From: (Jackson Dodd)
Subject: 11th USENIX SYS ADMIN CONFERENCE (LISA '97) - Conf Program
Date: 1997/10/17
Message-ID: <>
X-Deja-AN: 281965004
Keywords: USENIX, SAGE, LISA, systems administration, conference
Organization: USENIX Association

11th Systems Administration Conference (LISA'97)
October 26-31, San Diego, California USA

Sponsored by USENIX and SAGE

The Town & Country Hotel is completely sold out, as is the 
Quaility Resort Hotel.  USENIX has made overflow arrangements 
with the following hotels.  There will be complimentary shuttle
service provided to and from the Town & Country Hotel.

Regency Plaza Hotel
1515 Hotel Circle South
San Diego, CA  92108
Tel: 619-291-8790
Tollfree:  800-619-1549
Fax:  619-260-0147, Attn: Reservations

PLEASE NOTE:  If you should decide to cancel your reservation, you must
notify them no later than 48 hours before your scheduled arrival date.

Holiday Inn Select  (Except for Sat., 10/25, when they're sold out)
595 Hotel Circle South
San Diego, CA
Tel # 619-291-5720
Tollfree: 800-433-2131
Fax # 619-297-6125 -  Attn: Elizabeth Wilson
Smoking and non-smoking rooms available

Hotel Rates:  $80/night single or double occupancy
Make sure to tell them that you're attending the USENIX conference.

For more information about this event:


Hal Pomeranz, Deer Run Associates
Celeste Stokely, Stokely Consulting

Paul Anderson, University of Edinburgh
Melissa Binde, Swarthmore College
Helen E. Harrison, SAS Institute, Inc.
Trent R. Hein, XOR Network Engineering
Amy Kreiling, SAS Institute, Inc.
William LeFebvre, Group sys Consulting
Dinah McNutt, IT Masters, Inc.
Adam Moskowitz, Genome Therapeutics Corp.
Wendy Nather, Swiss Bank Warburg
John Sellens, UUNET Canada
Josh Simon, Sprint Paranet

Rik Farrow, Internet Security Consulting
Pat Wilson, Dartmouth College

Lee Damon, Qualcomm

Amy Kreiling, SAS Institute, Inc.

Adam Moskowitz, Genome Therapeutics Corp.

John Posey, Paranet


On-Site Registration 		 5:00 pm -  9:00 pm
Welcome Reception		 6:00 pm -  9:00 pm
Conference Kickoff		 8:00 pm -  9:00 pm

On-Site Registration		 7:30 am -  5:00 pm
Tutorial Program		 9:00 am -  5:00 pm

On-Site Registration		 7:30 am -  5:00 pm
Tutorial Program		 9:00 am -  5:00 pm

On-Site Registration	   	 7:30 am -  5:00 pm
Tutorial Program		 9:00 am -  5:00 pm
Advanced Topics Workshop	 9:00 am -  5:00 pm 
Birds-of-a-Feather Sessions	 6:00 pm - 10:00 pm 

On-Site Registration		 7:30 am -  6:00 pm
Refereed Track			 9:00 am -  5:30 pm
Invited Talks Track		11:00 am -  5:30 pm
Birds-of-a-Feather Sessions	 9:00 pm - 11:00 pm
Vendor Exhibition 		12:00 pm -  7:00 pm
Vendor Reception		 5:00 pm -  7:00 pm
Reception			 7:00 pm -  9:00 pm

On-Site Registration		 7:30 am -  5:00 pm
Refereed Track			 9:00 am -  5:00 pm
Invited Talks Track		 9:00 am -  5:30 pm
Vendor Exhibition		10:00 am -  4:00 pm
Costume Party & Reception	 6:00 pm -  8:00 pm
Birds-of-a-Feather Sessions	 7:00 pm - 11:00 pm
Poster Sessions			 7:00 pm -  9:00 pm

Refereed Track			 9:00 am - 12:30 pm
Invited Talks Track		 9:00 am - 12:30 pm
Joint Sessions			 2:00 pm -  5:30 pm


Thursday, October 30, 7:00pm - 9:00pm
Submissions Due: September 18, 1997

Poster submissions provide an opportunity to present interesting
results, including preliminary results, with less time and effort
than are typically needed for a paper. A poster is an ideal medium
for material such as tips and techniques that is best presented to
small groups. Posters provide conference attendees the opportunity
to interact individually with the presenters.

The conference will provide display space of approximately 3 feet
wide by 4 feet high on which to display the poster. 


Prospective poster presenters should submit an abstract of their
presentations (at most 1000 words), via email to
 by September 2, 1997. Abstracts should
include complete author information, including affiliation and email
addresses, as well as the name(s) of presenting author(s). You may
also submit proposals by one of the following alternate methods:

 	* Fax to 972.390.1114

 	* Mail to:  John Posey 
	     	    1201 Thoreau Lane 
		    Allen, TX  75002-2069

Participants are strongly encouraged to include references to URLs
that contain more detailed information, both about the proposed
presentation and related work of others.

Abstracts of accepted posters will be published in the Invited Talks
Submitted Notes which are distributed to all conference attendees.
Please email questions to .


USENIX has expanded its tutorial program to deliver the critical
information you need. Delivered by experts, tutorials are intensive,
practical, and essential to your professional development. 

Sign up for tutorials and you'll get an immediate payoff by gaining
command of the newest developments and putting them to work in your

Register now to guarantee your first choice--seating is limited. 


S1: System and Network Performance Tuning
S2: Introduction to Perl 5 for UNIX Programmers
S3: Internet Security for System and Network Administrators
S4: Setting Up and Administering a Web Server
S5: NIS+
S6: ISP Systems Administration
S7: Instroduction to UNIX Administration
S8am: Security Policies & Practices
S9pm: Skills for Consultants
S10am: Linux System Administration or Everyone Can Be Root
S11pm: Handling Computer and Network Security Incidents
S12am: Getting What You Want: Translating Technical Ideas into Funding
S13pm: Introduction to Domain Name System (DNS) Administration

M1: Hot Topics in Modern System Administration
M2: Fault Tolerance, High Availability, and Netowrk Design in 
    Today's Client-Server Environments
M3: Topics in Solaris Systems Administration
M4: Sendmail Inside and Out (Updated for Sendmail 8.8)
M5: Security on the World Wide Web
M6: Security for Software Developers: How to Design Code that 
    Withstands Hostile Environments
M7: Firewall Management and Troubleshooting
M8: Administration of a Local IP Network
M9am: Administering Windows NT 4.0
M10pm: Advanced Heterogeneous Systems Management - UNIX and Windows NT
M11am: Talking Technical:  Breaking the Communication Barrier
M12pm: Effective Meetings: Get More Done in Less Time
M13am: Managing Support Staff
M14pm: Developing Computing Policies
M15am: Sendmail From the Trenches

T1: Classic Topics in Systems Administration
T2: CGI and WWW Programming in Perl
T3: Advanced Topics in DNS and BIND
T4: IP version 6: An Introduction
T5: Network Security Profiles: What Every Hacker Already Knows About 
    You, and What To Do About It
T6: Joining the Internet Safely Using Firewalls
T7: Building a Successful Security Infrastructure
T8am: Configuring Sendmail Using the M4 Macros
T9pm: Building Secure Intranets
T10am: Good Ideas:  Presenting Technical Information
T11pm: Writing Good Stuff:  A Practical Guide for Technical Content 
T12am: Introduction to NNTP and INN
T13pm: Advanced Topics in NNTP and INN
T14am: TCP/IP Troubleshooting with UNIX
T15pm: Managing Network Printers and Print Spoolers
T16am: Where Your Employer's Liability Stops and Yours Begins; 
       Principles of Agency for the System Administrator 
T17pm: The Right of Privacy and the Employer/Employee Relationship


S1 - System and Network Performance Tuning
Hal Stern, Sun Microsystems

Who should attend: Novice and advanced UNIX system and network
administrators and developers concerned about network performance
impacts. A basic understanding of the UNIX system facilities and
network environments is assumed.

What you will learn: Procedures and techniques for tuning systems,
networks and application code. 

Starting from the single system view, we will examine how the
virtual memory system, the I/O system and file system can be
measured and optimized. We'll extend the single-host view to include
Network File System tuning and performance strategies. 

Detailed treatment of networking performance problems, including
network design and media choices, will lead to examples of network
capacity planning. Application issues, such as system call 
optimization, memory usage and monitoring, code profiling, real-
time programming, and techniques for controlling response time will
be addressed. Many examples will be given, along with guidelines
for capacity planning and customized monitoring based of your
workloads and traffic patterns. Question and analysis periods for
particular situations will be provided.

Topics include:

*  Performance tuning strategies (practical goals, monitoring
   intervals, useful stats, tools)

*  Server tuning (file system and disk tuning, memory consumption,
   and swap space, systems resource monitoring)

*  NFS performance tuning (server constraints, client
   improvements, NFS over WANs, automounter, and other tricks)

*  Network performance, design, and capacity planning (locating
   bottlenecks, demand management, media choices and protocols, network
   topologies, throughput and latency considerations, and modeling
   resource usage)

*  Application tuning (system resource usage, memory allocation,
   code profiling, job scheduling and queuing, real-time issues, and
   managing response time)

S2 - Introduction to Perl 5 for UNIX Programmers
Tom Christiansen, Consultant

Who should attend: System administrators who have never looked at
Perl before or those programming in it for a short time. You must
have experience in UNIX shell programming with a good working
knowledge of regular expressions. A background in sed, awk, and/or C
programming will prove useful.

What you will learn: Perl syntax and semantics; how to read Perl and
learn from others' progamming experiences.

Have you been spending a lot of time trying to solve problems in the
shell or C? Perl is an extremely powerful and robust scripting
language that can help you solve problems in less time. Now ten
years old, Perl is the tool of choice because of its power; plus it
works on nearly every conceivable platform. Because it incorporates
aspects of more than a dozen well-known UNIX tools, experienced UNIX
users will come up to speed on Perl rapidly, and even programmers
inexperienced with UNIX will learn UNIX through learning Perl.

You will learn about these topics through detailed descriptions and
numerous examples of the syntax and semantics of the language: 

*  Data types and data structures
*  Operators and control flow
*  Regular expressions
*  I/O facilities
*  Database access
*  User-defined functions
*  Writing and using library modules
*  An intro to Perl's O-O programming mechanisms. 

