Feeds

The Sandy Bridge Hackintosh

Run Mac OS X on Intel's new Core i

  • alert
  • submit to reddit

High performance access to file storage

Polishing the Installation

The version of Snow Leopard you buy today is 10.6.3, and will need updating to the latest version, 10.6.7 at the time of writing. The recommended way of doing this is to download the official Apple 10.6.7 Combo package. Hackintoshers may also download the tonymacx86 "Multibeast" package.

Apple's installer

Once the drive has been correctly partitioned, a green arrow indicates that it's the target for installation

Install the Combo package first. It'll invite you to reboot, but before you do that, run Multibeast. It gives you a number of options, so you'll need to check your system and read the documentation to pick the right ones. I needed to enable USB and Ethernet. Now when you reboot you should be able to do this directly off your hard drive, putting the iBoot disk aside.

Hardware Adjustments

The Ethernet gave me an Internet connection, and to test the USB I plugged in a Logitech C910 Webcam - its essential camera and microphone features worked right out of the box, requiring no tweaking or kext fiddling.

The only thing still not functioning is the HD Audio built into the Sandy Bridge motherboard. Future official Mac updates will take care of this. Meanwhile, I've settled for simply plugging in an external USB sound system. I'm using the M-Audio Fast Track box from Avid, but any digital-to-analogue USB sound adapter - 99p on eBay, including postage and packing - should do the job.

Multibeast

After successful installation, use Multibeast as an easy way to tune up your kexts

One piece of kit that arrived late in the day was the Freecom eSATA Hard Drive Dock. It plugs into the eSATA (external SATA) socket on the motherboard back-plate and allows me drop in 3.5 inch or 2.5 inch SATA drives. I should have had this with me right from the beginning - juggling multiple potential boot drives outside the machine is extraordinarily useful when you're experimenting with operating system installation, giving me a chance to explore Snow Leopard installations in way that just wouldn't be possible with internal drives.

Combat fraud and increase customer satisfaction

Next page: But is it Legal?

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.