Difference between revisions of "Eth0:2008 Summer/Workshops"
From Eth0Wiki
m (moved Workshops to Eth0:2008 Summer/Workshops) |
|||
(8 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
+ | {{Eth0:2008 Summer}} | ||
=Workshops and Lectures= | =Workshops and Lectures= | ||
If you know something and would like to share it with the people on the campgrounds, organizing a workshop or a lecture is a piece of cake. There might be a possibility that the organisation is able to provide an indoor room with tables, seats, power and network, which could be used for this purpose. Another option is that, if you have a big enough tent or are able to find space in a large tent, you do your workshop or lecture in your own location. You are responsible for providing your own network/power/seats in this case. Furthermore, apart from an entry on the wiki and maybe a schedule on the main site (ical anybody?) you are responsible for your own promotion. | If you know something and would like to share it with the people on the campgrounds, organizing a workshop or a lecture is a piece of cake. There might be a possibility that the organisation is able to provide an indoor room with tables, seats, power and network, which could be used for this purpose. Another option is that, if you have a big enough tent or are able to find space in a large tent, you do your workshop or lecture in your own location. You are responsible for providing your own network/power/seats in this case. Furthermore, apart from an entry on the wiki and maybe a schedule on the main site (ical anybody?) you are responsible for your own promotion. | ||
Line 31: | Line 32: | ||
It will include configuration of several different sensors and will explain how to work with the | It will include configuration of several different sensors and will explain how to work with the | ||
framework to monitor networks and systems. | framework to monitor networks and systems. | ||
+ | |||
+ | '''Subject:''' Punching holes through your corporate firewall | ||
+ | '''Author:''' maniac | ||
+ | '''Type:''' lecture | ||
+ | '''Availability:''' depending on the attendance | ||
+ | '''Requirements:''' Machine with proxytunnel. | ||
+ | '''Description:''' We will demonstrate some techniques to tunnel to any firewall using proxytunnel. | ||
'''Webdevelopment''' | '''Webdevelopment''' | ||
Line 73: | Line 81: | ||
'''Availability:''' Once | '''Availability:''' Once | ||
'''Description:''' De overheid, opensource en opencontent hoe ontwikkeld dit zich? | '''Description:''' De overheid, opensource en opencontent hoe ontwikkeld dit zich? | ||
+ | |||
+ | '''Subject:''' Data Privacy issues in developing Smolt | ||
+ | '''Author:''' Yaakov Nemoy - Fedora Project, Red Hat | ||
+ | '''Type:''' Lecture | ||
+ | '''Availability:''' Once | ||
+ | '''Description:''' Smolt is a utility we use in Fedora to collect hardware information from our users. | ||
+ | This presentation will discuss some of the issues we've had protecting user privacy, and how we solved that problem. | ||
+ | |||
'''Linux distributions''' | '''Linux distributions''' | ||
Line 80: | Line 96: | ||
'''Availability:''' | '''Availability:''' | ||
'''Description:''' Can do general and technical talks, and also demos. | '''Description:''' Can do general and technical talks, and also demos. | ||
+ | |||
+ | '''Subject:''' Topics on Fedor, Red Hat, and the Open Source community | ||
+ | '''Author:''' Yaakov Nemoy - Fedora Project, Red Hat | ||
+ | '''Type:''' Lecture (lightning possible too) | ||
+ | '''Availability:''' As long as I am present | ||
+ | '''Description:''' What is Red Hat's commitment to the Open Source community. How does Fedora support its users. | ||
+ | How do our users interact with Fedora as Community to get the most out of it. | ||
'''Gaming''' | '''Gaming''' |
Latest revision as of 09:36, 19 April 2010
Workshops and Lectures
If you know something and would like to share it with the people on the campgrounds, organizing a workshop or a lecture is a piece of cake. There might be a possibility that the organisation is able to provide an indoor room with tables, seats, power and network, which could be used for this purpose. Another option is that, if you have a big enough tent or are able to find space in a large tent, you do your workshop or lecture in your own location. You are responsible for providing your own network/power/seats in this case. Furthermore, apart from an entry on the wiki and maybe a schedule on the main site (ical anybody?) you are responsible for your own promotion.
