[ale] Fwd: Re: ALE talk on SE Linux - Synopsis and Bio

Jim Kinney jim.kinney at gmail.com
Thu Oct 7 18:50:07 EDT 2010


The original bio and talk synopsis pre-fanbouy.
---------- Forwarded message ----------
From: "Jim Kinney" <jim.kinney at gmail.com>
Date: Sep 24, 2010 1:59 PM
Subject: Re: ALE talk on SE Linux - Synopsis and Bio
To: "Aaron Ruscetta" <arxaaron at gmail.com>

BIO:

James (Jim) Kinney became an over-zealous Linux fanboy the first time he saw
a discarded Next Cube running Slackware in 1992. Several thousand installs
later his enthusiasm has escalated to "rabidly over-zealous Linux fanboy
advocating for the total world domination process to speed up!" He is
actively involved in helping this process by promoting his universal
solutions of "fdisk solves all windows problems" and "apple is one byte shy
of a whole fruit".
In the 18 years since his introduction to Linux goodness, James has turned
an obsession into a living. First at Emory University where he converted a
Mac lab to Linux (and ultimately used to same lab machines in a proto-type
Beowulf cluster in nice +5 mode so the students wouldn't notice)  and help
co-found LUGE (Linux Users Group of Emory), a 10+ year stint as a Linux
consultant (note to self: windows consultants make money because things
break all the time; Linux consultants only make money setting things up and
they never hear from the client again until the next time they want a new
machine.) with a few notable things like making Linux system run thin
clients in schools despite the technical obstacles and political chaffing, a
stint at "We're not evil. We just archive EVERYTHING FOREVER" Google, an
appearance at a travel booking company, and a ride with "we wanna be just
like Comcast" Cox Communications all led Jim to realize that he really likes
craft and Belgium beer and Linux security systems (and Linux fanboy
activities like trash-talking other OS wannabes from Redmond and Cupertino).
Currently at GTRI, Jim works with some really bright people who are actively
involved in extending SELinux policy to protect all aspects of critical path
communications.


Synopsis: SELinux tools for practical server security management.
Running a Linux server with SELinux in enforcing targeted mode is quite
daunting for many, if not most sysadmins. SELinux really needs to be a part
of the toolkit used to thwart security issues that admins will use and not
just turned off by default. Over the course of a 1+ hour seminar, Jim will
demonstrate various tools, command line and gui, and the analysis process to
resolve SELinux "Access Denied" problems for servers running in "Enforcing
Targeted" mode. If time permits a brief look at the concepts of higher
security methods like MCS and MLS will also be covered.

On Fri, Sep 24, 2010 at 11:22 AM, Aaron Ruscetta <arxaaron at gmail.com> wrote:

> Can post a Synopsis and Bio for your talk any time now.
>
> Let me know if I can be of assistance in any other way,
> like maybe you could use a kick ass sound system and
> use "text to speech" to read your config files for the blind
> and hard of hearing.
>
> peace
> aaron
>



-- 
-- 
James P. Kinney III
I would rather stumble along in freedom than walk effortlessly in chains.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.ale.org/pipermail/ale/attachments/20101007/6be6644d/attachment.html 


More information about the Ale mailing list