Last update:
Tue Jul 12 09:12:58 MDT 2016
Robert Ward Publisher's Forum . . . . . . . . . . . 2--2
Dorian Deane Orchestrating a Kinder, Gentler Disaster 3
David Fiedler My Favorite One-Liners: Some Useful
Shell Programs . . . . . . . . . . . . . 7
G. Clark Brown Testing Capabilities in Terminals and
Emulators . . . . . . . . . . . . . . . 11
Leor Zolman A Community-Style Overnight Job Spooler 17
Chris Hare Where Did that Core File Come From? . . 29
Sydney Weinstein USENET ELM: A Case Study in Portability
between UNIX Systems . . . . . . . . . . 32
R. King Ables Beware the Trojan Horse . . . . . . . . 43
Bruce H. Hunter Installing AIX . . . . . . . . . . . . . 48
Anonymous Call for Papers . . . . . . . . . . . . 50
Chris Hare How UNIX Password Controls Work . . . . 53
Anonymous New Products . . . . . . . . . . . . . . 61
Anonymous New Messages . . . . . . . . . . . . . . 63
Anonymous Advertiser Index . . . . . . . . . . . . 64
R. King Ables Security and Electronic Mail . . . . . . ??
Anonymous Advertiser Index . . . . . . . . . . . . ??
Anonymous Call for Papers . . . . . . . . . . . . ??
Anonymous New Messages . . . . . . . . . . . . . . ??
Anonymous New Products . . . . . . . . . . . . . . ??
Anonymous Source Code Availability . . . . . . . . ??
Chris Hare The UNIX File System Debugger --- FSDB ??
Bruce H. Hunter Printer Administration Potpourri for
Large-Scale UNIX Systems . . . . . . . . ??
Larry Reznick An older Option in C for find . . . . . ??
Bjorn Satdeva Questions and Answers . . . . . . . . . ??
Mark Stockton More Simple Scripts . . . . . . . . . . ??
Robert Ward Publisher's Forum . . . . . . . . . . . ??
Sydney Weinstein Joining USENET . . . . . . . . . . . . . ??
Elizabeth Zinkann Books: A User's Report . . . . . . . . . ??
Leor Zolman A Background Job Launcher . . . . . . . ??
Robert Ward Publisher's Forum . . . . . . . . . . . 2--2
Bjorn Satdeva Questions and Answers . . . . . . . . . 5
Chris Hare Getting the Info --- u386mon . . . . . . 13
Jeff Courington AIX Printer Support: Colon Files . . . . 29
Bruce H. Hunter UNIX Networking in the 90s --- DOS/UNIX
Connectivity . . . . . . . . . . . . . . 35
Leor Zolman A System Load Monitoring Trilogy . . . . 40
G. Clark Brown The Cure for Hung Up, Locked Up, and
Frozen Terminals . . . . . . . . . . . . 47
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 53
Anonymous Source Code Availability . . . . . . . . 57
Larry Reznick Using Regular Expressions . . . . . . . 59
Anonymous Call for Papers . . . . . . . . . . . . 64
Anonymous New Products . . . . . . . . . . . . . . 66
Anonymous New Messages . . . . . . . . . . . . . . 70
Anonymous Advertiser Index . . . . . . . . . . . . 72
Robert Ward Publisher's Forum . . . . . . . . . . . 3--3
Larry Reznick Setting Up a Printer's terminfo
Definition . . . . . . . . . . . . . . . 5
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 14
Judith Ashworth rdist to the Rescue! . . . . . . . . . . 18
Bjorn Satdeva Questions and Answers . . . . . . . . . 23
Steven G. Isaacson sukill: Stopping Unruly Processes . . . 31
David M. Knight Coherent 4.0: A Desktop UNIX Clone . . . 37
Anonymous Source Code Availability . . . . . . . . 46
Leor Zolman In-line Input or Bust . . . . . . . . . 47
Chris Hare Getting the Info --- sar . . . . . . . . 50
Anonymous New Products . . . . . . . . . . . . . . 58
William Genosa The System Performance Monitor . . . . . 62
Anonymous New Messages . . . . . . . . . . . . . . 67
Bruce Hunter An Administrator's Guide to the UNIX
Software Jungle . . . . . . . . . . . . 68
R. King Ables Putting cron to Work for You . . . . . . 72
Anonymous Call for Papers . . . . . . . . . . . . 77
Anonymous Advertiser Index . . . . . . . . . . . . 80
Robert Ward Publisher's Forum . . . . . . . . . . . 2--2
Larry Reznick Setting Up a Printer Interface File . . 5
Bjorn Satdeva Questions and Answers . . . . . . . . . 13
Leor Zolman A Project Directory Management Facility 19
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 29
G. Clark Brown Terminal Choices: The Right Tool for the
Job . . . . . . . . . . . . . . . . . . 34
Laurie Sefton UNIX Security in a Networked Environment 38
Dorian Deane The Short Life and Hard Times of an
Internet Packet . . . . . . . . . . . . 42
Sydney S. Weinstein Zombie Processes . . . . . . . . . . . . 49
Bruce H. Hunter Mail and Sendmail Administration: Part 1 53
William Genosa The Filesystem Activity Monitor . . . . 59
Chris Hare UUCP --- The User's Perspective . . . . 64
Anonymous Call for Papers . . . . . . . . . . . . 71
Anonymous Source Code Availability . . . . . . . . 78
Anonymous New Products . . . . . . . . . . . . . . 82
Anonymous New Messages . . . . . . . . . . . . . . 86
Anonymous Advertiser Index . . . . . . . . . . . . 88
Robert Ward Publisher's Forum . . . . . . . . . . . 2--2
Leor Zolman An lp Enhancement . . . . . . . . . . . 5
Steven G. Isaacson maxtab: Automatic File Pruning . . . . . 33
Larry Reznick Turning Numlock On . . . . . . . . . . . 39
R. King Ables Where Did you Get That Tape? . . . . . . 41
Paul A. Sand Automatically Cleaning Temporary
Directories . . . . . . . . . . . . . . 47
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 57
Beirne Konarski Easy Troubleshooting with crash . . . . 61
Bruce H. Hunter Mail and Sendmail Administration: Part 2 69
Bjorn Satdeva Questions and Answers . . . . . . . . . 75
Chris Hare UUCP: Administering BNU . . . . . . . . 78
Anonymous Source Code Availability . . . . . . . . 100
Anonymous Call for Papers . . . . . . . . . . . . 101
Anonymous New Products . . . . . . . . . . . . . . 102
Anonymous New Messages . . . . . . . . . . . . . . 110
Anonymous Advertiser Index . . . . . . . . . . . . 112
Robert Ward Publisher's Forum . . . . . . . . . . . 2--2
Steven G. Isaacson fchange: A File System Watchdog . . . . 5
David S. Linthicum Tuning for X . . . . . . . . . . . . . . 13
Larry Reznick Using Little Languages . . . . . . . . . 31
Jeff Courington The Object Data Manager (ODM) on AIX . . 37
Sherwood Botsford quota: A Gentle Enforcer . . . . . . . . 43
Paul A. Sand A Form Letter Utility for UNIX . . . . . 49
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 55
William Genosa The Sentinel . . . . . . . . . . . . . . 59
Bjorn Satdeva Questions and Answers . . . . . . . . . 63
Jeff Courington Two Handy AIX Tools: The Failed Login
Report and \tt lptran . . . . . . . . . 69
Anonymous Call for Papers . . . . . . . . . . . . 74
Chris Hare Configuring UUCP: Version 2 . . . . . . 77
Anonymous Source Code Availability . . . . . . . . 85
Anonymous New Products . . . . . . . . . . . . . . 87
Anonymous New Messages . . . . . . . . . . . . . . 94
Anonymous Advertiser Index . . . . . . . . . . . . 96
Robert Ward Publisher's Forum . . . . . . . . . . . 2--2
Eric T. Horne newping: Remote Host Downtime Detection 5
R. King Ables Distributing Local Information with NIS 13
David S. Linthicum Making the Most of NFS . . . . . . . . . 18
Larry Reznick Using cron and crontab . . . . . . . . . 29
Chris Hare More Network Security: Equivalency . . . 35
Ed Schaefer Using the UNIX Pipe in C . . . . . . . . 39
Jeff Courington Printer Encryption on AIX . . . . . . . 47
Leor Zolman User Report: \tt CTAR and Company . . . 53
Chris Hare SCCS: Keeping It under Control . . . . . 63
Leo Willems A Disk Usage Report Generator . . . . . 75
Larry Reznick Which Day of the Week is This? . . . . . 79
Anonymous Call for Papers . . . . . . . . . . . . 86
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 87
Anonymous New Messages . . . . . . . . . . . . . . 90
Anonymous Source Code Availability . . . . . . . . 96
Anonymous New Products . . . . . . . . . . . . . . 97
Anonymous Advertiser Index . . . . . . . . . . . . 104
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4
R. King Ables Backups with Standard UNIX Commands . . 6
Jon Alder and
Ed Schaefer Fast Backup and Restore Scripts for DAT
Drives . . . . . . . . . . . . . . . . . 19
Anonymous Call for Papers . . . . . . . . . . . . 45
Judith Ashworth Dump and Restore . . . . . . . . . . . . 49
Bjorn Satdeva Questions and Answers . . . . . . . . . 63
Chris Hare Monitoring Login Activity . . . . . . . 67
Anonymous InstantInfo . . . . . . . . . . . . . . 71
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 75
Russ Hill How to Login to Any UNIX System and Get
Your E-Mail . . . . . . . . . . . . . . 79
Eric Horne newping Revisited . . . . . . . . . . . 85
Larry Reznick Setting Up a High-Speed Modem . . . . . 95
Anonymous Source Code Availability . . . . . . . . 102
Anonymous New Products . . . . . . . . . . . . . . 103
Anonymous New Messages . . . . . . . . . . . . . . 110
Anonymous Advertiser Index . . . . . . . . . . . . 112
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4
Chris Hare C2 Security: Is Big Brother Watching? 6
Bjorn Satdeva Questions and Answers . . . . . . . . . 25
Bill Rieken UNIX Security Facilities . . . . . . . . 33
Larry Reznick Timing Out Idle Users . . . . . . . . . 43
Don Pipkin A Revised sudo: Managing Super-User
Privileges . . . . . . . . . . . . . . . 51
Robert Ward and
Scott Graham A Form Letter Facility for E-Mail . . . 59
Steven G. Isaacson checkcron: Checking for the Unexpected 71
Leor Zolman Building a Secure Journal/Logging
Utility with Encryption . . . . . . . . 75
Ben Reaves \tt Reading beyond a Bad Header with \tt
tar . . . . . . . . . . . . . . . . . . 89
Anonymous Call for Papers . . . . . . . . . . . . 91
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 97
Anonymous Source Code Availability . . . . . . . . 99
Anonymous InstantInfo . . . . . . . . . . . . . . 101
Anonymous New Products . . . . . . . . . . . . . . 103
Anonymous New Messages . . . . . . . . . . . . . . 110
Anonymous Advertiser Index . . . . . . . . . . . . 112
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4
Chris Hare Asynchronous Networking: PPP and SLIP 6
Emmett Dulaney Communicating with Other Users . . . . . 31
Chris Bush Internet Online Services: \tt archie . . 37
Arthur Messenger Configuring FTP . . . . . . . . . . . . 45
Matthew Ganis Configuring DNS . . . . . . . . . . . . 61
Packey Velleca Reproducing Boot-Disk Filesystems . . . 71
Patrick M. Ryan Disk Mirroring with NFS . . . . . . . . 79
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 86
Larry Reznick Weeding Your System . . . . . . . . . . 91
Bjorn Satdeva Questions and Answers . . . . . . . . . 101
Bill Rieken UNIX Accounting Facilities . . . . . . . 107
Anonymous Call for Papers . . . . . . . . . . . . 109
Anonymous InstantInfo . . . . . . . . . . . . . . 113
Anonymous Source Code Availability . . . . . . . . 116
Anonymous New Products . . . . . . . . . . . . . . 117
Anonymous New Messages . . . . . . . . . . . . . . 124
Anonymous Advertiser Index . . . . . . . . . . . . 128
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4
William Genosa Monitoring Performance with iostat and
vmstat . . . . . . . . . . . . . . . . . 6
John Lees A Host Health Probe . . . . . . . . . . 17
Clive King A Distributed File Location and
Properties Checker . . . . . . . . . . . 32
Brad Jacobs and
Thomas Kraus Heterogeneous Password Assignment . . . 50
Thomas Richter Improved Error Reporting in AIX . . . . 67
Carlos Francisco Gomez UUCP + Pager = Automated Warning System 71
Chris Bush Internet Online Services: \tt gopher . . 79
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 85
Bjorn Satdeva Questions and Answers . . . . . . . . . 91
John Caywood Installing Third-Party Applications . . 97
Anonymous Call for Papers . . . . . . . . . . . . 99
Larry Reznick Multiport Serial Installation . . . . . 101
Stephen Peterson RS/6000 Backup and Restore Scripts . . . 107
Anonymous Source Code Availability . . . . . . . . 108
Anonymous New Products . . . . . . . . . . . . . . 112
Anonymous InstantInfo . . . . . . . . . . . . . . 117
Anonymous New Messages . . . . . . . . . . . . . . 119
Anonymous Advertiser Index . . . . . . . . . . . . 120
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4
Dave Brillhart The Downtime Notification and Tracking
System . . . . . . . . . . . . . . . . . 6
Steven G. Isaacson stat: New Access to Your File System . . 24
Brett Wynkoop The Netgroup Advantage . . . . . . . . . 50
Matt Ganis Killidle Revisited . . . . . . . . . . . 59
Larry Reznick Time for UNIX . . . . . . . . . . . . . 65
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73
Carl Nichols and
Ed Schaefer Archiving Informix On-line from \tt cron 79
Fred Lenk Setting up a Secure User Environment
with Standard UNIX Tools . . . . . . . . 85
Anonymous New Products . . . . . . . . . . . . . . 102
Anonymous InstantInfo . . . . . . . . . . . . . . 107
Anonymous Call for Papers . . . . . . . . . . . . 108
Bjorn Satdeva Questions and Answers . . . . . . . . . 109
Anonymous Source Code Availability . . . . . . . . 112
Anonymous New Messages . . . . . . . . . . . . . . 114
Anonymous Advertiser Index . . . . . . . . . . . . 120
Robert Ward Editor's Forum . . . . . . . . . . . . . 4--4
Emmett Dulaney When Inodes Go Bad . . . . . . . . . . . 6
John Caywood Setting Up File Systems and Partitions 18
Rob MacKinnon and
Mark Dapoz Remote System Security: A Secure Net and
SLIP Solution . . . . . . . . . . . . . 26
John Lees Sharing Local Software on a Network . . 48
Larry Reznick Smarter Mail Addresses . . . . . . . . . 70
Chris Hare The UNIX Process Management System . . . 75
Anonymous Call for Papers . . . . . . . . . . . . 83
Jonathan Feldman A Transparent UNIX/PC Connection via NFS 85
Anonymous InstantInfo . . . . . . . . . . . . . . 89
Bjorn Satdeva Questions and Answers . . . . . . . . . 91
Bill Genosa AIX's Logical Volume Manager . . . . . . 95
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 102
Thomas Richter A refer Macro Package . . . . . . . . . 107
Anonymous Online Source Code . . . . . . . . . . . 109
Anonymous New Products . . . . . . . . . . . . . . 113
Anonymous New Messages . . . . . . . . . . . . . . 118
Anonymous Advertiser Index . . . . . . . . . . . . 120
Robert Ward Publisher's Forum . . . . . . . . . . . 4--4
William Genosa Sybase Database Administration . . . . . 6
Larry Reznick Checking User Security . . . . . . . . . 22
Ed Schaefer Copying and Moving Directories . . . . . 36
Clive King and
Adrian Rixon Automating Symbolic Link Generation . . 43
Chris Hare File Version Numbering . . . . . . . . . 48
Emmett Dulaney Standard UNIX Network Diagnostic Tools 53
Tom Clark Using fack to Check ufs File Systems . . 65
Packey Velleca A Method for Verifying System Integrity 89
Anonymous Advertiser Index . . . . . . . . . . . . 96--97
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 109
Anonymous Call for Papers . . . . . . . . . . . . 112
Bjorn Satdeva Questions and Answers . . . . . . . . . 117
Anonymous Online Source Code . . . . . . . . . . . 118
Anonymous New Products . . . . . . . . . . . . . . 122
Anonymous New Messages . . . . . . . . . . . . . . 127
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6
Neal S. Jamison Computer Security Revisited: Physical
Security . . . . . . . . . . . . . . . . 8
Steven G. Isaacson Logging rm and kill Requests . . . . . . 14
Chris Cox \tt suFirewall: Creating a Controlled
Setuid Environment . . . . . . . . . . . 24
Fred Brunet fcd: A Smart Change Directory . . . . . 33
Dale Panattoni Printer Sharing between UNIX and Windows
for Workgroups . . . . . . . . . . . . . 41
John Woodgate Using syslog . . . . . . . . . . . . . . 50
Larry Reznick Setting Priorities . . . . . . . . . . . 59
Robert Berry Monitoring and Optimizing NFS
Performance . . . . . . . . . . . . . . 66
Packey Velleca A Shell-Based Resource Scheduler . . . . 77
Anonymous Advertiser Index . . . . . . . . . . . . 96--97
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 99
William Genosa Sybase Database Administration: Part 2 107
Bjorn Satdeva Questions and Answers . . . . . . . . . 117
Anonymous Call for Papers . . . . . . . . . . . . 119
Anonymous New Products . . . . . . . . . . . . . . 122--124, 128
Anonymous New Messages . . . . . . . . . . . . . . 125--127
Robert Berry prq: A Print Queue Monitor and Manager ??
