Check out the new USENIX Web site.
LISA 2001, 15th Systems Administration Conference, December 2-7, 2001, San Diego, CA
LISA Home At a Glance Register/Hotel Tutorials Tech Sessions Workshops Exhibition Organizers Activities

Tutorials: Overview | By Day (Sunday, Monday, Tuesday) | By Instructor | All in One File

Sunday, December 2, 2001    

S1 Real-World Intrusion Detection: Problems and Solutions
Phil Cox and Mark Mellis, SystemExperts Corporation

Who should attend: System and network administrators who implement or maintain intrusion detection systems, managers charged with selecting and setting intrusion detection requirements, and anyone who wants to know the details of how to make intrusion detection work. Familiarity with TCP/IP networking is a plus.

In today's increasingly networked world, intrusion detection is essential for protecting resources, data, and reputation. It's a rapidly evolving field with several models and deployment methods from which to choose.

After taking this tutorial, attendees will understand the fundamental concepts of intrusion detection and will gain practical insights into designing, deploying, and managing intrusion detection systems in the real world.

Topics include:

  • Why intrusion detection?
  • ID and the organization
  • Intrusion detection basics
  • How attackers attempt to bypass IDS systems
  • Case studies for small, medium, and large deployments

Phil Cox (S1, M6) cox_phil is a consultant for SystemExperts Corporation, a consulting firm that specializes in system security and management. Phil frequently writes and lectures on issues bridging the gap between UNIX and Windows NT. He is a featured columnist in ;login;, the USENIX Association Magazine and has served on numerous USENIX program committees. Phil holds a B.S. in computer science from the College of Charleston, South Carolina.




Mark Mellis (S1) mellis_mark Corporation based in the San Francisco Bay Area. Over the past two years, Mark has distinguished himself by assisting several of the premier Internet companies in responding to major network attacks, and in designing and implementing robust infrastructure to limit future exposure. Mark has established a reputation over the past seventeen years of achieving the highest level of customer satisfaction in the areas of Unix, Windows & NT, Macintosh, DNS, Internet and intra-net connectivity, SMTP email, and WAN technologies. Mark attended the University of Washington, where he studied Physics.

S2 Advanced Solaris System Administration Topics
Peter Baer Galvin, Corporate Technologies

Who should attend: UNIX administrators who need more knowledge of Solaris administration.

We will discuss the major new features of recent Solaris releases, including which to use (and how) and which to avoid. This in-depth course will provide the information you need to run a Solaris installation effectively. Updated to include Solaris 8 and several other new topics.

Topics include:

  • Installing and upgrading
    • Architecting your facility
    • Choosing appropriate hardware
    • Planning your installation, filesystem layout, post-installation
    • Installing (and removing) patches and packages
  • Advanced features of Solaris 2
    • File systems and their uses
    • The /proc file system and commands
    • Useful tips and techniques
  • Networking and the kernel
    • Virtual IP: configuration and uses
    • Kernel and performance tuning: new features, adding devices, tuning, debugging commands
    • Devices: naming conventions, drivers, gotchas
  • Enhancing Solaris

Upon completion of the course, attendees will know what the IETF has been up to lately, and what to expect in upcoming BIND releases. This tutorial will not be a rehash of prior material--new subjects will be covered.

Peter Baer Galvin (S2) galvin_peter is the chief technologist for Corporate Technologies, Inc., and was the systems manager for Brown University's Computer Science Department. He has written articles for Byte and other magazines, is systems admnistration columnist for SunWorld, and is co-author of the Operating Systems Concepts and the Applied Operating Systems Concepts textbooks. As a consultant and trainer, Peter has taught tutorials on security and systems administration and has given talks at many conferences.


S4 Issues in UNIX Infrastructure Design
Lee Damon, University of Washington

Who should attend: Anyone who is designing, implementing, or maintaining a UNIX environment with 2 to 20,000+ hosts. System administrators, architects, and managers who need to maintain multiple hosts with few admins.

This tutorial won't propose one "perfect solution." Instead, it will try to raise all the questions you should ask in order to design the right solution for your needs.

Topics include:

  • Administrative domains: Who is responsible for what? What can users do for themselves?
  • Desktop services vs. farming
  • Disk layout
  • Free vs. purchased solutions: Do you write your own, or do you outsource?
  • Homogeneous vs. heterogeneous
  • Master database: What do you need to track, and how?
  • Policies to make your life easier
  • Push vs. pull: Do you force data to each host, or wait for a client request?
  • Quick replacement techniques: How to get the user back up in 5 minutes
  • Remote install/upgrade/patching: How can you implement lights-out operation? Handle remote user sites? Keep up with vendor patches?
  • Scaling and sizing: How do you plan?
  • Security vs. sharing
  • Single sign-on: Can one-password access to multiple services be secure?
  • Single system images: Should each user see everything the same way, or should each user's access to each service be consistent with his/her own environment?
  • Tools: What's free? What should you buy? What can you write yourself?

Lee Damon (S4) damon_lee holds a B.S. in speech communication from Oregon State University. He has been a UNIX system administrator since 1985 and has been active in SAGE since its inception. He has been a UNIX system administrator since 1985 and has been active in SAGE since its inception. He co-developed departmental and company-wide UNIX environments for IBM, GulfStream Aerospace and QUALCOMM. He is now working in the EE Department at the University of Washington, and is helping to develop the Nikola UNIX infrastructure there.


S5 Linux System Administration
Joshua Jensen, Red Hat, Inc.

Who should attend: System administrators who plan to implement a Linux solution in a production environment. Attendees should be familiar with the basics of system administration in a UNIX/Linux environment: user-level commands, administration commands, and TCP/IP networking. Both novice and intermediate administrators should leave the tutorial having learned something.

From a single server to a network of workstations, the Linux environment can be a daunting task for administrators knowledgeable on other platforms. Starting with a single server and finishing with a multi-server, 1000+ user environment, case studies will provide practical information for using Linux in the real world.

Topics include:

  • Installation features
  • Disk partitioning and RAID
  • Networking
  • User accounts
  • Services
  • NFS and NIS
  • Security through packet filtering and SSH
  • New developments (journaling file systems, VPNs, and more)

At the completion of the tutorial, attendees should feel confident in their ability to set up and maintain a secure and useful Linux network. The tutorial will be conducted in an open manner that allows for question-and-answer interruption.

Joshua Jensen jensen_joshua (S5) and examiner, and has been with Red Hat for 3 years. In that time he has written and maintained large parts of the Red Hat curriculum: Networking Services and Security, System Administration, and the Red Hat Certified Engineer course and exam. Joshua has worked with Linux for six years, and has been teaching Cisco Internetworking and Linux courses since 1998.




S7 Network Security Profiles: A Collection (Hodgepodge) of Stuff Hackers Know About You
Brad Johnson, SystemExperts Corporation

Who should attend: Network, system, and firewall administrators; security auditors and those who are audited; people involved with responding to intrusions or responsible for network-based applications or systems that might be targets for crackers (determined intruders). Participants should understand the basics of TCP/IP networking. Examples will use actual tools and will also include small amounts of HTML, JavaScript, and Tcl.

