Path: sparky!uunet!fedunix!paller
From: (Alan Paller)
Newsgroups: comp.unix.large
Subject: Revised Program and Early Registration For World Conference
Message-ID: <>
Date: Fri, 24 Apr 92 00:21:19 PDT
Organization: FedUNIX - Open Systems Conference Board - Washington D.C.
Lines: 339

The following program describes a meeting that is not attempting to compete
with  LISA.  Instead of advancing the state of the art, it attempts only to
instruct the  great community of system administrators and security managers
on the most  useful techniques employed by the acknowledged experts -- and to
exchange tips  and techniques that help them survive in the ever more complex
world of  heterogeneous UNIX systems administration and security.  Although
nearly all the  paper slots have been filled, we are still open to
tutorial-like papers on effective  technqiues that large numbers of people
will find practical and easy to implement. 
Send your propoasals to Alan Paller, Program Chairman ( 

April 20, 1992                                                           WCSAS
                                                             4610 Tournay Road
                                                            Bethesda, MD 20816

                             REGISTRATION PACKAGE

                         The 1992 World Conference On
                      System Administration and Security 
                              July 20 - 23, 1992 
                               Washington, DC  


This conference is designed to identify the current state of the art for
practical, cost-effective system administration and security so that the
techniques and tools used by the most effective managers can be adopted by
those still looking for solutions.

      o     Practical solutions, both public-domain and proprietary.
      o     Cost-effective system administration and security in networks of
            UNIX computers.  
      o     Papers and conferences valuable for both beginners and advanced
      o     Extra sessions focused on professional development, career growth
            and the human side of system administration and security.
      o     Favorite tips and techniques from the experts
      o     Special Interest Group meetings for SUN, HP, IBM, SCO, & DEC


Three forces are making the jobs of system and security administration more
and more difficult:
1. Growing, heterogeneous networks adding complexity to every system
administration task and increasing the risks of security breaches.
2. Growth of the number and size of files making systems management far more
difficult and time consuming.
3. Pressure to do more with fewer people increasing the stress. 

These challenges are particularly apparent and frustrating in government
agencies (both in the US and abroad), universities, and large companies which
have been in the vanguard of the move to open systems and networks of UNIX

The World Conference on System Administration and Security meets the
challenges head-on through practical sessions aimed at making the jobs of
system administration and security more manageable, using fewer people.


System administrators, security administrators, network administrators,
technology managers, computer installation managers, and their staffs. In
addition, a limited number of places are available for staff members from
organizations that offer commercial software and hardware products that
support system administration and security in networked computing


Washington Hilton Hotel, 1919 Connecticut Avenue NW, Washington DC. 

Conference Dates: 
Courses: July 20-21, 1992 -- 9:00 a.m. to 5:00 p.m.
Conference: July 22-23, 1992 -- 8:30 a.m. to 5:30 p.m.


These are the highest-rated and most popular courses from national and
international conferences.  They each carry a full money-back guarantee.
Monday, July 20 (9:00 am to 5:00 pm)

      1. Basic System Administration.  Instructor: Bruce Hunter, Editor, ROOT
      Journal, Open Systems Today columnist, author of UNIX Systems: Advanced
      Administration and Management Handbook (Macmillan)
            Basic tasks, how to accomplish them, time savers: just the basics
            (startup, daemons, storage devices, logins, backups, archives,
            basic security, spooling, etc.) by the highest-rated teacher of
            system administration.

      2. UNIX Security (Technical).  Instructor: Prof. Matt Bishop, Dartmouth
      College, member of group tasked with enhancing InterNet's security.
            Locate illicit programs, watch for traps, detect remote attacks,
            detect vulnerable passwords, avoid writing vulnerable programs,
            improve the environment, increase user awareness, and more, all
            taught thoroughly and effectively.

      3. Introduction To Computer Security -- Management. Instructor: Tom
      Peltier, General Motors, Chairman of the 19th Annual Computer Security
            Establishing the function, physical security planning,
            establishing need for policies and procedures, assessing the virus
            threat, microcomputer security, protecting system access in a
            network, key roles in contingency planning.  A survey course that
            gets the highest ratings of any course in the security field.

      4. Effective Presentation Skills For Computer Professionals. Instructor:
      Alan Paller, author of "How To Give The Best Presentation Of Your Life,"
      Chairman of CIO Conference and the Federal Open Systems Conference. When
      he presented this course, he achieved the highest ratings ever recorded
      at an NCGA conference.
            How to get audiences to want to accept your ideas, for project
            presentations, budget briefings, conference speeches, anything
            that matters. The three criteria audiences use and how to manage
            them. Packaging ideas, using visuals, maintaining attention. 
            Responding to questions.  Algorithms that work. 