You will also hear an overview of some of the new Perl 5 modules
including examples of full applications for Tk-based graphical
programming, CGI programs, and client-server programming.

NOTE: While this course is based on the current release of Perl
(version 5.004), it is not intended to be a detailed discourse on
all advanced programming constructs now afforded by that release. It
is a jump-start course on Perl for experienced UNIX programmers, not
an advanced course for previous Perl programmers.

S3 - Internet Security for System and Network Administrators
Ed DeHart, Pittsburgh OnLine, Inc.

Who should attend: UNIX system administrators, network managers and
operations/support staff.  A good working knowledge of UNIX is

What you will learn: How to establish and maintain a secure Internet

This tutorial will help you will learn strategies and techniques to
help eliminate the threat of Internet intrusions and to improve the
security of UNIX systems connected to the Internet. You will also
learn how to set up and manage a number of Internet services
appropriate to your site's mission.

After completing the tutorial, you will be able to establish and
maintain a secure Internet site that allows the benefits of Internet 
connectivity while protecting their organization's information.

Topics include:
*  Latest information on security problems
*  UNIX system security
*  TCP/IP network security
*  Site security policies

S4 - Setting Up and Administering a Web Server
Bryan Buus, XOR Network Engineering

Who should attend: Webmasters and administrators charged with
creating a World Wide Web service for their company. You should have
some knowledge of UNIX system administration.

What you will learn: How to set up and maintain a Web server on a
UNIX platform.

The World Wide Web is the most widely used Internet service.
Companies are quickly discovering that they need to be on the Web
to provide information to customers and to keep up with the
competition.  This course describes how to set up and maintain a
World Wide Web server on a UNIX platform. The servers covered in
the course include the popular and freely-available Apache and NCSA
Web servers.

Topics include:
*  The architecture of the Web 
*  The HTTP Protocol 
*  Compiling the server 
*  Server configuration 
    - Creating "virtual hosts" 
    - Resource configuration 
    - Access configuration 
    - Per-user access 
*  Analyzing and rotating logs 
*  Registering and announcing the server 
*  Web-related security issues 
*  Electronic commerce issues
*  Security and the Web
   - Operating system, CGI, and software considerations
   - Setting up and configuring SSL (Secure Sockets Layer)
*  Server performance issues
   - Using multiple servers
   - Detecting server problems

Setting up the web server is only half of the battle. Understanding
exactly how the protocol works, what performance issues are
critical, what the security implications are and other nuances are
just some of the important issues that all webmasters need to
thoroughly understand. After completing this course, web masters
should have an in-depth understanding of their server environment
and the critical issues surrounding ongoing maintenance.

S5 - NIS+
Marc Staveley, Consultant

Who should attend: System administrators and technical managers who
must evaluate or set up a NIS+ network. It will be most meaningful
to system administrators who have some experience setting up and
maintaining a NIS (formerly Yellow Pages) or DNS system.

What you will learn: Why and how to set up and administer a NIS+
network. An overview of what NIS+ is and how it differs from NIS.

You will learn about the benefits of NIS+, its integration with DNS,
enhanced security, cross-domain and cross-subnet operability,
distributed network information, and dynamic binding. Basic concepts
such as NIS+ tables (what are they and how are they used), the name
space, and basic terms (e.g. root, master, replica, and client) will
be explained.

Topics will include: the nsswitch.conf file, setting up an NIS+
domain, setting security levels, bulk loading data, integrating with
DNS (as well as an overview of NIS+ commands), and troubleshooting.

S6 - ISP System Administration
Barb Dijker, Labyrinth Computer Services

Who should attend: ISP managers and experienced system

What you will learn: Typical pitfalls and problems faced by ISPs and
how to avoid or solve them.

An ISP environment provides some specific challenges to system
administrators. The user community is highly dynamic and demanding,
the security vulnerability is aggressively challenged, and the
growth rate is astronomical. We will provide tips to meet these
challenges specific to ISPs. We'll discuss typical pitfalls in
problems faced by ISPs and how they can be best avoided or solved.

Topics include:
*  Account management
*  Customer service
*  Product/service planning
*  Security
*  Usage tracking
*  Billing data integration
*  Reliability and redundancy
*  Performance
*  Resource availability
*  Working with the phone company
*  Training or hiring talent

S7 - Introduction to UNIX Administration
Peter Galvin, Corporate Technologies, Inc.

Who should attend: Computer-literate students interested in learning
UNIX administration. Some background using UNIX will be a plus.

What you will learn: UNIX administration skills for those new to
UNIX administration. The course covers all of the essential system
administration topics, and stresses professional methods of
administration. It uses Solaris as the example operating system when
exploring detailed examples.

Topics include:
*  The role of the system administrator 
*  Overview of the UNIX file system 
*  User authorization and control 
*  The file system 
*  System startup and shutdown 
*  Boot process and start-up files 
*  Installation from CD, jumpstart, patches, and installing layered
*  File system backups 
*  System tuning and process control 
*  Configuration and devices 
*  Devices (naming, creation, and trouble shooting SCSI problems)
*  Admintool (overview, printing, user management, and terminal
*  Networking and IP configuration
*  NFS 
*  Security 
*  User services (mail, print, and data transfer)
*  Management and troubleshooting 
*  Performance and monitoring tools 

S8am - Security Policies & Practices
Marcus J. Ranum, Network Flight Recorder, Inc.

Who should attend: System and network managers chartered with
defining or enforcing site security policies; IT professionals or
auditors interested in Internet-related security  policies. 

What you will learn: A common-sense overview of security policy and
related issues.

How can you secure your network if you can't secure your people? As
much as 80% of the security incidents recorded are "inside jobs" or
the result of deliberate action by insiders. The preferred way of
dealing with the insider problem is to define a set of policies and
guidelines that foster a useful security mindset. This course
provides a common-sense overview of security policy and related
issues, how to perform a risk assessment, and how to build a  policy
that covers all the bases without going overboard. Topics include:

*  Risk assessment
   - Risk mitigation
   - Determining acceptable risk
*  Security policies and procedures 
   - Acceptable use
   - Security maintenance
   - Publications policies
   - Damage/spin control policies

S9pm - Skills for Consultants
Marcus J. Ranum, Network Flight Recorder, Inc.

Who should attend: Technical staff in consulting organizations, or
future consultants.

What you will learn: A general discussion of issues related to

Whether or not you plan to make your living as your own boss, it is
worth understanding the role and skills of "brainpower by the hour"
in today's industry. This tutorial offers advice on the skills
needed to effectively find your niche and succeed in today's market.

Topics include:
*  Basics
   - The role of a consultant
   - The consultant's relationship to the customer (management
     consulting, technical consulting, and corporate psychoanalysis)
   - Finding work and keeping yourself afloat

*  The statement of work
   - Reaching agreement on tasking and level of effort
   - Managing customer expectations

*  On the mission
   - Presentation skills
   - Managing politics
   - Effective communications

*  Closing the contract
   - Writing the report
   - Management presentations

*  Operations
   - Things you need before you start
   - Contracts, insurance, lawyers, and other disasters
   - Corporate shields
   - Setting fees and billing

S10am - Linux Systems Administration, or Everyone Can Be Root
Bryan C. Andregg, Red Hat Software

Who should attend: Systems administrators of all skill levels with
little knowledge of Linux who plan to implement Linux in the
workplace. You should know basic UNIX systems administration and be
able to grasp new concepts relatively easily. Advanced programming
skills are not necessary, but the ability to code tasks in a
language (perl, tcl, sh, etc.) is very helpful.

What you will learn: The difference between Linux and other
UNIX-like operating systems. How to administer a Linux server or
work station.

Administering a Linux server or work station is sometimes a daunting
task if your experience is on more mature platforms. We will discuss
some key concepts and designs which separate Linux from other
UNIX-like operating systems:

*  The Linux kernel
*  The Linux file system standard
*  Plug-in authentication modules
*  Services a Linux server can provide
*  Linux in a mission-critical environment (RAID, high availability, 
   and scalability)
*  Linux in a secure environment (firewalls, secure commerce, and ftp 
*  Hardware compatibility
*  Documentation and where to get help
*  Distributions and how to choose one

After completing the tutorial, you should be confident about your
ability to set up and maintain a reasonably useful and secure Linux
server. If there is time, we will discuss additional topics.

S11pm - Handling Computer and Network Security Incidents
Jim Duncan, Penn State University
Rik Farrow, Consultant

Who should attend: System and network administrators, security
staff, and management responsible for the security of networks and
connected systems. Basic knowledge of modern operating systems and
networking is recommended because it will help in understanding the
example incidents, procedures, and countermeasures.

What you will learn: How your organization can prepare for and
respond to computer security incidents.

Are you prepared to handle a security incident at your site?
Responding to computer security incidents is a requirement for all
organizations in which computer networks are an important part of
the infrastructure. You will find out how to prepare for and handle
computer and network security incidents with step-by-step information 
and examples from real-world incidents. 

Incident handling ranges from the mundane, yet critical, details of
preparing your management and modifying policy to working with an
incident in progress and correctly handling evidence. We will
explain the types of incidents that typically occur, and how to gain
management support in building an incident response team. You will
hear about real-life examples of incident handling and the steps
involved in recovering from an incident. 

You will learn about the need for comprehensive computer security
incident handling capability, how to communicate that need to
management and the user community, how to investigate an incident
(as a handler, not as law enforcement), and how to build and
maintain that capability. You will also learn how to adapt policy
and the incident handling capability to each other, how to staff an
incident response team, and how to establish links and communicate
with other teams and law enforcement agencies. Even if you are the
only person tasked with security, this tutorial will help you
prepare yourself and your organization for an inevitable computer
security incident.

S12am - Getting What You Want: Translating Technical Ideas into Funding
Maurita Plouff, Expert Innovations

Who should attend: Technical people who need to develop internal
support and funding for projects.

What you will learn: What the funding process is and how to get your
project funded. 

When you want to translate technical desires to funded projects, you
have to sell your ideas. Learn some of the techniques of
professional sales reps and apply them in your technical work to
get your ideas heard and approved.

Topics include:
*  Understanding the selling process
*  Who decides what? 
*  Organizational differences: consensus, departmentalized, and
*  Evangelism in the technical arena 
*  All about persuasion: Teaching, explaining, lobbying, and arm-
*  Structuring your proposal
*  Trial runs and hot-air balloons
*  The proper place for skunkworks
*  Getting your proposal heard, spreading the buzz
*  What if they say yes?

