Wednesday, December 31, 2008
under their new scheme named as 'pay as you go' Microsoft going to provide you prepaid PC with fully loaded functionalities and software and charge as you use.
These PC will be built on technology called "FlexGo". FlexGo is a combination of hardware and software that enables PCs to be sold and used on a pay-as-you-go basis, much like wireless phones.
This new technology checks your hardware utilization and cost you accordingly.
Must say an excellent business strategy. [:P]
Tuesday, December 23, 2008
Monday, December 22, 2008
IPTV can be viewed in several ways. A computer may be used to reassemble protocol packets and convert them into a television signal that can be recognized by standard television set. Another option is the set top box, commonly used by cable companies. The set top box would be used in place of a computer and would do the same job a computer does.
But because IPTV is based on the Internet Protocol, it is sensitive to packet loss and delays if the IPTV connection is not fast enough and it also does not support HDTV at the moment.
Wednesday, December 17, 2008
Sunday, December 14, 2008
Saturday, December 13, 2008
surprise surprise... google have done something that is never expected of them... they have taken one of their products out of its "beta" status within 3 months of its launch... yes... google chrome beta is no longer a beta... its just google chrome... this is a very surprising development especially since google is known for betas that last years rather than months... now i am just waiting for the day when the old gmail will lose the beta tag that it has been carrying along for over 4 years now!
Monday, December 1, 2008
- Download festival, espeak or freetts.
- Install festival (Press Ctrl and D to exit it when it is running) or espeak.
- A default voice is included but you can get voices from FestVox, MBROLA project, CMU Arctic or Nitech HTS.
- Unpack them by typing for t in `ls` ; do tar xvf $t ; done.
- Install them
sudo mkdir -p /usr/share/festival/voices/english/
sudo mv * /usr/share/festival/voices/english/.
- Get a audio encoder.
- Go to the command line.
- In festival type (SayText "Hello and welcome to Wikihow")
- To see a list of installed voices type (voice.list). To switch to a voice, type (voice_us2_mbrola) for example.
- Or from the command line type echo "It's such a beautiful day! Why are you in front of the computer?" | festival --tts
- Type (quit) to quit.
Friday, November 28, 2008
>> Load windows in ADMINISTRATOR mode, a standard account (limited) will not work because you're modifying the system registry.
>> Open the Registry Editor. To do this hold down Windows button and press R and enter regedit and click OK.
>> In the left column in the Registry Editor, click on HKEY_LOCAL_MACHINE, then SYSTEM, then CurrentControlSet, then Services, then i8042prt, then Parameters.
>> Call the new value (without the quotes) "CrashOnCtrlScroll".
>> Close the Registry Editor and restart your computer.
Saturday, November 22, 2008
The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival.
If hacking involves creativity and thinking 'out-of-the-box', then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of 'defense in depth'. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.
POST BY - [firstname.lastname@example.org]
Friday, November 14, 2008
(1)The Emergency Number
If you find yourself out of coverage area, dial 112 and the mobile will search any existing network for you, and interestingly this number 112 can be dialed even if the keypad is locked.
(2)Have you locked your keys in the car?
Does you car have remote keys?
If you lock your keys in the car and the spare keys are at home, call someone at home on their cell phone from your cell phone.Hold your cell phone about a foot from your car door and have the person at your home press the unlock button, holding it near the
mobile phone on their end. Your car will unlock. Distance is no object.You can unlock the doors (or the trunk).
(3)Hidden Battery power
Imagine your cell battery is very low, you are expecting an important call and you don’t have a charger.Nokia instrument comes with a reserve battery.To activate, press the keys *3370# Your cell will restart with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your cell next time.
(4) How to disable a STOLEN mobile phone?
To check your Mobile phone’s serial number,key in the following digits on your phone:
* # 0 6 #
A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. when your phone gets stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless.
You probably won’t get your phone back, but at least you know that whoever stole it can’t use/sell it either.If everybody does this, there would be no point in people stealing mobile phones.
POST - email@example.com
Monday, November 10, 2008
- Ubuntu Linux is now perhaps the best-known and most popular distribution of Linux. It is well designed, easy-to-use and has advanced the use of Linux as a desktop operating system more any other distribution.
