As Presented at the Central Iowa Linux User's Group
pdf version at https://www.evernote.com/shard/s84/sh/32e4e0d1-b247-4f04-9749-ea71079eb900/a21c87e733d8971dad82eece0de3bb1c
A very practical discussion on how to connect Asterisk with Relational Databases using ODBC database abstraction layer. This session will cover the basics of MySQL/ODBC installation, configuration and integration with Asterisk.
Additionally will be made practical examples about the benefits of this union: improving dialplan with SQL Queries, store Call Detail Records (CDR) in DB, implementing Realtime Architecture (ARA).
Proposed session is for those who do not yet know benefits of connecting an Asterisk box to a database or are interested to learn about it through a very simple step-by-step demo.
The document discusses hardening Linux servers against security threats. It begins by introducing the speaker and explaining the importance of hardening systems assuming an attacker has gained access. It then provides recommendations for various hardening techniques including: updating systems, removing unnecessary packages and users, securing SSH access, configuring firewalls and remote logging, auditing systems, and restricting access to things like temporary directories and compilers. The document is a guide that walks through steps to harden a Linux server across several areas.
The document discusses the La Fonera 2.0 wireless router and its capabilities, including its ability to run various open-source firmwares like OpenWrt. It provides instructions for updating the firmware and configuring features like connecting additional storage devices. The La Fonera 2.0 is presented as a low-cost platform for networking experimentation and development.
Building a secure bastion, or, 50 ways to kill your serverAnna Kennedy
A short introduction to how to turn a minimal Ubuntu AMI into a hardened bastion host: what to remove, what can't be removed, and what extra features you need to think about.
This presentation covers two important topics for scalable mongodb deployments. First, we will discus how MongoDB stores data so you can figure out how much RAM you need in each of your servers. Second, we'll look at replica sets and how to design a highly available topology for your replica set.
This document provides instructions for configuring network interfaces on a Linux system. It specifies static IP address and network settings for the Ethernet interface and uses DHCP for wireless. It also sets the wireless SSID and password and commands a system reboot to apply the new network configuration.
The document provides an overview of Docker containers and images. It discusses how containers isolate processes and resources, how they are named and networked, and how to attach environment variables and volumes. It also explains how images are built in layers and stored in registries, and recommends tools for managing images, logs, and using Docker with configuration management.
A very practical discussion on how to connect Asterisk with Relational Databases using ODBC database abstraction layer. This session will cover the basics of MySQL/ODBC installation, configuration and integration with Asterisk.
Additionally will be made practical examples about the benefits of this union: improving dialplan with SQL Queries, store Call Detail Records (CDR) in DB, implementing Realtime Architecture (ARA).
Proposed session is for those who do not yet know benefits of connecting an Asterisk box to a database or are interested to learn about it through a very simple step-by-step demo.
The document discusses hardening Linux servers against security threats. It begins by introducing the speaker and explaining the importance of hardening systems assuming an attacker has gained access. It then provides recommendations for various hardening techniques including: updating systems, removing unnecessary packages and users, securing SSH access, configuring firewalls and remote logging, auditing systems, and restricting access to things like temporary directories and compilers. The document is a guide that walks through steps to harden a Linux server across several areas.
The document discusses the La Fonera 2.0 wireless router and its capabilities, including its ability to run various open-source firmwares like OpenWrt. It provides instructions for updating the firmware and configuring features like connecting additional storage devices. The La Fonera 2.0 is presented as a low-cost platform for networking experimentation and development.
Building a secure bastion, or, 50 ways to kill your serverAnna Kennedy
A short introduction to how to turn a minimal Ubuntu AMI into a hardened bastion host: what to remove, what can't be removed, and what extra features you need to think about.
This presentation covers two important topics for scalable mongodb deployments. First, we will discus how MongoDB stores data so you can figure out how much RAM you need in each of your servers. Second, we'll look at replica sets and how to design a highly available topology for your replica set.
This document provides instructions for configuring network interfaces on a Linux system. It specifies static IP address and network settings for the Ethernet interface and uses DHCP for wireless. It also sets the wireless SSID and password and commands a system reboot to apply the new network configuration.
The document provides an overview of Docker containers and images. It discusses how containers isolate processes and resources, how they are named and networked, and how to attach environment variables and volumes. It also explains how images are built in layers and stored in registries, and recommends tools for managing images, logs, and using Docker with configuration management.
This document is a FAQ for burning game ISO images called "ISO Burning for Morons". It discusses various topics related to ISO burning such as file formats, software needed, and troubleshooting issues. Common questions are answered such as how to decompress RAR files, read NFO files, and use verification software. Tips are provided for burning PlayStation games slowly and making an image first before burning. Various websites for news, cracks, and links are listed. The author thanks those who contribute ISO releases and the creator of a similar PlayStation FAQ for layout ideas.
