Last update: Tue Jul 12 09:12:58 MDT 2016
Volume 1, Number 1, May / June, 1992Robert Ward Publisher's Forum . . . . . . . . . . . 2--2 Dorian Deane Orchestrating a Kinder, Gentler Disaster 3 David Fiedler My Favorite One-Liners: Some Useful Shell Programs . . . . . . . . . . . . . 7 G. Clark Brown Testing Capabilities in Terminals and Emulators . . . . . . . . . . . . . . . 11 Leor Zolman A Community-Style Overnight Job Spooler 17 Chris Hare Where Did that Core File Come From? . . 29 Sydney Weinstein USENET ELM: A Case Study in Portability between UNIX Systems . . . . . . . . . . 32 R. King Ables Beware the Trojan Horse . . . . . . . . 43 Bruce H. Hunter Installing AIX . . . . . . . . . . . . . 48 Anonymous Call for Papers . . . . . . . . . . . . 50 Chris Hare How UNIX Password Controls Work . . . . 53 Anonymous New Products . . . . . . . . . . . . . . 61 Anonymous New Messages . . . . . . . . . . . . . . 63 Anonymous Advertiser Index . . . . . . . . . . . . 64
R. King Ables Security and Electronic Mail . . . . . . ?? Anonymous Advertiser Index . . . . . . . . . . . . ?? Anonymous Call for Papers . . . . . . . . . . . . ?? Anonymous New Messages . . . . . . . . . . . . . . ?? Anonymous New Products . . . . . . . . . . . . . . ?? Anonymous Source Code Availability . . . . . . . . ?? Chris Hare The UNIX File System Debugger --- FSDB ?? Bruce H. Hunter Printer Administration Potpourri for Large-Scale UNIX Systems . . . . . . . . ?? Larry Reznick An older Option in C for find . . . . . ?? Bjorn Satdeva Questions and Answers . . . . . . . . . ?? Mark Stockton More Simple Scripts . . . . . . . . . . ?? Robert Ward Publisher's Forum . . . . . . . . . . . ?? Sydney Weinstein Joining USENET . . . . . . . . . . . . . ?? Elizabeth Zinkann Books: A User's Report . . . . . . . . . ?? Leor Zolman A Background Job Launcher . . . . . . . ??
Robert Ward Publisher's Forum . . . . . . . . . . . 2--2 Bjorn Satdeva Questions and Answers . . . . . . . . . 5 Chris Hare Getting the Info --- u386mon . . . . . . 13 Jeff Courington AIX Printer Support: Colon Files . . . . 29 Bruce H. Hunter UNIX Networking in the 90s --- DOS/UNIX Connectivity . . . . . . . . . . . . . . 35 Leor Zolman A System Load Monitoring Trilogy . . . . 40 G. Clark Brown The Cure for Hung Up, Locked Up, and Frozen Terminals . . . . . . . . . . . . 47 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 53 Anonymous Source Code Availability . . . . . . . . 57 Larry Reznick Using Regular Expressions . . . . . . . 59 Anonymous Call for Papers . . . . . . . . . . . . 64 Anonymous New Products . . . . . . . . . . . . . . 66 Anonymous New Messages . . . . . . . . . . . . . . 70 Anonymous Advertiser Index . . . . . . . . . . . . 72
Robert Ward Publisher's Forum . . . . . . . . . . . 3--3 Larry Reznick Setting Up a Printer's terminfo Definition . . . . . . . . . . . . . . . 5 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 14 Judith Ashworth rdist to the Rescue! . . . . . . . . . . 18 Bjorn Satdeva Questions and Answers . . . . . . . . . 23 Steven G. Isaacson sukill: Stopping Unruly Processes . . . 31 David M. Knight Coherent 4.0: A Desktop UNIX Clone . . . 37 Anonymous Source Code Availability . . . . . . . . 46 Leor Zolman In-line Input or Bust . . . . . . . . . 47 Chris Hare Getting the Info --- sar . . . . . . . . 50 Anonymous New Products . . . . . . . . . . . . . . 58 William Genosa The System Performance Monitor . . . . . 62 Anonymous New Messages . . . . . . . . . . . . . . 67 Bruce Hunter An Administrator's Guide to the UNIX Software Jungle . . . . . . . . . . . . 68 R. King Ables Putting cron to Work for You . . . . . . 72 Anonymous Call for Papers . . . . . . . . . . . . 77 Anonymous Advertiser Index . . . . . . . . . . . . 80
Robert Ward Publisher's Forum . . . . . . . . . . . 2--2 Larry Reznick Setting Up a Printer Interface File . . 5 Bjorn Satdeva Questions and Answers . . . . . . . . . 13 Leor Zolman A Project Directory Management Facility 19 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 29 G. Clark Brown Terminal Choices: The Right Tool for the Job . . . . . . . . . . . . . . . . . . 34 Laurie Sefton UNIX Security in a Networked Environment 38 Dorian Deane The Short Life and Hard Times of an Internet Packet . . . . . . . . . . . . 42 Sydney S. Weinstein Zombie Processes . . . . . . . . . . . . 49 Bruce H. Hunter Mail and Sendmail Administration: Part 1 53 William Genosa The Filesystem Activity Monitor . . . . 59 Chris Hare UUCP --- The User's Perspective . . . . 64 Anonymous Call for Papers . . . . . . . . . . . . 71 Anonymous Source Code Availability . . . . . . . . 78 Anonymous New Products . . . . . . . . . . . . . . 82 Anonymous New Messages . . . . . . . . . . . . . . 86 Anonymous Advertiser Index . . . . . . . . . . . . 88
Robert Ward Publisher's Forum . . . . . . . . . . . 2--2 Leor Zolman An lp Enhancement . . . . . . . . . . . 5 Steven G. Isaacson maxtab: Automatic File Pruning . . . . . 33 Larry Reznick Turning Numlock On . . . . . . . . . . . 39 R. King Ables Where Did you Get That Tape? . . . . . . 41 Paul A. Sand Automatically Cleaning Temporary Directories . . . . . . . . . . . . . . 47 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 57 Beirne Konarski Easy Troubleshooting with crash . . . . 61 Bruce H. Hunter Mail and Sendmail Administration: Part 2 69 Bjorn Satdeva Questions and Answers . . . . . . . . . 75 Chris Hare UUCP: Administering BNU . . . . . . . . 78 Anonymous Source Code Availability . . . . . . . . 100 Anonymous Call for Papers . . . . . . . . . . . . 101 Anonymous New Products . . . . . . . . . . . . . . 102 Anonymous New Messages . . . . . . . . . . . . . . 110 Anonymous Advertiser Index . . . . . . . . . . . . 112
Robert Ward Publisher's Forum . . . . . . . . . . . 2--2 Steven G. Isaacson fchange: A File System Watchdog . . . . 5 David S. Linthicum Tuning for X . . . . . . . . . . . . . . 13 Larry Reznick Using Little Languages . . . . . . . . . 31 Jeff Courington The Object Data Manager (ODM) on AIX . . 37 Sherwood Botsford quota: A Gentle Enforcer . . . . . . . . 43 Paul A. Sand A Form Letter Utility for UNIX . . . . . 49 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 55 William Genosa The Sentinel . . . . . . . . . . . . . . 59 Bjorn Satdeva Questions and Answers . . . . . . . . . 63 Jeff Courington Two Handy AIX Tools: The Failed Login Report and \tt lptran . . . . . . . . . 69 Anonymous Call for Papers . . . . . . . . . . . . 74 Chris Hare Configuring UUCP: Version 2 . . . . . . 77 Anonymous Source Code Availability . . . . . . . . 85 Anonymous New Products . . . . . . . . . . . . . . 87 Anonymous New Messages . . . . . . . . . . . . . . 94 Anonymous Advertiser Index . . . . . . . . . . . . 96
Robert Ward Publisher's Forum . . . . . . . . . . . 2--2 Eric T. Horne newping: Remote Host Downtime Detection 5 R. King Ables Distributing Local Information with NIS 13 David S. Linthicum Making the Most of NFS . . . . . . . . . 18 Larry Reznick Using cron and crontab . . . . . . . . . 29 Chris Hare More Network Security: Equivalency . . . 35 Ed Schaefer Using the UNIX Pipe in C . . . . . . . . 39 Jeff Courington Printer Encryption on AIX . . . . . . . 47 Leor Zolman User Report: \tt CTAR and Company . . . 53 Chris Hare SCCS: Keeping It under Control . . . . . 63 Leo Willems A Disk Usage Report Generator . . . . . 75 Larry Reznick Which Day of the Week is This? . . . . . 79 Anonymous Call for Papers . . . . . . . . . . . . 86 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 87 Anonymous New Messages . . . . . . . . . . . . . . 90 Anonymous Source Code Availability . . . . . . . . 96 Anonymous New Products . . . . . . . . . . . . . . 97 Anonymous Advertiser Index . . . . . . . . . . . . 104
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4 R. King Ables Backups with Standard UNIX Commands . . 6 Jon Alder and Ed Schaefer Fast Backup and Restore Scripts for DAT Drives . . . . . . . . . . . . . . . . . 19 Anonymous Call for Papers . . . . . . . . . . . . 45 Judith Ashworth Dump and Restore . . . . . . . . . . . . 49 Bjorn Satdeva Questions and Answers . . . . . . . . . 63 Chris Hare Monitoring Login Activity . . . . . . . 67 Anonymous InstantInfo . . . . . . . . . . . . . . 71 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 75 Russ Hill How to Login to Any UNIX System and Get Your E-Mail . . . . . . . . . . . . . . 79 Eric Horne newping Revisited . . . . . . . . . . . 85 Larry Reznick Setting Up a High-Speed Modem . . . . . 95 Anonymous Source Code Availability . . . . . . . . 102 Anonymous New Products . . . . . . . . . . . . . . 103 Anonymous New Messages . . . . . . . . . . . . . . 110 Anonymous Advertiser Index . . . . . . . . . . . . 112
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4 Chris Hare C2 Security: Is Big Brother Watching? 6 Bjorn Satdeva Questions and Answers . . . . . . . . . 25 Bill Rieken UNIX Security Facilities . . . . . . . . 33 Larry Reznick Timing Out Idle Users . . . . . . . . . 43 Don Pipkin A Revised sudo: Managing Super-User Privileges . . . . . . . . . . . . . . . 51 Robert Ward and Scott Graham A Form Letter Facility for E-Mail . . . 59 Steven G. Isaacson checkcron: Checking for the Unexpected 71 Leor Zolman Building a Secure Journal/Logging Utility with Encryption . . . . . . . . 75 Ben Reaves \tt Reading beyond a Bad Header with \tt tar . . . . . . . . . . . . . . . . . . 89 Anonymous Call for Papers . . . . . . . . . . . . 91 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 97 Anonymous Source Code Availability . . . . . . . . 99 Anonymous InstantInfo . . . . . . . . . . . . . . 101 Anonymous New Products . . . . . . . . . . . . . . 103 Anonymous New Messages . . . . . . . . . . . . . . 110 Anonymous Advertiser Index . . . . . . . . . . . . 112
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4 Chris Hare Asynchronous Networking: PPP and SLIP 6 Emmett Dulaney Communicating with Other Users . . . . . 31 Chris Bush Internet Online Services: \tt archie . . 37 Arthur Messenger Configuring FTP . . . . . . . . . . . . 45 Matthew Ganis Configuring DNS . . . . . . . . . . . . 61 Packey Velleca Reproducing Boot-Disk Filesystems . . . 71 Patrick M. Ryan Disk Mirroring with NFS . . . . . . . . 79 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 86 Larry Reznick Weeding Your System . . . . . . . . . . 91 Bjorn Satdeva Questions and Answers . . . . . . . . . 101 Bill Rieken UNIX Accounting Facilities . . . . . . . 107 Anonymous Call for Papers . . . . . . . . . . . . 109 Anonymous InstantInfo . . . . . . . . . . . . . . 113 Anonymous Source Code Availability . . . . . . . . 116 Anonymous New Products . . . . . . . . . . . . . . 117 Anonymous New Messages . . . . . . . . . . . . . . 124 Anonymous Advertiser Index . . . . . . . . . . . . 128
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4 William Genosa Monitoring Performance with iostat and vmstat . . . . . . . . . . . . . . . . . 6 John Lees A Host Health Probe . . . . . . . . . . 17 Clive King A Distributed File Location and Properties Checker . . . . . . . . . . . 32 Brad Jacobs and Thomas Kraus Heterogeneous Password Assignment . . . 50 Thomas Richter Improved Error Reporting in AIX . . . . 67 Carlos Francisco Gomez UUCP + Pager = Automated Warning System 71 Chris Bush Internet Online Services: \tt gopher . . 79 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 85 Bjorn Satdeva Questions and Answers . . . . . . . . . 91 John Caywood Installing Third-Party Applications . . 97 Anonymous Call for Papers . . . . . . . . . . . . 99 Larry Reznick Multiport Serial Installation . . . . . 101 Stephen Peterson RS/6000 Backup and Restore Scripts . . . 107 Anonymous Source Code Availability . . . . . . . . 108 Anonymous New Products . . . . . . . . . . . . . . 112 Anonymous InstantInfo . . . . . . . . . . . . . . 117 Anonymous New Messages . . . . . . . . . . . . . . 119 Anonymous Advertiser Index . . . . . . . . . . . . 120