Pre-registration
Use this space if you plan to give a workshop/lecture. Please note that this is just a preliminary registration, details will be subject to change in the future so keep an eye on this page if you intend to give a workshop/lecture
Unix system administration
Subject: Hardening exim Author: r3boot Type: lecture Availability: Once or twice, depending on the attendance Description: This lecture will explain some techniques behind hardened exim. It will explain several header / sender / receiver based detection and blocking techniques. It will also explain how to use SpamAssassin and several virus scanners for added protection.
Subject: Implementing anti-spam with exim Author: r3boot Type: workshop Availability: Once or twice, depending on the attendance Requirements: Machine with Exim, SpamAssassin, ClamAV and some commercial scanners. Some UNIX + rfc822 clue. Description: This workshop will show all techniques from the Hardening exim lecture in a step by step fashion.
Subject: Setting up IDS systems with Prelude-IDS Author: r3boot Type: workshop Availability: Once or twice, depending on the attendance Requirements: Machine with Prelude-IDS (libprelude, libpreludedb, prelude-manager) and sensors (prelude-lml, snort, tarpitd, <tbd>). Description: This workshop will explain how to setup a prelude-ids framework. It will include configuration of several different sensors and will explain how to work with the framework to monitor networks and systems.
Subject: Punching holes through your corporate firewall Author: maniac Type: lecture Availability: depending on the attendance Requirements: Machine with proxytunnel. Description: We will demonstrate some techniques to tunnel to any firewall using proxytunnel.
Webdevelopment
Subject: Webdevelopment: Why standards Author: Jan Klopper Type: lecture Availability: Once or twice, depending on the attendance Description: This lecture will explain why applying standards in webdevelopment is a good practice, and will explain how to change your workflow to be based on standards. I will explain the use of web semantics and if time permits it a bit of web accessibility.
Subject: Webdevelopment: Semantics in depth Author: Jan Klopper Type: lecture Availability: Once or twice, depending on the attendance Description: During this lecture I will explain the use of Semantics in webdevelopment, Why to use semantic correct markup, how to code semantic correct markup and how to separate content and style.
Datarecovery
Subject: What to do if data is lost Author: IsACK Type: Lecture Availability: Once or twice, depending on the attendance Description: During this lecture I will explain how data can be lost and what to do if it happends
Subject: How to recover lost data Author: IsACK Type: Workshop Availability: Once or twice, depending on the attendance Description: During this workshop I will explain how data can be recovered Requirements: Computer / laptop
OpenSource
Subject: Vrouwen in open source Author: Nancy van Baak Type: Lecture Availability: Once Description: How to get female hackers into the opensource scene, and keep them active and entertained.
Subject: de Overheid, open in verbinding Author: Yuen Keong Ng, duoraadslid VVD Amsterdam, woordvoerder Sport, bedrijven, deelnemingen en ICT. Type: Lecture Availability: Once Description: De overheid, opensource en opencontent hoe ontwikkeld dit zich?
Subject: Data Privacy issues in developing Smolt Author: Yaakov Nemoy - Fedora Project, Red Hat Type: Lecture Availability: Once Description: Smolt is a utility we use in Fedora to collect hardware information from our users. This presentation will discuss some of the issues we've had protecting user privacy, and how we solved that problem.
Linux distributions
Subject: Various Debian-related subjects possible - to be determined Author: Frans Pop Type: Lecture (lightning possible too) Availability: Description: Can do general and technical talks, and also demos.
Subject: Topics on Fedor, Red Hat, and the Open Source community Author: Yaakov Nemoy - Fedora Project, Red Hat Type: Lecture (lightning possible too) Availability: As long as I am present Description: What is Red Hat's commitment to the Open Source community. How does Fedora support its users. How do our users interact with Fedora as Community to get the most out of it.
Gaming
Subject: OpenLaserFrag: Open-source laser tagging Author: Stoney3K Type: Lecture (15-30min, Q&A available) Availability: Once or twice, depending on attendance Description: OpenLaserFrag is an attempt at an outdoor gaming experience similar to LaserQuest and MILES.