Schedule: Security sessions

Application, network, and data security, from Linux firewalls to VoIP risks.

Add to your personal schedule
Location: Ballroom A8
Philippe Gamache (Parler Haut, Interagir Librement), Damien Seguy (Alterway Consulting)
Average rating: ***..
(3.83, 6 ratings)
In this laboratory, we will carry out a safety audit of an Open Source web application. We will work on a real application. The laboratory will end with the handing over of the report to the authors of the application so they can have an outside view on the safety of the application. Read more.
Add to your personal schedule
Location: Ballroom A2
Robert Bernier (Consultant)
Average rating: ***..
(3.71, 7 ratings)
Protecting your data, by any and all means possible, is no longer an option. Rather, it is mandated by today's security conscious management. This tutorial will demonstrate a hands on methodology of using the latest encryption and cipher technology available in PostgreSQL. Following best condoned practices used in the industry today, PostgreSQL can be used to manage your data securely. Read more.
Add to your personal schedule
Location: Ballroom A8
Nicholas Solter (OpenSolaris / Sun Microsystems), David Miner (Sun Microsystems)
Average rating: *****
(5.00, 1 rating)
Join the authors of “OpenSolaris Bible” for a tutorial in becoming an OpenSolaris power user. Learn about ZFS, DTrace, FMA, SMF, and more. Read more.
Add to your personal schedule
Location: Meeting Room J1/J4
Neal McBurnett (Internet2)
Average rating: ****.
(4.00, 2 ratings)
The open source ElectionAudits software was used in Boulder Colorado's groundbreaking election audit in 2008. Recent advances in auditing practices can help increase confidence in elections. This new Django-based app ties together voter-verified paper ballots, batch reporting, verifiably random selection of batches, hand counts, and statistical analysis. Come, and help audit in your state! Read more.
Add to your personal schedule
Location: Ballroom A8
Eric Mandel (BlackMesh), Jason Ford (BlackMesh)
Average rating: ***..
(3.00, 4 ratings)
Quickly, accurately, and reliably deploying new systems, across the entire spectrum of production, test, and development systems, is a constant challenge for system administrators and developers. We leveraged Cobbler and Puppet to overcome these challenges and will show attendees how they can use Cobbler and Puppet to quickly, accurately, and reliably deploy new systems. Read more.
Add to your personal schedule
Location: Meeting Room B2
James Tillman (Elections by the People Foundation, Inc.), Richard Benham (Elections by the People Foundation, Inc.)
Average rating: ****.
(4.00, 1 rating)
Over the last few years, developments in the use of Open Source for creating efficient, verifiable, and trustworthy voting systems present viable approaches to solving technical problems in elections systems. The next wave of development will build on these recent achievements in the field by integrating them into the real, often messy, world of election administration and law. Read more.
Add to your personal schedule
Location: Meeting Room B1/B4
Edward Finkler (FictiveKin)
Average rating: ****.
(4.00, 5 ratings)
Inspekt is a filtering and validation library for PHP5. With a focus on ease of use, Inspekt makes writing secure PHP applications faster and easier. This talk covers the Inspekt library and the "input cage" concept, best practices when utilizing the library, and how to integrate Inspekt with existing applications and popular frameworks. Read more.
Add to your personal schedule
Location: Ballroom A7
Kyle Rankin (QuinStreet, Inc.)
Average rating: ****.
(4.22, 9 ratings)
In this talk Kyle Rankin will provide an introduction to performing forensics analysis on Linux machines using the popular Sleuthkit tools with their easy-to-use Autopsy web-based front-end. The talk will cover basic concepts for a forensics investigation, and at the end there will be a demo with a compromised Linux image. Read more.
Add to your personal schedule
Location: Ballroom A7
Chris Shiflett (Analog)
Average rating: ****.
(4.67, 6 ratings)
Perception is as important as reality. In this multifarious talk, I'll introduce some of what I have learned about cognitive psychology, exploring topics such as change blindness and ambient signifiers, and I'll show some real-world examples that demonstrate the profound impact human behavior can have on security. Read more.
Add to your personal schedule
Location: Ballroom A4/A5
Ken Yagen (MuleSoft)
Average rating: **...
(2.50, 2 ratings)
This session details how developers can use Mule -- an open source enterprise service bus (ESB) -- to develop, deploy and integrate composite applications on both sides of the firewall, and how Mule can work with complementary technology to address virtualization concerns. Read more.
Add to your personal schedule
Location: Ballroom A7
Jeff Arnold (Ksplice, Inc.)
Average rating: *****
(5.00, 1 rating)
Today, every mainstream operating system in the world requires regular reboots in order to be up to date and secure. Since reboots cause downtime and disruption, people are forced into the uncomfortable dilemma of choosing between security and convenience. New open source technology out of MIT, called Ksplice, enables running systems to stay secure without the disruption of rebooting. Read more.
Add to your personal schedule
Location: Meeting Room B1/B4
David Maxwell (Coverity, Inc.)
This talk will present the 2008 results from the Scan Project, a Department of Homeland Security open source initiative run by Coverity, designed to improve the quality and security of popular open source projects used to power government and private websites. Read more.
  • Intel
  • Microsoft
  • Google
  • SourceForge.net
  • Sun Microsystems
  • Facebook
  • Gear6
  • Kaltura
  • Liferay
  • MindTouch
  • MySpace.com
  • Novell, Inc.
  • Open Invention Network
  • Rackspace Cloud
  • Schooner Information Technology
  • Silicon Mechanics
  • Symbian Foundation
  • Twilio
  • WSO2
  • Yabarana Corporation

Sponsorship Opportunities

For information on exhibition and sponsorship opportunities at the conference, contact Sharon Cordesse at scordesse@oreilly.com

Download the OSCON Sponsor/Exhibitor Prospectus

Media Partner Opportunities

Download the Media & Promotional Partner Brochure (PDF) for information on trade opportunities with O'Reilly conferences or contact mediapartners@ oreilly.com

Press and Media

For media-related inquiries, contact Maureen Jennings at maureen@oreilly.com

OSCON Newsletter

To stay abreast of conference news and to receive email notification when registration opens, please sign up for the OSCON newsletter (login required)

Contact Us

View a complete list of OSCON contacts