S13pm - Basics of Domain Name System (DNS) Administration
William LeFebvre, Group sys Consulting

Who should attend: Network adminstrators responsible for the
administration of a DNS installation, either new or inherited.
Attendees should have a basic knowledge of network and system
administration. An in-depth understanding of IP will be beneficial
but is not required. 

What you will learn: How to set up, configure, and maintain primary
and secondary DNS service on the Internet.

The DNS is the primary method which the Internet uses to name and
number machines. This course is an introduction to DNS for network
administrators. It will describe the basic operation of DNS, and
will provide instructions and guidelines for the installation and
operation of DNS on various UNIX machines. Other topics include
vendor-specific differences, delegation of subdomains, and trouble
shooting techniques.


M1 - Hot Topics in Modern System Administration
Trent Hein, XOR Network Engineering 
Evi Nemeth, University of Colorado, Boulder

Who should attend: System and network administrators who want to
keep abreast of the latest developments in emerging areas.

What you will learn: Latest practice in some hot-topic areas.

Overwhelmed by the rapid change in the system administration field?
Need to learn some useful skills quickly? This tutorial is a
potpourri of learning about hot topics that will make you more
effective in your role as a system administrator. Specifically,
we'll be covering the following:

Squid cache--The squid internet object cache is a very high-
performance proxy caching system for web clients. When deployed
correctly, it can drastically improve the performance of your
network and reduce the need to purchase external bandwidth. We'll
talk about how to implement this hierarchical tool at your site in
a practical manner.

Security packet filtering primer--All too often these days, you hear
about firewalls. But what does it really mean, and how do you set up
a packet filter list to implement a basic one? We'll teach you the
dos and don'ts of creating a tough packet filter, and talk
specifically about how to apply one in an environment using Cisco

Samba--Being invaded by PCs on your network? This system can help
you integrate both existing and future UNIX file-sharing and
print-sharing systems with PCs on your network--without pain! Learn
how to plan, configure, and manage integrated PCs with Samba on your

Bind 8.x--BIND, also known as named or the DNS server, has been
changing to keep up with the times. Have you? We'll cover the recent
changes that have been made in BIND, as well as how to set the
newest version up in your network.

6bone--Ready or not, here it comes. It's time to start testing
applications at your site that use the "next generation" IP
protocol, IPv6. Learn how you can set up a test bed and connect to
the "6bone" to begin learning about IPv6 in a hands-on manner before
it's too late.

WAN performance--Practically every site these days has a WAN--
whether it be for Internet or Intranet. How do you measure the
performance you are getting from your WAN? We'll introduce you to
the basics of practical WAN performance monitoring.

M2 - Fault Tolerance, High Availability, and Network Design in Today's
Client-Server Environments
Karl Andersen, SystemExperts Corp.

Who should attend: Client-server computing planners and managers;
Web site and intranet planners; network planners, managers and

What you will learn: How to guarantee high availability of
mission-critical client-server data on your network.

Networked clients need access to servers' resources, but those
servers and the networks that connect clients to them come and go.
Just as traditional host-oriented computing gave rise to fault-
tolerant servers, networks have given rise to new ways of attaining 
increased uptime. This course will review the tools and techniques 
used to ensure access to  mission-critical client-server data. 

Topics include:
*  Fault-tolerance and enhanced availability
*  Server- and client-based data replication
*  The impact of transaction processors on enhanced availability
*  The impact of connection-oriented and connectionless technologies 
   on server transitions
*  Enhanced availability on the Internet
*  Security concerns
*  Historical approaches for achieving enhanced availability
*  Best practices today
*  Server replication
*  Client-side mirroring
*  Customer case studies

M3 - Topics in Solaris System Administration
Marc Staveley, Consultant

Who should attend: System administrators who need to know the
differences between SunOS 4.x and Solaris 2.x system administration.
Portions of this course will be useful from a BSD to Sys V.4
perspective. It will be most meaningful to sys admins with some
experience setting up and maintaining a network of SunOS 4.x
workstations and servers.

What you will learn: New features in the Solaris operating system
(e.g., the CacheFS file system). New methods for accomplishing
similar tasks in SunOS (e.g., the new NFS administration commands).

Topics include:
*  Installation (packages, jumpstart, etc.)
*  Booting and halting
*  Kernel enhancements (dynamic loading, multi-threading, layout
   on disk, and /etc/system)
*  Networking (NFS, AutoFS Automounter, and PPP)
*  AutoFS and CacheFS (including cache-only clients)
*  NIS+ vs. NIS (YP)
*  Service Access Facility (a getty replacement and much more)
*  Printing (lpd vs. lpsched, SunSoft print client)

M4 - Sendmail Inside and Out (Updated for Sendmail 8.8)
Eric Allman, Consultant

Who should attend: System administrators who want to learn more
about the Sendmail program, particularly details of the
configuration file. Programmers implementing new mail front ends who
want to know exactly what Sendmail can do for them (this tutorial
covers Sendmail, not mail front ends). This will be an intense,
fast-paced, full-day tutorial intended for people who have already
been exposed to Sendmail.

What you will learn: The latest release of Sendmail version 8.8.

Sendmail is arguably the most successful UNIX-based mail transfer
agent in the world today. Originally distributed with the Berkeley
Software Distribution, Sendmail is used by most UNIX vendors. After
introducing a bit of the philosophy and history, topics will include:

*  The syntactic elements of the configuration file: mailers,
   options, macros, classes, headers, precedences and priorities,
   trusted users, key file definitions, and rewriting rules and

*  The flow and semantics of rulesets, including hints about

*  Introduction to SMTP and how Sendmail operates in an SMTP

*  Day-to-day management issues: alias and forward files, "special"
   recipients (files,  programs, and include files), mailing lists,
   command line flags, tuning, and security.

*  How Sendmail interacts with the Domain Name System (DNS)

*  An introduction to the M4 configuration package included with 
   Sendmail 8.

M5 - Security on the World Wide Web
Daniel Geer, CertCo, LLC 
Jon Rochlis, SystemExperts Corp.

Who should attend: Anyone responsible for running a Web site who
wants to under stand the tradeoffs in making it secure. Anyone
seeking to understand how the Web is likely to be secured.

What you will learn: A comparison of available methods of Web

The World Wide Web is perhaps the most important enabler (so far)
of electronic commerce. It has grabbed the popular imagination and
the engineering and marketing efforts of a generation of on-line
entrepreneurs and con sumers. But the Web was initially designed
with little thought to industrial-strength security. Over the past
several years numerous proposals have surfaced to secure the Web.
This course will survey them with the goal of understanding the
strengths and weaknesses of each.

Topics include:
*  Client-server network security
*  A brief overview of encryption and its role in all security
*  Simple schemes: Basic Auth 
*  Prevailing protocols: SSL, S-HTTP, PCT
*  IP security
*  Payment protocols: Cybercash, Digicash, Open Market, First
   Virtual, Visa/Mastercard (SET) and others 
*  Secure operation: Configuration, containment, interaction with
   firewalls, replication, proxy servers, logging 

M6 - Security for Software Developers: How to Design Code that
Withstands Hostile Environments
Marcus J. Ranum, Network Flight Recorder, Inc.

Who should attend: System managers and software engineers who are
developing client-server applications that will be used over the

A strong background in UNIX and UNIX programming is recommended.
Many exam ples will refer to C programming constructs. Familiarity
with C is not a prerequisite, but familiarity with programming under
UNIX is strongly recommended for attendees.

What you will learn: How to write security-critical networking

Increasingly, client-server software is being deployed in hostile
environments that it may not have been designed to withstand. You
will learn how to spot and avoid making typical flaws in security
programming, using examples and case studies from existing

Topics include:
*  Basics
   - Taxonomies of software and system flaws
   - The importance of security
   - Putting security at the right layer
   - Orange book (C2, B1, B2 systems)
   - Authentication versus authorization

*  Data protocols
   - How protocols are secure or insecure
   - Designing a protocol for security
   - Typical weaknesses of protocols

*  Using cryptography
   - Basics: public key, secret key, certificates
   - Randomness
   - Algorithms
   - Synchronizing protocols
   - What cryptography can and cannot do 

*  Authentication
   - What to authenticate
   - Challenge/response
   - Authenticating packet streams
   - Publicly-available authentication systems 

*  Writing secure network daemons
   - Chroot
   - Setuid
   - Minimizing code
   - How to avoid doing everything as "root"

*  Case studies
   - A simple file transfer daemon
   - Using file system permissions
   - Locking up a process

M7 - Firewall Management and Troubleshooting
Char Sample and Mark Teicher, PriceWaterhouse

Who should attend: System integrators, firewall support staff and
managers, security managers, and other interested parties. Expertise 
running a firewall or a previous class on firewalls is strongly

What you will learn: Firewall troubleshooting and problem-solving
techniques and tools.

Now that your firewall is installed (perhaps by someone else), how
do you deal with the problems that will almost certainly come up?
This tutorial focuses on the tools and techniques used to solve the
most typical problems that occur after the installer has left.

Troubleshooting and problem-solving topics include: 
*  DNS
*  Sendmail
*  Routing, subnetting, and load sharing
*  Access lists
*  Logging and reporting
*  VPNs
*  Authentication 
*  Operating systems problems

This tutorial will cover the symptoms associated with each problem
area, how to isolate a problem, and the solution. We will discuss
which techniques to try when there is abnormal behavior. You will
take with you the tools necessary to increase your problem-solving
capabilities with regard to your firewall.

M8 - Administration of a Local IP Network
William LeFebvre, Group sys Consulting

Who should attend: Attendees should have some prior experience using
IP networks, but do not need to be experienced administrators.

What you will learn: The workings of essential Internet protocols
and how to administer them.

This tutorial will start with the Internet model and some basics
such as numerical addresses and relationships to the ISO model. It
will then progress to the fundamentally important protocols: IP,
ICMP, UDP, TCP, ARP, and RARP. With this firm foundation, the course
will focus on effective administration of a local IP network.

Topics include:
*  Routing basics and interior routing protocols
*  Subnetting
*  Classless routing
*  UNIX host configuration
*  Troubleshooting

As time permits, there will be an overview of the protocols used by
the popular application level programs: Telnet, TFTP, FTP, SMTP,
and rexec.

