CARP on FreeBSD - How to use DEVD to take action on kernel eventsRelease Date: 2013-12
BSD 12/2013 Free Issue to Download! [pdf]
In order to download the magazine you need to sign up to our newsletter. After clicking the “Download” button, you will be asked to provide your email address. You need to verify your email address using the link from the activation email you will receive. If you already subscribed to our list, you will be asked to provide your email address each time you download the magazine. No activation email will be sent and you should see the link for download.
1. After the activation of your subscription you need to click the “download” button once again to start downloading the PDF.
2. In case you do not get the activation email please check your spam folder. If it is not there, please use different email address
BSD 12/2013 Free Issue to Download! [epub]
Configuring a Highly Available Service on FreeBSD – part 2: CARP and devd
In the first part of this series, we learned how to make high availability (HA) storage on FreeBSD using HAST. We learned how to control HAST and how to recover from failures. However, all those actions were still manual actions. In this second part of the series, Jeroen will teach how two basic building blocks, CARP and devd, work and how we can use them in the final part of our series to automate the failover of our NFS server.
FreeBSD Programming Primer – Part 11
In the penultimate part of our series on programming, Rob will look at using the Netbeans Integrated Development Environment to debug and edit our CMS.
Unix Basics – for Security Professionals
Unix is the widely known multi-user and multitasking operating system that exists in many variants (e.g. Solaris, Linux, UX, AIX …etc), and for serves mission critical server environments around the world. Ramkumar provides the basics of Unix Operating systems while discussing how UNIX addresses the above security challenges.
Introduction to Unix Kernel
It is usually a source of wonderment to PC users that the whole of the Unix operating system is in one executable. Instead of a hodge-podge of DLL’s, drivers, and various occasionally-cooperating executables, everything is done by the Unix kernel. When Unix was first introduced, the operating system was described as having a ‘shell’, or user interface, which surrounded a ‘kernel’ which interpreted the commands passed to it from the shell.
OpenBSD 5.4 as a Transparent HTTP/HTTPS Proxy
Wesley in his article will teach you how to configure Relayd for URL Blocking with https inspection and how to use and understand Packet Filter.
GhostBSD: A User-friendly, Lightweight BSD Alternative
GhostBSD is an open source desktop operating system based on FreeBSD which aims for a secure, user-friendly experience out of the box. GhostBSD comes with most common software choices already configured, giving the user a solid BSD installation out of the box. Adrian will tell you why he chose FreeBSD OS.
How Secure Can Secure Shell (SSH) Be?
To begin, let’s concentrate on the One Time Password (OTP). We are going to achieve our already secure SSH in conjunction with OTP for remote system connections. At first, in algorithmic meaning, OTP is a character string which should never repeat. Arkadiusz, in his article, demonstrates configurations as well as tricks that make using the protocol more secure.
Column by Rob Somerville
OPINION: With the UK government in collusion with the major search engines to censor 100,000 search terms to prevent child abuse, is the UK joining the ranks of the technological fascists?