<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en_US"><generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator><link href="http://techlearningcollective.com/feed/events.xml" rel="self" type="application/atom+xml" /><link href="http://techlearningcollective.com/" rel="alternate" type="text/html" hreflang="en_US" /><updated>2026-03-11T03:07:00-04:00</updated><id>http://techlearningcollective.com/feed/events.xml</id><title type="html">Tech Learning Collective | Events</title><subtitle>Apprenticeship-based technology school for hypermedia, Information Technology, cybersecurity, and radical political practice. We offer unparalleled classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by cyber armies and governments.</subtitle><author><name>Tech Learning Collective</name><email>techlearningcollective@riseup.net</email></author><entry><title type="html">Two Sides of the Same Coin: Transacting Privately with Cryptocurrency</title><link href="http://techlearningcollective.com/events/2025/10/workshop-2025-10-19-two-sides-of-the-same-coin-transacting-privately-with-cryptocurrency" rel="alternate" type="text/html" title="Two Sides of the Same Coin: Transacting Privately with Cryptocurrency" /><published>2025-10-19T17:00:00-04:00</published><updated>2025-10-19T17:00:00-04:00</updated><id>http://techlearningcollective.com/events/2025/10/workshop-2025-10-19-two-sides-of-the-same-coin-transacting-privately-with-cryptocurrency</id><content type="html" xml:base="http://techlearningcollective.com/events/2025/10/workshop-2025-10-19-two-sides-of-the-same-coin-transacting-privately-with-cryptocurrency"><![CDATA[<p>Learn how you can go “to the moon” in one, giant leap for humankind! This workshop assumes you know nothing about cryptocurrency and quickly familiarizes you with the basics of blockchain technology, cryptocurrenct wallet apps, and the larger economic system in which it all fits. By the end, you’ll have a working, privacy-centric, self-custody wallet app installed and maybe even some funds in it ready to transact with, privately and discreetly, just like cash!</p>

<h2 id="workshop-description">Workshop Description</h2>

<blockquote>
  <p>When cryptocurrency was first popularized by the emergence of <a href="https://bitcoin.org/">Bitcoin</a>, it promised to disintermediate economic transactions from entrenched middlemen like central banks or credit card companies who have long been pushing for a “cashless” future. In contrast, “cash is king” for most ordinary people, who still prefer exchanging paper banknotes or metal coins to transact with each other.</p>

  <p>Electronic services like Venmo and CashApp have come to fill this desire, but using them comes with the same risks as relying on the big players: a lack of privacy and a dependence on centralized actors that might betray and de-bank you, punish you for chargebacks, or charge monopolistically unfair fees to use. Of course, there are benefits to electronic transactions, like being able to transact remotely. For example, using a credit or debit card enables online shopping, automated bill pay schedules, highly secure escrow and deposit systems, and much more.</p>

  <p>What if it were possible to have the best of both worlds? As both a buyer and a seller, the ideal would be a way to transact remotely, but with the privacy, reliability, and simplicity of physical cash.</p>

  <p>In this cryptocurrency primer, we’ll get straight at the heart of the issue: learning how to acquire, swap, and spend digital currencies that cannot be traced and that no one can prevent you from using in the future.</p>

  <p>You’ll be introduced to a special class of cryptocurrency options called privacy coins—specifically <a href="https://z.cash/">Zcash</a> and <a href="https://getmonero.org/">Monero</a>—whose opaque ledger systems differ from Bitcoin’s transparent ledger to protect your financial data, and why that is the key distinction allowing you to transact privately and discreetly. You’ll also learn the lay of the land when it comes to the broader cryptocurrency ecosystem, including methods for storing your funds safely, evaluating custodial and self-custody “wallet apps,” getting a feel for Know-Your-Customer (KYC) techniques, and becoming familiar with which cryptocurrency exchanges you can use more privately than others, preparing you for navigating the world of “crypto” better than HODL gang Bitcoin bros.</p>

  <p>When you leave, you’ll have a self-custody wallet app such as <a href="https://cakewallet.com/">Cake Wallet</a>, <a href="https://edge.app/">Edge Wallet</a>, or <a href="https://electriccoin.co/zashi/">Zashi</a>, and enough knowledge to transact safely by protecting both your “coinflow” and your netflow data. After all, if money is speech, and you care about the ability to speak both publicly and privately, you should be able to transact in both those ways, too!</p>
</blockquote>

<p>As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior <em>will</em> result in immediate removal from class without a refund. Please refer to <a href="https://github.com/AnarchoTechNYC/meta/wiki/Social-rules">our lightweight social rules</a> for details on our strictly enforced no-tolerance policy against bigotry of any kind.</p>

<h2 id="about-tech-learning-collective">About Tech Learning Collective</h2>

<p>Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit <a href="/">TechLearningCollective.com</a>.</p>]]></content><author><name>Tech Learning Collective</name><email>techlearningcollective@riseup.net</email></author><summary type="html"><![CDATA[Learn how you can go “to the moon” in one, giant leap for humankind! This workshop assumes you know nothing about cryptocurrency and quickly familiarizes you with the basics of blockchain technology, cryptocurrenct wallet apps, and the larger economic system in which it all fits. By the end, you’ll have a working, privacy-centric, self-custody wallet app installed and maybe even some funds in it ready to transact with, privately and discreetly, just like cash!]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://techlearningcollective.com/static/images/workshop.two-sides-of-the-same-coin-transacting-privately-with-cryptocurrency.rectangle.jpg" /><media:content medium="image" url="http://techlearningcollective.com/static/images/workshop.two-sides-of-the-same-coin-transacting-privately-with-cryptocurrency.rectangle.jpg" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Password Superpowers: How to Crack Hashes and Stump Hackers</title><link href="http://techlearningcollective.com/events/2023/11/workshop-2023-11-11-password-superpowers-how-to-crack-hashes-and-stump-hackers" rel="alternate" type="text/html" title="Password Superpowers: How to Crack Hashes and Stump Hackers" /><published>2023-11-11T13:30:00-05:00</published><updated>2023-11-11T13:30:00-05:00</updated><id>http://techlearningcollective.com/events/2023/11/workshop-2023-11-11-password-superpowers-how-to-crack-hashes-and-stump-hackers</id><content type="html" xml:base="http://techlearningcollective.com/events/2023/11/workshop-2023-11-11-password-superpowers-how-to-crack-hashes-and-stump-hackers"><![CDATA[<p>Get an accessible introduction to the basics of password management by learning how to perform a password cracking attack yourself. Learn exactly what Web sites do with your password when you log in, how to find out if you have been “pwned,” what the risks are, and what you can do to protect yourself from brute-force, credential stuffing, and other forms of account takeover attacks.</p>

