Editing Linux.BSD.UNIX Open Learning and Hacking

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 2: Line 2:
*ALL user levels are ALWAYS welcome and newbies are very sought after...
*ALL user levels are ALWAYS welcome and newbies are very sought after...
*People wanting to share cool things and teach them please come by...
*People wanting to share cool things and teach them please come by...
*Students in GNU/Linux classes, Sys.Admin/N.A./D.B.A./Web.Dev/Coding and others encouraged to come...
*Students in Linux classes, Sys.Admin/N.A./D.B.A./Web.Dev/Coding and others encouraged to come...
*Projection, whiteboards, ssh to each other's boxes(if WE want), and cool toys will be used...
*Projection, whiteboards, ssh to each other's boxes(if WE want), and cool toys will be used...
*Any and all positive knowledge and wisdom is welcome and the time-slot can be used for specific topics/teaching if/when needed...current projects of interest include but are NOT limited to:
*Any and all positive knowledge and wisdom is welcome and the time-slot can be used for specific topics/teaching if/when needed...current projects of interest include but are NOT limited to:
*hide browsing data usage when tethering with TOTALLY FREE/OPEN SOFTWARE
*hide browsing data usage when tethering with TOTALLY FREE OPEN SOFTWARE
*yes. your phone(s) work without google.
*yes. your phone(s) work without google.
*the beauty of the web without google, yahoo, facecrook, and you know the others...
*the beauty of the web without google, yahoo, facecrook, and you know the others...
Line 13: Line 13:
*rotating encryption
*rotating encryption
*ssh and other encryption(s)
*ssh and other encryption(s)
*all things GNU/Linux
*all things linux
*running freeBSD and openBSD on a dual partition to easily compare them
*running freeBSD and openBSD on a dual partition to easily compare them
*redundant firewalls
*redundant firewalls
Line 21: Line 21:
*putting up a 'totally secure'(yes, WE are going to try) network @ NB and trying to break it
*putting up a 'totally secure'(yes, WE are going to try) network @ NB and trying to break it
*killing gov. and other tracking/spying/privacy invasion and re-routing it  
*killing gov. and other tracking/spying/privacy invasion and re-routing it  
*creating a TOTALLY FREE/OPEN-SOURCE phone that can use both towers and satellite(s)
*creating a TOTALLY FREE OPEN-SOURCE phone that can use both towers and satellite(s)
*TOTALLY FREE/OPEN-SOURCE website design and implementation
*TOTALLY FREE OPEN-SOURCE website design and implementation
*creating a TOTALLY FREE/OPEN-SOURCE secure browser that can be installed one piece at a time(install only what you want)
*creating a TOTALLY FREE OPEN-SOURCE secure browser that can be installed one piece at a time(install only what you want)
*learning to write beautiful code
*learning to write beautiful code


Please note that all contributions to Noisebridge are considered to be released under the Creative Commons Attribution-NonCommercial-ShareAlike (see Noisebridge:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)