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...Priyanka Aash
With the proliferation of Linux-based SoCs -- you've likely got one or two in your house, on your person or in your pocket -- it is often useful to look "under the hood" at what is running; Additionally, in-situ debugging may be unavailable due to read-only filesystems, memory is often limited, and other factors keep us from attacking a live device. This talk looks at attacking binaries outside their native environment using QEMU, the Quick Emulator, as well as techniques for extracting relevant content from devices and exploring them.
Infrastructure as code might be literally impossible part 2ice799
The document discusses various issues with infrastructure as code including complexities that arise from software licenses, bugs, and inconsistencies across tools and platforms. Specific examples covered include problems with SSL and APT package management on Debian/Ubuntu, Linux networking configuration difficulties, and inconsistencies in Python packaging related to naming conventions for packages containing hyphens, underscores, or periods. Potential causes discussed include legacy code, lack of time for thorough testing and bug fixing, and economic pressures against developing fully working software systems.
Web 3, Week 1: Amazon Web Services for Beginnersjkosoy
In the first week of our 2012 MFADT Web 3 class the students went from GoDaddy to running their own lil web server. Is it perfect? No. Are they experts? Of course not. But at least they have a sandbox to install whatever server stack they want.
I figure there sharing this will be helpful to others. If you've never heard of AWS or just want a little more control over your web hosting beyond what the GoDaddys of the world offer, this tutorial should be a great starting point.
This was a presentation I gave back in 2000 on Linux Security. Even though some of it is definitely dated there's still some relevant stuff in it since security is mainly common sense stuff.
Steelcon 2015 - 0wning the internet of trashinfodox
My presentation slides from Steelcon 2015 on "Owning the Internet of Trash", a presentation on exploitation of endemic vulnerabilities in the so called "internet of things", with a focus on finding vulnerabilities in, exploiting, and gaining persistent access to, routers and other such embedded devices.
This talk was recorded, a video will be linked soonish, and went over some basics of analysing firmware, hardware, and suchlike to find bugs in things and hack the planet!
Tips from Support: Always Carry a Towel and Don’t Panic!Perforce
What should you do if you think you’ve got a problem with Perforce Helix? In this session, understand what the common issues are, what to look for, where to find help and how our Support engineers can assist you.
Windows logging workshop - BSides Austin 2014Michael Gough
This document provides an overview of a workshop on Windows logging. The workshop aims to teach attendees how to use Windows logging to detect attacks like the Target data breach. It discusses enabling and configuring Windows logging, collecting logs using commands, and analyzing logs with Splunk. The presentation covers malware behavior, Windows logging components, enabling auditing of important events in security and system logs, and installing the Splunk Universal Forwarder to send logs to Splunk Storm for analysis.
Dmitry Lebedev: Agile Testing Using Agile ToolsAgile Lietuva
The document discusses agile testing tools and techniques. It advocates becoming a software craftsman and creating test automation tools rather than buying them. Some recommended agile testing tools include whiteboards, index cards, stickies and sharpies. The document also provides examples of using Ruby tools like Watir, Selenium and Cucumber to automate tests for a web frontend, Java application, third-party web services and databases. It shows code examples for log parsing and testing web services using Ruby.
The document argues that Linux does not actually suck and provides counterarguments to common complaints. It notes that Linux is free of cost and free of copyright limitations. It then claims that criticisms of Linux's GPL license, ability to make users smarter, and customization options are misguided. The document suggests that Linux systems are more stable and secure than other operating systems and are less likely to crash or need reinstallation.
Hadoop is a framework for distributed storage and processing of large datasets across clusters of computers. It allows storing large amounts of data reliably across multiple nodes and running algorithms on parts of the data in parallel. Key components include a distributed file system (HDFS) to manage data storage across nodes, a job tracker to coordinate jobs, and a map-reduce programming model to break jobs into parallelized tasks.
[ElasticStack]What happens when you visualize servers exposed to the world? Masamitsu Maehara
Dionaea and Cowrie are low-interactive honeypots that can be installed on AWS to gather malware samples from attackers. Beats are used to ship logs from the honeypots to Elasticsearch via Logstash. The Grok filter in Logstash parses the ClamScan log format into key-value pairs to normalize the data before storing it in Elasticsearch. This allows the malware detections to be visualized in Kibana for real-time surveillance of malware activity.
Yet Another Dan Kaminsky Talk (Black Ops 2014)Dan Kaminsky
The document is a transcript of a talk by Dan Kaminsky about various cybersecurity topics. Some key points:
- Hard drives are essentially their own computers with direct access to system memory, so malware on a hard drive can be highly persistent.
- Random number generators are often insecure by default due to lack of entropy. This leads to issues like easily crackable passwords.
- A new library called Liburandy aims to make random numbers secure by default by hijacking standard functions and backing them with cryptographically secure sources of randomness.
- Humans are better at remembering stories than random bits, so representing passwords as memorable stories could improve security and usability.
Exploring the Internet of Things Using RubyMike Hagedorn
The document discusses exploring the Internet of Things using Ruby. It covers using Ruby and USB to control a lamp, creating an IoT printer that prints tasks from a Mac, and building an IoT display to show tweets. It demonstrates connecting various devices like Arduino boards to the cloud and controlling them remotely through Ruby scripts and APIs.
