac OS X loads though a boot mechanism known as EFI (Extensible Firmware Interface). Some obscure Apple-proprietary concoction, no doubt? Far from it. EFI, now officially called UEFI - the 'U' stands for 'universal' - is an open standard, originally devised by Intel as a replacement for the ageing Bios boot system.

Unlike the 16-bit Bios, EFI can be 32- or 64-bit, and is much more flexible. In particular, with suitable hardware, you can tweak EFI to persuade a Mac OS X installer that it's installing onto a Mac. A generic Intel machine on which you're running the Mac operating system has become known as a "Hackintosh".

Hackintosh

A Hackintosh, yesterday

So What Needs Hacking?

Pioneer Hackintoshers had to hack the official Mac operating system. These days it's easier: you just buy the standard Snow Leopard installation disk from the Apple Store, and rely on EFI to set up the hardware environment and install the necessary kexts.

Kexts, or "kernel extensions", are the Mac world's equivalent of Windows' drivers. They connect intimately with the operating system kernel - the processing centre of the operating system - to allow it to handle hardware components like the Ethernet port, the sound sub-system and so on.

The open source community has become pretty good at developing EFI tweaks and kext modifications to make Mac OS X feel at home with a wide variety of hardware. Recently these core coders have been joined by others who have set themselves the task of presenting all this to the end user in friendly, problem-free packages.

Bottom line: today it's a breeze to build your own Hackintosh, or adapt existing hardware to run the latest version of Mac OS X, Snow Leopard.

Internet Security Threat Report 2014

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.