FOSDEM 2018 Schedule

Total Page:16

File Type:pdf, Size:1020Kb

FOSDEM 2018 Schedule FOSDEM 2018 - Saturday 2018-02-03 (1/15) Janson K.1.105 (La H.2215 (Ferrer) H.1301 (Cornil) H.1302 (Depage) H.1308 (Rolin) H.1309 (Van Rijn) H.2111 Fontaine)… 09:30 Welcome to FOSDEM 2018 09:45 10:00 Consensus as a Service 10:15 10:30 The path to Data-plane The State of Go video - It's a lot more micro-services than just a HTML5 tag 10:45 11:00 Next Generation Python 3: 10 years later OpenDaylight as a De-mystifying Advanced Go debugging Internet Initiative Platform for Network contributing to with Delve Programmability PostgreSQL 11:15 11:30 Ligato: a platform for Networking deepdive Rendering of subtitles in development of cloud- HTML5 with imscJS native VNFs 11:45 12:00 Unix Architecture Surviving in an Open Easy GnuPG Networking-VPP PostgreSQL -- A Crash Testing and Automation An update on VLC and Evolution from the 1970 Source Niche: the Course in the Era of Containers the VideoLAN PDP-7 to the 2018 Pythran case community FreeBSD 12:15 BulletinBoard DHT and wireguard-p2p 12:30 ONAP – A road to Upspin and a future of Kodi v18 features and network automation ↴ the Internet ↴ improvements ↴ Nakadi Event Broker ↴ 12:45 FOSDEM 2018 - Saturday 2018-02-03 (2/15) H.2213 H.2214 H.3227 H.3228 AW1.120 AW1.121 AW1.125 AW1.126 09:30 09:45 10:00 10:15 10:30 A real life story about Cypher: An evolving Status of the Apache CANCELLED Simulating Arrival & Informal Everything is a device! product testing with query language for ODF Toolkit (incubating) Multilevel Caches in Discussions robotframework property graphs Cachegrind 10:45 Working in the ODF TC 11:00 Valgrind register Welcome allocator overhaul An Introduction to Ada GPU resource Improvements around for Beginning and multiplexing in 11:15 Cypher for Apache document signatures Experienced component based Spark and encryption Programmers systems Piece of cake 11:30 Valgrind's Memcheck tool vs Optimising Documentation Compilers 11:45 convergence project for Hurd's PCI arbiter LibreOffice 12:00 The Computer Science GNU Radio Meeting ↴ Anatomy of the Making the behind a modern OpenOffice localization Ada_Drivers_Library: distributed data store process Embedded Programming with Ada 12:15 Advanced testing in Antipatterns in gdb tools: duel and action on a Java project OpenOffice Code @PrettyPrinter ↴ Live sculpting a 12:30 ↴ Genode-based operating system ↴ 12:45 Analzying Blockchain … FOSDEM 2018 - Saturday 2018-02-03 (3/15) K.3.201 K.3.401 K.4.201 K.4.401 K.4.601 UA2.114 (Baudoux) UA2.118 (Henriot) UA2.220 (Guillissen) 09:30 09:45 10:00 10:15 10:30 Pulp 3 - Simpler, Better, The FreeBSD Foundation FOSS/H EDA tools for Graphics Performance Community DevRoom Mozilla Open Source More awesome and How We Are SPICE modeling Analysis with Welcoming Remarks Support (MOSS) Changing the World FrameRetrace 10:45 Italy: the most hacker- friendly country? 11:00 Packaging C/C++ Gnucap, and analog and Intel GFX CI and IGT Creating Inclusive libraries with Conan NetBSD and Mercurial mixed signal simulation Teams in Tech 11:15 Media 101 for Communities 11:30 The package bazaars WebExtensions API and the cathedrals status after Firefox 57 11:45 Software Philanthropy BSD from scratch - from ARB_gl_spirv: bringing for Everyone 12:00 Open Build Service in source to OS with ease Tutorial: my first FPGA SPIR-V to Mesa OpenGL A tour with Firefox' Debian on NetBSD design developer tools ↴ 12:15 Your Open Source Community Metrics 12:30 Introduction to Flatpak Graphic design tools for Should be Tracking More than Code ↴ pot: another container Open Source FPGAs ↴ framework based on 12:45 jails and ZFS ↴ FOSDEM 2018 - Saturday 2018-02-03 (4/15) UB2.147 UB2.252A (Lameere) UD2.119 UD2.120 (Chavanne) UD2.208 (Decroly) UD2.218A UD2.Corridor J1.106 09:30 09:45 10:00 10:15 Welcome! 