This document discusses file storage and deletion. It notes that when files are saved, they are stored across multiple hard drive clusters and a table tracks their locations. When a file is deleted, it is not immediately erased but moved to the trash or recycle bin. An experiment is described where a file is deleted, the trash is emptied, and then restoration software is used to successfully recover the file, showing that deletion does not fully remove the data. Risks to file recovery are discussed as data being overwritten or destroyed by viruses.
Your data is much safer at home than it is letting some corporation "take care of it" for you, right? Security reviews for some of the top vendors' devices reveal many interesting findings. Like everything else, there are bugs. But knowing what kinds of bugs and how the vendors have responded will allow you to better understand the impact of plugging these devices into your network. Jeremy will show you just how low access control and least privilege are their list of priorities. He'll also explore the amount of test collateral and debug interfaces sloppily left shipping to consumers. From remote roots to stealing social network tokens to just plain weird stuff, he'll expand on how it's not just about what they do, but also what they don't do. And, he'll give you some useful guidelines on how to close the gaps yourself.
This document provides an overview of Windows 8 forensics and anti-forensics techniques. It discusses new features in Windows 8 like pagefile and swapfile functions, Windows 8 to Go, Bitlocker updates, cloud integration, thumbnail caching, and PC refresh. It also covers Internet Explorer 10 changes and analyzes the pagefile, swapfile, thumbcache, file history artifacts, and new registry hives introduced in Windows 8. Anti-forensics techniques like encryption, time tampering, disk wiping, and disk destruction are also briefly mentioned. The document promotes an upcoming security conference and provides contact information for the author.
Packaging is the Worst Way to Distribute Software, Except for Everything Elsemckern
As part of the 2014 USENIX Release Engineering Summit West, I presented a talk about packaging software and what's wrong with current trends.
Here's the abstract:
Reliably distributing software is a notoriously difficult problem, and almost every operating system and programming language vendor has tried to solve it. This has led to a herd of packaging systems, almost none of which are cross-compatible; some manage system-level software, while others focus on extending their own language (often by trampling on system-level software). And like all competing standards, every packaging system comes with its own sharp corners, dull edges, and hidden idiosyncrasies to deal with along the path to packaging happiness. In an attempt to answer the question "How do I install this software and ensure that its dependencies are fulfilled?", some novel solutions have begun to see popular adoption. But a lot of these newer tools and techniques tread the same ground as their predecessors while overlooking the lessons that were learned along the way.
I'll talk about the state of native packaging systems on some popular platforms (Debian/Ubuntu, RHEL/CentOS/Fedora, and Mac OS X), packaging systems for popular languages (Ruby, Python, Perl, and Node) and the ways that developers are attempting to work around the limitations of these systems. I'll review the reasons that tools like curlbash, FPM, and omnibus packages have become popular by sharing lessons I've learned while working through these systems. While this will be an amusing presentation, I'll show how native packages can address the concerns that have pushed Release Engineers and Developers away. I will also talk about what native packaging systems can learn from the next generation of packaging tools.
The original abstract is available here:
https://www.usenix.org/conference/ures14west/summit-program/presentation/mckern
The document provides an overview of Mac OS X releases from 10.0 to 10.6, including brief summaries of each release. It also discusses security improvements in Mac OS X Leopard such as file quarantine, sandboxing, code signing, and address space layout randomization. The speaker is a long-time Unix zealot and open source contributor who came to Apple to help bring Unix to the desktop.
All about Time, or how to stop from going back to the futureAndrew Denner
This document discusses network time protocol (NTP) and how to synchronize computer clocks over a network. It explains that NTP was developed in 1985 to keep clocks accurate on networked devices. NTP works by synchronizing client clocks to server clocks via the network. Servers get their time from stratum 0 sources like atomic clocks and GPS. The document recommends configuring clients to sync to public NTP pool servers or a local server by editing /etc/ntp.conf to list the server addresses. More information on NTP and setting it up is provided.
This document provides information about an upcoming Linux Users Group meeting and various recent Linux news items. It announces that the LUG meeting will be held in a hybrid format on the third Wednesday of the month. It also lists several recent Linux-related news stories, including the release of CBL Mariner 2.0, Rust being added to the Linux kernel, PyTorch becoming a Linux Foundation project, and systemd being added to WSL.
This document is a FAQ for burning game ISO images called "ISO Burning for Morons". It discusses various topics related to ISO burning such as file formats, software needed, and troubleshooting issues. Common questions are answered such as how to decompress RAR files, read NFO files, and use verification software. Tips are provided for burning PlayStation games slowly and making an image first before burning. Various websites for news, cracks, and links are listed. The author thanks those who contribute ISO releases and the creator of a similar PlayStation FAQ for layout ideas.
