You are here

LUG

Presentations for 7/13

PLUG - Wed, 2017/07/12 - 21:50

We'll have 2 presentations with month.  One from Phil Waclawski on Krita held over from last month and the other from der.hans on Asciidoc

 

Phil Waclawski: Krita Basics - Tools, Layers, Coloring etc

Description:
Krita is a powerful painting program, designed for graphic designers and general artists. I will introduce the basic features it provides, along with some special filters, including G'mic. I will however not be able to demonstrate any artistic skills :)

Biography:
Phil has been a faculty member, focusing on open source software at MCC for nearly two decades.

Phil teaches a variety of course, including MySQL Database, PHP, Python, Javascript, HTML 5 and CSS, Linux OS, Internet Server Set up and more.

This summer, Phil will once again be offering a "MCC Multimedia Madness" summer camp for 6-8th graders. Over the two weeks I will cover a wide range of open source software, including GIMP, Inkscape, Krita, Audacity, Blender, Hydrogen Drum Kit, Tux Guitar, Openshot, Linux Multimedia Studio, work with green screen and more.

For hobbies, Phil has too many. Blacksmithing, archery, Leatherworking, Wood Working, Jewelry, Sound Recording/editing and SCUBA diving. Phil is also learning to play the Bass.

Phil has been using linux at home for desktops and servers since 1994.

der.hans: AsciiDoc - Plainish text for fancy output

Description:
AsciiDoc is a great text tool for documentation from simple notes to books. A text editor is all it takes. Since it's all text, AsciiDoc lends itself to revision control and revision control WebUI systems like GitLab and GitHub support it.

Biography:
der.hans is a technology and entrepreneurial veteran. Roles have included director of engineering, engineering manager, IS manager, system administrator, community college instructor, developer and DBA.

In his free time, der.hans endeavors to help build community through user group and conference leadership. He is chairman of the Phoenix Linux User Group (PLUG), BoF organizer for the Southern California Linux Expo (SCaLE) and founder of the Free Software Stammtisch.

He presents regularly at large community-led conferences (SCaLE, SeaGL, LFNW) and many local groups.

 

Security Meeting Topic for August 8th

PLUG - Wed, 2017/07/12 - 16:15

Programming Defensively

Join the Phoenix Linux Users Group at their Security Session to learn about defensive programming. Understand how software is written effectively, what to look for when checking security, and how to verify that you are following good practices. This will not be an introduction to computer programming but will be a discussion of how to write software properly with a focus on security and safety.

* Any discussion of paid services or software will be done for educational purposes only. Neither the instructor, PLUG, or any one involved in this course endorses any paid services or products discussed at this meeting.

Your Instructor: Aaron is an experienced Linux user with several years of teaching experience. He works in the industry as a software developer while also providing consultancy on cyber security related topics. His discussions are AZ Post certified for training credit for law enforcement and he prides himself on providing quality educational material that is relevant and topical. He has a Masters Degree in Intelligence Analysis with a focus in Cyber Security, is a life long learner, and prides himself on staying up to date with the ever changing field of cyber security.

Security Meeting Topic for July 11th

PLUG - Wed, 2017/06/14 - 09:13

Illegal Commerce and The Net

Join the Phoenix Linux Users Group at their Security Session to learn about crypto currencies, online trade, and where data is sold. What does a criminal do after they get your information? This two hour meeting will focus on providing a simplified and easy to follow explanation of the black markets that operate around the world on the internet. Find out about the supposed layers of the internet, how to use tor, and why bitcoin is as important for legitimate trade as it is for criminals.

* Any discussion of paid services or software will be done for educational purposes only. Neither the instructor, PLUG, or any one involved in this course endorses any paid services or products discussed at this meeting.

Your Instructor: Aaron is an experienced Linux user with several years of teaching experience. He works in the industry as a software developer while also providing consultancy on cyber security related topics. His discussions are AZ Post certified for training credit for law enforcement and he prides himself on providing quality educational material that is relevant and topical. He has a Masters Degree in Intelligence Analysis with a focus in Cyber Security, is a life long learner, and prides himself on staying up to date with the ever changing field of cyber security.

Security Meeting topic for June 13th

PLUG - Fri, 2017/06/02 - 16:07

Operational Security and Data Gathering
Join the Phoenix Linux Users Group at their Security Session to learn about Operational Security and Information Gathering. We will be discussing the importance of data assurance, the difference between assurance and privacy, and what tools we can use today to encrypt or verify data as appropriate. This two hour meeting will focus on providing a simplified and easy to follow explanation of how data should be safe guarded and what steps we can take to keep it trust worthy.

* Any discussion of paid services or software will be done for educational purposes only. Neither the instructor, PLUG, or any one involved in this course endorses any paid services or products discussed at this meeting.

