7
0
Fork 0

laurenstest commit

This commit is contained in:
Laurens 2024-02-28 15:23:51 +01:00
commit fef0a149ac
729 changed files with 278 additions and 10551 deletions

BIN
assets/.DS_Store vendored Normal file

Binary file not shown.

View file

@ -1,11 +1,11 @@
# Basisconfiguratie voor de website
baseURL = "https://nluug.nl/"
baseURL = "https://fediversity.eu/"
# Talen
languageCode = "nl"
defaultContentLanguage = "nl"
title = "NLUUG"
title = "nluug"
theme = "nluug"
# Git-ondersteuning, zodat lastmod automatisch wordt ingevuld met data van git.

View file

@ -1,96 +1,28 @@
# Menu-configuratie
[[main]]
identifier = "organisatie"
name = "Organisatie"
pageRef = "/organisatie"
weight = 10
[[main]]
identifier = "organisatie-goals"
name = "Doelstellingen"
url = "/organisatie/doelstellingen/"
parent = "organisatie"
weight = 11
[[main]]
identifier = "organisatie-bestuur"
name = "Bestuur"
url = "/organisatie/bestuur/"
parent = "organisatie"
weight = 12
[[main]]
identifier = "organisatie-commissies"
name = "Commissies"
url = "/organisatie/commissies/"
parent = "organisatie"
weight = 13
[[main]]
identifier = "nluug-award"
name = "NLUUG Award"
url = "/organisatie/nluug-award/"
parent = "organisatie"
weight = 14
[[main]]
identifier = "evenementen"
name = "Evenementen"
url = "/evenementen/"
identifier = "fediversity"
name = "Fediversity"
url = "/Fediversity/"
weight = 20
[[main]]
identifier = "evenementen-kalender"
name = "Kalender"
url = "/evenementen/kalender/"
parent = "evenementen"
weight = 21
identifier = "grants"
name = "Grants"
url = "/Grants/"
weight = 25
[[main]]
identifier = "evenementen-nluug"
name = "NLUUG"
url = "/evenementen/nluug/"
parent = "evenementen"
weight = 22
[[main]]
identifier = "evenementen-sprekers"
name = "Sprekers"
url = "/evenementen/sprekers/"
parent = "evenementen"
weight = 23
[[main]]
identifier = "lidmaatschap"
name = "Lidmaatschap"
url = "/lidmaatschap/"
identifier = "evenementen"
name = "Events"
url = "/evenementen/nluug"
weight = 30
[[main]]
identifier = "lidmaatschap-aanmelden"
name = "Aanmelden"
url = "/lidmaatschap/aanmelden/"
parent = "lidmaatschap"
weight = 31
[[main]]
identifier = "lidmaatschap-ereleden"
name = "Ereleden"
url = "/lidmaatschap/ereleden/"
parent = "lidmaatschap"
weight = 32
[[main]]
identifier = "lidmaatschap-ledendeel"
name = "Inloggen voor leden"
url = "https://leden.nluug.nl/leden/"
parent = "lidmaatschap"
weight = 34
[[main]]
identifier = "nieuws"
name = "Nieuws"
name = "News"
url = "/nieuws/"
weight = 40
@ -100,6 +32,42 @@
url = "/contact/"
weight = 50
[[main]]
identifier = "consortium"
name = "Consortium"
pageRef = "/consortium"
weight = 10
[[main]]
identifier = "consortium-nlnet"
name = "NLnet"
url = "/consortium/nlnet/"
parent = "consortium"
weight = 11
[[main]]
identifier = "consortium-nordunet"
name = "NORDUnet"
url = "/consortium/nordunet/"
parent = "consortium"
weight = 12
[[main]]
identifier = "consortium-oidf"
name = "Open Internet Discourse Foundation"
url = "/consortium/oidf/"
parent = "consortium"
weight = 13
[[main]]
identifier = "consortium-tweag"
name = "Tweag"
url = "/consortium/tweag/"
parent = "consortium"
weight = 14
[[footer]]
identifier = "voorwaarden"
name = "Algemene Voorwaarden"

View file

@ -48,7 +48,7 @@ textNoTitle = "Geen titel 🐦"
textEmptyValue = "Geen waarde 🐦"
# Social
mastodon_instance = "https://nluug.social/"
mastodon_handle = "nluug"
mastodon_instance = "https://mastodon.social/"
mastodon_handle = "fediversity"
# EOF

View file

@ -1,8 +1,8 @@
---
title: "Pagina niet gevonden"
title: "Page not found"
layout: customized-404
slug: 404
type: custom
---
Deze pagina kan niet gevonden worden. Bent u doorverwezen vanaf een andere pagina, dan [horen]({{< relref "contact/" >}}) we dit graag.
This page cannot be found.

21
content/Fediversity.md Normal file
View file

@ -0,0 +1,21 @@
---
categories:
date: 2024-01-28T17:36:06+02:00
description: "The Fediversity Project"
review:
last_review: 2023-06-24
reviewed_by: laurens-hof
period: 90
tags:
- fediversity
slug: fediversity
title: "The Fediversity Project"
---
Fediversity is a comprehensive effort to bring easy-to-use, hosted cloud services with service portability and personal freedom at their core to everyone. It wants to provide everyone with high-quality, secure IT systems for everyday use. Without tracking, without exploitation, in a way that runs everywhere and scales effortlessly. Fediversity is based on NixOS, a disruptive Linux distribution with a unique approach to package and configuration management. Built on top of the Nix package manager, NixOS is completely declarative, makes upgrading systems reliable, and has many other advantages. Because it is reproducible, it is ideally suited for complex deployment scenario's where consistent behaviour, stability and configurability matter.
One such "complex" deployment scenario is running state-of-the-art services for the Fediverse, like PeerTube, Mastodon, Owncast or Lemmy — especially if you want to for instance add services like live chat or transcoding. But even running more traditional services like modern e-mail servers with possible whistles and bells can be daunting. The same holds for deploying a VPN, private cloud storage, wiki, etc. Fediversity will enable all of these use cases, and more — finally bringing these to the market in a way that is as conveient as using a hosted service.
Fediversity is a pilot funded by the European Commission, building on many projects funding through the Next Generation Internet initiative. The results of the project should greatly simplify the creation and delivery of robust and secure services, on the web and beyond.
Fediversity will deliver an ambitious development effort, but this is a vast domain with many more challenges than what any preconceived effort could tackle by itself. This is why we invite your contribution to help us reshape the state of play, and together create an open, trustworthy and reliable internet for all.

21
content/Grants.md Normal file
View file

@ -0,0 +1,21 @@
---
categories:
date: 2024-01-28T17:36:06+02:00
description: "Fediversity Grants"
review:
last_review: 2023-06-24
reviewed_by: laurens-hof
period: 90
tags:
- fediversity
slug: grants
title: "Fediversity Grants"
---
Fediversity invites other people to join this ambitious development effort. It is a vast domain with many more challenges than what any preconceived effort could tackle by itself. This is why we invite your contribution to help us reshape the state of play, and together create an open, trustworthy and reliable internet for all.
This is your opportunity to make a real difference. You tell us how your project can help Fediversity go harder, better, faster, stronger. In order to enable you to make such contributions, NLnet will award 450 000 euro in small to medium-size R&D grants towards solutions that bring the next generation of mobile solutions closer. NLnet is seeking project proposals between 5.000 and 50.000 euro's — which should get you on your way.
Noteworthy fact: many projects which are to be deployed inside Fediversity were themselves bootstrapped on precisely such a grant from NGI, and now it is your turn.
For more information on how to apply, check the [NLnet website](https://nlnet.nl/fediversity/guideforapplicants/)

View file

@ -1,13 +1,15 @@
---
categories:
date: 2023-05-05T19:00:45+02:00
description: "De website van de NLUUG, de vereniging van professionele gebruikers van open systemen en open standaarden"
description: "The website of the Fediversity Project"
slug: index
title: "NLUUG"
title: "Fediversity"
---
NLUUG is een vereniging voor (professionele) gebruikers van UNIX/Linux, Open Source, Open Systemen en Open Standaarden in Nederland. Onder de NLUUG-gemeenschap vallen bijvoorbeeld systeembeheerders, programmeurs en netwerkspecialisten.
Welcome to the Fediversity Project
Ben je als professional bezig met "open", dan is NLUUG de vereniging bij uitstek waar je je technische kennis kunt bijhouden, bijvoorbeeld tijdens onze halfjaarlijkse conferenties. Het [doel van NLUUG](/organisatie/doelstellingen/) is namelijk de verspreiding van de toepassing van en kennis over open standaarden en UNIX/Linux.
Fediversity is a comprehensive effort to bring easy-to-use, hosted cloud services with service portability and personal freedom at their core to everyone. It wants to provide everyone with high-quality, secure IT systems for everyday use. Without tracking, without exploitation, in a way that runs everywhere and scales effortlessly. Fediversity is based on NixOS, a disruptive Linux distribution with a unique approach to package and configuration management. Built on top of the Nix package manager, NixOS is completely declarative, makes upgrading systems reliable, and has many other advantages. Because it is reproducible, it is ideally suited for complex deployment scenario's where consistent behaviour, stability and configurability matter.
NLUUG onderhoudt nauwe banden met vele organisaties en personen die de *open* gedachten nastreven.
One such "complex" deployment scenario is running state-of-the-art services for the Fediverse, like PeerTube, Mastodon, Owncast or Lemmy — especially if you want to for instance add services like live chat or transcoding. But even running more traditional services like modern e-mail servers with possible whistles and bells can be daunting. The same holds for deploying a VPN, private cloud storage, wiki, etc. Fediversity will enable all of these use cases, and more — finally bringing these to the market in a way that is as conveient as using a hosted service.
Fediversity is a pilot funded by the European Commission, building on many projects funding through the Next Generation Internet initiative. The results of the project should greatly simplify the creation and delivery of robust and secure services, on the web and beyond.

View file

@ -0,0 +1,16 @@
---
categories:
- consortium
date: 2023-05-06T13:08:32+02:00
description: "Learn more about the consortium behind the Fediversity Project."
tags:
- consortium
slug:
title: "Consortium"
# show_child_pages: true
---
The Fediversity consortium consists of the Open Internet Discourse Foundation, NLnet, Tweag and NORDUnet.
v2

View file

@ -0,0 +1,16 @@
---
categories:
- consortium
date: 2023-05-06T13:08:32+02:00
description: "Learn more about the consortium behind the Fediversity Project."
tags:
- consortium
slug:
title: "Consortium"
# show_child_pages: true
---
The Fediversity consortium consists of the Open Internet Discourse Foundation, NLnet, Tweag and NORDUnet.
v2

View file

@ -0,0 +1,15 @@
---
categories:
- consortium
date: 2024-01-01T13:08:32+02:00
description: "Learn more about the goals of the Fediversity Project"
review:
last_review: 2024-01-20
reviewed_by: laurens-hof
period: 90
tags:
- consortium
title: "The Fediversity Consortium"
---
main page of the consortium

View file

@ -0,0 +1,17 @@
---
categories:
- consortium
date: 2024-01-01T13:08:32+02:00
description: "Learn more about NLnet"
review:
last_review: 2024-01-20
reviewed_by: laurens-hof
period: 90
tags:
- consortium
title: "NLnet"
---
The [NLnet Foundation](https://nlnet.nl/) supports organisations and people who contribute to an open internet for all. NLnet funds projects that help fix the internet through open hardware, open software, open standards, open science and open data. After its historical contribution to the early internet in Europe in the 1980's, NLnet has been financially supporting the open internet since 1997.
NLnet provides grants to free and open source projects between 5.000 and 50.000 euro with the possibility to scale up. Funding is open to anyone: organisations of any type and individuals. Within NGI Fediversity, NLnet facilitates the open calls for third-party funding and contributes to outreach and dissemination.

View file

@ -0,0 +1,17 @@
---
categories:
- consortium
date: 2024-01-01T13:08:32+02:00
description: "Learn more about NORDUnet"
review:
last_review: 2024-01-20
reviewed_by: laurens-hof
period: 90
tags:
- consortium
title: "NORDUnet"
---
NORDUnet is a collaboration of the National Research and Education Networks of the Nordic countries connecting universities and research institutions across Denmark, Finland, Iceland, Norway, and Sweden. It enables collaboration, data sharing, and access to online resources for academic and research purposes.
Fun fact: the website of NORDUnet, [nordu.net](https://nordu.net/) is the oldest still active domain on the internet.

View file

@ -0,0 +1,15 @@
---
categories:
- consortium
date: 2024-01-01T13:08:32+02:00
description: "Learn more about the Open Internet Discourse Foundation"
review:
last_review: 2024-01-20
reviewed_by: laurens-hof
period: 90
tags:
- consortium
title: "Open Internet Discourse Foundation"
---
more about the Open Internet Discourse Foundation.

View file

@ -0,0 +1,15 @@
---
categories:
- consortium
date: 2024-01-01T13:08:32+02:00
description: "Learn more about Tweag"
review:
last_review: 2024-01-20
reviewed_by: laurens-hof
period: 90
tags:
- consortium
title: "Tweag"
---
Tweag is the open source program office (OSPO) of Modus Create, a global digital consulting firm that helps enterprises build competitive advantage through digital innovation. Tweagers are leading contributors to several open source projects — from functional programming languages to cross-platform frameworks. Tweag has extensive experience working with Nix, and many people at the forefront of the Nix community are Tweagers.

View file

@ -1,10 +1,10 @@
---
categories:
date: 2023-05-07T17:36:06+02:00
description: "Neem contact op met ons bestuur of een commissie aan de hand van de contactgegevens op deze pagina."
date: 2024-01-28T17:36:06+02:00
description: "Get in contact with the people of the Fediversity Project"
review:
last_review: 2023-06-24
reviewed_by: michael-boelen
reviewed_by: laurens-hof
period: 90
tags:
- contact
@ -12,38 +12,10 @@ slug: contact
title: "Contact"
---
Hieronder vindt je alle NLUUG gerelateerde contactinformatie. De administratie van NLUUG draait op vrijwilligers. Daarom geven wij sterk de voorkeur aan communicatie per e-mail.
Below you find all the ways you can contact the people of the Fediversity Project.
Onze vereniging heeft, naast het bestuur, verschillende commissies in wisselende samenstelling van vrijwilligers.
For questions that are about the project in general you can use the main emailadres
* placeholdermail@fediversity.website
* Bestuur: bestuur@nluug.nl
* Beheerteam: beheer@nluug.nl
* Filmteam: filmteam@nluug.nl
* FTP-mirrors en -server: ftp-admin@nluug.nl
* Ledenadministratie: buro@nluug.nl
* Programmacommissie: pc@nluug.nl
* Website: website@nluug.nl
Niet zeker aan wie de e-mail te adresseren? Gebruik dan info@nluug.nl.
## Post
```
NLUUG
Postbus 8189
6710 AD, Ede
Nederland
```
## Contributies
* IBAN: NL28 INGB 0002 3533 18
* Tenaamstelling: NLUUG, te Utrecht
* BIC: INGBNL2A
## Registraties
* KvK: 40533872
* BTW-nummer: NL803474386B01
* Vestiging: Sweelincklaan 8, 6815BH, Arnhem
If you have questions about the funding rounds that are part of the Fediversity project, you can find out more information on the NLnet website:
* https://nlnet.nl/fediversity/guideforapplicants/

View file

@ -1,177 +0,0 @@
---
categories:
- events
content_types:
- article
date: 2023-06-16T16:41:30+02:00
description: "All information related to our Call for Proposals (CFP) is listed on this page, including tips on how to convince our programme committee and event visitors."
review:
last_review: 2023-11-30
reviewed_by: michael-boelen
period: 365
url: events/nluug/cfp/
tags:
- cfp
title: "Call for Proposals (CFP)"
is_event: false
---
We would like to be open about our Call for Proposals (CFP) process. This page describes how our programme committee works and what we like to offer to our speakers. This includes tips to provide an even more convincing submission, so that the chance increases your talk is being accepted.
## Subjects
For our conferences we like the following subjects (and more):
* Automation
* Content Management Systems (CMS)
* Configuration management
* Cryptography and crypto analysis
* Databases
* Home automation
* Information security
* Internet (standards, technical aspects)
* Interesting events and historie
* Netwerk (analyze, firewalls)
* Open source
* Open standards
* Operating systems
* Programming languages
* Privacy
* Software development
* Tools
* Web technology
This list is just an indication of the topics that we typically like to see. But other topics can be still interesting, especially if they are related to recent events or ongoing developments within our field of expertise.
## Format
A default speaker slot is 45 minutes. This includes the time to answer questions. We are considering to accommodate workshops. It is not yet clear how to do so. One example is to add a complete track with two or three workshops.
## Audience
Our audience is technical oriented and includes generalists and specialists. Most have affinity with system administration, often with additional knowledge or specialization. Within this audience we also have people who have a primary focus on software development, while others have management experience or doing project management. Information security is another common interest area for our audience.
## What do we offer speakers?
Speakers will receive the following benefits:
* Free access to our conference
* Lunch, coffee/tea/beverages
* Invitation to join our speakers dinner
### Hardware
By default we have a wireless microphone, big screen with HDMI input and timer. Most speakers use their own notebook, but when needed our organization can provide one. For specific wishes, including other input options, the speaker can consult with our organization to see what is possible.
### Location and facilities
There is an internet connection available within the hotel. Stability of this connection is not guaranteed. We advise speakers to be careful with presentations that rely on a steady internet connection, especially when doing a live demo. Where possible use local resources on your notebook.
We can assist speakers with travel and their stay. Our goal is that speakers don't have to make costs to present at our conference, or at least to limit it as much as possible. Together with the speaker we look at the options. Such arrangments should therefore always been discussed upfront.
## Tips for speakers
We would like to give everyone a good shot in getting selected. Below are tips that may (strongly) increase your chances.
### Basics: title, asbstract, biography, photo
The best submission has a great title and a captivating abstract. The first audience to convice is our programme committee. Upon selection, the conference visitors are the next audience to be convinced. So a good and enticing abstract is as important as a well-prepared talk!
#### Abstract
The abstract itself tells more about the talk itself. Some generic tips:
* Write the abstract like how you would describe the talk to a friend
* Abstracts shouldn't be too long, but at least 10 sentences or more are needed to give readers a good insight on what to expect
* Keep things light and add humour where possible
* Focus on readability, so lines should not be too long. Also be careful with terminology and abbreviations, or at least describe them first.
* Check your text and use a grammar checker
* Let others proofread and provide feedback
To get the attention of the audience, a well-written abstract should answer the following questions:
* What is the goal of the presentation?
* What will I learn when attending it?
* What is the requirement level of the subject (beginner, novice, expert)?
* Is some knowledge required and a prerequisite?
* What is spoken language of the talk?
#### Title
An abstract requires a title. This should entice, yet give a clear indication what the subject is about. Simplicity is often the best, but also humour might have a good place here. Don't make the title too long, while still covering the subject focus properly.
#### Biography
Our programme committee and visitors of the event are interested in the background of a speaker. They might wonder why this is the right person to tell something about a topic. Therefore it is good to adjust the biography to the talk and include relevancy to the subject, besides generic information. A few related questions that are relevant to improve a biography:
* Why is this subject important to you?
* What experience do you have with the subject and do you use it yourself?
* What kind of work do you do? Where did you work before and what kind of roles?
* Did you contribute to specific or public projects?
* What is your experience with open standards and open source?
* Any software or tools that you created? Which ones and are they available?
* Do you write articles or have a blog?
* What are your hobbies or passions? What makes you tick?
* Any social media that you are active on?
A biography is typically written in the third person. Avoid using "I ..." and start with your full name, followed by your first name in any other sentences.
#### Photo
We like to have a complete event leaflet, including a photo of speakers. This way the person behind the name has a face and can be recognized by our organization and audience. We don't have strict requirements regarding the photo, but prefer a good quality photo, especially regarding the size. The photo should be "decent" and typically a photo of your face is the best suitable. Usually a photo that one might use on LinkedIn is also a good fit for submission.
### Too technical is impossible
Our audience loves technical aspects of the field. Therefore it almost impossible to have a talk that is too much in-depth. If you are an expert in some specific field, then feel free to start from the basics and go deeper step by step.
### Interaction with the audience
Visitors to our events are not shy to express their thoughts or ask questions. Any interaction with the audience is appreciated and share when questions are appreciated. Just keep an eye on the remaining time, so that you can finish (most of) your presentation.
### Commercials not appreciated
Our organization and audience does not like sales pitches. So be careful about what you mention when it comes to commercial products or services. Our programme committee will also focus on this and where possible filter out such talks.
### Alternative subjects
In doubt if a topic is still a good match? Feel free to reach out and contact our programma committee!
### Multiple submissions
We encourage participicants to the CFP to submit multiple submissions. This will increase your chances and also gives the programme committee to select a talk that fits with the rest of event schedule.
### Submittion an existing presentation
Already gave the presentation before? Let us know in the submission notes, preferably including a video or the presentation itself. This simplifies the selection and gives us a better insight if there is a good fit.
## Behind the scenes of our programme committee
### Opening of the CFP
After an event closes, the programme committee opens a new Call for Proposals. We use multiple phases and typically in the first phase we start with the the promotion of the event and the CFP. This includes social media and our website.
### Review phase
Since 2023 we use with a new software system (Pretalx). For every submission the members of the programme committee will add a review, including assigning points. Typically this boils down to:
* Yes, this submission is (very) interesting
* Maybe, the submission may need tuning to make it interesting
* No, this talk is not suitable (yet)
During the meetings of the programme committee, the results will be discussed. Talks with a high score are usually the ones that have a greater chance to be selected.
### Sending confirmation and reject messages
When a talk submission looks like a good match, we will send a confirmation message. At this stage we also introduce the speaker to Debbie, our event organizer. She arranges things like travel, hotel, diet wishes, or any other preferences.
When we are not convinced, we let this know by using a reject message. If we are in doubt, then we might contact the speaker to ask a revision or even ask for an alternative topic.
If the speaker has multiple submissions and one of them is selected, the programme committee will inform the speaker what the preferred talk is. The other submissions will then be rejected or possible moved to another event in the future. Another possibility is that we ask the speaker to have a second talk and be one of our backup speakers.
The time of sending out the accept/reject messages depend on the phase that we are in. Especially in the beginning we may wait a while to first gather as much submissions as possible. This gives the programme committee also the chance to reach out to potential speakers. This may include speakers from abroad or those who are a specialist in their field of expertise. When we are getting closer to the event date, it may be possible that we send our early accept messages, especially if the programme committee is fully convinced about the relevance of a talk.
### Publication and event schedule
Upon the approval and confirmation of more submissions, the names of speakers and the title of the talks will be added to the event page. This is also the moment when the event will be promoted, such as on our social media channels. When most slots are filled, the schedule of the event will be created. Typically all related topics will be near each other and depending on the availability of speakers, the order will be defined.
## Code of Conduct
At the request of speakers and active members, the NLUUG uses a [Code of Conduct]({{< relref "huisregels.en.md" >}}) for members and visitors of events.

