Meeting – September 14th, 2004

Topic:

Main presentation:
Asterisk – A Linux based PBX
6:00pm Doors open, registration
6:30pm Mug business
6:45pm Main presentation –
Asterisk – A Linux based PBX

Last September, John Lodden gave us an excellent overview of IP Telephony.
At that time, he suggested a follow-up presentation on a project called
[[http://www.asterisk.org][Asterisk]]. Asterisk is a complete PBX system that you can run on a Linux machine.

Well, a year has passed, and John is back to tell us all about Asterisk.

If you are interested in running a PBX, complete with voice mail, menu, multi-lines, and VOIP, then you really don’t want to miss this presentation.

Be the first on your block with a PBX in your home :-)

8:45pm Meeting adjourns
9:00pm Dinner at a local establishment
After the meeting, everybody is invited to grab dinner at a local restaurant

Meeting – August 10th, 2004

Main presentation: Remote Administration
6:00pm Doors open, registration
6:30pm Mug business
6:45pm Main presentation – Remote Administration

A panel of ‘experts’ will discuss various methods of and strategies for remote
administration of computer systems. Anyone who administers a system is faced
with the task of doing things to it when not in the same room with it. Remote
can mean: down the hall, in the next building, from out of town, at home, on
vacation, … we have all been there. Methods discussed will include a phone
conversation with someone else sitting in front of the computer, to modem dial
up, to VNC, and more.

Please come ready to share your experiences and to ask questions regarding your
current needs

8:45pm Meeting adjourns
9:00pm Dinner at a local establishment
After the meeting, everybody is invited to grab dinner at a local restaurant

Meeting – July 13th, 2004

Topic:

Main presentation: Novell Linux Strategy
6:00pm Doors open, registration
6:30pm Mug business
6:45pm Main presentation – Novell Linux Strategy

Jeff Lindholm will update the group on Novell’s Linux strategy.
Novell has recently acquired SuSE Linux and Ximian – establishing
themselves as a leading provider of solutions for the corporate Linux
community. His presentation will focus on the direction of Novell’s
full stack solution in the corporate Linux market, and an overview of
the companies point solution offerings – most of which run on Linux.
Novell will soon be releasing SuSE Linux Enterpise Server 9, the first
enterprise distribution of Linux based on the 2.6 kernel.

Jeff Lindholm is a networking and infrastructure product specialist
working for Novell out of Southfield, MI.

8:00pm 2nd presentation – To be announced

8:45pm Meeting adjourns
9:00pm Dinner at a local establishment
After the meeting, everybody is invited to grab dinner at a local restaurant

Meeting – June 8th, 2004

Topic:

Main presentation: CUPS – Common Unix Printing System
Slides in PDF format
Slides in !OpenOffice.org format
6:00pm Doors open, registration
6:30pm Mug business
6:45pm Main presentation – CUPS – Common Unix Printing System

MUG Member Erick Tyack will be showing the CUPS printing system. CUPS is a great way to share printers among Linux, Unix and even Windows computers.

We’ll have printers and laptops at the meeting, and we’ll show how the computers can discover what printers are available on the network.

8:00pm 2nd presentation – Open Discussion

To continue our discussion that we started last month about choosing a development environment, this month we’ll begin talking about developing a simple, useful application. Dave Satwicz will begin the discussion of what the requirements of our little app will be.

8:45pm Meeting adjourns
9:00pm Dinner at a local establishment
After the meeting, everybody is invited to grab dinner at a local restaurant

Meeting – May 11th, 2004

Topic:

Main presentation: Top 10 Myths about Linux Distro Security
6:00pm Doors open, registration
6:30pm Mug business
6:45pm Main presentation – Top 10 Myths about Linux distro Security

Mike O’Connor is the head of product security for Silicon Graphics, Inc. (SGI). He will be talking about security in Linux distros, as he says “From the distro perspective”.

8:00pm 2nd presentation – Open Discussion

This months Open discussion is about choosing a development environment in the world of Linux and !OpenSource.

If you are a software developer, you probably have a bag of tricks that you use, when developing applications for yourself or your customers. Maybe it’s based on C, C++, Fortran, Cobol, some 4th generation language, Perl, Python or something else. With the tools that come with Linux for free, we’re going to talk about the choices you have, in picking the tools that are going to make you productive in the future.

8:45pm Meeting adjourns
9:00pm Dinner at a local establishment
After the meeting, everybody is invited to grab dinner at a local restaurant

Meeting – April 13th, 2004

Topic:

Main presentation: KNOPPIX by Jim McQuillan
6:00pm Doors open, registration
6:30pm Mug business
6:45pm Main presentation – KNOPPIX

Jim McQuillan will give an overview of the KNOPPIX Live CD Linux Distribution. KNOPPIX contains an amazing amount of software on a single bootable CD-ROM.

Because KNOPPIX is a Live CD, it will boot the computer without touching the hard drive. This means that it can be used as a recovery CD or as a way of demonstrating the power of Linux, without removing the existing operating system from the hard drive.

KNOPPIX has very good hardware detection routines, and does an excellent job of detecting all of the devices in the system.

KNOPPIX is based on the Debian distribution,
and there is a simple procedure for copying it
to the harddrive. This is a very simple way to
install Debian on your system.

We’ll have several CDs containing the latest
release of KNOPPIX to give away, and if you have
a laptop at the meeting, you can boot from the
CD to see what it is like.

Jim McQuillan is the president of the Michigan
Unix User Group (MUG) and also the founder
of the Linux Terminal Server Project (LTSP)

8:00pm 2nd presentation – Open Discussion

It’s been a long time since we’ve had an open discussion, so we figured this would be a good time to poke the attendees for topics that interest them.