<h2 id="workshop-description">Workshop Description</h2>

<blockquote>
  <p>Have you been “pwned”? For years, security researcher Troy Hunt has been running a website at <a href="https://haveibeenpwned.com/">HaveIBeenPwned.com</a> that lets you check to see if your online accounts have been pwned—that is, if your personal information such as your password, has been leaked, accessed, or (worst of all!) “cracked.” Go on, check for yourself!</p>

  <p>If you’ve been “pwned,” this workshop is your chance to learn exactly what the risk might be, and what you can do about it. Derived from one portion of the <a href="/courses/sec101.html">Tech Learning Collective’s popular “Hacking with Mr. Robot” (Security 101) course</a>, this class will clarify the basics of cryptography and encryption within a context that actually applies to your day to day life online.</p>
</blockquote>

<blockquote>
  <p>Learn what websites do with your password when you log in to them, and why using free password management software can make you both safer and more productive. On the flip side, learn <a href="https://github.com/AnarchoTechNYC/meta/blob/master/train-the-trainers/mr-robots-netflix-n-hack/week-2/strengthening-passwords-to-defend-against-john/README.md">professional techniques for recovering passwords</a> from their “encrypted” (hashed) representation, such as using optimized wordlists, word-mangling rulesets, and employing basic doxing techniques for creating personally targeted password-cracking attacks.</p>
</blockquote>

<p>As this is a remote/online-only event, there is no physical class space, but attendance is still limited to 15 students, so <a href="#tickets-workshop-2023-11-11-password-superpowers-how-to-crack-hashes-and-stump-hackers">purchase your ticket now</a> to reserve your spot.</p>

<p>To participate in our webinars, you will need access to a modern Web browser such as an up-to-date copy of <a href="https://www.mozilla.org/firefox/">Mozilla Firefox</a> or <a href="https://www.google.com/chrome/">Google Chrome</a>. You will also need a reliable Internet connection. We recommend disabling Wi-Fi and plugging your computer in to a hard-wired Ethernet network cable for the duration of the webinar, if possible.</p>

<p>If you would like to share your video screen or appear on camera, you will need to have and activate your own camera, such as the one built-in to many modern laptops. Similarly, to speak with the rest of the webinar participants, you will need a microphone. If you do choose to activate your microphone, we ask that you please plug in headphones/ear buds or use a headset in order to help reduce audio feedback loops that can degrade the webinar experience for other participants.</p>

<p>Please refer to <a href="/faq/#workshops-and-webinars">our workshops and webinars FAQ</a> for additional tips and advice before you join the video conference.</p>

<p>As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior <em>will</em> result in immediate removal from class without a refund. Please refer to <a href="https://github.com/AnarchoTechNYC/meta/wiki/Social-rules">our lightweight social rules</a> for details on our strictly enforced no-tolerance policy against bigotry of any kind.</p>

<h2 id="about-tech-learning-collective">About Tech Learning Collective</h2>

<p>Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit <a href="/">TechLearningCollective.com</a>.</p>]]></content><author><name>Tech Learning Collective</name><email>techlearningcollective@riseup.net</email></author><summary type="html"><![CDATA[Get an accessible introduction to the basics of password management by learning how to perform a password cracking attack yourself. Learn exactly what Web sites do with your password when you log in, how to find out if you have been “pwned,” what the risks are, and what you can do to protect yourself from brute-force, credential stuffing, and other forms of account takeover attacks.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://techlearningcollective.com/static/images/workshop.password-superpowers-how-to-crack-hashes-and-stump-hackers.rectangle.jpg" /><media:content medium="image" url="http://techlearningcollective.com/static/images/workshop.password-superpowers-how-to-crack-hashes-and-stump-hackers.rectangle.jpg" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Writing with Blue Fire: Shell Scripting for Beginners</title><link href="http://techlearningcollective.com/events/2023/11/workshop-2023-11-05-writing-with-blue-fire-shell-scripting-for-beginners" rel="alternate" type="text/html" title="Writing with Blue Fire: Shell Scripting for Beginners" /><published>2023-11-05T14:30:00-05:00</published><updated>2023-11-05T14:30:00-05:00</updated><id>http://techlearningcollective.com/events/2023/11/workshop-2023-11-05-writing-with-blue-fire-shell-scripting-for-beginners</id><content type="html" xml:base="http://techlearningcollective.com/events/2023/11/workshop-2023-11-05-writing-with-blue-fire-shell-scripting-for-beginners"><![CDATA[<p>Learn how to inscribe your thoughts, dreams, and desires into your computer and take your command line skills to the next level by learning how to write simple programs called shell scripts. In a way, invoking commands one at a time is like writing a program interactively, whereas writing a script inscribes that knowledge into a more permanent form. By learning how to turn commands into simple scripted programs, you can unlock the almost magical potential of your computer and more easily share that potential with others to whom you distribute your scripts.</p>

<h2 id="workshop-description">Workshop Description</h2>

<blockquote>
  <p>At their core, digital computers are very complex writing instruments. Like pen and paper, they allow us to record our thoughts, dreams, and desires for later review. Unlike pen and paper, they allow us to do this at the speed of electricity and at a scale never before imagined possible, and their ability to directly manipulate the physical world through servomotors, industrial control systems, biomedical devices, and other robotic prosthesis means they can potentially supercharge every facet of our humanity.</p>

  <p>When a system administrator or programmer uses a computer, they often issue instructions one by one using a special-purpose, text-only interface called a <em><a href="/foundations/">command line</a></em>. Individually, these instructions are called <em>invocations</em>. (Yes, that’s their technical term!) In this beginner’s workshop, you’ll learn how to write whole spells, rituals, or (sacred) texts called <em>shell scripts</em> to inscribe your own thoughts, dreams, and desires in the electrified silicon and minerals of your computer.</p>

  <p>By saving your scripts in files, you can invoke arbitrarily complex routines to reproduce tasks or automate complex procedures with a single command. Writing scripts also makes it possible to share what you can do with others and, as such, are one the simplest forms of computer program that you can write and distribute. Come learn how the magic of digital inscription can help you do your work, and increase your power to accomplish your dreams.</p>
</blockquote>

<p>As this is a remote/online-only event, there is no physical class space, but attendance is still limited to 15 students, so <a href="#tickets-workshop-2023-11-05-writing-with-blue-fire-shell-scripting-for-beginners">purchase your ticket now</a> to reserve your spot.</p>

<p>To participate in our webinars, you will need access to a modern Web browser such as an up-to-date copy of <a href="https://www.mozilla.org/firefox/">Mozilla Firefox</a> or <a href="https://www.google.com/chrome/">Google Chrome</a>. You will also need a reliable Internet connection. We recommend disabling Wi-Fi and plugging your computer in to a hard-wired Ethernet network cable for the duration of the webinar, if possible.</p>

