Browse Definitions :
Definition

OpenBSD

OpenBSD is a free open source operating system based upon the Berkeley Software Distribution (BSD) for UNIX.

The OpenBSD project, coordinated by Theo de Raadt, is known in the programming community for its attention to security. His team is perhaps best known for developing OpenSSH, an open-source secure shell daemon for encrypting network packets.

The BSD project is also known for introducing several important changes to the way the rest of the open source community works, including providing public access to content version control (CVC) repositories and commit (code change) logs. Because OpenBSD is both compact and secure, it is often implemented as a firewall.

According to OpenBSD.org:

OpenBSD is developed by volunteers. The project funds development and releases by selling CDs and receiving donations from organizations and individuals. These finances ensure that OpenBSD will continue to exist, and will remain free for everyone to use and reuse as they see fit.

The OpenBSD logo and mascot is a pufferfish named "Puffy."

 

Learn more about IT:

> Veghead provides a step-by-step guide to using OpenBSD as a firewall.
> OpenBSD may be downloaded from OpenBSD.org.
> The OpenBSD Foundation supports OpenBSD and related projects like OpenSSH, OpenBGPD, OpenNTPD, and OpenCVS.
> Wikipedia's entry for OpenBSD provides more technical information and history of the distribution.
This was last updated in October 2009

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • unified threat management (UTM)

    Unified threat management (UTM) describes an information security (infosec) system that provides a single point of protection ...

  • physical security

    Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that ...

  • attack vector

    An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close