Making Apple Aluminum Keyboard work under Windows

Finally, after FOUR years of running this specific Hackintosh that dual boots with Windows, I have bothered to take the time to figure out how to make the Apple Aluminum Keyboard work 100% under Windows (On a NON Mac hardware machine.) My Volume and play control buttons work in windows now!! Even with the nice Apple On Screen Display. I can CONFIRM working on Windows 7 64BIT, almost positive that the same process will work on Windows 8 and Windows 8.1 64bit (Assuming 32 bit variants would just require using the 32 bit drivers)

Step one: Download the current BootCamp Support software for Windows from Apple.

https://support.apple.com/downloads/macoscomponents

Step TWO: using the program “7-Zip” , launch the 7-Zip file Manager and navigate to your BootCamp Drivers download and double click on it, then double click on the “BootCamp” folder, THEN, double click on the “Drivers” folder, THEN, double click on the “Apple” folder… you should be here now:

Step Three: Drag the “BootCamp64.msi” file on to your desktop. [For 64bit versions of Windows]

Step Three A: If you are on a 32 bit version of Windows, drag the “BootCamp.msi” file to your desktop, not “BootCamp64.msi” and ALSO Drag the “AppleKeyboardInstaller.exe” file on to your desktop. (NOTE; THESE ARE UNCONFIRMED STEPS FOR A 32 BIT INSTALLATION)

Step Four: Double click on the “x64” folder and drag the “AppleKeyboardInstaller64.exe” file to your desktop. [For 64 bit versions of Windows]

Step Five: Connect the Apple Aluminum Keyboard

Step Six: Double click the “AppleKeyboardInstaller64.exe” file [for 64 bit versions of windows] OR the “AppleKeyboardInstaller.exe” file [For 32 bit versions of Windows] and allow the installer to run. [NOTE: Your mouse and keyboard will be unresponsive until this install finishes.]

Step Seven: In the “Search” bar of the Windows start menu (Windows 7) or in the “Search” Charm on 8 or 8.1 type “CMD” the command prompt result will be displayed. Right click on that and select “Run As Administrator”. The Command Prompt will launch

Step 8: Navigate to the loaction where your “Bootcamp64.msi” [64 bit versions of windows] or “BootCamp.msi” [32 bit versions of Windows] files are located:

Step Nine: Run the Boot Camp installer by executing the command “BootCamp64.msi NOCHECK=1” [64 bit versions of Windows] OR “BootCamp.msi NOCHECK=1” [32 bit versions of Windows]

Step Ten: [[The Boot Camp installer will run, “agree” and click “Next” through it, it will take several minutes to complete.]]

When the Boot Camp installer completes you will be prompted to RESTART your computer, go ahead and restart… we’re ALMOST there!!

Step Eleven: after your computer reboots, press Win+R and type “regedit” to launch the registry editor

Step Twelve: Inside of Registry Editor navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\KeyMagic\

and set the value for “OSXFnBehavior” to 0

ALSO, Navigate to;

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\KeyMagic\

and set the value for “OSXFnBehavior” to 0

Close regedit.

Step Thirteen: Reboot one final time

Step Fourteen: ENJOY YOUR FULLY FUNCTIONAL Apple Aluminum Keyboard under Windows! With fully working transport controls, FN keys, volume buttons, eject button, etc.

Malware, Spyware, and Viruses – Oh My!

What is malware?

“Malware” is a term for any software that gets installed on your machine and performs unwanted tasks, often for some third party’s benefit. Malware programs can range from being simple annoyances (pop-up advertising) to causing serious computer invasion and damage (e.g., stealing passwords and data or infecting other machines on the network). Additionally, some malware programs are designed to transmit information about your Web-browsing habits to advertisers or other third party interests, unbeknownst to you.

Types of malware

Some categories of malware are:

  • Virus – Software that can replicate itself and spread to other computers or are programmed to damage a computer by deleting files, reformatting the hard disk, or using up computer memory.
  • Adware – Software that is financially supported (or financially supports another program) by displaying ads when you’re connected to the Internet.
  • Spyware – Software that surreptitiously gathers information and transmits it to interested parties. Types of information that is gathered includes the Websites visited, browser and system information, and your computer IP address.
  • Browser hijacking software – Advertising software that modifies your browser settings (e.g., default home page, search bars, toolbars), creates desktop shortcuts, and displays intermittent advertising pop-ups. Once a browser is hijacked, the software may also redirect links to other sites that advertise, or sites that collect Web usage information.