Network-based host intrusions, whether they come from the Internet, an extranet, or an intranet, typically follow a common methodology: reconnaissance, vulnerability research, and exploitation. This tutorial will review the ways crackers perform these activities, what protocols and tools they use, and a number of current methods and exploits. You'll learn how to generate vulnerability profiles of your systems. Additionally, we'll review some important management policies and issues.

We'll focus primarily on tools that exploit many of the common TCP/IP-
based protocols that underlie virtually all Internet applications, including Web technologies, network management, and remote file systems. Some topics will be addressed at a detailed technical level. We'll concentrate on examples drawn from public-domain tools that are widely available and commonly used by crackers.

Topics include:

  • Profiles: what can an intruder determine about your site remotely?
  • Review of profiling methodologies: different "viewpoints" generate different types of profiling information
  • Techniques: scanning, online research, TCP/IP protocol "mis"uses, denial of service, cracking clubs
  • Important intrusion areas: discovery techniques, SSL, SNMP, WWW, DNS
  • Tools: scotty, strobe, netcat, SATAN, SAINT, ISS, mscan, sscan, queso, curl, Nmap, SSLeay/upget
  • Defining management policies to minimize intrusion risk

Topics not covered:

  • Social engineering
  • Buffer overflow exploits
  • Browser (frame) exploits
  • Shell privilege escalation

Brad Johnson (S7, M6) johnson_brad is a vice president of SystemExperts Corporation, a consulting firm that specializes in system security and management. He is a well-known authority in the field of secure distributed systems and has recently served as a technical advisor to both Dateline NBC and CNN on network security matters. He has participated in seminal industry initiatives, including the Open Software Foundation, X/Open, and the IETF, and has often published about open systems.Brad was one of the original members of the OSF DCE Evaluation Team. He has a B.A. in computer science from Rutgers University and an M.S. from Lesley College.

S8 Blueprints for High Availability: Designing Resilient Distributed Systems
Evan Marcus, VERITAS Software Corporation

Who should attend: Beginning and intermediate UNIX system and network administrators, and UNIX developers concerned with building applications that can be deployed and managed in a highly resilient manner. A basic understanding of UNIX system programming, UNIX shell programming, and network environments is required.

This tutorial will explore procedures and techniques for designing, building, and managing predictable, resilient UNIX-based systems in a distributed environment. We will discuss the trade-offs among cost, reliability, and complexity.

Topics include:

  • What is high availability? Who needs it?
  • Defining uptime and cost; "big rules" of system design
  • Disk and data redundancy; RAID and SCSI arrays
  • Host redundancy in HA configs
  • Network dependencies
  • Application system programming concerns
  • Anatomy of failovers: applications, systems, management tools
  • Planning disaster recovery sites and data updates
  • Security implications
  • Upgrade and patch strategies
  • Backup systems: off-site storage, redundancy, and disaster recovery
  • Managing the system: managers, processes, verification

Evan Marcus (S8) marcus_evan is a senior systems engineer and high availability specialist with VERITAS Software Corporation. Evan has more than 12 years of experience in UNIX systems administration. While employed at Fusion Systems and OpenVision Software, Evan worked to bring the first high availability software application for SunOS and Solaris to market. Evan is the author of several articles and talks on the design of high availability systems.



S9 Topics in UNIX and Linux System Administration
Evi Nemeth, University of Colorado; Ned McClain, Consultant; and Trent Hein, Consultant

Who should attend: System and network administrators who are interested in picking up several new technologies in an accelerated manner. The format consists of six topics spread throughout the day.

Logical Volume Management for Linux: Logical volume support for Linux has brought storage flexibility and high availability to the masses. By abstracting physical storage devices, logical volumes let you grow and shrink partitions, efficiently back up databases, and much more. We'll talk about Linux LVM, what you need to get it up and running, and how to take advantage of its many features.

Security Packet Filtering Primer: What does the word "firewall" really mean, and how do you set up a packet filter list to implement a basic one? We'll teach you the dos and don'ts of creating a tough packet filter, and talk specifically about capabilities of packages available for Linux.

What's New in BIND9? BINDv9 includes a long laundry list of features needed for modern architectures, huge zones, machines serving a zillion zones, co-existence with PCs, security, and IPv6--specifically, dynamic update, incremental zone transfers, DNS security via DNSSEC and TSIG, A6, and DNAME records. We'll talk about the gory details of these new features.

Policy and Politics: Many of the policies and procedures followed at a site are carefully filed in the sysadmin's head. With the worldwide Net invading your local site, these secrets need to be written down, run by lawyers, and followed by your sysadmin staff. We will discuss approaches to these tasks, both good and bad, and illustrate with war stories, sample policy agreements, and procedure checklists.

Security Crisis Case Studies: Before your very eyes, we'll dissect a set of security incident case studies using many tools available on your system or from the Net. We'll specifically examine how to avoid common security-incident pitfalls.

Network Server Performance Tuning: Instead of throwing expensive hardware at a performance problem, consider that kernel and application tuning can yield a performance improvement of several hundred percent. We'll focus on Linux kernel and system tuning, but most of what we cover applies to other UNIX platforms as well.

Evi Nemeth (S9), a faculty member in computer science nemeth_evi at the University of Colorado, has managed UNIX systems for the past 20 years, both from the front lines and from the ivory tower. She is co-author of the UNIX System Administration Handbook.




Ned McClain (S9) is a lead engineer at XOR Network mcclain_ned Engineering. He is currently helping with the 3rd edition of the UNIX System Administration Handbook (by Nemeth, Snyder, and Hein). He has a degree in computer science from Cornell University and has done research with both the CS and Engineering Physics departments at Cornell.




Trent R. Hein (S9) is co-author of the best-selling UNIX hein_trent System Administration Handbook, and its Linux-focused counterpart, due in bookstores late this year. He has been teaching tutorials on system administration at USENIX conferences since 1989, and lately spends most of his time pondering security methodology for the corporate environment. Trent is Cisco CCIE-certified and is often known to obsess over system and network performance issues.



S10 SSH Introduction Through Implementation NEW
Steve Acheson, Cisco Systems, Inc.

SSH, the Secure Shell program, has matured into a popular and powerful tool for secure system access and securely performing remote functions such as rdist. This tutorial will help you navigate the many SSH features and related software and will show how to use SSH in a large networked environment.

Topics include:

  • SSH features and authentication methods
  • Overview of the different versions (both public and commercial)
  • How to secure X11 connections using SSH
  • How to do secure port forwarding with SSH
  • Software available for use with SSH (e.g., rdist, rsync)
  • How to impliment SSH in a large networked environment

Steve Acheson (S10) is currently a Computer Security acheson_steve_b&w Analyst at Cisco Systems, Inc. where he is a senior member of the Computer Information Security Department, responsible for network and system security, including designing internal security architecture and external/firewall access. Prior to working for Cisco, Steve managed security for NASA's Numerical Aerospace Simulations facility at Ames Research Center. He has worked in the field as a System Administrator, Network Engineer and Security Analyst for over 10 years.



S11 Perl for System Administration
David Blank-Edelman, Northeastern University College

Who should attend: System administrators with at least advanced-beginner to intermediate experience with Perl who would like a clear understanding of how to use Perl to make their jobs easier.

