<p>The original bio and talk synopsis pre-fanbouy. </p>
<div class="gmail_quote">---------- Forwarded message ----------<br>From: "Jim Kinney" <<a href="mailto:jim.kinney@gmail.com">jim.kinney@gmail.com</a>><br>Date: Sep 24, 2010 1:59 PM<br>Subject: Re: ALE talk on SE Linux - Synopsis and Bio<br>
To: "Aaron Ruscetta" <<a href="mailto:arxaaron@gmail.com">arxaaron@gmail.com</a>><br><br type="attribution">BIO:<br><br>James (Jim) Kinney became an over-zealous Linux fanboy the first time he saw a discarded Next Cube running Slackware in 1992. Several thousand installs later his enthusiasm has escalated to "rabidly over-zealous Linux fanboy advocating for the total world domination process to speed up!" He is actively involved in helping this process by promoting his universal solutions of "fdisk solves all windows problems" and "apple is one byte shy of a whole fruit". <br>
In the 18 years since his introduction to Linux goodness, James has turned an obsession into a living. First at Emory University where he converted a Mac lab to Linux (and ultimately used to same lab machines in a proto-type Beowulf cluster in nice +5 mode so the students wouldn't notice) and help co-found LUGE (Linux Users Group of Emory), a 10+ year stint as a Linux consultant (note to self: windows consultants make money because things break all the time; Linux consultants only make money setting things up and they never hear from the client again until the next time they want a new machine.) with a few notable things like making Linux system run thin clients in schools despite the technical obstacles and political chaffing, a stint at "We're not evil. We just archive EVERYTHING FOREVER" Google, an appearance at a travel booking company, and a ride with "we wanna be just like Comcast" Cox Communications all led Jim to realize that he really likes craft and Belgium beer and Linux security systems (and Linux fanboy activities like trash-talking other OS wannabes from Redmond and Cupertino).<br>
Currently at GTRI, Jim works with some really bright people who are actively involved in extending SELinux policy to protect all aspects of critical path communications. <br><br><br>Synopsis: SELinux tools for practical server security management.<br>
Running a Linux server with SELinux in enforcing targeted mode is quite daunting for many, if not most sysadmins. SELinux really needs to be a part of the toolkit used to thwart security issues that admins will use and not just turned off by default. Over the course of a 1+ hour seminar, Jim will demonstrate various tools, command line and gui, and the analysis process to resolve SELinux "Access Denied" problems for servers running in "Enforcing Targeted" mode. If time permits a brief look at the concepts of higher security methods like MCS and MLS will also be covered.<br>
<br><div class="gmail_quote"><div class="quoted-text">On Fri, Sep 24, 2010 at 11:22 AM, Aaron Ruscetta <span dir="ltr"><<a href="mailto:arxaaron@gmail.com" target="_blank">arxaaron@gmail.com</a>></span> wrote:<br></div>
<div class="elided-text"><blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid rgb(204, 204, 204);padding-left:1ex">
Can post a Synopsis and Bio for your talk any time now.<br>
<br>
Let me know if I can be of assistance in any other way,<br>
like maybe you could use a kick ass sound system and<br>
use "text to speech" to read your config files for the blind<br>
and hard of hearing.<br>
<br>
peace<br>
<font color="#888888">aaron<br>
</font></blockquote></div></div><br><br clear="all"><div class="elided-text"><br>-- <br>-- <br>James P. Kinney III<br>I would rather stumble along in freedom than walk effortlessly in chains.<br><br><br>
</div></div>