|
| 1 | +--- |
| 2 | +layout: post |
| 3 | +title: Visit to Indian Linux User Group, Chennai |
| 4 | +tag: ILUG-C |
| 5 | +--- |
| 6 | + |
| 7 | + |
| 8 | + |
| 9 | +Lately I was travelling to [Chennai](https://en.wikipedia.org/wiki/Chennai) |
| 10 | +for some personal work. I was very clear on meeting [Mr. Shakthi |
| 11 | +Kannan](http://shakthimaan.com/). While travelling to Chennai I dropped a mail |
| 12 | +inquiring about his availability. He replied with an invitation to attend the |
| 13 | +Meetup of [Indian Linux Users Group, |
| 14 | +Chennai](https://www.meetup.com/ILUG-C/events/234086665/) scheduled at IIT |
| 15 | +Madras. I happily accepted the invitation and decided to attend the Meetup. |
| 16 | + |
| 17 | +The Meetup was happening in the AeroSpace Engineering department, IIT Madras. |
| 18 | +The campus is so huge that it took 15 minute bus journey to get to the |
| 19 | +department. Because I was late, I missed the initial talk on Emacs Org mode by |
| 20 | +Shakthi. I was lucky enough to attend lightning talk section. When I entered |
| 21 | +one young boy was demonstrating |
| 22 | +[BeFF](http://tools.kali.org/exploitation-tools/beef-xss). I was not aware |
| 23 | +about this tool before his talk. After his words I realized BeFF is a |
| 24 | +penetration testing tool and now I am confident for switching to its |
| 25 | +documentation and start going through it. His talk ended with little discussion |
| 26 | +on doubts. Nearly one hour was still remaining Shakthi came forward and invited |
| 27 | +interested people to present a lightning talk. That sure rang a bell! I was not |
| 28 | +sure about attending Meetup and presenting something instantly was looking |
| 29 | +tough. Mohan moved forward and demonstrated How memory mapping works in |
| 30 | +GNU/Linux system. During his talk I quickly skimmed on a list of topics I was |
| 31 | +aware about and I decided to speak on [JSON Web |
| 32 | +Token](https://en.wikipedia.org/wiki/JSON_Web_Token). I introduced myself and |
| 33 | +demonstrated ways to generate a secure token. Discussed about architecture a |
| 34 | +bit and gave few guidelines, points to remember. I ended my talk with comparing |
| 35 | +[Oauth 2.0](https://oauth.net/2/) with JWT. Few interested people asked |
| 36 | +questions and I was lucky enough to solve their confusions. |
| 37 | + |
| 38 | +I realized it is good to have small and interested audience than having large |
| 39 | +and distracted audience. This group has nice experienced people in the |
| 40 | +GNU/Linux domain. If Chennai is your town, I will promote you to join this |
| 41 | +group and get involved. |
| 42 | + |
| 43 | + |
| 44 | +###### Proofreaders: [Shakthi Kannan](http://shakthimaan.com/), [Harsh Vardhan](https://github.com/vharsh) |
0 commit comments