William Genosa Sybase Database Administration: Part 3 ??
Chris Hare Subnetting: Networking One Piece at a
Time . . . . . . . . . . . . . . . . . . ??
John Lees Signals and Scripts . . . . . . . . . . ??
Lars Magnusson An Internet Gate for a Local Email
System . . . . . . . . . . . . . . . . . ??
Andy Papp NIS+ Security . . . . . . . . . . . . . ??
Larry Reznick Remote Login Menus . . . . . . . . . . . ??
Thomas Richter Login Surveillance and AIX . . . . . . . ??
Bjorn Satdeva DHCP: The Next Generation Host
Configuration Scheme . . . . . . . . . . ??
Bjorn Satdeva Questions and Answers . . . . . . . . . ??
John Wetsch Multilayered Security . . . . . . . . . ??
Elizabeth Zinkann Books: A User's Report . . . . . . . . . ??
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6
Chris Hare Network Construction: Using a Firewall 8
Bjorn Satdeva Questions and Answers . . . . . . . . . 33
Emmett Dulaney Understanding Filesystems . . . . . . . 40
Stephen Peterson Managing tty Attributes in AIX . . . . . 53
Marty Leisner File Management Tools . . . . . . . . . 59
Larry Reznick Finding Disk Hogs . . . . . . . . . . . 79
Steven G. Isaacson Customizing Your Calendar Program . . . 91
John Lees Printing: BSD or System V? . . . . . . . 97
Anonymous Advertiser Index . . . . . . . . . . . . 104--105
Larry Reznick Coordinating Password and Group Files 113
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 115
Russ Hill Creating New Users with perl . . . . . . 121
Anonymous Call for Papers . . . . . . . . . . . . 123
Anonymous New Products . . . . . . . . . . . . . . 130
Anonymous New Messages . . . . . . . . . . . . . . 136
Larry Reznick Publisher's Forum . . . . . . . . . . . 6--6
Arthur Donkers Managing sendmail in a Mixed UUCP/PPP
Environment . . . . . . . . . . . . . . 8
Ed Schaefer A Server-Based Date/Time Synchronizer
for TCP/IP . . . . . . . . . . . . . . . 28
John Kinsella A WWW-Based Computer Support System . . 39
Packey P. Velleca Making Tape-to-Tape Copies . . . . . . . 51
Donald C. Stone UNIX, TCP/IP, and Macs . . . . . . . . . 63
Kyle Gleed and
Scott Tarvainen Using SQL in Shell Scripts . . . . . . . 73
Bjorn Satdeva Questions and Answers . . . . . . . . . 85
Andrew B. Sherman and
Yuval Lirov Surviving Large-Scale Distributed
Computing Powerdowns . . . . . . . . . . 93
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 101
Anonymous Advertiser Index . . . . . . . . . . . . 104--105
Brad Weinert PCs and Serial X . . . . . . . . . . . . 111
Matt Ganis Implementing SOCKS . . . . . . . . . . . 117
Anonymous Call for Papers . . . . . . . . . . . . 119
Larry Reznick Setting Up an HP-UX Mail Hub . . . . . . 123
Anonymous New Products . . . . . . . . . . . . . . 128
Anonymous New Messages . . . . . . . . . . . . . . 134
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6
Chris Cox rlock: A Distributed File Locking
Utility . . . . . . . . . . . . . . . . 8
Lisa Lees Unidentified File Objects . . . . . . . 24
Tom Everson closeit: A Login Management Tool . . . . 39
Larry Reznick Creating terminfo Source from Binaries 49
Bill Moraca AIX's \tt backup and \tt restore
Utilities . . . . . . . . . . . . . . . 57
Jack Tuszynski Automating Operating System
Configuration . . . . . . . . . . . . . 78
Mark McDonagh Automated Numeric Paging via uucp . . . 95
Bjorn Satdeva Questions and Answers . . . . . . . . . 103
Anonymous Advertiser Index . . . . . . . . . . . . 104--105
Donald Brown Creating Filters for BSD Print Spoolers 111
Stephen Friedl and
Ed Schaefer Time Services from the U.S. Naval
Observatory . . . . . . . . . . . . . . 117
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 125
Anonymous Call for Papers . . . . . . . . . . . . 127
Anonymous New Products . . . . . . . . . . . . . . 130
Anonymous New Messages . . . . . . . . . . . . . . 135
Colt Johnson Real-Time between DOS, UNIX, and MVS . . 8
Arthur Donkers A UNIX/Windows 95 Implementation . . . . 27
Mark Baker Integrating Automounter into NIS across
Two Subnets . . . . . . . . . . . . . . 40
Kimbol Soques and
Bruce Altman UNIX as a DOS File and Print Server . . 45
Larry Reznick Hiding UNIX Applications in Utility
Wrappers . . . . . . . . . . . . . . . . 68
David Leibfritz A UNIX Print Server for UNIX
Workstations, PCs, and Macs . . . . . . 86
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 99
Emmett Dulaney Understanding Run Levels . . . . . . . . 103
Chris Hare procmon: A Process Monitor . . . . . . . 109
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6
Tim Mayfield logit: A Log File Manager . . . . . . . 8
Jeffrey Soto and
Ravindra Nemlekar Configurable Subscription-Based Scripts
for System Monitoring . . . . . . . . . 12
Hendrik-Jan Thomassen A termcap/terminfo Description for xterm 44
Ed Schaefer and
Charles Leonard Converting Data between UNIX and Windows 67
Anonymous Call for Papers . . . . . . . . . . . . 86
Michael Harold Creating Online Help for vi . . . . . . 87
Anonymous Advertiser Index . . . . . . . . . . . . 88--89
Bjorn Satdeva Questions and Answers . . . . . . . . . 97
Anonymous New Products . . . . . . . . . . . . . . 101
Packey P. Velleca Comparing Technologies for Long-Term,
High-Capacity Archives . . . . . . . . . 103
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 113
Larry Reznick Scheduled Rebooting . . . . . . . . . . 117
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6
Jonathan Feldman Using Linux as a Router . . . . . . . . 8
Jay Allen Migrating to an Automounted Network
Filesystem . . . . . . . . . . . . . . . 19
Ernest H. Rice, III Kernel Tuning for System I/O under SCO
UNIX . . . . . . . . . . . . . . . . . . 33
Michael Harold Porting Serial I/O Applications to
Distributed Environments . . . . . . . . 41
Arthur Donkers Linux as an Internet Server . . . . . . 52
Emmett Dulaney Handling Permissions between UNIX and
NetWare . . . . . . . . . . . . . . . . 69
John Woodgate Using fsck to Repair a Filesystem . . . 73
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 79
Bill Gray SM2UR: Simple-Minded System Monitoring
and Uptime Reporting . . . . . . . . . . 85
Anonymous Advertiser Index . . . . . . . . . . . . 88
Anonymous Call for Papers . . . . . . . . . . . . 94
Anonymous New Messages . . . . . . . . . . . . . . 100
Anonymous New Products . . . . . . . . . . . . . . 101
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6
Jonathan Feldman Simple Security: A GroupWise/SMTP
Connection . . . . . . . . . . . . . . . 8
Steven G. Isaacson isascii: The Easy Way to Work around
Binary Files . . . . . . . . . . . . . . 18
Marty Leisner Managing Disk Space . . . . . . . . . . 31
Charles Bundy HTML as a Graphical User Interface for
Sys Admin Tasks . . . . . . . . . . . . 51--56, 59, 60, 62, 63
Bjorn Satdeva Questions and Answers . . . . . . . . . 65
Thomas Richter Password Verification in AIX Version 4 69
Anonymous Advertiser Index . . . . . . . . . . . . 72
Anonymous New Products . . . . . . . . . . . . . . 76
Ed Schaefer and
Fred Brunet Converting UNIX Filenames to MS-DOS . . 81
Anonymous Call for Papers . . . . . . . . . . . . 86
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 87
Anonymous Sys Admin Contents: 1992--1995 . . . . . 91--102
Anonymous New Messages . . . . . . . . . . . . . . 103
Arthur Donkers Using Your Web Browser as a GUI . . . . ??
Gilbert Held Retrieving Information via Email . . . . ??
Colt S. Johnson Interlinking UNIX and MVS . . . . . . . ??
Bjorn Satdeva Questions and Answers . . . . . . . . . ??
Scott White The Administrator's Menu Program . . . . ??
Elizabeth Zinkann Books: A User's Report . . . . . . . . . ??
Steven Baum Graphical User Interface Development
Systems . . . . . . . . . . . . . . . . ??
Richard L. Brownrigg Customizing X Window Sessions with \tt
fvwm . . . . . . . . . . . . . . . . . . ??
Uri Guttman The Directory Stack . . . . . . . . . . ??
Russ Hill Consolidating Startup Shell Scripts . . ??
Doug Morris Simple Screen Auto-Locking Mechanisms ??
Bjorn Satdeva Questions and Answers . . . . . . . . . ??
Tom Tessier Shell Scripting and the WWW: Creating a
Searchable Web Database . . . . . . . . ??
Elizabeth Zinkann Books: A User's Report . . . . . . . . . ??
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6
Thom Garrett PPP Over High-Speed Serial Cards . . . . 8
David Rush IP Networking Over ATM . . . . . . . . . 22
Arthur Donkers Automating Your Network Maintenance . . 35
David Dykes Automated System Administrator's Pager 51
Arthur J. D'Adamo \tt SelectNews.pl: Perl Script for
Selective News Delivery . . . . . . . . 59
Anonymous Advertiser Index . . . . . . . . . . . . 64
Anonymous Career Opportunities . . . . . . . . . . 66
Bjorn Satdeva Questions and Answers . . . . . . . . . 67
Anonymous New Products . . . . . . . . . . . . . . 70
Anonymous Call for Papers . . . . . . . . . . . . 74
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 75
Anonymous New Messages . . . . . . . . . . . . . . 80
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6
Eric Knudstrup Samba . . . . . . . . . . . . . . . . . 8
Arthur Donkers Building a Linux Firewall . . . . . . . 12
Huiqi Liu Low-Cost Email Connection Between UNIX
and Macs . . . . . . . . . . . . . . . . 37
Al Koscielny A Windows NT Fileserver with UNIX
Clients . . . . . . . . . . . . . . . . 43
Stefan C. Johnson Attaching Non-TCP/IP Devices with \tt
telnet . . . . . . . . . . . . . . . . . 51
Anonymous Advertiser Index . . . . . . . . . . . . 56
David Collier-Brown Remote Password Update . . . . . . . . . 63
Anonymous Career Opportunities . . . . . . . . . . 72
Bjorn Satdeva Questions and Answers . . . . . . . . . 74
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 79
Anonymous Call for Papers . . . . . . . . . . . . 83
Anonymous New Products . . . . . . . . . . . . . . 84
Anonymous New Messages . . . . . . . . . . . . . . 88
Robert Ward Editor's Forum . . . . . . . . . . . . . 7--7
Curtis Preston Oracle Database Backup . . . . . . . . . 8
Benjamin J. Anello Simplifying Site-Wide Backups . . . . . 24
Cory Bear How Safe is Your Online Backup . . . . . 26
Arthur Donkers Enhance Your Web-Based GUI with Java . . 35, 36, 39, 40, 42, 43, 45, 47, 50
Anonymous Advertiser Index . . . . . . . . . . . . 48
Ed Schaefer Sybaccess: A Menu-Driven Interface to
Sybase . . . . . . . . . . . . . . . . . 51
Anonymous New Products . . . . . . . . . . . . . . 63
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 67
Anonymous Career Opportunities . . . . . . . . . . 72
Bjorn Satdeva Questions and Answers . . . . . . . . . 77
Anonymous Call for Papers . . . . . . . . . . . . 78
Matthew Cheek Automating Large Sybase Database Backups ??
