lunch commit
This commit is contained in:
parent
535cc984b8
commit
c9b18e3035
|
@ -1,14 +1,17 @@
|
|||
# Menu-configuratie
|
||||
|
||||
|
||||
|
||||
|
||||
[[main]]
|
||||
identifier = "organisatie"
|
||||
name = "Organisatie"
|
||||
name = "Organisation"
|
||||
pageRef = "/organisatie"
|
||||
weight = 10
|
||||
|
||||
[[main]]
|
||||
identifier = "organisatie-goals"
|
||||
name = "Doelstellingen"
|
||||
name = "Goals"
|
||||
url = "/organisatie/doelstellingen/"
|
||||
parent = "organisatie"
|
||||
weight = 11
|
||||
|
@ -34,6 +37,40 @@
|
|||
parent = "organisatie"
|
||||
weight = 14
|
||||
|
||||
[[main]]
|
||||
identifier = "organisatiev2"
|
||||
name = "Organisationv2"
|
||||
pageRef = "/organisatiev2"
|
||||
weight = 70
|
||||
|
||||
[[main]]
|
||||
identifier = "organisatiev2-goals"
|
||||
name = "Goalsv2"
|
||||
url = "/organisatiev2/doelstellingen/"
|
||||
parent = "organisatiev2"
|
||||
weight = 71
|
||||
|
||||
[[main]]
|
||||
identifier = "organisatiev2-bestuur"
|
||||
name = "Bestuurv2"
|
||||
url = "/organisatiev2/bestuur/"
|
||||
parent = "organisatiev2"
|
||||
weight = 72
|
||||
|
||||
[[main]]
|
||||
identifier = "organisatiev2-commissies"
|
||||
name = "Commissiesv2"
|
||||
url = "/organisatiev2/commissies/"
|
||||
parent = "organisatiev2"
|
||||
weight = 73
|
||||
|
||||
[[main]]
|
||||
identifier = "nluug-awardv2"
|
||||
name = "NLUUG Awardv2"
|
||||
url = "/organisatiev2/nluug-award/"
|
||||
parent = "organisatiev2"
|
||||
weight = 74
|
||||
|
||||
[[main]]
|
||||
identifier = "evenementen"
|
||||
name = "Evenementen"
|
||||
|
@ -100,6 +137,12 @@
|
|||
url = "/contact/"
|
||||
weight = 50
|
||||
|
||||
[[main]]
|
||||
identifier = "consortium"
|
||||
name = "Consortium"
|
||||
pageRef = "/consortium"
|
||||
weight = 9
|
||||
|
||||
[[footer]]
|
||||
identifier = "voorwaarden"
|
||||
name = "Algemene Voorwaarden"
|
||||
|
|
16
content/consortium/_index.en.md
Normal file
16
content/consortium/_index.en.md
Normal file
|
@ -0,0 +1,16 @@
|
|||
---
|
||||
categories:
|
||||
- consortium
|
||||
date: 2023-05-06T13:08:32+02:00
|
||||
description: "Learn more about the consortium behind the Fediversity Project."
|
||||
tags:
|
||||
- consortium
|
||||
slug:
|
||||
title: "Consortium"
|
||||
# show_child_pages: true
|
||||
|
||||
---
|
||||
|
||||
The Fediversity consortium consists of the Open Internet Discourse Foundation, NLnet, Tweag and NORDUnet.
|
||||
|
||||
v2
|
16
content/consortium/_index.md
Normal file
16
content/consortium/_index.md
Normal file
|
@ -0,0 +1,16 @@
|
|||
---
|
||||
categories:
|
||||
- consortium
|
||||
date: 2023-05-06T13:08:32+02:00
|
||||
description: "Learn more about the consortium behind the Fediversity Project."
|
||||
tags:
|
||||
- consortium
|
||||
slug:
|
||||
title: "Consortium"
|
||||
# show_child_pages: true
|
||||
|
||||
---
|
||||
|
||||
The Fediversity consortium consists of the Open Internet Discourse Foundation, NLnet, Tweag and NORDUnet.
|
||||
|
||||
v2
|
18
content/consortium/bestuur/index.en.md
Normal file
18
content/consortium/bestuur/index.en.md
Normal file
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
categories:
|
||||
- organization
|
||||
date: 2023-05-17T11:45:32+02:00
|
||||
description: "The board members are responsible for the vision of our assocation. Learn who they are and their activities."
|
||||
tags:
|
||||
- organization
|
||||
url: organization/board/
|
||||
title: "Board"
|
||||
contact_email: bestuur@nluug.nl
|
||||
type: team
|
||||
team_members:
|
||||
- bjorn-wijers
|
||||
- hans-van-de-looy
|
||||
- koen-de-jonge
|
||||
- ronny-lam
|
||||
- rudi-van-drunen
|
||||
---
|
31
content/consortium/bestuur/index.md
Normal file
31
content/consortium/bestuur/index.md
Normal file
|
@ -0,0 +1,31 @@
|
|||
---
|
||||
categories:
|
||||
- organisatie
|
||||
date: 2023-05-17T11:45:32+02:00
|
||||
description: "Leer meer over het dagelijks bestuur van de NLUUG, de vereniging voor open standaarden en open systemen."
|
||||
tags:
|
||||
- organisatie
|
||||
slug:
|
||||
title: "Bestuur"
|
||||
contact_email: bestuur@nluug.nl
|
||||
type: team
|
||||
team_members:
|
||||
- bjorn-wijers
|
||||
- hans-van-de-looy
|
||||
- koen-de-jonge
|
||||
- ronny-lam
|
||||
- rudi-van-drunen
|
||||
chairs:
|
||||
- rudi-van-drunen
|
||||
secretaries:
|
||||
- bjorn-wijers
|
||||
treasurers:
|
||||
- ronny-lam
|
||||
general_board_members:
|
||||
- hans-van-de-looy
|
||||
- koen-de-jonge
|
||||
---
|
||||
|
||||
Het Nederlandse verenigingsrecht en de statuten vereisen formeel een bestuur. De jaarlijkse ALV kiest dit bestuur. De zetelverdeling regelt het bestuur vervolgens zelf. In de praktijk wordt er pragmatisch omgegaan met deze formaliteit door te werken met aspirant bestuursleden. Inwerken is daarom altijd mogelijk. De jaarlijkse ALV is daarmee bovendien geen belemmering voor het ontplooien van activiteiten door leden.
|
||||
|
||||
Nieuwe bestuursleden worden jaarlijks tijdens de Algemene Ledenvergadering gekozen (normaliter in de lunch-pauze van de voorjaarsconferentie) waarna het bestuur intern besluit wie welke rol krijgt.
|
15
content/consortium/commissies/_index.md
Normal file
15
content/consortium/commissies/_index.md
Normal file
|
@ -0,0 +1,15 @@
|
|||
---
|
||||
categories:
|
||||
- organisatie
|
||||
date: 2023-05-17T11:19:43+02:00
|
||||
description: "Een overzicht van de actieve commissies binnen onze vereniging en de bijbehorende taken."
|
||||
tags:
|
||||
- organisatie
|
||||
slug:
|
||||
title: "Commissies"
|
||||
show_child_pages: true
|
||||
---
|
||||
|
||||
Door middel van meerdere commissies verspreiden we de werkzaamheden binnen de vereniging. Nagenoeg iedereen is vrijwilliger en hij of zij kiest zelf een relevante commissie om te ondersteunen.
|
||||
|
||||
Wil je ook helpen? Contacteer dan het betreffende team om te zien hoe je een bijdrage kan leveren.
|
19
content/consortium/commissies/beheer/index.md
Normal file
19
content/consortium/commissies/beheer/index.md
Normal file
|
@ -0,0 +1,19 @@
|
|||
---
|
||||
categories:
|
||||
- organisatie
|
||||
contact_email: beheer@nluug.nl
|
||||
date: 2023-06-05T18:16:02+02:00
|
||||
description: "Het beheerteam voert het technisch beheer uit op alle systemen van NLUUG"
|
||||
slug:
|
||||
tags:
|
||||
- organisatie
|
||||
- beheer
|
||||
title: "Beheerteam"
|
||||
type: team
|
||||
team_members:
|
||||
- hans-van-zijst
|
||||
- mark-janssen
|
||||
- patrick-reijnen
|
||||
---
|
||||
|
||||
Het beheerteam draagt zorg voor het up en running blijven van NLUUG systemen en het updaten en beveiligen ervan. Daarnaast beheren zij ook de DNS en mailomgeving van NLUUG.
|
18
content/consortium/commissies/buro/index.md
Normal file
18
content/consortium/commissies/buro/index.md
Normal file
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
categories:
|
||||
- organisatie
|
||||
contact_email: buro@nluug.nl
|
||||
date: 2023-05-17T11:02:43+02:00
|
||||
description: "Leer meer over degene achter ons buro en de bijbehorende ledenadministratie."
|
||||
tags:
|
||||
- organisatie
|
||||
- ledenadministratie
|
||||
slug:
|
||||
title: "Buro"
|
||||
type: team
|
||||
team_members:
|
||||
- jan-sepp
|
||||
---
|
||||
|
||||
Ons buro verzorgt de taken gerelateerd aan ledenbeheer. Deze taak ligt bij Jan Sepp en hij is het aanspreekpunt voor alle vragen rondom het lidmaatschap. Hierbij valt te denken aan het lid worden, opzeggingen, vragen of facturen en advies voor het juist lidmaatschap.
|
||||
|
24
content/consortium/commissies/film/index.md
Normal file
24
content/consortium/commissies/film/index.md
Normal file
|
@ -0,0 +1,24 @@
|
|||
---
|
||||
categories:
|
||||
- organisatie
|
||||
contact_email: filmteam@nluug.nl
|
||||
date: 2023-05-17T11:02:43+02:00
|
||||
description: "Leer meer over het filmteam, die o.a. opnames en foto's maken van onze evenementen."
|
||||
tags:
|
||||
- organisatie
|
||||
- film
|
||||
- foto
|
||||
slug:
|
||||
title: "Filmteam"
|
||||
type: team
|
||||
team_members:
|
||||
- jeroen-jonkman
|
||||
- luc-nieland
|
||||
- mark-janssen
|
||||
- nick-cohn
|
||||
- reinoud-van-leeuwen
|
||||
---
|
||||
|
||||
Het filmteam is vooral actief op de conferentie. Bij voldoende capaciteit wordt in alle zalen gefilmd.
|
||||
|
||||
|
19
content/consortium/commissies/ftp/index.md
Normal file
19
content/consortium/commissies/ftp/index.md
Normal file
|
@ -0,0 +1,19 @@
|
|||
---
|
||||
categories:
|
||||
- organisatie
|
||||
contact_email: ftp-admin@nluug.nl
|
||||
date: 2023-06-05T18:15:37+02:00
|
||||
description: "Leer meer over het FTP server beheerteam. Zij dragen zorg voor technisch en functioneel onderhoud"
|
||||
slug:
|
||||
tags:
|
||||
- organisatie
|
||||
- ftp
|
||||
title: "FTP-beheerteam"
|
||||
type: team
|
||||
team_members:
|
||||
- jan-christiaan-van-winkel
|
||||
- mike-hulsman
|
||||
- rudi-van-drunen
|
||||
---
|
||||
|
||||
Het FTP server beheerteam regelt alle technische en functionele zaken rondom de NLUUG FTP server, zoals het verdelen van schijfruimte en toevoegen van nieuwe software pakketten.
|
27
content/consortium/commissies/kcc/index.md
Normal file
27
content/consortium/commissies/kcc/index.md
Normal file
|
@ -0,0 +1,27 @@
|
|||
---
|
||||
categories:
|
||||
- organisatie
|
||||
date: 2023-05-17T11:02:43+02:00
|
||||
description: "Leer meer over de verantwoordelijkheden en taken van de kascontrolecommissie binnen de vereniging."
|
||||
tags:
|
||||
- organisatie
|
||||
- financieel
|
||||
slug:
|
||||
title: "Kascontrolecommissie"
|
||||
type: team
|
||||
team_members:
|
||||
- brenda-langedijk
|
||||
- jeroen-baten
|
||||
- michael-boelen
|
||||
---
|
||||
|
||||
De kascontrolecommissie, afgekort KCC, is de enige commissie die verplicht is voor een vereniging. Tijdens een algemene ledenvergadering brengt zij verslag uit van haar bevindingen.
|
||||
|
||||
Het bestuur is volgens de wet ook verplicht om alle benodigde informatie te verstrekken aan de KCC, zodat zij haar werkzaamheden kan verrichten. Details zijn te vinden in het [Burgelijk wetboek Boek 2, artikel 48](https://wetten.overheid.nl/BWBR0003045/2022-01-01#Boek2_Titeldeel2_Artikel48).
|
||||
|
||||
## Taken
|
||||
|
||||
* Controle van de kas
|
||||
* Verantwoordelijk voor financieel verslag
|
||||
* Naleven van wettelijke regels
|
||||
* Signaleren van risico's voor de vereniging
|
34
content/consortium/commissies/pc/index.md
Normal file
34
content/consortium/commissies/pc/index.md
Normal file
|
@ -0,0 +1,34 @@
|
|||
---
|
||||
categories:
|
||||
- organisatie
|
||||
contact_email: pc@nluug.nl
|
||||
date: 2023-05-07T17:01:05+02:00
|
||||
description: "De programmacommissie is ons grootste team en verantwoordelijk voor het vinden van sprekers en beheren van relevante contacten."
|
||||
review:
|
||||
last_review: 2023-06-23
|
||||
reviewed_by: michael-boelen
|
||||
period: 120
|
||||
tags:
|
||||
- conferentie
|
||||
- organisatie
|
||||
slug:
|
||||
title: "Programmacommissie"
|
||||
type: team
|
||||
team_members:
|
||||
- aschwin-marsman
|
||||
- brenda-langedijk
|
||||
- fred-donck
|
||||
- hans-van-de-looy
|
||||
- mischa-peters
|
||||
- rogier-spoor
|
||||
- rudi-van-drunen
|
||||
- willem-toorop
|
||||
---
|
||||
|
||||
De programmacommissie (PC) stelt het programma van de conferenties samen. Met meestal drie gelijktijdige tracks vergt dit veel voorbereiding. Het is dan ook niet verwonderlijk dat de programmacommissie het grootste team vormt.
|
||||
|
||||
## Taken
|
||||
|
||||
* Contacteren mogelijke sprekers
|
||||
* Begeleiding van sprekers voor en tijdens de conferentie
|
||||
|
31
content/consortium/commissies/pr/index.md
Normal file
31
content/consortium/commissies/pr/index.md
Normal file
|
@ -0,0 +1,31 @@
|
|||
---
|
||||
categories:
|
||||
- organisatie
|
||||
contact_email: pr@nluug.nl
|
||||
date: 2023-05-08T11:28:43+02:00
|
||||
description: "Leer meer over het PR-team dat aan de voor- en achterzijde onze vereniging ondersteunt"
|
||||
tags:
|
||||
- organisatie
|
||||
- pr
|
||||
slug:
|
||||
title: "PR-team"
|
||||
type: team
|
||||
team_members:
|
||||
- koen-de-jonge
|
||||
- mischa-peters
|
||||
- patrick-reijnen
|
||||
---
|
||||
|
||||
## PR en Social Media
|
||||
|
||||
Om de zichtbaarheid van onze vereniging te vergroten hebben we enkele leden die actief zijn binnen ons PR-team. Hierbij hebben we een onderlinge verdeling gemaakt, waarbij Koen de Jonge zich richt op de contacten met andere organisaties. Michael en Patrick vervullen de dagelijkse activiteiten, van het publiceren van nieuws tot het beheer van de social media.
|
||||
|
||||
## Social Media
|
||||
|
||||
Ons team doet het beheer van diverse online kanalen. Op dit moment zijn we actief op:
|
||||
|
||||
* LinkedIn
|
||||
* Mastodon
|
||||
* Meetup
|
||||
|
||||
In de footer van de website zijn alle relevante links te vinden.
|
18
content/consortium/commissies/website/index.md
Normal file
18
content/consortium/commissies/website/index.md
Normal file
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
categories:
|
||||
- organisatie
|
||||
date: 2023-05-08T11:28:43+02:00
|
||||
description: "Leer meer over onze webmasters die het beheer van de NLUUG-website verzorgen."
|
||||
tags:
|
||||
- organisatie
|
||||
- website
|
||||
slug:
|
||||
title: "Website"
|
||||
type: team
|
||||
team_members:
|
||||
- michael-boelen
|
||||
- patrick-reijnen
|
||||
contact_email: "website@nluug.nl"
|
||||
---
|
||||
|
||||
De website is voor onze vereniging een centrale plek waar we informatie beschikbaar stellen. Dit team verzorgt zowel de techniek als content.
|
38
content/consortium/doelstellingen/index.md
Normal file
38
content/consortium/doelstellingen/index.md
Normal file
|
@ -0,0 +1,38 @@
|
|||
---
|
||||
categories:
|
||||
- organisatie
|
||||
date: 2023-05-06T13:08:32+02:00
|
||||
description: "Learn more about the goals of the Fediversity Project"
|
||||
review:
|
||||
last_review: 2024-01-20
|
||||
reviewed_by: laurensh-hof
|
||||
period: 90
|
||||
tags:
|
||||
- organisation
|
||||
title: "Goals"
|
||||
---
|
||||
|
||||
Het volgende staat beschreven in de Statuten van NLUUG (te vinden in het ledendeel van deze website), over de doelstellingen van de vereniging:
|
||||
|
||||
## Definities
|
||||
|
||||
* "Open" in de context van standaarden duidt op specificaties waarvan de beschrijving voldoende gedetailleerd is en vrij van patenten, waardoor commerciële en niet-commerciële partijen deze zonder belemmering kunnen implementeren en verspreiden.
|
||||
* "Open" in de context van systemen duidt op computerapparatuur waarvan de werking van alle componenten zoveel mogelijk gebruik maakt van Open standaarden.
|
||||
|
||||
## Doel, Artikel 2
|
||||
|
||||
Het doel van de vereniging is:
|
||||
|
||||
* in het algemeen, het behartigen van de belangen van gebruikers van op Open standaarden gebaseerde software en Open systemen.
|
||||
* het onder de leden verspreiden van kennis over Open standaarden en de software en infrastructuur die daar gebruik van maakt.
|
||||
* het onder de leden verspreiden van kennis over de werking van Open systemen.
|
||||
* het stimuleren van de toepassing van Open standaarden en Open systemen in de professionele omgeving van onder andere bedrijven, organisaties, overheid en onderwijs.
|
||||
* het verbeteren van de contacten tussen professionele gebruikers en de bedrijven die zich bezighouden met systemen gebaseerd op de UNIX traditie van Open systemen, zowel nationaal als internationaal.
|
||||
|
||||
Zij tracht dit doel onder meer te bereiken door:
|
||||
|
||||
* het met regelmaat organiseren van onafhankelijke technische conferenties voor leden, waarbij ook leveranciers en gelieerde groepen zich kunnen presenteren.
|
||||
* het stimuleren, initiëren en organiseren van thema-bijeenkomsten en andere ontmoetingen.
|
||||
* het distribueren van software en documentatie, voor zover zij daartoe in staat en gerechtigd is.
|
||||
* contacten te onderhouden met andere nationale en internationale organisaties met vergelijkbare doelstellingen.
|
||||
* het opbouwen en onderhouden van contacten met leveranciers van hardware, software, kennis en/of kunde, die geacht worden voor haar leden van belang te zijn.
|
|
@ -1,177 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- events
|
||||
content_types:
|
||||
- article
|
||||
date: 2023-06-16T16:41:30+02:00
|
||||
description: "All information related to our Call for Proposals (CFP) is listed on this page, including tips on how to convince our programme committee and event visitors."
|
||||
review:
|
||||
last_review: 2023-11-30
|
||||
reviewed_by: michael-boelen
|
||||
period: 365
|
||||
url: events/nluug/cfp/
|
||||
tags:
|
||||
- cfp
|
||||
title: "Call for Proposals (CFP)"
|
||||
is_event: false
|
||||
---
|
||||
|
||||
We would like to be open about our Call for Proposals (CFP) process. This page describes how our programme committee works and what we like to offer to our speakers. This includes tips to provide an even more convincing submission, so that the chance increases your talk is being accepted.
|
||||
|
||||
## Subjects
|
||||
|
||||
For our conferences we like the following subjects (and more):
|
||||
|
||||
* Automation
|
||||
* Content Management Systems (CMS)
|
||||
* Configuration management
|
||||
* Cryptography and crypto analysis
|
||||
* Databases
|
||||
* Home automation
|
||||
* Information security
|
||||
* Internet (standards, technical aspects)
|
||||
* Interesting events and historie
|
||||
* Netwerk (analyze, firewalls)
|
||||
* Open source
|
||||
* Open standards
|
||||
* Operating systems
|
||||
* Programming languages
|
||||
* Privacy
|
||||
* Software development
|
||||
* Tools
|
||||
* Web technology
|
||||
|
||||
This list is just an indication of the topics that we typically like to see. But other topics can be still interesting, especially if they are related to recent events or ongoing developments within our field of expertise.
|
||||
|
||||
## Format
|
||||
|
||||
A default speaker slot is 45 minutes. This includes the time to answer questions. We are considering to accommodate workshops. It is not yet clear how to do so. One example is to add a complete track with two or three workshops.
|
||||
|
||||
## Audience
|
||||
|
||||
Our audience is technical oriented and includes generalists and specialists. Most have affinity with system administration, often with additional knowledge or specialization. Within this audience we also have people who have a primary focus on software development, while others have management experience or doing project management. Information security is another common interest area for our audience.
|
||||
|
||||
## What do we offer speakers?
|
||||
|
||||
Speakers will receive the following benefits:
|
||||
* Free access to our conference
|
||||
* Lunch, coffee/tea/beverages
|
||||
* Invitation to join our speakers dinner
|
||||
|
||||
### Hardware
|
||||
|
||||
By default we have a wireless microphone, big screen with HDMI input and timer. Most speakers use their own notebook, but when needed our organization can provide one. For specific wishes, including other input options, the speaker can consult with our organization to see what is possible.
|
||||
|
||||
### Location and facilities
|
||||
|
||||
There is an internet connection available within the hotel. Stability of this connection is not guaranteed. We advise speakers to be careful with presentations that rely on a steady internet connection, especially when doing a live demo. Where possible use local resources on your notebook.
|
||||
|
||||
We can assist speakers with travel and their stay. Our goal is that speakers don't have to make costs to present at our conference, or at least to limit it as much as possible. Together with the speaker we look at the options. Such arrangments should therefore always been discussed upfront.
|
||||
|
||||
## Tips for speakers
|
||||
|
||||
We would like to give everyone a good shot in getting selected. Below are tips that may (strongly) increase your chances.
|
||||
|
||||
### Basics: title, asbstract, biography, photo
|
||||
|
||||
The best submission has a great title and a captivating abstract. The first audience to convice is our programme committee. Upon selection, the conference visitors are the next audience to be convinced. So a good and enticing abstract is as important as a well-prepared talk!
|
||||
|
||||
#### Abstract
|
||||
|
||||
The abstract itself tells more about the talk itself. Some generic tips:
|
||||
|
||||
* Write the abstract like how you would describe the talk to a friend
|
||||
* Abstracts shouldn't be too long, but at least 10 sentences or more are needed to give readers a good insight on what to expect
|
||||
* Keep things light and add humour where possible
|
||||
* Focus on readability, so lines should not be too long. Also be careful with terminology and abbreviations, or at least describe them first.
|
||||
* Check your text and use a grammar checker
|
||||
* Let others proofread and provide feedback
|
||||
|
||||
To get the attention of the audience, a well-written abstract should answer the following questions:
|
||||
|
||||
* What is the goal of the presentation?
|
||||
* What will I learn when attending it?
|
||||
* What is the requirement level of the subject (beginner, novice, expert)?
|
||||
* Is some knowledge required and a prerequisite?
|
||||
* What is spoken language of the talk?
|
||||
|
||||
#### Title
|
||||
|
||||
An abstract requires a title. This should entice, yet give a clear indication what the subject is about. Simplicity is often the best, but also humour might have a good place here. Don't make the title too long, while still covering the subject focus properly.
|
||||
|
||||
#### Biography
|
||||
|
||||
Our programme committee and visitors of the event are interested in the background of a speaker. They might wonder why this is the right person to tell something about a topic. Therefore it is good to adjust the biography to the talk and include relevancy to the subject, besides generic information. A few related questions that are relevant to improve a biography:
|
||||
|
||||
* Why is this subject important to you?
|
||||
* What experience do you have with the subject and do you use it yourself?
|
||||
* What kind of work do you do? Where did you work before and what kind of roles?
|
||||
* Did you contribute to specific or public projects?
|
||||
* What is your experience with open standards and open source?
|
||||
* Any software or tools that you created? Which ones and are they available?
|
||||
* Do you write articles or have a blog?
|
||||
* What are your hobbies or passions? What makes you tick?
|
||||
* Any social media that you are active on?
|
||||
|
||||
A biography is typically written in the third person. Avoid using "I ..." and start with your full name, followed by your first name in any other sentences.
