Abstract is missing.
- Panel: Written Any Good Books Lately?
- Beyond File Permissions: Controlling User ActionsÆleen Frisch. [doi]
- Keynote Address: Slime vs. SiliconGreg Bear.
- Security for E-Voting in Public ElectionsAviel D. Rubin.
- BPF Meets UVMMichael T. Stolarchuk. [doi]
- Invited Talk: San Diego Supercomputer Center s Blue HorizonVictor Hazlewood.
- Rules of Thumb of System AdministrationSteve Simmons, Elizabeth D. Zwicky.
- JINI Networking Technology and Ad-Hoc NetworksJim Waldo.
- Infrastructure ArchitectureSteve Traugott.
- SANs and NASW. Curtis Preston.
- Panel: The Future of Computer Security
- Where Has All the Crypto Gone? Long Time Coming: A Speculative and Historical TalkGregory G. Rose. [doi]
- A Non-Traditional Approach to Network Security ControlMark Epstein.
- LDAPGerald Carter.
- Reducing System Complexity: A Case Study in Converging EnvironmentsRuth Milner.
- Panel: Scripting Languages Bake-Off
- BackupsW. Curtis Preston.
- PHP for System AdministrationShane Caraveo.
- Crypto BlundersSteve Burnett.
- Managing the Terascale: Lessons from a 750-Node SupercomputerEsther Filderman, Kevin J. Sullivan.
- CNN.com: Facing a World CrisisWilliam LeFebvre.
- If I Could Talk to the Animals--What Sysadmins Can Learn About Diagnostic Skills from Another ProfessionDavid N. Blank-Edelman.
- PKI/CryptographyGregory G. Rose.
- Are Baseline Computer Security Standards the Answer?Hal Pomeranz.
- AFSEsther Filderman, Garry Zacheiss.
- ZopeMichel Pelletier.
- Inspection, Detection & Deflection: Armoring the Next Wave of Security TechnologyJohn S. Flowers.
- Internet Measurement: Myths About Internet DataKimberly C. Claffy.
- Sysadmin for SuitsBill Labrie.
- 150/5, 000 Years of (E-)Commerce: History Repeats Itself AgainDaniel V. Klein.
- Computer Room Design/LayoutAdam Moskowitz.
- Writing Papers for Usenix Refereed TrackThomas A. Limoncelli.
- Keynote: Rebuilding the Digital Enterprise Around Internet StandardsErnest Prabhakar.
- Panel: An Overview of Terascale ComputingEsther Filderman, Kevin Sullivan, Victor Hazlewood.
- Email MTAsEric Allman.
- 2001: A Communications AnniversaryPeter H. Salus.
- Hardening Windows 2000Phil Cox.
- How Not to Configure Your Firewall: A Field Guide to Common Firewall ConfigurationsAvishai Wool.
- The Problem with DevelopersGeoff Halprin.
- TCP Performance TuningThomas J. Hacker.
- Whither End-to-End: Placing Bandwidth and Trust at the EdgeGordon Cook.
- What Sysadmins Need to Know About the New Intellectual Property LawsLee Tien.
- Wrap-Up and Q & AEsther Filderman, Kevin Sullivan, Victor Hazlewood.
- Defining the Role of Service Manager: Sanity Through Organizational EvolutionMark D. Roth. 1-6 [doi]
- Remote Outsourcing Services for Multiple Branch Offices and Small Businesses via the InternetDejan Diklic, Venkatesh Velayutham, Steve Welch, Roger Williams. 7-14 [doi]
- SUS, an Object Reference Model for Distributing UNIX Super User PrivilegesPeter D. Gray. 15-18 [doi]
- IPSECvalidate: A Tool to Validate IPSEC ConfigurationsReiner Sailer, Arup Acharya, Mandis Beigi, Raymond B. Jennings III, Dinesh C. Verma. 19-24 [doi]
- ScanSSH: Scanning the Internet for SSH ServersNiels Provos, Peter Honeyman. 25-30 [doi]
- A Probabilistic Approach to Estimating Computer System Reliability (Awarded Best Theory Paper!)Robert Apthorpe. 31-46 [doi]
- Scheduling Partially Ordered Events in a Randomised Framework: Empirical Results and Implications for Automatic Configuration ManagementFrode Eika Sandnes. 47-62 [doi]
- The Maelstrom: Network Service Debugging via Ineffective Procedures Alva L. Couch, Noah Daniels. 63-78 [doi]
- Performance Evaluation of Linux Virtual ServerPatrick O Rourke, Mike Keefe. 79-92 [doi]
- Measuring Real-World Data AvailabilityLarry Lancaster, Alan Rowe. 93-100 [doi]
- Simulation of User-Driven Computer BehaviourHårek Haugerud, Sigmund Straumsnes. 101-108 [doi]
- Specific Simple Network Management ToolsJürgen Schönwälder. 109-120 [doi]
- Gossips: System and Service MonitorVictor Götsch, Albert Wuersch, Tobias Oetiker. 121-132 [doi]
- The CoralReef Software Suite as a Tool for System and Network AdministratorsDavid Moore, Ken Keys, Ryan Koga, Edouard Lagache, Kimberly C. Claffy. 133-144 [doi]
- Global Impact Analysis of Dynamic Library DependenciesYizhan Sun, Alva L. Couch. 145-150 [doi]
- Tools to Administer Domain and Type EnforcementSerge E. Hallyn, Phil Kearns. 151-156 [doi]
- Solaris Bare-Metal Recovery from a Specialized CD and Your Enterprise Backup SolutionLee Leonardo Amatangelo, W. Curtis Preston. 157-162 [doi]
- Accessing Files on Unmounted FilesystemsWillem A. Schreüder. 163-168 [doi]
- Automating Infrastructure Composition for Internet ServicesTodd Poynor. 169-178 [doi]
- TemplateTree II: The Post-Installation Setup ToolTobias Oetiker. 179-186 [doi]
- The Arusha Project: A Framework for Collaborative UNIX System AdministrationMatt Holgate, Will Partain. 187-198 [doi]
- LEXIS: An EXam Invigilation System (Awarded Best Applied Paper!)Mike Wyer, Susan Eisenbach. 199-210 [doi]
- Dynamic Sublists: Scaling Unmoderated Mailing ListsEllen Spertus, Mills College, Robin Jeffries, Kiem Sie. 211-218 [doi]
- GEORDI: A Handheld Tool for Remote System AdministrationStephen J. Okay, Gale E. Pedowitz. 219-230 [doi]
- Macroscopic Internet Topology and Performance Measurements from the DNS Root Name ServersMarina Fomenkov, Kimberly C. Claffy, Bradley Huffaker, David Moore. 231-240 [doi]
- DNS Root/g TLD Server MeasurementsNevil Brownlee, Kimberly C. Claffy, Evi Nemeth. 241-256 [doi]
- Pelican DHCP Automated Self-Registration System: Distributed Registration and Centralized ManagementRobin Garner. 257-267 [doi]
- A Management System for Network-Shareable Locally Installed Software: Merging RPM and the Depot Scheme Under SolarisR. P. Channing Rodgers, Ziying Sherwin. 267-273 [doi]
- File Distribution Efficiencies: cfengine Versus rsyncAndrew Mayhew. 273-276 [doi]
- CfAdmin: A User Interface for cfengineCharles Beadnall, Andrew Mayhew. 277-281 [doi]