North Bay Linux Users Group

The North Bay Linux Users Group is a computer users serving the San Francisco North Bay and surrounding areas. We strive to promote Linux, Free Software, Open Source, open standards, and to generally have a good time by hosting social events that educate, allow members to share ideas and knowledge and to build friendships.

We hold regular meetings on the second Tuesday of each month with a selected topic presented by a guest speaker. Meetings and membership are free and open to the public. Please sign up for the announce mailing list to receive notifications of upcoming events, or join us on the talk mailing list or in IRC to get help with Linux.

general meeting

OpenStack

When: Tue May 12, 2015 07:30 PM to 09:00 PM

Speaker: Allan Cecil

Location: O'Reilly Media

Description: OpenStack is a set of tools to create a “cloud” infrastructure similar to Amazon’s cloud services to manage virtual machines (called instances) across multiple Compute servers in a cluster managed by one or more Controllers. In this talk I’ll introduce the general concepts of what OpenStack can be used for in an approachable way. I’ll provide an overview OpenStack’s Controller and Compute node model, how instances work, block and image storage, and a general overview of bridged networking into virtual machines. The majority of the talk will be devoted to a live demo of spinning up instances with plenty of time for interactive Q and A.

Published Tue 12 May 2015 by Allan Cecil

general meeting

Hackfest

When: Tue April 14, 2015 07:30 PM to 09:00 PM

Speaker: All of us

Location: O'Reilly Media

Published Tue 14 April 2015 by Allan Cecil

general meeting

Lightning Talks and Hackfest

When: Tue April 14, 2015 07:30 PM to 09:00 PM

Speaker: Open to all

Location: O'Reilly Media

Lightning Talks:

Have something you would like to present, but don’t have enough material for a full talk? Here’s your chance. Talk about anything Linux related.

Hackfest:

Bring your hardware to get help with it or just to show it off.

Published Fri 10 April 2015 by Allan Cecil

general meeting

Tiling Window Managers for X

When: Tue March 10, 2015 07:30 PM to 09:00 PM

Speaker: Tom Most

Location: O'Reilly Media

Description: Window management: it’s one of the places where desktop Linux shines, with an almost overwhelming amount of choice for a newcomer. For those wishing to improve their day-to-day productivity or stop reaching for the mouse all the time, however, venturing into this world is well worthwhile. This talk will provide an overview of the landscape, details on the tiling window manager i3, and some tips on setting up a comfortable environment.

Published Thu 05 March 2015 by Allan Cecil

general meeting

Icecast: Building an Open Source Online Radio Station

When: Tue February 10, 2015 07:30 PM to 09:00 PM

Speaker: Jordan Erickson

Location: O'Reilly Media

In this talk, Jordan Erickson will show you how to build your own online radio station using the open source software Icecast. The talk will include installation and configuration of Icecast and compatible source clients, as well as examples of different listening clients. There will also be discussion around Jordan’s efforts in creating a new Android source client that focuses on open codecs and a Creative Commons broadcast network called Echonet.

Published Fri 23 January 2015 by Tom Most

general meeting

Linux Bridging In a Virtualized Environment

When: Tue January 13, 2015 07:30 PM to 09:00 PM

Speaker: Robert Harker

Location: O'Reilly Media

Linux bridging is one of the seven mysteries of Linux. What is the br0 device and how does it use the NIC? What is virbr0? The answers to these and many other questions will be answered including how virtual instance use bridges and how they interact with the host’s IPtables. The goal of this talk is to give the Linux Sysadmin the understanding needed to configure, use and trouble-shoot Linux bridges.

Robert Harker is a [Linux|UNIX] greybeard sysadmin and one of the first Sun sysadmins. His interests include OS/application configuration management of scaling of server farms with a particular interest in verification of deployments: “How do you know it is correct and running?”

Update: Slides available online

Published Mon 12 January 2015 by Tom Most

general meeting

Anatomy of an Arbitrary Code Execution Exploit

When: Tue December 09, 2014 07:30 PM to 09:00 PM

Speaker: Allan Cecil

Location: O'Reilly Media

Allan writes,

This talk is all about dissecting exactly what happens when a program stops doing what the designers designed it to do and starts doing what an attacker (or in this case, the presenter) wants it to do. I’ll cover using a virtual machine environment of a simple system under Linux to step through all phases of an arbitrary code execution (ACE) exploit, including corrupting a data structure, out-of-bounds memory manipulation, pointer manipulation, and ultimately execution of arbitrary code. I’ll be demonstrating memory viewer and disassembly tools to show the exact instructions being processed as they happen.

