FreeBSD Multimedia
FreeBSD Multimedia Resources List
Links on this page refer to multimedia resources (podcast, vodcast, audio recordings, video recordings, photos) related to FreeBSD or of interest for FreeBSD users.
This list is available as chronological overview, as a tag cloud and via the sources.
This list is also available as RSS feed
If you know any resources not listed here, or notice any dead links, please send details to Edwin Groothuis so that it can be included or updated.
Tag: bsd
Marshall Kirk McKusick at DCBSDCon
A recording of Marshall Kirk McKusick's talk "A Narrative History of BSD" at DCBSDCon this past weekend. You can get a much more complete history here: http://www.mckusick.com/history/index.html
Source: bsdtalk
Added: 21 February 2009
Tags: bsdtalk, presentation, bsd, history, kirk mckusick
Ogg version (55 minutes), MP3 version (26 Mb, 55 minutes)
Using BSD in SchmooCon Labs
Using BSD in SchmooCon Labs DCBSDCon 2009, Ken Caruso clive URL: http://www.youtube.com/watch?v=9ZhfuP4jghY
Source: YouTube bsdconferences channel
Added: 24 May 2009
Tags: youtube, presentation, dcbsdcon, dcbsdcon2009, bsd, schmoocon, ken caruso
Flash (35:08)
25 years with BSD
Thinking RealSpace: Life with BSD - ~25 years with BSD AsiaBSDCon 2008, Hideki Sunahara clive URL: http://www.youtube.com/watch?v=brYdkQ120Do
Source: YouTube bsdconferences channel
Added: 24 May 2009
Tags: youtube, keynote, asiabsdcon2008, asiabsdcon, bsd, hideki sunahara
Flash (44:43)
EuroBSDCon 2008 - Edd Barret - Modern Typesetting on BSD
Edd Barrett will speak about using the BSD Platform as a means of typesetting from a practical standpoint at EuroBSDcon 2008. Edd Barrett does not wish to go into the technicalities of each typesetter, but rather state which are good for certain types of document, and which tools (ports and packages), integrate well with the available typesetters. Edd Barrett os a student from the UK, currently on "placement year" as a systems administrator for Bournemouth University. Open Source *NIX has been his platform of choice for many years and he has been using OpenBSD for about 3 years now, simply because it is small, clean, correct and secure. Just recently he has started developing things I want or need for OpenBSD.
Source: EuroBSDCon
Added: 22 October 2008
Tags: eurobsdcon, eurobsdcon2008, typesetting, bsd, edd barrett
MP3 (1 byte, 33 minutes), OGG (1 byte, 33 minutes), PDF (1 byte, n pages)
EuroBSDCon 2008 - Michael Dexter - Zen and the Art of Multiplicity Maintenance: An applied survey of BSD-licensed multiplicity strategies from chroot to mult
Many BSD-licensed strategies of various levels of maturity exist to implement multiplicity, herein defined as the introduction of plurality to traditionally singular computing environments via isolation, virtualization, or other method. For example, the chroot utility introduces an additional isolated root execution environment within that of the host; or an emulator provides highly-isolated virtual systems that can run complete native or foreign operating systems. Motivations for multiplicity vary, but a demonstrable desire exists for users to obtain root or run a foreign binary or operating system. We propose a hands-on survey of portable and integrated BSD-licensed multiplicity strategies applicable to the FreeBSD, OpenBSD, DragonFlyBSD and NetBSD operating systems on the i386 architecture. We will also address three oft-coupled disciplines: software storage devices, the installation of operating system and userlands in multiplicity environments plus the management of select multiplicity environments. Finally we will comment on each strategies potential limits of isolation, compatibility, independence and potential overhead in comparison to traditional systems. Keywords: multiplicity, virtualization, chroot, jail, hypervisor, xen, compat. Michael Dexter has used Unix systems since 1991 and BSD-licensed multiplicity strategies for over five years. He is the Program Manager at the BSD Fund and Project Manager of the BSD.lv Project.