M9am - Administering Windows NT 4.0
Chris Aranosian, MCSE, MCT, Lehman Brothers

Who should attend: Experienced system administrators new to Windows
NT. Systems professionals who seek a rapid "real-world" introduction
to Windows NT 4.0 Workstation and Server, ranging from small
workgroups to large, multi-domain architectures. 

What you will learn: Essential skills necessary to begin managing
and troubleshooting Windows NT systems.

Effective Windows NT systems administration requires a balance of
conceptual under standing and practical skills, and this tutorial
will address both areas. Topics include:

*  Definitions of essential terminology (including workgroups,
   domains, trusts, SIDs, and rights vs. permissions)

*  User and group account management with User Manager for Domains

*  Administering servers and workstations with Server Manager

*  Managing file and folder security with the Windows NT File
   System (NTFS)

*  Viewing the registry with REGEDIT

M10pm - Advanced Heterogeneous Systems Management--UNIX and Windows NT
Yuval Lirov and Andrew Rieger, Lehman Brothers

Who should attend: Systems support and management personnel in
distributed environments who must integrate UNIX with Windows NT
workstations while reducing outages, improving performance, and
controlling support costs. Participants should have basic database
or systems administration knowledge on either UNIX or Windows NT

What you will learn: Techniques for administering a heterogenous

This tutorial offers real-world, tested techniques for the popular
integrated architectures. The techniques reflect state-of-the-art
industry experience managing all aspects of computing including
systems, databases, and the production batch cycle in a mixed UNIX/
Windows NT environment. 

Topics include:
*  Cross platform architecture for systems management tools
*  Thin clients, fat servers, and centralized configurations 
*  High-availability architectures--RAID, AFS, Veritas
*  Centralized user management in a heterogeneous, distributed
*  Support accountability and management by the numbers
*  Client satisfaction in a cost-control  environment
*  Crisis management and formalized teamwork
*  Performance architecting/tuning

M11am - Talking Technical--Breaking the Communication Barrier
Maurita Plouff, Expert Innovations

Who should attend: Technical people (programmers, administrators,
and managers) who may be having difficulties communicating technical
topics to non-technical audiences.

What you will learn: How to communicate technical information to
non-technical colleagues.

Communication involves not only the speaker and listener, but also
their beliefs, pre-conceptions, and roles within the work environ-
ment. The different requirements and contexts in technical work and
business/managerial work create barriers to understanding.  These
barriers can place limits on your personal growth as well as on
your company's--if you cannot communicate effectively with your
manager or your customers, you may lose their trust and recognition.  
This tutorial will point out the problems in communicating effectively 
with non-technical colleagues, and help you remedy those problems.

Topics include:
*  Communications mechanics: The basics 
*  Happytalk, marketspeak, and jargon
*  Defining content: A three-step process 
*  Understanding your audience
*  Structuring your message to meet your goals
*  When to speak, when to present, and when to write a memo
*  Closing the loop: Decoding feedback

M12pm - Effective Meetings: Get More Done in Less Time
Maurita Plouff, Expert Innovations

Who should attend: People who wish to waste less time in meetings.

What you will learn: How to make meetings more useful and efficient
for you and other attendees.

Meetings are a fact of life, and larger, more complex projects often
involve larger, more complex meetings. Often we wonder "why was that
meeting necessary?" A good meeting is necessary, timely, concise,
and purposeful. Learn strategies to improve the quality of your
meetings, whether you are hosting or attending them. Topics include:

*  Meeting madness: Is this meeting necessary?
*  Rule #1: Know what you want
*  Roping 'em in: Three steps to get an audience
*  Great expectations: Agenda dos and don'ts
*  When you're leading the meeting: Special responsibilities 
*  Be a better participant: A checklist
*  What about minutes? 
*  Meeting secrets: The post meeting review
*  Special situations 
   - Mega-meetings
   - Teleconferencing
   - Videoconferencing
   - Translations

M13am - Managing Support Staff
Barb Dijker, Labyrinth Computer Services

Who should attend: Anyone who will supervise support staff and/or a
user "help desk."

What you will learn: Support staff management skills and techniques.

From the trenches, management looks easy--until you get there.
Managing a highly-skilled staff in a demanding user-support
environment adds complications. How do you improve or maintain
quality user service without sacrificing the staff? This tutorial
provides an overview of strategies for establishing or improving
your support organization and keeping your staff productive and
happy to stay.

We will discuss topics such as defining user services, tracking,
prioritizing, system monitoring, hiring/firing, training, tools, and
documentation. In addition, we will discuss traditional staff
management topics, considering the challenges specific to a support
environment including communication, team roles, delegation,
evaluation, and promotion.

M14pm - Developing Computing Policies
Barb Dijker, Labyrinth Computer Services

Who should attend: Computing professionals who may become involved
in setting, reviewing, or enforcing computing policies.

What you will learn: How to establish computing policies. 

Everyone knows they should have computing policies--but where do
you start? This tutorial will give you the jump start that you need.
The system administrator is usually in the position of enforcing
computing policies, but often also ends up drafting or recommending
policy. Come prepared to draft or revamp policies for your site.
Conducted in work shop style, the discus sion will cover everything
from getting started to management approval. We will focus on the
the pros and cons and practical enforceability of different aspects
of and approaches to computing policies.

*  What should and should not be included in policies
*  Informal vs. formal policies
*  Policies vs. procedures
*  Core policies: Authorization and acceptable use
*  Pros and cons of specific policies and approaches
*  Effect and enforceability
*  Organization and distribution
*  Management support and implementation

M15am - Sendmail from the Trenches
Tina Darmohray, Information Warehouse!

Who should attend: System and network administrators who want the
very basics to get them started with configuring Sendmail.

What you will learn: Real-world problems and configuring solutions,
rather than Sendmail design and programming.

This half-day tutorial is designed to give network administrators an
introduction to configuring Sendmail. It will cover the very basics
of the file so you can define macros, use DNS MX
records, understand rules and rulesets, and rewrite headers. We will
then examine ways to:

*  Design and implement a mail topology (e.g., a trusted mail hub
   outside a firewall)

*  Support virtual hosts, handle mail for multiple domains

*  Interface to popular PC mail solutions (e.g., MS Mail)

*  Establish a POP server


T1 - Classic Topics in System Administration
Trent Hein, XOR Network Engineering
Evi Nemeth, University of Colorado, Boulder

Who should attend: System and network administrators who want to
learn about real-life solutions to everyday problems.

What you will learn: Best practice solutions to common problems.

Network and security crisis case studies--Past attendees have found
that the network crisis case studies we presented provided important
insight into common real-world, network problems. We've chosen an
all-new set of network and security crises to dissect and correct in
front of your eyes.

* IPv6--What will 128-bit IP addresses mean to your site? What
features and motivations in IPv6 should you be thinking about when
planning your network for the future? We'll give you a good overview
of the IPv6 standard and explain how it relates to your existing 

* Advanced routing protocols--The days of RIP as a useful routing
protocol are numbered. As internetworks scale rapidly, you have no
choice but to look towards protocols such as BGP and OSPF for
reliable connectivity. We'll cover the basics of the protocols as
well as explain their use in real-world environments.

* Security auditing 101--So, you've done everything the experts
recommend to secure your site. Now, how do you measure how secure
your site really is? We'll take you through the anatomy of a
security audit from start to finish.

* Network monitoring--Bigger networks need bigger management
tools.  Until recently, automated network monitoring has been
implemented as a mish-mash of home grown tools at most sites. Now
there are a number of "production" quality tools available both
commercially and from the net. We'll explain what some of these
tools really do and compare them for you.

* Server performance--Years ago, sinking more money into a bigger
CPU was often the fix for performance problems. With CPUs out per
forming many other aspects of machines today, performance problems
most often appear in areas such as network bandwidth, software
optimization, memory usage, and system configuration. Learn how to
tune your modern UNIX box to get the most bang for your buck.

T2 - CGI and WWW Programming in Perl
Tom Christiansen, Consultant

Who should attend: Programmers with a light background in Perl and
HTML. No previous CGI experience is required. If you don't have any
Perl background, read the Llama book first or take the S2 tutorial
on Sunday. This is neither a "for non-programmers" course nor a "for
guru programmers" course. It's for "accidental programmers," folks
other than UNIX systems gurus who need to deal with CGI and WWW

What you will learn: CGI and other WWW programming using Perl. 

All aspects of writing and processing fill-out forms are covered
using the standard module. Some attention is also given to
parsing of HTML documents and writing "spiderbots", automata that
navigate the Web on their own. Specific topics include: 

*  A light introduction to using Perl's object-oriented class

*  Setting up your server for CGI and SSI

*  An overview of the CGI protocol and SSI
   - CGI-related environment variables
   - CGI without forms
   - Debugging your CGI programs
   - Using UNIX-domain sockets to serialize access to daemons
   - Non-parsed headers scripts

*  Data and system security
   - Setuid execution and taint checking
   - Avoiding the perils of shell escapes and backquotes
   - Backgrounding long-running CGI programs
   - Non-parsed headers scripts
   - Sending mail safely

*  Sample problems and solutions
   - Remote browser and remote user determination
   - Generating dynamic forms; multistage ("shopping cart") forms
   - Credit-card algorithms
   - File uploads
   - Database access using flat text or HTML files, DBM files,
     or a full SQL database
   - HTML parsing and link analysis

*  Image maps

*  Writing well-behaved robots

T3 - Advanced Topics in DNS and BIND
Paul Vixie, Internet Software Consortium

Who should attend: Name server administrators and software
developers who need a deeper understanding of the DNS protocol and
of the internals of BIND. Participants should already be responsible 
for the operation of at least one name server, familiar with Internet 
protocols such as TCP and UDP, and able to recognize C source code 
when they see it (which they will).

What you will learn: The DNS protocol and upcoming extensions to it;
implementation considerations in BIND.

Topics include:
*  DNS message format
*  DNS resource record format
*  Zone file format, and zone transfers
*  Incremental zone transfer
*  Dynamic update and deferred update
*  Real-time change notification
*  DHCP interaction
*  BIND current status
*  DNS security
*  DNS politics
*  BIND Version 8

After completing this tutorial, you will know what the IETF has been
up to lately, and what to expect in upcoming BIND releases.

T4 - IP version 6: An Introduction
Richard Stevens, Consultant

Who should attend: Network programmers and system administrators
who will be converting applications and networks from IPv4 to IPv6,
and implementors of IPv6. You should have a basic understanding of

What you will learn: How to transition to IPv6 from the
administration and programming standpoints.