View file

@ -1,181 +0,0 @@
---
categories:
- evenementen
content_types:
- article
date: 2023-06-16T16:41:30+02:00
description: "Deze pagina beschrijft voor zowel potentiële sprekers als onze programmacommissie hoe we omgaan met een Call for Proposals."
review:
last_review: 2023-11-30
reviewed_by: michael-boelen
period: 365
slug:
tags:
- cfp
title: "Call for Proposals (CFP)"
is_event: false
---
Als vereniging willen graag volledig "open" zijn over onze Call for Proposals (CFP). Op deze pagina beschrijven we hoe de programmacommissie te werk gaat en wat we sprekers bieden. Tevens bevat deze pagina tips om de programmacommissie te overtuigen en een inzending plaats te geven binnen het programma.
## Onderwerpen
Voor onze conferenties en evenementen hebben we voornamelijk interesse in onderstaande onderwerpen.
* Automatisering
* Besturingssystemen
* CMS
* Configuratiemanagement
* Cryptografie en cryptoanalyse
* Databases
* Domotica
* Informatiebeveiliging
* Internet (standaarden, technieken)
* Interessante gebeurtenissen en evenementen
* Netwerk (analyze, firewalls)
* Open source
* Open standaarden
* Programmeertalen
* Privacy
* Softwareontwikkeling
* Tooling
* Webtechnologie
Deze lijst van onderwerpen geeft een idee, echter sluit overige onderwerpen zeker niet uit. Presentaties over actualiteit, interessante projecten of die erg vermakelijk zijn worden eveneens gewaardeerd door onze programmacommissie.
## Formaat
Binnen het programma duren presentaties standaard 45 minuten. Deze tijd is inclusief het beantwoorden van eventuele vragen. Tevens wordt er nagedacht over de invulling van workshops, bijvoorbeeld een hele aparte track waarbij er twee of drie workshops na elkaar kunnen plaatsvinden.
## Publiek
Onze bezoekers zijn over het algemeen (zeer) technisch georiënteerd, daarbinnen zitten zowel generalisten als specialisten. Het merendeel heeft affiniteit met systeembeheer, vaak met aanvullende kennis of specialisaties. Een deel van de bezoekers heeft een primaire focus op softwareontwikkeling, terwijl er ook een groep is met ervaring binnen management of het leiden van projecten. Ook informatiebeveiliging is voor veel van de bezoekers geen onbekend terrein.
## Wat bieden we sprekers?
Sprekers ontvangen standaard het volgende:
* Sprekersbadge met toegang tot de gehele conferentie
* Lunch, koffie/thee/fris
* Uitnodiging voor het sprekersdiner
### Hardware
Voor sprekers hebben we standaard een draadloze microfoon, groot scherm met HDMI-aansluiting en een tijdklok tot beschikking. De meeste sprekers gebruiken hun eigen notebook, maar de organisatie kan dit ook verzorgen. Als dat gewenst is, dan dient de spreker dit vooraf bij de organisatie bekend te maken. Dat geldt ook voor een andere aansluiting dan HDMI, zodat de juiste voorbereidingen getroffen kunnen worden.
### Locatie en faciliteiten
In het hotel is een internetverbinding aanwezig, maar ervaring leert dat er geen garanties gegeven kunnen worden wat betreft de stabiliteit. Als organisatie adviseren we sprekers daarom om de afhankelijkheid van een internetverbinding te beperken. Presentaties en demo's kunnen het beste dus lokaal op het (eigen) systeem draaien.
Sprekers kunnen we ondersteunen met het vervoer en verblijf. Ons doel is dat sprekers (waar mogelijk) geen kosten hoeven te maken om bij ons te presenteren. Qua vervoer en verblijf in het hotel kijken we daarom naar de afstand die een spreker dient af te leggen om op onze locatie te arriveren. Buitenlandse sprekers hebben daarmee eerder recht op een hotelovernachting of zelfs vliegticket. Deze dienen wel altijd vooraf afgestemd te worden met de organisatie.
## Tips voor sprekers
Uiteraard willen wij als organisatie de kans voor iedereen vergroten om een presentatie te komen geven. We hebben diverse tips voor iedereen die een inzending overweegt.
### De basis: titel, abstract, biografie, foto
We verlangen van iedere inzending een titel en een spetterende en wervende abstract. In de eerste instantie is deze gericht om de programmacommissie te overtuigen dat het een geschikte lezing is. Na goedkeuring krijgt de belangrijkste groep de abstract te zien: de bezoekers. Een goedgeschreven abstract is daarom even belangrijk als een goed voorbereide presentatie.
#### Abstract
Een abstract dient duidelijk geschreven te zijn en de lezer te prikkelen. Wat algemene tips:
* Schrijf het abstract alsof je het aan een goede bekende zou beschrijven
* Een abstract hoeft zeker geen proza te worden, maar 10 regels of meer vormt een goede basis
* Hou het taalgebruik luchtig en gebruik humor waar dat passend is
* Gebruik niet te lange zinnen en pas op met teveel terminologie en technische afkortingen
* Controleer de tekst en gebruik spellingscontrole
* Laat gerust een bekende het abstract lezen
Een goed abstract zal de volgende vragen bij onze bezoekers beantwoorden:
* Wat is het doel van deze presentatie?
* Wat ga ik leren door deze lezing bij te wonen?
* Op wie of welk niveau is deze lezing gericht?
* Is er bepaalde voorkennis nodig?
* In welke taal zal de presentatie worden gegeven?
#### Titel
Onderdeel van de abstract is de bijbehorende titel. Deze dient te prikkelen, maar wel een duidelijke referentie te hebben naar het onderwerp. Soms is eenvoud het beste, soms een titel met de nodige humor. Maak de titel niet te lang, maar wel dat deze de lading van de presentatie dekt.
Heb je geen inspiratie voor je titel? Maak dan eerst het abstract compleet en kijk eens tussen de lezingen van voorgaande jaren op onze website.
#### Biografie
De programmacommissie en onze bezoekers willen weten wie een spreker is. Waarom is dit de juiste persoon om iets over een bepaald onderwerp te vertellen? Het is daarom raadzaam om je biografie aan te passen aan het onderwerp en relevante ervaringen te vermelden. Uiteraard willen we graag wat meer weten over jou als spreker. Een aantal vragen die je je kan afstellen tijdens het schrijven van de biografie:
* Waarom is het onderwerp van de presentatie belangrijk voor je?
* Welke ervaring heb je ermee of hoe pas je het zelf toe?
* Wat doe je voor werk of waar heb je gewerkt? Wat voor functie(s)?
* Heb je iets bijgedragen aan speciale of publieke projecten?
* Wat heb je zelf met open standaarden en open source?
* Heb je software geschreven? Zo ja, welke namen?
* Schrijf of blog je wel eens iets?
* Waar kunnen we meer over over je lezen?
* Heb je relevante hobby's en passies? Wat drijft je?
* Op welke social media ben je actief?
Voor de leesbaarheid is het aan te raden om de biografie in een derde persoon te schrijven. In plaats van "Ik ...", begin je dan met "[Voornaam achternaam] ..." en gebruik je je voornaam in vervolgzinnen.
#### Foto
Op onze website en programmaboekje willen we graag een compleet geheel hebben. Daar hoort natuurlijk een foto bij, zodat het gezicht achter de presentatie ook bekend is. We stellen geen harde eisen aan de foto, maar waarderen het wel als de kwaliteit en formaat groot genoeg is. Uiteraard verwachten we een "degelijke" foto en meestal is een foto van het gezicht dan ook het meest geschikt. Een foto die iemand bijvoorbeeld op LinkedIn zou gebruiken, voldoet vaak.
### Te technisch kan niet
Gezien ons publiek over het algemeen een stevige technische basis heeft, is het nagenoeg onmogelijk om een presentatie te geven die teveel techniek bevat. Ben je specialist en heb je een interessant verhaal, ga dan gerust (opbouwend) de diepte in.
### Dialoog met publiek
We hebben een mondig publiek dat niet bang is vragen te stellen of een debat te starten. We stellen het op prijs als interactie met het publiek wordt opgezocht. Als spreker is het wel zaak om duidelijk aan te geven wanneer vragen gesteld kunnen worden en om over de beschikbare tijd te waken.
### Presentaties met commerciële boodschap
Verkooppraatjes worden niet gewaardeerd. Het aanbevelen van commerciële producten of diensten zal dus ook niet in de smaak vallen bij onze bezoekers. De programmacommissie doet haar best om dit soort presentaties voortijdig te screenen.
### Alternatieve onderwerpen
Twijfel je of een onderwerp wel goed past? Neem dan gerust eerst contact op met onze [programmacommissie]({{< relref "organisatie/commissies/pc/index.md" >}}).
### Meerdere inzendingen zijn welkom
Een spreker die meerdere inzendingen indient maakt over het algemeen meer kans om geselecteerd te worden. Vaak kiest de programmacommissie een inzending die het beste bij de rest van het programma past of het meest aanspreekt. Een onderwerp dat actueel zou de voorkeur kunnen hebben.
### Eerder gegeven presentaties
Heb je de presentatie al eerder gegeven? Dan horen we dat graag, het liefst inclusief een video en/of presentatie. Zo kunnen we de inzending nog eenvoudiger beoordelen qua inhoud.
## Werkwijze programmacommissie
### Openen CFP
Nadat een conferentie is geweest, opent de programmacommissie een nieuwe Call for Proposals. We gebruiken hierbij meerdere fasen. In de eerste fase starten we met de promotie van de conferentie en delen we de CFP op onder andere social media en de website.
### Beoordelen van inzendingen
Sinds 2023 werken we met nieuwe CFP-software (Pretalx) en een nieuw systeem. Hierbij laten leden van de programmacommissie een review achter per inzending. Tevens krijgt iedere inzending een beoordeling. Deze beoordeling komt neer op drie mogelijkheden:
* Ja, deze inzending is interessant
* Twijfel, heeft mogelijk nog extra aanpassing nodig
* Nee, helaas (nog) niet geschikt
Tijdens onze PC-vergaderingen bespreken we de uitkomst van deze beoordelingen. Inzendingen die we overwegend positief beoordelen hebben een grote kans om geselecteerd te worden.
### Bevestigen en afkeuren van inzendingen
Als we positief gestemd zijn over een inzending gaan we over tot bevestiging. We versturen dan een bevestiging en introduceren [Debbie]({{< relref "organisatie/personen/debbie-reinders/index.md" >}}), die ons helpt met de organisatie van de evenementen. Hierbij valt de denken aan zaken zoals een eventuele hotelovernachting, dieetwensen of andere voorkeuren.
Het kan natuurlijk ook gebeuren dat we minder enthousiast zijn over een inzending. In dat geval laten we dat ook weten en waar het kan met een korte onderbouwing. Als de inzending volgens ons een twijfelgeval is, kan het zijn dat we vragen om het abstract te herzien of zelfs een alternatief onderwerp te kiezen.
Als een inzending wordt geselecteerd en de betreffende spreker heeft meerdere inzendingen ingediend, dan laat de programmacommissie haar voorkeur weten. De andere inzending(en) van die spreker komen dan te vervallen of worden doorgezet naar een volgende evenement. Eventueel kan een spreker worden gevraagd een ander onderwerp als backup te houden, bijvoorbeeld bij uitval van een andere spreker.
Het moment van bevestigen is afhankelijk in welke fase we zitten. Vooral in het begin sparen we de inzendingen even op, zodat we als programmacommissie ook de tijd hebben om zelf potentiële sprekers te benaderen. Denk hierbij aan buitenlandse sprekers die wellicht nog niet bekend zijn met onze vereniging, maar vaak ervaren sprekers binnen een specifiek onderwerp zijn. Naarmate we dichter bij de conferentie komen kan het zijn dat we tussendoor al sprekers bevestigen, zeker als het merendeel van de programmacommissie zeer positief is over een inzending.
### Publiceren sprekers en opstellen programma
Naarmate steeds meer inzendingen worden bevestigd, zullen de namen van de sprekers worden opgenomen op de pagina van het evenement. Dit is ook het moment waarop de het evenement steeds meer gaan promoten. Als we (bijna) alle beschikbare sloten hebben gevuld, dan zullen we het programma gaan samenstellen. De sloten worden dan zodanig ingevuld dat we zo goed mogelijk vergelijkbare onderwerpen in dezelfde track plaatsen en tevens rekening houden met wensen van sprekers.
## Huisregels
Op verzoek van sprekers en actieve leden heeft NLUUG [huisregels]({{< relref "huisregels.md" >}}) opgesteld voor haar leden en bezoekers van evenementen.

View file

@ -1,243 +0,0 @@
---
categories:
- conferenties
- evenementen
date: 2017-11-16T20:17:47+02:00
description: "De NLUUG najaarsconferentie heeft plaatsgevonden op donderdag 16 november 2017. Bekijk hier het programma, de presentaties, opnames en foto's."
is_event: true
tags:
- conferenties
slug:
title: "NLUUG najaarsconferentie 2017"
layout: schedule-event
event_title: "NLUUG najaarsconferentie 2017"
event_start: 2017-11-16T08:30:00+02:00
event_end: 2017-11-16T18:00:00+02:00
event_timezone: Europe/Amsterdam
event_location: Postillion Hotel Bunnik
event_address:
street_address: "Baan van Fectio 1"
postal_code: "3981 HZ"
city: "Bunnik"
country_name: "The Netherlands"
event_organizers:
- organizer:
id: nluug
name: NLUUG
event_attendance_mode: "offline"
event_images:
- /afbeeldingen/locaties/bunnik/postillion-hotel-bunnik-baan-van-fectio.jpg
event_description: "Najaarsconferentie 2017 van de vereniging NLUUG in het Postillion Hotel te Bunnik"
event_members_only: true
event_register_link: "https://nluug.nl/aanmelden/index.cgi?action=event"
event_status: "scheduled"
event_schedule:
title: Programma
description:
columns: 4
headers:
- header:
width: 10
- header:
text: Zaal 1
center: true
width: 30
- header:
text: Zaal 2
center: true
width: 30
- header:
text: Zaal 3
center: true
width: 30
rows:
- row:
columns:
- column:
time: 08:30
- column:
textfield:
text: Inschrijving, ontvangst, koffie
size: 3
center: true
- row:
columns:
- column:
time: 09:15
- column:
textfield:
text: Openingswoord
center: true
size: 3
- row:
columns:
- column:
time: 09:30
- column:
talk:
speaker: Teus Hagen
title: "NLUUG: 35 tinten grijs"
keynote: true
link:
center: true
size: 3
- row:
columns:
- column:
time: 10:30
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 11:00
- column:
talk:
speaker: Sake Blok
title: "Challenge: Can you esPcape?"
link:
- column:
talk:
speaker: Mike Place
title: Introduction to Event-Driven Linux Systems Management with SaltStacke
link:
- column:
talk:
speaker: Vesna Manojlovic
title: "Ethics in Technology"
link:
- row:
columns:
- column:
time: 11:50
- column:
talk:
title: Vervolg Challenge Sake Blok
link:
- column:
talk:
speaker: Jan-Piet Mens
title: "Introducing Ansible AWX - The Open Source 'Tower'"
link:
- column:
talk:
speaker: Jelle Niemantsverdriet
title: We don't need no security!
link:
- row:
columns:
- column:
time: 12:35
- column:
textfield:
text: Lunch
center: true
size: 3
- row:
columns:
- column:
time: 13:15
- column:
- column:
textfield:
text: NLUUG Algemene Ledenvergadering (ALV)
center: true
- column:
- row:
columns:
- column:
time: 14:00
- column:
talk:
speaker: Rudi van Drunen
title: "Things on the Internet: An introduction to the REAL world"
link:
- column:
talk:
speaker: Noud Aldenhoven
title: "An Overview of Deep Learning and its Open Source Tools"
link:
- column:
talk:
speaker: Per Buer
title: "Unikernels; what are they and what are the security implications?"
link:
- row:
columns:
- column:
time: 14:50
- column:
talk:
speaker: Daniel Kiper
title: "EFI Secure Boot, shim, GRUB2"
link:
- column:
talk:
speaker: Ed Schouten en Ron Lievens
title: "Google's BigTable en Apache Cassandra"
link:
- column:
talk:
speaker: Bart Jacobs
title: "Attribuut-gebaseerde authenticatie met IRMA"
link:
- row:
columns:
- column:
time: 15:35
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 16:00
- column:
talk:
speaker: John van Krieken
title: "What's up in modern C++"
link:
- column:
talk:
speaker: Willem Jan Withagen
title: "Ceph on FreeBSD"
link:
- column:
talk:
speaker: Ben Gras
title: "MMU Cache Side Channel Attack: Breaking ASLR from a Javascript Sandbox"
link:
- row:
columns:
- column:
time: 16:50
- column:
talk:
speaker: Anne Jan Brouwer en Bas van Sisseren
title: SHA2017 badge
link:
- column:
talk:
speaker: Christine Yen
title: "Everything is Up! (and other useful myths)"
link:
- column:
talk:
speaker: Daan Keuper
title: Car Hacking
link:
- row:
columns:
- column:
time: 17:35
- column:
textfield:
text: Borrel, gesponsord door SNOW
center: true
size: 3
---

View file

@ -1,258 +0,0 @@
---
categories:
- conferenties
- evenementen
date: 2018-11-15T16:08:58+02:00
description: "De NLUUG najaarsconferentie heeft plaatsgevonden op donderdag 15 november 2018 in het Van der Valk Hotel Utrecht."
is_event: true
tags:
- conferenties
slug:
title: "NLUUG najaarsconferentie 2018"
layout: schedule-event
event_title: "NLUUG najaarsconferentie 2018"
event_start: 2018-11-15T08:30:00+02:00
event_end: 2018-11-15T18:00:00+02:00
event_timezone: Europe/Amsterdam
event_location: Van der Valk Hotel Utrecht
event_organizers:
- organizer:
id: nluug
name: NLUUG
event_attendance_mode: "offline"
event_images:
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
event_description: "Najaarsconferentie 2018 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
event_address:
street_address: "Winthontlaan 4-6"
postal_code: "3526 KV"
city: "Utrecht"
country_name: "The Netherlands"
event_members_only: true
event_status: "scheduled"
event_schedule:
title: Programma
description:
columns: 4
headers:
- header:
width: 10
- header:
text: Zaal 1
center: true
width: 30
- header:
text: Zaal 2
center: true
width: 30
- header:
text: Zaal 3
center: true
width: 30
rows:
- row:
columns:
- column:
time: 08:30
- column:
textfield:
text: Inschrijving, ontvangst, koffie
size: 3
center: true
- row:
columns:
- column:
time: 09:15
- column:
textfield:
text: Openingswoord
center: true
size: 3
- row:
columns:
- column:
time: 09:30
- column:
talk:
speaker: John Yani Arrasjid
title: "Cloud Evolution and Revolution: Catering for Mission Critical Workloads"
keynote: true
link: talks/john-arrasjid-cloud-evolution-and-revolution/
center: true
size: 3
- row:
columns:
- column:
time: 10:30
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 11:00
- column:
talk:
speaker: Pieter Jenniskens
title: "Microservices, containers and Kubernetes"
link: talks/pieter-jenniskens-microservices-containers-and-kubernetes/
- column:
talk:
speaker: Jan-Piet Mens
title: The Story of OwnTracks
link: talks/jan-piet-mens-the-story-of-owntracks/
- column:
talk:
speaker: Martijn van Lom
title: "Fragile cyber-world: will fragmentation kill cybersecurity?"
link: talks/martijn-van-lom-fragile-cyber-world-will-fragmentation-kill-cybersecurity/
- row:
columns:
- column:
time: 11:45
- column:
size: 3
- row:
columns:
- column:
time: 11:50
- column:
talk:
speaker: Olaf Molenveld
title: "How to use smart canary releasing for containers to increase velocity and reduce issues"
link: talks/olaf-molenveld-how-to-use-smart-canary-releasing-for-containers-to-increase-velocity-and-reduce-issues/
- column:
talk:
speaker: Dag Wieers
title: "Managing complex infrastructure in lab environments using Ansible"
link: talks/dag-wieers-managing-complex-infrastructures-in-lab-environments-with-ansible/
- column:
talk:
speaker: Tom Tervoort
title: "The road to TLS 1.3"
link: talks/tom-tervoort-the-road-to-tls-13/
- row:
columns:
- column:
time: 12:35
- column:
textfield:
text: Lunch
center: true
size: 3
- row:
columns:
- column:
time: 13:15
- column:
textfield:
text: NLUUG ALV
center: true
size: 3
- row:
columns:
- column:
time: 14:00
- column:
talk:
speaker: Hagen Bauer
title: Secure your Networks with the Opensource Firewall pfSense
link: talks/hagen-bauer-secure-your-networks-with-the-opensource-firewall-pfsense/
- column:
talk:
speaker: Kees Meijs
title: "Cloud construction at Nefos"
link: talks/kees-meijs-cloud-construction-at-nefos/
- column:
talk:
speaker: Slawek Wojtczak
title: ZFS Boot Environments
link: talks/slawek-wojtczak-zfs-boot-environments/
- row:
columns:
- column:
time: 14:45
- column:
size: 3
- row:
columns:
- column:
time: 14:50
- column:
talk:
title: Vervolg talk Hagen Bauer
link:
- column:
talk:
speaker: René Ladan
title: "Decoding the DCF77 time signal on a Raspberry Pi"
link: talks/rene-ladan-decoding-the-dcf77-time-signal-on-a-raspberry-pi/
- column:
talk:
speaker: Arjan Widlak
title: The Digital Cage
link: talks/arjan-widlak-the-digital-cage/
- row:
columns:
- column:
time: 15:35
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 16:00
- column:
talk:
speaker: "Sylvia van Os, Thijs van der Gugten en Tom Scholten"
title: Saltstack workshop
link:
- column:
talk:
speaker: Benjamin Martin
title: "FileSender: Sharing large files across research facilities"
link: talks/benjamin-martin-filesender-sharing-large-files-across-research-facilities/
- column:
talk:
speaker: Mischa Peters
title: What Every Security Professional Should Know About the Dark Web
link: talks/mischa-peters-what-every-security-professional-should-know-about-the-dark-web/
- row:
columns:
- column:
time: 16:45
- column:
size: 3
- row:
columns:
- column:
time: 16:50
- column:
talk:
title: "Vervolg workshop Sylvia van Os, Thijs van der Gugten en Tom Scholten"
link:
- column:
talk:
speaker: Mike Ciavarella
title: "Shaved Yaks: Saving an Endangered Species"
link: talks/mike-ciavarella-shaved-yaks-saving-an-endangered-species/
- column:
talk:
speaker: Ben Gras
title: "TLBleed: When Protecting Your CPU Caches is Not Enough"
link: talks/ben-gras-tlbleed-when-protecting-your-cpu-caches-is-not-enough/
- row:
columns:
- column:
time: 17:35
- column:
textfield:
text: Borrel, gesponsord door Snow
center: true
size: 3
---

View file

@ -1,31 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- information-architecture
title: "Arjan Widlak - The Digital Cage"
speakers:
- arjan-widlak
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=gTL3-VaF89Q
---
## Abstract
In the Digital Cage we follow three Dutch citizens, Saskia, Pieter and Esther, who seem to have been struck by fate. Saskia is obliged to have her stolen car inspected. Because she cannot comply, she is haunted by government with fines and gets into debt. If model-citizen Esther is abroad too often for her work, she loses almost everything, from her parking permit to her voting rights. Like in a Kafka-novel we discover how registries and data exchange are no neutral actors, but that we have build with ignorance and negligence a digital cage that keeps larger and larger groups invisibly imprisoned.
The sharing of information is the backbone of government services today. However we have lost control. We do not know how uses these data and we have no idea about the consequences of an error in registration. In this talk Arjan shows how the information architecture has rendered government blind for the problems it causes with citizens and is unable to correct errors.
The Digital Cage is a book published earlier this year, written by Arjan Widlak and Rick Peeters on maladministration (onbehoorlijk bestuur) caused by information architecture and one of a series of papers. This lecture is an introduction into this theme. The book also contains the "ten principles of good digital government" to give the citizen a voice and central place again in the digital government. It's a must-read for every government professional.
## Biography
Arjan Widlak is director and researcher at the Kafka Brigade Foundation. The Kafka Brigade is an action research organization that aims to tackle bureaucratic dysfunction and red tape which prevents people from accessing the services they need and which constrains and frustrates public service staff. The Kafka Brigade Netherlands coordinates the sister organizations and associated researchers in several countries.
Arjan is developer of several serious games concerning complex decision making. His simulations are used by businesses, governments and universities in various countries. He teaches in several program's and masterclasses about wicked problems, standardization, negotiation and ICT and the transformation of government.