|
||||
|
||||
#### Photo
|
||||
|
||||
We like to have a complete event leaflet, including a photo of speakers. This way the person behind the name has a face and can be recognized by our organization and audience. We don't have strict requirements regarding the photo, but prefer a good quality photo, especially regarding the size. The photo should be "decent" and typically a photo of your face is the best suitable. Usually a photo that one might use on LinkedIn is also a good fit for submission.
|
||||
|
||||
### Too technical is impossible
|
||||
|
||||
Our audience loves technical aspects of the field. Therefore it almost impossible to have a talk that is too much in-depth. If you are an expert in some specific field, then feel free to start from the basics and go deeper step by step.
|
||||
|
||||
### Interaction with the audience
|
||||
|
||||
Visitors to our events are not shy to express their thoughts or ask questions. Any interaction with the audience is appreciated and share when questions are appreciated. Just keep an eye on the remaining time, so that you can finish (most of) your presentation.
|
||||
|
||||
### Commercials not appreciated
|
||||
|
||||
Our organization and audience does not like sales pitches. So be careful about what you mention when it comes to commercial products or services. Our programme committee will also focus on this and where possible filter out such talks.
|
||||
|
||||
### Alternative subjects
|
||||
|
||||
In doubt if a topic is still a good match? Feel free to reach out and contact our programma committee!
|
||||
|
||||
### Multiple submissions
|
||||
|
||||
We encourage participicants to the CFP to submit multiple submissions. This will increase your chances and also gives the programme committee to select a talk that fits with the rest of event schedule.
|
||||
|
||||
### Submittion an existing presentation
|
||||
|
||||
Already gave the presentation before? Let us know in the submission notes, preferably including a video or the presentation itself. This simplifies the selection and gives us a better insight if there is a good fit.
|
||||
|
||||
## Behind the scenes of our programme committee
|
||||
|
||||
### Opening of the CFP
|
||||
|
||||
After an event closes, the programme committee opens a new Call for Proposals. We use multiple phases and typically in the first phase we start with the the promotion of the event and the CFP. This includes social media and our website.
|
||||
|
||||
### Review phase
|
||||
|
||||
Since 2023 we use with a new software system (Pretalx). For every submission the members of the programme committee will add a review, including assigning points. Typically this boils down to:
|
||||
* Yes, this submission is (very) interesting
|
||||
* Maybe, the submission may need tuning to make it interesting
|
||||
* No, this talk is not suitable (yet)
|
||||
|
||||
During the meetings of the programme committee, the results will be discussed. Talks with a high score are usually the ones that have a greater chance to be selected.
|
||||
|
||||
### Sending confirmation and reject messages
|
||||
|
||||
When a talk submission looks like a good match, we will send a confirmation message. At this stage we also introduce the speaker to Debbie, our event organizer. She arranges things like travel, hotel, diet wishes, or any other preferences.
|
||||
|
||||
When we are not convinced, we let this know by using a reject message. If we are in doubt, then we might contact the speaker to ask a revision or even ask for an alternative topic.
|
||||
|
||||
If the speaker has multiple submissions and one of them is selected, the programme committee will inform the speaker what the preferred talk is. The other submissions will then be rejected or possible moved to another event in the future. Another possibility is that we ask the speaker to have a second talk and be one of our backup speakers.
|
||||
|
||||
The time of sending out the accept/reject messages depend on the phase that we are in. Especially in the beginning we may wait a while to first gather as much submissions as possible. This gives the programme committee also the chance to reach out to potential speakers. This may include speakers from abroad or those who are a specialist in their field of expertise. When we are getting closer to the event date, it may be possible that we send our early accept messages, especially if the programme committee is fully convinced about the relevance of a talk.
|
||||
|
||||
### Publication and event schedule
|
||||
|
||||
Upon the approval and confirmation of more submissions, the names of speakers and the title of the talks will be added to the event page. This is also the moment when the event will be promoted, such as on our social media channels. When most slots are filled, the schedule of the event will be created. Typically all related topics will be near each other and depending on the availability of speakers, the order will be defined.
|
||||
|
||||
## Code of Conduct
|
||||
|
||||
At the request of speakers and active members, the NLUUG uses a [Code of Conduct]({{< relref "huisregels.en.md" >}}) for members and visitors of events.
|
|
@ -1,181 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- evenementen
|
||||
content_types:
|
||||
- article
|
||||
date: 2023-06-16T16:41:30+02:00
|
||||
description: "Deze pagina beschrijft voor zowel potentiële sprekers als onze programmacommissie hoe we omgaan met een Call for Proposals."
|
||||
review:
|
||||
last_review: 2023-11-30
|
||||
reviewed_by: michael-boelen
|
||||
period: 365
|
||||
slug:
|
||||
tags:
|
||||
- cfp
|
||||
title: "Call for Proposals (CFP)"
|
||||
is_event: false
|
||||
---
|
||||
|
||||
Als vereniging willen graag volledig "open" zijn over onze Call for Proposals (CFP). Op deze pagina beschrijven we hoe de programmacommissie te werk gaat en wat we sprekers bieden. Tevens bevat deze pagina tips om de programmacommissie te overtuigen en een inzending plaats te geven binnen het programma.
|
||||
|
||||
## Onderwerpen
|
||||
|
||||
Voor onze conferenties en evenementen hebben we voornamelijk interesse in onderstaande onderwerpen.
|
||||
|
||||
* Automatisering
|
||||
* Besturingssystemen
|
||||
* CMS
|
||||
* Configuratiemanagement
|
||||
* Cryptografie en cryptoanalyse
|
||||
* Databases
|
||||
* Domotica
|
||||
* Informatiebeveiliging
|
||||
* Internet (standaarden, technieken)
|
||||
* Interessante gebeurtenissen en evenementen
|
||||
* Netwerk (analyze, firewalls)
|
||||
* Open source
|
||||
* Open standaarden
|
||||
* Programmeertalen
|
||||
* Privacy
|
||||
* Softwareontwikkeling
|
||||
* Tooling
|
||||
* Webtechnologie
|
||||
|
||||
Deze lijst van onderwerpen geeft een idee, echter sluit overige onderwerpen zeker niet uit. Presentaties over actualiteit, interessante projecten of die erg vermakelijk zijn worden eveneens gewaardeerd door onze programmacommissie.
|
||||
|
||||
## Formaat
|
||||
|
||||
Binnen het programma duren presentaties standaard 45 minuten. Deze tijd is inclusief het beantwoorden van eventuele vragen. Tevens wordt er nagedacht over de invulling van workshops, bijvoorbeeld een hele aparte track waarbij er twee of drie workshops na elkaar kunnen plaatsvinden.
|
||||
|
||||
## Publiek
|
||||
|
||||
Onze bezoekers zijn over het algemeen (zeer) technisch georiënteerd, daarbinnen zitten zowel generalisten als specialisten. Het merendeel heeft affiniteit met systeembeheer, vaak met aanvullende kennis of specialisaties. Een deel van de bezoekers heeft een primaire focus op softwareontwikkeling, terwijl er ook een groep is met ervaring binnen management of het leiden van projecten. Ook informatiebeveiliging is voor veel van de bezoekers geen onbekend terrein.
|
||||
|
||||
## Wat bieden we sprekers?
|
||||
|
||||
Sprekers ontvangen standaard het volgende:
|
||||
* Sprekersbadge met toegang tot de gehele conferentie
|
||||
* Lunch, koffie/thee/fris
|
||||
* Uitnodiging voor het sprekersdiner
|
||||
|
||||
### Hardware
|
||||
|
||||
Voor sprekers hebben we standaard een draadloze microfoon, groot scherm met HDMI-aansluiting en een tijdklok tot beschikking. De meeste sprekers gebruiken hun eigen notebook, maar de organisatie kan dit ook verzorgen. Als dat gewenst is, dan dient de spreker dit vooraf bij de organisatie bekend te maken. Dat geldt ook voor een andere aansluiting dan HDMI, zodat de juiste voorbereidingen getroffen kunnen worden.
|
||||
|
||||
### Locatie en faciliteiten
|
||||
|
||||
In het hotel is een internetverbinding aanwezig, maar ervaring leert dat er geen garanties gegeven kunnen worden wat betreft de stabiliteit. Als organisatie adviseren we sprekers daarom om de afhankelijkheid van een internetverbinding te beperken. Presentaties en demo's kunnen het beste dus lokaal op het (eigen) systeem draaien.
|
||||
|
||||
Sprekers kunnen we ondersteunen met het vervoer en verblijf. Ons doel is dat sprekers (waar mogelijk) geen kosten hoeven te maken om bij ons te presenteren. Qua vervoer en verblijf in het hotel kijken we daarom naar de afstand die een spreker dient af te leggen om op onze locatie te arriveren. Buitenlandse sprekers hebben daarmee eerder recht op een hotelovernachting of zelfs vliegticket. Deze dienen wel altijd vooraf afgestemd te worden met de organisatie.
|
||||
|
||||
## Tips voor sprekers
|
||||
|
||||
Uiteraard willen wij als organisatie de kans voor iedereen vergroten om een presentatie te komen geven. We hebben diverse tips voor iedereen die een inzending overweegt.
|
||||
|
||||
### De basis: titel, abstract, biografie, foto
|
||||
|
||||
We verlangen van iedere inzending een titel en een spetterende en wervende abstract. In de eerste instantie is deze gericht om de programmacommissie te overtuigen dat het een geschikte lezing is. Na goedkeuring krijgt de belangrijkste groep de abstract te zien: de bezoekers. Een goedgeschreven abstract is daarom even belangrijk als een goed voorbereide presentatie.
|
||||
|
||||
#### Abstract
|
||||
|
||||
Een abstract dient duidelijk geschreven te zijn en de lezer te prikkelen. Wat algemene tips:
|
||||
|
||||
* Schrijf het abstract alsof je het aan een goede bekende zou beschrijven
|
||||
* Een abstract hoeft zeker geen proza te worden, maar 10 regels of meer vormt een goede basis
|
||||
* Hou het taalgebruik luchtig en gebruik humor waar dat passend is
|
||||
* Gebruik niet te lange zinnen en pas op met teveel terminologie en technische afkortingen
|
||||
* Controleer de tekst en gebruik spellingscontrole
|
||||
* Laat gerust een bekende het abstract lezen
|
||||
|
||||
Een goed abstract zal de volgende vragen bij onze bezoekers beantwoorden:
|
||||
|
||||
* Wat is het doel van deze presentatie?
|
||||
* Wat ga ik leren door deze lezing bij te wonen?
|
||||
* Op wie of welk niveau is deze lezing gericht?
|
||||
* Is er bepaalde voorkennis nodig?
|
||||
* In welke taal zal de presentatie worden gegeven?
|
||||
|
||||
#### Titel
|
||||
|
||||
Onderdeel van de abstract is de bijbehorende titel. Deze dient te prikkelen, maar wel een duidelijke referentie te hebben naar het onderwerp. Soms is eenvoud het beste, soms een titel met de nodige humor. Maak de titel niet te lang, maar wel dat deze de lading van de presentatie dekt.
|
||||
|
||||
Heb je geen inspiratie voor je titel? Maak dan eerst het abstract compleet en kijk eens tussen de lezingen van voorgaande jaren op onze website.
|
||||
|
||||
#### Biografie
|
||||
|
||||
De programmacommissie en onze bezoekers willen weten wie een spreker is. Waarom is dit de juiste persoon om iets over een bepaald onderwerp te vertellen? Het is daarom raadzaam om je biografie aan te passen aan het onderwerp en relevante ervaringen te vermelden. Uiteraard willen we graag wat meer weten over jou als spreker. Een aantal vragen die je je kan afstellen tijdens het schrijven van de biografie:
|
||||
|
||||
* Waarom is het onderwerp van de presentatie belangrijk voor je?
|
||||
* Welke ervaring heb je ermee of hoe pas je het zelf toe?
|
||||
* Wat doe je voor werk of waar heb je gewerkt? Wat voor functie(s)?
|
||||
* Heb je iets bijgedragen aan speciale of publieke projecten?
|
||||
* Wat heb je zelf met open standaarden en open source?
|
||||
* Heb je software geschreven? Zo ja, welke namen?
|
||||
* Schrijf of blog je wel eens iets?
|
||||
* Waar kunnen we meer over over je lezen?
|
||||
* Heb je relevante hobby's en passies? Wat drijft je?
|
||||
* Op welke social media ben je actief?
|
||||
|
||||
Voor de leesbaarheid is het aan te raden om de biografie in een derde persoon te schrijven. In plaats van "Ik ...", begin je dan met "[Voornaam achternaam] ..." en gebruik je je voornaam in vervolgzinnen.
|
||||
|
||||
#### Foto
|
||||
|
||||
Op onze website en programmaboekje willen we graag een compleet geheel hebben. Daar hoort natuurlijk een foto bij, zodat het gezicht achter de presentatie ook bekend is. We stellen geen harde eisen aan de foto, maar waarderen het wel als de kwaliteit en formaat groot genoeg is. Uiteraard verwachten we een "degelijke" foto en meestal is een foto van het gezicht dan ook het meest geschikt. Een foto die iemand bijvoorbeeld op LinkedIn zou gebruiken, voldoet vaak.
|
||||
|
||||
### Te technisch kan niet
|
||||
|
||||
Gezien ons publiek over het algemeen een stevige technische basis heeft, is het nagenoeg onmogelijk om een presentatie te geven die teveel techniek bevat. Ben je specialist en heb je een interessant verhaal, ga dan gerust (opbouwend) de diepte in.
|
||||
|
||||
### Dialoog met publiek
|
||||
|
||||
We hebben een mondig publiek dat niet bang is vragen te stellen of een debat te starten. We stellen het op prijs als interactie met het publiek wordt opgezocht. Als spreker is het wel zaak om duidelijk aan te geven wanneer vragen gesteld kunnen worden en om over de beschikbare tijd te waken.
|
||||
|
||||
### Presentaties met commerciële boodschap
|
||||
|
||||
Verkooppraatjes worden niet gewaardeerd. Het aanbevelen van commerciële producten of diensten zal dus ook niet in de smaak vallen bij onze bezoekers. De programmacommissie doet haar best om dit soort presentaties voortijdig te screenen.
|
||||
|
||||
### Alternatieve onderwerpen
|
||||
|
||||
Twijfel je of een onderwerp wel goed past? Neem dan gerust eerst contact op met onze [programmacommissie]({{< relref "organisatie/commissies/pc/index.md" >}}).
|
||||
|
||||
### Meerdere inzendingen zijn welkom
|
||||
|
||||
Een spreker die meerdere inzendingen indient maakt over het algemeen meer kans om geselecteerd te worden. Vaak kiest de programmacommissie een inzending die het beste bij de rest van het programma past of het meest aanspreekt. Een onderwerp dat actueel zou de voorkeur kunnen hebben.
|
||||
|
||||
### Eerder gegeven presentaties
|
||||
|
||||
Heb je de presentatie al eerder gegeven? Dan horen we dat graag, het liefst inclusief een video en/of presentatie. Zo kunnen we de inzending nog eenvoudiger beoordelen qua inhoud.
|
||||
|
||||
## Werkwijze programmacommissie
|
||||
|
||||
### Openen CFP
|
||||
|
||||
Nadat een conferentie is geweest, opent de programmacommissie een nieuwe Call for Proposals. We gebruiken hierbij meerdere fasen. In de eerste fase starten we met de promotie van de conferentie en delen we de CFP op onder andere social media en de website.
|
||||
|
||||
### Beoordelen van inzendingen
|
||||
|
||||
Sinds 2023 werken we met nieuwe CFP-software (Pretalx) en een nieuw systeem. Hierbij laten leden van de programmacommissie een review achter per inzending. Tevens krijgt iedere inzending een beoordeling. Deze beoordeling komt neer op drie mogelijkheden:
|
||||
|
||||
* Ja, deze inzending is interessant
|
||||
* Twijfel, heeft mogelijk nog extra aanpassing nodig
|
||||
* Nee, helaas (nog) niet geschikt
|
||||
|
||||
Tijdens onze PC-vergaderingen bespreken we de uitkomst van deze beoordelingen. Inzendingen die we overwegend positief beoordelen hebben een grote kans om geselecteerd te worden.
|
||||
|
||||
### Bevestigen en afkeuren van inzendingen
|
||||
|
||||
Als we positief gestemd zijn over een inzending gaan we over tot bevestiging. We versturen dan een bevestiging en introduceren [Debbie]({{< relref "organisatie/personen/debbie-reinders/index.md" >}}), die ons helpt met de organisatie van de evenementen. Hierbij valt de denken aan zaken zoals een eventuele hotelovernachting, dieetwensen of andere voorkeuren.
|
||||
|
||||
Het kan natuurlijk ook gebeuren dat we minder enthousiast zijn over een inzending. In dat geval laten we dat ook weten en waar het kan met een korte onderbouwing. Als de inzending volgens ons een twijfelgeval is, kan het zijn dat we vragen om het abstract te herzien of zelfs een alternatief onderwerp te kiezen.
|
||||
|
||||
Als een inzending wordt geselecteerd en de betreffende spreker heeft meerdere inzendingen ingediend, dan laat de programmacommissie haar voorkeur weten. De andere inzending(en) van die spreker komen dan te vervallen of worden doorgezet naar een volgende evenement. Eventueel kan een spreker worden gevraagd een ander onderwerp als backup te houden, bijvoorbeeld bij uitval van een andere spreker.
|
||||
|
||||
Het moment van bevestigen is afhankelijk in welke fase we zitten. Vooral in het begin sparen we de inzendingen even op, zodat we als programmacommissie ook de tijd hebben om zelf potentiële sprekers te benaderen. Denk hierbij aan buitenlandse sprekers die wellicht nog niet bekend zijn met onze vereniging, maar vaak ervaren sprekers binnen een specifiek onderwerp zijn. Naarmate we dichter bij de conferentie komen kan het zijn dat we tussendoor al sprekers bevestigen, zeker als het merendeel van de programmacommissie zeer positief is over een inzending.
|
||||
|
||||
### Publiceren sprekers en opstellen programma
|
||||
|
||||
Naarmate steeds meer inzendingen worden bevestigd, zullen de namen van de sprekers worden opgenomen op de pagina van het evenement. Dit is ook het moment waarop de het evenement steeds meer gaan promoten. Als we (bijna) alle beschikbare sloten hebben gevuld, dan zullen we het programma gaan samenstellen. De sloten worden dan zodanig ingevuld dat we zo goed mogelijk vergelijkbare onderwerpen in dezelfde track plaatsen en tevens rekening houden met wensen van sprekers.
|
||||
|
||||
## Huisregels
|
||||
|
||||
Op verzoek van sprekers en actieve leden heeft NLUUG [huisregels]({{< relref "huisregels.md" >}}) opgesteld voor haar leden en bezoekers van evenementen.
|
|
@ -1,243 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- conferenties
|
||||
- evenementen
|
||||
date: 2017-11-16T20:17:47+02:00
|
||||
description: "De NLUUG najaarsconferentie heeft plaatsgevonden op donderdag 16 november 2017. Bekijk hier het programma, de presentaties, opnames en foto's."
|
||||
is_event: true
|
||||
tags:
|
||||
- conferenties
|
||||
slug:
|
||||
title: "NLUUG najaarsconferentie 2017"
|
||||
layout: schedule-event
|
||||
event_title: "NLUUG najaarsconferentie 2017"
|
||||
event_start: 2017-11-16T08:30:00+02:00
|
||||
event_end: 2017-11-16T18:00:00+02:00
|
||||
event_timezone: Europe/Amsterdam
|
||||
event_location: Postillion Hotel Bunnik
|
||||
event_address:
|
||||
street_address: "Baan van Fectio 1"
|
||||
postal_code: "3981 HZ"
|
||||
city: "Bunnik"
|
||||
country_name: "The Netherlands"
|
||||
event_organizers:
|
||||
- organizer:
|
||||
id: nluug
|
||||
name: NLUUG
|
||||
event_attendance_mode: "offline"
|
||||
event_images:
|
||||
- /afbeeldingen/locaties/bunnik/postillion-hotel-bunnik-baan-van-fectio.jpg
|
||||
event_description: "Najaarsconferentie 2017 van de vereniging NLUUG in het Postillion Hotel te Bunnik"
|
||||
event_members_only: true
|
||||
event_register_link: "https://nluug.nl/aanmelden/index.cgi?action=event"
|
||||
event_status: "scheduled"
|
||||
event_schedule:
|
||||
title: Programma
|
||||
description:
|
||||
columns: 4
|
||||
headers:
|
||||
- header:
|
||||
width: 10
|
||||
- header:
|
||||
text: Zaal 1
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 2
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 3
|
||||
center: true
|
||||
width: 30
|
||||
rows:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 08:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Inschrijving, ontvangst, koffie
|
||||
size: 3
|
||||
center: true
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:15
|
||||
- column:
|
||||
textfield:
|
||||
text: Openingswoord
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:30
|
||||
- column:
|
||||
talk:
|
||||
speaker: Teus Hagen
|
||||
title: "NLUUG: 35 tinten grijs"
|
||||
keynote: true
|
||||
link:
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 10:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Sake Blok
|
||||
title: "Challenge: Can you esPcape?"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Mike Place
|
||||
title: Introduction to Event-Driven Linux Systems Management with SaltStacke
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Vesna Manojlovic
|
||||
title: "Ethics in Technology"
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:50
|
||||
- column:
|
||||
talk:
|
||||
title: Vervolg Challenge Sake Blok
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Jan-Piet Mens
|
||||
title: "Introducing Ansible AWX - The Open Source 'Tower'"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Jelle Niemantsverdriet
|
||||
title: We don't need no security!
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 12:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Lunch
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 13:15
|
||||
- column:
|
||||
- column:
|
||||
textfield:
|
||||
text: NLUUG Algemene Ledenvergadering (ALV)
|
||||
center: true
|
||||
- column:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Rudi van Drunen
|
||||
title: "Things on the Internet: An introduction to the REAL world"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Noud Aldenhoven
|
||||
title: "An Overview of Deep Learning and its Open Source Tools"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Per Buer
|
||||
title: "Unikernels; what are they and what are the security implications?"
