default search action
login - The Usenix Magazine, Volume 27
Volume 27, Number 1, February 2002
- Rob Kolstad:
MOTD. - Tina Darmohray:
Apropos. - Clif Flynt:
Letters to the Editors. - Glen McCluskey:
New Preprocessor Features in C9X.
- Rik Farrow:
Musings.
- Steven M. Tylock:
GVSAGE Visits the Local Technology Show. - Steven M. Tylock:
If Computers Had Blood, We'd Be Called Doctors, Part 2. - Strata R. Chalup:
Consulting Reflections.
- Christopher M. Russo:
What is Your Problem? That Email Was Fine! - Edgar Danielyan:
The Law Moves In. - Trey Harris:
Ask Mr. Know-It-All. - Steve Johnson, Dusty White:
Judgment. - Ray Swartz:
When Do You Plan to Retire?
- Peter H. Salus:
The Bookworm.
Volume 27, Number 2, April 2002
- Clif Flynt:
The Tclsh Spot. - Glen McCluskey:
Math Library Functions in C9X.
- Ofir Arkin:
A Remote Active OS Fingerprinting Tool Using ICMP. - Rik Farrow:
Musings.
- Robert Haskins:
ISPAdmin. - Rick Moen:
A Recipe for a Successful Linux User Group. - Strata R. Chalup:
Wiki, Blog, Zope, and Other Communicative Grunts.
- Ray Swartz:
Planning a Model Retirement. - John Nicholson:
Data Privacy.
- Peter H. Salus, Raymond M. Schneider:
The Bookworm / "Agile Software Development" by Alistair Cockburn.
- Rob Kolstad:
Conference on File and Storage Technologies (FAST '02). - Tina Darmohray, Rob Kolstad:
Point/Counterpoint.
Volume 27, Number 3, June 2002
- Rob Kolstad:
MOTD. - Tina Darmohray:
Apropos.
- Strata R. Chalup:
Uncle Sam as Uncle Spam. - Erin Kenneally:
Evolving Behavioral Boundaries in Cyberspace.
- Adam Turoff:
Practical Perl. - Kragen Sitaker:
Python or Perl: Which is Better? - Clif Flynt:
The Tclsh Spot. - Glen McCluskey:
New I/O Features in C9X.
- Gunnar E. Wolf:
ProtoWrap. - Rik Farrow:
Musings.
- Robert Haskins:
ISPAdmin. - Paco Hope:
Using Jails in FreeBSD for Fun and Profit.
Volume 27, Number 4, August 2002
- Rob Kolstad:
MOTD. - Tina Darmohray:
Apropos.
- Hobbit:
High Availability.
- Erin Kenneally:
Computer Forensics.
- Glen McCluskey:
Wide Characters. - Adam Turoff:
Practical Perl. - Clif Flynt:
The Tclsh Spot.
- Gary Cohen:
Securing FTP. - Rik Farrow:
Musings. - Robert Foust:
Identifying and Tracking Unauthorized 802.11 Cards and Access Points. - Avishai Wool:
Combating the Perils of Port 80 at the Firewall.
- Robert Haskins:
ISPAdmin. - Howard Owen:
The Problem of PORCMOLSULB. - David A. Patterson:
An Introduction to Dependability. - Neil Ashizawa:
Monitoring Strategies for High-Availability Web Apps. - John Sellens:
Ten Reasons to Monitor Your System. - Steven M. Tylock:
If Systems Were Cars, Would Yours Be Doubled Parked? - Steven M. Tylock:
The SysAdmin's Court: Liz Action vs. Jack Trades.
- Peter H. Salus, Nina Karhuluoma:
Have You Locked the Castle Gates? reviewed by Chuck Hardin, and of John Viega and Gary McGraw: Building Secure Software.
Volume 27, Number 5, October 2002
- Rob Kolstad:
MOTD. - Tina Darmohray:
Apropos.
- Strata R. Chalup:
Vive la Révolution! Now Get Over It!
- John Nicholson:
Software Licensing 101.
- Glen McCluskey:
C99 and Compatability. - Adam Turoff:
Practical Perl. - Clif Flynt:
Generating Ethernet Packets.
- Rik Farrow:
Musings, Or What I Did on My Summer Vacation.
- Robert Haskins:
ISPAdmin. - Jozef Skvarcek:
Remote Monitoring with SNMP. - James Carlini:
Cabling: Just the Tip of the Iceberg.
- Peter H. Salus, Anton Chuvakin:
Incident Response, and of Lance Spitzner: Honeypots: Tracking Hackers, reviewed by Eugene Schultz and Russell Shumway.
- Andrew Josey:
Report received August 2002.
Volume 27, Number 6, December 2002
- Rob Kolstad:
MOTD. - Rik Farrow:
In This Issue.
- Kevin Fu, Michael Kaminsky, David Mazières:
Using SFS for a Secure Network File System. - Jared Allison:
Automated Log Procesing. - Lance Spitzner:
HOSUS (Honeypot Surveillance System). - George M. Jones:
The Case for Network Infrastructure Security. - Ofir Arkin:
Security Threats to IP Telephony-Based Networks. - Tom Perrine:
The Kernelized Secure Operating System (KSOS). - Erin Kenneally:
"It Depends": Defining Legal Values for Network Behavior. - Sven Dietrich:
Active Network Defense: Some Concepts and Techniques. - Abe Singer:
The Regional Information Watch. - Peter H. Salus:
Secure from What?
- Peter H. Salus, Raymond M. Schneider:
Dave Sill: The qmail Handbook reviewed by Dustin Puryear, and of Yukihiro Matsumoto w/translated text by David L. Reynolds: Ruby in a Nutshell.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.