View file

@ -1,32 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- cryptography
- tlbleed
title: "Ben Gras - TLBleed, when Protecting Your CPU Caches is Not Enough"
speakers:
- ben-gras
presentation:
filename: 2018-11-15-ben-gras-tlbleed-when-protecting-your-cpu-caches-is-not-enough.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=d63I7fHdI_U
---
## Abstract
We present TLBleed, a novel side-channel attack that leaks information out of Translation Lookaside Buffers (TLBs). TLBleed shows a reliable side channel without relying on the CPU data or instruction caches. This therefore bypasses several proposed CPU cache side-channel protections, such as page coloring, CAT, and TSX.
Our TLBleed exploit successfully leaks a 256-bit EdDSA key from cryptographic signing code, which would be safe from cache attacks with cache isolation turned on, but would no longer be safe with TLBleed. We achieve a 98% success rate after just a single observation of signing operation on a co-resident hyperthread and just 17 seconds of analysis time. Further, we show how another exploit based on TLBleed can leak bits from a side-channel resistant RSA implementation.
We use novel machine learning techniques to achieve this level of performance. These techniques will likely improve the quality of future side-channel attacks. This talk contains details about the architecture and complex behavior of modern, multilevel TLB's on several modern Intel microarchitectures that is undocumented.
## Biography
Ben Gras has been in the systems security research group of the VU Amsterdam since 2015. He has worked on software reliability, defensive research projects, and most recently, offensive research. Offensive research was most noticeably making cross-VM Rowhammer exploitation reliable and a cache-based ASLR-breaking MMU sidechannel attack, both of which have been widely reported on, perhaps most prominently in Wired and Arstechnica. At Cisco, he developed a infrastructure-as-a-target defensive system.
Ben is currently working on a PhD in systems security research. He is frequently asked for expert commentary on cpu flaws, most recently by Wired.com, BBC, Dutch national newspapers, and HBO Vice news tonight.

View file

@ -1,33 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- filesender
- files
title: "Benjamin Martin - FileSender: sharing large files across research facilities"
speakers:
- benjamin-martin
presentation:
filename: 2018-11-15-benjamin-martin-filesender-sharing-large-files-across-research-facilities.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=tzxnNGv9ObE
---
## Abstract
The FileSender project allows large files (100gb+) to easily be shared with people at other companies and research facilities. Uploads and downloads occur in the browser and files can be uploaded to a FileSender hosted at your organization or you can be invited as a guest to another research facility installation. Optional end to end encryption keeps the data secure from users on the server, all crypto is done in the browser keeping it simple and secure for users.
While a raw http and ftp server can be used to share files, many non technical users will not have access to upload and administer one of these servers. Access control to only selected users and automatic expiration of hosted files might be difficult for users more interested in research which is outside the IT field.
FileSender supports push and pull models. To push, if you have access to a FileSender installation you can upload the file to it and inform those who you want to access the data to allow them to obtain it. To pull a file, you can create a guest on your FileSender install and invite a user to upload the data there. Guests can be subjected to specific access control, for example, only uploading a single file, and only to you.
I would love to talk about the challenges the FileSender project tries to address, the php/js code that comprise it, the history, and development of FileSender. I think it is a useful project to know and use in research and commercial environments and would love to hear feedback on where the project might want to move in the future.
## Biography
Dr Martin is the creator of libferris and loves to push the envelope of what a filesystem can do. He loves to build robots, cnc machines, and tinker with electronics. He has a long history with open source, including many ODF projects and a core contributor to FontForge for many years and is now the project lead for FileSender.

View file

@ -1,31 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- ansible
title: "Dag Wieers - Managing complex infrastructures in lab environments with Ansible"
speakers:
- dag-wieers
presentation:
filename: 2018-11-15-dag-wieers-managing-complex-infrastructures-in-lab-environments-with-ansible.pdf
recording:
platform: youtube
url:
---
## Abstract
This presentation looks at how we started managing lab environments in a Cisco TAC support team. We will look into the specific requirements for lab environments to better support teams and customers. We will visit the business case and eventually the technical solution and end-up with using Ansible.
This presentation touches Linux, Windows, network automation, and also hardware devices and other interfaces that may not have been designed for automation.
Warning: attendants to this presentation may be exposed to flashes of YAML, Jinja, Python, and PowerShell. The faint of heart should probably skip this session.
## Biography
Dag Wieers is a freelance Linux and Open Source consultant, having worked for various international companies (mostly, in technology, banking, broadcasting and telecom markets).
His main competencies include architecting and automating workflow, systems management, documentation and knowledge transfer and leading technical teams. He loves lightweight processes and keeping it simple.

View file

@ -1,33 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- pfsense
title: "Hagen Bauer - Secure your Networks with the Opensource Firewall pfSense"
speakers:
- hagen-bauer
presentation:
filename: 2018-11-15-hagen-bauer-secure-your-networks-with-the-opensource-firewall-pfsense.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=9PQ6HGpTkso
---
## Abstract
Firewall and network security are a core element of IT (or at least should be). When it comes to the requirements of this crucial component of your infrastructure you should not count on your provider or a manufacturer name. Especially small organizations tend to ignore the risks due to the expected costs and complexity of enterprise devices.
The pfSense firewall is an high performance firewall for the growing needs to this vital element. The software provides functions like high availability, traffic shaping, vpns, network segmentation that are normally only provided by expensive enterprise products.
This way also small organizations and the advanced home office configurations can implement this enterprise capabilities.
In this double talk we will show the need for a new approach, how you can convince your decision makers and demonstrate how easy it is to set up such a configuration in typical use cases without any significant investments.
## Biography
Hagen Bauer can look back on more then 15 year of experience in the areas of open source content management, system administration and ecommerce. His personal mission is to help organisation of any size to deploy recent innovations in open source to reduce complexity and secure IT.
He holds a masters (Diplom-Informatiker) in computer science, is an Open Group Distinguished IT Specialist and certified pfSense administrator. He is a frequent speaker at open source and enterprise software conferences for the last 20 years.

View file

@ -1,29 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- owntracks
title: "Jan-Piet Mens - The Story of OwnTracks"
speakers:
- jan-piet-mens
presentation:
filename: 2018-11-15-jan-piet-mens-the-story-of-owntracks.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=ZOkit8TVUd8
---
## Abstract
OwnTracks let you track your own location (hence the name) via your own equipment. It is an Open Source project which produces Android and iOS apps.
In this talk, we tell you a bit about the crazy idea of how OwnTracks came to be, and some of the applications we've know people are using it for. We'll show you some of the eco-system around it. OwnTracks also produces a "protocol" which is implemented in the Recorder and for openHAB and Home Assistant, Traccar, etc.
## Biography
Jan-Piet Mens is an independent Unix/Linux consultant and sysadmin who's worked with Unix-systems since 1985. Jan-Piet does odd bits of coding, and has architected infrastructure at major customers throughout Europe.
One of his specialities is the Domain Name System and as such, he authored the book Alternative DNS Servers as well as a variety of other technical publications, and he launched the MQTT-based Open Source OwnTracks project.

View file

@ -1,33 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- cloud
- workloads
title: "John Yani Arrasjid - Cloud Evolution and Revolution: Catering for Mission Critical Workloads"
speakers:
- john-yani-arrasjid
presentation:
filename: 2018-11-15-john-yani-arrasjid-cloud-evolution-and-revolution-catering-for-mission-critical-workloads.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=sh0QeMAUt_o
---
## Abstract
John Yani Arrasjid presents on the evolution of cloud. He uses his perspective as an infrastructure architect for virtualization and cloud, and findings from his research in the Dell EMC and Virtustream offices of the CTO.
Mission critical workloads now run in the cloud based on technical capabilities and automation supporting high SLAs for the enterprise. Mission critical workloads are expecting support for hybridity (on- and off-premise) and multi-cloud (providing choice). New types of mission critical workloads include AI, healthcare, transportation, and industrial IoT.
The cloud is no longer just a sandbox. The capabilities offered through software defined technologies, partnership between IT and OT (Operational Technology) teams, and higher levels of automation and self-healing infrastructures based on machine learning. Examples presented are not exclusive to what is available.
## Biography
John Yani Arrasjid currently works in the Virtustream Office of the CTO, handling the technical relationship with VMware and Dell EMC, and working on advanced research areas for cloud solutions, including industrial IoT, AI, and secure ledger in a cloud for mission critical workloads.
John spent twelve years at VMware focusing on architect enablement, consulting solutions, development of the VCDX program, and the lead architect for the vCloud Architecture Toolkit.
John holds the first VCDX certification, and has published 6 books around virtualization, cloud, and IT infrastructure design. John has also spent 6 years on the USENIX Association Board of Directors, including his role as Vice President.

View file

@ -1,33 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- cloud
- openstack
- ceph
title: "Kees Meijs - Cloud construction at Nefos"
speakers:
- kees-meijs
presentation:
filename: 2018-11-15-kees-meijs-cloud-construction-at-nefos.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=83Sc8zQtjCY
---
## Abstract
This talk (in Dutch) is about Kees journey at Nefos towards a fully functional implementation of OpenStack in a public environment.
We start with the search for scale-out storage, going in production with Ceph, later on improving with SSDs and such. Continuing with systems architecture in terms of networking and OpenStack components. Pitfalls, maybe some war stories and thoughts about where to go from hereon. In short not a comprehensive guide how to build a OpenStack cloud, but a real-life tale how its done and not done at Nefos.
Obviously theres room for discussion and to ask questions along the way.
## Biography
Back in 96 Kees discovered the wonders of Open Source software and especially Linux. First his hobby and later career in IT brought him a lot of experience and expertise in systems operations and IT architecture.
Nowadays Kees works as a platform architect and partner at Nefos, a new kid on the block in terms of public cloud computing. Do we hear Ceph? Do we hear OpenStack? Yes, we do! Oh, and DevOps and such.

View file

@ -1,31 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- cybersecurity
title: "Martijn van Lom - Fragile cyber-world: will fragmentation kill cybersecurity?"
speakers:
- martijn-van-lom
presentation:
filename: 2018-11-15-martijn-van-lom-fragile-cyber-world-will-fragmentation-kill-cybersecurity.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=OX18MNVNsdA
---
## Abstract
Cybersecurity has reached a junction and needs a decision where it goes next. The choice we make will shape the future of our industry and the security of cyberspace for years to come, so we need to make the right one.
Today we stand in the middle of a storm. Not just a geopolitical one, but a cyberpolitical one. It feels like no-one trusts anyone anymore, and suspicion and confusion reign across our fragile cyber-world. Which way do we turn? Do we choose the road for Balkanization: the fragmentation and isolation of an industry? Or are we brave enough to enter the other road? One of collaboration and shared intelligence?
## Biography
Martijn is sinds 2010 in dienst bij Kasperky. Hij is begonnen als Managing Director voor de Benelux en Head of Corporate Sales in de Nordics. In 2012 werd hij benoemd tot General Manager voor zowel de Benelux- als de Nordic-regio. Sinds eind 2014 heeft Van Lom zich als General Manager Kaspersky Lab Benelux volledig gericht op de Benelux om deze regio maximaal te kunnen laten groeien.
Daarnaast schrijft hij regelmatig columns en artikelen voor onder andere Computable, DutchCowboys, Business & IT, BlogIT, Executive People en Dutch IT-Channel en spreekt hij op evenementen over security-gerelateerde onderwerpen.
Martijn heeft eerder voor Kaspersky Lab gewerkt als Sales Manager voor de Benelux van 2005 en 2008. Buiten zijn dienstverband bij de leverancier van cybersecurityoplossingen was Van Lom werkzaam bij verschillende IT-organisaties en leverde hij als freelance management consultant diensten aan organisaties als BenQ, Fujitsu, Siemens en Heineken.

View file

@ -1,31 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- automation
title: "Mike Ciavarella - Shaved Yaks, Saving an endangered species"
speakers:
- mike-ciavarella
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=zn_AS9QWbU8
---
## Abstract
Automation is meant to make our lives simpler: just throw a shell script at some problem and the problem goes away, right? If only life in a modern DevOps world was so easy! Instead, we have thousands of tools to choose from, and hundreds of problems to solve, even in small environments. Life wasn't meant to be easy, but does it have to have so many command line arguments?!?
Many of the decisions we make regarding automation are based on some combination of “experience”, “that's how it's always been”, and “I just need it to work”. This is not helpful when you have little experience, a green-field site, or even less time available than you thought. Even with experience, we tend to fall back to “Just use \<insert favorite battle-tested tool here /\>”. _We choose the tool not because it's the right tool for the job, but because it's a tool we know_. This becomes further “justified” on the grounds of personal productivity. Suddenly, tool choice is the important decision, and the original problem is secondary. How can we do better?
This talk is about the decisions and assumptions behind automation, and, perhaps, why yak shaving needs to be preserved.
## Biography
Mike has been working with UNIX since first gaining access to a BSD-based system in the late 1980s. After mastering the `oops(8)` and `restore(8)` commands, he gained a deep appreciation of the need to automate, and of the automation potential that is a fundamental part of UNIX and UNIX like systems.
Mike currently lives in Amsterdam with his wife, no cats, and a 3D printer named “Bob”.

View file

@ -1,33 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- security
- dark-web
title: "Mischa Peters - What Every Security Professional Should Know About the Dark Web"
speakers:
- mischa-peters
presentation:
filename:
recording:
platform: youtube
url:
---
## Abstract
Turn on the nightly news or your favorite TV drama and youre bound to hear mentions of a vast criminal underworld for drugs, sex, guns, and identity theft hidden in plain site - all you need is a computer or mobile device to get there - this is the dark web. But what is the dark web really?
While well known, fewer than 1% of internet users have visited the dark web and even among IT security professionals, only 1 in 7 have ever ventured to a dark web forum or site. This lack of direct experience helps explain why there is so much fear and misinformation being spread. But it also suggests that many in the security industry are missing out on a crucial source of information that could help them better protect their enterprise and better get inside the mind of a hacker.
In this talk, we hope to use our knowledge to help break apart fact from fiction and provide you with the basics you, as a security professional, will need to begin safely leveraging this growing intelligence resource to better protect your organization.
## Biography
Mischa Peters is Director Systems Engineering EMEA with IntSights. He has been in the industry for more than 20 years and began his career at one of the leading Internet Service Providers in the Netherlands, XS4ALL. After XS4ALL he worked for companies like Livingston/Lucent, Foundry/Brocade, A10 Networks and LightCyber.
His knowledge has evolved with the emergence of the Web and the need to secure it all and gained vast experience in this subject, with companies such as BlueCoat and LightCyber and currently IntSights. IntSights being positioned as a leader in the field of Dark Web and Cyber Risk Intelligence.
In his former life, he was helping teams designing, building and releasing innovative online and e-commerce focused platforms for digital enterprises. In his role of CTO of Vamp.io he is focusing on envisioning and realising the architecture, technology and features of Vamp, consultative business development, and defining and refining the vision of Vamps value in the ever-changing DevOps space.

View file

@ -1,32 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- containers
- canary-releasing
title: "Olaf Molenveld - How to use smart canary releasing for containers to increase velocity and reduce issues"
speakers:
- olaf-molenveld
presentation:
filename: 2018-11-15-olaf-molenveld-how-to-use-smart-canary-releasing-for-containers-to-increase-velocity-and-reduce-issues.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=-8enRR4poKU
---
## Abstract
Adopting new technologies like Docker containers, microservices, Mesos/Marathon, Kubernetes and other “cloud native” solutions, not only creates huge possibilities to increase velocity and scalability, but also introduces a whole new level of complexity. How to implement continuous delivery, service discovery, log-agreggation, API orchestration and secure exposing of service API's and applications? These are all non-trivial challenge which need to be solved before one can safely go to production with such an modern cloud-native stack.
A solution that can handle these requirements in an integrated and unified way can provide great value. It cannot only provide a single “pane of glass” to the underlying components and make them work together efficiently, it can also apply smart metric-driven automation workflows to provide advanced features like canary-relasing, feature-A/B testing and runtime optimisations like SLA based autoscaling.
In this talk, Olaf Molenveld, co-founder and CTO of Vamp.io, will demonstrate how smart service discovery, load balancing, canary releasing, feature testing and autoscaling can be quickly applied to a container scheduler using a unified system.
## Biography
Olaf has over 20 years of experience in the internet industry in various technical, architectural and managerial roles. With a background as a software developer, solutions architect and technical consultant, Olaf is in a good position to align business challenges with technical innovations and organisational processes.
In his former life, he was helping teams designing, building and releasing innovative online and e-commerce focused platforms for digital enterprises. In his role of CTO of Vamp.io he is focusing on envisioning and realising the architecture, technology and features of Vamp, consultative business development, and defining and refining the vision of Vamps value in the ever-changing DevOps space.

View file

@ -1,31 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- microservices
- containers
- kubernetes
title: "Pieter Jenniskens - Microservices, containers and Kubernetes"
speakers:
- pieter-jenniskens
presentation:
filename: 2018-11-15-pieter-jenniskens-microservices-containers-and-kubernetes.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=6t1tX0lz_M8
---
## Abstract
Containers have been around for a while now. But how do you use them to migrate your software from a traditional architecture to a more microservices oriented architecture? And what about management and scaling once your containers number in the hundreds?
In this talk we will have a look at microservices, how it uses containers and how kubernetes manages all this. Using a webshop as an example, we will look under the hood of kubernetes and see how it all works together.
## Biography
Pieter encountered Linux and Open Source software for the first time in 1992 and never let go. During his studies he played around a lot with Linux and BSD.
Pieter worked in Linux consultancy for most of his adult life and only recently started to work for SUSE as a Sales engineer. In this role he talks about Linux and Open Source all day but still gets to play with the new technologies out there.

View file

@ -1,40 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- dcf77
- time
- raspberry-pi
title: "René Ladan - Decoding the DCF77 time signal on a Raspberry Pi"
speakers:
- rene-ladan
presentation:
filename: 2018-11-15-rene-ladan-decoding-the-dcf77-time-signal-on-a-raspberry-pi.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=O7-l6EU1oCU
---
## Abstract
This talk will introduce the DCF77 time station located near Mainflingen, Germany. This station transmits the time every minute with one bit per second (except for the last second of the minute) at a carrier frequency of 77.5 kHz.
Topics will include:
* How can the raw radio signal be converted to bits? This is harder than you think!
* How can we decode the time information transmitted each minute and deal with reception errors?
* DCF77 also transmits information from third parties (mostly commercial weather forecasts), how can we decode these?
* Design of the software
* High-level history of the software and future ideas
* Demo time :)
## Biography
René studied computing science at the Eindhoven University of Technology where he graduated in 2006. After that he worked at various companies (including the university itself), some involving Linux, others Windows-based.
He started his open source shadow career with some small projects on Sourceforge but it really took off when he started to work on FreeBSD in 2004. Meanwhile, he has been awarded both a documentation and a ports commit bit and is now part of the Ports Management Team (aka portmgr@). After visiting too many instances of EuroBSDCon, he was drawn into the accompanying Foundation and now assumes the role of secretary.
When not doing BSD stuff and still in nerd mode, he likes to tinker with his DCF77 receiver which runs on a Raspberry Pi 1B (and still runs FreeBSD or Linux as its operating system).

