From: pal...@fedunix.org (Alan Paller)
Subject: Revised Program and Early Registration For World Conference
Date: Fri, 24 Apr 92 00:21:19 PDT
Organization: FedUNIX - Open Systems Conference Board - Washington D.C.
The following program describes a meeting that is not attempting to compete
with LISA. Instead of advancing the state of the art, it attempts only to
instruct the great community of system administrators and security managers
on the most useful techniques employed by the acknowledged experts -- and to
exchange tips and techniques that help them survive in the ever more complex
world of heterogeneous UNIX systems administration and security. Although
nearly all the paper slots have been filled, we are still open to
tutorial-like papers on effective technqiues that large numbers of people
will find practical and easy to implement.
Send your propoasals to Alan Paller, Program Chairman (Pal...@FEDUNIX.org)
April 20, 1992 WCSAS
4610 Tournay Road
Bethesda, MD 20816
The 1992 World Conference On
System Administration and Security
July 20 - 23, 1992
This conference is designed to identify the current state of the art for
practical, cost-effective system administration and security so that the
techniques and tools used by the most effective managers can be adopted by
those still looking for solutions.
o Practical solutions, both public-domain and proprietary.
o Cost-effective system administration and security in networks of
o Papers and conferences valuable for both beginners and advanced
o Extra sessions focused on professional development, career growth
and the human side of system administration and security.
o Favorite tips and techniques from the experts
o Special Interest Group meetings for SUN, HP, IBM, SCO, & DEC
WHY YOU SHOULD PARTICIPATE:
Three forces are making the jobs of system and security administration more
and more difficult:
1. Growing, heterogeneous networks adding complexity to every system
administration task and increasing the risks of security breaches.
2. Growth of the number and size of files making systems management far more
difficult and time consuming.
3. Pressure to do more with fewer people increasing the stress.
These challenges are particularly apparent and frustrating in government
agencies (both in the US and abroad), universities, and large companies which
have been in the vanguard of the move to open systems and networks of UNIX
The World Conference on System Administration and Security meets the
challenges head-on through practical sessions aimed at making the jobs of
system administration and security more manageable, using fewer people.
WHO SHOULD ATTEND:
System administrators, security administrators, network administrators,
technology managers, computer installation managers, and their staffs. In
addition, a limited number of places are available for staff members from
organizations that offer commercial software and hardware products that
support system administration and security in networked computing
Washington Hilton Hotel, 1919 Connecticut Avenue NW, Washington DC.
Courses: July 20-21, 1992 -- 9:00 a.m. to 5:00 p.m.
Conference: July 22-23, 1992 -- 8:30 a.m. to 5:30 p.m.
These are the highest-rated and most popular courses from national and
international conferences. They each carry a full money-back guarantee.
Monday, July 20 (9:00 am to 5:00 pm)
1. Basic System Administration. Instructor: Bruce Hunter, Editor, ROOT
Journal, Open Systems Today columnist, author of UNIX Systems: Advanced
Administration and Management Handbook (Macmillan)
Basic tasks, how to accomplish them, time savers: just the basics
(startup, daemons, storage devices, logins, backups, archives,
basic security, spooling, etc.) by the highest-rated teacher of
2. UNIX Security (Technical). Instructor: Prof. Matt Bishop, Dartmouth
College, member of group tasked with enhancing InterNet's security.
Locate illicit programs, watch for traps, detect remote attacks,
detect vulnerable passwords, avoid writing vulnerable programs,
improve the environment, increase user awareness, and more, all
taught thoroughly and effectively.
3. Introduction To Computer Security -- Management. Instructor: Tom
Peltier, General Motors, Chairman of the 19th Annual Computer Security
Establishing the function, physical security planning,
establishing need for policies and procedures, assessing the virus
threat, microcomputer security, protecting system access in a
network, key roles in contingency planning. A survey course that
gets the highest ratings of any course in the security field.
4. Effective Presentation Skills For Computer Professionals. Instructor:
Alan Paller, author of "How To Give The Best Presentation Of Your Life,"
Chairman of CIO Conference and the Federal Open Systems Conference. When
he presented this course, he achieved the highest ratings ever recorded
at an NCGA conference.
How to get audiences to want to accept your ideas, for project
presentations, budget briefings, conference speeches, anything
that matters. The three criteria audiences use and how to manage
them. Packaging ideas, using visuals, maintaining attention.