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4 Dave Brillhart The Downtime Notification and Tracking System . . . . . . . . . . . . . . . . . 6 Steven G. Isaacson stat: New Access to Your File System . . 24 Brett Wynkoop The Netgroup Advantage . . . . . . . . . 50 Matt Ganis Killidle Revisited . . . . . . . . . . . 59 Larry Reznick Time for UNIX . . . . . . . . . . . . . 65 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73 Carl Nichols and Ed Schaefer Archiving Informix On-line from \tt cron 79 Fred Lenk Setting up a Secure User Environment with Standard UNIX Tools . . . . . . . . 85 Anonymous New Products . . . . . . . . . . . . . . 102 Anonymous InstantInfo . . . . . . . . . . . . . . 107 Anonymous Call for Papers . . . . . . . . . . . . 108 Bjorn Satdeva Questions and Answers . . . . . . . . . 109 Anonymous Source Code Availability . . . . . . . . 112 Anonymous New Messages . . . . . . . . . . . . . . 114 Anonymous Advertiser Index . . . . . . . . . . . . 120
Robert Ward Editor's Forum . . . . . . . . . . . . . 4--4 Emmett Dulaney When Inodes Go Bad . . . . . . . . . . . 6 John Caywood Setting Up File Systems and Partitions 18 Rob MacKinnon and Mark Dapoz Remote System Security: A Secure Net and SLIP Solution . . . . . . . . . . . . . 26 John Lees Sharing Local Software on a Network . . 48 Larry Reznick Smarter Mail Addresses . . . . . . . . . 70 Chris Hare The UNIX Process Management System . . . 75 Anonymous Call for Papers . . . . . . . . . . . . 83 Jonathan Feldman A Transparent UNIX/PC Connection via NFS 85 Anonymous InstantInfo . . . . . . . . . . . . . . 89 Bjorn Satdeva Questions and Answers . . . . . . . . . 91 Bill Genosa AIX's Logical Volume Manager . . . . . . 95 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 102 Thomas Richter A refer Macro Package . . . . . . . . . 107 Anonymous Online Source Code . . . . . . . . . . . 109 Anonymous New Products . . . . . . . . . . . . . . 113 Anonymous New Messages . . . . . . . . . . . . . . 118 Anonymous Advertiser Index . . . . . . . . . . . . 120
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4 William Genosa Sybase Database Administration . . . . . 6 Larry Reznick Checking User Security . . . . . . . . . 22 Ed Schaefer Copying and Moving Directories . . . . . 36 Clive King and Adrian Rixon Automating Symbolic Link Generation . . 43 Chris Hare File Version Numbering . . . . . . . . . 48 Emmett Dulaney Standard UNIX Network Diagnostic Tools 53 Tom Clark Using fack to Check ufs File Systems . . 65 Packey Velleca A Method for Verifying System Integrity 89 Anonymous Advertiser Index . . . . . . . . . . . . 96--97 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 109 Anonymous Call for Papers . . . . . . . . . . . . 112 Bjorn Satdeva Questions and Answers . . . . . . . . . 117 Anonymous Online Source Code . . . . . . . . . . . 118 Anonymous New Products . . . . . . . . . . . . . . 122 Anonymous New Messages . . . . . . . . . . . . . . 127
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6 Neal S. Jamison Computer Security Revisited: Physical Security . . . . . . . . . . . . . . . . 8 Steven G. Isaacson Logging rm and kill Requests . . . . . . 14 Chris Cox \tt suFirewall: Creating a Controlled Setuid Environment . . . . . . . . . . . 24 Fred Brunet fcd: A Smart Change Directory . . . . . 33 Dale Panattoni Printer Sharing between UNIX and Windows for Workgroups . . . . . . . . . . . . . 41 John Woodgate Using syslog . . . . . . . . . . . . . . 50 Larry Reznick Setting Priorities . . . . . . . . . . . 59 Robert Berry Monitoring and Optimizing NFS Performance . . . . . . . . . . . . . . 66 Packey Velleca A Shell-Based Resource Scheduler . . . . 77 Anonymous Advertiser Index . . . . . . . . . . . . 96--97 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 99 William Genosa Sybase Database Administration: Part 2 107 Bjorn Satdeva Questions and Answers . . . . . . . . . 117 Anonymous Call for Papers . . . . . . . . . . . . 119 Anonymous New Products . . . . . . . . . . . . . . 122--124, 128 Anonymous New Messages . . . . . . . . . . . . . . 125--127
Robert Berry prq: A Print Queue Monitor and Manager ?? William Genosa Sybase Database Administration: Part 3 ?? Chris Hare Subnetting: Networking One Piece at a Time . . . . . . . . . . . . . . . . . . ?? John Lees Signals and Scripts . . . . . . . . . . ?? Lars Magnusson An Internet Gate for a Local Email System . . . . . . . . . . . . . . . . . ?? Andy Papp NIS+ Security . . . . . . . . . . . . . ?? Larry Reznick Remote Login Menus . . . . . . . . . . . ?? Thomas Richter Login Surveillance and AIX . . . . . . . ?? Bjorn Satdeva DHCP: The Next Generation Host Configuration Scheme . . . . . . . . . . ?? Bjorn Satdeva Questions and Answers . . . . . . . . . ?? John Wetsch Multilayered Security . . . . . . . . . ?? Elizabeth Zinkann Books: A User's Report . . . . . . . . . ??
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6 Chris Hare Network Construction: Using a Firewall 8 Bjorn Satdeva Questions and Answers . . . . . . . . . 33 Emmett Dulaney Understanding Filesystems . . . . . . . 40 Stephen Peterson Managing tty Attributes in AIX . . . . . 53 Marty Leisner File Management Tools . . . . . . . . . 59 Larry Reznick Finding Disk Hogs . . . . . . . . . . . 79 Steven G. Isaacson Customizing Your Calendar Program . . . 91 John Lees Printing: BSD or System V? . . . . . . . 97 Anonymous Advertiser Index . . . . . . . . . . . . 104--105 Larry Reznick Coordinating Password and Group Files 113 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 115 Russ Hill Creating New Users with perl . . . . . . 121 Anonymous Call for Papers . . . . . . . . . . . . 123 Anonymous New Products . . . . . . . . . . . . . . 130 Anonymous New Messages . . . . . . . . . . . . . . 136
Larry Reznick Publisher's Forum . . . . . . . . . . . 6--6 Arthur Donkers Managing sendmail in a Mixed UUCP/PPP Environment . . . . . . . . . . . . . . 8 Ed Schaefer A Server-Based Date/Time Synchronizer for TCP/IP . . . . . . . . . . . . . . . 28 John Kinsella A WWW-Based Computer Support System . . 39 Packey P. Velleca Making Tape-to-Tape Copies . . . . . . . 51 Donald C. Stone UNIX, TCP/IP, and Macs . . . . . . . . . 63 Kyle Gleed and Scott Tarvainen Using SQL in Shell Scripts . . . . . . . 73 Bjorn Satdeva Questions and Answers . . . . . . . . . 85 Andrew B. Sherman and Yuval Lirov Surviving Large-Scale Distributed Computing Powerdowns . . . . . . . . . . 93 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 101 Anonymous Advertiser Index . . . . . . . . . . . . 104--105 Brad Weinert PCs and Serial X . . . . . . . . . . . . 111 Matt Ganis Implementing SOCKS . . . . . . . . . . . 117 Anonymous Call for Papers . . . . . . . . . . . . 119 Larry Reznick Setting Up an HP-UX Mail Hub . . . . . . 123 Anonymous New Products . . . . . . . . . . . . . . 128 Anonymous New Messages . . . . . . . . . . . . . . 134
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6 Chris Cox rlock: A Distributed File Locking Utility . . . . . . . . . . . . . . . . 8 Lisa Lees Unidentified File Objects . . . . . . . 24 Tom Everson closeit: A Login Management Tool . . . . 39 Larry Reznick Creating terminfo Source from Binaries 49 Bill Moraca AIX's \tt backup and \tt restore Utilities . . . . . . . . . . . . . . . 57 Jack Tuszynski Automating Operating System Configuration . . . . . . . . . . . . . 78 Mark McDonagh Automated Numeric Paging via uucp . . . 95 Bjorn Satdeva Questions and Answers . . . . . . . . . 103 Anonymous Advertiser Index . . . . . . . . . . . . 104--105 Donald Brown Creating Filters for BSD Print Spoolers 111 Stephen Friedl and Ed Schaefer Time Services from the U.S. Naval Observatory . . . . . . . . . . . . . . 117 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 125 Anonymous Call for Papers . . . . . . . . . . . . 127 Anonymous New Products . . . . . . . . . . . . . . 130 Anonymous New Messages . . . . . . . . . . . . . . 135
Colt Johnson Real-Time between DOS, UNIX, and MVS . . 8 Arthur Donkers A UNIX/Windows 95 Implementation . . . . 27 Mark Baker Integrating Automounter into NIS across Two Subnets . . . . . . . . . . . . . . 40 Kimbol Soques and Bruce Altman UNIX as a DOS File and Print Server . . 45 Larry Reznick Hiding UNIX Applications in Utility Wrappers . . . . . . . . . . . . . . . . 68 David Leibfritz A UNIX Print Server for UNIX Workstations, PCs, and Macs . . . . . . 86 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 99 Emmett Dulaney Understanding Run Levels . . . . . . . . 103 Chris Hare procmon: A Process Monitor . . . . . . . 109
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6 Tim Mayfield logit: A Log File Manager . . . . . . . 8 Jeffrey Soto and Ravindra Nemlekar Configurable Subscription-Based Scripts for System Monitoring . . . . . . . . . 12 Hendrik-Jan Thomassen A termcap/terminfo Description for xterm 44 Ed Schaefer and Charles Leonard Converting Data between UNIX and Windows 67 Anonymous Call for Papers . . . . . . . . . . . . 86 Michael Harold Creating Online Help for vi . . . . . . 87 Anonymous Advertiser Index . . . . . . . . . . . . 88--89 Bjorn Satdeva Questions and Answers . . . . . . . . . 97 Anonymous New Products . . . . . . . . . . . . . . 101 Packey P. Velleca Comparing Technologies for Long-Term, High-Capacity Archives . . . . . . . . . 103 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 113 Larry Reznick Scheduled Rebooting . . . . . . . . . . 117
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6 Jonathan Feldman Using Linux as a Router . . . . . . . . 8 Jay Allen Migrating to an Automounted Network Filesystem . . . . . . . . . . . . . . . 19 Ernest H. Rice, III Kernel Tuning for System I/O under SCO UNIX . . . . . . . . . . . . . . . . . . 33 Michael Harold Porting Serial I/O Applications to Distributed Environments . . . . . . . . 41 Arthur Donkers Linux as an Internet Server . . . . . . 52 Emmett Dulaney Handling Permissions between UNIX and NetWare . . . . . . . . . . . . . . . . 69 John Woodgate Using fsck to Repair a Filesystem . . . 73 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 79 Bill Gray SM2UR: Simple-Minded System Monitoring and Uptime Reporting . . . . . . . . . . 85 Anonymous Advertiser Index . . . . . . . . . . . . 88 Anonymous Call for Papers . . . . . . . . . . . . 94 Anonymous New Messages . . . . . . . . . . . . . . 100 Anonymous New Products . . . . . . . . . . . . . . 101
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6 Jonathan Feldman Simple Security: A GroupWise/SMTP Connection . . . . . . . . . . . . . . . 8 Steven G. Isaacson isascii: The Easy Way to Work around Binary Files . . . . . . . . . . . . . . 18 Marty Leisner Managing Disk Space . . . . . . . . . . 31 Charles Bundy HTML as a Graphical User Interface for Sys Admin Tasks . . . . . . . . . . . . 51--56, 59, 60, 62, 63 Bjorn Satdeva Questions and Answers . . . . . . . . . 65 Thomas Richter Password Verification in AIX Version 4 69 Anonymous Advertiser Index . . . . . . . . . . . . 72 Anonymous New Products . . . . . . . . . . . . . . 76 Ed Schaefer and Fred Brunet Converting UNIX Filenames to MS-DOS . . 81 Anonymous Call for Papers . . . . . . . . . . . . 86 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 87 Anonymous Sys Admin Contents: 1992--1995 . . . . . 91--102 Anonymous New Messages . . . . . . . . . . . . . . 103
Arthur Donkers Using Your Web Browser as a GUI . . . . ?? Gilbert Held Retrieving Information via Email . . . . ?? Colt S. Johnson Interlinking UNIX and MVS . . . . . . . ?? Bjorn Satdeva Questions and Answers . . . . . . . . . ?? Scott White The Administrator's Menu Program . . . . ?? Elizabeth Zinkann Books: A User's Report . . . . . . . . . ??
Steven Baum Graphical User Interface Development Systems . . . . . . . . . . . . . . . . ?? Richard L. Brownrigg Customizing X Window Sessions with \tt fvwm . . . . . . . . . . . . . . . . . . ?? Uri Guttman The Directory Stack . . . . . . . . . . ?? Russ Hill Consolidating Startup Shell Scripts . . ?? Doug Morris Simple Screen Auto-Locking Mechanisms ?? Bjorn Satdeva Questions and Answers . . . . . . . . . ?? Tom Tessier Shell Scripting and the WWW: Creating a Searchable Web Database . . . . . . . . ?? Elizabeth Zinkann Books: A User's Report . . . . . . . . . ??
