From: t...@usenix.org (Toni Veglia)
Subject: 9th Systems Administration Conference Starts Sunday 9/17!
Date: 1995/09/14
Message-ID: < DEx01K.LuB@usenix.org>
X-Deja-AN: 110132915
organization: USENIX Association, Berkeley, CA
reply-to: t...@usenix.org (Toni Veglia)
newsgroups: comp.org.usenix
9th USENIX SYSTEMS ADMINISTRATION CONFERENCE - LISA '95
September 17-22, 1995
Monterey Conference Center, Monterey, California
Sponsored by the USENIX, the UNIX and Advanced Computing Systems
Technical and Professional Association and
SAGE, the System Administrators Guild
***********************************************************
PLEASE NOTE:
Most hotels have sold out - see below for suggestions
REGISTRATIONS MUST NOW BE DONE ON-SITE STARTING SATURDAY 7:00PM
****************************************************************
System administrators have some of the most demanding and critical
jobs in computing. Businesses rely on them to not only keep their
systems running, but to keep up with the latest technology, tools,
and information. LISA '95 will provide immediately useful,
practical information from the top system administrators and
experts.
=============================================================
This posting contains:
Tutorial & Technical Session Descriptions
Advanced Topics in System Administration Workshop Information
Schedule of Events
Hotel and General Conference Information
Registration Form
=============================================================
TUTORIAL PROGRAM - Sunday-Tuesday, September 17-19
Sunday, September 17
=====================
Joining the Internet Safely Using UNIX and Firewalls
Introduction to UNIX System Administration (New)
Monday, September 18
====================
New Topics in System Administration (New)
UNIX System Security
Sendmail Inside and Out (Updated)
Introduction to System Performance Tuning (New)
Administering the Domain Name System
An Introduction to HTML (New)
Breaking the Communication Barrier: Talking Technical (New)
GUI Programming in Perl (New)
IP Network Administration
New Manager's Survival Guide (New)
Tuesday, September 19
=====================
Topics in System Administration
Joining the Internet Safely Using UNIX and Firewalls
Beginning Perl Programming for UNIX Programmers (Updated)
Solaris System Administration
UNIX Security: Threats and Solutions from the Network (New)
How to Plan Internet Security and Firewalls (New)
World Wide Web Programming with CGI (New)
What's New in Sendmail 8.7 (New)
"But I'm Not Responsible Am I?": Your Liabilities as a System
Administrator (Updated)
Web Server Administration
TUTORIAL PROGRAM
Business in the nineties challenges you to do and learn more.
Its particularly difficult to keep up with the tools, technology
and technical issues that are raised in areas like system
administration. With the pressure on to manage more with less,
you need the latest information and solutions to keep up with the
pace of business.
USENIX tutorials provide the information you need in critical
areas. Delivered by experts, they are intensive, practical, and
essential to your professional development. Tutorial fees
include printed and bound materials from the tutorials you have
selected, lunch, and admission to the Vendor Display.
SUNDAY, SEPTEMBER 17
====================
S1: 9:00am-5:00pm
(Also Offered Tuesday)
JOINING THE INTERNET SAFELY USING UNIX AND FIREWALLS
Instructors: Tina Darmohray and Marcus J. Ranum
Information Works!, Inc.
Intended Audience: Participants should be familiar with basic
Internet concepts such as Internet services, TCP/IP, and
routing.
Connecting to the Internet is an exciting event for every
organization. The security implications can often bring
hesitation, though. This practical course outlines details and
examples of UNIX network security and Internet connectivity
issues. Site policies and topologies that implement them will be
covered, including packet-filtering, application-level, and
circuit-level gateways. Overviews of current, publicly-available
solutions, will be provided, focusing on complete examples for
configuring an Internet firewall. Pre-requisites for this
tutorial are a knowledge of TCP/IP, DNS, and sendmail.
This tutorial will cover:
*Problem definition and design motivation
- identify risks associated with Internet connection, including:
- valuable data
- motivation to obtain it
- potential consequences
*Nomenclature and design variations
- defining the common firewall terms and topologies
- compare designs and understand their strengths
*Implementing firewalls
- Routers
- Purpose
- Router-based firewalls
- Packet-filtering configuration
*Gateway/Bastion host security
- Router and bastion-host-based firewalls
- Host security configuration
- Bastion host software
tcpd, smrsh, and challenge-response passwd software
*Proxy solutions
- Misc. public-domain proxies
- SOCKS
- TIS firewall toolkit
*Hiding information with DNS
- SOA and MX records to support the firewall
- Dual-DNS configuration
*Sendmail configuration
- Configuration to operate with firewall topology
- Header re-writing to support the firewall
S2: 9:00am-5:00pm
INTRODUCTION TO UNIX SYSTEM ADMINISTRATION - New
Instructor: Bill Rieken, .sh Consulting
Intended audience: Administrators new to UNIX, but not new to
computers. This course will jump-start you into the UNIX way of
doing things, and will be valuable to new administrators, or
those transitioning from other computers and operating systems.
Topics covered will include:
*Basic UNIX operations
- General overview, job and task descriptions
- System boot and shutdown, startup and shutdown scripts
- User account management
- Regularly scheduled events: cron
*File System
- Overview: drives, partitions, superblocks, inodes
- Integrity checking (fsck, lost+found)
- Backup and restore (incremental and complete backup, dump vs.
dd vs. tar)
*Security
- File protection, Super-user privileges, set-uid programs
- Password security overview
- Security watchdog daemons
*System Configuration
- Line printer spooler
- System configuration files
- Adding drives and partitions, mounting file systems
- Managing swap space
- Managing processes
*Overview of Networking
- Network services (ftp,telnet, rsh, rlogin)
- Internet address resolution
- Network file systems
MONDAY, SEPTEMBER 18
====================
M1: 9:00am-5:00pm
NEW TOPICS IN SYSTEM ADMINISTRATION - New
Instructors: Trent Hein, XOR Network Engineering
Evi Nemeth, University of Colorado, Boulder
This course will cover the following topics essential for system
administrators:
Dealing with Daemons--Daemons are those friendly programs that
keep your system running. Learn how to install, configure,
monitor, and feed modern daemons that are essential for life in
an internetworked environment. Discussion will include modern
daemons such as inetd, wuftpd, popper, identd, mrouted, and many
more.
Security Disaster Post-Mortem -- What do you do after your site has
been compromised by an outside party? What if you discover the
hacker was someone inside your organization? Most folks talk
about how to prevent a security crisis, but what if your plan
doesn't work? When a security crisis does occur, proper handling
is essential. Learn tactics and techniques for dealing with
security problems "that could never happen at your site."
Video Conferencing on the Desktop--Have you ever participated in
a video conference at your desktop? You will, and probably
sooner than you think. Exciting new desktop video conferencing
tools are available today. Learn how to setup software, hold
private conferences, and participate in technical sessions at
conferences like USENIX and IETF from afar.
System Administration Power Tools -- Often system administrators
are caught saying "if only I had time to learn how to use that
nifty new program." Unfortunately, system administrators usually
do so much fire fighting that they don't have time to stop and
smell the new administration tools. In this overview of
readily-available UNIX system administration power tools, we'll
discuss packages that are likely to save you time and increase
your salary. Discover features and usage of programs like
flexfax, rc.config, addhost, amanda, adduser, sudo, glimpse,
patch, cksendml, majordomo, top, tcpdump, and more.
M2: 9:00am-5:00pm
UNIX SYSTEM SECURITY
Instructor: Matt Bishop, University of California, Davis
Intended Audience:
This course will discuss some non-network threats to UNIX
security and how to deal with them. The format will be to
analyze case histories, show what loopholes the attackers
exploited, how the systems administrators might have closed those
loopholes, and how the intruders were discovered. Concepts and
mechanisms will be discussed, as well as publicly available
tools.