View file

@ -1,33 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- zfs
title: "Slawek Wojtczak - ZFS Boot Environments"
speakers:
- slawek-wojtczak
presentation:
filename: 2018-11-15-slawek-wojtczak-zfs-boot-environments.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=6cpfKodHW00
---
## Abstract
As long as sysadmins need to maintain, change and update operating systems there is always need to protect against problems that may occur during these operations. Various solutions were used starting from simple backup/restore procedures or copying the contents of system filesystems into spare disks to snapshots and clones recently. None of these solutions were transparent enough or bulletproof enough to provide complete and consistent protection again failures in the change or update process.
One of such holy grails is ZFS Boot Environments solution. It protects entire system (and even additional data when needed) against almost any change or update process. As ZFS Boot Environments matured in Solaris/Illumos systems and then on FreeBSD UNIX other systems started to copy its principles to provide similar solutions such as snapper with BTRFS in SUSE or Boot Environment Manager for DragonFly BSD with their HAMMER filesystem.
The presentation aims to walk through the history of these solutions with the focus on practical ZFS Boot Environments solutions and examples.
## Biography
I have used FreeBSD for more then 13 years both privately and professionally along with various other UNIX and UNIX-like systems. Besides UNIX systems I put a lot of interest in storage, high availability solutions, virtualization/containers and backup/restore solutions showed on my LinkedIn page. I am also available via Twitter and Mastodon.
Recently I started a blog where I share knowledge and experience that I gathered by working 10+ years as sysadmin (now architect) at IT industry. Countless times various articles or blog posts helped me, so I though that its about time to give back. If you want to read more you may check My FreeBSD Story at my blog.
Arjan is developer of several serious games concerning complex decision making. His simulations are used by businesses, governments and universities in various countries. He teaches in several program's and masterclasses about wicked problems, standardization, negotiation and ICT and the transformation of government.

View file

@ -1,30 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- cryptography
- tls
title: "Tom Tervoort - The road to TLS 1.3"
speakers:
- tom-tervoort
presentation:
filename: 2018-11-15-tom-tervoort-the-road-to-tls-13.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=L1wFkKOzp6M
---
## Abstract
Since it was quickly cobbled together by Netscape in order to allow people to buy items over the web, the SSL/TLS protocol has become one of the most popular protocols for secure communications. Unfortunately, designing a cryptographic protocol that satisfied everyone's needs turned out to be more complex than anticipated, causing the large number of vulnerabilities which plaged each version of it so far.
This talk will cover the evolution of SSL and TLS, and how mistakes from the past informed the design of its newest incarnation: TLS 1.3. It will also examine the new protocols' considerable improvements in robustness, security and efficiency, and the issues that still remain.
## Biography
Tom is a security specialist (i.e. ethical hacker and consultant) at Secura and a PhD student (in the field of medical security) at the AMC hospital. He frequently perform security investigations of complex and unorthodox systems such as cryptographic protocols, identity management systems and blockchain applications.
Tom worked as a software developer before entering the security field, and received a master's degree in computing science (specialising in programming technology and automatic protocol verification) from Utrecht University.

View file

@ -1,261 +0,0 @@
---
categories:
- conferenties
- evenementen
date: 2019-11-21T16:08:58+02:00
description: "De NLUUG najaarsconferentie werd gehouden op donderdag 21 november 2019 in het Van der Valk Hotel Utrecht."
is_event: true
tags:
- conferenties
slug:
title: "NLUUG najaarsconferentie 2019"
layout: schedule-event
event_title: "NLUUG najaarsconferentie 2019"
event_start: 2019-11-21T08:30:00+02:00
event_end: 2019-11-21T18:00:00+02:00
event_timezone: Europe/Amsterdam
event_location: Van der Valk Hotel Utrecht
event_organizers:
- organizer:
id: nluug
name: NLUUG
event_attendance_mode: "offline"
event_images:
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
event_description: "Najaarsconferentie 2019 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
event_address:
street_address: "Winthontlaan 4-6"
postal_code: "3526 KV"
city: "Utrecht"
country_name: "The Netherlands"
event_members_only: true
event_status: "scheduled"
event_schedule:
title: Programma
description:
columns: 4
headers:
- header:
width: 10
- header:
text: Zaal 1
center: true
width: 30
- header:
text: Zaal 2
center: true
width: 30
- header:
text: Zaal 3
center: true
width: 30
rows:
- row:
columns:
- column:
time: 08:30
- column:
textfield:
text: Inschrijving, ontvangst, koffie
size: 3
center: true
- row:
columns:
- column:
time: 09:15
- column:
textfield:
text: Openingswoord
center: true
size: 3
- row:
columns:
- column:
time: 09:30
- column:
talk:
speaker: David Blank-Edelman
title: "SRE101: Lessons from a Parallel Universe"
keynote: true
link: talks/david-blank-edelman-sre101-lessons-from-a-parallel-universe/
center: true
size: 3
- row:
columns:
- column:
time: 10:30
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 11:00
- column:
talk:
speaker: Andreas Hülsing
title: Post-quantum cryptography
link: talks/andreas-hulsing-post-quantum-cryptography/
- column:
talk:
speaker: Moritz Müller
title: Roll, Roll, Roll your Root — first DNSSEC Root KSK Rollover
link: talks/moritz-muller-roll-roll-roll-your-root-first-dnssec-root-ksk-rollover/
- column:
talk:
speaker: Michael Boelen
title: "Let's create better* scripts"
link: talks/michael-boelen-lets-create-better-scripts/
- row:
columns:
- column:
time: 11:45
- column:
size: 3
- row:
columns:
- column:
time: 11:50
- column:
talk:
speaker: Roland van Rijswijk-Deij
title: "QBC: The Quantum Blockchain Cloud —debunking quantum myths and fables"
link: talks/roland-van-rijswijk-deij-qbc-the-quantum-blockchain-cloud-debunking-quantum-myths-and-fables/
- column:
talk:
speaker: Carlo Meijer
title: "Self-encrypting deception"
link: talks/carlo-meijer-self-encrypting-deception/
- column:
talk:
speaker: Hagen Bauer
title: Treating documentation as code
link: talks/hagen-bauer-treating-documentation-as-code/
- row:
columns:
- column:
time: 12:35
- column:
textfield:
text: Lunch
center: true
size: 3
- row:
columns:
- column:
time: 13:30
- column:
talk:
speaker: Thomas Attema
title: Cryptographic applications of quantum mechanics
link: talks/thomas-attema-cryptographic-applications-of-quantum-mechanics/
- column:
talk:
speaker: Bram Cappers
title: "Eventpad: Cybercrime Analysis Using Visual Analytics"
link: talks/bram-cappers-eventpad-cybercrime-analysis-using-visual-analytics/
- column:
talk:
speaker: Koen de Jonge
title: Community Hosted Open Source Infrastructure
link:
- row:
columns:
- column:
time: 14:15
- column:
size: 3
- row:
columns:
- column:
time: 14:20
- column:
talk:
speaker: Sebastian Österlund
title: "RIDL: Rogue In-Flight Data Load"
link: talks/sebastian-osterlund-ridl-rogue-in-flight-data-load/
- column:
talk:
speaker: Debarshi Basak
title: Next generation app security and mitigation for Lawfirms
link: talks/debarshi-basak-next-generation-app-security-and-mitigation-for-lawfirms/
- column:
talk:
speaker: Anco Scholte ter Horst
title: XS4ALL Moet Blijven
- row:
columns:
- column:
time: 15:05
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 15:30
- column:
talk:
speaker: Wim ten Have
title: What does vNUMA actually mean?
link: talks/wim-ten-have-what-does-vnuma-actually-mean/
- column:
talk:
speaker: Carlo Berto
title: An update on RPKI
link: talks/carlo-berto-an-update-on-rpki/
- column:
talk:
speaker: Michiel Leenaars
title: The Commons Conservancy
link: talks/michiel-leenaars-the-commons-conservancy/
- row:
columns:
- column:
time: 16:15
- column:
size: 3
- row:
columns:
- column:
time: 16:20
- column:
talk:
speaker: Pieter Lexis
title: Running containers with systemd-nspawn
link: talks/peter-lexis-running-containers-with-systemd-nspawn/
- column:
talk:
speaker: Eric Verheul
title: Remote Document Encryption
link: talks/eric-verheul-remote-document-encryption/
- column:
talk:
speaker: Martin Geusebroek
title: Counter social engineering
link: talks/martin-geusebroek-counter-social-engineering/
- row:
columns:
- column:
time: 17:10
- column:
talk:
speaker: Edwin den Andel
title: Tales (Fails) from the trenches…
link: talks/edwin-van-andel-tales-fails-from-the-trenches/
center: true
size: 3
- row:
columns:
- column:
time: 18:05
- column:
textfield:
text: Borrel, gesponsord door Sue
center: true
size: 3
---

View file

@ -1,32 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Andreas Hülsing - Post-quantum cryptography"
speakers:
- andreas-hulsing
presentation:
filename: 2019-11-21-andreas-hulsing-post-quantum-cryptography.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=hebljeD0Ngw
---
## Abstract
As soon as large scale quantum computers are built today's cryptography does not provide security anymore. This threatens the security of our digital society. Even worse: For some data that we send or store in encrypted form we want secrecy to hold for our whole lifetime, if not longer. Think of medical data for example. This data can be stored and decrypted when a quantum computer is available.
Post-quantum cryptography is the study of conventional cryptography in the presence of an adversary with access to a quantum computer. In this talk I will give an overview of the landscape of schemes submitted to the recent NIST standardization project. I will discuss the underlying problems and summarize the current knowledge about quantum algorithms to solve them.
In addition, I will touch on challenges in the area of provable post-quantum security.
## Biography
I am assistant professor in the Coding Theory and Cryptology group at Eindhoven University of Technology (TU/e). My research focuses on post-quantum cryptography — cryptography that resists quantum computer-aided attacks. My works range from theoretical works, like how to model quantum attacks or formal security arguments in post-quantum security models, to applied works, like the analysis of side-channel attacks or the development of efficient hash-based signature schemes. In many of my works I try to combine the theoretical and the applied perspective. This is especially reflected in my work on standardizing post-quantum cryptography.
Before my current position, I was a postdoctoral researcher in the Coding Theory and Cryptology group, working with Tanja Lange in the PQCRYPTO project. Before I was a postdoctoral researcher in the cryptographic implementations group at TU/e, working with Daniel J. Bernstein. I did my PhD in the cryptography and computer algebra group at TU Darmstadt under the supervision of Johannes Buchmann.
Before starting my PhD, I worked as a research fellow at Fraunhofer SIT in Darmstadt. I hold a Diploma in computer science from TU Darmstadt.

View file

@ -1,28 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Bram Cappers - Eventpad: Cybercrime Analysis Using Visual Analytics"
speakers:
- bram-cappers
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=TJixUQhU-lY
---
## Abstract
Automation of malware analysis is a popular and very important topic, but with human cognition still outperforming AI we are still indispensable. In this talk we show how we can exploit the human eye for the analysis of large PCAP files and event logs using visual analytics.
At the TU/e we designed a system Eventpad to quickly visualize patterns and anomalies in event collections. In this talk we give live demos on how we can use the tool to discover fraud in VoIP traffic, discover chemical waste dumping in a wildlife preserve and reverse engineer Ransomware in back office environments.
## Biography
Bram Cappers is a postdoctoral researcher at Eindhoven University of Technology and cofounder of the startup AnalyzeData. In 2018 he finished his PhD in the area of data visualization and cyber security. where he developed new antivirus technology to visually detect patterns and anomalies in network traffic.
Bram has won numerous awards in the area of data science and presented his technology at prestigious events such as BlackHat USA 2018 and Still Hacking Anyway 2017.

View file

@ -1,30 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Carlo Berto - An update on RPKI"
speakers:
- carlo-berto
presentation:
filename: 2019-11-21-carlo-berto-an-update-on-rpki.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=l_BJP5wHoJc
---
## Abstract
In this presentation Carlo will provide an update on the current state of routing security and routing hijacks from the perspective of RIPE NCC.
He will share statistics on the quality of the Internet Routing Registry and explains what Resource Public Key Infrastructure (RPKI) is, the difference between signing and validating resources and how to do this.
Finally, Carlo will share some insights from actual RPKI deployments.
## Biography
Carlo Berto is Customer Service Analyst at the RIPE NCC. He helps new members request Internet number resources and acts as the first point of contact for all support queries. He is an expert in all questions related to the RIPE Database, RPKI, abuse complaints and billing.
Carlo has over seven years of experience in Customer Services and was previously heading his own team at a global Telecommunications company. He holds a Bachelor in Statistics and Information Science from the University of Venice. Originally from Italy, Carlo speaks fluent Italian, Spanish and English.

View file

@ -1,34 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Carlo Meijer - Self-encrypting deception"
speakers:
- carlo-meijer
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=skqFDQrOepY
---
## Abstract
We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by reverse engineering their firmware. These drives were produced by three manufacturers between 2014 and 2018, and are both internal models using the SATA and NVMe interfaces (in a M.2 or 2.5“ traditional form factor) and external models using the USB interface.
In theory, the security guarantees offered by hardware encryption are similar to or better than software implementations. In reality, we found that many models using hardware encryption have critical security weaknesses due to specification, design, and implementation issues. For many models, these security weaknesses allow for complete recovery of the data without knowledge of any secret (such as the password).
BitLocker, the encryption software built into Microsoft Windows will rely exclusively on hardware full-disk encryption if the SSD advertises support for it. Thus, for these drives, data protected by BitLocker is also compromised.
We conclude that, given the state of affairs affecting roughly 60% of the market, currently one should not rely solely on hardware encryption offered by SSDs and users should take additional measures to protect their data.
## Biography
Carlo is a PhD candidate at the Digital security group at the Radboud University Nijmegen. He is currently under supervision of Bart Jacobs.
His research focuses on analysis of already-deployed cryptographic systems in the wild. As of today, many people rely on cryptographic systems on a daily basis. Be it your through web browser, your public transport e-ticket, or your wireless router. Some of these systems have gone through extensive scrutiny. However, many have not.
Within this category, the systems are often difficult to analyze because proper documentation and/or source code is unavailable to the public. Sometimes the difficulty of analysis is even relied on for security, which is a terrible idea. Most of Carlo's research follows a pattern of uncovering the details and inner workings of a system through reverse engineering, and subsequently analyzing (and often breaking) its security.

View file

@ -1,28 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "David Blank-Edelman - SRE101: Lessons from a Parallel Universe"
speakers:
- david-blank-edelman
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=oKnc8rcg1H0
---
## Abstract
Just within the last fifteen years, we have seen at least two separate communities evolve from the generic idea of Systems Administration/Operations. The first, DevOps, grew up very much in public. The second, SRE, germinated within the halls of “special” companies like Google and Facebook and is now starting to gain significant visibility and traction in the wider world.
Join me for an introduction to SRE: what it is, why it matters, how it relates to other operations practices like DevOps, and if/how you can get started with it in your organization.
## Biography
David has over thirty years of experience in the systems administration/DevOps/SRE field in large multiplatform environments. He is the curator/editor of the O'Reilly Book Seeking SRE: Conversations on Running Production Systems at Scale and author of the O'Reilly Otter Book (Automating Systems Administration with Perl).
David is a co-founder of the wildly popular SREcon conferences hosted globally by USENIX. David currently works for Microsoft as a senior cloud advocate focusing on site reliability engineering.

View file

@ -1,28 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Debarshi Basak - Next generation app security and mitigation for Lawfirms"
speakers:
- debarshi-basak
presentation:
filename:
recording:
platform: youtube
url:
---
## Abstract
Majority of Lawfirms today rely on older technology due to hyperfocus on security and scepticism over container technologies. As the rest of the world transition to containers, we discuss challenges in the lawfirms.
We propose an architecture to package applications, deliver, distribute and run third party vendor applications securely along with a method to capture and measure total cost of ownership.
We also discuss violation prevention effort that could be taken and a mitigation architecture in a scenario when there is a violation.
## Biography
Debarshi has almost 10 years of experience in Data Engineering, Container technologies etc. He has previously worked in Bol.com, SensysGatso and now at ReynenCourt BV addressing key issues in Container Technology and Security in modern infrastructure for Law Firms.

View file

@ -1,32 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Edwin van Andel - Tales (Fails) from the trenches…"
speakers:
- edwin-van-andel
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=N3_ezZDzADI
---
## Abstract
Edwin van Andel will take you on a ride through the beautiful, but sometimes scary, woods of bugs, fails and wonders, located in the misty valley of infosec.
There will be tales of misdirected focus. There will be burning arrows flying towards the anonymous clientele of Zerocopters bug-bounty and coordinated vulnerability disclosure platform. And we will gaze at the sunset over the immortal fields of stupidity.
Edwin will discuss and gives examples of beautifully chained exploits, utterly stupid designs, fails and the always funny owners responses. Fun, laughter and tears as we cool off and swim together in IoT infested waters. While always reflecting back to the key of all his presentations: Hackers can help.
Will you hop on for a 45 minute ride through these hidden woods? Visual stupidity included as always!
## Biography
Edwin van Andel started hacking at the age of 13. Although he is now CEO of hacker company Zerocopter, his relationship with the hacker community is still the main driving force in his life. His dream to bring the brilliant minds of all hackers he knows together in one room and to hack everything that is brought in is something that he is getting closer to.
In addition, together with the “Guild of Grumpy Old Hackers”, he is actively guiding and leading young hackers in the right direction in order to create his ultimate goal - a safe society through a safer internet.

View file

@ -1,30 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Eric Verheul - Remote Document Encryption"
speakers:
- eric-verheul
presentation:
filename: 2019-11-21-eric-verheul-remote-document-encryption.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=hnL7ET6Y9RM
---
## Abstract
We introduce Remote Document Encryption (RDE) allowing any party to encrypt data for a holder of an electronic passport such that only with physical possession of the passport decryption is possible. RDE is not an intended functionality of passports and actually consists of a tweak of passport protocols. Electronic passports allow for 160 bit security exceeding current good practice of 128 bit security.
In the presentation we also indicate possible applications including secure email and end- to-end secure file sending. In the second quarter of 2018 a proof-of-concept was done with RDE based secure mail. This pilot was successful and indicated that RDE was indeed a viable technique. SURF, the collaborative ICT organisation for Dutch education and research, intends to implement RDE in its Filesender instance and is planning a pilot in 2019.
## Biography
Eric Verheul is an independent cryptographic consultant and part-time professor at the Radboud University Nijmegen. Eric teaches a Master Course in security management and does research in applied cryptography and privacy enhancing technologies.
His scientific goal is to creatively (ab)use existing cryptographic techniques and protocols achieving optimal (privacy) protection at low cost. His presentation at NLUUG on Remote Document Encryption is a good example of this.
Eric also serves as cryptographic architect in the Dutch eID scheme in which capacity he has developed the technique of polymorphic encryption and pseudonymization (PEP). This supplements federative authentication with strong privacy protection. Paradoxically, PEP allows the identity provider DigiD conducting authentications in an anonymous way while still being able delivering identifying information (or pseudonym) to service providers. From June 4 2018 issued Dutch driver licenses support PEP.

View file

@ -1,30 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Hagen Bauer - Treating documentation as code"
speakers:
- hagen-bauer
presentation:
filename: 2019-11-21-hagen-bauer-treating-documentation-as-code.pdf
recording:
platform: youtube
url:
---
## Abstract
Use the editor you love and manage your documentation in a version control system. Have you been there too? You are forced to use a word processor to write technical documentation. You get frustrated from all this cut and paste and keeping up with different versions of input? And at the end you have to waste your time to convert the result into different versions for different audiences and different outputs?
Imagine this: you can use the text editor from the device you like the most (e.g. vi on your smartphone). Artifacts from configurations files are always up to date. Images and tables are generated from external tools without any manual steps. Different versions are created on demand with content that the intended audience is allowed or able to consume. And if you are working in a team you can have continuous documentation that creates the output of your choice for web, printing or ebooks from one single source of truth.
Let's have a look how you can use asciidoctor to create documentation in a way you will love.
## Biography
Hagen Bauer can look back on more then 15 year of experience in the areas of open source content management, system administration and ecommerce. His personal mission is to help organisation of any size to deploy recent innovations in open source to reduce complexity and secure IT.
Hagen holds a masters (Diplom-Informatiker) in computer science, is an Open Group Distinguished IT Specialist and certified pfSense administrator. He is a frequent speaker at open source and enterprise software conferences for the last 20 years.

View file

@ -1,31 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Martin Geusebroek - Counter social engineering"
speakers:
- hagen-bauer
presentation:
filename: 2019-11-21-martin-geusebroek-counter-social-engineering.pdf
recording:
platform: youtube
url:
---
## Abstract
This talk takes you on a journey through the shadow networks where access to information is vital. A world in which the line between spectator, participant, manipulator or victim of manipulation is unclear. Confidentiality, availability and integrity of information is vital for your business and society.
What if your data becomes the target of social engineers in order to access your business crown jewels, influence you, or even society into criminal act without even realizing it?
How do they proceed? What is profiling and pretexting? And how does behavioral manipulation and eliciting confidential information work. Eventually you will gain inspiration while sharing our knowledge on how we can counter social engineering together.
## Biography
Martin is one of our most experienced subject matter experts! He obtained knowledge and experience in Social Engineering in an international environment while working for the Dutch government.
Martin not only teaches in an inspiring way, but also provides many striking practical examples. It is his wish to educate staff in order to make organizations better protected against attacks by social engineers.

View file

@ -1,30 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: "Een presentatie gegeven door Michael Boelen over het optimaliseren van shellscripts en tips om ze veiliger en betrouwbaarder te maken."
layout: event-talk
tags:
- shell
- scripting
title: "Michael Boelen - Let's create better* scripts"
speakers:
- michael-boelen
presentation:
filename: 2019-11-21-michael-boelen-lets-create-better-scripts.pdf
recording:
platform: youtube
url:
---
## Abstract
Whether you call yourself a system administrator, developer, or DevOps sprint mediator, life is too short for sloppy shell scripts! In this talk, we look at how to improve them to stand the test of time. Michael will share how to create a good foundation for your scripts, so they run more reliable now and in the future. Your (future) colleagues might love you for it.
Focus areas of this presentation include error handling, security, style, and best practices. Also, it will cover (many) mistakes made by Michael over the last 20 years. Got some of your own? They are welcome as part of the discussion.
## Biography
Michael Boelen specializes in the field of Linux and UNIX security. He worked as a consultant for several Fortune 500 companies like Philips and ASML. In 2013, Michael started the security firm CISOfy to simplify security.
Next to software development, he is interested in technical auditing, system hardening, and compliance. Michael is the author of several open source security tools, including Rootkit Hunter (rkhunter) and Lynis. He blogs at Linux-Audit.com and has a personal website with relevant presentations.