Responding to questions. Algorithms that work.
Tuesday, July 21 (9:00 am to 5:00 pm)
5. UNIX Network Administration (Hunter -- see Course 1 above for bio)
Going beyond your single machine to a network multiplies the
effort. This course will help you keep that effort under control.
Ethernet and Internet, data encapsulation, types of networks,
devices, collisions, routers, bridges, addressing, net masks,
ARPs, RARPs, file servers, NFS, clients, workstations, NIS,
security and access control, monitoring and diagnostics.
6. Developing Policies and Procedures For Computer Security (Peltier --
See Course 3 above for bio)
Establishing security direction, publishing the mission or charter
statement, establishing the contents of the manual, four key
elements of data classification, the review panel, areas of
responsibility, gaining management and employee awareness. Great
course for managers.
7. Advanced UNIX Security (Bishop, see Course 2 above for bio)
How users prove their identity, managing privileges effectively
and limiting their use, malicious logic (worms, Trojan Horses,
etc.), what is really being done about networks and security.
Password storage, hashing algorithm, cracking passwords, managing
super-user accounts, how malicious logic works, ways to protect
yourself, Kerberos, Privacy-enhanced electronic mail, well-known
security holes and why they arise.
8. Essentials of Practical PERL Programming. Instructor: Tom
Christiansen, the acknowledged world's expert on PERL.
The language that makes system administration easy. Syntax and
semantics of PERL, data types, operators, control flow, regular
expressions and I/O facilities, debugging strategies, style and
efficiency issues, traps and pitfalls of PERL. Complete programs
are provided and reviewed.
9. Advanced Topics In Systems Administration. Instructor: Rob Kolstad,
organizer of the first Large Installation Systems Administration (LISA)
Conference, writes "Daemons and Dragons" column for UNIX Review. A
truly great instructor. Educational, entertaining, perceptive, and
This course takes you beyond the basics to learn about a
smorgasbord of topics includes: The COPS security monitor,
exploiting new high speed modems, the NTP time synchronization
protocol, an overview of routers and gateways, using SLIP, dealing
with management, and an in-depth discussion of sendmail.
THE CONFERENCE: July 22-23, 1992 -- 8:30 a.m. to 5:30 p.m.
The conference consists of the keynote presentation and panel, invited
presentations, peer-reviewed papers, audience participation sessions, and
special interest group meetings for SUN, HP, Digital, SCO, and IBM UNIX users.
The Keynote Presentation:
"The Future of Distributed Management in Multi-Vendor Systems" (Jon
Gossels, Area Manager for Interoperability at the Open Software
Foundation) A wide ranging view of the future of distributed system
The Keynote Panel
"Alternative Views Of The Future" (Dean Thompson of HP, Frank Moss of
Tivoli, along with two other discussants, will comment upon, expand, or
contradict the keynote speaker so that the audience will get a more
complete view of this important topic.
"Christiansen's Challenge" Tom Christiansen (See Course 8 above for a
bio) will share what he calls "information about PERL that is not
available anywhere else." (PERL is the language that makes system
administration easy.) Tom will also show how shell scripts submitted by
the audience can be replaced by a few lines of PERL. Bring your shell
"Kolstad's Korner" Rob Kolstad (see Course 9 above for a bio), the most
entertaining speaker in the field of system administration has a chance
to share some of his favorite techniques and answer your questions.
"What I Hate" System administrators and security managers have a chance
to speak out (anonymously if they choose) on aspects of the vendors'
offerings that most frustrate them. Public visibility will get the
vendors' attention and may even help correct the problems. This is an
especially useful session for beginners who want to know what problems
they should anticipate.
The Review Committee includes: Matthias Autrata (DME Team, Open Software
Foundation), Dr. Matt Bishop (Professor, Dartmouth University), Michele
Crabb (Computer Security Analyst/Common Software Support, Computer
Science Corporation, NASA-Ames Research Center), Randy Frank (Director,
University of Michigan), Bruce Hunter (author and columnist on System
Administration, and practicing system administrator for an ultra-large
network), Major Mark Harris (System Architect, US Air Force
Intelligence), Norman Kincl (HP System Architect, and Member of OSF
Management SIG, Responsible for Distributed Management Solutions), Rob
Kolstad (Program Manager, BSDI, and columnist for UNIX Review), Dale
Pfaff (Manager of the System Software Group, Research Computation
Division, Naval Research Lab.), Beverly Ulbrich (Senior Product Manager,
SysAdmin and Security, Sun Microsystems Computer Company), Ginger
Winckler (Manager, Workstations and Networking, National Center for
Supercomputing Applications, University of Illinois)
The review process is underway. Listed below are papers that have been
accepted. More papers will be presented at the conference.