Topics covered:
* security policies vs. security mechanisms
* password security: how passwords are stored, how to crack a
password, what makes a good password, schemes for
assigning/selecting passwords, shadow password files (this
includes a detailed description of the UNIX password hashing
function); among the tools discussed will be passwd+, crack,
ufc_crypt, COPS, and the shadow password suite
* files and auditing: how to audit files, recommended protection
modes, basic file encryption and checksumming, looking for illicit
setuid and setgid files; COPS and tripwire will be discussed
* management of privileges: when to work as root and when not to,
minimizing time working as root, managing a superuser account and
other non-root system accounts; among the tools discussed will be lsu
* Trojan horses and UNIX: what they can do, how they do it,
detection, prevention, and defenses
* managing an incident: what to look for to spot a break-in, how
to analyze the attack and what to do about it, audit trails and
their analysis, what not to believe
* examples of known security holes and how to fix them (or live
with them)
M3: 9:00am-5:00pm
SENDMAIL INSIDE AND OUT (Updated for 8.7)
Instructor: Eric Allman, Pangaea Reference Systems
Intended Audience: Systems administrators who want to learn more
about the sendmail program, particularly details of the
configuration file; programmers implementing new mail front ends
who want to know exactly what sendmail can do for them; curious
people who have wanted to know what sendmail is all about. This
course will not cover implementation of mail front ends. This
will be an intense, fast-paced, full-day course intended for
people who have already been exposed to sendmail.
Sendmail is arguably the most successful UNIX-based mail
transfer agent in the world today. Originally distributed with
the Berkeley Software Distribution, sendmail is now used by most
UNIX vendors. However, it has a reputation for being difficult
to configure and manage. This tutorial focuses on these areas.
After introducing a bit of the philosophy and history underlying
sendmail, topics will include:
* The syntactic elements of the configuration file: mailers,
options, macros, classes, headers, precedences and priorities,
trusted users, key file definitions, and rewriting rules and
rulesets.
* The flow and semantics of rulesets, including hints about
debugging.
* An introduction to SMTP and how sendmail operates in an SMTP
environment.
* Day-to-day management issues, including alias and forward files,
"special" recipients (files, programs, and include files),
mailing lists, command line flags, tuning, and security.
* How sendmail interacts with the Domain Name System.
* How to use the M4 configuration package included with sendmail 8.
This course uses the latest release of Berkeley sendmail (8.7)
for examples. (Version 8.7 is currently being shipped or will
shortly be shipped by BSDI, Convex, Hewlett-Packard, Sequent,
Silicon Graphics, and Sun.) Version 8 includes many of the
popular features of IDA sendmail. Other versions of sendmail
will be discussed briefly.
M4: 9:00am-5:00pm
AN INTRODUCTION TO SYSTEM PERFORMANCE TUNING - NEW
Instructor: Marcus J. Ranum, Information Works!, Inc
Intended Audience: System managers interested in understanding
performance factors
This course introduces the main factors that affect the
performance of UNIX systems, how to diagnose and improve
bottlenecks, and how to apply scientific methods to system
analysis. Case studies and theory will be interspersed with
descriptions of available performance monitoring tools and how
to use them. Topics covered include:
* Overview
-Welcome to the land of tradeoffs
-Why do I have a 200MIP boat-anchor?
* "Internals Lite"
- Hardware
- The file system(s)
- Virtual memory
- Scheduling
- Networking
- Microkernels/Macrokernels/Marketkernels
* Scheduling/CPU
- Know and love the process table
- When is a system CPU bottlenecked? Tools and Fixes
* Memory Bottlenecks
- When is a system memory-bottlenecked?
- Memory bottlenecks vis-a-vis disk bottlenecks
- How can you improve memory bottlenecks?
* Disk/File System Bottlenecks
- Why do file systems get slow? How to improve them.
- Network file systems
* Network Performance
- Factors affecting network performance
- How to measure what's going on on your network
* Application Tuning
- Dissecting applications
- Profiling applications
* Benchmarking and Benchmarketing
- How to rig a benchmark
- How to detect a rigged benchmark
- How not to write your own benchmark
M5am: 9:00am-12:30pm
ADMINISTERING THE DOMAIN NAME SYSTEM
Instructor: Bill LeFebvre, Argonne National Laboratory
Intended Audience: This course is designed for any network
administrator who is responsible for the operation and
maintenance of DNS, but who has little experience with it.
Attendees should have a basic knowledge of network and system
administration. An in-depth understanding of IP will be
beneficial but is not required.
The Domain Name System (DNS) is the primary method which the
Internet uses to name and number machines. This course is an
introduction to DNS for network administrators. It will describe
the basic operation of DNS, and will provide instructions and
guidelines for the configuration and operation of DNS on UNIX
platforms. Troubleshooting techniques will be taught, and common
problems (and solutions) will be explored.
M6am: 9:00am-12:30pm
AN INTRODUCTION TO HTML - NEW
Instructor: Dave Taylor, Intuitive Systems
Intended Audience: People wanting to learn how to design and
implement hypertext markup language (HTML) documents.
Participants should be familiar with text markup and the World
Wide Web in general, but needn't have previously been exposed to
HTML. People who already know the basics of HTML can still find
some of the material of value, but they might find the tutorial
basic.
This course starts with the basics of the Web and hypertext
markup language. It teaches participants how to create useful
and interesting documents for the World Wide Web, including
graphics, multiple typefaces, and pointers to any other type of
information or document on the Internet.
Topics covered include:
- basic document layout
- text and paragraph formats
- numbered, ordered, and definition lists
- external anchors (FTP, Gopher, Web, Telnet, mail, etc.)
- internal document anchors
- adding graphics
- an overview of CGI scripting
- NetScape and new HTML extensions
- how to promote your Web page
M7am: 9:00am-12:30pm
BREAKING THE COMMUNICATION BARRIER: TALKING TECHNICAL - NEW
Instructor: Maurita Plouff, Expert Innovations
Intended Audience: Technical folks who want to avoid difficulties
in communicating technical topics to non-technical audiences,
including their bosses
Communication involves not only the speaker and listener, but
also their beliefs, pre-conceptions, and roles within the work
environment. The different requirements and contexts in technical
work and business/managerial work create barriers to
understanding. These barriers can place limits on your personal
growth as well as your on company's-- if you cannot communicate
effectively with your manager or your customers, you may lose
their trust and recognition. This course will point out the
problems in communicating effectively with non-peers, and help
you remedy those problems.
Topics include:
- The communication process
- Happytalk, marketspeak, and jargon
- Understanding your audience
- Defining the content: a 3-step process
- Writing: memos, email, and short notes
- Speaking: presentations, hallway conversations, and meetings
- Closing the loop: decoding feedback
M8pm: 1:30pm-5:00pm
GUI PROGRAMMING IN PERL - NEW
Instructor: Tom Christiansen, Consultant
Intended Audience: Programmers with previous Perl programming
experience.
This course demonstrates how to create simple applications with a
graphical user interface. It is divided into three parts. The
first demonstrates OS-independent single-character I/O, simple
screen manipulation using curses, and the forms-entry menuing
library. The second concentrates on using Perl for CGI
programming (World Wide Web programming). The third demonstrates
using Perl in conjunction with the popular Tk package to create
sophisticated X11 applications in your script using all the
standard Tk widgets. These applications don't use the Tcl language
at all, but instead access Tk directly from Perl using a
convenient object-oriented programming interface.
M9pm: 1:30pm-5:00pm
IP NETWORK ADMINISTRATION
Instructor: Bill LeFebvre, Argonne National Laboratory
Intended Audience: Attendees should have some prior experience
with using IP networks, and should be familiar with number bases,
bits, bytes, and machine representations of integers, but need
not be experienced full-time programmers.
This course will cover essential IP network adminstration and the
background knowledge necessary to carry out such administration.