Various proposals have been made to replace IPv4, mainly to
overcome its addressing limitations. The successor has been chosen
and named IPv6. Numerous working groups have been busy completing
the specifications for all facets of IPv6 and implementations are
starting to appear. It is expected that vendor-supplied
implementations of IPv6 will appear in the coming years and there
will be a gradual transition of the Internet to IPv6.

You will get an overview of all aspects of IPv6, approaching it
from the perspectives of a system administrator who needs to
transition a network from pure-IPv4 hosts and routers to a mixture
of IPv4 and IPv6 nodes, and a programmer who needs to convert
applications from IPv4 to IPv6.

Topics include DNS support, new socket address structure, address
conversion functions, transition mechanisms, automatic tunneling,
header fields and extension headers, source routing, path MTU
discovery, upper-layer issues, ICMPv6, multicasting, neighbor
discovery, CIDR, anycasting, and mobility.

T5 - Network Security Profiles: What Every Hacker Already Knows About
You, and What To Do About It

Jon Rochlis and Brad Johnson, SystemExperts Corp.

Who should attend: People responsible for network-based applications 
or systems that might be targets for hackers, or who are proactively 
improving the security of their hosts, using any type of TCP/IP-based 
system. You should understand the basics of TCP/IP networking. 
Examples may use UNIX com mands or include C or scripting languages.

What you will learn: How to prepare for attacks and proactively
stave them off.

There are four common stages to network-based host attacks:
reconnaissance, target selection, exploitation, and cover-up. This
course will review the tools and techniques hackers use in attacks.
You will learn how to either be prepared for such attacks or how to
stay one step ahead of them. You will learn how to generate profiles
of your systems remotely and show some of the business implications
of these network-based probes. 

The course will focus primarily on tools that exploit many of the
common TCP/IP-based protocols (such as ICMP, SNMP, RPC, HTTP, and
SMTP) which support virtually all of the Internet applications--such
as mail, Web technologies, network management, and remote file
systems. Many topics will be addressed at a detailed technical and
administrative level. We will primarily use examples of public
domain tools because they are widely available and commonly used in
these types of situations. 

Topics include:
*  Review of network attack methodology: Reconnaissance, target
   selection, exploitation, and cover-up
*  Attack profiles: What does one look like?
*  Techniques: Scanning, CERTs, and hacking clubs
*  Tools: scotty, strobe, SATAN, ISS, etc.
*  Business exposures: Integrity and confidentiality, audits, and
   intrusion resolution

T6 - Joining the Internet Safely Using Firewalls
Tina Darmohray, Information Warehouse!

Who should attend: System and network administrators who will
implement or maintain a firewall; site managers charged with
selecting and setting site security requirements. 

What you will learn: The ins and outs of connecting to the Internet
using firewalls.

Connecting to the Internet is an exciting event for every
organization, but the security implications can often cause
hesitation. You will hear about the problems and solutions
surrounding interconnection and security of functional intracompany
and internetwork connections using firewalls. You will learn about
the differences between packet filtering and proxy firewalls. In
addition, there will be details and examples of bastion host
security using UNIX, and Internet gateway connectivity issues,
including Sendmail and Domain Name System (DNS) configurations for
your fire walled site. The tutorial concludes with a complete
example Internet firewall configuration.

T7 - Building a Successful Security Infrastructure
Michele Crabb, Cisco Systems, Inc.

Who should attend: UNIX system administrators and data processing or
MIS management who have an interest in developing or designing an
overall security plan or infrastructure for their site.

What you will learn: Step-by-step guidelines for evaluating your
site's security needs and deciding upon the elements of a successful
security framework.

Building and maintaining a successful security framework entails
performing a detailed analysis of your security needs and examining
your current security controls. You will also need to know what
security tools are needed, and the right things to keep the
framework in place and operational. Overlooking any one of these
pieces can mean an unreliable security framework. 

The class is not about how to implement UNIX security, but provides
an overall picture of how to implement a successful security
infrastructure. The class bridges the gap between the technical and
the administrative issues of system security.

Topics include:
*  Why do we need security and what are some motivating factors?
*  The risk assessment process
*  Policies and procedures
*  Building your infrastructure
*  Maintaining your infrastructure
*  The security toolbox

T8am - Configuring Sendmail Using the M4 Macros
Eric Allman, Consultant

Who should attend: System administrators who want a practical,
hands-on tutorial for building Sendmail configuration files using
the M4 package that comes with Sendmail version 8. This will be a
detailed, problem- and  solution-oriented tutorial. You should have
some familiarity with Sendmail.

What you will learn: How to use Sendmail's M4-based configuration

The M4 configuration package that comes with version 8 Sendmail
allows simple and easy configuration of Sendmail for many common
situations. This tutorial details how to use this package to best
effect. Extensive examples will be given.

Topics include:
*  The general structure of an M4-based configuration file 
*  Selecting an operating system environment 
*  Selecting special features 
*  Using selected external databases
*  Frustrating spammers

T9pm - Building Secure Intranets
Marcus J. Ranum, Network Flight Recorder, Inc.

Who should attend: Network managers responsible for planning the
future design of security critical networks, or IS managers trying
to plan effective ways of deploying the various security
technologies. You should be familiar with Internet/Intranet
applications and protocols.

What you will learn: A technical overview of site security design
and maintenance techniques.

As businesses increasingly rely on the Internet and intranets for
day-to-day operation, they may be unwittingly accepting substantial
risk of security incidents leading to downtime, loss of business, or
embarassment. Firewalls and related technologies can help address
the problem, but need to be combined with good site security
practices to be truly effective. This course provides a technical
overview of security design and maintenance techniques that can help
you protect your business in the highly-networked future. 

*  Implementing security
   - Network design for security
   - Interconnectivity and security

*  Technologies and tools
   - Firewalls: What they can and cannot do
   - Dial-in and dial-out
   - Audit tools and network management
   - Web sites

*  Audit
   - Building a security certification process
   - Building a security maintenance process
   - Auditing your network

T10am - Good Ideas: Presenting Technical Information
Maurita Plouff, Expert Innovations

Who should attend: People who make presentations. People who need to
make simple presentations on complex subjects. People who hate
making presentations but have to anyway. If you know it all but
can't present it clearly, this course is for you.

Some technical people would rather have a tooth pulled than have to
speak in public. Presenting technical information is even more
difficult. You will learn tips for making clear and enjoyable

Topics include:
*  Introduction
*  Secrets of good presentations
*  Refining your message and tuning it for the audience
*  Expressing your ideas with numbers, graphs, artwork, and photos
*  Graphics that get attention 
*  Presentation mechanics--media choices,  formats, and tips for
   handling handouts
*  Environmental decisions 
*  Your pre-presentation checklist
*  Delivering the message: No snoozing!
*  Conquering that nervous feeling
*  When things go wrong
*  Suggestions for typical situations

T11pm - Writing Good Stuff: A Practical Guide for Technical Content
Maurita Plouff, Expert Innovations

Who should attend: People who write proposals, reports, memos,
meeting minutes, feasibility studies, technical requirements,
letters, and email.

What you will learn: How to write business documents in less time
with greater ease.

We all need to write in our work, but many find it a burdensome
task. Learn simple techniques to write clear, concise, compelling
material in less time. The course includes examples and tools for
better writing.

Topics include:
*  Recognizing good writing
*  Setting goals
*  Audience analysis: Who reads it makes a difference!
*  How to manage your writing time
*  Start-up strategies: Avoiding writer's block
*  Organizing the information
*  First drafts, second drafts, nth drafts: Theory and practice
*  Editing: A 5-step checklist
*  Tips for common formats
*  Meeting minutes
*  Getting action
*  Email as an art form
*  Documentation and instructions

T12am - Introduction to NNTP and INN
James Brister and David Lawrence, Internet Software Consortium

Who should attend: Netnews server administrators who use or wish to
use INN (InterNet News). Participants should be capable UNIX system
administrators with experience in setting up new server hosts,
managing large file systems, and building programs from freely-
available source code.

What you will learn: Basic installation and management of a netnews
server using INN.

INN, written by Rich Salz, is the most widely-used software system
implementing the NNTP protocol. After completing this tutorial,
you'll be able to create and maintain INN server hosts, including
reader support, transport (netnews peering) administration, and
installation of source code patches to INN.

Topics include:
*  Hardware requirements
*  Fetching, building and installing INN
*  Transport servers vs. reader servers
*  Article transfer vs. article replication
*  innxmit, nntplink, and innfeed
*  Expire, multiple spindles
*  Reports and monitoring
*  Troubleshooting

T13pm - Advanced Topics in NNTP and INN
James Brister and David Lawrence, Internet Software Consortium

Who should attend: Administrators of INN servers who want a deeper
understanding of the NNTP protocol of the INN software system.
Participants should already have experience running at least one INN
server host.

What you will learn: How to diagnose serious but less-obvious
configuration or utilization problems, and be able to make informed
decisions about complex enterprise-wide netnews topology.

This tutorial will generally survey the NNTP and NNRP protocols,
with special attention to reader vs. transport verbs and to the
performance implications of offline news servers and Netscape
Navigator. Obscure INN performance tuning issues will be covered, as
will advanced troubleshooting and debugging techniques.

Topics include:
*  Falling behind your provider's feed
*  Downstream sites falling behind your feed
*  Web browsers vs. nnrpd and fork
*  NNTP streaming vs. innfeed parallelism
*  getactive and what to do about it
*  Mail <=> news gateways 
*  Advanced expire topics
*  Upcoming INN enhancements

T14am - TCP/IP Troubleshooting with UNIX
Jim Hickstein, Deer Run Associates

Who should attend: All UNIX system administrators, beginning to
intermediate network administrators, and advanced users who have to
diagnose and fix problems in their TCP/IP networks, or work with
others to do so. You should have some familiarity with general
networking concepts.

What you will learn: How to isolate, diagnose, and correct the most
common failures in TCP/IP networks using a diagnostic decision logic
table (DDLT).

The network is down: How do you fix it? This is no time to read a
book, and even the best organized textbook is not a good reference
in a crisis. 

Most sites have no specialist to call when the network breaks, so
UNIX system administrators and users are often called on to fix
things, but they seldom have a coherent plan of attack. Even people
with a great deal of experience with TCP/IP at the application level
often lack experience with network pathology.

