InstallFest: Difference between revisions
No edit summary |
No edit summary |
||
(8 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
__NOTOC__ |
|||
InstallFests are an opportunity for members and friends of the WPLUG community to gather together and share, help, and learn about installing linux and other free and open source operating systems. WPLUG holds four installfests a year. The basic formula is that we provide a room, bandwidth, and some food, you provide a computer or peripherals you'd like to get working, together we try to get them working. |
InstallFests are an opportunity for members and friends of the WPLUG community to gather together and share, help, and learn about installing linux and other free and open source operating systems. WPLUG holds four installfests a year. The basic formula is that we provide a room, bandwidth, and some food, you provide a computer or peripherals you'd like to get working, together we try to get them working. |
||
* '''How long does the event last?'''<br/> |
* '''How long does the event last?'''<br/>Times vary depending on the venue - typically we run from 3 to 5 hours. You need not stay the entire time. You will want to allocate at least 3 hours to get your hardware into the building, get setup in the meeting room, prepare for installation (backups or last minute hardware upgrades), plan your installation, get your computer on the network, perform the installation, apply security patches, configure additional drivers, install additional software, shutdown and pack-up your computer, and carry your computer to your method of transportation. |
||
* '''How does the network work?'''<br/>This depends on the location - a wired and/or wireless network connection will be available to participants at an installfest. If you intend to download software or perform software updates, check with the meeting host or look for a posted notice about the fastest mirrors to use. It is not permissible to run public servers, trade unauthorized copyrighted files, port scan, or do other borderline nefarious things while on the network. |
* '''How does the network work?'''<br/>This depends on the location - a wired and/or wireless network connection will be available to participants at an installfest. If you intend to download software or perform software updates, check with the meeting host or look for a posted notice about the fastest mirrors to use. It is not permissible to run public servers, trade unauthorized copyrighted files, port scan, or do other borderline nefarious things while on the network. |
||
Line 11: | Line 12: | ||
The purpose of a WPLUG installfest is to install and configure Linux and other open source software. We encourage you to use the provided network to aid in the install procedure, as well as a source of reference pertaining to Linux and/or open source projects. We do, however, want to set a few rules about network usage. |
The purpose of a WPLUG installfest is to install and configure Linux and other open source software. We encourage you to use the provided network to aid in the install procedure, as well as a source of reference pertaining to Linux and/or open source projects. We do, however, want to set a few rules about network usage. |
||
=== Policy for installfests at HackPittsburgh === |
|||
# We are guests on the HackPittsburgh property and network. As such, network access is governed by HackPittsburgh's policy. The hosts of the event and HackPittsburgh volunteers are the final judge of policy on use of the facility, including the network and the room. |
|||
# Please do not use the network to: |
|||
## Download or distribute protected media (warez, downloading mp3s, etc) |
|||
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.) |
|||
## Illegal activity, such as cracking or spamming. |
|||
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc. |
|||
# Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy. |
|||
=== Policy for installfests at the Wilkins School Community Center === |
|||
# We are guests on the Wilkins School Community Center property and network. As such, network access is governed by the WSCC's policy. The hosts of the event and WSCC volunteers are the final judge of policy on use of the facility, including the network and the room. |
|||
# Please do not use the network to: |
|||
## Download or distribute protected media (warez, downloading mp3s, etc) |
|||
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.) |
|||
## Illegal activity, such as cracking or spamming. |
|||
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc. |
|||
# Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy. |
|||
=== Policy for installfests at Northland Library === |
|||
# We are guests on Northland Public Library property and network. As such, network access is governed by [http://www.northlandlibrary.org/computers/policy.html Library policy]. The hosts of the event and Library employees are the final judge of policy on use of the facility, including the network and the room. |
|||
# Please do not use the network to: |
|||
## Download or distribute protected media (warez, downloading mp3s, etc) |
|||
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.) |
|||
## Illegal activity, such as cracking or spamming. |
|||
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc. |
|||
# For wireless access, you will need to enter the card number of your current, valid library card from an [http://www.einetwork.net/ein/libraries.html Allegheny County eiNetwork library]. |
|||
# Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy. |
|||
=== Policy for installfests at Monroeville Library === |
|||
# We are guests on Monroeville Public Library property and network. As such, network access is governed by [http://www.monroevillelibrary.org/screens/policies.html#internet Library policy]. The hosts of the event and Library employees are the final judge of policy on use of the facility, including the network and the room. |
|||
# Please do not use the network to: |
|||
## Download or distribute protected media (warez, downloading mp3s, etc). |
|||
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment). |
|||
## Illegal activity, such as cracking or spamming. |
|||
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc. |
|||
# Wireless access is available in some areas of the Library and is subject to its usage policies. |
|||
# Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy. |
|||
=== Policy for installfests at Brookline Library === |
=== Policy for installfests at Brookline Library === |
||
Line 18: | Line 61: | ||
## Download or distribute protected media (warez, downloading mp3s, etc) |
## Download or distribute protected media (warez, downloading mp3s, etc) |
||
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.) |
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.) |
||
## Illegal activity, such as |
## Illegal activity, such as cracking or spamming. |
||
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc. |
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc. |
||
# For wireless access, you will need to enter the card number of your current, valid library card from an [http://www.einetwork.net/ein/libraries.html Allegheny County eiNetwork library]. |
# For wireless access, you will need to enter the card number of your current, valid library card from an [http://www.einetwork.net/ein/libraries.html Allegheny County eiNetwork library]. |
||
Line 29: | Line 72: | ||
## Download or distribute protected media (warez, downloading mp3s, etc) |
## Download or distribute protected media (warez, downloading mp3s, etc) |
||
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.) |
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.) |
||
## Illegal activity, such as |
## Illegal activity, such as cracking or spamming. |
||
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc. |
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc. |
||
## Only those with Carnegie Mellon Andrew accounts may utilize the wireless network provided by the University. Creating or utilizing competing wireless networks is prohibited. |
## Only those with Carnegie Mellon Andrew accounts may utilize the wireless network provided by the University. Creating or utilizing competing wireless networks is prohibited. |
Latest revision as of 21:00, 2 March 2012
InstallFests are an opportunity for members and friends of the WPLUG community to gather together and share, help, and learn about installing linux and other free and open source operating systems. WPLUG holds four installfests a year. The basic formula is that we provide a room, bandwidth, and some food, you provide a computer or peripherals you'd like to get working, together we try to get them working.
