Diffstat (limited to 'en_US.ISO8859-1')
2 files changed, 225 insertions, 231 deletions
diff --git a/en_US.ISO8859-1/captions/2007/meetbsd/brueffer-torprvacy.sbv b/en_US.ISO8859-1/captions/2007/meetbsd/brueffer-torprvacy.sbv
index 1bba30ffdc..f4af5c5cd5 100644
@@ -1,6 +1,6 @@
Fortunately my slide will be centered, because
-I'll have to change resolutions, I think this works out..
+I'll have to change resolutions. I think this works out...
And, it's about protecting your privacy with FreeBSD and Tor
@@ -9,10 +9,10 @@ And, it's about protecting your privacy with FreeBSD and Tor
-what I mean here is mostly anonymity
+What I mean here is mostly anonymity
but there are some other aspects that
@@ -27,10 +27,10 @@ uh, so...
I want to first talk about who needs anonimity anyway
-is it just for criminals or some other bad guys, right?
+Is it just for criminals or some other bad guys, right?
anonymization concepts, then Tor. Tor's a, well, a tool
@@ -52,7 +52,7 @@ you have to take care of
when you want to be anonymous on the Web or the Internet
if time permits I'd like to do a little demonstration
@@ -79,16 +79,16 @@ Thailand last year
when the military coup was going on
-and the journalists in Thailand couldn't really uh,
+and the journalists in Thailand couldn't really uh
-journalists couldn't really, uh
+Journalists couldn't really, uh
get the information they needed to do their work
-also, uh, informants
+Also, uh, informants
whistleblowers... people who want to tell you about
@@ -100,7 +100,7 @@ corruption going on in governments and companies
and don't want to lose their job for it... Dissidents
-uh, best case
+Uh, best case
when in Myanmar
@@ -109,19 +109,19 @@ when in Myanmar
last few weeks ago
all the Buddhists monks were going to the streets and uh,
-the Internet was totally censored
+the Internet was heavily censored
-it was really dangerous to do anything on the Internet
+It was really dangerous to do anything on the Internet
-so, so umm
+So, so umm
socialy sensitive information, like when you want to uh,
@@ -140,7 +140,7 @@ know who you are
as it will be very embarrassing
-also Law Enforcement, ah
+Also Law Enforcement, ah
for example, uh, when you want to set up a
@@ -149,7 +149,7 @@ for example, uh, when you want to set up a
an anonymous tipline for crime reporting
-and uh, also companies that want to, uh
+And uh, also companies that want to, uh
research competition, as one case that, uh
@@ -192,7 +192,7 @@ driving forces behind the
-and maybe you
+And maybe you
may have heard of the European Union
@@ -201,7 +201,7 @@ may have heard of the European Union
Data Retention Directive?
collection data gets stored
@@ -217,7 +217,7 @@ Two weeks back this was, uh,
the law was passed in Germany
from first January on,
@@ -235,7 +235,7 @@ email, or the dial-in data needs to be stored
by providers for six months
sooner or later it's going to be in Poland as well
@@ -244,16 +244,16 @@ sooner or later it's going to be in Poland as well
-well, you're part of the Euro Union now, so ah, welcome!
+Well, you're part of the Euro Union now, so ah, welcome!
-maybe you want to hide what interests you have and uh,
+Maybe you want to hide what interests you have and uh,
who you talk to, I mean uh,
@@ -267,15 +267,15 @@ talking to
if they bother to find out
-yeah, and also
+Yeah, and also
-criminals, but um, they already do illegal stuff and they
+criminals, but they already do illegal stuff and they
don't care about
doing more illegal stuff to stay anonymous, right? They can
-uh, steal people's identities, they can rent botnets or
+steal people's identities, they can rent botnets or
create them in the first place
@@ -289,7 +289,7 @@ crack one of the thousands of Windows computers online,
no big deal
Criminals already do this and uh,
@@ -322,7 +322,7 @@ you can't really
stay anonymous on your own
-you needs the help of more people
+you need the help of more people
@@ -339,12 +339,8 @@ Ok, so on to talking about two
Proxy? Everyone here probably knows how a proxy works,
LANs connect to the proxy and request
@@ -355,14 +351,8 @@ a website or whatever and the proxy
just passes it on and pass through
-Proxys are fast and simple but it's a single point of
+Proxys are fast and simple but it's really a single point of
failure, like uh,
@@ -379,52 +369,52 @@ get a subpoena or
break into the computer room or whatever
-it's pretty easy
+It's pretty easy
-Second anonymization concept is mixed,
+Second anonymization concept is MIX,
it's really old from nineteen eighty one
-so you can see, uh,
+So you can see, uh,
how long the research in this area is going on
-the mix is kind of similar to a proxy
+The MIX is kind of similar to a proxy
-like, trying to connect to it to send the messages
+Like, trying to connect to it to send the messages
-and the mix collects them
+and the MIX collects them
-and no less than um
+and coalesces them
-it puts them all
+Like, it puts them all
-in through different coincides and uhm,
+into coming sites and uhm,
you see here it
-shuffles them and waits
+shuffles them. It waits
-til there's enough data in it and just
+until there's enough data in it and just
-shoves them and sends them back out so
+shuffles them and sends them back out so
-um, this is to protect against correlation effects.
