Tech Insider					     Technology and Trends

			      USENET Archives

From: (Toni Veglia)
Subject: USENIX 1996 Technical Conference Program & Registration Info
Date: 1995/11/06
Message-ID: <47kfet$>
X-Deja-AN: 118716471
distribution: world
approved: (Juergen Wagner)
sender: (Juergen Wagner)
organization: USENIX Association, Berkeley, CA
newsgroups: news.announce.conferences

This announcement is also available through the Conference Announcement
Archive on the WorldWideWeb, providing indexes and search functions by
subject, keywords, or date. You may also submit announcements through
on-line forms. The Conference Announcement Archive is located at

January 22-26, 1996, San Diego, CA

If you work with UNIX and advanced computing systems and want
to learn about the latest technology and practical techniques
you can implement immediately, plan to attend the 1996 USENIX 
Technical Conference.  Technology advances at a breakneck pace,
and USENIX's goal is to bring you the information you need 
to keep up, all in one place.

Pre-Registration Savings Deadline:   Friday, December 15, 1995
Hotel Discount Reservation Deadline:  Wednesday, January 3, 1996
This posting contains:
   Tutorial & Technical Session Descriptions
   Conference Schedule 
   Conference Organizers
   Hotel and General Conference Information
   Registration Form

  Advanced UNIX Security: Threats and Solutions
  IP version 6: An Introduction  (New)
  Creating a Web Site with HTML and CGI  (New)
  UNIX Kernel Internals: Data Structures and Algorithms
  An Introduction to Tcl and Tk
  Kerberos Approach to Network Security  (Updated)
  Sendmail Inside and Out - Version 8  (Updated)
  An Introduction to System Performance	Tuning  (New)
  Windows 95 and Windows NT for UNIX Programmers  (New)
  Topics in System Administration 
  The Law and Individual Rights on the Internet  (New)

  UNIX Security Tools: Use and 	Comparison  (New)
  Joining the Internet Safely Using UNIX and Firewalls
  UNIX Network Programming
  What's New in Networking  (New)
  BSD Network Internals: Data Structures and Algorithms  (New)
  Advanced Tcl/Tk  (New)
  Java  (New)
  Beginning Perl Programming for UNIX Programmers (Updated)
  Linux Inside and Out  (New)
  IP Network Administration


MONDAY, JANUARY 22 - 9:00am-5:00pm

M1:  Advanced UNIX Security: Threats and Solutions  
Matt Bishop, University of California, Davis

Intended audience: System administrators, system programmers, and
users, especially those interested in the underpinnings of UNIX
system security; those needing to write programs which change
privileges of their users; those worried about computer worms,
viruses, and other nasties and who want to learn how to limit
their damage; and those interested in more than a simple cookbook
list of ways to protect a UNIX system.

Prerequisites: an understanding of the basic protection mechanisms
of UNIX systems (real and effective UIDs and GIDs, file protection
modes, etc.)

Topics include:
*  UNIX and passwords: how passwords are stored, details of
   the hashing (password encryption) algorithm, password cracking,
   password management; schemes for selecting and/or assigning
   passwords. This section involves a somewhat technical
   discussion of the cryptographic techniques used in the UNIX
   password hashing function.

*  How to manage privileges: managing a super-user account;
   managing less powerful system management accounts; managing
   system resources.

*  Writing setuid programs: when not to use them; when to use
   them; approaches, alternatives, common pitfalls, considerations,
   some details about which library functions and system calls are
   safe to use, and which have dangerous effects or side effects. A
   setuid program designed to give temporary privileges will be

*  Trojan horses, computer worms, and other malicious logic:
   how malicious logic works, how UNIX security mechanisms
   interact with it;  ways to protect yourself and your system;
   some famous incidents (Internet worm of 1988, etc.) and what
   lessons they teach.

*  UNIX and network security: overview of Kerberos,
   Privacy-Enhanced electronic mail, and Secure RPC (including a
   technical discussion of the role of cryptography, and how the
   ciphers work) NFS and NIS (formerly YP); how to forge and
   intercept network traffic; network-based daemons; well-known
   security holes and why they arise; the many lives of UUCP.

*  X11 Window System security: how to set it up, and its
   limits and benefits.

*  Some of the better-known and pernicious security holes and
   how to plug them or detect their use.

*  Suggestions for detecting intrusions, what to look for,
   and what to do; planning for an attack; resources.

Matt Bishop received his PhD from Purdue University where he
specialized in computer security. Besides computer and network
security, his research and teaching areas include operating
systems and software engineering. He chaired the first two UNIX
Security Workshops, and his column on computer security appears
regularly in the Best Practises newsletter.

M2:  IP Version 6: An Introduction  (New)
W. Richard Stevens, Consultant

Intended audience: Network programmers and system administrators
who will be converting applications and networks from IPv4 to
IPv6, and implementors of IPv6.

The current underlying protocol used by TCP/IP applications and
the Internet is called "IP version 4" (IPv4). It was implemented
in the early 1980s. Over the past few years proposals have been
made to replace IPv4 with a new version, mainly to overcome the
addressing limitations of IPv4. In July 1994 the successor was
chosen and named IPv6. Since that time, numerous working groups
have been busy completing the specifications for all facets of
IPv6 and implementations are starting to appear. It is expected
that vendor-supplied implementations of IPv6 will appear in the
coming years and there will be a gradual transition of the
Internet from IPv4 to IPv6.

This course is an overview of all aspects of IPv6. It assumes a
basic understanding of TCP/IP in general. But unlike other
tutorials on this topic, this course is not just a description of
how the protocols operate and what all the fields in the protocol
headers mean. Instead, this course approaches IPv6 from the
perspectives of a programmer who needs to convert applications
from IPv4 to IPv6 and a system administrator who needs to
transition a network from pure-IPv4 hosts and routers to a mixture
of IPv4 and IPv6 nodes.

Topics include: 
*  DNS support 
*  new socket address structure
*  address conversion
*  functions, transition mechanisms
*  automatic tunneling
*  header fields
*  extension headers
*  source routing
*  path MTU discovery
*  upper-layer issues
*  ICMPv6
*  multicasting
*  neighbor discovery
*  anycasting
*  mobility

W. Richard Stevens is the author of "UNIX Network Programming",
"Advanced Programming in the UNIX Environment", "TCP/IP Illustrated,
Volume 1: The Protocols", and co-author of "TCP/IP Illustrated, 
Volume 2: The Implementation." He received his PhD in image 
processing from the University of Arizona.

