{"id":123,"date":"2010-10-07T15:42:05","date_gmt":"2010-10-07T19:42:05","guid":{"rendered":"http:\/\/mail.ale.org\/?p=123"},"modified":"2010-10-08T15:22:59","modified_gmt":"2010-10-08T19:22:59","slug":"ale-central-mtg-for-thursday-oct-21-2010-730pm","status":"publish","type":"post","link":"https:\/\/ale.org\/?p=123","title":{"rendered":"ALE CENTRAL MTG. for Thursday, Oct. 21, 2010"},"content":{"rendered":"<p>Our Featured Presentation at the ALE Central meeting<br \/>\nfor Thursday, Oct. 21, 2010 at 7:30pm will be <strong> <font size=\"+1\"><br \/>\nPractical Server Security Management with SELinux <\/font><br \/>\nas presented by rabid Linux fanboy and security guru,<br \/>\nJames Kinney<\/strong><\/p>\n<p>Synopsis:<br \/>\n&#8212; Running a Linux server with SELinux in enforcing targeted<br \/>\nmode is quite daunting for many, if not most sysadmins.<br \/>\nSELinux  really needs to be a part of the toolkit used to<br \/>\naddress security issues, but a toolkit that admins will use<br \/>\nand not just turn off by default. Over the course of a 1+<br \/>\nhour seminar, we will demonstrate various tools, both gui<br \/>\nand command line, and consider the analysis process for<br \/>\nresolving SELinux  &#8220;Access Denied&#8221; problems on servers<br \/>\nrunning in &#8220;Enforcing Targeted&#8221; mode. If time permits, a<br \/>\nbrief look at the concepts of higher security methods like<br \/>\nMCS and MLS will also be covered.<\/p>\n<p>(Full Frontal) Bio:<br \/>\n&#8212; James (Jim) Kinney became an over-zealous GNU Linux<br \/>\nfanboy the first time he saw a discarded Next Cube running<br \/>\nSlackware in 1992. Several thousand installs later his<br \/>\nenthusiasm has escalated to &#8220;rabidly over-zealous Linux<br \/>\nfanboy advocating for the total world domination process<br \/>\nto speed up!&#8221;  He is actively involved in helping this process<br \/>\nby promoting that &#8220;fdisk solves all windows problems<br \/>\nuniversally&#8221; and that &#8220;apple is one byte shy of a whole fruit&#8221;.<br \/>\n&#8212; In the 18 years since his introduction to Linux goodness,<br \/>\nJames has turned an obsession into a living. First at Emory<br \/>\nUniversity where he converted a Mac lab to Linux (and<br \/>\nultimately used the same lab machines for a proto-type<br \/>\nBeowulf cluster in nice +5 mode so the students wouldn&#8217;t<br \/>\nnotice) and helped co-found LUGE (Linux Users Group of<br \/>\nEmory). Next followed a 10+ year stint as a Linux<br \/>\nconsultant (note to self: windows consultants make money<br \/>\nbecause things break all the time; Linux consultants only<br \/>\nmake money setting things up so they never hear from<br \/>\nthe client again until the next time they want a new<br \/>\nmachine) with a few notable projects like making Linux<br \/>\nsystems run thin clients in schools despite the technical<br \/>\nobstacles and political chaffing, a stint at &#8220;We&#8217;re not evil,<br \/>\nWe just archive EVERYTHING FOREVER&#8221; Google, an<br \/>\nappearance at a travel booking company, and a ride with<br \/>\n&#8220;we wanna be just like Comcast&#8221; Cox Communications,<br \/>\nwhich all led Jim to realize that he really likes craft and<br \/>\nBelgian beer and Linux security systems (and Linux<br \/>\nfanboy activities like trash-talking other OS wannabes<br \/>\nfrom Redmond and Cupertino).<br \/>\n&#8212; Currently at GTRI, Jim works with some really bright<br \/>\npeople who are actively involved in extending SELinux<br \/>\npolicy to protect all aspects of critical path communications. <\/p>\n<p>============================<br \/>\nWe will be meeting in our usual Gambrel Hall room 1C venue.<br \/>\nMeeting time frame is 7:30pm to ~9:30pm<br \/>\nDirections to Emory Law School can be found<br \/>\n<strong><a href=\"http:\/\/mail.ale.org\/?page_id=2\">HERE<\/a><\/strong> (or via the side bar link).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our Featured Presentation at the ALE Central meeting for Thursday, Oct. 21, 2010 at 7:30pm will be Practical Server Security Management with SELinux as presented by rabid Linux fanboy and security guru, James Kinney Synopsis: &#8212; Running a Linux server with SELinux in enforcing targeted mode is quite daunting for many, if not most sysadmins. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-123","post","type-post","status-publish","format-standard","hentry","category-ale-central","category-announcements"],"_links":{"self":[{"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/posts\/123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=123"}],"version-history":[{"count":0,"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/posts\/123\/revisions"}],"wp:attachment":[{"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}