Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Links Operating Systems BSD

BSD Interview Roundup 88

Some anonymous readers wrote in to let us know about a couple of different interviews in the OpenBSD and NetBSD communities. O'Reilly's ONLamp has an interview with OpenBSD's Marc Espie, who maintains a good share of OpenBSD's build tools, as well as having made numerous contributions to the project. OSDN's own NewsForge also has a interview with NetBSD's Luke Mewburn of the NetBSD Core Group.
This discussion has been archived. No new comments can be posted.

BSD Interview Roundup

Comments Filter:
  • by Anonymous Coward
    Which is more secure, OpensBSD or NetBSD?
    • Open, their code is audited regularly, Net is more focused on the portability. That's why they say Open is secure and Net can run on a toaster.
      • But auditing is not an "end to all problems" or a sustitute for good defaults. To me good defaults make or break an OS (just look at Windows). NetBSD have more secure defaults IMHO
        • Since when? (Score:2, Informative)

          by Bensmum ( 766488 )
          How something so blatently stupid is modded insightful I can't imagine. Seriously, openbsd has had only 1 remote hole in 7 entire years with its defaults. This is a factual public record of how good their defaults are, and you think that's not as good as net? Get real.
    • I would say that the BSDs are all pretty close security wise. The typical answer is "OpenBSD" is the most secure, but the truth is that it's the sys admin that makes the biggest difference.

      A bad sys admin is like a bad driver, and we all know what happens when you let a bad driver borrow your BMW.

      Whenever a really great security feature gets added to OpenBSD, it won't be long before it will end up in the others. So when you get the time it's likely best to try them all and choose which you like best,

    • NetBSD - we just don't make a hype out of it.

      NetBSD - secure OF COURSE!

      - Hubert
    • Its very clearly open. Code is being audited all the time, daemons are being modified to run with priviledge seperation, setuid root programs are almost non-existant now on open. Then on top of that, there is the non-executable stack, propolice, and W^X protection of memory pages, and stack gap randomization. The first things make exploits much less likely, and the second make it very difficult to successfully exploit something that has an exploitable bug. Anyone who pretends netbsd is more secure is de
  • pkgsrCon 2004! (Score:2, Informative)

    by dotz ( 683519 )
    As /. rejected story about this, perhaps at least people, who read messages here can read this... http://pkgsrcCon.org , the first pkgsrc conference ever will be held in Vienna (Austria, Europe) on April 30 - May 2, 2004 Visit the official www page [pkgsrccon.org]

GREAT MOMENTS IN HISTORY (#7): April 2, 1751 Issac Newton becomes discouraged when he falls up a flight of stairs.

Working...