M3:  Creating a Web Site with HTML and CGI  (New)
Dave Taylor, Intuitive Systems

Intended audience: Programmers and other users who want to learn
how to design and implement hypertext markup language (HTML)
documents for the World Wide Web.  Participants should be familiar
with editing, text markup, and the World Wide Web, but needn't
have previously been exposed to HTML.

This course starts with the basics of the Web and hypertext markup
language, and teaches participants how to create useful and
interesting documents for the World Wide Web. Topics will

*  Basic document layout, including text and paragraph formats
*  Numbered, ordered, and definition lists
*  Internal and external anchors
*  Adding and placing graphics
*  Netscape, HTML3.0 and the next wave of HTML
*  Tables 
*  ISMAPs and page counters
*  Common Gateway Interface (CGI) scripts and dynamic pages.
*  How to promote your Web page

After the course, participants will be able to produce creative
and interesting Web pages including graphics, multiple typefaces,
pointers to any other type of information or document on the
Internet; build and process forms; create sophisticated image
maps, and much more.

Dave Taylor is author of "Creating Cool Web Pages with HTML",
"Teach Yourself UNIX In A Week", and "Global Software" and
co-author of "The Internet Business Guide." He is the proprietor
of The Internet Mall, a popular spot on the World Wide Web with
over 3500 stores.  Dave is also the original author of the Elm
Mail System.  He has a Masters in Educational Computing and a
Bachelors in Computer Science.

M4:  An Introduction to UNIX Kernel Internals: Data Structures and
Dr. Marshall Kirk McKusick, Consultant and Author

Intended audience: Users with at least a year's experience using
the UNIX system and the C programming language. Attendees should
have an understanding of fundamental algorithms (searching,
sorting, and hashing) and data structures (lists, queues, and
arrays). A source-code license is not required, as only unlicensed
source code will be presented.

A broad overview of how the UNIX kernel provides its basic
services, this course will be most useful to those who need to
learn how these services are provided.  Individuals involved in
technical and sales support can learn the capabilities and
limitations of the system; applications developers can learn how
to effectively and efficiently interface to the system; systems
programmers without direct experience with the UNIX kernel can
learn how to maintain, tune, and interface to such systems.

This course will provide a firm background in all the UNIX kernel
services except for networking. Those interested in networking
should take the companion course, T5  "BSD Network Internals,"
offered on Tuesday. The course includes coverage of most
BSD-derived kernels including USL's System V Release 4, Sun's
Solaris, and DEC's OSF/1. The POSIX kernel interfaces will be used
as examples where they are defined. Where they are not defined,
the BSD interfaces will be described and then related to other
vendors' interfaces.

Topics covered will include basic kernel services, process
structure, virtual and physical memory management, scheduling,
signals, paging and swapping. The kernel I/O structure will be
described, showing how I/O is multiplexed, special devices are
handled, character processing is done, and the buffer pool is
managed. The implementation of the filesystem and its capabilities
will be described. The filesystem interface will be generalized to
show how to support multiple filesystem types such as Sun
Microsystem's Network File System (NFS).

The presentation will emphasize code organization, data structure
navigation, and algorithms. It will not cover the machine-specific
parts of the system such as device drivers.

Kirk McKusick has a PhD in programming languages from the
University of California. At Berkeley he implemented the 4.2BSD
fast file system, and was the Research Computer Scientist at the
Berkeley Computer Systems Research Group, overseeing the
development and release of 4.3BSD and 4.4BSD. He is currently
writing a book on 4.4BSD and doing consulting on UNIX-related
subjects. He is a past president of the USENIX Association, and a
member of the editorial board of "UNIX Review."

M5:  An Introduction To Tcl and Tk
John Ousterhout, Sun Microsystems

Intended audience: Attendees who want to learn how to write
scripts for existing applications built with Tcl and Tk, or who
would like to build new graphical-user-interface applications
based on Tcl and Tk. Prior experience with Tcl and Tk is not
necessary, nor is detailed knowledge of any existing X toolkit.
Attendees should be familiar with the C programming language and
should have some basic knowledge about the X Window System.

Creating good graphical user interfaces for the X Window System is
notoriously hard. With traditional tools, you have to read
thousands of pages of documentation and write thousands of lines
of code to build even the simplest application. Tcl (a shell-like
scripting language) and Tk (an X11 toolkit and Motif-like widget
set based on Tcl) offer an alternative approach. With Tcl and Tk,
you program GUI applications in a high-level scripting language
with a much simpler model of the X world. As a result,
applications can be built with less learning time and an order of
magnitude less code than with other toolkits. The Tcl language is
interpretive so you can also program and extend applications at
run-time. Different applications can issue Tcl commands to each
other in order to work together in interesting ways. This gives
Tcl and Tk greater power and flexibility than other toolkits.
Lastly, you can extend the facilities of Tcl and Tk by writing C
code where it is needed, so there is no loss of functionality or

The course provides a complete top-to-bottom introduction to Tcl
and Tk. The course contains numerous examples of scripts and C
programs to illustrate the capabilities of the system.

Topics covered include:
*  Overview of benefits Tcl and Tk
*  Tcl scripting language
   -  syntax
   -  commonly used commands
*  How to program the Tk toolkit using Tcl scripts
   -  widgets
   -  geometry managers
   -  event bindings
*  How to write C code that interfaces to Tcl
   -  how to build new Tcl commands with C procedures

John Ousterhout is the author of both Tcl and Tk and a
Distinguished Engineer at Sun Microsystems, Inc. He is an ACM
Fellow and has received numerous awards, including the ACM Grace
Murray Hopper Award, the National Science Foundation Presidential
Young Investigator Award, and the U.C. Berkeley Distinguished
Teaching Award. Ousterhout received a PhD in Computer Science from
Carnegie Mellon University.

M6:  The Kerberos Approach to Network Security  (Updated)
Daniel Geer, Open Market, Inc. 
Jon A. Rochlis, BBN Planet

Intended audience: 

*  Systems administrators who are concerned about or must mitigate
the inherent lack of security and accountability in conventional
UNIX network services environments

*  Systems developers responsible for applications for networked
workstation environments, particularly those whose environments
include networks which are not themselves physically secure (i.e.
"open networks")

*  Technical managers in enterprises where the flow of electronic
information is the core of that enterprise and must be protected
without imposing the costs of a "security culture"

This course will focus on the practical challenges of providing
security for the cooperative electronic workplace, workplaces that
aspire to location and scale independence in the client-server
idiom or which need to provide the kind of security services that
enable external access to enterprise data.

