Stop the war!
Остановите войну!
for scientists:
default search action
login - The Usenix Magazine, Volume 25
Volume 25, Number 5, August 2000
- Rob Kolstad:
MOTD. - Tina Darmohray:
apropos.
- Clif Flynt:
The Tclsh Spot. - Glen McCluskey:
Java Performance. - Prithvi Rao:
Using Java.
- Marcus J. Ranum:
The Network Police Blotter. - Rik Farrow:
Musings.
- John Sellens:
System and Network Monitoring. - Mark Burgess:
System Administration Research, Part 3. - Daniel Singer:
Toolman. - William S. Annis:
Pithy Sayings for the UNIX Sysadmin.
- John Nicholson:
Taming the Wild West. - Steve Johnson, Dusty White:
To the Limit. - Christopher M. Russo:
Keeping Employees by Keeping Them Happy.
- Virginia E. Rezmierski, Adriana Carroll, Jamie Hine:
A Study on Incident Costs and Frequencies.
- Peter H. Salus:
The Bookworm.
- Andrew Josey:
Austin Group Status Update. - Joe Gwinn:
POSIX System Services Working Group - Realtime (SSWG-RT).
- Daniel E. Geer Jr.:
From the President. - Peter H. Salus:
N Years Ago: Anniversaries. - Rob Kolstad:
The 1999 - 2000 USACO Report. - Jane-Ellen Long:
Sun Comes Through for USENIX.
Volume 25, Number 6, October 2000
- Rob Kolstad:
MOTD. - Tina Darmohray:
Apropos. - Glen McCluskey:
Letters to the Editor. - Prithvi Rao:
Using Java.
- Barbara Dijker:
Use Your Local Tools. - Marcus J. Ranum:
The Network Police Blotter. - Rik Farrow:
Musings.
- Rob Kolstad:
An Interview With Geoff Halprin. - Geoff Halprin:
An Ode to Risk Management. - Strata Rose Chalup:
Vendor Contract Services. - David K. Z. Harris, Bryan Stansell:
Finding Time To Do It All. - David W. Parter:
Sysadmin Ethics.
- Steve Johnson, Dusty White:
Just Presuppose...
- Peter H. Salus:
The Bookworm.
Volume 25, Number 7, November 2000
- Rik Farrow:
In This Issue.
- Evi Nemeth:
Securing the DNS. - David Brumley:
Repeatable Security. - Steve Romig:
Correlating Log File Entries. - Renaud Deraison, Jordan Hrycaj:
Nessus: The Free Network Security Scanner. - Mudge:
Security Devices that Might Not Be. - Sven Dietrich:
Scalpel, Gauze, and Decompilers. - Carole Fennely:
An Interview with Blaine Burnham.
- Peter H. Salus:
The Bookworm.
Volume 25, Number 8, December 2000
- Rob Kolstad:
MOTD. - Tina Darmohray:
APROPOS. - Mark Burgess:
Letters to the Editor. - John Nicholson:
National Laws and the Net. - Rik Farrow:
Musings.
- Clif Flynt:
The Tclsh Spot. - Glen McCluskey:
Java Performance. - Prithvi Rao:
Using Java.
- Marcus J. Ranum:
The Network Police Blotter. - Gary Bahadur:
Why Should You Enforce a Network Security Policy? - Dario V. Forte:
Using Trinux for Security Testing. - Brian Martin:
A Note on Security Disclosures.
- Robert Haskins:
Mail Message Metering.
- Strata Rose Chalup:
Technical Interviews. - Steve Johnson, Dusty White:
The First Miracle of Management.
- Peter H. Salus:
The Bookworm.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.