Perl was originally created to help with system administration, so it is a wonder that there's not more instructional material available. This tutorial aims to remedy this situation by presenting a solid three hours of instruction on using Perl for system administration. You are also likely to deepen your knowledge of Perl.

Based on the instructor's just-published O'Reilly book, this tutorial will take a multi-platform approach to the subject. We'll be exploring cutting-edge and old standby system-administration topics as they manifest themselves on both UNIX and Windows NT/2000 platforms.

Topics include:

  • Secure Perl scripting
  • Files and file systems (including source control, XML, databases, and log files)
  • SQL databases via DBI and ODBC
  • Email as a system administration tool (including spam analysis)
  • Network directory services (including NIS, DNS, LDAP, and ADSI)
  • Network management (including SNMP and WBEM)

David N. Blank-Edelman (S11, S15) is the Director of blank-edelman Technology at the Northeastern University College of Computer Science and the author of the new O'Reilly book Perl for System Administration. He has spent the last 14 years as a system/network administrator in large multi-platform environments including Brandeis University, Cambridge Technology Group, and the MIT Media Laboratory. He has served as Senior Technical Editor for the Perl Journal and has written many magazine articles on world music.


S15 Perl Saves the Day
David N. Blank-Edelman, Northeastern University

Who should attend: People with system administration duties, advanced-beginner to intermediate Perl experience, and a desire to make their jobs easier and less stressful in times of sysadmin crisis.

Perl is an excellent language for rapid development and prototyping. Thanks to the power of the core language and the large body of additional modules, it is often possible to write programs quickly to solve pressing problems. System administrators have no shortage of pressing problems, so knowing how to wield this "swiss-army chain saw" can be a lifesaver.

This tutorial will be centered around a set of "battle stories" and the Perl source code used to deal with them. The code presented in this class will be mostly UNIX-based, though the approaches we'll talk about won't be operating-system-specific. Attendees will leave this class with new ideas for writing small Perl programs to get out of big sysadmin pinches.

David N. Blank-Edelman (S11, S15) is the Director of blank-edelman Technology at the Northeastern University College of Computer Science and the author of the new O'Reilly book Perl for System Administration. He has spent the last 14 years as a system/network administrator in large multi-platform environments including Brandeis University, Cambridge Technology Group, and the MIT Media Laboratory. He has served as Senior Technical Editor for the Perl Journal and has written many magazine articles on world music.



S16 Understanding and Implementing DHCP
Greg Kulosa, Consultant

Who should attend: Anyone with networked TCP/IP clients who wants to distribute network information to those clients automatically. Attendees should have a basic knowledge of TCP/IP and typical network setup. Attendees should also understand procedures for installing and working with their operating system.

DHCP can be used to distribute IP address, router, DNS, WINS, and other information to network clients, without having to manually configure each machine.

Topics include:

  • DHCP protocol in depth
  • Detailed coverage of ISC DHCP server
    • Failover protocol and how to configure
    • Dynamic DNS configuration
    • Classes
    • Conditional behavior (if, then)
    • Allowing or denying specific hosts
    • Allowing or denying by host type or sending specific options to certain host types
  • Relay agents and Relay Agent Information Option
  • Common DHCP clients
  • Debugging tips

Greg Kulosa (S16) has been a Unix Systems Administra kulosa_greg tor for 10+ years. He is currently a Senior consultant, solving a myriad of host and networking problems for a variety of clients. He has rolled out DHCP to networks from 2 to 1500 machines (Windows, Macintosh, Linux, Solaris 2.xclients).




Monday, December 3, 2001    

M1 High Performance Computing with Linux Clustering NEW
John R. Graham, Coastal Carolina University

Who should attend: Programmers and managers involved in the design and implementation of high performance computing solutions for business and scientific applications. Participants should have some programming background (C, C++, FORTRAN) and some understanding of hardware and networking.

Participants will come away from this tutorial knowing how to begin building a low-cost, high performance computing cluster and how to write programs to take advantage of the cluster.

Topics include:

  • Hardware configurations and selection criteria
  • Operating system considerations
  • Parallel programming models
  • Introduction to parallel programming techniques
  • Case studies, programming examples, results

John R. Graham, (M1) is currently on the faculty at graham_john_b&w Coastal Carolina University in Conway, South Carolina. His dissertation "Real-time Scheduling in Distributed, Multi-Agent Systems" was an application of highly threaded and distributed applications used to solve complex science and business problems. He has worked professional for Sun Microsystems, NASA, Texas Instruments and Eastman Kodak and as a consultant to clients world-wide. At the Univesiry he teaches Systems programming, Opearting Systems Design and continues research in development of
parallel applications.

M2 Exploring the Potential of LDAP
Gerald Carter, VA Linux Systems

Who should attend: Administrators and programmers interested in the potential of the Lightweight Directory Access Protocol (LDAP) and in exploring issues related to deploying an LDAP infrastructure. This tutorial is not a how-to for a specific LDAP server, nor is it an LDAP developers' course. Rather, it is an evaluation of the potential of LDAP to allow the consolidation of existing deployed directories. No familiarity with LDAP or other Directory Access Protocols will be assumed.

System administrators today run many directory services, though they may be called by such names as DNS and NIS. LDAP, the up-and-coming successor to the X500 directory, promises to allow administrators to consolidate multiple existing directories into one. Vendors across operating-system platforms are lending support.

Topics include:

  • The basics of LDAP
  • Current technologies employing LDAP services
  • Replacing NIS using LDAP
  • Integrating authentication mechanisms for other services (e.g., Apache, Sendmail, Samba) with LDAP
  • LDAP interoperability with other proprietary directory services, such as Novell's NDS and Microsoft's Active Directory
  • Programming tools and languages available for implementing LDAP support in applications

Gerald Carter (M2) has been a member of the Samba carter_gerald Team since 1998 and is employed by VA Linux Systems. He is currently working with O'Reilly Publishing on a guide to LDAP for system administrators. He holds a master's degree in computer science from Auburn University, where he was also previously employed as a network and systems administrator. Gerald has published articles with various Web-based magazines such as Linuxworld and has authored instructional course for companies such as Linuxcare. He acted as the lead author of Teach Yourself Samba in 24 Hours (Sams Publishing.)



M4 Sendmail Configuration and Operation (Updated for Sendmail 8.12)
Eric Allman, Sendmail, Inc.

Who should attend: System administrators who want to learn more about the sendmail program, particularly details of configuration and operational issues (this tutorial will not cover mail front ends). This intense, fast-paced tutorial is aimed at people who have already been exposed to sendmail. It describes the latest release of sendmail from Berkeley, version 8.12.

Topics include:

  • The basic concepts of configuration: mailers, options, macros, classes, keyed files (databases), and rewriting rules and rulesets
  • Configuring sendmail using the M4 macro package
  • Day-to-day management issues, including alias and forward files, "special" recipients (files, programs, and include files), mailing lists, command line flags, tuning, and security
  • How sendmail interacts with DNS

Eric Allman (M4) is the original author of sendmail. He allman_eric is the author of syslog, tset, the -me troff macros, and trek. He was the chief programmer on the INGRES database management project, designed database user and application interfaces at Britton Lee,and contributed to the Ring Array Processor project at the International Computer Science Institute. He is a former member of the USENIX Board of Directors.




