Since 2010 Markus Feilner has been sharing his Open VPN know-how in the wonderful location of the Linuxhotel in Villa Vogelsang in Essen, Germany. The wonderful hotel and training center are situated in a green and fresh park on a cliff above the Ruhr river. Its exclusive amenities range from sauna and spa to excellent food and extraordinary ideas for the evenings. (Watch the video beneath this post!)
Usually, Markus’ Open VPN training lasts for three days and covers basics, administration and advanced features of Open VPN in hands-on sessions. Whereas the first day is full of basic concepts and theory, day 2 and 3 will give participants hours of guided work with setup and exploring the abundance of Open VPN servers and clients, including deep dives into individually agreed on features.
Contact us or the Linux Hotel directly for requests about the class specified here: https://www.linuxhotel.de/kurs/openvpn/. Giving trainings at Linxhotel has always been a great pleasure, also because there are a lot of interesting and highly skilled parallel classes going on at the venue, the participants and trainers of which you will meet at lunch, breakfast, dinner, in the park or at the evening events. Linuxhotel is my favorite venue for any kind of training.
In a few minutes I will give this presentation here at KDE Akademy in Vienna. It’s more technical than others by yours truly, but simply a report of how I am using Mail and Groupware on Linux. Here’s the description, here’s the slide deck.
“Threat hunting requires a shift to a post-infection mentality and sets of tools such as SIEM (security incident and event management), EDR (endpoint detection and response) and NDR (network detection and response). Even with these tools, threat hunting is a challenge for a variety of reasons. For one thing, these solutions are “heavy.” They require some kind of data collection that involves installing agents on endpoints and/or hardware placed on networks. This can get quite expensive for a large enterprise.“
I do not think the whole story is clear yet, but my intuition tells me to doubt the US version of this story – and I know many people are thankful to Mr. Hutchins for stopping Wannacry, however accidentally that may have been. But what is going on in the court room here? I can’t tell. But the sad part is – as long as it remains unclear, this guy is another Snowden, locked away from home:
“Hutchins, who is living in Los Angeles on bail, is unable to leave the United States since last year due to his pending criminal charges. Hutchins stormed to fame and hailed as a hero earlier last year when he accidentally stopped a global epidemic of the WannaCry ransomware attack that crippled computers all across the world.“
“According to the bill, individuals who break the law will face fine of 3,000 to 5,000 rubles (approx. $48 to $80), officials will face fines up to 50,000 rubles (approx. $800), and legal entities could be fined 500,000 to 700,000 (nearly $8,019 to $11,227), reports Russian State Duma Government site.“
Open Source. Security Theater. Leadership. Journalism.