Journal: ;login:

Volume 32, Issue 6

0 -- 0Rob Kolstad. USACO Update
0 -- 0Gernot Heiser. Your System Is Secure? Prove It!
0 -- 0Sam Stover, David Dittrich, John Hernandez, Sven Dietrich. Analysis of the Storm and Nugache Trojans: P2P Is Here
0 -- 0Ellie Young. 2008 Election of the USENIX Board of Directors
0 -- 0Ellie Young. Thanks to Our Volunteers
0 -- 0David Josephsen. iVoyeur: Mystical Flows
0 -- 0Heison Chak. Asterisk and LumenVox ASR
0 -- 0Gary McGraw, Rik Farrow. Exploiting Online Games: An Interview
0 -- 0Robert G. Ferrell. /dev/random
0 -- 0Rik Farrow. Musings
0 -- 0Tal Garfinkel, Andrew Warfield. What Virtualization Can Do for Security
0 -- 0Elizabeth Zwicky, et al.. Book Reviews
0 -- 0David Dittrich, Sven Dietrich. Command and Control Structures in Malware: From Handler/Agent to P2P
0 -- 0Mike Rash. IDS Signature Matching with iptables, psad, and fwsnort
0 -- 0David N. Blank-Edelman. Practical Perl Tools: Perl Meets Nmap and p0f

Volume 32, Issue 5

0 -- 0Alexander Muentz. Hardening Your Systems Against Litigation
0 -- 0Octave Orgeron. An Introduction to Logical Domains, Part 2
0 -- 0Cat Okita. (Digital) Identity 2.0
0 -- 0Andrey Mirtchovski, Latchesar Ionkov. Why Some Dead OSes Still Matter
0 -- 0David N. Blank-Edelman. Practical Perl Tools: Let Me Draw You a Picture
0 -- 0Nicholas M. Stoughton. Whither C++?
0 -- 0Robert G. Ferrell. /dev/random
0 -- 0Ellie Young. 2008 USENIX Nominating Committee
0 -- 0Hemant Sengar. IP Telephony
0 -- 0David Josephsen. iVoyeur: Opaque Brews
0 -- 0Rik Farrow. Musings
0 -- 0Dan S. Wallach. Creating the EVT Workshop
0 -- 0Elizabeth Zwicky, et al.. Book Reviews

Volume 32, Issue 4

0 -- 0Massimo Bernaschi, Francesco Casadei, Samuele Ruco. Migration of Secure Connections Using SockMi
0 -- 0Octave Orgeron. An Introduction to Logical Domains, Part 1
0 -- 0Rik Farrow. Musings
0 -- 0Nick Stoughton. An Update on Standards: Revision Fever
0 -- 0Robert G. Ferrell. /dev/random
0 -- 0Michael Piatek, Tomas Isdal, Thomas E. Anderson, Arvind Krishnamurthy, Arun Venkataramani. Building BitTyrant, a (More) Strategic BitTorrent Client
0 -- 0Emin Gün Sirer, Rik Farrow. Some Lesser-Known Laws of Computer Science
0 -- 0Ellie Young. USENIX Association Financial Report for 2006
0 -- 0Rob Kolstad. Flame and STUG Awards
0 -- 0Alva L. Couch. Should the Root Prompt Require a Road Test?
0 -- 0David N. Blank-Edelman. Practical Perl Tools: Peter Piper Picked a Peck ofPDFs
0 -- 0Elizabeth Zwicky, et al.. Book Reviews
0 -- 0Heison Chak. Deviating Alternatives to Asterisk
0 -- 0Toni Veglia. Summary of USENIX Board of DirectorsMeetings and Actions
0 -- 0David Josephsen. iVoyeur: A View from Someplace Nearby

Volume 32, Issue 3

0 -- 0Avantika Mathur, Mingming Cao, Andreas Dilger. Ext4: The Next Generation of the Ext3 File System
0 -- 0Marshall K. McKusick. A Brief History of the BSD Fast File System
0 -- 0Daniel L. Appelman. Spam and Blogs. Part 2: Blogs, for Good or Ill
0 -- 0David N. Blank-Edelman. Practical Perl Tools: Impractical Perl Tools
0 -- 0Elizabeth Zwicky, et al.. Book Reviews
0 -- 0Pawel Jakub Dawidek, Marshall K. McKusick. Porting the Solaris ZFS File System to the FreeBSD Operating System
0 -- 0Rik Farrow. Musings
0 -- 0Robert G. Ferrell. /dev/random
0 -- 0Vassilis Prevelakis. Supporting a Security Laboratory
0 -- 0Alex Aiken. In Memoriam: John W. Backus, 1924-2007
0 -- 0Dan Geer. A Quant Looks at the Future
0 -- 0Alexander Muentz. Script Kiddies with Briefcases: The Legal System as Threat

Volume 32, Issue 2

0 -- 0Heison Chak. Asterisk Appliance
0 -- 0Robert Haskins. VoIP in an Internet Service Provider Network
0 -- 0Elizabeth Zwicky, et al.. Book Reviews
0 -- 0Daniel L. Appelman. Spam and Blogs. Part 1: Spam: A Balancing Act
0 -- 0Rik Farrow. Promises, Promises: An Interview with Mark Burgess
0 -- 0Brendan Quinn. Lessons Learned from Living with LDAP
0 -- 0Nicholas M. Stoughton. Why Standardize?
0 -- 0John Lloyd. Introducing System Engineering to the System Admin
0 -- 0David N. Blank-Edelman. Practical Perl Tools: These Inodes Were Made for Walkin'
0 -- 0Robert G. Ferrell. /dev/random
0 -- 0Jane-Ellen Long, Alva L. Couch. SAGE Update
0 -- 0Glenn A. Fink, Deborah A. Frincke. Autonomic Computing: Freedom or Threat?
0 -- 0Thomas Sluyter. All Quiet on the Western Front: A Discussion on the Necessity of Good Reporting
0 -- 0Rik Farrow. Musings
0 -- 0Chad Verbowski. The Secret Lives of Computers Exposed: Flight Data Recorder for Windows

Volume 32, Issue 1

0 -- 0Robert Haskins. ISPadmin: DHCP Services
0 -- 0Hans Boehm, Bill Pugh, Doug Lea. Multithreading in C and C++
0 -- 0Robert G. Ferrell. /dev/random
0 -- 0Rik Farrow. Musings
0 -- 0Jane-Ellen Long. SAGE Update
0 -- 0Ellie Young. USENIX Board of Directors Meetings and Actions
0 -- 0Steven Hand, Andrew Warfield, Keir Fraser. Hardware Virtualization with Xen
0 -- 0Robert M. Marmorstein, Phil Kearns. Debugging a Firewall Policy with Policy Mapping
0 -- 0Heison Chak. Virtualizing Asterisk
0 -- 0David N. Blank-Edelman. Practical Perl Tools: Spawning
0 -- 0Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum. Roadmap to a Failure-Resilient Operating System
0 -- 0Leigh Griffin, John Ronan. Xen Installation and Configuration
0 -- 0Mark Burgess. Configuration Management: Models and Myths. Part4: There's No I/O Without U
0 -- 0Elizabeth D. Zwicky, et al.. Book Reviews
0 -- 0Simson L. Garfinkel. Commodity Grid Computing with Amazon's S3 and EC2