Stop the war!
Остановите войну!
for scientists:
default search action
login - The Usenix Magazine, Volume 29
Volume 29, Number 1, February 2004
- Tina Darmohray:
MOTD. - Sean Kamath:
Letters to the Editor.
- Rik Farrow:
Musings.
- Robert Haskins:
ISPadmin: An Interview with Paul Graham. - Steven Alexander:
Avoiding Buffer Overflows and Related Problems.
- Christopher M. Russo:
Keeping Employees by Keeping Them Happy, Part II.
- Glen McCluskey:
Working with C# Interfaces. - Adam Turoff:
Practical Perl: Integration with Inline. - Clif Flynt:
The Tclsh Spot.
- Salah M. S. Al-Buraiky:
Building a Virtual IPv6 Lab Using User-Mode Linux.
- Glenn M. Brunette:
Hiding Within the Trees.
- Peter H. Salus:
The Bookworm. - Anton Chuvakin:
Kevin Mandia, Chris Prosise - Incident Response: Computer Forensics, 2nd Ed. - Peter H. Salus:
Is It 10 Years Already?
- Tara Mulligan, Ellie Young:
Report from the Nominating Committee. - More Haikus!
Volume 29, Number 2, April 2004
- Rob Kolstad:
MOTD. - Tina Darmohray:
Apropos.
- Qusay H. Mahmoud:
Wireless Java Applications Development.
- Rik Farrow:
Musings.
- Hernan Laffitte, Eric Anderson:
Document it with a Picture.
- Christopher M. Russo:
Keeping Employees by Keeping Them Happy, Part III. - Christine Bagwell:
Feng Shui for Computer Geeks.
- Peter H. Salus:
STUG 20 Years Ago.
- Glen McCluskey:
Using C# Abstract Classes. - Adam Turoff:
Practical Perl: An Introduction to Web Services. - Clif Flynt:
The Tclsh Spot: Mobile Agents in Tcl.
- Dan Appelman:
CAN-SPAM: New Federal Anti-Spam Law Sets Nationwide Standards for Commercial Email Messages. - Serge Egelman:
Suing Spammers for Fun and Profit.
- Peter H. Salus:
The Bookworm. - Anton Chuvakin:
Ed Skoudis (with Larry Zeitser) - Malware: Fighting Malicious Code. - Rik Farrow:
Cyrus Peikari, Anton Chuvakin: Security Warrior. - Rik Farrow:
Neal Stephenson: Quicksilver.
- An Open Letter from the USENIX Association Rebutting SCO's Position on Open Source Software.
Volume 29, Number 3, June 2004
- Adam Butler:
Certs for the Masses.
- Dan Appelman:
California Requires Disclosure of Database Security Breaches.
- Mark Burgess:
Talking to the Walls.
- Steven Alexander:
Password Protection for Modern Operating Systems. - Nicholas Weaver, Dan Ellis:
Reflections on Witty. - Rik Farrow:
Musings.
- Robert Haskins:
ISPadmin.
- Glen McCluskey:
C# Overloaded Operators. - Adam Turoff:
Practical Perl: Web Automation. - Clif Flynt:
The Tclsh Spot.
- Peter H. Salus:
The Bookworm. - Rob Kolstad:
Software Architect Bootcamp, 2nd ed. by Raphael C. Malveau and Thomas J. Mowbray - Reviewed by Harry DeLano.
Volume 29, Number 4, August 2004
- Rob Kolstad:
MOTD. - Tina Darmohray:
APROPOS: Sysadmin Jobs: The CIO. - Kirk McKusick:
USACO Correspondence. - Travis Howard:
CFS Travails. - Robert Haskins:
ISPadmin: Recent Spam-Fighting Developments.
- Rik Farrow:
Musings.
- John Nicholson, Rachel Wheeler:
California Online Privacy Act Has Widespread Effects. - Dan Appelman:
OPPA and Web Site Operators.
- Adam Turoff:
Practical Perl: Database Modeling with Class: : DBI. - Glen McCluskey:
Using C# Reflection. - Clif Flynt:
The Tclsh Spot.
- Peter H. Salus:
The Bookworm. - Peter H. Salus:
History and FUD. - Peter H. Salus:
Twenty Years Ago ... and More. - Rik Farrow:
Book Reviews.
- Rob Kolstad:
USACO: The USA Computing Olympiad. - Rob Kolstad:
Alain Hénon Retires. - Ellie Young:
THE USENIX Association Financial Report for 2003. - Kirk McKusick:
Restructuring of SAGE Governance.
Volume 29, Number 5, October 2004
- Rob Kolstad:
MOTD. - Rob Kolstad:
USENIX Haiku Contest. - Stephen B. Jenkins:
Letters to the Editor. - Clif Flynt:
The Tclsh Spot. - Glen McCluskey:
Making Use of C# Collections.
- Clair W. Goldsmith, Rob Kolstad:
A Conversation About Identity Management.
- Rik Farrow:
Musings.
- Phil Pennock:
On IMAP Service for Customers.
- Joel E. Natt:
Planet Broadband. - Peter H. Salus:
The Bookworm.
- Tara Mulligan:
Summary of the USENIX Board of Directors Meetings. - Peter H. Salus:
Twenty Years Ago in ;login. - Tara Mulligan:
In Memoriam: Charles "Chuck" Yerkes.
Volume 29, Number 6, December 2004
- Rik Farrow:
Letter to the Editor.
- James Butler, Sherri Sparks:
Spyware and Rootkits: The Future Convergence. - Chris Wysopal:
Putting Trust in Software Code. - Michael Rash:
Combining Port Knocking and Passive OS Fingerprinting with fwknop. - Steven Alexander:
Improving Security with Homebrew System Modifications. - Dario V. Forte, Davide Bertoletti, Cristiano Maruti, Michele Zambelli:
Sebek Web "ITA" Interface. - Jennifer S. Granick:
Strike Back. - Michael B. Scher:
SSO/RSO/USO/Oh No? - Eliot Lear:
Being Awash in Keys. - Sanjay Goel, Stephen F. Bush:
Biological Models of Security for Virus Propagation in Computer Networks. - Jonathan S. Shapiro:
Extracting the Lessons of Multics.
- Peter H. Salus:
The Bookworm. - Rik Farrow:
Book Reviews.
- Rob Kolstad:
USACO: The International Finals. - Ellie Young:
Thanks to Our Volunteers.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.