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6 Thom Garrett PPP Over High-Speed Serial Cards . . . . 8 David Rush IP Networking Over ATM . . . . . . . . . 22 Arthur Donkers Automating Your Network Maintenance . . 35 David Dykes Automated System Administrator's Pager 51 Arthur J. D'Adamo \tt SelectNews.pl: Perl Script for Selective News Delivery . . . . . . . . 59 Anonymous Advertiser Index . . . . . . . . . . . . 64 Anonymous Career Opportunities . . . . . . . . . . 66 Bjorn Satdeva Questions and Answers . . . . . . . . . 67 Anonymous New Products . . . . . . . . . . . . . . 70 Anonymous Call for Papers . . . . . . . . . . . . 74 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 75 Anonymous New Messages . . . . . . . . . . . . . . 80
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6 Eric Knudstrup Samba . . . . . . . . . . . . . . . . . 8 Arthur Donkers Building a Linux Firewall . . . . . . . 12 Huiqi Liu Low-Cost Email Connection Between UNIX and Macs . . . . . . . . . . . . . . . . 37 Al Koscielny A Windows NT Fileserver with UNIX Clients . . . . . . . . . . . . . . . . 43 Stefan C. Johnson Attaching Non-TCP/IP Devices with \tt telnet . . . . . . . . . . . . . . . . . 51 Anonymous Advertiser Index . . . . . . . . . . . . 56 David Collier-Brown Remote Password Update . . . . . . . . . 63 Anonymous Career Opportunities . . . . . . . . . . 72 Bjorn Satdeva Questions and Answers . . . . . . . . . 74 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 79 Anonymous Call for Papers . . . . . . . . . . . . 83 Anonymous New Products . . . . . . . . . . . . . . 84 Anonymous New Messages . . . . . . . . . . . . . . 88
Robert Ward Editor's Forum . . . . . . . . . . . . . 7--7 Curtis Preston Oracle Database Backup . . . . . . . . . 8 Benjamin J. Anello Simplifying Site-Wide Backups . . . . . 24 Cory Bear How Safe is Your Online Backup . . . . . 26 Arthur Donkers Enhance Your Web-Based GUI with Java . . 35, 36, 39, 40, 42, 43, 45, 47, 50 Anonymous Advertiser Index . . . . . . . . . . . . 48 Ed Schaefer Sybaccess: A Menu-Driven Interface to Sybase . . . . . . . . . . . . . . . . . 51 Anonymous New Products . . . . . . . . . . . . . . 63 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 67 Anonymous Career Opportunities . . . . . . . . . . 72 Bjorn Satdeva Questions and Answers . . . . . . . . . 77 Anonymous Call for Papers . . . . . . . . . . . . 78
Matthew Cheek Automating Large Sybase Database Backups ?? Michael S. Hill How to Develop a Distributed Filesystem Model . . . . . . . . . . . . . . . . . ?? Colt Johnson Interprocess Communication Between UNIX and MVS Applications Using Sockets . . . ?? Doug Morris Hidden Dangers of NFS Mounting Foreign Filesystems . . . . . . . . . . . . . . ?? Bjorn Satdeva Questions and Answers . . . . . . . . . ?? Jon Alder and Ed Schaefer A Dispatcher for Database Engine Alarms ?? Scott Tarvainen A System Administration Log Program Using Tcl/Tk . . . . . . . . . . . . . . ?? Elizabeth Zinkann Books: A User's Report . . . . . . . . . ??
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6 Emmett Dulaney Taking Shell Scripts Beyond Simple Batch Functionality . . . . . . . . . . . . . 8 Robert Ess Configuration Tracking . . . . . . . . . 20 Carolyn Conner Surviving the User Maintenance Jungle 38 Danny Lawrence and Scott Beimer Access Oracle from CGI Scripts Using Perl . . . . . . . . . . . . . . . . . . 46 Greg A. Wade Restricting Machine Access with the rma `Shell' . . . . . . . . . . . . . . . . 55 Arthur Donkers Creating User Islands . . . . . . . . . 61 Anonymous Advertiser Index . . . . . . . . . . . . 72 Anonymous Career Opportunities . . . . . . . . . . 74 Anonymous Call for Papers . . . . . . . . . . . . 78 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 79 Anonymous New Products . . . . . . . . . . . . . . 84 Anonymous New Messages . . . . . . . . . . . . . . 88
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Arthur Donkers Building a Secure Web Site . . . . . . . 8 Cornelius Cook Configuring a Minimal Web Server . . . . 23 Gilbert Held Determining a Web Server Connection Rate to the Internet . . . . . . . . . . . . 32 Jonathan Feldman Building a Linux Web Server . . . . . . 41 Lars Magnusson Local News -- Exploring Web-based Threaded Discussion Server Functionality 47 Lisa Lees Ethernet to Your Home . . . . . . . . . 53 Luca Salvadori Web Site Management by Mail . . . . . . 57 Anonymous Call for Papers . . . . . . . . . . . . 63 Steven G. Isaacson fchange: The Sys Admin Watchdog . . . . 66 Doug Morris Techniques for Simulating Multiple Group Ownership . . . . . . . . . . . . . . . 71 Anonymous New Products . . . . . . . . . . . . . . 76 Anonymous New Products . . . . . . . . . . . . . . 76--79 Anonymous Advertiser Index . . . . . . . . . . . . 80 Anonymous New Messages . . . . . . . . . . . . . . 80--80 Anonymous Career Opportunities . . . . . . . . . . 82 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 85 Anonymous Call for Papers . . . . . . . . . . . . 93 Anonymous New Messages . . . . . . . . . . . . . . 96
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 David O'Brien Recognizing and Recovering from Rootkit Attacks . . . . . . . . . . . . . . . . 8, 10, 13, 14, 16, 19, 20 David Endler Creating a Secure CGI Environment . . . 21--24, 27, 29 Matthew Cheek Enhanced Security on Digital UNIX . . . 31, 32, 35, 36, 38, 40, 42, 44, 46 Arthur Donkers Assorted Security Tips for UNIX . . . . 48, 50, 52, 54--58 Jack Maynard An Introduction to Client/Server Security . . . . . . . . . . . . . . . . 59--62 Anonymous Call for Papers . . . . . . . . . . . . 63--63 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 65--68 Bjorn Satdeva Questions and Answers . . . . . . . . . 69--72 Bjorn Satdeva Questions and Answers . . . . . . . . . 69--72 Anonymous Career Opportunities . . . . . . . . . . 73--75 Anonymous Career Opportunities . . . . . . . . . . 73--75 Anonymous New Products . . . . . . . . . . . . . . 76--79 Anonymous New Messages . . . . . . . . . . . . . . 80--80
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Dan Reis and Bill Welch Performance Management on SCO OpenServer 8, 10, 14, 16, 18--21 Gilbert Held Performance Planning in an NT Environment . . . . . . . . . . . . . . 22, 25--28 Richard S. Smith Performance Management in an RDBMS Environment . . . . . . . . . . . . . . 29, 30, 32, 34, 36, 38 Michael Hill Understanding syslog.conf . . . . . . . 39, 40, 42, 44, 46, 48, 50--53 Jeffrey B. Davis Detecting System Intruders . . . . . . . 54, 56, 58 Mark Mellman Creating a Web Help Desk with sybperl 59--64 William Steen and Emmett Dulaney Internet Security Information Sources 65, 66, 68, 71, 73, 74 Anonymous Advertiser Index . . . . . . . . . . . . 72--72 Bjorn Satdeva Questions and Answers . . . . . . . . . 75--76 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 77, 78, 80--82 Anonymous Career Opportunities . . . . . . . . . . 83--83 Anonymous Call for Papers . . . . . . . . . . . . 84--84 Anonymous New Products . . . . . . . . . . . . . . 85--88
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Arthur Donkers Writing Linux Device Drivers . . . . . . 8 Charles C. Bundy, IV Connect LAN Users to the Internet Using Linux and IP Masquerade . . . . . . . . 22 Jonathan Feldman Eschewing the Internet for External Data Sharing . . . . . . . . . . . . . . . . 42 Russ Hill Disaster Prevention . . . . . . . . . . 52 Michael Hall Creating Graphical Wrappers with Tcl/Tk 65 David Liebfritz and Michael Eisenberg Administering Network Information for PCs Using a Database . . . . . . . . . . 74 Elizabeth Zinkann Book: A User's Report . . . . . . . . . 82 Bjorn Satdeva Questions and Answers . . . . . . . . . 87
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Brian Rice A Web-based Graphical Front End for \tt sar . . . . . . . . . . . . . . . . . . 8 Chuck Boeheim Patrol . . . . . . . . . . . . . . . . . 16 Bruce Alan Wynn Automating Basic System Activity Monitoring . . . . . . . . . . . . . . . 31 Carolyn Conner Automating Database Space Monitoring . . 41 Dave Plonka Managing Sys Admin Tasks with GNATS . . 51 Matthew Cheek A Menu Program for Users and Admins Alike . . . . . . . . . . . . . . . . . 57 Dejan Muhamedagi\'c PPP Connections Made Easy . . . . . . . 61--63, 65 Elizabeth Zinkann Book: A User's Report . . . . . . . . . 67 Bjorn Satdeva Questions and Answers . . . . . . . . . 71
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Tim Cera Supporting PostScript Printing Under System V . . . . . . . . . . . . . . . . 7 Doris Hoffman Color Printing Management in a UNIX Environment . . . . . . . . . . . . . . 20 Victor Hazlewood Software-based Cluster Computing . . . . 27 Sean MacGuire Big Brother: A Web-Based UNIX System and Network Monitor . . . . . . . . . . . . 43 William Schaffer Validating Email Forwarding . . . . . . 55 Lars Magnusson Customizing Sendmail . . . . . . . . . . 61 Jonathan Feldman Babysitting Your Intranet and Internet 67 Bjorn Satdeva Questions and Answers . . . . . . . . . 75 Elizabeth Zinkann Book: A User's Report . . . . . . . . . 79
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Greg P. Schulz New Storage Interfaces . . . . . . . . . 8 David T. Caruso Implementing a CD-ROM Jukebox Solution 16 Gilbert Held Integrating NT into a UNIX Environment 27 Venkat Iyer Serious Shell Programming . . . . . . . 37 Wayne Wonchoba Spatchula --- A Script to Patch Solaris LANs . . . . . . . . . . . . . . . . . . 47 Ed Schaefer Returning a Single Character in a UNIX Shell Script . . . . . . . . . . . . . . 53 Anonymous Advertiser Index . . . . . . . . . . . . 56 Luca Salvadori Human: Managing User Accounts with a Friendly Interface . . . . . . . . . . . 57 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 59 Anonymous Call for Papers . . . . . . . . . . . . 62 Bjorn Satdeva Questions and Answers . . . . . . . . . 63 Anonymous Career Opportunities . . . . . . . . . . 66 Anonymous New Products . . . . . . . . . . . . . . 69
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Arthur Donkers Getting UNIX and NT on Speaking Terms 8 Yiorgos Adamopoulos Samba --- The First Step . . . . . . . . 21 Mark Nassal Samba --- Tuning the NT/UNIX Dance . . . 27 Anonymous Product Survey . . . . . . . . . . . . . 35 Robert Flannigan Adding R* to Windows NT . . . . . . . . 45 Ernst van Licht Product Review: RoboMon UNIX v6.1 . . . 55 Rich Holoch RPTRTR --- A Simple UNIX Report Router 63 Noah Davids Interpreting netstat Statistics . . . . 69 Anonymous Advertiser Index . . . . . . . . . . . . 72 Bjorn Satdeva Questions and Answers . . . . . . . . . 75 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 77 Anonymous Career Opportunities . . . . . . . . . . 81 Anonymous Correction: Dejan Muhamedagi\'c, PPP Connections Made Easy [Sysadmin, vol. 6, no. 2, pp. 61--63, 65 (1997)] . . . . . 84 Anonymous Call for Papers . . . . . . . . . . . . 84 Anonymous New Products . . . . . . . . . . . . . . 85
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Gilbert Held Firewalls: The Tool to Prevent Network 8, 10, 12, 13, 15, 16 Carolyn Conner Security: Controlling Root . . . . . . . 19, 20, 22--24, 27 Francisco M. De La Vega Strategies for Securing Web-centric Intranets . . . . . . . . . . . . . . . 29, 31, 32, 34, 35, 37, 39--41, 43 Anonymous Call for Papers . . . . . . . . . . . . 44--44 Bruce Alan Wynn and Michael Carpenter Cryptography Tools for the Systems Administrator . . . . . . . . . . . . . 45, 47--49, 51 Ben N. Klein Can You Trust HP-UX? . . . . . . . . . . 52, 54, 55, 57, 58, 60, 61, 63, 65, 66 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Jack Maynard UNIX Security Auditing: A Practical Guide . . . . . . . . . . . . . . . . . 67--72 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--75 Bjorn Satdeva Questions and Answers . . . . . . . . . 76, 78, 79 Anonymous Career Opportunities . . . . . . . . . . 80--81 Anonymous New Products . . . . . . . . . . . . . . 82--87 Anonymous New Messages . . . . . . . . . . . . . . 88--88
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Colton S. Johnson TCP/IP Connectivity Options Under NT 4.0 8, 11, 12, 15, 16, 19 David Endler PGP: A Simple Usage Guide . . . . . . . 21, 22, 24, 25, 27--29, 31, 32 Arthur Donkers Securing Your Web Server . . . . . . . . 35--40 Pete Welter and John Meier Server-Side Java . . . . . . . . . . . . 41, 43, 45--47, 49--51 Anonymous Advertiser Index . . . . . . . . . . . . 48--48 Anonymous Call for Papers . . . . . . . . . . . . 52--52 Luca Salvadori GNATS Revisited . . . . . . . . . . . . 53--55 Thom Garrett System Administration: ${SA} = f(x)$ . . 57--59 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 61--63 Anonymous Career Opportunities . . . . . . . . . . 64--64 Bjorn Satdeva Questions and Answers . . . . . . . . . 65--67 Anonymous New Products . . . . . . . . . . . . . . 68--71 Anonymous New Messages . . . . . . . . . . . . . . 72--72