It will start with the Internet model and some basics such as
numerical addresses and the fundamentally important protocols:
IP, ICMP, UDP, TCP, ARP, RARP. Packet routing (including
subnetting) will be included, along with information about the
most common UNIX routing daemon, routed. Management of the
common UNIX network services (telnet, rlogin, etc.) will be
examined, along with the primary network service provider daemon,
inetd. Management of essential RPC services (NIS, NFS, mountd)
will be covered as time permits. The course will finish with a
section on troubleshooting and information on Internet
resources.
M10pm: 1:30pm-5:00pm
THE NEW MANAGER'S SURVIVAL GUIDE- NEW
Instructor: Maurita Plouff, Expert Innovations
Intended Audience: New managers or those soon-to-be new managers.
Moving from contributor to manager is a difficult transition in
any field. In technical fields, it is especially difficult, as
the job requirements shift both in scope and nature.
Topics include:
-The simple part: overt expectations
-Lost context: new peers, new expectations
-Moving up or selling out? Reactions from former peers
-Uncovering hidden requirements
-Managing technical staff in a non-technical world
-Resolving conflicts in allegiance
-Fighting knowledge drain: how to stay technical
TUESDAY, SEPTEMBER 19
=====================
T1: 9:00am-5:00pm
TOPICS IN SYSTEM ADMINISTRATION
Instructors: Trent Hein, XOR Network Engineering
Evi Nemeth, University of Colorado at Boulder
This course will present the most popular topics covered at last
years LISA.
Network Performance--Trying to squeeze some extra speed out of
your network? This introduction to network performance will
cover the basics of monitoring and maintaining decent response on
your Ethernet-based LAN. You'll also learn how to use a number
of public domain network performance analysis tools.
Network Crisis Case Studies--At the request of students in
previous tutorials, this is a set of network problem case studies
that will be dissected and corrected in front of your eyes using
many of the tools discussed in the previous section.
Intro to expect-- Perhaps the greatest system administration tool
to come along since Perl, expect is a high-powered interpreted
dialogue language which can act like your hands on the keyboard
to perform tricky tasks while you're away, asleep, or at play.
We will talk about the basic constructs of the language and write
some sample programs.
Trouble Mail Management --Keeping up with your users is an
everyday task. We'll discuss trouble reporting procedures and
tools you can use to make your system administration group
operate painlessly and efficiently.
Syslog--Writing your programs so that they exploit the
network-oriented logging protocol can greatly ease debugging and
site maintenance. Modern BSD syslog includes facilities for
forwarding selective error and debugging information to one or
more other hosts. This section discusses how to configure a
central syslog host for your network to assist sysadmins in
monitoring the status of a variety of machines simultaneously.
Policy and Politics--Many of the policies and procedures followed
at a site are carefully filed in the sysadmin's head. With the
worldwide net invading your local site, this folklore needs to be
written down, reviewed by lawyers, and followed by your sysadmin
staff. Approaches to these tasks, both good and bad, will be
discussed and illustrated with war stories, sample policy
agreements, and procedure checklists.
T2: 9:00am-5:00pm
JOINING THE INTERNET SAFELY USING UNIX AND FIREWALLS
Instructors: Tina Darmohray and Marcus J. Ranum
Information Works!, Inc.
Intended Audience: Participants should be familiar with basic
Internet concepts such as Internet services, TCP/IP, and
routing.
PLEASE SEE COMPLETE DESCRIPTION OF THIS TUTORIAL IN ABOVE SUNDAY
TUTORIAL LISTING.
T3: 9:00am-5:00pm
BEGINNING PERL PROGRAMMING FOR UNIX PROGRAMMERS - Updated
Instructor: Tom Christiansen, Consultant
Intended Audience: Individuals who have never looked at perl
before or who have only been programming in it for a short time.
Students must have a previous background in UNIX shell programming
with a good working knowledge of regular expressions. A
background in sed, awk, and/or C programming will prove useful but
not essential.
Nearly ten years old now, Perl is a robust tool that has quickly
become the language of choice for systems administrators and
toolsmiths, database managers, software test and support
engineers, GUI programmers, and World Wide Web programmers.
Running on every nearly conceivable platform known to man, Perl is
both an extremely powerful scripting language for problems
previously solved at great effort in the shell or C. Because it
incorporates aspects of more than a dozen well-known UNIX tools,
experienced UNIX users will come up to speed on Perl rapidly, and
even programmers inexperienced at UNIX will learn UNIX through
learning Perl.
Topics of this course include detailed descriptions and numerous
examples of the syntax and semantics of the language, its data
types, operators and control flow, regular expressions and I/O
facilities, user functions, and systems subroutines.
Note: While this course is based on the current release of Perl
(Perl 5.1), it is not intended to be a detailed discourse on all
advanced programming constructs now afforded by that release. It
is a beginning course on Perl for experienced UNIX programmers,
not an advanced course for previous Perl programmers.
T4: 9:00am-5:00pm
SOLARIS SYSTEM ADMINISTRATION
Instructors: Peter Galvin, Brown University
Dinah McNutt, Consultant
Intended Audience: System administrators with experience at
managing systems, but not extensive experience with Sun's new
Solaris 2.x operating system. Areas of focus include differences
between Solaris 2.x and older operating systems, and migrating
from those older operating systems to Solaris. This course
includes up-to-the-minute information on Solaris 2.4.
Topics include:
* Installation and configuration of Solaris 2.x, including the
new naming schemes for directories and devices, the new startup
file organization and function, and the new printing and
serial-I/O configuration files. Jumpstart installation for
many-system environments is included as well as package and patch
management.
* Managing Solaris 2.3, covering the new aspects of 2.3, including
the new caching file system, AutoFS, the automounter file system,
and volume manager
* Differences between NIS and NIS+, as well as how to interoperate
between NIS and NIS+, and how to set up NIS+ clients and servers
* Kernel configuration and how to configure new devices and
changes from Solaris 2.1 and SunOS 4.1.x. The new device naming
scheme is covered as well
* Networking TCP/IP from the hardware side including how routers
and bridges work and useful tools for you to have in your toolbox
* Some useful tools for automating system administration tasks and
troubleshooting problems: watcher, multi-rsh, and sysinfo to name
a few
* Hints on how to monitor system performance and tune the software
for maximum throughput
* Discussion of current security holes, as well as general security
tips and changes which should be made to stock Solaris 2 systems
T5am: 9:00am-12:30pm
UNIX SECURITY: THREATS AND SOLUTIONS FROM THE NETWORK -NEW
Instructor: Matt Bishop, University of California, Davis
Intended Audience: This course analyzes incidents in which
attackers have tried to gain illicit access to UNIX systems.
Topics include the attacks used, why the exploited holes existed,
how the system administrators responded, and how they closed the
holes. Concepts and mechanisms will be discussed, as well as
publicly available tools.
This course focuses on problems from a networked site, including
both sites with local area networks and sites connected to the
Internet. It is complementary to, and not a replacement for, the
Firewall courses. The focus in this course is on the UNIX system
and not the security of the network itself. Although the
principles apply to any type of network, this course will focus on
protocols used in Berkeley-based UNIX systems.
Topics covered:
* security on the Internet, remote logins, ftp and file transfer,
secure RPC, NIS, NFS, secure NIS and NFS
* computer worms: the Internet Worm of November 1988 and its aftermath
* a short overview of Kerberos and the Privacy-Enhanced Electronic
Mail specifications
* some known UNIX network vulnerabilities, their exploitation and
fixes; the ISS tool will be discussed
* network logging, user and host authentication, the ident protocol;
tcp_wrapper will be discussed
T6am: 9:00am-12:30pm
HOW TO PLAN INTERNET SECURITY AND FIREWALLS - NEW
Instructor: Marcus J. Ranum, Information Works!, Inc.
This course introduces the policy issues and risks associated with
Internet connectivity, and some of technologies and approaches for
risk reduction. Participants should be familiar with basic
Internet concepts such as Internet services, TCP/IP, and routing.