10:30 BSDCG Exam Session Convergence of your Migrating to Red Hat Declarative Extensions The State of OpenJDK Global Diversity CFP virtualization and IdM in a large Linux for Kubernetes in Go Day ↴ container Environment infrastructures with 10:45 KubeVirt 11:00 The free toolchain for the STM8 Performance Analysis 11:15 A slightly different Æ-DIR -- Authorized and Troubleshooting nesting: KVM on Hyper- Entities Directory Methodologies for The OpenJDK Developer V Databases Experience 11:30 Building RT Linux distribution with Yocto 11:45 freeIPA installation using Monitoring Legacy Java AMENDMENT JVM Ansible Applications with Futures 12:00 Will it blend? Prometheus How to keep your embedded Linux up and running? ↴ 12:15 The Z Garbage Collector Easily Secure Your Front - An Introduction 12:30 and Back End app with Google’s approach to Keycloak ↴ distributed systems observability for Go ↴ 12:45 Securing Embedded Sys… FOSDEM 2018 - Saturday 2018-02-03 (5/15) K.Level.2 09:30 09:45 10:00 10:15 10:30 10:45 11:00 11:15 11:30 11:45 12:00 12:15 12:30 12:45 FOSDEM 2018 - Saturday 2018-02-03 (6/15) Janson K.1.105 (La H.2215 (Ferrer) H.1301 (Cornil) H.1302 (Depage) H.1308 (Rolin) H.1309 (Van Rijn) H.2111 Fontaine)… ↳ Nakadi Event Broker… ↳ ONAP – A road to ↳ Upspin and a future of ↳ Kodi v18 features a… network automation the Internet 13:00 The circuit less traveled Lift your Speed Limits Connecting the Edge NFV a' la VDE way PostgreSQL Replication Dep Deep Dive! What's new in with Cython in 2018 GStreamer? 13:15 PBX on a non- specialized distro 13:30 Integrating cloud and Networking Swiss Army Update on GStreamer container projects in the Knife for Go for Embedded Devices Urbit: the personal OPNFV community: Cross Community CI 13:45 server 14:00 Digital Archaeology Load testing web Making electronics Barometer: Taking the JITing PostgreSQL using The case for interface{} Modern tools to debug services at Mozilla with pressure off of LLVM GStreamer applications Molotov assurance and resource contention scenarios for 14:15 NFVI Introduction into the ppci project 14:30 The challenges of XDP Google’s approach to What's new in Upipe hardware offload distributed systems i3 window manager observability for Go 14:45 15:00 Reimagining EDSAC in Configuration Godot 3, libre gamedev Fast Packet Processing Blue elephant on- Creating GopherJS Apps GPAC: Support for High open source Revolution for everyone in Linux with AF_XDP demand: Postgres + with gRPC-Web Efficiency Image Format Kubernetes (HEIF) 15:15 i++: run your FOSS off 15:30 netmdev: mediated Building and testing a Matroska Low-Latency net_device distributed data store in streaming AMENDMENT DRLM in Go 15:45 Action! 16:00 MySQL: Scaling & High IPC in 1-2-3 ↴ Starviewer: FOSS How to write your own The Fabulous Destiny of Computer Vision Using RAWcooked ↴ Availability Produc… DICOM Medical Imaging NIC device driver (… 00000002000000080… Go And OpenCV ↴ So… FOSDEM 2018 - Saturday 2018-02-03 (7/15) H.2213 H.2214 H.3227 H.3228 AW1.120 AW1.121 AW1.125 AW1.126 ↳ Advanced testing in ↳ Analzying Blockchain ↳ GNU Radio Meeting BaseDocumenter ↳ gdb tools: duel and ↳ Live sculpting a action on a Java project transactions in Apache @PrettyPrinter Genode-based 13:00 Spark Shared Memory operating system Debug your build by Parallelism in Ada: Load tracing and reversing Balancing by Work Stealing 13:15 Load testing with Locust 13:30 G-CORE: The LDBC Accessibility 101 (not Ada, or How to Enforce Graph Query Language only) for LibreOffice Safety Rules at Compile Microkernels in the Era Proposal developers Time of Data-Centric 13:45 Computing Maintaining accessibility strace: new features through testing? 