GUADEC highlights the capabilities and direction of GNOME – the user environment for desktop computers, networked servers and portable Internet devices. GUADEC also features discussions of the future of Free Software and Open Source development in general. The History of GUADEC

This is the eleventh year in which the developers and users of GNOME will gather in person to discuss the future direction of the project, and to spread word of GNOME and the benefits of Free Software.

The story of GUADEC begins in Paris in 1998, where a number of GNOME developers, who had worked together via the internet, thought it might be nice to finally meet in real life. They have met at the GUADEC conference every year since then.

GUADEC is an acronym for the GNOME Users’ And Developers’ European Conference. Held annually in cities around Europe, presentations are given by software developers, business leaders and users who are involved in Open Source, Free Software and of course, GNOME.

These combine with many practical sessions and discussion groups which set the direction of the GNOME project. It also aims to attract new developers and contributers, as well has serve as a meeting point for corporate interests and allow us to showcase some of the latest technologies.

Security In Linux:

There is a saying in the security world that the only truly safe computer system is one that is disconnected from the network, switched off and buried six feet under ground. The sentiment may be somewhat true but it is hardly a practical solution to the problems we face today in protecting servers and desktops from outside intrusion.

There are more computer systems connected to the internet either directly or via local area networks than at any time in the history of technology and the numbers are growing at a rapid rate. It seems that not a month goes by without another story in the news about the internal network of a major corporation being compromised by an intruder.

The simple fact is that there really is no such thing as a truly secure system as long is it is connected to a network. If the large corporations with expensive firewalls and talented IT staff can’t always stop criminals from breaking in what chance do the rest of us have?

Fortunately all is not lost and we do not have to pull the network cables out of the back of our computer systems. With careful planning and system configuration it is quite possible to create a secure environment that will cause the hacker to move on to the next, easier target without rendering the entire system useless.

Lecturer: Mohammad Abbasi



GUADEC/2010/mjabbasi (last edited 2010-04-04 13:06:50 by Mohammadabbasi)