DragonFlyBSD Multimedia Resources List
Links on this page refer to multimedia resources (podcast, vodcast,
audio recordings, video recordings, photos) related to DragonFlyBSD or
of interest for DragonFlyBSD users.
This list is available as chronological
overview, as a tag cloud and
via the sources.
This list is also available as RSS feed
If you know any resources not listed here, or notice any dead links,
please send details to
Edwin Groothuis so that
it can be included or updated.
Tag: bsd
Marshall Kirk McKusick at DCBSDCon
Source: bsdtalk
Added: 21 February 2009
Tags: bsdtalk, presentation, bsd, history, kirk mckusick
Ogg version (55 minutes), MP3 version (26 Mb, 55 minutes)
A recording of Marshall Kirk McKusick's talk "A
Narrative History of BSD" at DCBSDCon this past
weekend.
You can get a much more complete history here:
http://www.mckusick.com/history/index.html
Using BSD in SchmooCon Labs
Source: YouTube bsdconferences channel
Added: 24 May 2009
Tags: youtube, presentation, dcbsdcon, dcbsdcon2009, bsd, schmoocon, ken caruso
Flash (35:08)
Using BSD in SchmooCon Labs
DCBSDCon 2009, Ken Caruso
clive URL: http://www.youtube.com/watch?v=9ZhfuP4jghY
25 years with BSD
Source: YouTube bsdconferences channel
Added: 24 May 2009
Tags: youtube, keynote, asiabsdcon2008, asiabsdcon, bsd, hideki sunahara
Flash (44:43)
Thinking RealSpace: Life with BSD - ~25 years with BSD
AsiaBSDCon 2008, Hideki Sunahara
clive URL: http://www.youtube.com/watch?v=brYdkQ120Do
EuroBSDCon 2008 - Edd Barret - Modern Typesetting on BSD
Source: EuroBSDCon
Added: 22 October 2008
Tags: eurobsdcon, eurobsdcon2008, typesetting, bsd, edd barrett
MP3 (1 byte, 33 minutes), OGG (1 byte, 33 minutes), PDF (1 byte, n pages)
Edd Barrett will speak about using the BSD Platform
as a means of typesetting from a practical standpoint
at EuroBSDcon 2008. Edd Barrett does not wish to
go into the technicalities of each typesetter, but
rather state which are good for certain types of
document, and which tools (ports and packages),
integrate well with the available typesetters.
Edd Barrett os a student from the UK, currently on
"placement year" as a systems administrator for
Bournemouth University. Open Source *NIX has been
his platform of choice for many years and he has
been using OpenBSD for about 3 years now, simply
because it is small, clean, correct and secure.
Just recently he has started developing things I
want or need for OpenBSD.
EuroBSDCon 2008 - Michael Dexter - Zen and the Art of Multiplicity Maintenance: An applied survey of BSD-licensed multiplicity strategies from chroot to mult
Source: EuroBSDCon
Added: 22 October 2008
Tags: eurobsdcon, eurobsdcon2008, bsd, michael dexter
MP3 (1 byte, 38 minutes), OGG (1 byte, 38 minutes), PDF (1 byte, n pages)
Many BSD-licensed strategies of various levels of
maturity exist to implement multiplicity, herein
defined as the introduction of plurality to
traditionally singular computing environments via
isolation, virtualization, or other method. For
example, the chroot utility introduces an additional
isolated root execution environment within that of
the host; or an emulator provides highly-isolated
virtual systems that can run complete native or
foreign operating systems. Motivations for multiplicity
vary, but a demonstrable desire exists for users
to obtain root or run a foreign binary or operating
system. We propose a hands-on survey of portable
and integrated BSD-licensed multiplicity strategies
applicable to the FreeBSD, OpenBSD, DragonFlyBSD
and NetBSD operating systems on the i386 architecture.
We will also address three oft-coupled disciplines:
software storage devices, the installation of
operating system and userlands in multiplicity
environments plus the management of select multiplicity
environments. Finally we will comment on each
strategies potential limits of isolation, compatibility,
independence and potential overhead in comparison
to traditional systems. Keywords: multiplicity,
virtualization, chroot, jail, hypervisor, xen,
compat.
Michael Dexter has used Unix systems since 1991 and
BSD-licensed multiplicity strategies for over five
years. He is the Program Manager at the BSD Fund
and Project Manager of the BSD.lv Project.
