Skip to main content

Leopard OS-X Virtual Machine

Recently, I was playing around with installing Leopard on my Dell, and I thought I'd try to get it running in a Virtual Machine.   So, I popped in the Kalyway 10.5.2 DVD, and installed it without too much trouble, actually.  I thought I'd record the settings that I used, as getting the Kalyway installs working is highly hardware dependent.  My machine is a quad-core 64-bit HP p6310y machine with an AMD Athlon II X4630 processor, with 8GB of RAM.  

I looked at the below guide, but the only thing that I used from it was the BIOS settings, which was a smart idea I thought.  The rest I did from memory and via trial and error.

First, I set up my VM to be an 'Other' OS (there's no Hackintosh OS), and increased the size of the RAM (Other defaults to 256MB ) to over 512MB.  If you have too little RAM, the install will simply hang.  

I removed the sound and floppy from my VM, as I didn't need that.  Then I booted into the Kalyway 10.5.2 DVD, and hit F2 immediately to enter the BIOS.  I used the setup instructions in the above URL to nuke the serial ports, parallel port, and floppy from the BIOS, hoping it would boot quicker.  Then I hit F10 to save the BIOS settings and boot into the DVD.  

When Kalyway booted into the setup, I went into Utilities->Disk Editor, and selected the Partition tab, and partitioned my disk (Volume Scheme is 1 Partition) to be a JFS disk, and selected the "Options" button under the disk to change the bootloader to MBR.  I then partitioned my disk.

Next, I selected Continue->accepted the EULA, and selected CUSTOMIZE.   I used the default (sleep) kernel, and unchecked everything to make it clean.  As I had an AMD processor, I checked the AMD Patch 1 and the Boot_with_legacy_flag.  That is what I considered the bare minimum to test the machine.  Later on, after I knew that this worked, I went back and messed with the Network settings, but first I wanted to try out the OS, as minimal as possible.  

Note, Mobo_Chipsets will cause a booting loop for me, so I unselected these. 

Next, I selected Continue, and I SKIPPED the disk check (this adds an hour or two).   When I came back a few hours later, my Leopard was ready to be set up.  

That was it.   Next, I reinstalled it again with the Network Drivers to try to get Ethernet working.... but I couldn't get this to work, even with all the Network Drivers (except wireless) loaded.  Thus, I have a working Leopard, but without any Ethernet.    It's mostly useless.  


Popular posts from this blog

ADS-B plotting with Kali (and other SDR goodies)

Recently I wanted to try some Software Defined Radio stuff.   
I had a RTL-SDR, FM+DAB, DVB-T USB Stick Set with RTL2832U & R820T. that I got from:
But, even though this dongle would break out FM radio stations, and ATC frequencies (like the local Ground Control, tower, and even ATIS), which was cool, it wouldn't break out ADS-B.   
Thus, I bought a Vantech Green Mini RTL2832U R820T DVB-T SDR DAB FM USB DIGITAL TV Tuner Receiver RTL-SDR Project + DAB dongle Tuner MCX Input from Amazon, and tried this.  
This dongle was able to listen to the 1090MHz frequency required for ADS-B (as it goes from 25MHz to 1700MHz).  There were tons of Windows programs out there for breaking out and plotting ADS-B Mode S broadcasts, but not many for Linux.  
For Kali Linux, here's how I got it running and plotting planes around my home:
0) before you start, you should do an apt-get update to ensure you hav…

Beaglebone Black as a Wireless Intrusion Detection System (WIDS)

Recently I have been wanting a wireless IDS (WIDS) to detect nefarious wifi activity.  I also had a Beaglebone Black hanging around that I wanted to put to good use.   This seemed like a perfect match, and indeed it seems to be so!

I did some research on WIDSs, and although there is SUPPOSED to be several out there, nearly all that I seemed to find was commercial and Windows-based products, not something I could use myself.   
About the only exception to that rule was Kismet, so I decided to give that a try.  Kismet is supposed to work as a WIDS, and per its documentation should catch the following attacks:
Kismet supports the following alerts, where applicable the WVE (Wireless Vulnerability and Exploits, ID is included: AIRJACKSSID Fingerprint Deprecated The original 802.11 hacking tools, Airjack, set the initial SSID to 'airjack' when starting up. This alert is no longer relevant as the Airjac…

Temper Temperature monitor on a Beaglebone Black

Beaglebone Black as a temperature monitor:

Recently I wanted to monitor the temperature of my shed.  I thought I'd use a small computer such as a Raspberry Pi or a Beaglebone or Odroid.

My Raspberry Pi boxes were all in use, so I grabbed my Beaglebone, which was doing nothing.

I flashed it with the Debian9.32018-03-054GB SDIoTimage, but that seemed like it was running lots of bloatware and the ethernet interface wouldn't take a static IP with /etc/network/interfaces.

So I went with the Debian9.32018-01-284GB SDLXQTi image instead.  I still had the same problem, that lots of junk was running, and I couldn't configure my interface by modifying /etc/network/interfaces

So my first step was to get rid of all the bloatware.  If you're using a Raspberry Pi or something, you can skip this and just go to the second step below

STEP 1--Remove Blotatware from Beaglebone Black:

With some searching, I came across this post:…