Abstract is missing.
- Lessons Learned from Howard Dean s Digital CampaignKeri Carpenter, Thomas A. Limoncelli. [doi]
- Mac OS XMichael Bartosh.
- RAID/HA/SAN (with a Heavy Dose of Veritas)Douglas Hughes, Darren Dunham.
- Filtering, Stamping, Blocking, Anti-Spoofing: How to Stop the SpamJoshua Goodman.
- A New Approach to ScriptingTrey Harris.
- LinuxBdale Garbee.
- Storage Security: You re Fooling YourselfW. Curtis Preston.
- Configuration ManagementGene Kim.
- Flying LinuxDaniel V. Klein. [doi]
- What Spammers Are Doing to Get Around Bayesian Filtering & What We Can Expect for the FutureJohn Graham-Cumming. [doi]
- Lessons Learned Reimplementing an ISP Mail Service Infrastructure to Cope with SpamDouglas Hughes. [doi]
- SambaGerald Carter.
- Anomaly Detection: Whatever Happened to Computer Immunology?Mark Burgess.
- LiveJournal s Backend and memcached: Past, Present, and FutureLisa Phillips, Brad Fitzpatrick. [doi]
- Professional GrowthDavid W. Parter.
- AFSEsther Filderman.
- System Administration and Sex Therapy: The Gentle Art of DebuggingDavid N. Blank-Edelman. [doi]
- Grid Computing: Just What Is It and Why Should I Care?Esther Filderman, Ken McInnis. [doi]
- Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and ConfigurationChad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang.
- VoIP and IETF StandardsRobert Sparks.
- What Information Security Laws Mean For YouJohn Nicholson. [doi]
- DocumentationMichael Ciavarella.
- BackupsW. Curtis Preston.
- What Is This Thing Called System Configuration?Alva L. Couch. [doi]
- NFS, Its Applications and FutureBrian Pawlowski. [doi]
- The Administrator, Then and NowPeter H. Salus.
- The Security Role of Linguistic Content AnalysisJim Nisbet. [doi]
- Used Disk DrivesSimson L. Garfinkel. [doi]
- Keynote Address: Going Digital at CNNHoward Ginsberg. [doi]
- A System Administrator s Introduction to BioinformaticsBill Van Etten. [doi]
- Scalable Centralized Bayesian Spam Mitigation with Bogofilter (Awarded Best Paper!)Jeremy Blosser, David Josephsen. 1-20 [doi]
- DIGIMIMIR: A Tool for Rapid Situation Analysis of Helpdesk and Support EmailNils Einar Eide, Andreas N. Blaafadt, Baard H. Rehn Johansen, Frode Eika Sandnes. 21-32 [doi]
- Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware ManagementYi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo. 33-46 [doi]
- A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and ProcessingSufatrio, Roland H. C. Yap, Liming Zhong. 47-58 [doi]
- DigSig: Runtime Authentication of Binaries at Kernel LevelAxelle Apvrille, David Gordon, Serge E. Hallyn, Makan Pourzandi, Vincent Roy. 59-66 [doi]
- I:::3:::FS: An In-Kernel Integrity Checker and Intrusion Detection File SystemSwapnil Patil, Anand Kashyap, Gopalan Sivathanu, Erez Zadok. 67-78 [doi]
- Nix: A Safe and Policy-Free System for Software DeploymentEelco Dolstra, Merijn de Jonge, Eelco Visser. 79-92 [doi]
- Auto-configuration by File Construction: Configuration Management with newfigWilliam LeFebvre, David Snyder. 93-104 [doi]
- AIS: A Fast, Disk Space Efficient Adaptable Installation System Supporting Multitudes of Diverse Software ConfigurationsSergei Mikhailov, Jonathan Robert Stanton. 105-112 [doi]
- autoMAC: A Tool for Automating Network Moves, Adds, and ChangesChristopher J. Tengi, James M. Roberts, Joseph R. Crouthamel, Chris M. Miller, Christopher M. Sanchez. 113-120 [doi]
- More Netflow Tools for Performance and SecurityCarrie Gates, Michael Collins, Michael Duggan, Andrew Kompanek, Mark Thomas. 121-132 [doi]
- Real-time Log File Analysis Using the Simple Event Correlator (SEC)John P. Rouillard. 133-150 [doi]
- Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault DiagnosisNi Lao, Ji-Rong Wen, Wei-Ying Ma, Yi-Min Wang. 151-158 [doi]
- LifeBoat: An Autonomic Backup and Restore SolutionTed Bonkenburg, Dejan Diklic, Benjamin Reed, Mark Smith, Michael Vanover, Steve Welch, Roger Williams. 159-170 [doi]
- PatchMaker: A Physical Network Patch Manager ToolJoseph R. Crouthamel, James M. Roberts, Christopher M. Sanchez, Christopher J. Tengi. 171-176 [doi]
- Who Moved My Data? A Backup Tracking System for Dynamic Workstation EnvironmentsGregory Pluta, Larry Brumbaugh, William Yurcik, Joseph Tucek. 177-186 [doi]
- Making a Game of Network SecurityMarc Dougherty. 187-194 [doi]
- Securing the PlanetLab Distributed Testbed: How to Manage Security in an Environment with No Firewalls, with All Users Having Root, and No Direct Physical Control of Any SystemPaul Brett, Mic Bowman, Jeff Sedayao, Robert Adams, Rob C. Knauerhase, Aaron Klingaman. 195-202 [doi]
- Secure Automation: Achieving Least Privilege with SSH, Sudo, and SuidRobert A. Napier. 203-212 [doi]
- Experience in Implementing an HTTP Service ClosureSteven Schwartzberg, Alva L. Couch. 213-230 [doi]
- Meta Change Queue: Tracking Changes to People, Places, and ThingsJon Finke. 231-240 [doi]
- Solaris Zones: Operating System Support for Consolidating Commercial WorkloadsDaniel Price, Andrew Tucker. 241-254 [doi]