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:50
|
||||
- column:
|
||||
talk:
|
||||
speaker: Daniel Kiper
|
||||
title: "EFI Secure Boot, shim, GRUB2"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Ed Schouten en Ron Lievens
|
||||
title: "Google's BigTable en Apache Cassandra"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Bart Jacobs
|
||||
title: "Attribuut-gebaseerde authenticatie met IRMA"
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 15:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: John van Krieken
|
||||
title: "What's up in modern C++"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Willem Jan Withagen
|
||||
title: "Ceph on FreeBSD"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Ben Gras
|
||||
title: "MMU Cache Side Channel Attack: Breaking ASLR from a Javascript Sandbox"
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:50
|
||||
- column:
|
||||
talk:
|
||||
speaker: Anne Jan Brouwer en Bas van Sisseren
|
||||
title: SHA2017 badge
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Christine Yen
|
||||
title: "Everything is Up! (and other useful myths)"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Daan Keuper
|
||||
title: Car Hacking
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 17:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Borrel, gesponsord door SNOW
|
||||
center: true
|
||||
size: 3
|
||||
---
|
|
@ -1,258 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- conferenties
|
||||
- evenementen
|
||||
date: 2018-11-15T16:08:58+02:00
|
||||
description: "De NLUUG najaarsconferentie heeft plaatsgevonden op donderdag 15 november 2018 in het Van der Valk Hotel Utrecht."
|
||||
is_event: true
|
||||
tags:
|
||||
- conferenties
|
||||
slug:
|
||||
title: "NLUUG najaarsconferentie 2018"
|
||||
layout: schedule-event
|
||||
event_title: "NLUUG najaarsconferentie 2018"
|
||||
event_start: 2018-11-15T08:30:00+02:00
|
||||
event_end: 2018-11-15T18:00:00+02:00
|
||||
event_timezone: Europe/Amsterdam
|
||||
event_location: Van der Valk Hotel Utrecht
|
||||
event_organizers:
|
||||
- organizer:
|
||||
id: nluug
|
||||
name: NLUUG
|
||||
event_attendance_mode: "offline"
|
||||
event_images:
|
||||
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
|
||||
event_description: "Najaarsconferentie 2018 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
|
||||
event_address:
|
||||
street_address: "Winthontlaan 4-6"
|
||||
postal_code: "3526 KV"
|
||||
city: "Utrecht"
|
||||
country_name: "The Netherlands"
|
||||
event_members_only: true
|
||||
event_status: "scheduled"
|
||||
event_schedule:
|
||||
title: Programma
|
||||
description:
|
||||
columns: 4
|
||||
headers:
|
||||
- header:
|
||||
width: 10
|
||||
- header:
|
||||
text: Zaal 1
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 2
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 3
|
||||
center: true
|
||||
width: 30
|
||||
rows:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 08:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Inschrijving, ontvangst, koffie
|
||||
size: 3
|
||||
center: true
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:15
|
||||
- column:
|
||||
textfield:
|
||||
text: Openingswoord
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:30
|
||||
- column:
|
||||
talk:
|
||||
speaker: John Yani Arrasjid
|
||||
title: "Cloud Evolution and Revolution: Catering for Mission Critical Workloads"
|
||||
keynote: true
|
||||
link: talks/john-arrasjid-cloud-evolution-and-revolution/
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 10:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Pieter Jenniskens
|
||||
title: "Microservices, containers and Kubernetes"
|
||||
link: talks/pieter-jenniskens-microservices-containers-and-kubernetes/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Jan-Piet Mens
|
||||
title: The Story of OwnTracks
|
||||
link: talks/jan-piet-mens-the-story-of-owntracks/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Martijn van Lom
|
||||
title: "Fragile cyber-world: will fragmentation kill cybersecurity?"
|
||||
link: talks/martijn-van-lom-fragile-cyber-world-will-fragmentation-kill-cybersecurity/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:50
|
||||
- column:
|
||||
talk:
|
||||
speaker: Olaf Molenveld
|
||||
title: "How to use smart canary releasing for containers to increase velocity and reduce issues"
|
||||
link: talks/olaf-molenveld-how-to-use-smart-canary-releasing-for-containers-to-increase-velocity-and-reduce-issues/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Dag Wieers
|
||||
title: "Managing complex infrastructure in lab environments using Ansible"
|
||||
link: talks/dag-wieers-managing-complex-infrastructures-in-lab-environments-with-ansible/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Tom Tervoort
|
||||
title: "The road to TLS 1.3"
|
||||
link: talks/tom-tervoort-the-road-to-tls-13/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 12:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Lunch
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 13:15
|
||||
- column:
|
||||
textfield:
|
||||
text: NLUUG ALV
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Hagen Bauer
|
||||
title: Secure your Networks with the Opensource Firewall pfSense
|
||||
link: talks/hagen-bauer-secure-your-networks-with-the-opensource-firewall-pfsense/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Kees Meijs
|
||||
title: "Cloud construction at Nefos"
|
||||
link: talks/kees-meijs-cloud-construction-at-nefos/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Slawek Wojtczak
|
||||
title: ZFS Boot Environments
|
||||
link: talks/slawek-wojtczak-zfs-boot-environments/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:50
|
||||
- column:
|
||||
talk:
|
||||
title: Vervolg talk Hagen Bauer
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: René Ladan
|
||||
title: "Decoding the DCF77 time signal on a Raspberry Pi"
|
||||
link: talks/rene-ladan-decoding-the-dcf77-time-signal-on-a-raspberry-pi/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Arjan Widlak
|
||||
title: The Digital Cage
|
||||
link: talks/arjan-widlak-the-digital-cage/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 15:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: "Sylvia van Os, Thijs van der Gugten en Tom Scholten"
|
||||
title: Saltstack workshop
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Benjamin Martin
|
||||
title: "FileSender: Sharing large files across research facilities"
|
||||
link: talks/benjamin-martin-filesender-sharing-large-files-across-research-facilities/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Mischa Peters
|
||||
title: What Every Security Professional Should Know About the Dark Web
|
||||
link: talks/mischa-peters-what-every-security-professional-should-know-about-the-dark-web/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:50
|
||||
- column:
|
||||
talk:
|
||||
title: "Vervolg workshop Sylvia van Os, Thijs van der Gugten en Tom Scholten"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Mike Ciavarella
|
||||
title: "Shaved Yaks: Saving an Endangered Species"
|
||||
link: talks/mike-ciavarella-shaved-yaks-saving-an-endangered-species/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Ben Gras
|
||||
title: "TLBleed: When Protecting Your CPU Caches is Not Enough"
|
||||
link: talks/ben-gras-tlbleed-when-protecting-your-cpu-caches-is-not-enough/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 17:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Borrel, gesponsord door Snow
|
||||
center: true
|
||||
size: 3
|
||||
---
|
|
@ -1,31 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- information-architecture
|
||||
title: "Arjan Widlak - The Digital Cage"
|
||||
speakers:
|
||||
- arjan-widlak
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=gTL3-VaF89Q
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In the Digital Cage we follow three Dutch citizens, Saskia, Pieter and Esther, who seem to have been struck by fate. Saskia is obliged to have her stolen car inspected. Because she cannot comply, she is haunted by government with fines and gets into debt. If model-citizen Esther is abroad too often for her work, she loses almost everything, from her parking permit to her voting rights. Like in a Kafka-novel we discover how registries and data exchange are no neutral actors, but that we have build with ignorance and negligence a digital cage that keeps larger and larger groups invisibly imprisoned.
|
||||
|
||||
The sharing of information is the backbone of government services today. However we have lost control. We do not know how uses these data and we have no idea about the consequences of an error in registration. In this talk Arjan shows how the information architecture has rendered government blind for the problems it causes with citizens and is unable to correct errors.
|
||||
|
||||
The Digital Cage is a book published earlier this year, written by Arjan Widlak and Rick Peeters on maladministration (onbehoorlijk bestuur) caused by information architecture and one of a series of papers. This lecture is an introduction into this theme. The book also contains the "ten principles of good digital government" to give the citizen a voice and central place again in the digital government. It's a must-read for every government professional.
|
||||
|
||||
## Biography
|
||||
|
||||
Arjan Widlak is director and researcher at the Kafka Brigade Foundation. The Kafka Brigade is an action research organization that aims to tackle bureaucratic dysfunction and red tape which prevents people from accessing the services they need and which constrains and frustrates public service staff. The Kafka Brigade Netherlands coordinates the sister organizations and associated researchers in several countries.
|
||||
|
||||
Arjan is developer of several serious games concerning complex decision making. His simulations are used by businesses, governments and universities in various countries. He teaches in several program's and masterclasses about wicked problems, standardization, negotiation and ICT and the transformation of government.
|
|
@ -1,32 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- cryptography
|
||||
- tlbleed
|
||||
title: "Ben Gras - TLBleed, when Protecting Your CPU Caches is Not Enough"
|
||||
speakers:
|
||||
- ben-gras
|
||||
presentation:
|
||||
filename: 2018-11-15-ben-gras-tlbleed-when-protecting-your-cpu-caches-is-not-enough.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=d63I7fHdI_U
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
We present TLBleed, a novel side-channel attack that leaks information out of Translation Lookaside Buffers (TLBs). TLBleed shows a reliable side channel without relying on the CPU data or instruction caches. This therefore bypasses several proposed CPU cache side-channel protections, such as page coloring, CAT, and TSX.
|
||||
|
||||
Our TLBleed exploit successfully leaks a 256-bit EdDSA key from cryptographic signing code, which would be safe from cache attacks with cache isolation turned on, but would no longer be safe with TLBleed. We achieve a 98% success rate after just a single observation of signing operation on a co-resident hyperthread and just 17 seconds of analysis time. Further, we show how another exploit based on TLBleed can leak bits from a side-channel resistant RSA implementation.
|
||||
|
||||
We use novel machine learning techniques to achieve this level of performance. These techniques will likely improve the quality of future side-channel attacks. This talk contains details about the architecture and complex behavior of modern, multilevel TLB's on several modern Intel microarchitectures that is undocumented.
|
||||
|
||||
## Biography
|
||||
|
||||
Ben Gras has been in the systems security research group of the VU Amsterdam since 2015. He has worked on software reliability, defensive research projects, and most recently, offensive research. Offensive research was most noticeably making cross-VM Rowhammer exploitation reliable and a cache-based ASLR-breaking MMU sidechannel attack, both of which have been widely reported on, perhaps most prominently in Wired and Arstechnica. At Cisco, he developed a infrastructure-as-a-target defensive system.
|
||||
|
||||
Ben is currently working on a PhD in systems security research. He is frequently asked for expert commentary on cpu flaws, most recently by Wired.com, BBC, Dutch national newspapers, and HBO Vice news tonight.
|
|
@ -1,33 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- filesender
|
||||
- files
|
||||
title: "Benjamin Martin - FileSender: sharing large files across research facilities"
|
||||
speakers:
|
||||
- benjamin-martin
|
||||
presentation:
|
||||
filename: 2018-11-15-benjamin-martin-filesender-sharing-large-files-across-research-facilities.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=tzxnNGv9ObE
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
The FileSender project allows large files (100gb+) to easily be shared with people at other companies and research facilities. Uploads and downloads occur in the browser and files can be uploaded to a FileSender hosted at your organization or you can be invited as a guest to another research facility installation. Optional end to end encryption keeps the data secure from users on the server, all crypto is done in the browser keeping it simple and secure for users.
|
||||
|
||||
While a raw http and ftp server can be used to share files, many non technical users will not have access to upload and administer one of these servers. Access control to only selected users and automatic expiration of hosted files might be difficult for users more interested in research which is outside the IT field.
|
||||
|
||||
FileSender supports push and pull models. To push, if you have access to a FileSender installation you can upload the file to it and inform those who you want to access the data to allow them to obtain it. To pull a file, you can create a guest on your FileSender install and invite a user to upload the data there. Guests can be subjected to specific access control, for example, only uploading a single file, and only to you.
|
||||
|
||||
|
||||
I would love to talk about the challenges the FileSender project tries to address, the php/js code that comprise it, the history, and development of FileSender. I think it is a useful project to know and use in research and commercial environments and would love to hear feedback on where the project might want to move in the future.
|
||||
|
||||
## Biography
|
||||
|
||||
Dr Martin is the creator of libferris and loves to push the envelope of what a filesystem can do. He loves to build robots, cnc machines, and tinker with electronics. He has a long history with open source, including many ODF projects and a core contributor to FontForge for many years and is now the project lead for FileSender.
|
|
@ -1,31 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- ansible
|
||||
title: "Dag Wieers - Managing complex infrastructures in lab environments with Ansible"
|
||||
speakers:
|
||||
- dag-wieers
|
||||
presentation:
|
||||
filename: 2018-11-15-dag-wieers-managing-complex-infrastructures-in-lab-environments-with-ansible.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
This presentation looks at how we started managing lab environments in a Cisco TAC support team. We will look into the specific requirements for lab environments to better support teams and customers. We will visit the business case and eventually the technical solution and end-up with using Ansible.
|
||||
|
||||
This presentation touches Linux, Windows, network automation, and also hardware devices and other interfaces that may not have been designed for automation.
|
||||
|
||||
Warning: attendants to this presentation may be exposed to flashes of YAML, Jinja, Python, and PowerShell. The faint of heart should probably skip this session.
|
||||
|
||||
## Biography
|
||||
|
||||
Dag Wieers is a freelance Linux and Open Source consultant, having worked for various international companies (mostly, in technology, banking, broadcasting and telecom markets).
|
||||
|
||||
His main competencies include architecting and automating workflow, systems management, documentation and knowledge transfer and leading technical teams. He loves lightweight processes and keeping it simple.
|
|
@ -1,33 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- pfsense
|
||||
title: "Hagen Bauer - Secure your Networks with the Opensource Firewall pfSense"
|
||||
speakers:
|
||||
- hagen-bauer
|
||||
presentation:
|
||||
filename: 2018-11-15-hagen-bauer-secure-your-networks-with-the-opensource-firewall-pfsense.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=9PQ6HGpTkso
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Firewall and network security are a core element of IT (or at least should be). When it comes to the requirements of this crucial component of your infrastructure you should not count on your provider or a manufacturer name. Especially small organizations tend to ignore the risks due to the expected costs and complexity of enterprise devices.
|
||||
|
||||
The pfSense firewall is an high performance firewall for the growing needs to this vital element. The software provides functions like high availability, traffic shaping, vpns, network segmentation that are normally only provided by expensive enterprise products.
|
||||
|
||||
This way also small organizations and the advanced home office configurations can implement this enterprise capabilities.
|
||||
|
||||
In this double talk we will show the need for a new approach, how you can convince your decision makers and demonstrate how easy it is to set up such a configuration in typical use cases without any significant investments.
|
||||
|
||||
## Biography
|
||||
|
||||
Hagen Bauer can look back on more then 15 year of experience in the areas of open source content management, system administration and ecommerce. His personal mission is to help organisation of any size to deploy recent innovations in open source to reduce complexity and secure IT.
|
||||
|
||||
He holds a masters (Diplom-Informatiker) in computer science, is an Open Group Distinguished IT Specialist and certified pfSense administrator. He is a frequent speaker at open source and enterprise software conferences for the last 20 years.
|
|
@ -1,29 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- owntracks
|
||||
title: "Jan-Piet Mens - The Story of OwnTracks"
|
||||
speakers:
|
||||
- jan-piet-mens
|
||||
presentation:
|
||||
filename: 2018-11-15-jan-piet-mens-the-story-of-owntracks.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=ZOkit8TVUd8
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
OwnTracks let you track your own location (hence the name) via your own equipment. It is an Open Source project which produces Android and iOS apps.
|
||||
|
||||
In this talk, we tell you a bit about the crazy idea of how OwnTracks came to be, and some of the applications we've know people are using it for. We'll show you some of the eco-system around it. OwnTracks also produces a "protocol" which is implemented in the Recorder and for openHAB and Home Assistant, Traccar, etc.
|
||||
|
||||
## Biography
|
||||
|
||||
Jan-Piet Mens is an independent Unix/Linux consultant and sysadmin who's worked with Unix-systems since 1985. Jan-Piet does odd bits of coding, and has architected infrastructure at major customers throughout Europe.
|
||||
|
||||
One of his specialities is the Domain Name System and as such, he authored the book Alternative DNS Servers as well as a variety of other technical publications, and he launched the MQTT-based Open Source OwnTracks project.
|
|
@ -1,33 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- cloud
|
||||
- workloads
|
||||
title: "John Yani Arrasjid - Cloud Evolution and Revolution: Catering for Mission Critical Workloads"
|
||||
speakers:
|
||||
- john-yani-arrasjid
|
||||
presentation:
|
||||
filename: 2018-11-15-john-yani-arrasjid-cloud-evolution-and-revolution-catering-for-mission-critical-workloads.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=sh0QeMAUt_o
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
John Yani Arrasjid presents on the evolution of cloud. He uses his perspective as an infrastructure architect for virtualization and cloud, and findings from his research in the Dell EMC and Virtustream offices of the CTO.
|
||||
|
||||
Mission critical workloads now run in the cloud based on technical capabilities and automation supporting high SLAs for the enterprise. Mission critical workloads are expecting support for hybridity (on- and off-premise) and multi-cloud (providing choice). New types of mission critical workloads include AI, healthcare, transportation, and industrial IoT.
|
||||
The cloud is no longer just a sandbox. The capabilities offered through software defined technologies, partnership between IT and OT (Operational Technology) teams, and higher levels of automation and self-healing infrastructures based on machine learning. Examples presented are not exclusive to what is available.
|
||||
|
||||
## Biography
|
||||
|
||||
John Yani Arrasjid currently works in the Virtustream Office of the CTO, handling the technical relationship with VMware and Dell EMC, and working on advanced research areas for cloud solutions, including industrial IoT, AI, and secure ledger in a cloud for mission critical workloads.
|
||||
|
||||
John spent twelve years at VMware focusing on architect enablement, consulting solutions, development of the VCDX program, and the lead architect for the vCloud Architecture Toolkit.
|
||||
|
||||
John holds the first VCDX certification, and has published 6 books around virtualization, cloud, and IT infrastructure design. John has also spent 6 years on the USENIX Association Board of Directors, including his role as Vice President.
|
|
@ -1,33 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- cloud
|
||||
- openstack
|
||||
- ceph
|
||||
title: "Kees Meijs - Cloud construction at Nefos"
|
||||
speakers:
|
||||
- kees-meijs
|
||||
presentation:
|
||||
filename: 2018-11-15-kees-meijs-cloud-construction-at-nefos.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=83Sc8zQtjCY
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
This talk (in Dutch) is about Kees’ journey at Nefos towards a fully functional implementation of OpenStack in a public environment.
|
||||
|
||||
We start with the search for scale-out storage, going in production with Ceph, later on improving with SSDs and such. Continuing with systems architecture in terms of networking and OpenStack components. Pitfalls, maybe some war stories and thoughts about where to go from hereon. In short not a comprehensive guide how to build a OpenStack cloud, but a real-life tale how it’s done and not done at Nefos.
|
||||
|
||||
Obviously there’s room for discussion and to ask questions along the way.
|
||||
|
||||
## Biography
|
||||
|
||||
Back in ‘96 Kees discovered the wonders of Open Source software and especially Linux. First his hobby and later career in IT brought him a lot of experience and expertise in systems operations and IT architecture.
|
||||
|
||||
Nowadays Kees works as a platform architect and partner at Nefos, a new kid on the block in terms of public cloud computing. Do we hear Ceph? Do we hear OpenStack? Yes, we do! Oh, and DevOps and such.
|
|
@ -1,31 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- cybersecurity
|
||||
title: "Martijn van Lom - Fragile cyber-world: will fragmentation kill cybersecurity?"
|
||||
speakers:
|
||||
- martijn-van-lom
|
||||
presentation:
|
||||
filename: 2018-11-15-martijn-van-lom-fragile-cyber-world-will-fragmentation-kill-cybersecurity.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=OX18MNVNsdA
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Cybersecurity has reached a junction and needs a decision where it goes next. The choice we make will shape the future of our industry and the security of cyberspace for years to come, so we need to make the right one.
|
||||
|
||||
Today we stand in the middle of a storm. Not just a geopolitical one, but a cyberpolitical one. It feels like no-one trusts anyone anymore, and suspicion and confusion reign across our fragile cyber-world. Which way do we turn? Do we choose the road for ‘Balkanization’: the fragmentation and isolation of an industry? Or are we brave enough to enter the other road? One of collaboration and shared intelligence?
|
||||
|
||||
## Biography
|
||||
|
||||
Martijn is sinds 2010 in dienst bij Kasperky. Hij is begonnen als Managing Director voor de Benelux en Head of Corporate Sales in de Nordics. In 2012 werd hij benoemd tot General Manager voor zowel de Benelux- als de Nordic-regio. Sinds eind 2014 heeft Van Lom zich als General Manager Kaspersky Lab Benelux volledig gericht op de Benelux om deze regio maximaal te kunnen laten groeien.
|
||||
|
||||
Daarnaast schrijft hij regelmatig columns en artikelen voor onder andere Computable, DutchCowboys, Business & IT, BlogIT, Executive People en Dutch IT-Channel en spreekt hij op evenementen over security-gerelateerde onderwerpen.
|
||||
|
||||
Martijn heeft eerder voor Kaspersky Lab gewerkt als Sales Manager voor de Benelux van 2005 en 2008. Buiten zijn dienstverband bij de leverancier van cybersecurityoplossingen was Van Lom werkzaam bij verschillende IT-organisaties en leverde hij als freelance management consultant diensten aan organisaties als BenQ, Fujitsu, Siemens en Heineken.
|
|
@ -1,31 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- automation
|
||||
title: "Mike Ciavarella - Shaved Yaks, Saving an endangered species"
|
||||
speakers:
|
||||
- mike-ciavarella
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=zn_AS9QWbU8
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Automation is meant to make our lives simpler: just throw a shell script at some problem and the problem goes away, right? If only life in a modern DevOps world was so easy! Instead, we have thousands of tools to choose from, and hundreds of problems to solve, even in small environments. Life wasn't meant to be easy, but does it have to have so many command line arguments?!?
|
||||
|
||||
Many of the decisions we make regarding automation are based on some combination of “experience”, “that's how it's always been”, and “I just need it to work”. This is not helpful when you have little experience, a green-field site, or even less time available than you thought. Even with experience, we tend to fall back to “Just use \<insert favorite battle-tested tool here /\>”. _We choose the tool not because it's the right tool for the job, but because it's a tool we know_. This becomes further “justified” on the grounds of personal productivity. Suddenly, tool choice is the important decision, and the original problem is secondary. How can we do better?
|
||||
|
||||
This talk is about the decisions and assumptions behind automation, and, perhaps, why yak shaving needs to be preserved.
|
||||
|
||||
## Biography
|
||||
|
||||
Mike has been working with UNIX since first gaining access to a BSD-based system in the late 1980s. After mastering the `oops(8)` and `restore(8)` commands, he gained a deep appreciation of the need to automate, and of the automation potential that is a fundamental part of UNIX and UNIX like systems.
|
||||
|
||||
Mike currently lives in Amsterdam with his wife, no cats, and a 3D printer named “Bob”.
|
|
@ -1,33 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- security
|
||||
- dark-web
|
||||
title: "Mischa Peters - What Every Security Professional Should Know About the Dark Web"
|
||||
speakers:
|
||||
- mischa-peters
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Turn on the nightly news or your favorite TV drama and you’re bound to hear mentions of a vast criminal underworld for drugs, sex, guns, and identity theft hidden in plain site - all you need is a computer or mobile device to get there - this is the dark web. But what is the dark web really?
|
||||
|
||||
While well known, fewer than 1% of internet users have visited the dark web and even among IT security professionals, only 1 in 7 have ever ventured to a dark web forum or site. This lack of direct experience helps explain why there is so much fear and misinformation being spread. But it also suggests that many in the security industry are missing out on a crucial source of information that could help them better protect their enterprise and better get inside the mind of a hacker.
|
||||
|
||||
In this talk, we hope to use our knowledge to help break apart fact from fiction and provide you with the basics you, as a security professional, will need to begin safely leveraging this growing intelligence resource to better protect your organization.
|
||||
|
||||
## Biography
|
||||
|
||||
Mischa Peters is Director Systems Engineering EMEA with IntSights. He has been in the industry for more than 20 years and began his career at one of the leading Internet Service Providers in the Netherlands, XS4ALL. After XS4ALL he worked for companies like Livingston/Lucent, Foundry/Brocade, A10 Networks and LightCyber.
|
||||
|
||||
His knowledge has evolved with the emergence of the Web and the need to secure it all and gained vast experience in this subject, with companies such as BlueCoat and LightCyber and currently IntSights. IntSights being positioned as a leader in the field of Dark Web and Cyber Risk Intelligence.
|
||||
In his former life, he was helping teams designing, building and releasing innovative online and e-commerce focused platforms for digital enterprises. In his role of CTO of Vamp.io he is focusing on envisioning and realising the architecture, technology and features of Vamp, consultative business development, and defining and refining the vision of Vamp’s value in the ever-changing DevOps space.
|
|
@ -1,32 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- containers
|
||||
- canary-releasing
|
||||
title: "Olaf Molenveld - How to use smart canary releasing for containers to increase velocity and reduce issues"
|
||||
speakers:
|
||||
- olaf-molenveld
|
||||
presentation:
|
||||
filename: 2018-11-15-olaf-molenveld-how-to-use-smart-canary-releasing-for-containers-to-increase-velocity-and-reduce-issues.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=-8enRR4poKU
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Adopting new technologies like Docker containers, microservices, Mesos/Marathon, Kubernetes and other “cloud native” solutions, not only creates huge possibilities to increase velocity and scalability, but also introduces a whole new level of complexity. How to implement continuous delivery, service discovery, log-agreggation, API orchestration and secure exposing of service API's and applications? These are all non-trivial challenge which need to be solved before one can safely go to production with such an modern cloud-native stack.
|
||||
|
||||
A solution that can handle these requirements in an integrated and unified way can provide great value. It cannot only provide a single “pane of glass” to the underlying components and make them work together efficiently, it can also apply smart metric-driven automation workflows to provide advanced features like canary-relasing, feature-A/B testing and runtime optimisations like SLA based autoscaling.
|
||||
|
||||
In this talk, Olaf Molenveld, co-founder and CTO of Vamp.io, will demonstrate how smart service discovery, load balancing, canary releasing, feature testing and autoscaling can be quickly applied to a container scheduler using a unified system.
|
||||
|
||||
## Biography
|
||||
|
||||
Olaf has over 20 years of experience in the internet industry in various technical, architectural and managerial roles. With a background as a software developer, solutions architect and technical consultant, Olaf is in a good position to align business challenges with technical innovations and organisational processes.
|
||||
|
||||
In his former life, he was helping teams designing, building and releasing innovative online and e-commerce focused platforms for digital enterprises. In his role of CTO of Vamp.io he is focusing on envisioning and realising the architecture, technology and features of Vamp, consultative business development, and defining and refining the vision of Vamp’s value in the ever-changing DevOps space.
|
|
@ -1,31 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- microservices
|
||||
- containers
|
||||
- kubernetes
|
||||
title: "Pieter Jenniskens - Microservices, containers and Kubernetes"
|
||||
speakers:
|
||||
- pieter-jenniskens
|
||||
presentation:
|
||||
filename: 2018-11-15-pieter-jenniskens-microservices-containers-and-kubernetes.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=6t1tX0lz_M8
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Containers have been around for a while now. But how do you use them to migrate your software from a traditional architecture to a more microservices oriented architecture? And what about management and scaling once your containers number in the hundreds?
|
||||
|
||||
In this talk we will have a look at microservices, how it uses containers and how kubernetes manages all this. Using a webshop as an example, we will look under the hood of kubernetes and see how it all works together.
|
||||
|
||||
## Biography
|
||||
|
||||
Pieter encountered Linux and Open Source software for the first time in 1992 and never let go. During his studies he played around a lot with Linux and BSD.