+um, this is to protect against correlation attacks.
But second in...
@@ -433,22 +423,22 @@ But second in...
Oh yeah, and
-when you actually put several mixes uh
+when you actually put several MIXes uh
-behind them; it's a mixed escape and uh,
+behind them; it's a MIX cascade and uh,
between mixes is also
-a friction going on, uh, the first
+encryption going on, uh, the first
-or the client which is
+or the client which
-you could see here if this lights would be centered, uh,
+you could see here if the slides would be centered, uh,
what else gets the
@@ -515,10 +505,10 @@ like web routing for example
but what's good about it it's uh
-distrinuted trust uh,
+distributed trust uh,
-just one these mixes has to be secure to actually
+just one these MIXes has to be secure to actually
anonymize the whole connection
@@ -542,13 +532,13 @@ It's a concept that is actually built on
both these concepts
-mixes and proxies.
+MIXes and proxies.
It's a TCP-Overlay network,
-means you can, uh
+that means you can, uh
@@ -560,29 +550,29 @@ TCP connection through it
-uh, theoretically I will explain
+Uh, theoretically I will explain
a couple of slides later
-it provides a SOCKS interface so you don't need any uh,
+It provides a SOCKS interface so you don't need any uh,
special application proxies like any application that uses
-SOCKS interface can just,
+SOCKS interface can just
-talk to talk
+talk to Tor
and it's available on, um, all major platforms
-what is uh, especially important is available in Windows
+What is uh, especially important it's available in Windows
-'cause, uhm, like I said earlier once
+Because, uhm, like I said earlier once
you want a really diverse,
@@ -606,7 +596,7 @@ Um, well it aims to uhm
combine the positive attributes of
-proxies and mixes
+proxies and MIXes
Like, proxies are fast, but
@@ -615,7 +605,7 @@ Like, proxies are fast, but
seem prone to failure
distributed trust, you want to combine them
@@ -624,22 +614,22 @@ distributed trust, you want to combine them
-Fast, uh, Tor use not only public key
+Fast, uh, Tor uses not only public key
encryption but also session keys
+so it's symmetrically encrypted.
-All the connection set up is this public key so you just, uh
+all the connection set up is this public key so you just, uh
-authentication and stuff?
+authentication and stuff
And uh, the actual communication that's going on later
@@ -673,10 +663,10 @@ like dums want the user to actually have
to patch his PC off the Operating System or something
-just be in a... workable state really fast
+just be in a... workable state really fast.
so you get the uh,
@@ -697,10 +687,10 @@ enable more research
in this whole area.
-the protocol to all users
+the protocol Tor users
should be really flexible
@@ -754,8 +744,8 @@ when she wants to talk to Jane
-The first one is the entry node, middle LAN nodes, and the
-uh exit nodes, I will leave thes for later
+The first one is the entry node, middleman nodes, and the
+uh exit nodes, I will leave these for later
uh, so this
@@ -774,7 +764,8 @@ and they establish a session key and same
thing goes on
-in these two and these two so they can communicate later on
+between these two and these two so they can communicate
What's really important here
@@ -792,10 +783,10 @@ I will talk about it later
So it has to be unencrypted
-so you can get your request through
+so you can actually get your request through
-this is a virtual circuit
+This is a virtual circuit
that gets established and uh
@@ -810,10 +801,10 @@ ten minutes
a new circuit is built
-when a new website, when a new request come through, so uh
+when a new website, when a new request comes through, so uh
-this one stays, all these connections above stays
+this one stays, all these connections above stay
in this circuit
@@ -840,13 +831,13 @@ anonymity
in case one connection is compromised, for example.