<p>If you would like to share your video screen or appear on camera, you will need to have and activate your own camera, such as the one built-in to many modern laptops. Similarly, to speak with the rest of the webinar participants, you will need a microphone. If you do choose to activate your microphone, we ask that you please plug in headphones/ear buds or use a headset in order to help reduce audio feedback loops that can degrade the webinar experience for other participants.</p>

<p>Please refer to <a href="/faq/#workshops-and-webinars">our workshops and webinars FAQ</a> for additional tips and advice before you join the video conference.</p>

<p>As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior <em>will</em> result in immediate removal from class without a refund. Please refer to <a href="https://github.com/AnarchoTechNYC/meta/wiki/Social-rules">our lightweight social rules</a> for details on our strictly enforced no-tolerance policy against bigotry of any kind.</p>

<h2 id="about-tech-learning-collective">About Tech Learning Collective</h2>

<p>Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit <a href="/">TechLearningCollective.com</a>.</p>]]></content><author><name>Tech Learning Collective</name><email>techlearningcollective@riseup.net</email></author><summary type="html"><![CDATA[Learn how to inscribe your thoughts, dreams, and desires into your computer and take your command line skills to the next level by learning how to write simple programs called shell scripts. In a way, invoking commands one at a time is like writing a program interactively, whereas writing a script inscribes that knowledge into a more permanent form. By learning how to turn commands into simple scripted programs, you can unlock the almost magical potential of your computer and more easily share that potential with others to whom you distribute your scripts.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://techlearningcollective.com/static/images/workshop.writing-with-blue-fire-shell-scripting-for-beginners.rectangle.jpg" /><media:content medium="image" url="http://techlearningcollective.com/static/images/workshop.writing-with-blue-fire-shell-scripting-for-beginners.rectangle.jpg" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">November, November Trance Party</title><link href="http://techlearningcollective.com/events/2023/11/event-2023-11-04-november-november-trance-party" rel="alternate" type="text/html" title="November, November Trance Party" /><published>2023-11-04T21:00:00-04:00</published><updated>2023-11-04T21:00:00-04:00</updated><id>http://techlearningcollective.com/events/2023/11/event-2023-11-04-november-november-trance-party</id><content type="html" xml:base="http://techlearningcollective.com/events/2023/11/event-2023-11-04-november-november-trance-party"><![CDATA[<p>Noble neighors!</p>

<p>Note this night of November the 4<sup>th</sup>, a noctural celebration notwithstanding November’s numbing nonchalance, surely introduced by its nippy temperatures. Nay, our evening’s novel narrative is nonfiction, and hosted by the neighborhood’s most notorious gender nonconforming hacker nymph on skates, Vi, with her network of naturally talented nightingale performers!</p>

<p>Indeed, you navigated the seasons! Now, this 4<sup>th</sup> of November, nourish a nonstandard way to fall into Fall!</p>

<p>On the eve of November 5<sup>th</sup>, we’ll prepare for the coming cold of Winter in the way we know best: enjoying cathartic, dreamy trance beats spun by some of Brooklyn’s hottest DJs, basking in radio waves from WiFi-enabled digital libraries letting you browse thousands of e-books for free, and drinks with huggable friends, all bathed in the warm glow of Wonderville’s many arcade cabinets. Drift into an exemplary, shimmering plane of possibilities to recharge your bio-batteries!</p>

<p>November the 4th is also DJ Astral_Dejection’s birthday, so come early (before the show starts) to participate in a delicious name day treat this November, November that will never be forgot!</p>

<p>Featuring:</p>

<ul>
  <li>
    <p>Shift-CTRL Space</p>
  </li>
  <li>
    <p>Tech Learning Collective</p>
  </li>
  <li>
    <p>Death By Audio Arcade</p>
  </li>
  <li>
    <p>lain__d</p>
  </li>
  <li>
    <p>Astral_Dejection</p>
  </li>
  <li>
    <p>heaven ender</p>
  </li>
  <li>
    <p>dis_aster_ous</p>
  </li>
  <li>
    <p>stuttersprite</p>
  </li>
  <li>
    <p><a href="https://www.wonderville.nyc/events/november-november-trance-party">$10 - General Admission</a></p>
  </li>
</ul>

<p>As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior <em>will</em> result in immediate removal from the event without a refund. Please refer to <a href="https://github.com/AnarchoTechNYC/meta/wiki/Social-rules">our lightweight social rules</a> for details on our strictly enforced no-tolerance policy against bigotry of any kind.</p>

<h2 id="about-astral_dejection">About Astral_Dejection</h2>

<h2 id="about-lain__d">About <a href="https://soundcloud.com/lain_d">lain__d</a></h2>

<h2 id="about-heaven-ender">About <a href="https://www.instagram.com/heavenender">heaven ender</a></h2>

<p>heaven ender is an immortal entity inhabiting the mortal plane of existence seeking to make the world a more beautiful place. Host of Gender Experts Party, producer of Str8 to DVD and all around creature of the New York underground rave scene, they are known for their unrelenting, genre blurring sets and condemning you to dance for eternity.</p>

<h2 id="about-dis_aster_ous">About <a href="https://www.instagram.com/dis_aster_ous">dis_aster_ous</a></h2>

<h2 id="about-stuttersprite">About <a href="https://ra.co/dj/stuttersprite">stuttersprite</a></h2>

<p>New York based, New Jersey raised DJ favoring the atmospheric, psychedelic, and experimental side of dance music.</p>

<h2 id="about-shift-ctrl-space">About <a href="https://shiftctrl.space/">Shift-CTRL Space</a></h2>

<p>Shift-CTRL Space is an elusive collective of New York City-based hacktivists whose mission is to strengthen local affinity groups with the power of contemporary digital technologies often hoarded by or made illegible by large corporations. As anti-(techno)capitalists, solarpunks, and radical technologists. Our ethics place us against “Adtech,” “Fintech,” and Silicon Valley. We believe technology is an intangible earth, with which we can and should have an earthly relationship. It <em>is</em> power that we can harness through holistic methods as individuals and cooperative networks for the empowerment of oneself and of one’s actual communities.</p>

<h2 id="about-vi-like-the-text-editor">About Vi “like the text editor”</h2>

<p>If you’ve spent time in Bushwick’s post-quarantine queer party scene or in a number of billiards bars around the city, you may have seen Vi zipping around on her rollerblades. As Brooklyn’s own trans hacker roller slut, she has the type of main character energy found in cyberpunk hentai and is best known for her approachable, sporty whirlwind of kind, extroverted energy radiating from a hard femme candy shell. Whether she’s holding a pool cue, a keyboard, a tequila shot, or all three, it’s all about having a good, safe, and memorable time making people feel comfortable at the party. Say hi!</p>