View file

@ -1,28 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Michiel Leenaars - The Commons Conservancy"
speakers:
- michiel-leenaars
presentation:
filename: 2019-11-21-michiel-leenaars-the-commons-conservancy.pdf
recording:
platform: youtube
url:
---
## Abstract
Small projects can grow big, but why should every successful FOSS project bootstrap its own foundation, when this invokes all kinds of bureaucratic burdens? The Commons Conservancy is a hypervisor for virtual foundations, a meta-foundation set up to help mature upcoming efforts around open technologies.
The Commons Conservancy facilitates healthy and self-supporting ecosystems that are sustainable in the long term. It does so by providing a free (in all senses of the word) infrastructure for coordination as well as a proper legal framework for governance over contributions made to the projects. By collaboration with well-known charities like NLnet and dedicated service providers it can provide a turn-key charitable and business infrastructure for your FOSS efforts.
## Biography
Michiel Leenaars (1972, Netherlands) is the chairperson of The Commons Conservancy. In daily life he is Director of Strategy at NLnet Foundation. and director of Internet Society Netherlands, one of the more sizable Internet Society chapters in the world. He is also a W3C liason officer for the Benelux Office of the World Wide Web Consortium. He currently leads two of the four Research & Innovation Actions of the Next Generation Internet initiative, NGI Zero Discovery and NGI Zero PET.
He is active in a number of national and international organisations, such as OpenDoc Society (vice-chair), SIDN Fund (Board of Advisors), Digitale Infrastructuur Nederland, and Petities.nl foundation (treasurer). He is a member of the Netherlands committee for the UNESCO Information for All Programme.

View file

@ -1,26 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Moritz Müller - Roll, Roll, Roll your Root — first DNSSEC Root KSK Rollover"
speakers:
- moritz-muller
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=1yu6eQIaH5Y
---
## Abstract
I give an in-depth insight into the Root KSK Rollover of the DNSSEC key of last year. Together with researchers, operators and developers from five organizations we analyzed the first ever rollover of the main cryptographic keys of DNSSEC, which had the potential of rendering millions of Internet users offline.
I will show, why the rollover was postponed by one year, the impact of the rollover itself and the surprising behavior it triggered in resolver software. Our results also question the current distribution methods of the DNSSEC trust anchor, and other trust anchors like CAs.
## Biography
Moritz is a Research Engineer with SIDN Labs, the research department of SIDN, the .nl ccTLD and a Ph.D candidate at the University of Twente. His research is focusing on the security and stability of the Domain Name System (DNS). In his work at SIDN he develops tools to detect malicious domain names and measures the deployment and behavior of DNS infrastructure.

View file

@ -1,35 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Peter Lexis - Running containers with systemd-nspawn"
speakers:
- peter-lexis
presentation:
filename: 2019-11-21-peter-lexis-running-containers-with-systemd-nspawn.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=u3urXzJU1X8
---
## Abstract
According to its manpage, systemd-nspawn:
> ... may be used to run a command or OS in a light-weight namespace container. In many ways it is similar to chroot(1), but more powerful since it fully virtualizes the file system hierarchy, as well as the process tree, the various IPC subsystems and the host and domain name...
In this talk, I'll go over what all of this means, how to use systemd-nspawn and how nspawn differs from docker, lxc/lxd and qemu-kvm. I'll discuss how to use the systemd-nspawn and machinectl commands, how to run services inside containers and how to introspect the containers.
After this, I'll quickly touch on a related project called mkosi ("make operating system image") that can be used to create images for containers and virtual-machines in one go.
Basic knowledge of systemd service management and containers is recommended to attend this talk.
## Biography
Educated as a Systems and Network Engineer and having dabbled with DevOps-y things for years, Pieter's official title now is "Senior PowerDNS Engineer". As such, he works on the PowerDNS source code, the build/CI/packaging pipeline and running the infrastructure around the PowerDNS open source project.
He is also involved in the broader DNS operations and standards communities to make the Internet a better place.

View file

@ -1,38 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Roland van Rijswijk-Deij - QBC: The Quantum Blockchain Cloud — debunking quantum myths and fables"
speakers:
- roland-van-rijswijk-deij
presentation:
filename: 2019-11-21-roland-van-rijswijk-deij-qbc-the-quantum-blockchain-cloud-debunking-quantum-myths-and-fables.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=fC8yB5K_25A
---
## Abstract
In this talk I will focus on trying to discombobulate some of the common hypes and misunderstandings about the words quantum and cryptography in one sentence. This includes questions such as:
* Can everybody decrypt my TLS if quantum is a thing?
* Oh my god, quantum will be a thing next week, they're already selling 2000 qubit machines!
* Quantum cryptography will solve all my problems
* Post-quantum cryptography will solve all my problems
With a wink and a smile, the goal of this talk is to inform the audience about the real issues quantum computing may raise for Internet security and what they should and should not focus their energies on in dealing with this problem.
##v Biography
Roland is principal scientist at NLnet Labs, a not-for-profit foundation dedicated to research and development of core Internet protocols.
Next to his work at NLnet Labs, Roland is an assistant professor of computer network security at the University of Twente. His research interests include DNS(SEC), BGP and network security and stability. Roland obtained an M.Sc. in computer science from the University of Twente in 2001 and a cum laude PhD in computer science from the same university in 2017.
In his spare time, Roland very much enjoys finding new places to go scuba diving.

View file

@ -1,28 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Sebastian Österlund - RIDL: Rogue In-Flight Data Load"
speakers:
- sebastian-osterlund
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=OWt05H1Ssak
---
## Abstract
Speculative execution bugs in modern CPUs popped up out of nowhere, but the worst of the nightmare appears to be over. While Spectre-style attacks will be with us forever, a variety of mitigations have been implemented to protect us against Intel CPU vulnerabilities such as Meltdown and Foreshadow. Browser vendors have implemented process isolation, and Intel even have silicon fixes in their latest CPUs. Do you feel safe?
We destroy these mitigations by taking a skeptical look at their assumptions, and reveal that unprivileged userspace applications can steal data by simply ignoring security boundaries -- after all, what do address spaces and privilege levels mean to Intel's CPU pipeline? Using our RIDL attacks, we'll steal secrets from SGX using just a bit of JavaScript in a web browser, grab /etc/shadow from another VM without even thinking about the hypervisor in the middle, and despair about our speculatively executed future.
## Biography
Sebastian is a Ph.D. student in the Systems and Network Security Group (VUSec) at the Vrije Universiteit Amsterdam. His interests include memory safety, operating systems defenses, and Fuzzing.
Previously he has worked on kMVX, a comprehensive kernel defense against information leaks using multi-variant execution, and more recently has worked on finding software bugs through directed fuzzing.

View file

@ -1,28 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Thomas Attema - Cryptographic applications of quantum mechanics"
speakers:
- thomas-attema
presentation:
filename: 2019-11-21-thomas-attema-cryptographic-applications-of-quantum-mechanics.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=A0Df7T4y63s
---
## Abstract
It is well known that the quantum computer poses a significant threat to the security of many ICT systems. However, quantum technology is also capable of improving the security of these systems. As an example, quantum key distribution systems are already commercially available. But other applications such as quantum authentication and quantum coin flipping protocols have been developed as well. All these protocols achieve functionalities that are known to be impossible for conventional protocols.
In this talk I will explain some of these cryptographic applications of quantum technology and highlight the impossibilities that are circumvented by making use of quantum mechanical properties.
## Biography
In 2013, Thomas Attema started as a researcher in the Cyber Security and Robustness department of TNO. His research focus has been on (applied) cryptography, working mainly on Multi-Party Computation and Post-Quantum Cryptography.
In addition, in 2018 he started his PhD in the cryptology group of the CWI under the supervision of professor Ronald Cramer.

View file

@ -1,28 +0,0 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Wim ten Have - What does vNUMA actually mean?"
speakers:
- wim-ten-have
presentation:
filename: 2019-11-21-wim-ten-have-what-does-vnuma-actually-mean.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=guQlThaE2Cl
---
## Abstract
NUMA, Non-uniform memory access, is a computer memory design used in multiprocessing to build vast computer servers. Cloud environments often partition such server 'hosts' into smaller virtual 'guests' with the help of a virtualization management tool like libvirt. Libvirt supports a wide variety of virtualization technologies and allows to compose a vNUMA, virtual NUMA, model for its 'guest' representing and respecting the 'host' NUMA architecture for maximum performance.
There are many angles in which one can fail orchestrating such 'guests'. This presentation will walkthrough libvirt to implement a vNUMA 'guest' representation of the 'host' and how to compose such architecture describing it with the libvirt XML available elements and their designated attributes. It will focus on critical detail describing the NUMA induced distances of processor local- and remote memory, pinning a vCPU to a single or set of pCPUs and memory binding.
Last but not least important is the use and the composing of 'host-passthrough' (PCI passthrough) controllers under a vNUMA rendered architecture.
## Biography
Wim ten Have has embraced Open Source Software and deployed its use in various practical environments since 1992. He is currently working for Oracle in their Linux Virtualization Engineering group. Wim is implementing a mechanism to automatically partitioning 'host' provided capabilities and dynamically rendering those into multiple smaller 'guests' without the need for manual intervention. The goal of this automatic host partitioning is to respect all 'host' NUMA topology detail.

View file

@ -1,218 +0,0 @@
---
categories:
- conferenties
- evenementen
date: 2021-11-11T21:17:47+02:00
description: "De NLUUG najaarsconferentie heeft plaatsgevonden op 11 november 2021 in het Van der Valk Hotel Utrecht."
is_event: true
lastmod: 2023-05-10T15:17:47+02:00
tags:
- conferenties
slug:
title: "NLUUG najaarsconferentie 2021"
layout: schedule-event
event_title: "NLUUG najaarsconferentie 2021"
event_start: 2021-11-11T08:30:00+02:00
event_end: 2021-11-11T18:00:00+02:00
event_timezone: Europe/Amsterdam
event_location: Van der Valk Hotel Utrecht
event_address:
street_address: "Winthontlaan 4-6"
postal_code: "3526 KV"
city: "Utrecht"
country_name: "The Netherlands"
event_attendance_mode: "offline"
event_description: "Najaarsconferentie 2021 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
event_images:
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
event_members_only: true
event_organizers:
- organizer:
id: nluug
name: NLUUG
event_schedule:
title: Programma
description: Alleen maar geweldige sprekers
columns: 3
headers:
- header:
width: 10
- header:
text: Zaal 1
center: true
width: 30
- header:
text: Zaal 2
center: true
width: 30
rows:
- row:
columns:
- column:
time: 08:30
- column:
textfield:
text: Inschrijving, ontvangst, koffie
size: 2
center: true
- row:
columns:
- column:
time: 09:15
- column:
textfield:
text: Openingswoord
center: true
size: 2
- row:
columns:
- column:
time: 09:30
- column:
talk:
speaker: Sjoera Nas
title: It's the metadata, stupid! Privacy versus de grote cloudproviders
keynote: true
link: talks/sjoera-nas-its-the-metadata-stupid-privacy-versus-de-grote-cloudproviders/
center: true
size: 2
- row:
columns:
- column:
time: 10:30
- column:
textfield:
text: Koffiepauze
center: true
size: 2
- row:
columns:
- column:
time: 11:00
- column:
talk:
speaker: Sake Blok
title: TLS decryption in times of Perfect Forward Secrecy
link: talks/sake-blok-tls-decryption-in-times-of-perfect-forward-secrecy/
- column:
talk:
speaker: Mischa Peters
title: The OpenBSD hypervisor in the wild, a short story, but getting longer
link: talks/mischa-peters-the-openbsd-hypervisor-in-the-wild-a-short-story-but-getting-longer/
- row:
columns:
- column:
time: 11:45
- column:
size: 2
- row:
columns:
- column:
time: 11:50
- column:
talk:
speaker: Jaap Akkerhuis
title: "The sky is falling: The sun is exploding, duck! Revisited"
link: talks/jaap-akkerhuis-the-sky-is-falling-the-sun-is-exploding-duck-revisited/
- column:
talk:
speaker: Walter Lioen
title: "Snellius: the latest Dutch national supercomputer"
link: talks/walter-lioen-snellius-the-latest-dutch-national-supercomputer/
- row:
columns:
- column:
time: 12:35
- column:
textfield:
text: Lunch
center: true
size: 2
- row:
columns:
- column:
time: 13:30
- column:
talk:
speaker: Pieter Lexis
title: YANG and NETCONF for Systems Administration?
link: talks/pieter-lexis-yang-and-netconf-for-systems-administration/
- column:
talk:
speaker: Dennis Baaten
title: "Internet.nl & DANE for SMTP"
link: talks/dennis-baaten-internetnl-en-dane-for-smtp/
- row:
columns:
- column:
time: 14:15
- column:
size: 2
- row:
columns:
- column:
time: 14:20
- column:
talk:
speaker: Wouter de Vries
title: "Anycast: What is it and How to measure it"
link: talks/wouter-de-vries-anycast-what-is-it-and-how-to-measure-it/
- column:
talk:
speaker: Eiger Jonker
title: May Contain Hackers 2022, the Dutch hacker camp after SHA
link: talks/eiger-jonker-may-contain-hackers-2022-the-dutch-hacker-camp-after-sha/
- row:
columns:
- column:
time: 15:05
- column:
textfield:
text: Koffiepauze
center: true
size: 2
- row:
columns:
- column:
time: 15:30
- column:
talk:
speaker: Martin Pels
title: 10 years of NLNOG RING
link: talks/martin-pels-10-years-of-nlnog-ring/
- column:
talk:
speaker: Rudi van Drunen
title: What are FPGAs anyway and why is it fun to play with them?
link: talks/rudi-van-drunen-what-are-fpgas-anyway-and-why-is-it-fun-to-play-with-them/
- row:
columns:
- column:
time: 16:15
- column:
size: 2
- row:
columns:
- column:
time: 16:20
- column:
talk:
speaker: Vesna Manojlovic
title: Technical Communities Resilience During COVID-19 Pandemic
link: talks/vesna-manojlovic-technical-communities-resilience-during-covid-19-pandemic/
- column:
talk:
speaker: Attilla de Groot
title: Integrating host networking with EVPN
link: talks/attilla-de-groot-integrating-host-networking-with-evpn/
- row:
columns:
- column:
time: 17:05
- column:
textfield:
text: Borrel, gesponsord door AT Computing
center: true
size: 2
---

View file

@ -1,28 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Attilla de Groot - Integrating host networking with EVPN"
speakers:
- attilla-de-groot
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=8I_s3U-a20o
---
## Abstract
Over the past years EVPN has become the default technology in datacenter deployments. Still most hosts are connected through standard vlan configuration or have their own overlay technology. By the end of the year NVIDIA will add the Host Based Networking functionality to the Bluefield2 DPUs. HBN makes it possible to use the native Linux networking constructs through DOCA directly on the DPU.
In this session we will explain how such an architecture is deployed in customer environments and allows for native integration in a network with NVIDIA Spectrum switches.
## Biography
Attilla has spent the last 15 years at the cutting edge of networking, having spent time with Amsterdam Internet Exchange, Infostrada, TenICT, with exposure to technology from Cisco, Brocade, HP, Juniper, and Huawei.
After NVIDIA acquired Cumulus Networks, the creators of open networking, Attilla is able to continue his interest in open architecture design.

View file

@ -1,24 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Dennis Baaten - Internet.nl & DANE for SMTP"
speakers:
- dennis-baaten
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=Pl5GseddzE8
---
## Abstract
Historically, SMTP servers exchange emails using either an unencrypted (plaintext) connection or (since 2002) an encrypted connection based on the opportunistic STARTTLS protocol. At the same time SMTP servers, by design, did not validate the authenticity of another email servers certificate; any random certificate were accepted. In short; confidentiality and integrity of (public) email transport cannot be guaranteed without taking extra measures. This is where DANE for SMTP comes in, as it enables email servers to determine up front whether or not another SMTP server supports an encrypted connection, while also providing the means of validating the authenticity of the other email servers certificate.
## Biography
Dennis Baaten is a freelance security consultant and ethical hacker. He works for the Dutch Internet Standards Platform where he operates the support desk of Internet.nl, contributes to the development of the internet.nl platform, and creates technical how-to guides on implementing secure Internet standards.

View file

@ -1,26 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Eiger Jonker - May Contain Hackers 2022, the Dutch hacker camp after SHA"
speakers:
- eiger-jonker
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=3m3JzGhbhGM
---
## Abstract
The Netherlands has been a host of hacker camps since 1993. Last edition was called SHA2017. They are the temporary home away for over 3500 hackers. This talk shows what makes a hacker camp, how it is organized and highlights some of the insane challenges and complications.
## Biography
Elger helps organize the large Dutch quadrennial hacker events such as SHA2017 and MCH2022, in the role as being responsible. You can bring your own (digital) flame thrower, but that also means that is has to be safe. Elger helps with setting up the organization, planning, permits and organizational matters.
Elger has also helped create other nice hacker things such as Hack42 in Arnhem and the Awesome Space in Utrecht.

View file

@ -1,30 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Jaap Akkerhuis - The sky is falling: The sun is exploding, duck! Revisited"
speakers:
- jaap-akkerhuis
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=CmxE7lCzk0g
---
## Abstract
In May 2013 at the Ripe 66 meeting in Dublin, at the maximum of solar cycle 24, I presented a short talk on mass emisions from the sun and it effects on our planet. Now, at the start the 25th solar cycle, it is a good moment to talk about Space Weather again and its effect on our environment. This talk doesn't need any special knowledege and will try to make you understand alarmist headlines better.
## Biography
After a period of seven years in the U.S., where he was active at the Information Technology Center at Carnegie Mellon University, software company mtXinu, and AT&T Bell Labs, Jaap returned to the Netherlands where he joined the NLnet, the first independent ISP in the Netherlands. Later he worked as a technical advisor for Stichting Internet Domeinregistratie Nederland (SIDN)
Jaap went back and forth between scientific institutes, research labs, Internet service providers and registries in Europe and across the U.S., playing a key role as a global connector in the technical community.
Throughout his career, Jaap has spent a generous amount of time sharing his knowledge with others and playing key roles in organisations such as the European Unix User Group, Advanced Computing Systems Association (USENIX), the Internet Engineering Task Force, the Internet Society, Internet Corporation for Assigned Names and Numbers (ICANN), Réseaux IP Européens (RIPE) and The Council of European National Top-Level Domain Registries (CENTR). Currently, he is a research engineer in the research and development group at NLnet Labs, focusing on IT development.
Jaap always had ample interest in astronomy and was asked to help with the outreach project of the Stanford Solar Research Center and ending up maintaining the software of the solar monitors which are scattered around the world. The International Heliophysical Year 2007-2009 Education Center recognized his role in the the Space Weather Monitor Program. In 2014 he and the Society of Amateur Radio Astronomers received an Award of Excellence and the title "Hero in Solar and Space Physics".

View file

@ -1,26 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Martin Pels - 10 years of NLNOG RING"
speakers:
- martin-pels
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=bJ_b5kDq_jY
---
## Abstract
The NLNOG RING is a platform for troubleshooting networking problems from different vantage points in the world.
In this talk, I will give an introduction on what NLNOG RING is, how the project came to be, and how it has evolved over the ten years of its existence. I will also share details about the tools we use for managing the increasingly large constellation of servers and the challenges we've encountered with this along the way.
## Biography
Infrastructure Engineer at RIPE NCC and co-founder of NLNOG RING.

View file

@ -1,28 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Mischa Peters - The OpenBSD hypervisor in the wild, a short story, but getting longer"
speakers:
- mischa-peters
presentation:
filename: 2021-11-11-mischa-peters-the-openbsd-hypervisor-in-the-wild-a-short-story-but-getting-longer.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=OQCIy8INJig
---
## Abstract
In the Summer of 2018 —after a poll on Twitter— OpenBSD Amsterdam started testing with vmm(4)/vmd(8). Mostly to see how far we could take it; more importantly to give back to the project. Little did we know where it would take us.
During this talk, Mischa will outline how it all started, how its built, how we operate the platform, what speedbumps we encountered and where we are now.
We are a big proponent of using as much out of OpenBSD base as possible and it has influenced our design choices a lot. These choices will be highlighted when discussing how the platform is built and how its operated.
## Biography
Mischa Peters is a long term BSD user, starting with FreeBSD 2.x and later OpenBSD as well. He is operating a hosting and co-location company out of Amsterdam The Netherlands, currently focused on providing services on top of OpenBSD. The OpenBSD Amsterdam project is a good example of it. For his $dayjob he is leading a team of System/Solutions Engineers for a security startup.

View file

@ -1,30 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Pieter Lexis - YANG and NETCONF for Systems Administration?"
speakers:
- pieter-lexis
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=Ns8-Hf_8TzQ
---
## Abstract
In the operations world, there's a disconnect between the system administrators and the network administrators. The sys-admins have automation tools that don't integrate with the NFV/SDN standards used by "pure" network operations.
In RFC 3535, the Internet Architecture Board stated that network equipment should provide defined models and a unified configuration API. This resulted in the standardization of YANG (a data modeling language) and NETCONF (an RPC protocol for configuration that carries instantiated YANG data).
In this talk, I'll be discussing the configuration management landscape (from a system administrator perspective), explain a bit about YANG and NETCONF and how these two technologies can be used to automate network functions that are running on Linux instead of dedicated network equipment.
## Biography
Educated as a Systems and Network Engineer and having dabbled with DevOps-y things for years, Pieter's official title now is "Senior PowerDNS Engineer". As such, he works on the PowerDNS source code, the build/CI/packaging pipeline and running the infrastructure around the PowerDNS open source project.
Pieter is also involved in the broader DNS operations and standards communities to make the Internet a better place.

View file

@ -1,30 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Rudi van Drunen - What are FPGAs anyway and why is it fun to play with them?"
speakers:
- rudi-van-drunen
presentation:
filename: 2021-11-11-rudi-van-drunen-what-are-fpgas-anyway-and-why-is-it-fun-to-play-with-them.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=LOAn0jR-Udc
---
## Abstract
Programmable logic devices —a.o. FPGAs (Field Programmable Gate Arrays)— are a cheap way of building your own logic (hardware) that can be used as (very) fast processing devices, or just logic devices in your hardware design.
In this talk I will explain what FPGAs are and what you can do with them and how to develop hardware systems with them using Open source tooling. We will be using different tools, both graphical and a hardware description language to generate configuration for an FPGA. A short (live) demo will be provided.
## Biography
Next to being dad and geek, Rudi tries to mold the technical part of the product creation process at SpronQ.
Rudi has more than 20 years of experience in the UNIX and open standards world, in large (data-centers) and small (embedded) environments.
He is an active member of USENIX and likes to visit conferences. In his spare time, he's into photography, sailing and travelling, and tries to combine this.