By the end of the course, participants will understand:
* How to draft an Internet connectivity requirements and
implementation plan
* How to build a consistent security policy for their network perimeter
* How to assess their risks in connecting to the Internet
* The tradeoffs between different security approaches
* How to evaluate them in the context of their business objectives
Topics covered include:
- Internet threats
- Risk assessment
- Security policies and procedures
- Acceptable use policies
- Security maintenance policies
- Service-oriented approaches to achieving Internet connectivity
- Host-based security versus perimeter security
- TCP/IP security issues
- Host security issues for Internet connected hosts
- Viruses and the Internet
- Perimeter security approaches
- Firewalls:
Screening routers
Application level firewalls
Management of firewalls
Auditing firewalls
- Authentication
Advantages and disadvantages of strong authentication
Token authenticators
Software authenticators
Kerberos
- Network level encryption
What does the future hold?
T7am: 9:00am-12:30pm
WORLD WIDE WEB PROGRAMMING WITH CGI - NEW
Instructor: Tom Coppeto, Massachusetts Institute of Technology
Intended Audience: WWW developers and programmers who wish to
explore the Common Gateway Interface to the World Wide Web and
development of WWW applications. Participants should be familiar
with HTML, UNIX shell scripts, and some C and/or Perl.
This course covers the basics of CGI, including creating documents
"on the fly", building new services, writing forms, and creating
searchable documents.
Specific topics will include:
- how CGI works
- gateway applications
- searching
- forms
- dynamic documents
- redirects
T8pm: 1:30pm-5:00pm
WHAT'S NEW IN SENDMAIL 8.7 - NEW
Instructor: Eric Allman, Pangaea Reference Systems
Intended Audience: People familiar with sendmail 8.6 who want to
learn how to convert their sites over to sendmail 8.7. This
tutorial is in no way an introduction to sendmail.
Sendmail 8.7, the latest release of Berkeley sendmail, has many
new features. In many cases mail administrators can just compile
the new release of sendmail and use their old configuration files,
but there are many new capabilities that "power users" may wish to
utilize. This course discusses the differences between versions
8.6 and 8.7 of sendmail.
Topics will include:
- 8 BIT MIME support, including 8 to 7 bit encodings.
- New debug "system service switch" to control access to resources.
- New map classes (text, nisplus, netinfo, hesiod, program, sequence,
switch, user, bestmx, userdb).
- Priority-dependent message time-outs.
- Delivery Status Notification extensions.
- Long option, macro, class, and ruleset names
- Support for dial-on-demand sites.
Time permitting, musings on the future direction of sendmail will
be indulged in.
T9pm: 1:30pm-5:00pm
"BUT I'M NOT RESPONSIBLE, AM I?": YOUR LIABILITIES AS A SYSTEM
ADMINISTRATOR - Updated
Instructor: Dan Appelman, Heller, Ehrman, White and McAullife
Intended Audience: System administrators faced with legal issues
of increasing complexity and potential liability as more users are
able to use, and abuse, electronic networks.
The law as it applies to the electronic media is not always
intuitive or obvious. It is especially confusing and unpredictable
as it pertains to computer and network system administration and
those who work in that field.
This course will provide invaluable insight when you or one of your
users is confronted with issues involving the law. It will also
address your legal obligations and responsibilities as a system
administrator, what your employer may ask you to do, and when you
can legally refuse to comply. It will examine how this uncertainty
can affect your decision making and suggest ways to minimize your
risk of legal liability.
The law has changed considerably since this tutorial was offered a
year ago at LISA VIII. The tutorial will address the most recent
legal developments in the following areas:
- Email Privacy
- Defamation Liability
- Intellectual Property Rights (including copyrights)
- Liability for Transmission of Adult Materials
- Export Compliance
T10pm: 1:30pm-5:00pm
WEB SERVER ADMINISTRATION
Instructor: Tom Coppeto, Massachusetts Institute of Technology
Intended Audience: System administrators who want to learn the
essentials of maintaining a WWW site from configuration to ongoing
maintenance. Participants should have experience with basic UNIX
system administration.
This course covers setting up and maintaining a WWW server. Topics
include server configuration, statistic gathering, access control,
proxying, and image-map files (clickable images). It will focus on
the NCSA implementation of the Hypertext Transfer Protocol daemon
(httpd), but users of the CERN implementation will also find this
tutorial valuable.
Specific topics will include:
- web server setup
- basic configuration
- proxy servers
- access control
- logs and statistics
- clickable image support
- useful gateways and other add-ons
===================================================
CONTINUING EDUCATION UNITS
The USENIX Association is a provider of Continuing Education
Units (CEUs) and offers CEUs for a small additional
administrative fee. Established by the International Association
for Continuing Education and Training, the CEU is a nationally
recognized standard unit of measure for continuing education and
training, and is used by thousands of organizations across the
United States. Each full-day USENIX tutorial qualifies for 0.6
CEUs. You can request CEU credit by completing the CEU section
on the registration form. USENIX provides a certificate for each
attendee taking a tutorial for CEU credit, and maintains
transcripts for all CEU students.
===================================================
ABOUT THE INSTRUCTORS
=====================
Eric Allman is the original author of sendmail, as well as several
other perennial favorites including syslog, tset, the -me macros,
and trek, as well as a major contributor to INGRES. He received
his MS in Computer Science from UC Berkeley in 1980. He is
currently the Chief Technical Officer at Pangaea Reference Systems.
Dan Appelman practices computer and telecommunications law for the
Silicon Valley firm of Heller, Ehrman, White and McAuliffe. He
represents many high-tech and Internet-related companies. In
addition to his law degree, he earned a PhD in telecommunications
policy. He teaches computer and telecommunications law, and
frequently lectures and writes about these matters.
Matt Bishop received his PhD. from Purdue University where he
specialized in computer security. His research and teaching areas
at the University of California at Davis include computer and
network security, along with operating systems and software
engineering. He chaired the first two USENIX UNIX Security
Workshops, and his column on computer security appears regularly in
the "Best Practises" newsletter.
Tom Christiansen is a software consultant specializing in perl
applications, optimizations, and training. He earned an MS degree
in Computer Science from the University of Wisconsin at Madison.
Tom serves on the Board of Directors of the USENIX Association, and
is well-known around the world for his courses in Perl programming.
Tom Coppeto is a systems programmer in the MIT Network Operations
Group specializing in systems and network management of MIT's
distributed computing environment and client/server development.
He received a SB degree in Aeronautical Engineering from MIT in 1989.
Tina Darmohray is a consultant in the area of Internet firewalls
and network connections. She has over a decade of experience
managing and networking UNIX systems. Previously, she was the lead
for the UNIX System Administration team at a national laboratory
where her group was responsible for over 1,000 machines. She is
completing a book on Internet firewalls with Marcus Ranum for
Prentice Hall.
Peter Galvin is currently the Systems Manager for Brown
University's Computer Science Department, where he manages an
installation of nearly 200 Sun SPARC stations and servers. He is a
member of the Board of Directors of the Sun User Group, and has
been Program Chair for the last 4 SUG/SunWorld conferences. He has
written articles for "Byte" and "Advanced Systems" (SunWorld)
magazines and the "SuperUser" newsletter and is co-author of
"Operating Systems Concepts" textbook.
Trent Hein is Chief Network Architect at XOR Network Engineering
where he deals with sticky system and network administration
problems. He worked on the 4.4 BSD port to the MIPS architecture at
Berkeley, and is an author on the 5th edition of the UNIX System
Administration Handbook. Trent has a BS in Computer Science from
the University of Colorado.
William LeFebvre is a computer systems engineer at Argonne
National Laboratory. He received his BA and MS degrees from Rice
University. He has been using UNIX systems since 1982 and has
been an active user of the Internet since 1984. William has
regularly participated as a "guru" at USENIX conferences.
