• Report Links
    We do not store any files or images on our server. XenPaste only index and link to content provided by other non-affiliated sites. If your copyrighted material has been posted on XenPaste or if hyperlinks to your copyrighted material are returned through our search engine and you want this material removed, you must contact the owners of such sites where the files and images are stored.

Freebsd 13.X - Mastering Jails


🦊 DNSProxy Layer 7 DDOS Protection 🥷 / DMCA Ignored 🫡 / Advanced Browser Checks 🕸

King

Administrator
Joined
Jul 12, 2021
Messages
25,005
Reaction score
5
Points
38

332845eda34e847319620710f549b0ea.jpeg



Freebsd 13.X - Mastering Jails
Published 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.27 GB | Duration: 3h 6m

Using FreeBSD Jails for running software packages in a secure way using pragmatic approach.​

What you'll learn
How to install FreeBSD - minimal installation for Jails
Setting-up Jails environment using BastilleBSD
FreeBSD 13.x Lab setup using VirtualBox
Use BastilleBSD for managing Jails in many ways
Use Jails networking options for running Jails in private and public networks
Use Jails on Raspberry PI, and if it is even a vital option
Manage Jails and pf (packet filter firewall)
Backup and restore Jailed environments
Requirements
Basic UNIX / BSD knowledge
Description
Hello,welcome to the 'FreeBSD 13.x - Mastering JAILS' course. The purpose of this course is give a deep overview what Jails are, how to use them for building a testing or production ready environments. All this using a great BastilleBSD project. What are FreeBSD Jails from wikipedia: "The jail mechanism is an implementation of FreeBSD's OS-level virtualisation that allows system administrators to partition a FreeBSD-derived computer system into several independent mini-systems called jails, all sharing the same kernel, with very little overhead. It is implemented through a system call, jail, as well as a userland utility, jail, plus, depending on the system, a number of other utilities. The functionality was committed into FreeBSD in 1999 by Poul-Henning Kamp after some period of production use by a hosting provider, and was first released with FreeBSD 4.0, thus being supported on a number of FreeBSD descendants, including DragonFly BSD, to this day.The need for the FreeBSD jails came from a small shared-environment hosting provider's (R&D Associates, Inc.'s owner, Derrick T. Woolworth) desire to establish a clean, clear-cut separation...

Read more

Continue reading...
 
Top