Michael S. Hill How to Develop a Distributed Filesystem
Model . . . . . . . . . . . . . . . . . ??
Colt Johnson Interprocess Communication Between UNIX
and MVS Applications Using Sockets . . . ??
Doug Morris Hidden Dangers of NFS Mounting Foreign
Filesystems . . . . . . . . . . . . . . ??
Bjorn Satdeva Questions and Answers . . . . . . . . . ??
Jon Alder and
Ed Schaefer A Dispatcher for Database Engine Alarms ??
Scott Tarvainen A System Administration Log Program
Using Tcl/Tk . . . . . . . . . . . . . . ??
Elizabeth Zinkann Books: A User's Report . . . . . . . . . ??
Robert Ward Editor's Forum . . . . . . . . . . . . . 6--6
Emmett Dulaney Taking Shell Scripts Beyond Simple Batch
Functionality . . . . . . . . . . . . . 8
Robert Ess Configuration Tracking . . . . . . . . . 20
Carolyn Conner Surviving the User Maintenance Jungle 38
Danny Lawrence and
Scott Beimer Access Oracle from CGI Scripts Using
Perl . . . . . . . . . . . . . . . . . . 46
Greg A. Wade Restricting Machine Access with the rma
`Shell' . . . . . . . . . . . . . . . . 55
Arthur Donkers Creating User Islands . . . . . . . . . 61
Anonymous Advertiser Index . . . . . . . . . . . . 72
Anonymous Career Opportunities . . . . . . . . . . 74
Anonymous Call for Papers . . . . . . . . . . . . 78
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 79
Anonymous New Products . . . . . . . . . . . . . . 84
Anonymous New Messages . . . . . . . . . . . . . . 88
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Arthur Donkers Building a Secure Web Site . . . . . . . 8
Cornelius Cook Configuring a Minimal Web Server . . . . 23
Gilbert Held Determining a Web Server Connection Rate
to the Internet . . . . . . . . . . . . 32
Jonathan Feldman Building a Linux Web Server . . . . . . 41
Lars Magnusson Local News -- Exploring Web-based
Threaded Discussion Server Functionality 47
Lisa Lees Ethernet to Your Home . . . . . . . . . 53
Luca Salvadori Web Site Management by Mail . . . . . . 57
Anonymous Call for Papers . . . . . . . . . . . . 63
Steven G. Isaacson fchange: The Sys Admin Watchdog . . . . 66
Doug Morris Techniques for Simulating Multiple Group
Ownership . . . . . . . . . . . . . . . 71
Anonymous New Products . . . . . . . . . . . . . . 76
Anonymous New Products . . . . . . . . . . . . . . 76--79
Anonymous Advertiser Index . . . . . . . . . . . . 80
Anonymous New Messages . . . . . . . . . . . . . . 80--80
Anonymous Career Opportunities . . . . . . . . . . 82
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 85
Anonymous Call for Papers . . . . . . . . . . . . 93
Anonymous New Messages . . . . . . . . . . . . . . 96
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
David O'Brien Recognizing and Recovering from Rootkit
Attacks . . . . . . . . . . . . . . . . 8, 10, 13, 14, 16, 19, 20
David Endler Creating a Secure CGI Environment . . . 21--24, 27, 29
Matthew Cheek Enhanced Security on Digital UNIX . . . 31, 32, 35, 36, 38, 40, 42, 44, 46
Arthur Donkers Assorted Security Tips for UNIX . . . . 48, 50, 52, 54--58
Jack Maynard An Introduction to Client/Server
Security . . . . . . . . . . . . . . . . 59--62
Anonymous Call for Papers . . . . . . . . . . . . 63--63
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 65--68
Bjorn Satdeva Questions and Answers . . . . . . . . . 69--72
Bjorn Satdeva Questions and Answers . . . . . . . . . 69--72
Anonymous Career Opportunities . . . . . . . . . . 73--75
Anonymous Career Opportunities . . . . . . . . . . 73--75
Anonymous New Products . . . . . . . . . . . . . . 76--79
Anonymous New Messages . . . . . . . . . . . . . . 80--80
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Dan Reis and
Bill Welch Performance Management on SCO OpenServer 8, 10, 14, 16, 18--21
Gilbert Held Performance Planning in an NT
Environment . . . . . . . . . . . . . . 22, 25--28
Richard S. Smith Performance Management in an RDBMS
Environment . . . . . . . . . . . . . . 29, 30, 32, 34, 36, 38
Michael Hill Understanding syslog.conf . . . . . . . 39, 40, 42, 44, 46, 48, 50--53
Jeffrey B. Davis Detecting System Intruders . . . . . . . 54, 56, 58
Mark Mellman Creating a Web Help Desk with sybperl 59--64
William Steen and
Emmett Dulaney Internet Security Information Sources 65, 66, 68, 71, 73, 74
Anonymous Advertiser Index . . . . . . . . . . . . 72--72
Bjorn Satdeva Questions and Answers . . . . . . . . . 75--76
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 77, 78, 80--82
Anonymous Career Opportunities . . . . . . . . . . 83--83
Anonymous Call for Papers . . . . . . . . . . . . 84--84
Anonymous New Products . . . . . . . . . . . . . . 85--88
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Arthur Donkers Writing Linux Device Drivers . . . . . . 8
Charles C. Bundy, IV Connect LAN Users to the Internet Using
Linux and IP Masquerade . . . . . . . . 22
Jonathan Feldman Eschewing the Internet for External Data
Sharing . . . . . . . . . . . . . . . . 42
Russ Hill Disaster Prevention . . . . . . . . . . 52
Michael Hall Creating Graphical Wrappers with Tcl/Tk 65
David Liebfritz and
Michael Eisenberg Administering Network Information for
PCs Using a Database . . . . . . . . . . 74
Elizabeth Zinkann Book: A User's Report . . . . . . . . . 82
Bjorn Satdeva Questions and Answers . . . . . . . . . 87
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Brian Rice A Web-based Graphical Front End for \tt
sar . . . . . . . . . . . . . . . . . . 8
Chuck Boeheim Patrol . . . . . . . . . . . . . . . . . 16
Bruce Alan Wynn Automating Basic System Activity
Monitoring . . . . . . . . . . . . . . . 31
Carolyn Conner Automating Database Space Monitoring . . 41
Dave Plonka Managing Sys Admin Tasks with GNATS . . 51
Matthew Cheek A Menu Program for Users and Admins
Alike . . . . . . . . . . . . . . . . . 57
Dejan Muhamedagi\'c PPP Connections Made Easy . . . . . . . 61--63, 65
Elizabeth Zinkann Book: A User's Report . . . . . . . . . 67
Bjorn Satdeva Questions and Answers . . . . . . . . . 71
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Tim Cera Supporting PostScript Printing Under
System V . . . . . . . . . . . . . . . . 7
Doris Hoffman Color Printing Management in a UNIX
Environment . . . . . . . . . . . . . . 20
Victor Hazlewood Software-based Cluster Computing . . . . 27
Sean MacGuire Big Brother: A Web-Based UNIX System and
Network Monitor . . . . . . . . . . . . 43
William Schaffer Validating Email Forwarding . . . . . . 55
Lars Magnusson Customizing Sendmail . . . . . . . . . . 61
Jonathan Feldman Babysitting Your Intranet and Internet 67
Bjorn Satdeva Questions and Answers . . . . . . . . . 75
Elizabeth Zinkann Book: A User's Report . . . . . . . . . 79
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Greg P. Schulz New Storage Interfaces . . . . . . . . . 8
David T. Caruso Implementing a CD-ROM Jukebox Solution 16
Gilbert Held Integrating NT into a UNIX Environment 27
Venkat Iyer Serious Shell Programming . . . . . . . 37
Wayne Wonchoba Spatchula --- A Script to Patch Solaris
LANs . . . . . . . . . . . . . . . . . . 47
Ed Schaefer Returning a Single Character in a UNIX
Shell Script . . . . . . . . . . . . . . 53
Anonymous Advertiser Index . . . . . . . . . . . . 56
Luca Salvadori Human: Managing User Accounts with a
Friendly Interface . . . . . . . . . . . 57
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 59
Anonymous Call for Papers . . . . . . . . . . . . 62
Bjorn Satdeva Questions and Answers . . . . . . . . . 63
Anonymous Career Opportunities . . . . . . . . . . 66
Anonymous New Products . . . . . . . . . . . . . . 69
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Arthur Donkers Getting UNIX and NT on Speaking Terms 8
Yiorgos Adamopoulos Samba --- The First Step . . . . . . . . 21
Mark Nassal Samba --- Tuning the NT/UNIX Dance . . . 27
Anonymous Product Survey . . . . . . . . . . . . . 35
Robert Flannigan Adding R* to Windows NT . . . . . . . . 45
Ernst van Licht Product Review: RoboMon UNIX v6.1 . . . 55
Rich Holoch RPTRTR --- A Simple UNIX Report Router 63
Noah Davids Interpreting netstat Statistics . . . . 69
Anonymous Advertiser Index . . . . . . . . . . . . 72
Bjorn Satdeva Questions and Answers . . . . . . . . . 75
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 77
Anonymous Career Opportunities . . . . . . . . . . 81
Anonymous Correction: Dejan Muhamedagi\'c, PPP
Connections Made Easy [Sysadmin, vol. 6,
no. 2, pp. 61--63, 65 (1997)] . . . . . 84
Anonymous Call for Papers . . . . . . . . . . . . 84
Anonymous New Products . . . . . . . . . . . . . . 85
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Gilbert Held Firewalls: The Tool to Prevent Network 8, 10, 12, 13, 15, 16
Carolyn Conner Security: Controlling Root . . . . . . . 19, 20, 22--24, 27
Francisco M. De La Vega Strategies for Securing Web-centric
Intranets . . . . . . . . . . . . . . . 29, 31, 32, 34, 35, 37, 39--41, 43
Anonymous Call for Papers . . . . . . . . . . . . 44--44
Bruce Alan Wynn and
Michael Carpenter Cryptography Tools for the Systems
Administrator . . . . . . . . . . . . . 45, 47--49, 51
Ben N. Klein Can You Trust HP-UX? . . . . . . . . . . 52, 54, 55, 57, 58, 60, 61, 63, 65, 66
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Jack Maynard UNIX Security Auditing: A Practical
Guide . . . . . . . . . . . . . . . . . 67--72
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--75
Bjorn Satdeva Questions and Answers . . . . . . . . . 76, 78, 79
Anonymous Career Opportunities . . . . . . . . . . 80--81
Anonymous New Products . . . . . . . . . . . . . . 82--87
Anonymous New Messages . . . . . . . . . . . . . . 88--88
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Colton S. Johnson TCP/IP Connectivity Options Under NT 4.0 8, 11, 12, 15, 16, 19
David Endler PGP: A Simple Usage Guide . . . . . . . 21, 22, 24, 25, 27--29, 31, 32
Arthur Donkers Securing Your Web Server . . . . . . . . 35--40
Pete Welter and
John Meier Server-Side Java . . . . . . . . . . . . 41, 43, 45--47, 49--51
Anonymous Advertiser Index . . . . . . . . . . . . 48--48
Anonymous Call for Papers . . . . . . . . . . . . 52--52
Luca Salvadori GNATS Revisited . . . . . . . . . . . . 53--55
Thom Garrett System Administration: ${SA} = f(x)$ . . 57--59
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 61--63
Anonymous Career Opportunities . . . . . . . . . . 64--64
Bjorn Satdeva Questions and Answers . . . . . . . . . 65--67
Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous New Messages . . . . . . . . . . . . . . 72--72
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Steven Brown Web-Based Network Management --- A Free
Add-on to HP Openview . . . . . . . . . 8, 11, 12, 14, 15
Rick Moore Automating Software Installation . . . . 16, 18, 19, 21, 22
Francisco M. De La Vega Missing Link: Administration by LDAP
Directory Services . . . . . . . . . . . 25, 27, 28, 30, 32, 34--38, 40
Ron Shalhoup A Web-Based Helpdesk . . . . . . . . . . 41, 42, 44--46
Anonymous Advertiser Index . . . . . . . . . . . . 48--48
Chris Clifton Exporting Environments Made Easy . . . . 49--52, 54, 56, 57
Elizabeth Zinkann A User's Report . . . . . . . . . . . . 59--61
Anonymous Call for Papers . . . . . . . . . . . . 62--62
Bjorn Satdeva Questions and Answers . . . . . . . . . 63--66