14:00 Contract-based Programming: a Route Simplifying the Maximizing UX for to Finding Bugs Earlier 14:15 contribution process for Efficient Graph Customizing both contributors & Algorithms in Neo4j maintainers Debugging realtime 14:30 Proposal for better font application with Ftrace Reducing CPU usage of handling in LibreOffice a Toro Appliance 14:45 Native GTK3 UI DTrace for Linux 15:00 Handling Billions Of SPARK Language: Testing and Validating Edges in a Graph Historical Perspective & distributed systems Database LO URI 101 FOSS Development Rust On L4Re 15:15 15:30 Hidden Gems in AMENDMENT DWARF 15:45 It's a Trie... it's a Draw/Impress Part 2 Pieces And Other Graph... it's a Traph! ↴ DWARF Location Woes ↴ AMENDMENT Lightning 16:00 Testing Red Hat Calc: The challenges of Writing REST APIs with talks ↴ Enterprise Linux the scalable arithmet… OpenAPI and Swagge… Micr… FOSDEM 2018 - Saturday 2018-02-03 (8/15) K.3.201 K.3.401 K.4.201 K.4.401 K.4.601 UA2.114 (Baudoux) UA2.118 (Henriot) UA2.220 (Guillissen) ↳ Introduction to ↳ pot: another ↳ Graphic design tool… A pixel format guide to Community Karoke ↳ A tour with Firefox' Flatpak container framework the galaxy developer tools 13:00 Package quality based on jails and ZFS Funny digital electronics Tomorrow's JavaScript assurance with Open Source FPGAs Debugger 13:15 Nouveau Passing the Baton: 13:30 How compilers affect CBSD, Isolation The open source EDA Succession planning for Making a browser fast dependency resolution manager tool chain for the FOSS leadership in Spack Chips4Makers project 13:45 Mir 2018 What community can 14:00 Package management Automated system learn from marketing Firefox: How to ship over Tor partitioning based on quality software hypergraphs for 3D stacked integrated 14:15 circuits pkgsrc on ChromeOS You’ve Got Some 14:30 The many ways of using KiCad Version 5 New Explaining to Do! So Photon Performance Guix packages Feature Demo Use An FAQ! 14:45 Generic Graphics Tablets in Linux Technical Writing for 15:00 Package Management syspatch(8) Designing PCBs with Non-Writers The future of the Unites Us All code internet from a Mozilla perspective 15:15 A
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • N2N: a Layer Two Peer-To-Peer VPN
    N2N: A Layer Two Peer-to-Peer VPN Luca Deri1, Richard Andrews2 ntop.org, Pisa, Italy1 Symstream Technologies, Melbourne, Australia2 {deri, andrews}@ntop.org Abstract. The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by enormous and heterogeneous economic interests, it has become a constrained network severely enforcing client-server communication where addressing plans, packet routing, security policies and users’ reachability are almost entirely managed and limited by access providers. From the user’s perspective, the Internet is not an open transport system, but rather a telephony-like communication medium for content consumption. This paper describes the design and implementation of a new type of peer-to- peer virtual private network that can allow users to overcome some of these limitations. N2N users can create and manage their own secure and geographically distributed overlay network without the need for central administration, typical of most virtual private network systems. Keywords: Virtual private network, peer-to-peer, network overlay. 1. Motivation and Scope of Work Irony pervades many pages of history, and computing history is no exception. Once personal computing had won the market battle against mainframe-based computing, the commercial evolution of the Internet in the nineties stepped the computing world back to a substantially rigid client-server scheme. While it is true that the today’s Internet serves as a good transport system for supplying a plethora of data interchange services, virtually all of them are delivered by a client-server model, whether they are centralised or distributed, pay-per-use or virtually free [1].
