Tarsnap is an online service where you can securely backup your data. It is maintained by Colin Percifal, an ex FreeBSD Security Officer.
Tarsnap is a secure online backup service for BSD, Linux, OS X, Minix, Solaris, Cygwin, and probably many other UNIX-like operating systems. The Tarsnap client code provides a flexible and powerful command-line interface which can be used directly or via shell scripts.
Linux Journal has a 10 page article on Tarsnap in its latest issue.
Collin recently announced you can now pay by credit card for the Tarsnap service, in addition to Paypal.
Microsoft and collaborators today announced a beta release of drivers that enable the open source FreeBSD 8.2 server operating system to run in a virtual machine (VM) using Microsoft’s Hyper-V Server.
The beta, which isn’t intended for use in production environments, can be downloaded from the GitHub portal here. Installation instructions can be accessed on this page. The code was released under a FreeBSD license.
In the near future, GitHub will supply ISO images of FreeBSD that will include the new drivers. The collaboration, which involved Microsoft, Insight Global, Citrix and NetApp, was highlighted at the BSDCan 2012 event in May.
In version 1.2 of the highly scalable distributed database, developers can stage and review multiple cluster changes to see how they affect the system before committing them.
Personally I don’t like Gnome (2) and Gnome3 even less. There’s good news for those who are waiting for Gnome3 on FreeBSD: Gnome3 porting to FreeBSD.
Gnome3 isn’t working on FreeBSD as Gnome3 uses technologies that are not available to BSDs. I thought Gnome3 to BSD was a dead project till Juanjo Marin (Gnome Dev in Evince and A11y) mentioned a few things about BSD in Gnome’s Marketing ML.
BIND 9 is an implementation of the Domain Name System (DNS) protocols. The named(8) daemon is an Internet Domain Name Server.
DNS Security Extensions (DNSSEC) provides data integrity, origin authentication and authenticated denial of existence to resolvers.
II. Problem Description
BIND 9 stores a cache of query names that are known to be failing due to misconfigured name servers or a broken chain of trust. Under high query loads, when DNSSEC validation is active, it is possible for a condition to arise in which data from this cache of failing queries could be used before it was fully initialized, triggering an assertion failure.
A remote attacker that is able to generate high volume of DNSSEC validation enabled queries can trigger the assertion failure that causes it to crash, resulting in a denial of service.
For a workaround and solution, check out the security advisory: FreeBSD-SA-12:05.bind.asc