Anonymous Career Opportunities . . . . . . . . . . 66--67
Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous New Messages . . . . . . . . . . . . . . 72--72
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Gilbert Held Network: Communications Equipment by the
Layer . . . . . . . . . . . . . . . . . 8, 10, 12, 13, 15, 16, 18, 19
Ralph Barker Product Survey: High-Speed Networking 21, 22, 24, 25, 27, 29--32, 34--36, 38
Ernst van Licht Product Review: Artecon's LynxStak and
LynxArray RAID Systems . . . . . . . . . 41, 43--45, 47, 48
Arthur Donkers ISDN and Linux . . . . . . . . . . . . . 51--53, 55, 57--60
Rafeeq Ur Rehman Distributed Network Security through
Radius . . . . . . . . . . . . . . . . . 63, 65, 66, 68--70
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Anonymous Career Opportunities . . . . . . . . . . 71--71
Anonymous Call for Papers . . . . . . . . . . . . 72--72
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--75
Anonymous New Products . . . . . . . . . . . . . . 76--79
Anonymous Letters . . . . . . . . . . . . . . . . 80--80
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Victor Hazlewood and
Chris Daharsh Backups for Large UNIX Installations . . 8, 10, 12, 15, 16, 18, 19
Gilbert Held Windows NT Backup . . . . . . . . . . . 21--24
Mark L. Nassal The Other Backup: dump . . . . . . . . . 27--28, 30, 32, 34, 36--40, 42
Donald Bryson Forget Me Not . . . . . . . . . . . . . 43--44, 46--48, 50--51
Jonathan Feldman Inexpensive Network Troubleshooting . . 53--55, 57--58, 60
Todd Radermacher and
Peter Kocks Executable Content: Controlling the
Potential Revolution . . . . . . . . . . 61--63, 65--66
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 69--70
Anonymous Career Opportunities . . . . . . . . . . 71--71
Bjorn Satdeva Questions and Answers . . . . . . . . . 73--75
Anonymous Call for Papers . . . . . . . . . . . . 76--76
Anonymous New Products . . . . . . . . . . . . . . 77--80
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Gilbert Held Bandwidth and Latency: The Dynamic Duo
of Network Performance . . . . . . . . . 8, 10, 13--15
Ed Lehr and
Chris Schultz RAID Performance Issues . . . . . . . . 16, 18--20, 22
Jim Pinson vGen . . . . . . . . . . . . . . . . . . 23--24, 26, 28, 30, 33--36
Mario A. Ibanez A Comparison of Firewalls and Intrusion
Detection Systems . . . . . . . . . . . 37--39, 41
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Dejan Muhamedagi\'c A Filter Library System . . . . . . . . 43--46, 48, 50--51
Donald Bryson Problem Solving with sar . . . . . . . . 52, 54--55, 58--59
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 60, 62--63
Anonymous Call for Papers . . . . . . . . . . . . 64--64
Bjorn Satdeva Questions and Answers . . . . . . . . . 65--66
Anonymous Career Opportunities . . . . . . . . . . 67--67
Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous Correction . . . . . . . . . . . . . . . 71--71
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Anthony L. Cook Linux-Hosted Frame Relay . . . . . . . . 8, 10, 14, 16, 18--19
Jonathan Feldman Simple Security: Building a SOCKS Proxy
Server . . . . . . . . . . . . . . . . . 20, 22, 24, 27
Matt Ganis SOCKSLIB.PL --- A Library for Using
SOCKS Firewalls . . . . . . . . . . . . 29--30, 33, 34
Francisco M. De La Vega Secure Remote Sessions . . . . . . . . . 36, 38--39, 41, 43--44
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Arthur Donkers Using Linux in an Office Environment . . 45--46, 48, 50, 51
Anonymous Code Availability . . . . . . . . . . . 52--52
Anonymous Call for Papers . . . . . . . . . . . . 52--52
Chris Chroniger and
David Yarashus When 100Mb/s Isn't Fast Enough . . . . . 53--60
Bjorn Satdeva Questions and Answers . . . . . . . . . 61--62
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 63--65
Anonymous New Products . . . . . . . . . . . . . . 67--70
Anonymous Career Opportunities . . . . . . . . . . 71--71
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Greg P. Schulz Integrating Fibre Channel into a SCSI
World . . . . . . . . . . . . . . . . . 8, 10, 14--16, 18--19
Dale Swindler Tape Drive Technology Comparison: Sony
AIT, Exabyte Mammoth, and Quantum DLT 20, 22, 24, 26, 29--30
Anonymous Advertiser Index . . . . . . . . . . . . 32--32
Jim McKinstry File Replication . . . . . . . . . . . . 33--37
Mark Nassal Security: A Multi-Tiered Approach ---
Part 1 . . . . . . . . . . . . . . . . . 39--40, 42--44, 46
W. Curtis Preston Backup Techniques . . . . . . . . . . . 47--48, 50, 52--54
Anonymous Call for Papers . . . . . . . . . . . . 55--55
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 57, 59--60
Bjorn Satdeva Questions and Answers . . . . . . . . . 61--62, 64
Anonymous Career Opportunities . . . . . . . . . . 65--65
Anonymous New Products . . . . . . . . . . . . . . 67--70
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Ross Goldman UNIX Serial Communications . . . . . . . 8, 10, 12--13
Larry Bennett Streamlining Network Administration with
DHCP . . . . . . . . . . . . . . . . . . 14, 16, 18, 20, 22--23
Mark Nassal Security: A Multi-Tiered Approach ---
Part 2 . . . . . . . . . . . . . . . . . 24, 26, 28, 30--31, 33
Anonymous Advertiser Index . . . . . . . . . . . . 32--32
Bridget Allison Integrating CIFS and NFS File Sharing 34, 36, 38--40
Bob Ess iptool --- Maintaining /etc/hosts . . . 43--45
Christopher A. Jones Shell Objects . . . . . . . . . . . . . 46, 48--53
Anonymous Career Opportunities . . . . . . . . . . 54--54
Gilbert Held RAID Basics . . . . . . . . . . . . . . 55--59
Bjorn Satdeva Questions and Answers . . . . . . . . . 61--62
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 63--65
Anonymous New Products . . . . . . . . . . . . . . 67--70
Anonymous Code Availability . . . . . . . . . . . 71--71
Anonymous Call for Papers . . . . . . . . . . . . 71--71
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Ramon J. Hontanon Managing Remote Access to Your Intranet 8, 10, 12, 14, 16
Pete Welter Why Is My Web Site Down? . . . . . . . . 18, 20, 22, 24--25
Nalneesh Gaur Time Synchronization in a UNIX/NT
Environment . . . . . . . . . . . . . . 27--30, 33
Anonymous Advertiser Index . . . . . . . . . . . . 32--32
Anonymous Call for Papers . . . . . . . . . . . . 34--34
Dave Zwieback Web Capacity Planning: How to Plan for
Server Growth . . . . . . . . . . . . . 35--36, 38, 40--41
Francisco M. De La Vega Improving Performance with Web Server
Clusters . . . . . . . . . . . . . . . . 43--46, 48--50
Gilbert Held Understanding Cookies . . . . . . . . . 51--54
Brian Tanaka Acquiring and Installing a Server
Certificate . . . . . . . . . . . . . . 55--58
Kailash Jayaswal Virtual Network Interfaces and Dependent
Web Sites . . . . . . . . . . . . . . . 59--60
Bjorn Satdeva Questions and Answers . . . . . . . . . 61--62
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 63--65
Anonymous Career Opportunities . . . . . . . . . . 66--67
Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Guy Helmer Security Tools in FreeBSD . . . . . . . 8, 10, 12, 14, 16, 18
Andrew Mickish Graphing Usage Statistics on the Web . . 21--22, 25, 27--28
Anonymous Advertiser Index . . . . . . . . . . . . 32--32
Arthur Donkers The Ins and Outs of Packet Filtering . . 33--35
Steven G. Isaacson Web-Enabled \tt man Pages . . . . . . . 37--40
John Tiso Managing TCP/IP with Windows NT 4.0 . . 45--49
James W. Meritt Setup Check . . . . . . . . . . . . . . 51--56
Joe Berry Assessing CPU Utilization . . . . . . . 57--60
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 61--63
Anonymous Sys Admin Crossword Puzzle . . . . . . . 64--64
Anonymous Career Opportunities . . . . . . . . . . 65--65
Anonymous Call for Papers . . . . . . . . . . . . 66--66
Bjorn Satdeva Questions and Answers . . . . . . . . . 67--68
Anonymous New Products . . . . . . . . . . . . . . 69--71
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Chet Gebhards Restoring the Sun . . . . . . . . . . . 8, 10, 12, 14, 16, 18
Derek Vadala Linux Software RAID --- High Performance
through Low-Cost Alternatives . . . . . 19--20, 22, 24, 26
Robert Owen Thomas The Downside of Routers as Firewalls . . 29--31
Werner Klauser The /proc File System . . . . . . . . . 32, 34--35
Yao-Chiang Kan and
Jackie Carlson and
Jen-Sheng Wang A Print Quota Scheme . . . . . . . . . . 37--38, 41--44
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Anonymous Career Opportunities . . . . . . . . . . 45--45
James Santos Logical Volumes in AIX . . . . . . . . . 46, 48--54
Noah Davids When Packets Collide . . . . . . . . . . 55--59
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 61--63
Anonymous Call for Papers . . . . . . . . . . . . 64--64
Bjorn Satdeva Questions and Answers . . . . . . . . . 65--66
Anonymous Crossword . . . . . . . . . . . . . . . 67--67
Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Nik Okuntseff Overview of Windows NT Security
Subsystem . . . . . . . . . . . . . . . 8, 10, 12, 14, 16
Ed Quillen SLAMming Symbolic Links . . . . . . . . 18, 20, 22
Tony Mobily PHP, Databases, and the Web . . . . . . 24, 26, 28, 30, 32, 34, 36, 38
Bob McCormick Automating Configs with Cfengine . . . . 41--44
Joseph Berry A Methodology for Analyzing Network File
System Performance Problems . . . . . . 45--53
Russ Hill 10 Steps to Becoming a UNIX
Administrator . . . . . . . . . . . . . 55, 57--61
Anonymous Advertiser Index . . . . . . . . . . . . 56--56
Jim McKinstry Real-World RAID Implementation . . . . . 63--67
Arthur Donkers IP Spoofing: Are You Really Who You Say
You Are? . . . . . . . . . . . . . . . . 69--71
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--74
Anonymous Crossword Puzzle Solutions . . . . . . . 75--75
Anonymous Career Opportunities . . . . . . . . . . 76--77
Bjorn Satdeva Questions and Answers . . . . . . . . . 79--82
Anonymous Call for Papers . . . . . . . . . . . . 83--83
Anonymous New Products . . . . . . . . . . . . . . 84--86
Anonymous New Messages . . . . . . . . . . . . . . 87--87
James W. Meritt File Tamper Checking . . . . . . . . . .
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Eric Davis Securing UNIX Passwords . . . . . . . . 8, 10, 12, 14--16
Yufan Hu Readership Sensitive Expiration Control
for Usenet News . . . . . . . . . . . . 19--20, 23--24, 26--27
David Endler Detecting Illegal Root Transition in
Solaris . . . . . . . . . . . . . . . . 29--32, 34--35
Ramón J. Hontañón Encryption 101 --- The Choices . . . . . 37--39, 40--44
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Anonymous Career Opportunities . . . . . . . . . . 44--45
Yuval Lirov and
Dave Macolino and
Martha Ben-Michael and
Andrew Rieger Centaur: Hybrid Desktops with
Manageability . . . . . . . . . . . . . 47, 49, 51--56
Gilbert Held Authenticating Remote Users . . . . . . 57, 59--62
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 63--65
Anonymous Crossword Puzzle Solutions . . . . . . . 66--66
Anonymous Call for Papers . . . . . . . . . . . . 67--67
Anonymous New Products . . . . . . . . . . . . . . 68--71
Ted Nolan Report on 1998 Usenix Technical
Conference . . . . . . . . . . . . . . .
Luca Salvadori Access Control in Sensitive WWW
Environments . . . . . . . . . . . . . .