    [Show full text]
  • A Generic Data Exchange System for F2F Networks
    The Retroshare project The GXS system Decentralize your app! A Generic Data Exchange System for F2F Networks Cyril Soler C.Soler The GXS System 03 Feb. 2018 1 / 19 The Retroshare project The GXS system Decentralize your app! Outline I Overview of Retroshare I The GXS system I Decentralize your app! C.Soler The GXS System 03 Feb. 2018 2 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows, (+ Android). C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows. C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows. C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows.
    [Show full text]
  • Microkernel Construction Introduction
    Microkernel Construction Introduction Nils Asmussen 04/09/2020 1 / 32 Normal Organization Thursday, 4th DS, 2 SWS Slides: www.tudos.org ! Studies ! Lectures ! MKC Subscribe to our mailing list: www.tudos.org/mailman/listinfo/mkc2020 In winter term: Microkernel-based operating systems (MOS) Various labs 2 / 32 Organization due to COVID-19 Slides and video recordings of lectures will be published Questions can be asked on the mailing list Subscribe to the mailing list! Practical exercises are planed for the end of the semester Depending on how COVID-19 continues, exercises are in person or we use some video-conferencing tool 3 / 32 Goals 1 Provide deeper understanding of OS mechanisms 2 Look at the implementation details of microkernels 3 Make you become enthusiastic microkernel hackers 4 Propaganda for OS research done at TU Dresden and Barkhausen Institut 4 / 32 Outline Organization Monolithic vs. Microkernel Kernel design comparison Examples for microkernel-based systems Vision vs. Reality Challenges Overview About L4/NOVA 5 / 32 Monolithic Kernel System Design u s Application Application Application e r k Kernel e r File Network n e Systems Stacks l m Memory Process o Drivers Management Management d e Hardware 6 / 32 Monolithic Kernel OS (Propaganda) System components run in privileged mode No protection between system components Faulty driver can crash the whole system Malicious app could exploit bug in faulty driver More than 2=3 of today's OS code are drivers No need for good system design Direct access to data structures Undocumented
    [Show full text]
  • Escaping the Ossification Trap with Gnunet
    Escaping the Ossification Trap with GNUnet Christian Grothoff BFH & The GNU Project 25.1.2018 \We shape our tools, and thereafter our tools shape us". {John Culkin What can be done? I Democracies are slow ) Effective regulation of mega-corporations exists only under dictatorships Dictatorship or Corpocracy? Regulation? I Charles Stross (@34c4) warns: Companies are AIs that develop faster than the law I Julia Reda (@IGF) warns: Regulation of platforms paradoxically can give them more power Regulation? I Charles Stross (@34c4) warns: Companies are AIs that develop faster than the law I Julia Reda (@IGF) warns: Regulation of platforms paradoxically can give them more power I Democracies are slow ) Effective regulation of mega-corporations exists only under dictatorships Dictatorship or Corpocracy? Better Technology! Data protection! Decentralization! Self-Organization! Technological impact assessment!1 1Difficult, but better than design-by-buzzword! Technological impact assessment case-study: Name systems DNS/DNSSEC DNS Server Root Zone a.root-servers.net. www.example.com? a.gtld-servers.net.test E2D3C9.... DNSSEC Trust Anchor NS . S4LXnQiBS... 49AAC1... DS RRSIG www.example.com? Recursive DNS Server Stub www.example.com? Name .com Resolver Server NS a.gtld-servers.net.test a.gtld-servers.net. A 93.184.216.119 DS 3490A6.... RRSIG example.com. K0rp9n... RRSIG com. U/ZW6P3c... AD www.example.com? RRSIG A 93.184.216.119 example.com. K0rp9n... DNS Server example.com a.iana-servers.net. RAINS Authority Server Root Zone 44 ) com ZK ; :registry www.example.com?
