As spring is here, it is high time to wish you that Easter will bring you a lot of joy, happiness, hope, and light.
Our wishes for this Easter.
I hope that this issue of BSD magazine will be a good lecture for the holidays. I know that all of you are waiting for the holidays so I do not bother you more. Please go to the Table of Contents page to see what we prepared and what you will find inside this BSD issue. Just start reading now.
Finally, I would like to thank you Authors, Reviewers, Proofreaders, BSD fans, Friends, and Readers for your invaluable support and contribution.
Ewa & BSD Team
C Developer in a FreeBSD World. Part 2
In the “The Journey of a C developer in a FreeBSD World”, David described the changes that occur when you land in a BSD system coming from Linux. Now, you get ready to get your C/C++ code working in both platforms; this time we will look into the debugging side.
A Complete Guide to FreeNAS Hardware Design, Part II: Hardware Specifics
A guide to selecting and building FreeNAS hardware, written by the FreeNAS Team, is long past overdue by now. For that, we apologize. The issue was the depth and complexity of the subject, as you’ll see by the extensive nature of this four part guide, due to the variety of ways FreeNAS can be utilized.
Does Your Information Belong to the CIA Triad?
Confidentiality, Integrity and Availability are the three pillars of Information Security. In this article, we pose a number of scenarios to you the IT professional and ask What would you do? Every environment is different, so we will not provide any answers. Instead we want to stimulate thought and debate around the ethics that Donn Parker says are missing from the computer center.
Security Monitoring of Industrial Control Systems
Eric D. Knapp & Joel Thomas Langill
The first step of information analysis requires a certain degree of data collection so that there is a healthy body of data to assess. Collecting evidence relevant to cyber security requires knowing what to monitor and how to monitor it. You will learn about determining what to monitor, successfully monitoring security zones, information management, and log storage and retention.
With a former intelligence operative confirming that the NSA has developed the prized technique of concealing spyware in the firmware of hard drives, what are the implications and is there any point in shutting the door now that the horse has bolted?
Interview with Solène Rapenne
|BSD Magazine 3/2015 (PDF)|
|BSD Magazine 3/2015 (ePUB)|