EuroBSDCon 2008 - Hauke Fath - Managing BSD desktop clients - Fencing in the herd
Source: EuroBSDCon
Added: 22 October 2008
Tags: eurobsdcon, eurobsdcon2008, bsd, desktop, hauke fath
MP3 (1 byte, 50 minutes), OGG (1 byte, 50 minutes), PDF (1 byte, n pages)
The members of the BSD family have traditionally
prospered off the desktop, as operating systems on
servers and embedded systems. The advent of MacOS
X has marked a change, and moved the desktop more
into focus. Modern desktop systems create a richer
software landscape, with more diverse requirements,
than their server counterparts. User demands,
software package interdependencies and frequent
security issues result in a change rate that can
put a considerable load on the admin staff. Without
central management tools, previously identical
installations diverge quickly. This paper looks at
concepts and strategies for managing tens to hundreds
of modern, Unix-like desktop clients. The available
management tools range from simple, image-based
software distribution, mainly used for setting up
uniform clients, to "intelligent" rule-based engines
capable of search-and-replace operations on
configuration files. We will briefly compare their
properties and limitations, then take a closer look
at Radmind, a suite for file level administration
of Unix clients. Radmind has been in use in the
Institute of Telecommunication at Technische
Universitt Darmstadt for over three years, managing
NetBSD and Debian Linux clients in the labs as well
as faculty members' machines. We will explore the
Radmind suite's underlying concepts and functionality.
In order to see how the concept holds up, we will
discuss real-world scenarios from the system
life-cycle of Installation, configuration changes,
security updates, component updates, and system
upgrades.
Hauke Fath works as a systems administrator for the
Institut fr Nachrichtentechnik (telecommunication)
at Technische Universitt Darmstadt. He has been
using NetBSD since 1994, when he first booted a
NetBSD 1.0A kernel on a Macintosh SE/30. NetBSD
helped shaping his career by causing a slow drift
from application programmer's work towards systems
and network administration. Hauke Fath holds a MS
in Physics and became a NetBSD developer in late
2006.
Keywords: Managing Unix desktop clients, software
distribution, tripwire
AsiaBSDCon 2008 Paper List
Source: AsiaBSDCon
Added: 08 April 2008
Tags: asiabsdcon, asiabsdcon2008
Using FreeBSD to Promote Open Source Development Methods, Brooks Davis, Michael AuYeung, Mark Thomas (The Aerospace Corporation) (483 Kb), OpenBSD Network Stack Internals, Claudio Jeker (The OpenBSD Project) (410 Kb), Tracking FreeBSD in a Commercial Setting, M. Warner Losh (Cisco Systems, Inc.) (94 Kb), Send and Receive of File System Protocols: Userspace Approach With puffs, Antti Kantee (Helsinki University of Technology, Finland) (126 Kb), GEOM --- in Infrastructure We Trust, Pawel Jakub Dawidek (The FreeBSD Project) (91 Kb), Reducing Lock Contention in a Multi-Core System, Randall Stewart (Cisco Systems, Inc.) (72 Kb), PC-BSD: FreeBSD on the Desktop, Matt Olander (iXsystems) (6.4 Mb), Logical Resource Isolation in the NetBSD Kernel, Kristaps Dzonsons (Centre for Parallel Computing, Swedish Royal Institute of Technology) (97 Kb), Whole of the proceedings (9.3 Mb), Gaols: Implementing Jails Under the kauth Framework, Christoph Badura (The NetBSD Foundation) (92 Kb), Cover page (467 Kb), Sleeping Beauty --- NetBSD on Modern Laptops, Jorg Sonnenberger, Jared D. McNeill (The NetBSD Foundation) (87 Kb), A Portable iSCSI Initiator, Alistair Crooks (The NetBSD Foundation) (341 Kb), BSD implementations of XCAST6, Yuji IMAI, Takahiro KUROSAWA, Koichi SUZUKI, Eiichi MURAMOTO, Katsuomi HAMAJIMA, Hajimu UMEMOTO, and Nobuo KAWAGUTI (XCAST fan club, Japan) (526 Kb)
Papers of the AsiaBSDCon 2007
Constantine A. Murenin - Quiet Computing with BSD
Source: BSDCan - The Technical BSD Conference
Added: 25 May 2009
Tags: bsdcan, bsdcan2009, presentation, bsd, hardware monitors, canstantine murenin
Slides (264 Kb, 16 pages)
Quiet Computing with BSD
Programming system hardware monitors for quiet computing
In this talk, we will present a detailed overview
of the features and common problems of microprocessor
system hardware monitors as they relate to the topic
of silent computing. In a nutshell, the topic of
programmable fan control will be explored.
Silent computing is an important subject as its
practice reduces the amount of unnecessary stress
and improves the motivation of the workforce, at
home and in the office.
Attendees will gain knowledge on how to effectively
programme the chips to minimise fan noise and avoid
system failure or shutdown during temperature
fluctuations, as well as some basic principles
regarding quiet computing.