<h2 id="about-death-by-audio">About Death By Audio</h2>

<p>The <a href="https://www.deathbyaudioarcade.com/">Death By Audio Arcade</a> is a series of lovingly crafted local multiplayer arcade cabinets produced by local indie game developers. We are also a progressive, open community of like-minded artists, artisans, and enthusiasts. We host events at least once a month, in NYC and at events across the country, from SXSW to the Smithsonian.</p>

<h2 id="about-tech-learning-collective">About Tech Learning Collective</h2>

<p>Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit <a href="/">TechLearningCollective.com</a>.</p>]]></content><author><name>Tech Learning Collective</name><email>techlearningcollective@riseup.net</email></author><summary type="html"><![CDATA[Noble neighors!]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://images.squarespace-cdn.com/content/v1/5ca40c7b40978c0001458f5d/62ba1e7e-6ba8-49be-bdcd-5b1fa2a76277/poster.1080x1080+-+Tech+LearningCollective.jpg?format=540w" /><media:content medium="image" url="https://images.squarespace-cdn.com/content/v1/5ca40c7b40978c0001458f5d/62ba1e7e-6ba8-49be-bdcd-5b1fa2a76277/poster.1080x1080+-+Tech+LearningCollective.jpg?format=540w" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">The Imitation Game: Introduction to Administering Virtual Machine Systems</title><link href="http://techlearningcollective.com/events/2023/10/workshop-2023-10-29-the-imitation-game-introduction-to-administering-virtual-machine-systems" rel="alternate" type="text/html" title="The Imitation Game: Introduction to Administering Virtual Machine Systems" /><published>2023-10-29T13:30:00-04:00</published><updated>2023-10-29T13:30:00-04:00</updated><id>http://techlearningcollective.com/events/2023/10/workshop-2023-10-29-the-imitation-game-introduction-to-administering-virtual-machine-systems</id><content type="html" xml:base="http://techlearningcollective.com/events/2023/10/workshop-2023-10-29-the-imitation-game-introduction-to-administering-virtual-machine-systems"><![CDATA[<p>This workshop is a practical introduction to creating, using, and administering virtual machine (VM) systems. Even if you’ve never heard of a virtual machine before, you probably already use the underlying technology. And you can get a lot out of using a virtual machine even if you aren’t a software developer because they can help secure your Web browsing activity, give you a sandbox in which to try out new software, and much more!</p>

<h2 id="workshop-description">Workshop Description</h2>

<blockquote>
  <p>Virtualization and containerization are concepts almost as old as computing itself so, no matter what you’re doing on your computer, you’re probably using one form of it or another. For example, partitioning a hard disk chunks its total capacity into smaller units useful for specific purposes, much like the individual drawers in a dresser might separate undergarments from outerwear. Organizing, or “containerizing,” your closet this way is useful in its own right because it helps you keep things neat and orderly. But this organizing method also offers dramatic security enhancements because a misbehaving program (or dirty sock) will be confined to its own container.</p>

  <p>Today, virtualization has become integral to how desktop computers, servers, and global data networks work, and cross-platform, Free Software virtualization programs have never been easier to use. Storage virtualization makes it possible for a single file on your computer to appear to be an entire hard disk drive (such as provided by <a href="https://www.veracrypt.fr/">VeraCrypt</a>), network virtualization makes it possible to simulate different networks (e.g., using <a href="https://en.wikipedia.org/wiki/Virtual_LAN">VLANs</a>) or even the whole Internet (using <a href="https://www.inetsim.org/">INetSim</a>), processor virtualization makes it possible to run programs built for one microchip architecture on computers running a completely different one (e.g., in <a href="https://www.qemu.org/">QEMU</a>), and fully-fledged virtual machine monitors (VMMs) or hypervisors can construct and modify entire hardware environments complete with virtual video monitors and other peripherals on the fly (as is offered by <a href="https://www.proxmox.com/">Proxmox</a>). Virtualization is even the bedrock of numerous Operating System and Web browser security features, such as in the <a href="https://www.qubes-os.org/">Qubes Operating System</a>, <a href="https://developer.apple.com/library/archive/documentation/Security/Conceptual/AppSandboxDesignGuide/AboutAppSandbox/AboutAppSandbox.html">macOS’s App Sandbox</a>, and <a href="https://support.mozilla.org/kb/containers">Firefox Containers</a>.</p>

  <p>Whether you’re using your computer for fun or for profit, this workshop will get you up and running with Virtual Machines using the <a href="https://virtualbox.org/">VirtualBox</a> type-2 hypervisor so you can experiment with unfamiliar software more boldly, browse the Web more safely, and play games you otherwise wouldn’t have been able to. By learning how to take advantage of the virtualization capabilities your computer already offers, you can revive your love of that long-lost DOS point-and-click adventure, reliably build and test single- and multi-machine networked software systems, or simply create an almost unlimited number of purpose-built virtual machines that all exist, like inception, inside your existing laptop or other personal computer.</p>
</blockquote>

<p>As this is a remote/online-only event, there is no physical class space, but attendance is still limited to 15 students, so <a href="#tickets-workshop-2023-10-29-the-imitation-game-introduction-to-administering-virtual-machine-systems">purchase your ticket now</a> to reserve your spot.</p>

<p>To participate in our webinars, you will need access to a modern Web browser such as an up-to-date copy of <a href="https://www.mozilla.org/firefox/">Mozilla Firefox</a> or <a href="https://www.google.com/chrome/">Google Chrome</a>. You will also need a reliable Internet connection. We recommend disabling Wi-Fi and plugging your computer in to a hard-wired Ethernet network cable for the duration of the webinar, if possible.</p>

<p>If you would like to share your video screen or appear on camera, you will need to have and activate your own camera, such as the one built-in to many modern laptops. Similarly, to speak with the rest of the webinar participants, you will need a microphone. If you do choose to activate your microphone, we ask that you please plug in headphones/ear buds or use a headset in order to help reduce audio feedback loops that can degrade the webinar experience for other participants.</p>

<p>Please refer to <a href="/faq/#workshops-and-webinars">our workshops and webinars FAQ</a> for additional tips and advice before you join the video conference.</p>

<p>As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior <em>will</em> result in immediate removal from class without a refund. Please refer to <a href="https://github.com/AnarchoTechNYC/meta/wiki/Social-rules">our lightweight social rules</a> for details on our strictly enforced no-tolerance policy against bigotry of any kind.</p>