-An these ten minutes
+And these ten minutes
-are really an arbitrary value
+are really an arbitrary value,
-,you can choose anything
+you can choose anything
you have to do the research
@@ -858,13 +849,13 @@ which value is best and so
ten minutes is compromised.
-With all you get exit policies,
+With Tor you get exit policies,
this is important for the exit node
-the one which actually send the uh,
+the one which actually sends the uh,
original request to the destination server
@@ -879,10 +870,10 @@ you can control which
TCP connections you want
-to allow from your node if you want
+to allow from your own node if you want
-that's default policy which uh
+As default policy which uh
blocks SMTP and NNTP to prevent uh
@@ -909,7 +900,7 @@ HTTP SSH
all the important stuff
-that you would want to minimize just works
+that you would want to anonymize just works
and uh, if you uh
@@ -918,7 +909,7 @@ and uh, if you uh
this is important for uh, if you
-want to run you node, uh
+want to run you own node, uh
waht kind of node you actually want to run
@@ -928,7 +919,7 @@ if you look at the picture, uh earlier
there's these three different nodes: entry node,
-middleman note, and exit node
+middleman node, and exit node
and uh, which node you want to run
@@ -967,7 +958,7 @@ administrator of the forum will see the IP address
-exit node in his forum and not the one
+exit node in his logs and not the one
of Alice so uh he's going to have the problems later on
@@ -979,8 +970,8 @@ so I will talk about it later
but you have to keep this in mind
-and uh, keep up everything and uh we can play the role of
-entry nodes and middle man nodes
+And uh, keep up everything and uh we can play the role of
+entry nodes and middleman nodes
which is also important
@@ -995,7 +986,7 @@ these are services which can be
-without having an IP address
+without having the IP address of them
@@ -1004,17 +995,17 @@ so uh
you can't really find them physically
-so if you want to run a
+So if you want to run a
hidden service you can do it from anywhere
-do it from inside this private network here
+You can even do it from inside this private network here
-instead of a service and everyone in the outside world can
-actually access it
+You can set up a service and everyone in the outside world
+can actually access it
even if you don't have the rights to do
@@ -1029,13 +1020,13 @@ uh, this is really important to, uh
resist Denial of Service, for example
-'cause every uh,
+Because every uh,
every client that wants to
-access the service uh, gets
+access the service uh,
gets a different route in the network
@@ -1056,7 +1047,7 @@ resist censorship
And the addresses look like this:
-it's really a hash of a private key
+it's really a hash of a public key
and each hidden service is actually, well, identified
@@ -1065,7 +1056,7 @@ and each hidden service is actually, well, identified
by a public key
-this how it works, uhm, yet Alice the client
+This how it works, uhm, yet Alice the client
and the hidden server, Bob.
@@ -1090,14 +1081,14 @@ And Bob has the public key to identify the service,
and uh he sends
-this public key into each of these three introduction
+this public key and the list of three introduction
points to the directory server.
Now Alice wants to uh,
-connect to Bob, but first the first thing she does
+connect to Bob, the first the first thing she does
is download this
@@ -1109,7 +1100,7 @@ this list with the introduction points and the uh
public key from the directory server. After that, uh
-she choose one of the uh introduction points
+she chooses one of the uh introduction points
@@ -1217,10 +1208,10 @@ then you have to give up your crypto keys
so they can decrypt it later
-and uh, yeah, it's not...
+and uh, yeah, it's not really great
-and it's actually last week was the first case
+and actually last week was the first case
when this was actually used in
@@ -1229,13 +1220,13 @@ when this was actually used in
-uh, there can be special laws like in Germany
+Uh, there can be special laws like in Germany
sort of like a hacker paragraph
-just a nickname, it has some cryptic legal name
+It's just a nickname, it has some cryptic legal name
uh, in reality
@@ -1274,7 +1265,7 @@ it could
restrict anything. From a map to a
-to God know what? Network tools.
+to God know what Network tools.