    [Show full text]
  • Can Microkernels Mitigate Microarchitectural Attacks?⋆
    Can Microkernels Mitigate Microarchitectural Attacks?? Gunnar Grimsdal1, Patrik Lundgren2, Christian Vestlund3, Felipe Boeira1, and Mikael Asplund1[0000−0003−1916−3398] 1 Department of Computer and Information Science, Link¨oping University, Sweden ffelipe.boeira,[email protected] 2 Westermo Network Technologies [email protected] 3 Sectra AB, Link¨oping,Sweden Abstract. Microarchitectural attacks such as Meltdown and Spectre have attracted much attention recently. In this paper we study how effec- tive these attacks are on the Genode microkernel framework using three different kernels, Okl4, Nova, and Linux. We try to answer the question whether the strict process separation provided by Genode combined with security-oriented kernels such as Okl4 and Nova can mitigate microar- chitectural attacks. We evaluate the attack effectiveness by measuring the throughput of data transfer that violates the security properties of the system. Our results show that the underlying side-channel attack Flush+Reload used in both Meltdown and Spectre, is effective on all in- vestigated platforms. We were also able to achieve high throughput using the Spectre attack, but we were not able to show any effective Meltdown attack on Okl4 or Nova. Keywords: Genode, Meltdown, Spectre, Flush+Reload, Okl4, Nova 1 Introduction It used to be the case that general-purpose operating systems were mostly found in desktop computers and servers. However, as IoT devices are becoming in- creasingly more sophisticated, they tend more and more to require a powerful operating system such as Linux, since otherwise all basic services must be im- plemented and maintained by the device developers. At the same time, security has become a prime concern both in IoT and in the cloud domain.
    [Show full text]
  • Operating System Support for Run-Time Security with a Trusted Execution Environment
    Operating System Support for Run-Time Security with a Trusted Execution Environment - Usage Control and Trusted Storage for Linux-based Systems - by Javier Gonz´alez Ph.D Thesis IT University of Copenhagen Advisor: Philippe Bonnet Submitted: January 31, 2015 Last Revision: May 30, 2015 ITU DS-nummer: D-2015-107 ISSN: 1602-3536 ISBN: 978-87-7949-302-5 1 Contents Preface8 1 Introduction 10 1.1 Context....................................... 10 1.2 Problem....................................... 12 1.3 Approach...................................... 14 1.4 Contribution.................................... 15 1.5 Thesis Structure.................................. 16 I State of the Art 18 2 Trusted Execution Environments 20 2.1 Smart Cards.................................... 21 2.1.1 Secure Element............................... 23 2.2 Trusted Platform Module (TPM)......................... 23 2.3 Intel Security Extensions.............................. 26 2.3.1 Intel TXT.................................. 26 2.3.2 Intel SGX.................................. 27 2.4 ARM TrustZone.................................. 29 2.5 Other Techniques.................................. 32 2.5.1 Hardware Replication........................... 32 2.5.2 Hardware Virtualization.......................... 33 2.5.3 Only Software............................... 33 2.6 Discussion...................................... 33 3 Run-Time Security 36 3.1 Access and Usage Control............................. 36 3.2 Data Protection................................... 39 3.3 Reference
    [Show full text]
  • Greetings from Slackbuilds.Org