- Red Hat Linux has been around for a while and has acquired a reputation for consistency and reliability. It may not be the easiest to use or the most cutting-edge distribution, but it provides the type of high-quality support that is valued by companies, which made it the de-facto standard in corporate America.
- Fedora Core is a Linux distribution sponsored by Red Hat. The objectives of Fedora Linux differ from those of Red Hat in that Fedora engages the Open Source community and is more experimental in nature.
- Mandriva Linux has been very popular among new and home users. Installation is particularly user-friendly, and it runs by default the KDE Windows-like graphical desktop environment.
- SuSE Linux is a serious alternative for Windows users, with solid, user-friendly installation and configuration tools. Its popularity is held back a little only by somewhat “un-Linux like” business practices, such as not providing ISO installation images for free download. They do, however, offer free FTP installation.
- Lycoris is designed to be a user-friendly Linux distribution with particular emphasis on transitioning from Windows operating systems. Good choice for beginners.
- Xandros Linux is a great choice for beginners who don’t mind to fork over a few dollars to get a worry free product. It is refined and reliable but with proprietary components that prevent re-distribution. No free download.
- Linspire’s one-click web based software installation is quick and easy. An annual fee is charged for accessing Lindows software pool.
- Knoppix provides an excellent run-from-CD solution, with its powerful hardware detection features and pain-free set-up. If desired, the system can be optionally installed on the hard disk to improve performance. It also comes with plenty of software.
- Slackware Linux is a good opportunity to learn about the Linux operating system. It gives you back a long-lost sense of control and empowerment. No longer will you be at the mercy of graphical set-up wizards and mysterious background demons.
Sunday, November 9, 2008
The MCIPT certification (Enterprise), or Microsoft Certified IT Professional - Enterprise Support comes in at number 11 on the list of highest paying technical certifications. (The MCITP Database is number 14, see below). The average MCITP Enterprise salary reported was $82,941.
12. Cisco CCSP - Cisco Certified Security Professional
Coming in at number 12 on the list of the highest paying technical certifications is the Cisco CCSP or Cisco Certified Security Professional. The average annual salary reported by CCSP holders is $80,000.
13. MCAD - Microsoft Certified Applications Developer
With an average annual salary of $79,444, the MCAD certification, or Microsoft Certified Application Developer certification, is number 13 on the list of highest paying certifications in technology.
14. MCITP - Microsoft Certified IT Professional (Database)
The MCIPT certification (Database), or Microsoft Certified IT Professional - Database comes in at number 14 on the list of highest paying technical certifications. (The MCITP Enterprise Support is number 11, above). The average MCITP Database salary reported was $77,000.
15. MCDBA - Microsoft Certified Database Administrator
The Microsoft Certified Database Administrator, or MCDBA, comes in at number 15 on the list of highest paying technical certifications. The average annual salary reported by MCDBA respondents is $76,960.
That would be alllll
MOHIT YADAV [firstname.lastname@example.org]
Number six on the list of the highest paying certifications is the Cisco CCVP or Cisco Certified Voice Professional. The average annual salary of CCVP respondents was $88,824.
7. ITIL v3 - ITIL Master
The ITIL v3 certification - the ITIL Master - came in 7th on the list of the highest paying technical certifications. The average annual salary for ITIL Master certification holders was $86,600.
8. MCSD - Microsoft Certified Solution Developer
The MCSD or Microsoft Certified Solution Developer certification pays an average of $84,522. This puts the MCSD certification at number 8 on the list of highest paying certifications in technology.
9. Cisco CCNP - Cisco Certified Network Professional
Cisco Certified Network professional or CCNP certification is number 9 on the list of highest paying technical certifications. The average annual salary reported by CCNP holders is $84,161.
10. Red Hat Certified Engineer
The Red Hat Certified Engineer (RHCE) came in at number 10 on the list of highest paying certifications. The average annual salary reported by Red Hat Certified Engineers is $83,692.
MOHIT YADAV [email@example.com]
1. PMI Project Management Professional (PMP)
With an average annual salary of $101,695, the PMP certification from the Project Management Institute (PMI) organization tops the list of highest paying certifications.
2. PMI Certified Associate in Project Management (CAPM)
Next highest on the list of highest paying certifications is PMI's Certified Associate in Project Management (CAPM). The average annual salary for CAPM holders that were surveyed is $101,103.
