From: (Toni Veglia)
Subject: 5th USENIX UNIX Security Symposium
Date: 1995/04/05
Message-ID: <>
X-Deja-AN: 100926259
organization: USENIX Association, Berkeley, CA
reply-to: (Toni Veglia)

JUNE 5-7, 1995
Salt Lake City, Utah

Sponsored by USENIX 
Co-sponsored by UniForum 
In cooperation with the Computer Emergency Response Team (CERT)
and IFIP WG 11.4

Please join us at the 5th USENIX UNIX Security Symposium.  The
1990s could end up being known as the Decade of the Internet.
Along with its increased popularity has come a growing awareness
of the dangers associated with connecting your computers with the
rest of the world.  These dangers and security issues from
perimeter defenses, such as firewalls, to host-based computer
security will be covered in-depth.

Security researchers and practitioners, system administrators,
systems analysts, site managers, programmers, and others with an
interest in computer security, will hear latest results from
research, new and innovative ideas and real-world experiences.
Attendees will be able to share experiences and ideas in both
formal and informal settings.  There will be tutorials providing
immediately useful information, peer-reviewed technical
presentations, and Birds-of-a-Feather sessions, all given by
industry-renowned speakers.

USENIX has augmented its offerings with a seminar and panel
sessions sponsored by UniForum.  This two-day security track for
managers, running in parallel with the USENIX tutorials and
technical sessions, will provide a comprehensive overview of
computer security as it relates to open systems from a manager's
perspective.  The first day is designed for managers just getting
into the business.  It will explain what security is, its
components and the risks to information in today's environment.
Day two will provide four intensive panel sessions addressing
confidentiality, integrity, implementation issues, and disaster
planning and practice.


USENIX Program Co-Chairs
  Frederick M. Avolio, Trusted Information Systems, Inc.
  Steven M. Bellovin, AT&T Bell Laboratories

USENIX Program Committee
  Bill Cheswick, AT&T Bell Laboratories
  Ed DeHart, CERT
  Ed Gould, Digital Equipment Corporation
  Marcus Ranum, Trusted Information Systems
  Gene Spafford, COAST Laboratory, Purdue University

UniForum Program Chair
  Jim Schindler, Hewlett-Packard

Tutorial Program Coordinator
  Daniel V. Klein, USENIX

Conference Planner
  Judith DesHarnais, USENIX
  Debbie Bonnin, UniForum

Pre-Registration Deadline:  Friday, May 19, 1995
Hotel Reservation Deadline: Friday, May 19, 1995

Sunday, June 4
   6:00pm - 9:00pm      Registration
Monday, June 5
   9:00am - 5:00pm      USENIX Tutorial Program  
   9:00am - 5:00pm      UniForum Security Seminar for Managers
Tuesday, June 6
   9:00am - 5:30pm      USENIX Technical Sessions
  11:00am - 6:45pm      UniForum Panel Sessions
   6:00pm -11:00pm      Birds-of-a-Feather Sessions
   7:00pm - 9:00pm      Symposium Reception
Wednesday, June 7 
   9:00am - 5:30pm      USENIX Technical Sessions
Monday, June 5, 1995   9:00am-5:00pm 

The USENIX Association's highly-respected tutorial program offers
you introductory as well as advanced, intensive, and informative
tutorials.  Courses are presented by skilled instructors who are
hands-on experts in their topic areas.  The USENIX tutorial
program has been developed to meet the needs of an audience of
computer professionals, system administrators, and technical

Attend these tutorials and benefit from this opportunity for
in-depth exploration and skill development in essential areas of
UNIX-related security.  Combining the tutorials with the
technical sessions gives you the opportunity to learn from
experts in varied learning environments.

The USENIX tutorial program continues to experience high demand
for its offerings.  Several tutorials sell out before
pre-registration closes.  Attendance is limited, and
pre-registration is strongly recommended.  On-site registration
is possible ONLY if space permits.

The USENIX Association is now a provider of Continuing Education
Units (CEUs), and will offer CEUs for a small additional
administrative fee.  Established by the International Association
for Continuing Education and Training, the CEU is a nationally
recognized standard unit of measure for continuing education and
training, and is used by thousands of organizations across the
United States.  Each full-day USENIX tutorial qualifies for 0.6
CEUs.  You can request CEU credit by checking the appropriate box
on the registration form.  USENIX provides a certificate for each
attendee taking a tutorial for CEU credit, and maintains
transcripts for all CEU students.