|
||||
|
||||
Pieter worked in Linux consultancy for most of his adult life and only recently started to work for SUSE as a Sales engineer. In this role he talks about Linux and Open Source all day but still gets to play with the new technologies out there.
|
|
@ -1,40 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- dcf77
|
||||
- time
|
||||
- raspberry-pi
|
||||
title: "René Ladan - Decoding the DCF77 time signal on a Raspberry Pi"
|
||||
speakers:
|
||||
- rene-ladan
|
||||
presentation:
|
||||
filename: 2018-11-15-rene-ladan-decoding-the-dcf77-time-signal-on-a-raspberry-pi.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=O7-l6EU1oCU
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
This talk will introduce the DCF77 time station located near Mainflingen, Germany. This station transmits the time every minute with one bit per second (except for the last second of the minute) at a carrier frequency of 77.5 kHz.
|
||||
|
||||
Topics will include:
|
||||
|
||||
* How can the raw radio signal be converted to bits? This is harder than you think!
|
||||
* How can we decode the time information transmitted each minute and deal with reception errors?
|
||||
* DCF77 also transmits information from third parties (mostly commercial weather forecasts), how can we decode these?
|
||||
* Design of the software
|
||||
* High-level history of the software and future ideas
|
||||
* Demo time :)
|
||||
|
||||
## Biography
|
||||
|
||||
René studied computing science at the Eindhoven University of Technology where he graduated in 2006. After that he worked at various companies (including the university itself), some involving Linux, others Windows-based.
|
||||
|
||||
He started his open source shadow career with some small projects on Sourceforge but it really took off when he started to work on FreeBSD in 2004. Meanwhile, he has been awarded both a documentation and a ports commit bit and is now part of the Ports Management Team (aka portmgr@). After visiting too many instances of EuroBSDCon, he was drawn into the accompanying Foundation and now assumes the role of secretary.
|
||||
|
||||
When not doing BSD stuff and still in nerd mode, he likes to tinker with his DCF77 receiver which runs on a Raspberry Pi 1B (and still runs FreeBSD or Linux as its operating system).
|
|
@ -1,33 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- zfs
|
||||
title: "Slawek Wojtczak - ZFS Boot Environments"
|
||||
speakers:
|
||||
- slawek-wojtczak
|
||||
presentation:
|
||||
filename: 2018-11-15-slawek-wojtczak-zfs-boot-environments.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=6cpfKodHW00
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
As long as sysadmins need to maintain, change and update operating systems there is always need to protect against problems that may occur during these operations. Various solutions were used starting from simple backup/restore procedures or copying the contents of system filesystems into spare disks to snapshots and clones recently. None of these solutions were transparent enough or bulletproof enough to provide complete and consistent protection again failures in the change or update process.
|
||||
|
||||
One of such holy grails is ZFS Boot Environments solution. It protects entire system (and even additional data when needed) against almost any change or update process. As ZFS Boot Environments matured in Solaris/Illumos systems and then on FreeBSD UNIX other systems started to copy its principles to provide similar solutions such as snapper with BTRFS in SUSE or Boot Environment Manager for DragonFly BSD with their HAMMER filesystem.
|
||||
|
||||
The presentation aims to walk through the history of these solutions with the focus on practical ZFS Boot Environments solutions and examples.
|
||||
|
||||
## Biography
|
||||
|
||||
I have used FreeBSD for more then 13 years both privately and professionally along with various other UNIX and UNIX-like systems. Besides UNIX systems I put a lot of interest in storage, high availability solutions, virtualization/containers and backup/restore solutions showed on my LinkedIn page. I am also available via Twitter and Mastodon.
|
||||
|
||||
Recently I started a blog where I share knowledge and experience that I gathered by working 10+ years as sysadmin (now architect) at IT industry. Countless times various articles or blog posts helped me, so I though that its about time to give back. If you want to read more you may check My FreeBSD Story at my blog.
|
||||
|
||||
Arjan is developer of several serious games concerning complex decision making. His simulations are used by businesses, governments and universities in various countries. He teaches in several program's and masterclasses about wicked problems, standardization, negotiation and ICT and the transformation of government.
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- cryptography
|
||||
- tls
|
||||
title: "Tom Tervoort - The road to TLS 1.3"
|
||||
speakers:
|
||||
- tom-tervoort
|
||||
presentation:
|
||||
filename: 2018-11-15-tom-tervoort-the-road-to-tls-13.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=L1wFkKOzp6M
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Since it was quickly cobbled together by Netscape in order to allow people to buy items over the web, the SSL/TLS protocol has become one of the most popular protocols for secure communications. Unfortunately, designing a cryptographic protocol that satisfied everyone's needs turned out to be more complex than anticipated, causing the large number of vulnerabilities which plaged each version of it so far.
|
||||
|
||||
This talk will cover the evolution of SSL and TLS, and how mistakes from the past informed the design of its newest incarnation: TLS 1.3. It will also examine the new protocols' considerable improvements in robustness, security and efficiency, and the issues that still remain.
|
||||
|
||||
## Biography
|
||||
|
||||
Tom is a security specialist (i.e. ethical hacker and consultant) at Secura and a PhD student (in the field of medical security) at the AMC hospital. He frequently perform security investigations of complex and unorthodox systems such as cryptographic protocols, identity management systems and blockchain applications.
|
||||
|
||||
Tom worked as a software developer before entering the security field, and received a master's degree in computing science (specialising in programming technology and automatic protocol verification) from Utrecht University.
|
|
@ -1,261 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- conferenties
|
||||
- evenementen
|
||||
date: 2019-11-21T16:08:58+02:00
|
||||
description: "De NLUUG najaarsconferentie werd gehouden op donderdag 21 november 2019 in het Van der Valk Hotel Utrecht."
|
||||
is_event: true
|
||||
tags:
|
||||
- conferenties
|
||||
slug:
|
||||
title: "NLUUG najaarsconferentie 2019"
|
||||
layout: schedule-event
|
||||
event_title: "NLUUG najaarsconferentie 2019"
|
||||
event_start: 2019-11-21T08:30:00+02:00
|
||||
event_end: 2019-11-21T18:00:00+02:00
|
||||
event_timezone: Europe/Amsterdam
|
||||
event_location: Van der Valk Hotel Utrecht
|
||||
event_organizers:
|
||||
- organizer:
|
||||
id: nluug
|
||||
name: NLUUG
|
||||
event_attendance_mode: "offline"
|
||||
event_images:
|
||||
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
|
||||
event_description: "Najaarsconferentie 2019 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
|
||||
event_address:
|
||||
street_address: "Winthontlaan 4-6"
|
||||
postal_code: "3526 KV"
|
||||
city: "Utrecht"
|
||||
country_name: "The Netherlands"
|
||||
event_members_only: true
|
||||
event_status: "scheduled"
|
||||
event_schedule:
|
||||
title: Programma
|
||||
description:
|
||||
columns: 4
|
||||
headers:
|
||||
- header:
|
||||
width: 10
|
||||
- header:
|
||||
text: Zaal 1
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 2
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 3
|
||||
center: true
|
||||
width: 30
|
||||
rows:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 08:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Inschrijving, ontvangst, koffie
|
||||
size: 3
|
||||
center: true
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:15
|
||||
- column:
|
||||
textfield:
|
||||
text: Openingswoord
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:30
|
||||
- column:
|
||||
talk:
|
||||
speaker: David Blank-Edelman
|
||||
title: "SRE101: Lessons from a Parallel Universe"
|
||||
keynote: true
|
||||
link: talks/david-blank-edelman-sre101-lessons-from-a-parallel-universe/
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 10:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Andreas Hülsing
|
||||
title: Post-quantum cryptography
|
||||
link: talks/andreas-hulsing-post-quantum-cryptography/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Moritz Müller
|
||||
title: Roll, Roll, Roll your Root — first DNSSEC Root KSK Rollover
|
||||
link: talks/moritz-muller-roll-roll-roll-your-root-first-dnssec-root-ksk-rollover/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Michael Boelen
|
||||
title: "Let's create better* scripts"
|
||||
link: talks/michael-boelen-lets-create-better-scripts/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:50
|
||||
- column:
|
||||
talk:
|
||||
speaker: Roland van Rijswijk-Deij
|
||||
title: "QBC: The Quantum Blockchain Cloud —debunking quantum myths and fables"
|
||||
link: talks/roland-van-rijswijk-deij-qbc-the-quantum-blockchain-cloud-debunking-quantum-myths-and-fables/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Carlo Meijer
|
||||
title: "Self-encrypting deception"
|
||||
link: talks/carlo-meijer-self-encrypting-deception/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Hagen Bauer
|
||||
title: Treating documentation as code
|
||||
link: talks/hagen-bauer-treating-documentation-as-code/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 12:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Lunch
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 13:30
|
||||
- column:
|
||||
talk:
|
||||
speaker: Thomas Attema
|
||||
title: Cryptographic applications of quantum mechanics
|
||||
link: talks/thomas-attema-cryptographic-applications-of-quantum-mechanics/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Bram Cappers
|
||||
title: "Eventpad: Cybercrime Analysis Using Visual Analytics"
|
||||
link: talks/bram-cappers-eventpad-cybercrime-analysis-using-visual-analytics/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Koen de Jonge
|
||||
title: Community Hosted Open Source Infrastructure
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:15
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:20
|
||||
- column:
|
||||
talk:
|
||||
speaker: Sebastian Österlund
|
||||
title: "RIDL: Rogue In-Flight Data Load"
|
||||
link: talks/sebastian-osterlund-ridl-rogue-in-flight-data-load/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Debarshi Basak
|
||||
title: Next generation app security and mitigation for Lawfirms
|
||||
link: talks/debarshi-basak-next-generation-app-security-and-mitigation-for-lawfirms/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Anco Scholte ter Horst
|
||||
title: XS4ALL Moet Blijven
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 15:05
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 15:30
|
||||
- column:
|
||||
talk:
|
||||
speaker: Wim ten Have
|
||||
title: What does vNUMA actually mean?
|
||||
link: talks/wim-ten-have-what-does-vnuma-actually-mean/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Carlo Berto
|
||||
title: An update on RPKI
|
||||
link: talks/carlo-berto-an-update-on-rpki/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Michiel Leenaars
|
||||
title: The Commons Conservancy
|
||||
link: talks/michiel-leenaars-the-commons-conservancy/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:15
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:20
|
||||
- column:
|
||||
talk:
|
||||
speaker: Pieter Lexis
|
||||
title: Running containers with systemd-nspawn
|
||||
link: talks/peter-lexis-running-containers-with-systemd-nspawn/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Eric Verheul
|
||||
title: Remote Document Encryption
|
||||
link: talks/eric-verheul-remote-document-encryption/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Martin Geusebroek
|
||||
title: Counter social engineering
|
||||
link: talks/martin-geusebroek-counter-social-engineering/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 17:10
|
||||
- column:
|
||||
talk:
|
||||
speaker: Edwin den Andel
|
||||
title: Tales (Fails) from the trenches…
|
||||
link: talks/edwin-van-andel-tales-fails-from-the-trenches/
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 18:05
|
||||
- column:
|
||||
textfield:
|
||||
text: Borrel, gesponsord door Sue
|
||||
center: true
|
||||
size: 3
|
||||
---
|
|
@ -1,32 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Andreas Hülsing - Post-quantum cryptography"
|
||||
speakers:
|
||||
- andreas-hulsing
|
||||
presentation:
|
||||
filename: 2019-11-21-andreas-hulsing-post-quantum-cryptography.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=hebljeD0Ngw
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
As soon as large scale quantum computers are built today's cryptography does not provide security anymore. This threatens the security of our digital society. Even worse: For some data that we send or store in encrypted form we want secrecy to hold for our whole lifetime, if not longer. Think of medical data for example. This data can be stored and decrypted when a quantum computer is available.
|
||||
|
||||
Post-quantum cryptography is the study of conventional cryptography in the presence of an adversary with access to a quantum computer. In this talk I will give an overview of the landscape of schemes submitted to the recent NIST standardization project. I will discuss the underlying problems and summarize the current knowledge about quantum algorithms to solve them.
|
||||
|
||||
In addition, I will touch on challenges in the area of provable post-quantum security.
|
||||
|
||||
## Biography
|
||||
|
||||
I am assistant professor in the Coding Theory and Cryptology group at Eindhoven University of Technology (TU/e). My research focuses on post-quantum cryptography — cryptography that resists quantum computer-aided attacks. My works range from theoretical works, like how to model quantum attacks or formal security arguments in post-quantum security models, to applied works, like the analysis of side-channel attacks or the development of efficient hash-based signature schemes. In many of my works I try to combine the theoretical and the applied perspective. This is especially reflected in my work on standardizing post-quantum cryptography.
|
||||
|
||||
Before my current position, I was a postdoctoral researcher in the Coding Theory and Cryptology group, working with Tanja Lange in the PQCRYPTO project. Before I was a postdoctoral researcher in the cryptographic implementations group at TU/e, working with Daniel J. Bernstein. I did my PhD in the cryptography and computer algebra group at TU Darmstadt under the supervision of Johannes Buchmann.
|
||||
|
||||
Before starting my PhD, I worked as a research fellow at Fraunhofer SIT in Darmstadt. I hold a Diploma in computer science from TU Darmstadt.
|
|
@ -1,28 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Bram Cappers - Eventpad: Cybercrime Analysis Using Visual Analytics"
|
||||
speakers:
|
||||
- bram-cappers
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=TJixUQhU-lY
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Automation of malware analysis is a popular and very important topic, but with human cognition still outperforming AI we are still indispensable. In this talk we show how we can exploit the human eye for the analysis of large PCAP files and event logs using visual analytics.
|
||||
|
||||
At the TU/e we designed a system Eventpad to quickly visualize patterns and anomalies in event collections. In this talk we give live demos on how we can use the tool to discover fraud in VoIP traffic, discover chemical waste dumping in a wildlife preserve and reverse engineer Ransomware in back office environments.
|
||||
|
||||
## Biography
|
||||
|
||||
Bram Cappers is a postdoctoral researcher at Eindhoven University of Technology and cofounder of the startup AnalyzeData. In 2018 he finished his PhD in the area of data visualization and cyber security. where he developed new antivirus technology to visually detect patterns and anomalies in network traffic.
|
||||
|
||||
Bram has won numerous awards in the area of data science and presented his technology at prestigious events such as BlackHat USA 2018 and Still Hacking Anyway 2017.
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Carlo Berto - An update on RPKI"
|
||||
speakers:
|
||||
- carlo-berto
|
||||
presentation:
|
||||
filename: 2019-11-21-carlo-berto-an-update-on-rpki.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=l_BJP5wHoJc
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In this presentation Carlo will provide an update on the current state of routing security and routing hijacks from the perspective of RIPE NCC.
|
||||
|
||||
He will share statistics on the quality of the Internet Routing Registry and explains what Resource Public Key Infrastructure (RPKI) is, the difference between signing and validating resources and how to do this.
|
||||
|
||||
Finally, Carlo will share some insights from actual RPKI deployments.
|
||||
|
||||
## Biography
|
||||
|
||||
Carlo Berto is Customer Service Analyst at the RIPE NCC. He helps new members request Internet number resources and acts as the first point of contact for all support queries. He is an expert in all questions related to the RIPE Database, RPKI, abuse complaints and billing.
|
||||
|
||||
Carlo has over seven years of experience in Customer Services and was previously heading his own team at a global Telecommunications company. He holds a Bachelor in Statistics and Information Science from the University of Venice. Originally from Italy, Carlo speaks fluent Italian, Spanish and English.
|
|
@ -1,34 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Carlo Meijer - Self-encrypting deception"
|
||||
speakers:
|
||||
- carlo-meijer
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=skqFDQrOepY
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by reverse engineering their firmware. These drives were produced by three manufacturers between 2014 and 2018, and are both internal models using the SATA and NVMe interfaces (in a M.2 or 2.5“ traditional form factor) and external models using the USB interface.
|
||||
|
||||
In theory, the security guarantees offered by hardware encryption are similar to or better than software implementations. In reality, we found that many models using hardware encryption have critical security weaknesses due to specification, design, and implementation issues. For many models, these security weaknesses allow for complete recovery of the data without knowledge of any secret (such as the password).
|
||||
|
||||
BitLocker, the encryption software built into Microsoft Windows will rely exclusively on hardware full-disk encryption if the SSD advertises support for it. Thus, for these drives, data protected by BitLocker is also compromised.
|
||||
|
||||
We conclude that, given the state of affairs affecting roughly 60% of the market, currently one should not rely solely on hardware encryption offered by SSDs and users should take additional measures to protect their data.
|
||||
|
||||
## Biography
|
||||
|
||||
Carlo is a PhD candidate at the Digital security group at the Radboud University Nijmegen. He is currently under supervision of Bart Jacobs.
|
||||
|
||||
His research focuses on analysis of already-deployed cryptographic systems in the wild. As of today, many people rely on cryptographic systems on a daily basis. Be it your through web browser, your public transport e-ticket, or your wireless router. Some of these systems have gone through extensive scrutiny. However, many have not.
|
||||
|
||||
Within this category, the systems are often difficult to analyze because proper documentation and/or source code is unavailable to the public. Sometimes the difficulty of analysis is even relied on for security, which is a terrible idea. Most of Carlo's research follows a pattern of uncovering the details and inner workings of a system through reverse engineering, and subsequently analyzing (and often breaking) its security.
|
|
@ -1,28 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "David Blank-Edelman - SRE101: Lessons from a Parallel Universe"
|
||||
speakers:
|
||||
- david-blank-edelman
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=oKnc8rcg1H0
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Just within the last fifteen years, we have seen at least two separate communities evolve from the generic idea of Systems Administration/Operations. The first, DevOps, grew up very much in public. The second, SRE, germinated within the halls of “special” companies like Google and Facebook and is now starting to gain significant visibility and traction in the wider world.
|
||||
|
||||
Join me for an introduction to SRE: what it is, why it matters, how it relates to other operations practices like DevOps, and if/how you can get started with it in your organization.
|
||||
|
||||
## Biography
|
||||
|
||||
David has over thirty years of experience in the systems administration/DevOps/SRE field in large multiplatform environments. He is the curator/editor of the O'Reilly Book Seeking SRE: Conversations on Running Production Systems at Scale and author of the O'Reilly Otter Book (Automating Systems Administration with Perl).
|
||||
|
||||
David is a co-founder of the wildly popular SREcon conferences hosted globally by USENIX. David currently works for Microsoft as a senior cloud advocate focusing on site reliability engineering.
|
|
@ -1,28 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Debarshi Basak - Next generation app security and mitigation for Lawfirms"
|
||||
speakers:
|
||||
- debarshi-basak
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Majority of Lawfirms today rely on older technology due to hyperfocus on security and scepticism over container technologies. As the rest of the world transition to containers, we discuss challenges in the lawfirms.
|
||||
|
||||
We propose an architecture to package applications, deliver, distribute and run third party vendor applications securely along with a method to capture and measure total cost of ownership.
|
||||
|
||||
We also discuss violation prevention effort that could be taken and a mitigation architecture in a scenario when there is a violation.
|
||||
|
||||
## Biography
|
||||
|
||||
Debarshi has almost 10 years of experience in Data Engineering, Container technologies etc. He has previously worked in Bol.com, SensysGatso and now at ReynenCourt BV addressing key issues in Container Technology and Security in modern infrastructure for Law Firms.
|
|
@ -1,32 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Edwin van Andel - Tales (Fails) from the trenches…"
|
||||
speakers:
|
||||
- edwin-van-andel
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=N3_ezZDzADI
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Edwin van Andel will take you on a ride through the beautiful, but sometimes scary, woods of bugs, fails and wonders, located in the misty valley of infosec.
|
||||
|
||||
There will be tales of misdirected focus. There will be burning arrows flying towards the anonymous clientele of Zerocopter’s bug-bounty and coordinated vulnerability disclosure platform. And we will gaze at the sunset over the immortal fields of stupidity.
|
||||
|
||||
Edwin will discuss and gives examples of beautifully chained exploits, utterly stupid designs, fails and the always funny owner’s responses. Fun, laughter and tears as we cool off and swim together in IoT infested waters. While always reflecting back to the key of all his presentations: Hackers can help.
|
||||
|
||||
Will you hop on for a 45 minute ride through these hidden woods? Visual stupidity included as always!
|
||||
|
||||
## Biography
|
||||
|
||||
Edwin van Andel started hacking at the age of 13. Although he is now CEO of hacker company Zerocopter, his relationship with the hacker community is still the main driving force in his life. His dream to bring the brilliant minds of all hackers he knows together in one room and to hack everything that is brought in is something that he is getting closer to.
|
||||
|
||||
In addition, together with the “Guild of Grumpy Old Hackers”, he is actively guiding and leading young hackers in the right direction in order to create his ultimate goal - a safe society through a safer internet.
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Eric Verheul - Remote Document Encryption"
|
||||
speakers:
|
||||
- eric-verheul
|
||||
presentation:
|
||||
filename: 2019-11-21-eric-verheul-remote-document-encryption.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=hnL7ET6Y9RM
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
We introduce Remote Document Encryption (RDE) allowing any party to encrypt data for a holder of an electronic passport such that only with physical possession of the passport decryption is possible. RDE is not an intended functionality of passports and actually consists of a tweak of passport protocols. Electronic passports allow for 160 bit security exceeding current good practice of 128 bit security.
|
||||
|
||||
In the presentation we also indicate possible applications including secure email and end- to-end secure file sending. In the second quarter of 2018 a proof-of-concept was done with RDE based secure mail. This pilot was successful and indicated that RDE was indeed a viable technique. SURF, the collaborative ICT organisation for Dutch education and research, intends to implement RDE in its Filesender instance and is planning a pilot in 2019.
|
||||
|
||||
## Biography
|
||||
|
||||
Eric Verheul is an independent cryptographic consultant and part-time professor at the Radboud University Nijmegen. Eric teaches a Master Course in security management and does research in applied cryptography and privacy enhancing technologies.
|
||||
|
||||
His scientific goal is to creatively (ab)use existing cryptographic techniques and protocols achieving optimal (privacy) protection at low cost. His presentation at NLUUG on Remote Document Encryption is a good example of this.
|
||||
|
||||
Eric also serves as cryptographic architect in the Dutch eID scheme in which capacity he has developed the technique of polymorphic encryption and pseudonymization (PEP). This supplements federative authentication with strong privacy protection. Paradoxically, PEP allows the identity provider DigiD conducting authentications in an anonymous way while still being able delivering identifying information (or pseudonym) to service providers. From June 4 2018 issued Dutch driver licenses support PEP.
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Hagen Bauer - Treating documentation as code"
|
||||
speakers:
|
||||
- hagen-bauer
|
||||
presentation:
|
||||
filename: 2019-11-21-hagen-bauer-treating-documentation-as-code.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Use the editor you love and manage your documentation in a version control system. Have you been there too? You are forced to use a word processor to write technical documentation. You get frustrated from all this cut and paste and keeping up with different versions of input? And at the end you have to waste your time to convert the result into different versions for different audiences and different outputs?
|
||||
|
||||
Imagine this: you can use the text editor from the device you like the most (e.g. vi on your smartphone). Artifacts from configurations files are always up to date. Images and tables are generated from external tools without any manual steps. Different versions are created on demand with content that the intended audience is allowed or able to consume. And if you are working in a team you can have continuous documentation that creates the output of your choice for web, printing or ebooks from one single source of truth.
|
||||
|
||||
Let's have a look how you can use asciidoctor to create documentation in a way you will love.
|
||||
|
||||
## Biography
|
||||
|
||||
Hagen Bauer can look back on more then 15 year of experience in the areas of open source content management, system administration and ecommerce. His personal mission is to help organisation of any size to deploy recent innovations in open source to reduce complexity and secure IT.
|
||||
|
||||
Hagen holds a masters (Diplom-Informatiker) in computer science, is an Open Group Distinguished IT Specialist and certified pfSense administrator. He is a frequent speaker at open source and enterprise software conferences for the last 20 years.
|
|
@ -1,31 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Martin Geusebroek - Counter social engineering"
|
||||
speakers:
|
||||
- hagen-bauer
|
||||
presentation:
|
||||
filename: 2019-11-21-martin-geusebroek-counter-social-engineering.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
This talk takes you on a journey through the shadow networks where access to information is vital. A world in which the line between spectator, participant, manipulator or victim of manipulation is unclear. Confidentiality, availability and integrity of information is vital for your business and society.
|
||||
|
||||
What if your data becomes the target of social engineers in order to access your business crown jewels, influence you, or even society into criminal act without even realizing it?
|
||||
|
||||
|
||||
How do they proceed? What is profiling and pretexting? And how does behavioral manipulation and eliciting confidential information work. Eventually you will gain inspiration while sharing our knowledge on how we can counter social engineering together.
|
||||
|
||||
## Biography
|
||||
|
||||
Martin is one of our most experienced subject matter experts! He obtained knowledge and experience in Social Engineering in an international environment while working for the Dutch government.
|
||||
|
||||
Martin not only teaches in an inspiring way, but also provides many striking practical examples. It is his wish to educate staff in order to make organizations better protected against attacks by social engineers.
