Links on this page refer to multimedia resources (podcast, vodcast, audio recordings, video recordings, photos) related to FreeBSD or of interest for FreeBSD users.
This list is available as chronological overview, as a tag cloud and via the sources.
This list is also available as RSS feed
If you know any resources not listed here, or notice any dead links, please send details to Edwin Groothuis so that it can be included or updated.
Marshall
Kirk McKusick at DCBSDCon
Source: bsdtalk
Added: 21 February 2009
Tags: bsdtalk, presentation, bsd, history, kirk
mckusick
Ogg version
(55 minutes), MP3
version (26 Mb, 55 minutes)
Using BSD in SchmooCon
Labs
Source: YouTube bsdconferences
channel
Added: 24 May 2009
Tags: youtube, presentation, dcbsdcon,
dcbsdcon2009, bsd, schmoocon, ken
caruso
Flash (35:08)
25 years with BSD
Source: YouTube bsdconferences
channel
Added: 24 May 2009
Tags: youtube, keynote, asiabsdcon2008, asiabsdcon, bsd, hideki sunahara
Flash (44:43)
EuroBSDCon 2008 - Edd Barret - Modern
Typesetting on BSD
Source: EuroBSDCon
Added: 22 October 2008
Tags: eurobsdcon, eurobsdcon2008, typesetting, bsd, edd barrett
MP3
(1 byte, 33 minutes), OGG
(1 byte, 33 minutes), PDF
(1 byte, n pages)
EuroBSDCon 2008 - Michael Dexter - Zen
and the Art of Multiplicity Maintenance: An applied survey of BSD-licensed multiplicity
strategies from chroot to mult
Source: EuroBSDCon
Added: 22 October 2008
Tags: eurobsdcon, eurobsdcon2008, bsd, michael dexter
MP3
(1 byte, 38 minutes), OGG
(1 byte, 38 minutes), PDF
(1 byte, n pages)
EuroBSDCon 2008 - Hauke Fath -
Managing BSD desktop clients - Fencing in the herd
Source: EuroBSDCon
Added: 22 October 2008
Tags: eurobsdcon, eurobsdcon2008, bsd, desktop, hauke fath
MP3
(1 byte, 50 minutes), OGG
(1 byte, 50 minutes), PDF
(1 byte, n pages)
AsiaBSDCon 2008 Paper List
Source: AsiaBSDCon
Added: 08 April 2008
Tags: asiabsdcon, asiabsdcon2008
Using FreeBSD to Promote Open
Source Development Methods, Brooks Davis, Michael AuYeung, Mark Thomas (The Aerospace
Corporation) (483 Kb), OpenBSD Network Stack Internals,
Claudio Jeker (The OpenBSD Project) (410 Kb), Tracking FreeBSD in a Commercial
Setting, M. Warner Losh (Cisco Systems, Inc.) (94 Kb), Send and Receive of File System
Protocols: Userspace Approach With puffs, Antti Kantee (Helsinki University of
Technology, Finland) (126 Kb), GEOM --- in Infrastructure We
Trust, Pawel Jakub Dawidek (The FreeBSD Project) (91 Kb), Reducing Lock Contention in a
Multi-Core System, Randall Stewart (Cisco Systems, Inc.) (72 Kb), PC-BSD: FreeBSD on the Desktop,
Matt Olander (iXsystems) (6.4 Mb), Logical Resource Isolation in the
NetBSD Kernel, Kristaps Dzonsons (Centre for Parallel Computing, Swedish Royal Institute
of Technology) (97 Kb), Whole of the
proceedings (9.3 Mb), Gaols: Implementing Jails Under
the kauth Framework, Christoph Badura (The NetBSD Foundation) (92 Kb), Cover page (467 Kb),
Sleeping Beauty --- NetBSD on
Modern Laptops, Jorg Sonnenberger, Jared D. McNeill (The NetBSD Foundation) (87 Kb),
A Portable iSCSI Initiator,
Alistair Crooks (The NetBSD Foundation) (341 Kb), BSD implementations of XCAST6,
Yuji IMAI, Takahiro KUROSAWA, Koichi SUZUKI, Eiichi MURAMOTO, Katsuomi HAMAJIMA, Hajimu
UMEMOTO, and Nobuo KAWAGUTI (XCAST fan club, Japan) (526 Kb)
Fernando Gont -
Results of a Security Assessment of the TCP and IP protocols and Common implementation
Strategies
Source: BSDCan - The Technical BSD Conference
Added: 25 May 2009
Tags: bsdcan, bsdcan2009,
presentation, bsd, security assessment, fernado gont
Security
Assessment of the Internet Protocol (660 Kb, 63 pages),
Slides (473 Kb, 64 pages), Proposal
(93 Kb, 3 pages),
Security Assessment of the Transmission Control Protocol (TCP) (1.4 Mb, 130
pages)
Results of a Security Assessment of the TCP and IP protocols and Common implementation Strategies
Fernando Gont will present the results of security assessment of the TCP and IP protocols carried out on behalf of the United Kingdom's Centre for the Protection of National Infrastructure (Centre for the Protection of National Infrastructure). His presentation will provide an overview of the aforementioned project, and will describe some of the new insights that were gained as a result of this project. Additionally, it will provide an overview of the state of affairs of the different TCP/IP implementations found in BSD operating systems with respect to the aforementioned issues.
