Frontmatter fixes
This commit is contained in:
parent
dd4e68b439
commit
61eec5458f
|
@ -5,6 +5,7 @@ title: "Datengarten 23"
|
|||
no: 23
|
||||
subtitle: "Datenübertragung über Satellit - Wie die Daten vom Himmel fallen"
|
||||
speaker: FrankRo
|
||||
language: de
|
||||
date: 2006-06-08T00:00:00+02:00
|
||||
event:
|
||||
start: 2006-06-08T20:00:00+02:00
|
||||
|
|
|
@ -4,16 +4,16 @@ series: "Datengarten"
|
|||
no: 32
|
||||
title: "Datengarten 32"
|
||||
subtitle: "Liquid Democracy"
|
||||
date: 2018-09-03T00:00:00+02:00
|
||||
date: 2009-09-03T00:00:00+02:00
|
||||
event:
|
||||
start: 2018-09-03T20:00:00+02:00
|
||||
end: 2018-09-03T22:00:00+02:00
|
||||
start: 2009-09-03T20:00:00+02:00
|
||||
end: 2009-09-03T22:00:00+02:00
|
||||
location: CCCB
|
||||
speaker: Martin Häcker & Daniel Reichert
|
||||
speaker_url:
|
||||
language:
|
||||
streaming:
|
||||
recording:
|
||||
language: de
|
||||
streaming: no
|
||||
#recording:
|
||||
---
|
||||
|
||||
**Direkter Parlamentarismus – gemeinsam verbindlich entscheiden** (in
|
||||
|
|
21
content/datengarten/89.md
Normal file
21
content/datengarten/89.md
Normal file
|
@ -0,0 +1,21 @@
|
|||
---
|
||||
categories: ["Datengarten"]
|
||||
tags: ["Security", "SDN"]
|
||||
series: "Datengarten"
|
||||
title: "Datengarten 89"
|
||||
no: 89
|
||||
subtitle: (In)Security in Software-Defined Networks
|
||||
speaker: Kashyap Thimmaraju
|
||||
# Twitter, homepage, mail (use mailto:foo@example.com)
|
||||
#speaker_url:
|
||||
date: 2018-06-11T21:01:19+02:00
|
||||
event:
|
||||
start: 2018-06-12T20:00:00+02:00
|
||||
end: 2018-06-12T22:00:00+02:00
|
||||
location: CCCB
|
||||
language: en
|
||||
streaming: true
|
||||
#recording: https://media.ccc.de/v/dg-89
|
||||
---
|
||||
|
||||
Computer networking is currently undergoing a transformation: Network control is being consolidated into a centralized “controller” by separating the so-called data plane and control plane. This transformation is what is popularly known as Software-Defined Networking. In this talk we will see how Software-Defined Networks can be exploited by attackers, and on the flip-side, how they can be leveraged to detect network attacks. For example, we will look at topology spoofing attacks, software switch exploitation in the cloud and attacks arising from malicious switches, we will also see novel techniques to detect malicious switches and hosts.
|
18
content/page/plenum.md
Normal file
18
content/page/plenum.md
Normal file
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
title: "Plenum"
|
||||
subtitle: "Instrument der internen Konsensfindung"
|
||||
date: 2018-05-18T01:11:54+02:00
|
||||
menu:
|
||||
main:
|
||||
parent: "verein"
|
||||
outputs:
|
||||
- html
|
||||
- calendar
|
||||
---
|
||||
|
||||
Das Plenum findet am ersten Mittwoch des Monats ab 20:00 Uhr in den Clubräumen
|
||||
des CCCB statt.
|
||||
|
||||
Als Instrument der internen Konsensbildung, bei dem Interna diskutiert werden,
|
||||
richtet sich das Plenum aussließlich an Member oder explizit eingeladene Gäste.
|
||||
|
Loading…
Reference in a new issue