[Bradford] Venue change (and reminder): MFS Meeting. Tue, 20 Nov. "NCSC End User Device security - Installer. AppArmor+auditd. GRUB."
Michael Dorrington
michael.dorrington at member.fsf.org
Mon Nov 19 16:46:18 UTC 2018
The meeting tomorrow (Tuesday) has changed venue to:
Pioneer Cafe, Upper Ground Floor,
Federation House,
2 Federation St,
Manchester,
M4 4BF.
and on OpenStreetMap:
https://www.openstreetmap.org/#map=19/53.48592/-2.23967
This is very close to the original venue and on the same street; just by
the Shudehill Interchange (tram and bus station) part Dantzic Street.
Still usual time, 7pm.
A big thanks to The Federation http://www.thefederation.coop/ for
providing us with a venue on short notice.
On 16/11/2018 00:17, Michael Dorrington wrote:
> Please forward this notice to those that would welcome it.
>
> You can subscribe to the Manchester Free Software mailing list at:
> https://lists.nongnu.org/mailman/listinfo/fsuk-manchester
>
> * Event: Manchester Free Software's November Meeting
>
> * 45 minute slot: AppArmor + auditd
> * 15 minute slot 1: Debian Installer Preseeding for security
> * 15 minute slot 2: Boot process hardening including GRUB
> * 15 minute slot 3: Security monthly round-up
>
> * Date: Tuesday, 20th November 2018 (3rd Tuesday of the month)
> * Start time: 19:00
> * Finish time: 21:00
>
> * Location: PLANT NOMA
> - https://madlab.org.uk/2018/04/madlab-and-plant-noma
> - https://www.plantnoma.com/
> * Address: Redfern, Dantzic Street, NOMA, M60 0AE.
> - Near Shudehill Interchange and not far from original Madlab.
> - https://www.openstreetmap.org/#map=19/53.48668/-2.23934
>
>
> == Details ==
>
> === Introduction ===
>
> The purpose of Manchester Free Software is to promote the Free Software
> philosophy.
>
> Every meeting we start with an opportunity for informal key signing.
> For this you'll need to bring paper OpenPGP fingerprint slips, see
> `gpg-key2ps` from the `signing-party` package (or equivalent in your
> GNU/Linux distro):
> https://packages.debian.org/signing-party
>
>
> === Schedule ===
>
> 19:00-19:05 Introduction and key signing
> 19:05-19:20 Debian Installer Preseeding for security
> 19:20-19:25 Short Break (5 minutes)
> 19:25-20:10 AppArmor + auditd
> 20:10-20:25 Long Break (15 minutes)
> 20:25-20:40 Boot process hardening including GRUB
> 20:40-20:45 Short Break (5 minutes)
> 21:45-21:00 Security monthly round-up
>
>
> === Topic details ===
>
> The topics in this month's meeting will cover some elements of the
> National Cyber Security Centre (NCSC) End User Device (EUD) Security
> Guidance for GNU/Linux. Given the number of elements in the guidance we
> will cover them over 2 meetings.
>
> *
> https://en.wikipedia.org/wiki/National_Cyber_Security_Centre_(United_Kingdom)
> * https://www.ncsc.gov.uk/
> * https://www.ncsc.gov.uk/guidance/eud-security-guidance-ubuntu-1804-lts
>
>
> ==== AppArmor and auditd ====
>
> This will be a talk and demo of AppArmor and auditd. AppArmor helps to
> stop applications doing things they shouldn't, particularly from a
> security point of view. And auditd can be used to spot and log events
> that are a security concern.
>
> * https://packages.debian.org/apparmor
> * https://packages.debian.org/auditd
>
>
> ==== Debian Installer Preseeding for security ====
>
> This will be a talk and demo on using Debian Installer preseeding for
> security.
>
> The Debian Installer is used by Debian and Debian derivatives to install
> the Operating System. The questions asked in the installer can be
> pre-answered by using a preseed file. The preseed file also allows
> running post-installation commands. These features can be used to
> ensure security related items aren't missed during an install.
>
> * https://www.debian.org/releases/stretch/amd64/apb.html.en
>
>
> ==== Boot process hardening including GRUB ====
>
> The will be a talk and demo covering hardening the boot process
> including GRUB.
>
> GRUB is used as a boot loader for GNU/Linux, which means it gets the
> computer from being turned on to running GNU/Linux. GRUB can be locked
> down to provide additional security. Similar steps can be taken in the
> computer's BIOS / UEFI.
>
> * https://www.gnu.org/software/grub/
>
>
> ==== Security monthly round-up ====
>
> Our monthly round-up of Free Software security issues and tips.
>
>
> == Location ==
>
> The meeting will take place at the usual PLANT NOMA, details above.
>
>
> == Transport ==
>
>
> === Parking ===
>
> Around the venue there are parking meter bays that become zero cost
> after 8pm on Tuesday so you will have to pay up until then and the
> maximum stay is 2 hours BUT MAKE SURE YOU VERIFY ALL THIS on parking.
>
> There are paid parking lots around the venue, they are marked by a blue
> P in this OpenStreetMap centred on PLANT NOMA
> <https://www.openstreetmap.org/#map=15/53.48668/-2.23934>. Most of
> those parking lots are owned by NCP <http://www.ncp.co.uk/>.
>
> If you can't decide otherwise then park in Manchester Arndale
> <https://www.manchesterarndale.com/visiting/directions>.
>
>
> === Public Transport ===
>
> Manchester Victoria (MCV) train station, Shudehill tram and bus station,
> and Manchester Piccadilly bus station are all fairly close to PLANT
> NOMA, see OpenStreetMap centred on PLANT NOMA
> <https://www.openstreetmap.org/#map=15/53.48668/-2.23934>.
>
> Manchester Piccadilly (MAN) train station and Manchester Central Coach
> Station are not too far away either.
>
>
> == More Information ==
>
> Information about Manchester Free Software can be found on the
> Manchester Free Software pages on LibrePlanet
> <https://libreplanet.org/wiki/Manchester>.
>
> Regards,
> Mike.
> MFS Chair.
>
--
FSF member #9429
http://www.fsf.org/register_form?referrer=9429
http://www.fsf.org/about
"The Free Software Foundation (FSF) is a nonprofit with a worldwide
mission to promote computer user freedom and to defend the rights of all
free software users."
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://mailman.lug.org.uk/pipermail/bradford/attachments/20181119/4e3c667e/attachment.sig>
More information about the Bradford
mailing list