Archive

Archive for January, 2013

Index

1. ILUG-Cochin Meeting on 27th January 2012
2. December 2012 Meeting Details

ILUG-Cochin Meeting on 27th January 2012

January 26th, 2013

Warm Greetings To The Free Software Community

Indian Libre User Group is spreading Free Software awareness in society through its regular monthly meetings ( 4th Sunday of every month ),conducted since 1997. ILUG Cochin (www.ilug-cochin.org) is holding its regular meeting for this month on Sunday, 27th January 2013.

The Details are as follows

Date : 27/01/2013, 27th January, Sunday

Time : 2pm – 5:30pm

Venue : Internet Club
IInd Floor, AMI Trust Bldg,
Broadway Enclave,Broadway,
Kochi-682031
Location: Behind Allappat Super Shoppe,On top of SBT Treasury wing

Meeting Schedule
================
1. Introduction to Free Software and GNU Movement
2. Agenda : Forensics with Ext4
3. Technical Discussions
4. Q&A Session

A Map showing the venue is available at : http://www.ilug-cochin.org/content/view/31/

Directions to reach venue: http://www.ilug-cochin.org/meetings/directions-to-meeting-venue/

Get answers to your questions about the meeting at: http://www.ilug-cochin.org/faq/

For further information contact :
Tel:+91 9447111771 – JayJacob
Tel:+91 9895068235 – Ananthan
Tel:+91 9747173432 – Sreenadh
Tel:+91 9496449969 – SanalKumar
Tel:+91 484 2374862 (Venue)
Tel:+91 484 4025077 (Venue)

Details

1. Introduction to Free Software

We start of with our regular discussion on the concepts and philosophy of the Free Software Movement and related topics.

2. Agenda : Forensics with Ext4

Finding out more about File system vulnerability detection tools to understand the file system compromises and tools, the benefits of being protected will be discussed. File system attacks can be minimised by file
system analysis & security measures.

3. Technical Discussions

Attendees will discuss and/or present topics of interest. They will share their knowledge by handling small sessions to make up the Technical Session part of the Meeting.

4. Q&A Session

This would be used to answer doubts that users have concerning Free Software.

We look forward to your participation for this exciting meeting. Hope to meet you all on Sunday.

Thank You

Regards
Co-ordinator
Indian Libre User Group, Cochin

Uncategorized

December 2012 Meeting Details

January 8th, 2013

IMG_1009
IMG_1012
IMG_1007
IMG_0999
IMG_0990
IMG_0987
The meeting of the “Indian Libre User Group” was successfully held on December 23rd 2012

Date: 23-12-2012

Time: 2:00pm – 5.30pm
Venue: Internet Club, IInd Floor,
AMI Trust Building,Broadway Enclave,
Broadway, Ernakulam

2.30pm – 2.45pm

Customary Self Introduction. People shared their experience with Free Software.

2.45pm – 3.45pm – Session by G.Venkit Subramanian

A botnet is a collection of internet-connected computers whose security defenses have been breached and control ceded to a 3rd party. Each such compromised device, known as a “bot”, is created when a computer is penetrated by software from a malware distribution; otherwise known as malicious software. The controller of a botnet is able to direct the activities of these compromised computers through communication channels formed by standards-based network protocols such as IRC (Internet Relay Chat) and HTTP (Hypertext Transfer Protocol).

Types of attacks

1. In distributed denial-of-service attacks, multiple systems submit as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests. An example is an attack on a victim’s phone number. The victim is bombarded with phone calls by the bots, attempting to connect to the internet.

2. Adware advertises a commercial offering actively and without the user’s permission or awareness, for example by replacing banner ads on web pages with those of another advertiser.

3. Spyware is software which sends information to its creators about a user’s activities – typically passwords, credit card numbers and other information that can be sold on the black market. Compromised machines that are located within a corporate network can be worth more to the bot herder, as they can often gain access to confidential corporate information. Several targeted attacks on large corporations aimed to steal sensitive information, such as the Aurora botnet.

4. E-mail spam are e-mail messages disguised as messages from people, but are either advertising,annoying, or malicious.

5. Click fraud occurs when the user’s computer visits websites without the user’s awareness to create false web traffic for personal or commercial gain.

6. Brute-forcing remote machines services such as FTP, SMTP and SSH.

Countermeasures

The geographic dispersal of botnets means that each recruit must be individually identified/corralled/repaired and limits the benefits of filtering. Passive OS fingerprinting can identify attacks: network administrators can configure newer firewall equipment to take action on a botnet attack by using information obtained from passive OS fingerprinting. The most serious preventive measures use rate-based intrusion prevention systems using specialized hardware. A network based intrusion detection system (NIDS) can be effective. NIDS monitors a network: it sees a protected host in terms of external interfaces to the rest of the network, rather than as a single system, and gets results by network packet analysis.

3.45pm – 4.30pm- Session by Joseph John

Alfresco is a Free/Libre enterprise content management system for Microsoft Windows and Unix-like operating systems. Alfresco comes in three flavors. Alfresco Community Edition is free software, LGPL licensed open source and open standards. Alfresco Enterprise Edition is commercially & proprietary licensed open source, open standards and enterprise scale. Its design is geared towards users who require a high degree of modularity and scalable performance. Alfresco Cloud Edition (Alfresco in the cloud) is the SaaS version of Alfresco.

Features

Alfresco is capable of the following:

1.Document Management
2.Web Content Management (including full webapp & session virtualization)
3.Repository-level versioning (similar to Subversion)
4.Transparent overlays (similar to unionfs)
5.Records Management, including 5015.2 certification
6.Image Management
7.Learning Content Management support for Learning Management Systems (e.g. Moodle)
8.LOR Learning Object Repository (edu-sharing)
9.Auto-generated XForms with AJAX support
10.Integrated Publishing
11.Repository access via CIFS/SMB, FTP, WebDAV, NFS and CMIS
12.Activities workflow
13.Lucene search
14.Federated servers
15.Multi-language support
16.Portable application packaging
17.Multi-platform support (officially Windows, GNU/Linux and Solaris)
18.Browser-based GUI (official support for Internet Explorer and Firefox)
19.Desktop integration with Microsoft Office, OpenOffice.org and LibreOffice.
20.Clustering support

4.30pm – 5.30pm – Session by Sooraj

Sooraj shared his experience with free software and photography related tools coming with special reference to Phatch, hugin, some Raw Processing tools, GIMP and its plugins.

Concluding Session

People were requested to handle small technical discussions for the next meeting.

Thanks to all the attendees for coming and they are requested to put their feedback on the mailing list so that we can improve future meetings

The next user meet is on 27th January 2013

Meetings