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Steven Brown Web-Based Network Management --- A Free Add-on to HP Openview . . . . . . . . . 8, 11, 12, 14, 15 Rick Moore Automating Software Installation . . . . 16, 18, 19, 21, 22 Francisco M. De La Vega Missing Link: Administration by LDAP Directory Services . . . . . . . . . . . 25, 27, 28, 30, 32, 34--38, 40 Ron Shalhoup A Web-Based Helpdesk . . . . . . . . . . 41, 42, 44--46 Anonymous Advertiser Index . . . . . . . . . . . . 48--48 Chris Clifton Exporting Environments Made Easy . . . . 49--52, 54, 56, 57 Elizabeth Zinkann A User's Report . . . . . . . . . . . . 59--61 Anonymous Call for Papers . . . . . . . . . . . . 62--62 Bjorn Satdeva Questions and Answers . . . . . . . . . 63--66 Anonymous Career Opportunities . . . . . . . . . . 66--67 Anonymous New Products . . . . . . . . . . . . . . 68--71 Anonymous New Messages . . . . . . . . . . . . . . 72--72
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Gilbert Held Network: Communications Equipment by the Layer . . . . . . . . . . . . . . . . . 8, 10, 12, 13, 15, 16, 18, 19 Ralph Barker Product Survey: High-Speed Networking 21, 22, 24, 25, 27, 29--32, 34--36, 38 Ernst van Licht Product Review: Artecon's LynxStak and LynxArray RAID Systems . . . . . . . . . 41, 43--45, 47, 48 Arthur Donkers ISDN and Linux . . . . . . . . . . . . . 51--53, 55, 57--60 Rafeeq Ur Rehman Distributed Network Security through Radius . . . . . . . . . . . . . . . . . 63, 65, 66, 68--70 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Anonymous Career Opportunities . . . . . . . . . . 71--71 Anonymous Call for Papers . . . . . . . . . . . . 72--72 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--75 Anonymous New Products . . . . . . . . . . . . . . 76--79 Anonymous Letters . . . . . . . . . . . . . . . . 80--80
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Victor Hazlewood and Chris Daharsh Backups for Large UNIX Installations . . 8, 10, 12, 15, 16, 18, 19 Gilbert Held Windows NT Backup . . . . . . . . . . . 21--24 Mark L. Nassal The Other Backup: dump . . . . . . . . . 27--28, 30, 32, 34, 36--40, 42 Donald Bryson Forget Me Not . . . . . . . . . . . . . 43--44, 46--48, 50--51 Jonathan Feldman Inexpensive Network Troubleshooting . . 53--55, 57--58, 60 Todd Radermacher and Peter Kocks Executable Content: Controlling the Potential Revolution . . . . . . . . . . 61--63, 65--66 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 69--70 Anonymous Career Opportunities . . . . . . . . . . 71--71 Bjorn Satdeva Questions and Answers . . . . . . . . . 73--75 Anonymous Call for Papers . . . . . . . . . . . . 76--76 Anonymous New Products . . . . . . . . . . . . . . 77--80
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Gilbert Held Bandwidth and Latency: The Dynamic Duo of Network Performance . . . . . . . . . 8, 10, 13--15 Ed Lehr and Chris Schultz RAID Performance Issues . . . . . . . . 16, 18--20, 22 Jim Pinson vGen . . . . . . . . . . . . . . . . . . 23--24, 26, 28, 30, 33--36 Mario A. Ibanez A Comparison of Firewalls and Intrusion Detection Systems . . . . . . . . . . . 37--39, 41 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Dejan Muhamedagi\'c A Filter Library System . . . . . . . . 43--46, 48, 50--51 Donald Bryson Problem Solving with sar . . . . . . . . 52, 54--55, 58--59 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 60, 62--63 Anonymous Call for Papers . . . . . . . . . . . . 64--64 Bjorn Satdeva Questions and Answers . . . . . . . . . 65--66 Anonymous Career Opportunities . . . . . . . . . . 67--67 Anonymous New Products . . . . . . . . . . . . . . 68--71 Anonymous Correction . . . . . . . . . . . . . . . 71--71
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Anthony L. Cook Linux-Hosted Frame Relay . . . . . . . . 8, 10, 14, 16, 18--19 Jonathan Feldman Simple Security: Building a SOCKS Proxy Server . . . . . . . . . . . . . . . . . 20, 22, 24, 27 Matt Ganis SOCKSLIB.PL --- A Library for Using SOCKS Firewalls . . . . . . . . . . . . 29--30, 33, 34 Francisco M. De La Vega Secure Remote Sessions . . . . . . . . . 36, 38--39, 41, 43--44 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Arthur Donkers Using Linux in an Office Environment . . 45--46, 48, 50, 51 Anonymous Code Availability . . . . . . . . . . . 52--52 Anonymous Call for Papers . . . . . . . . . . . . 52--52 Chris Chroniger and David Yarashus When 100Mb/s Isn't Fast Enough . . . . . 53--60 Bjorn Satdeva Questions and Answers . . . . . . . . . 61--62 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 63--65 Anonymous New Products . . . . . . . . . . . . . . 67--70 Anonymous Career Opportunities . . . . . . . . . . 71--71
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Greg P. Schulz Integrating Fibre Channel into a SCSI World . . . . . . . . . . . . . . . . . 8, 10, 14--16, 18--19 Dale Swindler Tape Drive Technology Comparison: Sony AIT, Exabyte Mammoth, and Quantum DLT 20, 22, 24, 26, 29--30 Anonymous Advertiser Index . . . . . . . . . . . . 32--32 Jim McKinstry File Replication . . . . . . . . . . . . 33--37 Mark Nassal Security: A Multi-Tiered Approach --- Part 1 . . . . . . . . . . . . . . . . . 39--40, 42--44, 46 W. Curtis Preston Backup Techniques . . . . . . . . . . . 47--48, 50, 52--54 Anonymous Call for Papers . . . . . . . . . . . . 55--55 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 57, 59--60 Bjorn Satdeva Questions and Answers . . . . . . . . . 61--62, 64 Anonymous Career Opportunities . . . . . . . . . . 65--65 Anonymous New Products . . . . . . . . . . . . . . 67--70
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Ross Goldman UNIX Serial Communications . . . . . . . 8, 10, 12--13 Larry Bennett Streamlining Network Administration with DHCP . . . . . . . . . . . . . . . . . . 14, 16, 18, 20, 22--23 Mark Nassal Security: A Multi-Tiered Approach --- Part 2 . . . . . . . . . . . . . . . . . 24, 26, 28, 30--31, 33 Anonymous Advertiser Index . . . . . . . . . . . . 32--32 Bridget Allison Integrating CIFS and NFS File Sharing 34, 36, 38--40 Bob Ess iptool --- Maintaining /etc/hosts . . . 43--45 Christopher A. Jones Shell Objects . . . . . . . . . . . . . 46, 48--53 Anonymous Career Opportunities . . . . . . . . . . 54--54 Gilbert Held RAID Basics . . . . . . . . . . . . . . 55--59 Bjorn Satdeva Questions and Answers . . . . . . . . . 61--62 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 63--65 Anonymous New Products . . . . . . . . . . . . . . 67--70 Anonymous Code Availability . . . . . . . . . . . 71--71 Anonymous Call for Papers . . . . . . . . . . . . 71--71
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Ramon J. Hontanon Managing Remote Access to Your Intranet 8, 10, 12, 14, 16 Pete Welter Why Is My Web Site Down? . . . . . . . . 18, 20, 22, 24--25 Nalneesh Gaur Time Synchronization in a UNIX/NT Environment . . . . . . . . . . . . . . 27--30, 33 Anonymous Advertiser Index . . . . . . . . . . . . 32--32 Anonymous Call for Papers . . . . . . . . . . . . 34--34 Dave Zwieback Web Capacity Planning: How to Plan for Server Growth . . . . . . . . . . . . . 35--36, 38, 40--41 Francisco M. De La Vega Improving Performance with Web Server Clusters . . . . . . . . . . . . . . . . 43--46, 48--50 Gilbert Held Understanding Cookies . . . . . . . . . 51--54 Brian Tanaka Acquiring and Installing a Server Certificate . . . . . . . . . . . . . . 55--58 Kailash Jayaswal Virtual Network Interfaces and Dependent Web Sites . . . . . . . . . . . . . . . 59--60 Bjorn Satdeva Questions and Answers . . . . . . . . . 61--62 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 63--65 Anonymous Career Opportunities . . . . . . . . . . 66--67 Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Guy Helmer Security Tools in FreeBSD . . . . . . . 8, 10, 12, 14, 16, 18 Andrew Mickish Graphing Usage Statistics on the Web . . 21--22, 25, 27--28 Anonymous Advertiser Index . . . . . . . . . . . . 32--32 Arthur Donkers The Ins and Outs of Packet Filtering . . 33--35 Steven G. Isaacson Web-Enabled \tt man Pages . . . . . . . 37--40 John Tiso Managing TCP/IP with Windows NT 4.0 . . 45--49 James W. Meritt Setup Check . . . . . . . . . . . . . . 51--56 Joe Berry Assessing CPU Utilization . . . . . . . 57--60 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 61--63 Anonymous Sys Admin Crossword Puzzle . . . . . . . 64--64 Anonymous Career Opportunities . . . . . . . . . . 65--65 Anonymous Call for Papers . . . . . . . . . . . . 66--66 Bjorn Satdeva Questions and Answers . . . . . . . . . 67--68 Anonymous New Products . . . . . . . . . . . . . . 69--71
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Chet Gebhards Restoring the Sun . . . . . . . . . . . 8, 10, 12, 14, 16, 18 Derek Vadala Linux Software RAID --- High Performance through Low-Cost Alternatives . . . . . 19--20, 22, 24, 26 Robert Owen Thomas The Downside of Routers as Firewalls . . 29--31 Werner Klauser The /proc File System . . . . . . . . . 32, 34--35 Yao-Chiang Kan and Jackie Carlson and Jen-Sheng Wang A Print Quota Scheme . . . . . . . . . . 37--38, 41--44 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Anonymous Career Opportunities . . . . . . . . . . 45--45 James Santos Logical Volumes in AIX . . . . . . . . . 46, 48--54 Noah Davids When Packets Collide . . . . . . . . . . 55--59 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 61--63 Anonymous Call for Papers . . . . . . . . . . . . 64--64 Bjorn Satdeva Questions and Answers . . . . . . . . . 65--66 Anonymous Crossword . . . . . . . . . . . . . . . 67--67 Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Nik Okuntseff Overview of Windows NT Security Subsystem . . . . . . . . . . . . . . . 8, 10, 12, 14, 16 Ed Quillen SLAMming Symbolic Links . . . . . . . . 18, 20, 22 Tony Mobily PHP, Databases, and the Web . . . . . . 24, 26, 28, 30, 32, 34, 36, 38 Bob McCormick Automating Configs with Cfengine . . . . 41--44 Joseph Berry A Methodology for Analyzing Network File System Performance Problems . . . . . . 45--53 Russ Hill 10 Steps to Becoming a UNIX Administrator . . . . . . . . . . . . . 55, 57--61 Anonymous Advertiser Index . . . . . . . . . . . . 56--56 Jim McKinstry Real-World RAID Implementation . . . . . 63--67 Arthur Donkers IP Spoofing: Are You Really Who You Say You Are? . . . . . . . . . . . . . . . . 69--71 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--74 Anonymous Crossword Puzzle Solutions . . . . . . . 75--75 Anonymous Career Opportunities . . . . . . . . . . 76--77 Bjorn Satdeva Questions and Answers . . . . . . . . . 79--82 Anonymous Call for Papers . . . . . . . . . . . . 83--83 Anonymous New Products . . . . . . . . . . . . . . 84--86 Anonymous New Messages . . . . . . . . . . . . . . 87--87
James W. Meritt File Tamper Checking . . . . . . . . . . Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Eric Davis Securing UNIX Passwords . . . . . . . . 8, 10, 12, 14--16 Yufan Hu Readership Sensitive Expiration Control for Usenet News . . . . . . . . . . . . 19--20, 23--24, 26--27 David Endler Detecting Illegal Root Transition in Solaris . . . . . . . . . . . . . . . . 29--32, 34--35 Ramón J. Hontañón Encryption 101 --- The Choices . . . . . 37--39, 40--44 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Anonymous Career Opportunities . . . . . . . . . . 44--45 Yuval Lirov and Dave Macolino and Martha Ben-Michael and Andrew Rieger Centaur: Hybrid Desktops with Manageability . . . . . . . . . . . . . 47, 49, 51--56 Gilbert Held Authenticating Remote Users . . . . . . 57, 59--62 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 63--65 Anonymous Crossword Puzzle Solutions . . . . . . . 66--66 Anonymous Call for Papers . . . . . . . . . . . . 67--67 Anonymous New Products . . . . . . . . . . . . . . 68--71
Ted Nolan Report on 1998 Usenix Technical Conference . . . . . . . . . . . . . . . Luca Salvadori Access Control in Sensitive WWW Environments . . . . . . . . . . . . . . Anonymous Code Availability . . . . . . . . . . . 4--6 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Randy Zhang Configuring Cisco Routers and Switches for Management . . . . . . . . . . . . . 8, 10, 12, 14, 16, 18--19 Greg Whalin Virtual Private Networks . . . . . . . . 21--22, 25--26 Ralph Barker Sys Admin's Desktop Tape Library Buyer's Guide . . . . . . . . . . . . . . . . . 29, 31--41 Anonymous Call for Papers . . . . . . . . . . . . 43--43 Anonymous Advertiser Index . . . . . . . . . . . . 45--45 Thom Garrett IPv6 --- A Brief Overview . . . . . . . 47--50, 52 Anonymous Career Opportunities . . . . . . . . . . 54--55 Robert-Andre Croteau BBWARN: A Notification Extension for Big Brother . . . . . . . . . . . . . . . . 57--62 Robert Owen Thomas Haunted by the Ghost of Smurfing . . . . 63--64 Bjorn Satdeva Questions and Answers . . . . . . . . . 65--66 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 67--70 Anonymous New Products . . . . . . . . . . . . . . 71--74 Anonymous New Messages . . . . . . . . . . . . . . 75--75 Tim Jones Backing Up Windows Clients on UNIX . . . NT-1--NT-7 Gilbert Held Optimizing NT Performance . . . . . . . NT-9--NT-15 Arthur Donkers Looking at NT Security Through UNIX Glasses . . . . . . . . . . . . . . . . NT-17--NT-20