Instructors:      Tina Darmohray, Consultant
                  Marcus J. Ranum, Trusted Information Systems, Inc.

Intended Audience: System administrators, programmers, technical
and operational managers, and all professionals involved in
securing computer networks and/or inter-network gateways.
Prerequisites for this tutorial are a knowledge of TCP/IP, DNS,
and sendmail.

Connecting to the Internet is an exciting event for every
organization but the security implications can often bring
hesitation.  This tutorial outlines details and examples of UNIX
network security and Internet connectivity issues.  Site policies
and topologies that implement them will be covered, including
packet-filtering, application-level, and circuit-level gateways.
Overviews of current, publicly-available solutions, will be
provided, focusing on complete examples for configuring an
Internet firewall.

This tutorial will cover:
*  Problem definition and design motivation
    -  Identify risks associated with Internet connection
       *  Valuable data
       *  Motivation to obtain it
       *  Potential consequences
*  Nomenclature and design variations
    -  Common firewall terms and topologies
    -  Compare designs and strenghts
*  Implementing firewalls
    -  Routers
       *  Purpose
       *  Router-based firewalls
       *  Packet-filtering configuration
    -  Gateway/Bastion host security
       *  Router and Bastion-host-based firewalls
       *  Host security configuration
       *  Bastion host software: tcpd, smrsh, and challenge-response
           passwd software
    -  Proxy solutions
       *  Misc. public-domain proxies
       *  SOCKS
       *  TIS firewall toolkit
    -  Hiding information with DNS
       *  SOA and MX records to support the firewall
       *  Dual-DNS configuration
    -  Sendmail configuration
       *  Configuration to operate with firewall topology
       *  Header re-writing to support the firewall

Tina Darmohray is a consultant in the area of Internet firewalls
and network connections.  She has over a decade of experience
managing and networking UNIX systems.  Previously, she was the
lead for the UNIX System Administration team at a national
laboratory where her group was responsible for over 1,000

Marcus J. Ranum is a senior scientist at Trusted Information
Systems, Inc., specializing in Internet and UNIX security. He is
the principal designer and developer of the TIS Internet Firewall
Toolkit, and engineering manager for the TIS Gauntlet network
firewall product.

The instructors are currently completing a book on Internet
firewalls for Prentice Hall.

Instructor:    Professor Gene Spafford, COAST Lab Director, Purdue

Intended Audience: System administrators and managers with basic
knowledge of UNIX operation and security mechanisms who are
seeking ideas and security information beyond basic tools,
techniques and patches.  Attendees should have mastered a RBasic
UNIX SecurityS course, or equivalent.  The course assumes no
knowledge of UNIX internals, nor does it require access to source

You've mastered basic security concerns, such as setting and
monitoring file permissions, password selection, and applying the
latest published security patches.  What do you do next?  What do
you monitor?  This tutorial describes a framework for security
plans and operational measures to further protect a typical UNIX
system from both insider threats and outsider attacks.

This course presents several topics about security as applied to
UNIX systems.  It presents material drawn from actual experience
handling security incidents at major universities and commercial
firms.  Rather than focus on specific security tools or the
implementation of firewalls, this course teaches you policy- how
to plan an overall approach to security, and how to decide which
precautions to take.

Topics covered include:

*  Devising a security policy
*  Basic physical security concerns
*  Some uses of encryption
*  Ideas on audit trails
*  Management of an incident response team
*  Intrusion detection and response
*  Logical and physical perimeter analysis
*  Operational security concerns

Gene Spafford is an associate professor at Purdue University, and
director of the COAST Project and Laboratory (Computer
Operations, Audit, and Security Technology).  He teaches and
conducts research on issues relating to increasing the
reliability of computer systems, and the consequences of computer
failures.  His publishing credits include:  RPractical UNIX
Security,S RComputer Viruses: Dealing with Electronic Vandalism
and Programmed Threats,S and (as consulting editor) RComputer
Crime: A Crime-Fighters HandbookS.  He is also chair of IFIP WG
11.4 on Network Security.



Instructor: Michael Weidner, Arca Systems, Inc.