We will briefly describe fundamental network security so that you
will understand the kinds of threats which result from operating
conventional systems in an open environment, i.e., you will know
what is within the realm of the possible for any communications
security system.

We then describe what effective approaches can exist to meeting
these threats, emphasizing the practical. We will show you where
common fallacies are, such as the idea that your organization's
security is materially dependent on close control of external
access (rather than competent internal security mechanisms).

We will discuss the Kerberos network security system, as a
case-in-point to what has been so far taught. We will also touch
on public-key techniques, the X.509 authentication model, the
Internet's Privacy Enhanced Mail (PEM), Pretty Good Privacy (PGP),
and the difference between a firewall, a proxy server, and blind

Kerberos is the only serious contender for a general purpose
secret-key security system. Kerberos is the soul of the Open
Software Foundation's Distributed Computing Environment (OSF/DCE),
which we will describe by way of its differences to stock
Kerberos. We will thoroughly discuss the extensions and
enhancements to Kerberos that made it into the open-systems
standard for network security. We will also discuss briefly the
range of commercial providers for Kerberos.

Above all, we will stress the nuts-and-bolts of making this work
in your environment, including administration and integration of
this technology with your existing environments. By the end of the
day, you will be able to go home and start work on a computing
environment that is both open and accountable, and be able to
explain all this to your colleagues.

Dan Geer, head of engineering for special projects at Open Market,
Inc., has been a successful entrepreneur in network security and
distributed systems management. He was manager of systems
development for MIT's Project Athena overseeing all technical
development. He holds a SB in Electrical Engineering and Computer
Science from MIT, and a Doctor of Science in Biostatistics from
Harvard University. He is a frequent speaker, popular teacher and
member of several professional societies.

Jon Rochlis is an engineer manager for BBN Planet and responsible
for development of managed security services. Previously he was an
engineering director at OpenVision Technologies. He ran the
development group of MIT's Distributed Computing and Network
Services (DCNS), which was chartered with extending Project
Athena's successes to broader user communities within MIT. He has
a SB degree from MIT.

M7:  Sendmail Inside and Out  (Updated for Sendmail 8.7) 
Eric Allman, Pangaea Reference Systems

Intended audience: Systems administrators who want to learn more
about the Sendmail program, particularly details of the
configuration file; programmers implementing new mail front ends
who want to know exactly what Sendmail can do for them; curious
people who want to know what Sendmail is all about. This course
will not cover mail front ends. It will be an intense, fast-paced,
full-day course for people who have already been exposed to

Sendmail is arguably the most successful UNIX-based mail transfer
agent in the world today. Originally distributed with the Berkeley
Software Distribution, Sendmail is now used by most UNIX vendors,
but it has a reputation for being difficult to configure and

After introducing a bit of the philosophy and history underlying
Sendmail, this course covers:

*  The syntactic elements of the configuration file: mailers,
   options, macros, classes, headers, precedences and priorities,
   trusted users, key file definitions, and rewriting rules and
*  The flow and semantics of rulesets, including hints about
*  An introduction to SMTP and how Sendmail operates in an SMTP
*  Day-to-day management issues, including alias and forward
   files, "special" recipients (files, programs, and include files),
   mailing lists, command line flags, tuning, and security
*  How Sendmail interacts with the Domain Name System
*  How to use the M4 configuration package included with Sendmail 8

This course uses the latest release of Sendmail from Berkeley,
version 8.7, for examples (version 8.7 or variants thereon is
currently being shipped or will be shipped shortly by BSDI,
Convex, Hewlett-Packard, Sequent, Silicon Graphics, and Sun).
Version 8 includes many of the popular features of IDA Sendmail.
Other versions of Sendmail will be discussed briefly.

Eric Allman is the original author of Sendmail, as well as several
other perennial favorites including syslog, tset, the -me macros,
and  trek, and was a major contributor to INGRES. He received his
MS in Computer Science from UC Berkeley in 1980. He is currently
the Chief Technical Officer at Pangaea Reference Systems.

M8:  An Introduction to System Performance Tuning  (New)
Marcus J. Ranum, Information Warehouse! Inc.

Intended audience: System managers interested in understanding
performance factors.

This course introduces the main factors that affect how UNIX
systems perform, how to diagnose and improve bottlenecks, and how
to apply scientific method to system analysis. Case studies and
theory will be interspersed with descriptions of available
performance monitoring tools and how to use them. 

Topics covered include:

-  Welcome to the land of tradeoffs
-  Why do I have a 200MIP boat-anchor?

"Internals Lite"
-  Hardware
-  The file system(s)
-  Virtual memory
-  Scheduling
-  Networking
-  Microkernels/macrokernels/marketkernels

-  Know and love the process table
-  When is a system CPU bottlenecked--tools and fixes
   Memory Bottlenecks
-  When is a system memory-bottlenecked?
-  Memory bottlenecks vis-a-vis disk bottlenecks
-  How can you improve memory bottlenecks?

Disk/Filesystem Bottlenecks
-  Why filesystems get slow and how to improve them.
-  Network filesystems
Network Performance
-  Factors affecting network performance
-  How to measure what's going on on your network

Application Tuning
-  Dissecting applications
-  Profiling applications

Benchmarking and Benchmarketing
-  How to rig a benchmark
-  How to detect a rigged benchmark
-  How not to write your own benchmark

Marcus J. Ranum is a network and computer security consultant. He
is the principal author of several major Internet firewall
products, including the DEC SEAL, the TIS Gauntlet, and the TIS
Internet Firewall Toolkit. Marcus has been managing UNIX systems
and network security for over 13 years, including configuring and

M9:  Windows 95 and Windows NT for UNIX Programmers
Douglas A. Hamilton, Hamilton Laboratories

Intended audience: Programmers and system architects who need an
in-depth but extremely fast-paced introduction to the
non-graphical portion of the Win32 application programming
interface (API) on Windows NT and Windows 95.  Participants should
already be proficient in C and generally familiar with ordinary
system programming concepts such as processes, filesystem
structures, and IPC (interprocess communication).

This course will allow programmers already familiar with the UNIX
programming interface to become instantly productive writing
system (i.e., non-graphical) applications for Windows NT and
Windows 95. Some short general material will introduce these two
systems, comparing them from technical and marketing points of
view and demonstrating their operation and system administration
features.  Most of the day will be spent in rigorous examination
of the native Win32 32-bit programming interface, covering these

*  The filesystem and I/O
*  Processes and threads
*  Synchonization primitives
*  Dynamic link libraries
*  Memory management
*  Structured exception handling
*  Interprocess communication
*  Using the registry
*  Services
*  Using the event log
*  Security
*  An overview of administrative tools

In each case there will be discussion of the general concepts
involved, a review of the set of functions provided by Win32 with
analogies to the corresponding UNIX system calls, and examination
of a working sample of live code that exercises that part of the
API. All examples will also be provided on diskette.

