Hello BSD users,
We, the BSD Mag team, are releasing the new BSD issue. This issue includes the next articles that will upgrade your admin skills. We hope that you will find the articles useful. Our ultimate goal is to provide you with the knowledge and skills you need in your professional careers.
I am looking for the next topics for 2015. I’d love to receive your suggestions regarding what articles should be in the next issues of BSD. If you think we’ve missed a very interesting subject that should be covered, do not hesitate to write to us.
As always, we would like to send a warm “Thank You”.
If you want to go on a real life, open source journey with our rich content workshops, publications, tutorials, and so on or if you want to get in touch with our team, please email us.
Ewa & the BSD Mag Team
PPPoE Concentrator Dual-Stack!
Tiago Felipe Gonçalves
Tiago, in his article, presents how to use a PPPoE Concentrator Dual-Stack (v4/v6) based on open source software for small and midsize Internet service providers. He will also describe how to make a FreeRadius centralized server and will cover its settings, once they are essential for the concentrator’s operation.
Getting to grips with the Gimp
The next part of our Gimp series will be about 3D objects. In this article, Rob will give you more information about how to create a realistic 3D object for a FreeBSD carton that is print ready.
100+ UNIX COMMANDS
Craig S. Wright
The last part of Craig’s article will give you insight into Pen Testing and Audits. Craig will present the Netcat tool. Netcat has a number of pre-existing scripts that can allow it to act as a simple vulnerability scanner. It does this by connecting to the port to be tested, entering data to test a vulnerability and returning the result.
Acunetix Web Vulnerability Scanner
Application Security testing tools are often the best solution for security professionals tasked with securing applications throughout the Software Development Lifecycle (SDLC). This is where we introduce Acunetix! As a precursor to the remainder of this article, Michael has had the opportunity to work with a number of Application Security tools for large enterprises.
Is There a Difference Between Geeks and Nerds?