M6 Practical Wireless IP Security and Connectivity: How to Use It Safely
Philip Cox and Brad C. Johnson, SystemExperts Corporation

Who should attend: Users, administrators, managers, and others interested in learning about some of the fundamental security and usage issues around wireless IP services. This tutorial assumes some knowledge of TCP/IP networking and client/server computing, the ability or willingness to use administrative GUIs to set up a device, and a general knowledge of common laptop environments.

Whether you like it or not, wireless services are popping up everywhere. And you and your organization will be responsible for understanding and managing the devices you possess. Since the purpose of wireless is to share data when you aren't directly attached to a wired resource, you need to understand the fundamental security and usage options. In this tutorial we will cover a number of topics that affect you in managing and using wireless services. Some of the topics will be demonstrated live using popular wireless devices.

Topics include:

  • Wireless practicals
    • Transmission networks
    • Mobile data services:
  • 802.11
  • Popular access points
    • Common functionality
    • Cisco Aironet
    • Apple Airport
    • Lucent ORiNOCO
    • Proxim Harmony
  • Configuration issues
  • Threats
    • Technology problems
    • Masquerading and viruses
    • Eavesdropping
  • Practical uses
    • At home
    • At a conference
    • At work
    • At a university
  • Miscellaneous wireless topics

Phil Cox (S1, M6) is a consultant for SystemExperts cox_phil Corporation, a consulting firm that specializes in system security and management. Phil frequently writes and lectures on issues bridging the gap between UNIX and Windows NT. He is a featured columnist in ;login;, the USENIX Association Magazine and has served on numerous USENIX program committees. Phil holds a B.S. in computer science from the College of Charleston, South Carolina.



Brad Johnson (S7, M6) is a vice president of SystemEx johnson_brad perts Corporation, a consulting firm that specializes in system security and management. He is a well-known authority in the field of secure distributed systems and has recently served as a technical advisor to both Dateline NBC and CNN on network security matters. He has participated in seminal industry initiatives, including the Open Software Foundation, X/Open, and the IETF, and has often published about open systems.Brad was one of the original members of the OSF DCE Evaluation Team. He has a B.A. in computer science from Rutgers University and an M.S. from Lesley College.

M7 An Introduction to Computer Security NEW
Avi Rubin, AT&T Labs–Research

Who should attend: Anyone with a computer science degree or the equivalent experience who is not an expert in computer security. IT managers who need to understand how to evaluate risk, what the dangers are, and what countermeasures are available. We will emphasize issues of importance to system administrators.

As more and more of our lives move online, we are exposing more of ourselves to often untraceable, malicious, and automated attack: credit card numbers, data, a group of machines that we manage, our time, our privacy. This tutorial seeks to sweep a broad brush across the field of computer security, addressing in particular the practical aspects of the field.

Topics include:

  • Assessing risk
  • Viruses and worms
  • Cryptography
  • Secure data storage and backup
  • Secure data transfer, including SSL and IPsec
  • Public Key Infrastructure (PKI)
  • Firewalls
  • Intrusion detection
  • Network sniffing and sniff detection
  • Denial-of-service attacks
  • E-commerce and privacy

Attendees should leave with a general understanding of the field and a direction for learning more about each topic covered.

Avi Rubin (M7) is Principal Researcher at AT&T Labs and rubin_avi a member of theboard of directors of USENIX. He has been researching security issues in computer security since 1991. Rubin is the author of two books on computer security: White-Hat Security Arsenal (Addison Wesley, 2001) and Web Security Sourcebook (with Dan Geer and Marcus Ranum, John Wiley &Sons, 1997). He is the author of dozens of refereed conference and journal papers, and co-authored two chapters of Peer-to-Peer (O'Reilly,2001). Rubin is also an Associate Editor of Electronic Commerce Research Journal. His latest research project, Publius, a system forcircumventing censorship on the Internet, won the Index on Censorship's Freedom of Expression Award.

M8 Advanced Topics in DNS Administration NEW
Jim Reid, Nominum

Who should attend: DNS administrators who wish to extend their understanding of how to configure and manage name servers running BIND9. Attendees should have some experience of running a name server and be familiar with DNS jargon for resource records, as well as the syntax of zone files and named.conf.

This tutorial will answer the question, "I've set up master (primary) and slave (secondary) name servers. What else can I do with the name server?"

Topics include:

  • The BIND9 Logging Subsystem
    • Getting the most from the name server's logs
  • Managing the name server with rndc
  • Configuring split DNS: internal and external versions of a domain
    • Using the views mechanism of BIND9 to implement split DNS
  • Setting up an internal root server
  • Securing the name server
    • Running it chroot()ed
    • Using access control lists
    • Preventing unwanted access
  • Dynamic DNS (DDNS)
    • Dynamic updates with nsupdate
  • IPv6
    • Resolving and answering queries with IPv6
    • Setting up A6/DNAME chains and AAAA records to resolve IPv6 addresses
  • The Lightweight Resolver Daemon, lwresd
  • Secure DNS (DNSSEC)
    • Using Transaction Signatures (TSIG)
    • How to sign zones with dnssec-keygen and dnssec-signzone

Jim Reid (M8) started using a PDP11/45 running reid_jim_b&w V7 Unix 21 years ago and has been working with Unix systems ever since. He worked for three years at Origin on behalf of Philips Electronics where he wrote a DNS management system and designed, built and ran the DNS infrastructure for the corporate network, one of the biggest in the world. He has over a decade's experience in writing and teaching training courses ranging from kernel internals to system administration and network security to DNS administration. He's a frequent speaker at conferences and workshops in Europe and the US. His book on DNS Administration with BIND9 will be published in late 2001 or early 2002.


M9 Oracle Backup and Recovery
W. Curtis Preston, Storage Designs

Who should attend: System administrators and DBAs who are responsible for the backup and recovery of one or more Oracle databases. NT engineers and UNIX administrators will both benefit from the Oracle architecture and recovery sections of this tutorial. We'll briefly discuss oraback.sh, a Bourne shell backup script for Oracle.

This tutorial will explain everything administrators need to know to begin backing up and recovering their Oracle 7 or 8 database. We'll cover the basics of Oracle architecture in sysadmin terms, including all of the backup and recovery options for Oracle. We'll look at live demonstrations of both backup and recovery, including the 30 possible steps of an Oracle recovery. If you'd like to perform the backup and recovery demonstrations along with the instructor, email curtis@backupcentral.com for instructions at least one week prior to the class.

Topics include:

  • Oracle architecture
    • The power user's view
    • The DBA's view
  • Physical backups
  • Managing the archived redologs
  • Logical backups
  • Backup demonstrations
  • Recovery demonstrations

W. Curtis Preston (M9, T11, T15) has been specializing preston_curtis_b&w in backup and recovery for over seven years and has designed, implemented, and audited enterprisewide backup and recovery systems for many Fortune 500 and e-commerce companies. His O'Reilly & Associates book, UNIX Backup & Recovery, has sold over 20,000 copies, and he writes a regular column for UnixReview online and SysAdmin magazine. Curtis's Web address is https://www.backupcentral.com, and he can be reached at curtis@backupcentral.com.


