Hardly a week goes by that I don’t get an email about some “security best practice” or the other. Some examples are “Best Practices For Detecting Insider Threats”, “Best Practices for DDoS Mitigation”, and “Best Practices for Security in Linux/Unix”. The same old best practices keep circulating around but we don’t seem to be learning from them. If you don’t believe this to be true, why do we still see SQL injection attacks being used and succeeding?
Your boss corners you at the coffee pot and says, "Did you see the news? Our competition got hacked into and company secrets were stolen. I want you to test our networks and report back to me on how safe they are." Because of the pressure of regulatory compliance and increasing activity by cyber-criminals, many organizations are turning to penetration testing.
Penetration testing goes beyond a vulnerability assessment by exploiting vulnerabilities to learn how an a bad actor may get access to key systems and confidential files.
Get multiouch working on your touch-enabled screen. Be able to edit the configuration files that enable your computer to break out of the cripplingly limited interface of mouse and screen.
The hardware we'll be working with is the Acer Iconia W500 (should also apply to Dell Duo, as it has the same capacitative screen manufacturer). We'll be talking mostly about using Ubuntu with a Gnome-shell (plus some other cool utilities / programs) for this application, though I would be interested to hear from KDE users who have input.
In this session I will give a tour of the more usfull tools Linux users and administrators have available to them for monitoring Linux systems. We will look at SAR, ksar, top, nmon, tcpdump, netstat, iostat among others. This will lead into a discussion of the most common causes of performance problems, how to identify them and possible fixes.
About the presenter:
Logical Volume Managers provide administrators and users with the ability to use their storage in a more flexible fashion then are possible when file systems are placed directly into disk partitions. Logical Volume Managers can also be used to provide redundancy for important data.
This presentation will cover the Linux Logical Volume Managers more advanced uses and features. I will show how you can use LVM2 for data migration, data protection, spanning storage devices and considerations when using LVM2 with Linux native multipahting.
About the presentation:
Businesses today are looking to reduce the cost of maintaining large number of servers while also increasing reliability and consistency by using configuration management tools.
Configuration management tools bring consistent, repeatable, dependable and rapid software deployment to your infrastructure while also performing preventive maintenance and repairing systems in real time.
Attend this session to learn how to install the open source Chef configuration management tool into your environment to deploy applications faster and more consistently than ever before.
Some bozo here at Linux Fest NW has a session called "Why Linux Sucks". Well, he's wrong. Not only is Linux great... but there is not one single thing that it sucks at. NOT ONE. And I'll prove it (and provide you with the amunition needed to distroy any anti-Linux argument... IN THE WORLD).
2012 is an amazing time for Linux. Huge changes. Amazing opportunities. ...And lots and lots of ways that using Linux just plain sucks. We'll look at some of the more interesting (to me) things that Linux sucks at -- and exactly how to fix them.
We'll review common mistakes made when defining MySQL user credentials.
I'll be covering all situations through a presentation and run through a couple of the less obvious examples using a live demo.
Presentation will cover:
- List of examples
- Audit and administration tools: pt-show-grants
- How to close the gaps