The update to 10.6.8 for Hackintoshes is pretty painless. It doesn’t touch/remove anything terribly important if you have a standard build, but it may introduce some problems with your SleepEnabler.kext file.
To avoid any problems I suggest using my methods in the Maximizing Success article here:
That way you can experiment with what works, and have no consequences if you fail since you can just wipe your drive and start over again with a fresh Hackintosh install.
· Download the combo update from the apple site: http://support.apple.com/kb/DL1399
· Start the installer to apply the update
The easiest method (if you followed my other article mentioned above) would be to boot into your other Snow Leopard partition and drag and drop the new kext into System/Library/Extensions folder in the root drive of the partition that has the failed update. You will then have to authenticate, and after that you will need to set the permissions. To do this open up your terminal by going to Go – Utilities – Terminal and do the following:
sudo su <press enter>
(enter your password) <press enter>
chown -R 0:0 (drag SleepEnabler.kext here*) <press enter>
chmod -R 755 (drag SleepEnaber.kext here*) <press enter>
* This should be dragging from your System/Library/Extensions folder, not any other place (ex: desktop or wherever it was originally saved).
After doing this you should be good to go! restart normally and cross fingers. If you do end up having a problem then you may need to consult insanelymac, i cannot stress enough now much of a help that forum is:
Good Luck and happy hackintoshing!
A BOOK! I am proud to present the publication of a new book, written by the founder/developer of leetupload.com. The book, as seen below, is entitled “No Root for You: A Series of Tutorials, Rants and Raves, and Other Random Nuances Therein. It is about network auditing, a step by step tutorial guide explaining how one would go about auditing, securing, and learning why certain exploits work, etc. Purchase your copy now, by clicking HERE.To read more (view table of contents and the like) click here.
| About the Book
| As I have noticed over the years, spoon-fed information on anything that involves network auditing, or anything of the sort, has been rather scarce. It is for this reason that my book has spawned in its current form. The idea is to prove that such tasks may be explained in an articulate manner, while still maintaining a proper rapport with the individual. People tend to speak in lofty tongue when they have a superiority complex; I eliminate this completely by drawing back the verbal curtain and cutting straight to the point. This is done by speaking in layman’s terms, while still maintaining proper terminology when absolutely necessary, and utilizing metaphors to express the idea in a more
descriptive form. As you may have guessed, this is a network auditor’s quick-reference bible. Not only does it contain step-by-step, illustrated tutorials, but an explanation in regards to why each exploitation, or what have you, works, and how to defend against such attacks. Be prepared, one might also discover a few “rants and raves,” as well as other random nuances.
|About the Author|
| Gordon L. Johnson is currently a junior at Indiana University in Bloomington, and is 20 years of age. His major is Informatics, with minors in computer science and cyber security. He has written for Hakin9 I.T. Magazine entitled Remote and Local File Inclusion Explained, which may be found in this book. He has experience in the I.T. field, as well as a consulting computer technician. As an aspiring network auditor, he has many computer related interests as well. His background encompasses knowledge in the following: programming in C, C#, Visual Basic, VB.net, HTML, PHP, Scheme, MATLAB, scripting, 3D interior design, hardware modification/development, and maintaining IRC/game servers as well as his website: leetupload.com.
Ever find yourself shopping around somewhere, getting hungry, and you don’t know if your favorite restaurant is open? Don’t have their number and your mall doesn’t have phone books near the pay phones? Well Google has the perfect solution for you.
Sure, there are other free 411 services out there, but you have to listen to boring and irrelevant ads just to get an answer. With Google, all you do is tell the city, state, business name or category, and Google will give you the top 8 or so results. NO AD’S! Tell Google the number of the result you like, it will read out the address and phone number and offer to connect you. Just say connect and you will be on the phone with the corner Bistro or Pizza Hut. (It also works if you want to call and see if the local computer store has the right RAM ; )
The lookup service is free, but if you choose to connect to the number Google lists, phone charges will apply as if you are calling the number.
As a side note, Goog 411 is in beta right now. Hopefully Google decides it likes the program and finds ways to improve its algorithms. I use this service at least once a week, and it has only failed me once, only because I wasn’t sure about the exact city something was in, and the number may have been unlisted anyway.