Your Instructor:
Aaron is an experienced Linux user with several years of teaching experience. He works in the industry as a software developer while also providing consultancy on cyber security related topics. His discussions are AZ Post certified for training credit for law enforcement and he prides himself on providing quality educational material that is relevant and topical. He has a Masters Degree in Intelligence Analysis with a focus in Cyber Security, is a life long learner, and prides himself on staying up to date with the ever changing field of cyber security.

Meeting topics for the June 8th meeting

PLUG - Fri, 2017/06/02 - 15:46

This month Phil Waclawski will give us an introduction to Krita and Ed Nicholson will explain DNSSEC and NTPsec

Phil Waclawski: Krita Basics: Tools, Layers, Coloring etc

Krita is a powerful painting program, designed for graphic designers and general artists. I will introduce the basic features it provides, along with some special filters, including G'mic. I will however not be able to demonstrate any artistic skills :)

About Phil:
Phil has been a faculty member, focusing on open source software at MCC for nearly two decades.

Phil teaches a variety of course, including MySQL Database, PHP, Python, Javascript, HTML 5 and CSS, Linux OS, Internet Server Set up and more.

This summer, Phil will once again be offering a "MCC Multimedia Madness" summer camp for 6-8th graders. Over the two weeks I will cover a wide range of open source software, including GIMP, Inkscape, Krita, Audacity, Blender, Hydrogen Drum Kit, Tux Guitar, Openshot, Linux Multimedia Studio, work with green screen and more.

For hobbies, Phil has too many. Blacksmithing, archery, Leatherworking, Wood Working, Jewelry, Sound Recording/editing and SCUBA diving. Phil is also learning to play the Bass.

Phil has been using linux at home for desktops and servers since 1994.

 

Ed Nicholson: DNSSEC DANE & NTPsec - Trust but Verify
DNSSEC DANE and NTPsec - The basic infrastructure of the Internet hasn't seen such significant improvement since Jon Postel's contributions to the original DNS RFCs. DNSSEC is operational authentication of information served by authoritative DNS servers. This is the dawn of the believable Internet. An important consequence has been the emergence of DANE or DNS-based Authentication of Named Entities. And that adds confidentiality to believability. Even as Internet naming gains this new robustness, similar efforts are improving our access to time services with the NTPsec project. While not all Internet infrastructure has left the era of blind trust, the names and times we depend on are now things we can verify. This presentation is about consuming and deploying DNSSEC DANE and NTPsec services.

About Ed:
Ed has been involved with Free Software for some time. His interests are in how people, organizations and populations use, create and experience information. He enjoys The Prescott National Forest as his "office" and The Valley of The Sun as a home away from home. Personal systems run either Fedora, Project Atomic, Android or OpenBSD.

 

PLUG Cryptoparty on 5/11 at regular meeting

PLUG - Wed, 2017/05/03 - 20:45

PLUG is hosting a CryptoParty!

Show up on Thursday May 11th to get help securing your mobile and desktop electronics.

A CryptoParty is a global, decentralized, grass-root movement to help people protect their privacy.

The Phoenix Linux Users Group (PLUG) will have labs to help you setup things like secure messaging with Signal, VPN, TOR, a password manager and multi-factor authentication.

A CryptoParty relies on two resources. 1) people with the knowledge and desire to lead a lab; 2) people who want to take the lab and improve their security.

Secuirty Class on May 9th

PLUG - Wed, 2017/05/03 - 20:36
Join the Phoenix Linux Users Group at their Security Session to learn about real world exploits used in the wild to gain unauthorized access to computers. We will be discussing Brute Force Attacks, Man-In-The-Middle attacks (DNS hijacking), Social Engineering, and Web Application Exploits targeting popular CMS like WordPress. This two hour meeting will focus on providing simplified and easy to follow explanations of the methods used to attack your servers and how you can better prepare yourself to mitigate the risks.  

* Any discussion of paid services or software will be done for educational purposes only. Neither the instructor, PLUG, or any one involved in this course endorses any paid services or products discussed at this meeting.

PLUG Meeting on April 13th

PLUG - Thu, 2017/04/06 - 18:01
This month we will have a two presentations.  Phil Waclawski will present "Using Hierarchical Data in MySQL, Trees vs Nests" and Ed Nicholson will present "Securing a SSH Bastion host with PrivacyIDEA and U2F"

Phil Waclawski: Using Hierarchical Data in MySQL, Trees vs Nests

Real world data is often made of hierarchical relationships, or "trees".
Representing that data in a Relational Database starts to get complicated as soon as you have more than two levels in your "Tree".
There are many strategies for handling such data, and I will cover examples of at least two of them (adjacency list and nested sets) and possibly more.

If you have access to a mysql instance, you can create the test tables and follow along, or get the code later.

About Phil:
Phil has been a faculty member, focusing on open source software at MCC for nearly two decades.

Phil teaches a variety of course, including MySQL Database, PHP, Python, Javascript, HTML 5 and CSS, Linux OS, Internet Server Set up and more.

