By Day (Sunday,
Monday, Tuesday) |
By Instructor | All in One File
Eric Allman (S2, T10)
Eric Allman wrote sendmail, leads
sendmail.org, and is CTO of Sendmail, Inc. Eric was the lead programmer for the
INGRES database management and the Mammoth infrastructure projects and authored
syslog, tset, the -me troff macros, and trek, developed a commercial
client/server implementation, helped develop a first-generation window system,
and contributed to the Ring Array Processor Project. He has been a member of the
Board of Directors of the USENIX Association. Eric received his M.S. in Computer
Science from U.C. Berkeley. He collects wines, which he stashes in the cellar of
the house he shares with Kirk McKusick, his partner of 20-and-some-odd years.
||Bryan C. Andregg (M3, T6)
is the Director of Networks
at Red Hat Inc. He has been with the company for three years and in that time
has moved from being the only systems administrator through almost every job in
IS. Bryan's next round of business cards will give his job title as
Tina Bird (M10)
is a senior security analyst at Counter
pane Internet Security. She has implemented and managed a variety of
wide-area-network security technologies and has developed, implemented, and
enforced corporate IS security policies. She is the moderator of the VPN mailing
list and the owner of "VPN Resources on the World Wide Web," a vendor-neutral
source of information about VPN technology. Tina has a B.S. in physics from
Notre Dame and an M.S. and Ph.D. in astrophysics from the University of
||Matt Bishop (S1)
began working on problems of secu
rity inUNIX systems at Purdue, where he earned his doctorate. He subsequently
worked at the Research Institute for Advanced Computer Science at NASA and
taught courses in operating systems, computer security, and software engineering
at Dartmouth College. Matt chaired the first USENIX Security Workshop and has
been on the faculty at UC Davis since 1993.
|Gerald Carter (M4, T4)
has been a member of the
SAMBA Team since 1998 andhas been maintaining SAMBA servers for the past four
years. As a network manager at Auburn University, Gerald maintains approximately
700 PCs and 30 Solaris 2.x servers. He is the lead author of Teach
Yourself SAMBA in 24 Hours (Sams Publishing) and has worked as an instructor
or technical reviewer for major publishers.
||Tom Christiansen (S4, M8)
has been involved with Perl
since day zero of its initial public release in 1987. Lead author of The Perl
Cookbook, co-author of Programming Perl, Learning Perl, and
Learning Perl on Win32 Systems, Tom is also the major caretaker of Perl's
online documentation. He holds undergraduate degrees in computer science and
Spanish and a Master's in computer science. He now lives in Boulder, Colorado.
Phil Cox (M4, T5)
is a consultant for SystemExperts Corporation. Phil
frequently writes and lectures on issues bridging the gap between UNIX and
Windows NT. He is a featured columnist in ;login;, the magazine of USENIX
& SAGE, and has served on numerous USENIX program committees. Phil holds a
in computer science from the College of Charleston, South Carolina.
||Tina Darmohray (T5)
is a network and security consultant with over a
decade of experience in administration and programming UNIX/TCP-based computers.
She specializes in firewalls, Internet connections, sendmail/DNS configurations,
and defensive intrusion management. Previously Tina was the lead for the UNIX
support team at Lawrence Livermore National Laboratory. Tina was a founding
board member of SAGE, the System Administrators Guild. She is the author of the
popular SAGE jobs booklet Job Descriptions for System Administrators,
she's co-editor of ;login:, the magazine of USENIX & SAGE, and she
co-chaired the USENIX LISA IX conference. Tina holds a B.S. and an M.S. from the
University of California, Berkeley.
|Barb Dijker (M6) is currently the owner of and lead everything at NeTrack, a
Colorado ISP. She's also the Executive Director of the Colorado Internet
Cooperative Association and the president of SAGE. Barb has been a system
administrator for 12 years.
||Mark-Jason Dominus (T7)
has been using Perl for Web application
development and site management since 1994, for large organizations such as
Estee Lauder, the University of Pennsylvania, and Time-Warner. He is a regular
contributor to the Perl Journal and is the managing editor of
|Aeleen Frisch (M7)
has been a system administrator for
over 15 years. She currently looks after a very heterogeneous network of UNIX
and Windows NT systems. She is the author of several books, including
Essential Windows NT System Administration.