This tutorial examines a practical problem-solving method using a
diagnostic decision logic table (DDLT), developed by the instructor
and based on many years' experience. The DDLT gives step-by-step
instructions on what to look at, what it should look like, and how
to fix it. Even if it's not your job to fix it, you can help get
things back on the air quickly by knowing which vital statistics to
gather to give the diagnosis a head start.

The tutorial focuses on specific examples of network failures, and
introduces and amplifies on TCP/IP and Ethernet concepts. Examples
are taken from SunOS 4.x and Solaris 2.x UNIX systems, but apply in
principle to any TCP/IP network.

Topics include:
*  Using the DDLT

*  Discovery: Where to look

*  Name Service
   - /etc/hosts, ping
   - DNS: /etc/resolv.conf, in.named
   - NIS: ypserv, ypbind, /etc/domainname
   - NIS+DNS: /var/yp/Makefile
   - Name service switch

*  TCP/IP over Ethernet
   - Ethernet interface: le0, ne0, etc.
   - ARP: The ARP shotgun
   - IP, the Internet protocol
   - ICMP: Echo, Host Unreachable
   - TCP and TELNET

*  Network topology and routing
   - Host and network addressing
   - Subnets
   - The routing table, traceroute

T15pm - Managing Network Printers and Print Spoolers
Patrick Powell, AStArt Technologies

Who should attend: System managers who are faced with managing a
wide variety of printers in a distributed and non-homogeneous
environment. Participants should be familiar with the basics on UNIX
and networking, and the concepts of client-server programming.

What you will learn: An overview of network-based printing, and the
various approaches used by UNIX, Novell, and Windows to support
printing. We will focus on the problems of supporting a hetero-
geneous print spooler environment such as BSD, System V, and Windows 
NT printing. 

Topics include:
*  Printer interfaces, printer job lanaguages, and page description 
*  Print spooler architecture and functions
*  BSD and System V print spooler  organization
*  Novell and Microsoft print spoolers
*  Network protocols--RFC 1179
*  Application programs, drivers, and PDL conversion programs
*  BSD print spooler
   - Organization
   - LPRng, BSD 4.4 lpd
   - Installation of software
   - printcap files
   - Filters
*  SAMBA and SMB print spooling support
   - Organization
   - Installation
   - Configuration
*  Exotic spooling problems
   - System V to lpd spooling
   - PCNFSD spooling
   - Windows WINSOCK client programs
*  Guidelines and recommendations

Attendees will gain a better understanding of the problems and
solutions when managing a large number of printers with different
capabilities. In-depth examples include supporting Windows NT print
clients on UNIX systems and vice versa, using LPRng and SAMBA.

T16am - Where Your Employer's Liability Stops and Yours Begins:
Principles of Agency for the System Administrator
Dan Appelman, Heller, Ehrman, White & McAuliffe

Who should attend: System and network administrators interested in
the legal issues surrounding the employer/employee relationship. 

What you will learn: Areas of employment law as it relates to the
system administrator, in cluding privacy, defamation, denial of
account privileges, export liability, and  obscenity/indecency.
The state of the law and practical measures to take to minimize
personal liability in the workplaces.

What problems arise from the conflicting goals of autonomy and
accountability in the employer/employee relationship? The right to
free speech, anonymity, and privacy are central concepts in the
U.S., but this right is constantly balanced by the need for
accountability and the need of the employer to control the

The course will also focus on the laws and regulations that govern
the employer/employee relationship, including those which limit
employer and employee liability for the acts of the employee. You
will receive concrete suggestions for ways to understand where the
line is drawn and how to minimize your own personal liability.

T17pm - The Right of Privacy and the Employer/Employee Relationship
Dan Appelman, Heller, Ehrman, White & McAuliffe

Who should attend: System and network administrators interested in
the limitations of the right to privacy in the employer/employee

What you will learn: The rights and responsibilities of the system
administrator regarding the privacy of users, the privacy of the
employer, and the right to privacy of the system administrator.

Do you know what the legal right of privacy is, how that right has
been recognized by the courts, and what its limitations are? You
will learn from actual cases decided by the Supreme Court, by other
Federal and state courts, by Congress, and the administrative
agencies. We will examine the limitations to the right of privacy in
the United States, and compare those limitations to the treatment of
privacy in other countries.

This course will also focus on privacy specifically relevant to
system administrators and their workplace responsibilities. The
instructor will suggest guidelines for dealing with the conflicting
goals of privacy and employer control, addressing such questions as:

*  Is there anything different about the workplace which either
   enhances or limits the right of privacy? 

*  How far can a system administrator go in intruding into the
   privacy of other employees in the workplace? 

*  When can a system administrator say "no" to a request by the
   employer to invade the privacy of other employees? 

*  What behavior and communications are protected by the right of
   privacy and what are not?

Tuesday, October 28, 1997 9:00 am - 5:00 pm

This one-day workshop will focus on the most recent developments in
systems administration, including technical, ethical, and
ACCEPTANCE OF A POSITION PAPER. The workshop will be an open forum
during which a representative subset of the topics and positions
submitted will be discussed.

There are no additional fees to attend this workshop, but attendees
must be registered for the conference or the tutorials. 


Potential workshop attendees are invited to submit a proposal (in
ASCII), of at most three pages, via email to Adam Moskowitz at
 no later than September 1. Proposals should
contain a topic for discussion, why the topic is relevant, and a
personal position on the topic.

Please note that this workshop  precludes attending any tutorials on
Tuesday (even half-day tutorials). Lunch will be provided.

TECHNICAL PROGRAM:  Wednesday - Friday, October 29-31, 1997


9:00am-10:30am:  Opening Remarks
Hal Pomeranz, Deer Run Associates
Celeste Stokely, Stokely Consulting

Keynote Address: Generation X in IT
Randy Johnson and Harris Kern, R & H Associates, Inc.

Generation X in IT. What? A generation gap within IT? Of course
there is, just like there is virtually everywhere else. What is so
different and how will things change to favor Gen X? From a
centralized planned world to one of virtual information management,
the impact of Generation X will loom large to change the face of IT
as we know it.

Randy and Harris will explore how the IT industry is being
influenced permanently by Generation X staffers who are bringing new
technical skills and attitudes into organizations. The speakers will
offer ample evidence and note important trends, both technical and
cultural, to highlight where things are going and how it will impact
our role as systems administrators.



11:00am-12:30pm:  Monitoring 
Session Chair: Adam Moskowitz, Genome Therapeutics Corporation 

	Implementing a Generalized Tool for Network Monitoring 
	Marcus Ranum, Network Flight Recorder, Inc. 

	Extensible, Scalable Monitoring for Clusters of Computers
	Eric Anderson and Dave Patterson, University of California,

	Monitoring Application Use With License Server Logs
	Jon Finke, RPI

2:00pm-3:30pm:  The Business of System Administration 
Session Chair: Wendy Nather, Swiss Bank Warburg

	Automating 24x7 Support Response To Telephone Requests
	Peter Scott, NASA Jet Propulsion Laboratory 

	Turning the Corner: Upgrading Yourself from System Clerk to
 	System Advocate 
	Tom Limoncelli, Lucent Bell Labs 

	How To Control and Manage Change in a Commercial Data Center
	Without Losing Your Mind
	Sally J. Howden and Frank B. Northrup, Distributed Computing
	Consultants, Inc. 

4:00pm-5:30pm:  System Design Perspectives 
Session Chair: Hal Pomeranz, Deer Run Associates

	Developing Interim Systems
	Jennifer Caetta, NASA Jet Propulsion Laboratory

	A Large-Scale Data Warehouse Application Case Study
	Dan Pollack, America Online

	SHUSE at Two
	Henry Spencer, SP Systems 


9:00am-10:30am:  Working with PCs
Session Chair: Melissa Binde, Swarthmore College

	A Web-Based Backup/Restore Method for Intel-Based PCs
	Tyler Barnett, Lexmark International 

	Managing PC Operating Systems With A Revision Control System 
	Gottfried Rudorfer, Vienna University of Economics and Business

	BAL: A Tool to Synchronize Document Collections Between
	Juergen Christoffel, GMD 

11:00am-12:30pm:  Inside the Black Box 
Session Chair: John Sellens, UUNET Canada

	Increased Server Availibility Through Failover Capability 
	Michael R. Barber, Michigan Technological University

	INN and the Cyclic News Filesystem
	Scott Fritchie, Minnesota Regional Network 

	Adaptive Locks for Frequently Scheduled Tasks With Unpredictable
	Mark Burgess and Demosthenes Skipitaris, Oslo College

2:00pm-3:30pm:  Work-In-Progress Reports (WIPs)

Short, pithy, and fun. Work-In-Progress Reports introduce
interesting new or ongoing work. If you have work you would like to
share or a cool idea that is not quite ready to be published, a WIP
is for you! We are particularly interested in presenting student

To reserve your presentation slot, contact the WIPs coordinator via
email to . A list of topics is announced on-site.

4:00pm-5:00pm:  Net Gains 
Session Chair: Josh Simon, Sprint Paranet

	Creating the Network for Lucent Bell Labs Research
	Tom Limoncelli, Thomas Reingold, Ravi Narayan, and Ralph Loura,
	Lucent Bell Labs 

	Instrumenting and Tuning a Very High Performance Web Server
	Douglas L. Urner, BSDI


Config Management
Session Chair: Paul Anderson, University of Edinburgh
	Automation of Site Configuration Management
	Jon Finke, RPI

	An Anarchists Guide to Heterogeneous Configuration Management 
	Alva Couch, Tufts University 

	An Analysis of UNIX System Configuration 
	Remy Evard, Argonne National Lab 

11:00am-12:30pm:  Mail
Session Chair: Bill LeFebvre, Group sys Consulting

	Tuning Sendmail for Large Mailing Lists 
	Rob Kolstad, BSDI

	Selectively Rejecting Spam Using Sendmail check_Rulesets 
	Robert Harker, Harker Systems

	A Better Email Bouncer
	Rich Holland, Rockwell Collins 



11:00am-12:30pm:  Overview of the Large Scale System Administration 
		  of Windows NT Workshop

The program chairs of USENIX's Large Scale System Administration of
Windows NT Workshop will select highlights of the workshop for

2:00pm-3:30pm:  DNS--Doing Nothing the Same 
Joel Avery and Andrew Macpherson, Nortel Technology

Northern Telecom and Bell Northern Research have recently merged
their corporate appearance into a single entity called Nortel. This
project included migrating,, and to
"," deployment of 100 new DNS slaves, worldwide 24-hour
DNS support for all Mac, PC, and UNIX machines, and the migration
of our IP address repository from a proprietary system to a
commercial product.  This talk discusses the implications upon the
DNS, both on the Internet, and on the 180,000 hosts in the Nortel

4:00pm-5:30pm:  Panel Discussion: 40 Bosses, 3000 Users, 20 Projects...
Managing Computers for Academics 

Chair: David Parter, University of Wisconsin 
       Panelists TBA

Sysadmins in academic departments have a lot of fun but often face
special challenges. These challanges include the multitude of
"bosses" (the faculty), the diversity and frequent turnover of users
(the students), and the lack of clear lines of authority and
accountability between the faculty, students, and staff. In
addition, the department sysadmin must maintain relationships with
the campus computing center, while at the same time relying on
student staff (who sometimes are allowed to graduate).

