


default search action
login - The Usenix Magazine, Volume 31
Volume 31, Number 1, February 2006
- Rik Farrow:
Musings. - Paul Anderson:
Why Configuration Management Is Crucial. - Alain Hénon:
Extreme Makeover.
- Narayan Desai, Rick Bradshaw, Joey Hagedorn:
System Management Methodologies with Bcfg2. - Luke Kanies:
Puppet: Next-Generation Configuration Management. - Marc Wallman:
Spam Filtering for the Enterprise. - Tom Limoncelli:
Delegating to the Web. - Dustin Puryear:
Consulting for Fun and Profit. - Thomas Sluyter:
Keeping Track of Time.
- David N. Blank-Edelman:
Practical Perl Tools: Configuration Files. - Robert Haskins:
ISPadmin: Blocking Non-Email Spam.
- Michael Rash:
Single Packet Authorization with Fwknop. - Steven M. Bellovin, Bill Cheswick, Angelos D. Keromytis:
Worm Propagation Strategies in an IPv6 Internet.
- Dave Brown:
MythTV: Some Assembly Required ... But the Results Can Be Spectacular.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Strata R. Chalup:
2006 USENIX Nominating Committee Report. - Tara Mulligan, Ellie Young:
Summary of USENIX Board of Directors Meetings and Actions.
Volume 31, Number 2, April 2006
- Rik Farrow:
Musings. - Tom Haynes:
OpenSolaris: The Model.
- Brian W. Kernighan:
Code Testing and Its Role in Teaching. - Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Modular System Programming in MINIX 3. - Diomidis Spinellis:
Some Types of Memory Are More Equal than Others. - Chaos Golubitsky:
Simple Software Flow Analysis Using GNU Cflow. - Luke Kanies:
Why You Should Use Ruby.
- David Malone:
Unwanted HTTP: Who Has the Time? - Randolph Langley:
Auditing Superuser Usage.
- David N. Blank-Edelman:
Practical Perl Tools: Programming, Ho Hum.
- Nicholas M. Stoughton:
USENIX Standards Activities.
- Elizabeth Zwicky, Sam Stover, Rik Farrow:
Book Reviews.
- Ted Dolotta:
Letter to the Editor.
Volume 31, Number 3, June 2006
- Rik Farrow:
Musings. - Mark Burgess:
Autonomic Computing - The Music of the Cubes.
- Kurt Chan:
A Comparison of Disk Drives for Enterprise Computing. - Marshall K. McKusick:
Disks from the Perspective of a File System. - Tom Haynes:
Introduction to ZFS. - Stefan Büttcher, Charles L. A. Clarke:
Adding Full-Text Filesystem Search to Linux.
- Pablo Neira Ayuso:
Netfilter's Connection Tracking System. - Markos Gogoulos, Diomidis Spinellis:
Using Linux Live CDs for Penetration Testing.
- David N. Blank-Edelman:
Practical Perl Tools: Car 10.0.0.54, Where Are You? - Robert Haskins:
ISPadmin: Policy Enforcement. - Heison Chak:
VoIP Watch. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Strata R. Chalup:
SAGE Update.
Volume 31, Number 4, August 2006
- Rik Farrow:
Musings.
- Mark Uris:
DataMonster: Building a Cost-Effective, High-Speed, Heterogeneous Shared File System. - Mark Burgess:
Configuration Management: Models and Myths. Part 1: Cabbage Patch Kiss. - Darrell Fuhriman:
Identity Management Identified. - Andy Seely:
System Administration of Command and Control Systems.
- KyoungSoo Park, Vivek S. Pai:
CoBlitz: A Scalable Large-File Transfer Service. - Ryan Peterson, Venugopalan Ramasubramanian, Emin Gün Sirer:
A Practical Approach to Peer-to-Peer Publish-Subscribe.
- Eric Sorenson:
Enterprise Routing Sinkholes Using Linux and Open Source Tools. - Pete Herzog:
The Protocol Historian.
- David N. Blank-Edelman:
Practical Perl Tools: Tie Me Up, Tie Me Down (Part 1). - Robert Haskins:
ISPadmin: Traffic Shaping. - Heison Chak:
Choosing IP Phones.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Vassilis Prevelakis:
Letter to the Editor. - Ellie Young:
USENIX Board of Directors Meetings and Actions. - Ellie Young:
The USENIX Association Financial Report for 2005.
Volume 31, Number 5, October 2006
- Rik Farrow:
Musings.
- Stephen C. Johnson:
Algorithms for the 21st Century. - Mike Howard:
Maybe You Should Use Python.
- Mark Burgess:
Configuration Management: Models and Myths. Part2: Babel, Babble, Toil, and Grammar. - Brad Knowles:
It's About Time...
- Richard McDougall, James Laudon:
Multi-Core Microprocessors Are Here. - Timo Sivonen:
Measuring Performance of FreeBSD Disk Encryption.
- Michael J. Freedman:
Automating Server Selection with OASIS. - Rik Farrow:
WISPER: Open Source, Long-Distance Wireless.
- David N. Blank-Edelman:
Practical Perl Tools: Tie Me Up, Tie Me Down (Part 2). - Robert Haskins:
ISPadmin: Anti-Spam Roundup. - Heison Chak:
Echo in VoIP Systems. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Nick Stoughton:
An Update on Standards: Diary of a Standard Geek. - Andrew Josey:
Why Get Involved in POSIX?
- Rob Kolstad:
USACO News. - Strata R. Chalup:
SAGE Update. - Rik Farrow, Jane-Ellen Long:
Writing for ;login;.
Volume 31, Number 6, December 2006
- Rik Farrow:
Musings.
- Team Cymru:
The Underground Economy: Priceless. - Jan Göbel, Jens Hektor, Thorsten Holz:
Advanced Honeypot-Based Intrusion Detection. - Andy Ozment, Stuart E. Schechter:
The Security of OpenBSD: Milk or Wine? - Nicholas Weaver, Dan Ellis:
White Worms Don't Work. - Michael B. Scher:
On Doing "Being Reasonable". - Mike Howard:
How Often Should You Change Your Password?
- Dave Josephsen:
Homeless Vikings: Short-Lived BGP SessionHijacking - A New Chapter in the Spam Wars. - Mark Burgess:
Configuration Management: Models and Myths. Part3: A Shocking Lack of Ad-Hocracy.
- David N. Blank-Edelman:
Practical Perl Tools: Give Me My Woobie Back. - Robert Haskins:
ISPadmin: Wireless. - Heison Chak:
VoIP Watch: Security. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Nicholas M. Stoughton:
An Update on Standards.
- Ellie Young:
Thanks to Our Volunteers.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.