Douglas Hamilton is president of Hamilton Laboratories, Sudbury,
Massachusetts, and the author of Hamilton C shell[TM], a tools
package that recreates the UNIX C shell and utilities completely
from scratch for Windows NT and Windows 95. Mr.  Hamilton holds a
BS and MS from Stanford University and an MBA from Boston

M10:  Topics In System Administration 
Trent Hein, XOR Network Engineering 
Evi Nemeth, University of Colorado, Boulder

Intended audience: System administrators with a year or more
experience who wish to learn state-of-the-art information about

Topics covered are:

* Dealing with Daemons:  Daemons are those friendly programs that
keep your system running. Learn how to install, configure,
monitor, and feed modern daemons that are essential for life in an
internetworked environment. Discussion will include modern daemons
such as inetd, wuftpd, popper, identd, mrouted, and many more.
Security Disaster Post-Mortem.  What do you do after your site has
been compromised by an outside party? What if you discover the
hacker was someone inside your organization? Most folks talk about
how to prevent a security crisis but what if that doesn't work?
When a security crisis does occur, careful handling is essential.
Learn tactics and techniques for dealing with security problems
"that could never happen at your site."

* Video Conferencing on the Desktop:  Ever participated in a
video conference at your desktop? You will, and probably sooner
than you think. Exciting new desktop video conferencing tools are
available today. Learn how to setup software and hold private
conferences, as well as join technical sessions at conferences
like USENIX and IETF from afar.

* System Administration Power Tools:  Often times, system
administrators are caught saying "if only I had time to learn how
to use that nifty new program." Unfortunately, system
administrators usually do so much firefighting that they don't
have time to stop and smell the new administration tools. In this
overview of readily-available UNIX system administration power
tools, we'll discuss packages that are likely to save you time and
increase your salary. Discover features and usage of programs like
flexfax, rc.config, addhost, amanda, adduser, sudo, glimpse,
patch, cksendml, majordomo, top, tcpdump, and more.

Trent Hein is Chief Network Architect at XOR Network Engineering
where he deals with sticky system administration and network
administration problems. He worked on the 4.4 BSD port to the MIPS
architecture at Berkeley, and is an author on the 2nd edition of
the UNIX System Administration Handbook. Trent has a BS in
Computer Science from the University of Colorado.

Evi Nemeth, a faculty member in Computer Science at the University
of Colorado, has managed UNIX systems for the past 18 years, both
from the front lines and from the ivory tower. She is co-author of
the best-selling UNIX System Administration Handbook.

M11:  The Law And Individual Rights on the Net:  Privacy, Anonymity,
      and Other Issues
Daniel Appelman, Heller, Ehrman, White, and McAuliffe 
Johan Helsingius, Oy Penetic Ab

Intended audience: System and network administrators and net users
interested in the legal issues surrounding the use of the
Internet, with special emphasis on privacy, anonymity and
accountability. Because this course will cover both practical
aspects of tools such as encryption and anonymous remailers as
well as legal and moral issues rising out of the global nature of
the network, it will interest those who deal with the threat of
mail bombings and lawsuits.

The course highlights technical and pragmatical methods as well as
the legal bases for resolving those problems. We examine the areas
of law involved with privacy and confidentiality as well as the
means of dealing with abuse and outright criminal activity.

The first part of this course will focus on the kinds of problems
that arise from the conflicting goals of privacy and
accountability in a global network covering countries with widely
different legal, moral, ethical and cultural standards. The right
to free speech, anonymity, and privacy are very central concepts
in most modern societies. But this right is constantly balanced by
the need of accountability. We discuss practical tools and their
use, and look at the potential problems caused by these tools.
Some of the tools include:

*  encryption systems such as PGP and PEM
*  anonymous/pseudonymous forwarders/servers
*  mail/news header spoofing
*  steganography/cryptography
*  electronic payment systems such as ecash and FV

The second part will focus on a survey of other issues, including
libel, obscenity, and the protection of intellectual property
rights. The instructors will discuss the most recent cases and
controversys, and will suggest guidelines for system
administrators, employers, and others who are responsible for
developing policies for the use of the Internet by their

Daniel L. Appelman is an attorney specializing in computer and
telecommunications law. He represents many computer software,
telecommunications, and electronic publishing companies such as
UUNET Technologies, O'Reilly & Associates, Songline Studios,
Cygnus Support, and Xinet, Inc and is a frequent writer and

Johan Helsingius is managing director of both Oy Penetic Ab, a
consultancy company that runs an anonymous/pseudonymous server,, and EUnet Finland, an internet service provider. He
has done extensive work on the legal and ethical implications of
global networking. His involvement with privacy/anonymity issues
on the Internet has been covered in many publications.  Despite
what some stories claim, there is NOT a pile of unwashed dishes in
his kitchen.

TUESDAY, JANUARY 23  -  9:00am-5:00pm

T1:  UNIX Security Tools: Use and Comparison  (New)
Matt Bishop, University of California, Davis

Intended audience: UNIX security administrators and users.

The goal of this course is to assist UNIX security administrators,
and interested users in locating and using publicly available
programs to improve the security of their systems. The course will
compare the uses and drawbacks of several different programs, with
an emphasis on when to use which.

*  Tool checking and analysis: what to look for, how to analyze a
tool, checking downloaded tools for security problems

*  Tools for authentication: proactive password changers (ex:
npasswd, passwd+); password generation tools, challenge-response
and one-time password techniques (ex: S/key), password concealment
and cracking tools (ex: shadow, crack)

*  Static analysis tools: file system auditing (ex: Tripwire,
binaudit), more general analysis tools (ex: tiger, COPS)

*  Network analysis and security tools: monitors (ex:
tcp_wrapper), probers (ex:  strobe), NFS and NIS analysis and
testing tools (ex: nfsbug, nfswatch), ISS, SATAN, Gabriel,

*  Tools for privilege: managing shells (ex: osh, sudo), shared
account management (ex: lsu)

*  Tools for logging and log analysis tools (ex: swatch, etc.)

*  Libraries: securelib, msystem, safe_access, etc.

Matt Bishop received his PhD from Purdue University where he
specialized in computer security. Besides computer and network
security, his research and teaching areas include operating
systems and software engineering. He chaired the first two UNIX
Security Workshops, and his column on computer security appears
regularly in the "Best Practises" newsletter.

