OpenSSL is an open source security library providing the underlying cryptographic algorithms for many applications. This talk will focus on the steps necessary to enhance OpenSSL to make use of application specific hardware for cryptographic processing. The OpenSSL command line and kernel crypto interfaces will be discussed.
For this meeting we will revisit a time-honored (but recently neglected) NBLUG tradition: Stump the Geek. We’ll open up the floor for questions about Linux and we’ll try our best to answer them. Be gentle…
Instead of a regular speaker, this month we are going to do a hackfest. Like the previous hackfests we will take half of the meeting to conduct lightning talks from the first four people who sign up for one. After that we will spend the rest of the time in a more loosely-structured social setting where everyone can show each other what they have been working on or ask for help. This would be a good meeting to bring your computers.
During this meeting we will also conduct our annual NBLUG elections. You can find out more about the open positions at https://nblug.org/bylaws
When a server is used in production, you want every possible level of fault tolerance. Ethernet bonding allows you to create redundant NICs on a server so that you can lose a NIC, a ethernet cable, or even potentially a switch, without downtime.
In this talk Kyle will introduce the concept of ethernet bonding, discuss the different bonding modes, and describe how to set up bonding on Red Hat and Debian-based systems.
Instead of a regular speaker, this month we are going to do a hackfest. Like the previous hackfest we will take half of the meeting to conduct lightning talks from the first four people who sign up for one. After that we will spend the rest of the time in a more loosely-structured social setting where everyone can show each other what they have been working on or ask for help. This would be a good meeting to bring your computers.
SSH is one of the most widely used network protocols. Much more than a replacement for telnet, SSH has many tricks up its encrypted sleeve and harnessing them is a rite of passage for any keyboard cowboy. In this talk, Aaron will discuss the core protocol itself, the history of development and how you can use OpenSSH to better secure your packets through the tubes.
The U.C.S.C Long Marine lab includes the ‘costalab’, where I work
taking care of 4 servers, mostly Ubuntu, and a few windows desktops.
The costalab studies marine mammals and birds all over the world.
Google on ‘costalab’ to find out more about what we do.
About half of the talk will be specific to the costalab work - what
information the researchers collect, how it is stored and analyzed,
the benefits to the world from this research, etc. This should be of
interest to a much wider audience than linux gurus.
The rest of the talk will be about our Ubuntu servers, how they are
configured, how they are used, and particular tools that get heavy use
(including Python, rsync, NX, rsnapshot,geany, Ksplice, and Postgres).
A Q&A session will follow.
This month we are going to do something a little different. Instead of having a formal presentation, we are going to experiment with a “Hackfest.” What this means is that we will have free-form lightning talks for up to the first half of the meeting, and then reserve the last half of the meeting so everyone can hack on things or just sit around and chat about Linux. The lightning talks are open to anyone so if you have something interesting you have been working on and could present on it for 5-10 minutes, we will have a sign-up sheet for you at the beginning of the meeting.
Just when you had gotten used to using GRUB instead of LILO, Ubuntu goes and changes GRUB to GRUB2. It turns out that the similarities between the two boot loaders end at the name. In this talk Kyle will go over the differences between GRUB and GRUB2 and discuss the new configuration files, which files you should and shouldn’t touch, and why the Esc key no longer works at boot time. There will be a group counseling session at the end of the meeting for disaffected users.
Joomla is a content management system (CMS), which enables you to build multi-user Web sites quickly. Many aspects, including its ease-of-use and extensibility, have made Joomla the most popular free and open source Web site software available. Joomla, which operates on top of a LAMP stack (Linux/Apache/MySQL/PHP-perl), is designed to be easy to install and set up even if you’re not an advanced user. Many Web hosting services offer a single-click install, getting your new site up and running in just a few minutes. If your clients need specialized functionality, Joomla is highly extensible and thousands of extensions (most for free under the GPL license ) are available in the Joomla Extensions Directory.
In the talk, Doug Bierer, founder of unlikelysource.com, which maintains an open source Joomla extension, will cover:
what is Joomla and why it may be useful to you
rapid website development using Joomla
expanding beyond the core by installing extensions
Second Life (SL) is like a MMORPG (Massively Multi-player Online Role
Playing Game), although many of the people hanging out there will be
offended if you called it a “game”. It is a 3D virtual environment
created between a database on a huge farm of Linux servers and viewer
programs running on home PCs. But besides the bare simulated ground,
everything in SL is created by one of the “residents” there. Objects
in SL can have snippets of code inserted in them to add behavior. I
have found this to be a fascinating environment to program in. I’ll
start this talk with an overview of what SL is like and briefly touch
on the organization of the servers. I’ll describe the scripting
language, data types, programming environment and the foibles of the
API library. We should be able to go “in-world” live and show some
projects I’m working on in Second Life.
Every year or so you hear about how the Internet is about to run out of IPv4 addresses. When that happens we will all need to be able to migrate to IPv6. In this talk Owen will discuss what IPv6 is and cover how to use IPv6 from a sysadmin perspective.