InstallFest

From WPLUG
Jump to navigation Jump to search

InstallFests are an opportunity for members and friends of the WPLUG community to gather together and share, help, and learn about installing linux and other free and open source operating systems. WPLUG holds four installfests a year. The basic formula is that we provide a room, bandwidth, and some food, you provide a computer or peripherals you'd like to get working, together we try to get them working.

  • How long does the event last?
    An installfest usually runs from about 10:30am to 3:30pm. You need not stay the entire time. You will want to allocate at least 3 hours to get your hardware into the building, get setup in the meeting room, prepare for installation (backups or last minute hardware upgrades), plan your installation, get your computer on the network, perform the installation, apply security patches, configure additional drivers, install additional software, shutdown and pack-up your computer, and carry your computer to your method of transportation.
  • How does the network work?
    This depends on the location - a wired and/or wireless network connection will be available to participants at an installfest. If you intend to download software or perform software updates, check with the meeting host or look for a posted notice about the fastest mirrors to use. It is not permissible to run public servers, trade unauthorized copyrighted files, port scan, or do other borderline nefarious things while on the network.
  • Can I just show stuff off?
    We encourage people who may not have anything to install to show up and share their expertise with others. If you've got something cool you'd like to just show off, go ahead and bring it along.

Installfest Policy

Instituted effective March 12, 2005

The purpose of a WPLUG installfest is to install and configure Linux and other open source software. We encourage you to use the provided network to aid in the install procedure, as well as a source of reference pertaining to Linux and/or open source projects. We do, however, want to set a few rules about network usage.

Policy for installfests at the Wilkins School Community Center

  1. We are guests on the Wilkins School Community Center property and network. As such, network access is governed by the WSCC's policy. The hosts of the event and WSCC volunteers are the final judge of policy on use of the facility, including the network and the room.
  2. Please do not use the network to:
    1. Download or distribute protected media (warez, downloading mp3s, etc)
    2. Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
    3. Illegal activity, such as hacking or spamming.
    4. Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
  3. Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.

Policy for installfests at Northland Library

  1. We are guests on Northland Public Library property and network. As such, network access is governed by Library policy. The hosts of the event and Library employees are the final judge of policy on use of the facility, including the network and the room.
  2. Please do not use the network to:
    1. Download or distribute protected media (warez, downloading mp3s, etc)
    2. Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
    3. Illegal activity, such as hacking or spamming.
    4. Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
  3. For wireless access, you will need to enter the card number of your current, valid library card from an Allegheny County eiNetwork library.
  4. Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.

Policy for installfests at Brookline Library

  1. We are guests on Carnegie Library of Pittsburgh property and network. As such, network access is governed by the CLP's policy. The hosts of the event and Library employees are the final judge of policy on use of the facility, including the network and the room.
  2. Please do not use the network to:
    1. Download or distribute protected media (warez, downloading mp3s, etc)
    2. Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
    3. Illegal activity, such as hacking or spamming.
    4. Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
  3. For wireless access, you will need to enter the card number of your current, valid library card from an Allegheny County eiNetwork library.
  4. Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.

Policy for installfests at Carnegie Mellon

  1. We are guests on Carnegie Mellon University's property and network. The hosts of the event are the final judge of policy on use of the facility, including the network and the room.
  2. Please do not use the network to:
    1. Download or distribute protected media (warez, downloading mp3s, etc)
    2. Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
    3. Illegal activity, such as hacking or spamming.
    4. Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
    5. Only those with Carnegie Mellon Andrew accounts may utilize the wireless network provided by the University. Creating or utilizing competing wireless networks is prohibited.
  3. Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.