T2:  Joining the Internet Safely Using UNIX and Firewalls
Tina Darmohray and Marcus Ranum, Information Warehouse!, Inc.

Intended audience: System administrators, programmers, technical
and operational managers, and all professionals involved in
securing computer networks and/or inter-network gateways.
Prerequisites for this tutorial are a knowledge of TCP/IP, DNS,
and Sendmail.

Connecting to the Internet is an exciting event for every
organization. The security implications can often bring
hesitation, though. This practical tutorial outlines details and
examples of UNIX network security and Internet connectivity
issues. Site policies and topologies that implement them will be
covered, including packet-filtering, application-level, and
circuit-level gateways. Overviews of current, publicly-available
solutions will be provided, focusing on complete examples for
configuring an Internet firewall.

Pre-requisites for this tutorial are a knowledge of TCP/IP, DNS,
and sendmail.

Topics covered include:

Problem definition and design motivation:
* Identify risks associated with Internet connection, including:
   -  valuable data
   -  motivation to obtain it
   -  potential consequences

Nomenclature and design variations:
*  Defining the common firewall terms and topologies
*  Compare designs and understand their strengths

Implementing firewalls:
*  Routers
   -  Purpose
   -  Router-based firewalls
   -  Packet-filtering configuration 
*  Gateway/Bastion host security
   -  Router and bastion-host-based firewalls
   -  Host security configuration
   -  Bastion host software: tcpd, smrsh, and challenge-response
      password software
*  Proxy solutions
   -  Misc. public-domain proxies
   -  SOCKS
   -  TIS firewall toolkit
*  Hiding information with DNS
   -  SOA and MX records to support the firewall
   -  Dual-DNS configuration
*  Sendmail configuration 
   -  Configuration to operate with firewall topology 
   -  Header re-writing to support the firewall 

Tina Darmohray is a consultant in the area of Internet firewalls
and network connections. She has over a decade of experience
managing and networking UNIX systems. Previously, she was the lead
for the UNIX System Administration team where her group was
responsible for over 1,000 machines.

Marcus J. Ranum is a network and computer security consultant. He
is the principal author of several major Internet firewall
products, including the DEC SEAL, the TIS Gauntlet, and the TIS
Internet Firewall Toolkit. Marcus has been managing UNIX systems
and network security for over 13 years, including configuring and

T3:  UNIX Network Programming
Richard Stevens, Consultant

Intended audience: UNIX/C programmers interested in learning how
to write programs that communicate across a network. A basic
familiarity with networking concepts and the TCP/IP protocols is

The goal of this course is to provide the knowledge required to
write network programs, and to develop and examine actual
examples. Although the course covers the Berkeley sockets
interface, it focuses on UNIX network programming concepts using
TCP/IP that are applicable to both sockets and TLI. 

Course topics will include:

Introduction (10%) 
-  The big picture
-  Standards
-  UNIX process handling
-  Connections and associations
-  Concurrent vs. iterative servers

Berkeley sockets (90%)
-  All the socket functions
-  TCP and UDP client-server examples
-  Reserved ports
-  Stream pipes
-  Multiplexed I/O
-  Out-of-band data
-  Raw sockets
-  Broadcasting
-  inetd superserver
-  Constructing Internet addresses
-  Socket changes with 4.4BSD

Richard Stevens is author of the books  "TCP/IP Illustrated",
"Advanced Programming in the UNIX Environment", and "UNIX Network
Programming".  He received his PhD in the area of image processing
from the University of Arizona in 1982.

T4:  What's New in Networking  (New)
Rik Farrow, Consultant 
Dave Taylor, Intuitive Systems

Intended audience: System or network administrators responsible
for maintaining or administering a Web site.

This course gives a quick overview on six hot new topics in

*  IP - The Next Generation:  IP Version 4 has been in use since
the late '70's, and although quite successful, it's beyond just
showing signs of strain. IP Version 6, aka IP Next Generation, is
supposed to last for the next 25 years by expanding address space,
improving routing, adding features which will support security,
mobility, and high-volume (read multimedia) connections. Besides
exploring these issues, the transition between IPv4 and IPv6 will
also be discussed.

*  ATM:  Prices for ATM (Asynchronous Transfer Mode) cards and
switches are entering the realm of real, working environments. ATM
will be deployed where high-bandwidth is required for
applications, and is starting to show up in both LANs and WANs.
The technology, sample configurations for UNIX workstations and
ATM relation to TCP/IP will be discussed.

*  Java:  The Java Language Environment might be the
object-oriented network programming language of the future--or
just another O-O language. Hot Java, a Web browser which permits
the import of secure applets, is an example application of Java,
embodying an architecture neutral distribution format (remember
ANDF?), security, memory management, along with object-oriented
language features. With promises of performance rivaling native C
or C++, without the massive recompile-relink cycles of C++, the
Java language is examined, with examples.

*  HTML 3:  If there's one thing that has affected network traffic
on the Internet, it's the Web and its load of graphics. A new
version of the Web markup language--HTML--might be the next
biggest thing to show up in late 1995; this'll be a fast overview
of its newest and coolest features.

*  VRML:  Besides the new capabilities of HTML, there is another
addition to the networking field that will be important to know:
VRML, a "virtual reality" browser that lets you walk through Web

*  Microsoft Network:  You love them or you hate them, but you
must learn about the Microsoft Network and how it'll be adding
millions of new users to the Internet and potentially to your
servers and services.

Rik Farrow has written two books, "UNIX Administration Guide to
System V" and "UNIX System Security". Since 1986, he has taught
UNIX security and system administration for conferences, user
groups, and businesses. He was the Technical Editor of "UNIX World"
magazine for four years, and writes for ;login:  and InfoWorld. He
enjoys mountain biking, living in the high desert and flying small

Dave Taylor is author of "Creating Cool Web Pages with HTML",
"Teach Yourself UNIX In A Week", and "Global Software", and
co-author of "The Internet Business Guide".  He is the proprietor
of The Internet Mall, a popular spot on the World Wide Web with
over 3500 stores. Dave is also the original author of the Elm Mail
System.  He has a Masters in Educational Computing and a BS in
Computer Science.

T5:  BSD Network Internals: Data Structures and Algorithms  (New)
Michael J. Karels, Berkeley Software Design, Inc.

Intended audience: Programmers using network services who wish to
know how the system functions; system or network administrators
using BSD-based networking to control routing and network
services; those who want to understand the kernel network services
from the socket interface down through routing and network
interface management. Users should have at least a year of
experience using UNIX, the C programming language, and
BSD/UNIX-based networking. A source-code license is not required,
as only unlicensed source code will be presented.

