BSD MAG

Blog

Blog Posts with Masonry

06

Nov'14

Pros & Cons of Keyword Driven Testing

Testing is a vital element of software development as it enables you to measure software quality. Today, testing can be …

Read More

24

Oct'14

Optimized FreeBSD Is On Its Way To Support ARMv8 Architectures

In cooperating with the FreeBSD Foundation, Cavium Inc. Will contribute directly to FreeBSD, supply engineering expertise and provide reference ThunderX …

Read More

22

Oct'14

Why Unix-Like Operating Systems Are To Boost More Security Trust?

The security features of the Linux kernel have evolved significantly to satisfy modern demands, although the Unix Discretionary Access Control …

Read More

17

Oct'14

The Z File System (ZFS) in FreeBSD

ZFS is commonly employed by data hoarders, NAS users, and the geeks who prefer to trust a redundant storage system …

Read More

16

Oct'14

FreeBSD 10.1 Is to Support Secure Boot Capabilities

Secure boot will be backed up by default in the upcoming FreeBSD 10.1 release, which is due to be built …

Read More

16

Oct'14

Cluster Systems: High Performance, Highly Available and Scalable

When the information systems consumers, suppliers and industry analysts agree on a technology, It is the Clustered architectures that changed …

Read More

14

Oct'14

Why FreeBSD? A Revolution in Open Source Operting Systems

The differences between the Unix variant operating systems such as BSD, Linux, Solaris, OS X and etc. and FreeBSD are …

Read More

14

Oct'14

Highly Available Storage (HAST), The Future of Transparent Storage.

High availability is a major requirement in critical business applications and is considered as a key component in such environments. …

Read More

07

Oct'14

Security Considerations of Ethernet Connections

Nowadays, the most important media access protocol is the Ethernet, the IEEE 802.3 standards. If you have a Local Area …

Read More

07

Oct'14

Secure Your FreeBSD, Security Tips

Security has always been a major topic alongside with Open Source systems. A weak entry-point in any system may allow …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013