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: "Een presentatie gegeven door Michael Boelen over het optimaliseren van shellscripts en tips om ze veiliger en betrouwbaarder te maken."
|
||||
layout: event-talk
|
||||
tags:
|
||||
- shell
|
||||
- scripting
|
||||
title: "Michael Boelen - Let's create better* scripts"
|
||||
speakers:
|
||||
- michael-boelen
|
||||
presentation:
|
||||
filename: 2019-11-21-michael-boelen-lets-create-better-scripts.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Whether you call yourself a system administrator, developer, or DevOps sprint mediator, life is too short for sloppy shell scripts! In this talk, we look at how to improve them to stand the test of time. Michael will share how to create a good foundation for your scripts, so they run more reliable now and in the future. Your (future) colleagues might love you for it.
|
||||
|
||||
Focus areas of this presentation include error handling, security, style, and best practices. Also, it will cover (many) mistakes made by Michael over the last 20 years. Got some of your own? They are welcome as part of the discussion.
|
||||
|
||||
## Biography
|
||||
|
||||
Michael Boelen specializes in the field of Linux and UNIX security. He worked as a consultant for several Fortune 500 companies like Philips and ASML. In 2013, Michael started the security firm CISOfy to simplify security.
|
||||
|
||||
Next to software development, he is interested in technical auditing, system hardening, and compliance. Michael is the author of several open source security tools, including Rootkit Hunter (rkhunter) and Lynis. He blogs at Linux-Audit.com and has a personal website with relevant presentations.
|
|
@ -1,28 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Michiel Leenaars - The Commons Conservancy"
|
||||
speakers:
|
||||
- michiel-leenaars
|
||||
presentation:
|
||||
filename: 2019-11-21-michiel-leenaars-the-commons-conservancy.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Small projects can grow big, but why should every successful FOSS project bootstrap its own foundation, when this invokes all kinds of bureaucratic burdens? The Commons Conservancy is a hypervisor for virtual foundations, a meta-foundation set up to help mature upcoming efforts around open technologies.
|
||||
|
||||
The Commons Conservancy facilitates healthy and self-supporting ecosystems that are sustainable in the long term. It does so by providing a free (in all senses of the word) infrastructure for coordination as well as a proper legal framework for governance over contributions made to the projects. By collaboration with well-known charities like NLnet and dedicated service providers it can provide a turn-key charitable and business infrastructure for your FOSS efforts.
|
||||
|
||||
## Biography
|
||||
|
||||
Michiel Leenaars (1972, Netherlands) is the chairperson of The Commons Conservancy. In daily life he is Director of Strategy at NLnet Foundation. and director of Internet Society Netherlands, one of the more sizable Internet Society chapters in the world. He is also a W3C liason officer for the Benelux Office of the World Wide Web Consortium. He currently leads two of the four Research & Innovation Actions of the Next Generation Internet initiative, NGI Zero Discovery and NGI Zero PET.
|
||||
|
||||
He is active in a number of national and international organisations, such as OpenDoc Society (vice-chair), SIDN Fund (Board of Advisors), Digitale Infrastructuur Nederland, and Petities.nl foundation (treasurer). He is a member of the Netherlands committee for the UNESCO Information for All Programme.
|
|
@ -1,26 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Moritz Müller - Roll, Roll, Roll your Root — first DNSSEC Root KSK Rollover"
|
||||
speakers:
|
||||
- moritz-muller
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=1yu6eQIaH5Y
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
I give an in-depth insight into the Root KSK Rollover of the DNSSEC key of last year. Together with researchers, operators and developers from five organizations we analyzed the first ever rollover of the main cryptographic keys of DNSSEC, which had the potential of rendering millions of Internet users offline.
|
||||
|
||||
I will show, why the rollover was postponed by one year, the impact of the rollover itself and the surprising behavior it triggered in resolver software. Our results also question the current distribution methods of the DNSSEC trust anchor, and other trust anchors like CAs.
|
||||
|
||||
## Biography
|
||||
|
||||
Moritz is a Research Engineer with SIDN Labs, the research department of SIDN, the .nl ccTLD and a Ph.D candidate at the University of Twente. His research is focusing on the security and stability of the Domain Name System (DNS). In his work at SIDN he develops tools to detect malicious domain names and measures the deployment and behavior of DNS infrastructure.
|
|
@ -1,35 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Peter Lexis - Running containers with systemd-nspawn"
|
||||
speakers:
|
||||
- peter-lexis
|
||||
presentation:
|
||||
filename: 2019-11-21-peter-lexis-running-containers-with-systemd-nspawn.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=u3urXzJU1X8
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
According to its manpage, systemd-nspawn:
|
||||
|
||||
|
||||
> ... may be used to run a command or OS in a light-weight namespace container. In many ways it is similar to chroot(1), but more powerful since it fully virtualizes the file system hierarchy, as well as the process tree, the various IPC subsystems and the host and domain name...
|
||||
|
||||
In this talk, I'll go over what all of this means, how to use systemd-nspawn and how nspawn differs from docker, lxc/lxd and qemu-kvm. I'll discuss how to use the systemd-nspawn and machinectl commands, how to run services inside containers and how to introspect the containers.
|
||||
|
||||
After this, I'll quickly touch on a related project called mkosi ("make operating system image") that can be used to create images for containers and virtual-machines in one go.
|
||||
|
||||
Basic knowledge of systemd service management and containers is recommended to attend this talk.
|
||||
|
||||
## Biography
|
||||
|
||||
Educated as a Systems and Network Engineer and having dabbled with DevOps-y things for years, Pieter's official title now is "Senior PowerDNS Engineer". As such, he works on the PowerDNS source code, the build/CI/packaging pipeline and running the infrastructure around the PowerDNS open source project.
|
||||
|
||||
He is also involved in the broader DNS operations and standards communities to make the Internet a better place.
|
|
@ -1,38 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Roland van Rijswijk-Deij - QBC: The Quantum Blockchain Cloud — debunking quantum myths and fables"
|
||||
speakers:
|
||||
- roland-van-rijswijk-deij
|
||||
presentation:
|
||||
filename: 2019-11-21-roland-van-rijswijk-deij-qbc-the-quantum-blockchain-cloud-debunking-quantum-myths-and-fables.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=fC8yB5K_25A
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In this talk I will focus on trying to discombobulate some of the common hypes and misunderstandings about the words quantum and cryptography in one sentence. This includes questions such as:
|
||||
|
||||
* Can everybody decrypt my TLS if quantum is a thing?
|
||||
|
||||
* Oh my god, quantum will be a thing next week, they're already selling 2000 qubit machines!
|
||||
|
||||
* Quantum cryptography will solve all my problems
|
||||
|
||||
* Post-quantum cryptography will solve all my problems
|
||||
|
||||
With a wink and a smile, the goal of this talk is to inform the audience about the real issues quantum computing may raise for Internet security and what they should and should not focus their energies on in dealing with this problem.
|
||||
|
||||
##v Biography
|
||||
|
||||
Roland is principal scientist at NLnet Labs, a not-for-profit foundation dedicated to research and development of core Internet protocols.
|
||||
|
||||
Next to his work at NLnet Labs, Roland is an assistant professor of computer network security at the University of Twente. His research interests include DNS(SEC), BGP and network security and stability. Roland obtained an M.Sc. in computer science from the University of Twente in 2001 and a cum laude PhD in computer science from the same university in 2017.
|
||||
|
||||
In his spare time, Roland very much enjoys finding new places to go scuba diving.
|
|
@ -1,28 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Sebastian Österlund - RIDL: Rogue In-Flight Data Load"
|
||||
speakers:
|
||||
- sebastian-osterlund
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=OWt05H1Ssak
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Speculative execution bugs in modern CPUs popped up out of nowhere, but the worst of the nightmare appears to be over. While Spectre-style attacks will be with us forever, a variety of mitigations have been implemented to protect us against Intel CPU vulnerabilities such as Meltdown and Foreshadow. Browser vendors have implemented process isolation, and Intel even have silicon fixes in their latest CPUs. Do you feel safe?
|
||||
|
||||
We destroy these mitigations by taking a skeptical look at their assumptions, and reveal that unprivileged userspace applications can steal data by simply ignoring security boundaries -- after all, what do address spaces and privilege levels mean to Intel's CPU pipeline? Using our RIDL attacks, we'll steal secrets from SGX using just a bit of JavaScript in a web browser, grab /etc/shadow from another VM without even thinking about the hypervisor in the middle, and despair about our speculatively executed future.
|
||||
|
||||
## Biography
|
||||
|
||||
Sebastian is a Ph.D. student in the Systems and Network Security Group (VUSec) at the Vrije Universiteit Amsterdam. His interests include memory safety, operating systems defenses, and Fuzzing.
|
||||
|
||||
Previously he has worked on kMVX, a comprehensive kernel defense against information leaks using multi-variant execution, and more recently has worked on finding software bugs through directed fuzzing.
|
|
@ -1,28 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Thomas Attema - Cryptographic applications of quantum mechanics"
|
||||
speakers:
|
||||
- thomas-attema
|
||||
presentation:
|
||||
filename: 2019-11-21-thomas-attema-cryptographic-applications-of-quantum-mechanics.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=A0Df7T4y63s
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
It is well known that the quantum computer poses a significant threat to the security of many ICT systems. However, quantum technology is also capable of improving the security of these systems. As an example, quantum key distribution systems are already commercially available. But other applications such as quantum authentication and quantum coin flipping protocols have been developed as well. All these protocols achieve functionalities that are known to be impossible for conventional protocols.
|
||||
|
||||
In this talk I will explain some of these cryptographic applications of quantum technology and highlight the impossibilities that are circumvented by making use of quantum mechanical properties.
|
||||
|
||||
## Biography
|
||||
|
||||
In 2013, Thomas Attema started as a researcher in the Cyber Security and Robustness department of TNO. His research focus has been on (applied) cryptography, working mainly on Multi-Party Computation and Post-Quantum Cryptography.
|
||||
|
||||
In addition, in 2018 he started his PhD in the cryptology group of the CWI under the supervision of professor Ronald Cramer.
|
|
@ -1,28 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Wim ten Have - What does vNUMA actually mean?"
|
||||
speakers:
|
||||
- wim-ten-have
|
||||
presentation:
|
||||
filename: 2019-11-21-wim-ten-have-what-does-vnuma-actually-mean.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=guQlThaE2Cl
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
NUMA, Non-uniform memory access, is a computer memory design used in multiprocessing to build vast computer servers. Cloud environments often partition such server 'hosts' into smaller virtual 'guests' with the help of a virtualization management tool like libvirt. Libvirt supports a wide variety of virtualization technologies and allows to compose a vNUMA, virtual NUMA, model for its 'guest' representing and respecting the 'host' NUMA architecture for maximum performance.
|
||||
|
||||
There are many angles in which one can fail orchestrating such 'guests'. This presentation will walkthrough libvirt to implement a vNUMA 'guest' representation of the 'host' and how to compose such architecture describing it with the libvirt XML available elements and their designated attributes. It will focus on critical detail describing the NUMA induced distances of processor local- and remote memory, pinning a vCPU to a single or set of pCPUs and memory binding.
|
||||
|
||||
Last but not least important is the use and the composing of 'host-passthrough' (PCI passthrough) controllers under a vNUMA rendered architecture.
|
||||
|
||||
## Biography
|
||||
|
||||
Wim ten Have has embraced Open Source Software and deployed its use in various practical environments since 1992. He is currently working for Oracle in their Linux Virtualization Engineering group. Wim is implementing a mechanism to automatically partitioning 'host' provided capabilities and dynamically rendering those into multiple smaller 'guests' without the need for manual intervention. The goal of this automatic host partitioning is to respect all 'host' NUMA topology detail.
|
|
@ -1,218 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- conferenties
|
||||
- evenementen
|
||||
date: 2021-11-11T21:17:47+02:00
|
||||
description: "De NLUUG najaarsconferentie heeft plaatsgevonden op 11 november 2021 in het Van der Valk Hotel Utrecht."
|
||||
is_event: true
|
||||
lastmod: 2023-05-10T15:17:47+02:00
|
||||
tags:
|
||||
- conferenties
|
||||
slug:
|
||||
title: "NLUUG najaarsconferentie 2021"
|
||||
layout: schedule-event
|
||||
event_title: "NLUUG najaarsconferentie 2021"
|
||||
event_start: 2021-11-11T08:30:00+02:00
|
||||
event_end: 2021-11-11T18:00:00+02:00
|
||||
event_timezone: Europe/Amsterdam
|
||||
event_location: Van der Valk Hotel Utrecht
|
||||
event_address:
|
||||
street_address: "Winthontlaan 4-6"
|
||||
postal_code: "3526 KV"
|
||||
city: "Utrecht"
|
||||
country_name: "The Netherlands"
|
||||
event_attendance_mode: "offline"
|
||||
event_description: "Najaarsconferentie 2021 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
|
||||
event_images:
|
||||
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
|
||||
event_members_only: true
|
||||
event_organizers:
|
||||
- organizer:
|
||||
id: nluug
|
||||
name: NLUUG
|
||||
event_schedule:
|
||||
title: Programma
|
||||
description: Alleen maar geweldige sprekers
|
||||
columns: 3
|
||||
headers:
|
||||
- header:
|
||||
width: 10
|
||||
- header:
|
||||
text: Zaal 1
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 2
|
||||
center: true
|
||||
width: 30
|
||||
rows:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 08:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Inschrijving, ontvangst, koffie
|
||||
size: 2
|
||||
center: true
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:15
|
||||
- column:
|
||||
textfield:
|
||||
text: Openingswoord
|
||||
center: true
|
||||
size: 2
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:30
|
||||
- column:
|
||||
talk:
|
||||
speaker: Sjoera Nas
|
||||
title: It's the metadata, stupid! Privacy versus de grote cloudproviders
|
||||
keynote: true
|
||||
link: talks/sjoera-nas-its-the-metadata-stupid-privacy-versus-de-grote-cloudproviders/
|
||||
center: true
|
||||
size: 2
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 10:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 2
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Sake Blok
|
||||
title: TLS decryption in times of Perfect Forward Secrecy
|
||||
link: talks/sake-blok-tls-decryption-in-times-of-perfect-forward-secrecy/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Mischa Peters
|
||||
title: The OpenBSD hypervisor in the wild, a short story, but getting longer
|
||||
link: talks/mischa-peters-the-openbsd-hypervisor-in-the-wild-a-short-story-but-getting-longer/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:45
|
||||
- column:
|
||||
size: 2
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:50
|
||||
- column:
|
||||
talk:
|
||||
speaker: Jaap Akkerhuis
|
||||
title: "The sky is falling: The sun is exploding, duck! Revisited"
|
||||
link: talks/jaap-akkerhuis-the-sky-is-falling-the-sun-is-exploding-duck-revisited/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Walter Lioen
|
||||
title: "Snellius: the latest Dutch national supercomputer"
|
||||
link: talks/walter-lioen-snellius-the-latest-dutch-national-supercomputer/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 12:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Lunch
|
||||
center: true
|
||||
size: 2
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 13:30
|
||||
- column:
|
||||
talk:
|
||||
speaker: Pieter Lexis
|
||||
title: YANG and NETCONF for Systems Administration?
|
||||
link: talks/pieter-lexis-yang-and-netconf-for-systems-administration/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Dennis Baaten
|
||||
title: "Internet.nl & DANE for SMTP"
|
||||
link: talks/dennis-baaten-internetnl-en-dane-for-smtp/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:15
|
||||
- column:
|
||||
size: 2
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:20
|
||||
- column:
|
||||
talk:
|
||||
speaker: Wouter de Vries
|
||||
title: "Anycast: What is it and How to measure it"
|
||||
link: talks/wouter-de-vries-anycast-what-is-it-and-how-to-measure-it/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Eiger Jonker
|
||||
title: May Contain Hackers 2022, the Dutch hacker camp after SHA
|
||||
link: talks/eiger-jonker-may-contain-hackers-2022-the-dutch-hacker-camp-after-sha/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 15:05
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 2
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 15:30
|
||||
- column:
|
||||
talk:
|
||||
speaker: Martin Pels
|
||||
title: 10 years of NLNOG RING
|
||||
link: talks/martin-pels-10-years-of-nlnog-ring/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Rudi van Drunen
|
||||
title: What are FPGAs anyway and why is it fun to play with them?
|
||||
link: talks/rudi-van-drunen-what-are-fpgas-anyway-and-why-is-it-fun-to-play-with-them/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:15
|
||||
- column:
|
||||
size: 2
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:20
|
||||
- column:
|
||||
talk:
|
||||
speaker: Vesna Manojlovic
|
||||
title: Technical Communities Resilience During COVID-19 Pandemic
|
||||
link: talks/vesna-manojlovic-technical-communities-resilience-during-covid-19-pandemic/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Attilla de Groot
|
||||
title: Integrating host networking with EVPN
|
||||
link: talks/attilla-de-groot-integrating-host-networking-with-evpn/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 17:05
|
||||
- column:
|
||||
textfield:
|
||||
text: Borrel, gesponsord door AT Computing
|
||||
center: true
|
||||
size: 2
|
||||
---
|
||||
|
|
@ -1,28 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Attilla de Groot - Integrating host networking with EVPN"
|
||||
speakers:
|
||||
- attilla-de-groot
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=8I_s3U-a20o
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Over the past years EVPN has become the default technology in datacenter deployments. Still most hosts are connected through standard vlan configuration or have their own overlay technology. By the end of the year NVIDIA will add the Host Based Networking functionality to the Bluefield2 DPUs. HBN makes it possible to use the native Linux networking constructs through DOCA directly on the DPU.
|
||||
|
||||
In this session we will explain how such an architecture is deployed in customer environments and allows for native integration in a network with NVIDIA Spectrum switches.
|
||||
|
||||
## Biography
|
||||
|
||||
Attilla has spent the last 15 years at the cutting edge of networking, having spent time with Amsterdam Internet Exchange, Infostrada, TenICT, with exposure to technology from Cisco, Brocade, HP, Juniper, and Huawei.
|
||||
|
||||
After NVIDIA acquired Cumulus Networks, the creators of open networking, Attilla is able to continue his interest in open architecture design.
|
|
@ -1,24 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Dennis Baaten - Internet.nl & DANE for SMTP"
|
||||
speakers:
|
||||
- dennis-baaten
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=Pl5GseddzE8
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Historically, SMTP servers exchange emails using either an unencrypted (plaintext) connection or (since 2002) an encrypted connection based on the opportunistic STARTTLS protocol. At the same time SMTP servers, by design, did not validate the authenticity of another email server’s certificate; any random certificate were accepted. In short; confidentiality and integrity of (public) email transport cannot be guaranteed without taking extra measures. This is where DANE for SMTP comes in, as it enables email servers to determine up front whether or not another SMTP server supports an encrypted connection, while also providing the means of validating the authenticity of the other email server’s certificate.
|
||||
|
||||
## Biography
|
||||
|
||||
Dennis Baaten is a freelance security consultant and ethical hacker. He works for the Dutch Internet Standards Platform where he operates the support desk of Internet.nl, contributes to the development of the internet.nl platform, and creates technical how-to guides on implementing secure Internet standards.
|
|
@ -1,26 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Eiger Jonker - May Contain Hackers 2022, the Dutch hacker camp after SHA"
|
||||
speakers:
|
||||
- eiger-jonker
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=3m3JzGhbhGM
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
The Netherlands has been a host of hacker camps since 1993. Last edition was called SHA2017. They are the temporary home away for over 3500 hackers. This talk shows what makes a hacker camp, how it is organized and highlights some of the insane challenges and complications.
|
||||
|
||||
## Biography
|
||||
|
||||
Elger helps organize the large Dutch quadrennial hacker events such as SHA2017 and MCH2022, in the role as being responsible. You can bring your own (digital) flame thrower, but that also means that is has to be safe. Elger helps with setting up the organization, planning, permits and organizational matters.
|
||||
|
||||
Elger has also helped create other nice hacker things such as Hack42 in Arnhem and the Awesome Space in Utrecht.
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Jaap Akkerhuis - The sky is falling: The sun is exploding, duck! Revisited"
|
||||
speakers:
|
||||
- jaap-akkerhuis
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=CmxE7lCzk0g
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In May 2013 at the Ripe 66 meeting in Dublin, at the maximum of solar cycle 24, I presented a short talk on mass emisions from the sun and it effects on our planet. Now, at the start the 25th solar cycle, it is a good moment to talk about Space Weather again and its effect on our environment. This talk doesn't need any special knowledege and will try to make you understand alarmist headlines better.
|
||||
|
||||
## Biography
|
||||
|
||||
After a period of seven years in the U.S., where he was active at the Information Technology Center at Carnegie Mellon University, software company mtXinu, and AT&T Bell Labs, Jaap returned to the Netherlands where he joined the NLnet, the first independent ISP in the Netherlands. Later he worked as a technical advisor for Stichting Internet Domeinregistratie Nederland (SIDN)
|
||||
|
||||
Jaap went back and forth between scientific institutes, research labs, Internet service providers and registries in Europe and across the U.S., playing a key role as a global connector in the technical community.
|
||||
|
||||
Throughout his career, Jaap has spent a generous amount of time sharing his knowledge with others and playing key roles in organisations such as the European Unix User Group, Advanced Computing Systems Association (USENIX), the Internet Engineering Task Force, the Internet Society, Internet Corporation for Assigned Names and Numbers (ICANN), Réseaux IP Européens (RIPE) and The Council of European National Top-Level Domain Registries (CENTR). Currently, he is a research engineer in the research and development group at NLnet Labs, focusing on IT development.
|
||||
|
||||
Jaap always had ample interest in astronomy and was asked to help with the outreach project of the Stanford Solar Research Center and ending up maintaining the software of the solar monitors which are scattered around the world. The International Heliophysical Year 2007-2009 Education Center recognized his role in the the Space Weather Monitor Program. In 2014 he and the Society of Amateur Radio Astronomers received an Award of Excellence and the title "Hero in Solar and Space Physics".
|
|
@ -1,26 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Martin Pels - 10 years of NLNOG RING"
|
||||
speakers:
|
||||
- martin-pels
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=bJ_b5kDq_jY
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
The NLNOG RING is a platform for troubleshooting networking problems from different vantage points in the world.
|
||||
|
||||
In this talk, I will give an introduction on what NLNOG RING is, how the project came to be, and how it has evolved over the ten years of its existence. I will also share details about the tools we use for managing the increasingly large constellation of servers and the challenges we've encountered with this along the way.
|
||||
|
||||
## Biography
|
||||
|
||||
Infrastructure Engineer at RIPE NCC and co-founder of NLNOG RING.
|
|
@ -1,28 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Mischa Peters - The OpenBSD hypervisor in the wild, a short story, but getting longer"
|
||||
speakers:
|
||||
- mischa-peters
|
||||
presentation:
|
||||
filename: 2021-11-11-mischa-peters-the-openbsd-hypervisor-in-the-wild-a-short-story-but-getting-longer.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=OQCIy8INJig
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In the Summer of 2018 —after a poll on Twitter— OpenBSD Amsterdam started testing with vmm(4)/vmd(8). Mostly to see how far we could take it; more importantly to give back to the project. Little did we know where it would take us.
|
||||
|
||||
During this talk, Mischa will outline how it all started, how it’s built, how we operate the platform, what speedbumps we encountered and where we are now.
|
||||
|
||||
We are a big proponent of using as much out of OpenBSD base as possible and it has influenced our design choices a lot. These choices will be highlighted when discussing how the platform is built and how it’s operated.
|
||||
|
||||
## Biography
|
||||
|
||||
Mischa Peters is a long term BSD user, starting with FreeBSD 2.x and later OpenBSD as well. He is operating a hosting and co-location company out of Amsterdam The Netherlands, currently focused on providing services on top of OpenBSD. The OpenBSD Amsterdam project is a good example of it. For his $dayjob he is leading a team of System/Solutions Engineers for a security startup.
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Pieter Lexis - YANG and NETCONF for Systems Administration?"
|
||||
speakers:
|
||||
- pieter-lexis
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=Ns8-Hf_8TzQ
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In the operations world, there's a disconnect between the system administrators and the network administrators. The sys-admins have automation tools that don't integrate with the NFV/SDN standards used by "pure" network operations.
|
||||
|
||||
In RFC 3535, the Internet Architecture Board stated that network equipment should provide defined models and a unified configuration API. This resulted in the standardization of YANG (a data modeling language) and NETCONF (an RPC protocol for configuration that carries instantiated YANG data).
|
||||
|
||||
In this talk, I'll be discussing the configuration management landscape (from a system administrator perspective), explain a bit about YANG and NETCONF and how these two technologies can be used to automate network functions that are running on Linux instead of dedicated network equipment.
|
||||
|
||||
## Biography
|
||||
|
||||
Educated as a Systems and Network Engineer and having dabbled with DevOps-y things for years, Pieter's official title now is "Senior PowerDNS Engineer". As such, he works on the PowerDNS source code, the build/CI/packaging pipeline and running the infrastructure around the PowerDNS open source project.
|
||||
|
||||
Pieter is also involved in the broader DNS operations and standards communities to make the Internet a better place.