3. ITIL v2 - Foundations
With an annual average salary of $95,415 the ITIL v2 Foundations certification came up third on the list of highest paying certifications. ITIL stands for the IT Infrastructure Library. The ITIL certification is designed to show expertise in ITIL service support and service delivery.
4. Certified Information Systems Security Professional (CISSP)
Coming in at a close 4th on the list of highest paying certifications is the Certified Information Systems Security Professional or CISSP certification from (ISC). The average annual reported salary was $94,018.
5. Cisco CCIE Routing and Switching
At $93,500 per year average annual salary, the Cisco CCIE Routing and Switching certification came in 5th on the list of highest paying certifications in the technology industry.
More to come on the next post.......
MOHIT YADAV [firstname.lastname@example.org]
Saturday, November 1, 2008
'news' to her mother. Shouting, cursing, crying, the mother says, "Who was
the pig that did this to you?
I want to know!" The girl picks up the phone and makes a call. Half an hour
later a Ferrari stops in front of their house; a mature and distinguished
man with gray hair and impeccably dressed in a very expensive suit steps out
of it and enters the house.
He sits in the living room with the father, the mother and the girl, and
tells them: "Good Morning, your daughter has informed me of the problem.
However, I can't marry her because of my personal family situation, but I'll
If a girl is born I will bequeath her 2 retail stores, a townhouse, a beach
villa and a $1,000,000 bank account. If a boy is born, my legacy will be a
couple of factories and a $2,000,000 bank account. If it is twins, a factory
and $1,000,000 each. However, if there is a miscarriage, what do you suggest
At this point, the father, who had remained silent, places a hand firmly on
the man's shoulder and tells him, "You can try again!"
Friday, October 31, 2008
miWe all know only too well the Windows logo, that ubiquitous four-color flapping flag, which conveniently marks the Start Menu. In case you have not seen the trees because of the forest so far, the colors in question are red, green, blue and yellow. Coincidently, the same colors have been planted in Google's logo - the search engine - as well. However, there would be nothing too strange about this, if the similarity were restricted to the chromatic aspect alone.
But when it comes to Google's web browser, the resemblance between its logo and that from Windows tends to become more obvious, in that the former’s approach seems like a stylized clone of the latter’s logo. Since just taking a closer look at the two, side by side, will do the trick. It could be just us, but the only difference in there is the fact that Windows' fluttering flag has been rolled into a Google ball.
POST BY - MOHIT [email@example.com]
Tuesday, October 28, 2008
Monday, October 27, 2008
1. Larger screen size availability.
2. Better contrast ratio and ability to render deeper blacks.
3. Better color accuracy and saturation.
4. Better motion tracking (little or no motion lag in fast moving images).
The DISADVANTAGES of Plasma vs LCD include:
1. Plasma TVs are more susceptible to burn-in of static images.
2. Plasma TVs generate more heat than LCDs, due to the need to light of phosphors to create the images.
3. Does not perform as well at higher altitudes.
4. Shorter display life span (about 30,000 hours or 8 hrs of viewing a day for 9 years) than LCD. However, screen life span is improving to as high as 60,000 hours due to technology improvements.
POST BY - mohit [firstname.lastname@example.org]
Sunday, October 26, 2008
"C:\Program Files\Google\Google Talk\googletalk.exe" /parameter
/nomutex: Open more than 1 Gtalk.
/autostart: Check the registry settings to see if Gtalk needs to be started. If the “Start automatically with Windows” option is unchecked, it won’t start.
/forcestart: Similar to /autostart, but forces Gtalk to start.
/S upgrade: Used when upgrading Google Talk
/register: registers Google Talk in the registry, includig the GMail Compose method.
/checkupdate: check for newer versions
/plaintextauth: uses plain authentication mechanism instead then Google’s GAIA mechanism. Used for testing the plain method on Google’s servers.
/nogaiaauth: disables GAIA authentication method. The same as above.
/factoryreset: set settings back to default.
/gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
/mailto email@example.com: send an email with Gmail
/diag: start Google Talk in diagnostic mode
/log: probably has something to do with the diagnostic logging
POSTED BY - MOHIT YADAV [firstname.lastname@example.org]
Saturday, October 25, 2008
- GNOME 2.24.x. (GNOME 2.23.91 development version at the moment.)
