The Power Mac G5 was one of the last PowerPC machines Apple produced and sold. It remains a capable computer today. This website is dedicated to the venerable machine, providing users with information on available hardware and software choices for their G5.
Enjoy! -- Nathan
Did you just pick up a Power Mac G5 via eBay, CraigsList, or locally? Are you interested in souping up that old G5 sitting in your garage? Do you need to squeeze more life out of your office or home G5?
The apps linked under our nifty categories above are sort of curated by me and, in some cases, from other great blogs. These apps do not represent an objective "best of" but should be taken as a starting point to find what works best for you.
My Power Mac G5 has been modified from its stock state with a 120GB OWC Mercury 3G solid state drive, a 1.5 TB Western Digital drive, 10 GB of RAM, and a GeForce 7800GT video card.
This website was built on my Power Mac G5, using the following software:
The CSS code and layout are from Bootstrap (3.3.7), an elegant and responsive framework for creating awesome websites. Find out more at the Get Bootstrap website.
Bootstrap is released under the MIT license and is copyright 2014 Twitter.
Drop me an email here - nathan @ g5center.net.
Published on September 26, 2014
According to our good friends at TenFourFox and numerous other tech sites around the world, BASH, that great little command line shell built into Mac OS X, has a major security vulnerability.
More bad news - since Leopard, Tiger, etc are so old, the hope of seeing an official patch of this vulnerability are next to nil.
But now the good news - there is a (unofficial) fix. TenFourFox to the rescue! Follow the instructions to download a patched BASH and replace your existing shell with the updated one. It's a straightforward process that includes some example commands to make sure you are indeed affected and patched.
This is just another reminder of why our old machines are not getting more secure. Other bugs and vulnerabilities may indeed exist. If your machine faces outward, serving webpages, files, or whatever, keep in mind that you are operating at risk. This doesn't mean you will be hacked, but it's something to keep in mind and stay vigilant about.