Tuesday, July 21 (9:00 am to 5:00 pm)

      5. UNIX Network Administration (Hunter -- see Course 1 above for bio)
            Going beyond your single machine to a network multiplies the
            effort.  This course will help you keep that effort under control.
            Ethernet and Internet, data encapsulation, types of networks,
            devices, collisions, routers, bridges, addressing, net masks,
            ARPs, RARPs, file servers, NFS, clients, workstations, NIS,
            security and access control, monitoring and diagnostics.

      6. Developing Policies and Procedures For Computer Security (Peltier --
       See Course 3 above for bio)
            Establishing security direction, publishing the mission or charter
            statement, establishing the contents of the manual, four key
            elements of data classification, the review panel, areas of
            responsibility, gaining management and employee awareness.  Great
            course for managers.

      7. Advanced UNIX Security (Bishop, see Course 2 above for bio)
            How users prove their identity, managing privileges effectively
            and limiting their use, malicious logic (worms, Trojan Horses,
            etc.), what is really being done about networks and security. 
            Password storage, hashing algorithm, cracking passwords, managing
            super-user accounts, how malicious logic works, ways to protect
            yourself, Kerberos, Privacy-enhanced electronic mail, well-known
            security holes and why they arise.

      8. Essentials of Practical PERL Programming. Instructor: Tom
      Christiansen, the acknowledged world's expert on PERL.  
            The language that makes system administration easy.   Syntax and
            semantics of PERL, data types, operators, control flow, regular
            expressions and I/O facilities, debugging strategies, style and
            efficiency issues, traps and pitfalls of PERL.  Complete programs
            are provided and reviewed.

      9. Advanced Topics In Systems Administration. Instructor: Rob Kolstad,
      organizer of the first Large Installation Systems Administration (LISA)
      Conference, writes "Daemons and Dragons" column for UNIX Review.  A
      truly great instructor. Educational, entertaining, perceptive, and
            This course takes you beyond the basics to learn about a
            smorgasbord of topics includes:  The COPS security monitor,
            exploiting new high speed modems, the NTP time synchronization
            protocol, an overview of routers and gateways, using SLIP, dealing
            with management, and an in-depth discussion of sendmail. 


THE CONFERENCE: July 22-23, 1992 -- 8:30 a.m. to 5:30 p.m.

The conference consists of the keynote presentation and panel, invited
presentations, peer-reviewed papers, audience participation sessions, and
special interest group meetings for SUN, HP, Digital, SCO, and IBM UNIX users.

The Keynote Presentation: 
      "The Future of Distributed Management in Multi-Vendor Systems" (Jon
      Gossels, Area Manager for Interoperability at the Open Software
      Foundation)  A wide ranging view of the future of distributed system

The Keynote Panel
      "Alternative Views Of The Future" (Dean Thompson of HP, Frank Moss of
      Tivoli, along with two other discussants, will comment upon, expand, or
      contradict the keynote speaker so that the audience will get a more
      complete view of this important topic.

Invited Papers:
      "Christiansen's Challenge"  Tom Christiansen (See Course 8 above for a
      bio) will share what he calls "information about PERL that is not
      available anywhere else."  (PERL is the language that makes system
      administration easy.)  Tom will also show how shell scripts submitted by
      the audience can be replaced by a few lines of PERL.  Bring your shell
      scripts along.

      "Kolstad's Korner" Rob Kolstad (see Course 9 above for a bio), the most
      entertaining speaker in the field of system administration has a chance
      to share some of his favorite techniques and answer your questions.

      "What I Hate"  System administrators and security managers have a chance
      to speak out (anonymously if they choose) on aspects of the vendors'
      offerings that most frustrate them.  Public visibility will get the
      vendors' attention and may even help correct the problems.  This is an
      especially useful session for beginners who want to know what problems
      they should anticipate.

Peer-Reviewed Presentations

      The Review Committee includes: Matthias Autrata (DME Team, Open Software
      Foundation), Dr. Matt Bishop (Professor, Dartmouth University), Michele
      Crabb (Computer Security Analyst/Common Software Support, Computer
      Science Corporation, NASA-Ames Research Center), Randy Frank (Director,
      University of Michigan), Bruce Hunter (author and columnist on System
      Administration, and practicing system administrator for an ultra-large
      network), Major Mark Harris (System Architect, US Air Force
      Intelligence), Norman Kincl (HP System Architect, and Member of OSF
      Management SIG, Responsible for Distributed Management Solutions), Rob
      Kolstad (Program Manager, BSDI, and columnist for UNIX Review), Dale
      Pfaff (Manager of the System Software Group, Research Computation
      Division, Naval Research Lab.), Beverly Ulbrich (Senior Product Manager,
      SysAdmin and Security, Sun Microsystems Computer Company), Ginger
      Winckler (Manager, Workstations and Networking, National Center for
      Supercomputing Applications, University of Illinois)

      The review process is underway.  Listed below are papers that have been
      accepted.  More papers will be presented at the conference.

