Stop the war!
Остановите войну!
for scientists:
default search action
login - The Usenix Magazine, Volume 28
Volume 28, Number 1, February 2003
- Rob Kolstad:
MOTD. - Tina Darmohray:
Letters to the Editor.
- John Nicholson:
Common Problems with Outsourcing Deals and How to Avoid Them.
- Glen McCluskey:
An Introduction to C#. - Clif Flynt:
The Tclsh Spot. - Adam Turoff:
Practical Perl: CPAN, Modules, and the CPAN SHELL.
- Rik Farrow:
Musings. - Peleus G. Uhley:
Web Browser Vulnerabilities 101.
- Strata R. Chalup:
Will the Real "Sysadmin of the Future" Please Stand Up? - Steven M. Tylock:
Confessions of a Sysadmin Turned Salesman. - Robert Haskins:
ISPadmin: Service Provider Book Reviews. - Steve Simmons:
Symlinks and Hard Links Don't Belong in /etc. - Jozef Skvarcek:
Remote Monitoring with SNMP: A Practical Example.
- Greg Hankins:
Introduction to the Border Gateway Protocol.
- Peter H. Salus:
The Bookworm.
Volume 28, Number 2, April 2003
- Rob Kolstad:
MOTD.
- Dan Geer:
Comments of the National Strategy to Secure Cyberspace.
- Timo Sivonen:
IPv6 Configuration on Solaris 9 and freeBSD-4.x.
- Glen McCluskey:
Examining the C# "Hello World" Program. - Clif Flynt:
The Tclsh Spot. - Adam Turoff:
Practical Perl: Fixing Broken Modules.
- Rik Farrow:
Musings. - Tina Darmohray:
Hacking for Fun and Profit. - Anton Chuvakin:
Ups and Downs of UNIX/Linux Host-Based Security Solutions.
- Strata R. Chalup:
Not on My Watch! Filtering Options Revisited. - Stephen Pierzchala:
Compressing Web Output Using mod_gzip and Apache.
- Ray Swartz:
Isn't That a Little Risky?
- Peter H. Salus:
The Bookworm.
Volume 28, Number 3, June 2003
- Rob Kolstad:
MOTD.
- Kragen Sitaker:
Microsoft: What's Next? - Dan Geer:
Getting the Problem Statement Right.
- Travis Howard:
.profile.
- Glen McCluskey:
C# Types. - Kragen Sitaker:
Non-Proprietary Flash Solutions. - Clif Flynt:
The Tclsh Spot: Capturing and Analyzing IP Packets on the AX-4000 Using AxTcl. - Adam Turoff:
Practical Perl: Keeping it Simple.
- Rik Farrow:
Musings.
- Diomidis D. Spinellis:
Organized Pruning of File Sets. - Robert Haskins, Rob Kolstad:
ISPadmin: Bayesian Spam-Filtering Techniques. - Steven M. Tylock:
Private, HMO, and Group Support.
- John Nicholson:
Trends in the Outsourcing Industry. - Erin Kenneally:
Put Your Data Where Your Mouth Is.
- Peter H. Salus:
The Bookworm ; Twenty Years Ago in USENIX.
Volume 28, Number 4, August 2003
- Rob Kolstad:
MOTD.
- Adam Moskowitz:
On Choosing Usernames.
- Nimrod Megiddo, Dharmendra S. Modha:
One Up on LRU.
- Tina Darmohray, Dan Appelman:
What's in a Name?
- Ian Lumb:
Production HPC Reinvented.
- Rik Farrow:
Musings.
- Robert Haskins:
ISPadmin: Service Provider Book Reviews II. - Dan Geer:
Patch Work. - Matthew Hoskins:
Oracle Hot Backup.
- Glen McCluskey:
Working with C# Classes. - Clif Flynt:
The Tclsh Spot: Monitor Your System with expect. - Adam Turoff:
Practical Perl: Cleaning Up with Modules.
- Ray Swartz:
Where Can I Find a Good Investment?
- Andrew Josey:
Updates.
- Peter H. Salus:
The Bookworm; Twenty-Five Years Ago in UNIX.
Volume 28, Number 5, October 2003
- Rob Kolstad:
MOTD.
- Tina Darmohray:
Value Added.
- Ryan Kereliuk:
Introducing Voice Over Internet Protocol Technology.
- Rik Farrow:
Musings.
- Robert Haskins:
ISPadmin: Managing and Providing ISP Services. - Adam Moskowitz:
"Eat Your Own Dog Food".
- Glen McCluskey:
Using C# Properties and Static Members. - Clif Flynt:
The Tclsh Spot: Client Server Sockets. - Adam Turoff:
Practical Perl: Using Object Factories.
- Peter H. Salus:
The Bookworm; Networking Anniversaries.
Volume 28, Number 6, December 2003
- Rik Farrow:
In this Issue.
- Tom Perrine:
The End of crypt() Passwords ... Please? - Chris Wysopal:
Learning Security QA from the Vulnerability Researchers. - Jason Damron:
Identifiable Fingerprints in Network Applications. - Edward Balas:
Sebek: Covert Glass-Box Host Analysis. - Markus Jakobsson, Filippo Menczer:
Untraceable Email Cluster Bombs. - Mudge:
Insider Threat. - Abe Singer:
Life Without Firewalls. - Renaud Deraison, Ron Gula:
Nessus. - Dario V. Forte:
Coordinated Incident Response Procedures. - Ryan Russell:
How Are We Going to Patch All These Boxes? - Erin Kenneally:
Evidence Enhancing Technology.
- Peter H. Salus:
The Bookworm; Nearly 20 Years Ago in U[SE]NIX.
- Ellie Young:
2004 Election for Board of Directors.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.