"System management requirements for bringing mainframe applications to
UNIX," Al Novissimo, VP of Research and Development, Computer Associates
"Security basics for system administrators," Rik Farrow, Editor, UNIX
World Magazine (and author of a book on the subject)
"The human aspect of system administration," Bjorn Satdeva, /sys/admin,
"Two architectures for open system administrators," Dr. William I.
Norwicki, Legato Systems
"RPC programming and DCE," Veda Shankar, IBM
"Doubt," Elizabeth Ziwicky, SRI International
"Security on a shoestring: a minimalist dial-up authorization scheme,"
Hal Pomeranz, University of Pennsylvania
Favorite Tips And Techniques
A series of three to five minute presentations by volunteers from the
audience. Each will tell about a favorite technique or a solution to a
common problem. Start thinking about what you can offer.
Special Interest Group Meetings
During the conference, user groups representing SUN, ULTRIX, HP-UX, AIX,
and SCO will hold sessions on advances in system administration and
security on those boxes. Their late-afternoon schedules will not
conflict with paper presentations you may want to attend and allow them
to last as long as you like.Conference Fees:Early BirdAdvancedOn-Site
(Before May 31) (Before July 10)
Technical Conference only
(July 22-23) $295 $335 $395
One Course $295 $335 $395
Two Courses $495 $535 $595
and One Course $495 $535 $695
and Two Courses $585 $735 $795
HOW TO REGISTER:
The big savings are on the Early-Bird Technical Conference plus Two Courses.
You basically get to attend the conference for free (paying only for the
Payment must accompany your registration. To register, send your name, title,
organization, address, and phone and FAX numbers, plus the names of the
courses you will be attending and whether you will attend the Technical
Conference. Send it all to WCSAS, 4610 Tournay Road, Bethesda, MD 20816.
You may pay by check (payable to WCSAS) or charge it to your VISA, MasterCard,
or AMEX account. If you use a credit card, supply your account number,
expiration date, name as it appears on the card, and a signature.
Government employees may use Training Orders, but may not take advantage of
the Early Bird Discounts unless a check accompanies the registration.
Washington Hilton Hotel, 1919 Connecticut Ave. NW, Washington, D.C.
A block of rooms has been reserved at the conference hotel, the Washington
Hilton. Hotel rooms can be very hard to get in Washington during the summer,
so it makes sense to take advantage of the block and to register early. Call
the hotel directly at 202-483-3000 Extension 3939, or use the toll-free
number, 800-HILTONS. When you reach them say you are reserving space in the
block reserved for the World Conference on System Administration and Security
at the Washington Hilton Hotel.
AIR TRAVEL INFORMATION
Delta Air Lines is offering special rates for this meeting for people coming
from anywhere in the US. Call Delta at 1-800-241-6760 between 8:00 am and 11
p.m. Eastern Standard Time and refer to File Number N0692. The discounts are
available only through Delta's toll-free number
TRANSPORTATION TO THE CONFERENCE FROM TRAIN STATION AND AIRPORTS
The best airport for this conference is Washington National. Taxi fare from
Washington National is less than $15. International visitors and others who
find themselves arriving at Washington Dulles Airport or Baltimore-Washington
International Airport may wish to use the Washington Flyer Bus service to
transfer from the airport to downtown Washington and then use a taxi or the
Metro. The Washington Hilton is about four blocks north of the DuPont Circle
exit on the Metro Red Line. The Metro also runs from National Airport and
Union Station (for trains).
HOSTS AND SPONSORS
Host Organizations: The Washington Area UNIX User Group and the Federal SUN,
HP-UX, AIX, ULTRIX, and SCO Special Interest Groups.
Conference Sponsor: the Open Systems Conference Board, a not-for-profit
educational organization dedicated to removing the barriers to widespread
adoption of UNIX and Open Systems. Co-sponsors: AFIPS (including ACM, DPMA,
and the IEEE Computer Society) and the Federal Open Systems Conference,
FedUNIX, and FedSecurity Conferences. Sponsoring publications include ROOT
Journal, SysAdmin Magazine, and Federal Computer Week.