Language Selection

English French German Italian Portuguese Spanish

Why FreeBSD 8 Won't Rewrite the Book

Filed under
BSD

A major release of an operating system typically brings significant changes that require users to learn new skills. But backers of the open source FreeBSD 8 operating system say that's not necessarily going to be the case with its next major version.

FreeBSD 8 is currently in its beta release cycle with a final release targeted for August. The new release will be the first major release since FreeBSD 7 in February 2008, with the most recent point update being the 7.2 release in May of this year.

While the jump to 8.0 might seem a big step, FreeBSD contributor and Absolute FreeBSD author pointed out that most users have little to worry about.

"FreeBSD has a two-tier development process," Lucas told InternetNews.com. "This two-tear method lets our users be very conservative, using only well-tested and widely deployed code, while we can further improve the code and add new features."

"The newest version of FreeBSD, including the changes that were made just minutes ago, is called FreeBSD-current," he explained. "Any new features go into FreeBSD-current for community testing and further development. Every so often, we cut a major release from FreeBSD-current. This is a .0 release, such as 8.0."

rest here




More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News