M10 Apache 2--What's New? What's Cool? What's Hot? NEW
Jan Säll, Irial Ltd

Who should attend: System administrators and developers who want to learn more about Apache configuration and the changes in Apache 2, and people who want to write Apache modules. Participants should have prior knowledge of the Apache 1.3 server and module APIs.

Apache server version 2 will further increase the portability of Apache server. You will leave this tutorial with all the information you need to configure and test the new Apache.

Topics include:

  • Configuring the new multiprocessing modules (MPMs)
  • Configuring the cgid daemon
  • Using Reliable Piped Logs
  • Programming the new API
  • Using Apache Portable Runtime
  • Writing and configuring the new filtering I/O

Jan Säll (M10, M14) is a leading UNIX consultant saell_jan_b&w operating both in Sweden and internationally. He is currently operating his own company, Irial which provides advanced UNIX and network consultancy. Mr. Saell is currently the chairman of EurOpen.SE, and he has been working in the UNIX environment since 1983.




M11 Introduction to Domain Name System Administration
William LeFebvre, CNN Internet Technologies

Who should attend: System or network administrators who have been exposed to the Domain Name System only as users. A basic understanding of the IP protocols, TCP and UDP, data encapsulation, and the seven-layer model will be beneficial.

DNS, the primary method the Internet uses to name and number machines, is used to translate names like "www.usenix.org" into addresses like 131.106.3.253. Any site that is serious about joining the Internet community will need to understand how to configure and administer DNS.

This tutorial will describe the basic operation of DNS and will provide instructions and guidelines for the configuration and operation of DNS on UNIX platforms using the BIND software distribution. This class is designed for the beginner and is intended to provide a foundation for the tutorial on "Intermediate Topics in Domain Name System Administration."

Topics include:

  • DNS and BIND
  • The DNS Name Hierarchy
  • The four components of DNS
  • Iterative vs. recursive querying
  • Essential resource records: SOA, A, PTR, CNAME, NS
  • Zone transfers and secondaries
  • Vendor-specific differences

William LeFebvre (M11, M15) has been using UNIX lefebvre_bill and Internet technologies since 1983. He has written many articles on UNIX, networking, and systems administration issues. Currently he writes the monthly "Daemons & Dragons" column for UNIX Review. William is the editor of the SAGE series "Short Topics in System Administration." He has taught tutorials since 1989 for such organizations as USENIX, the Sun User Group (SUG), MIS Training Institute, IT Forum, and Great Circle Associates, and he is a certified Cisco Systems Instructor. William is the primary programmer for the popular UNIX utility top and has contributed to several widely used UNIX packages, including Wietse Venema's logdaemon package. He can be reached at wnl@groupsys.com or via https://www.groupsys.com/.

M12 Sendmail and Security NEW
Gregory Neil Shapiro, Sendmail, Inc.

Who should attend: UNIX administrators who are already familiar with configuring and administering sendmail and who want to learn how to convert to sendmail 8.11 or 8.12, or who want to understand sendmail security better, particularly on firewalls and other similar systems.

Sendmail is a powerful Mail Transport Agent that can be configured for many different environments, from firewalls through workstation mail servers. These environments have different security requirements. Sendmail can also be used to secure the e-mail infrastructure at your site using SMTP authentication and TLS authentication and encryption.

Topics include:

  • How to configure sendmail on systems that have special security requirements, such as firewalls
  • Securing e-mail infrastructure using SMTP authentication and TLS authentication and encryption
  • Running sendmail without set-user-ID permissions
  • Running sendmail in a "chroot"ed jail
  • How and when to relax sendmail's file security checks

Gregory Neil Shapiro (M12) began his professional shapiro_gregory_b&w career as a system administrator for Worcester Polytechnic Institute (WPI) after graduating from WPI in 1992. During his tenure as senior UNIX system administrator, he became involved with beta testing the BIND name server, the sendmail mail transfer agent, and other UNIX utilities such as emacs and screen. He contributed the secure zones functionality included in BIND 4.9.X. When presented with the opportunity to join Sendmail, Inc., he packed his bags and headed west. As lead engineer at Sendmail, Inc., he has continued to support the open source version while working on Sendmail Pro and Sendmail Switch, the commercial versions.

M13 Management 101—The Basics
Stephen Johnson and Dusty White, Consultants

Who should attend: Newly promoted technical managers and those who expect promotion in the near future.

You've done well at your technical job and have been asked to take on some management responsibility. What do you need to succeed as a manager?

This class and the accompanying "Management 102" will orient you, introduce you to the skills you will need to be most effective, and suggest ways you can guide your own growth as a manager. (N.B.: The tutorial "Communicating with Everyone" is highly recommended, but not essential.)

Topics include:

  • How to find out what your job really is
  • Developing a new definition of job satisfaction and success
  • Delegation and coaching
  • Developing your people
  • Performance reviews
  • Why being right is not enough
  • Common mistakes technical managers make

Stephen Johnson (M13, M17) has been a Johnson_Steve technical manager on and off for nearly two decades, in both large and small companies. At AT&T, he is best known for writing Yacc, Lint, and the Portable C Compiler. He served as the head of the UNIX Languages Department at AT&T's Summit Labs. He has also been involved in a number of Silicon Valley startup companies. He served for ten years on the USENIX Board of Directors, four of them as president. He presented an invited talk on management at LISA three years ago, he has taught USENIX tutorials on technical subjects, and he has led management training seminars at LISA and the USENIX Annual Conference, as well as at Transmeta.

Dusty White (M13, M17) was an early White_Dusty employee of Adobe, where she served in a variety of managerial positions. She now works as a management consultant in Silicon Valley, where she acts as a trainer, coach, and troubleshooter for technical companies. She has presented tutorials at LISA and the USENIX Annual Technical Conferences.




M14 Cool Apache Modules and Stuff You Can Do with Them NEW
Jan Säll, Irial Ltd

Who should attend: System administrators who wants to know more about how to configure different modules and increase the use, and speed of their Web servers.

This tutorial will cover the Apache module APIs, focusing on how to configure them. We will give an overview of available modules and then examine a number of modules and their configurations in more detail. Attendees should leave this tutorial with good ideas for using Apache modules.

Topics include:

  • Using mod_alias for redirection/rewriting
  • The more complex and capable mod_rewrite
  • Authentifications with e.g., mod_auth_mysql
  • Handling secure connections with mod_ssl
  • Speeding up your CGIs with mod_perl
  • Creating dynamic Web contents with mod_php
  • Creating fast CGI processing with mod_fastcgi

Jan Säll (M10, M14) is a leading UNIX consultant saell_jan_b&w operating both in Sweden and internationally. He is currently operating his own company, Irial which provides advanced UNIX and network consultancy. Mr. Saell is currently the chairman of EurOpen.SE, and he has been working in the UNIX environment since 1983.




M15 Intermediate Topics in Domain Name System Administration
William LeFebvre, CNN Internet Technologies

Who should attend: Network administrators with a basic understanding of DNS and its configuration who need to learn how to create and delegate subdomains, and administrators planning to install BIND8. Attendees are expected either to have prior experience with DNS, including an understanding of basic operation and zone transfers, or to have attended the "Introduction to Domain Name System Administration" tutorial.