Over the years, the information security focus shifted from
secure product development [the past], to secure system
development [the present], and has begun the shift toward secure
enterprise solutions [the future].  This reflects the changing
management information paradigms from data management to
information management to enterprise execution.  Security
technology will be integral to all enterprise solutions in the
future, but it must be used as an enabling technology, creating
new or innovative ways of doing business.  This can only be done
when security is a fundamental element of the business process
re-engineering efforts of the organization.  This seminar will
highlight evolving enterprise information needs, discuss
enterprise-wide threats and vulnerabilities, including Internet
attacks, and then describe tools, methodologies, products,
practices, and procedures that can be used to develop practical,
secure enterprise solutions.

Mr. Michael Weidner is a founder and vice-president of Arca
Systems, Inc.  He has over nineteen years of security experience
and a broad, diversified background with computer security.  Mr.
Weidner co-authored and is a principal instructor in Arca's
popular Computer Security and INFOSEC training courses.

Frederick  M. Avoilio, Trusted Information Systems, Inc.


Why are our Systems Insecure? Must they always be?
  Stephen T. Walker, President and Founder, Trusted Information
  Systems, Inc.

Every day we hear new horror stories of ever more sophisticated
break-ins and hostile attacks on our information systems and
networks.  The exciting prospects of quantum leaps in our
information handling capabilities are dampened by the prospect
that "outsiders" meddling with our sytems can easily do damage
from afar.  Why is it so hard to protect our systems?  Will it
always be this way?  Are there fundamental limiting factors,
technological and otherwise, that we are up against and, if so,
what can we do about them?  This presentation will explore these
issues and attempt to identify specific actions we can and must
take now.

Stephen T. Walker is the founder and president of Trusted
Information Systems, Inc.  His background includes twenty-two
years as an employee of the Department of Defense, the National
Security Agency, the Advanced Research Projects Agency, and the
Office of the Secretary of Defense.  He is nationally recognized
for his pioneering work on the DoD Computer Security Initiative,
establishment of the National Computer Security Center and the
Defense Data Network, and extensive experience with the design
and implementation of large scale computer networks and
information systems.  He is a member of the Computer System
Security and Privacy Advisory Board.


Information Security Technology? Don't Rely on It.  A Case Study
in Social Engineering
   Ira S. Winkler & Brian Dealy, Science Applications
   International Corp.

A Simple Active Attack Against TCP
   Laurent Joncheray, Merit Network Inc.

WAN-hacking with AutoHack: Auditing Security Behind the Firewall
   Alec Muffet, Sun Microsystems, UK


Kerberos Security with Clocks Adrift
   Don Davis, Systems Experts, Inc.; Daniel E. Geer, OpenVision

Design and Implementation of Modular Key Management Protocol and
IP Secure Tunnel on AIX
   Pau-Chen Cheng, Juan A. Garay, Amir Herzberg and Hugo Krawczyk,
   IBM, Thomas J. Watson Research Center

Network Randomization Protocol: A Proactive Pseudo-Random Generator
   Chee-Seng Chow and Amir Herzberg, IBM, Thomas J. Watson
   Research Center


Implementing a Secure rlogin Environment: A Case Study of Using a
Secure Network Layer Protocol
   Gene H. Kim, Hilarie Orman and Sean O'Malley, University of Arizona

STEL: Secure TELnet
   David Vincenzetti, Stefano Taino and Fabio Bolognesi, Computer
   Emergency Response Team Italiano (CERT-IT), University of Milan

Session-Layer Encryption
   Matt Blaze and Steven M. Bellovin, AT&T Bell Laboratories

"What every manager should know about computer security but was
afraid to ask!" - The Four Basic Components within a Secure
Computer Environment

11:00-12:30  -  Session 1 
Session Chair:  Dr. Eugene Schultz, SRI

One of the most important UNIX security issues is maintaining the
integrity of system binaries and data files.  Unauthorized
changes to either can be extremely disruptive to operations,
causing considerable effort to be expended  on reestablishing
integrity.  How should an organization approach the issue of
integrity in UNIX systems?   What tools are available and what
procedures should be established?  What are organizations
actually doing to ensure the integrity of their UNIX systems and
data?  These questions are addressed in the UniForum UNIX
integrity session.  Three speakers from different industries will
present solutions they have developed for dealing with integrity
issues in the UNIX computing environments.

Dr. Eugene Schultz is a senior consultant in SRI's Information
Technologies Practice.  He provides technical and managerial
support for SRI's I4 (International Information Integrity
Institute) program, for which he is the Deputy Program Manager.
He founded and managed the Department of EnergyUs Computer
Incident Advisory Capability (CIAC), a team responsible for
responding to incidents at all Department of Energy sites.