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Bob Ess SysMon --- A Systems Monitor . . . . . . 8, 10, 12, 14, 16, 18, 20, 22--24 Joshua Weinberg Centralized Logging with syslog . . . . 27, 30--34 Paul McKinley Aging Passwords . . . . . . . . . . . . 35--37 William Sherman Advisory Management . . . . . . . . . . 39--43 Packey Velleca Time Synchronization . . . . . . . . . . 45--46, 48--53 Anonymous Crossword Puzzle Solutions . . . . . . . 54--54 Anonymous Sys Admin Crossword Puzzle . . . . . . . 54--54 Anonymous Career Opportunities . . . . . . . . . . 54--55 Darrell Root and Belinda Liviero Slow: A Tool for Reporting and Diagnosing Performance Problems . . . . 57--63, 65--66 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Robert Owen Thomas Virtual Private Networks: Help or Hype? 67--68 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 69--71 Bjorn Satdeva Questions and Answers . . . . . . . . . 73--75 Anonymous Call for Papers . . . . . . . . . . . . 76--76 Anonymous New Products . . . . . . . . . . . . . . 77--80
William L. Garner User Configuration Basics . . . . . . . ?? Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Amy Rich Backups and Disaster Recovery . . . . . 8, 10, 12 Yufan Hu Managing Multi-File System Backup Using dump/restore . . . . . . . . . . . . . . 15--16, 18, 20, 22, 24, 26 Ira Goodman Network Backup Configuration: A Primer 29--30, 33--36 Anonymous Advertiser Index . . . . . . . . . . . . 32--32 Gilbert Held Televaulting and LAN Backup . . . . . . 37--40 Charles Gagnon Managing a Distributed Software Library Using LUDE . . . . . . . . . . . . . . . 41--46 Jim McKinstry Alternate Boot Devices . . . . . . . . . 47, 49--50, 52--55 Steven Bellenot Creating User Accounts . . . . . . . . . 57--60 Arthur Donkers The Art and Detection of Port Scanning 61--64 Bjorn Satdeva Questions and Answers . . . . . . . . . 65--67 Anonymous Call for Papers . . . . . . . . . . . . 68--68 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 69--72 Anonymous Career Opportunities . . . . . . . . . . 73--75 Anonymous Crossword Puzzle Solutions . . . . . . . 73--73 Anonymous New Products . . . . . . . . . . . . . . 76--79
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Dave Plonka Sys Admin File Revision Control with RCS 8, 10, 12, 14, 16, 18, 20--22 Frank Koensgen Managing Availability of SAP R/3 . . . . 25, 26, 28 Robert Kiesling Managing Documentation with RCS . . . . 31--32, 34--36 Richard S. Smith A Web-Based Revision Control System . . 37--40 Gilbert Held Using vLANs . . . . . . . . . . . . . . 41--42, 44, 46--47 Brian Tanaka Writing Maintainable Perl Programs and Shell Scripts . . . . . . . . . . . . . 49--50, 52 Benjamin F. Kuo Using UNIX Utilities to Create CD-ROMs 53--56 Chris Hare IT Security Coming of Age . . . . . . . 57--62 Anonymous Call for Papers . . . . . . . . . . . . 63--63 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Packey Velleca Reducing Asynchronous Serial Interrupts 65--68 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 69--71 Anonymous Career Opportunities . . . . . . . . . . 72--73 Anonymous New Products . . . . . . . . . . . . . . 74--76 Bjorn Satdeva Questions and Answers . . . . . . . . . 77--79
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Gary Bahadur and Dan Robertson Security Diagnostic Review for Solaris 2.X . . . . . . . . . . . . . . . . . . 8, 10, 12, 14 Robert Kiesling Linux and the Y2K Bug . . . . . . . . . 16, 18--20 Michael Schwager Sendmail as Gatekeeper . . . . . . . . . 23--28 Arthur Donkers Living on the Edge . . . . . . . . . . . 29--30, 33--35 Anonymous Advertiser Index . . . . . . . . . . . . 32--32 Anonymous Career Opportunities . . . . . . . . . . 36--36 Noah Davids IP Forwarding . . . . . . . . . . . . . 37--38 Syed Ali Freeware-Based Security . . . . . . . . 39--42, 43--44 Ron Jachim Application Level ping: alp . . . . . . 45--48 Ed Schaefer Password Encryption in Shell Scripts . . 49--54 Mark Rauschkolb Writing a Web-Based Admin Tool . . . . . 55--58 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 59--60, 62 Bjorn Satdeva Questions and Answers . . . . . . . . . 63--65 Anonymous Call for Papers . . . . . . . . . . . . 66--66 Anonymous New Products . . . . . . . . . . . . . . 67--70 Anonymous New Messages . . . . . . . . . . . . . . 71--71
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Michael Schwager De-Spamming the Enterprise with Sendmail 8.9 . . . . . . . . . . . . . . . . . . 8, 10, 12--15 Christopher Bush Using Apache as an Internet Proxy Server 16, 18, 20, 22, 24--29 Rob Kolstad 1998 SANS System, Network, and Security Administration Survey . . . . . . . . . 29--30, 32 Ron McCarty RADIUS . . . . . . . . . . . . . . . . . 33--39, 41 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Anonymous Career Opportunities . . . . . . . . . . 42--42 Jimmy Ball Web Security Basics with Apache: Authentication and Secure Log Files . . 43--46 Arthur Donkers SSL: What Does It Buy Me? . . . . . . . 47--48, 50--54 John Berninger Network Monitoring . . . . . . . . . . . 55--58 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 59--63 Bjorn Satdeva Questions and Answers . . . . . . . . . 65--66 Anonymous Call for Papers . . . . . . . . . . . . 68--68 Anonymous New Products . . . . . . . . . . . . . . 69--71 Michael Schwager How Spammers Do It . . . . . . . . . . . ?? Michael Schwager The Sendmail Rulesets --- A Detailed Look . . . . . . . . . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Victor Hazlewood UNIX Accounting Magic . . . . . . . . . 8, 10, 12, 14, 16, 18 Michael Schwager Proactive Spam Prevention . . . . . . . 19--22 Clay Lin Using Expect to Configure Cisco Routers 23--24, 27, 29--30 George Kurtz and Chris Prosise The Art of Attack and Penetration: Understanding Your Security Posture . . 31, 33--38 John Mechalas The Masshosts Tool . . . . . . . . . . . 39, 41--46 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Gilbert Held Checking Network Health . . . . . . . . 47--48, 50--52 Christopher Bush Perls of Wisdom . . . . . . . . . . . . 53--57 Anonymous Call for Papers . . . . . . . . . . . . 58--58 Bjorn Satdeva Questions and Answers . . . . . . . . . 59--61 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 63--66 Anonymous Career Opportunities . . . . . . . . . . 67--67 Anonymous New Products . . . . . . . . . . . . . . 69--71
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Ira Goodman Network Backup Configuration: A More Complex Scenario . . . . . . . . . . . . 8, 10, 12, 14, 16, 18 Tim Jones Image-Based Versus File-by-File Backup 20, 22 Corey Gaffney Patching Solaris . . . . . . . . . . . . 24, 26, 28, 30, 32--35 Anonymous Career Opportunities . . . . . . . . . . 36--36 Chris Prosise and George Kurtz The Art of Attack and Penetration: Defending Your Site . . . . . . . . . . 37--39, 41--42, 44 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Chad Barker and Mark Frisbey Designing For Disaster . . . . . . . . . 47--50 John E. Canavan Painless AIX . . . . . . . . . . . . . . 51--55 Anonymous Call for Papers . . . . . . . . . . . . 56--56 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 57--60 Arthur Donkers Publicly Available Security Tools . . . 61--63 Bjorn Satdeva Questions and Answers . . . . . . . . . 67, 66--68 Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Ronald McCarty Packet Filtering and Cisco's Way . . . . 8, 10, 12, 14, 16, 18, 20 Christopher Bush Enhancing Network Security with tcp\_wrapper . . . . . . . . . . . . . . 22, 24, 26--28 Rafeeq Ur Rehman Linux Transparent Proxy . . . . . . . . 29--30, 32--34 Kyle Dent Securing Apache . . . . . . . . . . . . 35--39 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 William Kramp Secure by Design . . . . . . . . . . . . 41--44 Ray Soriano and Gary Bahadur Securing Your Web Server . . . . . . . . 45--46, 48--52 Timothy Swenson Customer Support --- The View from the Other End of the Phone . . . . . . . . . 53--56 Bjorn Satdeva Questions and Answers . . . . . . . . . 57--58, 60--61 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 62, 64--66 Anonymous Career Opportunities . . . . . . . . . . 67--67 Anonymous Call for Papers . . . . . . . . . . . . 68--68 Anonymous New Products . . . . . . . . . . . . . . 69--71 Anonymous New Messages . . . . . . . . . . . . . . 72--72 Chris Bush Web-Exclusive: \tt tcp\_wrapper Macro Basics . . . . . . . . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6 Randy Zhang Implementing LAN Switching . . . . . . . 8, 10, 12--14, 16, 18--20 Jon ``maddog'' Hall Legitimizing Linux . . . . . . . . . . . 21--22 Terrehon Bowden and Bodo Bauer Linux Firewall and Masquerading: The IP Chains Concept in Linux 2.2 . . . . . . 23--24, 26--30, 32 Bryan C. Andregg The All Linux Office . . . . . . . . . . 33--38 Robert Kiesling The Linux Kernel: A Case Study for CVS 39 . . . . . . . . . . . . . . . . . . . 39, 41--43 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Anonymous Call for Papers . . . . . . . . . . . . 44--44 Joe Freeman and Ronald McCarty VPNs and IPSec: An Introduction . . . . 45--49 Gilbert Held Gigabit Ethernet --- The Potential Illusion of Speed . . . . . . . . . . . 51--55 Marcel Gagné Web-Enabling Legacy Applications . . . . 57--59 Anonymous Career Opportunities . . . . . . . . . . 60--60 Bjorn Satdeva Questions and Answers . . . . . . . . . 61--64 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 65--67 Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum: syslog . . . . . . . . . 6--6 Joe Beck ABCs of Performance Tuning . . . . . . . 8, 10, 12, 14, 16, 18 Anthony Taylor Perl for the DBA . . . . . . . . . . . . 20, 23--24, 26--27, 29--30 Anonymous Career Opportunities . . . . . . . . . . 34--34 John Berninger and Dana Lee SAs and DBAs: Interactions across Traditional Lines of Responsibility . . 35--39 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Noah Davids TCP Connection States: A Clue to Network Health . . . . . . . . . . . . . . . . . 41--48 Jim McKinstry I/O Considerations for Database Performance . . . . . . . . . . . . . . 49--54 Alan Laudicina Exploits . . . . . . . . . . . . . . . . 55--59 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 61--63 Anonymous Call for Papers . . . . . . . . . . . . 64--64 Bjorn Satdeva Questions and Answers . . . . . . . . . 65--67 Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum: syslog . . . . . . . . . 6--6 Gilbert Held What's New in LAN Management . . . . . . 8, 10, 12, 14, 16 Dave D. Zwieback Storage Capacity Planning . . . . . . . 19--20, 22, 24--26, 28, 30 Randal L. Schwartz The Missing Symlink . . . . . . . . . . 33--34, 36 Ron Jachim Poor Man's High Availability . . . . . . 37--38, 40--43 Jeffrey R. Thomas Hierarchical Storage Management . . . . 45--48 Andrew Mickish A Comprehensive Approach to Log Files 49--55 Steve Nelson Fibre Channel Unraveled . . . . . . . . 57--63, 65 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Anonymous Career Opportunities . . . . . . . . . . 66--66 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 67--69 Bjorn Satdeva Questions and Answers . . . . . . . . . 71--72, 74 Anonymous Call for Papers . . . . . . . . . . . . 75--75 Anonymous New Products . . . . . . . . . . . . . . 76--79
Anonymous Code Availability . . . . . . . . . . . 4--4 Ralph Barker Editor's Forum: Uncommon Common Ground 6--6 Dan Farmer and Brad Powell and Matt Archibald TITAN --- A Systems Administration Approach to Security . . . . . . . . . . 8, 10, 12, 14, 16 M. L. A. Lammerse Can You C2? . . . . . . . . . . . . . . 18, 20, 22--24 Marcel Gagné The Xni Network Analysis Tool . . . . . 25--26, 28, 30, 32, 34 Michael Lucas Maintaining Patch Levels with Open Source BSDs . . . . . . . . . . . . . . 35--36, 38, 40, 42 Amy Rich Landmining the Cracker's Playing Field 43--44, 46, 48--49 Dave D. Zwieback Hardening a Host . . . . . . . . . . . . 51--56 Ronald McCarty Intrusion Detection Strategies and Design Considerations . . . . . . . . . 57, 59--63 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 John Mechalas Practical Packet Sniffing . . . . . . . 65--71 Anonymous Call for Papers . . . . . . . . . . . . 72--72 James W. Meritt Use the 'Net to Secure Your Net . . . . 73--74 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 75--78 Bjorn Satdeva Questions and Answers . . . . . . . . . 79--80 Anonymous Career Opportunities . . . . . . . . . . 82--82 Anonymous New Products . . . . . . . . . . . . . . 83--88 Shannon Wyatt and Bryan C. Andregg New Messages . . . . . . . . . . . . . . 87--87