@@ -1303,7 +1294,7 @@ but no one really knows
and uh, the biggest Tor
@@ -1375,13 +1366,13 @@ and uh,
that's random stuff that can happen
as an exit nodes provider you can get
-letters from Law Enforcement entities, and uh
+letters from Law Enforcement agencies, and uh
What are you doing there?
@@ -1393,7 +1384,7 @@ Maybe some illegal stuff?
And you have to explain to them that you are
-providing Tor server
+providing Tor server and
it wasn't you
@@ -1429,7 +1420,7 @@ Law Enforcement agencies, actually are, so so
depends on what kind of guy you're actually talking to
-So what's... what kind of role plays FreeBSD here?
+So what's... What kind of role plays FreeBSD here?
uh, FreeBSD is really well suited as a Tor node, uh
@@ -1445,7 +1436,7 @@ it doesn't matter what kind of system you use
and it shouldn't matter
-There's one of the, uh
+This is one of the, uh
like I said earlier one of the design
@@ -1463,7 +1454,7 @@ But if you're using the Tor
as actually uh,
-the security of other depends on your node
+the security of others depends on your node
@@ -1493,7 +1484,7 @@ which is important, especialy the swap encryption. And uh,
there's also audit
-and the mac framework
+and the MAC framework
when you want to run your installation
@@ -1520,16 +1511,16 @@ And uh, probably the biggest feature:
Well maintained Tor-related ports.
-There is the main port, security Tor
+There is the main port, security/Tor
-Which is a client and server if you want to run
+Which is a client and server if you want to run
a network node, or just a client.
-There's Tor level
and these are really up to date, uhm
@@ -1538,7 +1529,7 @@ and these are really up to date, uhm
Tor development happens really fast
-and ports get updated
+and the ports get updated
pretty soon after a release is made.
@@ -1549,7 +1540,7 @@ we'll use it later when we do the demonstration
And there's net management Vidalia which is a
also for Windows
@@ -1558,7 +1549,7 @@ also for Windows
-there's trans-proxy Tor
which enables you to actually
@@ -1576,10 +1567,10 @@ that do stuff that's
that makes it hard for Tor to
-run with them
-and you can use trans-proxy Tor
+and you can use trans-proxy-tor
to tunnel such connections through the Tor network.
@@ -1601,7 +1592,7 @@ Some applications just
bypass the configured proxy
-for example FireFox versions below version 1.5,
+for example Firefox versions below version 1.5,
which send every data,
@@ -1703,7 +1694,7 @@ out all the passwords.
And it's really surprising how many people uh, do this.
-So, lesson learned: use secure protocol.
+So, lesson learned: use secure protocols.
There are also other services that require
@@ -1742,13 +1733,14 @@ Uh, I've installed Tor and
Privoxy on this system
-the config files are on the usual places.
+Config files are on the usual places.
-And if you read this, this little.. small.. Is this alright?
+And if you read this, this little... small...
+Is this alright?
-So there is this Tor I see sample file
+So there is this torrc sample file
which we can use
@@ -1772,7 +1764,7 @@ there's this uh,
SOCKS port and SOCKS listen address information
tells you where to connect your uh,
@@ -1818,7 +1810,7 @@ we need to tell
-where to send connections requests.
+where to send connection requests.
Ok, I've actually entered this earlier
@@ -1839,19 +1831,19 @@ the uh, SOCKS client
So we just start
-Ok, so we all set
+Ok, so we are all set
Now we can just do
-everything with our brother
+everything with our browser
-we all started times
+Startup time sucks a bit
-a bit slow on my external drive
+because of my external drive
@@ -1863,7 +1855,7 @@ proxy settings
we just put in our Privoxy server
-which listens on port 3128, hopefully, or does it?
+which listens on port 3128, hopefully, or doesn't?
Oh, 8108, that's it.
