version 1.607, 2016/04/24 20:08:50 |
version 1.608, 2016/08/15 02:22:11 |
|
|
<meta name="copyright" content="This document copyright 1996-2016 by OpenBSD."> |
<meta name="copyright" content="This document copyright 1996-2016 by OpenBSD."> |
<meta name="viewport" content="width=device-width, initial-scale=1"> |
<meta name="viewport" content="width=device-width, initial-scale=1"> |
<link rel="stylesheet" type="text/css" href="openbsd.css"> |
<link rel="stylesheet" type="text/css" href="openbsd.css"> |
<link rel="canonical" href="http://www.openbsd.org/press.html"> |
<link rel="canonical" href="https://www.openbsd.org/press.html"> |
</head> |
</head> |
|
|
<body bgcolor="#ffffff" text="#000000" link="#23238E"> |
<body bgcolor="#ffffff" text="#000000" link="#23238E"> |
|
|
Code written under NDA will make it difficult to improve it in the future |
Code written under NDA will make it difficult to improve it in the future |
because somebody signed an agreement to keep the required hardware |
because somebody signed an agreement to keep the required hardware |
documentation secret. For the OpenBSD project |
documentation secret. For the OpenBSD project |
<a href="http://www.openbsd.org/goals.html">NDAs are never acceptable</a>. |
<a href="goals.html">NDAs are never acceptable</a>. |
<p> |
<p> |
|
|
<li><font color="#009000"><strong> |
<li><font color="#009000"><strong> |
|
|
support for UltraSPARC III on sparc64, improvements to ipsecctl, |
support for UltraSPARC III on sparc64, improvements to ipsecctl, |
a new RCS implementation, and much more. |
a new RCS implementation, and much more. |
Includes a reminder to "show your support for the project by |
Includes a reminder to "show your support for the project by |
<a href="http://www.openbsd.org/orders.html">placing your pre-orders today!"</a> |
<a href="orders.html">placing your pre-orders today!"</a> |
<p> |
<p> |
|
|
</ul> |
</ul> |
|
|
fully dedicated to OpenBSD..." |
fully dedicated to OpenBSD..." |
Great coverage of the OpenBSD Porting Hackathon: people, ports, beer, ... |
Great coverage of the OpenBSD Porting Hackathon: people, ports, beer, ... |
Contains a link to |
Contains a link to |
<a href="http://www.openbsd.org/papers/ven05-pvalchev/mgp00008.html"> |
<a href="papers/ven05-pvalchev/mgp00008.html"> |
pval's summary slides</a>. |
pval's summary slides</a>. |
<p> |
<p> |
|
|
|
|
making software vendors liable for bug-ridden products? Or rooting |
making software vendors liable for bug-ridden products? Or rooting |
out insecure Microsoft products like the troubled SQL server in favor |
out insecure Microsoft products like the troubled SQL server in favor |
of more secure open-source solutions like |
of more secure open-source solutions like |
<a href="http://www.openbsd.org/">OpenBSD</a>?" |
<a href="index.html">OpenBSD</a>?" |
I can scarcely believe that Slate's owner Microsoft is paying |
I can scarcely believe that Slate's owner Microsoft is paying |
them to write this stuff (nor that Koerner thinks OpenBSD is a database :-)). |
them to write this stuff (nor that Koerner thinks OpenBSD is a database :-)). |
Finally: "Nothing so bold is forthcoming in the Strategy. Which is |
Finally: "Nothing so bold is forthcoming in the Strategy. Which is |
|
|
Support, Software Development, Security, and Research. One unexpected |
Support, Software Development, Security, and Research. One unexpected |
result was the degree to which Security depends on FOSS. Banning |
result was the degree to which Security depends on FOSS. Banning |
FOSS would remove certain types of infrastructure components (e.g., |
FOSS would remove certain types of infrastructure components (e.g., |
<a href="http://www.openbsd.org/">OpenBSD</a>) that currently help |
<a href="index.html">OpenBSD</a>) that currently help |
support network security. |
support network security. |
It would also limit DoD access to, and overall expertise in, the use of |
It would also limit DoD access to, and overall expertise in, the use of |
powerful FOSS analysis and detection applications that hostile groups could |
powerful FOSS analysis and detection applications that hostile groups could |