Anonymous Code Availability . . . . . . . . . . . 4--6
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Randy Zhang Configuring Cisco Routers and Switches
for Management . . . . . . . . . . . . . 8, 10, 12, 14, 16, 18--19
Greg Whalin Virtual Private Networks . . . . . . . . 21--22, 25--26
Ralph Barker Sys Admin's Desktop Tape Library Buyer's
Guide . . . . . . . . . . . . . . . . . 29, 31--41
Anonymous Call for Papers . . . . . . . . . . . . 43--43
Anonymous Advertiser Index . . . . . . . . . . . . 45--45
Thom Garrett IPv6 --- A Brief Overview . . . . . . . 47--50, 52
Anonymous Career Opportunities . . . . . . . . . . 54--55
Robert-Andre Croteau BBWARN: A Notification Extension for Big
Brother . . . . . . . . . . . . . . . . 57--62
Robert Owen Thomas Haunted by the Ghost of Smurfing . . . . 63--64
Bjorn Satdeva Questions and Answers . . . . . . . . . 65--66
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 67--70
Anonymous New Products . . . . . . . . . . . . . . 71--74
Anonymous New Messages . . . . . . . . . . . . . . 75--75
Tim Jones Backing Up Windows Clients on UNIX . . . NT-1--NT-7
Gilbert Held Optimizing NT Performance . . . . . . . NT-9--NT-15
Arthur Donkers Looking at NT Security Through UNIX
Glasses . . . . . . . . . . . . . . . . NT-17--NT-20
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Bob Ess SysMon --- A Systems Monitor . . . . . . 8, 10, 12, 14, 16, 18, 20, 22--24
Joshua Weinberg Centralized Logging with syslog . . . . 27, 30--34
Paul McKinley Aging Passwords . . . . . . . . . . . . 35--37
William Sherman Advisory Management . . . . . . . . . . 39--43
Packey Velleca Time Synchronization . . . . . . . . . . 45--46, 48--53
Anonymous Crossword Puzzle Solutions . . . . . . . 54--54
Anonymous Sys Admin Crossword Puzzle . . . . . . . 54--54
Anonymous Career Opportunities . . . . . . . . . . 54--55
Darrell Root and
Belinda Liviero Slow: A Tool for Reporting and
Diagnosing Performance Problems . . . . 57--63, 65--66
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Robert Owen Thomas Virtual Private Networks: Help or Hype? 67--68
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 69--71
Bjorn Satdeva Questions and Answers . . . . . . . . . 73--75
Anonymous Call for Papers . . . . . . . . . . . . 76--76
Anonymous New Products . . . . . . . . . . . . . . 77--80
William L. Garner User Configuration Basics . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Amy Rich Backups and Disaster Recovery . . . . . 8, 10, 12
Yufan Hu Managing Multi-File System Backup Using
dump/restore . . . . . . . . . . . . . . 15--16, 18, 20, 22, 24, 26
Ira Goodman Network Backup Configuration: A Primer 29--30, 33--36
Anonymous Advertiser Index . . . . . . . . . . . . 32--32
Gilbert Held Televaulting and LAN Backup . . . . . . 37--40
Charles Gagnon Managing a Distributed Software Library
Using LUDE . . . . . . . . . . . . . . . 41--46
Jim McKinstry Alternate Boot Devices . . . . . . . . . 47, 49--50, 52--55
Steven Bellenot Creating User Accounts . . . . . . . . . 57--60
Arthur Donkers The Art and Detection of Port Scanning 61--64
Bjorn Satdeva Questions and Answers . . . . . . . . . 65--67
Anonymous Call for Papers . . . . . . . . . . . . 68--68
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 69--72
Anonymous Career Opportunities . . . . . . . . . . 73--75
Anonymous Crossword Puzzle Solutions . . . . . . . 73--73
Anonymous New Products . . . . . . . . . . . . . . 76--79
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Dave Plonka Sys Admin File Revision Control with RCS 8, 10, 12, 14, 16, 18, 20--22
Frank Koensgen Managing Availability of SAP R/3 . . . . 25, 26, 28
Robert Kiesling Managing Documentation with RCS . . . . 31--32, 34--36
Richard S. Smith A Web-Based Revision Control System . . 37--40
Gilbert Held Using vLANs . . . . . . . . . . . . . . 41--42, 44, 46--47
Brian Tanaka Writing Maintainable Perl Programs and
Shell Scripts . . . . . . . . . . . . . 49--50, 52
Benjamin F. Kuo Using UNIX Utilities to Create CD-ROMs 53--56
Chris Hare IT Security Coming of Age . . . . . . . 57--62
Anonymous Call for Papers . . . . . . . . . . . . 63--63
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Packey Velleca Reducing Asynchronous Serial Interrupts 65--68
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 69--71
Anonymous Career Opportunities . . . . . . . . . . 72--73
Anonymous New Products . . . . . . . . . . . . . . 74--76
Bjorn Satdeva Questions and Answers . . . . . . . . . 77--79
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Gary Bahadur and
Dan Robertson Security Diagnostic Review for Solaris
2.X . . . . . . . . . . . . . . . . . . 8, 10, 12, 14
Robert Kiesling Linux and the Y2K Bug . . . . . . . . . 16, 18--20
Michael Schwager Sendmail as Gatekeeper . . . . . . . . . 23--28
Arthur Donkers Living on the Edge . . . . . . . . . . . 29--30, 33--35
Anonymous Advertiser Index . . . . . . . . . . . . 32--32
Anonymous Career Opportunities . . . . . . . . . . 36--36
Noah Davids IP Forwarding . . . . . . . . . . . . . 37--38
Syed Ali Freeware-Based Security . . . . . . . . 39--42, 43--44
Ron Jachim Application Level ping: alp . . . . . . 45--48
Ed Schaefer Password Encryption in Shell Scripts . . 49--54
Mark Rauschkolb Writing a Web-Based Admin Tool . . . . . 55--58
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 59--60, 62
Bjorn Satdeva Questions and Answers . . . . . . . . . 63--65
Anonymous Call for Papers . . . . . . . . . . . . 66--66
Anonymous New Products . . . . . . . . . . . . . . 67--70
Anonymous New Messages . . . . . . . . . . . . . . 71--71
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Michael Schwager De-Spamming the Enterprise with Sendmail
8.9 . . . . . . . . . . . . . . . . . . 8, 10, 12--15
Christopher Bush Using Apache as an Internet Proxy Server 16, 18, 20, 22, 24--29
Rob Kolstad 1998 SANS System, Network, and Security
Administration Survey . . . . . . . . . 29--30, 32
Ron McCarty RADIUS . . . . . . . . . . . . . . . . . 33--39, 41
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Anonymous Career Opportunities . . . . . . . . . . 42--42
Jimmy Ball Web Security Basics with Apache:
Authentication and Secure Log Files . . 43--46
Arthur Donkers SSL: What Does It Buy Me? . . . . . . . 47--48, 50--54
John Berninger Network Monitoring . . . . . . . . . . . 55--58
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 59--63
Bjorn Satdeva Questions and Answers . . . . . . . . . 65--66
Anonymous Call for Papers . . . . . . . . . . . . 68--68
Anonymous New Products . . . . . . . . . . . . . . 69--71
Michael Schwager How Spammers Do It . . . . . . . . . . . ??
Michael Schwager The Sendmail Rulesets --- A Detailed
Look . . . . . . . . . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Victor Hazlewood UNIX Accounting Magic . . . . . . . . . 8, 10, 12, 14, 16, 18
Michael Schwager Proactive Spam Prevention . . . . . . . 19--22
Clay Lin Using Expect to Configure Cisco Routers 23--24, 27, 29--30
George Kurtz and
Chris Prosise The Art of Attack and Penetration:
Understanding Your Security Posture . . 31, 33--38
John Mechalas The Masshosts Tool . . . . . . . . . . . 39, 41--46
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Gilbert Held Checking Network Health . . . . . . . . 47--48, 50--52
Christopher Bush Perls of Wisdom . . . . . . . . . . . . 53--57
Anonymous Call for Papers . . . . . . . . . . . . 58--58
Bjorn Satdeva Questions and Answers . . . . . . . . . 59--61
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 63--66
Anonymous Career Opportunities . . . . . . . . . . 67--67
Anonymous New Products . . . . . . . . . . . . . . 69--71
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Ira Goodman Network Backup Configuration: A More
Complex Scenario . . . . . . . . . . . . 8, 10, 12, 14, 16, 18
Tim Jones Image-Based Versus File-by-File Backup 20, 22
Corey Gaffney Patching Solaris . . . . . . . . . . . . 24, 26, 28, 30, 32--35
Anonymous Career Opportunities . . . . . . . . . . 36--36
Chris Prosise and
George Kurtz The Art of Attack and Penetration:
Defending Your Site . . . . . . . . . . 37--39, 41--42, 44
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Chad Barker and
Mark Frisbey Designing For Disaster . . . . . . . . . 47--50
John E. Canavan Painless AIX . . . . . . . . . . . . . . 51--55
Anonymous Call for Papers . . . . . . . . . . . . 56--56
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 57--60
Arthur Donkers Publicly Available Security Tools . . . 61--63
Bjorn Satdeva Questions and Answers . . . . . . . . . 67, 66--68
Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Ronald McCarty Packet Filtering and Cisco's Way . . . . 8, 10, 12, 14, 16, 18, 20
Christopher Bush Enhancing Network Security with
tcp\_wrapper . . . . . . . . . . . . . . 22, 24, 26--28
Rafeeq Ur Rehman Linux Transparent Proxy . . . . . . . . 29--30, 32--34
Kyle Dent Securing Apache . . . . . . . . . . . . 35--39
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
William Kramp Secure by Design . . . . . . . . . . . . 41--44
Ray Soriano and
Gary Bahadur Securing Your Web Server . . . . . . . . 45--46, 48--52
Timothy Swenson Customer Support --- The View from the
Other End of the Phone . . . . . . . . . 53--56
Bjorn Satdeva Questions and Answers . . . . . . . . . 57--58, 60--61
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 62, 64--66
Anonymous Career Opportunities . . . . . . . . . . 67--67
Anonymous Call for Papers . . . . . . . . . . . . 68--68
Anonymous New Products . . . . . . . . . . . . . . 69--71
Anonymous New Messages . . . . . . . . . . . . . . 72--72
Chris Bush Web-Exclusive: \tt tcp\_wrapper Macro
Basics . . . . . . . . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum . . . . . . . . . . . . . 6--6
Randy Zhang Implementing LAN Switching . . . . . . . 8, 10, 12--14, 16, 18--20
Jon ``maddog'' Hall Legitimizing Linux . . . . . . . . . . . 21--22
Terrehon Bowden and
Bodo Bauer Linux Firewall and Masquerading: The IP
Chains Concept in Linux 2.2 . . . . . . 23--24, 26--30, 32
Bryan C. Andregg The All Linux Office . . . . . . . . . . 33--38
Robert Kiesling The Linux Kernel: A Case Study for CVS
39 . . . . . . . . . . . . . . . . . . . 39, 41--43
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Anonymous Call for Papers . . . . . . . . . . . . 44--44
Joe Freeman and
Ronald McCarty VPNs and IPSec: An Introduction . . . . 45--49
Gilbert Held Gigabit Ethernet --- The Potential
Illusion of Speed . . . . . . . . . . . 51--55
Marcel Gagné Web-Enabling Legacy Applications . . . . 57--59
Anonymous Career Opportunities . . . . . . . . . . 60--60
Bjorn Satdeva Questions and Answers . . . . . . . . . 61--64
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 65--67
Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum: syslog . . . . . . . . . 6--6
Joe Beck ABCs of Performance Tuning . . . . . . . 8, 10, 12, 14, 16, 18
Anthony Taylor Perl for the DBA . . . . . . . . . . . . 20, 23--24, 26--27, 29--30
Anonymous Career Opportunities . . . . . . . . . . 34--34
John Berninger and
Dana Lee SAs and DBAs: Interactions across
Traditional Lines of Responsibility . . 35--39
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Noah Davids TCP Connection States: A Clue to Network
Health . . . . . . . . . . . . . . . . . 41--48
Jim McKinstry I/O Considerations for Database
Performance . . . . . . . . . . . . . . 49--54
Alan Laudicina Exploits . . . . . . . . . . . . . . . . 55--59
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 61--63
Anonymous Call for Papers . . . . . . . . . . . . 64--64
Bjorn Satdeva Questions and Answers . . . . . . . . . 65--67
Anonymous New Products . . . . . . . . . . . . . . 68--71
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum: syslog . . . . . . . . . 6--6
Gilbert Held What's New in LAN Management . . . . . . 8, 10, 12, 14, 16
Dave D. Zwieback Storage Capacity Planning . . . . . . . 19--20, 22, 24--26, 28, 30
Randal L. Schwartz The Missing Symlink . . . . . . . . . . 33--34, 36
Ron Jachim Poor Man's High Availability . . . . . . 37--38, 40--43
Jeffrey R. Thomas Hierarchical Storage Management . . . . 45--48
Andrew Mickish A Comprehensive Approach to Log Files 49--55
Steve Nelson Fibre Channel Unraveled . . . . . . . . 57--63, 65
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Anonymous Career Opportunities . . . . . . . . . . 66--66
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 67--69
Bjorn Satdeva Questions and Answers . . . . . . . . . 71--72, 74
Anonymous Call for Papers . . . . . . . . . . . . 75--75
Anonymous New Products . . . . . . . . . . . . . . 76--79
Anonymous Code Availability . . . . . . . . . . . 4--4
Ralph Barker Editor's Forum: Uncommon Common Ground 6--6
Dan Farmer and
Brad Powell and
Matt Archibald TITAN --- A Systems Administration
Approach to Security . . . . . . . . . . 8, 10, 12, 14, 16
M. L. A. Lammerse Can You C2? . . . . . . . . . . . . . . 18, 20, 22--24
Marcel Gagné The Xni Network Analysis Tool . . . . . 25--26, 28, 30, 32, 34
Michael Lucas Maintaining Patch Levels with Open
Source BSDs . . . . . . . . . . . . . . 35--36, 38, 40, 42
Amy Rich Landmining the Cracker's Playing Field 43--44, 46, 48--49
Dave D. Zwieback Hardening a Host . . . . . . . . . . . . 51--56
Ronald McCarty Intrusion Detection Strategies and
Design Considerations . . . . . . . . . 57, 59--63
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
John Mechalas Practical Packet Sniffing . . . . . . . 65--71
Anonymous Call for Papers . . . . . . . . . . . . 72--72
James W. Meritt Use the 'Net to Secure Your Net . . . . 73--74
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 75--78
Bjorn Satdeva Questions and Answers . . . . . . . . . 79--80
Anonymous Career Opportunities . . . . . . . . . . 82--82
Anonymous New Products . . . . . . . . . . . . . . 83--88
Shannon Wyatt and
Bryan C. Andregg New Messages . . . . . . . . . . . . . . 87--87
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Randy Zhang DSL: Technology and Implementation . . . 8, 10, 12, 14, 16, 18, 20--21