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...Priyanka Aash
With the proliferation of Linux-based SoCs -- you've likely got one or two in your house, on your person or in your pocket -- it is often useful to look "under the hood" at what is running; Additionally, in-situ debugging may be unavailable due to read-only filesystems, memory is often limited, and other factors keep us from attacking a live device. This talk looks at attacking binaries outside their native environment using QEMU, the Quick Emulator, as well as techniques for extracting relevant content from devices and exploring them.
Infrastructure as code might be literally impossible part 2ice799
The document discusses various issues with infrastructure as code including complexities that arise from software licenses, bugs, and inconsistencies across tools and platforms. Specific examples covered include problems with SSL and APT package management on Debian/Ubuntu, Linux networking configuration difficulties, and inconsistencies in Python packaging related to naming conventions for packages containing hyphens, underscores, or periods. Potential causes discussed include legacy code, lack of time for thorough testing and bug fixing, and economic pressures against developing fully working software systems.
Web 3, Week 1: Amazon Web Services for Beginnersjkosoy
In the first week of our 2012 MFADT Web 3 class the students went from GoDaddy to running their own lil web server. Is it perfect? No. Are they experts? Of course not. But at least they have a sandbox to install whatever server stack they want.
I figure there sharing this will be helpful to others. If you've never heard of AWS or just want a little more control over your web hosting beyond what the GoDaddys of the world offer, this tutorial should be a great starting point.
This was a presentation I gave back in 2000 on Linux Security. Even though some of it is definitely dated there's still some relevant stuff in it since security is mainly common sense stuff.
Steelcon 2015 - 0wning the internet of trashinfodox
My presentation slides from Steelcon 2015 on "Owning the Internet of Trash", a presentation on exploitation of endemic vulnerabilities in the so called "internet of things", with a focus on finding vulnerabilities in, exploiting, and gaining persistent access to, routers and other such embedded devices.
This talk was recorded, a video will be linked soonish, and went over some basics of analysing firmware, hardware, and suchlike to find bugs in things and hack the planet!
Tips from Support: Always Carry a Towel and Don’t Panic!Perforce
What should you do if you think you’ve got a problem with Perforce Helix? In this session, understand what the common issues are, what to look for, where to find help and how our Support engineers can assist you.
Windows logging workshop - BSides Austin 2014Michael Gough
This document provides an overview of a workshop on Windows logging. The workshop aims to teach attendees how to use Windows logging to detect attacks like the Target data breach. It discusses enabling and configuring Windows logging, collecting logs using commands, and analyzing logs with Splunk. The presentation covers malware behavior, Windows logging components, enabling auditing of important events in security and system logs, and installing the Splunk Universal Forwarder to send logs to Splunk Storm for analysis.
Dmitry Lebedev: Agile Testing Using Agile ToolsAgile Lietuva
The document discusses agile testing tools and techniques. It advocates becoming a software craftsman and creating test automation tools rather than buying them. Some recommended agile testing tools include whiteboards, index cards, stickies and sharpies. The document also provides examples of using Ruby tools like Watir, Selenium and Cucumber to automate tests for a web frontend, Java application, third-party web services and databases. It shows code examples for log parsing and testing web services using Ruby.
The document argues that Linux does not actually suck and provides counterarguments to common complaints. It notes that Linux is free of cost and free of copyright limitations. It then claims that criticisms of Linux's GPL license, ability to make users smarter, and customization options are misguided. The document suggests that Linux systems are more stable and secure than other operating systems and are less likely to crash or need reinstallation.
Hadoop is a framework for distributed storage and processing of large datasets across clusters of computers. It allows storing large amounts of data reliably across multiple nodes and running algorithms on parts of the data in parallel. Key components include a distributed file system (HDFS) to manage data storage across nodes, a job tracker to coordinate jobs, and a map-reduce programming model to break jobs into parallelized tasks.
[ElasticStack]What happens when you visualize servers exposed to the world? Masamitsu Maehara
Dionaea and Cowrie are low-interactive honeypots that can be installed on AWS to gather malware samples from attackers. Beats are used to ship logs from the honeypots to Elasticsearch via Logstash. The Grok filter in Logstash parses the ClamScan log format into key-value pairs to normalize the data before storing it in Elasticsearch. This allows the malware detections to be visualized in Kibana for real-time surveillance of malware activity.
Yet Another Dan Kaminsky Talk (Black Ops 2014)Dan Kaminsky
The document is a transcript of a talk by Dan Kaminsky about various cybersecurity topics. Some key points:
- Hard drives are essentially their own computers with direct access to system memory, so malware on a hard drive can be highly persistent.
- Random number generators are often insecure by default due to lack of entropy. This leads to issues like easily crackable passwords.
- A new library called Liburandy aims to make random numbers secure by default by hijacking standard functions and backing them with cryptographically secure sources of randomness.
- Humans are better at remembering stories than random bits, so representing passwords as memorable stories could improve security and usability.
