Personal tools

Difference between revisions of "Eth0:2008 Summer/Workshops"

From Eth0Wiki

Jump to: navigation, search
(Added proxytunnel talk)
 
(6 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 +
{{Eth0:2008 Summer}}
 
=Workshops and Lectures=
 
=Workshops and Lectures=
 
If you know something and would like to share it with the people on the campgrounds, organizing a workshop or a lecture is a piece of cake. There might be a possibility that the organisation is able to provide an indoor room with tables, seats, power and network, which could be used for this purpose. Another option is that, if you have a big enough tent or are able to find space in a large tent, you do your workshop or lecture in your own location. You are responsible for providing your own network/power/seats in this case. Furthermore, apart from an entry on the wiki and maybe a schedule on the main site (ical anybody?) you are responsible for your own promotion.
 
If you know something and would like to share it with the people on the campgrounds, organizing a workshop or a lecture is a piece of cake. There might be a possibility that the organisation is able to provide an indoor room with tables, seats, power and network, which could be used for this purpose. Another option is that, if you have a big enough tent or are able to find space in a large tent, you do your workshop or lecture in your own location. You are responsible for providing your own network/power/seats in this case. Furthermore, apart from an entry on the wiki and maybe a schedule on the main site (ical anybody?) you are responsible for your own promotion.
Line 33: Line 34:
  
 
  '''Subject:'''      Punching holes through your corporate firewall
 
  '''Subject:'''      Punching holes through your corporate firewall
  '''Author:'''      [[User:dag|dag]]
+
  '''Author:'''      maniac
 
  '''Type:'''        lecture
 
  '''Type:'''        lecture
  '''Availability:''' saturday
+
  '''Availability:''' depending on the attendance
 
  '''Requirements:''' Machine with proxytunnel.
 
  '''Requirements:''' Machine with proxytunnel.
 
  '''Description:'''  We will demonstrate some techniques to tunnel to any firewall using proxytunnel.
 
  '''Description:'''  We will demonstrate some techniques to tunnel to any firewall using proxytunnel.

Latest revision as of 09:36, 19 April 2010

Eth0oldlogo.jpg
[POST-EVENT] This is information about the Eth0:2008 Summer Edition. [POST-EVENT]
Eth0oldlogo.jpg


Workshops and Lectures

If you know something and would like to share it with the people on the campgrounds, organizing a workshop or a lecture is a piece of cake. There might be a possibility that the organisation is able to provide an indoor room with tables, seats, power and network, which could be used for this purpose. Another option is that, if you have a big enough tent or are able to find space in a large tent, you do your workshop or lecture in your own location. You are responsible for providing your own network/power/seats in this case. Furthermore, apart from an entry on the wiki and maybe a schedule on the main site (ical anybody?) you are responsible for your own promotion.

Pre-registration

Use this space if you plan to give a workshop/lecture. Please note that this is just a preliminary registration, details will be subject to change in the future so keep an eye on this page if you intend to give a workshop/lecture

Unix system administration

Subject:      Hardening exim
Author:       r3boot
Type:         lecture
Availability: Once or twice, depending on the attendance
Description:  This lecture will explain some techniques behind hardened exim. It will explain several header
              / sender / receiver based detection and blocking techniques. It will also explain how to use SpamAssassin
              and several virus scanners for added protection.
Subject:      Implementing anti-spam with exim
Author:       r3boot
Type:         workshop
Availability: Once or twice, depending on the attendance
Requirements: Machine with Exim, SpamAssassin, ClamAV and some commercial scanners. Some UNIX + rfc822 clue.
Description:  This workshop will show all techniques from the Hardening exim lecture in a step by step fashion.
Subject:      Setting up IDS systems with Prelude-IDS
Author:       r3boot
Type:         workshop
Availability: Once or twice, depending on the attendance
Requirements: Machine with Prelude-IDS (libprelude, libpreludedb, prelude-manager) and sensors
              (prelude-lml, snort, tarpitd, <tbd>).
Description:  This workshop will explain how to setup a prelude-ids framework.
              It will include configuration of several different sensors and will explain how to work with the
              framework to monitor networks and systems.
Subject:      Punching holes through your corporate firewall
Author:       maniac
Type:         lecture
Availability: depending on the attendance
Requirements: Machine with proxytunnel.
Description:  We will demonstrate some techniques to tunnel to any firewall using proxytunnel.

Webdevelopment

Subject:      Webdevelopment: Why standards
Author:       Jan Klopper
Type:         lecture
Availability: Once or twice, depending on the attendance
Description:  This lecture will explain why applying standards in webdevelopment is a good practice, and will explain how to change your workflow to be based on standards. I will explain the use of web semantics and if time permits it a bit of web accessibility.
Subject:      Webdevelopment: Semantics in depth
Author:       Jan Klopper
Type:         lecture
Availability: Once or twice, depending on the attendance
Description:  During this lecture I will explain the use of Semantics in webdevelopment, Why to use semantic correct markup, how to code semantic correct markup and how to separate content and style.

Datarecovery

Subject:      What to do if data is lost
Author:       IsACK
Type:         Lecture
Availability: Once or twice, depending on the attendance
Description:  During this lecture I will explain how data can be lost and what to do if it happends
Subject:      How to recover lost data
Author:       IsACK
Type:         Workshop
Availability: Once or twice, depending on the attendance
Description:  During this workshop I will explain how data can be recovered
Requirements: Computer / laptop

OpenSource

Subject:      Vrouwen in open source
Author:       Nancy van Baak
Type:         Lecture
Availability: Once
Description:  How to get female hackers into the opensource scene, and keep them active and entertained.
Subject:      de Overheid, open in verbinding
Author:       Yuen Keong Ng, duoraadslid VVD Amsterdam, woordvoerder Sport, bedrijven, deelnemingen en ICT.
Type:         Lecture
Availability: Once
Description:  De overheid, opensource en opencontent hoe ontwikkeld dit zich?
Subject:      Data Privacy issues in developing Smolt
Author:       Yaakov Nemoy - Fedora Project, Red Hat
Type:         Lecture
Availability: Once
Description:  Smolt is a utility we use in Fedora to collect hardware information from our users.  
              This presentation will discuss some of the issues we've had protecting user privacy, and how we solved that problem.


Linux distributions

Subject:      Various Debian-related subjects possible - to be determined
Author:       Frans Pop
Type:         Lecture (lightning possible too)
Availability: 
Description:  Can do general and technical talks, and also demos.
Subject:      Topics on Fedor, Red Hat, and the Open Source community
Author:       Yaakov Nemoy - Fedora Project, Red Hat
Type:         Lecture (lightning possible too)
Availability: As long as I am present
Description:  What is Red Hat's commitment to the Open Source community.  How does Fedora support its users.
              How do our users interact with Fedora as Community to get the most out of it.

Gaming

Subject:      OpenLaserFrag: Open-source laser tagging
Author:       Stoney3K
Type:         Lecture (15-30min, Q&A available)
Availability: Once or twice, depending on attendance
Description:  OpenLaserFrag is an attempt at an outdoor gaming experience similar to LaserQuest and MILES.