@@ -1877,7 +1869,7 @@ through the Tor network
uhm, this is going to take a little bit,
-'cause all the route selection needs to be done
+Because all the route selection needs to be done
all the public crypto, there's also network latency
@@ -1904,7 +1896,7 @@ if you have a node that is running a modem then,
you'll have problem, it's really slow
-ok, while waiting
+Ok, while waiting
we can actually take a look
@@ -1913,7 +1905,7 @@ we can actually take a look
at how our hidden service is configured
-there's some lines for the Tor config file
+There's some lines for the Tor config file
the routing services
@@ -1927,7 +1919,7 @@ as I said, the hidden service is identified by a
public key, and uh, if you
-uncommand this sutff,
+uncomment this sutff,
@@ -1964,14 +1956,14 @@ that an exit node
Ok, this is typical that when you want to show stuff
it doesn't work
-it worked earlier, so uh, it's not the network's fault
+It worked earlier, so uh, it's not the network's fault
@@ -1986,7 +1978,7 @@ So we actually need to
-The default directory in FreeBSD is bar/db/Tor
+The default directory in FreeBSD is /var/db/tor
@@ -1998,7 +1990,7 @@ and when we start Tor it will actually, uh
create the service directory
-by itself. It's also a web server listening on port 80
+by itself. It's also a web server listening on port 80
@@ -2008,7 +2000,7 @@ so we can
and hopefully will be able to see it later on
-okay, so let's see if
+Okay, so let's see if
this stuff is already
@@ -2024,6 +2016,7 @@ two parts in this directory
hostname and private key. Private key is uh,
and the hostname is actually what you give to people
@@ -2033,7 +2026,7 @@ if you want to
to publish your service
-this is actually less likely to work right now
+This is actually less likely to work right now
because it takes some time for Tor to choose these
@@ -2045,13 +2038,13 @@ introduction points,
send all this stuff to directory services
-it takes time for directory services to sync up
+It takes time for directory services to sync up
and actually distribute information to the clients
-and when we want to exit the service, we actually put
+and when we want to access the service, we actually put
this address into the uh,
@@ -2061,7 +2054,7 @@ the address line, and uh,
Tor knows how to
-deal with this uh, the Onion pop up domain, so uh
+deal with this uh, the Onion top-level domain, so uh
this usually actually works. Let's see what's going on here...
@@ -2097,7 +2090,7 @@ localized web page.
For example, when you are from Germany, and you go to
-Google.com, you get a German webpage
+google.com, you get a German webpage
and if you're using Tor and you go to Google,
@@ -2118,7 +2111,7 @@ if it is in the Netherlands,
you get a Dutch Google, which is uh, pretty cool.
I'll have to take a look later
@@ -2127,10 +2120,10 @@ I'll have to take a look later
while I'm working
-so let's just, continue for a moment
+So let's just, continue for a moment
-ok, to summarize, uh
+Ok, to summarize, uh
Tor is actually useful if
@@ -2149,23 +2142,23 @@ so theoretically
it should work
-publish my hidden services from around here
+publish my hidden service around here
and anyone in the world that's connected to the Tor network
-can actually exit it, access it
+can actually access it
-Privoxy is a pretty cool platform for Tor
+FreeBSD is a pretty cool platform for Tor
-'cause it's for one, it has very nice
+Because it has very nice
security features like jail
@@ -2220,7 +2213,7 @@ it depends upon
you can use any port you like
-depend on uh,
+It depends on uh,
what port the nodes use. Nodes can use any port
@@ -2247,7 +2240,7 @@ HTTP access can actually access my node
-yet in theory uh
+In theory uh
you can use any port you like.
@@ -2276,9 +2269,6 @@ Yes?
Well, usually I use Opera, so
I didn't know
@@ -2316,7 +2306,7 @@ so, the uh
Tor developers actually run those directory servers
-but this is really crypto infrastucture
+but this is really critical infrastucture
@@ -2325,7 +2315,7 @@ uhm
Well it's it's hard to say
-'cause the question was uh
+Because the question was uh
Were there any estimates on uh,
@@ -2372,10 +2362,10 @@ going on
and unfortunately also a lot of filesharing systems
-which it doesn't relly make sense 'cause they're slow
+which it doesn't relly make sense because they're slow
Tor is really cool
@@ -2388,4 +2378,4 @@ but if you really want to move a lot of data it's
not a good tool
-ah, any other questions? Doesn't seem to be the case. Ok!
+Ah, any other questions? Doesn't seem to be the case. Ok!
diff --git a/en_US.ISO8859-1/captions/2007/nycbsdcon/dixon-bsdisdying.sbv b/en_US.ISO8859-1/captions/2007/nycbsdcon/dixon-bsdisdying.sbv
index e3ff5ee343..55d933cd40 100644
@@ -14,7 +14,7 @@ we're getting there.
