![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
login - The Usenix Magazine, Volume 30
Volume 30, Number 1, February 2005
- Rob Kolstad:
MOTD. - Marcus J. Ranum:
Letters to the Editor. - Rob Kolstad:
SAGE-News Article on SCO Defacement.
- Heison Chak:
Voice over IP with Asterisk.
- Steven Alexander:
Why Teenagers Hack: A Personal Memoir. - Rik Farrow:
Musings. - Tina Darmohray:
Firewalls and Fairy Tales. - Steven Alexander:
The Importance of Securing Workstations. - Abe Singer
:
Tempting Fate.
- Robert Haskins:
ISPadmin. - Thomas Sluyter:
Getting What You Want: The Fine Art of Proposal Writing. - Mark Burgess:
The Profession of System Administration.
- Adam Turoff:
Practical Perl: Error Handling Patterns in Perl. - Clif Flynt:
The Tclsh Spot. - Glen McCluskey:
Working with C# Serialization.
- Peter H. Salus:
The Bookworm. - Rik Farrow, Chuck Hardin:
Book Reviews.
- Peter H. Salus:
20 Years Ago ... and More. - Tara Mulligan:
Summary of USENIX Board of Directors Actions.
Volume 30, Number 2, April 2005
- Rob Kolstad:
MOTD: Leverage. - Steven Alexander:
Letter to the Editor. - Rik Farrow:
Musings.
- Adam Turoff:
Practical Perl: Programs to Write Programs.
- Jason G. Andress:
IPv6: The Next Internet Protocol.
- Robert Haskins:
ISPadmin: Interview with Vipul Ved Prakash. - Hal Miller:
Customer Requirements Specificationsfor System Administrators.
- Nick Stoughton:
Update on Standards.
- Æleen Frisch:
The Bookworm. - Rik Farrow:
Book Reviews.
- Peter H. Salus:
Years and Years Ago. - Rik Farrow:
Short Topics Booklets. - Peter H. Salus:
Thirtieth Anniversary, USENIX Association.
Volume 30, Number 3, June 2005
- Rob Kolstad:
MOTD. - Jon Finke:
Letter to the Editor. - Heison Chak:
More Asterisk Tricks.
- Anthony Howe:
Shoot the Messenger: Some Techniques for Spam Control. - Thomas Sluyter, Roland van Maarschalkerweerd:
When Disaster Strikes: Cailin and Roland Discuss Crisis Management. - Ofir Arkin:
Demystifying Passive Network Discovery and Monitoring Systems. - Andrew Hume:
How's Your OS These Days?
- Adam Turoff:
Practical Perl: Date and Time Formatting in Perl.
- Amr El-Kadi, Ahmed Nashed, Kareem El Gebaly, Mahmoud Abo Daoud, Noha El Sharawy, Rania Nazmi, Mostafa Mazen:
Architecture and Internal Design of the AUC-Abyss Web Server.
- Boris Loza:
Under Attack: Dealing with Missing UNIX Files. - Steven Alexander:
Defeating Compiler-level Buffer Overflow Protection. - Rik Farrow:
Musings.
- Æleen Frisch:
The Bookworm.
- Ellie Young:
Vale, Rob, atque Ave, Rik. - Tara Mulligan:
Summary of the USENIX Board of Directors Actions. - Peter H. Salus:
Annual Awards.
Volume 30, Number 4, August 2005
- Rik Farrow:
Musings. - Abe Singer
:
Conference Password Sniffing: Legal and Ethical Issues.
- Jon Crowcroft, Keir Fraser, Steven Hand, Ian Pratt, Andrew Warfield:
The Inevitability of Xen. - Mark McCullough:
Secure Automated File Transfer. - Adam Levin:
SAN vs. NAS for Oracle: A Tale of Two Protocols. - Adam Turoff:
Practical Perl: Defensive CGI Programming with Taint Mode and CGI: : Untaint. - Robert Haskins:
ISPadmin: Understanding and Mitigating DDoS Attacks.
- Daniel L. Appelman:
Primer on Cybercrime Laws.
- Sean Peisert:
Forensics for System Administrators. - Steve Manzuik:
Your Defense Is Offensive.
- Emily W. Salus, Peter H. Salus:
Marketing After the Bubble.
- Rik Farrow:
Book Reviews.
- Peter H. Salus:
20 Years Ago in ;login. - David W. Parter:
SAGE Update. - Tara Mulligan, Anne Dickison:
New Membership Benefits.
Volume 30, Number 5, October 2005
- Rik Farrow:
Musings.
- Michael W. Lucas:
FreeBSD 5 SMPng. - Marc E. Fiuczynski:
Better Tools for Kernel Evolution, Please! - Peter Baer Galvin:
Solaris 10 Containers.
- Hobbit:
DNS-based Spam Rejection. - Boris Loza:
Finding Trojans for Fun and Profit. - Robert Haskins:
ISPadmin: Embedded Hardware.
- David Malone:
Security Through Obscurity: A Review of a Few of FreeBSD's Lesser-Known Security Capabilities. - Srikanth Kandula:
Surviving DDoS Attacks.
- Geoffrey Mainland, Matt Welsh:
Distributed, Adaptive Resource Allocation for Sensor Networks.
- Elizabeth Zwicky, Adam Turoff:
Book Reviews.
- Peter H. Salus:
25 Years Ago. - Chris Palmer:
SAGE Update. - Rob Kolstad:
USACO, the USA Computing Olympiad.
Volume 30, Number 6, December 2005
- Rik Farrow:
Musings. - Dan Geer:
Monoculture on the Back of the Envelope.
- Gernot Heiser:
Secure Embedded Systems Need Microkernels. - Shaya Potter, Jason Nieh:
Breaking the Ties That Bind: Application Isolation and Migration. - Thorsten Holz:
Spying with Bots. - Raven Alder:
A Summary of Savvy Backbone Defense. - Vassilis Prevelakis:
The Virtual Firewall. - Massimiliano Adamo, Mauro Tablò:
Linux vs. OpenBSD: A Firewall Performance Test. - Sam Stover, Matthew Dickerson:
Using Memory Dumps in Digital Forensics. - Luke Kanies:
Using Version Control in System Administration. - Christopher Jordan, Jason Royes, Jesse Whyte:
Writing Detection Signatures. - Ming Chow:
Teaching Computer Security, Privacy, and Politics.
- Elizabeth Zwicky:
Book Reviews.
- Peter H. Salus:
2006 Election for Board of Directors. - Rob Kolstad:
USACO Team Brings Home the Gold. - Ellie Young:
Thanks to Our Volunteers. - Ellie Young, Tara Mulligan:
Summary of USENIX Board of Directors Meetings.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.