<h2 id="about-tech-learning-collective">About Tech Learning Collective</h2>

<p>Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit <a href="/">TechLearningCollective.com</a>.</p>]]></content><author><name>Tech Learning Collective</name><email>techlearningcollective@riseup.net</email></author><summary type="html"><![CDATA[This workshop is a practical introduction to creating, using, and administering virtual machine (VM) systems. Even if you’ve never heard of a virtual machine before, you probably already use the underlying technology. And you can get a lot out of using a virtual machine even if you aren’t a software developer because they can help secure your Web browsing activity, give you a sandbox in which to try out new software, and much more!]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://techlearningcollective.com/static/images/workshop.the-imitation-game-introduction-to-administering-virtual-machine-systems.rectangle.jpg" /><media:content medium="image" url="http://techlearningcollective.com/static/images/workshop.the-imitation-game-introduction-to-administering-virtual-machine-systems.rectangle.jpg" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Tor: What is it Good For? (Absolutely Everything!)</title><link href="http://techlearningcollective.com/events/2023/10/workshop-2023-10-28-tor-what-is-it-good-for-absolutely-everything" rel="alternate" type="text/html" title="Tor: What is it Good For? (Absolutely Everything!)" /><published>2023-10-28T13:30:00-04:00</published><updated>2023-10-28T13:30:00-04:00</updated><id>http://techlearningcollective.com/events/2023/10/workshop-2023-10-28-tor-what-is-it-good-for-absolutely-everything</id><content type="html" xml:base="http://techlearningcollective.com/events/2023/10/workshop-2023-10-28-tor-what-is-it-good-for-absolutely-everything"><![CDATA[<p>Come learn how the free Tor Web Browser can be your gateway to the Dark Web while simultaneously keeping you safer and your personal info more private as you browse web sites big and small. In this deep dive workshop on Tor, the Tech Learning Collective’s cybersecurity trainers will show you how to make the most of this widely available and free digital safety tool.</p>

<h2 id="workshop-description">Workshop Description</h2>

<blockquote>
  <p>From illegal online drug stores like Silk Road to DDoS botnet command and control headquarters, media attention has long painted “the Dark Web” as though nothing good can come of it. But learn just a little bit more about how Tor and “hidden services” work and you’ll find a treasure trove of valuable possibilities for day-to-day Internet use. The same technology that can hide the location of a drug ring can also serve as a free VPN-like service to protect your privacy while you browse the Internet, make censored websites available again, and even let you host your own Internet services for free, all without opening a single port on your firewall!</p>

  <p>In this deep dive workshop on Tor, the Tech Learning Collective’s cybersecurity trainers will show you how to make the most of this widely available and free digital safety tool. They’ll demonstrate numerous Tor features such as Tor authentication, target service load balancing, and NAT-punching. In the process, you’ll finally understand—on a technical level—what the “Dark Web” actually is and how it works. Bring a laptop to class, and you’ll leave having run your own Dark Web site. This class is for everyone; whether you’re a veteran black hat or a timid newbie, this class will shine a light on the Dark Web once and for all.</p>
</blockquote>

<p>As this is a remote/online-only event, there is no physical class space, but attendance is still limited to 15 students, so <a href="#tickets-workshop-2023-10-28-tor-what-is-it-good-for-absolutely-everything">purchase your ticket now</a> to reserve your spot.</p>

<p>To participate in our webinars, you will need access to a modern Web browser such as an up-to-date copy of <a href="https://www.mozilla.org/firefox/">Mozilla Firefox</a> or <a href="https://www.google.com/chrome/">Google Chrome</a>. You will also need a reliable Internet connection. We recommend disabling Wi-Fi and plugging your computer in to a hard-wired Ethernet network cable for the duration of the webinar, if possible.</p>

<p>If you would like to share your video screen or appear on camera, you will need to have and activate your own camera, such as the one built-in to many modern laptops. Similarly, to speak with the rest of the webinar participants, you will need a microphone. If you do choose to activate your microphone, we ask that you please plug in headphones/ear buds or use a headset in order to help reduce audio feedback loops that can degrade the webinar experience for other participants.</p>

<p>Please refer to <a href="/faq/#workshops-and-webinars">our workshops and webinars FAQ</a> for additional tips and advice before you join the video conference.</p>

<p>As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior <em>will</em> result in immediate removal from class without a refund. Please refer to <a href="https://github.com/AnarchoTechNYC/meta/wiki/Social-rules">our lightweight social rules</a> for details on our strictly enforced no-tolerance policy against bigotry of any kind.</p>

<h2 id="about-tech-learning-collective">About Tech Learning Collective</h2>

<p>Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit <a href="/">TechLearningCollective.com</a>.</p>]]></content><author><name>Tech Learning Collective</name><email>techlearningcollective@riseup.net</email></author><summary type="html"><![CDATA[Come learn how the free Tor Web Browser can be your gateway to the Dark Web while simultaneously keeping you safer and your personal info more private as you browse web sites big and small. In this deep dive workshop on Tor, the Tech Learning Collective’s cybersecurity trainers will show you how to make the most of this widely available and free digital safety tool.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://techlearningcollective.com/static/images/workshop.tor-what-is-it-good-for-absolutely-everything.rectangle.jpg" /><media:content medium="image" url="http://techlearningcollective.com/static/images/workshop.tor-what-is-it-good-for-absolutely-everything.rectangle.jpg" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Taming Daemons: System Administration and Operation Basics</title><link href="http://techlearningcollective.com/events/2023/10/workshop-2023-10-22-taming-daemons-system-administration-and-operation-basics" rel="alternate" type="text/html" title="Taming Daemons: System Administration and Operation Basics" /><published>2023-10-22T13:30:00-04:00</published><updated>2023-10-22T13:30:00-04:00</updated><id>http://techlearningcollective.com/events/2023/10/workshop-2023-10-22-taming-daemons-system-administration-and-operation-basics</id><content type="html" xml:base="http://techlearningcollective.com/events/2023/10/workshop-2023-10-22-taming-daemons-system-administration-and-operation-basics"><![CDATA[<p>Most individuals with access to a computer system have more power today than ever before, but rarely do they make use of it or even know how much power they truly have. In this beginner’s workshop, you’ll begin learning how to “speak with the machines.” By learning to communicate more expressively with the digital devices that are increasingly responsible for mediating contemporary society, you’ll gain the power to effectively and materially change your relationship not only with your laptop, but with global systems of law, finance, and even art, literature, and philosophy governing today’s world.</p>

<h2 id="workshop-description">Workshop Description</h2>

<blockquote>
  <p>How much good does a powerful tool do for you if you don’t know how to use it well? How much more capable would you be if you mastered all the tools available to you? It might sound ridiculous, but failing to learn the practicalities of computer system operation basics is arguably the most common mistake people in the fast-paced tech scene make.</p>