During the last twenty years, many vulnerabilities have been identified in the TCP/IP stacks of a number of systems. The discovery of these vulnerabilities led in most cases to reports being published by a number of CSIRTs and vendors, which helped to raise awareness about the threats and the best possible mitigations known at the time the reports were published. For some reason, much of the effort of the security community on the Internet protocols did not result in official documents (RFCs) being issued by the organization in charge of the standardization of the communication protocols in use by the Internet: the Internet Engineering Task Force (IETF). This basically led to a situation in which "known" security problems have not always been addressed by all vendors. In addition, in many cases vendors have implemented quick "fixes" to the identified vulnerabilities without a careful analysis of their effectiveness and their impact on interoperability. As a result, producing a secure TCP/IP implementation nowadays is a very difficult task, in large part because of the hard task of identifying relevant documentation and differentiating between that which provides correct advisory, and that which provides misleading advisory based on inaccurate or wrong assumptions. During 2006, the United Kingdom's Centre for the Protection of National Infrastructure embarked itself in an ambitious and arduous project: performing a security assessment of the TCP and IP protocols. The project did not limit itself to an analysis of the relevant IETF specifications, but also included an analysis of common implementation strategies found in the most popular TCP and IP implementations. The result of the project was a set of documents which identifies possible threats for the TCP and IP protocols and, where possible, proposes counter-measures to mitigate the identified threats. This presentation will will describe some of the new insights that were gained as a result of this project. Additionally, it will provide an overview of the state of affairs of the different TCP/IP implementations found in BSD operating systems.
George Neville-Neil -
Thinking about thinking in code
Source: BSDCan - The Technical BSD Conference
Added: 25 May 2009
Tags: bsdcan, bsdcan2009,
keynote, bsd, george neville-neil
Slides
(4.0 Mb, 137 pages)
Thinking about thinking in code
Proposed keynote talk
This is not a talk that's specific to any BSD but is a more general talk about how we think about coding and how our thinking changes the way we code.
I compare how we built systems to how other industries build their products and talk about what we can learn from how we work and from how others work as well.
Een historisch
overzicht van BSD - Hans van de Looy
Source: Nederlandse Linux Gebruikers Group
Added: 31 December 2008
Tags: nllgg, bsd, history, hans van de
looy
PDF version (5767 Kb, 38
pages)
Hans zal een historisch overzicht geven van het ontstaan van *BSD vanaf de oorsprong van UNIX tot aan de nu bekende *BSD varianten. Hij zal daarbij met name ingaan wat de oorsprong en het ontstaan van een aantal *BSD-projecten zijn. Hierbij zal hij zeer kort ingaan op de verschillende licentieproblemen die we in het verleden gezien hebben en worden een aantal bekende personen en data weer eens even op de kaart geplaatst.
Hans van de Looy is oprichter van Madison Gurkha. Een bedrijf dat gespecialiseerd is op het gebied van het uitvoeren van technische ICT-beveiligingsonderzoeken, in de media ook wel aangeduid met Etisch Hacken. Tijdens dergelijke onderzoeken maakt hij ook regelmatig gebruik van op BSD* gebaseerde systemen.