Installing AMD Radeon drivers on a 2013 Mac Pro (updated for version 15.x)

The following guide will show you how to install AMD Radeon graphics drivers on a Mac Pro 2013 running Windows. Currently the Mac Pro uses workstation graphics from the AMD FirePro D-series, which utilizes the same chipset as the Radeon 7900 / R9 series. This means that you can use those graphics drivers instead of the FirePro drivers. Why would somebody do this? Let’s say you have a Mac Pro as a professional workstation at home, you’d most likely use Mac OS X for those tasks. If not, then it would be a waste of money. If you’re into PC gaming, you can dual-boot the Mac Pro with Windows and use it as a decent gaming rig. The AMD FirePro drivers are optimized for professional applications, and not for gaming. Thus playing a game using those drivers won’t be optimal (read: dramatic). However, by installing the AMD Radeon drivers it will be optimized for gaming. You can use the latest gaming profiles including CrossFire, which will dramatically improve the performance. I don’t have any numbers to compare between those drivers, but on the same hardware with the FirePro drivers (dual D700) it can barely manage to run Left 4 Dead 2 (a game from 2009) on Medium quality (1920×1080). Using the Radeon 15.11 drivers I can play Fallout 4 on High – Ultra quality (2560×1440), so the performance boost is insane.

In this tutorial I will show you how to install these drivers. I’ve written a tutorial about this in the past, but that stopped working with the Catalyst 15.x drivers ( The installation will fail immediately as it will complain that it can’t detect a compatible graphics card (“We are unable to find a driver for your system. No supported AMD hardware was detected”).  Installing the drivers manually will cause performance issues or even refuse to load at all. This tutorial has been updated for that purpose.

Make sure you read this tutorial first, and please be advised that this procedure is not supported by AMD and I’m not responsible for any issues with your system.

I’ve used the following tutorial as reference:

Continue reading

Configuring NOD32 Business Edition on Linux and OS X by command line

The Linux and OS X versions of ESET NOD32 Anti-Virus (Business Edition) require an X-server to present in order to install. Since this isn’t an issue on OS X, it might on Linux since this isn’t installed on most servers. Although you can use the ESET Remote Administration Console to generate a custom installer to circumvent this, sometimes you might need to make a manual change in the configuration. I will show you how to do this using the command line (very useful for remote access).

Continue reading

Installing Windows 8.1 on a 2013 Mac Pro

Installing Windows 8.1 on a 2013 Mac Pro was challenging, but I’ve managed to get it working after a lot of hassle. I’ll share my experience and the solution that worked for me.

I was using the Mac Pro and the Promise Pegasus2 R4. I would divide the internal SSD to get Windows installed on that one (installing Windows directly on the Pegasus2 is not possible).

Continue reading

Configuring Sudo, the proper way

A very useful application for Linux and BSD systems is the sudo application. This allows a user to execute a root task without being logged in as root. There are some security concerns when this is not configured correctly. Fortunately most distributions have this enabled only for the ‘sudo’ usergroup. But in some cases you want sudo to merge into your environment, instead of having to change your environment for sudo.

Continue reading

How to create a secure Video Conferencing network

When I was reading the NY Times yesterday I’ve read this interesting article about a security officer of a company who has managed to connect to video conferencing equipment in boardrooms and was therefore able to control the camera and hear what is going on in these rooms (

In theory he could eavesdrop on conversations that where happening in these boardrooms. Companies who utilize video conferencing solutions around the globe suddenly start to realize that they might be at risk. I’ll try by best explaining the vulnerability and possible solutions.

Continue reading

Deploying DKIM on Debian and Ubuntu

This guide will demonstrate how to deploy DKIM on Debian-based Linux distributions. Other distributions work similar, except some do not use the scripts in init.d. The configuration of DKIM will be the same. I will discuss HOW to deploy it, not WHY to deploy it as I assume you’ve already decided to do so.
Continue reading

Delegating Reverse Lookup Zones for big subnets

Imagine that your company’s network owns the IPv4 range – The Reverse Lookup zone would be, covering this entire network. Your primary nameserver is Your zone would look something like this: (

@          IN          NS 
1          IN          PTR

But now you want to delegate the range – to the nameserver Since it also resides in the same reverse zone, you cannot delegate this entire zone, as this would just move your entire network to the control of coyote.acme com, something you might not want to achieve with delegation.

Continue reading