||Peter Baer Galvin (S7,
is the chief technologist for
Corporate Technologies, a systems integrator and VAR. Previously, he was the
systems manager for Brown University's Computer Science Department. He has
written articles for Byte and other magazines and is a regular columnist
for SunWorld. He is co-author of the Operating Systems Concepts
and the Applied Operating Systems Concepts textbooks. As a consultant and
trainer, Peter has taught tutorials on security and system administration and
has given talks at many conferences.
|Daniel E. Geer, Jr. (M9),
is CTO of @Stake. Dr. Geer
has a long history in network security and distributed computing management as
an entrepreneur, consultant, teacher, and architect. He holds a B.S. in
electrical engineering and computer science from MIT, and an Sc.D. in
biostatistics from Harvard University. In USENIX he has participated in
virtually every activity, including serving as technical program chair for the
San Diego, California, 1993 Winter Technical Conference, as well as conference
chair for both the First Symposium on Mobile and Location Independent Computing
and the First USENIX Workshop on Electronic Commerce. He was elected to the
Board of Directors in June 1994 and began an elected two-year term as
vice-president in June 1996. He is the co-author of Wiley's Web Security
Sourcebook (June 1997).
||Jamie Hanrahan (S5)
provides Windows NT driver
development, consulting, and training services to leading companies. He is
co-writing a book on Windows NT device drivers (O'Reilly and Associates). He
also has an extensive background in VMS device drivers and internals. He is
co-author of VMS Advanced Driver Techniques, and he received Digital's
Instructor of the Year award for his courses in VMS device drivers and
|Brad Johnson (T9)
is Vice President of Consulting of SystemExperts Corporation.
He has participated in seminal industry initiatives like the Open Software
Foundation, X/Open, and the IETF, and has published often about open
systems. Brad has served as a technical advisor to organizations such as
Dateline NBC and CNN on security matters.
Prior to joining SystemExperts, Brad was one of the original members of the
DCE Evaluation Team, the group that identified, evaluated and selected
technology to become the industry's first true interoperable middleware.
Brad was also the engineering project manager to complete the integration of
those technologies and the project leader for the first three major
releases. Prior to OSF, Brad was a principal software engineer/project
leader for Digital Equipment Corporation, a technical staff member at Data
General Corporation and before that, a technical staff member at Bell
Brad holds a Bachelor of Arts degree in Computer Science from Rutgers
University and a Master of Science degree in Applied Management from Lesley
|Steve Johnson (T8)
has been a technical manager for
nearly two decades, in both large and small companies. At AT&T, he is best
known for writing Yacc, Lint, and the Portable C Compiler. He served as the head
of the UNIX Languages Department at AT&T's Summit Labs and has been involved
in a number of Silicon Valley startup companies. He served for ten years on the
USENIX Board of Directors, four of them as president. He presented an invited
talk on management at LISA '97, he has taught USENIX tutorials on technical
subjects, and he has led management training seminars at Transmeta.
|George Kurtz (S6)
has performed hundreds of firewall,
network, and e-commercerelated security assessments throughout his
security consulting career. He is a regular speaker at many security conferences
and is frequently quoted in The Wall Street Journal, InfoWorld,
USA Today, and the Associated Press. He is the co-author of the widely
acclaimed Hacking Exposed: Network Security Secrets and Solutions.
||Evan Marcus (T1)
is a senior systems engineer and high
availability specialist with VERITAS Software Corporation. Evan has more than 12
years of experience in UNIX systems administration. While employed at Fusion
Systems and OpenVision Software, Evan worked to bring the first high
availability software application for SunOS and Solaris to market. Evan is the
author of several articles and talks on the design of high availability systems.
|James Mauro (T2)
is an enterprise IT architect for Sun Microsystems,
focusing on multi-tier and distributed application platforms, with an eye to
availability and scalable growth. He works extensively with Solaris application
development, performance tuning, capacity planning, and general systems behavior
analysis. Jim, who has 20 years of UNIX industry experience, writes a monthly
column on Solaris internals for SunWorld and is co-author of Solaris
Internals: Architecture Tips and Techniques (Sun Microsystems Press/Prentice
||Richard McDougall (T2),
an established engineer in
the Performance Application Engineering Group at Sun Microsystems, focuses on
large systems performance and architecture. He has over 12 years of experience
in UNIX performance tuning, application/kernel development, and capacity
planning. Richard is the author of many papers and tools for measurement,
monitoring, tracing and sizing UNIX systems, including the memory-sizing
methodology for Sun, the MemTool set for Solaris, the recent Priority Paging
memory algorithms in Solaris, and many unbundled tools for Solaris, and is
co-author of Solaris Internals: Architecture Tips and Techniques (Sun
Microsystems Press/Prentice Hall, forthcoming).
