Difference between revisions of "PC-BSD® Releases/9.2"
|(4 intermediate revisions by one user not shown)|
|Line 2:||Line 2:|
|Line 24:||Line 24:|
Latest revision as of 19:19, 15 December 2013
PC-BSD® version numbers are the same as those used by FreeBSD. Unlike FreeBSD, PC-BSD® also uses a rolling release model. The name of the file image that you choose to install or upgrade to will determine how often you receive updates to the software that is installed with the operating system as well as whether or not you will receive updates as new features and drivers are added to the operating system. Image names will include the version number, where 9.2 is the most recent version, and either the word RELEASE or STABLE, where:
- RELEASE: indicates that updates to the software installed with the operating system will appear in Update Manager on or about the 1st and 15th of each month. This means that these applications will never be more than a month out of date. However, new drivers and features will not be added to the operating system until the next RELEASE version becomes available and the user upgrades to that new version.
- STABLE: indicates that updates to the software installed with the operating system will appear in Update Manager on or about the 5th and 20th of each month. In addition, on the 1st of each month, Update Manager will provide a patch which will update the operating system to include all of the new features and drivers.
Despite the name, RELEASE is considered to be more stable than STABLE. If you can wait until the next release (typically every 6 months or so) for new drivers and features, install RELEASE instead of STABLE.
If you are currently running RELEASE and would like to change to STABLE, refer to Using a Rolling Release.
Occasionally, the FreeBSD project releases security patches that affect the operating system or the software installed with the operating system. These will appear in Update Manager for both RELEASE and STABLE users, making it easy to keep your PC-BSD® system fully patched against known security vulnerabilities.