BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//program.why2025.org//why2025//RMGAQW
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-why2025-XZRAHF@program.why2025.org
DTSTART;TZID=CET:20250809T123500
DTEND;TZID=CET:20250809T130000
DESCRIPTION:Let's learn about L2 isolation with VLANs and dive into basic n
 etwork architecture with OPNsense. After playing a bit with IPv4\, let's d
 iscuss unicorn-issues IPv6 for your homelab-ing. Then expanding with WireG
 uard for simple inter-machine networks. Continuing\, we will take a look i
 nto Linux network namespaces and a few tricks you can do with your systems
  to bypass "security" - and also how to defend against it.
DTSTAMP:20250731T184827Z
LOCATION:Cassiopeia
SUMMARY:🔗 Networking your (Linux) Machines - simonmicro
URL:https://program.why2025.org/why2025/talk/XZRAHF/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-why2025-HXDAMY@program.why2025.org
DTSTART;TZID=CET:20250810T210000
DTEND;TZID=CET:20250810T212500
DESCRIPTION:So\, it is 2025 and mailservers are getting more and more repla
 ced by cloud-based solutions\, which promise to be easy and secure... But 
 what if you can just do it yourself? Hosting your private message server a
 nd applying common modern mailserver security practices on your own? This 
 talk wants to introduce a few common software solutions and introduce mult
 iplie techniques from an operators toolbox.
DTSTAMP:20250731T184827Z
LOCATION:Andromeda
SUMMARY:📧 Your own Mailserver - 2025 Edition - simonmicro
URL:https://program.why2025.org/why2025/talk/HXDAMY/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-why2025-QNH3VU@program.why2025.org
DTSTART;TZID=CET:20250811T160000
DTEND;TZID=CET:20250811T162500
DESCRIPTION:You want to learn more about Linux permissions? This is the tal
 k for you. Let's learn about the basic UID/GID concepts in Linux and expan
 d into more complex ACLs. Then escalating on the "everything-is-a-file" co
 ncept and applying the learned security logic onto program behavior using 
 SELinux or AppArmor.
DTSTAMP:20250731T184827Z
LOCATION:Delphinus
SUMMARY:🛡️ Linux Permissions and Hardening - simonmicro
URL:https://program.why2025.org/why2025/talk/QNH3VU/
END:VEVENT
END:VCALENDAR
