Search results
Jump to navigation
Jump to search
- ==Security== ===Key security areas on Friday===1 KB (210 words) - 17:09, 1 September 2011
- * Security needs * Security Needs1 KB (145 words) - 09:57, 7 May 2011
- **[[Security]]473 bytes (47 words) - 13:58, 25 August 2013
- ...agazine.com> she covers Linux Magazine, Ubuntu Magazine, ADMIN Network and Security, and Smart Developer [[Linux New Media Ad specs]] - '''BOUNCES''' as of 201366 bytes (54 words) - 17:32, 22 March 2014
- ...er of conference organizing committee, local police, hotel security, venue security **email olf-security@ohiolinux.org5 KB (714 words) - 17:29, 10 June 2011
- <td>[http://socialmediasecurity.com/ Social Media Security Podcast]</td><td></td><td>feedback@socialmediasecurity.com</td>2 KB (370 words) - 11:26, 17 September 2012
- ==Security Chair== **Coordinate all security efforts for the conference9 KB (1,192 words) - 17:34, 24 February 2022
- * [http://web2.research.att.com/people/Cheswick_William_R/ Bill Cheswick] - security Packet Filter Firewall AT&T * [http://en.wikipedia.org/wiki/Dan_Geer Dan Geer] security [http://current.com/1mjra4c VIDEO] Microsoft is a monoculture11 KB (1,575 words) - 02:07, 10 May 2016
- ...ntown Toronto. She currently serves on the board of advisors of the SECtor security conference, has served as a Google Summer of Code mentor, and is one of the1 KB (225 words) - 12:46, 8 August 2011
- *Get Overnight Security quote (Katie/GCCC)2 KB (232 words) - 16:37, 10 September 2013
- ...ity wants talks from and for programmers, users, sysadmins, network gurus, security folks, and hobbyists. We need hard technical talks and talks about using FO2 KB (305 words) - 23:10, 23 January 2012
- *I enjoy security topics, vulnerabilities and cryptography. *Cloud computing and thin client configurations. (Virtualization, VPN, Security, and cloud computing configurations)8 KB (1,270 words) - 23:54, 24 October 2010
- * August 14-16 Usenix Security Summit2 KB (307 words) - 22:42, 22 February 2015
- *1 Linux Security Myth (Maco)2 KB (282 words) - 23:22, 24 October 2010
- ** Security chair2 KB (327 words) - 13:30, 16 November 2013
- ...ity wants talks from and for programmers, users, sysadmins, network gurus, security folks, and hobbyists. We need hard technical talks and talks about using FO2 KB (427 words) - 17:09, 23 January 2012
- **Both hearing a good security talk and learning about IPv63 KB (455 words) - 23:14, 24 October 2010
- *Need (more) security people3 KB (485 words) - 20:54, 5 January 2012
- Beth-Lynn wants to bring on a safety/security chair. May hire a firm if we cannot find an appropriate candidate. * Action Item (Kevin): Call for candidates for security role.7 KB (1,040 words) - 20:08, 21 May 2013
- |Security4 KB (578 words) - 20:54, 19 October 2014