  <p>Modern computers are power tools, and behind each one of them is a human operator, or “system administrator,” responsible for configuring and maintaining that computer. If you have a personal computer such as a laptop or smartphone, then you are already a system administrator whether you realize it or not! Making sure the apps you want to use are installed and up to date, managing the amount of free space you have for your photos, and connecting or disconnecting from the Internet are all examples of simple system administration tasks that you probably already take on a daily basis.</p>

  <p>In this beginner’s workshop, we’ll start by exploring what happens inside your computer when you take every-day tasks like open a Web browser or save files, and then dive down the rabbit hole to meet the special class of programs that make it possible for all your other programs to work. Called <em>daemons</em>, short for Disk Access and Execution Monitors, they make up the world of Operating System services, signals, sockets, and more under the hood of your desktop environment. By the end of this workshop, you’ll have a far deeper understanding of how to care for your computer, as well as the ability to understand any new tools or services you encounter a whole lot faster than ever before.</p>
</blockquote>

<p>As this is a remote/online-only event, there is no physical class space, but attendance is still limited to 15 students, so <a href="#tickets-workshop-2023-10-22-taming-daemons-system-administration-and-operation-basics">purchase your ticket now</a> to reserve your spot.</p>

<p>To participate in our webinars, you will need access to a modern Web browser such as an up-to-date copy of <a href="https://www.mozilla.org/firefox/">Mozilla Firefox</a> or <a href="https://www.google.com/chrome/">Google Chrome</a>. You will also need a reliable Internet connection. We recommend disabling Wi-Fi and plugging your computer in to a hard-wired Ethernet network cable for the duration of the webinar, if possible.</p>

<p>If you would like to share your video screen or appear on camera, you will need to have and activate your own camera, such as the one built-in to many modern laptops. Similarly, to speak with the rest of the webinar participants, you will need a microphone. If you do choose to activate your microphone, we ask that you please plug in headphones/ear buds or use a headset in order to help reduce audio feedback loops that can degrade the webinar experience for other participants.</p>

<p>Please refer to <a href="/faq/#workshops-and-webinars">our workshops and webinars FAQ</a> for additional tips and advice before you join the video conference.</p>

<p>As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior <em>will</em> result in immediate removal from class without a refund. Please refer to <a href="https://github.com/AnarchoTechNYC/meta/wiki/Social-rules">our lightweight social rules</a> for details on our strictly enforced no-tolerance policy against bigotry of any kind.</p>

<h2 id="about-tech-learning-collective">About Tech Learning Collective</h2>

<p>Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit <a href="/">TechLearningCollective.com</a>.</p>]]></content><author><name>Tech Learning Collective</name><email>techlearningcollective@riseup.net</email></author><summary type="html"><![CDATA[Most individuals with access to a computer system have more power today than ever before, but rarely do they make use of it or even know how much power they truly have. In this beginner’s workshop, you’ll begin learning how to “speak with the machines.” By learning to communicate more expressively with the digital devices that are increasingly responsible for mediating contemporary society, you’ll gain the power to effectively and materially change your relationship not only with your laptop, but with global systems of law, finance, and even art, literature, and philosophy governing today’s world.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://techlearningcollective.com/static/images/workshop.taming-daemons-system-administration-and-operation-basics.rectangle.jpg" /><media:content medium="image" url="http://techlearningcollective.com/static/images/workshop.taming-daemons-system-administration-and-operation-basics.rectangle.jpg" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Clearing Away the Clouds: How Computer Networks, Servers, and the Internet Work</title><link href="http://techlearningcollective.com/events/2023/10/workshop-2023-10-21-clearing-away-the-clouds-how-computer-networks-servers-and-the-internet-work" rel="alternate" type="text/html" title="Clearing Away the Clouds: How Computer Networks, Servers, and the Internet Work" /><published>2023-10-21T13:30:00-04:00</published><updated>2023-10-21T13:30:00-04:00</updated><id>http://techlearningcollective.com/events/2023/10/workshop-2023-10-21-clearing-away-the-clouds-how-computer-networks-servers-and-the-internet-work</id><content type="html" xml:base="http://techlearningcollective.com/events/2023/10/workshop-2023-10-21-clearing-away-the-clouds-how-computer-networks-servers-and-the-internet-work"><![CDATA[<p>Learn the basics of computer networking in this workshop that starts by watching a “conversation” between two computers as it’s happening in real time. You’ll be introduced to the free professional network analysis application called Wireshark so that you can listen in on what the programs on your computer are saying to or hearing from other computers across the Internet. By the end of this workshop, you’ll understand all about the basics of computer networking. If you’ve ever been curious about what happens “on the wire” when you’re browsing a Web site, or if you ever wanted to take a look “under the hood” of your Wi-Fi connection, this is the class for you!</p>

<h2 id="workshop-description">Workshop Description</h2>

<blockquote>
  <p>Our ability to browse Web sites, send and receive digital messages like emails and text messages, and make phone or video calls depends on the connections our digital devices make with one another. That makes it critical to understand how these connections are made, and where they lead to. Far from being an amorphous “cloud,” modern telecommunications networks and services like the Internet are made up of physical devices. Some of these you can see, like your own computer or the router and modem in your house, and others you can’t, like distant servers or Layer 2 switches that make up the network infrastructure itself.</p>

  <p>In this workshop derived from a portion of the <a href="/courses/net101.html">Tech Learning Collective’s NET101 course</a>, you’ll have the opportunity to actually look—visually and with great detail—at how your computer “talks” to other computers like those that power Google Drive, Facebook, and other cloud services. By using an industry-standard tool called <a href="https://wireshark.org/">Wireshark</a>, we’ll dissect a conversation between your computer and a server and walk through the process of encapsulating a packet of application layer data, emitting it onto a network, and watching it travel to its destination. We’ll also touch on some illustrative counter-examples to explore how things can go wrong on a network, such as <a href="https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol">DHCP</a> server misconfigurations, <a href="https://en.wikipedia.org/wiki/ARP_spoofing">ARP spoofing attacks</a>, and unsecured or weakly-secured Wi-Fi networks.</p>
</blockquote>

<p>As this is a remote/online-only event, there is no physical class space, but attendance is still limited to 15 students, so <a href="#tickets-workshop-2023-10-21-clearing-away-the-clouds-how-computer-networks-servers-and-the-internet-work">purchase your ticket now</a> to reserve your spot.</p>

