• No products in the cart.

NEW BSD Issue: FreeNAS A Complete Guide to FreeNAS Hardware Design

BSD Magazine 3/2015 (PDF)
BSD Magazine 3/2015 (ePUB)

Dear Readers,

As spring is here, it is high time to wish you that Easter will bring you a lot of joy, happiness, hope, and light.

Our wishes for this Easter.

Good health,

Good fortune,

Fulfilling life.

I hope that this issue of BSD magazine will be a good lecture for the holidays. I know that all of you are waiting for the holidays so I do not bother you more. Please go to the Table of Contents page to see what we prepared and what you will find inside this BSD issue. Just start reading now.

Finally, I would like to thank you Authors, Reviewers, Proofreaders, BSD fans, Friends, and Readers for your invaluable support and contribution.

Happy Easter!
Ewa & BSD Team


C Developer in a FreeBSD World. Part 2

David Carlier

In the “The Journey of a C developer in a FreeBSD World”, David described the changes that occur when you land in a BSD system coming from Linux. Now, you get ready to get your C/C++ code working in both platforms; this time we will look into the debugging side.


A Complete Guide to FreeNAS Hardware Design, Part II: Hardware Specifics

Josh Paetzel

A guide to selecting and building FreeNAS hardware, written by the FreeNAS Team, is long past overdue by now. For that, we apologize. The issue was the depth and complexity of the subject, as you’ll see by the extensive nature of this four part guide, due to the variety of ways FreeNAS can be utilized.


Does Your Information Belong to the CIA Triad?

Rob Somerville

Confidentiality, Integrity and Availability are the three pillars of Information Security. In this article, we pose a number of scenarios to you the IT professional and ask What would you do? Every environment is different, so we will not provide any answers. Instead we want to stimulate thought and debate around the ethics that Donn Parker says are missing from the computer center.


Security Monitoring of Industrial Control Systems

Eric D. Knapp & Joel Thomas Langill

The first step of information analysis requires a certain degree of data collection so that there is a healthy body of data to assess. Collecting evidence relevant to cyber security requires knowing what to monitor and how to monitor it. You will learn about determining what to monitor, successfully monitoring security zones,  information management, and log storage and retention.


With a former intelligence operative confirming that the NSA has developed the prized technique of concealing spyware in the firmware of hard drives, what are the implications and is there any point in shutting the door now that the horse has bolted?

Rob Somerville


Interview with Solène Rapenne

Luca Ferrari


BSD Magazine 3/2015 (PDF)
BSD Magazine 3/2015 (ePUB)

April 1, 2015

2 responses on "NEW BSD Issue: FreeNAS A Complete Guide to FreeNAS Hardware Design"

  1. Thank you for the great wealth of information about ZFS. Convinced me to mirror a couple of drives using ZFS, well actually 2 mirrors. Dru always has strong writing skills – I always learn something new. Sincerely!

Leave a Message

Your email address will not be published. Required fields are marked *

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013