diff --git a/content/datengarten/23.md b/content/datengarten/23.md index 252e9cd..51aa520 100644 --- a/content/datengarten/23.md +++ b/content/datengarten/23.md @@ -5,6 +5,7 @@ title: "Datengarten 23" no: 23 subtitle: "Datenübertragung über Satellit - Wie die Daten vom Himmel fallen" speaker: FrankRo +language: de date: 2006-06-08T00:00:00+02:00 event: start: 2006-06-08T20:00:00+02:00 diff --git a/content/datengarten/32.md b/content/datengarten/32.md index 5134d85..47c89ff 100644 --- a/content/datengarten/32.md +++ b/content/datengarten/32.md @@ -4,16 +4,16 @@ series: "Datengarten" no: 32 title: "Datengarten 32" subtitle: "Liquid Democracy" -date: 2018-09-03T00:00:00+02:00 +date: 2009-09-03T00:00:00+02:00 event: - start: 2018-09-03T20:00:00+02:00 - end: 2018-09-03T22:00:00+02:00 + start: 2009-09-03T20:00:00+02:00 + end: 2009-09-03T22:00:00+02:00 location: CCCB speaker: Martin Häcker & Daniel Reichert speaker_url: -language: -streaming: -recording: +language: de +streaming: no +#recording: --- **Direkter Parlamentarismus – gemeinsam verbindlich entscheiden** (in diff --git a/content/datengarten/89.md b/content/datengarten/89.md new file mode 100644 index 0000000..1d06506 --- /dev/null +++ b/content/datengarten/89.md @@ -0,0 +1,21 @@ +--- +categories: ["Datengarten"] +tags: ["Security", "SDN"] +series: "Datengarten" +title: "Datengarten 89" +no: 89 +subtitle: (In)Security in Software-Defined Networks +speaker: Kashyap Thimmaraju +# Twitter, homepage, mail (use mailto:foo@example.com) +#speaker_url: +date: 2018-06-11T21:01:19+02:00 +event: + start: 2018-06-12T20:00:00+02:00 + end: 2018-06-12T22:00:00+02:00 +location: CCCB +language: en +streaming: true +#recording: https://media.ccc.de/v/dg-89 +--- + +Computer networking is currently undergoing a transformation: Network control is being consolidated into a centralized “controller” by separating the so-called data plane and control plane. This transformation is what is popularly known as Software-Defined Networking. In this talk we will see how Software-Defined Networks can be exploited by attackers, and on the flip-side, how they can be leveraged to detect network attacks. For example, we will look at topology spoofing attacks, software switch exploitation in the cloud and attacks arising from malicious switches, we will also see novel techniques to detect malicious switches and hosts. diff --git a/content/page/plenum.md b/content/page/plenum.md new file mode 100644 index 0000000..7fd318b --- /dev/null +++ b/content/page/plenum.md @@ -0,0 +1,18 @@ +--- +title: "Plenum" +subtitle: "Instrument der internen Konsensfindung" +date: 2018-05-18T01:11:54+02:00 +menu: + main: + parent: "verein" +outputs: + - html + - calendar +--- + +Das Plenum findet am ersten Mittwoch des Monats ab 20:00 Uhr in den Clubräumen +des CCCB statt. + +Als Instrument der internen Konsensbildung, bei dem Interna diskutiert werden, +richtet sich das Plenum aussließlich an Member oder explizit eingeladene Gäste. +