To celebrate Software Freedom Day 2015, the Linux Professional Institute (LPI) Southern Africa is offering discounted LPI 101 & 102 exams on the 19th September at SFD 2015 in Pretoria. The exam price has been slashed from R1,900 to R890 per exam. If you have been thinking about getting a Linux certification now is the time! Get certified and get paid more!
Come visit us on the 19th of September 2015 at SFD, any time from 10:00-14:00 to write. You can pay via eft or credit card before the event by calling 011 781 8014 for details or bring proof of payment on the day to write.. The exams are 90 minutes long and are paper based. Please ensure you have your LPI ID number with you before you come. You can get an LPI ID number by registering at https://cs.lpi.org/caf/Xamman/register.
Raspberry Jams are events organised by the community to share knowledge, learn new things, and meet other Pi enthusiasts. They’re a great way to find out more about the Raspberry Pi and what you can do with it, and to find like-minded people.
We’ll have on at SFD Pretoria 2015
We are planning an informal key signing party at the end of the SFD 2015 Event
Who is running with it?
Charl le Roux
Software Freedom Day 2015: South Africa
19 September 2015
At conclusion of formal agenda.
Pretoria Gautrain Station: Conference Venue
What to prepare beforehand:
- Generate a PGP Key if you don’t have one already.
- Publish the key to a key server.
- Print paper copies (+-30) for handout (business card size or larger) containing:
- Key ID
- The fingerprint of your key.
- The keyserver where the key can be found.
- Your Name and ID.
- Example of paper handout
- Name: John Doe
- ID: 7303235122080
- Key-ID: 460DD22A
- Keyserver: hkp://keyserver.ubuntu.com:11371
- Key fingerprint: 759F D7C7 595C 2948 D9EB D99B ABF3 3D95 460D D22A
- Email: email@example.com
What to Bring:
- Official Identification Document matching the name on your paper handout and your key.
- Any other documentation you need to prove your identity.
- Paper copies for handout containing key information.
- Pen for recording info about the key you are evaluating (e.g. verified or not)
- Do not bring your computer
Procedure during key-signing:
- Two lines will be formed with participants opposing each other.
- Participants will exchange fingerprint and ID verification, and verify each other’s identity.
- The line will then move one position to the left and repeat the key exchange.
- This will continue until every participant exchanged keys with every other participant.
What to do after the party:
- Sign keys only for participants that you trust the identity of.
More about web of Trust: