[HACK] [OT] Charla seguridad

Alvaro Navarro anavarro at gsyc.escet.urjc.es
Tue Apr 22 22:57:55 CEST 2003


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hola gente,

Perdonad por el off-topic pero creo que a más de uno le puede interesar :)
Se trata de dos charlas que dará Russ Cox, que está en el MIT y trabaja con la
gente que hizo UNIX, C/C++ y Plan 9, en Bell Labs.
Una en la autonoma de Madrid y otra en la rey juan carlos.
Las dos el jueves que viene día 24.

Al final del mensaje hay punteros sobre como llegar y demas.

- -----------------------------------------------------------------------
Dia: Jueves 24 a las 5pm
Lugar: salon grados departamental II, escet, urjc

Peer-to-peer computing: a new direction in the design of distributed systems

Traditionally, distributed systems are architected as central servers
serving many clients.  Recently a number of Internet applications
(such as Naptster, Gnutella, and Freenet) have demonstrated the
benefits of a peer-to-peer architecture, in which clients
cooperatively provide a service, without relying on central servers.
The benefits of a peer-to-peer architecture are fault tolerance, load
balance, and the ability to harness idle storage and network
resources.  Accompanying these benefits are a number of design
challenges.  A peer-to-peer architecture should be symmetric and
decentralized, and should operate well with unmanaged volunteer
participants.  Finding desired data in a large system must be fast;
servers must be able to join and leave the system frequently without
affecting its robustness or efficiency; and load must be balanced
appropriately across the available servers.  While the peer-to-peer
systems in common use solve some of these problems, none solves
all of them.  This talk discusses Chord, a peer-to-peer system built
at MIT, and how it solves some of these problems and others.
- --------------------------------------------------------------------


- -----------------------------------------------------------------------
Dia: jueves 24 de abril de 2003 a las 12 horas
Lugar: Sala de Grados, Escuela Politecnica Superior, Universidad Autonoma 
Madrid

Security in Plan 9
 
    The security architecture of the Plan 9 operating system has recently
    been redesigned to address some technical shortcomings.  This redesign
    provided an opportunity also to make the system more convenient to use
    securely.  Plan 9 has thus improved in two ways not usually seen
    together: it has become more secure *and* easier to use.
 
    The new architecture is centered around a per-user self-contained
    agent called factotum.  Factotum securely holds a copy of the user's
    keys and conducts authentication protocols (both native Plan 9
    protocols and legacy protocols like APOP and SSH) on behalf of the user.
 
    I'll describe the Plan 9 architecture and also talk about ongoing work
    in applying the lessons of factotum to Unix systems.
- -----------------------------------------------------------------------


Como llegar a la URJC:

Tren: Mostoles (el soto)
Metrosur: Universidad Rey Juan Carlos.
Mas info en:  http://acm.escet.urjc.es/como_llegar.php

Como llegar a la UAM:

Carretera de Colmenar: lo mejor
es la entrada Norte, desde la carretera de Alcobendas, M-616, que se
coge en la salida 17, NO LA 15, de la carretera de Colmenar
si se coge la 15 se atraviesa el campus.




-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+pazXob51ucPG3YsRAppxAJ0cpU8IGyZVyQA4wUmd56e0qRdHjwCeMUlR
MwW2QAYkcoZCPzWC3dg7ErE=
=AY46
-----END PGP SIGNATURE-----



More information about the hacking mailing list