- How long does the event last?
Times vary depending on the venue - typically we run from 3 to 5 hours. You need not stay the entire time. You will want to allocate at least 3 hours to get your hardware into the building, get setup in the meeting room, prepare for installation (backups or last minute hardware upgrades), plan your installation, get your computer on the network, perform the installation, apply security patches, configure additional drivers, install additional software, shutdown and pack-up your computer, and carry your computer to your method of transportation.
- How does the network work?
This depends on the location - a wired and/or wireless network connection will be available to participants at an installfest. If you intend to download software or perform software updates, check with the meeting host or look for a posted notice about the fastest mirrors to use. It is not permissible to run public servers, trade unauthorized copyrighted files, port scan, or do other borderline nefarious things while on the network.
- Can I just show stuff off?
We encourage people who may not have anything to install to show up and share their expertise with others. If you've got something cool you'd like to just show off, go ahead and bring it along.
Installfest Policy
Instituted effective March 12, 2005
The purpose of a WPLUG installfest is to install and configure Linux and other open source software. We encourage you to use the provided network to aid in the install procedure, as well as a source of reference pertaining to Linux and/or open source projects. We do, however, want to set a few rules about network usage.
Policy for installfests at HackPittsburgh
- We are guests on the HackPittsburgh property and network. As such, network access is governed by HackPittsburgh's policy. The hosts of the event and HackPittsburgh volunteers are the final judge of policy on use of the facility, including the network and the room.
- Please do not use the network to:
- Download or distribute protected media (warez, downloading mp3s, etc)
- Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
- Illegal activity, such as cracking or spamming.
- Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
- Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.
Policy for installfests at the Wilkins School Community Center
- We are guests on the Wilkins School Community Center property and network. As such, network access is governed by the WSCC's policy. The hosts of the event and WSCC volunteers are the final judge of policy on use of the facility, including the network and the room.
- Please do not use the network to:
- Download or distribute protected media (warez, downloading mp3s, etc)
- Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
- Illegal activity, such as cracking or spamming.
- Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
- Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.
Policy for installfests at Northland Library
- We are guests on Northland Public Library property and network. As such, network access is governed by Library policy. The hosts of the event and Library employees are the final judge of policy on use of the facility, including the network and the room.
- Please do not use the network to:
- Download or distribute protected media (warez, downloading mp3s, etc)
- Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
- Illegal activity, such as cracking or spamming.
- Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
- For wireless access, you will need to enter the card number of your current, valid library card from an Allegheny County eiNetwork library.
- Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.
Policy for installfests at Monroeville Library
- We are guests on Monroeville Public Library property and network. As such, network access is governed by Library policy. The hosts of the event and Library employees are the final judge of policy on use of the facility, including the network and the room.
- Please do not use the network to:
- Download or distribute protected media (warez, downloading mp3s, etc).
- Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment).
- Illegal activity, such as cracking or spamming.
- Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
- Wireless access is available in some areas of the Library and is subject to its usage policies.
- Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.
Policy for installfests at Brookline Library
- We are guests on Carnegie Library of Pittsburgh property and network. As such, network access is governed by the CLP's policy. The hosts of the event and Library employees are the final judge of policy on use of the facility, including the network and the room.
- Please do not use the network to:
- Download or distribute protected media (warez, downloading mp3s, etc)
- Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
- Illegal activity, such as cracking or spamming.
- Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
- For wireless access, you will need to enter the card number of your current, valid library card from an Allegheny County eiNetwork library.
- Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.
Policy for installfests at Carnegie Mellon
- We are guests on Carnegie Mellon University's property and network. The hosts of the event are the final judge of policy on use of the facility, including the network and the room.
- Please do not use the network to:
- Download or distribute protected media (warez, downloading mp3s, etc)
- Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
- Illegal activity, such as cracking or spamming.
- Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
- Only those with Carnegie Mellon Andrew accounts may utilize the wireless network provided by the University. Creating or utilizing competing wireless networks is prohibited.
- Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.