Attendees will move beyond the basics into a more thorough understanding of the overall design and implementation of DNS.

Topics include:

  • Subdomains and delegation
  • Resource records: NS, RP, MX, TXT, AAAA
  • Migration to BIND8
  • DNS management tools
  • DNS design
  • DNS and firewalls

William LeFebvre (M11, M15) has been using UNIX lefebvre_bill and Internet technologies since 1983. He has written many articles on UNIX, networking, and systems administration issues. Currently he writes the monthly "Daemons & Dragons" column for UNIX Review. William is the editor of the SAGE series "Short Topics in System Administration." He has taught tutorials since 1989 for such organizations as USENIX, the Sun User Group (SUG), MIS Training Institute, IT Forum, and Great Circle Associates, and he is a certified Cisco Systems Instructor. William is the primary programmer for the popular UNIX utility top and has contributed to several widely used UNIX packages, including Wietse Venema's logdaemon package. He can be reached at wnl@groupsys.com or via https://www.groupsys.com/.

M16 System and Network Monitoring NEW
John Sellens, Certainty Solutions

Who should attend: Network and system administrators interested in real-life, practical, network-based monitoring of their systems and networks. Participants should understand the fundamentals of networking and computing and network components and have some familiarity with UNIX and scripting languages.

This tutorial provides an introduction to system and network monitoring and a review of effective tools and applications that can be used for monitoring. It will introduce the concepts and functions of monitoring systems, describe the Simple Network Management Protocol (SNMP) and SNMP-based tools, and provide introductions to and discussion of some of the most popular monitoring tools. The emphasis will be on the practical, and the tutorial will provide examples of easy-to-implement monitoring techniques.

Topics include:

  • Monitoring: goals, techniques, reporting
  • SNMP: the protocol, reference materials, relevant RFCs
  • Introduction to SNMP MIBs (Management Information Bases)
  • SNMP tools and libraries
  • Security concerns when using SNMP
  • Monitoring applications
  • Special situations: remote locations, firewalls, etc.
  • Monitoring implementation roadmap

Participants should leave the tutorial able to start using a number of monitoring systems and techniques that will improve their ability to manage and maintain their systems and networks.

John Sellens (M16) has been involved in system and sellens_john network administration since 1986 and is the author of several related USENIX papers and a number of ;login: articles, including the "On Reliability"series and SAGE booklet. He has a Master's degree in Computer Science from the University of Waterloo, and is a Chartered Accountant. He is currently the General Manager for CertaintySolutions (formerly known as GNAC) in Toronto. Prior to joining Certainty, John was the Director of Network Engineering at UUNET Canada, and was a staff member in computing and information technology at the University of Waterloo for 11 years.

M17 Management 102--Empowerment
Steve Johnson and Dusty White, Consultants

Who should attend: New technical managers or those who expect to be managers soon. (This is a companion tutorial to "Management 101." The tutorial on "Communicating with Everybody" is also recommended, but not required.)

Many managers report that although their job seemed very powerful before they stepped into it, it doesn't seem that way now. This tutorial offers practical techniques that allow people to empower themselves and others. True empowerment comes from within and can be developed even in a hostile environment. Empowering yourself also helps you empower your employees and your boss.

Topics include:

  • A theory of power and empowerment
  • How to empower yourself, or, better said, to experience how empowered you already are
  • Common disempowering mistakes and how to remain empowered in spite of them
  • Empowerment and trust
  • How to gain and keep agreement
  • Techniques for gaining and increasing trust

Stephen Johnson (M13, M17) has been a Johnson_Steve technical manager on and off for nearly two decades, in both large and small companies. At AT&T, he is best known for writing Yacc, Lint, and the Portable C Compiler. He served as the head of the UNIX Languages Department at AT&T's Summit Labs. He has also been involved in a number of Silicon Valley startup companies. He served for ten years on the USENIX Board of Directors, four of them as president. He presented an invited talk on management at LISA three years ago, he has taught USENIX tutorials on technical subjects, and he has led management training seminars at LISA and the USENIX Annual Conference, as well as at Transmeta.

Dusty White (M13, M17) was an early White_Dusty employee of Adobe, where she served in a variety of managerial positions. She now works as a management consultant in Silicon Valley, where she acts as a trainer, coach, and troubleshooter for technical companies. She has presented tutorials at LISA and the USENIX Annual Technical Conferences.




Tuesday, December 4, 2001    

T1 Building and Using a Personal Beowulf NEW
Willem A. (Vlakkies) Schreuder, CU Boulder

Who should attend: The tutorial is designed for individuals or small groups on a limited budget who need a personal supercomputer. The tutorial differs from most tutorials on Beowulfs in that it is aimed at small installations rather than, for example, national labs. The goal is to provide attendees with practical advice on how to put together the hardware, install the software, and use the system successfully to speed up tasks.

Topics include:

Tutorial materials includes a CD-ROM for the Scyld Beowulf distribution.

Willem A. (Vlakkies) Schreuder (T1) holds a Ph.D. in vlakkies_willem_b&w Computational Fluid Mechanics and is currently working on a second Ph.D. in Parallel Systems. He has been solving practical problems in mathematical modeling in academia and private industry for about 20 years, and has been a UNIX sysadmin for more than 15 years. He uses his personal Beowulf to solve problems in software development, computational fluid dynamics, data analysis,scientific visualization and animation.


T4 PHP: Scripting the Web NEW
Rasmus Lerdorf, Consultant

Who should attend: Web site designers or programmers working on Web-related projects. No programming background is required, but a basic understanding of HTML and HTTP is assumed.

PHP is a popular scripting language used for creating dynamic Web sites. This tutorial, taught by the original developer of the language, will cover all the main features of the language.

Topics include:

  • History
  • Language overview
  • Sessions
  • Error handling
  • Database examples
  • Creating graphics on the fly
  • Creating PDF and Flash on the fly
  • XML/XSLT
  • Caching, content compression, and other tips
  • Content management
  • Extending PHP

Anybody involved with Web development will come out of this tutorial with some new approaches to common problems.

Rasmus Lerdorf (T4) has been designing large-scale lerdorf_rasmus_b&w UNIX-based solutions since 1989.In the Open Source community, he is known mostly as the creator of the PHP scripting language. He has also contributed to a number of other Apache-related projects and is a member of the Apache-core team.




T5 Using Cryptography and Authentication for Mail Transport and Sendmail NEW
Craig Hunt, Consultant

Who should attend: System administrators interested in learning about the cryptographic tools SASL and openssl, which are now bundled in Linux and available for all versions of UNIX. Sendmail administrators interested in learning about the AUTH and STARTTLS extensions to SMTP will also benefit. Attendees need basic system administration skills and knowledge of sendmail configuration to gain the most benefit from this course.

Soon all Linux and UNIX systems will ship with built-in cryptographic capabilities. System administrators need to understand what those tools can and cannot do for them and how to use the tools. This tutorial outlines the current state of cryptographic support in Linux and shows attendees how to make use of the openssl and SASL services. The network protocols that underlie these cryptographic services are described. Attendees will receive practical advice about using strong authentication and encrypted data streams with sendmail. Sendmail is also used as a model to show the strengths and weaknesses of cryptography for security. This tutorial describes in detail how to install, configure, and use openssl, SASL and sendmail to support the AUTH and STARTTLS mail protocol extensions.

