Language Selection

English French German Italian Portuguese Spanish

Comparing GNU/Linux and FreeBSD

Filed under
OS

GNU/Linux is the most popular operating system built with free/open source software. However, it is not the only one: FreeBSD is also becoming popular for its stability, robustness and security. In this article, I’ll take a look at their similarities and differences.

Introduction

FreeBSD is an operating system based on the Berkeley Software Distribution (BSD), which itself is a modification of AT&T’s UNIX, and was created by the University of California. During the development of FreeBSD, to avoid any legal problems with the owners of the source code, the developers decided to re-engineer the original BSD, rather than copy the source code.

In contrast with GNU/Linux, where all the pieces are developed separately and brought together in distributions, FreeBSD has been developed as a complete operating system: the kernel, device drivers, sysadmin’s tools and all the other pieces of software are held in the same revision control system.

Full Story.



Older article

Smile Sorry to be repetitive, but they have taken an old article from the pile again and then changed the datestamp.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Android Leftovers

Leftovers: OSS

  • Dice Selling Slashdot and Sourceforge
    FS tells me that Ars Technica reports that Dice is selling the Slashdot and Sourceforge sites. The company in their second quarter earnings announcements stated they have "not successfully leveraged the Slashdot user base to further Dice's digital recruitment business", and are planning to divest this business.
  • Tips for how to plan an open source event
    Step 1 is very clear: Document your event. This way you have shared document that all organizers can refer to as the event progresses. We started with a sample document Kara and Francesca provided. The document is broken down is to several sections and you're free to copy the document and use it to plan your own event. I'll review some of the sections in more detail below.
  • DreamHost CEO Details OpenStack Customer Use Cases [VIDEO]
    DreamHost has made a name for itself over the years as being a friendly, yet low-cost hosting provider, offering both shared hosting as well as virtual private servers (VPS). DreamHost is also a major backer of the open source OpenStack cloud platform and now offers the DreamCompute cloud server as well.
  • loop optimizations in guile
    Sup peeps. So, after the slog to update Guile's intermediate language, I wanted to land some new optimizations before moving on to the next thing. For years I've been meaning to do some loop optimizations, and I was finally able to land a few of them.
  • Snippets – ODF 1.2, Meteor 1.2 and NodeMCU customised

Security Leftovers

  • Security advisories for Monday
  • QEMU Vulnerability Exposes The Host Through Emulated CD-ROM Drive
    Back in May was the big "VENOM" security vulnerability affect QEMU whereby VM security could be escaped through QEMU's virtual floppy disk drive. In June was a PCNET controller buffer overflow allowing a guest to escape to have host access. Today there's a similar security vulnerability going public about its virtual CD-ROM drive.
  • Websites, Please Stop Blocking Password Managers. It’s 2015
    Rather than fancy zero-day exploits, or cutting-edge malware, what you mostly need to worry about when it comes to security is using strong, unique passwords on all the sites and services you visit. You know that. But what’s crazy is that, in 2015, some websites are intentionally disabling a feature that would allow you to use stronger passwords more easily—and many are doing so because they wrongly argue it makes you safer.
  • The Ashley Madison hack -- this time it's personal
    Last week I argued that requiring backdoors in strong encryption would result in the effective end of encryption and provide a veritable buffet of sensitive data to both the government and those with malicious intents. Encryption with backdoors is not encryption at all.
  • Malware on Linux - When Penguins Attack
    Regular Naked Security readers will know that some security topics cause more friction that others. Lately, artificial intelligence has provoked its fair share of excitement. Surveillance and privacy are other topics that draw out some very varied viewpoints.

Canonical Says Ubuntu-Based Docker Images Are Not a Copyright Violation

Canonical said through the voice of Dustin Kirkland that you can use Ubuntu with Docker without violating any copyright policy, contradicting what Matthew Garrett said in a blog post just a week ago. Read more