Steven G. Isaacson Using Screen . . . . . . . . . . . . . . 23--24, 26
Chris Byers Balancing User Flexibility and
Administrative Support . . . . . . . . . 29--30, 32, 34, 36
Randal Schwartz Compiling Regular Expressions . . . . . 39--40, 42
Esme Cowles and
Leonard K. Carson Lessons Learned from PCASSO . . . . . . 43--47
Anonymous Advertiser Index . . . . . . . . . . . . 48--48
John Weeks Webifying UNIX Commands . . . . . . . . 49--50, 52--54, 56--57, 59--60
Robert Blader File Transfer and Verification Between
Non-Connected Networks . . . . . . . . . 61--64
Anonymous Career Opportunities . . . . . . . . . . 65--65
Anonymous Call for Papers . . . . . . . . . . . . 66--66
Patrick Lambert Implementing Security on Linux . . . . . 67--70
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 71--74
Anonymous New Products . . . . . . . . . . . . . . 75--78
Anonymous New Messages . . . . . . . . . . . . . . 79--79
Anonymous Code Availability . . . . . . . . . . . 4--4
David Wartell Controlling Spam . . . . . . . . . . . . 8, 10, 12
George Winter Automated Boot Disk Fail Over . . . . . 14, 16, 18, 20, 22, 24, 26
Gilbert Held Router Access Lists . . . . . . . . . . 29--34
Ralph Barker Alternative Libraries . . . . . . . . . 35--38
Reinhard Erich Voglmaier Admin Agent . . . . . . . . . . . . . . 39--43
Ron McCarty Domain Name System Design Considerations 45--48
Mike Schwager Automating Your Site with Expect . . . . 49--54
Shawn Bayern and
Brian Carp How to Crawl Back Inside Your Shell . . 55--58
Joe Aguiar Log File Event Management with Waldo . . 59--60, 62--63, 65
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Jim McKinstry Questions and Answers . . . . . . . . . 67--69
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 71, 73, 74
Anonymous Career Opportunities . . . . . . . . . . 75--75
Anonymous Call for Papers . . . . . . . . . . . . 76--76
Anonymous New Products . . . . . . . . . . . . . . 77--79
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Kyle Dent IBM's Secure Mailer . . . . . . . . . . 8, 10, 12, 14
David Conrad Upgrading BIND . . . . . . . . . . . . . 16, 18, 20, 23--24, 26
Dave Zwieback Using Solaris Packages . . . . . . . . . 29--30, 32, 34, 36, 38, 40
Randal L. Schwartz Figuring Phone-y Words . . . . . . . . . 43--44, 46
Victor Hazlewood A Holy Grail for the New Millennium: No
Plaintext Passwords . . . . . . . . . . 47--48, 50--52
James Santos Network Troubleshooting Tips . . . . . . 53--54, 55--58
Ron McCarty Web Caching: Why the Continued Interest? 59--62
Gilbert Held Switching by the Layer . . . . . . . . . 63--67
Jim McKinstry Questions and Answers . . . . . . . . . 69--71
Anonymous Advertiser Index . . . . . . . . . . . . 72--72
Lenard Morin and
Ed Schaefer Verifying Dates and Times for the
Millennium . . . . . . . . . . . . . . . 73--75
Tony Bourke Console Network Design . . . . . . . . . 77--78
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 79--81
Anonymous New Messages . . . . . . . . . . . . . . 82--82
Anonymous Call for Papers . . . . . . . . . . . . 83--83
Anonymous Career Opportunities . . . . . . . . . . 84--84
Anonymous New Products . . . . . . . . . . . . . . 85--87
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Dave Endler Creating and Deploying a Honey Pot . . . 8, 10, 12, 14, 16, 18, 20--22, 24
Michael Lucas Linux under FreeBSD . . . . . . . . . . 26, 29--30, 32
James O'Kane Kickstart . . . . . . . . . . . . . . . 33--34, 36
Ron McCarty Fast Port Speeds Do Not Build Optimized
Networks . . . . . . . . . . . . . . . . 37--38, 40
Marcel Gagné EnlightenDSM --- Distributed Systems
Management . . . . . . . . . . . . . . . 41--42, 44--46, 48
Matthew Marsh Policy Routing in Linux . . . . . . . . 49--50, 52--58
Joe ``Zonker'' Brockmeier Selecting a GUI for Linux . . . . . . . 59--61
Ron Jachim Practical IP and DNS Tips . . . . . . . 63, 65--66
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 67--70
Anonymous Call for Papers . . . . . . . . . . . . 71--71
Jim McKinstry Questions and Answers . . . . . . . . . 73--75
Anonymous New Products . . . . . . . . . . . . . . 76--78
Anonymous New Messages . . . . . . . . . . . . . . 79--79
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Alan C. Davis Implementing Web/RCS under Oracle OWS
for UNIX . . . . . . . . . . . . . . . . 8, 10, 12, 14
Liam Widdowson Deploying Microsoft FrontPage 2000 UNIX
Web Services . . . . . . . . . . . . . . 16, 18, 21--22, 24, 27, 29--30, 32
Steve Nice Isolating Performance Problems . . . . . 33--34, 38--41
Randal L. Schwartz Deep Copying, not Deep Secrets . . . . . 43--46
Anonymous Call for Papers . . . . . . . . . . . . 47--47
Anonymous Advertiser Index . . . . . . . . . . . . 48--48
Ron McCarty Snort . . . . . . . . . . . . . . . . . 49--52
Marcel Gagné A Linux Email Server . . . . . . . . . . 53--58
Don Gourley and
Wei Wu Building a Web-based Java Application
Server with Apache JServ . . . . . . . . 59--65
Jim McKinstry Questions and Answers . . . . . . . . . 67--69
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 71--74
Anonymous New Products . . . . . . . . . . . . . . 75--78
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Michael Lucas FreeBSD for the SVR4/Linux Administrator 8, 10, 12, 14, 16
Bill Kramp Beyond MTRG . . . . . . . . . . . . . . 18, 20, 22, 24, 27, 29--30, 32
Darrin Husmann and
Andy Sackrieter LogViewer . . . . . . . . . . . . . . . 33--34, 36, 38, 40--43
George Ericson and
Ken Kutzer Storage Area Networks --- Achieving Safe
Shared Data Access . . . . . . . . . . . 45--50
Ed Quillen Script Manager . . . . . . . . . . . . . 51--52, 54
Ron McCarty NAT: Network Address Translator . . . . 55--57, 60
Gilbert Held Router-Based Network Defense . . . . . . 61--63, 65
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Anonymous Call for Papers . . . . . . . . . . . . 66--66
Jim McKinstry Questions and Answers . . . . . . . . . 67--69
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 71--72, 74--75
Anonymous New Products . . . . . . . . . . . . . . 76--79
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Greg Schuweiler Building a SAN Backup Solution . . . . . 8, 10, 12, 14
Mark Nielsen Using Linux to Duplicate Computers . . . 16, 18, 20, 22, 25
William David Automatically Performing and Monitoring
Backups . . . . . . . . . . . . . . . . 27--28, 30, 32--33
Randal L. Schwartz Rainy Day Template Fun . . . . . . . . . 35, 37--38, 40
Gilbert Held The Emergence of Convergence . . . . . . 42, 44--46, 48--49
Alan C. Davis Automating Single-User Backups with Tape
Verification . . . . . . . . . . . . . . 51--53
Mike Dunham and
Ed Schaefer Recovering Source From a Defunct RCS
System . . . . . . . . . . . . . . . . . 55--58
Mats Brymér Managing Usability with the TERM
Variable . . . . . . . . . . . . . . . . 59--60, 62--63, 65--68
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Ron McCarty ICMP: The Good, the Bad, and the Ugly 69--71
Anonymous Call for Papers . . . . . . . . . . . . 72--72
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--75
Anonymous New Products . . . . . . . . . . . . . . 76--79
Jim McKinstry Additional Questions and Answers . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Peter van der Weerd Building a Jumpstart Server for Solaris 8, 10, 12, 14
Kurt Seifried Crypto 101 . . . . . . . . . . . . . . . 16, 20, 22, 24, 26--27
Matej Sustic The Use of Routers in Firewall Setup . . 29--30, 32, 35--36, 38, 40--41
Eric Davis SNMPv3 --- User Security Model . . . . . 43--44, 46, 48--50
Gilbert Held Implementing Voice and Data Convergence 51--52, 54--55
W. Curtis Preston Backups --- In a League of Their Own . . 57--61
Didier Racheneur Setting Root SUIDed Programs at Work . . 63, 65--71
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Reinhard Voglmaier Simplifying Web Production . . . . . . . 73--76
Ron McCarty MPLS Part I: The Search for IP Quality
of Service . . . . . . . . . . . . . . . 77--78
Joe Beck A Sys Admin's Toolkit . . . . . . . . . 79--84
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 85--87
Jim McKinstry Questions and Answers . . . . . . . . . 89--91
Anonymous Call for Papers . . . . . . . . . . . . 92--92
Anonymous New Products . . . . . . . . . . . . . . 93--95
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Wyman Eric Miles LPRng . . . . . . . . . . . . . . . . . 8, 10, 12, 14, 16, 18, 22
Lizmari Brignoni LDAP Directory Basics . . . . . . . . . 23--24, 26--27, 29, 31
Michael Lucas FreeBSD Firewall Tools & Techniques . . . 32, 34, 36--37, 39, 41--42, 44
Eric Davis SNMPv3 --- View Access Control Model . . 45--46, 48, 50--51
Randal L. Schwartz Getting It to Look the Way You Want . . 53--55
Reinhard Erich Voglmaier Link Management System . . . . . . . . . 57--59
Kristy Westphal Tiger . . . . . . . . . . . . . . . . . 61--62, 64, 66--67
Gilbert Held Convergence Economics . . . . . . . . . 69--72
Ron McCarty MPLS Part II: A Closer Look . . . . . . 73--75
Marcel Gagné A Linux Internet Gateway . . . . . . . . 77--79, 81--83
Anonymous Advertiser Index . . . . . . . . . . . . 80--80
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 85--87
Anonymous Call for Papers . . . . . . . . . . . . 88--88
Jim McKinstry Questions and Answers . . . . . . . . . 89--91
Anonymous New Products . . . . . . . . . . . . . . 92--94
Anonymous New Messages . . . . . . . . . . . . . . 95--95
Anonymous Converging Remote Networks into Your
Routing Table . . . . . . . . . . . . . ??
Chris Kuethe Dial-Up Networking with PPP . . . . . . ??
Shawn Bayern Making a Wish: The Web-Interface Shell ??
Mike Murphy Scripting and HTML . . . . . . . . . . . ??
Ed Schaefer Processing Command-Line Options in the
Shell . . . . . . . . . . . . . . . . . ??
Gunnar Wolf WPM --- Web-Based Proxy Manager . . . . ??
W. Curtis Preston As Easy As It Gets . . . . . . . . . . . ??
Pam Rissmann Pushing Corporate Email out to Wireless
Devices . . . . . . . . . . . . . . . . ??
Alek Komarnitsky \tt Gettemp --- Built-In Temperature
Monitoring for Sun Enterprise Servers ??
Jim McKinstry Questions and Answers . . . . . . . . . ??
Elizabeth Zinkann Books: A User's Report . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . ??
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . ??
Anonymous Advertiser Index . . . . . . . . . . . . ??
Anonymous Career Opportunities . . . . . . . . . . ??
Anonymous Call for Papers . . . . . . . . . . . . ??
Anonymous New Products . . . . . . . . . . . . . . ??
Anonymous New Messages . . . . . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Greg Schuweiler Migrating Solaris to a Storage Area
Network . . . . . . . . . . . . . . . . 8, 10, 12
Rafeeq Ur Rehman Logical Volume Manager for Linux . . . . 14, 16, 18, 20, 22, 25
Dave Plonka How I Recovered Data I Thought I'd Lost 26, 28--30
David Sultzman Storage Area Networks . . . . . . . . . 33, 35, 36--38, 40
Timothy Swenson How to Read a SCSI Bus Trace . . . . . . 43--44, 46--47
Russ Hill Automating ftp with Expiring Passwords 49--51
Randal L. Schwartz Taint so Easy, Is It? . . . . . . . . . 53--54
Yufan Hu Up and Down . . . . . . . . . . . . . . 55--56, 58--59
Kerry Miles Merging Files without Disk Space . . . . 61--63
Randy Appleton Perl and the Practical Systems
Administrator . . . . . . . . . . . . . 65--68
Bryon Beilman and
Jamy Libsack The Art of the Refresh . . . . . . . . . 69--71
Anonymous Advertiser Index . . . . . . . . . . . . 72--72
Ron McCarty Network Operations Center On-line . . . 73--74, 76--77
Anonymous Call for Papers . . . . . . . . . . . . 78--78
Jim McKinstry Questions and Answers . . . . . . . . . 79--80
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 81--83
Anonymous New Products . . . . . . . . . . . . . . 84--86
Anonymous New Messages . . . . . . . . . . . . . . 87--87
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Kurt Seifried PAM --- Pluggable Authentication Modules 8, 10, 12, 14
Michael Lucas FreeBSD's \tt sysctl Interface . . . . . 16, 18, 22
Emmett Dulaney Examining LPI Certification . . . . . . 23--24, 26, 28, 30
Joe Aguiar Cross Platform Event Reporting . . . . . 33--34, 36
Alex Withers OpenBSD as a VPN Solution . . . . . . . 39--40, 42, 44, 45
Kristy Westphal Snort --- A Look Inside an Intrusion
Detection System . . . . . . . . . . . . 46, 48, 50, 52--53
John C. Place FreeBSD Mail Server with GUI . . . . . . 55--58
David Totsch Managing SUID/SGID Files . . . . . . . . 60, 62--63, 65
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
W. Curtis Preston Why SANs? . . . . . . . . . . . . . . . 67--72
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--76
Gilbert Held Quality of Service . . . . . . . . . . . 77--81
Ron McCarty Sendmail Alternatives . . . . . . . . . 83--85
Jim McKinstry Questions and Answers . . . . . . . . . 87--89
Anonymous Call for Papers . . . . . . . . . . . . 90--90
Anonymous New Products . . . . . . . . . . . . . . 91--94
Anonymous New Messages . . . . . . . . . . . . . . 95--95
Barbara Dijker Careers in System Administration . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Matt Lesko Installing and Configuring OpenSSH . . . 8, 10, 12
Clark Cooper Alias Defender . . . . . . . . . . . . . 14, 16, 18, 20
Alek Komarnitsky nmap-web: Port Scanning Made Easy . . . 22, 24, 26, 28--30
Arthur Donkers Building Tunnels with VTun . . . . . . . 32, 34, 36, 38, 40--41
Randal L. Schwartz Little Acts of Magic . . . . . . . . . . 43--45
Gilbert Held Layer 2 Quality of Service . . . . . . . 47--48, 50, 52, 54
Jeff Gilbertson Platform-Independent Backup Script . . . 57--59
Werner Klauser MySQL for E-Commerce Web Sites . . . . . 61--63, 65
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Adam Olson Scaring Crackers Away with TCP Wrapper 67--71
John Tiso Automated Security Scanning . . . . . . 73--74, 76, 78
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 79--82
Ron McCarty The World According to ARP . . . . . . . 83--85
Jim McKinstry Questions and Answers . . . . . . . . . 86, 88--89
Anonymous Call for Papers . . . . . . . . . . . . 90--90
Anonymous New Products . . . . . . . . . . . . . . 91--93
Anonymous New Messages . . . . . . . . . . . . . . 94--95