<p>To participate in our webinars, you will need access to a modern Web browser such as an up-to-date copy of <a href="https://www.mozilla.org/firefox/">Mozilla Firefox</a> or <a href="https://www.google.com/chrome/">Google Chrome</a>. You will also need a reliable Internet connection. We recommend disabling Wi-Fi and plugging your computer in to a hard-wired Ethernet network cable for the duration of the webinar, if possible.</p>

<p>If you would like to share your video screen or appear on camera, you will need to have and activate your own camera, such as the one built-in to many modern laptops. Similarly, to speak with the rest of the webinar participants, you will need a microphone. If you do choose to activate your microphone, we ask that you please plug in headphones/ear buds or use a headset in order to help reduce audio feedback loops that can degrade the webinar experience for other participants.</p>

<p>Please refer to <a href="/faq/#workshops-and-webinars">our workshops and webinars FAQ</a> for additional tips and advice before you join the video conference.</p>

<p>As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior <em>will</em> result in immediate removal from class without a refund. Please refer to <a href="https://github.com/AnarchoTechNYC/meta/wiki/Social-rules">our lightweight social rules</a> for details on our strictly enforced no-tolerance policy against bigotry of any kind.</p>

<h2 id="about-tech-learning-collective">About Tech Learning Collective</h2>

<p>Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit <a href="/">TechLearningCollective.com</a>.</p>]]></content><author><name>Tech Learning Collective</name><email>techlearningcollective@riseup.net</email></author><summary type="html"><![CDATA[Learn the basics of computer networking in this workshop that starts by watching a “conversation” between two computers as it’s happening in real time. You’ll be introduced to the free professional network analysis application called Wireshark so that you can listen in on what the programs on your computer are saying to or hearing from other computers across the Internet. By the end of this workshop, you’ll understand all about the basics of computer networking. If you’ve ever been curious about what happens “on the wire” when you’re browsing a Web site, or if you ever wanted to take a look “under the hood” of your Wi-Fi connection, this is the class for you!]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://techlearningcollective.com/static/images/workshop.clearing-away-the-clouds-how-computer-networks-servers-and-the-internet-work.rectangle.jpg" /><media:content medium="image" url="http://techlearningcollective.com/static/images/workshop.clearing-away-the-clouds-how-computer-networks-servers-and-the-internet-work.rectangle.jpg" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Automate All the Things: A Primer to Infrastructure as Code</title><link href="http://techlearningcollective.com/events/2023/10/workshop-2023-10-15-automate-all-the-things-a-primer-to-infrastructure-as-code" rel="alternate" type="text/html" title="Automate All the Things: A Primer to Infrastructure as Code" /><published>2023-10-15T13:30:00-04:00</published><updated>2023-10-15T13:30:00-04:00</updated><id>http://techlearningcollective.com/events/2023/10/workshop-2023-10-15-automate-all-the-things-a-primer-to-infrastructure-as-code</id><content type="html" xml:base="http://techlearningcollective.com/events/2023/10/workshop-2023-10-15-automate-all-the-things-a-primer-to-infrastructure-as-code"><![CDATA[<p>Learn how to make your own Virtual Private Cloud (VPC), automatically install software on the servers in your cloud, and write executable runbooks to automatically perform upgrades and other maintenance with the press of a button. With today’s modern automation toolkits, a two-person hobby project can outperform a 100-person company, as long as they use the right tools the right way. In this workshop, you’ll get a practical introduction to cloud infrastructure automation with tools like Ansible, Vagrant, and Terraform, and a chance to solidify your understanding of fundamental DevOps skills that every IT professional needs.</p>

<h2 id="workshop-description">Workshop Description</h2>

<blockquote>
  <p>In today’s IT environments, application servers, databases, file shares, and even network devices are too numerous for any individual or team to provision, configure, and administer one at a time. To deploy, maintain, and secure large digital fleets, site reliability engineers leverage the inherent power of computerized automation to perform everything from daily tasks (patching, updating code) to critical but rare operations (migrations, incident response). But even small groups can take advantage of this sort of automation to massively amplify their impact; today, a two-person hobby project can outperform a 100-person company if they use the right tools the right way.</p>

  <p>Generically called <em>Infrastructure as Code (IaC)</em>, modern configuration management tools like <a href="https://www.ansible.com/">Ansible</a>, <a href="https://chef.io/">Chef</a>, <a href="https://saltstack.com/">SaltStack</a>, and <a href="https://puppet.com/">Puppet</a> make it possible for a single operator to paralellize executing Standard Operating Procedures (SOPs) like initiating backups or performing blue-green deployments on hundreds or thousands of machines at once. By using virtualization through IaC tools like <a href="https://vagrantup.com/">Vagrant</a>, entire “cloud” environments can be emulated for heterogenous development teams, massively streamlining everything from software development, to R&amp;D, to education and onboarding. (Tech Learning Collective’s own course exercises and practice labs are defined in code as Vagrant configurations!) Encoding your organization’s infrastructure requirements in standard, vendor-neutral, open formats such as <a href="https://terraform.io/">Terraform</a> means you can switch from one infrastructure provider to another with ease. But perhaps most important of all, “automating all the things” means that potential disasters like ransomware extortion attempts, outages, or even mere accidents can be audited, diagnosed, and remediated in a matter of minutes instead of days or weeks.</p>

  <p>In this workshop, you’ll get a practical introduction to cloud infrastructure automation. You’ll learn how to create your first virtual private cloud (VPC), add multiple machines to it, automatically install server software on those machines, and write exectuable runbooks to automatically perform upgrades and other maintenance tasks on your new infrastructure. Whether you’re already administering a fleet of servers at work, or just want to slim your “weekend project” time down to size, this far-reaching workshop will solidify your understanding of the development operations (DevOps) skills every IT professional needs to hone to have success with modern digital infrastructure projects.</p>
</blockquote>

<p>As this is a remote/online-only event, there is no physical class space, but attendance is still limited to 15 students, so <a href="#tickets-workshop-2023-10-15-automate-all-the-things-a-primer-to-infrastructure-as-code">purchase your ticket now</a> to reserve your spot.</p>

<p>To participate in our webinars, you will need access to a modern Web browser such as an up-to-date copy of <a href="https://www.mozilla.org/firefox/">Mozilla Firefox</a> or <a href="https://www.google.com/chrome/">Google Chrome</a>. You will also need a reliable Internet connection. We recommend disabling Wi-Fi and plugging your computer in to a hard-wired Ethernet network cable for the duration of the webinar, if possible.</p>

<p>If you would like to share your video screen or appear on camera, you will need to have and activate your own camera, such as the one built-in to many modern laptops. Similarly, to speak with the rest of the webinar participants, you will need a microphone. If you do choose to activate your microphone, we ask that you please plug in headphones/ear buds or use a headset in order to help reduce audio feedback loops that can degrade the webinar experience for other participants.</p>

