Difference between revisions of "Eth0:2008 Summer/Workshops"
From Eth0Wiki
m |
|||
Line 88: | Line 88: | ||
'''Description:''' During this workshop I will explain how data can be recovered | '''Description:''' During this workshop I will explain how data can be recovered | ||
'''Requirements:''' Computer / laptop | '''Requirements:''' Computer / laptop | ||
+ | |||
+ | '''OpenSource''' | ||
+ | '''Subject:''' Vrouwen in open source | ||
+ | '''Author:''' Nancy van Baak | ||
+ | '''Type:''' Lecture | ||
+ | '''Availability:''' Once | ||
+ | '''Description:''' How to get female hackers into the opensource scene, and keep them active and entertained. |
Revision as of 07:25, 29 May 2008
Workshops and Lectures
If you know something and would like to share it with the people on the campgrounds, organizing a workshop or a lecture is a piece of cake. There might be a possibility that the organisation is able to provide an indoor room with tables, seats, power and network, which could be used for this purpose. Another option is that, if you have a big enough tent or are able to find space in a large tent, you do your workshop or lecture in your own location. You are responsible for providing your own network/power/seats in this case. Furthermore, apart from an entry on the wiki and maybe a schedule on the main site (ical anybody?) you are responsible for your own promotion.
Pre-registration
Use this space if you plan to give a workshop/lecture. Please note that this is just a preliminary registration, details will be subject to change in the future so keep an eye on this page if you intend to give a workshop/lecture
Unix system administration
Subject: Hardening exim Author: r3boot Type: lecture Availability: Once or twice, depending on the attendance Description: This lecture will explain some techniques behind hardened exim. It will explain several header / sender / receiver based detection and blocking techniques. It will also explain how to use SpamAssassin and several virus scanners for added protection.
Subject: Implementing anti-spam with exim Author: r3boot Type: workshop Availability: Once or twice, depending on the attendance Requirements: Machine with Exim, SpamAssassin, ClamAV and some commercial scanners. Some UNIX + rfc822 clue. Description: This workshop will show all techniques from the Hardening exim lecture in a step by step fashion.
Subject: Setting up IDS systems with Prelude-IDS Author: r3boot Type: workshop Availability: Once or twice, depending on the attendance Requirements: Machine with Prelude-IDS (libprelude, libpreludedb, prelude-manager) and sensors (prelude-lml, snort, tarpitd, <tbd>). Description: This workshop will explain how to setup a prelude-ids framework. It will include configuration of several different sensors and will explain how to work with the framework to monitor networks and systems.
Python
Subject: Python3000 programming challenge Author: tehmaze Type: workshop Availability: Once or twice, depending on the attendance Requirements: A Python interpreter, Python 3.0a2 recommended. Will attempt to offer a shell box on the event for those who can't run their own interpreter. Description: In this workshop we will study some real life usage examples. We will attempt to create a file-indexer that will scan all available shared files on the LAN event. Everybody who knows Python, or wishes to get to know Python can join in. Some programming experience is required.
Subject: Gozerbot, a user and developers point of view Author: tehmaze, ]v[ Type: lecture Description: gozerbot is a Python IRC and Jabber bot, which is very versatile
Subject: Python golf: Perfection is achieved not when you have nothing more to add, but when you have nothing left to take away. Author: tehmaze, ]v[ Type: workshop Availability: daily Requirements: A Python interpreter, some programming knowledge, or at least the desire to get familiar with Python programming. Description: A competition to find the shortest (fewest keystrokes) Python code to solve a given problem. There will be a new puzzle every day, with some working code example. It's up to you to produce the shortest version possible, generating the same output for the given inputs. You will have 24 hours for each challenge. Some prizes will be available for the winning challengers.
Webdevelopment
Subject: Webdevelopment: Why standards Author: Jan Klopper Type: lecture Availability: Once or twice, depending on the attendance Description: This lecture will explain why applying standards in webdevelopment is a good practice, and will explain how to change your workflow to be based on standards. I will explain the use of web semantics and if time permits it a bit of web accessibility.
Subject: Webdevelopment: Semantics in depth Author: Jan Klopper Type: lecture Availability: Once or twice, depending on the attendance Description: During this lecture I will explain the use of Semantics in webdevelopment, Why to use semantic correct markup, how to code semantic correct markup and how to separate content and style.
Datarecovery
Subject: What to do if data is lost Author: IsACK Type: Lecture Availability: Once or twice, depending on the attendance Description: During this lecture I will explain how data can be lost and what to do if it happends
Subject: How to recover lost data Author: IsACK Type: Workshop Availability: Once or twice, depending on the attendance Description: During this workshop I will explain how data can be recovered Requirements: Computer / laptop
OpenSource
Subject: Vrouwen in open source Author: Nancy van Baak Type: Lecture Availability: Once Description: How to get female hackers into the opensource scene, and keep them active and entertained.