BSDCan, a BSD conference held in Ottawa,
Canada, has quickly established itself as the technical conference for
people working on and with 4.4BSD based operating systems and related
projects. The organizers have found a fantastic formula that appeals to
a wide range of people from extreme novices to advanced developers.
BSDCan 2011 will be held on 13-14 May 2011 at University of Ottawa,
and will be preceded by two days of Tutorials on 11-12 May 2011.
I mentioned the password cracking spreadsheet at Sans.org in our last
meeting, here is the relevant link:
Password cracking spreadsheet
On the same site there is a discussion on the issue of passwords vs.
passphrases and the spreadsheet is mentioned again:
How long to crack a password
Got this job ad from one of the agencies I’m in contact with:
Linux admin - contract
Title: February Meeting
Location: Pythian
Link out:
Click here
Description: Based on some recent work I have done for a client,
I’m going to give a little overview on how to set up a secured file
distribution for multiple clients so that you can get away from FTP and
you can manage in a simple fashion.
Other topics include:
- Possible changes to the website to make documentation easier
- Creating epub books with OpenOffice
- Open discussion.
Start Time: 19:00
Date: 2011-02-17
End Time: 21:30
no description

Beautiful Security is a collection of essays on security thought from a
variety of industry leaders. The sixteen chapters of the book cover a
surprisingly wide base of security domains making it worth reading just
for the exposure to the wealth of ideas. The fact that the essays are
intellectually entertaining is a bonus.
The best sections of this book are the places where some of my long held
beliefs get challenged by the chapter author, particularly the issues
involved with security in cloud computing. I still have a healthy
skepticism for the claims of cloud service providers, but the concept
that we will not get any better at securing abstracted compute
environments until we start using them is correct. You do not become an
expert at something until you invest a significant amount of time and
practice into it, so how can we expect to secure these environments
unless we use them?