Linux demonstrations, advice, and Linux software give-aways! Open to the community; drop by and see what all the talk is about!
Topics and demonstrations:
– Home Networking and Firewalls
– Linux on the Desktop
– Installing and Upgrading Linux
– Linux Applications
– E-business on Linux
– Linux Games and Online Play
– Linux/Apache (Web Serving)
Linux Fest 2000 Press Release in simple HTML
Linux Fest 2000 Press Release in plain text
Linuxfest 2000 Last Call!
A final organizational meeting before Linux Fest.
The magic of PHP
This meeting should be a great follow-up to last month’s meeting where Greg demonstrated the Apache Web server. PHP is a server-side scripting language for creating dynamic Web pages. PHP integrates with Apache and HTML. When a visitor opens a page, the server processes the PHP commands and then sends the results to the visitor’s browser. Very cool. For a more thorough introduction, see:
PHP Web Site: http://www.php.net
PHP Base Library Site: http://phplib.netuse.de
MySQL Web Site: http://www.mysql.com
Thanks to Kris Dahl for sinding in these links!
Apache for the Beginner
An introduction to Apache setup and administration under Red Hat Linux. Greg is a networking instructor at Bellingham Technical College. This is sure to be a popular night!
https://blug.org/photos/greg.jpg – Pic of Greg (please excuse low-light grainyness)
BLUG Y2K Party at Boundary Bay!
Can nerds really have fun? BLUG’s first annual year-end party, where BLUGers can meet in a relaxed atmosphere, have a beer, and talk about their favorite subject–Linux!
VMware is software that runs multiple virtual computers on a single PC–at the same time–without partitioning or rebooting. Really.
Tripwire is a security tool that allows you to monitor the files on your system, and detect any unauthorized changes. It is used as an intrusion detection method, and as a way to clean up a system that has been hacked.
Setting Up a PPP Connection
This somewhat impromptu demonstration involved installing Linux on a box and simulating a connection to another Linux box over a dedicated telephone line using PPP. (Well, with a little help from the audience we got through most of this!)
Getting Hip to Qmail
Qmail is a secure, reliable, efficient, simple message transfer agent. It is meant as a replacement for the entire sendmail-binmail system on typical Internet-connected UNIX hosts.
Secure: Security isn’t just a goal, but an absolute requirement.
Reliable: qmail’s straight-paper-path philosophy guarantees that a message, once accepted into the system, will never be lost.
Replacement for sendmail: qmail supports host and user masquerading, full host hiding, virtual domains, null clients, list-owner rewriting, relay control, double-bounce recording, arbitrary RFC 822 address lists, cross-host mailing list loop detection, per-recipient checkpointing, downed host backoffs, independent message retry schedules, etc. In short, it’s up to speed on modern MTA features. qmail also includes a drop-in “sendmail” wrapper so that it will be used transparently by your current UAs.
Overall performance: What really matters is how well qmail performs with your mail load. Red Hat Software found one day that their mail hub, a 48MB Pentium running sendmail 8.7, was running out of steam at 70000 messages a day. They shifted the load to qmail—on a smaller machine, a 16MB 486/66—and now they’re doing fine.
In my presentation I hope to cover:
* Introduction and explanation of Qmail
* Why use Qmail? (why sendmail is not the best thing to use)
* How to install Qmail
* Installing a mailing list manager to go along with Qmail
* Configuring your POP3 and IMAP services to understand Qmail
What is Coda?
In a situation where a single computer is used, all files are often stored on the local disk. When the computer is part of a network of workstations, it is often advantageous to have the workstations share files across the network. This talk will explore network-based file systems and give an introduction to the distributed file system called Coda. Coda will be demonstrated using several networked PCs.
Linux Security Tools I: nmap and ssh
John’s suggested URLs are located at: http://www.peakserv.com/blug/security.html
This is the first installment of a series of presentations on the subject of running a secure Linux system. This meeting we will go over the use of nmap, a network port scanner, and ssh, a more secure replacement for telnet and ftp. Future sessions are planned for tripwire and other tools.
nmap, a tool often used by crackers, allows a system administrator to create a “security profile” of services that are running on a system. These services are potential entry points for intruders and need special care in configuration and prompt updateing when security bugs are found. Old versions of software with known holes are a MAJOR source of system breakins.
Telnet and ftp were two of the first tools developed on the early DARPANET, and are still widely used by sys admins today. But they have a major security hole, that send passwords over the net in CLEAR TEXT! ssh provides a replacement for these programs that uses RSH keys for authentication and encryption for privacy. We will go over how to setup and use ssh on linux.