Topics include:

  • The SMTP AUTH security option
  • The STARTTLS protocol
  • The SASL and TLS protocols
  • SASL configuration
  • Using openssl to support sendmail
  • Configuring sendmail to use the cryptographic protocols
  • Securing services with stunnel

Craig Hunt (T5) is the author of the bestsellers "TCP/IP hunt_craig_b&w NetworkAdministration" from O'Reilly and "Linux Network Servers 24seven" from Sybex. Craig is also the series editor for the Craig Hunt Linux Libraryfrom Sybex. This library of advanced system administration books includes his new book "Linux Sendmail Administration". He has more than 20 years of computer experience and more than 10 years experience in training computer science professionals. He is a well-known lecturer, who speaks about networking and Linux at USENIX, Networld+Interop, COMDEX, LinuxBusiness Expo, ComNet and the Open Source Software
Convention.

T6 UNIX Security Threats and Solutions NEW
Matt Bishop, University of California, Davis

Who should attend: Anyone interested in threats to UNIX security and how to deal with them.

This tutorial uses case histories to show what vulnerabilities the attackers exploited, how the system administrators might have closed those loopholes, and how the intruders were discovered. Concepts and mechanisms, as well as publicly available tools, are discussed. This course focuses on non-network problems.

Topics include:

  • Security policies vs. security
    mechanisms
  • Password security
  • Files and auditing
  • Access control mechanisms
  • Management of privileges
  • Malicious logic and the UNIX
    system
  • Basic vulnerabilities analysis
  • Baisc incident management
  • Security holes past and current
  • Managing the humans
  • Where to get help

Matt Bishop (T6) began working on problems of com bishop_matt puter security, and the security ofthe UNIX operating system at Purdue where he earned his doctorate in 1984. He has taught courses in computer security, cryptography, operating systems, and software engineering at both Dartmouth College and at the University of California at Davis, where he teaches now. Matt's current research interests are analyzing vulnerabilities in operating systems, protocols, and software in general; denial of service; intrusion detection; and formal models of access control.


T7 Managing Production Linux Servers
Aeleen Frisch, Exponential Consulting

Who should attend: Current Linux system administrators, and administrators from sites considering converting to or adding Linux systems. Attendees who are new to system administration will find the pace quite rapid.

We will focus on the administrative issues that arise when Linux systems are deployed to address a variety of real-world tasks and problems arising from both commercial and R&D contexts.

Topics include:

  • Recent kernel developments
  • Advanced file systems
  • Disk striping and RAID
  • Enterprise and high performance networking options
  • Multiprocessing and clustering
  • Network-based user authentication
  • Automating installation and system configuration
  • Configuring a compute server
  • Web servers and electronic commerce
  • Linux and databases
  • Operating in heterogeneous environments

Aeleen Frisch (T7) has been a system administrator for frisch_aeleen over 15 years. She currently looks after a very heterogeneous network of UNIX and Windows NT systems. She is the author of several books, including Essential Windows NT System
Administration
.




T8 System and Network Performance Tuning
Marc Staveley, Consultant

Who should attend: Novice and advanced UNIX system and network administrators, and UNIX developers concerned about network performance impacts. A basic understanding of UNIX system facilities and network environments is assumed.

We will explore techniques for tuning systems, networks, and application code. Starting from a single-system view, we'll examine how the virtual memory system, the I/O system, and the file system can be measured and optimized. We'll move on to Network File System tuning and performance strategies. Detailed treatment of network performance problems will lead to examples of network capacity planning. Application issues will be covered. Many examples will be given, along with guidelines for capacity planning and customized monitoring based on your workloads and traffic patterns. Analysis periods for particular situations will be provided.

Topics include:

  • Performance tuning strategies
    • Practical goals
    • Monitoring intervals
    • Useful statistics
    • Tools, tools, tools
  • Server tuning
    • Filesystem and disk tuning
    • Memory consumption and swap space
    • System resource monitoring
  • NFS performance tuning
  • Network performance, design, and capacity planning
  • Application tuning

Marc Staveley (T8) recently left Sun Microsystems staveley_mark Enterprise Services to join a start-up, where he is applying his 16 years of experience with UNIX development and administration. Previously Marc was an independent consultant and has held positions at NCR, Princeton University, and the University of Waterloo. He is a frequent speaker on the topics of standards-based development, multi-threaded programming, systems administration, and performance tuning.




T10 Introduction to Python NEW
Wesley Chun, CyberWeb Consulting

Who should attend: Developers and system administrators familiar with at least one high-level language who want to add Python to their toolbox.

Python is interpreted, interactive, and inherently object-oriented, featuring an easy-to-learn syntax that is clear and concise. As a scripting language, Python is often used for many common network and system administration tasks. Python is available for many versions of UNIX (e.g. Solaris, Linux, FreeBSD), Windows 3.x/9x/NT/2000, and Macintosh, as well as less common platforms such as OS/2, PalmPilot, and DOS.

Python is also available in a Java-compiled interpreter called Jython, which will run anywhere a Java Virtual Machine (JVM) is available. Python classes can interact with Java classes and vice versa, making Jython a powerful tool in Java development.

Topics include:

  • Syntax and style
  • Development and run-time environments
  • Objects and the Python memory model
  • Data types and operators
  • Files and I/O
  • Errors and exception handling
  • Functions and functional programming
  • Modules and packages
  • Classes, methods, and class instances

Wesley J. Chun (T10, T14) holds chun_wesleycomputer science, mathematics, and music degrees from the University of California. He is currently a principal at CyberWeb Consulting, specializing in software engineering, Web site design and architecture, corporate training, and technical documentation. He has over a decade of programming and instructional experience, and currently is a coordinator for the Silicon Valley-San Francisco Bay Area Python users group (BayPIGgies), a volunteer moderator for the Python Tutor mailing list, and the author of Core Python Programming, the Python book in Prentice Hall's Core series.

T11 Using SANs and NAS NEW
W. Curtis Preston, Storage Designs

Who should attend: System administrators and system engineers responsible for the design and implementation of storage systems. Attendees should be aware of storage systems concepts; a basic familiarity with SAN and NAS is helpful but not required.

This tutorial will explain the differences and similarities between Storage Area Networks (SAN) and Network Attached Storage (NAS), including an explanation of why NAS is now competing with SAN in certain markets. It will also cover the myriad of backup and recovery options that each brings to the table, and the pros and cons of each of them. It will then offer guidelines on how to decide whether SAN or NAS is right for you.

Topics include:

  • SAN & NAS overview: why and what
  • SAN architecture overview
  • NAS architecture overview
  • Managing SANs
  • Backing up with SANs
  • Managing NAS
  • Backing up NAS

W. Curtis Preston (M9, T11, T15) has been specializing preston_curtis_b&w in backup and recovery for over seven years and has designed, implemented, and audited enterprisewide backup and recovery systems for many Fortune 500 and e-commerce companies. His O'Reilly & Associates book, UNIX Backup & Recovery, has sold over 20,000 copies, and he writes a regular column for UnixReview online and SysAdmin magazine. Curtis's Web address is https://www.backupcentral.com, and he can be reached at curtis@backupcentral.com.


