This site will look much better in a browser that supports web standards, but it is accessible to any browser or Internet device.

The Fourth Annual Southern California Linux Expo

Charles Edge

Charles began his consulting career working with Support Technologies, Andersen Consulting and Honda. In 2000, he began working with Three18, a boutique technology consulting firm in Santa Monica, California. At Three18, Charles has worked with Network Architecture and Design for film, commercial production, post-production, advertising and design clients including Universal Studios, The Osbournes and Mossimo.

Charles has been working with servers for over 10 years. In this time he has worked on security both at the perimeter and at the operating system levels. Charles maintains certifications for Linux, Microsoft and Mac OS X Servers. Charles has just published his first book, The Mac Tiger Server Black Book with Paraglyph Press.

Linux Network Security

A Network Intrusion Detection Systems (NIDS) is a system that helps to thwart various malicious activities. Various types of intrusion detection systems and firewalls have become prolific in the open source community. However, often not implemented to their fullest potential due to their time consuming nature. They are allowed to become outdated and the logs are often not reviewed on a regular basis. Even when these tasks can be automated, the systems are often left ineffectual and can go from being a security system to becoming a security hole.

In this presentation we will cover the tools used to defend networks and the flaws in most of their implementations. Once we have explained the tools we will go into further detail on using these tools to maximize protection. We will cover things that can be done on the network edge and how to automate the process of keeping the new services updated across the Enterprise.

In the spirit of fostering a stronger open source community, this presentation will focus on open source tools. We will cover where to get the tools, managing their deployment and the options available to administrators. Finally we will cover the limitations of Network Intrusion Detection Systems and the ways that these systems can be turned against their administrators.