[HACK] [OT] Charla seguridad
Alvaro Navarro
anavarro at gsyc.escet.urjc.es
Tue Apr 22 22:57:55 CEST 2003
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hola gente,
Perdonad por el off-topic pero creo que a más de uno le puede interesar :)
Se trata de dos charlas que dará Russ Cox, que está en el MIT y trabaja con la
gente que hizo UNIX, C/C++ y Plan 9, en Bell Labs.
Una en la autonoma de Madrid y otra en la rey juan carlos.
Las dos el jueves que viene día 24.
Al final del mensaje hay punteros sobre como llegar y demas.
- -----------------------------------------------------------------------
Dia: Jueves 24 a las 5pm
Lugar: salon grados departamental II, escet, urjc
Peer-to-peer computing: a new direction in the design of distributed systems
Traditionally, distributed systems are architected as central servers
serving many clients. Recently a number of Internet applications
(such as Naptster, Gnutella, and Freenet) have demonstrated the
benefits of a peer-to-peer architecture, in which clients
cooperatively provide a service, without relying on central servers.
The benefits of a peer-to-peer architecture are fault tolerance, load
balance, and the ability to harness idle storage and network
resources. Accompanying these benefits are a number of design
challenges. A peer-to-peer architecture should be symmetric and
decentralized, and should operate well with unmanaged volunteer
participants. Finding desired data in a large system must be fast;
servers must be able to join and leave the system frequently without
affecting its robustness or efficiency; and load must be balanced
appropriately across the available servers. While the peer-to-peer
systems in common use solve some of these problems, none solves
all of them. This talk discusses Chord, a peer-to-peer system built
at MIT, and how it solves some of these problems and others.
- --------------------------------------------------------------------
- -----------------------------------------------------------------------
Dia: jueves 24 de abril de 2003 a las 12 horas
Lugar: Sala de Grados, Escuela Politecnica Superior, Universidad Autonoma
Madrid
Security in Plan 9
The security architecture of the Plan 9 operating system has recently
been redesigned to address some technical shortcomings. This redesign
provided an opportunity also to make the system more convenient to use
securely. Plan 9 has thus improved in two ways not usually seen
together: it has become more secure *and* easier to use.
The new architecture is centered around a per-user self-contained
agent called factotum. Factotum securely holds a copy of the user's
keys and conducts authentication protocols (both native Plan 9
protocols and legacy protocols like APOP and SSH) on behalf of the user.
I'll describe the Plan 9 architecture and also talk about ongoing work
in applying the lessons of factotum to Unix systems.
- -----------------------------------------------------------------------
Como llegar a la URJC:
Tren: Mostoles (el soto)
Metrosur: Universidad Rey Juan Carlos.
Mas info en: http://acm.escet.urjc.es/como_llegar.php
Como llegar a la UAM:
Carretera de Colmenar: lo mejor
es la entrada Norte, desde la carretera de Alcobendas, M-616, que se
coge en la salida 17, NO LA 15, de la carretera de Colmenar
si se coge la 15 se atraviesa el campus.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQE+pazXob51ucPG3YsRAppxAJ0cpU8IGyZVyQA4wUmd56e0qRdHjwCeMUlR
MwW2QAYkcoZCPzWC3dg7ErE=
=AY46
-----END PGP SIGNATURE-----
More information about the hacking
mailing list