Exploring the Internet of Things Using RubyMike Hagedorn
The document discusses exploring the Internet of Things using Ruby. It covers using Ruby and USB to control a lamp, creating an IoT printer that prints tasks from a Mac, and building an IoT display to show tweets. It demonstrates connecting various devices like Arduino boards to the cloud and controlling them remotely through Ruby scripts and APIs.
This document discusses file storage and deletion. It notes that when files are saved, they are stored across multiple hard drive clusters and a table tracks their locations. When a file is deleted, it is not immediately erased but moved to the trash or recycle bin. An experiment is described where a file is deleted, the trash is emptied, and then restoration software is used to successfully recover the file, showing that deletion does not fully remove the data. Risks to file recovery are discussed as data being overwritten or destroyed by viruses.
Your data is much safer at home than it is letting some corporation "take care of it" for you, right? Security reviews for some of the top vendors' devices reveal many interesting findings. Like everything else, there are bugs. But knowing what kinds of bugs and how the vendors have responded will allow you to better understand the impact of plugging these devices into your network. Jeremy will show you just how low access control and least privilege are their list of priorities. He'll also explore the amount of test collateral and debug interfaces sloppily left shipping to consumers. From remote roots to stealing social network tokens to just plain weird stuff, he'll expand on how it's not just about what they do, but also what they don't do. And, he'll give you some useful guidelines on how to close the gaps yourself.
This document provides an overview of Windows 8 forensics and anti-forensics techniques. It discusses new features in Windows 8 like pagefile and swapfile functions, Windows 8 to Go, Bitlocker updates, cloud integration, thumbnail caching, and PC refresh. It also covers Internet Explorer 10 changes and analyzes the pagefile, swapfile, thumbcache, file history artifacts, and new registry hives introduced in Windows 8. Anti-forensics techniques like encryption, time tampering, disk wiping, and disk destruction are also briefly mentioned. The document promotes an upcoming security conference and provides contact information for the author.
Packaging is the Worst Way to Distribute Software, Except for Everything Elsemckern
As part of the 2014 USENIX Release Engineering Summit West, I presented a talk about packaging software and what's wrong with current trends.
Here's the abstract:
Reliably distributing software is a notoriously difficult problem, and almost every operating system and programming language vendor has tried to solve it. This has led to a herd of packaging systems, almost none of which are cross-compatible; some manage system-level software, while others focus on extending their own language (often by trampling on system-level software). And like all competing standards, every packaging system comes with its own sharp corners, dull edges, and hidden idiosyncrasies to deal with along the path to packaging happiness. In an attempt to answer the question "How do I install this software and ensure that its dependencies are fulfilled?", some novel solutions have begun to see popular adoption. But a lot of these newer tools and techniques tread the same ground as their predecessors while overlooking the lessons that were learned along the way.
I'll talk about the state of native packaging systems on some popular platforms (Debian/Ubuntu, RHEL/CentOS/Fedora, and Mac OS X), packaging systems for popular languages (Ruby, Python, Perl, and Node) and the ways that developers are attempting to work around the limitations of these systems. I'll review the reasons that tools like curlbash, FPM, and omnibus packages have become popular by sharing lessons I've learned while working through these systems. While this will be an amusing presentation, I'll show how native packages can address the concerns that have pushed Release Engineers and Developers away. I will also talk about what native packaging systems can learn from the next generation of packaging tools.
The original abstract is available here:
https://www.usenix.org/conference/ures14west/summit-program/presentation/mckern
The document provides an overview of Mac OS X releases from 10.0 to 10.6, including brief summaries of each release. It also discusses security improvements in Mac OS X Leopard such as file quarantine, sandboxing, code signing, and address space layout randomization. The speaker is a long-time Unix zealot and open source contributor who came to Apple to help bring Unix to the desktop.
All about Time, or how to stop from going back to the futureAndrew Denner
This document discusses network time protocol (NTP) and how to synchronize computer clocks over a network. It explains that NTP was developed in 1985 to keep clocks accurate on networked devices. NTP works by synchronizing client clocks to server clocks via the network. Servers get their time from stratum 0 sources like atomic clocks and GPS. The document recommends configuring clients to sync to public NTP pool servers or a local server by editing /etc/ntp.conf to list the server addresses. More information on NTP and setting it up is provided.
This document provides information about an upcoming Linux Users Group meeting and various recent Linux news items. It announces that the LUG meeting will be held in a hybrid format on the third Wednesday of the month. It also lists several recent Linux-related news stories, including the release of CBL Mariner 2.0, Rust being added to the Linux kernel, PyTorch becoming a Linux Foundation project, and systemd being added to WSL.
January 2022: Central Iowa Linux Users Group: GitAndrew Denner
This document provides an overview of the history and features of Git version control software. It discusses earlier version control systems like SCCS and CVS, and how Git was created in 2005 by Linus Torvalds with goals of speed, data integrity, and supporting distributed non-linear workflows. The document outlines some key features of Git like distributed versioning and atomic commits, as well as potential downsides like dealing with large binary files. It also briefly introduces Git LFS as an extension for managing large files outside of the main Git repository.
