Ottawa Valley SAGE

Providing a forum since 1998

Mar 7, 2011 - 1 minute read

BSDCan 2011 is coming...

BSDCan, a BSD conference held in Ottawa, Canada, has quickly established itself as the technical conference for people working on and with 4.4BSD based operating systems and related projects. The organizers have found a fantastic formula that appeals to a wide range of people from extreme novices to advanced developers.

BSDCan 2011 will be held on 13-14 May 2011 at University of Ottawa, and will be preceded by two days of Tutorials on 11-12 May 2011.

Feb 22, 2011 - 1 minute read

Password Cracking Spreadsheet

I mentioned the password cracking spreadsheet at Sans.org in our last meeting, here is the relevant link:
Password cracking spreadsheet

On the same site there is a discussion on the issue of passwords vs. passphrases and the spreadsheet is mentioned again:
How long to crack a password

Feb 22, 2011 - 1 minute read

Contract job

Got this job ad from one of the agencies I’m in contact with:
Linux admin - contract

Feb 14, 2011 - 1 minute read

February Meeting

Title: February Meeting
Location: Pythian
Link out: Click here
Description: Based on some recent work I have done for a client, I’m going to give a little overview on how to set up a secured file distribution for multiple clients so that you can get away from FTP and you can manage in a simple fashion.

Other topics include:

  • Possible changes to the website to make documentation easier
  • Creating epub books with OpenOffice
  • Open discussion.

Start Time: 19:00
Date: 2011-02-17
End Time: 21:30

Jan 28, 2011 - 2 minute read

A Brief Review of Beautiful Security by Andy Oram and John Viega

no description

Beautiful Security
Cover

Beautiful Security is a collection of essays on security thought from a variety of industry leaders. The sixteen chapters of the book cover a surprisingly wide base of security domains making it worth reading just for the exposure to the wealth of ideas. The fact that the essays are intellectually entertaining is a bonus.

The best sections of this book are the places where some of my long held beliefs get challenged by the chapter author, particularly the issues involved with security in cloud computing. I still have a healthy skepticism for the claims of cloud service providers, but the concept that we will not get any better at securing abstracted compute environments until we start using them is correct. You do not become an expert at something until you invest a significant amount of time and practice into it, so how can we expect to secure these environments unless we use them?