default search action
login - The Usenix Magazine, Volume 32
Volume 32, Number 1, February 2007
- Rik Farrow:
Musings.
- Simson L. Garfinkel:
Commodity Grid Computing with Amazon's S3 and EC2. - Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Roadmap to a Failure-Resilient Operating System. - Steven Hand, Andrew Warfield, Keir Fraser:
Hardware Virtualization with Xen.
- Mark Burgess:
Configuration Management: Models and Myths. Part4: There's No I/O Without U. - Leigh Griffin, John Ronan:
Xen Installation and Configuration. - Robert M. Marmorstein, Phil Kearns:
Debugging a Firewall Policy with Policy Mapping.
- David N. Blank-Edelman:
Practical Perl Tools: Spawning. - Robert Haskins:
ISPadmin: DHCP Services. - Heison Chak:
Virtualizing Asterisk. - Robert G. Ferrell:
/dev/random.
- Elizabeth D. Zwicky, et al.:
Book Reviews.
- Hans Boehm, Bill Pugh, Doug Lea:
Multithreading in C and C++.
- Ellie Young:
USENIX Board of Directors Meetings and Actions. - Jane-Ellen Long:
SAGE Update.
Volume 32, Number 2, April 2007
- Rik Farrow:
Musings.
- Glenn A. Fink, Deborah A. Frincke:
Autonomic Computing: Freedom or Threat? - Chad Verbowski:
The Secret Lives of Computers Exposed: Flight Data Recorder for Windows. - Brendan Quinn:
Lessons Learned from Living with LDAP. - John Lloyd:
Introducing System Engineering to the System Admin. - Rik Farrow:
Promises, Promises: An Interview with Mark Burgess. - Daniel L. Appelman:
Spam and Blogs. Part 1: Spam: A Balancing Act. - Thomas Sluyter:
All Quiet on the Western Front: A Discussion on the Necessity of Good Reporting.
- David N. Blank-Edelman:
Practical Perl Tools: These Inodes Were Made for Walkin'. - Robert Haskins:
VoIP in an Internet Service Provider Network. - Heison Chak:
Asterisk Appliance. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Nicholas M. Stoughton:
Why Standardize?
- Jane-Ellen Long, Alva L. Couch:
SAGE Update.
Volume 32, Number 3, June 2007
- Rik Farrow:
Musings.
- Marshall K. McKusick:
A Brief History of the BSD Fast File System. - Pawel Jakub Dawidek, Marshall K. McKusick:
Porting the Solaris ZFS File System to the FreeBSD Operating System. - Avantika Mathur, Mingming Cao, Andreas Dilger:
Ext4: The Next Generation of the Ext3 File System.
- Dan Geer:
A Quant Looks at the Future. - Vassilis Prevelakis:
Supporting a Security Laboratory.
- Daniel L. Appelman:
Spam and Blogs. Part 2: Blogs, for Good or Ill. - Alexander Muentz:
Script Kiddies with Briefcases: The Legal System as Threat.
- David N. Blank-Edelman:
Practical Perl Tools: Impractical Perl Tools. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Alex Aiken:
In Memoriam: John W. Backus, 1924-2007.
Volume 32, Number 4, August 2007
- Rik Farrow:
Musings.
- Michael Piatek, Tomas Isdal, Thomas E. Anderson, Arvind Krishnamurthy, Arun Venkataramani:
Building BitTyrant, a (More) Strategic BitTorrent Client. - Alva L. Couch:
Should the Root Prompt Require a Road Test? - Octave Orgeron:
An Introduction to Logical Domains, Part 1. - Emin Gün Sirer, Rik Farrow:
Some Lesser-Known Laws of Computer Science. - Massimo Bernaschi, Francesco Casadei, Samuele Ruco:
Migration of Secure Connections Using SockMi.
- David N. Blank-Edelman:
Practical Perl Tools: Peter Piper Picked a Peck ofPDFs. - David Josephsen:
iVoyeur: A View from Someplace Nearby. - Heison Chak:
Deviating Alternatives to Asterisk. - Robert G. Ferrell:
/dev/random.
- Nick Stoughton:
An Update on Standards: Revision Fever.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Toni Veglia:
Summary of USENIX Board of DirectorsMeetings and Actions. - Rob Kolstad:
Flame and STUG Awards. - Ellie Young:
USENIX Association Financial Report for 2006.
Volume 32, Number 5, October 2007
- Rik Farrow:
Musings.
- Andrey Mirtchovski, Latchesar Ionkov:
Why Some Dead OSes Still Matter.
- Cat Okita:
(Digital) Identity 2.0.
- Alexander Muentz:
Hardening Your Systems Against Litigation.
- Octave Orgeron:
An Introduction to Logical Domains, Part 2.
- Hemant Sengar:
IP Telephony.
- David N. Blank-Edelman:
Practical Perl Tools: Let Me Draw You a Picture. - David Josephsen:
iVoyeur: Opaque Brews. - Robert G. Ferrell:
/dev/random.
- Nicholas M. Stoughton:
Whither C++?
- Elizabeth Zwicky, et al.:
Book Reviews.
- Dan S. Wallach:
Creating the EVT Workshop. - Ellie Young:
2008 USENIX Nominating Committee.
Volume 32, Number 6, December 2007
- Rik Farrow:
Musings.
- David Dittrich, Sven Dietrich:
Command and Control Structures in Malware: From Handler/Agent to P2P. - Sam Stover, David Dittrich, John Hernandez, Sven Dietrich:
Analysis of the Storm and Nugache Trojans: P2P Is Here. - Tal Garfinkel, Andrew Warfield:
What Virtualization Can Do for Security. - Gernot Heiser:
Your System Is Secure? Prove It! - Gary McGraw, Rik Farrow:
Exploiting Online Games: An Interview.
- Mike Rash:
IDS Signature Matching with iptables, psad, and fwsnort.
- David N. Blank-Edelman:
Practical Perl Tools: Perl Meets Nmap and p0f. - David Josephsen:
iVoyeur: Mystical Flows. - Heison Chak:
Asterisk and LumenVox ASR. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Ellie Young:
Thanks to Our Volunteers. - Ellie Young:
2008 Election of the USENIX Board of Directors. - Rob Kolstad:
USACO Update.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.