This summer, Phil will once again be offering a "MCC Multimedia Madness" summer camp for 6-8th graders. Over the two weeks I will cover a wide range of open source software, including GIMP, Inkscape, Krita, Audacity, Blender, Hydrogen Drum Kit, Tux Guitar, Openshot, Linux Multimedia Studio, work with green screen and more.

For hobbies, Phil has too many. Blacksmithing, archery, Leatherworking, Wood Working, Jewelry, Sound Recording/editing and SCUBA diving.  Phil is also learning to play the Bass.

Phil has been using linux at home for desktops and servers since 1994.



Ed Nicholson: Securing a SSH Bastion host with PrivacyIDEA and U2F

Bastion Servers are an important tool for access control to your other
systems. PrivacyIDEA is a credential management system that can add
many types of authentication to your Jump Server, for example U2F.
FIDO Universal 2nd Factor Keys are a convenient standard implemented
by many to improve security. PrivacyIDEA is a great example of how
easy adding important levels of security to your systems can be.

About Ed:
Ed has been involved with Free Software for some time, and is most
interested in how people, organizations and populations use, create and
experience information. Recently, Ed is enjoying The Prescott National Forest
as his "personal office" and The Valley of The Sun as a home away from home.
Personal systems run either Fedora, Project Atomic, Android or OpenBSD.

PLUG Meeting on April 13th

PLUG - Thu, 2017/04/06 - 18:01
This month we will have a two presentations.  Phil Waclawski will present "Using Hierarchical Data in MySQL, Trees vs Nests" and Ed Nicholson will present "Securing a SSH Bastion host with PrivacyIDEA and U2F"

Phil Waclawski: Using Hierarchical Data in MySQL, Trees vs Nests

Real world data is often made of hierarchical relationships, or "trees".
Representing that data in a Relational Database starts to get complicated as soon as you have more than two levels in your "Tree".
There are many strategies for handling such data, and I will cover examples of at least two of them (adjacency list and nested sets) and possibly more.

If you have access to a mysql instance, you can create the test tables and follow along, or get the code later.

About Phil:
Phil has been a faculty member, focusing on open source software at MCC for nearly two decades.

Phil teaches a variety of course, including MySQL Database, PHP, Python, Javascript, HTML 5 and CSS, Linux OS, Internet Server Set up and more.

This summer, Phil will once again be offering a "MCC Multimedia Madness" summer camp for 6-8th graders. Over the two weeks I will cover a wide range of open source software, including GIMP, Inkscape, Krita, Audacity, Blender, Hydrogen Drum Kit, Tux Guitar, Openshot, Linux Multimedia Studio, work with green screen and more.

For hobbies, Phil has too many. Blacksmithing, archery, Leatherworking, Wood Working, Jewelry, Sound Recording/editing and SCUBA diving.  Phil is also learning to play the Bass.

Phil has been using linux at home for desktops and servers since 1994.



Ed Nicholson: Securing a SSH Bastion host with PrivacyIDEA and U2F

Bastion Servers are an important tool for access control to your other
systems. PrivacyIDEA is a credential management system that can add
many types of authentication to your Jump Server, for example U2F.
FIDO Universal 2nd Factor Keys are a convenient standard implemented
by many to improve security. PrivacyIDEA is a great example of how
easy adding important levels of security to your systems can be.

About Ed:
Ed has been involved with Free Software for some time, and is most
interested in how people, organizations and populations use, create and
experience information. Recently, Ed is enjoying The Prescott National Forest
as his "personal office" and The Valley of The Sun as a home away from home.
Personal systems run either Fedora, Project Atomic, Android or OpenBSD.

Security Meeting on April 11th

PLUG - Thu, 2017/04/06 - 09:04
We will be holding our new security meeting on April 11th at 7pm.

In this meeting we will learn about Virtual Private Networks, Proxies, and Tor. We will be discussing new developments on who can sell your data, how that data is gathered, and what these tools can do for you. Traffic obfuscation is not a silver bullet for anonymization. This two hour meeting will focus on providing a simplified and easy to follow explanation of online privacy, the technologies involved in masking or revealing users, and what a VPN or Tor can do for you.

* Any discussion of paid services or software will be done for educational purposes only. Neither the instructor, PLUG, or any one involved in this course endorses any paid services or products discussed at this meeting.

For more information see our meeting information page.

Security Meeting on April 11th

PLUG - Thu, 2017/04/06 - 09:04
We will be holding our new security meeting on April 11th at 7pm.

In this meeting we will learn about Virtual Private Networks, Proxies, and Tor. We will be discussing new developments on who can sell your data, how that data is gathered, and what these tools can do for you. Traffic obfuscation is not a silver bullet for anonymization. This two hour meeting will focus on providing a simplified and easy to follow explanation of online privacy, the technologies involved in masking or revealing users, and what a VPN or Tor can do for you.

* Any discussion of paid services or software will be done for educational purposes only. Neither the instructor, PLUG, or any one involved in this course endorses any paid services or products discussed at this meeting.

For more information see our meeting information page.
Subscribe to LuftHans aggregator - LUG