View file

@ -1,30 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Sake Blok - TLS decryption in times of Perfect Forward Secrecy"
speakers:
- sake-blok
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=0renIBt6To
---
## Abstract
As more and more traffic is encrypted with TLS, there is a stronger need for decrypting TLS traffic inside captured packet data (pcap files). But getting everything aligned to be able to decrypt the TLS traffic is not that trivial. Access to the servers private key is often not possible and even if you have access to the private key, most TLS sessions use Perfect Forward Secrecy which makes decryption based on the private key impossible.
Using session keys (instead of the private key of the server) to do the decryption is much more feasible. However, you need a way to get these session keys. There are several ways to get the session keys from one of the TLS endpoints. And sometimes you can use man-in-the-middle proxying to get them. Which method of retrieving the session keys could be used depends on the level of control you have over the used components in the TLS traffic flow.
In this presentation the different TLS handshakes will be discussed and several ways to get the session keys will be shown to enable TLS decryption with Wireshark and Tshark.
## Biography
Sake has been using Wireshark/Ethereal for almost 20 years. In 2009, Sake started the company SYN-bit to provide network analysis and training services to enterprises across Europe. During his work, he started developing functionality for Wireshark that he missed while working with the analyser in his day-to-day job. He also enhanced multiple protocol dissectors to suit his analysis needs. In 2007, Sake joined the Wireshark Core Development team.
Sake Blok calls himself "Relational Therapist for Computer Systems", as he solves problems by looking closely at the communication between computer systems.

View file

@ -1,26 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Sjoera Nas - It's the metadata, stupid! Privacy versus de grote cloudproviders"
speakers:
- sjoera-nas
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=-qglWvaxW2A
---
## Abstract
Sjoera Nas will speak about her experiences negotiating with big cloud providers about their compliance with EU privacy rules (General Data Protection Regulation and the ePrivacy Directive). She will summarise the key problems and outcomes, and discuss future EU legislative developments and alternatives such as Gaia X and national clouds.
## Biography
Drs. Sjoera Nas worked for the Dutch Data Protection Authority (Autoriteit Persoonsgegevens) between 2006 and 2018, as head of the internet inspection team. She also worked for XS4ALL and Bits of Freedom.
Since her move to Privacy Company in 2018 she has written many DPIAs ("Data Protection Impact Assessment") on Microsoft, Google, Zoom, Oracle, SAP, and AWS cloud services for the Dutch central government, and for the Dutch universities (represented by SURF). Read the [DPIAs for government](https://slmmicrosoftrijk.nl/) and [on Google for SURF](https://www.surf.nl/en/news/all-about-dpia-google-workspace).

View file

@ -1,24 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Vesna Manojlovic - Technical Communities Resilience During COVID-19 Pandemic"
speakers:
- vesna-manojlovic
presentation:
filename: 2021-11-11-vesna-manojlovic-technical-communities-resilience-during-covid-19-pandemic.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=2HstoqAFn9g
---
## Abstract
As a Community Builder in the RIPE Community, since March 2020 I've been working on organising the support for community that is struggling with isolation, grief, anxiety etc due to the pandemic. In 2021, together with a small "task force" we have organised a survey, had several online meetings, published articles on RIPE Labs and gave several talks.
## Biography
Vesna is a Community Builder at RIPE NCC, hacker, mother, engineer, feminist, artist, Trusted Contact at RIPE Community, J.E.D.I. advocate, neurodivergent, trauma survivor, NVC practitioner, psychiatric meds guinea pig. Living in The Netherlands since 1999, born in Yugoslavia.

View file

@ -1,39 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Walter Lioen - Snellius: the latest Dutch national supercomputer"
speakers:
- walter-lioen
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=7zNKNZHNUQY
---
## Abstract
In September this year, the seventh-generation Dutch national supercomputer called Snellius was inaugurated by Her Majesty the Queen Máxima.
This immediately raises a number of questions:
* What exactly is a supercomputer?
* What are supercomputers used for?
* What do supercomputers look like?
* Where does the Netherlands stand in relation to Europe and the rest of the world?
Since 1984, SURF has housed and managed the Dutch national supercomputer and has supported scientific researchers in making optimal use of it. We look back on more than 35 years of supercomputing in the Netherlands, but also take a brief look at the future.
We also take a closer look at a number of aspects of Snellius: the tender; the (hardware) architecture; and the software environment, from both the administrator's and the user's perspective.
## Biography
Walter studied mathematics at the University of Amsterdam (UvA) and worked from the mid-eighties as a scientific programmer at the Center for Mathematics and Computer Science (CWI) in Amsterdam. In that capacity he used virtually all supercomputers in the Netherlands working on highly efficient implementations of algorithms in numerical mathematics and computational number theory.
From 2001 he worked as a software engineer on predictive analytics software at Data Distilleries/SPSS.
In 2007 he joined SURF as an HPC consultant, where he quickly became manager of the supercomputing team. He is currently responsible for the Research Services department, including the supercomputing team.

View file

@ -1,26 +0,0 @@
---
categories:
date: 2021-11-11T13:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Wouter de Vries - Anycast: What is it and How to measure it"
speakers:
- wouter-de-vries
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=osiiLsk7C3Y
---
## Abstract
In this talk we will take a look at Anycast, a network "technology" that —to put it bluntly— allows network operators to use the Internet as a giant load balancer. You will learn what Anycast is, how Internet users are affected by it, what problems it solves and what problems it causes.
We will start by first looking at some real-world Anycast deployments, such as the one that is deployed by Google for its public DNS resolver, and learn that Internet routing is strange. Then, we will discuss Verfploeter, a methodology to comprehensively measure the performance of an anycast network that has been applied at one of the largest anycast deployments in the world.
## Biography
Wouter obtained his PhD with his thesis titled 'Improving Anycast with Measurements' in December 2019. Currently, he is a Systems Engineer at Cloudflare, still focusing on networks, but now from a security perspective. He has spent the past four years looking at (and researching) anycast from various angles.

View file

@ -1,244 +0,0 @@
---
categories:
- conferenties
- evenementen
date: 2022-11-29T17:58:58+02:00
description: "De NLUUG najaarsconferentie werd gehouden op dinsdag 29 november 2022 in het Van der Valk Hotel Utrecht."
is_event: true
tags:
- conferenties
slug:
title: "NLUUG najaarsconferentie 2022"
layout: schedule-event
event_title: "NLUUG najaarsconferentie 2022"
event_start: 2022-11-29T08:30:00+02:00
event_end: 2022-11-29T18:00:00+02:00
event_timezone: Europe/Amsterdam
event_location: Van der Valk Hotel Utrecht
event_organizers:
- organizer:
id: nluug
name: NLUUG
event_attendance_mode: "offline"
event_images:
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
event_description: "Najaarsconferentie 2022 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
event_address:
street_address: "Winthontlaan 4-6"
postal_code: "3526 KV"
city: "Utrecht"
country_name: "The Netherlands"
event_members_only: true
event_status: "scheduled"
event_schedule:
title: Programma
description:
columns: 4
headers:
- header:
width: 10
- header:
text: Zaal 1
center: true
width: 30
- header:
text: Zaal 2
center: true
width: 30
- header:
text: Zaal 3
center: true
width: 30
rows:
- row:
columns:
- column:
time: 08:30
- column:
textfield:
text: Inschrijving, ontvangst, koffie
size: 3
center: true
- row:
columns:
- column:
time: 09:15
- column:
textfield:
text: Openingswoord
center: true
size: 3
- row:
columns:
- column:
time: 09:30
- column:
talk:
speaker: Lucinda Sterk
title: Talk nerdy to me
keynote: true
link: talks/lucinda-sterk-talk-nerdy-to-me/
center: true
size: 3
- row:
columns:
- column:
time: 10:30
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 11:00
- column:
talk:
speaker: Riccardo ten Cate en Glenn ten Cate
title: Exploitation, automation, mitigation
link: talks/riccardo-ten-cate-en-glenn-ten-cate-explotation-automation-mitigation/
- column:
talk:
speaker: Mike Ciavarella
title: This is just temporary
- column:
talk:
speaker: Melchior Aelmans
title: Exploring quantum Technology for Networking
- row:
columns:
- column:
time: 11:45
- column:
size: 3
- row:
columns:
- column:
time: 11:50
- column:
talk:
speaker: Rob Hulsebos
title: OT Cybersecurity Challenges
link: talks/rob-hulsebos-ot-cybersecurity-challenges/
- column:
talk:
speaker: Michiel Leenaars
title: "NLnet and NGI Zero: working for the internet"
link: talks/michiel-leenaars-nlnet-and-ngi-zero-working-for-the-internet/
- column:
talk:
speaker: Sake Blok
title: "LOG4SHELL: Getting to know your adversary"
link: talks/sake-blok-log4shell-getting-to-know-your-adversary/
- row:
columns:
- column:
time: 12:35
- column:
textfield:
text: Lunch
center: true
size: 3
- row:
columns:
- column:
time: 14:00
- column:
talk:
speaker: Francisco Dominguez and Zawadi Done
title: Automating incindent response should be the default
link: talks/francisco-dominguez-en-zawadi-done-automating-incident-response-should-be-the-default/
- column:
talk:
speaker: Andreas Hülsing
title: "An update on NIST's PQC standardization process"
link: talks/andreas-hulsing-an-update-on-nists-pqc-standardization-process/
- column:
talk:
speaker: Kris Buytaert
title: Help My Datacenter is On Fire
link: talks/kris-buytaert-help-my-datacenter-is-on-fire/
- row:
columns:
- column:
time: 14:45
- column:
size: 3
- row:
columns:
- column:
time: 14:50
- column:
talk:
speaker: Jean-Paul Sablerolle
title: Power to the Open Source
- column:
talk:
speaker: Filip Chyla
title: Cloud-Native Security with the OWASP Cloud-Native Application Security Top 10
- column:
talk:
speaker: Toshaan Bharvani
title: Why Open Technologies need to use Open Technologies
- row:
columns:
- column:
time: 15:35
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 16:00
- column:
talk:
speaker: Marcel van der Velde
title: Heuristic Park (why we can fake it until we make it)
- column:
talk:
speaker: Ondřej Caletka
title: Run your own networking lab with Vagrant and Ansible
link: talks/ondrej-caletka-run-my-own-networking-lab-with-vagrant-and-ansible/
- column:
talk:
speaker: Joost van Dijk
title: "From passwords to passkeys: What's new with FIDO"
link: talks/joost-van-dijk-from-passwords-to-passkeys-whats-new-with-fido/
- row:
columns:
- column:
time: 16:45
- column:
size: 3
- row:
columns:
- column:
time: 16:50
- column:
talk:
speaker: "-"
title: "-"
- column:
talk:
speaker: Marcel Kornegoor
title: "Course as Code: the future of AT Computing's training courses"
link: talks/marcel-kornegoor-course-as-code-the-future-of-at-computings-training-courses/
- column:
talk:
speaker: Joyce Mellens
title: "Caer: An IoT Firewall for consumers"
link: talks/joyce-mellens-caer-an-iot-firewall-for-consumers/
- row:
columns:
- column:
time: 17:55
- column:
textfield:
text: Borrel, gesponsord door AT-Computing, en keysigning party (download manual)
center: true
size: 3
---

View file

@ -1,25 +0,0 @@
---
categories:
- presentaties
date: 2022-11-29T20:31:43+02:00
description: "Andreas Hülsing gaf een presentatie over de selectie en standaardisatie van post-quantum cryptography. Leer meer over het onderwerp en deze spreker."
layout: event-talk
tags:
- cryptography
title: "Andreas Hülsing - An update on NIST's PQC standardization process"
speakers:
- andreas-hulsing
presentation:
filename: 2022-11-29-andreas-hulsing-an-update-on-nists-pqc-standardization-process.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=0HjsoMrqlF4
---
## Abstract
In this talk I will give an overview of the current situation regarding the selection and standardization of post-quantum cryptography. I will discuss the schemes selected by NIST, the schemes that moved to round 4, as well as recent and upcoming events on the topic. Finally, I will discuss which topics I think are next in the area of post-quantum cryptography.
## Biography
I am assistant professor for provable security in the Coding Theory and Cryptology group at Eindhoven University of Technology (TU/e). Me and my research group are currently supported by NWO under the Vidi grant “A solid theory for post-quantum cryptography”. Besides, I am collaborating in the Formosa project to produce machine-checked proofs for high-assurance cryptographic software. My research focuses on post-quantum cryptography cryptography that resists quantum computer-aided attacks. My works range from theoretical works, like how to model quantum attacks or formal security arguments in post-quantum security models, to applied works, like the analysis of side-channel attacks or the development of efficient hash-based signature schemes. In many of my works I try to combine the theoretical and the applied perspective. This is especially reflected in my work on standardizing post-quantum cryptography. To learn more about my research, have a look at [my homepage](https://huelsing.net/wordpress/).

View file

@ -1,34 +0,0 @@
---
categories:
- presentaties
date: 2022-11-29T20:31:43+02:00
description: "Francisco Dominguez en Zawadi Done gaven een presentaties over het automatiseren van het proces om beveiligingsincidenten af te handelen."
layout: event-talk
tags:
- analysis
- devops
- incident-response
title: "Francisco Dominguez & Zawadi Done - Automating incident response should be the default"
speakers:
- francisco-dominguez
- zawadi-done
presentation:
filename: 2022-11-29-francisco-dominguez-en-zawadi-done-automating-incident-response-should-be-the-default.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=CH2ntnZxZks
---
## Abstract
We are going to present the role of open source software during a typical incident response process, whereby we will focus on the main phases that are usually applicable: Acquiring data, Processing data & Analyzing information. Most of these phases lean heavily on open source tools that are widely used by analysts in their daily operation. This talk will guide you from using these tools manually to using these tools automatically and magically. Well not really magically, but we will emphasize the application of a DevOps mindset to the process that most incident response analysts execute on daily basis, including ourselves.
## Biography Francisco
Bouncing between technical deep dives and board room chatter Francisco Dominguez has been involved with security (nowadays Cybersecurity) for the last 20 years and has kept track of some of it on his personal blog. Hacking and breaking different environments by combining technical knowledge and understanding of the surrounding process has always been his main passion. For example, he was involved in the investigation of the software and processes used to support the Dutch national elections. Unfortunately, those pesky commercial NDAs dont allow the naming of other fun jobs that involved social engineering people, jumping airgaps, fences or listening to hard disks to know if they are encrypted. Most of his offensive career he worked at Fox-IT and Securify, nowadays he is viewing security from the defense side while working at Hunt & Hackett.
## Biography Zawadi
Zawadi Done is 22 years old and works as an Incident Responder at Hunt and Hackett and is also pursuing a bachelor's degree in Cyber Security and Cloud.
The profile picture by Dennis van Zuijlekom is licensed under [CC BY SA 2.0](https://creativecommons.org/licenses/by-sa/2.0/).

View file

@ -1,31 +0,0 @@
---
categories:
date: 2022-11-29T20:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Joost van Dijk - From passwords to passkeys: what's new with FIDO?"
speakers:
- joost-van-dijk
presentation:
filename: 2022-11-29-joost-van-dijk-from-passwords-to-passkeys-whats-new-with-fido.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=z4T5P_LpN3E
---
## Abstract
Recent additions to FIDO and W3C standards enable mass adoption of passwordless authentication. Browser and platform vendors like Apple, Google, and Microsoft have started to implement support for these additions, enabling websites and other relying parties to further transition away from passwords to cryptographically secure passkeys.
In this talk, we will discuss what these new additions are, and how they can help with replacing passwords. Along the way, we will answer questions like the following:
* What are passkeys or discoverable credentials? What are multi-device credentials, how are they different from single-device credentials, and what problem are they solving?
* Should I allow multi-device credentials on my website? How can I tell if a user logs in using a multi-device credential? How can device attestation and the FIDO metadata service help me distinguish different levels of authentication strength?
* How do I migrate from passwords to passkeys? What is WebAuthn Conditional Mediation and why would I need it?
* What is Hybrid transport and how does it allow me to use my phone as an authenticator?
## Biography
Joost van Dijk is a developer advocate at Yubico. He focuses on securing digital identities and accelerating the adoption of open source authentication standards as part of Yubico's developer program.

View file

@ -1,24 +0,0 @@
---
categories:
date: 2022-11-29T20:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Joyce Mellens - Caer: An IoT Firewall for consumers"
speakers:
- joyce-mellens
presentation:
filename: 2022-11-29-joyce-mellens-caer-an-iot-firewall-for-consumers.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=HHBzhHA1YCM
---
## Abstract
In this presentation, we will describe the technical design, practical UX considerations, and the limitations imposed by designing an open-source IoT Firewall for non-technical consumers. In short, this firewall begins as an out-of-band device that replaces the home router as DHCP server. It uses this position to restructures the network, containing IoT devices in isolated subnets and setting itself as the network gateway for all IoT devices in the home. From this position, besides applying some basic firewalling, it also employs an automated form of secondary authentication via whitelisting through a companion application to effectively enforce MFA.
## Biography
Joyce Mellens is young lecturer and researcher at the Hanze University of Applied Sciences, where she teaches students the foundations of computing architecture and cybersecurity. As a researcher she specializes in the Internet of Things, preferring to focus on the challenges of marrying cybersecurity with useability for consumers who dont know what that word means.

View file

@ -1,30 +0,0 @@
---
categories:
date: 2022-11-29T20:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Kris Buytaert - Help My Datacenter is On Fire"
speakers:
- kris-buytaert
presentation:
filename: 2022-11-29-kris-buytaert-help-my-datacenter-is-on-fire.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=ik7FX_WwCns
---
## Abstract
Most people will claim that this never happens, others hope it never happens, but it happened, and it was not just the 1 datacenter that got impacted, but the whole campus of the provider that got powered down. This talk will explain how our customers survived this outage, how our culture, opensource tooling and automation saved the da(y,ta). A talk about disaster recovery, business continuity plans and building cloud agnostic stacks that survive disasters.
## Biography
Kris Buytaert is a long time Linux and Open Source Consultant. He's one of instigators of the devops movement, currently working for Inuits
He is frequently speaking at, or organizing different international conferences and has written about the same subjects in different Books, Papers and Articles
He spends most of his time working on bridging the gap between developers and operations with a strong focus on High Availability, Scalability , Virtualisation and Large Infrastructure Management projects hence trying to build infrastructures that can survive the 10th floor test, better known today as the cloud while actively promoting the devops idea !
His blog can be found at ["Everything is a Freaking DNS Problem"](http://www.krisbuytaert.be/blog/)

View file

@ -1,26 +0,0 @@
---
categories:
- presentaties
date: 2022-11-29T20:31:43+02:00
description:
layout: event-talk
tags:
- communicatie
- keynote
title: "Lucinda Sterk - Talk nerdy to me"
speakers:
- lucinda-sterk
presentation:
filename: 2022-11-29-lucinda-sterk-talk-nerdy-to-me.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=DILgkfR79kY
---
## Abstract
Ik sta als communicatieadviseur en contentmaker nooit op gelijke hoogte als de technisch experts qua kennis. Hoe komen we dan toch tot een mooi product? Een blogpost of een whitepaper. "Talk nerdy to me", roep ik altijd tegen mijn nerds, en dan begint het proces waarbij zij en ik vooral veel geduld met elkaar moeten opbrengen. In deze talk vertel ik met een beetje humor en een vleugje vooroordeel hoe dat proces in zijn werk gaat.
## Biografie
Lucinda heeft na haar studie journalistiek bij diverse landelijke dagbladen gewerkt. In 2008 maakte zij de overstap naar communicatie en begon ze als crisiscommunicatiespecialist bij de Nationaal Coordinator Terrorismebestrijding en Veiligheid. In 2015 ging zij zich steeds meer richten op communicatie over cybersecurity. Na enkele jaren bij het NCSC, begon ze bij Fox-IT. In 2020 heeft ze de communicatie bij Z-CERT opgezet en sinds 2022 werkt ze voor DIVD en KPN Security

View file

@ -1,26 +0,0 @@
---
categories:
date: 2022-11-29T20:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Marcel Kornegoor - Course as Code: the future of AT Computing's training courses"
speakers:
- marcel-kornegoor
presentation:
filename: 2022-11-29-marcel-kornegoor-course-as-code-the-future-of-at-computings-training-courses.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=xaEP29OZR3U
---
## Abstract
In 1985 Ger Austen (A) and Hendrik-Jan Thomassen (T) started AT Computing to share their knowledge of the UNIX operating system with the world through training. For nearly 35 years, the training formula has remained untouched: a classroom, a teacher, and an on-premises lab environment. However, the technology has evolved considerably since 1985 and the success formula of yesteryear began to show more and more cracks. A real breaking point came with the rise of Kubernetes. It turned out to be impossible to build a lab environment for a full class of students on the on-premises environment. Not much later, the COVID pandemic ensured that virtual and hybrid training became a necessity for survival and that the way people in general (and IT people in particular) learn was permanently changed. The big question is therefore how AT Computing will remain a relevant player in the market for open source training in the future?
During this presentation we show how AT Computing looks at this and how we approach both our lab environment and our course materials as code and git first in order to (hopefully) find a future-proof new formula. Through a demo with a plethora of open source tools (Terraform, Packer, Ansible, Docker, GitLab, reStructuredText, LibreOffice, Python, CI/CD pipeline and Google Cloud Platform) and a storyline showing the ups and downs , the attendees are taken on the journey of discovery that we have embarked on with Course as Code. We are far from our final destination, but we are convinced that there is hope.
## Biography
Marcel earned a master's degree from Utrecht School of the Arts and after spending a couple of years as lead editor of a technical magazine, he started his IT career back in 2011. In 2018 he joined AT Computing and was promoted to CTO in early 2019. From that moment on he started to adapt the course of AT Computing towards containers, config management and cloud, with Linux at the core (of course) and a way of working that is heavily influenced by DevOps, LEAN and Continuous Delivery principles. Being brainwashed by the AT Computing gurus for over 4 years, he has become a huge fan of open source software. In his spare time he likes to spend time with his family or on his road bike or mountainbike.