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Randy Zhang DSL: Technology and Implementation . . . 8, 10, 12, 14, 16, 18, 20--21 Steven G. Isaacson Using Screen . . . . . . . . . . . . . . 23--24, 26 Chris Byers Balancing User Flexibility and Administrative Support . . . . . . . . . 29--30, 32, 34, 36 Randal Schwartz Compiling Regular Expressions . . . . . 39--40, 42 Esme Cowles and Leonard K. Carson Lessons Learned from PCASSO . . . . . . 43--47 Anonymous Advertiser Index . . . . . . . . . . . . 48--48 John Weeks Webifying UNIX Commands . . . . . . . . 49--50, 52--54, 56--57, 59--60 Robert Blader File Transfer and Verification Between Non-Connected Networks . . . . . . . . . 61--64 Anonymous Career Opportunities . . . . . . . . . . 65--65 Anonymous Call for Papers . . . . . . . . . . . . 66--66 Patrick Lambert Implementing Security on Linux . . . . . 67--70 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 71--74 Anonymous New Products . . . . . . . . . . . . . . 75--78 Anonymous New Messages . . . . . . . . . . . . . . 79--79
Anonymous Code Availability . . . . . . . . . . . 4--4 David Wartell Controlling Spam . . . . . . . . . . . . 8, 10, 12 George Winter Automated Boot Disk Fail Over . . . . . 14, 16, 18, 20, 22, 24, 26 Gilbert Held Router Access Lists . . . . . . . . . . 29--34 Ralph Barker Alternative Libraries . . . . . . . . . 35--38 Reinhard Erich Voglmaier Admin Agent . . . . . . . . . . . . . . 39--43 Ron McCarty Domain Name System Design Considerations 45--48 Mike Schwager Automating Your Site with Expect . . . . 49--54 Shawn Bayern and Brian Carp How to Crawl Back Inside Your Shell . . 55--58 Joe Aguiar Log File Event Management with Waldo . . 59--60, 62--63, 65 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Jim McKinstry Questions and Answers . . . . . . . . . 67--69 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 71, 73, 74 Anonymous Career Opportunities . . . . . . . . . . 75--75 Anonymous Call for Papers . . . . . . . . . . . . 76--76 Anonymous New Products . . . . . . . . . . . . . . 77--79
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Kyle Dent IBM's Secure Mailer . . . . . . . . . . 8, 10, 12, 14 David Conrad Upgrading BIND . . . . . . . . . . . . . 16, 18, 20, 23--24, 26 Dave Zwieback Using Solaris Packages . . . . . . . . . 29--30, 32, 34, 36, 38, 40 Randal L. Schwartz Figuring Phone-y Words . . . . . . . . . 43--44, 46 Victor Hazlewood A Holy Grail for the New Millennium: No Plaintext Passwords . . . . . . . . . . 47--48, 50--52 James Santos Network Troubleshooting Tips . . . . . . 53--54, 55--58 Ron McCarty Web Caching: Why the Continued Interest? 59--62 Gilbert Held Switching by the Layer . . . . . . . . . 63--67 Jim McKinstry Questions and Answers . . . . . . . . . 69--71 Anonymous Advertiser Index . . . . . . . . . . . . 72--72 Lenard Morin and Ed Schaefer Verifying Dates and Times for the Millennium . . . . . . . . . . . . . . . 73--75 Tony Bourke Console Network Design . . . . . . . . . 77--78 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 79--81 Anonymous New Messages . . . . . . . . . . . . . . 82--82 Anonymous Call for Papers . . . . . . . . . . . . 83--83 Anonymous Career Opportunities . . . . . . . . . . 84--84 Anonymous New Products . . . . . . . . . . . . . . 85--87
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Dave Endler Creating and Deploying a Honey Pot . . . 8, 10, 12, 14, 16, 18, 20--22, 24 Michael Lucas Linux under FreeBSD . . . . . . . . . . 26, 29--30, 32 James O'Kane Kickstart . . . . . . . . . . . . . . . 33--34, 36 Ron McCarty Fast Port Speeds Do Not Build Optimized Networks . . . . . . . . . . . . . . . . 37--38, 40 Marcel Gagné EnlightenDSM --- Distributed Systems Management . . . . . . . . . . . . . . . 41--42, 44--46, 48 Matthew Marsh Policy Routing in Linux . . . . . . . . 49--50, 52--58 Joe ``Zonker'' Brockmeier Selecting a GUI for Linux . . . . . . . 59--61 Ron Jachim Practical IP and DNS Tips . . . . . . . 63, 65--66 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 67--70 Anonymous Call for Papers . . . . . . . . . . . . 71--71 Jim McKinstry Questions and Answers . . . . . . . . . 73--75 Anonymous New Products . . . . . . . . . . . . . . 76--78 Anonymous New Messages . . . . . . . . . . . . . . 79--79
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Alan C. Davis Implementing Web/RCS under Oracle OWS for UNIX . . . . . . . . . . . . . . . . 8, 10, 12, 14 Liam Widdowson Deploying Microsoft FrontPage 2000 UNIX Web Services . . . . . . . . . . . . . . 16, 18, 21--22, 24, 27, 29--30, 32 Steve Nice Isolating Performance Problems . . . . . 33--34, 38--41 Randal L. Schwartz Deep Copying, not Deep Secrets . . . . . 43--46 Anonymous Call for Papers . . . . . . . . . . . . 47--47 Anonymous Advertiser Index . . . . . . . . . . . . 48--48 Ron McCarty Snort . . . . . . . . . . . . . . . . . 49--52 Marcel Gagné A Linux Email Server . . . . . . . . . . 53--58 Don Gourley and Wei Wu Building a Web-based Java Application Server with Apache JServ . . . . . . . . 59--65 Jim McKinstry Questions and Answers . . . . . . . . . 67--69 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 71--74 Anonymous New Products . . . . . . . . . . . . . . 75--78
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Michael Lucas FreeBSD for the SVR4/Linux Administrator 8, 10, 12, 14, 16 Bill Kramp Beyond MTRG . . . . . . . . . . . . . . 18, 20, 22, 24, 27, 29--30, 32 Darrin Husmann and Andy Sackrieter LogViewer . . . . . . . . . . . . . . . 33--34, 36, 38, 40--43 George Ericson and Ken Kutzer Storage Area Networks --- Achieving Safe Shared Data Access . . . . . . . . . . . 45--50 Ed Quillen Script Manager . . . . . . . . . . . . . 51--52, 54 Ron McCarty NAT: Network Address Translator . . . . 55--57, 60 Gilbert Held Router-Based Network Defense . . . . . . 61--63, 65 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Anonymous Call for Papers . . . . . . . . . . . . 66--66 Jim McKinstry Questions and Answers . . . . . . . . . 67--69 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 71--72, 74--75 Anonymous New Products . . . . . . . . . . . . . . 76--79
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Greg Schuweiler Building a SAN Backup Solution . . . . . 8, 10, 12, 14 Mark Nielsen Using Linux to Duplicate Computers . . . 16, 18, 20, 22, 25 William David Automatically Performing and Monitoring Backups . . . . . . . . . . . . . . . . 27--28, 30, 32--33 Randal L. Schwartz Rainy Day Template Fun . . . . . . . . . 35, 37--38, 40 Gilbert Held The Emergence of Convergence . . . . . . 42, 44--46, 48--49 Alan C. Davis Automating Single-User Backups with Tape Verification . . . . . . . . . . . . . . 51--53 Mike Dunham and Ed Schaefer Recovering Source From a Defunct RCS System . . . . . . . . . . . . . . . . . 55--58 Mats Brymér Managing Usability with the TERM Variable . . . . . . . . . . . . . . . . 59--60, 62--63, 65--68 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Ron McCarty ICMP: The Good, the Bad, and the Ugly 69--71 Anonymous Call for Papers . . . . . . . . . . . . 72--72 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--75 Anonymous New Products . . . . . . . . . . . . . . 76--79 Jim McKinstry Additional Questions and Answers . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Peter van der Weerd Building a Jumpstart Server for Solaris 8, 10, 12, 14 Kurt Seifried Crypto 101 . . . . . . . . . . . . . . . 16, 20, 22, 24, 26--27 Matej Sustic The Use of Routers in Firewall Setup . . 29--30, 32, 35--36, 38, 40--41 Eric Davis SNMPv3 --- User Security Model . . . . . 43--44, 46, 48--50 Gilbert Held Implementing Voice and Data Convergence 51--52, 54--55 W. Curtis Preston Backups --- In a League of Their Own . . 57--61 Didier Racheneur Setting Root SUIDed Programs at Work . . 63, 65--71 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Reinhard Voglmaier Simplifying Web Production . . . . . . . 73--76 Ron McCarty MPLS Part I: The Search for IP Quality of Service . . . . . . . . . . . . . . . 77--78 Joe Beck A Sys Admin's Toolkit . . . . . . . . . 79--84 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 85--87 Jim McKinstry Questions and Answers . . . . . . . . . 89--91 Anonymous Call for Papers . . . . . . . . . . . . 92--92 Anonymous New Products . . . . . . . . . . . . . . 93--95
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Wyman Eric Miles LPRng . . . . . . . . . . . . . . . . . 8, 10, 12, 14, 16, 18, 22 Lizmari Brignoni LDAP Directory Basics . . . . . . . . . 23--24, 26--27, 29, 31 Michael Lucas FreeBSD Firewall Tools & Techniques . . . 32, 34, 36--37, 39, 41--42, 44 Eric Davis SNMPv3 --- View Access Control Model . . 45--46, 48, 50--51 Randal L. Schwartz Getting It to Look the Way You Want . . 53--55 Reinhard Erich Voglmaier Link Management System . . . . . . . . . 57--59 Kristy Westphal Tiger . . . . . . . . . . . . . . . . . 61--62, 64, 66--67 Gilbert Held Convergence Economics . . . . . . . . . 69--72 Ron McCarty MPLS Part II: A Closer Look . . . . . . 73--75 Marcel Gagné A Linux Internet Gateway . . . . . . . . 77--79, 81--83 Anonymous Advertiser Index . . . . . . . . . . . . 80--80 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 85--87 Anonymous Call for Papers . . . . . . . . . . . . 88--88 Jim McKinstry Questions and Answers . . . . . . . . . 89--91 Anonymous New Products . . . . . . . . . . . . . . 92--94 Anonymous New Messages . . . . . . . . . . . . . . 95--95
Anonymous Converging Remote Networks into Your Routing Table . . . . . . . . . . . . . ?? Chris Kuethe Dial-Up Networking with PPP . . . . . . ?? Shawn Bayern Making a Wish: The Web-Interface Shell ?? Mike Murphy Scripting and HTML . . . . . . . . . . . ?? Ed Schaefer Processing Command-Line Options in the Shell . . . . . . . . . . . . . . . . . ?? Gunnar Wolf WPM --- Web-Based Proxy Manager . . . . ?? W. Curtis Preston As Easy As It Gets . . . . . . . . . . . ?? Pam Rissmann Pushing Corporate Email out to Wireless Devices . . . . . . . . . . . . . . . . ?? Alek Komarnitsky \tt Gettemp --- Built-In Temperature Monitoring for Sun Enterprise Servers ?? Jim McKinstry Questions and Answers . . . . . . . . . ?? Elizabeth Zinkann Books: A User's Report . . . . . . . . . ?? Anonymous Code Availability . . . . . . . . . . . ?? Amber Ankerholz Editor's Forum . . . . . . . . . . . . . ?? Anonymous Advertiser Index . . . . . . . . . . . . ?? Anonymous Career Opportunities . . . . . . . . . . ?? Anonymous Call for Papers . . . . . . . . . . . . ?? Anonymous New Products . . . . . . . . . . . . . . ?? Anonymous New Messages . . . . . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Greg Schuweiler Migrating Solaris to a Storage Area Network . . . . . . . . . . . . . . . . 8, 10, 12 Rafeeq Ur Rehman Logical Volume Manager for Linux . . . . 14, 16, 18, 20, 22, 25 Dave Plonka How I Recovered Data I Thought I'd Lost 26, 28--30 David Sultzman Storage Area Networks . . . . . . . . . 33, 35, 36--38, 40 Timothy Swenson How to Read a SCSI Bus Trace . . . . . . 43--44, 46--47 Russ Hill Automating ftp with Expiring Passwords 49--51 Randal L. Schwartz Taint so Easy, Is It? . . . . . . . . . 53--54 Yufan Hu Up and Down . . . . . . . . . . . . . . 55--56, 58--59 Kerry Miles Merging Files without Disk Space . . . . 61--63 Randy Appleton Perl and the Practical Systems Administrator . . . . . . . . . . . . . 65--68 Bryon Beilman and Jamy Libsack The Art of the Refresh . . . . . . . . . 69--71 Anonymous Advertiser Index . . . . . . . . . . . . 72--72 Ron McCarty Network Operations Center On-line . . . 73--74, 76--77 Anonymous Call for Papers . . . . . . . . . . . . 78--78 Jim McKinstry Questions and Answers . . . . . . . . . 79--80 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 81--83 Anonymous New Products . . . . . . . . . . . . . . 84--86 Anonymous New Messages . . . . . . . . . . . . . . 87--87
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Kurt Seifried PAM --- Pluggable Authentication Modules 8, 10, 12, 14 Michael Lucas FreeBSD's \tt sysctl Interface . . . . . 16, 18, 22 Emmett Dulaney Examining LPI Certification . . . . . . 23--24, 26, 28, 30 Joe Aguiar Cross Platform Event Reporting . . . . . 33--34, 36 Alex Withers OpenBSD as a VPN Solution . . . . . . . 39--40, 42, 44, 45 Kristy Westphal Snort --- A Look Inside an Intrusion Detection System . . . . . . . . . . . . 46, 48, 50, 52--53 John C. Place FreeBSD Mail Server with GUI . . . . . . 55--58 David Totsch Managing SUID/SGID Files . . . . . . . . 60, 62--63, 65 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 W. Curtis Preston Why SANs? . . . . . . . . . . . . . . . 67--72 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--76 Gilbert Held Quality of Service . . . . . . . . . . . 77--81 Ron McCarty Sendmail Alternatives . . . . . . . . . 83--85 Jim McKinstry Questions and Answers . . . . . . . . . 87--89 Anonymous Call for Papers . . . . . . . . . . . . 90--90 Anonymous New Products . . . . . . . . . . . . . . 91--94 Anonymous New Messages . . . . . . . . . . . . . . 95--95 Barbara Dijker Careers in System Administration . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Matt Lesko Installing and Configuring OpenSSH . . . 8, 10, 12 Clark Cooper Alias Defender . . . . . . . . . . . . . 14, 16, 18, 20 Alek Komarnitsky nmap-web: Port Scanning Made Easy . . . 22, 24, 26, 28--30 Arthur Donkers Building Tunnels with VTun . . . . . . . 32, 34, 36, 38, 40--41 Randal L. Schwartz Little Acts of Magic . . . . . . . . . . 43--45 Gilbert Held Layer 2 Quality of Service . . . . . . . 47--48, 50, 52, 54 Jeff Gilbertson Platform-Independent Backup Script . . . 57--59 Werner Klauser MySQL for E-Commerce Web Sites . . . . . 61--63, 65 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Adam Olson Scaring Crackers Away with TCP Wrapper 67--71 John Tiso Automated Security Scanning . . . . . . 73--74, 76, 78 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 79--82 Ron McCarty The World According to ARP . . . . . . . 83--85 Jim McKinstry Questions and Answers . . . . . . . . . 86, 88--89 Anonymous Call for Papers . . . . . . . . . . . . 90--90 Anonymous New Products . . . . . . . . . . . . . . 91--93 Anonymous New Messages . . . . . . . . . . . . . . 94--95
