• No products in the cart.

Table Level Security in PostgreSQL

Dear Readers,

The three weeks went by so fast and here we are again. I hope that time was spent at many great events. This issue from the BSD magazine will cover not only BSD-oriented articles, but also articles from different parts of the IT World. I hope these articles provide some additional and inspired reading.

If you would like to get in touch with our team, please feel free to send your messages to [email protected] and I will be more than pleased to talk to you and answer all your questions.

Thank you and enjoy reading!
Ewa & The BSD Team

Table of Contents

In Brief
Ewa & The BSD Team
This column presents the latest news coverage of breaking news, events, product releases, and trending topics from the BSD sector.

The GNU/Linux PowerPC Notebook Project
Saulo Paiva
Learn how to build a laptop with the PowerPC architecture, designed around GNU/Linux, Free Software (compatible with other operating systems) and Open Hardware (as much as possible) that does not become quickly obsolete. You will be able to replace the MXM graphics card, the RAM, and storage.

Table Level Security in PostgreSQL
Luca Ferrari
PostgreSQL does support a lot of security features that are often not applied to use cases. Such features include the ability for column-level and row-level security constraint. This article presents a simple use case to allow readers to better understand the capabilities of this great database.

Robust and Minimal, Yet Functional Mail Server With FreeBSD, Sendmail, and Dovecot
Abdorrahman Homaei
Many people think running a functional Mail-Server is a complicated process that requires a script. Numerous blogs talk about how complicated Sendmail is, in fact neither running a Mail-Server nor working with Sendmail is all that painful.

Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)
Damon Mohammadbagher
In this chapter, Damon will explain how to send data to Attacker Server by DNS AAAA records and IPv6 Addresses. This is one method of data exfiltration.

Operating System Doppelgängers: The Creation of Indistinguishable, Deterministic Environments
Jason L. Wright, Chris Eagle, Tim Vidas
In support of the Cyber Grand Challenge program, DARPA required an
execution environment that not only focused on research, but also facilitated rigorous, repeatable measurements, and presented the highest levels of integrity. The desire was that measurements published out of the program could provide a basis for years of research in automated cyber reasoning.

Expert Speak by E.G.Nadhan

The Art of Minding Your Own (DevOps) Business
Automation, agility, continuous delivery, continuous integration, etc... What is the single word that comes to mind when you come across these terms? DevOps! Yes, that is correct, however, it is common practice to associate these terms immediately with IT when they actually can and should relate to the business of the enterprise.


In a recent High Court decision, Lauri Love won his appeal against extradition from the UK to the USA on health grounds, due to many long-term medical conditions, including Asperger’s Syndrome. What implications will this have for the global hacking community?
Rob Somerville

Interview with Roberto Innocenti,
Initiator and Coordinator of the PowerPC Notebook Project
Ewa & The BSD Team

BSD Magazine 02/2018 (102) (PDF)
BSD Magazine 02/2018 (102) (iBook)

Leave a Reply

Be the First to Comment!

Notify of
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013