26.05  
Inicio arrow RSS / Twitter
Principal
Inicio
Noticias
Artigos
Regras da Lista
Assinar a Lista
Histórico da Lista
Forum
Keyserver
PC-BSD: Artigos
PC-BSD: Notícias
Galeria de Imagens
Contador Usuários FUG
FUGs Estaduais
Downloads
Enquetes
FAQ
Resumo do Site
Links
Pesquisar
Contato
Sobre a FUG-BR
RSS / Twitter
-
DOC-BR (FUG BR)
Introdução
Projeto DOC-BR
Handbook
FAQ Oficial
-
+ Noticias
Alertas de Seguranca
Alertas em Ports
BSD em Geral
DaemonNews (Ingles)
MyFreeBSD
Todas Categorias
-
Login
Nome de Usuário

Senha

Lembrar login
Esqueceu sua senha?
Sem conta? Crie uma


RSS / Twitter
OpenBSD Journal
The OpenBSD Community.

OpenBSD Journal
  • Privilege Separation and Pledge (video)
    This year's dotSecurity conference featured a presentation from OpenBSD founder Theo de Raadt, titled "Privilege Separation and Pledge."

    The video is now available here, in addition to the slides.

  • p2k16 Hackathon Report: pirofti@ on octeon and TPM
    The next hackathon report comes from Paul Irofti, who writes:

    This was probably the shortest hackathon I attended. The 4 days flew by and I realised we have to pack and go with nothing to show for.

    My usual hackathon work flow is: waste 3-4 days trying to figure how some device works, and then polish the driver(s) for the remaining days while congratulating myself with coffee, Günther and beer.

    Read more...

  • p2k16 Hackathon Report: jasper@ on gnome, puppet and more
    Our next report comes from Jasper Lievisse Adriaanse, who writes:

    Hackathons have long since had two themes for me, gnomes and puppets. However this hackathon I actually didn't want to play with puppets for once, yet I ended up importing Puppet 4 after all. More on that later.
    Read more...

  • SROP mitigation committed
    In a recent email, Theo de Raadt explains the SROP mitigation technique, a recent team effort.

    This is the first demonstration of a mitigation against SROP.

    Utilizing a trick from kbind(2), the kernel now only accepts signal returns from the PC address of the sigreturn(2) syscall in the signal trampoline. Since the signal trampoline page is randomized placed per process, it is only known by directly returning from a signal handler.

    As well, the sigcontext provided to sigreturn(2) now contains a magic cookie constructed from a per-process cookie XOR'd against the address of the signal context. That part is similar to the LWN discussion mentioned above. I came to the same conclusion semi-independently as a result of Antoine's ports builds, which identified all the parts of the application software ecosystem I had to study. Woe is me!

    Read more...


FUG-BR - Espalhando BSD
Dicas Rápidas:
Acabou de atualizar o ports? Não se esqueça de ler o /usr/ports/UPDATING, para evitar ter que descobrir sozinho, ao custo de seu tempo, o que já está documentado.
 






Wallpapers
Online:
Nós temos 20 visitantes online


Devil Store - Sua loja BSD
FreeBSD Brasil LTDA

FUG-BR: Desde 1999, espalhando BSD pelo Brasil.