Dinah McNutt is a free lance consultant and writer specialzing in
systems administration. She is the author of the Daemons and
Dragons column for "UNIX Review" and has written for "Byte",
"SunExpert" Magazine, and the "X Resource". She teaches system
administration classes all over the world and was the chair of the
Evi Nemeth, a faculty member in Computer Science at the University
of Colorado, has managed UNIX systems for the past 18 years, both
from the front lines and the ivory tower. She is co-author of the
best-selling "UNIX System Administration Handbook."
Maurita Plouff has been translating between technical and
non-technical audiences since her first post as a physics
laboratory research assistant. She has held both technical and
managerial posts, and is known for her ability to avoid inducing
the "glassy-eyed stare" in managers grappling with technical
material. Ms. Plouff is currently a consultant assisting clients to
meet strategic business goals through effective use of technology.
Marcus J. Ranum is a network and computer security consultant. He
is the principal author of several major Internet firewall
products, including the DEC SEAL, the TIS Gauntlet, and the TIS
Internet Firewall Toolkit. Marcus has been managing UNIX systems
and network security for over 13 years, including configuring and
managing whitehouse.gov. Marcus is a frequent lecturer and
conference speaker on computer security topics. He is completing a
book on Internet firewalls with Tina Darmohray for Prentice Hall.
Bill Rieken provides technical support for distributed object
programming for the DOE project at Sun. He is co-author of
"Adventures in UNIX Network Applications Programming" and is
currently writing a system administration book for Prentice-Hall.
His company, .sh consulting, is located in Los Gatos, California.
Dave Taylor is proprietor of The Internet Mall, a World Wide Web
site with over 2000 stores listed. He is author of "Creating Cool
Web Pages with HTML", "Teach Yourself UNIX In A Week", and "Global
Software", and co-author of "The Internet Business Guide". He also
writes for Internet World, Marketing Computers and other trade
publications and is the original author of the Elm Mail System.
Dave has a Masters in Educational Computing and a Bachelors in
Computer Science.
=============================================================
LISA '95 WORKSHOP: ADVANCED TOPICS IN SYSTEM ADMINISTRATION
Tuesday, September 19, 1995
A one-day workshop will focus on a discussion of the
latest-breaking technical issues in the systems administration
arena as introduced by those in attendance. Attendance is limited
and based on acceptance of a position paper. Acceptance notices to
all participants will be issued by August 14, 1995.
How to Submit: Potential workshop attendees are invited to submit
a proposal of at most three pages (ASCII) via electronic mail to
j...@sgi.com no later than August 1. These proposals should
briefly contain a topic for discussion, a description of the
subject, an explanation of what makes this topic controversial or
interesting, and personal position. More substantive reports of
completed works should instead be submitted as papers to the
technical sessions. A representative subset of positions will be
discussed in an open forum.
The workshop is being organized by John Schimmel of Silicon
Graphics. Mail these proposals to j...@sgi.com by August 1. Chosen
participants will be notified by August 14. Participants must be
pre-registered for the LISA conference. No additional fee will be
charged to attend this workshop, and lunch will be provided.
==============================================================
PRELIMINARY TECHNICAL PROGRAM
Wednesday-Friday, September 20-22, 1995
WEDNESDAY, Sept 20 9:00am-5:30pm
==================================
9:00-10:30 Opening Remarks
Tina Darmohray, Information Works!, Inc & Paul Evans, Synopsys, Inc.
Keynote Address: Hardware, Wetware, and Software
John Mashey, Silicon Graphics
How does the very outer-most technology manage to become more
affordable, and finally wind up on the desks of the masses (which
then becomes the problem of the SAs!). John Mashey will bring his
INDY workstation for the presentation and demonstrate different
ways to apply graphics to problems of system analysis and
management. He'll also bring the software used in Jurassic Park
to view filesystems in a pictorial manner as an example of where
the future may be for all of us.
Dr. Mashey is the director of systems technology in Silicon
Graphics' R&D department. He is an ancient UNIX person, having
started work on it at Bell Labs in 1973. He has worked on and
managed projects in both commercial and technical computing and
helped design the MIPS RISC architecture. He was one of the
founders of the SPEC benchmarking group. He has given more than
500 public talks on software engineering, RISC design, performance
benchmarking, and supercomputing.
REFEREED TRACK
==============
11:00 -12:30 Network Services
Session Chair: John Schimmel, Silicon Graphics, Inc.
lbnamed (A Load Balancing Name Server in Perl)
Roland J. Schemers, SunSoft
LPRng -- An Enhanced Printer Spooler System
Patrick Powell, San Diego State University
Finding a Needle in a Virtual Haystack: Whois++ and the
Whois++ Client Library
Jeff Allen, Harvey Mudd College
2:00 - 3:30 Commercial Environments
Session Chair: TBA
Capital Markets Trading Floors, Current Practice
Alan Kadin, Fidelity Investments, Sam Lipson, Morgan
Stanley Japan Ltd.
Morgan Stanley's Aurora System: Designing a Next Generation
Global Production Unix Environment
Xev Gittler and W. Phillip Moore, Morgan Stanley
How to Upgrade 1500 Workstations on Saturday, and Still Have
Time to Mow the Yard on Sunday
Michael E. Shaddock, Michael C. Mitchell, and Helen E. Harrison
SAS Institute, Inc.
4:00 - 5:30 Security
Session Chair: Marcus J. Ranum, Information Works!, Inc.
Security Administration in an Open Networking Environment
Karen Casella, Sun Microsystems, Inc.
Multi-platform Interrogation and Reporting with Rscan
Nathaniel Sammons, Colorado State University
Exu - A System for Secure Delegation of Authority on an Insecure
Network
Karl Ramm and Michael Grubb, Duke University
INVITED TALKS TRACK
===================
11:00 - 12:30
PANEL DISCUSSION: Management of Mission-critical Applications on
Large Farms of UNIX Workstations.
Panelists: Aaron Goldberg and Yuval Lirov, Lehman Brothers;
Dan Geer, OpenVision Technologies
A critical challenge for distributed systems technology is to
respond to growing numbers of crises without increasing support
costs. Three key support areas require special attention in a
globalized business environment: change management, batch
coordination, and systems monitoring. Their synergy allows
harnessing the spare cycles of desktop systems after business
hours to offer both a competitive edge and economies of scale.
2:00 - 3:30
Spamming, Spoofing, and Spying on Your Personal Global System
N. L. Schryer, AT&T Bell Laboratories
Nearly half of our researchers have megabit/second access to work
from the home computing environment. Soon, employees will expect
the company to maintain and secure the environment at home and the
office. The connection may be over a cable television system so
that the whole neighborhood can spy on the bits as they go by.
The phrase "tightly knit small town" only hints at the new
information sharing. Does the home computer belong behind your
institutional fire-wall?
This talk describes our joyous experience with the wonders of the
InfoBahn and some of the tools and procedures we've developed in
response to the InfoBahn's darker sides.
4:00 - 5:30
PANEL DISCUSSION: Commercial Models of UNIX Support
Yun S. Choi, Pilot Network Services, Inc.; Jennifer Lawton,
Net Daemons Associates; Steve Simmons, Inland Sea
The demand for expert UNIX support has created a growing industry.
Companies large and small are finding "contract support" of their
dynamic computer infrastructure is not only more efficient, but
also cost effective. How is this done? How are these "service
providers" structuring their services? At this panel session, we
have invited three service providers to explain their diverse
service models and share with us their experiences.
6:30-7:30 Work-in-Progress
Short, pithy, and fun, WIP Reports introduce new or ongoing work.
If you have interesting work to share or a cool idea that is not
ready to be published, then a Work-in-Progress report is for you.
Your fellow attendees will give you insightful feedback. We are
especially interested in the presentation of student work. To
reserve your slot, contact Peg Schafer via email to
w...@usenix.org.
THURSDAY, Sept 21 9:00am-5:30pm
=================================
9:00 - 10:30
Electronic Commerce: What It Means to You
Dan Geer, OpenVision Technologies
You can't pick up a newspaper or magazine without reading about
doing business on the Internet. It brings up many interesting points
for sysadmins. How do you secure your system from outsiders and
insiders? How do you take payment? What are the options?