Facilities managers/senior sysadmins from four sites will present
case studies of their facilities. The panel will explore approaches
to various issues including staffing, budget and funding,
purchasing, security, and training. They will also address
relationships to faculty, research projects, the campus computing
center, and the institutional bureaucracy. 


9:00am-10:30am:  Logging and Monitoring: How, Why, and When
		 Peter Honeyman, CITI, University of Michigan
		 Joe Saul, ITD OPD&E, University of Michigan

Logging and monitoring is key to UNIX system security--but do you
know how to do it effectively? What information should you collect?
How do you protect your institution and user community from the
potential hazards of logging?

In part one of the presentation, Peter Honeyman describes the tools
available for logging and monitoring on UNIX systems, and describes
strategies for using them to detect intrusion. In part two, Joseph
Saul discusses the legal, ethical, and policy implications of
logging and monitoring, and the tradeoffs that must be made. 

As an illustration, Honeyman and Saul describe and critique the
Packet Vault, a technique for capturing all network traffic and
storing it for post-mortem investigation of a security incident.

11:00am-12:30pm:  So Now You Are the Project Manager
		  William E. Howell, Glaxo Wellcome, Inc.

Do we congratulate you or express our condolences? Have you just
strapped yourself to the solid fuel rocket booster that will take
you to the heights of your career? Or, have you just been sized for
a pair of concrete shoes that will take you to the bottom of the
East River? The success of a new project manager can be enhanced by
means of a mentor, a seasoned, more senior project manager to act as
a sounding board and a guiding light.

But what if you don't have that mentor? What if you don't have that
senior person to consult with? Where do you turn? Learn the critical
success factors that will enable you to be a successful project

2:00pm-3:30pm:  When UNIX Met Air Traffic Control
		Jim Reid, RTFM Ltd.

The management of Europe's congested air space is partly handled by
custom software running on Eurocontrol's UNIX systems. These servers
process all flight plans and optimize slot allocations for European
air space. This service has uniquely difficult operating criteria:
downtime is not permitted, data must never be lost and the service
must run 24 hours a day, every day of the year.

This presentation will describe the operating environment and
management structure at Eurocontrol. Configuration management and
change control/administration procedures are also explained. It also
discusses some of the problems caused by attempts to automate the
task of system administration.

4:00pm-5:30pm:  Enterprise Backup and Recovery--Do You Need a 
		Commercial Utility?
		W. Curtis Preston, Pencom Systems Administration

Every backup implementation leaves out something. Historically this
has been because good methods to back up all types of data have not
been available. Attempting to rectify this, many companies have
purchased products that they did not need, and others have purchased
the wrong products. 

This talk will explain the different types of data that must be
backed up, and the native and public domain utilities that attempt
to do so. An overview will follow of all the types of commercial
products available, including software and hardware.


9:00am-10:30am:  A Technologist Looks at Management
		 Steve Johnson, Transmeta Corp.

Managers and employees have models in their heads for what the
manager/employee relationship should look like. Unfortunately, no
two people seem to have the same model. This causes tension as our
boss fails meet our expectations, even as we fail to meet his or

This is a somewhat irreverant look at management by someone who is a
technical person, but has managed research and development in both
large companies and startups. The aim is to present material that
Dilbert would approve of.

We talk about common models, how to smoke out differences between
your model and your boss's, and how to resolve those differences. We
touch on job descriptions, dealing with deadlines and the resulting
stress, dealing with bozos in your management chain, making your
boss/employee look good, performance reviews, trust, teamwork,
dealing with difficult employees or peers, squeaky wheels, planning,
budgets, diversity, power, harassment, petty tyrants, and, after all
this, how to decide whether you want to manage, and how to start to
do it well.

11:00am-12:30pm:  IPv6 Deployment on the 6bone
		  Bob Fink, Lawrence Berkeley National Labs.

This talk will cover real operational experiences learned from the
6bone, the test and early deployment network for the IPng (Internet
Next Generation) IPv6 protocol. This will include an example of how
to put a site up on the 6bone and operational experiences such as
site renumbering (considered hard to do with IPv4, but easy with
IPv6). The new and very promising Aggregator-based unicast
addressing architecture will also be presented.


2:00pm-3:30pm:  Panel: Is System Administration a Dead-End Career?
Moderator: Celeste Stokely, Stokely Consulting 

Panelists: Bill Howell, Glaxo Wellcome, Inc. 
	   Wendy Nather, Swiss Bank Warburg
	   Hal Pomeranz, Deer Run Associates

4:00pm-5:30pm: The LISA Quiz Show! 
Hosted by Rob Kolstad, BSDI


Tuesday, Wednesday and Thursday evenings

Do you have a topic that you'd like to discuss with others? Our
Birds-of-a-Feather Sessions may be perfect for you. BoFs are very
interactive and informal gatherings for attendees interested in a
particular topic. Schedule your BoF in advance by sending email to or by telephoning the USENIX Conference
Office at 714.588.8649. BoFs may also be scheduled on-site at the
registration desk.


Have a question that's been bothering you? Try asking a USENIX
guru!  Experts from the USENIX community will be available to spark
controversy and answer questions. These are informal discussions
among participants, one more way at the conference to transmit
information. Please contact Guru coordinator Lee Damon at
 if you would like to volunteer your expertise.


Short, pithy, and fun. Work-In-Progress Reports introduce
interesting new or ongoing work. If you have work you would like to
share or a cool idea that is not quite ready to be published, a WIP
is for you! We are particularly interested in presenting student

To reserve your presentation slot, contact the WIPs coordinators via
email to A list of topics is announced on-site.



Internet and dial-out access are provided in the Terminal Room.
Copying facilities will be available to create tapes of
miscellaneous GNU and public domain software. The Terminal Room will
be open Monday-Friday. Look for details posted to


Electronic message service will be available Monday, October
27-Friday, October 31. Email to conference attendees should be
addressed: . 

Telephone messages during the conference may be left by telephoning
the Town & Country Hotel at 619.291.7131 and asking for the
USENIX Message Center Desk. The Message Center will be open
beginning on Sunday, October 26, 7:30 am-5:00 pm, and continuing
during conference hours until October 31, at 3:30 pm.


Welcoming Reception and Kickoff:  Saturday, October 25, 6:00pm-9:00 pm 

Vendor Exhibition Reception:  Wednesday, October 29, 5:00 pm-7:00 pm

Reception:  Wednesday, October 29, 7:00pm-9:00pm 

Costume Party & Reception:  Thursday, October 30, 6:00 pm-8:00 pm
We encourage you to come in costume dressed as your favorite system
command, computing equipment, or high-tech concept.



USENIX has negotiated special rates for conference attendees at the
Town & Country Hotel. Contact the hotel directly to make your
reservation. To get the special rate, be sure to mention USENIX. A
one-night room deposit must be guaranteed to a major credit card.
To cancel your reservation, you must notify the hotel at least 24
hours before your planned arrival date. Parking at the Town &
Country Hotel is complimentary.

Town & Country Hotel
500 Hotel Circle North
San Diego, CA  92186-5098
Toll Free: 800.772.8527 (USA)
Telephone: 619.291.7131
Reservation Fax: 619.291.3584

		       Single	Double
Garden Rooms		$ 70	$ 80
The garden rooms are located in one- or two-story buildings and are
spread throughout the hotel grounds, surrounded by lush landscaping.

East Tower Rooms	$ 84	$ 94
This 8-story high-rise has its own pool and an adjacent parking

West Tower Rooms	$ 94	$104
This 10-story deluxe tower offers oversized rooms, with private
balconies and views of the large pool and surrounding hillsides.

Usenet facilitates room sharing. If you wish to share a room, post
to and check

Special airline discounts will be available for USENIX attendees.
Please call for details:

JNR, Inc.
Toll Free in US and Canada: 800.343.4546 
Telephone: 714.476.2788


Lindbergh Field, San Diego's International Airport, is located only
15 minutes from the Town & Country Hotel. Cloud Nine Shuttle offers
continuous 24-hour van service every 20 to 30 minutes at a current
cost of $7.00 one way. Catch the shuttle outside the baggage claim
area at the shuttle loading island. Taxi service is available at an
approximate cost of $15 one way.


San Diego abounds with activities for an enjoyable visit: sunshine,
scenery, seven miles of shoreline, fine eating, fun night life, and
a wide array of things to see and do, including Mexico! 

The San Diego Zoo is home to 4,000 rare and endangered birds,
mammals, and reptiles and has 6,500 varieties of exotic plants.
Balboa Park includes the famous Zoo, 14 museums, art galleries and
theaters in ornate, Spanish-style buildings. Museum topics include
art, cars, aerospace, model trains, local history, science, and much

Sea World presents a variety of marine life in a large park in
Mission Bay. It features 5 shows and more than 20 exhibits and
attractions, including Shamu.

The San Diego Wild Animal Park is an 1,800 acre exotic animal and
botanical reserve dedicated to the preservation and protection of
endangered species. It features a 50-minute guided monorail tour,
and has 2,200 animals roaming free. It is a bit further afield, but
provides an interesting excursion.

The Gaslamp Quarter is located downtown in the historic district,
with restaurants, theaters, galleries, and shops.

Old Town is characterized by adobe haciendas and beautifully
restored Victorian homes. You will find shops and restaurants,
margaritas, mariachis, and hand-crafted treasures from around the

Mexico is only twenty miles away. US and Canadian citizens need only
valid identification to recross the border and you can bring back
$400 in purchases. You can travel to Tijuana on the San Diego
Trolley, a high-speed trolley that runs from downtown to the border.
If driving to Mexico, you must have special insurance.



