linuxbsdos has a fairly positive review of PC-BSD 8.1, though there is still room for improvement:
“PC-BSD 8.1 was released on July 20, 2010, roughly five months after version 8.0 was released. Some of the suggestions made in the review of PC-BSD 8.0 have been carried out in this latest release. In fact, the changes were made within one month of that review being published. It is an encouraging example of how some distro developers respond to suggestions (or critical reviews).
While I still think that PC-BSD is not yet ready for the masses, it is coming along very well. This review will offer another detailed look at some of the good and bad sides of this FreeBSD-based distribution, with the attendant recommendations and suggestions for improvement.
Let me begin by looking at the bright side of this distribution…. ”
Yesterday, iXsystems upload a snapshot of their new FreeNAS release on the SVN.
The new FreeNAS is based on nanoBSD, then here are all the steps for generate the disk image of this release (from a FreeBSD 8.1 amd64).
Remember, this build is for developers and testing purposes only, as this snapshot is not functionally complete yet, and there are likely many rough edges, bugs and problems.
To run and test this build, the instructions can be found in the readme file.
BSD-Day@2010 will be held at Eötvös Loránd University, Budapest, Hungary on 20 November 2010.
The purpose of this one-day event is to gather Central European developers of today’s open-source BSD systems, popularize their work, and provide a real-life communication interface between developers and users. There are no formalities, no papers, and no registration or participation fee, however the invited developers are encouraged to give a talk on their favorite BSD-related topic. The goal is to motivate potential future developers and users, especially undergraduate university students to work with BSD systems.
For those interested in open source firewalls, there will be a pfSense tuturial at EuroBSDCon 2010.
pfSense is a free, open source customized distribution of FreeBSD tailored for use as a firewall and router. In addition to being a powerful, flexible firewalling and routing platform, it includes a long list of related features and a package system allowing further expandability without adding bloat and potential security vulnerabilities to the base distribution.
MeetBSD 2010 (California)
Registration is now open for MeetBSD 2010 (Mountain View, California, 5-6 November): www.meetbsd.com
Capsicum is a lightweight operating system capability and sandbox framework planned for inclusion in FreeBSD 9. Capsicum extends, rather than replaces, UNIX APIs, providing new kernel primitives (sandboxed capability mode and capabilities) and a userspace sandbox API. These tools support compartmentalisation of monolithic UNIX applications into logical applications, an increasingly common goal supported poorly by discretionary and mandatory access control. We demonstrate our approach by adapting core FreeBSD utilities and Google’s Chromium web browser to use Capsicum primitives, and compare the complexity and robustness of Capsicum with other sandboxing techniques.
Dru Lavigne has joined the PC-BSD team this month. The first thing she did, was setting up another blog: the PC-BSD Blog. She already posts BSD related posts on it.toolbox.com: A year in the life of a BSD guru.
As for the goal for AboutBSD, I want to turn it into a planet website that aggregates how BSD system admins use BSD. So that new users or system admins can learn that BSD is flexible, powerful, and provides all the freedom one needs to deploy services on BSD.
I would have no hesitation in recommending PC-BSD for desktop use. It has definitely been the best install experience for a desktop system I have had. It seems exactly tailored for someone like me, a developer in an office where we have tried to be operating-system-neutral as much as possible: most of our programmers do run PCs but we have weaned ourselves off any PC-only applications long ago (apart from specialist applications). As I mentioned in the previous blog, it is a smooth and pretty OS, and feels solid.
As announced before, ZFS v15 was successfuly imported into FreeBSD! For a time there was an option of importing just v15 or proceeding directly to v16 but the community has decided to first import the older version for reasons of stability and compatibility with Solaris 10 Update 8. (via)
Millions of home routers at risk.
According to new research delivered today here at the Black Hat security conference, millions of home routers may have a serious security flaw.
In his presentation at Black Hat, security researcher Craig Heffner detailed how an external attacker could gain full control of a user’s router and use that to gain access to the internal local area network (LAN). Though the implications are ominous, Heffner, also detailed a variety of steps users can take to protect themselves.
Foremay has introduced a 1TB 2.5? SATA solid-state drive alongside the industry-leading 2TB 3.5? SATA SSD, as the company expects to see an increased demand in SSD products for the enterprise.
The EC188 M-series model-V includes 200 MB/s read/write speeds, and can be used in the enterprise and workstation PCs.
Ideally, enterprise users will be able to utilize the EC188 M-series model-V, as it includes support for Microsoft Windows, Mac, several versions of Linux, OpenSolaris, Solaris, FreeBSD, HP-UX, Unix, and other operating systems…. Continues
Stopping SSH Brute Force attacks with PF on FreeBSD
Most people know that port 22 is used for SSH communication and due to this common knowledge, you get people using scripts to test for weak passwords. If you look into your /var/log/auth.log and you see tons of fails/errors from users not on your system or from invalid passwords for root, it means you have people trying to break into your system. Truthfully, anyone that puts a system online with port 22 open will see this happen to them. It’s quite common and not direct attack against you, just scripts looking for IPs with port 22 open.
Now it goes without saying that you should make sure you have a strong password that take use of numbers, upper and low case letters and symbols. Doing this will go along way in preventing someone from breaking into your system. You should also ensure that people can’t remotely log in as root by making sure that you have ‘PermitRootLogin’ set to ‘no’ in your /etc/ssh/sshd_config file. This will ensure that no mater how many passwords they try for root they will never be able to log in.
Now you could just set your SSH server to run on a different port or have your firewall redirect a different port from the outside to the system, but what’s the fun in that when you can use a great tool like PF.
I have just bought a copy of Bordeaux for PC-BSD/FreeBSD to support Tom and his team. They’re doing a great job building a bridge between *nix and the Windows world. Most of use still need/want to use some Windows programs Linux/PC-BSD/FreeBSD. If you’re interested, be quick as there’s a 50% off sale on. A copy costs only $10.
The Bordeaux Technology Group is a software services and development company specializing in Windows compatibility software. Users of Linux systems from time to time find themselves in the need to run specialized Windows software. The Bordeaux suite enables access to these programs and data in a seamless and low cost manner without requiring licensing of Microsoft Technology.
Now You can install GhostBSD by terminal commands and a list with pc-sysinstall. The partition Supported to install GhostBSD are UFS, UFS+S (plus soft updates7), UFS+J (plus journaling8), ZFS, and SWAP.
A how to install is in the desktop.
With GhostBSD in your hard drive you have Linux-f10 compatibility that mean you can install Linux apps and Linux flash. Cups ready to use. Compiz install and ready to be use.
GhostBSD 1.5 Beta is out. Notable additions are Compiz, Cups and it seems to include the PC-BSD backend installer (PC-Sysinstall (vid)). pc-sysinstall is the best FreeBSD installer around, so no wonder it’s included ;-)