How malware gets through

Malware writers are very experienced in using tricks to get users to download their malware. Software that comes bundled with “other software” is often called a Trojan Horse. For example, an instant messenger software bundled with a program such as WildTangent, a known spyware offender. Peer-to-peer file sharing software, such as Kaaza, LimeWire, and eMule, bundle various types of malware that are categorized as spyware or adware. Software that promises to speed up the Internet connection or assist with downloads (e.g., My Web Search) will often contain adware. Another common way to infect a computer through email containing a seemingly benign link or email attachment.

Malware can exploit security holes in your browser as a way of invading your machine. Sometimes websites state that software is needed to view the site, in an attempt to trick users into clicking “Yes” thus installing software onto their machines. Another trick is if you click “No,” many error windows display. Other sites will tell you that using a certificate makes their site “safe” which is not the case. Certificate verification means only that the company that wrote the software is the same as the company whose name appears on the download prompt.

Some malware provides no uninstall option, and installs code in unexpected and hidden places (e.g., the Windows registry) or modifies the operating system, thus making it more difficult to remove.

Scareware

Not all antivirus programs are what they seem. Some are actually fakes, rogue programs that don’t protect your security and do harm your bank balance. At best these programs offer no real protection; at worst they include actively harmful elements. They work hard to scare you into paying for registration, so they’re often called scareware. If you do register, you’ve both wasted your money and handed your credit card information to crooks. Avoiding scareware gets more and more difficult as the programs get more refined.

These categories aren’t mutually exclusive. For example, a single threat might virus-style, steal your personal information like spyware, and use rootkit technology to hide itself from your antivirus. A scareware program is a kind of Trojan, and it might also steal private data.

The term malware encompasses all of these types of malicious software. Any program whose purpose is harmful is a malware program, pure and simple. Industry groups like the Anti-Malware Testing Standards Organization (AMTSO) use this term for clarity, but the general public still asks for antivirus, not anti-malware. We’re stuck with the word antivirus.

If you think that you may have malware installed on your machine, contact ustoday.

iPhone 5 officially coming to T-Mobile 4/12/2013

After welcoming iPhone customers to its network for the past couple of years, T-Mobile USA is finally going to be offering the iPhone 5 on their network – with no contract.

Qualifying customers will be able to purchase an iPhone 5 for $99.99 down, and $20 per month.

T-Mobile’s new Simple Choice Plan starts with a base rate of $50 per month for unlimited talk, text and Web with 500MB of 4G data. Consumers can add 2GB of 4G data for $10 per month per line or get unlimited 4G data for an additional $20 per month per line. Customers can add a second phone line for $30 per month, and each additional line is just $10 per month. There are no caps and no overages.

That means that two lines on a fully unlimited plan would come in at $100/month – or $35/month less than I was paying on AT&T, and data on AT&T was capped at 2GB

T-Mobile official announcement

Tip of the Day: AdBlock Plus

Sick of seeing tons of advertisements when you are browsing the web?  Annoyed by ads before your YouTube videos?

Well, there is a solution for that!

Adblock Plus is an extension for available for Firefox, Chrome, and Opera web browsers with the primary goal of removing advertisements. (Sorry, It’s not available for Internet Explorer; but you should know better than to be using Internet Explorer anyway.  Don’t know why? Look for a follow up post later on.)

To do this, it will look at all requests made by web pages and block the request if the address of the request  matches a filter in Adblock Plus.Adblock Plus is free, open-source, and incredibly easy to install.  Adblock doesn’t remove ALL advertising, as they have some guidelines for what is “acceptable” advertising, and if an ad meets that criteria, it won’t be blocked. But Adblock Plus does really make for a nicer browsing experience.Get Adblock Plus now at their website: adblockplus.org

© 2023 1428 systems

Theme by Anders NorenUp ↑