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 David Sweet A Perl of a Site Map . . . . . . . . . . 8, 10, 12, 14, 16, 19, 22 Emmett Dulaney Evaluating MKS Toolkit 7.0 . . . . . . . 24, 26, 28, 30 Robert Geiger and John Schweitzer Automating UNIX Security Monitoring . . 32, 34--36 Ron McCarty Virtual Router Redundancy Protocol . . . 38, 40, 43 Kurt Seifried How to Hack -- An Introduction . . . . . 44, 46--47 Carlos Ramirez Monitoring Web Server Reliability . . . 49--50, 53 Ed Schaefer Using vi Tag Files . . . . . . . . . . . 55--56 Gilbert Held QoS into the Network: Router Queuing . . 57--62 Duncan Napier Introducing FreeS/WAN and IPsec . . . . 63, 65--69 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 W. Curtis Preston A Fibre Channel Primer: Part 1 . . . . . 71--74 Dan Garrett Fast and Painless System-Disk Recovery on SGI Systems . . . . . . . . . . . . . 75--76, 78--80, 82--83 Bill Bollenbach AIX Filesystem ReOrg Made Simple . . . . 85--86 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 87--89 Anonymous Call for Papers . . . . . . . . . . . . 90--90 Anonymous New Messages . . . . . . . . . . . . . . 94--95 Anonymous New Products . . . . . . . . . . . . . . 91--93
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Rich Teer New Approaches to Making Solaris More Secure . . . . . . . . . . . . . . . . . 8, 10, 12, 14, 16, 18 Jeff Ruggeri Starfire Administration . . . . . . . . 19--20, 22, 24--25 Ido Dubrawsky Securing Solaris . . . . . . . . . . . . 26, 28--35 Kevin Wenchel and Stephen Michaels Implementing C2 Auditing in the Solaris Environment . . . . . . . . . . . . . . 36, 38--39, 41--44 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Robert Weeks and Marc Tamres The BigAdmin Protocol: Combining Tools and Community . . . . . . . . . . . . . 45--47 Ron McCarty IP Filter on Solaris . . . . . . . . . . 53--56 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 61--63 Jim McKinstry Questions and Answers . . . . . . . . . 64, 66--67 Anonymous Call for Papers . . . . . . . . . . . . 68--68 Anonymous New Products . . . . . . . . . . . . . . 69--71
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Randy Zhang MPLS: Delivering Next Generation Networking Services . . . . . . . . . . 8, 10, 12, 14, 16, 18 Adam Anderson and Dave Felps Protocol Analysis for Performance Tuning 20, 22, 24 Peter Valian and Todd K. Watson NetReg: An Automated DHCP Registration System . . . . . . . . . . . . . . . . . 26, 28, 30--32 Thomas Vincent Role-Based Access Control . . . . . . . 35--36, 38 Randal L. Schwartz So What's the Difference? . . . . . . . 39--40, 42--43 Ben Diamond How to Make a Solaris 2.5.1 Workstation Support PPP Dial-Up from Windows . . . . 44--46, 48--50, 52 Reinhard Erich Voglmaier Managing an LDAP Database with Perl and Apache . . . . . . . . . . . . . . . . . 55--56, 58--59 Ron McCarty FCheck: A Solution to Host-Based Intrusion Detection . . . . . . . . . . 61--63 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Jim McKinstry and Amy Rich Questions and Answers . . . . . . . . . 66, 68--70 Gilbert Held QoS into the Network: Part 2 . . . . . . 71--72, 74--75 Kurt Seifried How to Hack UNIX: Part 2 . . . . . . . . 77--80 Chris Josephes Designing a Scalable NNTP Server Network 81--88 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 89--91 Anonymous Call for Papers . . . . . . . . . . . . 92--92 Anonymous New Products . . . . . . . . . . . . . . 93--93
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6 Don Gourley An Apache Load Balancing Cluster . . . . 8, 10, 12, 14, 16 D. Hageman GnuPG: An Open Solution to Data Protection . . . . . . . . . . . . . . . 18, 20, 22, 24--26 Mike Murray Installing OpenBSD on Small Disks . . . 28, 30 Chris Bush Linux as an Application Server -- The Tomcat Way . . . . . . . . . . . . . . . 31--32, 34, 36, 39--40, 42, 44 David Beecher Getting Out/Getting In . . . . . . . . . 45--46, 48, 50 Greg Nakhimovsky Measuring and Improving Memory Efficiency of Large Applications . . . . 51--52, 54, 56--57 Drew Smith Homebrew High Availability: Booting Linux from a RAID-1 Device . . . . . . . 59--60, 62, 64--65 Gilbert Held QoS Through the Network . . . . . . . . 67--68, 70, 72 Ron McCarty RSVP: Signaling Quality of Service . . . 73--74 Andreas Meyer Build a Floppy Firewall . . . . . . . . 76, 78--79 Peter H. Salus Disruptions of Service: Types and Effects . . . . . . . . . . . . . . . . 81--85 W. Curtis Preston A Fibre Channel Primer: Part 2 . . . . . 87--90 Rafeeq Ur Rehman Open Source Real-Time Operating Systems 91--95 Anonymous Advertiser Index . . . . . . . . . . . . 96--96 Jim McKinstry and Amy Rich Questions and Answers . . . . . . . . . 97--98, 100--101 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 102, 104--105 Anonymous Call for Papers . . . . . . . . . . . . 106--106 Anonymous New Products . . . . . . . . . . . . . . 107--109 Anonymous New Messages . . . . . . . . . . . . . . 110--111 Anonymous Linux Intrusion Detection Poster . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6 Charles Walker and Larry Bennett Safer CGI Scripting . . . . . . . . . . 8, 10, 12, 14, 16, 18, 20, 22 Brett Lymn What To Do When the Server Doesn't Serve 24, 26, 28 Dani Pardo A Centralized and Flexible Antivirus Solution . . . . . . . . . . . . . . . . 31--34 Adam Olson Keeping Your Web Content in Sync . . . . 37--38 Charles V. Leonard Devouring Spam with Spamivore . . . . . 39--40, 42--44, 46--47 James O'Gorman Viagra: Keeping Services Running on BSD 49--51 Michael Watson Replacing rdist and ftp with scp and Associated Utilities . . . . . . . . . . 52, 54 Davin Petersen Overcoming Large Outlook Distribution Lists: An Exercise in Sendmail Aliases 55--57 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 59--60, 62 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Randal L. Schwartz What is That, Anyway? . . . . . . . . . 65--67 Jim McKinstry and Amy Rich Questions and Answers . . . . . . . . . 68, 70--71 Anonymous New Products . . . . . . . . . . . . . . 73--75 Anonymous Call for Papers . . . . . . . . . . . . 76--76 Anonymous New Messages . . . . . . . . . . . . . . 77--77 Anonymous Recruitment . . . . . . . . . . . . . . 78--79
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6 Carlos Ramirez Getting Your Message Across with Apache 8, 10, 12 Adam Olson Working with SAINT . . . . . . . . . . . 14, 16, 18, 20 Brett Lymn What to Do When the Server Doesn't Serve -- Duplicating Data . . . . . . . . . . 22, 24, 26 Anthony Cinelli Using PortSentry and LogCheck . . . . . 29--31 Gary Bahadur Freeware Security Web Tools . . . . . . 32, 34, 36--37, 39--40 Rainer Raab Creating Global Functions with the Korn Shell . . . . . . . . . . . . . . . . . 42, 44--47 Mark E. Dawson, Jr. AIX Cloning . . . . . . . . . . . . . . 49--51 Ripduman Sohan Web Hosting: A Migrational Case Study 53--56 Brian Wilson Using VMWare as a Development Tool . . . 57--59 Ron McCarty R.I.P. RIP? . . . . . . . . . . . . . . 61--62 Anonymous Advertiser Index . . . . . . . . . . . . 64--64 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 65--67 W. Curtis Preston SAN Building Blocks . . . . . . . . . . 69--72 Jim McKinstry and Amy Rich Questions and Answers . . . . . . . . . 73--74 Anonymous Call for Papers . . . . . . . . . . . . 75--75 Anonymous New Products . . . . . . . . . . . . . . 76--78 Anonymous Recruitment . . . . . . . . . . . . . . 79--80
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6 Leo Liberti Quick Network Redundancy Schemes . . . . 8, 10, 12, 14, 16 Clark Cooper Using One Script to Back Up Linux and Solaris . . . . . . . . . . . . . . . . 18, 20 Brett Lymn What to Do When the Server Doesn't Serve -- Using CODA . . . . . . . . . . . . . 22, 24, 26 Shawn Bayern Minimal Backups . . . . . . . . . . . . 28, 30 Ben Diamond and Keil Wurl Quick and Dirty Server/Workstation Replication Using \tt ufsdump . . . . . 32, 34, 36, 38--39 Randal L. Schwartz A MIME Is a Terrible Thing to Waste . . 41--42 Rafeeq Ur Rehman Configuring Red Hat's High-Availability Server . . . . . . . . . . . . . . . . . 43--44, 46, 48 Richard Ferri Remote Installation of Heterogeneous Linux Clusters Using LUI . . . . . . . . 50, 52, 54--57 Reg Quinton Solaris Network Hardening: First Steps 59--61 Hiu Ho Automatically Restart Login Services on a Remote Host . . . . . . . . . . . . . 63--64 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 65--67 Gary Bahadur and Yen-ming Chen Using Freeware Vulnerability Scanners 69--71, 73--75 Anonymous Advertiser Index . . . . . . . . . . . . 72--72 Jim McKinstry and Amy Rich Questions and Answers . . . . . . . . . 77--78 Anonymous Call for Papers . . . . . . . . . . . . 79--79 Anonymous New Products . . . . . . . . . . . . . . 80--82 Anonymous Marketplace . . . . . . . . . . . . . . 83--83 Anonymous Training and Education . . . . . . . . . 84--85 Anonymous Recruitment . . . . . . . . . . . . . . 86--87 Anonymous New Messages . . . . . . . . . . . . . . 88--88 Kurt Seifried How to Hack Windows . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6 Anders Òstergård Jensen Using PHP and MySQL as a Weblog . . . . 8, 10, 12, 14 Leonardo Orellano and Timothy Young Optimizing Solaris for Oracle 8.x . . . 16, 18, 20, 22 Bill Mansfield Oracle Backup for UNIX Administrators 24, 26, 28--29 Evan Sarmiento Securing FreeBSD Using Jail . . . . . . 31, 32, 34, 36--37 W. Curtis Preston Building and Using a SAN: Part I . . . . 38, 40--41 Tristan Greaves Virtual Hosting, FTP, and LDAP . . . . . 43--45 Ross Oliver Achieving More Flexible File Permissions Using Solaris ACLs . . . . . . . . . . . 46, 48, 50--51 Noah Davids TCP --- Either Fast or Efficient . . . . 53--57 Francisco Mancardi Application Usage Accounting . . . . . . 58, 60--61 Jim McKinstry Host-Based Replication and Oracle . . . 63--64, 66--69 Anonymous Call for Papers . . . . . . . . . . . . 70--70 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 71, 73--74 Anonymous Advertiser Index . . . . . . . . . . . . 72--72 Ron McCarty A Look at ngrep . . . . . . . . . . . . 75--76 Jim McKinstry and Amy Rich Questions and Answers . . . . . . . . . 77--79 Anonymous New Products . . . . . . . . . . . . . . 80--82 Anonymous New Messages . . . . . . . . . . . . . . 87--87 Gilbert Held Preparing for Script-Form Attack . . . . ?? Ed Schaefer Communicating with Intermec and Zebra Bar Code Printers . . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6 Thomas Akin Dangers of SUID Shell Scripts . . . . . 8, 10, 12 Alex Golomshtok and Yefim Nodelman Fuzzy Text Searches with agrep and afind 14, 16, 18, 20, 22 Br. David Carlson Poor Man's Search Engine . . . . . . . . 24, 26, 28, 30 Tim Maletic Secure, Automated File Distribution . . 31--32, 34, 36 Reinhard Erich Voglmaier The Art of Spidering . . . . . . . . . . 37--39 W. Curtis Preston Building and Using a SAN (Part II) . . . 41--43 Mark Prager Useful Scripts for Overworked Administrators . . . . . . . . . . . . . 44, 46--48 Koos Pol A Powerful Search Tool for ASCII Files 49--51 Randal L. Schwartz It's All About Context . . . . . . . . . 53--55 Thomas Kranz Redundant NICs on Solaris . . . . . . . 56, 58 Ron McCarty Mailman . . . . . . . . . . . . . . . . 59--61 Kristy Westphal Tools Built to Sort Through Snort . . . 62, 64--67 Jim McKinstry and Amy Rich Questions and Answers . . . . . . . . . 68, 70--71 Anonymous Advertiser Index . . . . . . . . . . . . 72--72 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--74 Anonymous New Products . . . . . . . . . . . . . . 77--79 Anonymous New Messages . . . . . . . . . . . . . . 80--80 Anonymous Marketplace . . . . . . . . . . . . . . 81--81 Anonymous Recruitment . . . . . . . . . . . . . . 82--82 Anonymous Training and Education . . . . . . . . . 83--87 Miguel Armas del Río and Esteban Manchado Velázquez PICA: Perl Installation and Configuration Agent . . . . . . . . . . ?? Benjamin King A Complete Network Information Center ?? Roman Marxer Automatic UNIX Documentation with \tt unixdoc . . . . . . . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Anker Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6 Sandor W. Sklar The AIX Error Logging Facility . . . . . 8, 10, 12--14 Richard C. Ferri Linux Affinity . . . . . . . . . . . . . 16, 18, 20 Primitivo Cervantes Real-Time Remote Data Mirroring . . . . 22, 24--28 Bill Wood AIX Network Install Manager . . . . . . 29--31 Anonymous Advertiser Index . . . . . . . . . . . . 32--32 Jeff Marsh AIX Alternate Disk Installation . . . . 33--37 Mike Wilcox An Introduction to IBM's Network Dispatcher . . . . . . . . . . . . . . . 38, 40--41 David Carver Managing AIX with SMIT . . . . . . . . . 43--45 Jim McKinstry and Amy Rich Questions and Answers . . . . . . . . . 47--48 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 49--51 Anonymous New Products . . . . . . . . . . . . . . 53--54 Anonymous Recruitment . . . . . . . . . . . . . . 55--55