2:00-3:30  - Session 2
Session Chair:  Katherine Fithen, CERT

The following crucial elements of implementation will be
discussed: Internet security, policies, procedures, practices and
incident reporting.  The panel will include users from a
commercial site that has been connected to the Internet for at
least 3 years, a government site that has been connected to the
Internet for 3 years, and an Incident Response Team.

Katherine Fithen is a technical coordinator in the Incident
Handling group of the CERT Coordination Center.  She earned her
Bachelor's degree in Retail Management, a Master's Degree in
Personnel Management, and a Master's Degree in Information

4:00-5:30  - Session 3
Session Chair:  Gene Spafford, COAST Laboratory, Purdue University

Planning for disaster recovery in the case of a mainframe
environment is familiar to many IS managers.  However, planning
how to recover from major events that affect distributed
client/server computing in wide-area networks is a much more
difficult task, and one much more difficult to address.

This session will address the needs to be considered when
planning for recovery and business continuation of computing
spread across many sites -- and possibly around the world.
Panelists participating in this session will address contingency
site considerations and back-up plans from a disaster recovery
specialist's perspective, on-site data storage aspects from a
manager's global perspective and security and law enforcement
considerations from a high-tech criminal investigator's

Gene Spafford is an associate professor at Purdue University, and
director of the COAST Project and Laboratory (Computer
Operations, Audit, and Security Technology).  He teaches and
conducts research on issues relating to increasing the
reliability of computer systems, and the consequences of computer
failures.  His publishing credits include:  Practical UNIX
Security, Computer Viruses: Dealing with Electronic Vandalism and
Programmed Threats, and (as consulting editor) Computer Crime: A
Crime-Fighters Handbook.  He is also chair of IFIP WG 11.4 on
Network Security.

5:30-6:45   -  Session 4
Session Chair:  Stephen T. Walker, Trusted Information Systems, Inc.

Confidentiality is one of the essential components of any
information security policy along with integrity and
availability.  How we keep information for the "good guys" and
away from the "bad guys" must be considered in the design and
implementation of every information system component.  When the
bad guys are all "out there" on some other net, this can be done
with careful use of encryption and firewalls.  When only some of
the people "inside" the net should be allowed to access
particularly sensitive information (e.g., personnel, accounting,
advanced planning), appropriate access control policies must be
established by upper management and enforced by appropriate
components throughout the "inside" net.  Because the security
policies of organizations vary, solving this problem will require
that widely used operating systems provide a variety of access
control mechanisms.  These include mechanisms for hierarchical
mandatory access control, discretionary need to know, and 
role-based access control (e.g., domain and type enforcement)

This panel will address all aspects of confidentiality from
advanced network security measures to the latest thinking of
confidentiality policy enforcement in host systems and

Stephen T. Walker is the founder and president of Trusted
Information Systems, Inc.  His background includes twenty-two
years as an employee of the Department of Defense, the National
Security Agency, the Advanced Research Projects Agency, and the
Office of the Secretary of Defense.  He is nationally recognized
for his pioneering work on the DoD Computer Security Initiative,
establishment of the National Computer Security Center and the
Defense Data Network, and extensive experience with the design
and implementation of large scale computer networks and
information systems.  He is a member of the computer System
Security and Privacy Advisory Board.



File-Based Network Collaboration System
   Toshinari Takahashi, Atsushi Shimbo and Masao Murota,
   Communications and Information Systems Research Labs, Toshiba
   R&D Center

Safe Use of X WINDOW SYSTEM Protocol Across a Firewall
   Brian L. Kahn, The MITRE Corporation

An Architecture for Advanced Packet Filtering and Access Policy
   Andrew Molitor, Network Systems Corporation


A Domain and Type Enforcement UNIX Prototype
   Lee Badger, Daniel F. Sterne, David L. Sherman and Kenneth M.
   Walker, Trusted Information Systems, Inc.

Providing Policy Control Over Object Operations in a Mach-Based
   Spencer E. Minear, Secure Computing Corporation

Joining Security Realms: A Single Login for NetWare and Kerberos
   William A. Adamson, Jim Rees and Peter Honeyman, University of


Independent One-Time Passwords
   Aviel D. Rubin, Bellcore

One-Time Passwords in Everything (OPIE):  Experiences with
Building and Using Strong Authentication
   Daniel L. McDonald and Randall J. Atkinson, U.S. Naval Research
   Laboratory; Craig Metz, Kaman Sciences Corporation

Improving the Trustworthiness of Security Trace Files
   Ennio Pozzetti, Politecnico di Milano; Vidar Vetland, Carleton


Using the Domain Name System for System Break-ins
   Steven M. Bellovin, AT&T Bell Laboratories

DNS and BIND Security Issues
   Paul A. Vixie, Internet Software Consortium

MIME Object Security Services: Issues in a Multi-User Environment
   James M. Galvin and Mark S. Feldman, Trusted Information
   Systems, Inc.