- Nautilus finally has tab support and can now restore from Trash.
- File Roller ("Archive Manager") now uses p7zip to extract archives, so it supports ALZ, RZIP, CAB, TAR.7Z now also.
- Empathy IM client and Hamster time tracker are two new applications that have been accepted into GNOME 2.24 "module suite."
- When you try to log out, shutdown, etc. with (a) program(s) open, a warning pops up stating you must close all applications first.
- Redesigned "Quit..." menu very similar to Mac OS X's (unlike before which was similar to XP.)
- Nautilus finally has tab support and can now restore from Trash.
- Complete theme overhaul. (With alpha 4, the default theme was switched back to Human(-Murrine.))
- OpenOffice.org 3.0.x with MS Office 2007 new file support.
- Linux kernel 2.6.27 images have been prepared and will be uploaded soon to Intrepid.
- Compiz 0.7.7 development release from Git with tons of new effects.
- Network Manager 0.7.x with better network configuring and 3G support.
- Ability to sign in as Guest via (Fast) User Switcher panel applet.
- Default Adobe Flash 10.x.x.x (RC now) in repos to enhance Flash experience.
- Improved Jockey ("Hardware Manager") to additionally download printer drivers when needed.
- Official USB installation support for converting ISO CD image files into USB-live compatible files. EDIT: Work has started! Package usb-creator just got in
- Ubiquity (Ubuntu installer) layout redesign.
- An "Automatically sign in" option added at the fifth step of Ubiquity (Ubuntu installer) "Who are you?."
- An "Automatically sign in" option added at the fifth step of Ubiquity (Ubuntu installer) "Who are you?."
- Secret ~/Private folder to encrypt anything you place into it.
- X.Org 7.4, still in development, with X Server 1.5 and Mesa 7.1, is included in Intrepid.
Saturday, October 18, 2008
Friday, October 17, 2008
Wednesday, October 15, 2008
- There are 10 types of people in the world - those who know binary and those who don't
- There are 10 types of people in the world - those who know binary and those who have friends
- Q: Did you hear about the Coder that got stuck in his shower for a week?
A: The instructions on his shampoo said: Lather, rinse, repeat.
- 1f u c4n r34d th1s u r34lly n33d t0 g37 l41d
- If at first you don't succeed; call it version 1.0
- Q: How many programmers does it take to change a light bulb?
A: None. It's a hardware problem.
- Q: How many IBM Processors does it take to execute a job?
A: Four. Three to hold it down, and one to rip it's head off.
- Q: How can you tell if a geek is extroverted?
A: He stares at your shoes.
- Windows: Just another pane in the glass
- Failure is not an option. It comes bundled with your Microsoft product.
Sunday, October 12, 2008
Samsung officially announced its second 8-megapixel cell phone, the Pixon a.k.a M8800
(the first one was Samsung i8510 INNOV8)
In fact it looks very much like a compact camera from the rear, and its 3.2-inch screen bears the same TouchWiz interface as the Omnia. That screen is a 400 x 240 pixel touchscreen with touch keyboard and handwriting recognition, and the phone has AGPS, accelerometer and FM radio.
Quad-band GSM, tri-band HSDPA
• 107.9x54.6x14.9mm, 110 g
• 3.2-inch touch screen display (240 x 400 pixels)
• 8 megapixel camera, auto focus, face recognition with smile detection and blink detection, WDR (wide dynamic range), ASR (advanced shake reduction), GPS geotagging, ISO 1600, WVGA (720x480 pixels) and VGA (640 x 480 pixels) @30fps video recording
• Built-in GPS receiver
• DivX playback
• FM radio with RDS
• microSD card slot
• Landscape virtual QWERTY keyboard
• Handwriting recognition
• ShoZu integration - direct image and video upload
• Office document viewer
Interestingly, there's no mention of Wi-Fi in that list of specs. It'll be out early November (in Russia, at least) for around $800
Saturday, October 11, 2008
Wednesday, October 8, 2008
It's possible to broadcast music, MP3 etc... through Google Talk.
cab4me enables you to easily call a cab to any location worldwide. You do not need to know the number of the local cab company. You do not need to enter or even know the address you want to be picked up at. You do not need to place a call. With cab4me you can order a cab to your current location with a single click.
