The following guide will show you how to install AMD Radeon graphics drivers on a Mac Pro 2013 running Windows. Currently the Mac Pro uses workstation graphics from the AMD FirePro D-series, which utilizes the same chipset as the Radeon 7900 / R9 series. This means that you can use those graphics drivers instead of the FirePro drivers. Why would somebody do this? Let’s say you have a Mac Pro as a professional workstation at home, you’d most likely use Mac OS X for those tasks. If not, then it would be a waste of money. If you’re into PC gaming, you can dual-boot the Mac Pro with Windows and use it as a decent gaming rig. The AMD FirePro drivers are optimized for professional applications, and not for gaming. Thus playing a game using those drivers won’t be optimal (read: dramatic). However, by installing the AMD Radeon drivers it will be optimized for gaming. You can use the latest gaming profiles including CrossFire, which will dramatically improve the performance. I don’t have any numbers to compare between those drivers, but on the same hardware with the FirePro drivers (dual D700) it can barely manage to run Left 4 Dead 2 (a game from 2009) on Medium quality (1920×1080). Using the Radeon 15.11 drivers I can play Fallout 4 on High – Ultra quality (2560×1440), so the performance boost is insane.
In this tutorial I will show you how to install these drivers. I’ve written a tutorial about this in the past, but that stopped working with the Catalyst 15.x drivers (http://www.royhochstenbach.com/the-amd-firepro-d-series-in-the-2013-mac-pro/) The installation will fail immediately as it will complain that it can’t detect a compatible graphics card (“We are unable to find a driver for your system. No supported AMD hardware was detected”). Installing the drivers manually will cause performance issues or even refuse to load at all. This tutorial has been updated for that purpose.
Make sure you read this tutorial first, and please be advised that this procedure is not supported by AMD and I’m not responsible for any issues with your system.
I’ve used the following tutorial as reference: http://www.remkoweijnen.nl/blog/2015/09/21/update-amd-display-driver-under-bootcamp/
The Linux and OS X versions of ESET NOD32 Anti-Virus (Business Edition) require an X-server to present in order to install. Since this isn’t an issue on OS X, it might on Linux since this isn’t installed on most servers. Although you can use the ESET Remote Administration Console to generate a custom installer to circumvent this, sometimes you might need to make a manual change in the configuration. I will show you how to do this using the command line (very useful for remote access).
Installing Windows 8.1 on a 2013 Mac Pro was challenging, but I’ve managed to get it working after a lot of hassle. I’ll share my experience and the solution that worked for me.
I was using the Mac Pro and the Promise Pegasus2 R4. I would divide the internal SSD to get Windows installed on that one (installing Windows directly on the Pegasus2 is not possible).
A very useful application for Linux and BSD systems is the sudo application. This allows a user to execute a root task without being logged in as root. There are some security concerns when this is not configured correctly. Fortunately most distributions have this enabled only for the ‘sudo’ usergroup. But in some cases you want sudo to merge into your environment, instead of having to change your environment for sudo.
New releases of Ubuntu are using a new desktop environment, which is something not every user is accepting. Although it’s very useful for non-experienced computer users, it will be annoying to others. Getting the old GNOME back is rather simple.
Pointers have to be one of the most difficult concepts to understand to new programmers. Although it’s relatively easy to use them, the main question still remains: why? I will show you how to create pointers in C-languages and why you can and should use them.
When I was reading the NY Times yesterday I’ve read this interesting article about a security officer of a company who has managed to connect to video conferencing equipment in boardrooms and was therefore able to control the camera and hear what is going on in these rooms (http://www.nytimes.com/2012/01/23/technology/flaws-in-videoconferencing-systems-put-boardrooms-at-risk.html).
In theory he could eavesdrop on conversations that where happening in these boardrooms. Companies who utilize video conferencing solutions around the globe suddenly start to realize that they might be at risk. I’ll try by best explaining the vulnerability and possible solutions.
This guide will demonstrate how to deploy DKIM on Debian-based Linux distributions. Other distributions work similar, except some do not use the scripts in init.d. The configuration of DKIM will be the same. I will discuss HOW to deploy it, not WHY to deploy it as I assume you’ve already decided to do so.
Imagine that your company’s network owns the IPv4 range 188.8.131.52 – 184.108.40.206. The Reverse Lookup zone would be 60.50.40.in-addr.arpa, covering this entire network. Your primary nameserver is ns.acme.com. Your zone would look something like this:
60.50.40.in-addr.arpa ns.acme.com. support.acme.com. (
@ IN NS ns.acme.com.
1 IN PTR www.acme.com.
But now you want to delegate the range 220.127.116.11 – 18.104.22.168 to the nameserver coyote.acme.com. Since it also resides in the same reverse zone, you cannot delegate this entire zone, as this would just move your entire network to the control of coyote.acme com, something you might not want to achieve with delegation.
In this short tutorial I will show you some ways to protect a (login) web form against the most common types of attacks, making it much safer.
I will use PHP as the server-side programming language, but any other language will provide similar features.