Hackintosh Mac Pro Replica Using A Trash Can

An anonymous German case modder decided to poke fun at the new Mac Pro… by making his own Hackintosh Pro out of a trash can!

For whatever reason the German forum it spawned in is a little bit secretive, but [Dschijn] of tonymacx86.com got permission to share the build on the creator’s behalf — and it is absolutely glorious.

The beautiful exterior is a Authentics Lunar 6L trash can, painted a vibrant pink — complete with a fake Apple logo. Inside is a Gigabyte Mini ITX motherboard, a Haswell i3 processor, a Radeon 7750, an SSD, a HDD, an ATX power supply, and an undisclosed amount of RAM. True to the Mac Pro, it features a central airflow design, with a fancy hand-crafted intake grate on the bottom.

While its technical specs fail to impress, it is remarkably similar in size to the real deal, varying by just under an inch.

[via Ars Technica]

Putting A Mac Plus On The Internet

plus

[Jeff] has a Mac Plus, an 8 MHz computer with 4 MB of RAM and a 512×342 1-bit screen. It was his first ‘real’ computer, and like those guys that take Model A Fords out for a Sunday drive, [Jeff] decided to put this old box on the Internet.

A Plus has a few options to get on the Internet. The best, but most expensive, is a SCSI to Ethernet computer. For a somewhat slower connections, a PowerPC mac can be used as an Ethernet to Localtalk (the Macintosh serial port networking protocol) bridge. Lacking either of those pieces of hardware, [Jeff] decided to use a Raspberry Pi. The Pi does the heavy lifting, and a handful of serial adapters and voltage converters turns the Pi into something that can talk to the Plus’ serial port.

Even with the MacTCP stack and the MacWeb browser, there are still some things this ancient computer couldn’t do. HTTPS hadn’t been invented until 1994, cookies are just a pain, and CSS is right out. This means modern websites (except, of course, the Hackaday retro edition) simply won’t render properly. To fix this issue, [Jeff]’s friend [Tyler] came up with a Python script using Requests, Beautiful Soup, and Flask to strip out all the Web 2.0 cruft, handle the cookies, and to get rid of SSL.

The end result is a Mac Plus with 4 Megabytes of RAM on the Internet, able to pull up Wikipedia and Hacker News. It isn’t fast by any means – in the video below, it takes about five minutes to pull up the front page of Hacker News – but it is a 27-year-old computer on the Internet.

Continue reading “Putting A Mac Plus On The Internet”

A Macbook Air And A Thunderbolt GPU

When Intel and Apple released Thunderbolt, hallelujahs from the Apple choir were heard. Since very little in any of Apple’s hardware lineup is upgradeable, an external video card is the best of all possible world. Unfortunately, Intel doesn’t seem to be taking kindly to the idea of external GPUs. That hasn’t stopped a few creative people like [Larry Gadea] from figuring it out on their own. Right now he’s running a GTX 570 through the Thunderbolt port of his MacBook Air, and displaying everything on the internal LCD. A dream come true.

[Larry] is doing this with a few fairly specialized bits of hardware. The first is a Thunderbolt to ExpressCard/34 adapter, after that an ExpressCard to PCI-E adapter. Couple that with a power supply, GPU, and a whole lot of software configuration, and [Larry] had a real Thunderbolt GPU on his hands.

There are, of course, a few downsides to running a GPU through a Thunderbolt port. The current Thunderbolt spec is equivalent to a PCI-E 4X slot, a quarter of what is needed to get all the horsepower out of high-end GPUs. That being said, it is an elegant-yet-kludgy way for better graphics performance on the MBA,

Demo video below.

Continue reading “A Macbook Air And A Thunderbolt GPU”

Mac Malware Uses Right To Left Character Exploit

right-to-left-character-malware-attack

Check out this jumbled confirmation window. At first glance the message appears to contain a bunch of gibberish, but it can actually be read if you start at the right side and read each character moving left. The text displays like this because it is prefixed by a special Right-to-Left override Unicode character. The technique is being used in malware to obscure the actual extension of the file being launched. Notice that when written backwards your eye can still pick out the string “pdf” which may be enough to trick the uninitiated into approving the launch of the file.

This confirmation screen is launched when clicking on a piece of malware found in the wild a little over a week ago. If you do choose to run it, a decoy PDF file is opened in order not to arouse suspicion. But at the same time the program — which is signed with an Apple Developer ID — is installing itself in the home directory and making a cron job to launch at each boot. Sneaky!

Apple MagSafe Protocol Hacking

[Ken Shirriff] was interested in how the Apple MagSafe works. Specifically he wanted to know what controlled the LED on the connector itself so he tore one open to see what is inside. There’s a chip present and he didn’t waste time figuring out how the MagSafe communication protocol works.

The DS2413 chip he found on the MagSafe’s tiny little PCB has just six pins. Two of these control a pair of LEDs, which give the indicator its color range.  Another pin is used for 1-wire communications. When polled the charger will return a 64-bit identification number that includes a variety of information. [Ken] looks into what data is offered from several different models of charger by using the Arduino setup above. But the results are not entirely straight-forward as he discusses in his article. The 1-wire protocol is also used to switch the LEDs. This process is the responsibility of the computer being charged, but [Ken] shows how the colors can be cycled using an Arduino (with a couple of 9-volts as a source instead of a connection to mains).

Apple MagSafe Cord Repair

[Tommy Ward] had a big problem with the cord for his laptop power supply. This thing’s not cheap so he figured out a way to fix the frayed cord on his Apple MagSafe. He asserts that the shortened rubber collar on the plug end of the cord is to blame for this type of damage. We think rough use may have something to do with it too, but having had to repair our own feline-damaged power cords we’re not about to start pointing fingers.

To pull off an appropriate fix [Tommy] pries apart the case housing the power converter. This lets him get at the solder connections of the cord. After removing it from the circuit board he clips off the damaged portion of the cable. To reuse the strain relief grommet he drilled out the old portion of wire and insulation, making room for the undamaged cable to pass through, adding a cable tie on the inside to aide in strain relief. The last part of the fix involves gluing everything back together.

If your power supply problems have to do with the computer connector itself there’s a fix for that too.

Hacked Together Mac Isn’t A Hackintosh

hacked-together-macintosh

Check out this 20″ iMac. Notice anything peculiar? Look closely at the branding above the Apple logo. The only thing that tips you off that this iMac is a hacked together unit is that Acer logo on the replacement screen.

As we’ve so often been caught doing, [Flippy] was browsing eBay for deals. It’s a dangerous activity because you end up falling into purchases like an Aluminum iMac for $35. That led to the purchase of a very slim LED LCD monitor to use as the display. It fits perfectly behind the iMac’s glass bezel, which has a tiny chip in the upper right corner that doesn’t bother [Flippy]. It’s thin enough that this actually left room for him to add in the guts of a MacBook Pro which he had sitting in his unused parts pile. With all of the main components accounted for the rest is really just logistics like routing all of the cable connectors and adding openings for USB ports. What he ended up with is a high-end computer for a low-end price.