The meeting of the “Indian Libre User Group” was successfully held on December 23rd 2012
Time: 2:00pm – 5.30pm
Venue: Internet Club, IInd Floor,
AMI Trust Building,Broadway Enclave,
2.30pm – 2.45pm
Customary Self Introduction. People shared their experience with Free Software.
2.45pm – 3.45pm – Session by G.Venkit Subramanian
A botnet is a collection of internet-connected computers whose security defenses have been breached and control ceded to a 3rd party. Each such compromised device, known as a “bot”, is created when a computer is penetrated by software from a malware distribution; otherwise known as malicious software. The controller of a botnet is able to direct the activities of these compromised computers through communication channels formed by standards-based network protocols such as IRC (Internet Relay Chat) and HTTP (Hypertext Transfer Protocol).
Types of attacks
1. In distributed denial-of-service attacks, multiple systems submit as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests. An example is an attack on a victim’s phone number. The victim is bombarded with phone calls by the bots, attempting to connect to the internet.
2. Adware advertises a commercial offering actively and without the user’s permission or awareness, for example by replacing banner ads on web pages with those of another advertiser.
3. Spyware is software which sends information to its creators about a user’s activities – typically passwords, credit card numbers and other information that can be sold on the black market. Compromised machines that are located within a corporate network can be worth more to the bot herder, as they can often gain access to confidential corporate information. Several targeted attacks on large corporations aimed to steal sensitive information, such as the Aurora botnet.
4. E-mail spam are e-mail messages disguised as messages from people, but are either advertising,annoying, or malicious.
5. Click fraud occurs when the user’s computer visits websites without the user’s awareness to create false web traffic for personal or commercial gain.
6. Brute-forcing remote machines services such as FTP, SMTP and SSH.
The geographic dispersal of botnets means that each recruit must be individually identified/corralled/repaired and limits the benefits of filtering. Passive OS fingerprinting can identify attacks: network administrators can configure newer firewall equipment to take action on a botnet attack by using information obtained from passive OS fingerprinting. The most serious preventive measures use rate-based intrusion prevention systems using specialized hardware. A network based intrusion detection system (NIDS) can be effective. NIDS monitors a network: it sees a protected host in terms of external interfaces to the rest of the network, rather than as a single system, and gets results by network packet analysis.
3.45pm – 4.30pm- Session by Joseph John
Alfresco is a Free/Libre enterprise content management system for Microsoft Windows and Unix-like operating systems. Alfresco comes in three flavors. Alfresco Community Edition is free software, LGPL licensed open source and open standards. Alfresco Enterprise Edition is commercially & proprietary licensed open source, open standards and enterprise scale. Its design is geared towards users who require a high degree of modularity and scalable performance. Alfresco Cloud Edition (Alfresco in the cloud) is the SaaS version of Alfresco.
Alfresco is capable of the following:
2.Web Content Management (including full webapp & session virtualization)
3.Repository-level versioning (similar to Subversion)
4.Transparent overlays (similar to unionfs)
5.Records Management, including 5015.2 certification
7.Learning Content Management support for Learning Management Systems (e.g. Moodle)
8.LOR Learning Object Repository (edu-sharing)
9.Auto-generated XForms with AJAX support
11.Repository access via CIFS/SMB, FTP, WebDAV, NFS and CMIS
16.Portable application packaging
17.Multi-platform support (officially Windows, GNU/Linux and Solaris)
18.Browser-based GUI (official support for Internet Explorer and Firefox)
19.Desktop integration with Microsoft Office, OpenOffice.org and LibreOffice.
4.30pm – 5.30pm – Session by Sooraj
Sooraj shared his experience with free software and photography related tools coming with special reference to Phatch, hugin, some Raw Processing tools, GIMP and its plugins.
People were requested to handle small technical discussions for the next meeting.
Thanks to all the attendees for coming and they are requested to put their feedback on the mailing list so that we can improve future meetings
The next user meet is on 27th January 2013