


default search action
login - The Usenix Magazine, Volume 27
Volume 27, Number 1, February 2002
- Rob Kolstad:

MOTD. - Tina Darmohray:

Apropos. - Clif Flynt:

Letters to the Editors. - Glen McCluskey:

New Preprocessor Features in C9X.
- Rik Farrow:

Musings.
- Steven M. Tylock:

GVSAGE Visits the Local Technology Show. - Steven M. Tylock:

If Computers Had Blood, We'd Be Called Doctors, Part 2. - Strata R. Chalup:

Consulting Reflections.
- Christopher M. Russo:

What is Your Problem? That Email Was Fine! - Edgar Danielyan:

The Law Moves In. - Trey Harris:

Ask Mr. Know-It-All. - Steve Johnson, Dusty White:

Judgment. - Ray Swartz:

When Do You Plan to Retire?
- Peter H. Salus:

The Bookworm.
Volume 27, Number 2, April 2002
- Clif Flynt:

The Tclsh Spot. - Glen McCluskey:

Math Library Functions in C9X.
- Ofir Arkin:

A Remote Active OS Fingerprinting Tool Using ICMP. - Rik Farrow:

Musings.
- Robert Haskins:

ISPAdmin. - Rick Moen:

A Recipe for a Successful Linux User Group. - Strata R. Chalup:

Wiki, Blog, Zope, and Other Communicative Grunts.
- Ray Swartz:

Planning a Model Retirement. - John Nicholson:

Data Privacy.
- Peter H. Salus, Raymond M. Schneider:

The Bookworm / "Agile Software Development" by Alistair Cockburn.
- Rob Kolstad:

Conference on File and Storage Technologies (FAST '02). - Tina Darmohray, Rob Kolstad:

Point/Counterpoint.
Volume 27, Number 3, June 2002
- Rob Kolstad:

MOTD. - Tina Darmohray:

Apropos.
- Strata R. Chalup:

Uncle Sam as Uncle Spam. - Erin Kenneally:

Evolving Behavioral Boundaries in Cyberspace.
- Adam Turoff:

Practical Perl. - Kragen Sitaker:

Python or Perl: Which is Better? - Clif Flynt:

The Tclsh Spot. - Glen McCluskey:

New I/O Features in C9X.
- Gunnar E. Wolf:

ProtoWrap. - Rik Farrow:

Musings.
- Robert Haskins:

ISPAdmin. - Paco Hope:

Using Jails in FreeBSD for Fun and Profit.
Volume 27, Number 4, August 2002
- Rob Kolstad:

MOTD. - Tina Darmohray:

Apropos.
- Hobbit:

High Availability.
- Erin Kenneally:

Computer Forensics.
- Glen McCluskey:

Wide Characters. - Adam Turoff:

Practical Perl. - Clif Flynt:

The Tclsh Spot.
- Gary Cohen:

Securing FTP. - Rik Farrow:

Musings. - Robert Foust:

Identifying and Tracking Unauthorized 802.11 Cards and Access Points. - Avishai Wool:

Combating the Perils of Port 80 at the Firewall.
- Robert Haskins:

ISPAdmin. - Howard Owen:

The Problem of PORCMOLSULB. - David A. Patterson:

An Introduction to Dependability. - Neil Ashizawa:

Monitoring Strategies for High-Availability Web Apps. - John Sellens:

Ten Reasons to Monitor Your System. - Steven M. Tylock:

If Systems Were Cars, Would Yours Be Doubled Parked? - Steven M. Tylock:

The SysAdmin's Court: Liz Action vs. Jack Trades.
- Peter H. Salus, Nina Karhuluoma:

Have You Locked the Castle Gates? reviewed by Chuck Hardin, and of John Viega and Gary McGraw: Building Secure Software.
Volume 27, Number 5, October 2002
- Rob Kolstad:

MOTD. - Tina Darmohray:

Apropos.
- Strata R. Chalup:

Vive la Révolution! Now Get Over It!
- John Nicholson:

Software Licensing 101.
- Glen McCluskey:

C99 and Compatability. - Adam Turoff:

Practical Perl. - Clif Flynt:

Generating Ethernet Packets.
- Rik Farrow:

Musings, Or What I Did on My Summer Vacation.
- Robert Haskins:

ISPAdmin. - Jozef Skvarcek:

Remote Monitoring with SNMP. - James Carlini:

Cabling: Just the Tip of the Iceberg.
- Peter H. Salus, Anton Chuvakin:

Incident Response, and of Lance Spitzner: Honeypots: Tracking Hackers, reviewed by Eugene Schultz and Russell Shumway.
- Andrew Josey:

Report received August 2002.
Volume 27, Number 6, December 2002
- Rob Kolstad:

MOTD. - Rik Farrow:

In This Issue.
- Kevin Fu, Michael Kaminsky, David Mazières:

Using SFS for a Secure Network File System. - Jared Allison:

Automated Log Procesing. - Lance Spitzner:

HOSUS (Honeypot Surveillance System). - George M. Jones:

The Case for Network Infrastructure Security. - Ofir Arkin:

Security Threats to IP Telephony-Based Networks. - Tom Perrine:

The Kernelized Secure Operating System (KSOS). - Erin Kenneally:

"It Depends": Defining Legal Values for Network Behavior. - Sven Dietrich:

Active Network Defense: Some Concepts and Techniques. - Abe Singer

:
The Regional Information Watch. - Peter H. Salus:

Secure from What?
- Peter H. Salus, Raymond M. Schneider:

Dave Sill: The qmail Handbook reviewed by Dustin Puryear, and of Yukihiro Matsumoto w/translated text by David L. Reynolds: Ruby in a Nutshell.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














