The move is (more or less) complete to NoVa Labs new home. We will start meeting there on 8 November 2014.
NoVa Labs II
1916 Isaac Newton Square West
Reston, VA 20190
The August meeting of NOVALUG will be held in Arlington VA in support of a picnic honouring the birthday of Linux.
Originally, ARPANET ran the Network Control Program (NCP). The NCP had many limitations (including address space) and was in time superseded by TCP/IP. However, users were reluctant to make the transition. So, in 1982, Vinton Cerf and Jon Postel brutally forced users to switch from NCP to IPv4 by programming the Internet gateways to block all NCP traffic.
Now, almost 30 years later, it is the IPv4 address space that is approaching exhaustion. If current IPv4 address allocation policy continues, then IANA will allocate its last remaining /8 block in 2011 06, and the RIRs will allocate the last of their IPv4 addresses in 2012 04. Yet the demand for addresses will only grow due to the rapid proliferation of hand-held devices and the ongoing roll-out of Internet services in the third-world.
DATE: 8 May 2010
LOCATION: Reston Library
TIME: 10 am
TOPIC: Stateful Firewall
PRESENTER: Ivan Makfinsky
The Netfilter kernel module, popularly known as iptables, provides a
powerful and, often, very flexible toolbox for building Linux based
firewalls. While clustering Linux based firewalls may not be new, these
clusters are often not capable or configured to maintain stateful
connections during fail-over scenarios, connections such as SSL
transactions and SSH connections. By combining Netfilter with a couple
of open source projects, one can construct a cluster of Linux systems
that enable seamless firewall failover such that stateful connections
are protected and maintained.
Senior Systems Architect, Ivan Makfinsky, of Endosys, Inc., a Linux and
Open Source Software consulting company, will demonstrate how clustered,
stateful Linux based firewalls can be constructed using Red Hat
Enterprise Linux and software from the Fedora EPEL (Extra Packages for
The twenty-first century has brought with it a disturbing loss of personal privacy. Communications are routinely monitored for content and traffic analysis can be used to determine which IP addresses are exchanging meaningful amounts of traffic. Onion routing is a technique by which a subset of all network nodes are tasked with relaying encrypted traffic for clients. Tor is a widely used implementation of an onion routing protocol which defends against traffic analysis
attacks; it also implements hidden services only reachable from within the Tor darknet. Tor is endorsed by a number of human rights and advocacy organizations, including as the Electronic Frontier Foundation, Reporters Without Borders, and Wikileaks.org. Tor is also used by the US Department of Defense and the US Military.
Come and learn about a company in Herndon, VA that embraces Open Source. We will learn what data visualization is and how JuiceKit can help.
The meeting is 13 March 2010 at the Fortnightly Library in Herndon, VA.
DATE: 9 January 2010
TOPIC: Packaging under Linux
Here is a brief run down of the topics to be covered:
* Talk about Linux packages briefly, zip files, tar/gz files, rpms, and debs.
* Brief, basic usage of the above (for the wee penguins)
* How to create RPMs (for the bigger penguins)
* How to create Yum repositories
* How to deploy RPM and Yum in your organization
* Common pitfalls with RPMs and Yum repositories (what not to do, how to fix the rpmdb)
* How to create deb files and apt repositories
* drpm/delta rpm
* rpm sub packages (should be simple to explain)
* rpm triggers and other advanced features
(IF you have a projector you can bring, please do so. I have not purchased one yet)
Install, Tweak, Share!
Date: 10 October 2009
Time: 10 a.m.
Location: 11925 Bowman Towne Dr, Reston, VA (Reston Library)