    Greetings from SlackBuilds.org David Spencer pkgsrcCon 2017 About SBo 11 years old conventional ports-inspired setup ● from source ftw ● shell script + metadata ~6500 packages disjoint from core Slackware (~1400 packages) lightweight project one new server, one old server About SBo ~250 maintainers active in last year ~12500 commits in last year no bugtracker no CI ● Infrastructure is a productivity killer ● Aggressively reductionist on dep management ● Vanilla from upstream, patch only when needed ● Don’t split packages ● git git baby About SBo submissions are open ambition to submit ‘something’ is a thing maintainers drop in and drop out review must be sympathetic volunteers are a pipeline not a funnel don’t crush people’s dreams maintainer is expert on the software reviewer (admin) is expert on good packaging no room for style variations About SBo Education needs to be a thing No time in review feedback hurts, doesn’t scale Currently done on mailing list & forum ● CI as education Listening systemd refugees rolling release ● stable versus current out of date / security / unmaintained upstream disappearing SBo maintainers disappearing sources and projects ● repology ● keeps mailing list active Happy community Users helping each other Tools Satellite projects Package all the obscure things ● if it exists it will attract users Unopened letter to the world Need to educate upstreams proper releases with proper tarballs don’t move or delete old tarballs learn to write a decent Makefile no, I don’t want your stinking CFLAGS don’t use -Werror
    [Show full text]
  • Guide to Retroshare Tor Or I2P Routing Update Some Quick Notes To
    A Guide to Retroshare Tor or I2P routing Update Some quick notes to supplement the existing Help Guides for setting up Retroshare Regular and Hidden Nodes routed via Tor and/or I2P. Snapshot in this update 1) Point out the torrc exit node command is not needed for Regular and Hidden Node Retroshare Tor routing with torrc examples. 2) Steps, guides for setting up multiple Tor binary folders each using a different Socks Port for concurrent TorS applications to enable different specific listening ports, Tor proxys. 3) Guide for setting up a I2P 4/4a/5 client tunnel and need to turn off unused I2P default tunnels. Retroshare Regular nodes using the optional Tor proxy client does not need nor use any Tor Exit Nodes. Unless you are using the same Tor binary for applications which require a Exit Node to clearnet such as with a FeedReader RSS server or website, do not include Exit Node commands in your Tor torrc file. Retroshare Regular Node using the optional Tor Proxy client Working Torrc Example (adjust the file paths for your needs, system) # This file was generated by Tor; if you edit it, comments will not be preserved # The old torrc file was renamedm to torrc.orig.1 or similar, and Tor will ignore it DataDirectory /usr/local/etc/tor GeoIPFile /usr/local/etc/tor/geoip GeoIPv6File /usr/local/etc/tor/geoip6 SocksPort 9050 Retroshare Hidden nodes routed solely to and inside the Tor Network should not have any Exit Node commands in your Tor torrc file. Working example of a Retroshare Hidden node operating as a Tor Hidden Service torrc file # This file was generated by Tor; if you edit it, comments will not be preserved # The old torrc file was renamed to torrc.orig.1 or similar, and Tor will ignore it DataDirectory /usr/local/etc/tor GeoIPFile /usr/local/etc/tor/geoip GeoIPv6File /usr/local/etc/tor/geoip6i HiddenServiceDir /home/name/hideserv HiddenServicePort 11040 127.0.0.1:13080 SocksPort 9050 Running Multiple concurrentt applications routing each through the tor network as a Tor proxy client or as a Tor hidden service.
