


default search action
14th LISA 2000: New Orleans, Louisiana, USA
- Rémy Evard, Phil Scarr:
Proceedings of the 14th Conference on Systems Administration (LISA 2000), New Orleans, Louisiana, USA, December 3-8, 2000. USENIX 2000 [contents]
Refereed Papers
Deep Thoughts
- Mark Burgess:
Theoretical System Administration. 1-13 - Alva L. Couch:
An Expectant Chat About Script Maturity. 15-28 - Jon Finke:
An Improved Approach for Generating Configuration Files from a Database. 29-38
You, a Rock, and a Hard Place
- Robert Beck, Steve Holstead:
FOKSTRAUT and Samba--Dealing with Authentication and Performance Issues on a Large-scale Samba Service. 39-42 - Robert Drzyzgula:
Designing a Data Center Instrumentation System. 43-58 - Karl Larson, Todd Stansell:
Improving Availability in VERITAS Environments. 59-66
Users and Passwords and Scripts, Oh My!
- Douglas Hughes:
User-Centric Account Management with Heterogeneous Password Changing. 67-76 - Matt Curtin, Sandy Farrar, Tami King:
Pelendur: Steward of the Sysadmin. 77-83 - Alexander Kent, James Clifford:
Network Information Management and Distribution in a Heterogeneous and Decentralized Enterprise Environment.
Network Track
Analyze This!
- Jon T. Meek:
Wide Area Network Packet Capture and Analysis. 255-264 - Parthiphan Krishnan, Tejas Naik, Ganesan Ramu, Roshan Sequeira:
Sequencing of Configuration Operations for IP Networks. 265-274 - Ellen L. Mitchell, Eric Nelson, David Hess:
ND: A Comprehensive Network Administration and Analysis Tool. 275-283
Go With the Netflow
- Bill Nickless, John-Paul Navarro, Linda Winkler:
Combining Cisco NetFlow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics. 285-290 - Steve Romig, Mark Fullmer, Ron Luman:
The OSU Flow-tools Package and CISCO NetFlow Logs. 291-303 - David Plonka:
FlowScan: A Network Traffic Flow Reporting and Visualization Tool. 305-317
The Toolshed
- Rocky Bernstein:
xps--Dynamic Process Tree Watching Under X. 95-100 - Matthew Bing, Carl Erickson:
Extending UNIX System Logging with SHARP. 101-107 - Michael Gilfix, Alva L. Couch:
Peep (The Network Auralizer): Monitoring Your Network with Sound. 109-117
1984
- John Sellens:
Thresh--A Data-Directed SNMP Threshold Poller. 119-130 - Jarra Voleynik:
eEMU: A Practical Tool and Language for System Monitoring and Event Management. 131-137 - Jake D. Brutlag:
Aberrant Behavior Detection in Time Series for Network Monitoring. 139-146
The Sorcerer's Apprentice
- Robert Osterlund:
PIKT: Problem Informant/Killer Tool. 147-165 - Allan Miller, Alex Donnini:
Relieving the Burden of System Administration Through Support Automation. 167-180 - Alexei Novikov, Martin Hamilton:
FTP Mirror Tracker: A Few Steps Towards URN. 181-186
Fully Automatic
- Kyle Oppenheim, Patrick McCormick:
Deployme: Tellme's Package Management and Deployment System. 187-196 - Christopher Hemmerich:
Automating Request-based Software Distribution. 197-205 - David Ressman, John Valdés:
Use of Cfengine for Automated, Multi-Platform Software and Patch Distribution. 207-218
Building Blocks
- Lee "Leonardo" Amatangelo:
Unleashing the Power of JumpStart: A New Technique for Disaster Recovery, Cloning, or Snapshotting a Solaris System. 219-228 - Michael W. Shaffer:
A Linux Appliance Construction Setv. - Rajeev Agrawala, Rob Fulmer, Shaun Erickson:
Automating Dual Boot (Linux and NT) Installations. 245-254
Security Track
Someone's Knocking at the Door...
- Hal Burch, Bill Cheswick:
Tracing Anonymous Packets to Their Approximate Source. 319-327 - Sven Dietrich, Neil Long, David Dittrich:
Analyzing Distributed Denial of Service Tools: The Shaft Case. 329-339
Don't Let Them In
- Jean Chouanard:
YASSP! A Tool for Improving Solaris Security. 341-354 - Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, Virgil D. Gligor:
SubDomain: Parsimonious Server Security. 355-368 - Bruce Barnett:
NOOSE - Networked Object-Oriented Security Examiner. 369-378
Invited Talks Track
- Jon Rochlis:
How Not to Get Fleeced with Employee Stock Options. - Barb Dijker:
SAGE Update. LISA 2000 - Lorette Cheswick:
The Digital House. - Edward W. Felten:
Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust Case. LISA 2000 - Steve Romig:
Experiences with Incident Response at The Ohio State University. - Leif Hedstrom:
Integrating LDAP in a Heterogeneous Environment. LISA 2000 - Bill Cheswick:
Mapping Corporate Intranets and Internets. LISA 2000 - Brad Knowles:
The Design and Implementation of Highly Scalable Email Systems. - W. Curtis Preston:
SANs--From A To Reality. LISA 2000 - Steven Levine:
Why the Documentation Sucks and What You Can Do About It.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.