Do you have a topic that you'd like to discuss with others?  Our
Birds-of-a-Feather sessions may be perfect for you.  BOFs are
very interactive and informal gatherings for attendees interested
in a particular topic.  BOFs will be held on Tuesday evening at
the Salt Lake City Marriott Hotel.  BOFs may be scheduled at the
meeting, or you may schedule a BOF in advance by telephoning the
USENIX Conference Office at 714-588-8649, or E-mail to:


USENIX, The UNIX and Advanced Computing Systems Association

Since 1975, the USENIX Association has brought together the
community of engineers, scientists, and technicians working on
the cutting edge of the computing world.  The USENIX Conferences
and Technical Workshops have become the essential meeting grounds
for the presentation and discussion of the most advanced
information on the developments of all aspects of computing

The USENIX Association and its members are dedicated to:
 -problem-solving with a practical bias,
 -fostering innovation and research that works,
 -communicating rapidly the results of both research and innovation,
 -providing a neutral forum for the exercise of critical thought and
   the airing of technical issues.

SAGE, the System Administrators Guild, a Special Technical Group
within the USENIX Association, is dedicated to the recognition
and advancement of system administration as a profession.


UniForum, the International Association of Open Systems

UniForum is a not-for-profit organization founded in 1980 and
incorporated in 1981.  UniForum's mission is to help individuals
and their organizations increase the effectiveness of their
information systems through the use of open systems, based on
shared industry standards.  Central to UniForum's mission is the
delivery of high-quality educational programs, trade shows and
conferences, publications, on-line services and peer group


The Symposium headquarters will be:

75 South West Temple                   $89.00 Single/Double Occupancy
Salt Lake City, UT 84101               (Plus local and state taxes -
Telephone: 801-531-0800                  currently 10.84%)
FAX: 801-532-4127

To Make Your Reservation:  Call the Marriott directly and ask for
the Reservations Desk.  Tell reservations that you are a USENIX
attendee to take advantage of our group rate.  ONE NIGHT'S
your reservation, you must notify the hotel no later than 6:00pm
on the day of your scheduled arrival.

IMPORTANT:  Room reservation deadline is Friday, May 19, 1995.
Requests for reservations received after the deadline will be
handled on a space available basis.

Special discounted airfares are available only through JNR, Inc.,
a full-service travel agency.  Some restrictions apply.  Please
call for details:

JNR, Inc.  PHONE:  714-476-2788 (Local),TOLL FREE 800-343-4546 (USA)

The Salt Lake City International Airport is just 15 minutes from
the Salt Lake City Marriott.  The Marriott offers COMPLIMENTARY
SHUTTLE SERVICE to and from the hotel and the Salt Lake City
International Airport every twenty minutes, on the hour, from
6:00am until 11:00pm daily.  Catch the red and white Marriott
shuttle van outside the baggage claim area.  If you will be
arriving before 6:00am or later than 11:00pm, you may call the
Marriott hotel front desk and request a shuttle pickup.

Taxi service is available at an approximate cost of $12 one way.

As of January 1, 1995, Utah has adopted stringent smoking laws
that limit smoking to Private Clubs and designated hotel sleeping
rooms.  There are many private clubs in Salt Lake City that
permit smoking with the purchase of a two week membership pass,
currently costing $5.00 for a group of 1-6 people.

Hansen Planetarium is within walking distance from the Marriott
Hotel and is one of the best known and most innovative
planetariums in the world.  It offers two floors of free exhibits
(including a rock brought back from the moon).  A domed theater
that entertains and informs audiences with spectacular star
shows, and laser/music shows.

Historic Temple Square is a 1/2 block north of the Marriott Hotel
and is the symbolic heart of the world-wide Church of Jesus
Christ of Latter-day Saints, the Mormons.  The Square includes
the six-spired Temple, Tabernacle, Assembly Hall, information
centers, gardens and monuments.  There are 4 entrances where
guides assist visitors in finding tours, concerts or other
information.  Several types of tours are offered from 9am to 9pm,
seven days a week.  All tours are free.  Seven National parks,
including Yellowstone, Bryce, Zion and the Grand Tetons are only
a half-day drive from Salt Lake City.