View file

@ -1,24 +0,0 @@
---
categories:
date: 2022-11-29T20:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Michiel Leenaars - NLnet and NGI Zero: Working for the internet"
speakers:
- michiel-leenaars
presentation:
link: "https://nlnet.nl/NGI0/2022-NLUUG/"
recording:
platform: youtube
url: https://www.youtube.com/watch?v=xaEP29OZR3U
---
## Abstract
April 1st 1982, Teus Hagen launched the EUnet at the European Unix User Group (EUUG) spring conference, creating the first public wide area network in Europe. NLnet was born as part of a litter of 'national' networks. Fifteen years later this community effort had grown into a foundation which had a company underneath that ran a flourishing business - which was sold to its American sister UUnet (named after the Unix-to-Unix Copy Protocol). Stichting NLnet used to proceeds to morph into a recognised public benefit organisation focused on achieving 'an open information society', and for the last 25 years has been funding the development of free, libre and open source technologies across the globe. Everything it funds is free and open source software and hardware, open standards and open content. This ranges from libre silicon chips, to open hardware GSM networks, projects like Wireguard and Jitsi - and much more. Meanwhile NLnet plays a strong role in the Next Generation Internet initiative set up by the European Commission. In this talk, Michiel Leenaars will dive into the current portfolio of projects, and talk about funding opportunities through the open calls of NLnet and NGI - in other words: how to get your project funded.
## Biography
Michiel Leenaars (1972, Netherlands) is the chairperson of The Commons Conservancy. In daily life he is Director of Strategy at NLnet Foundation. and director of Internet Society Netherlands, one of the more sizable Internet Society chapters in the world. He is also a W3C liason officer for the Benelux Office of the World Wide Web Consortium. He currently leads two of the four Research & Innovation Actions of the Next Generation Internet initiative, NGI Zero Discovery and NGI Zero PET. He is active in a number of national and international organisations, such as OpenDoc Society (vice-chair), SIDN Fund (Board of Advisors), Digitale Infrastructuur Nederland, and Petities.nl foundation (treasurer). He is a member of the Netherlands committee for the UNESCO Information for All Programme.

View file

@ -1,26 +0,0 @@
---
categories:
date: 2022-11-29T20:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Ondřej Caletka - Run your own networking lab with Vagrant and Ansible"
speakers:
- ondrej-caletka
presentation:
filename: 2022-11-29-ondrej-caletka-run-your-own-networking-lab-with-vagrant-and-ansible.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=xaEP29OZR3U
---
## Abstract
Today's computers are pretty powerful and capable of running a few virtual machines. In the RIPE NCC we use this potential for our e-learning courses to provide the participants a portable lab environment that is based on open source software and can run on most computers. In this talk I will demonstrate how we use tools like Vagrant, VirtualBox or Ansible to automate creation and distribution of such environments as well as some pitfalls discovered along the way.
## Biography
Ondřej works as a technical expert in the Learning and Development team of the RIPE NCC. His main responsibility includes developing and operating the lab environment for training courses and online learning.
Ondřej graduated from Czech Technical University in Prague and worked as network services administrator and developer for the Czech national research and education network CESNET before joining the RIPE NCC. He is also active in local IT communities around open source/free software, and acts as an IPv6 and DNSSEC ambassador, delivering talks and trainings at various events.

View file

@ -1,51 +0,0 @@
---
categories:
date: 2022-11-29T20:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Riccardo ten Cate & Glenn ten Cate - Exploitation, automation, mitigation"
speakers:
- riccardo-ten-cate
- glenn-ten-cate
presentation:
filename: 2022-11-29-riccardo-en-glenn-ten-cate-exploitation-automation-mitigation.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=CH2ntnZxZks
---
## Abstract
We can see the trends in integrating security tooling into CI/CD pipelines. However, security tooling alone will not cover your entire attack surface. This is because the tooling can never understand the full context of the applications functions and logic. On the other hand, resources in the form of manual verification can often be scarce and expensive.
Where do we find the right balance between security test automation and manual verification?
Even more importantly, how do we train the developers to understand the metrics and make security part of their process and culture?
OWASP security knowledge framework introduced a new interactive learning platform to teach you everything you need to know about secure software development! SKF helps you deploy sandboxed learning environments on the fly where you find all the tools you need to get yourself going.
Use the OWASP SKF to train yourself or your entire team to exploit and mitigate web application vulnerabilities.
In our session:
* We will show you how the SKF is set-up, so you can get started.
* We will show the labs and demo live exploitation of the labs.
* How do we fix the vulnerabilities? We will use SKF to generate security requirement that guide how to mitigate the vulnerabilities demonstrated in the labs
* We will implement mitigations (requirements) and use the Owasp ZAP (Automation framework) and ZEST to validate the mitigations.
## Biography Riccardo
As a penetration tester from the Netherlands Riccardo ten Cate specialises in application security and has extensive knowledge in securing applications in multiple coding languages. Riccardo has many years of experience in training and guiding development teams becoming more mature and making their applications secure by design.
## Biography Glenn
As a coder, hacker, speaker, trainer and security chapter leader employed at ING Belgium Glenn has over 15 years experience in the field of security. One of the founders of defensive development security trainings dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world.
Not only does Glenn train developers, he and his brother Riccardo also donated an entire knowledge framework solely dedicated to help developers make their code secure by design.
See: SKF (Security knowledge framework) https://www.securityknowledgeframework.org

View file

@ -1,26 +0,0 @@
---
categories:
date: 2022-11-29T20:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Rob Hulsebos - OT Cybersecurity Challenges"
speakers:
- rob-hulsebos
presentation:
filename: 2022-11-29-rob-hulsebos-ot-cybersecurity-challenges.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=CH2ntnZxZks
---
## Abstract
“OT” (Operations Technology) systems are all around us, but hardly ever noticed, while a failure in their operation could impact society or cripple companies. However, their cybersecurity lags behind, for various reasons and this has resulted in numerous hacks with major consequences far beyond the effort needed.
In this talk, we will discuss what “OT” is, the special challenges for this (often legacy) equipment, the lack of interest in cybersecurity both from vendors and users, the usage of network protocols and stacks from the previous century, the difficulty of patching equipment and what PLC programmers themselves can do. We will also highlight the “IEC-62443” standard, specially dedicated to industrial cybersecurity.
## Biography
Graduated 1986, computer science, Eindhoven. Always been working in industrial machinery, PLC's, etc. Specialised in the implementation of many industrial network protocols, Since 1993 active as freelance journalist for the Dutch trade press about current developments in networking and cybersecurity, wrote several books about it. Since 1998 active as teacher on these subjects. In 2010, assisted Symantec in decoding Stuxnet. As of 2018, am now working for Forescout (Eindhoven) OT Competence Center, developing detection of malwares and other unwanted operations in OT environments.

View file

@ -1,28 +0,0 @@
---
categories:
date: 2022-11-29T20:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Sake Blok - LOG4SHELL: Getting to know your adversary"
speakers:
- sake-blok
presentation:
filename: 2022-11-29-sake-blok-log4shell-getting-to-know-your-adversary.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=4X0ITI_YOiw
---
## Abstract
What does a LOG4SHELL attack look like on the network and how to analyze the LOG4SHELL attack (including some of its deployed exploits) with Wireshark.
In December 2021, the IT world was shaken up by a CVE with score 10. A vulnerability in the widely used log4j logging library allowed an attacker to run arbitrary code on the system by making it log a specific string. As a lot of elements in the logging comes from user controlled data, the exploit was very easy use.
In order to understand the attack and it's impact, I reproduced an attack in my LAB. And after that, I set up a honeypot to collect attack samples. I went one step further and set up an isolated system and deliberately infected it with some of the exploits to see what it would do. In this talk I will walk through the process of (safely) setting up the LAB systems, the honeypot and the infected victim. The captured traffic will be analyzed with Wireshark and some hints and tips on how to use Wireshark in a security context will be given.
## Biography
Sake Blok calls himself "Relational Therapist for Computer Systems", as he solves problems by looking closely at the communication between computer systems. He has been using Wireshark/Ethereal for almost 20 years. In 2009, Sake started the company SYN-bit to provide network analysis and training services to enterprises across Europe. During his work, Sake started developing functionality for Wireshark that he missed while working with the analyser in his day-to-day job. He also enhanced multiple protocol dissectors to suit his analysis needs. In 2007, Sake joined the Wireshark Core Development team.

View file

@ -1,261 +0,0 @@
---
categories:
- conferenties
- evenementen
date: 2018-05-15T20:17:47+02:00
description: "De NLUUG voorjaarsconferentie heeft plaatsgevonden op dinsdag 15 mei 2018. Bekijk hier het programma, de presentaties, opnames en foto's."
is_event: true
tags:
- conferenties
slug:
title: "NLUUG voorjaarsconferentie 2018"
layout: schedule-event
event_title: "NLUUG voorjaarsconferentie 2018"
event_start: 2018-05-15T08:30:00+02:00
event_end: 2018-05-15T18:00:00+02:00
event_timezone: Europe/Amsterdam
event_location: Van der Valk Hotel Utrecht
event_address:
street_address: "Winthontlaan 4-6"
postal_code: "3526 KV"
city: "Utrecht"
country_name: "The Netherlands"
event_organizers:
- organizer:
id: nluug
name: NLUUG
event_attendance_mode: "offline"
event_images:
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
event_description: "Voorjaarsconferentie 2018 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
event_members_only: true
event_register_link: "https://nluug.nl/aanmelden/index.cgi?action=event"
event_status: "scheduled"
event_schedule:
title: Programma
description:
columns: 4
headers:
- header:
width: 10
- header:
text: Zaal 1
center: true
width: 30
- header:
text: Zaal 2
center: true
width: 30
- header:
text: Zaal 3
center: true
width: 30
rows:
- row:
columns:
- column:
time: 08:30
- column:
textfield:
text: Inschrijving, ontvangst, koffie
size: 3
center: true
- row:
columns:
- column:
time: 09:15
- column:
textfield:
text: Openingswoord
center: true
size: 3
- row:
columns:
- column:
time: 09:30
- column:
talk:
speaker: Bill Cheswick
title: "Some Thoughts on Current Security Topics, and Their Eventual Mitigation"
keynote: true
link:
center: true
size: 3
- row:
columns:
- column:
time: 10:30
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 11:00
- column:
talk:
speaker: Jeroen Janssens
title: Workshop Data Science with UNIX Power Tools
link:
- column:
talk:
speaker: Klaas van Gend
title: The backgrounds of Meltdown and Spectre
link:
- column:
talk:
speaker: Alec Muffett
title: "Setting-up a .Onion address for your Website"
link:
- row:
columns:
- column:
time: 11:45
- column:
size: 3
- row:
columns:
- column:
time: 11:50
- column:
talk:
title: Vervolg workshop Jeroen Janssens
link:
- column:
talk:
speaker: David Woodhouse
title: Mitigating Spectre and Meltdown vulnerabilities
link:
- column:
talk:
speaker: Melanie Rieback
title: Pentesting Chatops
link:
- row:
columns:
- column:
time: 12:35
- column:
textfield:
text: Lunch
center: true
size: 3
- row:
columns:
- column:
time: 13:15
- column:
- column:
textfield:
text: NLUUG Algemene Ledenvergadering (ALV)
center: true
- column:
- row:
columns:
- column:
time: 14:00
- column:
talk:
speaker: Franklin Hu
title: "Kubernetes Cron Jobs: Going from Alpha to Production"
link:
- column:
talk:
speaker: James Bottomley
title: "Enhancing Linux Security with the TPM"
link: talks/james-bottomley-enhancing-linux-security-with-tpm/
- column:
talk:
speaker: Walter Belgers
title: Gigatron TTL Computer
link: talks/walter-belgers-gigatron-ttl-computer/
- row:
columns:
- column:
time: 14:45
- column:
size: 3
- row:
columns:
- column:
time: 14:50
- column:
talk:
speaker: Oleg Ivanivskyi
title: "Zabbix: 4.0 Seasons of monitoring"
link:
- column:
talk:
speaker: Adrianus Warmenhoven
title: Port Knocking
link: talks/adrianus-warmenhoven-port-knocking/
- column:
talk:
speaker: Kevin McPeake
title: "Rise of the WarriorPI's"
link:
- row:
columns:
- column:
time: 15:35
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 16:00
- column:
talk:
speaker: Ralph Dolmans en Martin Hoffmann
title: "DNSSEC: Rollin', Rollin', Rollin'"
link: talks/ralf-dolmans-martin-hoffmann-dnssec-rollin-rollin-rollin/
- column:
talk:
speaker: Rogier Spoor en François Kooman
title: "Let's Connect - Open Source VPN Solution"
link: talks/rogier-spoor-francois-kooman-lets-connect-open-source-vpn-solution/
- column:
talk:
speaker: Ilja van Sprundel
title: Are all BSDs created equally?
link:
- row:
columns:
- column:
time: 16:45
- column:
size: 3
- row:
columns:
- column:
time: 16:50
- column:
talk:
speaker: Willem Westerhof
title: Beveiliging van PV-installaties
link: talks/willem-westerhof-how-an-intern-hacked-the-power-grid/
- column:
talk:
speaker: Howard Chu
title: Inside Monero - The worlds first fungible cryptocurrency
link:
- column:
talk:
speaker: Nanako Momiyama
title: IP Forwarding Fastpath on FreeBSD
link:
- row:
columns:
- column:
time: 17:35
- column:
textfield:
text: Borrel, gesponsord door SNOW
center: true
size: 3
---

View file

@ -1,36 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- hacking
- port-knocking
- single-packet-authentication
title: "Adrianus Warmenhoven - Port Knocking"
speakers:
- adrianus-warmenhoven
presentation:
filename: 2018-11-15-adrianus-warmenhoven-port-knocking.pdf
recording:
platform: youtube
url:
---
## Abstract
Using SPA for profit and fun, or, a zero-cost solution to getting your fridge out of Shodan.
Port knocking has been around for quite a while; send a sequence of packets to seemingly closed ports and Sesame opens up. This is, however, not so very secure. Single Packet Authentication port knocking, involving a signed packet with an timestamp, is a lot more secure and works quite well.
I want to make the case that, just like firewalling (IPTables), SPA port knocking should be a default mechanism in any modern OS, especially the IoT OSes. It is easily implemented (both on server and on client side) and is readily available. It takes the stress out of getting every underpaid worker on the same security page whilst still enabling access when needed.
And finally, it can be used (a hobby of mine) to waste tremendous amounts of time and resources of (wannabe) attackers; your server can be a Decepticon too!
## Biography
Adrianus Warmenhoven has been involved in pioneering endeavors in IT since the early 1990s. Collaborated in setting up firsts in Dutch anti-cybercrime, branch organization for ISPs as well as being CTO for one of the first free ISPs in the Netherlands, co-designer of supercomputing hardware and running projects for Dutch governmental organizations.
For various international companies, he has done security reviews and given advice on how to deal with active threats and extortion. He is now affiliated with RedSocks as security evangelist and develops academic classes in hacking.

View file

@ -1,35 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- linux
- security
- tpm
title: "James Bottomley - Enhancing Linux Security with TPM"
speakers:
- james-bottomley
presentation:
link: "https://www.hansenpartnership.com/Impress-Slides/NLUUG-2018/#/begin"
recording:
platform: youtube
url:
---
## Abstract
Thanks to Microsoft requiring version 2 of a TPM for Windows, the Linux drivers for this technology have been making great strides: We now have an in-kernel resource manager an in-kernel trusted TPM based keys which can give the user the same protection as two factor authentication. This now allows us to build a functional secrets guarding ecosystem around TPM2 with Linux both for personal and Cloud Container use.
This talk will first of all explain how a TPM2 guards secrets and keys, look at the in-kernel technology and how it works, including a brief digression into the TPM Genie security breach and how we countered it in linux and end with a survey of the current state of Linux ecosystem support for TPM based keys.
Note this talk is entirely about TPM2 (TPM1 and trousers will not be mentioned, neither will measurement except for key sealing).
## Biography
James Bottomley is a Distinguished Engineer at IBM Research where he works on Cloud and Container technology. He is also Linux Kernel maintainer of the SCSI subsystem. He has been a Director on the Board of the Linux Foundation and Chair of its Technical Advisory Board.
He went to university at Cambridge for both his undergraduate and doctoral degrees after which he joined AT&T Bell labs to work on Distributed Lock Manager technology for clustering.
In 2000 he helped found SteelEye Technology, a High availability company for Linux and Windows, becoming Vice President and CTO. He joined Novell in 2008 as a Distinguished Engineer at Novell's SUSE Labs, Parallels (later Odin) in 2011 as CTO of Server Virtualization and IBM Research in 2016.

View file

@ -1,43 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- dnssec
- root-key-rollover
- rfc5011
title: "Ralf Dolmans & Martin Hoffmann - DNSSEC: Rollin', Rollin', Rollin'"
speakers:
- ralf-dolmans
- martin-hoffmann
presentation:
filename: 2018-11-15-ralf-dolmans-martin-hoffmann-dnssec-rollin-rollin-rollin.pdf
recording:
platform: youtube
url:
---
## Abstract
This is a talk about the status of the planned DNSSEC root key rollover. The first part of the presentation is an introduction to DNSSEC and will cover how DNSSEC works and which keys are involved, why keys are rolled in DNSSEC, and how keys in DNSSEC are updated and retrieved by DNSSEC validators.
The second part of the presentation will cover the scheduled root key rollover, including the original time-line, the new methods to get an insight in the current status (and its limitations) and the reason why the key roll is postponed.
The last part will cover a study performed by Open Netlabs on the state of the RFC5011 implementation in various open source DNSSEC validators. RFC5011 describes a method to update DNSSEC keys and a proper implementation is crucial for the root key rollover.
## Biography Martin Hoffmann
Martin is a systems architect at NLnet Labs. There, he is involved in various projects aiming to improve the stability, security, and privacy of the Internet.
While most of his current work revolves around the DNS, he previously lived further up the stack, developing and operating the server side of real-time communication and VoIP services.
## Biography Ralph Dolmans
Ralph is a software developer at NLnet Labs and one of the core developers of Unbound and the internet.nl Internet standards compliance test website (DNS, DNSSEC, DANE, IPv6, TLS, DMARC/DKIM/SPF).
Ralph completed his MSc study System and Network Engineering at the University of Amsterdam. After his study, he started as a system and software engineer at NLnet Labs. At NLnet Labs his tasks are various, including writing code (implement RFCs), review Internet Drafts and send feedback to mailing lists.
Ralph is programme committee member for DNS-OARC and member of expert groups on usage of TLS and secure email (national and international fora).

View file

@ -1,38 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- wifi
- vpn
- lets-connect
title: "Rogier Spoor & François Kooman - Let's Connect! - Open Source VPN solution"
speakers:
- rogier-spoor
- francois-kooman
presentation:
filename: 2018-11-15-rogier-spoor-francois-kooman-lets-connect-open-source-vpn-solution.pdf
recording:
platform: youtube
url:
---
## Abstract
Public WiFi hotspots in a hotel, restaurant or train are generally unsafe. There is a risk of being eavesdropped or tracked by someone on the same network or by malicious software. A virtual private network (VPN) sends all data over an encrypted connection and offers a safe and secure path to the internet.
There are hardly any Internet Service Providers (ISP) that provide VPN services to their customers and setting it up yourself is rather cumbersome. The few ones that do offer VPN havent been able to offer a modern and user-friendly experience to their users. There are a lot of other VPN solutions around, but most of them do not provide sufficient security en privacy to their users.
Lets Connect! provides an open source VPN solution allowing ISPs, hosters and bussinesses to easily setup a secure VPN service. Even security minded people will be able to deploy it in a home environment. After deployment, users have a safe path from all generic devices.
What is unique about Let's Connect! It is fully open-source (server management, client, gui etc) and integrates nicely via SAML with identity management systems. It allows you to rebrand the apps and run large scale VPN services.
## Biography
Rogier Spoor, manager bij SURFnet en innovator pur sang. Tijdens zijn studententijd in 1997 medeoprichter van het reizende DNA-lab dat vervolgens landelijk is geadopteerd. Bij SURFnet heeft Rogier in 2004 SURFids, een gedistribueerd detectiesysteem, ontwikkeld dat een internationaal succes was.
Daarnaast heeft Rogier aan de wieg gestaan van SURFnet's eigen 'dropbox' dienst, Filesender geïntroduceerd, DNSsec geïnitieerd, IPv6 adoptie en IaaS dienstontwikkeling getrokken. Op dit moment trekt Rogier de internationale ontwikkeling en adoptie van eduVPN, een VPN standaard voor onderwijs en onderzoek.
Rogier is voorzitter van stichting HoneyNED, waarin security experts van Nederlandse organisaties samenwerken. Bestuurder bij the Commons Conservancy, een software governance orgaan.

View file

@ -1,38 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- wifi
- vpn
- lets-connect
title: "Rogier Spoor & François Kooman - Let's Connect! - Open Source VPN solution"
speakers:
- rogier-spoor
- francois-kooman
presentation:
filename: 2018-11-15-rogier-spoor-francois-kooman-lets-connect-open-source-vpn-solution.pdf
recording:
platform: youtube
url:
---
## Abstract
Public WiFi hotspots in a hotel, restaurant or train are generally unsafe. There is a risk of being eavesdropped or tracked by someone on the same network or by malicious software. A virtual private network (VPN) sends all data over an encrypted connection and offers a safe and secure path to the internet.
There are hardly any Internet Service Providers (ISP) that provide VPN services to their customers and setting it up yourself is rather cumbersome. The few ones that do offer VPN havent been able to offer a modern and user-friendly experience to their users. There are a lot of other VPN solutions around, but most of them do not provide sufficient security en privacy to their users.
Lets Connect! provides an open source VPN solution allowing ISPs, hosters and bussinesses to easily setup a secure VPN service. Even security minded people will be able to deploy it in a home environment. After deployment, users have a safe path from all generic devices.
What is unique about Let's Connect! It is fully open-source (server management, client, gui etc) and integrates nicely via SAML with identity management systems. It allows you to rebrand the apps and run large scale VPN services.
## Biography
Rogier Spoor, manager bij SURFnet en innovator pur sang. Tijdens zijn studententijd in 1997 medeoprichter van het reizende DNA-lab dat vervolgens landelijk is geadopteerd. Bij SURFnet heeft Rogier in 2004 SURFids, een gedistribueerd detectiesysteem, ontwikkeld dat een internationaal succes was.
Daarnaast heeft Rogier aan de wieg gestaan van SURFnet's eigen 'dropbox' dienst, Filesender geïntroduceerd, DNSsec geïnitieerd, IPv6 adoptie en IaaS dienstontwikkeling getrokken. Op dit moment trekt Rogier de internationale ontwikkeling en adoptie van eduVPN, een VPN standaard voor onderwijs en onderzoek.
Rogier is voorzitter van stichting HoneyNED, waarin security experts van Nederlandse organisaties samenwerken. Bestuurder bij the Commons Conservancy, een software governance orgaan.