Anybody out here last year?
-Okay. I gave a really bad talk on pf, so and I
+Okay. I gave a really bad talk on pf, and I
appreciate Bob coming out and correcting me this year.
@@ -49,10 +49,10 @@ But, what is a computer?
It helps users accomplish tasks. What is a user?
-A user is somebody biped like
+A user is somebody biped
-biped that stands up right sort of like me.
+that stands up right sort of like me.
Who am I? My name is Jason Dixon.
@@ -94,7 +94,7 @@ That’s the question I've been asking myself all along.
To talk about why BSD is dying.
-Sex, and greed.
+Sex and greed.
Someone kick these guys out.
@@ -122,7 +122,8 @@ This is a computer. This is also known as a
computer. This is a really big computer.
-This is a fake computer, and sometimes, just can, well, compute
+This is a big big computer, and sometimes,
+it just can, well, compute
But what does a computer really do?
@@ -132,7 +133,7 @@ All right, it helps us write documents,
shopping lists. Sometimes, it can even delete documents.
-It helps us work with emails,
+It helps us work with email,
surf the Web, movies,
@@ -158,7 +159,7 @@ that is the foundation
for kernel, libraries, userland applications,
-otherwise known as operating system.
+otherwise known as an operating system.
@@ -170,12 +171,12 @@ What is a kernel?
It's a wonderful thing, it allows
-The management and processes of memory, peripheral devices,
+The management of processes memory, peripheral devices,
and by extension, allows us to do networking, security,
work with disks and file systems, user interfaces,
+userland applications, like
people can write documents, check email, surf the Web,
@@ -231,10 +232,10 @@ wasn’t. The Multics was a commercial
failure. So, a couple of gentlemen like Ken Thompson and
+Dennis Ritchie were not
-[xx] support, like to play games. They worked at Bell Labs
+[xx] support, liked to play games. They worked at Bell Labs
and they had this game called
@@ -248,7 +249,7 @@ it ran on a PDP-7.
What is an assembly programmer to do when a game
-doesn’t work properly on the star board? He moves
+doesn’t work properly on the star board? He mauls
it. So, in 1969, Ken Thompson
@@ -272,7 +273,7 @@ up to two.
-1970, UNIX was officially known as U-N-I-X
+1970, UNIX was officially known as U-N-I-X Unix
It ran on a PDP1145
@@ -346,7 +347,7 @@ precursor to sendmail, curses, libraries. 1981,
4.1BSD, this one, we are recorded through VAX
-4.1BSD addressed memory performance issues with UNIX on VAX
+addressed a number of memory performance issues with UNIX on VAX
1983, 4.2BSD uses TCP/IP from BBN,
@@ -358,7 +359,7 @@ and also the Berkeley Fast File System from the
gentleman, Kirk McKusick,
-who also brought us the original BSD mascot.
+who also brought us the original Beastie today.
In 1986, 4.3BSD introduced performance improvements
@@ -375,7 +376,7 @@ originally intended to run on the Power 6/32
That platform actually never came to fruition
-but it did allow us to extract some of the
+but it did allow us to abstract some of the
@@ -444,7 +445,7 @@ BSD3, I'm sorry, the 386BSD, which later on became
BSD/OS by BSDI
-Exodus. Back in 1992, a wholly own subsidiary of
+Exodus. Back in 1992, a wholly owned subsidiary of
AT&T called Unix System Laboratories
@@ -472,7 +473,7 @@ code in the
-This was one of their advertising and again, they used
+This was one of their advertising things again, they used
this as the basis for the
@@ -517,7 +518,7 @@ for BSD is that he hinted,
that…actually by this
-point, the lawsuit with California Berkeley had been
+point, the University of California Berkeley had been
also added into the
@@ -565,16 +566,16 @@ the lawsuit was settled out of court
in secret for ten years.
+In 2004, a site Groklaw primarily got
-done with the actual settlement
+what the actual settlement
-was and really sit.