This document summarizes Andrew Denner's presentation about migrating his blog from a WordPress/LAMP stack hosted on a VM to a static site generated with Jekyll and hosted on GitLab Pages. It discusses the pros and cons of each approach, including how the new static site will have a smaller attack surface and be easier to version control but lose dynamic features. It also provides demonstrations of using Markdown, Liquid templates, and Podman to build and serve the static site locally before deployment.
Local Kubernetes for Dummies: STLLUG March 2021Andrew Denner
Andrew Denner gives an introduction to moving from Docker to Kubernetes. He discusses drawbacks of Docker like lack of orchestration and networking headaches. Kubernetes provides orchestration, service discovery, storage orchestration, self-healing and more. It is not a drop-in replacement for Docker and does not include deployment or middleware. Key Kubernetes concepts include clusters, controllers, manifests, pods, volumes and workloads. Easier options for learning Kubernetes include Minikube, K3s and Helm.
St Louis Linux Users Group Wireguard (for Fun and Networking)Andrew Denner
This document discusses different VPN protocols and presents Wireguard as a new option. It provides an overview of older protocols like PPTP and OpenVPN, noting their security weaknesses. The document then introduces Wireguard as very fast with low overhead, using standardized encryption algorithms and having no known major vulnerabilities. It demonstrates how to install and set up Wireguard on different platforms like the Raspberry Pi, Ubuntu, MacOS, and Android to securely connect networks.
Central Iowa Linux Users Group: August 2020 Jupyter LabAndrew Denner
Setting up Jupyter Lab, virtual env and other Linux fun
Video at: https://youtu.be/3_r0LqzMAD8
Version control at: https://gitlab.com/denner1/cialug-august-2020-jupyter-lab
Central Iowa Linux Users Group June 2020 Meeting Apache GuacamoleAndrew Denner
The document welcomes attendees to the Central Iowa Linux Users Group (CIALUG) meeting for June 2020. It provides information on the group's monthly meetings on the third Wednesday, website, mailing list, and Slack/IRC channels. The document also lists topics for the meeting including news about Apache and Guacamole remote desktop software, with links provided for Guacamole configuration and Docker setups. Speakers for the meeting are listed as Kyle Hamilton and Andrew Denner.
A brief intro to Ansible-CIALUG March 2020Andrew Denner
- The document introduces Ansible, an automation tool for server provisioning, configuration, and management that allows organizing servers into groups and describing how those groups should be configured from a central location.
- Key Ansible concepts are introduced including control nodes, managed nodes, inventory files, modules, tasks, and playbooks which are like todo lists that use modules to achieve tasks.
- A brief demo is shown of using Ansible with a control node, two managed nodes, and a Docker Compose host for sharing files.
Central Iowa Linux Users Group May 2020 Meeting: WireGuardAndrew Denner
This document summarizes a presentation about the Wireguard VPN protocol given to the Central Iowa Linux Users Group. It begins with introductions and background about the presenter and organization. The bulk of the document discusses and compares existing VPN protocols like PPTP, OpenVPN, and IPSec and their security issues. It focuses on introducing Wireguard as a newer, more lightweight VPN protocol that uses standardized encryption and has no known vulnerabilities. It concludes with demos of installing Wireguard on Ubuntu, MacOS, and Android.
Central Iowa Linux Users Group-December 2019: Windows ManagersAndrew Denner
This document provides information about a Linux users group meeting, including summaries of several desktop environments that were discussed. The meeting covered setting up a Raspberry Pi 4 with Manjaro Linux, and then discussed popular desktop environments like KDE Plasma, GNOME, Budgie, Cinnamon, MATE, Enlightenment, LXDE, LXQt, Xfce, Sugar, and Deepin. Unfortunately Window Maker was not able to be demonstrated as it does not build for ARM. The document also mentions a user submitted section on desktops.
Central Iowa Linux Users Group: November Meeting -- Container showdownAndrew Denner
This document summarizes an upcoming meeting of the Central Iowa Linux Users Group (CIALUG) that will feature a presentation on Linux containers. The presentation will provide a brief history of containers from early chroot-based implementations to modern Docker and Kubernetes containers. It will also demo and compare various container technologies like Docker, LXC, Podman, Buildah, and Kubernetes.
Central Iowa Linux Users Group October Meeting: Centos 8Andrew Denner
This document summarizes a presentation about CentOS 8 and alternatives to Docker like Podman and Buildah. It discusses what CentOS is, key changes in CentOS 8 like using DNF and Python 3.6 by default. It also covers how long support lasts for CentOS 6, 7, and 8. Alternatives to Docker like Podman and Buildah are presented as being more secure since they don't require running a daemon process as root. Demo videos are linked showing how to install Podman and pull a Docker image. Risks of upgrading from CentOS 7 to 8 are discussed.