The simple system in question? A Zilog Z80 processor, running inside of a Super Game Boy. Come for the dissection, stay for some entertaining abuse of a live SNES console. This will largely be a no slides, full demo presentation and should have something of interest for everyone. See you there!

Published Fri 05 December 2014 by Tom Most

general meeting

Secure Server Deployments in Hostile Territory

When: Tue November 11, 2014 07:30 PM to 09:00 PM

Speaker: Kyle Rankin

Location: O'Reilly Media

It’s easy to secure your servers when they are in the safe confines of your own data center, but deploying servers in the cloud is like dropping them from a helicopter into a jungle across enemy lines without so much as an IP address. This talk will cover how to use Puppet to harden cloud servers including certificate and key management, protecting secrets on your hosts, managing dynamic IPs, and overall security best practices. While a few tips will be specific to Puppet and Amazon AWS, most of the techniques would apply in just about any environment.

Update: Kyle’s slides can be found on his web site.

Published Tue 04 November 2014 by Tom Most

general meeting

Open Conferences

When: Tue October 14, 2014 07:30 PM to 09:00 PM

Speaker: Kevin Ablett

Location: O'Reilly Media

Our speaker writes:

I just spent the last 2 days at Agile Open Northern California. This talk has nothing to do with Linux directly. I intend to talk some about the sessions I attended, but more about the concept of Open Conferences in general.

The presentation will be followed by nominations for NBLUG’s upcoming elections and discussion of this month’s developments: shellshock, etc. All positions are up for election and are listed in the bylaws.

Published Sat 11 October 2014 by Tom Most

general meeting

The Raspberry Pi used to Implement a Radar Speed Sign

When: Tue September 09, 2014 07:39 PM to 09:00 PM

Speaker: Steve Goody

Location: O'Reilly Media

I will give a brief talk about how we used a modified Pocket Radar unit, a Raspberry Pi board, and an HDTV to implement a radar speed sign. The talk will include a brief overview of how the Pocket Radar works and what modifications were done to interface it to the Raspberry Pi. In addition, I’ll explain a little about the webpage development and how it is run on the Raspberry Pi. Also, I’ll cover what software was used on the Raspberry Pi, along with what configuration file changes where done. I will bring a demo system so that people can see the sign in operation.

Published Tue 02 September 2014 by Tom Most

general meeting

Lightning Talks / Hackfest / GPG Key Signing

When: Tue August 12, 2014 07:30 PM to 09:00 PM

Speaker: Frank Ball et al.

Location: O'Reilly Media

Coordinator: Frank Ball

Lightning Talks:

Have something you would like to present, but don’t have enough material for a full talk? Here’s your chance. Talk about anything Linux related.

Hackfest:

Bring your hardware to get help with it or just to show it off.

GPG Key Signing Party:

The point of this is to create a web of trust. By signing someone’s public key, you state that you have checked that the person that uses a certain keypair, is who he says he is and really is in control of the private key. This way a complete network of people who trust each other can be created. This network is called the Strongly connected set. Information about it can be found at http://pgp.cs.uu.nl/

Before the meeting:

Create a GPG keypair, upload your public key to a keyserver, print out the fingerprint, mail it to me (frank@nblug.org) and bring copies to the meeting.

Details:

  1. Generate a public/private keypair with the gpg --gen-key command (accept the defaults), see man gpg for more info.
  2. Upload your key to a keyserver: gpg --send-keys --keyserver keyserver.ubuntu.com
  3. Print out the key “fingerprint” with gpg --fingerprint Also include your full name, email address, and Key ID#. Bring this to the meeting, and optionally make extra copies to hand out.
  4. Email me at frank@nblug.org with the fingerprint, email, full name, and Key ID. I’ll have a list of everyone’s info to hand out.

During the meeting:

Verify your GPG key fingerprint on the list I hand out and verify your identity (with photo ID).

After the meeting:

Download the keys for the fingerprints verified at the meeting, add them to your keyring, sign them, and upload your key again.

More info:

Published Tue 12 August 2014 by Glenn Kerbein

general meeting

Tails

When: Tue July 08, 2014 07:30 PM to 09:00 PM

Speaker: Kyle Rankin

Location: O'Reilly Media

With everything we know now about spying and hacking from the hacker next to you in the coffee shop all the way to government surveillance, now’s as good a time as any to learn how to protect your privacy and anonymity. The Tails project provides a live bootable disk that sets up a secure anonymous session on any computer with all traffic routed over Tor. In this talk Kyle will discuss how to download and verify the latest Tails release, and demonstrate some of the more advanced features of Tails including its persistent encrypted storage.

Published Fri 04 July 2014 by Glenn Kerbein

Page 1 of 9 Less Recent →