* Google Maps integration
* Phone’s contact list integration to select pickup locations
Shop smarter using your phone. Compare prices, read reviews, and connect with local stores with CompareEverywhere.
* Barcode scanner using the built-in camera
Friday, October 3, 2008
2) Product Key-less install option - As with Windows Vista, new XP with SP3 installs can proceed without entering a product key during Setup.
3) Kernel Mode Cryptographics Module - A new kernel module that "encapsulates several different cryptographic algorithms,".
4) "Black hole" router detection algorithm - XP gains the ability to ignore network routers that incorrectly drop certain kinds of network packets. This, too, is a feature of Windows Vista.
POST - MOHIT [email@example.com]
Friday, September 26, 2008
Adeona is the first Open Source system for tracking the location of a lost or stolen laptop that does not rely on a proprietary, central service. This means that you can install Adeona on your laptop and go — there's no need to rely on a single third party.
Adeona is designed to use the Open Source OpenDHT distributed storage service to store location updates sent by a small software client installed on an owner's laptop. The client continually monitors the current location of the laptop, gathering information (such as IP addresses and local network topology) that can be used to identify its current location. The client then uses strong cryptographic mechanisms to not only encrypt the location data, but also ensure that the ciphertexts stored within OpenDHT are anonymous and unlinkable. At the same time, it is easy for an owner to retrieve location information.
To download click here
Thursday, September 25, 2008
Wednesday, September 24, 2008
Yesterday I went to attend a conference organized by University of Southern California (USC), Viterbi School of Engineering at the Le Meridian Hotel, New Delhi to get some idea about what all is necessary for getting admitted to a good foreign university for Master of Sciences (M.S.).
I got many of my queries regarding admission in MS answered there. So, I thought why not share some of them with you people. Here they are…
Ques 1 : What are the cutoffs in GRE required by universities ?
Ans : There is no proper demarcation or cutoff below which they won’t give you admission, they only refer to this test to get a basic idea of your skills in quantitative analysis and vocabulary.
Ques 2 : What all do we need to submit with the application form?
Ans : You submit them all those articles which you think reflects your actual persona of being a good engineer and shows that you have some goals in your life. Basically your achievements which are related to your field or the field for which you are applying for at their university e.g. real life projects, research work, your certificates etc. BUT BEWARE: They will pass all your documents through rigorous scrutiny, so don’t put any vague information which you cannot prove.
Ques 3 : Financial Aid or Sponsorship?
Ans : Many university don’t provide sponsorship, pupil themselves have to search for sponsors who will pay for them. Many Indian students get loans from banks for their studies and many Indian nationalized banks provide them this help at lower rates of interest too.
For reviewing fees and cost of living, surf any university’s site. They provide information for international students which will help you in calculating the required funds.
For more FAQ contact
-- > Fre@k (firstname.lastname@example.org)
It will be available in the UK beginning November and across Europe in early 2009.
Tushar Bhatia (email@example.com)
Tuesday, September 23, 2008
With integrated graphics (ie. no separate graphics card), the system has to dedicate some of its memory to graphics generation. Dedicated graphics cards have their own memory to drive the graphics, leaving the system memory to handle the computation.
Dedicated graphics cards are superior in almost every aspect. They are a must for any REAL gaming. They take much of the graphics work off the CPU, leaving the CPU to do other things.Integrated graphics are fine for pretty much everything but gaming and software such as Motion. They cost less and usually generate less heat. All graphics work is done on the CPU, possibly taking away valuable cycles from the processor.
Saturday, September 20, 2008
Actually this havoc is created by a virus known as boot.vbs and dxdlg.exe,it is a variant of trojan ...
steps to correct it are :