Source: EuroBSDCon
Added: 22 October 2008
Tags: eurobsdcon, eurobsdcon2008, bsd, michael dexter
MP3 (1 byte, 38 minutes), OGG (1 byte, 38 minutes), PDF (1 byte, n pages)
EuroBSDCon 2008 - Hauke Fath - Managing BSD desktop clients - Fencing in the herd
The members of the BSD family have traditionally prospered off the desktop, as operating systems on servers and embedded systems. The advent of MacOS X has marked a change, and moved the desktop more into focus. Modern desktop systems create a richer software landscape, with more diverse requirements, than their server counterparts. User demands, software package interdependencies and frequent security issues result in a change rate that can put a considerable load on the admin staff. Without central management tools, previously identical installations diverge quickly. This paper looks at concepts and strategies for managing tens to hundreds of modern, Unix-like desktop clients. The available management tools range from simple, image-based software distribution, mainly used for setting up uniform clients, to "intelligent" rule-based engines capable of search-and-replace operations on configuration files. We will briefly compare their properties and limitations, then take a closer look at Radmind, a suite for file level administration of Unix clients. Radmind has been in use in the Institute of Telecommunication at Technische Universitt Darmstadt for over three years, managing NetBSD and Debian Linux clients in the labs as well as faculty members' machines. We will explore the Radmind suite's underlying concepts and functionality. In order to see how the concept holds up, we will discuss real-world scenarios from the system life-cycle of Installation, configuration changes, security updates, component updates, and system upgrades. Hauke Fath works as a systems administrator for the Institut fr Nachrichtentechnik (telecommunication) at Technische Universitt Darmstadt. He has been using NetBSD since 1994, when he first booted a NetBSD 1.0A kernel on a Macintosh SE/30. NetBSD helped shaping his career by causing a slow drift from application programmer's work towards systems and network administration. Hauke Fath holds a MS in Physics and became a NetBSD developer in late 2006. Keywords: Managing Unix desktop clients, software distribution, tripwire
Source: EuroBSDCon
Added: 22 October 2008
Tags: eurobsdcon, eurobsdcon2008, bsd, desktop, hauke fath
MP3 (1 byte, 50 minutes), OGG (1 byte, 50 minutes), PDF (1 byte, n pages)
AsiaBSDCon 2008 Paper List
Papers of the AsiaBSDCon 2007
Source: AsiaBSDCon
Added: 08 April 2008
Tags: asiabsdcon, asiabsdcon2008
Using FreeBSD to Promote Open Source Development Methods, Brooks Davis, Michael AuYeung, Mark Thomas (The Aerospace Corporation) (483 Kb), OpenBSD Network Stack Internals, Claudio Jeker (The OpenBSD Project) (410 Kb), Tracking FreeBSD in a Commercial Setting, M. Warner Losh (Cisco Systems, Inc.) (94 Kb), Send and Receive of File System Protocols: Userspace Approach With puffs, Antti Kantee (Helsinki University of Technology, Finland) (126 Kb), GEOM --- in Infrastructure We Trust, Pawel Jakub Dawidek (The FreeBSD Project) (91 Kb), Reducing Lock Contention in a Multi-Core System, Randall Stewart (Cisco Systems, Inc.) (72 Kb), PC-BSD: FreeBSD on the Desktop, Matt Olander (iXsystems) (6.4 Mb), Logical Resource Isolation in the NetBSD Kernel, Kristaps Dzonsons (Centre for Parallel Computing, Swedish Royal Institute of Technology) (97 Kb), Whole of the proceedings (9.3 Mb), Gaols: Implementing Jails Under the kauth Framework, Christoph Badura (The NetBSD Foundation) (92 Kb), Cover page (467 Kb), Sleeping Beauty --- NetBSD on Modern Laptops, Jorg Sonnenberger, Jared D. McNeill (The NetBSD Foundation) (87 Kb), A Portable iSCSI Initiator, Alistair Crooks (The NetBSD Foundation) (341 Kb), BSD implementations of XCAST6, Yuji IMAI, Takahiro KUROSAWA, Koichi SUZUKI, Eiichi MURAMOTO, Katsuomi HAMAJIMA, Hajimu UMEMOTO, and Nobuo KAWAGUTI (XCAST fan club, Japan) (526 Kb)
Fernando Gont - Results of a Security Assessment of the TCP and IP protocols and Common implementation Strategies
