Incidentally, my employer, REDCOM, uses FreeBSD as a base for its main product, is deployed in rough areas and in high-security government locations, and is one of the few electronics manufacturers still working entirely in the U.S.. REDCOM also has jobs to fill in New York, where I work. Please, apply if you see a job that interests you – and tell me.
- DistroTest.net, which happens to have runnable online versions of GhostBSD, FreeBSD, HardenedBSD, MidnightBSD, NetBSD, OpenBSD, OPNSense, and DragonFly. (via)
- The VBSDCon schedule (Sept 5-7, very soon!) is up.
- Update webmin/usermin if you have them installed.
- Impact of Tariff Increases. Eventually relevant even if you aren’t a U.S. reader.
- Project Trident 12-U3 and 19.08 now available.
- Valuable News for 2019/08/14 and 2019/08/19.
- Porting wine to amd64 on NetBSD, third evaluation report.
- USBNET: A story of networking and threads that won’t stop pulling.
- Getting the GNU gdbserver to work.
- Fuzzing NetBSD Filesystems via AFL. [Part 2].
- GSoC 2019 Report: Adding NetBSD KNF to clang-format, Part 2.
- Brutal Doom 64 on OpenBSD.
- OpenBSD -stable gets package updates! Release OpenBSD doesn’t normally get packages?
- Blueprint and progress status for mixed environment multilevel backup. Really, the thing to see is a spreadsheet.
- When a hacker tries to infiltrate an OpenBSD machine. Pufferfish reference.
- CFT: CBSD project switched to its own cloud images.
- Instant Workstation.
OpenBSD locks the ports and packages to each release. If there was a security issue, you were supposed to patch and rebuild the affected ports by hand the same way you were supposed to with the base system.
If you wanted something more current than the latest release, you’d update the whole system to one of the weekly snapshot builds and hope nothing broke that week, or use the packages from https://stable.mtier.org/