1. Go to Task Manager –> Processes and End the following processes in order:
2. Go to Start –> Run –> regedit –> Open the following key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
3. In the right hand pane, select Userinit and delete everything except “C:\windows\system32\userinit.exe”
4. Make sure the processes wscript.exe and dxdlg.exe are not running.
1. Delete the following files
5. In your Windows drive, search for boot.vbs and delete all of them.
6. In your Windows drive, search for kinza.exe and delete all of them.
7. Disable System Restore and then Enable it again. Restart your computer.
Wednesday, September 17, 2008
Display DNS Cache Info Configuration: ipconfig /displaydns
Clear DNS Cache: ipconfig /flushdns
Release All IP Address Connections: ipconfig /release
Renew All IP Address Connections: ipconfig /renew
Re-Register the DNS connections: ipconfig /registerdns
Change/Modify DHCP Class ID: ipconfig /setclassid
Network Connections: control netconnections
Network Setup Wizard: netsetup.cpl
Test Connectivity: ping www.whatismyip.com
Trace IP address Route: tracert
Displays the TCP/IP protocol sessions: netstat
Display Local Route: route
Display Resolved MAC Addresses: arp
Display Name of Computer Currently on: hostname
Display DHCP Class Information: ipconfig /showclassid
Post by - MOHIT YADAV [firstname.lastname@example.org]
Monday, September 15, 2008
Friday, September 12, 2008
Ubuntu Certified Professional (UCP) which was first introduced in May 2006 is a computer based examination about the Ubuntu operating system.
It is administered by the LPI [linux professional institute] foundation.
The LPI UCP exam code is LPI 117-199.
The testee needs to pass all three exams (117-101,117-102 and 117-199) in order to receive a UCP certification. The 101 and 102 exams may be taken before or after the UCP exam.
For further details go to ucp
POST BY - MOHIT [email@example.com]
Tuesday, September 9, 2008
Here are the things that you will need before Install Leopard on your PC…
- The Patched DVD Image
- The zip file containing the patch
- One pen drive or USB Flash Drive formatted as FAT32
Well once you have all these you can go ahead and Install Leopard..
Step 1. Getting things ready
- Burn the DVD Image onto a Single Layer DVD-R using a software like Nero.
- Format the USB Flash Drive and the drive label should be “Patcher” without the quotes. Please note it has to be “Patcher” only and nothing else for the patch to work when we apply it later.
- Extract the Zip file and put its contents into the USB Flash Drive.
- Now your USB Drive should contain a folder called “files”, if it doesn’t then check to see where you have gone wrong.
Step 2. Installing Leopard
- Now that you have the Patched DVD with you, you can now install Leopard. Pop in the DVD into the drive and boot into it by pressing F12 at the BIOS Prompt.
- Boot into the DVD and the installer should now load. It take a while though, so be patient.
- Select your Language and make sure you select Customize and you need to deselect all the packages that are displayed.
- Leopard will now install. This can take a while, so go grab yourself a coffee.
- It will ask you to Reboot, so go ahead and Reboot. Before rebooting make sure that USB Flash Drive is connected to the PC.
Step 3. Patching Leopard
- Now that you have got Leopard installed, you need to patch it. Before we do that Boot into the Leopard DVD like the way you did before.
- Wait for the Darwin Bootloader to load. Once it loads up press F8. You should now see a prompt. Type -s and hit enter. The DVD will now load in Verbose mode. Watch for any errors. It should load without a problem because you have already installed Leopard.
- Once the setup is loaded select your Language. Once done you should now be seeing the Welcome Screen. Once there navigate to Utilities-Terminal.
- Once the terminal loads up, you now need to browse to your USB Drive, so follow the steps below, typing it exactly as it appears below in the Terminal.
In the command line type the following as they appear here
Notice the space between cd and the 2 dots.
- Now its the time to run the patcher to make sure Leopard will work on your PC. Type the following into the Terminal.
- The Patch should now run. You can answer Yes while removing the ACPUPowerManagement.kext
- After the Script is done, you should now be able to Boot into Leopard after you restart.
Step 4. Congratulations! You’ve done the Impossible!
Well that was it. Please note this has not been extensively tested, so most of your Hardware like Sound, Network may not work. If something goes wrong for you or you want to help us, then please join the discussion over at OSX86Scene. If you noticed I haven’t posted the links to the Torrent that contains the DVD image and the zip. Well I haven’t posted them because I am sure the lawyers over at Apple are going to sue the hell out of me. If you wondering where you can find them, then head over to Demonoidand search for it.
Well here are few screenshots by Mac.nub over at the forums who could get Leopard working on his system.
Some Updates and Clarifications :
- This Hack works on Intel PC’s with atleast SSE3
- You need to format your Leopard Partition to HFS+
- Make Sure you install Leopard on MBR and not GUID or it won’t boot.
- More Patched DVD’s from Uphuck, Netkas is in the works so it would be better if you wait for the polished releases to come out.