A DNS based malware protection
This is a Proof of Concept Technology for protecting End Users from malware, advanced threat and other malicious content by preventing DNS malicious Request/Responses. Considerations: Virtual Hardware Recommended (ALL Back-level Compatibility): - CPU Type: x86_64 (AMD64) - 4vCPUs - 8GB RAM - 40GB On demand Virtual Disk - Intel e1000 Virtual Network Interfaces (Mandatory) Components Used: PFSense 2.3.4-Patch1 - Suricata Module - Bind Module - Cron Module - Service Watchdog Module - SNORT Community Signature + Emerging Threats for constant update. - - Bring Your Own SNORT OINKCODE to get advanced rules. #CleanDNS Project: Because Detection is Cool but Proactivity is Better!
FreeBSD GNOME LiveCD built using the latest development ports
Latest stable version - GNOME 3.26 - working Latest unstable version - GNOME 3.27 - working This project provides live systems built using the latest FreeBSD release and the latest GNOME ports from the FreeBSD GNOME project. Scripts used to build the LiveCDs are also available for downloading. The scripts are largely based on this article: https://wiki.freebsd.org/AndriyGapon/AvgLiveCD Note: This is not a general-purpose LiveCD! I track the development version instead of the stable version. If you want to do things other than previewing the latest (possibly unstable) GNOME release, please download the scripts to make your own LiveCDs. If any bug is found, please download the debug version LiveCD to find the cause and report it to the FreeBSD GNOME project or GNOME bugzilla. Starting from GNOME 3.12, most portability patches are merged upstream, so you can also directly use JHBuild on FreeBSD to check whether an issue is already fixed in the upstream.