|Evi Nemeth (M6)
is a faculty member in computer science at the University of Colorado and has managed UNIX systems for the past 20
years, both from the front lines and from the ivory tower. She is co-author of
the UNIX System Administration Handbook.
||Ian Poynter (M5)
is president of Jerboa Inc., a strategic
Internet security consultancy he founded in 1994. He has over 14 years in the
technology industry, focusing on networking and human/computer interfaces. He
has delivered firewall and Internet security training to key IS personnel and
has appeared as an expert speaker at professional meetings and industry
conferences. Mr. Poynter holds a B.Sc. First Class in computer science from
University College, London.
|Marcus J. Ranum (M1)
is CEO and founder of Network
Flight Recorder, Inc. He is the principal author of several major Internet
firewall products, including the DEC SEAL, the TIS Gauntlet, and the TIS
Internet Firewall Toolkit. Marcus has been managing UNIX systems and network
security for over 13 years, including configuring and managing whitehouse.gov.
Marcus is a frequent lecturer and conference speaker.
||Jon Rochlis (M9)
is the President of The Rochlis Group, Inc., providing systems and services in various high-technology areas of network security and electronic commerce. Previously Mr. Rochlis was a consultant with SystemExperts and an engineering manager with BBN Planet, OpenVision, and MIT.
|Greg Rose (M4)
graduated from the University of New
South Wales with a B.Sc. (honours) in computer science and was awarded the
University Medal in 1977. A member of the Board of Directors of the USENIX
Association, he served as program chair of the 1996 USENIX Security Symposium.
As Principal Engineer at QUALCOMM, he focuses on cryptographic security and
authentication for wireless communications, and on setting up the office of
QUALCOMM Australia. He has written a number of public tools using cryptography,
and he holds generic cryptographic export licenses for two countries.
||Char Sample (M5),
a senior systems engineer at L-3
Network Security, has over fourteen years of experience in the industry. One of
the original five engineers on the Gauntlet project at Trusted Information
Systems, Char has installed and integrated over 200 firewalls and has experience
deploying e-commerce solutions. She has developed and delivered training for a
number of organizations and has been an invited speaker for various industry
|Eric Schultze (S6)
specializes in assessing and securing
Microsoft products. He is a contributing author to Hacking Exposed: Network
Security Secrets and Solutions and is a frequent speaker at security
conferences, including Black Hat, CSI, and MIS. Eric is also a faculty
instructor for CSI's education resource center, presenting workshops on NT4 and
Windows 2000 security.
||Gregory Neil Shapiro (T10)
began his professional
career as a systems administrator for Worcester Polytechnic Institute (WPI).
There he became involved with beta-testing the BIND name-server, the sendmail
mail-transfer agent, and other UNIX utilities such as emacs and screen. He
contributed the secure zones functionality included in BIND 4.9.X. His
involvement with sendmail grew into assisting in supporting sendmail by joining
the Sendmail Consortium and later increased to include code maintenance and
release assistance. As Lead Engineer at Sendmail, Inc., he has continued to
support the open source version while working on Sendmail Pro, the commercial
|Marc Staveley (S3)
recently took a position with Sun
Microsystems Enterprise Services, where he is applying his 16 years of
experience with UNIX development and administration in helping to create new
service programs. Previously Marc was an independent consultant, and he has held
positions at NCR, Princeton University, and the University of Waterloo. He is a
frequent speaker on the topics of standards-based development, multi-threaded
programming, systems administration, and performance tuning.
||Theodore Ts'o (T3)
has been a Linux kernel developer
since almost the very beginnings of Linux--he implemented POSIX job control in
the 0.10 Linux kernel. He is the maintainer and author for the Linux COM serial
port driver and the Comtrol Rocketport driver. He architected and implemented
Linux's tty layer. Outside of the kernel, he is the maintainer of the e2fsck
filesystem consistency checker. Ted is currently employed by VA Linux Systems.
|Stephen C. Tweedie (T3)
works on Linux kernel inter
nals and high availability for Red Hat, Inc. Before that, he worked on VMS
filesystem internals for Digital's Operating Systems Software Group. He has been
contributing to Linux for a number of years, in particular designing some of the
high-performance algorithms central to the ext2fs file system and the virtual
||Dusty White (T8)
was an early employee of Adobe,
where she served in a variety of managerial positions. She now works as a
management consultant in Silicon Valley, where she acts as a trainer, coach, and
troubleshooter for technical companies.