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Rudi van Drunen - What are FPGAs anyway and why is it fun to play with them?"
|
||||
speakers:
|
||||
- rudi-van-drunen
|
||||
presentation:
|
||||
filename: 2021-11-11-rudi-van-drunen-what-are-fpgas-anyway-and-why-is-it-fun-to-play-with-them.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=LOAn0jR-Udc
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Programmable logic devices —a.o. FPGAs (Field Programmable Gate Arrays)— are a cheap way of building your own logic (hardware) that can be used as (very) fast processing devices, or just logic devices in your hardware design.
|
||||
|
||||
In this talk I will explain what FPGAs are and what you can do with them and how to develop hardware systems with them using Open source tooling. We will be using different tools, both graphical and a hardware description language to generate configuration for an FPGA. A short (live) demo will be provided.
|
||||
|
||||
## Biography
|
||||
|
||||
Next to being dad and geek, Rudi tries to mold the technical part of the product creation process at SpronQ.
|
||||
|
||||
Rudi has more than 20 years of experience in the UNIX and open standards world, in large (data-centers) and small (embedded) environments.
|
||||
|
||||
He is an active member of USENIX and likes to visit conferences. In his spare time, he's into photography, sailing and travelling, and tries to combine this.
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Sake Blok - TLS decryption in times of Perfect Forward Secrecy"
|
||||
speakers:
|
||||
- sake-blok
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=0renIBt6To
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
As more and more traffic is encrypted with TLS, there is a stronger need for decrypting TLS traffic inside captured packet data (pcap files). But getting everything aligned to be able to decrypt the TLS traffic is not that trivial. Access to the servers private key is often not possible and even if you have access to the private key, most TLS sessions use Perfect Forward Secrecy which makes decryption based on the private key impossible.
|
||||
|
||||
Using session keys (instead of the private key of the server) to do the decryption is much more feasible. However, you need a way to get these session keys. There are several ways to get the session keys from one of the TLS endpoints. And sometimes you can use man-in-the-middle proxying to get them. Which method of retrieving the session keys could be used depends on the level of control you have over the used components in the TLS traffic flow.
|
||||
|
||||
In this presentation the different TLS handshakes will be discussed and several ways to get the session keys will be shown to enable TLS decryption with Wireshark and Tshark.
|
||||
|
||||
## Biography
|
||||
|
||||
Sake has been using Wireshark/Ethereal for almost 20 years. In 2009, Sake started the company SYN-bit to provide network analysis and training services to enterprises across Europe. During his work, he started developing functionality for Wireshark that he missed while working with the analyser in his day-to-day job. He also enhanced multiple protocol dissectors to suit his analysis needs. In 2007, Sake joined the Wireshark Core Development team.
|
||||
|
||||
Sake Blok calls himself "Relational Therapist for Computer Systems", as he solves problems by looking closely at the communication between computer systems.
|
|
@ -1,26 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Sjoera Nas - It's the metadata, stupid! Privacy versus de grote cloudproviders"
|
||||
speakers:
|
||||
- sjoera-nas
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=-qglWvaxW2A
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Sjoera Nas will speak about her experiences negotiating with big cloud providers about their compliance with EU privacy rules (General Data Protection Regulation and the ePrivacy Directive). She will summarise the key problems and outcomes, and discuss future EU legislative developments and alternatives such as Gaia X and national clouds.
|
||||
|
||||
## Biography
|
||||
|
||||
Drs. Sjoera Nas worked for the Dutch Data Protection Authority (Autoriteit Persoonsgegevens) between 2006 and 2018, as head of the internet inspection team. She also worked for XS4ALL and Bits of Freedom.
|
||||
|
||||
Since her move to Privacy Company in 2018 she has written many DPIAs ("Data Protection Impact Assessment") on Microsoft, Google, Zoom, Oracle, SAP, and AWS cloud services for the Dutch central government, and for the Dutch universities (represented by SURF). Read the [DPIAs for government](https://slmmicrosoftrijk.nl/) and [on Google for SURF](https://www.surf.nl/en/news/all-about-dpia-google-workspace).
|
|
@ -1,24 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Vesna Manojlovic - Technical Communities Resilience During COVID-19 Pandemic"
|
||||
speakers:
|
||||
- vesna-manojlovic
|
||||
presentation:
|
||||
filename: 2021-11-11-vesna-manojlovic-technical-communities-resilience-during-covid-19-pandemic.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=2HstoqAFn9g
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
As a Community Builder in the RIPE Community, since March 2020 I've been working on organising the support for community that is struggling with isolation, grief, anxiety etc due to the pandemic. In 2021, together with a small "task force" we have organised a survey, had several online meetings, published articles on RIPE Labs and gave several talks.
|
||||
|
||||
## Biography
|
||||
|
||||
Vesna is a Community Builder at RIPE NCC, hacker, mother, engineer, feminist, artist, Trusted Contact at RIPE Community, J.E.D.I. advocate, neurodivergent, trauma survivor, NVC practitioner, psychiatric meds guinea pig. Living in The Netherlands since 1999, born in Yugoslavia.
|
|
@ -1,39 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Walter Lioen - Snellius: the latest Dutch national supercomputer"
|
||||
speakers:
|
||||
- walter-lioen
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=7zNKNZHNUQY
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In September this year, the seventh-generation Dutch national supercomputer called Snellius was inaugurated by Her Majesty the Queen Máxima.
|
||||
|
||||
This immediately raises a number of questions:
|
||||
|
||||
* What exactly is a supercomputer?
|
||||
* What are supercomputers used for?
|
||||
* What do supercomputers look like?
|
||||
* Where does the Netherlands stand in relation to Europe and the rest of the world?
|
||||
|
||||
Since 1984, SURF has housed and managed the Dutch national supercomputer and has supported scientific researchers in making optimal use of it. We look back on more than 35 years of supercomputing in the Netherlands, but also take a brief look at the future.
|
||||
|
||||
We also take a closer look at a number of aspects of Snellius: the tender; the (hardware) architecture; and the software environment, from both the administrator's and the user's perspective.
|
||||
|
||||
## Biography
|
||||
|
||||
Walter studied mathematics at the University of Amsterdam (UvA) and worked from the mid-eighties as a scientific programmer at the Center for Mathematics and Computer Science (CWI) in Amsterdam. In that capacity he used virtually all supercomputers in the Netherlands working on highly efficient implementations of algorithms in numerical mathematics and computational number theory.
|
||||
|
||||
From 2001 he worked as a software engineer on predictive analytics software at Data Distilleries/SPSS.
|
||||
|
||||
In 2007 he joined SURF as an HPC consultant, where he quickly became manager of the supercomputing team. He is currently responsible for the Research Services department, including the supercomputing team.
|
|
@ -1,26 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2021-11-11T13:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Wouter de Vries - Anycast: What is it and How to measure it"
|
||||
speakers:
|
||||
- wouter-de-vries
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=osiiLsk7C3Y
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In this talk we will take a look at Anycast, a network "technology" that —to put it bluntly— allows network operators to use the Internet as a giant load balancer. You will learn what Anycast is, how Internet users are affected by it, what problems it solves and what problems it causes.
|
||||
|
||||
We will start by first looking at some real-world Anycast deployments, such as the one that is deployed by Google for its public DNS resolver, and learn that Internet routing is strange. Then, we will discuss Verfploeter, a methodology to comprehensively measure the performance of an anycast network that has been applied at one of the largest anycast deployments in the world.
|
||||
|
||||
## Biography
|
||||
|
||||
Wouter obtained his PhD with his thesis titled 'Improving Anycast with Measurements' in December 2019. Currently, he is a Systems Engineer at Cloudflare, still focusing on networks, but now from a security perspective. He has spent the past four years looking at (and researching) anycast from various angles.
|
|
@ -1,244 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- conferenties
|
||||
- evenementen
|
||||
date: 2022-11-29T17:58:58+02:00
|
||||
description: "De NLUUG najaarsconferentie werd gehouden op dinsdag 29 november 2022 in het Van der Valk Hotel Utrecht."
|
||||
is_event: true
|
||||
tags:
|
||||
- conferenties
|
||||
slug:
|
||||
title: "NLUUG najaarsconferentie 2022"
|
||||
layout: schedule-event
|
||||
event_title: "NLUUG najaarsconferentie 2022"
|
||||
event_start: 2022-11-29T08:30:00+02:00
|
||||
event_end: 2022-11-29T18:00:00+02:00
|
||||
event_timezone: Europe/Amsterdam
|
||||
event_location: Van der Valk Hotel Utrecht
|
||||
event_organizers:
|
||||
- organizer:
|
||||
id: nluug
|
||||
name: NLUUG
|
||||
event_attendance_mode: "offline"
|
||||
event_images:
|
||||
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
|
||||
event_description: "Najaarsconferentie 2022 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
|
||||
event_address:
|
||||
street_address: "Winthontlaan 4-6"
|
||||
postal_code: "3526 KV"
|
||||
city: "Utrecht"
|
||||
country_name: "The Netherlands"
|
||||
event_members_only: true
|
||||
event_status: "scheduled"
|
||||
event_schedule:
|
||||
title: Programma
|
||||
description:
|
||||
columns: 4
|
||||
headers:
|
||||
- header:
|
||||
width: 10
|
||||
- header:
|
||||
text: Zaal 1
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 2
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 3
|
||||
center: true
|
||||
width: 30
|
||||
rows:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 08:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Inschrijving, ontvangst, koffie
|
||||
size: 3
|
||||
center: true
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:15
|
||||
- column:
|
||||
textfield:
|
||||
text: Openingswoord
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:30
|
||||
- column:
|
||||
talk:
|
||||
speaker: Lucinda Sterk
|
||||
title: Talk nerdy to me
|
||||
keynote: true
|
||||
link: talks/lucinda-sterk-talk-nerdy-to-me/
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 10:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Riccardo ten Cate en Glenn ten Cate
|
||||
title: Exploitation, automation, mitigation
|
||||
link: talks/riccardo-ten-cate-en-glenn-ten-cate-explotation-automation-mitigation/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Mike Ciavarella
|
||||
title: This is just temporary
|
||||
- column:
|
||||
talk:
|
||||
speaker: Melchior Aelmans
|
||||
title: Exploring quantum Technology for Networking
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:50
|
||||
- column:
|
||||
talk:
|
||||
speaker: Rob Hulsebos
|
||||
title: OT Cybersecurity Challenges
|
||||
link: talks/rob-hulsebos-ot-cybersecurity-challenges/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Michiel Leenaars
|
||||
title: "NLnet and NGI Zero: working for the internet"
|
||||
link: talks/michiel-leenaars-nlnet-and-ngi-zero-working-for-the-internet/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Sake Blok
|
||||
title: "LOG4SHELL: Getting to know your adversary"
|
||||
link: talks/sake-blok-log4shell-getting-to-know-your-adversary/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 12:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Lunch
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Francisco Dominguez and Zawadi Done
|
||||
title: Automating incindent response should be the default
|
||||
link: talks/francisco-dominguez-en-zawadi-done-automating-incident-response-should-be-the-default/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Andreas Hülsing
|
||||
title: "An update on NIST's PQC standardization process"
|
||||
link: talks/andreas-hulsing-an-update-on-nists-pqc-standardization-process/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Kris Buytaert
|
||||
title: Help My Datacenter is On Fire
|
||||
link: talks/kris-buytaert-help-my-datacenter-is-on-fire/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:50
|
||||
- column:
|
||||
talk:
|
||||
speaker: Jean-Paul Sablerolle
|
||||
title: Power to the Open Source
|
||||
- column:
|
||||
talk:
|
||||
speaker: Filip Chyla
|
||||
title: Cloud-Native Security with the OWASP Cloud-Native Application Security Top 10
|
||||
- column:
|
||||
talk:
|
||||
speaker: Toshaan Bharvani
|
||||
title: Why Open Technologies need to use Open Technologies
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 15:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Marcel van der Velde
|
||||
title: Heuristic Park (why we can fake it until we make it)
|
||||
- column:
|
||||
talk:
|
||||
speaker: Ondřej Caletka
|
||||
title: Run your own networking lab with Vagrant and Ansible
|
||||
link: talks/ondrej-caletka-run-my-own-networking-lab-with-vagrant-and-ansible/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Joost van Dijk
|
||||
title: "From passwords to passkeys: What's new with FIDO"
|
||||
link: talks/joost-van-dijk-from-passwords-to-passkeys-whats-new-with-fido/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:50
|
||||
- column:
|
||||
talk:
|
||||
speaker: "-"
|
||||
title: "-"
|
||||
- column:
|
||||
talk:
|
||||
speaker: Marcel Kornegoor
|
||||
title: "Course as Code: the future of AT Computing's training courses"
|
||||
link: talks/marcel-kornegoor-course-as-code-the-future-of-at-computings-training-courses/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Joyce Mellens
|
||||
title: "Caer: An IoT Firewall for consumers"
|
||||
link: talks/joyce-mellens-caer-an-iot-firewall-for-consumers/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 17:55
|
||||
- column:
|
||||
textfield:
|
||||
text: Borrel, gesponsord door AT-Computing, en keysigning party (download manual)
|
||||
center: true
|
||||
size: 3
|
||||
---
|
|
@ -1,25 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description: "Andreas Hülsing gaf een presentatie over de selectie en standaardisatie van post-quantum cryptography. Leer meer over het onderwerp en deze spreker."
|
||||
layout: event-talk
|
||||
tags:
|
||||
- cryptography
|
||||
title: "Andreas Hülsing - An update on NIST's PQC standardization process"
|
||||
speakers:
|
||||
- andreas-hulsing
|
||||
presentation:
|
||||
filename: 2022-11-29-andreas-hulsing-an-update-on-nists-pqc-standardization-process.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=0HjsoMrqlF4
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In this talk I will give an overview of the current situation regarding the selection and standardization of post-quantum cryptography. I will discuss the schemes selected by NIST, the schemes that moved to round 4, as well as recent and upcoming events on the topic. Finally, I will discuss which topics I think are next in the area of post-quantum cryptography.
|
||||
|
||||
## Biography
|
||||
|
||||
I am assistant professor for provable security in the Coding Theory and Cryptology group at Eindhoven University of Technology (TU/e). Me and my research group are currently supported by NWO under the Vidi grant “A solid theory for post-quantum cryptography”. Besides, I am collaborating in the Formosa project to produce machine-checked proofs for high-assurance cryptographic software. My research focuses on post-quantum cryptography – cryptography that resists quantum computer-aided attacks. My works range from theoretical works, like how to model quantum attacks or formal security arguments in post-quantum security models, to applied works, like the analysis of side-channel attacks or the development of efficient hash-based signature schemes. In many of my works I try to combine the theoretical and the applied perspective. This is especially reflected in my work on standardizing post-quantum cryptography. To learn more about my research, have a look at [my homepage](https://huelsing.net/wordpress/).
|
|
@ -1,34 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description: "Francisco Dominguez en Zawadi Done gaven een presentaties over het automatiseren van het proces om beveiligingsincidenten af te handelen."
|
||||
layout: event-talk
|
||||
tags:
|
||||
- analysis
|
||||
- devops
|
||||
- incident-response
|
||||
title: "Francisco Dominguez & Zawadi Done - Automating incident response should be the default"
|
||||
speakers:
|
||||
- francisco-dominguez
|
||||
- zawadi-done
|
||||
presentation:
|
||||
filename: 2022-11-29-francisco-dominguez-en-zawadi-done-automating-incident-response-should-be-the-default.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=CH2ntnZxZks
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
We are going to present the role of open source software during a typical incident response process, whereby we will focus on the main phases that are usually applicable: Acquiring data, Processing data & Analyzing information. Most of these phases lean heavily on open source tools that are widely used by analysts in their daily operation. This talk will guide you from using these tools manually to using these tools automatically and magically. Well not really magically, but we will emphasize the application of a DevOps mindset to the process that most incident response analysts execute on daily basis, including ourselves.
|
||||
|
||||
## Biography Francisco
|
||||
|
||||
Bouncing between technical deep dives and board room chatter Francisco Dominguez has been involved with security (nowadays Cybersecurity) for the last 20 years and has kept track of some of it on his personal blog. Hacking and breaking different environments by combining technical knowledge and understanding of the surrounding process has always been his main passion. For example, he was involved in the investigation of the software and processes used to support the Dutch national elections. Unfortunately, those pesky commercial NDAs don’t allow the naming of other fun jobs that involved social engineering people, jumping airgaps, fences or listening to hard disks to know if they are encrypted. Most of his offensive career he worked at Fox-IT and Securify, nowadays he is viewing security from the defense side while working at Hunt & Hackett.
|
||||
|
||||
## Biography Zawadi
|
||||
|
||||
Zawadi Done is 22 years old and works as an Incident Responder at Hunt and Hackett and is also pursuing a bachelor's degree in Cyber Security and Cloud.
|
||||
|
||||
The profile picture by Dennis van Zuijlekom is licensed under [CC BY SA 2.0](https://creativecommons.org/licenses/by-sa/2.0/).
|
|
@ -1,31 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Joost van Dijk - From passwords to passkeys: what's new with FIDO?"
|
||||
speakers:
|
||||
- joost-van-dijk
|
||||
presentation:
|
||||
filename: 2022-11-29-joost-van-dijk-from-passwords-to-passkeys-whats-new-with-fido.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=z4T5P_LpN3E
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Recent additions to FIDO and W3C standards enable mass adoption of passwordless authentication. Browser and platform vendors like Apple, Google, and Microsoft have started to implement support for these additions, enabling websites and other relying parties to further transition away from passwords to cryptographically secure passkeys.
|
||||
|
||||
In this talk, we will discuss what these new additions are, and how they can help with replacing passwords. Along the way, we will answer questions like the following:
|
||||
|
||||
* What are passkeys or discoverable credentials? What are multi-device credentials, how are they different from single-device credentials, and what problem are they solving?
|
||||
* Should I allow multi-device credentials on my website? How can I tell if a user logs in using a multi-device credential? How can device attestation and the FIDO metadata service help me distinguish different levels of authentication strength?
|
||||
* How do I migrate from passwords to passkeys? What is WebAuthn Conditional Mediation and why would I need it?
|
||||
* What is Hybrid transport and how does it allow me to use my phone as an authenticator?
|
||||
|
||||
## Biography
|
||||
|
||||
Joost van Dijk is a developer advocate at Yubico. He focuses on securing digital identities and accelerating the adoption of open source authentication standards as part of Yubico's developer program.
|
|
@ -1,24 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Joyce Mellens - Caer: An IoT Firewall for consumers"
|
||||
speakers:
|
||||
- joyce-mellens
|
||||
presentation:
|
||||
filename: 2022-11-29-joyce-mellens-caer-an-iot-firewall-for-consumers.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=HHBzhHA1YCM
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In this presentation, we will describe the technical design, practical UX considerations, and the limitations imposed by designing an open-source IoT Firewall for non-technical consumers. In short, this firewall begins as an out-of-band device that replaces the home router as DHCP server. It uses this position to restructures the network, containing IoT devices in isolated subnets and setting itself as the network gateway for all IoT devices in the home. From this position, besides applying some basic firewalling, it also employs an automated form of secondary authentication via whitelisting through a companion application to effectively enforce MFA.
|
||||
|
||||
## Biography
|
||||
|
||||
Joyce Mellens is young lecturer and researcher at the Hanze University of Applied Sciences, where she teaches students the foundations of computing architecture and cybersecurity. As a researcher she specializes in the Internet of Things, preferring to focus on the challenges of marrying cybersecurity with useability for consumers who don’t know what that word means.
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Kris Buytaert - Help My Datacenter is On Fire"
|
||||
speakers:
|
||||
- kris-buytaert
|
||||
presentation:
|
||||
filename: 2022-11-29-kris-buytaert-help-my-datacenter-is-on-fire.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=ik7FX_WwCns
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Most people will claim that this never happens, others hope it never happens, but it happened, and it was not just the 1 datacenter that got impacted, but the whole campus of the provider that got powered down. This talk will explain how our customers survived this outage, how our culture, opensource tooling and automation saved the da(y,ta). A talk about disaster recovery, business continuity plans and building cloud agnostic stacks that survive disasters.
|
||||
|
||||
## Biography
|
||||
|
||||
Kris Buytaert is a long time Linux and Open Source Consultant. He's one of instigators of the devops movement, currently working for Inuits
|
||||
|
||||
He is frequently speaking at, or organizing different international conferences and has written about the same subjects in different Books, Papers and Articles
|
||||
|
||||
He spends most of his time working on bridging the gap between developers and operations with a strong focus on High Availability, Scalability , Virtualisation and Large Infrastructure Management projects hence trying to build infrastructures that can survive the 10th floor test, better known today as the cloud while actively promoting the devops idea !
|
||||
|
||||
His blog can be found at ["Everything is a Freaking DNS Problem"](http://www.krisbuytaert.be/blog/)
|
|
@ -1,26 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
tags:
|
||||
- communicatie
|
||||
- keynote
|
||||
title: "Lucinda Sterk - Talk nerdy to me"
|
||||
speakers:
|
||||
- lucinda-sterk
|
||||
presentation:
|
||||
filename: 2022-11-29-lucinda-sterk-talk-nerdy-to-me.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=DILgkfR79kY
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Ik sta als communicatieadviseur en contentmaker nooit op gelijke hoogte als de technisch experts qua kennis. Hoe komen we dan toch tot een mooi product? Een blogpost of een whitepaper. "Talk nerdy to me", roep ik altijd tegen mijn nerds, en dan begint het proces waarbij zij en ik vooral veel geduld met elkaar moeten opbrengen. In deze talk vertel ik met een beetje humor en een vleugje vooroordeel hoe dat proces in zijn werk gaat.
|
||||
|
||||
## Biografie
|
||||
|
||||
Lucinda heeft na haar studie journalistiek bij diverse landelijke dagbladen gewerkt. In 2008 maakte zij de overstap naar communicatie en begon ze als crisiscommunicatiespecialist bij de Nationaal Coordinator Terrorismebestrijding en Veiligheid. In 2015 ging zij zich steeds meer richten op communicatie over cybersecurity. Na enkele jaren bij het NCSC, begon ze bij Fox-IT. In 2020 heeft ze de communicatie bij Z-CERT opgezet en sinds 2022 werkt ze voor DIVD en KPN Security
|
|
@ -1,26 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Marcel Kornegoor - Course as Code: the future of AT Computing's training courses"
|
||||
speakers:
|
||||
- marcel-kornegoor
|
||||
presentation:
|
||||
filename: 2022-11-29-marcel-kornegoor-course-as-code-the-future-of-at-computings-training-courses.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=xaEP29OZR3U
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In 1985 Ger Austen (A) and Hendrik-Jan Thomassen (T) started AT Computing to share their knowledge of the UNIX operating system with the world through training. For nearly 35 years, the training formula has remained untouched: a classroom, a teacher, and an on-premises lab environment. However, the technology has evolved considerably since 1985 and the success formula of yesteryear began to show more and more cracks. A real breaking point came with the rise of Kubernetes. It turned out to be impossible to build a lab environment for a full class of students on the on-premises environment. Not much later, the COVID pandemic ensured that virtual and hybrid training became a necessity for survival and that the way people in general (and IT people in particular) learn was permanently changed. The big question is therefore how AT Computing will remain a relevant player in the market for open source training in the future?
|
||||
|
||||
During this presentation we show how AT Computing looks at this and how we approach both our lab environment and our course materials as code and git first in order to (hopefully) find a future-proof new formula. Through a demo with a plethora of open source tools (Terraform, Packer, Ansible, Docker, GitLab, reStructuredText, LibreOffice, Python, CI/CD pipeline and Google Cloud Platform) and a storyline showing the ups and downs , the attendees are taken on the journey of discovery that we have embarked on with Course as Code. We are far from our final destination, but we are convinced that there is hope.
|
||||
|
||||
## Biography
|
||||
|
||||
Marcel earned a master's degree from Utrecht School of the Arts and after spending a couple of years as lead editor of a technical magazine, he started his IT career back in 2011. In 2018 he joined AT Computing and was promoted to CTO in early 2019. From that moment on he started to adapt the course of AT Computing towards containers, config management and cloud, with Linux at the core (of course) and a way of working that is heavily influenced by DevOps, LEAN and Continuous Delivery principles. Being brainwashed by the AT Computing gurus for over 4 years, he has become a huge fan of open source software. In his spare time he likes to spend time with his family or on his road bike or mountainbike.
