• eForensics Magazine
  • Hakin9 Magazine
  • Pentest Magazine
  • Software Developer's Journal

Security and Cryptography in BSD

Release Date: 2013-07
Bsd_07_2013
Rating: 13 votes

Issue_contents

  • An Eye For An Eye Soon Leads To Blindness
  • MaheshaOpenBSD – OpenBSD In A Serpent World
  • Security Policy Development in TrustedBSD MAC Framework
  • Using Nginx and Naxsi for Security and High Availability
  • FreeBSD Programming Primer – Part 6
  • Elliptic Curve Cryptography and Basic Applications in BSD OS
  • Articles

    • Free Issue to Download! BSD 7/2013

      In order to download the magazine you need to sign up to our newsletter. After clicking the “Download” button, you will be asked to provide your email address. You need to verify your email address using the link from the activation email you will receive. If you already subscribed to our list, you will be asked to provide your email address each time you download the magazine. No activation email will be sent and you should see the link for download.

      IMPORTANT NOTICE
      1. After the activation of your subscription you need to click the “download” button once again to start downloading the PDF.
      2. In case you do not get the activation email please check your spam folder. If it is not there, please use different email address


    • BSD 7/2013 in epub format!

    • An Eye For An Eye Soon Leads To Blindness

      Former National Security Agency contractor, Edward Snowden, has created worldwide controversy by leaking United States secrets to British and American newspapers. While Snowden seeks permanent asylum, the US bans access to the UK Guardian newspaper for US troops. This follows in the footsteps of the Stuxnet attack on Iranian nuclear infrastructure. Are we at war on the web?


    • MaheshaOpenBSD - OpenBSD In A Serpent World

      The article focuses on a turnkey server made with OpenBSD. This is available as a USB image that can be immediately deployed in the SOHO (Small Office – Home Office) environment. MaheshaOpenBSD Server is a flavor of the MaheshaBSD Server, originally based on FreeBSD, that runs on OpenBSD 5.2 and was released on April 5, 2013.


    • Security Policy Development in TrustedBSD MAC Framework

      Trusted Operating Systems are the next level of system security. They offer both new security features and a high assurance of successful implementation. Trusted systems differ from secure systems in many principles. Trusted Systems established the concept of “ranking” systems with different degrees of trustworthiness. In such systems, users decide on trustworthiness and make a judgment based on the security of systems. Operating systems have to implement security policies, and different mechanisms are used to enforce such policies. There are various operating system security policies such as the Massachusetts Library System (MLS) and Biba, which was developed by Kenneth J. Biba. This article describes the overall process of developing and applying different security policies within the FreeBSD kernel under the TrustedBSD MAC Security Framework.


    • Using Nginx and Naxsi for Security and High Availability

      Nginx is a lightweight and powerful HTTP proxy, mail proxy, and reverse proxy server for UNIX-like systems that can also be used as an excellent High Availability (HA) and cluster system. Naxsi is an Nginx Web Application Firewall (WAF) created to mitigate web application vulnerabilities by using an intelligent resource to generate whitelist rules.


    • FreeBSD Programming Primer – Part 6

      In the sixth part of our series on programming, we will design a basic menu navigation system and style it with CSS.


    • Elliptic Curve Cryptography and Basic Applications in BSD OS

      Over the past century, new IT discoveries and top technologies have been incorporated into our daily lives. As a result, a dichotomy between considerations about essential computer safety and safety appears. In these times, when the Internet allows users to communicate easily around the world, many people use it to trade in goods or to protect against intruders. That’s why cryptological techniques and algorithms are an essential need.


    Back