Search results

Jump to navigation Jump to search
  • ==Security== ===Key security areas on Friday===
    1 KB (210 words) - 17:09, 1 September 2011
  • * Security needs * Security Needs
    1 KB (145 words) - 09:57, 7 May 2011
  • **[[Security]]
    473 bytes (47 words) - 13:58, 25 August 2013
  • ...agazine.com> she covers Linux Magazine, Ubuntu Magazine, ADMIN Network and Security, and Smart Developer [[Linux New Media Ad specs]] - '''BOUNCES''' as of 201
    366 bytes (54 words) - 17:32, 22 March 2014
  • ...er of conference organizing committee, local police, hotel security, venue security **email olf-security@ohiolinux.org
    5 KB (714 words) - 17:29, 10 June 2011
  • <td>[http://socialmediasecurity.com/ Social Media Security Podcast]</td><td></td><td>feedback@socialmediasecurity.com</td>
    2 KB (370 words) - 11:26, 17 September 2012
  • ==Security Chair== **Coordinate all security efforts for the conference
    9 KB (1,192 words) - 17:34, 24 February 2022
  • * [http://web2.research.att.com/people/Cheswick_William_R/ Bill Cheswick] - security Packet Filter Firewall AT&T * [http://en.wikipedia.org/wiki/Dan_Geer Dan Geer] security [http://current.com/1mjra4c VIDEO] Microsoft is a monoculture
    11 KB (1,575 words) - 02:07, 10 May 2016
  • ...ntown Toronto. She currently serves on the board of advisors of the SECtor security conference, has served as a Google Summer of Code mentor, and is one of the
    1 KB (225 words) - 12:46, 8 August 2011
  • *Get Overnight Security quote (Katie/GCCC)
    2 KB (232 words) - 16:37, 10 September 2013
  • ...ity wants talks from and for programmers, users, sysadmins, network gurus, security folks, and hobbyists. We need hard technical talks and talks about using FO
    2 KB (305 words) - 23:10, 23 January 2012
  • *I enjoy security topics, vulnerabilities and cryptography. *Cloud computing and thin client configurations. (Virtualization, VPN, Security, and cloud computing configurations)
    8 KB (1,270 words) - 23:54, 24 October 2010
  • * August 14-16 Usenix Security Summit
    2 KB (307 words) - 22:42, 22 February 2015
  • *1 Linux Security Myth (Maco)
    2 KB (282 words) - 23:22, 24 October 2010
  • ** Security chair
    2 KB (327 words) - 13:30, 16 November 2013
  • ...ity wants talks from and for programmers, users, sysadmins, network gurus, security folks, and hobbyists. We need hard technical talks and talks about using FO
    2 KB (427 words) - 17:09, 23 January 2012
  • **Both hearing a good security talk and learning about IPv6
    3 KB (455 words) - 23:14, 24 October 2010
  • *Need (more) security people
    3 KB (485 words) - 20:54, 5 January 2012
  • Beth-Lynn wants to bring on a safety/security chair. May hire a firm if we cannot find an appropriate candidate. * Action Item (Kevin): Call for candidates for security role.
    7 KB (1,040 words) - 20:08, 21 May 2013
  • |Security
    4 KB (578 words) - 20:54, 19 October 2014

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)