default search action
19th LISA 2005: San Diego, California, USA
- David N. Blank-Edelman:
Proceedings of the 19th Conference on Systems Administration (LISA 2005), December 4-9, 2005, San Diego, California, USA. USENIX 2005
Opening Remarks, Awards, Keynote
- Qi Lu:
Keynote Address: Scaling Search Beyond the Public Web.
Vulnerabilities
- Matt Selsky, Daniel Medina:
GULP: A Unified Logging Architecture for Authentication Data. 1-5 - Chaos Golubitsky:
Toward an Automated Vulnerability Comparison of Open Source IMAP Servers (Awarded Best Student Paper!). 9-22 - Yi-Min Wang, Doug Beck:
Fast User-Mode Rootkit Scanner for the Enterprise. 23-30
Configuration Management Theory
- Paul Anderson, Edmund Smith:
Configuration Tools: Working Together. 31-37 - Narayan Desai, Rick Bradshaw, Scott Matott, Sandra Bittner, Susan Coghlan, Rémy Evard, Cory Lueninghoener, Ti Leggett, John-Paul Navarro, Gene Rackow, Craig Stacey, Tisha Stacey:
A Case Study in Configuration Management Tool Deployment. 39-46 - Shaya Potter, Jason Nieh:
Reducing Downtime Due to System Maintenance and Upgrades (Awarded Best Student Paper!). 47-62
Configuration Management Practice
- Anton Schultschik:
About the Integration of Mac OS X Devices into a Centrally Managed UNIX Environment. 63-71 - Brent ByungHoon Kang, Vikram Sharma, Pratik Thanki:
RegColl: Centralized Registry Framework for Infrastructure System Management. 73-82 - Maarten Thibaut, Wout Mertens:
Herding Cats: Managing a Mobile UNIX Platform. 83-88
Networking
- Bruce Campbell, Robyn Landers:
Open Network Administrator (ONA) - A Web-based Network Management Tool. 89-101 - Robert M. Marmorstein, Phil Kearns:
An Open Source Solution for Testing NAT'd and Nested iptables Firewalls. 103-112 - Evan Hughes, Anil Somayaji:
Towards Network Awareness. 113-124
Theory
- Alva L. Couch, Ning Wu, Hengky Susanto:
Toward a Cost Model for System Administration (Awarded Best Paper!). 125-141 - Mark Burgess, Kyrre M. Begnum:
Voluntary Cooperation in Pervasive Computing Services. 143-154 - Sanjai Narain:
Network Configuration Management via Model Finding. 155-168
Network Visualization
- William Yurcik:
Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite. 169-176 - Cristian Estan, Garret Magin:
Interactive Traffic Analysis and Visualization with Wisconsin Netpy. 177-184 - Seong Soo Kim, A. L. Narasimha Reddy:
NetViewer: A Network Traffic Visualization and Analysis Tool. 185-196
Tools
- Eben M. Haber, Eser Kandogan, Allen Cypher, Paul P. Maglio, Rob Barrett:
A1: Spreadsheet-based Scripting for Developing Web Tools. 197-208 - Thomas A. Limoncelli:
Hostdb: The Best Damn host2DNS/DHCP Script Ever Written. 209-223 - Jonathan Adams, David Bustos, Stephen Hahn, David Powell, Liane Praza:
Solaris Service Management Facility: Modern System Startup and Administration. 225-236
Access Control
- James Deverick, Phil Kearns:
Towards a Deep-Packet-Filter Toolkit for Securing Legacy Resources. 237-248 - Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva:
Administering Access Control in Dynamic Coalitions. 249-261 - Jon Finke:
Manage People, Not Userids. 263-277
Work-in-Progress Reports (WiPS)
Invited Talks
- Bdale Garbee:
Computing on Amateur Satellites. - Dan Kaminsky:
Network Black Ops: Extracting Unexpected Functionality from Existing Networks. - Thomas A. Limoncelli:
What Big Sites Can Learn from Little Sites. - Garrett Wollman:
Building MIT's Stata Center: An IT Perspective. - Strata Rose Chalup:
Under 200: Applying IS Best Practices to Small Companies. - Radia J. Perlman:
What's a PKI, Why Would I Want One, and How Should it Be Designed? - Andrew Cowie:
Modern Trends in UNIX and Linux Infrastructure Management. - Brent Chapman:
Incident Command for IT: What We Can Learn from the Fire Department. - Monica Lam:
Automatic PC Desktop Management with Virtualization Technology. - Peyton Engel:
What's the Worst That Could Happen? - Lance Cottrell:
Internet Counter-Intelligence: Offense and Defense. - Paul Vixie:
Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV). - Kevin Bankston:
How Sysadmins Can Protect Free Speech and Privacy on the Electronic Frontier. - Michael H. Warfield:
Wireless Security. - Jonas Luster:
Weblogs, Wikis, and RSS for System Administrators. - Michael R. Crusoe:
Using Your Body for Authentication: A Biometrics Guide for System Administrators. - Terry Slattery:
Silly Network Management Tricks.
Plenary Session
- Matt Blaze:
Picking Locks with Cryptology.
Guru Sessions
- W. Curtis Preston:
Backups. LISA 2005 - Howard Chu:
LDAP. LISA 2005 - Douglas Hughes:
Spam. LISA 2005 - Esther Filderman:
AFS. LISA 2005 - Gerald Carter:
Samba. LISA 2005 - Robert Sparks:
VoIP. LISA 2005 - Strata Rose Chalup:
Project Management. LISA 2005 - Thomas A. Limoncelli:
Time Management. LISA 2005 - Gene Kim:
Change Management. LISA 2005 - Gregory G. Rose:
Security/Cryptography. LISA 2005 - Ben Laurie:
Apache/OpenSSL/DNSSEC. LISA 2005 - Jordan Hubbard:
Mac OS X. LISA 2005 - Bryan Cantrill, Daniel Price, Liane Praza:
Solaris 10: System/DTrace/Zones/SMF. LISA 2005 - John Arrasjid, John Gannon:
Virtualization. LISA 2005
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.