USENIX provides Continuing Education Units for a small additional
administrative fee. Established by the International Association for
Continuing Education and Training, the CEU is a nationally
recognized standard unit of measure for continuing education and
training, and is used by thousands of organizations across the
United States. Each full-day tutorial, or two half-day tutorials,
qualifies for 0.6 CEUs. You can request CEU credit by completing the
CEU section on the registration form. USENIX provides a certificate
for each attendee taking a tutorial for CEU credit, and maintains
transcripts for all CEU students. CEUs are not the same as college
credits. Consult your employer or school to determine their


Tutorials: A limited number of seats in each tutorial are reserved
for full-time students at the  special rate of $70.00 for either two
half-day tutorial classes or one full-day tutorial (2 units). To
take advantage of this, you must telephone the conference office to
confirm availability and make a reservation. You will receive a
reservation code number which must appear on your Registra tion
Form. Your registration form with full payment and a photocopy of
your current student ID card must arrive within 14 days from the
date of your reservation. If they do not arrive by that date, your
reservation will be canceled. This special fee is non-transferable.
Technical Sessions: USENIX offers a special discount rate of $75 for
its technical sessions for full-time students. You must include a
copy of your current student ID card with your registration. This
special fee is not transferable. 

Stipends: Student stipends are available to pay for travel, living
expenses, and registration fees to enable full-time students to
attend this conference. To apply for a stipend, read
six to eight weeks before the conference, visit our Web site:, or contact Diane DeMartini 
for more information.

*  Admission to the tutorial(s) you select
*  Printed tutorial notes for your selected courses
*  CD-ROM with tutorials and conference proceedings 
*  Lunch
*  Admission to the Vendor Display

*  Admission to the Technical Sessions
*  One copy of the Conference Proceedings
*  One copy of the Invited Talks Submitted Notes
*  Admission to all social events
*  Admission to the Vendor Exhibition

                    October 26-31, 1997, San Diego, California 
Please complete the form below and return with full payment to:

22672 Lambert St., Suite 613, Lake Forest, CA 92630
Telephone: (714) 588-8649 / FAX Number (714) 588-9706
Electronic Mail Address:
Office Hours: 8:30am - 5:00pm Pacific Time

         (first)                                 (last)

FIRST NAME FOR BADGE____________________________

USENIX Member ID____________________

COMPANY OR INSTITUTION______________________________________________

MAILING ADDRESS_____________________________________________________
						(mail stop)



TELEPHONE NO:_________________________FAX NO._________________________

NETWORK ADDRESS______________________________________________________
                          (one only please)

The address you provide will be used for all future USENIX
mailings unless you notify us in writing.

Please help us serve you better.  By answering the following
questions, you help us plan our activities to meet members'
needs.  All information is confidential.

[ ] I do not want to be on the attendee list
[ ] I do not want my address made available except for USENIX mailings
[ ] I do not want USENIX to email me notices of Association activities.

What is your affiliation? [ ]academic  [ ]commercial  [ ]gov't  [ ]R&D

What is your role in purchase decision?
1.[] final  2.[] specify  3.[] recommend 4.[] influence 5.[] no role

What is your job function? (check one)
1.[] system/network administrator    2.[] consultant 
3.[] academic/research   4.[] developer/programmer/architect 
5.[] system engineer    6.[] technical manager  7.[] student
8.[] security  9.[] webmaster

How did you hear about this meeting:
1.[] USENIX brochure 2.[] newsgroup/bulletin board 3.[] ;login:  
4.[] World Wide Web  5.[] from a colleague  6.[] magazine
7. [] SUNWORLD Email

What publications or newgroups do you read releated to systems


TUTORIAL PROGRAM - Sunday-Tuesday, October 26-28, 1997

The tutorials may be on different days, so long as there is no
overlap (i.e. selecting two AM tutorials on the same day).
Full-day tutorials cannot be split.  Check the boxes next to
the tutorial number(s) you wish to attend.  A maximum of two
units per day may be selected.

Sunday, October 26, 1997
FULL DAY:  2 units
[ ]S1: System and Network Performance Tuning
[ ]S2: Introduction to Perl 5 for UNIX Programmers
[ ]S3: Internet Security for System and Network Administrators
[ ]S4: Setting Up and Administering a Web Server
[ ]S5: NIS+
[ ]S6: ISP Systems Administration
[ ]S7: Instroduction to UNIX Administration

HALF DAY: 1 unit
[ ]S8am: Security Policies & Practices
[ ]S10am: Linux System Administration or Everyone Can Be Root
[ ]S12am: Getting What You Want: Translating Technical Ideas into Funding

[ ]S9pm: Skills for Consultants
[ ]S11pm: Handling Computer and Network Security Incidents
[ ]S13pm: Introduction to Domain Name System (DNS) Administration

Monday, October 27, 1997
FULL DAY:  2 units
[ ]M1: Hot Topics in Modern System Administration
[ ]M2: Fault Tolerance, High Availability, and Netowrk Design in
    Today's Client-Server Environments
[ ]M3: Topics in Solaris Systems Administration
[ ]M4: Sendmail Inside and Out (Updated for Sendmail 8.8)
[ ]M5: Security on the World Wide Web
[ ]M6: Security for Software Developers: How to Design Code that
    Withstands Hostile Environments
[ ]M7: Firewall Management and Troubleshooting
[ ]M8: Administration of a Local IP Network

HALF DAY: 1 unit
[ ]M9am: Administering Windows NT 4.0
[ ]M11am: Talking Technical:  Breaking the Communication Barrier
[ ]M13am: Managing Support Staff
[ ]M15am: Sendmail From the Trenches

[ ]M10pm: Advanced Heterogeneous Systems Management - UNIX and Windows NT
[ ]M12pm: Effective Meetings: Get More Done in Less Time
[ ]M14pm: Developing Computing Policies

Tuesday, October 28. 1997
FULL DAY: 2 units
[ ]T1: Classic Topics in Systems Administration
[ ]T2: CGI and WWW Programming in Perl
[ ]T3: Advanced Topics in DNS and BIND
[ ]T4: IP version 6: An Introduction
[ ]T5: Network Security Profiles: What Every Hacker Already Knows About
    You, and What To Do About It
[ ]T6: Joining the Internet Safely Using Firewalls
[ ]T7: Building a Successful Security Infrastructure

HALF DAY: 1 unit
[ ]T8am: Configuring Sendmail Using the M4 Macros
[ ]T10am: Good Ideas:  Presenting Technical Information
[ ]T12am: Introduction to NNTP and INN
[ ]T14am: TCP/IP Troubleshooting with UNIX
[ ]T16am: Where Your Employer's Liability Stops and Yours Begins;
       Principles of Agency for the System Administrator

[ ]T9pm: Building Secure Intranets
[ ]T11pm: Writing Good Stuff:  A Practical Guide for Technical Content
[ ]T13pm: Advanced Topics in NNTP and INN
[ ]T15pm: Managing Network Printers and Print Spoolers
[ ]T17pm: The Right of Privacy and the Employer/Employee Relationship



Full-day tutorial  =  2 units
Half-day tutorial  =  1 unit
To determine your total tutorial registration fee, add the total
number of units you have selected and refer to the fee schedule
shown below. A maximum of 2 units per day may be selected.
# Units    Tutorial Fee       Tutorial Fee         CEU Credit Selected  
         (until Sept. 19)    (after Sept. 19)          (optional)
1 unit      $190.00              $240.00                 $15.00
2 units     $335.00              $385.00                 $15.00
3 units     $480.00              $530.00                 $23.00
4 units     $620.00              $670.00                 $30.00
5 units     $765.00              $815.00                 $38.00
6 units     $905.00              $955.00                 $45.00


TUTORIAL PROGRAM FEES (Sunday-Tuesday, Oct 26-28)

	Enter Tutorial fee from fee schedule above	$_________
	CEU units surcharge from fee schedule above	$_________

	Late fee applies if postmarked after 
	  Friday, September 19, 1997........Add $ 50	$_________

	Full-Time Students (see instructions under 
	(Attach photocopy of current student ID)
	CODE NO:______________________         $ 70	$_________
	CODE NO:______________________         $ 70	$_________
	CODE NO:______________________         $ 70	$_________

TECHNICAL SESSION FEES (Wednesday-Friday, Oct 29-31)

	Current Member Fee.....................$340	$________
        (Applies to individual members of USENIX, 
	EurOpen national groups, JUS and AUUG)

	Non-Member Fee*........................$435	$________
	*Join or renew your USENIX/SAGE membership 
	and attend the conference for same low price 
                                         -Check here [ ]

	Late fee applies if postmarked after 
	Friday, September 19, 1997.........Add $ 50	$_________

	Full-Time Student Fee**: pre-registered  
	                       or on-site......$ 75	$_________
	Full-Time Student Fee** including USENIX 
	                   membership fee......$100	$_________
	**Students must include photocopy of current 
   	student I.D.

                       TOTAL ENCLOSED...................$_________

Payment in US Dollars must accompany this form.  Purchase orders,
vouchers, telephone or email registrations cannot be accepted.  

[ ] Payment Enclosed (Make check payable to USENIX Conference)


ACCOUNT NO.______________________________________ EXP. DATE___________

 Print Cardholder's Name                 Cardholder's Signature

You may fax your registration form if paying by credit card to 
USENIX Conference Office, fax:  714-588-9706.  (To avoid duplicate 
billing, please DO NOT mail an additional copy.)

REFUND CANCELLATION POLICY:  If you must cancel, all refund requests 
must be in writing and postmarked no later than Octobber 17, 1997.  
Telephone cancellations cannot be accepted.  You may telephone to 
substitute another in your place.  Call the conference office for
details:  714-588-8649.

			  SCO's Case Against IBM

November 12, 2003 - Jed Boal from Eyewitness News KSL 5 TV provides an
overview on SCO's case against IBM. Darl McBride, SCO's president and CEO,
talks about the lawsuit's impact and attacks. Jason Holt, student and 
Linux user, talks about the benefits of code availability and the merits 
of the SCO vs IBM lawsuit. See SCO vs IBM.

Note: The materials and information included in these Web pages are not to
be used for any other purpose other than private study, research, review
or criticism.