default search action
login - The Usenix Magazine, Volume 30
Volume 30, Number 1, February 2005
- Rob Kolstad:
MOTD. - Marcus J. Ranum:
Letters to the Editor. - Rob Kolstad:
SAGE-News Article on SCO Defacement.
- Heison Chak:
Voice over IP with Asterisk.
- Steven Alexander:
Why Teenagers Hack: A Personal Memoir. - Rik Farrow:
Musings. - Tina Darmohray:
Firewalls and Fairy Tales. - Steven Alexander:
The Importance of Securing Workstations. - Abe Singer:
Tempting Fate.
- Robert Haskins:
ISPadmin. - Thomas Sluyter:
Getting What You Want: The Fine Art of Proposal Writing. - Mark Burgess:
The Profession of System Administration.
- Adam Turoff:
Practical Perl: Error Handling Patterns in Perl. - Clif Flynt:
The Tclsh Spot. - Glen McCluskey:
Working with C# Serialization.
- Peter H. Salus:
The Bookworm. - Rik Farrow, Chuck Hardin:
Book Reviews.
- Peter H. Salus:
20 Years Ago ... and More. - Tara Mulligan:
Summary of USENIX Board of Directors Actions.
Volume 30, Number 2, April 2005
- Rob Kolstad:
MOTD: Leverage. - Steven Alexander:
Letter to the Editor. - Rik Farrow:
Musings.
- Adam Turoff:
Practical Perl: Programs to Write Programs.
- Jason G. Andress:
IPv6: The Next Internet Protocol.
- Robert Haskins:
ISPadmin: Interview with Vipul Ved Prakash. - Hal Miller:
Customer Requirements Specificationsfor System Administrators.
- Nick Stoughton:
Update on Standards.
- Æleen Frisch:
The Bookworm. - Rik Farrow:
Book Reviews.
- Peter H. Salus:
Years and Years Ago. - Rik Farrow:
Short Topics Booklets. - Peter H. Salus:
Thirtieth Anniversary, USENIX Association.
Volume 30, Number 3, June 2005
- Rob Kolstad:
MOTD. - Jon Finke:
Letter to the Editor. - Heison Chak:
More Asterisk Tricks.
- Anthony Howe:
Shoot the Messenger: Some Techniques for Spam Control. - Thomas Sluyter, Roland van Maarschalkerweerd:
When Disaster Strikes: Cailin and Roland Discuss Crisis Management. - Ofir Arkin:
Demystifying Passive Network Discovery and Monitoring Systems. - Andrew Hume:
How's Your OS These Days?
- Adam Turoff:
Practical Perl: Date and Time Formatting in Perl.
- Amr El-Kadi, Ahmed Nashed, Kareem El Gebaly, Mahmoud Abo Daoud, Noha El Sharawy, Rania Nazmi, Mostafa Mazen:
Architecture and Internal Design of the AUC-Abyss Web Server.
- Boris Loza:
Under Attack: Dealing with Missing UNIX Files. - Steven Alexander:
Defeating Compiler-level Buffer Overflow Protection. - Rik Farrow:
Musings.
- Æleen Frisch:
The Bookworm.
- Ellie Young:
Vale, Rob, atque Ave, Rik. - Tara Mulligan:
Summary of the USENIX Board of Directors Actions. - Peter H. Salus:
Annual Awards.
Volume 30, Number 4, August 2005
- Rik Farrow:
Musings. - Abe Singer:
Conference Password Sniffing: Legal and Ethical Issues.
- Jon Crowcroft, Keir Fraser, Steven Hand, Ian Pratt, Andrew Warfield:
The Inevitability of Xen. - Mark McCullough:
Secure Automated File Transfer. - Adam Levin:
SAN vs. NAS for Oracle: A Tale of Two Protocols. - Adam Turoff:
Practical Perl: Defensive CGI Programming with Taint Mode and CGI: : Untaint. - Robert Haskins:
ISPadmin: Understanding and Mitigating DDoS Attacks.
- Daniel L. Appelman:
Primer on Cybercrime Laws.
- Sean Peisert:
Forensics for System Administrators. - Steve Manzuik:
Your Defense Is Offensive.
- Emily W. Salus, Peter H. Salus:
Marketing After the Bubble.
- Rik Farrow:
Book Reviews.
- Peter H. Salus:
20 Years Ago in ;login. - David W. Parter:
SAGE Update. - Tara Mulligan, Anne Dickison:
New Membership Benefits.
Volume 30, Number 5, October 2005
- Rik Farrow:
Musings.
- Michael W. Lucas:
FreeBSD 5 SMPng. - Marc E. Fiuczynski:
Better Tools for Kernel Evolution, Please! - Peter Baer Galvin:
Solaris 10 Containers.
- Hobbit:
DNS-based Spam Rejection. - Boris Loza:
Finding Trojans for Fun and Profit. - Robert Haskins:
ISPadmin: Embedded Hardware.
- David Malone:
Security Through Obscurity: A Review of a Few of FreeBSD's Lesser-Known Security Capabilities. - Srikanth Kandula:
Surviving DDoS Attacks.
- Geoffrey Mainland, Matt Welsh:
Distributed, Adaptive Resource Allocation for Sensor Networks.
- Elizabeth Zwicky, Adam Turoff:
Book Reviews.
- Peter H. Salus:
25 Years Ago. - Chris Palmer:
SAGE Update. - Rob Kolstad:
USACO, the USA Computing Olympiad.
Volume 30, Number 6, December 2005
- Rik Farrow:
Musings. - Dan Geer:
Monoculture on the Back of the Envelope.
- Gernot Heiser:
Secure Embedded Systems Need Microkernels. - Shaya Potter, Jason Nieh:
Breaking the Ties That Bind: Application Isolation and Migration. - Thorsten Holz:
Spying with Bots. - Raven Alder:
A Summary of Savvy Backbone Defense. - Vassilis Prevelakis:
The Virtual Firewall. - Massimiliano Adamo, Mauro Tablò:
Linux vs. OpenBSD: A Firewall Performance Test. - Sam Stover, Matthew Dickerson:
Using Memory Dumps in Digital Forensics. - Luke Kanies:
Using Version Control in System Administration. - Christopher Jordan, Jason Royes, Jesse Whyte:
Writing Detection Signatures. - Ming Chow:
Teaching Computer Security, Privacy, and Politics.
- Elizabeth Zwicky:
Book Reviews.
- Peter H. Salus:
2006 Election for Board of Directors. - Rob Kolstad:
USACO Team Brings Home the Gold. - Ellie Young:
Thanks to Our Volunteers. - Ellie Young, Tara Mulligan:
Summary of USENIX Board of Directors Meetings.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.