T13 Documentation Techniques for Sysadmins
Mike Ciavarella, Cybersource Pty Ltd

Who should attend: System administrators who need to produce documention for the systems they manage or who want to improve their documentation skills.

Attendees will learn basic techniques for writing effective documentation and improving their documentation practices.

Topics include:

  • Why system administrators need to document
  • The document life cycle
  • Targeting your audience
  • An adaptable document framework
  • Common mistakes
  • Tools to assist the documentation process

Attendees should be able to make immediate, practical use of the techniques presented in this tutorial in their day-to-day tasks. Particular emphasis is placed on documentation as a time-saving tool rather than a workload imposition.

Mike Ciavarella (T13, T16) has been producing and editing technical documentation since he naively agreed to write application manuals for his first employer in the early 1980s. He has been a technical editor for MacMillan Press and has been teaching system administrators about documentation for the past four years. Mike has an Honours Degree in Science from the University of Melbourne in Australia, and is currently a Senior Partner with Cybersource Pty Ltd, where he heads Cybersource's Security Practice. In his spare time, Mike is a caffeine addict and photographer.

T14 Internet Programming with Python NEW
Wesley J. Chun, CyberWeb Consulting

Who should attend: Developers familiar with Python who are interested in exploring client-server socket programming, Web client development, and CGI programming in Python.

This tutorial will introduce current Python programmers to three different areas of network programming. Attendees will leave this tutorial able to "start coding back in their hotel room." An introduction to each topic will be followed by a walk-through of sample code.

Topics include:

  • Network programming with sockets
  • Web client programming
  • CGI programming

Wesley J. Chun (T10, T14) holds chun_wesleycomputer science, mathematics, and music degrees from the University of California. He is currently a principal at CyberWeb Consulting, specializing in software engineering, Web site design and architecture, corporate training, and technical documentation. He has over a decade of programming and instructional experience, and currently is a coordinator for the Silicon Valley-San Francisco Bay Area Python users group (BayPIGgies), a volunteer moderator for the Python Tutor mailing list, and the author of Core Python Programming, the Python book in Prentice Hall's Core series.

T15 Administering Veritas NetBackup NEW
W. Curtis Preston, Storage Designs

Who should attend: System administrators involved in the design, implementation, and administration of Veritas NetBackup. Participants who are not yet using NetBackup should review NetBackup documentation before attending this session.

Anyone who has implemented a medium-to-large installation of any commercial backup software package understands the challenges that such a project will face. This tutorial focuses on the challenges unique to Veritas NetBackup, with heavy emphasis on configuring NetBackup in such a way that it will be easier to automate, easier to monitor and make reports from, takes full advantage of your storage resources, and, above all, ensures that your data is being protected properly. The tutorial will also answer the questions that all NetBackup administrators find themselves asking and will provide scripts to automate NetBackup.

Topics include (with an emphasis on decisions to be made):

  • NetBackup architecture
  • System design
  • Commonly used (and misunderstood) commands
  • System automation
  • frequently asked questions, including:
    • How do I do offsite tape duplication? Is bpvault worth it?
    • Why can't I delete this tape?
    • Can NetBackup tell me when I'm low on volumes, instead of waiting until I'm out?
    • How do I automate the importing, exporting, and labeling of library volumes?
    • How do I back up NAS systems?
    • Is there any way to manage the exclude lists centrally?

After completing this tutorial, participants will be able to answer all of these questions and will have the tools necessary to better automate their NetBackup installation. They will also be aware of common pitfalls and how to avoid them.

W. Curtis Preston (M9, T11, T15) has been specializing preston_curtis_b&w in backup and recovery for over seven years and has designed, implemented, and audited enterprisewide backup and recovery systems for many Fortune 500 and e-commerce companies. His O'Reilly & Associates book, UNIX Backup & Recovery, has sold over 20,000 copies, and he writes a regular column for UnixReview online and SysAdmin magazine. Curtis's Web address is https://www.backupcentral.com, and he can be reached at curtis@backupcentral.com.



T16 Advanced Shell Programming NEW
Mike Ciavarella, Cybersource Pty Ltd

Who should attend: Junior or intermediate system administrators or anyone with a basic knowledge of programming, preferably with some experience in Bourne/Korn shells (or their derivatives).

The humble shell script is still a mainstay of UNIX/Linux system administration, despite the wide availability of other scripting languages.

This tutorial details techniques that move beyond the quick-and-dirty shell script.

Topics include:

  • Common "mistakes" and unsafe practices
  • Modular shell script programming
  • Building blocks: awk, sed, etc.
  • Writing secure shell scripts
  • Performance tuning
  • Choosing the right utilities for the job
  • Addressing portability at the design stage
  • When not to use shell scripts

Mike Ciavarella (T13, T16) has been producing and editing technical documentation since he naively agreed to write application manuals for his first employer in the early 1980s. He has been a technical editor for MacMillan Press and has been teaching system administrators about documentation for the past four years. Mike has an Honours Degree in Science from the University of Melbourne in Australia, and is currently a Senior Partner with Cybersource Pty Ltd, where he heads Cybersource's Security Practice. In his spare time, Mike is a caffeine addict and photographer.

T17 Practical Project Management NEW
Strata Rose Chalup, Project Management Consultant

Who should attend: Sysadmins who want to stay hands-on as team leads or system architects and need a new set of skills with which to tackle bigger, more complex challenges. No previous experience with project management is required. Participants will get a no-nonsense grounding in methods that work without adding significantly to one's workload. People who have been through traditional multi-day project management courses will be shocked, yet refreshed, by the practicality of our approach. To get the most out of this tutorial, participants should have some real-world project or complex task in mind for the lab sections.

This tutorial focuses on complementing your own organizational style (or lack thereof) with a toolbox of ways to organize and manage complex tasks without drowning in paperwork or clumsy, meeting-intensive methodologies. Also emphasized is how to bridge the gap between ad-hoc methods and the kinds of tracking and reporting that traditionally trained managers will understand.

Topics include:

  • Quick basics of project management
  • Skill sets
    • Defining success
    • Chunking and milestoning
    • Delegating
    • Tracking
    • Reporting
  • Problem areas
  • Project mangement tools
    • What tools should do for you
    • UNIX commands and scripts for 90+%
    • Freeware PM tool options
    • The only 15 minutes of MS Project you'll ever need
  • Real-world lab
    • Applying skillsets to a sample project
    • Generating skeleton documents and notes as we go along
    • Project Fixit Q&A

Strata Rose Chalup (T17) began as a fledgling sysad Chalup_Strata_Rose min in 1983, and has been leading and managing complex IT projects for many years, serving in roles ranging from Project Manager to Director of Network Operations. She has authored several articles on management and working with teams, and specializes in multi-vendor infrastructure rollouts. Another MIT dropout, Strata is founder and CEO of VirtualNet Consulting, and applies her management skills on various volunteer boards, including BayLISA and SAGE.



?Need help? Use our Contacts page.
Last changed: 21 November 2001 ml
LISA 2001 index
Events calendar
USENIX home