Difference between revisions of "VTLUUG:Talks"

From the Linux and Unix Users Group at Virginia Teck Wiki
Jump to: navigation, search
imported>Matthazinski
(Talks people are willing to give)
Line 16: Line 16:
 
* [[User:mutantmonkey | mutantmonkey]] - LDAP
 
* [[User:mutantmonkey | mutantmonkey]] - LDAP
 
* [[User:dyreshark | dyreshark]] - C++11 features
 
* [[User:dyreshark | dyreshark]] - C++11 features
 +
* [[User:Jagged | Jagged]] - Digital is Analog
 
* [[User:Jagged | Jagged]] - RF explained: modulation, antennas, and link budgets
 
* [[User:Jagged | Jagged]] - RF explained: modulation, antennas, and link budgets
 
* [[User:Jagged | Jagged]] - FCC Part 97 vs. Part 15 operation
 
* [[User:Jagged | Jagged]] - FCC Part 97 vs. Part 15 operation

Revision as of 12:14, 21 September 2012

This is a list of talks people would like to see and (unscheduled) talks people are willing to put together if they are nagged. Since there's no dedicated VTCSEC wiki, you can also list talks on this page that you'd like to see given there.

Talks people are willing to give

Talks people would like to see

  • Short presentation of how members use Linux/UNIX in their daily routines, thus making people hear about various tools they didn't know existed/haven't seen used.
  • Samba
  • NFS (including NFS4)
  • NIS
  • Kerberos
  • FDE (both boot disk and external drives)
  • Mutantmonkey's security practices
  • Failover tools for Linux (e.g. CARP)
  • Simple high availability/clustered services in RHEL/CentOS and/or Debian
  • DNS (theory, caching/recursive, brief tutorial on how to make your own on Linux/BSD, DNSSEC)
  • Mail
  • C11 features
  • GSM protocol, how to MITM - potential Cyber Security Club topic
  • MIFARE and iCLASS attacks - potential Cyber Security Club topic
  • Expert level Vim
  • Emacs
  • Timecube
  • X.Org and Wayland
  • DragonFly BSD
  • Sys V Init
  • Systemd

VTCSEC

  • IPSEC
  • PF / IPTables
  • Hardware Crypto
  • Metasploit "advanced" CLI
  • Physical security - Matt
  • IPv6
  • Malware analysis
  • Key signing
  • Botnets
  • Software radio
  • Buffer overflows, etc
  • Social engineering
  • Using CSS to hack Gmail
  • TPMs - dyreshark
  • Forensics