USENIX Conference Office
22672 Lambert St., Suite 613
Lake Forest, CA 92630
Telephone: 714-588-8649
FAX: 714-588-9706
Office Hours: 8:30am-5:00pm Pacific Time

---------------------------cut here----------------------------
                       JUNE 5-7, 1995

Please complete this Registration Form and return it along with
full payment to:  

	USENIX Conference Office
	22672 Lambert St., Suite 613 
	Lake Forest  CA  USA 92630
	Phone: 	+1 714 588 8649
	FAX: 	+1 714 588 9706

You may FAX your Registration if payment is by credit card.
(To avoid duplicate billing, do NOT mail an additional copy. 
You may telephone the Conference Office to confirm receipt of 
your fax.)

Registration via email is not accepted.

Please duplicate this form as needed by friends and colleagues
Please type or print clearly

          (first)                          (last)

FIRST NAME FOR BADGE____________________________

COMPANY OR INSTITUTION______________________________________________

MAILING ADDRESS_____________________________________________________


TELEPHONE NUMBER_____________________FAX NO_________________________

NETWORK ADDRESS (1 only)____________________________________________

If you do NOT want the address below to be used for future 
  USENIX mailings, check here: ___
Is this your work address?  __Yes  ___No 
If you do NOT want to appear in the attendee list, check here:___
What is your affilitation? __Academic __Commercial __Gov't __R&D
How did you hear about this symposium?  1.__USENIX mailing 
  2.__Newsgroup/Bulletin Bd   3.__;login:   4.__World Wide Web
  5.__From a Collegue  6.__Advertisement
What security publications or newsgroups do you read?________________

TUTORIAL PROGRAM - Monday, June 5, 1995, 9:00-5:00

Select only ONE Full-Day Tutorial 

[ ]  M1 - Firewalls:  Achieving Security in an Internet Environment

[ ]  M2 - Beyond Basic UNIX Security


One full-day tutorial.................................$295_____
	CEU credit for one tutorial (optional)........$ 15_____

Late fee applies if postmarked after Friday, May 19, 1995 
                                                  Add $ 50_____


Payment of technical program fee allows registrant to attend 
both the USENIX Technical Sessions (June 6-7) and the
UniForum Management Track (June 5-6).  To ensure adequate
seating, please indicate which track you will most likely
	[ ] USENIX Technical Sessions
	[ ] UniForum Management Track

Member Fee............................................$320_____
  (Applies to current USENIX, UniForum, EurOpen, JUS, or AUUG

*Non-Member or Renewing Member Fee....................$400_____

Late fee applies if postmarked after Friday, May 19, 1995 
                                                  Add $ 50_____

    *Join or renew USENIX membership and attend the conference
    for the same low price -- CHECK HERE.....................[ ]
Join or renew your SAGE membership (you must be a current
    member of USENIX)..............................Add $ 25_____

FULL-TIME STUDENT FEE:  Pre-registered or on-site......$ 75_____
(Students: attach photocopy of current student I.D. card)

 		TOTAL ENCLOSED.........................$ ________

Purchase orders and vouchers are not accepted.

____Payment Enclosed - Make check payable to: USENIX CONFERENCE.  

CHARGE TO:___VISA___MasterCard___American Express___Diner's Club

Account No.:_____________________________________Expiration Date_______

Print Cardholder's Name                  Cardholder's Signature

If you must cancel, all refund requests must be in writing and 
postmarked no later than May 30, 1995.  You may telephone to 
substitute another in your place.


For more information about USENIX and its events, access
the USENIX Resource Center on the World Wide Web.  The URL
is  OR send email to our mailserver
at  Your message should contain the line:
send catalog.  A catalog will be returned to you.

			  SCO's Case Against IBM

November 12, 2003 - Jed Boal from Eyewitness News KSL 5 TV provides an
overview on SCO's case against IBM. Darl McBride, SCO's president and CEO,
talks about the lawsuit's impact and attacks. Jason Holt, student and 
Linux user, talks about the benefits of code availability and the merits 
of the SCO vs IBM lawsuit. See SCO vs IBM.

Note: The materials and information included in these Web pages are not to
be used for any other purpose other than private study, research, review
or criticism.