8:45pm Meeting adjourns
9:00pm Dinner at a local establishment
After the meeting, everybody is invited to grab dinner at a local restaurant

Meeting – March 9th 2004

Topic:

Main presentation: VMWare by Jim Small
6:00pm Doors open, registration
6:30pm Mug business
6:45pm Main presentation – VMWare

Jim Small will give an overview of VMWare Workstation, a powerful virtual
machine that runs under both Linux and Windows. VMWare allows the user to
run other Operating Systems on top of their base Operating System. For
example, a user that needed to test a !NetWare server, could install VMWare
under Linux. !NetWare could then be installed within the VMWare virtual
machine essentially letting you use your computer as both a Linux
workstation and a !NetWare server. Because VMWare is a virtual machine,
there are many advanced features you can take advantage of such as point in
time snapshots, multiple networks, and multiple Operating Systems. A
complete tour of the product will be provided.

Jim Small is a Security and Network Analyst at EDS. Jim also teaches at
Global Information Technology (www.global-itech.com) and does
occasional freelance consulting.

8:00pm 2nd presentation – NFSv4 and Kerberos by Ann Adams

Ann Adams will give an overview of NFSv4 and Kerberos. NFS is a popular
file sharing protocol. Kerberos is a single sign-on authentication system.
Kerberos security has been integrated into NFSv4.

Ann has been investigating NFSv4 while looking for a more secure file at
Ford. While Sun came out with many enhancements for NFSv3, they were not
picked up by other vendors. So, Sun sponsored NFSv4 as an open standardized
file sharing protocol, including a full Linux implementation. The
impressive features integrated into NFSv4 have it poised to be the remote
file system of the future.

Ann will discuss the following:

  1. Features of NFSv4.
  2. Comparison to NFSv3.
  3. Kerberos Security enhancements in Solaris 10 NFSv4 Beta.
  4. Potential Integration into a corporate environment.

Ann Adams is a Computer Architect in Advanced Technology Research at Ford Motor Company. She has her Masters in Computer Science from the University of Michigan, Rackham School of Engineering. Ann has ten years at Ford Motor Company in Network Management, UNIX Server Development, and Infrastructure Architecture. Ann has also done work in Cellular Engineering Network Management as well as the development of a Kerberos infrastructure at Ford.

8:45pm Meeting adjourns
9:00pm Dinner at a local establishment
After the meeting, everybody is invited to grab dinner at a local restaurant

Meeting – February 10th, 2004

Topic:

Main presentation: Gentoo by Brian Downey
6:00pm Doors open, registration
6:30pm Mug business
6:45pm Main presentation – Gentoo Linux

Brian Downey will give an overview of Gentoo Linux and its unique Portage
package management system. Also, he’ll be covering some techniques using
Gentoo servers from past experiences.

Brian is involved in the Gentoo project, mostly contributing corrections
and additions to Gentoo’s x86 Installation Guide. Also, he contributes to
the Gentoo Weekly Newsletter. He runs a small Linux-based consulting
business out of Farmington Hills that uses Gentoo exclusively.

8:00pm 2nd presentation

Several things to go over, including highlights of the Linux World Expo that was in New York City in January, and the elections for the 2004 MUG Board of Directors

8:45pm Meeting adjourns
9:00pm Dinner at a local establishment
After the meeting, everybody is invited to grab dinner at a local restaurant

Meeting – January 13th, 2004

Topic:

Main presentation: Network Intrusion Detection by Jeff Nathan
6:00pm Doors open, registration
6:30pm Mug business
6:45pm Main presentation – Network Intrusion Detection

Jeff Nathan will give an overview of Network Intrusion Detection, and then proceed with an introduction to snort www.snort.org as a Network Intrusion Detection System. Network Intrusion Detection is currently one of the hottest IT security topics and snort is the most popular Open Source NIDS.
Jeff is a developer for snort and several other Open Source Security tools.

8:00pm 2nd presentation – Network Characterization by Jim Small

Jim Small will briefly discuss various Open Source tools which can be used to profile a network, ISP or isolate network performance bottlenecks.

8:45pm Meeting adjourns
9:00pm Dinner at a local establishment
After the meeting, everybody is invited to grab dinner at a local restaurant

 

Click here for more information about the location.

Biography info:

Jeff Nathan is a software engineer and security researcher working on Arbor Networks’ next-generation behavioral detection and policy enforcement system: Peakflow X. Specializing in network security and forensics, he is a core member of the Snort project (the world’s most widely deployed Network Intrusion Detection System). Jeff is also a member of the Honeynet project,
developing technologies for data capture and network isolation in honey pot networks (honeynets). Additionally, Jeff is the developer of Nemesis, a command-line network packet generation tool suite and an occasional contributor to a number of open source software projects.

Before working as for Arbor Networks, Jeff worked as a senior software engineer for Sygate, an Enterprise security architect for !McKesson, a security consultant for @stake, a security researcher developing new
Intrusion Detection technologies, a software developer and a system and network administrator.

Meeting – December 9th, 2003

Topic:

Main presentation: Perl by Pandu Rao
6:00pm Doors open, registration
6:30pm Mug business
6:45pm Main presentation – Perl by Pandu Rao

Pandu will be presenting on using Perl. Arguably the most popular interpreted programming language, Perl is widely used for system administration and CGI programming among other things. Pandu will run through the basics of Perl for beginners. He will then talk about data manipulation and regular expressions, and possibly some advanced features as time permits.

8:00pm 2nd presentation – 2003, the year in review
This is a chance to review all the exciting events that took place in the last year.
8:45pm Meeting adjourns
9:00pm Dinner at a local establishment
After the meeting, everybody is invited to grab dinner at a local restaurant

You can find a link to Pandu’s presentation here.