Archive for October, 2008
Hello everyone, many of you may have been having issues with the latest release of OSX86. The iDeneb team put together a fantastic version of Leopard that works on a lot of x86 hardware, but the first release had compatibility issues with some nVidia hardware. Either a white apple screen would pop up, or if you installed using the diagnostic view (pressing F8 and then -v when the disk loads) you may have noticed a message similar to “Still waiting for root device”. I myself have had plenty of trouble with this, and it was only after several hours of searching that I found the iDeneb team’s patch for the .iso. Unfortuantly they just give the patch out, and have no instructions for how to actually apply the patch. As it turns out it is a raw sort of patch, one that is applied through the command line or terminal of your operating system.
When the patch is downloaded there are three folders, Linux, OSX, and Windows. I have tried installing the patch in OSX and have run into errors that I could not solve, so that is the reason why this tutorial is Windows oriented.
- A Windows Operating System
- the original .iso file you downloaded from a torrent site
- the patch folder you downloaded from the link below
A BOOK! I am proud to present the publication of a new book, written by the founder/developer of leetupload.com. The book, as seen below, is entitled “No Root for You: A Series of Tutorials, Rants and Raves, and Other Random Nuances Therein. It is about network auditing, a step by step tutorial guide explaining how one would go about auditing, securing, and learning why certain exploits work, etc. Purchase your copy now, by clicking HERE.To read more (view table of contents and the like) click here.
| About the Book
| As I have noticed over the years, spoon-fed information on anything that involves network auditing, or anything of the sort, has been rather scarce. It is for this reason that my book has spawned in its current form. The idea is to prove that such tasks may be explained in an articulate manner, while still maintaining a proper rapport with the individual. People tend to speak in lofty tongue when they have a superiority complex; I eliminate this completely by drawing back the verbal curtain and cutting straight to the point. This is done by speaking in layman’s terms, while still maintaining proper terminology when absolutely necessary, and utilizing metaphors to express the idea in a more
descriptive form. As you may have guessed, this is a network auditor’s quick-reference bible. Not only does it contain step-by-step, illustrated tutorials, but an explanation in regards to why each exploitation, or what have you, works, and how to defend against such attacks. Be prepared, one might also discover a few “rants and raves,” as well as other random nuances.
|About the Author|
| Gordon L. Johnson is currently a junior at Indiana University in Bloomington, and is 20 years of age. His major is Informatics, with minors in computer science and cyber security. He has written for Hakin9 I.T. Magazine entitled Remote and Local File Inclusion Explained, which may be found in this book. He has experience in the I.T. field, as well as a consulting computer technician. As an aspiring network auditor, he has many computer related interests as well. His background encompasses knowledge in the following: programming in C, C#, Visual Basic, VB.net, HTML, PHP, Scheme, MATLAB, scripting, 3D interior design, hardware modification/development, and maintaining IRC/game servers as well as his website: leetupload.com.
Please see update at end of post!
In previous posts I showed you how to install Tiger and Leopard on your boring PC and cut its chains of slavery to Windows operating systems. Installing Tiger involved quite a bit of work, and may have taken someone with advanced knowledge of computer software an entire weekend to perfect. Drivers were hard to come by, and it was largely luck of the draw if you were able to get your particular hardware to work with Tiger. Leopard was an evolutionary step forward, automating much of the process and having great compatibility with PC architecture. More modern devices are supported automatically, both through default Leopard software, and from the lovely folks who compiled these hacks in order to liberate OSX for the masses.
OS X Leopard was cracked for PC consumption the day of its release. This was mostly accomplished because Leopard was meant from the beginning to be used on computers with the x86 Intel architecture. The roadblock keeping OS X from naturally running on any pc is something called EFI, or Extensible Firmware Interface. The EFI that Leopard uses is only tooled to work with Apple hardware, which means that it needs to be patched. The original method of patching was to use a thumbdrive attached to the computer and utilize the terminal to transfer files from the thumbdrive to the operating system files of Leopard. Compared to installing Tiger onto a PC, this method was ridiculously easy and was all that was required to have a successful boot of Leopard. But a better solution is now available, one where no thumbdrive is required and installation is streamlined and so easy that nearly anyone can do it.