• eForensics Magazine
  • Hakin9 Magazine
  • Pentest Magazine
  • Software Developer's Journal

BSD Certification: How? When? Why?

Release Date: 2012-02
Bsd_02_2012
Rating: 18 votes

Issue_contents

  • Why Should I Become BSDA Certified?
  • Customizing Your PC-BSD 9.0 Desktop
  • The MidnightBSD Package Management Tools
  • What Can’t You Do On The command-line?
  • PostgreSQL: From Installation to PITR
  • OpenBSD with SUN JAVA & Netbeans
  • Load Balancers. Enterprise Load & Service Availability
  • Anatomy of FreeBSD Compromise Part 3
  • Data Classification Policy
  • Counting Our Losses
  • Articles

    • Free Issue to Download! BSD 2/2012

      In order to download the magazine you need to sign up to our newsletter. After clicking the “Download” button, you will be asked to provide your email address. You need to verify your email address using the link from the activation email you will receive. If you already subscribed to our list, you will be asked to provide your email address each time you download the magazine. No activation email will be sent and you should see the link for download.

      IMPORTANT NOTICE
      1. After the activation of your subscription you need to click the “download” button once again to start downloading the PDF.
      2. In case you do not get the activation email please check your spam folder. If it is not there, please use different email address.


    • Short Survey About New Project

      Dear friends of Software Media Group known for such a publications as: Hakin9, PenTest, BSD, SDJ or Codersky. We are entering with new initiative devoted to on-line trainigs. This innovative project Hakin9Lab is based on case studies and laboratories. We would like to ask you to answer a few questions related to trainings topic. Thank you in advance for your help!
      Click here to take the survey now. The survey was created with eSurveysPro.com survey software

      For more information please contact katarzyna.zwierowicz@software.com.pl


    • Customizing Your PC-BSD 9.0 Desktop

      One of the most important new features of PC-BSD 9.0 is the ability to customize your desktop with a variety of different FreeBSD packages, such as desktops, window-managers, servers, drivers and more. This is done through the new pc-metapkgmanager utility and it’s front-ends, which allows users to quickly and easily select a bundle of packages, such as KDE or GNOME, to install. This ability in effect allows a user to deploy a custom FreeBSD based desktop without the hassle of using the command-line and manually resolving dependency issues. Lets take a look at how this can be used in the new PC-BSD 9 desktop.


    • mport: The MidnightBSD Package Management Tools

      One of the most tedious tasks in setting up and maintaining a personal computer is installing software applications. The BSD community has historically handled this by providing users a ports system to compile software and later some package management software. This approach has worked well for power users. The Linux community has built some user friendly package management tools with command line and graphical user interfaces. In minutes, one can install a new web browser or word processor.


    • Why Should I Become BSDA Certified?

      If you are reading this magazine, you are interested in learning more about BSD systems. Perhaps you have seen this magazine’s ads for BSD Certification and want to learn more about this certification program or perhaps you think that certification is not for you. This article addresses some common misconceptions about certification and describes why you should be BSDA certified. This article outlined some of the benefits provided by a psychometrically valid certification program as well as some tips for learning the skills needed to pass a certification exam.


    • What Can’t You Do On The command-line?

      Most of us have all grown accustomed to some form of true graphical interface to our computers. But there’s always that group of so-called `geeks’, which remain to work at a simple 80×24 console. But that’s just for geeks, or is it?


    • PostgreSQL: From Installation to PITR

      “The most advanced open-source database available anywhere”, this is the comment for the PostgreSQL package. PostgreSQL is an enterprise-level ORDBMS very stable and reliable, with a rich set of features that make it competing with well known commercial databases. PostgreSQL is released under a BSD license, has a very comprehensive documentation and is maintained by a set of database experts around the planet. In this article you will learn how to install and set up a PostgreSQL cluster, how to interact with the system and how to make backups of your databases.


    • OpenBSD with SUN JAVA & Netbeans

      This article is designed for Java developers who wants to have a good operating system for their works. You will learn how to setup SUN Java system and Netbeans on your OpenBSD desktop.This article is based on OpenBSD 5.0 version.


    • Data Classification Policy

      A good sysadmin realizes that security is more than firewalls, encryption, patching, and other technical considerations. One common saying is: “The only secure computer is one that’s not plugged into the network.” Humbug! A clever intruder will easily trick the user into plugging that Ethernet cable back into its socket. The weakest point in any network is the human element.
      I want to share with you my data classification policy.


    • Load Balancers. Enterprise Load & Service Availability

      The world is a complex place. A term that means one thing to one person may mean something completely different to someone else. Take Load Balancers for example. How many different Load Balancers can you think of?


    • Anatomy of a FreeBSD Compromise (Part 3)

      Continuing in our security series, we will look at the tools essential to securing and exploiting systems.In the previous articles, the author looked at the culture and processes behind hacking exploits, as well as some possible real-life examples. In this article we will look at some of the tools used to penetrate, test and secure devices as well performing analysis and discovering vulnerabilities. While the examples here are non-destructive, it is recommended that these tests are carried out on a private test network and definitely not on the Internet or without your employer’s approval. To do so may well be in breach of your ISP’s or employers Acceptable Use Policy and could lead to legal action against you.


    • Counting Our Losses

      2011, a hefty year as they all say. Even Discovery Channel has specials on the events of this year. The devastating earthquake in Japan, the war on terrorism finally claimed their hard sought-after victim and even the untimely death of Steve Jobs has a special. But what about the real heroes? The heroes behind the screens, outside of popular media?


    Back