I'm moving to bsd.network/@badger
Carlos Cardena (ccardenas@) brings initial CD-ROM/vioscsi(4) support to #OpenBSD vmm(4)/vmd(8): https://marc.info/?l=openbsd-cvs&m=151495800420938&w=2
@badger_ I have a port of scid on ports@ right now. It's just waiting for an ok for me to import it.
This setup for #adblocking using Unbound is doing wonders in my home network. All tools are included in OpenBSD base system :-)
First up is the diff for pledge(2) execpromises, which Theo explains replaces the unused second pledge argument (..will reappear later as the more refined pledgepath): https://marc.info/?l=openbsd-tech&m=151302727506669&w=2 #OpenBSD
Why do you care about this? This makes #OpenBSD work /much/ better on a wifi network that has multiple Access Points with the same name.
Most Conferences, shopping malls, large buildings, etc, have this type of wifi network.
Previously, it would "stick" to the first Access Point that it found. Now, it will switch to a better one when the signal strength is too weak.
K&R is now free! #C #programming
https://archive.org/details/CProgrammingLanguage2ndEditionByBrianW.KernighanDennisM.Ritchie
This really is a great book, anyone who does any sort of programming should read it. It's not very long but really gives you an understanding of the fundamentals of C.
arm64 platform now officially supported [and has syspatch(8)] https://undeadly.org/cgi?action=article;sid=20171208082238
landry@ keeps on giving
https://marc.info/?l=openbsd-ports-cvs&m=151273908609469&w=2
Update on pledge(2) from Theo de Raadt, outlining two upcoming features, pledgepaths and execpromises: https://marc.info/?l=openbsd-tech&m=151268831628549&w=2 #OpenBSD
Don't place items inside other items! The #recycling machine won't be able to sort them and precious resources are lost.
Via RecycleListIRL at birdsite.
This bullshit market-speak generator in spanish rocks, hahaha.
http://www.doctorproaudio.com/calculador-verborrea-empresarial/
Motivational speakers suck.
I love this article: http://www.ranum.com/security/computer_security/editorials/dumb/index.html
Why spend time "pentesting" and "fixing" stupid setups instead of redesigning from the ground with security in mind?
"I don't use Windows and I have no clue about it"... "so you use Linux?".... "No, I use OpenBSD".
Interesting behaviour change to chromium builds on #OpenBSD, unfortunate but required due to increasing pressure from major companies: https://marc.info/?l=openbsd-ports-cvs&m=151264513213832&w=2
Sugarless +2, a free design of a companion board for the #ZX-Uno to adapt it to a #ZX-Spectrum +2A/+2B/+3 case and keyboard. #8bits
https://github.com/spark2k06/zxuno/tree/master/ZXUnoCompanion-2