<p>Please refer to <a href="/faq/#workshops-and-webinars">our workshops and webinars FAQ</a> for additional tips and advice before you join the video conference.</p>

<p>As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior <em>will</em> result in immediate removal from class without a refund. Please refer to <a href="https://github.com/AnarchoTechNYC/meta/wiki/Social-rules">our lightweight social rules</a> for details on our strictly enforced no-tolerance policy against bigotry of any kind.</p>

<h2 id="about-tech-learning-collective">About Tech Learning Collective</h2>

<p>Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit <a href="/">TechLearningCollective.com</a>.</p>]]></content><author><name>Tech Learning Collective</name><email>techlearningcollective@riseup.net</email></author><summary type="html"><![CDATA[Learn how to make your own Virtual Private Cloud (VPC), automatically install software on the servers in your cloud, and write executable runbooks to automatically perform upgrades and other maintenance with the press of a button. With today’s modern automation toolkits, a two-person hobby project can outperform a 100-person company, as long as they use the right tools the right way. In this workshop, you’ll get a practical introduction to cloud infrastructure automation with tools like Ansible, Vagrant, and Terraform, and a chance to solidify your understanding of fundamental DevOps skills that every IT professional needs.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://techlearningcollective.com/static/images/workshop.automate-all-the-things-a-primer-to-infrastructure-as-code.rectangle.jpg" /><media:content medium="image" url="http://techlearningcollective.com/static/images/workshop.automate-all-the-things-a-primer-to-infrastructure-as-code.rectangle.jpg" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Computer Language Foundations: Command Line Basics</title><link href="http://techlearningcollective.com/events/2023/10/workshop-2023-10-14-computer-language-foundations-command-line-basics" rel="alternate" type="text/html" title="Computer Language Foundations: Command Line Basics" /><published>2023-10-14T13:30:00-04:00</published><updated>2023-10-14T13:30:00-04:00</updated><id>http://techlearningcollective.com/events/2023/10/workshop-2023-10-14-computer-language-foundations-command-line-basics</id><content type="html" xml:base="http://techlearningcollective.com/events/2023/10/workshop-2023-10-14-computer-language-foundations-command-line-basics"><![CDATA[<p>You have read about people who can talk to machines. Maybe you imagined secret chambers, hidden away behind locked doors, with dark rooms basking in blue from electric fires. Some of these people seemed friendly, others scary, but all of them were powerful. How did they learn to communicate with their computers? This is your chance to learn the foundations of all computer languages, the command line, and actually begin to talk to a machine yourself.</p>

<h2 id="workshop-description">Workshop Description</h2>

<blockquote>
  <p>To be useful, every computer must offer some way for you to control it. Generically, the way you can control a computer is called a <em>user interface</em> because it allows you (the user) to interact with (that is, “to interface with”) the computer system. Most people may already be familiar with <em>Graphical User Interfaces</em> or GUIs, which are the buttons, windows, and other controls that you can point-and-click on, but this way of controlling a computer comes with severe limitations. Chief among these is the fact that you are limited to using only one tip of one finger on one of your hands (called your <em>pointer</em> or <em>mouse cursor</em>) and, worse, you have no access to anything outside of your immediate reach. In a GUI, if you cannot see it or touch it with the mouse, you cannot manipulate it.</p>

  <p>This is why almost all hackers, programmers, and system administrators prefer a Command Line Interface or CLI over the graphical options for many, if not most, of their day-to-day tasks. In a command-line, or “terminal,” you can use the complete expressive power of spoken language to control your computer. You can use symbolism and metaphor to express any idea that you have the words for. Moreover, you always have all the words you know at your disposal at any time, even if they refer to things that are far away or that you cannot currently see.</p>

  <p>In this beginner’s workshop, you’ll learn how to access the command line interface of your computer, and you’ll learn the basic grammar of command line languages such as that provided by the ubiquitous Bash command interpreter. You’ll also be introduced to the basic set of utilities required to quickly accomplish tasks that require working with files and folders, processing text, and automating common workflows that would take dozens or even hundreds of clicks with a mouse to complete in a Graphical User Interface. By learning how to “speak” to your computer using a command language, you can save hours every day and take your first step toward using your computer the way the best hackers would.</p>
</blockquote>

<p>As this is a remote/online-only event, there is no physical class space, but attendance is still limited to 15 students, so <a href="#tickets-workshop-2023-10-14-computer-language-foundations-command-line-basics">purchase your ticket now</a> to reserve your spot.</p>

<p>To participate in our webinars, you will need access to a modern Web browser such as an up-to-date copy of <a href="https://www.mozilla.org/firefox/">Mozilla Firefox</a> or <a href="https://www.google.com/chrome/">Google Chrome</a>. You will also need a reliable Internet connection. We recommend disabling Wi-Fi and plugging your computer in to a hard-wired Ethernet network cable for the duration of the webinar, if possible.</p>

<p>If you would like to share your video screen or appear on camera, you will need to have and activate your own camera, such as the one built-in to many modern laptops. Similarly, to speak with the rest of the webinar participants, you will need a microphone. If you do choose to activate your microphone, we ask that you please plug in headphones/ear buds or use a headset in order to help reduce audio feedback loops that can degrade the webinar experience for other participants.</p>

<p>Please refer to <a href="/faq/#workshops-and-webinars">our workshops and webinars FAQ</a> for additional tips and advice before you join the video conference.</p>

<p>As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior <em>will</em> result in immediate removal from class without a refund. Please refer to <a href="https://github.com/AnarchoTechNYC/meta/wiki/Social-rules">our lightweight social rules</a> for details on our strictly enforced no-tolerance policy against bigotry of any kind.</p>

<h2 id="about-tech-learning-collective">About Tech Learning Collective</h2>

<p>Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit <a href="/">TechLearningCollective.com</a>.</p>]]></content><author><name>Tech Learning Collective</name><email>techlearningcollective@riseup.net</email></author><summary type="html"><![CDATA[You have read about people who can talk to machines. Maybe you imagined secret chambers, hidden away behind locked doors, with dark rooms basking in blue from electric fires. Some of these people seemed friendly, others scary, but all of them were powerful. How did they learn to communicate with their computers? This is your chance to learn the foundations of all computer languages, the command line, and actually begin to talk to a machine yourself.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://techlearningcollective.com/static/images/workshop.computer-language-foundations-command-line-basics.rectangle.jpg" /><media:content medium="image" url="http://techlearningcollective.com/static/images/workshop.computer-language-foundations-command-line-basics.rectangle.jpg" xmlns:media="http://search.yahoo.com/mrss/" /></entry></feed>