background preloader

How to Build a Hackintosh

How to Build a Hackintosh
Build a Hackintosh with better performance than a Mac Pro — for half the price. A comprehensive, free, step-by-step guide. Last updated March 2013 with the latest Intel Ivy Bridge processor and motherboard recommendations (which, it’s worth noting, are not available on the out-of-date Mac Pros) and OS X Mountain Lion-native installation instructions. We’ve also refreshed the nVidia GPUs. Introduction What do you do when you need a high-end Mac — for editing video, retouching photos, recording music, animating 3D graphics, or just playing games — but you can’t afford a Mac Pro? Creativity shouldn’t be relegated to the upper class. Here’s a screencast (no sound) of my original hackintosh running flawlessly, loading notoriously slow applications like Adobe Photoshop and Microsoft Word in a jiffy. The new model represented in this article is quite a bit faster. This isn’t easy. For a comparison of the speed of this Hackintosh and the current Mac Pro, turn the page: (Apple photo by kyz) Related:  shaundonnelly

#3038363 SOPA Emergency IP list: So if these ass-fucks in DC decide to ruin the internet, here’s how to access your favorite sites in the event of a DNS takedown tumblr.com 174.121.194.34 wikipedia.org 208.80.152.201 # News bbc.co.uk 212.58.241.131 aljazeera.com 198.78.201.252 # Social media reddit.com 72.247.244.88 imgur.com 173.231.140.219 google.com 74.125.157.99 youtube.com 74.125.65.91 yahoo.com 98.137.149.56 hotmail.com 65.55.72.135 bing.com 65.55.175.254 digg.com 64.191.203.30 theonion.com 97.107.137.164 hush.com 65.39.178.43 gamespot.com 216.239.113.172 ign.com 69.10.25.46 cracked.com 98.124.248.77 sidereel.com 144.198.29.112 github.com 207.97.227.239 # Torrent sites thepiratebay.org 194.71.107.15 mininova.com 80.94.76.5 btjunkie.com 93.158.65.211 demonoid.com 62.149.24.66 demonoid.me 62.149.24.67 # Social networking facebook.com 69.171.224.11 twitter.com 199.59.149.230 tumblr.com 174.121.194.34 livejournal.com 209.200.154.225 dreamwidth.org 69.174.244.50

Overclocking the CPU, Motherboard and Memory Beginners Guides: Overclocking the CPU, Motherboard & Memory The term overclocking is thrown around a lot, for better or worse. If you're one of the many who has never overclocked, this guide will explain what it is and how to do it to the computers' processor, motherboard and memory. - Version 1.0.0 The prospect of overclocking a computer system can be intimidating for a computer newcomer, to say the least. Successful overclocking is as often a matter of 'what you know' as 'what you have'. In this Beginners Guide, PCSTATS will explore the process of overclocking processors, motherboards and memory to achieve a faster yet still stable computer. What Does Overclocking Do? Overclocking a computer's processor or memory causes it to go faster than its factory rated speed. Can Overclocking Damage Computer Hardware? Yes, but it's typically unlikely. For older processors, heat is also a factor worth keeping a close eye on. The Purpose of Overclocking

The Always Up-to-Date Guide to Building a Hackintosh (OS X 10.9.2) tonymacx86 Blog How To Bypass Internet Censorship Five ways to stop the NSA from spying on you If recent reports are to be believed, the National Security Agency has broad powers to capture private information about Americans. They know who we're calling, they have access to our Gmail messages and AOL Instant Messenger chats, and it's a safe bet that they have other interception capabilities that haven't been publicly disclosed. Indeed, most mainstream communications technologies are vulnerable to government eavesdropping. But all is not lost! 1. NSA whistleblower Edward Snowden has been photographed with a Tor sticker on his laptop. Tor is easy to use. 2. If you use a conventional instant messaging service like those offered by Google, AOL, Yahoo or Microsoft, logs of your chats may be accessible to the NSA through the PRISM program. To use OTR, both you and the person you're chatting with need to use instant messaging software that supports it. 3. The conventional telephone network is vulnerable to government wiretapping. 4. 5. You probably can't hide metadata

Old Software Downloads for Windows, Mac, Linux and Abandonware Games 7 Free VPN services Advertisement A few years ago, there was an abundance of quality free VPNs available. Today, there is less choice. Much depends on why you want a VPN. In this article, I’ll show you seven free VPNs that’ll help protect your privacy. (Note: All the VPNs in this article have a robust free version available. 1. Spotflux falls into the ad-supported category. It’ll block dangerous sites, works on multiple platforms, and gives you a “set it and forget about it” peace of mind. If you decide to upgrade to the premium version (including no ads and access to the premium network), it’ll set you back $38 per year. 2. CyberGhost has been at the forefront of the VPN industry for many years. Although it does offer more features than Spotflux, the free version is bandwidth-restricted. Unlike some other free VPNs, CyberGhost offers a one-click launch of both a browser session and a VPN connection; you don’t need to remember to launch two sessions in two different places when you want to be private. 3. 4.

PrivacyKeyboard - The #1 Keylogger Scanner In Pictures: Online computer tutorials based on pictures. Free. Best Free Remote Access Software Remote Access Software (RAS) allows a user to remotely administer another computer through a GUI (Graphical User Interface). RAS software usually falls into three categories: Attended (someone must be present on the remote machine) Unattended Self-hosted RPC proxy servers (middleware for accessing firewall-protected networks). In this review, we are interested in the first and second categories. There are also two different kinds of packages: Those that are downloaded and run without requiring any installation And the other, which is installed and either uninstalls at the end of the session or remains for future sessions. Unattended sessions would of course need to have the installed version to allow for connecting at any time in the future. Read this article in Spanish (Español) Go straight to the Quick Selection Guide Let's first talk about the two different categories, attended and unattended. Typically the process for establishing an attended session is simple. TeamViewer Mikogo

Related: