From: (Toni Veglia)
Subject: 9th Systems Administration Conference Starts Sunday 9/17!
Date: 1995/09/14
Message-ID: <>
X-Deja-AN: 110132915
organization: USENIX Association, Berkeley, CA
reply-to: (Toni Veglia)

September 17-22, 1995
Monterey Conference Center, Monterey, California

Sponsored by the USENIX, the UNIX and Advanced Computing Systems 
  Technical and Professional Association and 
SAGE, the System Administrators Guild 

Most hotels have sold out - see below for suggestions
System administrators have some of the most demanding and critical
jobs in computing.  Businesses rely on them to not only keep their
systems running, but to keep up with the latest technology, tools,
and information.  LISA '95 will provide immediately useful,
practical information from the top system administrators and

This posting contains:
   Tutorial & Technical Session Descriptions
   Advanced Topics in System Administration Workshop Information
   Schedule of Events
   Hotel and General Conference Information
   Registration Form

TUTORIAL PROGRAM - Sunday-Tuesday, September 17-19

Sunday, September 17
Joining the Internet Safely Using UNIX and Firewalls
Introduction to UNIX System Administration  (New)

Monday, September 18
New Topics in System Administration  (New)
UNIX System Security
Sendmail Inside and Out  (Updated)
Introduction to System Performance Tuning  (New)
Administering the Domain Name System
An Introduction to HTML  (New)
Breaking the Communication Barrier: Talking Technical  (New)
GUI Programming in Perl  (New)
IP Network Administration
New Manager's Survival Guide  (New)

Tuesday, September 19
Topics in System Administration
Joining the Internet Safely Using UNIX and Firewalls
Beginning Perl Programming for UNIX Programmers  (Updated)
Solaris System Administration
UNIX Security:  Threats and Solutions from the Network  (New)
How to Plan Internet Security and Firewalls  (New)
World Wide Web Programming with CGI  (New)
What's New in Sendmail 8.7  (New)
"But I'm Not Responsible Am I?": Your Liabilities as a System 
 Administrator  (Updated)
Web Server Administration


Business in the nineties challenges you to do and learn more.
Its particularly difficult to keep up with the tools, technology
and technical issues that are raised in areas like system
administration.  With the pressure on to manage more with less,
you need the latest information and solutions to keep up with the
pace of business.

USENIX tutorials provide the information you need in critical
areas.  Delivered by experts, they are intensive, practical, and
essential to your professional development.  Tutorial  fees
include printed and bound materials from the tutorials you have
selected, lunch, and admission to the Vendor Display.

S1:  9:00am-5:00pm 
(Also Offered Tuesday)
Instructors: Tina Darmohray and Marcus J. Ranum
                   Information Works!, Inc.

Intended Audience:  Participants should be familiar with basic
Internet concepts such as Internet services, TCP/IP, and

Connecting to the Internet is an exciting event for every
organization.  The security implications can often bring
hesitation, though.  This practical course outlines details and
examples of UNIX network security and Internet connectivity
issues.  Site policies and topologies that implement them will be
covered, including packet-filtering, application-level, and
circuit-level gateways.  Overviews of current, publicly-available
solutions, will be provided, focusing on complete examples for
configuring an Internet firewall.  Pre-requisites for this
tutorial are a knowledge of TCP/IP, DNS, and sendmail.

This tutorial will cover:

*Problem definition and design motivation      
   - identify risks associated with Internet connection, including:
     - valuable data
     - motivation to obtain it
     - potential consequences
*Nomenclature and design variations
   - defining the common firewall terms and topologies
   - compare designs and understand their strengths
*Implementing firewalls
   - Routers
     - Purpose
     - Router-based firewalls
     - Packet-filtering configuration 
*Gateway/Bastion host security
     - Router and bastion-host-based firewalls
     - Host security configuration
     - Bastion host software
        tcpd, smrsh, and challenge-response passwd software
*Proxy solutions
     - Misc. public-domain proxies
     - SOCKS
     - TIS firewall toolkit
*Hiding information with DNS
     - SOA and MX records to support the firewall
     - Dual-DNS configuration
*Sendmail configuration 
     - Configuration to operate with firewall topology 
     - Header re-writing to support the firewall 

S2:  9:00am-5:00pm
Instructor:  Bill Rieken, .sh Consulting

Intended audience:  Administrators new to UNIX, but not new to
computers.  This course will jump-start you into the UNIX way of
doing things, and will be valuable to new administrators, or
those transitioning from other computers and operating systems.

Topics covered will include:
*Basic UNIX operations
    - General overview, job and task descriptions
    - System boot and shutdown, startup and shutdown scripts
    - User account management
    - Regularly scheduled events:  cron
*File System
    - Overview: drives, partitions, superblocks, inodes
    - Integrity checking (fsck, lost+found)
    - Backup and restore (incremental and complete backup, dump vs.
      dd  vs. tar)
     - File protection, Super-user privileges, set-uid programs
    - Password security overview
    - Security watchdog daemons
*System Configuration
    - Line printer spooler
    - System configuration files
    - Adding drives and partitions, mounting file systems
    - Managing swap space
    - Managing processes
*Overview of Networking
    - Network services (ftp,telnet, rsh, rlogin)
    - Internet address resolution
    - Network file systems

M1:  9:00am-5:00pm
Instructors:  Trent Hein, XOR Network Engineering
                    Evi Nemeth, University of Colorado, Boulder

This course will cover the following topics essential for system

Dealing with Daemons--Daemons are those friendly programs that
keep your system running.  Learn how to install, configure,
monitor, and feed modern daemons that are essential for  life in
an internetworked environment.  Discussion will include modern
daemons such as inetd, wuftpd, popper, identd, mrouted, and many

Security Disaster Post-Mortem -- What do you do after your site has
been compromised by an outside party?  What if you discover the
hacker was someone inside your organization?  Most folks talk
about how to prevent a security crisis, but what if your plan
doesn't work? When a security crisis does occur, proper handling
is essential. Learn tactics and techniques for dealing with
security  problems "that could never happen at your site."

Video Conferencing on the Desktop--Have you ever participated in
a video conference at your desktop?  You will, and probably
sooner than you think.  Exciting new desktop video conferencing
tools are available today.  Learn how to setup software, hold
private conferences, and participate in technical sessions at
conferences like USENIX and IETF from afar.

System Administration Power Tools -- Often  system administrators
are caught saying "if only I had time to learn how to use that
nifty new program."  Unfortunately, system administrators usually
do so much fire fighting that they don't have time to  stop and
smell the new administration tools.  In this overview of
readily-available UNIX system administration power tools, we'll
discuss packages that are likely to save you time and increase
your salary.  Discover features and usage of programs like
flexfax, rc.config, addhost, amanda, adduser, sudo, glimpse,
patch, cksendml, majordomo, top, tcpdump, and more.

M2:  9:00am-5:00pm
Instructor:  Matt Bishop, University of California, Davis

Intended Audience:
This course will discuss some non-network threats to UNIX
security  and how to deal with them.  The format  will be to
analyze case histories, show what loopholes the attackers
exploited, how the systems administrators might have closed those
loopholes, and how the intruders were discovered.  Concepts and
mechanisms will be discussed, as well as publicly available

Topics covered:
* security policies vs. security mechanisms
* password security:  how passwords are stored, how to crack a
  password, what makes a good  password, schemes for
  assigning/selecting passwords, shadow password files (this
  includes a detailed description of the UNIX password hashing
  function); among the tools discussed will be passwd+, crack,
  ufc_crypt, COPS, and the shadow password suite
* files and auditing: how to audit files, recommended protection
  modes, basic file encryption and checksumming, looking for illicit
  setuid and setgid files; COPS and tripwire will be discussed
* management of privileges: when to work as root and when not to,
  minimizing time working as root, managing a superuser account and
  other non-root system accounts; among the tools discussed will be lsu
* Trojan horses and UNIX:  what they can do, how they do it,
  detection, prevention, and defenses
* managing an incident: what to look for to spot a break-in, how
  to analyze the attack and what to do about it, audit trails and
  their analysis, what not to believe
* examples of known security holes and how to fix them (or live
  with them)

M3:  9:00am-5:00pm
SENDMAIL INSIDE AND OUT  (Updated for 8.7)
Instructor:   Eric Allman, Pangaea Reference Systems

Intended Audience:  Systems administrators who want to learn more
about the sendmail program, particularly details of the
configuration file; programmers implementing new mail front ends
who want to know exactly what sendmail  can do for them; curious
people who have wanted to know what sendmail is all about.  This
course will not cover implementation of mail front ends. This
will be an intense, fast-paced, full-day course intended for
people who have already been exposed to sendmail.

Sendmail is arguably the most successful UNIX-based mail
transfer agent in the world today.  Originally distributed with
the Berkeley Software Distribution, sendmail  is now used by most
UNIX vendors.  However, it has a reputation for being difficult
to configure and manage.  This tutorial focuses on these areas.

After introducing a bit of the philosophy and history underlying
sendmail, topics will include:

* The syntactic elements of the configuration file: mailers,
 options, macros, classes, headers, precedences and priorities,
 trusted users, key file definitions, and rewriting rules and
* The flow and semantics of rulesets, including hints about
* An introduction to SMTP and how sendmail operates in an SMTP
* Day-to-day management issues, including alias and forward files,
 "special" recipients (files, programs, and include files),
 mailing lists, command line flags, tuning, and security.
* How sendmail interacts with the Domain Name System.
* How to use the M4 configuration package included with sendmail 8.

This course uses the latest release of  Berkeley sendmail (8.7)
for examples.  (Version 8.7 is currently being shipped or will
shortly be shipped by BSDI, Convex, Hewlett-Packard, Sequent,
Silicon Graphics, and Sun.)  Version 8 includes many of the
popular features of IDA sendmail.  Other versions of sendmail
will be discussed briefly.

M4:  9:00am-5:00pm
Instructor:   Marcus J. Ranum, Information Works!, Inc

Intended Audience: System managers interested in understanding
performance factors

This course introduces the main factors that affect the
performance of UNIX systems, how to diagnose and improve
bottlenecks, and how to apply scientific methods to system
analysis. Case studies and theory will be interspersed with
descriptions of available performance monitoring tools and how
to use them. Topics covered include:
* Overview
   -Welcome to the land of tradeoffs
   -Why do I have a 200MIP boat-anchor?
* "Internals Lite"
   - Hardware
   - The file system(s)
   - Virtual memory
   - Scheduling
   - Networking
   - Microkernels/Macrokernels/Marketkernels
* Scheduling/CPU
   - Know and love the process table
   - When is a system CPU bottlenecked? Tools and Fixes
* Memory Bottlenecks
   - When is a system memory-bottlenecked?
   - Memory bottlenecks vis-a-vis disk bottlenecks
   - How can you improve memory bottlenecks?
* Disk/File System Bottlenecks
   - Why do file systems get slow? How to improve them.
   - Network file systems
* Network Performance
   - Factors affecting network performance
   - How to measure what's going on on your network
* Application Tuning
   - Dissecting applications
   - Profiling applications
* Benchmarking and Benchmarketing
   - How to rig a benchmark
   -  How to detect a rigged benchmark
   -  How not to write your own benchmark

M5am:  9:00am-12:30pm
Instructor:  Bill LeFebvre, Argonne National Laboratory

Intended Audience:  This course is designed for any network
administrator who is responsible for the operation and
maintenance of DNS, but who has little experience with it.
Attendees should have a basic knowledge of network and system
administration.  An in-depth understanding of IP will be
beneficial but is not required.

The Domain Name System (DNS) is the primary method which the
Internet uses to name and number machines.  This course is an
introduction to DNS for network administrators.  It will describe
the basic operation of DNS, and will provide instructions and
guidelines for the configuration and operation of DNS on UNIX
platforms. Troubleshooting techniques will be taught, and common
problems (and solutions) will be explored.

M6am:  9:00am-12:30pm
Instructor:  Dave Taylor, Intuitive Systems

Intended Audience:  People wanting to learn how to design and
implement hypertext markup language (HTML) documents.
Participants should be familiar with text markup and the World
Wide Web in general, but needn't have previously been exposed to
HTML.  People who already know the basics of HTML can still find
some of the material of value, but they might find the tutorial

This course starts with the basics of the Web and hypertext
markup language.  It teaches participants how to create useful
and interesting documents for the World Wide Web, including
graphics, multiple typefaces, and pointers to any other type of
information or document on the Internet.

Topics covered include: 
- basic document layout
- text and paragraph formats
- numbered, ordered, and definition lists
- external anchors (FTP, Gopher, Web, Telnet, mail, etc.)
- internal document anchors
- adding graphics
- an overview of CGI scripting
- NetScape and new HTML extensions
- how to promote your Web page

M7am:  9:00am-12:30pm
Instructor: Maurita Plouff, Expert Innovations 

Intended Audience: Technical folks who want to avoid difficulties
in communicating technical topics to non-technical audiences,
including their bosses

Communication involves not only the speaker and listener, but
also their beliefs, pre-conceptions, and roles within the work
environment. The different requirements and contexts in technical
work and business/managerial work create barriers to
understanding.  These barriers can place limits on your personal
growth as well as your on company's-- if you cannot communicate
effectively with your manager or your customers, you may lose
their trust and recognition.  This course will point out the
problems in communicating effectively with non-peers, and help
you remedy those problems.

Topics include:
- The communication process
- Happytalk, marketspeak, and jargon
- Understanding your audience
- Defining the content: a 3-step process
- Writing: memos, email, and short notes
- Speaking: presentations, hallway conversations, and meetings
- Closing the loop: decoding feedback

M8pm:  1:30pm-5:00pm
Instructor:  Tom Christiansen, Consultant

Intended Audience:  Programmers with previous Perl programming

This course demonstrates how to create simple applications with a
graphical user interface.  It is divided into three parts. The
first demonstrates OS-independent single-character I/O, simple
screen manipulation using curses, and the forms-entry menuing
library.  The second  concentrates on using Perl  for CGI
programming (World Wide Web programming).  The third demonstrates
using Perl in conjunction with the popular Tk package to create
sophisticated X11 applications in your script using all the
standard Tk widgets. These applications don't use the Tcl language
at all, but instead access Tk directly from Perl using a
convenient object-oriented programming interface.

M9pm:  1:30pm-5:00pm
Instructor:  Bill LeFebvre, Argonne National Laboratory

Intended Audience:  Attendees should have some prior experience
with using IP networks, and should be familiar with number bases,
bits, bytes, and machine representations of integers, but need
not be experienced full-time programmers.

This course will cover essential IP network adminstration and the
background knowledge necessary to carry out such administration.
It will start with the Internet model and some basics such as
numerical addresses and the fundamentally important protocols:
IP, ICMP, UDP, TCP, ARP, RARP.  Packet routing (including
subnetting) will be included, along with information about the
most common UNIX routing daemon, routed.  Management of the
common UNIX network services (telnet, rlogin, etc.) will be
examined, along with the primary network service provider daemon,
inetd.  Management of essential RPC services (NIS, NFS, mountd)
will be covered as time permits.  The course will finish with a
section on troubleshooting and information on Internet

M10pm:  1:30pm-5:00pm
Instructor:  Maurita Plouff, Expert Innovations 

Intended Audience: New managers or those soon-to-be new managers.

Moving from contributor to manager is a difficult transition in
any field.  In technical fields, it is especially difficult, as
the job requirements shift both in scope and nature.

Topics include:

-The simple part: overt expectations
-Lost context: new peers, new expectations
-Moving up or selling out? Reactions from former peers
-Uncovering hidden requirements
-Managing technical staff in a non-technical world
-Resolving conflicts in allegiance
-Fighting knowledge drain: how to stay technical

T1: 9:00am-5:00pm
Instructors:   Trent Hein, XOR Network Engineering
	       Evi Nemeth, University of Colorado at Boulder

This course will present the most popular topics covered at last
years LISA.

Network Performance--Trying to squeeze some extra speed out of
your network?  This introduction to network performance will
cover the basics of monitoring and maintaining decent response on
your Ethernet-based LAN.  You'll also learn how to use a number
of public domain network performance analysis tools.

Network Crisis Case Studies--At the request of students in
previous tutorials, this is a set of network problem case studies
that will be dissected and corrected in front of your eyes using
many of the tools discussed in the previous section.

Intro to expect-- Perhaps the greatest system administration tool
to come along since Perl, expect  is a high-powered interpreted
dialogue language which can act like your hands on the keyboard
to perform tricky tasks while you're away, asleep, or at play.
We will talk about the basic constructs of the language and write
some sample programs.

Trouble Mail Management --Keeping up with your users is an
everyday task.  We'll discuss trouble reporting procedures and
tools you can use to make your system administration  group
operate painlessly and efficiently.

Syslog--Writing your programs so that they exploit the
network-oriented logging protocol can greatly ease debugging and
site maintenance.  Modern BSD syslog includes facilities for
forwarding selective error and debugging information to one or
more other hosts. This section discusses how to configure a
central syslog  host for your network to assist sysadmins in
monitoring the status of a variety of machines simultaneously.

Policy and Politics--Many of the policies and procedures followed
at a site are carefully filed in the sysadmin's head.  With the
worldwide net invading your local site, this folklore needs to be
written down, reviewed by lawyers, and followed by your sysadmin
staff.  Approaches to these tasks, both good and bad, will be
discussed and illustrated with war stories, sample policy
agreements, and procedure checklists.

T2:  9:00am-5:00pm
Instructors: Tina Darmohray and Marcus J. Ranum  
                   Information Works!, Inc.

Intended Audience:  Participants should be familiar with basic
Internet concepts such as Internet services, TCP/IP, and


T3:  9:00am-5:00pm
Instructor: Tom Christiansen, Consultant

Intended Audience:  Individuals who have never looked at perl
before or who have only been  programming in it for a short time.
Students must have a previous background in UNIX shell programming
with a good working knowledge of regular expressions.  A
background in sed, awk, and/or C programming will prove useful but
not essential.

Nearly ten years old now, Perl is a robust tool that has quickly
become the language of choice for systems administrators and
toolsmiths, database managers, software test and support
engineers, GUI programmers, and World Wide Web programmers.
Running on every nearly conceivable platform known to man, Perl is
both an extremely powerful scripting language for problems
previously solved at great effort in the shell or C.  Because it
incorporates aspects of more than a dozen well-known UNIX tools,
experienced UNIX users will come up to speed on Perl rapidly, and
even programmers inexperienced at UNIX will learn UNIX through
learning Perl.

Topics of this course include detailed descriptions and numerous
examples of the syntax and semantics of the language, its data
types, operators and control flow, regular expressions and I/O
facilities, user functions, and systems subroutines.

Note: While this course is based on the current release of Perl
(Perl 5.1), it is not intended to be a detailed discourse on all
advanced  programming constructs now afforded by that release.  It
is a beginning course on Perl for experienced UNIX programmers,
not an advanced course for previous Perl programmers.

T4:  9:00am-5:00pm
Instructors:  Peter Galvin, Brown University
                    Dinah McNutt, Consultant

Intended Audience:  System administrators with experience at
managing systems, but not extensive experience with Sun's new
Solaris 2.x operating system.  Areas of focus include differences
between Solaris 2.x and older operating systems, and migrating
from those older operating systems to Solaris. This course
includes up-to-the-minute information on Solaris 2.4.

Topics  include:
* Installation and  configuration of Solaris 2.x,  including the
new naming schemes for directories and devices, the new startup
file organization and function, and the new printing and
serial-I/O configuration files. Jumpstart installation for
many-system environments is included as well as package and patch

* Managing Solaris 2.3,  covering the new aspects of 2.3, including
the new caching file system, AutoFS, the automounter file system, 
and volume manager

* Differences between NIS and NIS+, as well as how to interoperate
between NIS and NIS+, and how to set up NIS+ clients and servers

* Kernel configuration and how to configure new devices and
changes from Solaris 2.1 and SunOS 4.1.x. The new device naming
scheme is covered as well

* Networking TCP/IP from the hardware side including how routers
and bridges work and useful tools for you to have in your toolbox

* Some useful tools for automating system administration tasks and
troubleshooting problems: watcher, multi-rsh, and sysinfo to name
a few

* Hints on how to monitor system performance and tune the software
for maximum throughput

* Discussion of current security holes, as well as general security
tips and changes which should be made to stock Solaris 2 systems

T5am:  9:00am-12:30pm
Instructor:  Matt Bishop, University of California, Davis

Intended Audience:  This course analyzes incidents in which
attackers have tried to gain illicit access to UNIX systems.
Topics include the attacks used, why the exploited holes existed,
how the system administrators responded, and how they closed the
holes. Concepts and mechanisms will be discussed, as well as
publicly available tools.

This course focuses on problems from a networked site, including
both sites with local area networks and sites connected to the
Internet. It is complementary to, and not a replacement for, the
Firewall courses.  The focus in this course is on the  UNIX system
and not the security of the network itself.  Although the
principles apply to any type of network, this course will focus on
protocols used in Berkeley-based UNIX systems.

Topics covered:
* security on the Internet, remote logins, ftp and file transfer, 
  secure RPC, NIS, NFS, secure NIS and NFS
* computer worms: the Internet Worm of November 1988 and its aftermath
* a short overview of Kerberos and the Privacy-Enhanced Electronic  
  Mail specifications
* some known UNIX network vulnerabilities, their exploitation and
  fixes; the ISS tool will be discussed
* network logging, user and host authentication, the ident protocol; 
  tcp_wrapper will be discussed

T6am: 9:00am-12:30pm
Instructor:   Marcus J. Ranum,  Information Works!, Inc.

This course introduces the policy issues and risks associated with
Internet connectivity, and some of technologies and approaches for
risk reduction.  Participants should be familiar with basic
Internet concepts such as Internet services, TCP/IP, and routing.

By the end of the course, participants will understand:

* How to draft an Internet connectivity requirements and
  implementation plan
* How to build a consistent security policy for their network perimeter
* How to assess their risks in connecting to the Internet
* The tradeoffs between different security approaches
* How to evaluate them in the context of their business objectives 

Topics covered include:
- Internet threats
- Risk assessment
- Security policies and procedures
- Acceptable use policies
- Security maintenance policies
- Service-oriented approaches to achieving Internet connectivity
- Host-based security versus perimeter security
- TCP/IP security issues
- Host security issues for Internet connected hosts
- Viruses and the Internet
- Perimeter security approaches
- Firewalls:
      Screening routers
      Application level firewalls
      Management of firewalls
      Auditing firewalls
- Authentication
      Advantages and disadvantages of strong authentication
      Token authenticators
      Software authenticators
- Network level encryption
      What does the future hold?

T7am:  9:00am-12:30pm
Instructor:  Tom Coppeto, Massachusetts Institute of Technology

Intended Audience: WWW developers and programmers who wish to
explore the Common Gateway Interface to the World Wide Web and
development of WWW applications.  Participants should be familiar
with HTML, UNIX shell scripts, and some C and/or Perl.

This course covers the basics of CGI, including creating documents
"on the fly",  building new services, writing forms, and creating
searchable documents.

Specific topics will include:
- how CGI works
- gateway applications
- searching
- forms
- dynamic documents
- redirects

T8pm: 1:30pm-5:00pm
Instructor:   Eric Allman, Pangaea Reference Systems

Intended Audience:  People familiar with sendmail 8.6 who want to
learn how to convert their sites over to sendmail 8.7.  This
tutorial is in no way an introduction to sendmail.

Sendmail 8.7, the latest release of Berkeley sendmail, has many
new features.  In many cases mail administrators can just compile
the new release of sendmail and use their old configuration files,
but there are many new capabilities that "power users" may wish to
utilize.  This course discusses the differences between versions
8.6 and 8.7 of sendmail.

Topics will include:
- 8 BIT MIME support, including 8 to 7 bit encodings.
- New debug  "system service switch" to control access to resources.
- New map classes (text, nisplus, netinfo, hesiod, program, sequence, 
   switch, user, bestmx, userdb).
- Priority-dependent message time-outs.
- Delivery Status Notification extensions.
- Long option, macro, class, and ruleset names 
- Support for dial-on-demand sites.

Time permitting, musings on the future direction of sendmail will
be indulged in.

T9pm:  1:30pm-5:00pm
Instructor:  Dan Appelman, Heller, Ehrman, White and McAullife

Intended Audience:  System administrators faced with legal issues
of increasing complexity and potential liability as more users are
able to use, and abuse, electronic networks.

The law as it applies to the electronic media is not always
intuitive or obvious.  It is especially confusing and unpredictable
as it pertains to computer and network system administration and
those who work in that field.

This course will provide invaluable insight when you or one of your
users is confronted with issues involving the law.  It will also
address your legal obligations and responsibilities as a system
administrator, what your employer may ask you to do, and when you
can legally refuse to comply. It will examine how this uncertainty
can affect your decision making and suggest ways to minimize your
risk of legal liability.

The law has changed considerably since this tutorial was offered a
year ago at LISA VIII.  The tutorial will address the most recent
legal developments in the following areas:
	- Email Privacy
	- Defamation Liability
	- Intellectual Property Rights (including copyrights)
	- Liability for Transmission of Adult Materials
	- Export Compliance

T10pm:  1:30pm-5:00pm
Instructor:  Tom Coppeto, Massachusetts Institute of Technology

Intended Audience: System administrators who want to learn the
essentials of maintaining a WWW site from configuration to ongoing
maintenance.  Participants should have experience with basic UNIX
system administration.

This course covers setting up and maintaining a WWW server. Topics
include server configuration, statistic gathering, access control,
proxying, and image-map files (clickable images).  It will focus on
the NCSA implementation of the Hypertext Transfer Protocol daemon
(httpd), but users of the CERN implementation will also find this
tutorial valuable.

Specific topics will include:
- web server setup
- basic configuration
- proxy servers
- access control 
- logs and  statistics     
- clickable image support
- useful gateways and other add-ons

The USENIX Association is a provider of Continuing Education
Units (CEUs) and offers CEUs for a small additional
administrative fee.  Established by the International Association
for Continuing Education and Training, the CEU is a nationally
recognized standard unit of measure for continuing education and
training, and is used by thousands of organizations across the
United States.  Each full-day USENIX tutorial qualifies for 0.6
CEUs.  You can request CEU credit by completing the CEU section
on the registration form.  USENIX provides a certificate for each
attendee taking a tutorial for CEU credit, and maintains
transcripts for all CEU students.

Eric Allman is the original author of sendmail, as well as several
other perennial favorites including syslog, tset, the -me  macros,
and trek, as well as a major contributor to INGRES.  He received
his MS in Computer Science from UC Berkeley in 1980.  He is
currently the Chief Technical Officer at Pangaea Reference Systems.

Dan Appelman practices computer and telecommunications law for the
Silicon Valley firm of Heller, Ehrman, White and McAuliffe.  He
represents many high-tech and Internet-related companies.  In
addition to his law degree, he earned a PhD in telecommunications
policy.  He teaches computer and telecommunications law, and
frequently lectures and writes about these matters.

Matt Bishop received his PhD. from Purdue University  where he
specialized in computer security. His research and teaching areas
at the University of California at Davis include computer and
network security, along with operating systems and software
engineering.  He chaired the first two USENIX UNIX Security
Workshops, and his column on computer security appears regularly in
the "Best Practises" newsletter.

Tom Christiansen is a software consultant specializing in perl
applications, optimizations, and training. He earned an MS degree
in Computer Science from the University of Wisconsin at Madison.
Tom serves on the Board of Directors of the USENIX Association, and
is well-known around the world for his courses in Perl programming.

Tom Coppeto is a systems programmer in the MIT Network Operations
Group specializing in systems and network management of MIT's
distributed computing environment and client/server development.
He received a SB degree in Aeronautical Engineering from MIT in 1989.

Tina Darmohray is a consultant in the area of Internet firewalls
and network connections.  She has over a decade of experience
managing and networking UNIX systems.  Previously, she was the lead
for the UNIX System Administration team at a national laboratory
where her group was responsible for over 1,000 machines. She is
completing a book on Internet firewalls with Marcus Ranum for
Prentice Hall.

Peter Galvin is currently the Systems Manager for Brown
University's Computer Science Department, where he manages an
installation of nearly 200 Sun SPARC stations and servers.  He is a
member of the Board of Directors of the Sun User Group, and has
been Program Chair for the last 4 SUG/SunWorld conferences.  He has
written articles for "Byte" and "Advanced Systems" (SunWorld) 
magazines and the "SuperUser" newsletter and is co-author of 
"Operating Systems Concepts" textbook.

Trent Hein is Chief Network Architect at XOR Network Engineering
where he deals with sticky system and network administration
problems. He worked on the 4.4 BSD port to the MIPS architecture at
Berkeley, and is an author on the 5th edition of the UNIX System
Administration Handbook.  Trent has a BS in Computer Science from
the University of Colorado.

William LeFebvre is a computer systems engineer at Argonne
National Laboratory. He received his BA and MS degrees from Rice
University.  He has been using UNIX systems since 1982 and has
been an active user of the Internet since 1984.  William has
regularly participated as a "guru" at USENIX conferences.

Dinah McNutt is a free lance consultant and writer specialzing in
systems administration. She is the author of the Daemons and
Dragons column for "UNIX Review" and has written for "Byte", 
"SunExpert" Magazine, and the "X Resource". She teaches system 
administration classes all over the world and was the chair of the 

Evi Nemeth, a faculty member in Computer Science at the University
of Colorado, has managed UNIX systems for the past 18 years, both
from the front lines and the ivory tower.  She is co-author of the
best-selling "UNIX System Administration Handbook."

Maurita Plouff has been translating between technical and
non-technical audiences since her first post as a physics
laboratory research assistant.  She has held both technical and
managerial posts, and is known for her ability to avoid inducing
the "glassy-eyed stare" in managers grappling with technical
material. Ms. Plouff is currently a consultant assisting clients to
meet strategic business goals through effective use of technology.

Marcus J. Ranum is a network and computer security consultant. He
is the principal author of several major Internet firewall
products, including the DEC SEAL, the TIS Gauntlet, and the TIS
Internet Firewall Toolkit.  Marcus has been managing UNIX systems
and network security for over 13 years, including configuring and
managing Marcus is a frequent lecturer and
conference speaker on computer security topics.  He is completing a
book on Internet firewalls with Tina Darmohray for Prentice Hall.

Bill Rieken  provides technical support for distributed object
programming for the DOE project at Sun.  He is co-author of
"Adventures in UNIX Network Applications Programming"  and is
currently writing a system administration book for Prentice-Hall.
His company, .sh consulting, is located in Los Gatos, California.

Dave Taylor is proprietor of The Internet Mall, a World Wide Web
site with over 2000 stores listed. He is author of "Creating Cool
Web Pages with HTML", "Teach Yourself UNIX In A Week",  and "Global
Software", and co-author of "The Internet Business Guide". He also
writes for Internet World, Marketing Computers and other trade
publications and is the original author of the Elm Mail System.
Dave has a Masters in Educational Computing and a Bachelors in
Computer Science.

Tuesday, September 19, 1995

A one-day workshop will focus on a discussion of the
latest-breaking technical issues in the systems administration
arena as introduced by those in attendance.  Attendance is limited
and based on acceptance of a position paper.  Acceptance notices to
all participants will be issued by August 14, 1995.

How to Submit:  Potential workshop attendees are invited to submit
a proposal of at most three pages (ASCII) via electronic mail to  no later than August 1.  These proposals should
briefly contain a topic for discussion, a description of the
subject, an explanation of what makes this topic controversial or
interesting, and personal position.  More substantive reports of
completed works should instead be submitted as papers to the
technical sessions.  A representative subset of positions will be
discussed in an open forum.

The workshop is being organized by John Schimmel of Silicon
Graphics. Mail these proposals to by August 1.  Chosen
participants will be notified by August 14.  Participants must be
pre-registered for the LISA conference.  No additional fee will be
charged to attend this workshop, and lunch will be provided.

Wednesday-Friday, September 20-22, 1995

WEDNESDAY, Sept 20   9:00am-5:30pm
9:00-10:30  Opening Remarks 
Tina Darmohray, Information Works!, Inc & Paul Evans, Synopsys, Inc.

Keynote Address: Hardware, Wetware, and Software
John Mashey, Silicon Graphics

How does the very outer-most technology manage to become more
affordable, and finally wind up on the desks of the masses (which
then becomes the problem of the SAs!).  John Mashey will bring his
INDY workstation for the presentation and demonstrate different
ways to apply graphics to problems of system analysis and
management.  He'll also bring the software used in Jurassic Park
to view filesystems in a pictorial manner as an example of where
the future may be for all of us.

Dr. Mashey is the director of systems technology in Silicon
Graphics' R&D department.  He is an ancient UNIX person, having
started work on it at Bell Labs in 1973.  He has worked on and
managed projects in both commercial and technical computing and
helped design the MIPS RISC architecture. He was one of the
founders of the SPEC benchmarking group. He has given more than
500 public talks on software engineering, RISC design, performance
benchmarking, and supercomputing.

11:00 -12:30  Network Services
Session Chair:  John Schimmel, Silicon Graphics, Inc.

lbnamed (A Load Balancing Name Server in Perl)
  Roland J. Schemers, SunSoft

LPRng -- An Enhanced Printer Spooler System
  Patrick Powell, San Diego State University

Finding a Needle in a Virtual Haystack:  Whois++ and the 
Whois++ Client Library
  Jeff Allen, Harvey Mudd College

2:00 - 3:30  Commercial Environments 
Session Chair:  TBA

Capital Markets Trading Floors, Current Practice
  Alan Kadin, Fidelity Investments,  Sam Lipson, Morgan 
  Stanley Japan Ltd.

Morgan Stanley's Aurora System:  Designing a Next Generation 
Global Production Unix Environment
  Xev Gittler and  W. Phillip Moore, Morgan Stanley

How to Upgrade 1500 Workstations on Saturday, and Still Have 
Time to Mow the Yard on Sunday
  Michael E. Shaddock, Michael C. Mitchell, and Helen E. Harrison  
  SAS Institute, Inc.

4:00 - 5:30  Security
Session Chair:  Marcus J. Ranum, Information Works!, Inc.

Security Administration in an Open Networking Environment
  Karen Casella, Sun Microsystems, Inc.

Multi-platform Interrogation and Reporting with Rscan
  Nathaniel Sammons, Colorado State University

Exu - A System for Secure Delegation of Authority on an Insecure
  Karl Ramm and Michael Grubb, Duke University

11:00 - 12:30 
PANEL DISCUSSION:  Management of Mission-critical Applications on
Large Farms of UNIX Workstations.

Panelists:  Aaron Goldberg and Yuval Lirov, Lehman Brothers; 
            Dan Geer, OpenVision Technologies

A critical challenge for distributed systems technology is to
respond to growing numbers of crises without increasing support
costs.  Three key support areas require special attention in a
globalized business environment: change management, batch
coordination, and systems monitoring.  Their synergy allows
harnessing the spare cycles of desktop systems after business
hours to offer both a competitive edge and economies of scale.

2:00 - 3:30    
Spamming, Spoofing, and Spying on Your Personal Global System
  N. L. Schryer,  AT&T Bell Laboratories

Nearly half of our researchers have megabit/second access to work
from the home computing environment.  Soon, employees will expect
the company to maintain and secure the environment at home and the
office.  The connection may be over a cable television system so
that the whole neighborhood can spy on the bits as they go by.
The phrase "tightly knit small town" only hints at the new
information sharing.  Does the home computer belong behind your
institutional fire-wall?

This talk describes our joyous experience with the wonders of the
InfoBahn and some of the tools and procedures we've developed in
response to the InfoBahn's darker sides.

4:00 - 5:30 
PANEL DISCUSSION: Commercial Models of UNIX Support 
  Yun S. Choi, Pilot Network Services, Inc.; Jennifer Lawton,
  Net Daemons Associates; Steve Simmons, Inland Sea

The demand for expert UNIX support has created a growing industry.
Companies large and small are finding "contract support" of their
dynamic computer infrastructure is not only more efficient, but
also cost effective.  How is this done?  How are these "service
providers" structuring their services?  At this panel session, we
have invited three service providers to explain their diverse
service models and share with us their experiences.

6:30-7:30  Work-in-Progress
Short, pithy, and fun, WIP Reports introduce new or ongoing work.
If you have interesting work to share or a cool idea that is not
ready to be published, then a Work-in-Progress report is for you.
Your fellow attendees will give you insightful feedback.  We are
especially interested in the presentation of student work.  To
reserve your slot, contact Peg Schafer via email to

THURSDAY, Sept 21  9:00am-5:30pm
9:00 - 10:30 
Electronic Commerce:  What It Means to You 
  Dan Geer, OpenVision Technologies

You can't pick up a newspaper or magazine without reading about 
doing business on the Internet.  It brings up many interesting points
for sysadmins.  How do you secure your system from outsiders and 
insiders?  How do you take payment?  What are the options?  

What kinds of problems should you anticipate?  This talk will
describe real- life problems and issues.

11:00-12:30   Internet Services 
Session Chair:  Tina Darmohray, Information Works!, Inc.

Administering Very High Volume Internet Services
  Dan Mosedale, William Foss, and Rob McCool, Netscape

Bringing the MBONE Home:  Experiences with Internal Use of 
Multicast-Based Conferencing Tools
  Arch Mott, Cisco Systems, Inc.

LACHESIS:  A Tool for Benchmarking Internet Service Providers
  Jeff Sedayao, Intel Corporation

2:00-3:30   Management 
Session Chair:  Kim Trudel, Massachusetts Institute of Technology

From Something to Nothing (and back)
  Gretchen Phillips, State University of New York at Buffalo

Metrics for Management
  Christine Hogan, Synopsys, Inc.

SQL_2_HTML:  Automatic Generation of HTML Database Schemas
  Jon Finke, Rensselaer Polytechnic Institute

4:00-5:30   User Environment
Session Chair:  Bryan McDonald, SRI International

Decentralising Distributed System Administration
  Christine Hogan and Tim Hunter, Synopsys, Inc.; Aoife Cox, 

SPM:  System for Password Management
  Michael A. Cooper, University of Southern California

AGUS:  An Automatic Multi-Platform Account Generation System
  Paul Riddle and  Paul Danckaert, University of Maryland,
  Baltimore County; and Matt Metaferia , MCI Telecommunications

11:30-12:30  An Important Announcement from the IETF
Mike O'Dell
Scott Bradner
Area Directors, Operational Requirements
Internet Engineering Steering Group of the IETF
As is obvious, the Internet is growing rapidly, and as a result, the
CIDR Deployment Group is about to forward a Best Current Practices 
document to the IETF, which will probably effect network and system 
administrators in the future.  Come hear one of the IETF area directors
explain this important document and discuss the reasons behind it.

Highlights from the 5th USENIX UNIX Security Symposium

This session will present highlights from the 5th USENIX UNIX
Security Symposium held June 5-7, 1995, in Salt Lake City, Utah.
This session will present three of the refereed papers from that
conference, selected for their relevance for systems

4:00-5:30   From ARPANET to Internet
Peter H. Salus, Author and Enthusiast

Before the Internet, there was the ARPANET.  Find out what went on
before the first connection:  the teasers; the plans for a network
(e.g. Shapiro's paper); the RFQs and the BBN papers; the first two
dozen RFCs (1-19 precede the first IMP); then, the phenomenal
growth which led from 6-bit to 8-bit addressing; the first
applications; where TCP/IP and OSI came from; and a few

FRIDAY, Sept 22,  9:00am-5:30pm

9:00-10:30   File Management
Session Chair:  Paul Anderson, University of Edinburgh

OpenDist -- Incremental Software Distribution
  Peter W. Osel & Wilfried Gaensheimer, Siemens AG 

filetsf:  A File Transfer System Based on lpr/lpd
  John Sellens, University of Waterloo

Patch Control Mechanism for Large Scale Software
  Atsushi Futakata, Central Research Institute of Electric Power 

11:00-12:30   Network Hardware
Session Chair:  Paul Evans, Synopsys, Inc.

From Twisting Country Lanes to MultiLane Ethernet SuperHighways
  Stuart McRobert, Imperial College 

From thinnet to 10 baseT, from Sys Admin to Network Manager
  Arnold de Leon, Synopsys, Inc.

Tracking Hardware Configurations in a Heterogeneous Network with
  Rex Walters, IBM Microelectronics

2:00-3:30  Closing Session

Panel Discussion:  Computing in the year 2000
Moderator:  Rob Kolstad, BSDI
Dan Geer, OpenVision Technologies
Other panelists to be announced


9:00-10:30   The Truth About ATM
Berry Kercheval, Xerox PARC

Asynchronous Transfer Mode (ATM) is an emerging networking
technology based on cell forwarding which makes high-speed design
easier and enables guaranteed bandwidth.  ATM is gaining a
foothold on your desktop, with interface cards for workstations at
less $1000 and switch prices falling, too.  It is one of the most
hyped technologies in recent years.  This talk cuts through the
hype and explains what ATM really is, what it is good for, and
what the state of the art is.

Panel Discussion: Integration of PCs in a UNIX computing Environment
  Hal Pomeranz, The NetMarket Company; Rob Reynolds,
  Hewlett-Packard Laboratories; Marshal Wilensky, Novell

The path to integration of PCs into a UNIX computing environment
is at least a tricky business, expecially when mail is involved.
This panel features seasoned professionals who have accomplished
this feat of black magic.


Saturday, September 16
	Conference Registration		7:00pm - 9:00pm

Sunday, September 17 
	Conference Registration		7:30am - 9:00pm
	Tutorial Program		9:00am - 5:00pm
	Welcome Reception		6:00pm - 9:00pm

Monday, September 18
	Conference Registration		7:30am - 6:00pm
	Tutorial Program		9:00am - 5:00pm

Tuesday, September 19
	Conference Registration		7:30am - 6:00pm
	Tutorial Program		9:00am - 5:00pm
	Workshop: Advanced Topics
	 in System Administration	9:00am - 5:00pm
	Birds-of a-Feather Sessions	6:00pm - 10:00pm

Wednesday, September 20 
	Conference Registration		7:30am - 6:00pm
	Refereed Track			9:00am - 5:30pm
	Invited Talks Track		11:00am - 5:30pm
	Birds-of-a-Feather Sessions	6:00pm - 10:00pm
	Vendor Display			12:00pm - 6:00pm

Thursday, September 21
	Conference Registration		7:30am - 5:00pm	
	Refereed Track			9:00am - 5:30pm
	Invited Talks Track		9:00am - 5:30pm
	Vendor Display			10:00am - 4:00pm
	Monterey Aquarium Reception	8:00pm - 10:00pm
	Birds-of-a-Feather Sessions	10:00pm - 11:30pm

Friday, September 22	  
	Refereed Track			9:00am - 12:30pm
	Invited Talks Track		9:00am - 3:30pm


The Vendor Display focuses on vendors with products of interest to
system administrators.  The atmosphere is informal, and you can
ask the vendors any technical questions you've been thinking
about.  The Exhibit hours will be:
	Wednesday, September 20  - 12:00pm - 6:00pm
	Thursday, September 21      -10:00am - 4:00 pm

Thursday, September 21,  8:00pm - 10:00pm
Desserts and beverages will be served.

All the wonders of a hidden world come to light at the
internationally acclaimed Monterey Bay Aquarium.  You'll get a
fish-eye view of Monterey Bay and meet more than 6,000 of its most
colorful inhabitants.  Your invitation to this reception is
included in the technical sessions registration fee.  Additional
reception tickets will be available for purchase at the

One copy of the conference proceedings, contains all refereed
papers, and one copy of the Invited Talks Submitted Notes may be
picked up at the conference by all technical sessions registrants.
Additional copies may be purchased at the conference.  After the
conference, the proceedings  are available for purchase; contact
the USENIX Association Executive Office, telephone 510-528-8649 or
via email to

Once again this year, a Terminal Room will be available to
conference attendees.  Services available at the Terminal Room will
include Internet access, dial-out access, facilities for making
copies of miscellaneous GNU and public domain software.  The
Terminal Room will be located at the Monterey Marriott Hotel.

Electronic message service will be available Monday, September 18
through noon Friday, September 22.  Electronic messages to
conference attendees should be addressed:

Telephone messages during the conference may be left by telephoning
the USENIX Registration Desk located at the Monterey Conference
Center.  The Message Center will be open beginning on Sunday,
September 17, 7:30 am - 9:00 pm, and continue during conference
hours until Friday, September 22, at 3:30 pm.

Have a question that's been bothering you? Can't find the answer?
Try asking a USENIX guru! Experts from the USENIX community will be
available to answer your questions, each in their own areas of
expertise.  The schedule, including the names of the volunteer
gurus and their areas of expertise, will be posted at the
conference.  Email suggestions for this track should be directed to
Lee Damon,

Birds-of-a-Feather Sessions (BOFs) allow attendees to meet and
discuss topics of interest to them.  BOFs are intended to be highly
interactive and much less formal than the technical sessions.  BOFs
will be held Tuesday, Wednesday and Thursday evenings in the
Monterey Marriott.  We would particularly like to encourage
sessions on topics which would not normally be discussed during
typical USENIX technical presentations (for instance, discussions
on professional and technical issues, non-professional interests
common to system administrators, etc.)  To schedule a BOF Session,
or to request more information, send email to Lee Damon,  BOFs may also be scheduled on-site at the
Conference Registration Desk.


USENIX is the UNIX and Advanced Computing Systems Technical and
Professional Association.  Since 1975 the USENIX Association has
brought together the community of system administrators, engineers,
scientists, and technicians working on the cutting edge of the
computing world.

The USENIX technical conferences have become the essential meeting
grounds for the presentation and discussion of the most advanced
information on new developments in all aspects of advanced
computing systems.

The USENIX Association and its members are dedicated to:
- problem-solving with a practical bias
- fostering innovation and research that works
- communicating rapidly the results of both research and innovation
- providing a neutral forum for the excercise of critical thought
and the airing of technical issues.

USENIX holds an annual multi-topic technical conference, the annual
System Administration (LISA) conference, and frequent single-topic
symposia addressing topics such as security, Tcl/tk, object-orient
technologies, mobile computing, and operating systems design -- as
many as ten technical meetings a year.  It publishes ;login:, a
bi-monthly newsletter; Computing Systems, a quarterly technical
journal published with The MIT Press; and proceedings for each of
its conferences and symposia.  It also sponsors special technical
groups and participates in various standards efforts such as IEEE,
ANSI, and ISO.


SAGE, a Special Technical Group within the USENIX Association, is
dedicated to the recognition and advancement of system
administration as a profession.  To join SAGE, you must also be a
member of USENIX.

SAGE activities currently include the publishing of the Short
Topics in System Administration series, the first of which is Job
Descriptions for System Administrators and the second of which,
will be about policies, is in progress;  "SAGE News", a regular
section in ;login:; and The System Administrator Profile, an annual
survey of system administrator salaries and responsibilities;
co-sponsoring the LISA conference; support of working groups;
encouraging the formation of local SAGE groups; and an archive site
for papers from the LISA conferences and sys admin-related

For more information about USENIX and SAGE, please access our
World Wide Web Site:  URL:


All daytime meetings will be held at the Monterey Conference Center,
One Portola Plaza Monterey, CA  93940.

All hotels listed below are within walking distance of Fisherman's
Wharf, Cannery Row, the Monterey Bay Aquarium, and many fine
restaurants.   To make your hotel reservation at any of the hotels
below, be sure to tell reservations you are with USENIX to take
advantage of our group rate.  A one night's deposit is required
for all reservations.

SPECIAL ANNOUNCEMENT*: The Monterey Jazz Festival will be held at
the Fairgrounds in Monterey on September 15-17, 1995.  There will
be non-stop jazz at the oldest continuous jazz festival in the
world.  Top names in jazz, colorful gifts, food, jazz photo/art
exhibits, jazz clinics/seminars and much more.  If you have an
interest in attending, please phone:  800-307-3378 for ticket and
seating information.

*Due to the Jazz Festival, hotel rooms in Monterey will be at a
premium on Friday and Saturday nights.  USENIX has a limited number
of hotel rooms reserved for attendees on these nights.  You may be
paying a substantially higher hotel rate if you do not make your
arrangements immediately!


Hotel space is nearly non-existant.  Here are some suggestions:

* Try calling "Resorts to Me" at 408-646-9250.  

* If you are a AAA member, check out the listings in the
  California Tour book.  

* ROOM SHARING IS AN OPTION!  If you've booked a room and would
  like to cut down on your expenses by sharing that room, or if 
  you can't find a room and are considering sharing one, you can 
  post your request to other attendees on:

* Try calling the sold out hotels below to see if there are
  any cancellations.  

Monterey Marriott (headquarters hotel) - Tel# 408-649-4234

Doubletree Hotel - Tel# 408-649-4511

Hotel Pacific - Tel# 408-373-5700

Victorian Inn - Tel# 408-373-8000	

Monterey Plaza Hotel - Tel# 408-646-5937

Monterey Hotel - Tel# 408-375-3184	

Colton Inn - Tel# 408-649-6500

Quality Inn Pacific Grove - Tel# 800-992-9060, 800-232-4232, 
                                 408 646-8885
Hyatt Regency Monterey - Tel# 408-372-1234

Merritt House Tel# 408-646-9686

Bay Park Hotel Tel# 408-649-1020

*To get original complete hotel information, with addresses
and descriptions, send email to our mailserver at:
Send the line:  send lisa-hotels conferences" in the body of
your mail message.


ROOM SHARING - Usenet facilitates room sharing.  If you wish to share
a room, post to and check

There are two garages available for Conference Center Parking.
The East Garage is $3 per day and the West Garage, which is closer
to the Center, is $5 per day.  Valet parking is available at both
the Marriott and Doubletree Hotels for $10/day.

Special airline discounts will be available for USENIX attendees.
It is suggested that you fly into either the San Francisco or Los
Angeles International Airport, then transfer to a flight into the
Monterey Peninsula Airport.  Please call for details:

JNR, Inc.   TOLL FREE: 800-343-4546 (USA) or   714-476-2788

The Monterey Peninsula Airport is located just four miles from the
Monterey Conference Center.  Taxi service is available at an
approximate cost of $10-12 one way.

If you are driving -

>From San Jose - Take Hwy 101 South to Hwy 156 West which turns
into Hwy 1.  Exit at at Pacific Grove/Del Monte Avenue.  Continue
on Del Monte into Monterey.

>From southern California - Take Hwy 101 north to Hwy 68 west to
Central Monterey turnoff to Hwy 1 south.  Take the Monterey exit
straight and turn right on Camino Aguajito to Del Monte and turn
left.  Continue on Del Monte to the Conference Center.

Conference Co-Chairs:
	Tina Darmohray, Information Works!, Inc.
	Paul Evans, Synopsys, Inc.

Conference Program Committee:
	Paul Anderson, University of Edinburgh
	Kim Trudel, Massachusetts Institute of Technology
	Rob Kolstad, Berkeley Software Design, Inc.
	Bryan McDonald, SRI International
	Marcus J. Ranum,  Information Works!, Inc.
	John Schimmel, Silicon Graphics, Inc.

Invited Talks Coordinators:
	Peg Schafer, Harvard University
	Laura de Leon, Hewlett-Packard

Work-In-Progress Coordinator:
	Peg Schafer, Harvard University (

Guru Is IN Coordinator:
	Lee Damon, QUALCOMM, Inc.  (

Terminal Room Coordinator:
	Henry Spencer, SP Systems  (

Tutorial Program Coordinator:
	Daniel V. Klein, USENIX  (

Exhibits Coordinator:
	Peter Mui, USENIX  (

Meeting Planner:
	Judith F. DesHarnais, USENIX  (


TUTORIALS: A limited number of seats in each tutorial are reserved
for full-time students at the very special rate of $70.00 for
either two - 1/2 day tutorial classes or one full-day tutorial (2
units).  To take advantage of this, you MUST telephone the
conference office to confirm availability and make a reservation.
You will receive a reservation code number which MUST appear on
your Registration Form.  Your registration form with full payment
and a photocopy of your current student I.D. card MUST arrive
within 14 days from the date of your reservation.  If they do not
arrive by that date, your reservation will be cancelled.  This
special fee is non-transferable.

TECHNICAL SESSIONS:  USENIX offers a special discount rate of $75
for its technical sessions for full-time students.  You must
include a copy of your current student I.D. card with your
registration.  This special fee is not transferable.

Full-time students please note:  A limited number of scholarships
are available.  Contact the Conference Office for details.

---------------------------CUT HERE--------------------------------
September 17-22, 1995, Monterey Conference Center, Monterey, CA

Please complete the form below and return with full payment to:

22672 Lambert St., Suite 613, Lake Forest, CA 92630
Telephone: (714) 588-8649 / FAX Number (714) 588-9706
Electronic Mail Address:
Office Hours: 8:30am - 5:00pm Pacific Time

         (first)                                 (last)

USENIX Member ID____________________

FIRST NAME FOR BADGE____________________________

COMPANY OR INSTITUTION______________________________________________

MAILING ADDRESS_____________________________________________________


TELEPHONE NO:_________________________FAX NO._________________________

NETWORK ADDRESS______________________________________________________
                          (one only please)

[ ] I do not want to receive future commercial mailings
Is this your work address?  ___yes	___no
[ ] I do NOT want to appear in the attendee list

What is your affiliation? [ ]Academic  [ ]Commercial  [ ]Gov't  [ ]R&D
What is your role in purchase decision?
1.[] Final  2.[] Specify  3.[] Recommend 4.[] Influence 5.[] No role

What is your job function?
1.[] System/Network Administrator    2.[] Consultant 
3.[]Academic/Research   4.[] Developer/Programmer/Architect 
6.[]Technical Manager  7.[] Student

How did you hear about this meeting:
1.[] USENIX mailing  2.[] Newsgroup/Bulletin Board 3.[] ;login:  
4.[] World Wide Web  6.[] From a Colleague  7.[] Magazine

What publications or newgroups do you read releated to system


TUTORIAL PROGRAM - Sunday-Tuesday, September 17-19, 1995

You must pre-register for the tutorials you wish to take.  They 
may be on different days, so long as there is no overlap.  You 
may not "split" tutorials - for example, you may not register for
M8pm and half of M1.  Tutorials designated "AM" run from 
9:00am-12:30pm; tutorials designated "PM" run from 1:30pm-5:00pm; 
tutorials with no AM or PM designation run from 9:00am-5:00pm.

Check the boxes next to the tutorial number(s) you wish to attend:

Sunday, September 17
[ ] S1:  Joining the Internet Safely Using UNIX and Firewalls
[ ] S2:  Introduction to UNIX System Administration 

Monday, September 18
[ ] M1:  New Topics in System Administration 
[ ] M2:  UNIX System Security
[ ] M3:  Sendmail Inside and Out 
[ ] M4:  Introduction to System Performance Tuning
[ ] M5am:  Administering the Domain Name System
[ ] M6am:  An Introduction to HTML 
[ ] M7am:  Breaking the Communication Barrier: Talking Technical 
[ ] M8pm:  GUI Programming in Perl  
[ ] M9pm:  IP Network Administration
[ ] M10pm: New Manager's Survival Guide

Tuesday, September 19
[ ] T1:  Topics in System Administration
[ ] T2:  Joining the Internet Safely Using UNIX and Firewalls
[ ] T3:  Beginning Perl Programming for UNIX Programmers  
[ ] T4:  Solaris System Administration
[ ] T5am:  UNIX Security:  Threats and Solutions from the Network 
[ ] T6am:  How to Plan Internet Security and Firewalls  
[ ] T7am:  World Wide Web Programming with CGI  
[ ] T8pm:  What's New in Sendmail 8.7  
[ ] T9pm:  "But I'm Not Responsible Am I?": Your Liabilities as a 
           System Administrator  
[ ] T10pm: Web Server Administration

One half-day tutorial  =  1 unit
One full-day tutorial  =  2 units

In order to determine your total tutorial registration fee, add the
total number of units you have selected and refer to the fee schedule
shown below (a maximum of 2 units per day, may be selected):

SELECTED	(before Aug 25)		(optional)	

One Unit	$175.00			$15.00
Two Unit	$320.00			$15.00
Three Units	$455.00			$23.00
Four Units	$590.00			$30.00
Five Units	$725.00			$38.00
Six Units	$860.00			$45.00


TUTORIAL FEES - Sunday-Tuesday, September 17-19, 1995
	Enter total tutorial fee from schedule above......$__________
	CEU units surcharge from schedule above (optional)$__________
Late fee applies if postmarked after Aug. 25, 1995..Add $50. $_______

	Full-Time Student Fee:  pre-registered or onsite
	(Attach copy of current student I.D. card)
			CODE NO:______________________$70.00$________
			CODE NO:______________________$70.00$________
			CODE NO:______________________$70.00$________

Wednesday-Friday, September 20-22, 1995

Member Fee............................................$320.00$_______
   (Applies to current USENIX,EurOpen, JUS and AUUG members)

Non-Member or Renewing Member Fee*....................$425.00$_______
	*Join or renew your USENIX/SAGE membership and
	attend the conference for same low price -check here [ ]

Late fee applies if postmarked after Aug. 25, 1995..Add $50. $_______

Full-Time Student Fee: pre-registered or on-site......$ 75.00 $______
(Students must include photocopy of current student I.D. card)

                          TOTAL ENCLOSED...................$_________

Purchase orders, vouchers, telephone or email registrations 
cannot be accepted.  

[ ]Payment Enclosed (Make check payable to USENIX Conference)


ACCOUNT NO.______________________________________ EXP. DATE___________

 Print Cardholder's Name                 Cardholder's Signature

You may FAX your registration form if paying by credit card to 
USENIX Conference Office, FAX:  714 588 9706.  (To avoid duplicate 
billing, please DO NOT mail an additional copy.)

REFUND CANCELLATION POLICY:  If you must CANCEL, all refund requests
must be in writing and postmarked no later than September 11, 1995. 
Direct your letter to the USENIX Conference Office.  You may 
telephone to substitute another in your place.

			  SCO's Case Against IBM

November 12, 2003 - Jed Boal from Eyewitness News KSL 5 TV provides an
overview on SCO's case against IBM. Darl McBride, SCO's president and CEO,
talks about the lawsuit's impact and attacks. Jason Holt, student and 
Linux user, talks about the benefits of code availability and the merits 
of the SCO vs IBM lawsuit. See SCO vs IBM.

Note: The materials and information included in these Web pages are not to
be used for any other purpose other than private study, research, review
or criticism.