This course provides a layer-by-layer examination of the BSD
kernel networking framework, using TCP/IP as an example. It will
provide a roadmap to those who want to understand the organization
of the network layers in order to modify or add protocol

The BSD networking code has been used as the basis for the TCP/IP
implementations in most UNIX systems as well as some non-UNIX
systems. The course will include a description of the kernel
software layers involved in networking, including the socket
layer, the protocol modules, the routing table, and the network
interface layer. Examples will focus on the 4.4BSD-Lite version of
the system, and will point out the differences from earlier
versions. The course will conclude with selected algorithms used
in the TCP implementation.  The course will not cover the STREAMS
framework used in some System V systems.

This course will be given in four parts:

*  Introduction to Kernel Layering
   -  TCP/IP Overview
   -  Address Resolution Protocol
*  Network buffers (mbufs)
   -  Socket layer
   -  Protocol layers (IP and TCP)
   -  Network interface layer
*  Routing tables
   -  Routing tree in 4.4BSD-Lite
*  TCP Algorithms:
   -  Slow start, congestion avoidance
   -  Network changes in 4.4BSD-Lite

Michael J. Karels is a system architect at Berkeley software
Design, Inc. He was the system architect for 4.3BSD and part of
4.4BSD at the University of California, Berkeley and the principal
developer of the 2.9BSD UNIX release of the Berkeley Software
Distribution for the PDP-11. He is a co-author of "The Design and
Implementation of the 4.3BSD UNIX Operating System."

T6:  Advanced Programming with Tcl and Tk  (New)
Steve Uhler and Brent Welch, Sun Microsystems Laboratories

Intended audience:  Programmers involved in medium to large scale
Tcl/Tk projects, familiar with the basics of Tcl and Tk.  People
who learned Tcl/Tk through an earlier course, as well as people
who have been programming in Tcl/Tk for some time, should come
away from this course with useful, practical information.

This course describes techniques to get the most power out of Tcl
and Tk while avoiding troublesome areas. We will show you tricks
and techniques that we have developed as part of building many
applications with Tcl and Tk.

Tcl topics include:
*  Understanding the Tcl parser
*  Using eval effectively
*  Lists or Arrays--when and how to use one or the other
*  Quirks of expr 
*  Scoping issues and upvar 
*  String processing with regular expressions 
*  Error handling 
*  File I/O, pipelines, and background processing 
*  Debugging and profiling 
*  Multiple interpreters and Safe-Tcl 

Tk topics include:
*  Using the packer effectively 
*  Special effects with the place geometry manager 
*  Event bindings and bind tags 
*  Scope issues with button and binding commands 
*  Variables associated with widgets 
*  Scrolling and scanning: scrolling frames with a canvas 
*  Text widget programming: tags and marks 
*  Canvas programming: tags and coordinate systems 
*  Effective use of X resources 
*  Sending commands among interpreters 

After taking this course the participants will know how to build
Tcl/Tk programs that are efficient and powerful with a relatively
small amount of code.

Stephen Uhler is a researcher in the Tcl/Tk project in Sun
Microsystems Laboratories, where he is currently building the
Hippo web browser and the SpecTcl graphical user interface
builder. He writes the "PracTcl Programming" column in the "Linux

Brent Welch is the creator of the widely-used exmh mail user
interface and numerous other custom Tcl/Tk applications. He is the
author of "Practical Programming in Tcl and Tk."  Brent earned a
PhD at UC Berkeley while building the Sprite network operating
system. He is currently a member of the Tcl/Tk group at Sun Labs.

T7:  Java: A Language for Providing Content on the World Wide Web  (New)
Jim Waldo, Sun Microsystems Laboratories

Intended audience: Experienced programmers and technical
contributors.  Participants will be assumed to be familiar with
the C and C++ programming languages, the basics of object oriented
programming, and the basics of how the World Wide Web operates and
is organized.

The first part of this tutorial will introduce Java, an
object-oriented language designed to enable live content on the
Internet. This "live content" consists of full programs that can
be placed into HTML documents. When such a document is loaded into
a Java-enabled HTML viewer such as HotJava, the program is run,
creating a page with active or even interactive elements.

While designed for creating interactive web content, Java is a
general purpose, object-oriented language with such features as
garbage collection, exceptions, strong typing, and a clean
separation between classes and interfaces. Built around a C-style
syntax, Java allows the writing of secure, robust programs that
can be relied upon to run in a finite amount of space without
crashing into a pile of bits. Language, as well as the set of
class and interface libraries which are defined as part of any
compliant Java implementation, will be discussed.

How one uses Java to create "applets", programs that can be
included as part of a standard HTML document, will be discussed,
as well as how to write such applets, what resources are available
to these applets, and what features of the language and runtime
environment allow these applets to be run securely by anyone on
the Internet.

If time permits, the day will end with wild speculation and
discussion of the possible technological and social impacts of the
kind of computing that Java allows.

After this course, attendees should understand the structure and
features of Java and be able to write programs in it. Attendees
should understand how to write "applets", how to include those
applets in an HTML page, and understand the security features of
the language and runtime environment that allow such applets to be
run with confidence over the Internet.

Jim Waldo is a Senior Staff Engineer with Sun Microsystems
Laboratories where he does research in reliable distributed
computing. A long-time advocate of object oriented programming and
the architect of one of the first distributed object request
brokers, he has written and spoken extensively on object-oriented
programming techniques, distributed computing concepts, and
techniques for building robust, reusable software.

T8:  Beginning Perl Programming for UNIX Programmers  
    (Updated for Perl V5)
Tom Christiansen, Consultant

Intended audience: Individuals who have never looked at Perl
before or who have only been programming in it for a short time.
Students must have a previous background in UNIX shell programming
with a good working knowledge of regular expressions. A background
in sed, awk, and/or C programming will prove useful but is not

Now nearly ten years old, Perl is a robust tool that has become
the language of choice for systems administrators and toolsmiths,
database managers, software test and support engineers, GUI and
World Wide Web programmers. Running on nearly all platforms, Perl
is an extremely powerful scripting language for problems
previously solved at great effort in the shell or C. Because it
incorporates aspects of more than a dozen well-known UNIX tools,
experienced UNIX users will come up to speed on Perl rapidly, and
even programmers inexperienced at UNIX will learn UNIX through
learning Perl.