View file

@ -1,31 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- gigatron
- ttl-chips
title: "Walter Belgers - Gigatron TTL Computer"
speakers:
- walter-belgers
presentation:
filename: 2018-11-15-walter-belgers-gigatron-ttl-computer.pdf
recording:
platform: youtube
url:
---
## Abstract
What happens when a hacker gets his hands on a heap of 7400-series TTL chips, an oscilloscope and a soldering iron? In 1975 Wozniak famously made Breakout out of 44 such chips. When the MOS 6502 and Zilog Z80 were launched one year later, his Apple 1 started the microcomputer revolution. But were these processor ICs really necessary for that?
One year ago we ordered a bunch of such ICs, bought an oscilloscope and started hacking. The result is a fully functional microcomputer from 36 TTL chips, ROM, RAM, some diodes, etcetera, but most importantly: no microprocessor.
This talk explores the hardware design, the software stack and the capabilities of our result we now call “the Gigatron”. It will give you a good understanding of how a CPU works and what interesting design decisions we have made to keep our CPU small, yet powerful.
## Biography
Walter Belgers is a hacker, having worked in IT security for all his life, the majority as a penetration tester and currently as a security officer at Philips. He is also the chairman of Toool, the Open Organisation of Lockpickers. He has been soldering since the 1970s but never before has he built a complete computer.

View file

@ -1,34 +0,0 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- power-grid
- hacking
title: "Willem Westerhof - How an intern hacked the power grid"
speakers:
- willem-westerhof
presentation:
filename: 2018-11-15-willem-westerhof-how-an-intern-hacked-the-power-grid.pdf
recording:
platform: youtube
url:
---
## Abstract
The Horus scenario, is a scenario describing a large scale cyber attack targeting the vital electrical infrastructure. This scenario was both theoretically and practically proven to exist during the thesis of Willem Westerhof.
Horus is an ancient Egyptian god, referred to in many different ways, which is in most cases related to the heavens or the sun. In mythology, one of his eyes stands for the sun, the other one of his eyes stands for the moon. The Horus scenario focuses on a cyber attack on PhotoVoltaic-installations (solar energy systems) and “recreates” the impact that a Solar eclipse has on the stability of the power grid, hence the reference to the old god.
In essence, this means that a scenario was created and proven where a malicious hacker targets the electrical grid by focusing on PV-installations and succeeds in causing large scale (Nation-wide or even continental) power outages. If this attack is ever truly executed in the wild, it is expected to cost billions of euros and have a direct and severe impact on everybodys lives.
## Biography
As a graduate with honours this (former)student performed serious ethical hacking work on PV-installations. He ended up disclosing a large number of vulnerabilities to the specific vendor, and mathematically proving that it was possible to cause large scale (nation-wide/continental wide) power outages using the discovered vulnerabilities.
Following his study he has worked as an ethical hacker/security specialist and done work on a large number of companies, different sectors, and specific products. He was also requested to advise the dutch national government (2e kamer) department of justice and safety regarding cyber security issues and how to deal with them.
He currently leads a small team of ethical hackers for the offensive security centre at ITsec security services. In addition, he provides workshops and trainings, performs penetration tests/vulnerability assessments, does research on password cracking and public speaking from time to time.

View file

@ -1,254 +0,0 @@
---
categories:
- conferenties
- evenementen
date: 2019-05-23T16:08:58+02:00
description: "De NLUUG voorjaarsconferentie werd gehouden op donderdag 23 mei 2019 in het Van der Valk Hotel Utrecht."
is_event: true
tags:
- conferenties
slug:
title: "NLUUG voorjaarsconferentie 2019"
layout: schedule-event
event_title: "NLUUG voorjaarssconferentie 2019"
event_start: 2019-05-23T08:30:00+02:00
event_end: 2019-05-23T18:00:00+02:00
event_timezone: Europe/Amsterdam
event_location: Van der Valk Hotel Utrecht
event_organizers:
- organizer:
id: nluug
name: NLUUG
event_attendance_mode: "offline"
event_images:
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
event_description: "Voorjaarsconferentie 2019 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
event_address:
street_address: "Winthontlaan 4-6"
postal_code: "3526 KV"
city: "Utrecht"
country_name: "The Netherlands"
event_members_only: true
event_status: "scheduled"
event_schedule:
title: Programma
description:
columns: 4
headers:
- header:
width: 10
- header:
text: Zaal 1
center: true
width: 30
- header:
text: Zaal 2
center: true
width: 30
- header:
text: Zaal 3
center: true
width: 30
rows:
- row:
columns:
- column:
time: 08:30
- column:
textfield:
text: Inschrijving, ontvangst, koffie
size: 3
center: true
- row:
columns:
- column:
time: 09:15
- column:
textfield:
text: Openingswoord
center: true
size: 3
- row:
columns:
- column:
time: 09:30
- column:
talk:
speaker: Frank Karlitschek
title: "ownCloud/nextCloud, Why I forked my own project and my own company"
keynote: true
link: talks/frank-karlitschek-owncloud-nextcloud-why-i-forked-my-own-project-and-my-own-company/
center: true
size: 3
- row:
columns:
- column:
time: 10:30
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 11:00
- column:
talk:
speaker: Andy Miller
title: Quickly build a personal resume site with Grav, a modern flat-file open source CMS
link: talks/andy-miller-quickly-build-a-personal-resume-site-with-grav-a-modern-flat-file-open-source-cms/
- column:
talk:
speaker: Maxim Burgerhout
title: End-to-end automation with Ansible
link: talks/maxim-burgerhout-end-to-end-automation-with-ansible/
- column:
talk:
speaker: Brian Joseph
title: "How new OS technologies & standards will not only excite admins... but users as well"
- row:
columns:
- column:
time: 11:45
- column:
size: 3
- row:
columns:
- column:
time: 11:50
- column:
talk:
title: vervolg workshop Andy Miller
link:
- column:
talk:
speaker: Joost van Dijk
title: FIDO2 and Web Authentication
link: talks/joost-van-dijk-fido2-and-web-authentication/
- column:
talk:
speaker: Reinoud van Leeuwen
title: Built-in security in an agile online software development environment
link: talks/reinoud-van-leeuwen-built-in-security-in-an-agile-online-software-development-environment/
- row:
columns:
- column:
time: 12:35
- column:
textfield:
text: Lunch
center: true
size: 3
- row:
columns:
- column:
time: 13:15
- column:
textfield:
text: ALV
center: true
size: 3
- row:
columns:
- column:
time: 14:00
- column:
talk:
speaker: Robert Altnoeder
title: Software Defined Storage the Linux way
link: talks/robert-altnoeder-software-defined-storage-the-linux-way/
- column:
talk:
speaker: Kashyap Chamarthy
title: Effective Virtual CPU Configuration with QEMU and libvirt
link: talks/kashyap-chamarthy-effective-virtual-cpu-configuration-with-qemu-and-libvirt/
- column:
talk:
speaker: Esther Crabbendam
title: Protection of data, privacy and online freedom in a fast changing world
link: talks/esther-crabbendam-protection-of-data-privacy-and-online-freedom-in-a-fast-changing-world/
- row:
columns:
- column:
time: 14:45
- column:
size: 3
- row:
columns:
- column:
time: 14:50
- column:
talk:
title: vervolg workshop Robert Altnoeder
- column:
talk:
speaker: Olivier Lambert
title: "XCP-ng: building an Open Source and turnkey virtualization platform"
link: talks/olivier-lambert-xcp-ng-building-an-open-source-and-turnkey-virtualization-platform/
- column:
talk:
speaker: Alexios Zavras
title: Making Open Source Easily Usable
link: talks/alexios-zavras-making-open-source-easily-usable/
- row:
columns:
- column:
time: 15:35
- column:
textfield:
text: Koffiepauze
center: true
size: 3
- row:
columns:
- column:
time: 16:00
- column:
talk:
speaker: Amir Jerbi
title: Keeping your Kubernetes secured using kube-hunter, kube-bench and microscanner
link: talks/amir-jerbi-keeping-your-kubernetes-secured-using-kube-hunter-kube-bench-and-microscanner-github/
- column:
talk:
speaker: Suzanne Daniels
title: From Clippy to Kernel
link: talks/suzanne-daniels-from-clippy-to-kernel/
- column:
talk:
speaker: Rudi van Drunen
title: "CI/CD in a modern world"
link: talks/rudi-van-drunen-ci-cd-in-a-modern-world/
- row:
columns:
- column:
time: 16:45
- column:
size: 3
- row:
columns:
- column:
time: 16:50
- column:
talk:
title: vervolg workshop Amir Jerbi
- column:
talk:
speaker: Bert Hubert
title: "DNS & TLS SNI: Now with encryption... and cloud"
link: talks/bert-hubert-dns-and-tls-sni-now-with-encryption-and-cloud/
- column:
talk:
speaker: Mike Hulsman
title: The NLUUG FTP server
link: talks/mike-hulsman-the-nluug-ftp-server/
- row:
columns:
- column:
time: 17:35
- column:
textfield:
text: Borrel, gesponsord door Snow
center: true
size: 3
---

View file

@ -1,30 +0,0 @@
---
categories:
- presentaties
date: 2019-05-23T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Alexios Zavras - Making Open Source Easily Usable"
speakers:
- alexios-zavras
presentation:
filename: 2019-05-23-alexios-zavras-making-open-source-easily-usable.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=3ab14ur_QJA
---
## Abstract
Releasing some software as “Open Source” entails a few more steps than simply making it available (or “push to a repo”). Notwithstanding any quality or usability issues, the software, in order to be legally used by others, has to have an appropriate license.
This talk will present the basics of software licenses and legal compliance, from the viewpoints of both the producers and consumers of open source software. The audience will get detailed practical information and will be in position to immediately apply the concepts learned into their daily work.
## Biography
Alexios Zavras (zvr) is the Senior Open Source Compliance Engineer of Intel Corp. He has been involved with Free and Open Source Software since 1983, and is an evangelist for all things Open.
He has a PhD in Computer Science after having studied Electrical Engineering and Computer Science in Greece and the United States.
Alexios is a regular speaker in international conferences and industry events and he first presented in an NLUUG event 21 years ago!

View file

@ -1,42 +0,0 @@
---
categories:
- presentaties
date: 2019-05-23T10:31:43+02:00
description: ""
layout: event-talk
tags:
- kubernetes
- kube-hunter
- kube-bench
- microscanner
title: "Amir Jerbi - Keeping your Kubernetes secured using kube-hunter, kube-bench and microscanner GitHub"
speakers:
- amir-jerbi
presentation:
filename: 2019-05-23-amir-jerbi-keeping-your-kubernetes-secured-using-kube-hunter-kube-bench-and-microscanner-github.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=Qz0LcwwABJg
---
## Abstract
This is a hands-on workshop session that will show you how to apply opensource and free tools to apply good security hygiene with your Kubernetes cluster. During the workshop we will show some real attacks that can happen due to a miss-configured cluster and how the opensource tools can help us identify these issues and remediate them.
The following tools will be used during the session:
* kube-hunter: A pen-testing tool for Kubernetes that simulates attacks on your cluster. It shows you what is the attack surface for your existing Kubernetes cluster.
* kube-bench: A configuration assessment tool that shows you how to tweak your cluster settings based on the CIS best practices.
* microscanner: A free image scanning utility that scans your Docker images for known security vulnerabilities.
__Other Info:__
Attendees should have access to a Kubernetes cluster (can be a mini-kube installed on their laptop). Network access to download opensource tools is also needed.
## Biography
Amir Jerbi brings to Aqua 17 years of security software experience in technical leadership positions. Amir co-founded Aqua with the vision of creating a security solution that will be simpler and lighter than traditional security products.
Prior to Aqua, he was a Chief Architect at CA Technologies, in charge of the host based security product line, building enterprise grade security products for Global 1000 companies. Amir has 14 cloud and virtual security patents under his belt. In his free time, Amir enjoys backpacking in exotic places.

View file

@ -1,60 +0,0 @@
---
categories:
- presentaties
date: 2019-05-23T10:31:43+02:00
description: ""
layout: event-talk
tags:
- grav
- cms
title: "Andy Miller - Quickly build a personal resume site with Grav, a modern flat-file open source CMS"
speakers:
- andy-miller
presentation:
filename: 2019-05-23-andy-miller-quickly-build-a-personal-resume-site-with-grav-a-modern-flat-file-open-source-cms.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=flMPnb_gwg8
---
## Abstract
Grav is a modern open-source flat-file CMS built to be _fast_, _flexible_, and _extensible_. In this workshop, we will cover the basics of Grav, it's origins, and it's _many benefits_ over traditional database-powered platforms.
During this comprehensive session we will go step-by-step through the process of creating a personal resume site while touching on many key topics that will enable you to develop more complex sites in the future:
* Installation via __ZIP__, __GitHub__, and __Composer__
* Configuration and customization via __YAML-based config files__
* Making use of Grav's __CLI tools__
* __Markdown syntax__ and Grav-specific content features
* Content __editing and creation__ via the filesystem
* Working with __content media__ such as images and videos
* Understanding the difference between __regular__ and __modular pages__
* Basic __theme modification__, and a quick guide to creating your own __custom theme__
* Overview of Grav's __plugin architecture__ and the __Grav Package Manager (GPM)__
* Including __forms__ utilizing Grav's flexible Form plugin and blueprints
* Optional web-based __administration plugin__
* Grav's powerful __multi-language capabilities__
* Overview of __Scheduler__ and __Backups manager__
* Using GitHub to manage your __deployment workflow__
Participants should bring their own devices if they wish to follow along. They should have PHP 7.1+ pre-installed, a modern browser installed, and be familiar using a text editor.
## Biography
Andy Miller is a web developer with over 20 years of experience, having worked for fortune 100 companies, dot-com startups, and now runs his own businesses. Andy is a former core-team member of Joomla, as well as the CEO of RocketTheme, one of the longest running theme development companies that specializes in open source platforms.
As well as being involved in open source projects for over 13 years, he's also the author and lead developer of Grav CMS, a modern open-source flat-file CMS that is rapidly becoming a go-to alternative to traditional CMS platforms. Andy is also a senior partner at Trilby Media, a professional services company focusing on end-to-end site development with Grav CMS.

View file

@ -1,30 +0,0 @@
---
categories:
- presentaties
date: 2019-05-23T10:31:43+02:00
description: "Een presentatie gegeven door Bert Hubert over DNS en TLS SNI zoals het gebruik van DNS over TLS (DoT) en DNS over HTTPS (DoH)."
layout: event-talk
tags:
- dns
- doh
- dot
- tls
title: "Bert Hubert - DNS & TLS SNI: Now with encryption... and cloud"
speakers:
- bert-hubert
presentation:
filename: 2019-05-23-bert-hubert-dns-and-tls-sni-now-with-encryption-and-cloud.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=V2F92orIEO8
---
## Abstract
DNS is one of the few remaining (generally) unencrypted parts of our daily network use. In addition, TLS sessions (even TLS 1.3) transfer the name of the server visited in plaintext ("SNI"). 2018 saw the release of technologies to encrypt both of these privacy leaks, which is good. Less good however is that with this encryption, your DNS (and TLS SNI) lookups will move to the cloud.
In this talk, I explain the technologies used (DNS over TLS and DNS over HTTPS), but also spend time on what this change means: loss of control over your lookups (forget about your intranet), and how encrypting your data to a cloud provider may provide security against your network admin & government, but does send all your browsing behaviour to California.
## Biografie
Bert is the founder of PowerDNS. These days he also cares a lot about keeping the internet open. In addition, he can't help document or explain open technologies.

View file

@ -1,31 +0,0 @@
---
categories:
- presentaties
date: 2019-05-23T10:31:43+02:00
description: ""
layout: event-talk
tags:
- online-freedom
- privacy
- data
title: "Esther Crabbendam - Protection of data, privacy and online freedom in a fast changing world"
speakers:
- esther-crabbendam
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=jDOHyOeHrRU
---
## Abstract
Freedom and privacy on the internet are under threat, with far-reaching consequences for the daily lives of millions of internet users. Their data are being collected ever more frequently and for an ever longer period. Their access to websites can be blocked. It is even being proposed to cut off users from the internet altogether. Meanwhile, the development of innovative services is also under threat.
The coming years are decisive for the future of privacy and freedom on the internet. Now, we need to ensure that each internet user can decide for her- or himself what happens to their private data. Now, we have to act to make sure that each internet user can continue to enjoy an open and free internet without borders.
This talk wil focus on recent social developments, reflect on the role data, privacy en profiling plays in these and point out what users and business can do to make a change.
## Biography
Bits of Freedom is the leading digital rights organization in the Netherlands, focusing on privacy and freedom of communication online. Working at the cutting edge of technology and law, Bits of Freedom strives to influence legislation and self-regulation, and empower citizens and users by advancing the awareness, use, and development of freedom-enhancing technologies.

View file

@ -1,32 +0,0 @@
---
categories:
- presentaties
date: 2019-05-23T10:31:43+02:00
description: ""
layout: event-talk
tags:
- owncloud
- nextcloud
title: "Frank Karlitschek - ownCloud/nextCloud, why I forked my own project and my own company"
speakers:
- frank-karlitschek
presentation:
filename: 2019-05-23-frank-karlitschek-owncloud-nextcloud-why-i-forked-my-own-project-and-my-own-company.pdf
recording:
platform: youtube
url:
---
## Abstract
Frank founded ownCloud in 2010. After being the maintainer and CTO, he decided to leave his own project and company in 2016, to start Nextcloud. Most community people and a big part of the customers have followed him to Nextcloud. This talk covers the questions on why this happened and what other community maintainer and start-ups can learn.
This talk will tell the reasons why ownCloud was founded as an open source project, the good and bad things when it was turned into a venture capital funded company, the changes which Frank and the core team wanted for Nextcloud, and how that improved the business model, licensing and community relations.
This talk covers insights into different open source business models and how to create a win-win situation for a company and a community.
## Biography
Frank Karlitschek started the ownCloud project in 2010 to return control over the storing and sharing of information to consumers. In 2016 he initiated the Nextcloud project to bring this idea to the next level.
He has been involved with a variety of Free Software projects including having been a board member for the KDE community. Frank has spoken at MIT, CERN and ETH and keynoted LinuxCon, Latinoware, Akademy, openSUSE Con and many other conferences. Frank is a fellow of Open Forum Europe.

View file

@ -1,34 +0,0 @@
---
categories:
- presentaties
date: 2019-05-23T10:31:43+02:00
description: ""
layout: event-talk
tags:
- fido2
- web-authentication
title: "Joost van Dijk - FIDO2 and Web Authentication"
speakers:
- joost-van-dijk
presentation:
filename: 2019-05-23-joost-van-dijk-fido2-and-web-authentication.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=04AaSqXRJzU
---
## Abstract
Earlier this year, the World Wide Web Consortium published the W3C Recommendation for Web Authentication: An API for accessing Public Key Credentials. This API enables web sites to authenticate users with FIDO2 authenticators — small hardware tokens that can be used as a second factor for protecting your accounts at Dropbox, Google, and Microsoft (just like its predecessor, FIDO U2F).
Moreover, [FIDO2](https://fidoalliance.org/fido2/) support passwordless login, where users can access their accounts without the need to enter any credentials, instead performing some user action like pushing a button or scanning a fingerprint.
Also of great importance are the security benefits of FIDO2 tokens, in particular its privacy properties and protection from phishing and Man-in-the-Middle attacks.
In this presentation, we will dive into this new technology and see how it works under the hood, why it improves on usability, security, and privacy aspects compared with traditional solutions, and how it can be integrated into your own web applications.
## Biography
Joost van Dijk works for SURF, the collaborative organisation for ICT in Dutch education and research as a technical product manager in the field of Security and Privacy.
For the past decade, he has been working on solutions for improving the usability and security of authentication for SURF's population of 1.5 million students, researchers, and staff. He was involved in the development of SURFs service for strong authentication and is the co-designer of the open source authentication app [tiqr](https://tiqr.org/).

View file

@ -1,32 +0,0 @@
---
categories:
- presentaties
date: 2019-05-23T10:31:43+02:00
description: ""
layout: event-talk
tags:
- qemu
- libvirt
title: "Kashyap Chamarthy - Effective Virtual CPU Configuration with QEMU and libvirt"
speakers:
- kashyap-chamarthy
presentation:
filename: 2019-05-23-kashyap-chamarthy-effective-virtual-cpu-configuration-with-qemu-and-libvirt.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=UZXIZzSUeyw
---
## Abstract
QEMU (the open source machine emulator and virtualizer) and the libvirt API allow a variety of ways in which CPUs can be configured for virtual machines (VMs). However, there had been a flurry of CPU hardware flaws in 2018, and it has become increasingly difficult to choose an optimal CPU configuration. This talk aims to provide some clarity around this.
In this presentation, we will walk through the distinct CPU configuration interfaces QEMU offers, and in turn, how the libvirt project uses those interfaces to provide convenient APIs for higher-level tools. We will also consider critical needs such as the ability to live migrate a VM across hosts with a diverse set of CPUs; or the flexibility to add or remove specific CPU features from a guest CPU model—to mitigate from various hardware CPU flaws.
The talk will be set in context such that developers and administrators of high-level management software (that relies on KVM, QEMU and libvirt) will, hopefully, gain an appreciation for the details.
## Biography
Kashyap Chamarthy works as part of Red Hat's Cloud Engineering group. He focuses his efforts on integrating low-level virtualization components (KVM, QEMU, libvirt and related tooling) into higher-level management tools (OpenStack).
He has previously presented or participated in the last seven editions of Linux Foundation's technical events (mostly European, sometimes North American) such as LinuxCon, Open Source Summit, and KVM Forum. And also at other major open source conferences such as FOSDEM.

View file

@ -1,32 +0,0 @@
---
categories:
- presentaties
date: 2019-05-23T10:31:43+02:00
description: ""
layout: event-talk
tags:
- ansible
- automation
title: "Maxim Burgerhout - End-to-end automation with Ansible"
speakers:
- maxim-burgerhout
presentation:
filename: 2019-05-23-maxim-burgerhout-end-to-end-automation-with-ansible.pdf
recording:
platform: youtube
url:
---
## Abstract
Let me take you on a journey through the endless possibilities of Ansible. You already knew Ansible could manage Linux machines, but your data center contains much, much more. What about hypervisors? Clouds? Windows machines? Network devices? Kubernetes? Applications?
During this session, we'll look at deploying and configuring various platforms and applications, combining them into automated wall-to-wall deployments and look at some things you might never have tried before!
## Biography
Maxim has worked in various fields, from law enforcement to academia, through being a consultant in several mid-size and large IT firms in the Netherlands, until ending up at Red Hat.
At Red Hat, Maxim is part of the presales team in the Benelux region, as a principal solution architect, and part-time evangelist. Red Hat is the place where Maxim was destined to end up at: it was his ultimate goal ever since he started to work with Linux and other open source software in the early '00s. He is very passionate about Red Hat and the way Red Hat does it's software development: out in the open.
Maxim has spoken at various conferences, both in Europe and the United States, about the Red Hat portfolio and open society in general and open source in particular. He was voted #1 speaker at Red Hat Summit 2018 in San Francisco.

Some files were not shown because too many files have changed in this diff Show more