What kinds of problems should you anticipate? This talk will
describe real- life problems and issues.
REFEREED TRACK
==============
11:00-12:30 Internet Services
Session Chair: Tina Darmohray, Information Works!, Inc.
Administering Very High Volume Internet Services
Dan Mosedale, William Foss, and Rob McCool, Netscape
Communications
Bringing the MBONE Home: Experiences with Internal Use of
Multicast-Based Conferencing Tools
Arch Mott, Cisco Systems, Inc.
LACHESIS: A Tool for Benchmarking Internet Service Providers
Jeff Sedayao, Intel Corporation
2:00-3:30 Management
Session Chair: Kim Trudel, Massachusetts Institute of Technology
From Something to Nothing (and back)
Gretchen Phillips, State University of New York at Buffalo
Metrics for Management
Christine Hogan, Synopsys, Inc.
SQL_2_HTML: Automatic Generation of HTML Database Schemas
Jon Finke, Rensselaer Polytechnic Institute
4:00-5:30 User Environment
Session Chair: Bryan McDonald, SRI International
Decentralising Distributed System Administration
Christine Hogan and Tim Hunter, Synopsys, Inc.; Aoife Cox,
Lockheed-Martin
SPM: System for Password Management
Michael A. Cooper, University of Southern California
AGUS: An Automatic Multi-Platform Account Generation System
Paul Riddle and Paul Danckaert, University of Maryland,
Baltimore County; and Matt Metaferia , MCI Telecommunications
INVITED TALKS TRACK
===================
11:30-12:30 An Important Announcement from the IETF
Mike O'Dell
Scott Bradner
Area Directors, Operational Requirements
Internet Engineering Steering Group of the IETF
As is obvious, the Internet is growing rapidly, and as a result, the
CIDR Deployment Group is about to forward a Best Current Practices
document to the IETF, which will probably effect network and system
administrators in the future. Come hear one of the IETF area directors
explain this important document and discuss the reasons behind it.
2:00-3:30
Highlights from the 5th USENIX UNIX Security Symposium
This session will present highlights from the 5th USENIX UNIX
Security Symposium held June 5-7, 1995, in Salt Lake City, Utah.
This session will present three of the refereed papers from that
conference, selected for their relevance for systems
administrators.
4:00-5:30 From ARPANET to Internet
Peter H. Salus, Author and Enthusiast
Before the Internet, there was the ARPANET. Find out what went on
before the first connection: the teasers; the plans for a network
(e.g. Shapiro's paper); the RFQs and the BBN papers; the first two
dozen RFCs (1-19 precede the first IMP); then, the phenomenal
growth which led from 6-bit to 8-bit addressing; the first
applications; where TCP/IP and OSI came from; and a few
anecdotes.
FRIDAY, Sept 22, 9:00am-5:30pm
================================
REFEREED TRACK
9:00-10:30 File Management
Session Chair: Paul Anderson, University of Edinburgh
OpenDist -- Incremental Software Distribution
Peter W. Osel & Wilfried Gaensheimer, Siemens AG
filetsf: A File Transfer System Based on lpr/lpd
John Sellens, University of Waterloo
Patch Control Mechanism for Large Scale Software
Atsushi Futakata, Central Research Institute of Electric Power
Industry
11:00-12:30 Network Hardware
Session Chair: Paul Evans, Synopsys, Inc.
From Twisting Country Lanes to MultiLane Ethernet SuperHighways
Stuart McRobert, Imperial College
From thinnet to 10 baseT, from Sys Admin to Network Manager
Arnold de Leon, Synopsys, Inc.
Tracking Hardware Configurations in a Heterogeneous Network with
syslogd
Rex Walters, IBM Microelectronics
2:00-3:30 Closing Session
Panel Discussion: Computing in the year 2000
Moderator: Rob Kolstad, BSDI
Dan Geer, OpenVision Technologies
Other panelists to be announced
INVITED TALKS TRACK
===================
9:00-10:30 The Truth About ATM
Berry Kercheval, Xerox PARC
Asynchronous Transfer Mode (ATM) is an emerging networking
technology based on cell forwarding which makes high-speed design
easier and enables guaranteed bandwidth. ATM is gaining a
foothold on your desktop, with interface cards for workstations at
less $1000 and switch prices falling, too. It is one of the most
hyped technologies in recent years. This talk cuts through the
hype and explains what ATM really is, what it is good for, and
what the state of the art is.
11:00-12:30
Panel Discussion: Integration of PCs in a UNIX computing Environment
Hal Pomeranz, The NetMarket Company; Rob Reynolds,
Hewlett-Packard Laboratories; Marshal Wilensky, Novell
The path to integration of PCs into a UNIX computing environment
is at least a tricky business, expecially when mail is involved.
This panel features seasoned professionals who have accomplished
this feat of black magic.
=================================================================
SCHEDULE OF CONFERENCE EVENTS
Saturday, September 16
Conference Registration 7:00pm - 9:00pm
Sunday, September 17
Conference Registration 7:30am - 9:00pm
Tutorial Program 9:00am - 5:00pm
Welcome Reception 6:00pm - 9:00pm
Monday, September 18
Conference Registration 7:30am - 6:00pm
Tutorial Program 9:00am - 5:00pm
Tuesday, September 19
Conference Registration 7:30am - 6:00pm
Tutorial Program 9:00am - 5:00pm
Workshop: Advanced Topics
in System Administration 9:00am - 5:00pm
Birds-of a-Feather Sessions 6:00pm - 10:00pm
Wednesday, September 20
Conference Registration 7:30am - 6:00pm
Refereed Track 9:00am - 5:30pm
Invited Talks Track 11:00am - 5:30pm
Birds-of-a-Feather Sessions 6:00pm - 10:00pm
Vendor Display 12:00pm - 6:00pm
Thursday, September 21
Conference Registration 7:30am - 5:00pm
Refereed Track 9:00am - 5:30pm
Invited Talks Track 9:00am - 5:30pm
Vendor Display 10:00am - 4:00pm
Monterey Aquarium Reception 8:00pm - 10:00pm
Birds-of-a-Feather Sessions 10:00pm - 11:30pm
Friday, September 22
Refereed Track 9:00am - 12:30pm
Invited Talks Track 9:00am - 3:30pm
================================================================
VENDOR DISPLAY
The Vendor Display focuses on vendors with products of interest to
system administrators. The atmosphere is informal, and you can
ask the vendors any technical questions you've been thinking
about. The Exhibit hours will be:
Wednesday, September 20 - 12:00pm - 6:00pm
Thursday, September 21 -10:00am - 4:00 pm
MONTEREY BAY AQUARIUM RECEPTION,
Thursday, September 21, 8:00pm - 10:00pm
Desserts and beverages will be served.
All the wonders of a hidden world come to light at the
internationally acclaimed Monterey Bay Aquarium. You'll get a
fish-eye view of Monterey Bay and meet more than 6,000 of its most
colorful inhabitants. Your invitation to this reception is
included in the technical sessions registration fee. Additional
reception tickets will be available for purchase at the
conference.
CONFERENCE PUBLICATIONS
One copy of the conference proceedings, contains all refereed
papers, and one copy of the Invited Talks Submitted Notes may be
picked up at the conference by all technical sessions registrants.
Additional copies may be purchased at the conference. After the
conference, the proceedings are available for purchase; contact
the USENIX Association Executive Office, telephone 510-528-8649 or
via email to off...@usenix.org.
TERMINAL ROOM
Once again this year, a Terminal Room will be available to
conference attendees. Services available at the Terminal Room will
include Internet access, dial-out access, facilities for making
copies of miscellaneous GNU and public domain software. The
Terminal Room will be located at the Monterey Marriott Hotel.