Shortly before the talk, a patch for programming
the most popular chips (like those from Winbond)
will be released for the OpenBSD operating system,
although the talk itself will be more specific to
the microprocessor system hardware monitors themselves,
as opposed to the interfacing with thereof in modern
operating systems like OpenBSD, NetBSD, DragonFly
BSD and FreeBSD.
Fernando Gont - Results of a Security Assessment of the TCP and IP protocols and Common implementation Strategies
Source: BSDCan - The Technical BSD Conference
Added: 25 May 2009
Tags: bsdcan, bsdcan2009, presentation, bsd, security assessment, fernado gont
Security Assessment of the Internet Protocol (660 Kb, 63 pages), Slides (473 Kb, 64 pages), Proposal (93 Kb, 3 pages), Security Assessment of the Transmission Control Protocol (TCP) (1.4 Mb, 130 pages)
Results of a Security Assessment of the TCP and IP
protocols and Common implementation Strategies
Fernando Gont will present the results of security
assessment of the TCP and IP protocols carried out
on behalf of the United Kingdom's Centre for the
Protection of National Infrastructure (Centre for
the Protection of National Infrastructure). His
presentation will provide an overview of the
aforementioned project, and will describe some of
the new insights that were gained as a result of
this project. Additionally, it will provide an
overview of the state of affairs of the different
TCP/IP implementations found in BSD operating systems
with respect to the aforementioned issues.
During the last twenty years, many vulnerabilities
have been identified in the TCP/IP stacks of a
number of systems. The discovery of these vulnerabilities
led in most cases to reports being published by a
number of CSIRTs and vendors, which helped to raise
awareness about the threats and the best possible
mitigations known at the time the reports were
published. For some reason, much of the effort of
the security community on the Internet protocols
did not result in official documents (RFCs) being
issued by the organization in charge of the
standardization of the communication protocols in
use by the Internet: the Internet Engineering Task
Force (IETF). This basically led to a situation in
which "known" security problems have not always
been addressed by all vendors. In addition, in many
cases vendors have implemented quick "fixes" to the
identified vulnerabilities without a careful analysis
of their effectiveness and their impact on
interoperability. As a result, producing a secure
TCP/IP implementation nowadays is a very difficult
task, in large part because of the hard task of
identifying relevant documentation and differentiating
between that which provides correct advisory, and
that which provides misleading advisory based on
inaccurate or wrong assumptions. During 2006, the
United Kingdom's Centre for the Protection of
National Infrastructure embarked itself in an
ambitious and arduous project: performing a security
assessment of the TCP and IP protocols. The project
did not limit itself to an analysis of the relevant
IETF specifications, but also included an analysis
of common implementation strategies found in the
most popular TCP and IP implementations. The result
of the project was a set of documents which identifies
possible threats for the TCP and IP protocols and,
where possible, proposes counter-measures to mitigate
the identified threats. This presentation will will
describe some of the new insights that were gained
as a result of this project. Additionally, it will
provide an overview of the state of affairs of the
different TCP/IP implementations found in BSD
operating systems.
George Neville-Neil - Thinking about thinking in code
Source: BSDCan - The Technical BSD Conference
Added: 25 May 2009
Tags: bsdcan, bsdcan2009, keynote, bsd, george neville-neil
Slides (4.0 Mb, 137 pages)
Thinking about thinking in code
Proposed keynote talk
This is not a talk that's specific to any BSD but
is a more general talk about how we think about
coding and how our thinking changes the way we code.
I compare how we built systems to how other industries
build their products and talk about what we can
learn from how we work and from how others work as
well.
Een historisch overzicht van BSD - Hans van de Looy
Source: Nederlandse Linux Gebruikers Group
Added: 31 December 2008
Tags: nllgg, bsd, history, hans van de looy
PDF version (5767 Kb, 38 pages)
Hans zal een historisch overzicht geven van het
ontstaan van *BSD vanaf de oorsprong van UNIX tot
aan de nu bekende *BSD varianten. Hij zal daarbij
met name ingaan wat de oorsprong en het ontstaan
van een aantal *BSD-projecten zijn. Hierbij zal hij
zeer kort ingaan op de verschillende licentieproblemen
die we in het verleden gezien hebben en worden een
aantal bekende personen en data weer eens even op
de kaart geplaatst.
Hans van de Looy is oprichter van Madison Gurkha. Een bedrijf
dat gespecialiseerd is op het gebied van het uitvoeren
van technische ICT-beveiligingsonderzoeken, in de
media ook wel aangeduid met Etisch Hacken. Tijdens
dergelijke onderzoeken maakt hij ook regelmatig
gebruik van op BSD* gebaseerde systemen.
|
|