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
David Sweet A Perl of a Site Map . . . . . . . . . . 8, 10, 12, 14, 16, 19, 22
Emmett Dulaney Evaluating MKS Toolkit 7.0 . . . . . . . 24, 26, 28, 30
Robert Geiger and
John Schweitzer Automating UNIX Security Monitoring . . 32, 34--36
Ron McCarty Virtual Router Redundancy Protocol . . . 38, 40, 43
Kurt Seifried How to Hack -- An Introduction . . . . . 44, 46--47
Carlos Ramirez Monitoring Web Server Reliability . . . 49--50, 53
Ed Schaefer Using vi Tag Files . . . . . . . . . . . 55--56
Gilbert Held QoS into the Network: Router Queuing . . 57--62
Duncan Napier Introducing FreeS/WAN and IPsec . . . . 63, 65--69
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
W. Curtis Preston A Fibre Channel Primer: Part 1 . . . . . 71--74
Dan Garrett Fast and Painless System-Disk Recovery
on SGI Systems . . . . . . . . . . . . . 75--76, 78--80, 82--83
Bill Bollenbach AIX Filesystem ReOrg Made Simple . . . . 85--86
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 87--89
Anonymous Call for Papers . . . . . . . . . . . . 90--90
Anonymous New Messages . . . . . . . . . . . . . . 94--95
Anonymous New Products . . . . . . . . . . . . . . 91--93
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Rich Teer New Approaches to Making Solaris More
Secure . . . . . . . . . . . . . . . . . 8, 10, 12, 14, 16, 18
Jeff Ruggeri Starfire Administration . . . . . . . . 19--20, 22, 24--25
Ido Dubrawsky Securing Solaris . . . . . . . . . . . . 26, 28--35
Kevin Wenchel and
Stephen Michaels Implementing C2 Auditing in the Solaris
Environment . . . . . . . . . . . . . . 36, 38--39, 41--44
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Robert Weeks and
Marc Tamres The BigAdmin Protocol: Combining Tools
and Community . . . . . . . . . . . . . 45--47
Ron McCarty IP Filter on Solaris . . . . . . . . . . 53--56
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 61--63
Jim McKinstry Questions and Answers . . . . . . . . . 64, 66--67
Anonymous Call for Papers . . . . . . . . . . . . 68--68
Anonymous New Products . . . . . . . . . . . . . . 69--71
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Randy Zhang MPLS: Delivering Next Generation
Networking Services . . . . . . . . . . 8, 10, 12, 14, 16, 18
Adam Anderson and
Dave Felps Protocol Analysis for Performance Tuning 20, 22, 24
Peter Valian and
Todd K. Watson NetReg: An Automated DHCP Registration
System . . . . . . . . . . . . . . . . . 26, 28, 30--32
Thomas Vincent Role-Based Access Control . . . . . . . 35--36, 38
Randal L. Schwartz So What's the Difference? . . . . . . . 39--40, 42--43
Ben Diamond How to Make a Solaris 2.5.1 Workstation
Support PPP Dial-Up from Windows . . . . 44--46, 48--50, 52
Reinhard Erich Voglmaier Managing an LDAP Database with Perl and
Apache . . . . . . . . . . . . . . . . . 55--56, 58--59
Ron McCarty FCheck: A Solution to Host-Based
Intrusion Detection . . . . . . . . . . 61--63
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Jim McKinstry and
Amy Rich Questions and Answers . . . . . . . . . 66, 68--70
Gilbert Held QoS into the Network: Part 2 . . . . . . 71--72, 74--75
Kurt Seifried How to Hack UNIX: Part 2 . . . . . . . . 77--80
Chris Josephes Designing a Scalable NNTP Server Network 81--88
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 89--91
Anonymous Call for Papers . . . . . . . . . . . . 92--92
Anonymous New Products . . . . . . . . . . . . . . 93--93
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6
Don Gourley An Apache Load Balancing Cluster . . . . 8, 10, 12, 14, 16
D. Hageman GnuPG: An Open Solution to Data
Protection . . . . . . . . . . . . . . . 18, 20, 22, 24--26
Mike Murray Installing OpenBSD on Small Disks . . . 28, 30
Chris Bush Linux as an Application Server -- The
Tomcat Way . . . . . . . . . . . . . . . 31--32, 34, 36, 39--40, 42, 44
David Beecher Getting Out/Getting In . . . . . . . . . 45--46, 48, 50
Greg Nakhimovsky Measuring and Improving Memory
Efficiency of Large Applications . . . . 51--52, 54, 56--57
Drew Smith Homebrew High Availability: Booting
Linux from a RAID-1 Device . . . . . . . 59--60, 62, 64--65
Gilbert Held QoS Through the Network . . . . . . . . 67--68, 70, 72
Ron McCarty RSVP: Signaling Quality of Service . . . 73--74
Andreas Meyer Build a Floppy Firewall . . . . . . . . 76, 78--79
Peter H. Salus Disruptions of Service: Types and
Effects . . . . . . . . . . . . . . . . 81--85
W. Curtis Preston A Fibre Channel Primer: Part 2 . . . . . 87--90
Rafeeq Ur Rehman Open Source Real-Time Operating Systems 91--95
Anonymous Advertiser Index . . . . . . . . . . . . 96--96
Jim McKinstry and
Amy Rich Questions and Answers . . . . . . . . . 97--98, 100--101
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 102, 104--105
Anonymous Call for Papers . . . . . . . . . . . . 106--106
Anonymous New Products . . . . . . . . . . . . . . 107--109
Anonymous New Messages . . . . . . . . . . . . . . 110--111
Anonymous Linux Intrusion Detection Poster . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6
Charles Walker and
Larry Bennett Safer CGI Scripting . . . . . . . . . . 8, 10, 12, 14, 16, 18, 20, 22
Brett Lymn What To Do When the Server Doesn't Serve 24, 26, 28
Dani Pardo A Centralized and Flexible Antivirus
Solution . . . . . . . . . . . . . . . . 31--34
Adam Olson Keeping Your Web Content in Sync . . . . 37--38
Charles V. Leonard Devouring Spam with Spamivore . . . . . 39--40, 42--44, 46--47
James O'Gorman Viagra: Keeping Services Running on BSD 49--51
Michael Watson Replacing rdist and ftp with scp and
Associated Utilities . . . . . . . . . . 52, 54
Davin Petersen Overcoming Large Outlook Distribution
Lists: An Exercise in Sendmail Aliases 55--57
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 59--60, 62
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Randal L. Schwartz What is That, Anyway? . . . . . . . . . 65--67
Jim McKinstry and
Amy Rich Questions and Answers . . . . . . . . . 68, 70--71
Anonymous New Products . . . . . . . . . . . . . . 73--75
Anonymous Call for Papers . . . . . . . . . . . . 76--76
Anonymous New Messages . . . . . . . . . . . . . . 77--77
Anonymous Recruitment . . . . . . . . . . . . . . 78--79
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6
Carlos Ramirez Getting Your Message Across with Apache 8, 10, 12
Adam Olson Working with SAINT . . . . . . . . . . . 14, 16, 18, 20
Brett Lymn What to Do When the Server Doesn't Serve
-- Duplicating Data . . . . . . . . . . 22, 24, 26
Anthony Cinelli Using PortSentry and LogCheck . . . . . 29--31
Gary Bahadur Freeware Security Web Tools . . . . . . 32, 34, 36--37, 39--40
Rainer Raab Creating Global Functions with the Korn
Shell . . . . . . . . . . . . . . . . . 42, 44--47
Mark E. Dawson, Jr. AIX Cloning . . . . . . . . . . . . . . 49--51
Ripduman Sohan Web Hosting: A Migrational Case Study 53--56
Brian Wilson Using VMWare as a Development Tool . . . 57--59
Ron McCarty R.I.P. RIP? . . . . . . . . . . . . . . 61--62
Anonymous Advertiser Index . . . . . . . . . . . . 64--64
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 65--67
W. Curtis Preston SAN Building Blocks . . . . . . . . . . 69--72
Jim McKinstry and
Amy Rich Questions and Answers . . . . . . . . . 73--74
Anonymous Call for Papers . . . . . . . . . . . . 75--75
Anonymous New Products . . . . . . . . . . . . . . 76--78
Anonymous Recruitment . . . . . . . . . . . . . . 79--80
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6
Leo Liberti Quick Network Redundancy Schemes . . . . 8, 10, 12, 14, 16
Clark Cooper Using One Script to Back Up Linux and
Solaris . . . . . . . . . . . . . . . . 18, 20
Brett Lymn What to Do When the Server Doesn't Serve
-- Using CODA . . . . . . . . . . . . . 22, 24, 26
Shawn Bayern Minimal Backups . . . . . . . . . . . . 28, 30
Ben Diamond and
Keil Wurl Quick and Dirty Server/Workstation
Replication Using \tt ufsdump . . . . . 32, 34, 36, 38--39
Randal L. Schwartz A MIME Is a Terrible Thing to Waste . . 41--42
Rafeeq Ur Rehman Configuring Red Hat's High-Availability
Server . . . . . . . . . . . . . . . . . 43--44, 46, 48
Richard Ferri Remote Installation of Heterogeneous
Linux Clusters Using LUI . . . . . . . . 50, 52, 54--57
Reg Quinton Solaris Network Hardening: First Steps 59--61
Hiu Ho Automatically Restart Login Services on
a Remote Host . . . . . . . . . . . . . 63--64
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 65--67
Gary Bahadur and
Yen-ming Chen Using Freeware Vulnerability Scanners 69--71, 73--75
Anonymous Advertiser Index . . . . . . . . . . . . 72--72
Jim McKinstry and
Amy Rich Questions and Answers . . . . . . . . . 77--78
Anonymous Call for Papers . . . . . . . . . . . . 79--79
Anonymous New Products . . . . . . . . . . . . . . 80--82
Anonymous Marketplace . . . . . . . . . . . . . . 83--83
Anonymous Training and Education . . . . . . . . . 84--85
Anonymous Recruitment . . . . . . . . . . . . . . 86--87
Anonymous New Messages . . . . . . . . . . . . . . 88--88
Kurt Seifried How to Hack Windows . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6
Anders Òstergård Jensen Using PHP and MySQL as a Weblog . . . . 8, 10, 12, 14
Leonardo Orellano and
Timothy Young Optimizing Solaris for Oracle 8.x . . . 16, 18, 20, 22
Bill Mansfield Oracle Backup for UNIX Administrators 24, 26, 28--29
Evan Sarmiento Securing FreeBSD Using Jail . . . . . . 31, 32, 34, 36--37
W. Curtis Preston Building and Using a SAN: Part I . . . . 38, 40--41
Tristan Greaves Virtual Hosting, FTP, and LDAP . . . . . 43--45
Ross Oliver Achieving More Flexible File Permissions
Using Solaris ACLs . . . . . . . . . . . 46, 48, 50--51
Noah Davids TCP --- Either Fast or Efficient . . . . 53--57
Francisco Mancardi Application Usage Accounting . . . . . . 58, 60--61
Jim McKinstry Host-Based Replication and Oracle . . . 63--64, 66--69
Anonymous Call for Papers . . . . . . . . . . . . 70--70
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 71, 73--74
Anonymous Advertiser Index . . . . . . . . . . . . 72--72
Ron McCarty A Look at ngrep . . . . . . . . . . . . 75--76
Jim McKinstry and
Amy Rich Questions and Answers . . . . . . . . . 77--79
Anonymous New Products . . . . . . . . . . . . . . 80--82
Anonymous New Messages . . . . . . . . . . . . . . 87--87
Gilbert Held Preparing for Script-Form Attack . . . . ??
Ed Schaefer Communicating with Intermec and Zebra
Bar Code Printers . . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6
Thomas Akin Dangers of SUID Shell Scripts . . . . . 8, 10, 12
Alex Golomshtok and
Yefim Nodelman Fuzzy Text Searches with agrep and afind 14, 16, 18, 20, 22
Br. David Carlson Poor Man's Search Engine . . . . . . . . 24, 26, 28, 30
Tim Maletic Secure, Automated File Distribution . . 31--32, 34, 36
Reinhard Erich Voglmaier The Art of Spidering . . . . . . . . . . 37--39
W. Curtis Preston Building and Using a SAN (Part II) . . . 41--43
Mark Prager Useful Scripts for Overworked
Administrators . . . . . . . . . . . . . 44, 46--48
Koos Pol A Powerful Search Tool for ASCII Files 49--51
Randal L. Schwartz It's All About Context . . . . . . . . . 53--55
Thomas Kranz Redundant NICs on Solaris . . . . . . . 56, 58
Ron McCarty Mailman . . . . . . . . . . . . . . . . 59--61
Kristy Westphal Tools Built to Sort Through Snort . . . 62, 64--67
Jim McKinstry and
Amy Rich Questions and Answers . . . . . . . . . 68, 70--71
Anonymous Advertiser Index . . . . . . . . . . . . 72--72
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 73--74
Anonymous New Products . . . . . . . . . . . . . . 77--79
Anonymous New Messages . . . . . . . . . . . . . . 80--80
Anonymous Marketplace . . . . . . . . . . . . . . 81--81
Anonymous Recruitment . . . . . . . . . . . . . . 82--82
Anonymous Training and Education . . . . . . . . . 83--87
Miguel Armas del Río and
Esteban Manchado Velázquez PICA: Perl Installation and
Configuration Agent . . . . . . . . . . ??
Benjamin King A Complete Network Information Center ??
Roman Marxer Automatic UNIX Documentation with \tt
unixdoc . . . . . . . . . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Anker Ankerholz Editor's Forum . . . . . . . . . . . . . 6--6
Sandor W. Sklar The AIX Error Logging Facility . . . . . 8, 10, 12--14
Richard C. Ferri Linux Affinity . . . . . . . . . . . . . 16, 18, 20
Primitivo Cervantes Real-Time Remote Data Mirroring . . . . 22, 24--28
Bill Wood AIX Network Install Manager . . . . . . 29--31
Anonymous Advertiser Index . . . . . . . . . . . . 32--32
Jeff Marsh AIX Alternate Disk Installation . . . . 33--37
Mike Wilcox An Introduction to IBM's Network
Dispatcher . . . . . . . . . . . . . . . 38, 40--41
David Carver Managing AIX with SMIT . . . . . . . . . 43--45
Jim McKinstry and
Amy Rich Questions and Answers . . . . . . . . . 47--48
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 49--51
Anonymous New Products . . . . . . . . . . . . . . 53--54
Anonymous Recruitment . . . . . . . . . . . . . . 55--55
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6
Jeffrey B. Rothman and
John Buckman Which OS is Fastest for High-Performance
Network Applications? . . . . . . . . . 8, 10, 12, 14, 16
Tom Podnar Multi-Vendor LAN Troubleshooting . . . . 18, 20, 22--23
A. J. Weinzettel Interoperating Linux with NetWare . . . 24, 26, 28, 30
Anthony Taylor Simplifying WindowMaker Menus in a
Distributed Environment . . . . . . . . 31--34
Brandon Stone Samba-Based Network Recycle Bin . . . . 37--39
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
John Tiso Securing Your Cisco Router . . . . . . . 41--42, 44--45
Robert Chuba and
Anthony Caruso Proxy FTP without the Browser . . . . . 47--48
Joe Aguiar WTMP: Another Step Toward Centralizing
Event Management . . . . . . . . . . . . 49--51
Adam Ronthal Why Java Isn't Appropriate for
Everything . . . . . . . . . . . . . . . 52, 54--55
Jim McKinstry and
Amy Rich Questions and Answers . . . . . . . . . 56, 58--60
W. Curtis Preston Backup on a Budget . . . . . . . . . . . 61--63
Anonymous New Products . . . . . . . . . . . . . . 64--66
Bill Davidsen Monitoring Usenet News . . . . . . . . . ??