|
|
@ -1,24 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Michiel Leenaars - NLnet and NGI Zero: Working for the internet"
|
||||
speakers:
|
||||
- michiel-leenaars
|
||||
presentation:
|
||||
link: "https://nlnet.nl/NGI0/2022-NLUUG/"
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=xaEP29OZR3U
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
April 1st 1982, Teus Hagen launched the EUnet at the European Unix User Group (EUUG) spring conference, creating the first public wide area network in Europe. NLnet was born as part of a litter of 'national' networks. Fifteen years later this community effort had grown into a foundation which had a company underneath that ran a flourishing business - which was sold to its American sister UUnet (named after the Unix-to-Unix Copy Protocol). Stichting NLnet used to proceeds to morph into a recognised public benefit organisation focused on achieving 'an open information society', and for the last 25 years has been funding the development of free, libre and open source technologies across the globe. Everything it funds is free and open source software and hardware, open standards and open content. This ranges from libre silicon chips, to open hardware GSM networks, projects like Wireguard and Jitsi - and much more. Meanwhile NLnet plays a strong role in the Next Generation Internet initiative set up by the European Commission. In this talk, Michiel Leenaars will dive into the current portfolio of projects, and talk about funding opportunities through the open calls of NLnet and NGI - in other words: how to get your project funded.
|
||||
|
||||
## Biography
|
||||
|
||||
Michiel Leenaars (1972, Netherlands) is the chairperson of The Commons Conservancy. In daily life he is Director of Strategy at NLnet Foundation. and director of Internet Society Netherlands, one of the more sizable Internet Society chapters in the world. He is also a W3C liason officer for the Benelux Office of the World Wide Web Consortium. He currently leads two of the four Research & Innovation Actions of the Next Generation Internet initiative, NGI Zero Discovery and NGI Zero PET. He is active in a number of national and international organisations, such as OpenDoc Society (vice-chair), SIDN Fund (Board of Advisors), Digitale Infrastructuur Nederland, and Petities.nl foundation (treasurer). He is a member of the Netherlands committee for the UNESCO Information for All Programme.
|
|
@ -1,26 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Ondřej Caletka - Run your own networking lab with Vagrant and Ansible"
|
||||
speakers:
|
||||
- ondrej-caletka
|
||||
presentation:
|
||||
filename: 2022-11-29-ondrej-caletka-run-your-own-networking-lab-with-vagrant-and-ansible.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=xaEP29OZR3U
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Today's computers are pretty powerful and capable of running a few virtual machines. In the RIPE NCC we use this potential for our e-learning courses to provide the participants a portable lab environment that is based on open source software and can run on most computers. In this talk I will demonstrate how we use tools like Vagrant, VirtualBox or Ansible to automate creation and distribution of such environments as well as some pitfalls discovered along the way.
|
||||
|
||||
## Biography
|
||||
|
||||
Ondřej works as a technical expert in the Learning and Development team of the RIPE NCC. His main responsibility includes developing and operating the lab environment for training courses and online learning.
|
||||
|
||||
Ondřej graduated from Czech Technical University in Prague and worked as network services administrator and developer for the Czech national research and education network CESNET before joining the RIPE NCC. He is also active in local IT communities around open source/free software, and acts as an IPv6 and DNSSEC ambassador, delivering talks and trainings at various events.
|
|
@ -1,51 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Riccardo ten Cate & Glenn ten Cate - Exploitation, automation, mitigation"
|
||||
speakers:
|
||||
- riccardo-ten-cate
|
||||
- glenn-ten-cate
|
||||
presentation:
|
||||
filename: 2022-11-29-riccardo-en-glenn-ten-cate-exploitation-automation-mitigation.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=CH2ntnZxZks
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
We can see the trends in integrating security tooling into CI/CD pipelines. However, security tooling alone will not cover your entire attack surface. This is because the tooling can never understand the full context of the applications functions and logic. On the other hand, resources in the form of manual verification can often be scarce and expensive.
|
||||
|
||||
Where do we find the right balance between security test automation and manual verification?
|
||||
|
||||
Even more importantly, how do we train the developers to understand the metrics and make security part of their process and culture?
|
||||
|
||||
OWASP security knowledge framework introduced a new interactive learning platform to teach you everything you need to know about secure software development! SKF helps you deploy sandboxed learning environments on the fly where you find all the tools you need to get yourself going.
|
||||
|
||||
Use the OWASP SKF to train yourself or your entire team to exploit and mitigate web application vulnerabilities.
|
||||
|
||||
In our session:
|
||||
|
||||
* We will show you how the SKF is set-up, so you can get started.
|
||||
* We will show the labs and demo live exploitation of the labs.
|
||||
* How do we fix the vulnerabilities? We will use SKF to generate security requirement that guide how to mitigate the vulnerabilities demonstrated in the labs
|
||||
* We will implement mitigations (requirements) and use the Owasp ZAP (Automation framework) and ZEST to validate the mitigations.
|
||||
|
||||
|
||||
## Biography Riccardo
|
||||
|
||||
As a penetration tester from the Netherlands Riccardo ten Cate specialises in application security and has extensive knowledge in securing applications in multiple coding languages. Riccardo has many years of experience in training and guiding development teams becoming more mature and making their applications secure by design.
|
||||
|
||||
|
||||
## Biography Glenn
|
||||
|
||||
As a coder, hacker, speaker, trainer and security chapter leader employed at ING Belgium Glenn has over 15 years experience in the field of security. One of the founders of defensive development security trainings dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world.
|
||||
|
||||
Not only does Glenn train developers, he and his brother Riccardo also donated an entire knowledge framework solely dedicated to help developers make their code secure by design.
|
||||
|
||||
See: SKF (Security knowledge framework) https://www.securityknowledgeframework.org
|
||||
|
|
@ -1,26 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Rob Hulsebos - OT Cybersecurity Challenges"
|
||||
speakers:
|
||||
- rob-hulsebos
|
||||
presentation:
|
||||
filename: 2022-11-29-rob-hulsebos-ot-cybersecurity-challenges.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=CH2ntnZxZks
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
“OT” (Operations Technology) systems are all around us, but hardly ever noticed, while a failure in their operation could impact society or cripple companies. However, their cybersecurity lags behind, for various reasons and this has resulted in numerous hacks with major consequences far beyond the effort needed.
|
||||
|
||||
In this talk, we will discuss what “OT” is, the special challenges for this (often legacy) equipment, the lack of interest in cybersecurity both from vendors and users, the usage of network protocols and stacks from the previous century, the difficulty of patching equipment and what PLC programmers themselves can do. We will also highlight the “IEC-62443” standard, specially dedicated to industrial cybersecurity.
|
||||
|
||||
## Biography
|
||||
|
||||
Graduated 1986, computer science, Eindhoven. Always been working in industrial machinery, PLC's, etc. Specialised in the implementation of many industrial network protocols, Since 1993 active as freelance journalist for the Dutch trade press about current developments in networking and cybersecurity, wrote several books about it. Since 1998 active as teacher on these subjects. In 2010, assisted Symantec in decoding Stuxnet. As of 2018, am now working for Forescout (Eindhoven) OT Competence Center, developing detection of malwares and other unwanted operations in OT environments.
|
|
@ -1,28 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
date: 2022-11-29T20:31:43+02:00
|
||||
description:
|
||||
layout: event-talk
|
||||
slug:
|
||||
tags:
|
||||
title: "Sake Blok - LOG4SHELL: Getting to know your adversary"
|
||||
speakers:
|
||||
- sake-blok
|
||||
presentation:
|
||||
filename: 2022-11-29-sake-blok-log4shell-getting-to-know-your-adversary.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=4X0ITI_YOiw
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
What does a LOG4SHELL attack look like on the network and how to analyze the LOG4SHELL attack (including some of its deployed exploits) with Wireshark.
|
||||
|
||||
In December 2021, the IT world was shaken up by a CVE with score 10. A vulnerability in the widely used log4j logging library allowed an attacker to run arbitrary code on the system by making it log a specific string. As a lot of elements in the logging comes from user controlled data, the exploit was very easy use.
|
||||
|
||||
In order to understand the attack and it's impact, I reproduced an attack in my LAB. And after that, I set up a honeypot to collect attack samples. I went one step further and set up an isolated system and deliberately infected it with some of the exploits to see what it would do. In this talk I will walk through the process of (safely) setting up the LAB systems, the honeypot and the infected victim. The captured traffic will be analyzed with Wireshark and some hints and tips on how to use Wireshark in a security context will be given.
|
||||
|
||||
## Biography
|
||||
|
||||
Sake Blok calls himself "Relational Therapist for Computer Systems", as he solves problems by looking closely at the communication between computer systems. He has been using Wireshark/Ethereal for almost 20 years. In 2009, Sake started the company SYN-bit to provide network analysis and training services to enterprises across Europe. During his work, Sake started developing functionality for Wireshark that he missed while working with the analyser in his day-to-day job. He also enhanced multiple protocol dissectors to suit his analysis needs. In 2007, Sake joined the Wireshark Core Development team.
|
|
@ -1,261 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- conferenties
|
||||
- evenementen
|
||||
date: 2018-05-15T20:17:47+02:00
|
||||
description: "De NLUUG voorjaarsconferentie heeft plaatsgevonden op dinsdag 15 mei 2018. Bekijk hier het programma, de presentaties, opnames en foto's."
|
||||
is_event: true
|
||||
tags:
|
||||
- conferenties
|
||||
slug:
|
||||
title: "NLUUG voorjaarsconferentie 2018"
|
||||
layout: schedule-event
|
||||
event_title: "NLUUG voorjaarsconferentie 2018"
|
||||
event_start: 2018-05-15T08:30:00+02:00
|
||||
event_end: 2018-05-15T18:00:00+02:00
|
||||
event_timezone: Europe/Amsterdam
|
||||
event_location: Van der Valk Hotel Utrecht
|
||||
event_address:
|
||||
street_address: "Winthontlaan 4-6"
|
||||
postal_code: "3526 KV"
|
||||
city: "Utrecht"
|
||||
country_name: "The Netherlands"
|
||||
event_organizers:
|
||||
- organizer:
|
||||
id: nluug
|
||||
name: NLUUG
|
||||
event_attendance_mode: "offline"
|
||||
event_images:
|
||||
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
|
||||
event_description: "Voorjaarsconferentie 2018 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
|
||||
event_members_only: true
|
||||
event_register_link: "https://nluug.nl/aanmelden/index.cgi?action=event"
|
||||
event_status: "scheduled"
|
||||
event_schedule:
|
||||
title: Programma
|
||||
description:
|
||||
columns: 4
|
||||
headers:
|
||||
- header:
|
||||
width: 10
|
||||
- header:
|
||||
text: Zaal 1
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 2
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 3
|
||||
center: true
|
||||
width: 30
|
||||
rows:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 08:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Inschrijving, ontvangst, koffie
|
||||
size: 3
|
||||
center: true
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:15
|
||||
- column:
|
||||
textfield:
|
||||
text: Openingswoord
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:30
|
||||
- column:
|
||||
talk:
|
||||
speaker: Bill Cheswick
|
||||
title: "Some Thoughts on Current Security Topics, and Their Eventual Mitigation"
|
||||
keynote: true
|
||||
link:
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 10:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Jeroen Janssens
|
||||
title: Workshop Data Science with UNIX Power Tools
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Klaas van Gend
|
||||
title: The backgrounds of Meltdown and Spectre
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Alec Muffett
|
||||
title: "Setting-up a .Onion address for your Website"
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:50
|
||||
- column:
|
||||
talk:
|
||||
title: Vervolg workshop Jeroen Janssens
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: David Woodhouse
|
||||
title: Mitigating Spectre and Meltdown vulnerabilities
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Melanie Rieback
|
||||
title: Pentesting Chatops
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 12:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Lunch
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 13:15
|
||||
- column:
|
||||
- column:
|
||||
textfield:
|
||||
text: NLUUG Algemene Ledenvergadering (ALV)
|
||||
center: true
|
||||
- column:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Franklin Hu
|
||||
title: "Kubernetes Cron Jobs: Going from Alpha to Production"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: James Bottomley
|
||||
title: "Enhancing Linux Security with the TPM"
|
||||
link: talks/james-bottomley-enhancing-linux-security-with-tpm/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Walter Belgers
|
||||
title: Gigatron TTL Computer
|
||||
link: talks/walter-belgers-gigatron-ttl-computer/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:50
|
||||
- column:
|
||||
talk:
|
||||
speaker: Oleg Ivanivskyi
|
||||
title: "Zabbix: 4.0 Seasons of monitoring"
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Adrianus Warmenhoven
|
||||
title: Port Knocking
|
||||
link: talks/adrianus-warmenhoven-port-knocking/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Kevin McPeake
|
||||
title: "Rise of the WarriorPI's"
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 15:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Ralph Dolmans en Martin Hoffmann
|
||||
title: "DNSSEC: Rollin', Rollin', Rollin'"
|
||||
link: talks/ralf-dolmans-martin-hoffmann-dnssec-rollin-rollin-rollin/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Rogier Spoor en François Kooman
|
||||
title: "Let's Connect - Open Source VPN Solution"
|
||||
link: talks/rogier-spoor-francois-kooman-lets-connect-open-source-vpn-solution/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Ilja van Sprundel
|
||||
title: Are all BSDs created equally?
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:50
|
||||
- column:
|
||||
talk:
|
||||
speaker: Willem Westerhof
|
||||
title: Beveiliging van PV-installaties
|
||||
link: talks/willem-westerhof-how-an-intern-hacked-the-power-grid/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Howard Chu
|
||||
title: Inside Monero - The worlds first fungible cryptocurrency
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Nanako Momiyama
|
||||
title: IP Forwarding Fastpath on FreeBSD
|
||||
link:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 17:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Borrel, gesponsord door SNOW
|
||||
center: true
|
||||
size: 3
|
||||
---
|
|
@ -1,36 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- hacking
|
||||
- port-knocking
|
||||
- single-packet-authentication
|
||||
title: "Adrianus Warmenhoven - Port Knocking"
|
||||
speakers:
|
||||
- adrianus-warmenhoven
|
||||
presentation:
|
||||
filename: 2018-11-15-adrianus-warmenhoven-port-knocking.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Using SPA for profit and fun, or, a zero-cost solution to getting your fridge out of Shodan.
|
||||
|
||||
Port knocking has been around for quite a while; send a sequence of packets to seemingly closed ports and Sesame opens up. This is, however, not so very secure. Single Packet Authentication port knocking, involving a signed packet with an timestamp, is a lot more secure and works quite well.
|
||||
|
||||
I want to make the case that, just like firewalling (IPTables), SPA port knocking should be a default mechanism in any modern OS, especially the IoT OSes. It is easily implemented (both on server and on client side) and is readily available. It takes the stress out of getting every underpaid worker on the same security page whilst still enabling access when needed.
|
||||
|
||||
|
||||
And finally, it can be used (a hobby of mine) to waste tremendous amounts of time and resources of (wannabe) attackers; your server can be a Decepticon too!
|
||||
|
||||
## Biography
|
||||
|
||||
Adrianus Warmenhoven has been involved in pioneering endeavors in IT since the early 1990’s. Collaborated in setting up firsts in Dutch anti-cybercrime, branch organization for ISP’s as well as being CTO for one of the first free ISP’s in the Netherlands, co-designer of supercomputing hardware and running projects for Dutch governmental organizations.
|
||||
|
||||
For various international companies, he has done security reviews and given advice on how to deal with active threats and extortion. He is now affiliated with RedSocks as security evangelist and develops academic classes in hacking.
|
|
@ -1,35 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- linux
|
||||
- security
|
||||
- tpm
|
||||
title: "James Bottomley - Enhancing Linux Security with TPM"
|
||||
speakers:
|
||||
- james-bottomley
|
||||
presentation:
|
||||
link: "https://www.hansenpartnership.com/Impress-Slides/NLUUG-2018/#/begin"
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Thanks to Microsoft requiring version 2 of a TPM for Windows, the Linux drivers for this technology have been making great strides: We now have an in-kernel resource manager an in-kernel trusted TPM based keys which can give the user the same protection as two factor authentication. This now allows us to build a functional secrets guarding ecosystem around TPM2 with Linux both for personal and Cloud Container use.
|
||||
|
||||
This talk will first of all explain how a TPM2 guards secrets and keys, look at the in-kernel technology and how it works, including a brief digression into the TPM Genie security breach and how we countered it in linux and end with a survey of the current state of Linux ecosystem support for TPM based keys.
|
||||
|
||||
Note this talk is entirely about TPM2 (TPM1 and trousers will not be mentioned, neither will measurement except for key sealing).
|
||||
|
||||
## Biography
|
||||
|
||||
James Bottomley is a Distinguished Engineer at IBM Research where he works on Cloud and Container technology. He is also Linux Kernel maintainer of the SCSI subsystem. He has been a Director on the Board of the Linux Foundation and Chair of its Technical Advisory Board.
|
||||
|
||||
He went to university at Cambridge for both his undergraduate and doctoral degrees after which he joined AT&T Bell labs to work on Distributed Lock Manager technology for clustering.
|
||||
|
||||
In 2000 he helped found SteelEye Technology, a High availability company for Linux and Windows, becoming Vice President and CTO. He joined Novell in 2008 as a Distinguished Engineer at Novell's SUSE Labs, Parallels (later Odin) in 2011 as CTO of Server Virtualization and IBM Research in 2016.
|
|
@ -1,43 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- dnssec
|
||||
- root-key-rollover
|
||||
- rfc5011
|
||||
title: "Ralf Dolmans & Martin Hoffmann - DNSSEC: Rollin', Rollin', Rollin'"
|
||||
speakers:
|
||||
- ralf-dolmans
|
||||
- martin-hoffmann
|
||||
presentation:
|
||||
filename: 2018-11-15-ralf-dolmans-martin-hoffmann-dnssec-rollin-rollin-rollin.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
This is a talk about the status of the planned DNSSEC root key rollover. The first part of the presentation is an introduction to DNSSEC and will cover how DNSSEC works and which keys are involved, why keys are rolled in DNSSEC, and how keys in DNSSEC are updated and retrieved by DNSSEC validators.
|
||||
|
||||
The second part of the presentation will cover the scheduled root key rollover, including the original time-line, the new methods to get an insight in the current status (and its limitations) and the reason why the key roll is postponed.
|
||||
|
||||
The last part will cover a study performed by Open Netlabs on the state of the RFC5011 implementation in various open source DNSSEC validators. RFC5011 describes a method to update DNSSEC keys and a proper implementation is crucial for the root key rollover.
|
||||
|
||||
## Biography Martin Hoffmann
|
||||
|
||||
Martin is a systems architect at NLnet Labs. There, he is involved in various projects aiming to improve the stability, security, and privacy of the Internet.
|
||||
|
||||
While most of his current work revolves around the DNS, he previously lived further up the stack, developing and operating the server side of real-time communication and VoIP services.
|
||||
|
||||
|
||||
## Biography Ralph Dolmans
|
||||
|
||||
Ralph is a software developer at NLnet Labs and one of the core developers of Unbound and the internet.nl Internet standards compliance test website (DNS, DNSSEC, DANE, IPv6, TLS, DMARC/DKIM/SPF).
|
||||
|
||||
Ralph completed his MSc study System and Network Engineering at the University of Amsterdam. After his study, he started as a system and software engineer at NLnet Labs. At NLnet Labs his tasks are various, including writing code (implement RFCs), review Internet Drafts and send feedback to mailing lists.
|
||||
|
||||
Ralph is programme committee member for DNS-OARC and member of expert groups on usage of TLS and secure email (national and international fora).
|
|
@ -1,38 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- wifi
|
||||
- vpn
|
||||
- lets-connect
|
||||
title: "Rogier Spoor & François Kooman - Let's Connect! - Open Source VPN solution"
|
||||
speakers:
|
||||
- rogier-spoor
|
||||
- francois-kooman
|
||||
presentation:
|
||||
filename: 2018-11-15-rogier-spoor-francois-kooman-lets-connect-open-source-vpn-solution.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Public WiFi hotspots in a hotel, restaurant or train are generally unsafe. There is a risk of being eavesdropped or tracked by someone on the same network or by malicious software. A virtual private network (VPN) sends all data over an encrypted connection and offers a safe and secure path to the internet.
|
||||
|
||||
There are hardly any Internet Service Providers (ISP) that provide VPN services to their customers and setting it up yourself is rather cumbersome. The few ones that do offer VPN haven’t been able to offer a modern and user-friendly experience to their users. There are a lot of other VPN solutions around, but most of them do not provide sufficient security en privacy to their users.
|
||||
|
||||
Let’s Connect! provides an open source VPN solution allowing ISPs, hosters and bussinesses to easily setup a secure VPN service. Even security minded people will be able to deploy it in a home environment. After deployment, users have a safe path from all generic devices.
|
||||
|
||||
What is unique about Let's Connect! It is fully open-source (server management, client, gui etc) and integrates nicely via SAML with identity management systems. It allows you to rebrand the apps and run large scale VPN services.
|
||||
|
||||
## Biography
|
||||
|
||||
Rogier Spoor, manager bij SURFnet en innovator pur sang. Tijdens zijn studententijd in 1997 medeoprichter van het reizende DNA-lab dat vervolgens landelijk is geadopteerd. Bij SURFnet heeft Rogier in 2004 SURFids, een gedistribueerd detectiesysteem, ontwikkeld dat een internationaal succes was.
|
||||
|
||||
Daarnaast heeft Rogier aan de wieg gestaan van SURFnet's eigen 'dropbox' dienst, Filesender geïntroduceerd, DNSsec geïnitieerd, IPv6 adoptie en IaaS dienstontwikkeling getrokken. Op dit moment trekt Rogier de internationale ontwikkeling en adoptie van eduVPN, een VPN standaard voor onderwijs en onderzoek.
|
||||
|
||||
Rogier is voorzitter van stichting HoneyNED, waarin security experts van Nederlandse organisaties samenwerken. Bestuurder bij the Commons Conservancy, een software governance orgaan.
|
|
@ -1,38 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- wifi
|
||||
- vpn
|
||||
- lets-connect
|
||||
title: "Rogier Spoor & François Kooman - Let's Connect! - Open Source VPN solution"
|
||||
speakers:
|
||||
- rogier-spoor
|
||||
- francois-kooman
|
||||
presentation:
|
||||
filename: 2018-11-15-rogier-spoor-francois-kooman-lets-connect-open-source-vpn-solution.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Public WiFi hotspots in a hotel, restaurant or train are generally unsafe. There is a risk of being eavesdropped or tracked by someone on the same network or by malicious software. A virtual private network (VPN) sends all data over an encrypted connection and offers a safe and secure path to the internet.
|
||||
|
||||
There are hardly any Internet Service Providers (ISP) that provide VPN services to their customers and setting it up yourself is rather cumbersome. The few ones that do offer VPN haven’t been able to offer a modern and user-friendly experience to their users. There are a lot of other VPN solutions around, but most of them do not provide sufficient security en privacy to their users.
|
||||
|
||||
Let’s Connect! provides an open source VPN solution allowing ISPs, hosters and bussinesses to easily setup a secure VPN service. Even security minded people will be able to deploy it in a home environment. After deployment, users have a safe path from all generic devices.
|
||||
|
||||
What is unique about Let's Connect! It is fully open-source (server management, client, gui etc) and integrates nicely via SAML with identity management systems. It allows you to rebrand the apps and run large scale VPN services.
|
||||
|
||||
## Biography
|
||||
|
||||
Rogier Spoor, manager bij SURFnet en innovator pur sang. Tijdens zijn studententijd in 1997 medeoprichter van het reizende DNA-lab dat vervolgens landelijk is geadopteerd. Bij SURFnet heeft Rogier in 2004 SURFids, een gedistribueerd detectiesysteem, ontwikkeld dat een internationaal succes was.
|
||||
|
||||
Daarnaast heeft Rogier aan de wieg gestaan van SURFnet's eigen 'dropbox' dienst, Filesender geïntroduceerd, DNSsec geïnitieerd, IPv6 adoptie en IaaS dienstontwikkeling getrokken. Op dit moment trekt Rogier de internationale ontwikkeling en adoptie van eduVPN, een VPN standaard voor onderwijs en onderzoek.
|
||||
|
||||
Rogier is voorzitter van stichting HoneyNED, waarin security experts van Nederlandse organisaties samenwerken. Bestuurder bij the Commons Conservancy, een software governance orgaan.
|
|
@ -1,31 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- gigatron
|
||||
- ttl-chips
|
||||
title: "Walter Belgers - Gigatron TTL Computer"
|
||||
speakers:
|
||||
- walter-belgers
|
||||
presentation:
|
||||
filename: 2018-11-15-walter-belgers-gigatron-ttl-computer.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
What happens when a hacker gets his hands on a heap of 7400-series TTL chips, an oscilloscope and a soldering iron? In 1975 Wozniak famously made Breakout out of 44 such chips. When the MOS 6502 and Zilog Z80 were launched one year later, his Apple 1 started the microcomputer revolution. But were these processor ICs really necessary for that?
|
||||
|
||||
|
||||
One year ago we ordered a bunch of such ICs, bought an oscilloscope and started hacking. The result is a fully functional microcomputer from 36 TTL chips, ROM, RAM, some diodes, etcetera, but most importantly: no microprocessor.
|
||||
|
||||
This talk explores the hardware design, the software stack and the capabilities of our result we now call “the Gigatron”. It will give you a good understanding of how a CPU works and what interesting design decisions we have made to keep our CPU small, yet powerful.