Results of a Security Assessment of the TCP and IP protocols and Common implementation Strategies Fernando Gont will present the results of security assessment of the TCP and IP protocols carried out on behalf of the United Kingdom's Centre for the Protection of National Infrastructure (Centre for the Protection of National Infrastructure). His presentation will provide an overview of the aforementioned project, and will describe some of the new insights that were gained as a result of this project. Additionally, it will provide an overview of the state of affairs of the different TCP/IP implementations found in BSD operating systems with respect to the aforementioned issues. During the last twenty years, many vulnerabilities have been identified in the TCP/IP stacks of a number of systems. The discovery of these vulnerabilities led in most cases to reports being published by a number of CSIRTs and vendors, which helped to raise awareness about the threats and the best possible mitigations known at the time the reports were published. For some reason, much of the effort of the security community on the Internet protocols did not result in official documents (RFCs) being issued by the organization in charge of the standardization of the communication protocols in use by the Internet: the Internet Engineering Task Force (IETF). This basically led to a situation in which "known" security problems have not always been addressed by all vendors. In addition, in many cases vendors have implemented quick "fixes" to the identified vulnerabilities without a careful analysis of their effectiveness and their impact on interoperability. As a result, producing a secure TCP/IP implementation nowadays is a very difficult task, in large part because of the hard task of identifying relevant documentation and differentiating between that which provides correct advisory, and that which provides misleading advisory based on inaccurate or wrong assumptions. During 2006, the United Kingdom's Centre for the Protection of National Infrastructure embarked itself in an ambitious and arduous project: performing a security assessment of the TCP and IP protocols. The project did not limit itself to an analysis of the relevant IETF specifications, but also included an analysis of common implementation strategies found in the most popular TCP and IP implementations. The result of the project was a set of documents which identifies possible threats for the TCP and IP protocols and, where possible, proposes counter-measures to mitigate the identified threats. This presentation will will describe some of the new insights that were gained as a result of this project. Additionally, it will provide an overview of the state of affairs of the different TCP/IP implementations found in BSD operating systems.
Source: BSDCan - The Technical BSD Conference
Added: 25 May 2009
Tags: bsdcan, bsdcan2009, presentation, bsd, security assessment, fernado gont
Security Assessment of the Internet Protocol (660 Kb, 63 pages), Slides (473 Kb, 64 pages), Proposal (93 Kb, 3 pages), Security Assessment of the Transmission Control Protocol (TCP) (1.4 Mb, 130 pages)
George Neville-Neil - Thinking about thinking in code
Thinking about thinking in code Proposed keynote talk This is not a talk that's specific to any BSD but is a more general talk about how we think about coding and how our thinking changes the way we code. I compare how we built systems to how other industries build their products and talk about what we can learn from how we work and from how others work as well.
Source: BSDCan - The Technical BSD Conference
Added: 25 May 2009
Tags: bsdcan, bsdcan2009, keynote, bsd, george neville-neil
Slides (4.0 Mb, 137 pages)
Een historisch overzicht van BSD - Hans van de Looy
Hans zal een historisch overzicht geven van het ontstaan van *BSD vanaf de oorsprong van UNIX tot aan de nu bekende *BSD varianten. Hij zal daarbij met name ingaan wat de oorsprong en het ontstaan van een aantal *BSD-projecten zijn. Hierbij zal hij zeer kort ingaan op de verschillende licentieproblemen die we in het verleden gezien hebben en worden een aantal bekende personen en data weer eens even op de kaart geplaatst. Hans van de Looy is oprichter van Madison Gurkha. Een bedrijf dat gespecialiseerd is op het gebied van het uitvoeren van technische ICT-beveiligingsonderzoeken, in de media ook wel aangeduid met Etisch Hacken. Tijdens dergelijke onderzoeken maakt hij ook regelmatig gebruik van op BSD* gebaseerde systemen.
Source: Nederlandse Linux Gebruikers Group
Added: 31 December 2008
Tags: nllgg, bsd, history, hans van de looy
PDF version (5767 Kb, 38 pages)