    [Show full text]
  • N2N: a Layer Two Peer-To-Peer VPN
    N2N: A Layer Two Peer-to-Peer VPN Luca Deri1 and Richard Andrews2 1 ntop.org, Pisa, Italy 2 Symstream Technologies, Melbourne, Australia {deri,andrews}@ntop.org Abstract. The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by enormous and heterogeneous economic interests, it has become a constrained network severely enforcing client-server communication where addressing plans, packet routing, security policies and users’ reachability are almost entirely managed and limited by access providers. From the user’s perspective, the Internet is not an open transport system, but rather a telephony-like communication medium for content consumption. This paper describes the design and implementation of a new type of peer- to-peer virtual private network that can allow users to overcome some of these limitations. N2N users can create and manage their own secure and geographically distributed overlay network without the need for central administration, typical of most virtual private network systems. Keywords: Virtual private network, peer-to-peer, network overlay. 1 Motivation and Scope of Work Irony pervades many pages of history, and computing history is no exception. Once personal computing had won the market battle against mainframe-based computing, the commercial evolution of the Internet in the nineties stepped the computing world back to a substantially rigid client-server scheme. While it is true that the today’s Internet serves as a good transport system for supplying a plethora of data interchange services, virtually all of them are delivered by a client-server model, whether they are centralised or distributed, pay-per-use or virtually free [1].
    [Show full text]
  • Messenger App for Linux Download Install and Access Facebook Messenger on Linux Desktop
    messenger app for linux download Install and Access Facebook Messenger on Linux Desktop. linuxmessenger app is a “ Facebook-like ” client for Linux desktop was written in Python language. It allows you to login to your Facebook account right from the command line without installing it on your system and have chat with your loved ones with much a like a Facebook interface. If you want, you can install it as a desktop client. This application has some built-in features like desktop notifications , pop-up alert , friends request and chat sound (with On/Off options). Facebook Messenger for Linux. Installing Facebook Messenger. The installation is very straightforward, simply open the terminal and install python3 , PyQt4 dependencies packages required by the application to run. Next, download the linuxmessenge r zip file from the github page, using wget command. Once downloaded, extract it to your desired directory or home directory. You should get the folder similar to “ linuxmessenger-master ”. To verify, whether application is working, Go to the extracted folder “ linuxmessenger-master ” and run the “ fbmessenger ” script file. A “ Facebook Messenger ” window opens, Enter your Facebook login credentials and chat with your friends. Facebook Messenger in Ubuntu 13.10. If you would like to install this application as a desktop client, simply run the “ setup.py ” script or you just execute the “ fbmessenger ” from the terminal and have everything as desktop client. There are also builds for RPM based and Debian distributions, so you can install and build it on most distro. As I said the script written in Python language, so it should work on all Linux platforms as long as required dependencies packages are fulfilled.
    [Show full text]
  • KOS - Principles, Design, and Implementation
    KOS - Principles, Design, and Implementation Martin Karsten, University of Waterloo Work In Progress - September 29, 2015 Abstract KOS is an experimental operating system kernel that is designed to be simple and accessible to serve as a platform for research, experimen- tation, and teaching. The overall focus of this project is on system-level infrastructure software, in particular runtime systems. 1 Introduction KOS (pronounce "Chaos") is an experimental operating system kernel that is designed to be simple and accessible to serve as a platform for research, ex- perimentation, and teaching. It is focused on building a nucleus kernel that provides the basic set of operating system functionality, primarily for resource mediation, that must realistically be implemented for execution in privileged mode. While being simple KOS is not simplistic and avoids taking design shortcuts that would prohibit adding more sophisticated resource management strategies later on { inside the kernel or at higher software layers. The nu- cleus kernel is augmented with several prototype subsystems typically found in an operating system to eventually support running realistic applications. The entire code base is written in C++, except for small assembler parts. The C++ code makes use of advanced language features, such as code reuse with efficient strong type safety using templates, the C++ library for data struc- ture reuse, as well as (limited) polymorphism. Existing open-source software is reused for non-nucleus subsystems as much as possible. The project is hosted at https://git.uwaterloo.ca/mkarsten/KOS 2 Motivation In principle, an operating system has two basic functions. First, it consolidates low-level hardware interfaces and provides higher-level software abstractions to facilitate and alleviate application programming.
    [Show full text]