Peter Baer Galvin Solaris Corner . . . . . . . . . . . . . ??
Brett Lymn Coda -- The Disconnectable File System ??
Mark Prager Useful Scripts for Overworked
Administrators . . . . . . . . . . . . . ??
Reg Quinton Securing SNMP on Solaris . . . . . . . . ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6
Elena Khan Tripwire in the Enterprise: Integrating
Tripwire into Big Brother . . . . . . . 8, 10, 12, 14, 16, 18--19
Jason Chan Distributed Intrusion Detection with
Open Source Tools . . . . . . . . . . . 20, 22, 24--25
David Hughes Have I Been Hacked? . . . . . . . . . . 26, 28, 30
Randy Weidman Simple Security Scripts from Simple
Commands . . . . . . . . . . . . . . . . 31--32
Mark Prager Firewall Log-Checking Techniques . . . . 33--34, 36--37
Liam Widdowson Jailed Internet Services . . . . . . . . 39, 41--42, 44--45
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Victor Burns Locking the Front Door of Password
Security . . . . . . . . . . . . . . . . 47--51
W. Curtis Preston Large File System Backup Tool . . . . . 52, 54--55
Anonymous Call for Papers . . . . . . . . . . . . 56--56
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 57--58
Randal L. Schwartz Developing a Perl Routine . . . . . . . 59--60
Amy Rich Questions and Answers . . . . . . . . . 61--64
Anonymous New Products . . . . . . . . . . . . . . 65--67
Ed L. Cashin Integrit for File Verification . . . . . ??
Ido Dubrawsky Freeware Intrusion Detection Tools . . . ??
Alex Le Fevre Firewall Reporter . . . . . . . . . . . ??
Chris Kuethe Homebrew Intrusion Detection Systems . . ??
Jeffrey Rothman and
John Buckman Which OS is Fastest -- FreeBSD Follow-Up ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz Editor's syslog . . . . . . . . . . . . 6--6
Adam Anderson What I Did Instead of Buying a SAN . . . 8, 10, 12, 14
Primitivo Cervantes Disaster Recovery with Tivoli Storage
Manager . . . . . . . . . . . . . . . . 16, 18, 20, 22--23
Steve Blackmon and
John Nguyen High-Availability File Server with
Heartbeat . . . . . . . . . . . . . . . 24, 26, 28, 30, 31--32
Michael Watson Creating a Cold Standby E250 . . . . . . 34, 36--37
Gilbert Held Why Energy Consumption Matters . . . . . 38, 41--42, 44
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Ed L. Cashin A Flexible System for Centralized Backup 46, 48--50
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 51--52
W. Curtis Preston Understanding Oracle Backup and Recovery 54, 56--58
Amy Rich Questions and Answers . . . . . . . . . 59--62
Anonymous New Products . . . . . . . . . . . . . . 63--65
Anonymous Call for Papers . . . . . . . . . . . . 66--66
Anonymous Marketplace . . . . . . . . . . . . . . 67--67
Anonymous Training and Education . . . . . . . . . 68--71
Anonymous New Messages . . . . . . . . . . . . . . 72--72
Anonymous Career Opportunities . . . . . . . . . . ??
George Callaway A Framework for Automated File Transfer ??
Jose Nazario Checking Your System Logs with awk . . . ??
Miles Purdy Serial Storage Architecture Management ??
John Shearer A Perl Package for Monitoring Traffic ??
Anonymous Code Availability . . . . . . . . . . . 4--4
Amber Ankerholz syslog . . . . . . . . . . . . . . . . . 6--6
Alexander Golomshtok and
Yefim Nodelman Managing Solaris with Kstat . . . . . . 8, 10, 12, 14, 16, 18
Brian Gollsneider Multi-Booting Windows 98, Linux, and
Solaris . . . . . . . . . . . . . . . . 20, 22--23
Kevin Wenchel Implementing IPsec in the Solaris 8
Environment . . . . . . . . . . . . . . 24, 26--29
Chris Hare Revisiting UNIX Password Controls --
Part 1 . . . . . . . . . . . . . . . . . 30, 32--34
Ken Gottry Successful Solaris Performance Tuning 35--38
Chris Josephes A Framework for JumpStart Begin/Finish
Scripts . . . . . . . . . . . . . . . . 39--41
John S. Howard Introduction to Solaris Web Start Flash 42, 44--46
Ron McCarty NFS: Part I, The Protocol . . . . . . . 47, 49--50
Anonymous Advertiser Index . . . . . . . . . . . . 48--48
Amy Rich Questions and Answers . . . . . . . . . 51--54
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 55--57
Anonymous New Products . . . . . . . . . . . . . . 58--59
Anonymous Call for Papers . . . . . . . . . . . . 64--64
Keith Clay E-Class Tools . . . . . . . . . . . . . ??
Peter Baer Galvin Solaris Corner . . . . . . . . . . . . . ??
Moazam Raja Managing Sun Rays in Technical
Environments . . . . . . . . . . . . . . ??
Matt Lesko Ethereal . . . . . . . . . . . . . . . . 8, 10, 12, 14
Liam Widdowson and
John Ferlito Tales from the Abyss: UNIX File Recovery 16, 18, 20, 22
Jonathan D. Leghart Dynamic Round Robin . . . . . . . . . . 24, 26--27
David LaPorte and
Kevin Amorin Getting on the 6bone Quickly with
Solaris\TM 8 . . . . . . . . . . . . . . 28, 30, 32--34
Chris Hare Revisiting UNIX Password Controls --
Part 2 . . . . . . . . . . . . . . . . . 35--38
Richard Hellier Centralize Your Crontabs . . . . . . . . 39--40
Edward L. Haletky Integrating Macintosh Computers into
Your Network . . . . . . . . . . . . . . 41--44
Amy Rich Questions and Answers . . . . . . . . . 45--46
Peter Baer Galvin Reliable Network with Solaris\TM . . . . 47, 49--50
Elizabeth Zinkann Books: A User's Report . . . . . . . . . 51--52
W. Curtis Preston Oracle, Hot Backups, and Redo Logs . . . 53--55
Duncan Napier IPTables/NetFilter -- Linux's
Next-Generation Stateful Packet Filter 8, 10, 12, 14, 16
Tim Sammut Little Known Cisco IOS Security Features 17, 20, 22--23
Randal L. Schwartz Parsing Interesting Things . . . . . . . 24, 26--27
David Smith Implementing Kerberos . . . . . . . . . 28, 30, 32, 34--38
Alex Withers Integrating Windows 2000 and UNIX Using
Kerberos . . . . . . . . . . . . . . . . 39, 41--42, 44
Amy Rich Questions and Answers . . . . . . . . . ??
Jon Orwant Creating XML--RPC Web Services . . . . . P50, P52--P53
Sean M. Burke Uni\em decode . . . . . . . . . . . . . P54, P56--P60
Dan Brian and
Jon Bjornstad Helping the Disabled with Perl/Tk . . . P61--P65
Elizabeth Zinkann Books: A User's Report . . . . . . . . . ??
Peter Baer Galvin Solaris Companion . . . . . . . . . . . ??
Ron McCarty NFS Part II, Usage . . . . . . . . . . . ??
Marcel Gagné WINE: The Open Source Way to Run Windows
Applications . . . . . . . . . . . . . . 8, 10, 12, 14
Evan Sarmiento Systems Administration with scsh . . . . 16, 18--22
Chris Josephes Instant Messaging with Jabber . . . . . 23--26
Mike Murray Halted Firewalls . . . . . . . . . . . . 27--28
Brent Bice Network Diagramming and Monitoring with
Scotty . . . . . . . . . . . . . . . . . 29--32
Mark Pruett RDB -- A UNIX Command-Line Database . . 33--36
Amy Rich Questions and Answers . . . . . . . . . 37--39
Seann Herdejurgen Redundant Internet Connections Using
Linux . . . . . . . . . . . . . . . . . 41--47
Roberto João Lopes Garcia Posting Email to the Web with MHonArc 49, 52--55
Peter Baer Galvin Solaris Companion . . . . . . . . . . . ??
Reinhard Voglmaier Web Publishing with Perl Objects . . . . 8, 10, 12, 14--15
Jay Ribak Managing Logging with Numerous Virtual
Hosts in Apache . . . . . . . . . . . . 16, 18--19
Brett Lymn Web-Based Printer Management . . . . . . 20, 22--23
Bob Apthorpe Increasing Reliability Through Forensic
Operations . . . . . . . . . . . . . . . 24, 26--29
Bruno Pedro Deleting Temporary Files Created by Web
Sites Using PHP . . . . . . . . . . . . 30, 32--33
Stanley Wong How Web Cache Proxies Do and Don't Save
on Internet Costs . . . . . . . . . . . 34, 36--38
Amy Rich Questions and Answers . . . . . . . . . 39--41
Daniel Solin Developing a MySQL Quota Daemon . . . . 42, 44--47, 49
Thomas Knox Solaris\TM Patch Levels . . . . . . . . 51--53
Peter Baer Galvin Solaris Companion: The Golden Rules of
Sun Systems Administration . . . . . . . 55--56
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6
Karen Kent Frederick Cisco IOS HTTP Authorization
Vulnerability . . . . . . . . . . . . . 8, 10, 12, 14
Leo Liberti Web-Enabled Filesystem-Based Databases 16, 18--19
Duncan Napier Administering Linux IPSec Virtual
Private Networks . . . . . . . . . . . . 20, 22, 25--27, 29
James Standboge Encrypted NFS with OpenSSH and Linux . . 30, 32--34
Walt Jones Securing Public-Access Networks:
Stopping the IP Thieves . . . . . . . . 35--36, 38--39, 41--42
Anonymous Advertiser Index . . . . . . . . . . . . 40--40
Ed Schaefer Creating Black Box Functions in the Korn
and Bash Shells . . . . . . . . . . . . 43--46
Amy Rich Questions and Answers . . . . . . . . . 47--50
Anonymous Call for Papers . . . . . . . . . . . . 51--51
Anonymous Marketplace . . . . . . . . . . . . . . 68--68
Anonymous Training and Education . . . . . . . . . 69--69
Anonymous New Products . . . . . . . . . . . . . . 71--72
Peter Baer Galvin Solaris\TM Corner: Sun/Cobalt Qube
Server . . . . . . . . . . . . . . . . . ??
Amber Ankerholz Editor's Forum: syslog . . . . . . . . . 6--6
David T. Smith Configuring Amanda . . . . . . . . . . . 8, 10, 12, 14, 16--17
Robin Wakefield Multi-Platform Backups . . . . . . . . . 18, 20--21
Bryan Smith CD Backups for Easy File Access . . . . 22, 24, 26
Ed Schaefer Backup Scripts from \tt UnixReview.com 27--29
Ed Schaefer Geographic Failover for Cheapskates . . 30, 32
Henry Newman Using Lib C and I/O and Performance . . 33--35
Ray Strubinger A Homegrown Backup Solution Utilizing
RSA Keys, SSH, and \tt tar . . . . . . . 37--38
Peter Baer Galvin Solaris\TM Companion: Upgrading to
Solaris 8 . . . . . . . . . . . . . . . 39--41
Brian Buckeye and
Kevin Liston Recovering Deleted Files in Linux . . . 42, 44--47
Anonymous Advertiser Index . . . . . . . . . . . . 48--48
Ron McCarty Name Services: Another View . . . . . . 49--52
Amy Rich Questions and Answers . . . . . . . . . 53--56
Anonymous Call for Papers . . . . . . . . . . . . 57--57
Anonymous New Products . . . . . . . . . . . . . . 58--60
Anonymous New Messages . . . . . . . . . . . . . . 64--64
Peter Baer Galvin Solaris\TM Corner . . . . . . . . . . . ??
Edward L. Haletky Integrating Backup into a Multiple
Operating System Network with Amanda . . ??
Amber Ankerholz syslog . . . . . . . . . . . . . . . . . 6--6
Michael S. DeGraw-Bertsch Configuring a FreeBSD Access Point for
Your Wireless Network . . . . . . . . . 8, 10, 12, 14
Ido Dubrawsky Wireless (In)Security . . . . . . . . . 16, 18, 20, 22
Alan P. Laudicina Nessus --- A Powerful, Free Remote
Security Scanner . . . . . . . . . . . . 24, 26, 28--30
Bob Dilworth Using Email to Perform UNIX System
Monitoring and Control . . . . . . . . . 31--32, 34--36
Scott DeJong Supporting Screened Hosts with BIND 9.x
View . . . . . . . . . . . . . . . . . . 37--38, 40--44
John Shearer Tracking Machines with GetHost . . . . . 45--51
Randal L. Schwartz Doing Many Things, Like pings . . . . . 52, 54--55
Anonymous Advertiser Index . . . . . . . . . . . . 56--56
Amy Rich Questions and Answers . . . . . . . . . 57--60
Peter Baer Galvin Solaris\TM Corner: Solaris
Administration Best Practices . . . . . 61--64
Anonymous Call for Papers . . . . . . . . . . . . 65--65
Anonymous Marketplace . . . . . . . . . . . . . . 66--66
Anonymous Training and Education . . . . . . . . . 67--70
Anonymous New Products . . . . . . . . . . . . . . 71--72