Topics will include detailed descriptions and numerous examples of
the syntax and semantics of the language, its data types,
operators and control flow, regular expressions and I/O
facilities, user functions and systems subroutines.

Note: While this course is based on the current release of Perl
5.1, it is not intended to be a detailed discourse on all advanced
programming constructs now afforded by that release. It is a
beginning course on Perl for experienced UNIX programmers, not an
advanced course for previous Perl programmers.

Tom Christiansen is a software consultant specializing in Perl
applications, optimizations, and training. He earned an MS degree
in Computer Science from the University of Wisconsin at Madison.
Tom serves on the Board of Directors for the USENIX Association,
and is well-known around the world for his courses in Perl

T9:  Understanding Linux Inside and Out  (New)
Michael K. Johnson, Linux Journal

Intended audience: Programmers with a strong general familiarity
with UNIX and an interest in using Linux as a programming
platform. This course will demonstrate Linux programming at all
levels from user programs to kernel drivers. Curiosity is
encouraged and Q&A sessions will be included.

Linux systems provide a cost-effective and powerful solution to
many programming problems. Unfortunately, while many books for the
novice Linux user have been released in the last year,
documentation for Linux programmers is still in its infancy.
Fortunately, some UNIX documentation does apply. This course will
help you learn which parts of what documentation apply to Linux,
and show you which pitfalls to avoid.

After quickly covering how to obtain and install Linux, the course
will cover two main subjects: writing applications and system
programs for Linux, including porting UNIX-based programs to
Linux, and writing kernel-level code for Linux, primarily device

After completing this course, attendees should be able to write
system programs and simple device drivers for Linux.

Michael K. Johnson is the editor of "Linux Journal", a monthly
magazine for Linux users and developers. He is also the author and
editor of the "Linux Kernel Hackers' Guide", a work-in-progress to
document Linux kernel internals. He has participated in the Linux
project since 1991, writing documentation, system programs, and
kernel code.

T10:  IP Network Administration
William LeFebvre, Argonne National Laboratory

Intended audience: Attendees should have some prior experience
with using IP networks, and should be familiar with number bases,
bits, bytes, and machine representations of integers, but need not
be experienced full-time programmers.

This course will cover essential IP network administration, and
background knowledge necessary to carry out such administration.

It will start with the Internet Model and some basics such as
numerical addresses and the fundamentally important protocols: IP,
ICMP, UDP, TCP, ARP, RARP. Packet routing (including subnetting)
will be included, along with information about the most common
UNIX routing daemons, routed and gated. This course will also take
a brief look at the domain name system (DNS). Management of the
common UNIX network services (telnet, rlogin, etc.) will be
examined, along with the primary network service provider daemon,
inet. Management of essential RPC services (NIS, NFS, mountd) will
be covered as time permits. The course will finish with a section
on troubleshooting and information on Internet resources.

William LeFebvre is currently a computer systems engineer in the
Decision and Information Sciences division of Argonne National
Laboratory. He received his BA and MS degrees from Rice
University. He has been using UNIX systems since 1982 and has been
an active user of the Internet since 1984.

TUTORIAL SEATING IS LIMITED, so register now to guarantee your first 

TUTORIAL FEES INCLUDE:  Admission to tutorials you select, 
Printed and bound tutorial materials from your sessions, CD ROM,
Lunch, and admission to the Vendor Display.

USENIX provides CEUs for a small administrative fee.  The CEU is 
a nationally recognized standard unit of measurement for continuing
education and training and is used by thousands of organizations
across the United States.

Completion of any full-day tutorial qualifies you for 0.6 CEUs.
For CEU credit, just check the box on the registration form.
USENIX provides a certificate and maintains transcripts for each
attendee who wants CEU credits.  CEUs are not the same as college
credits.  Consult your employer or school to determine their

TECHNICAL PROGRAM   Weds-Fri, January 24-26


9:00am-10:30am	KEYNOTE ADDRESS
Nature and Nurture: The Interplay of UNIX and Networking
Van Jacobson, Lawrence Berkeley National Laboratory

11am-12:30pm	FILE SYSTEMS 
Session Chair: John Ousterhout, Sun Microsystems Laboratories

Scalability in the XFS File System
  Adam Sweeney, Silicon Graphics

A Comparison of FFS Disk Allocation Policies
  Keith A. Smith and Margo Seltzer, Harvard University

AFRAID--A Frequently Redundant Array of Independent Disks
  Stefan Savage, University of Washington; John Wilkes, Hewlett-Packard 

Invited Talk:  Linux: Architecture, Experiences, and Future
  Linus Torvalds, University of Helsinki

2pm-3:30pm	OS EXTENSIONS
Session Chair: Darrell Long, University of California, Santa Cruz

A Comparison of OS Extension Technologies
  Christopher Small and Margo Seltzer, Harvard University

An Extensible Protocol Architecture for Application-Specific Networking
  Marc E. Fiuczynski and Brian N. Bershad, University of Washington

Linux Device Driver Emulation in Mach
  Shantanu Goel and Dan Duchamp, Columbia University

Invited Talk Panel Discussion:  Opinions on Recent Legal Decisions
Moderator:  Ed Gould, Digital Equipment Corporation
Panelists:  Dan Appelman, Partner, Heller, Ehrman, White,
  and McAuliffe; Mitch Dembin, Assistant U.S. Attorney--Chief,
  Financial Fraud Section; Mike Godwin, Staff Counsel,
  Electronic Frontier Foundation

Session Chair: Brent Welch, Sun Microsystems Laboratories

Calliope: A Distributed, Scalable Multimedia Server
  Andrew Heybey, Mark Sullivan, and Paul England, Bellcore

Simple Continuous Media Storage Server on Real-Time Mach
  Hiroshi Tezuka and Tatsuo Nakajima, Japan Advanced Institute of 
  Science and Technology

Invited Talk: Cryptography in the 21st Century
  Bruce Schneier, Counterpane Systems


9am-10:30am	NETWORKS 
Session Chair: John Kohl, Atria Software

Eliminating Receive Livelock in an Interrupt-driven Kernel
  Jeffrey Mogul, Digital Equipment Corp., Western Research Laboratory; 
  K. K. Ramakrishnan, AT&T Bell Laboratories

Implementation of IPv6 in 4.4 BSD
  Randall Atkinson, Daniel McDonald, and Bao Phan, Naval Research 
  Laboratory; Craig Metz, Kaman Sciences Corporation; Kenneth Chin, 
  Naval Research Laboratory

Supporting Mobility in MosquitoNet
  Mary Baker, Xinhua Zhao, Stuart Cheshire, and Jonathan Stone, 
  Stanford University