|
||||
|
||||
## Biography
|
||||
|
||||
Walter Belgers is a hacker, having worked in IT security for all his life, the majority as a penetration tester and currently as a security officer at Philips. He is also the chairman of Toool, the Open Organisation of Lockpickers. He has been soldering since the 1970s but never before has he built a complete computer.
|
|
@ -1,34 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2018-11-15T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- power-grid
|
||||
- hacking
|
||||
title: "Willem Westerhof - How an intern hacked the power grid"
|
||||
speakers:
|
||||
- willem-westerhof
|
||||
presentation:
|
||||
filename: 2018-11-15-willem-westerhof-how-an-intern-hacked-the-power-grid.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
The Horus scenario, is a scenario describing a large scale cyber attack targeting the vital electrical infrastructure. This scenario was both theoretically and practically proven to exist during the thesis of Willem Westerhof.
|
||||
|
||||
Horus is an ancient Egyptian god, referred to in many different ways, which is in most cases related to the heavens or the sun. In mythology, one of his eyes stands for the sun, the other one of his eyes stands for the moon. The Horus scenario focuses on a cyber attack on PhotoVoltaic-installations (solar energy systems) and “recreates” the impact that a Solar eclipse has on the stability of the power grid, hence the reference to the old god.
|
||||
|
||||
In essence, this means that a scenario was created and proven where a malicious hacker targets the electrical grid by focusing on PV-installations and succeeds in causing large scale (Nation-wide or even continental) power outages. If this attack is ever truly executed in the wild, it is expected to cost billions of euros and have a direct and severe impact on everybody’s lives.
|
||||
|
||||
## Biography
|
||||
|
||||
As a graduate with honours this (former)student performed serious ethical hacking work on PV-installations. He ended up disclosing a large number of vulnerabilities to the specific vendor, and mathematically proving that it was possible to cause large scale (nation-wide/continental wide) power outages using the discovered vulnerabilities.
|
||||
|
||||
Following his study he has worked as an ethical hacker/security specialist and done work on a large number of companies, different sectors, and specific products. He was also requested to advise the dutch national government (2e kamer) department of justice and safety regarding cyber security issues and how to deal with them.
|
||||
|
||||
He currently leads a small team of ethical hackers for the offensive security centre at ITsec security services. In addition, he provides workshops and trainings, performs penetration tests/vulnerability assessments, does research on password cracking and public speaking from time to time.
|
|
@ -1,254 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- conferenties
|
||||
- evenementen
|
||||
date: 2019-05-23T16:08:58+02:00
|
||||
description: "De NLUUG voorjaarsconferentie werd gehouden op donderdag 23 mei 2019 in het Van der Valk Hotel Utrecht."
|
||||
is_event: true
|
||||
tags:
|
||||
- conferenties
|
||||
slug:
|
||||
title: "NLUUG voorjaarsconferentie 2019"
|
||||
layout: schedule-event
|
||||
event_title: "NLUUG voorjaarssconferentie 2019"
|
||||
event_start: 2019-05-23T08:30:00+02:00
|
||||
event_end: 2019-05-23T18:00:00+02:00
|
||||
event_timezone: Europe/Amsterdam
|
||||
event_location: Van der Valk Hotel Utrecht
|
||||
event_organizers:
|
||||
- organizer:
|
||||
id: nluug
|
||||
name: NLUUG
|
||||
event_attendance_mode: "offline"
|
||||
event_images:
|
||||
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
|
||||
event_description: "Voorjaarsconferentie 2019 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
|
||||
event_address:
|
||||
street_address: "Winthontlaan 4-6"
|
||||
postal_code: "3526 KV"
|
||||
city: "Utrecht"
|
||||
country_name: "The Netherlands"
|
||||
event_members_only: true
|
||||
event_status: "scheduled"
|
||||
event_schedule:
|
||||
title: Programma
|
||||
description:
|
||||
columns: 4
|
||||
headers:
|
||||
- header:
|
||||
width: 10
|
||||
- header:
|
||||
text: Zaal 1
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 2
|
||||
center: true
|
||||
width: 30
|
||||
- header:
|
||||
text: Zaal 3
|
||||
center: true
|
||||
width: 30
|
||||
rows:
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 08:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Inschrijving, ontvangst, koffie
|
||||
size: 3
|
||||
center: true
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:15
|
||||
- column:
|
||||
textfield:
|
||||
text: Openingswoord
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 09:30
|
||||
- column:
|
||||
talk:
|
||||
speaker: Frank Karlitschek
|
||||
title: "ownCloud/nextCloud, Why I forked my own project and my own company"
|
||||
keynote: true
|
||||
link: talks/frank-karlitschek-owncloud-nextcloud-why-i-forked-my-own-project-and-my-own-company/
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 10:30
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Andy Miller
|
||||
title: Quickly build a personal resume site with Grav, a modern flat-file open source CMS
|
||||
link: talks/andy-miller-quickly-build-a-personal-resume-site-with-grav-a-modern-flat-file-open-source-cms/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Maxim Burgerhout
|
||||
title: End-to-end automation with Ansible
|
||||
link: talks/maxim-burgerhout-end-to-end-automation-with-ansible/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Brian Joseph
|
||||
title: "How new OS technologies & standards will not only excite admins... but users as well"
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 11:50
|
||||
- column:
|
||||
talk:
|
||||
title: vervolg workshop Andy Miller
|
||||
link:
|
||||
- column:
|
||||
talk:
|
||||
speaker: Joost van Dijk
|
||||
title: FIDO2 and Web Authentication
|
||||
link: talks/joost-van-dijk-fido2-and-web-authentication/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Reinoud van Leeuwen
|
||||
title: Built-in security in an agile online software development environment
|
||||
link: talks/reinoud-van-leeuwen-built-in-security-in-an-agile-online-software-development-environment/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 12:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Lunch
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 13:15
|
||||
- column:
|
||||
textfield:
|
||||
text: ALV
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Robert Altnoeder
|
||||
title: Software Defined Storage the Linux way
|
||||
link: talks/robert-altnoeder-software-defined-storage-the-linux-way/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Kashyap Chamarthy
|
||||
title: Effective Virtual CPU Configuration with QEMU and libvirt
|
||||
link: talks/kashyap-chamarthy-effective-virtual-cpu-configuration-with-qemu-and-libvirt/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Esther Crabbendam
|
||||
title: Protection of data, privacy and online freedom in a fast changing world
|
||||
link: talks/esther-crabbendam-protection-of-data-privacy-and-online-freedom-in-a-fast-changing-world/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 14:50
|
||||
- column:
|
||||
talk:
|
||||
title: vervolg workshop Robert Altnoeder
|
||||
- column:
|
||||
talk:
|
||||
speaker: Olivier Lambert
|
||||
title: "XCP-ng: building an Open Source and turnkey virtualization platform"
|
||||
link: talks/olivier-lambert-xcp-ng-building-an-open-source-and-turnkey-virtualization-platform/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Alexios Zavras
|
||||
title: Making Open Source Easily Usable
|
||||
link: talks/alexios-zavras-making-open-source-easily-usable/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 15:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Koffiepauze
|
||||
center: true
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:00
|
||||
- column:
|
||||
talk:
|
||||
speaker: Amir Jerbi
|
||||
title: Keeping your Kubernetes secured using kube-hunter, kube-bench and microscanner
|
||||
link: talks/amir-jerbi-keeping-your-kubernetes-secured-using-kube-hunter-kube-bench-and-microscanner-github/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Suzanne Daniels
|
||||
title: From Clippy to Kernel
|
||||
link: talks/suzanne-daniels-from-clippy-to-kernel/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Rudi van Drunen
|
||||
title: "CI/CD in a modern world"
|
||||
link: talks/rudi-van-drunen-ci-cd-in-a-modern-world/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:45
|
||||
- column:
|
||||
size: 3
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 16:50
|
||||
- column:
|
||||
talk:
|
||||
title: vervolg workshop Amir Jerbi
|
||||
- column:
|
||||
talk:
|
||||
speaker: Bert Hubert
|
||||
title: "DNS & TLS SNI: Now with encryption... and cloud"
|
||||
link: talks/bert-hubert-dns-and-tls-sni-now-with-encryption-and-cloud/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Mike Hulsman
|
||||
title: The NLUUG FTP server
|
||||
link: talks/mike-hulsman-the-nluug-ftp-server/
|
||||
- row:
|
||||
columns:
|
||||
- column:
|
||||
time: 17:35
|
||||
- column:
|
||||
textfield:
|
||||
text: Borrel, gesponsord door Snow
|
||||
center: true
|
||||
size: 3
|
||||
---
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-05-23T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Alexios Zavras - Making Open Source Easily Usable"
|
||||
speakers:
|
||||
- alexios-zavras
|
||||
presentation:
|
||||
filename: 2019-05-23-alexios-zavras-making-open-source-easily-usable.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=3ab14ur_QJA
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Releasing some software as “Open Source” entails a few more steps than simply making it available (or “push to a repo”). Notwithstanding any quality or usability issues, the software, in order to be legally used by others, has to have an appropriate license.
|
||||
|
||||
This talk will present the basics of software licenses and legal compliance, from the viewpoints of both the producers and consumers of open source software. The audience will get detailed practical information and will be in position to immediately apply the concepts learned into their daily work.
|
||||
|
||||
## Biography
|
||||
|
||||
Alexios Zavras (zvr) is the Senior Open Source Compliance Engineer of Intel Corp. He has been involved with Free and Open Source Software since 1983, and is an evangelist for all things Open.
|
||||
|
||||
He has a PhD in Computer Science after having studied Electrical Engineering and Computer Science in Greece and the United States.
|
||||
|
||||
Alexios is a regular speaker in international conferences and industry events and he first presented in an NLUUG event 21 years ago!
|
|
@ -1,42 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-05-23T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- kubernetes
|
||||
- kube-hunter
|
||||
- kube-bench
|
||||
- microscanner
|
||||
title: "Amir Jerbi - Keeping your Kubernetes secured using kube-hunter, kube-bench and microscanner GitHub"
|
||||
speakers:
|
||||
- amir-jerbi
|
||||
presentation:
|
||||
filename: 2019-05-23-amir-jerbi-keeping-your-kubernetes-secured-using-kube-hunter-kube-bench-and-microscanner-github.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=Qz0LcwwABJg
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
This is a hands-on workshop session that will show you how to apply opensource and free tools to apply good security hygiene with your Kubernetes cluster. During the workshop we will show some real attacks that can happen due to a miss-configured cluster and how the opensource tools can help us identify these issues and remediate them.
|
||||
|
||||
The following tools will be used during the session:
|
||||
|
||||
* kube-hunter: A pen-testing tool for Kubernetes that simulates attacks on your cluster. It shows you what is the attack surface for your existing Kubernetes cluster.
|
||||
|
||||
* kube-bench: A configuration assessment tool that shows you how to tweak your cluster settings based on the CIS best practices.
|
||||
|
||||
* microscanner: A free image scanning utility that scans your Docker images for known security vulnerabilities.
|
||||
|
||||
__Other Info:__
|
||||
|
||||
Attendees should have access to a Kubernetes cluster (can be a mini-kube installed on their laptop). Network access to download opensource tools is also needed.
|
||||
|
||||
## Biography
|
||||
|
||||
Amir Jerbi brings to Aqua 17 years of security software experience in technical leadership positions. Amir co-founded Aqua with the vision of creating a security solution that will be simpler and lighter than traditional security products.
|
||||
|
||||
Prior to Aqua, he was a Chief Architect at CA Technologies, in charge of the host based security product line, building enterprise grade security products for Global 1000 companies. Amir has 14 cloud and virtual security patents under his belt. In his free time, Amir enjoys backpacking in exotic places.
|
|
@ -1,60 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-05-23T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- grav
|
||||
- cms
|
||||
title: "Andy Miller - Quickly build a personal resume site with Grav, a modern flat-file open source CMS"
|
||||
speakers:
|
||||
- andy-miller
|
||||
presentation:
|
||||
filename: 2019-05-23-andy-miller-quickly-build-a-personal-resume-site-with-grav-a-modern-flat-file-open-source-cms.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=flMPnb_gwg8
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Grav is a modern open-source flat-file CMS built to be _fast_, _flexible_, and _extensible_. In this workshop, we will cover the basics of Grav, it's origins, and it's _many benefits_ over traditional database-powered platforms.
|
||||
|
||||
During this comprehensive session we will go step-by-step through the process of creating a personal resume site while touching on many key topics that will enable you to develop more complex sites in the future:
|
||||
|
||||
* Installation via __ZIP__, __GitHub__, and __Composer__
|
||||
|
||||
* Configuration and customization via __YAML-based config files__
|
||||
|
||||
* Making use of Grav's __CLI tools__
|
||||
|
||||
* __Markdown syntax__ and Grav-specific content features
|
||||
|
||||
* Content __editing and creation__ via the filesystem
|
||||
|
||||
* Working with __content media__ such as images and videos
|
||||
|
||||
* Understanding the difference between __regular__ and __modular pages__
|
||||
|
||||
* Basic __theme modification__, and a quick guide to creating your own __custom theme__
|
||||
|
||||
* Overview of Grav's __plugin architecture__ and the __Grav Package Manager (GPM)__
|
||||
|
||||
* Including __forms__ utilizing Grav's flexible Form plugin and blueprints
|
||||
|
||||
* Optional web-based __administration plugin__
|
||||
|
||||
* Grav's powerful __multi-language capabilities__
|
||||
|
||||
* Overview of __Scheduler__ and __Backups manager__
|
||||
|
||||
* Using GitHub to manage your __deployment workflow__
|
||||
|
||||
Participants should bring their own devices if they wish to follow along. They should have PHP 7.1+ pre-installed, a modern browser installed, and be familiar using a text editor.
|
||||
|
||||
## Biography
|
||||
|
||||
Andy Miller is a web developer with over 20 years of experience, having worked for fortune 100 companies, dot-com startups, and now runs his own businesses. Andy is a former core-team member of Joomla, as well as the CEO of RocketTheme, one of the longest running theme development companies that specializes in open source platforms.
|
||||
|
||||
As well as being involved in open source projects for over 13 years, he's also the author and lead developer of Grav CMS, a modern open-source flat-file CMS that is rapidly becoming a go-to alternative to traditional CMS platforms. Andy is also a senior partner at Trilby Media, a professional services company focusing on end-to-end site development with Grav CMS.
|
|
@ -1,30 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-05-23T10:31:43+02:00
|
||||
description: "Een presentatie gegeven door Bert Hubert over DNS en TLS SNI zoals het gebruik van DNS over TLS (DoT) en DNS over HTTPS (DoH)."
|
||||
layout: event-talk
|
||||
tags:
|
||||
- dns
|
||||
- doh
|
||||
- dot
|
||||
- tls
|
||||
title: "Bert Hubert - DNS & TLS SNI: Now with encryption... and cloud"
|
||||
speakers:
|
||||
- bert-hubert
|
||||
presentation:
|
||||
filename: 2019-05-23-bert-hubert-dns-and-tls-sni-now-with-encryption-and-cloud.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=V2F92orIEO8
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
DNS is one of the few remaining (generally) unencrypted parts of our daily network use. In addition, TLS sessions (even TLS 1.3) transfer the name of the server visited in plaintext ("SNI"). 2018 saw the release of technologies to encrypt both of these privacy leaks, which is good. Less good however is that with this encryption, your DNS (and TLS SNI) lookups will move to the cloud.
|
||||
|
||||
In this talk, I explain the technologies used (DNS over TLS and DNS over HTTPS), but also spend time on what this change means: loss of control over your lookups (forget about your intranet), and how encrypting your data to a cloud provider may provide security against your network admin & government, but does send all your browsing behaviour to California.
|
||||
|
||||
## Biografie
|
||||
|
||||
Bert is the founder of PowerDNS. These days he also cares a lot about keeping the internet open. In addition, he can't help document or explain open technologies.
|
|
@ -1,31 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-05-23T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- online-freedom
|
||||
- privacy
|
||||
- data
|
||||
title: "Esther Crabbendam - Protection of data, privacy and online freedom in a fast changing world"
|
||||
speakers:
|
||||
- esther-crabbendam
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=jDOHyOeHrRU
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Freedom and privacy on the internet are under threat, with far-reaching consequences for the daily lives of millions of internet users. Their data are being collected ever more frequently and for an ever longer period. Their access to websites can be blocked. It is even being proposed to cut off users from the internet altogether. Meanwhile, the development of innovative services is also under threat.
|
||||
|
||||
The coming years are decisive for the future of privacy and freedom on the internet. Now, we need to ensure that each internet user can decide for her- or himself what happens to their private data. Now, we have to act to make sure that each internet user can continue to enjoy an open and free internet without borders.
|
||||
|
||||
This talk wil focus on recent social developments, reflect on the role data, privacy en profiling plays in these and point out what users and business can do to make a change.
|
||||
|
||||
## Biography
|
||||
|
||||
Bits of Freedom is the leading digital rights organization in the Netherlands, focusing on privacy and freedom of communication online. Working at the cutting edge of technology and law, Bits of Freedom strives to influence legislation and self-regulation, and empower citizens and users by advancing the awareness, use, and development of freedom-enhancing technologies.
|
|
@ -1,32 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-05-23T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- owncloud
|
||||
- nextcloud
|
||||
title: "Frank Karlitschek - ownCloud/nextCloud, why I forked my own project and my own company"
|
||||
speakers:
|
||||
- frank-karlitschek
|
||||
presentation:
|
||||
filename: 2019-05-23-frank-karlitschek-owncloud-nextcloud-why-i-forked-my-own-project-and-my-own-company.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Frank founded ownCloud in 2010. After being the maintainer and CTO, he decided to leave his own project and company in 2016, to start Nextcloud. Most community people and a big part of the customers have followed him to Nextcloud. This talk covers the questions on why this happened and what other community maintainer and start-ups can learn.
|
||||
|
||||
This talk will tell the reasons why ownCloud was founded as an open source project, the good and bad things when it was turned into a venture capital funded company, the changes which Frank and the core team wanted for Nextcloud, and how that improved the business model, licensing and community relations.
|
||||
|
||||
This talk covers insights into different open source business models and how to create a win-win situation for a company and a community.
|
||||
|
||||
## Biography
|
||||
|
||||
Frank Karlitschek started the ownCloud project in 2010 to return control over the storing and sharing of information to consumers. In 2016 he initiated the Nextcloud project to bring this idea to the next level.
|
||||
|
||||
He has been involved with a variety of Free Software projects including having been a board member for the KDE community. Frank has spoken at MIT, CERN and ETH and keynoted LinuxCon, Latinoware, Akademy, openSUSE Con and many other conferences. Frank is a fellow of Open Forum Europe.
|
|
@ -1,34 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-05-23T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- fido2
|
||||
- web-authentication
|
||||
title: "Joost van Dijk - FIDO2 and Web Authentication"
|
||||
speakers:
|
||||
- joost-van-dijk
|
||||
presentation:
|
||||
filename: 2019-05-23-joost-van-dijk-fido2-and-web-authentication.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=04AaSqXRJzU
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Earlier this year, the World Wide Web Consortium published the W3C Recommendation for Web Authentication: An API for accessing Public Key Credentials. This API enables web sites to authenticate users with FIDO2 authenticators — small hardware tokens that can be used as a second factor for protecting your accounts at Dropbox, Google, and Microsoft (just like its predecessor, FIDO U2F).
|
||||
|
||||
Moreover, [FIDO2](https://fidoalliance.org/fido2/) support passwordless login, where users can access their accounts without the need to enter any credentials, instead performing some user action like pushing a button or scanning a fingerprint.
|
||||
|
||||
Also of great importance are the security benefits of FIDO2 tokens, in particular its privacy properties and protection from phishing and Man-in-the-Middle attacks.
|
||||
|
||||
In this presentation, we will dive into this new technology and see how it works under the hood, why it improves on usability, security, and privacy aspects compared with traditional solutions, and how it can be integrated into your own web applications.
|
||||
|
||||
## Biography
|
||||
|
||||
Joost van Dijk works for SURF, the collaborative organisation for ICT in Dutch education and research as a technical product manager in the field of Security and Privacy.
|
||||
|
||||
For the past decade, he has been working on solutions for improving the usability and security of authentication for SURF's population of 1.5 million students, researchers, and staff. He was involved in the development of SURF’s service for strong authentication and is the co-designer of the open source authentication app [tiqr](https://tiqr.org/).
|
|
@ -1,32 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-05-23T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- qemu
|
||||
- libvirt
|
||||
title: "Kashyap Chamarthy - Effective Virtual CPU Configuration with QEMU and libvirt"
|
||||
speakers:
|
||||
- kashyap-chamarthy
|
||||
presentation:
|
||||
filename: 2019-05-23-kashyap-chamarthy-effective-virtual-cpu-configuration-with-qemu-and-libvirt.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=UZXIZzSUeyw
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
QEMU (the open source machine emulator and virtualizer) and the libvirt API allow a variety of ways in which CPUs can be configured for virtual machines (VMs). However, there had been a flurry of CPU hardware flaws in 2018, and it has become increasingly difficult to choose an optimal CPU configuration. This talk aims to provide some clarity around this.
|
||||
|
||||
In this presentation, we will walk through the distinct CPU configuration interfaces QEMU offers, and in turn, how the libvirt project uses those interfaces to provide convenient APIs for higher-level tools. We will also consider critical needs such as the ability to live migrate a VM across hosts with a diverse set of CPUs; or the flexibility to add or remove specific CPU features from a guest CPU model—to mitigate from various hardware CPU flaws.
|
||||
|
||||
The talk will be set in context such that developers and administrators of high-level management software (that relies on KVM, QEMU and libvirt) will, hopefully, gain an appreciation for the details.
|
||||
|
||||
## Biography
|
||||
|
||||
Kashyap Chamarthy works as part of Red Hat's Cloud Engineering group. He focuses his efforts on integrating low-level virtualization components (KVM, QEMU, libvirt and related tooling) into higher-level management tools (OpenStack).
|
||||
|
||||
He has previously presented or participated in the last seven editions of Linux Foundation's technical events (mostly European, sometimes North American) such as LinuxCon, Open Source Summit, and KVM Forum. And also at other major open source conferences such as FOSDEM.
|
|
@ -1,32 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-05-23T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
- ansible
|
||||
- automation
|
||||
title: "Maxim Burgerhout - End-to-end automation with Ansible"
|
||||
speakers:
|
||||
- maxim-burgerhout
|
||||
presentation:
|
||||
filename: 2019-05-23-maxim-burgerhout-end-to-end-automation-with-ansible.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url:
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Let me take you on a journey through the endless possibilities of Ansible. You already knew Ansible could manage Linux machines, but your data center contains much, much more. What about hypervisors? Clouds? Windows machines? Network devices? Kubernetes? Applications?
|
||||
|
||||
During this session, we'll look at deploying and configuring various platforms and applications, combining them into automated wall-to-wall deployments and look at some things you might never have tried before!
|
||||
|
||||
## Biography
|
||||
|
||||
Maxim has worked in various fields, from law enforcement to academia, through being a consultant in several mid-size and large IT firms in the Netherlands, until ending up at Red Hat.
|
||||
|
||||
At Red Hat, Maxim is part of the presales team in the Benelux region, as a principal solution architect, and part-time evangelist. Red Hat is the place where Maxim was destined to end up at: it was his ultimate goal ever since he started to work with Linux and other open source software in the early '00s. He is very passionate about Red Hat and the way Red Hat does it's software development: out in the open.
|
||||
|
||||
Maxim has spoken at various conferences, both in Europe and the United States, about the Red Hat portfolio and open society in general and open source in particular. He was voted #1 speaker at Red Hat Summit 2018 in San Francisco.
|
|
@ -1,27 +0,0 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-05-23T10:31:43+02:00
|
||||
description: "Een presentatie gegeven door Mike Hulsman over de FTP-server van de NLUUG. Over de geschiedenis van deze dienst en hoe operationeel beheer in zijn werk gaat."
|
||||
layout: event-talk
|
||||
tags:
|
||||
- ftp
|
||||
title: "Mike Hulsman - The NLUUG FTP server"
|
||||
speakers:
|
||||
- mike-hulsman
|
||||
presentation:
|
||||
filename: 2019-05-23-mike-hulsman-the-nluug-ftp-server.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=eVstCesOF_U
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
A major asset of the NLUUG is the service of the FTP server. The FTP archive is a service for the open source community, and mirrors a very large number of open source packages.
|
||||
|
||||
In this talk we describe the history of this major hub of global software distribution and show the people and technology (ao. hardware, software and networking infrastructure) that we use to run this service now and in the near future. The method of mirroring and procedure to have a new content mirror attached will be discussed as well.
|
||||
|
||||
## Biografie
|
||||
|
||||
Mike Hulsman is working at Proxy Managed Services in various roles. Since 2012, he is one of the archive- and system admins of ftp.nluug.nl. He is sysadmin for over 20 years now, working on Enterprise solutions for warehousing, telco's, broadband providers, banking, and technology companies. His focus is on integration, virtualization, systems, SAN storage, monitoring and application level. At the moment, he is working on a multi Petabyte gluster environment, inclusing the backup to S3.
|
Some files were not shown because too many files have changed in this diff Show more
Reference in a new issue