This document provides a brief introduction to networking and the Internet. It discusses the history of networks from early packet networks in the 1950s to the development of the ARPANET and the birth of the Internet in the 1980s and 1990s. The presentation also introduces some key networking concepts like MAC addresses, IP addresses, DNS, network devices like hubs, switches and routers, and firewalls. It provides an overview of private IP addressing and mentions some common troubleshooting tools like Wireshark.
A Brief overview of Linux, or How I learned to stop worrying and love the pen...Andrew Denner
This document provides an overview of Linux distributions including a brief history of Linux and an explanation of key terms. It summarizes several popular distributions such as Ubuntu, Debian, Red Hat, Fedora, CentOS, Gentoo, Arch, and Knoppix. Each distribution is described in one to two sentences focusing on package management, default desktop environment, and release cycles.
Debian Buster was released on July 6, 2019 as the latest stable version, codenamed Debian 10. It replaces Debian Stretch and includes updates to major components like Gnome 3.30, Linux kernel 4.19, OpenJDK 11, and Python 3 as the default version. Some changes include switching to NFtables for firewall rules, improved ARM and SBC support, and Wayland as the default display server. The /usr directory merger and Bash 5.0 update are also covered.
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry PiAndrew Denner
This document summarizes a presentation given at the Central Iowa Linux Users Group meeting on July 17, 2019 about using Jupyter Notebook on a Raspberry Pi. The presentation covered installing Docker on a Raspberry Pi 3B+, building a Docker image with Jupyter Notebook and related Python packages, and briefly demonstrating Jupyter Notebook within the Docker container. The speaker was Andrew Denner, a senior software developer and president of the user group.
CIALUG June 2019: Raspberry Pi Facial RecognitionAndrew Denner
This document provides instructions for setting up facial recognition on a Raspberry Pi using Python. It discusses installing necessary libraries like dlib, face_recognition, and OpenCV. It then explains how to build a facial dataset by taking photos, encode the faces to train a model, and transfer the trained model to the Pi to run facial recognition code and demo it.
CIALUG May 2019 Meeting: An intro to docker and using rootless dockerAndrew Denner
The document summarizes a presentation given by Andrew Denner to the Central Iowa Linux Users Group about Docker and rootless Docker. It begins with welcome information about the meeting and introduces the presenter. Andrew Denner then gives a brief introduction to Docker, comparing it to shipping containers, and discusses the benefits of using Docker. He notes some limitations of running Docker as root and introduces the concept of rootless Docker as a more secure alternative, explaining how it works using user namespaces to simulate root access within containers run by non-root users.
Transform Your Communication with Cloud-Based IVR SolutionsTheSMSPoint
Discover the power of Cloud-Based IVR Solutions to streamline communication processes. Embrace scalability and cost-efficiency while enhancing customer experiences with features like automated call routing and voice recognition. Accessible from anywhere, these solutions integrate seamlessly with existing systems, providing real-time analytics for continuous improvement. Revolutionize your communication strategy today with Cloud-Based IVR Solutions. Learn more at: https://thesmspoint.com/channel/cloud-telephony
Artificia Intellicence and XPath Extension FunctionsOctavian Nadolu
The purpose of this presentation is to provide an overview of how you can use AI from XSLT, XQuery, Schematron, or XML Refactoring operations, the potential benefits of using AI, and some of the challenges we face.
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
Measures in SQL (SIGMOD 2024, Santiago, Chile)Julian Hyde
SQL has attained widespread adoption, but Business Intelligence tools still use their own higher level languages based upon a multidimensional paradigm. Composable calculations are what is missing from SQL, and we propose a new kind of column, called a measure, that attaches a calculation to a table. Like regular tables, tables with measures are composable and closed when used in queries.
SQL-with-measures has the power, conciseness and reusability of multidimensional languages but retains SQL semantics. Measure invocations can be expanded in place to simple, clear SQL.
To define the evaluation semantics for measures, we introduce context-sensitive expressions (a way to evaluate multidimensional expressions that is consistent with existing SQL semantics), a concept called evaluation context, and several operations for setting and modifying the evaluation context.
A talk at SIGMOD, June 9–15, 2024, Santiago, Chile
Authors: Julian Hyde (Google) and John Fremlin (Google)
https://doi.org/10.1145/3626246.3653374
SMS API Integration in Saudi Arabia| Best SMS API ServiceYara Milbes
Discover the benefits and implementation of SMS API integration in the UAE and Middle East. This comprehensive guide covers the importance of SMS messaging APIs, the advantages of bulk SMS APIs, and real-world case studies. Learn how CEQUENS, a leader in communication solutions, can help your business enhance customer engagement and streamline operations with innovative CPaaS, reliable SMS APIs, and omnichannel solutions, including WhatsApp Business. Perfect for businesses seeking to optimize their communication strategies in the digital age.
What to do when you have a perfect model for your software but you are constrained by an imperfect business model?
This talk explores the challenges of bringing modelling rigour to the business and strategy levels, and talking to your non-technical counterparts in the process.
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Łukasz Chruściel
No one wants their application to drag like a car stuck in the slow lane! Yet it’s all too common to encounter bumpy, pothole-filled solutions that slow the speed of any application. Symfony apps are not an exception.
