Privacy Defender Webinar Ticket $70Privacy Defender tickets are the recommended ticket type for those who can afford to help fund the digital security and online privacy advocacy communities with their financial resources, are attending the workshop with the support of their employers or other backers, or have other resources available to them. Purchasing tickets at this level makes it possible for us to offer reduced price tickets to those in need.
Reduced price admission (for queer-identified, femme, and BIPOC people) $25Reduced price workshop tickets help offset systemic biases prevalent in society and in the technology sector especially.
Prices shown may exclude nominal handling fees. All sales are final.
Thank you for purchasing a ticket to our upcoming “The Imitation Game: Introduction to Administering Virtual Machine Systems” webinar. Please allow several minutes for delivery of your webinar access credentials to the email address associated with your payment processor account. Remember to check your spam folder, as well!
If you still don’t receive your webinar access credentials after one hour, please contact us and we’ll help you get it sorted.
Your order has been cancelled.
This workshop is a practical introduction to creating, using, and administering virtual machine (VM) systems. Even if you’ve never heard of a virtual machine before, you probably already use the underlying technology. And you can get a lot out of using a virtual machine even if you aren’t a software developer because they can help secure your Web browsing activity, give you a sandbox in which to try out new software, and much more!
Virtualization and containerization are concepts almost as old as computing itself so, no matter what you’re doing on your computer, you’re probably using one form of it or another. For example, partitioning a hard disk chunks its total capacity into smaller units useful for specific purposes, much like the individual drawers in a dresser might separate undergarments from outerwear. Organizing, or “containerizing,” your closet this way is useful in its own right because it helps you keep things neat and orderly. But this organizing method also offers dramatic security enhancements because a misbehaving program (or dirty sock) will be confined to its own container.
Today, virtualization has become integral to how desktop computers, servers, and global data networks work, and cross-platform, Free Software virtualization programs have never been easier to use. Storage virtualization makes it possible for a single file on your computer to appear to be an entire hard disk drive (such as provided by VeraCrypt), network virtualization makes it possible to simulate different networks (e.g., using VLANs) or even the whole Internet (using INetSim), processor virtualization makes it possible to run programs built for one microchip architecture on computers running a completely different one (e.g., in QEMU), and fully-fledged virtual machine monitors (VMMs) or hypervisors can construct and modify entire hardware environments complete with virtual video monitors and other peripherals on the fly (as is offered by Proxmox). Virtualization is even the bedrock of numerous Operating System and Web browser security features, such as in the Qubes Operating System, macOS’s App Sandbox, and Firefox Containers.
Whether you’re using your computer for fun or for profit, this workshop will get you up and running with Virtual Machines using the VirtualBox type-2 hypervisor so you can experiment with unfamiliar software more boldly, browse the Web more safely, and play games you otherwise wouldn’t have been able to. By learning how to take advantage of the virtualization capabilities your computer already offers, you can revive your love of that long-lost DOS point-and-click adventure, reliably build and test single- and multi-machine networked software systems, or simply create an almost unlimited number of purpose-built virtual machines that all exist, like inception, inside your existing laptop or other personal computer.
As this is a remote/online-only event, there is no physical class space, but attendance is still limited to 15 students, so purchase your ticket now to reserve your spot.
To participate in our webinars, you will need access to a modern Web browser such as an up-to-date copy of Mozilla Firefox or Google Chrome. You will also need a reliable Internet connection. We recommend disabling Wi-Fi and plugging your computer in to a hard-wired Ethernet network cable for the duration of the webinar, if possible.
If you would like to share your video screen or appear on camera, you will need to have and activate your own camera, such as the one built-in to many modern laptops. Similarly, to speak with the rest of the webinar participants, you will need a microphone. If you do choose to activate your microphone, we ask that you please plug in headphones/ear buds or use a headset in order to help reduce audio feedback loops that can degrade the webinar experience for other participants.
Please refer to our workshops and webinars FAQ for additional tips and advice before you join the video conference.
As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior will result in immediate removal from class without a refund. Please refer to our lightweight social rules for details on our strictly enforced no-tolerance policy against bigotry of any kind.
About Tech Learning Collective
Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit TechLearningCollective.com.
- New York NY United States
- New York NY United States