CONFERENCE ATTENDEE MESSAGE SERVICE
Electronic message service will be available Monday, September 18
through noon Friday, September 22. Electronic messages to
conference attendees should be addressed:
first_lastn...@conference.usenix.org.
Telephone messages during the conference may be left by telephoning
the USENIX Registration Desk located at the Monterey Conference
Center. The Message Center will be open beginning on Sunday,
September 17, 7:30 am - 9:00 pm, and continue during conference
hours until Friday, September 22, at 3:30 pm.
THE GURU IS IN
Have a question that's been bothering you? Can't find the answer?
Try asking a USENIX guru! Experts from the USENIX community will be
available to answer your questions, each in their own areas of
expertise. The schedule, including the names of the volunteer
gurus and their areas of expertise, will be posted at the
conference. Email suggestions for this track should be directed to
Lee Damon, n...@qualcomm.com.
BIRDS-OF-A-FEATHER SESSIONS
Birds-of-a-Feather Sessions (BOFs) allow attendees to meet and
discuss topics of interest to them. BOFs are intended to be highly
interactive and much less formal than the technical sessions. BOFs
will be held Tuesday, Wednesday and Thursday evenings in the
Monterey Marriott. We would particularly like to encourage
sessions on topics which would not normally be discussed during
typical USENIX technical presentations (for instance, discussions
on professional and technical issues, non-professional interests
common to system administrators, etc.) To schedule a BOF Session,
or to request more information, send email to Lee Damon,
n...@qualcomm.com. BOFs may also be scheduled on-site at the
Conference Registration Desk.
USENIX ASSOCIATION
USENIX is the UNIX and Advanced Computing Systems Technical and
Professional Association. Since 1975 the USENIX Association has
brought together the community of system administrators, engineers,
scientists, and technicians working on the cutting edge of the
computing world.
The USENIX technical conferences have become the essential meeting
grounds for the presentation and discussion of the most advanced
information on new developments in all aspects of advanced
computing systems.
The USENIX Association and its members are dedicated to:
- problem-solving with a practical bias
- fostering innovation and research that works
- communicating rapidly the results of both research and innovation
- providing a neutral forum for the excercise of critical thought
and the airing of technical issues.
USENIX holds an annual multi-topic technical conference, the annual
System Administration (LISA) conference, and frequent single-topic
symposia addressing topics such as security, Tcl/tk, object-orient
technologies, mobile computing, and operating systems design -- as
many as ten technical meetings a year. It publishes ;login:, a
bi-monthly newsletter; Computing Systems, a quarterly technical
journal published with The MIT Press; and proceedings for each of
its conferences and symposia. It also sponsors special technical
groups and participates in various standards efforts such as IEEE,
ANSI, and ISO.
SAGE, THE SYSTEM ADMINISTRATORS GUILD
SAGE, a Special Technical Group within the USENIX Association, is
dedicated to the recognition and advancement of system
administration as a profession. To join SAGE, you must also be a
member of USENIX.
SAGE activities currently include the publishing of the Short
Topics in System Administration series, the first of which is Job
Descriptions for System Administrators and the second of which,
will be about policies, is in progress; "SAGE News", a regular
section in ;login:; and The System Administrator Profile, an annual
survey of system administrator salaries and responsibilities;
co-sponsoring the LISA conference; support of working groups;
encouraging the formation of local SAGE groups; and an archive site
for papers from the LISA conferences and sys admin-related
documentation.
For more information about USENIX and SAGE, please access our
World Wide Web Site: URL: http://www.usenix.org
===============================================================
MEETING LOCATION AND HOTEL INFORMATION
All daytime meetings will be held at the Monterey Conference Center,
One Portola Plaza Monterey, CA 93940.
All hotels listed below are within walking distance of Fisherman's
Wharf, Cannery Row, the Monterey Bay Aquarium, and many fine
restaurants. To make your hotel reservation at any of the hotels
below, be sure to tell reservations you are with USENIX to take
advantage of our group rate. A one night's deposit is required
for all reservations.
SPECIAL ANNOUNCEMENT*: The Monterey Jazz Festival will be held at
the Fairgrounds in Monterey on September 15-17, 1995. There will
be non-stop jazz at the oldest continuous jazz festival in the
world. Top names in jazz, colorful gifts, food, jazz photo/art
exhibits, jazz clinics/seminars and much more. If you have an
interest in attending, please phone: 800-307-3378 for ticket and
seating information.
*Due to the Jazz Festival, hotel rooms in Monterey will be at a
premium on Friday and Saturday nights. USENIX has a limited number
of hotel rooms reserved for attendees on these nights. You may be
paying a substantially higher hotel rate if you do not make your
arrangements immediately!
HOTEL STATUS 8/29/95
********************
Hotel space is nearly non-existant. Here are some suggestions:
* Try calling "Resorts to Me" at 408-646-9250.
* If you are a AAA member, check out the listings in the
California Tour book.
* ROOM SHARING IS AN OPTION! If you've booked a room and would
like to cut down on your expenses by sharing that room, or if
you can't find a room and are considering sharing one, you can
post your request to other attendees on: comp.org.usenix.roomshare
* Try calling the sold out hotels below to see if there are
any cancellations.
SOLD OUT:
*********
Monterey Marriott (headquarters hotel) - Tel# 408-649-4234
Doubletree Hotel - Tel# 408-649-4511
Hotel Pacific - Tel# 408-373-5700
Victorian Inn - Tel# 408-373-8000
Monterey Plaza Hotel - Tel# 408-646-5937
Monterey Hotel - Tel# 408-375-3184
Colton Inn - Tel# 408-649-6500
Quality Inn Pacific Grove - Tel# 800-992-9060, 800-232-4232,
408 646-8885
Hyatt Regency Monterey - Tel# 408-372-1234
Merritt House Tel# 408-646-9686
Bay Park Hotel Tel# 408-649-1020
*To get original complete hotel information, with addresses
and descriptions, send email to our mailserver at: i...@usenix.org.
Send the line: send lisa-hotels conferences" in the body of
your mail message.
=================================================================
ROOM SHARING - Usenet facilitates room sharing. If you wish to share
a room, post to and check comp.org.usenix.roomshare
PARKING AT THE MONTEREY CONFERENCE CENTER
There are two garages available for Conference Center Parking.
The East Garage is $3 per day and the West Garage, which is closer
to the Center, is $5 per day. Valet parking is available at both
the Marriott and Doubletree Hotels for $10/day.
GETTING TO MONTEREY
Special airline discounts will be available for USENIX attendees.
It is suggested that you fly into either the San Francisco or Los
Angeles International Airport, then transfer to a flight into the
Monterey Peninsula Airport. Please call for details:
JNR, Inc. TOLL FREE: 800-343-4546 (USA) or 714-476-2788
The Monterey Peninsula Airport is located just four miles from the
Monterey Conference Center. Taxi service is available at an
approximate cost of $10-12 one way.
If you are driving -
>From San Jose - Take Hwy 101 South to Hwy 156 West which turns
into Hwy 1. Exit at at Pacific Grove/Del Monte Avenue. Continue
on Del Monte into Monterey.
>From southern California - Take Hwy 101 north to Hwy 68 west to
Central Monterey turnoff to Hwy 1 south. Take the Monterey exit
straight and turn right on Camino Aguajito to Del Monte and turn
left. Continue on Del Monte to the Conference Center.
=================================================================
CONFERENCE ORGANIZERS
Conference Co-Chairs:
Tina Darmohray, Information Works!, Inc.
Paul Evans, Synopsys, Inc.
Conference Program Committee:
Paul Anderson, University of Edinburgh
Kim Trudel, Massachusetts Institute of Technology
Rob Kolstad, Berkeley Software Design, Inc.
Bryan McDonald, SRI International
Marcus J. Ranum, Information Works!, Inc.
John Schimmel, Silicon Graphics, Inc.