In this talk, I will take you for a spin around the performance racetrack. We’ll explore common pitfalls - those hidden potholes on your application that can cause unexpected slowdowns. Learn how to spot these performance bumps early, and more importantly, how to navigate around them to keep your application running at top speed.
We will focus in particular on tuning your engine at the application level, making the right adjustments to ensure that your system responds like a well-oiled, high-performance race car.
Hand Rolled Applicative User ValidationCode KataPhilip Schwarz
Could you use a simple piece of Scala validation code (granted, a very simplistic one too!) that you can rewrite, now and again, to refresh your basic understanding of Applicative operators <*>, <*, *>?
The goal is not to write perfect code showcasing validation, but rather, to provide a small, rough-and ready exercise to reinforce your muscle-memory.
Despite its grandiose-sounding title, this deck consists of just three slides showing the Scala 3 code to be rewritten whenever the details of the operators begin to fade away.
The code is my rough and ready translation of a Haskell user-validation program found in a book called Finding Success (and Failure) in Haskell - Fall in love with applicative functors.
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemPeter Muessig
Learn about the latest innovations in and around OpenUI5/SAPUI5: UI5 Tooling, UI5 linter, UI5 Web Components, Web Components Integration, UI5 2.x, UI5 GenAI.
Recording:
https://www.youtube.com/live/MSdGLG2zLy8?si=INxBHTqkwHhxV5Ta&t=0
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfVALiNTRY360
Salesforce Healthcare CRM, implemented by VALiNTRY360, revolutionizes patient management by enhancing patient engagement, streamlining administrative processes, and improving care coordination. Its advanced analytics, robust security, and seamless integration with telehealth services ensure that healthcare providers can deliver personalized, efficient, and secure patient care. By automating routine tasks and providing actionable insights, Salesforce Healthcare CRM enables healthcare providers to focus on delivering high-quality care, leading to better patient outcomes and higher satisfaction. VALiNTRY360's expertise ensures a tailored solution that meets the unique needs of any healthcare practice, from small clinics to large hospital systems.
For more info visit us https://valintry360.com/solutions/health-life-sciences
What next after learning python programming basics
CIALUG: Encrypt all the things
1. Encrypt all the things
Andrew Denner
February 2018 Central Iowa Linux User’s Group
2.
3. Welcome to CIA LUG
Website: (http://cialug.org)
Email List: (see website)
IRC/Slack: (see website)
Video: Will be posted when it gets uploaded
Slides will be emailed after and at https://denner.co
4. Little about me
Andrew Denner
Email: denner@gmail.com
Website: http://denner.co
Twitter: @adenner
Slides will be posted to https://denner.co
8. Why Encrypt? Why not encrypt?
● You have a laptop
● You deal with information that is sensitive
(PII)
● Healthy Paranoia
● You don’t care about your data
● Performance Hit
● Hard drive failure challenge
● Forget username and password you lose
your data
10. Encrypt by hand…
Ubuntu uses eCryptfs (http://ecryptfs.org/about.html) think of it as PGP as a
filesystem
Screenshots are from
https://www.howtogeek.com/116032/how-to-encrypt-your-home-folder-after-installin
g-ubuntu/
11. You cannot encrypt your account while you are logged in… you need to create a
seperate account in the wheel group
18. GNUPG
Swiss army knife of encryption… can do email, files, etc.
Dates back to Phil Zimmermann’s PGP (Prety Good Privacy)
19.
20. We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
++++++++++..+++++.+++++++++++++++.++++++++++...+++++++++++++++...++++++
+++++++++++++++++++++++++++++.+++++..+++++.+++++.+++++++++++++++++++++++++>.
++++++++++>+++++...........................................................+++++
Not enough random bytes available. Please do some other work to give
the OS a chance to collect more entropy! (Need 284 more bytes)
21. Let’s make some random to fix the problem! (in a
separate window) ls -l -R / would work as well
26. Generate revocation cert
gpg -a --gen-revoke john.doe@example.com >
revocation_cert.gpg
sec 4096R/144A027B 2013-11-04 John Doe
<john.doe@example.com>
Create a revocation certificate for this key? (y/N) y
Please select the reason for the revocation:
0 = No reason specified
1 = Key has been compromised
2 = Key is superseded
3 = Key is no longer used
Q = Cancel
(Probably you want to select 1 here)
Your decision? 1
Enter an optional description; end it with an empty line:
>
Reason for revocation: Key has been compromised
(No description given)
Is this okay? (y/N) y
You need a passphrase to unlock the secret key for
user: "John Doe <john.doe@example.com>"
4096-bit RSA key, ID 144A027B, created 2013-11-04
Revocation certificate created.
Please move it to a medium which you can hide away; if
Mallory gets
access to this certificate he can use it to make your key
unusable.
It is smart to print this certificate and store it away, just in
case
your media become unreadable. But have some caution:
The print system of
your machine might store the data and make it available to
others!