      "System management requirements for bringing mainframe applications to
      UNIX," Al Novissimo, VP of Research and Development, Computer Associates

      "Security basics for system administrators," Rik Farrow, Editor, UNIX
      World Magazine (and author of a book on the subject)

      "The human aspect of system administration," Bjorn Satdeva, /sys/admin,

      "Two architectures for open system administrators," Dr. William I.
      Norwicki, Legato Systems

      "RPC programming and DCE," Veda Shankar, IBM

      "Doubt," Elizabeth Ziwicky, SRI International

      "Security on a shoestring: a minimalist dial-up authorization scheme,"
      Hal Pomeranz, University of Pennsylvania

Favorite Tips And Techniques

      A series of three to five minute presentations by volunteers from the
      audience.  Each will tell about a favorite technique or a solution to a
      common problem.  Start thinking about what you can offer.

Special Interest Group Meetings

      During the conference, user groups representing SUN, ULTRIX, HP-UX, AIX,
      and SCO will hold sessions on advances in system administration and
      security on those boxes.  Their late-afternoon schedules will not
      conflict with paper presentations you may want to attend and allow them
      to last as long as you like.Conference Fees:Early BirdAdvancedOn-Site
                              (Before May 31)   (Before July 10)

Technical Conference only 
(July 22-23)                        $295              $335              $395

One Course                    $295              $335              $395

Two Courses             $495              $535              $595

Technical Conference
and One Course                $495              $535              $695

Technical Conference
and Two Courses               $585              $735              $795


The big savings are on the Early-Bird Technical Conference plus Two Courses. 
You basically get to attend the conference for free (paying only for the

Payment must accompany your registration.  To register, send your name, title,
organization, address, and phone and FAX numbers, plus the names of the
courses you will be attending and whether you will attend the Technical
Conference.  Send it all to WCSAS, 4610 Tournay Road, Bethesda, MD 20816.

You may pay by check (payable to WCSAS) or charge it to your VISA, MasterCard,
or AMEX account.  If you use a credit card, supply your account number,
expiration date, name as it appears on the card, and a signature.

Government employees may use Training Orders, but may not take advantage of
the Early Bird Discounts unless a check accompanies the registration.


Washington Hilton Hotel, 1919 Connecticut Ave. NW, Washington, D.C.

A block of rooms has been reserved at the conference hotel, the Washington
Hilton.  Hotel rooms can be very hard to get in Washington during the summer,
so it makes sense to take advantage of the block and to register early.  Call
the hotel directly at 202-483-3000 Extension 3939, or use the toll-free
number, 800-HILTONS.  When you reach them say you are reserving space in the
block reserved for the World Conference on System Administration and Security
at the Washington Hilton Hotel.


Delta Air Lines is offering special rates for this meeting for people coming
from anywhere in the US.  Call Delta at 1-800-241-6760 between 8:00 am and 11
p.m. Eastern Standard Time and refer to File Number N0692.  The discounts are
available only through Delta's toll-free number


The best airport for this conference is Washington National.  Taxi fare from
Washington National is less than $15.  International visitors and others who
find themselves arriving at Washington Dulles Airport or Baltimore-Washington
International Airport may wish to use the Washington Flyer Bus service to
transfer from the airport to downtown Washington and then use a taxi or the
Metro.  The Washington Hilton is about four blocks north of the DuPont Circle
exit on the Metro Red Line.  The Metro also runs from National Airport and
Union Station (for trains).


Host Organizations: The Washington Area UNIX User Group and the Federal SUN,
HP-UX, AIX, ULTRIX, and SCO Special Interest Groups.

Conference Sponsor: the Open Systems Conference Board, a not-for-profit
educational organization dedicated to removing the barriers to widespread
adoption of UNIX and Open Systems.  Co-sponsors: AFIPS (including ACM, DPMA,
and the IEEE Computer Society) and the Federal Open Systems Conference,
FedUNIX, and FedSecurity Conferences.  Sponsoring publications include ROOT
Journal, SysAdmin Magazine, and Federal Computer Week.

			  SCO's Case Against IBM

November 12, 2003 - Jed Boal from Eyewitness News KSL 5 TV provides an
overview on SCO's case against IBM. Darl McBride, SCO's president and CEO,
talks about the lawsuit's impact and attacks. Jason Holt, student and 
Linux user, talks about the benefits of code availability and the merits 
of the SCO vs IBM lawsuit. See SCO vs IBM.

Note: The materials and information included in these Web pages are not to
be used for any other purpose other than private study, research, review
or criticism.