ILUG-Cochin Meeting on 23rd December 2012

Warm Greetings To The Free Software Community

Indian Libre User Group is spreading Free Software awareness in society through its regular monthly meetings ( 4th Sunday of every month ), conducted since 1997. ILUG Cochin ( is holding its regular meeting for this month on Sunday, 23rd December 2012.

The Details are as follows

Date : 23/12/2012, 23rd December, Sunday

Time : 2pm – 5:30pm

Venue : Internet Club,
IInd Floor, AMI Trust Bldg,
Broadway Enclave, Broadway,
Location: Behind Allappat Super Shoppe,On top of SBT Treasury wing

Meeting Schedule

1. Introduction to Free Software and GNU Movement
2. Agenda : Botnets
3. Technical Session : Alfresco (Live demo,bring laptop with 64 bit GNU/Linux OS for in depth technical implementation)
4. Special Session : Free software and photography (Phatch, hugin, some Raw Processing tools, GIMP and its plugins)

A Map showing the venue is available at :

Directions to reach venue:

Get answers to your questions about the meeting at:

For further information contact :

Tel:+91 9447111771 – JayJacob
Tel:+91 484 4025077 (Venue)


1. Introduction to Free Software

We start of with our regular discussion on the concepts and philosophy of the Free Software Movement and related topics.

2. Agenda : Botnets

How to stop botnet attacks by 3rd parties, there by securing ourselves from having been breached and ceding control to the 3rd party, thereby allowing the 3rd party not to utilise our system for damaging and
dangerous purposes.

3. Technical Session : Alfresco as DM

Different Free & Open Source and proprietary Document Management System
Alfresco reason for my choice
Installation prerequisite
Installation (Live demo)
Administration and Configuration (Live demo)
Configuration for CIFS
Configuration for IMAP (Drag and Drop email from Mail Clients to DM)
Work flow eg in which you can integrate Alfresco with other systems

Important : Please bring a 64 bit GNU/Linux operating system installed on your laptop to participate in this workshop (Alfresco should already be installed if you use the internet for installation), if you need a 64 bit GNU/Linux operating system, let us know in advance, so that we can plan for it.

4. Free software and Photography

Some experiences with free software and photography related tools coming with special reference to Phatch, hugin, some Raw Processing tools, GIMP and its plugins.

We look forward to your participation for this exciting meeting. Hope to meet you all on Sunday.

Thank You

Indian Libre User Group, Cochin

November 2012 Meeting Details

The meeting of the “Indian Libre User Group” was successfully held on November 25th 2012

Date: 25-11-2012

Time: 2:00pm – 5.30pm
Venue: Internet Club, IInd Floor,
AMI Trust Building,Broadway Enclave,
Broadway, Ernakulam

2.30pm – 2.45pm

Customary Self Introduction. People shared their experience with Free Software

2.45pm – 4.30pm – Session by G.Venkit Subramanian

Network security and Incident profiling

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Types of Attacks – Networks are subject to attacks from malicious sources. Attacks can be from two categories: “Passive” when a network intruder intercepts data traveling through the network, and “Active” in which an intruder initiates commands to disrupt the network’s normal operation. Types of attacks include:


-Port scanner
-Idle scan


-Denial-of-service attack
-Man in the middle
-ARP poisoning
-Smurf attack
-Buffer overflow
-Heap overflow
-Format string attack
-SQL injection

4.30pm – 4.45pm

Tea break

Concluding Session

People were requested to handle small technical discussions for the next meeting.

Thanks to all the attendees for coming and they are requested to put their feedback on the mailing list so that we can improve future meetings

The next user meet is on 23rd December 2012