USL, AT&T and
@@ -602,10 +603,10 @@ and became the
-NetBSD, I'm sorry, FreeBSD
+NetBSD, I'm sorry, FreeBSD, it ends right there
FreeBSD, people with background, only different BSDs
@@ -639,13 +640,13 @@ and that’s pretty much what it's known for. To be honest
I mean, I got to admit I'm an Open BSD guy, I was looking for
-a really cool and innovative features in NetBSD and I really
+a really cool and innovative features for NetBSD and I really
couldn’t find any.
-Why am I hanging on this.
+so let them hang their head on this.
@@ -654,15 +655,16 @@ Sorry,
I know people are going to…
-I know the NetBSD is going to get me…I can
+I know the NetBSDers is going to jump me…I can
handle two of you. Okay? And this is
-a list of the platforms that probably
+a list of the hardware platforms that currently supported on
including a toaster.
@@ -688,7 +690,7 @@ And it comes out with a new release every six months,
generally, in May and November
-1st, so if you haven’t already, pick a copy, it just came
+1st, so if you haven’t already, pick a copy, that just came
out of the foil. It's unofficial model is secure by default
@@ -714,7 +716,7 @@ the most obvious example. ProPolice
Some other features that they’d given us through
-the years – PF, authpf, CARP, fsyncd,
+the years – PF, authpf, CARP, pfsyncd,
which I think some of these are probably in the
@@ -727,11 +729,11 @@ FreeBSD 4.8. Again,
-FreeBSD 4.8 and was intended to basically
+forked with FreeBSD 4.8 and was intended to basically
overhaul the SMP features in FreeBSD 6
-and 7,5,6, and 7.
+and 7..5,6, and 7.
DragonFly is another example. If you look at their goals,
@@ -750,13 +752,13 @@ Of course,
Tiger is an old I'm sorry, OSX
-It started from the Jolitz project, but it's sort of a inbred
+It started from the Jolitz project, but it's sort of an inbred
+and then various others spearBSD, ecoBSD
+and other minor BSDs
That is all about, I wanted to cover kind of the present of
@@ -772,7 +774,7 @@ of the project and topic is.
Well, first, because IDC said so.
-Market share for BSD is, right now, all time low, under 1%
+Market share for BSD is, right now, at an all time low, under 1%
And, of course, Netcraft confirms these findings.
@@ -789,24 +791,25 @@ I mean, we can't possibly make
money, so that, obviously, means that
-we're dying. And free software is…
+we're dying. And free software is terrible
-We know how to say this, when we came out.
-Free software equals terrorism.
+We know the insane let me get out.
+Free software equals terrism.
-Our inability to adapt. As you can see by this graph
+Our inability to adapt. As you can see by this graph
Let's be serious here, people.
+As per FreeBSD network pages per hour search
-We see Windows, I mean, the way people. Come on,
-they’ve been doing this for a number of what? 15,
+We see Windows, obviously I mean, they are way ahead people.
+Come on, they’ve been doing this for a number of what? 15,
20 years. Linux is second.
@@ -815,17 +818,18 @@ they’ve been doing this for a number of what? 15,
They actually are showing some.
-We presume that someone is doing office by doing
+We presume that someone is doing authentication
+by reading user pages
The BSD is only for register, so we've got to work
on that, of course
-Loss of talent. Free
+Loss of talent.
-BSD has lost 93% of their core developers.
+FreeBSD has lost 93% of their core developers.
Okay, come on, guys, let's go.
@@ -851,12 +855,11 @@ sponsor, and some other company that didn’t sponsor us
I should just end right there.
+because we're the nearest to them
Seriously, though, the technological challenge that we
@@ -870,13 +873,13 @@ Of course, developers are in the market, so,
if that happens, that
-happens. The end is really, really cool.
+happens. Although the end is really, really cool.
DRM, is obviously evil, yes, I know, I don’t care about
-DRM. Ran out.
+DRM. Run Dell.
@@ -885,10 +888,11 @@ Right?
-No, this has been hard to admit, but I can't beat
+Now, this has been hard to entertain,
+but I can't read this out in front of
binary is bad,
@@ -897,10 +901,10 @@ binary is bad,
don’t do it
-just smoke in the same crack
+just smoke in the same crap
+when it says
@@ -922,7 +926,7 @@ out
-get your files with your supplier,
+get in touch with your supplier,
let's get some documentation to these guys.
@@ -931,7 +935,7 @@ let's get some documentation to these guys.
Because without the
-diversity, we'll have
+diversity, we have