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6 Jeffrey B. Rothman and John Buckman Which OS is Fastest for High-Performance Network Applications? . . . . . . . . . 8, 10, 12, 14, 16 Tom Podnar Multi-Vendor LAN Troubleshooting . . . . 18, 20, 22--23 A. J. Weinzettel Interoperating Linux with NetWare . . . 24, 26, 28, 30 Anthony Taylor Simplifying WindowMaker Menus in a Distributed Environment . . . . . . . . 31--34 Brandon Stone Samba-Based Network Recycle Bin . . . . 37--39 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 John Tiso Securing Your Cisco Router . . . . . . . 41--42, 44--45 Robert Chuba and Anthony Caruso Proxy FTP without the Browser . . . . . 47--48 Joe Aguiar WTMP: Another Step Toward Centralizing Event Management . . . . . . . . . . . . 49--51 Adam Ronthal Why Java Isn't Appropriate for Everything . . . . . . . . . . . . . . . 52, 54--55 Jim McKinstry and Amy Rich Questions and Answers . . . . . . . . . 56, 58--60 W. Curtis Preston Backup on a Budget . . . . . . . . . . . 61--63 Anonymous New Products . . . . . . . . . . . . . . 64--66 Bill Davidsen Monitoring Usenet News . . . . . . . . . ?? Peter Baer Galvin Solaris Corner . . . . . . . . . . . . . ?? Brett Lymn Coda -- The Disconnectable File System ?? Mark Prager Useful Scripts for Overworked Administrators . . . . . . . . . . . . . ?? Reg Quinton Securing SNMP on Solaris . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6 Elena Khan Tripwire in the Enterprise: Integrating Tripwire into Big Brother . . . . . . . 8, 10, 12, 14, 16, 18--19 Jason Chan Distributed Intrusion Detection with Open Source Tools . . . . . . . . . . . 20, 22, 24--25 David Hughes Have I Been Hacked? . . . . . . . . . . 26, 28, 30 Randy Weidman Simple Security Scripts from Simple Commands . . . . . . . . . . . . . . . . 31--32 Mark Prager Firewall Log-Checking Techniques . . . . 33--34, 36--37 Liam Widdowson Jailed Internet Services . . . . . . . . 39, 41--42, 44--45 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Victor Burns Locking the Front Door of Password Security . . . . . . . . . . . . . . . . 47--51 W. Curtis Preston Large File System Backup Tool . . . . . 52, 54--55 Anonymous Call for Papers . . . . . . . . . . . . 56--56 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 57--58 Randal L. Schwartz Developing a Perl Routine . . . . . . . 59--60 Amy Rich Questions and Answers . . . . . . . . . 61--64 Anonymous New Products . . . . . . . . . . . . . . 65--67 Ed L. Cashin Integrit for File Verification . . . . . ?? Ido Dubrawsky Freeware Intrusion Detection Tools . . . ?? Alex Le Fevre Firewall Reporter . . . . . . . . . . . ?? Chris Kuethe Homebrew Intrusion Detection Systems . . ?? Jeffrey Rothman and John Buckman Which OS is Fastest -- FreeBSD Follow-Up ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz Editor's syslog . . . . . . . . . . . . 6--6 Adam Anderson What I Did Instead of Buying a SAN . . . 8, 10, 12, 14 Primitivo Cervantes Disaster Recovery with Tivoli Storage Manager . . . . . . . . . . . . . . . . 16, 18, 20, 22--23 Steve Blackmon and John Nguyen High-Availability File Server with Heartbeat . . . . . . . . . . . . . . . 24, 26, 28, 30, 31--32 Michael Watson Creating a Cold Standby E250 . . . . . . 34, 36--37 Gilbert Held Why Energy Consumption Matters . . . . . 38, 41--42, 44 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Ed L. Cashin A Flexible System for Centralized Backup 46, 48--50 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 51--52 W. Curtis Preston Understanding Oracle Backup and Recovery 54, 56--58 Amy Rich Questions and Answers . . . . . . . . . 59--62 Anonymous New Products . . . . . . . . . . . . . . 63--65 Anonymous Call for Papers . . . . . . . . . . . . 66--66 Anonymous Marketplace . . . . . . . . . . . . . . 67--67 Anonymous Training and Education . . . . . . . . . 68--71 Anonymous New Messages . . . . . . . . . . . . . . 72--72 Anonymous Career Opportunities . . . . . . . . . . ?? George Callaway A Framework for Automated File Transfer ?? Jose Nazario Checking Your System Logs with awk . . . ?? Miles Purdy Serial Storage Architecture Management ?? John Shearer A Perl Package for Monitoring Traffic ??
Anonymous Code Availability . . . . . . . . . . . 4--4 Amber Ankerholz syslog . . . . . . . . . . . . . . . . . 6--6 Alexander Golomshtok and Yefim Nodelman Managing Solaris with Kstat . . . . . . 8, 10, 12, 14, 16, 18 Brian Gollsneider Multi-Booting Windows 98, Linux, and Solaris . . . . . . . . . . . . . . . . 20, 22--23 Kevin Wenchel Implementing IPsec in the Solaris 8 Environment . . . . . . . . . . . . . . 24, 26--29 Chris Hare Revisiting UNIX Password Controls -- Part 1 . . . . . . . . . . . . . . . . . 30, 32--34 Ken Gottry Successful Solaris Performance Tuning 35--38 Chris Josephes A Framework for JumpStart Begin/Finish Scripts . . . . . . . . . . . . . . . . 39--41 John S. Howard Introduction to Solaris Web Start Flash 42, 44--46 Ron McCarty NFS: Part I, The Protocol . . . . . . . 47, 49--50 Anonymous Advertiser Index . . . . . . . . . . . . 48--48 Amy Rich Questions and Answers . . . . . . . . . 51--54 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 55--57 Anonymous New Products . . . . . . . . . . . . . . 58--59 Anonymous Call for Papers . . . . . . . . . . . . 64--64 Keith Clay E-Class Tools . . . . . . . . . . . . . ?? Peter Baer Galvin Solaris Corner . . . . . . . . . . . . . ?? Moazam Raja Managing Sun Rays in Technical Environments . . . . . . . . . . . . . . ??
Matt Lesko Ethereal . . . . . . . . . . . . . . . . 8, 10, 12, 14 Liam Widdowson and John Ferlito Tales from the Abyss: UNIX File Recovery 16, 18, 20, 22 Jonathan D. Leghart Dynamic Round Robin . . . . . . . . . . 24, 26--27 David LaPorte and Kevin Amorin Getting on the 6bone Quickly with Solaris\TM 8 . . . . . . . . . . . . . . 28, 30, 32--34 Chris Hare Revisiting UNIX Password Controls -- Part 2 . . . . . . . . . . . . . . . . . 35--38 Richard Hellier Centralize Your Crontabs . . . . . . . . 39--40 Edward L. Haletky Integrating Macintosh Computers into Your Network . . . . . . . . . . . . . . 41--44 Amy Rich Questions and Answers . . . . . . . . . 45--46 Peter Baer Galvin Reliable Network with Solaris\TM . . . . 47, 49--50 Elizabeth Zinkann Books: A User's Report . . . . . . . . . 51--52 W. Curtis Preston Oracle, Hot Backups, and Redo Logs . . . 53--55
Duncan Napier IPTables/NetFilter -- Linux's Next-Generation Stateful Packet Filter 8, 10, 12, 14, 16 Tim Sammut Little Known Cisco IOS Security Features 17, 20, 22--23 Randal L. Schwartz Parsing Interesting Things . . . . . . . 24, 26--27 David Smith Implementing Kerberos . . . . . . . . . 28, 30, 32, 34--38 Alex Withers Integrating Windows 2000 and UNIX Using Kerberos . . . . . . . . . . . . . . . . 39, 41--42, 44 Amy Rich Questions and Answers . . . . . . . . . ?? Jon Orwant Creating XML--RPC Web Services . . . . . P50, P52--P53 Sean M. Burke Uni\em decode . . . . . . . . . . . . . P54, P56--P60 Dan Brian and Jon Bjornstad Helping the Disabled with Perl/Tk . . . P61--P65 Elizabeth Zinkann Books: A User's Report . . . . . . . . . ?? Peter Baer Galvin Solaris Companion . . . . . . . . . . . ?? Ron McCarty NFS Part II, Usage . . . . . . . . . . . ??
Marcel Gagné WINE: The Open Source Way to Run Windows Applications . . . . . . . . . . . . . . 8, 10, 12, 14 Evan Sarmiento Systems Administration with scsh . . . . 16, 18--22 Chris Josephes Instant Messaging with Jabber . . . . . 23--26 Mike Murray Halted Firewalls . . . . . . . . . . . . 27--28 Brent Bice Network Diagramming and Monitoring with Scotty . . . . . . . . . . . . . . . . . 29--32 Mark Pruett RDB -- A UNIX Command-Line Database . . 33--36 Amy Rich Questions and Answers . . . . . . . . . 37--39 Seann Herdejurgen Redundant Internet Connections Using Linux . . . . . . . . . . . . . . . . . 41--47 Roberto João Lopes Garcia Posting Email to the Web with MHonArc 49, 52--55 Peter Baer Galvin Solaris Companion . . . . . . . . . . . ??
Reinhard Voglmaier Web Publishing with Perl Objects . . . . 8, 10, 12, 14--15 Jay Ribak Managing Logging with Numerous Virtual Hosts in Apache . . . . . . . . . . . . 16, 18--19 Brett Lymn Web-Based Printer Management . . . . . . 20, 22--23 Bob Apthorpe Increasing Reliability Through Forensic Operations . . . . . . . . . . . . . . . 24, 26--29 Bruno Pedro Deleting Temporary Files Created by Web Sites Using PHP . . . . . . . . . . . . 30, 32--33 Stanley Wong How Web Cache Proxies Do and Don't Save on Internet Costs . . . . . . . . . . . 34, 36--38 Amy Rich Questions and Answers . . . . . . . . . 39--41 Daniel Solin Developing a MySQL Quota Daemon . . . . 42, 44--47, 49 Thomas Knox Solaris\TM Patch Levels . . . . . . . . 51--53 Peter Baer Galvin Solaris Companion: The Golden Rules of Sun Systems Administration . . . . . . . 55--56
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6 Karen Kent Frederick Cisco IOS HTTP Authorization Vulnerability . . . . . . . . . . . . . 8, 10, 12, 14 Leo Liberti Web-Enabled Filesystem-Based Databases 16, 18--19 Duncan Napier Administering Linux IPSec Virtual Private Networks . . . . . . . . . . . . 20, 22, 25--27, 29 James Standboge Encrypted NFS with OpenSSH and Linux . . 30, 32--34 Walt Jones Securing Public-Access Networks: Stopping the IP Thieves . . . . . . . . 35--36, 38--39, 41--42 Anonymous Advertiser Index . . . . . . . . . . . . 40--40 Ed Schaefer Creating Black Box Functions in the Korn and Bash Shells . . . . . . . . . . . . 43--46 Amy Rich Questions and Answers . . . . . . . . . 47--50 Anonymous Call for Papers . . . . . . . . . . . . 51--51 Anonymous Marketplace . . . . . . . . . . . . . . 68--68 Anonymous Training and Education . . . . . . . . . 69--69 Anonymous New Products . . . . . . . . . . . . . . 71--72 Peter Baer Galvin Solaris\TM Corner: Sun/Cobalt Qube Server . . . . . . . . . . . . . . . . . ??
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6 David T. Smith Configuring Amanda . . . . . . . . . . . 8, 10, 12, 14, 16--17 Robin Wakefield Multi-Platform Backups . . . . . . . . . 18, 20--21 Bryan Smith CD Backups for Easy File Access . . . . 22, 24, 26 Ed Schaefer Backup Scripts from \tt UnixReview.com 27--29 Ed Schaefer Geographic Failover for Cheapskates . . 30, 32 Henry Newman Using Lib C and I/O and Performance . . 33--35 Ray Strubinger A Homegrown Backup Solution Utilizing RSA Keys, SSH, and \tt tar . . . . . . . 37--38 Peter Baer Galvin Solaris\TM Companion: Upgrading to Solaris 8 . . . . . . . . . . . . . . . 39--41 Brian Buckeye and Kevin Liston Recovering Deleted Files in Linux . . . 42, 44--47 Anonymous Advertiser Index . . . . . . . . . . . . 48--48 Ron McCarty Name Services: Another View . . . . . . 49--52 Amy Rich Questions and Answers . . . . . . . . . 53--56 Anonymous Call for Papers . . . . . . . . . . . . 57--57 Anonymous New Products . . . . . . . . . . . . . . 58--60 Anonymous New Messages . . . . . . . . . . . . . . 64--64 Peter Baer Galvin Solaris\TM Corner . . . . . . . . . . . ?? Edward L. Haletky Integrating Backup into a Multiple Operating System Network with Amanda . . ??
Amber Ankerholz syslog . . . . . . . . . . . . . . . . . 6--6 Michael S. DeGraw-Bertsch Configuring a FreeBSD Access Point for Your Wireless Network . . . . . . . . . 8, 10, 12, 14 Ido Dubrawsky Wireless (In)Security . . . . . . . . . 16, 18, 20, 22 Alan P. Laudicina Nessus --- A Powerful, Free Remote Security Scanner . . . . . . . . . . . . 24, 26, 28--30 Bob Dilworth Using Email to Perform UNIX System Monitoring and Control . . . . . . . . . 31--32, 34--36 Scott DeJong Supporting Screened Hosts with BIND 9.x View . . . . . . . . . . . . . . . . . . 37--38, 40--44 John Shearer Tracking Machines with GetHost . . . . . 45--51 Randal L. Schwartz Doing Many Things, Like pings . . . . . 52, 54--55 Anonymous Advertiser Index . . . . . . . . . . . . 56--56 Amy Rich Questions and Answers . . . . . . . . . 57--60 Peter Baer Galvin Solaris\TM Corner: Solaris Administration Best Practices . . . . . 61--64 Anonymous Call for Papers . . . . . . . . . . . . 65--65 Anonymous Marketplace . . . . . . . . . . . . . . 66--66 Anonymous Training and Education . . . . . . . . . 67--70 Anonymous New Products . . . . . . . . . . . . . . 71--72