Invited Talks Coordinators:
Peg Schafer, Harvard University
Laura de Leon, Hewlett-Packard
Work-In-Progress Coordinator:
Peg Schafer, Harvard University (w...@usenix.org)
Guru Is IN Coordinator:
Lee Damon, QUALCOMM, Inc. (n...@qualcomm.com)
Terminal Room Coordinator:
Henry Spencer, SP Systems (h...@zoo.toronto.edu)
Tutorial Program Coordinator:
Daniel V. Klein, USENIX (d...@usenix.org)
Exhibits Coordinator:
Peter Mui, USENIX (disp...@usenix.org)
Meeting Planner:
Judith F. DesHarnais, USENIX (confere...@usenix.org)
=================================================================
STUDENT DISCOUNTS
TUTORIALS: A limited number of seats in each tutorial are reserved
for full-time students at the very special rate of $70.00 for
either two - 1/2 day tutorial classes or one full-day tutorial (2
units). To take advantage of this, you MUST telephone the
conference office to confirm availability and make a reservation.
You will receive a reservation code number which MUST appear on
your Registration Form. Your registration form with full payment
and a photocopy of your current student I.D. card MUST arrive
within 14 days from the date of your reservation. If they do not
arrive by that date, your reservation will be cancelled. This
special fee is non-transferable.
TECHNICAL SESSIONS: USENIX offers a special discount rate of $75
for its technical sessions for full-time students. You must
include a copy of your current student I.D. card with your
registration. This special fee is not transferable.
Full-time students please note: A limited number of scholarships
are available. Contact the Conference Office for details.
---------------------------CUT HERE--------------------------------
*******************************************************************
REGISTRATION FORM - 9th SYSTEMS ADMINISTRATION CONFERENCE (LISA '95)
September 17-22, 1995, Monterey Conference Center, Monterey, CA
*******************************************************************
Please complete the form below and return with full payment to:
USENIX CONFERENCE OFFICE
22672 Lambert St., Suite 613, Lake Forest, CA 92630
Telephone: (714) 588-8649 / FAX Number (714) 588-9706
Electronic Mail Address: confere...@usenix.org
Office Hours: 8:30am - 5:00pm Pacific Time
NAME________________________________________________________________
(first) (last)
USENIX Member ID____________________
FIRST NAME FOR BADGE____________________________
COMPANY OR INSTITUTION______________________________________________
MAILING ADDRESS_____________________________________________________
CITY___________________________STATE_____COUNTRY________ZIP____________
TELEPHONE NO:_________________________FAX NO._________________________
NETWORK ADDRESS______________________________________________________
(one only please)
[ ] I do not want to receive future commercial mailings
Is this your work address? ___yes ___no
[ ] I do NOT want to appear in the attendee list
What is your affiliation? [ ]Academic [ ]Commercial [ ]Gov't [ ]R&D
What is your role in purchase decision?
1.[] Final 2.[] Specify 3.[] Recommend 4.[] Influence 5.[] No role
What is your job function?
1.[] System/Network Administrator 2.[] Consultant
3.[]Academic/Research 4.[] Developer/Programmer/Architect
6.[]Technical Manager 7.[] Student
How did you hear about this meeting:
1.[] USENIX mailing 2.[] Newsgroup/Bulletin Board 3.[] ;login:
4.[] World Wide Web 6.[] From a Colleague 7.[] Magazine
What publications or newgroups do you read releated to system
administration?________________________________________________
==========================================================
TUTORIAL PROGRAM - Sunday-Tuesday, September 17-19, 1995
You must pre-register for the tutorials you wish to take. They
may be on different days, so long as there is no overlap. You
may not "split" tutorials - for example, you may not register for
M8pm and half of M1. Tutorials designated "AM" run from
9:00am-12:30pm; tutorials designated "PM" run from 1:30pm-5:00pm;
tutorials with no AM or PM designation run from 9:00am-5:00pm.
Check the boxes next to the tutorial number(s) you wish to attend:
Sunday, September 17
=====================
[ ] S1: Joining the Internet Safely Using UNIX and Firewalls
[ ] S2: Introduction to UNIX System Administration
Monday, September 18
====================
[ ] M1: New Topics in System Administration
[ ] M2: UNIX System Security
[ ] M3: Sendmail Inside and Out
[ ] M4: Introduction to System Performance Tuning
[ ] M5am: Administering the Domain Name System
[ ] M6am: An Introduction to HTML
[ ] M7am: Breaking the Communication Barrier: Talking Technical
[ ] M8pm: GUI Programming in Perl
[ ] M9pm: IP Network Administration
[ ] M10pm: New Manager's Survival Guide
Tuesday, September 19
=====================
[ ] T1: Topics in System Administration
[ ] T2: Joining the Internet Safely Using UNIX and Firewalls
[ ] T3: Beginning Perl Programming for UNIX Programmers
[ ] T4: Solaris System Administration
[ ] T5am: UNIX Security: Threats and Solutions from the Network
[ ] T6am: How to Plan Internet Security and Firewalls
[ ] T7am: World Wide Web Programming with CGI
[ ] T8pm: What's New in Sendmail 8.7
[ ] T9pm: "But I'm Not Responsible Am I?": Your Liabilities as a
System Administrator
[ ] T10pm: Web Server Administration
FOR PURPOSES IN CALCULATING YOUR TUTORIAL REGISTRATION FEE:
One half-day tutorial = 1 unit
One full-day tutorial = 2 units
In order to determine your total tutorial registration fee, add the
total number of units you have selected and refer to the fee schedule
shown below (a maximum of 2 units per day, may be selected):
NUMBER UNITS TUTORIAL FEE CEU Surcharge
SELECTED (before Aug 25) (optional)
One Unit $175.00 $15.00
Two Unit $320.00 $15.00
Three Units $455.00 $23.00
Four Units $590.00 $30.00
Five Units $725.00 $38.00
Six Units $860.00 $45.00
==========================================================
FEE SCHEDULE for TUTORIAL PROGRAM and TECHNICAL SESSIONS
TUTORIAL FEES - Sunday-Tuesday, September 17-19, 1995
Enter total tutorial fee from schedule above......$__________
CEU units surcharge from schedule above (optional)$__________
Late fee applies if postmarked after Aug. 25, 1995..Add $50. $_______
Full-Time Student Fee: pre-registered or onsite
(Attach copy of current student I.D. card)
CODE NO:______________________$70.00$________
CODE NO:______________________$70.00$________
CODE NO:______________________$70.00$________
TECHNICAL SESSIONS REGISTRATION FEES
Wednesday-Friday, September 20-22, 1995
Member Fee............................................$320.00$_______
(Applies to current USENIX,EurOpen, JUS and AUUG members)
Non-Member or Renewing Member Fee*....................$425.00$_______
*Join or renew your USENIX/SAGE membership and
attend the conference for same low price -check here [ ]
Late fee applies if postmarked after Aug. 25, 1995..Add $50. $_______
Full-Time Student Fee: pre-registered or on-site......$ 75.00 $______
(Students must include photocopy of current student I.D. card)
TOTAL ENCLOSED...................$_________
PAYMENT (US Dollars only) MUST ACCOMPANY THIS FORM.
Purchase orders, vouchers, telephone or email registrations
cannot be accepted.
[ ]Payment Enclosed (Make check payable to USENIX Conference)
CHARGE TO MY: ___VISA ___MASTERCARD ___AMERICAN EXPRESS ___DINERS CLUB
ACCOUNT NO.______________________________________ EXP. DATE___________
_______________________________________/___________________________
Print Cardholder's Name Cardholder's Signature
You may FAX your registration form if paying by credit card to
USENIX Conference Office, FAX: 714 588 9706. (To avoid duplicate
billing, please DO NOT mail an additional copy.)
REFUND CANCELLATION POLICY: If you must CANCEL, all refund requests
must be in writing and postmarked no later than September 11, 1995.
Direct your letter to the USENIX Conference Office. You may
telephone to substitute another in your place.
|