Invited Talk : Why Threads Are A Bad Idea (for most purposes)
  John Ousterhout, Sun Microsystems Laboratories

11am-12:30pm	WEB 
Session Chair: Christopher Small, Harvard University

World Wide Web Cache Consistency
  James Gwertzman and Margo Seltzer, Harvard University

A Hierarchical Internet Object Cache
  Anawat Chankhunthod, Peter Danzig, and Chuck Neerdaels, University 
  of Southern California; Michael F. Schwartz and Kurt J. Worrell, 
  University of Colorado, Boulder

Tracking and Viewing Changes on the Web
  Fred Douglis and Thomas Ball, AT&T Bell Laboratories

Invited Talk Track:  Vmalloc: The Search Ends?
  Kiem-Phong Vo, AT&T Bell Laboratories


Short, pithy, and fun, WIP reports introduce new or ongoing work.
If you have interesting work to share, or a cool idea that is not
ready to be published, a Work-in-Progress report is for you. Your
fellow attendees will give you insightful feedback. We are
especially interested in the presentation of student work. To
reserve your spot, send email to Peg Schafer at

Invited Talk Track: Forming a More Perfect Net Governance
  Carey Eugene Heckman, Adjunct Professor of Law, Stanford Law 
  School and Co-Director, Stanford Law and Technology Policy Center

Session Chair: David Black, Open Software Foundation Research 

Implementation of a Reliable Remote Memory Pager
  Evangelos P. Markatos and George Dramitinos, Institute of Computer 
  Science, FORTH, Crete

Solaris MC: A Multi Computer OS
  Yousef A. Khalidi, Jose M. Bernabeu, Vlada Matena, Ken Shirriff, and 
  Moti Thadani, Sun Microsystems Laboratories

A New Approach to Distributed Memory Management in the Mach
  Stephan Zeisset, Stefan Tritscher, and Martin Mairandres, Intel

Fault Tolerance in a Distributed CHORUS/MiX System
  Sunil Kittur, Online Media; Francois Armand, Chorus Systemes;
  Douglas Steel, ICL High Performance Systems; Jim Lipkis, Chorus

Invited Talk Panel Discussion:  Selling Stuff that's Free: the 
	Commercial Side of Free Software
Moderator: Mary Baker, Stanford University
Panelists: Bob Bruce, Walnut Creek CD-ROM; William H. Davidow,
  Mohr, Davidow Ventures; Michael Tiemann, Cygnus Support;
  Linus Torvalds, University of Helsinki


9am-10:30am     PROTOCOLS 
Session Chair: Jonathan Smith, University of Pennsylvania 

Latency Messaging System for Distributed Real Time Environments
  David L. Black, Randall D. Smith, Steven J. Sears, and Randall W.
  Dean, Open Software Foundation Research Insititute 

An Analysis of Process and Memory Models to Support High-Speed
Networking in a UNIX Environment
  B. Murphy, University of Cambridge; S. Zeadally and C. J. Adams, 
  University of Buckingham 

Zero-Copy TCP in Solaris
  H. K. Jerry Chu, SunSoft, Inc.  

Invited Talk:  Highlights from 1995 USENIX Conferences

11am-12:30pm	PERFORMANCE
Session Chair: Miche Baker-Harvey, Digital Equipment Corporation

A Performance Comparison of UNIX Operating Systems on the Pentium
  Kevin Lai and Mary Baker, Stanford University

lmbench: Portable Tools for Performance Analysis
  Larry McVoy, Silicon Graphics; Carl Staelin, Hewlett-Packard 

Process Labeled Kernel Profiling: A New Facility to Profile System
  Shingo Nishioka, Atsuo Kawaguchi, and Hiroshi Motoda, Hitachi 
  Advanced Research Laboratory

Invited Talk Track: CitySpace: Come Build It Yourself--A
User-Extensible Virtual Environment for Real-time Play
  Coco Conn and Zane Vella, Digital Circus Productions

2pm-4pm	POT POURRI
Session Chair: Matt Blaze, AT&T Bell Laboratories

Cut-and-Paste File-Systems: Integrating Simulators and File-Systems
  Peter Bosch and Sape J. Mullender, Universiteit Twente

Predicting Future File-System Actions From Prior Events
  Tom M. Kroeger and Darrell D. E. Long, University of California, 
  Santa Cruz

Transparent Fault Tolerance for Parallel Applications on Networks
of Workstations
  Daniel J. Scales, Digital Equipment Corporation Western Research
  Laboratory; Monica S. Lam, Stanford University

Why Use a Fishing Line When you Have a Net? An Adaptive Multicast
Data Distribution Protocol
  Steve Kotsopoulos and Jeremy Cooperstock, University of Toronto

Invited Talk Panel Discussion:  Technical Executive Summary: 
90 Minutes, 8 Talks, No Regrets
Moderator: Keith Bostic, Berkeley Software Design, Inc.


TECHNICAL SESSIONS FEES INCLUDE:  Admission to all technical
sessions, Copy of the Conference Proceedings and Invited
Talks Submitted Notes, Admission to the Reception, Admission
to the Vendor Display.

Pre-Registration Savings Deadline:   Friday, December 15, 1995
Hotel Discount Reservation Deadline:  Wednesday, January 3, 1996
Tutorial Program:
Monday-Tuesday, Jan 22-23       9:00am-5:00pm
Technical Sessions:
Wednesday, Jan 24		9:00am-5:00pm
Thursday, Jan 25		9:00am-6:00pm
Friday, Jan 26			9:00am-5:30pm
On-Site Conference Registration Hours:
Sunday, Jan 21                  4:00pm-9:00pm
Monday-Thursday, Jan 22-25      7:30am-6:00pm
Vendor Display:
Wednesday, Jan 24               12:00pm-7:00pm
Thursday, Jan 25                10:00am-4:00pm
Birds-of-a-Feather Sessions:
Tuesday & Thursday, Jan 23 & 25	6:00pm-10:00pm
Wednesday, Jan 24               9:00pm-11:00pm
USENIX Conference Reception:
Wednesday, Jan 24               7:00pm-9:00pm

PROGRAM CHAIR: Robert Gray, US WEST Advanced Technologies

Eric Allman		Pangaea Reference Systems
Miche Baker-Harvey	Digital Equipment Corporation
David Black		Open Software Foundation Research Institute
Matt Blaze		AT&T Bell Laboratories
John Kohl		Atria Software
Darrell Long		University of California, Santa Cruz
John Ousterhout		Sun Microsystems Laboratories
Christopher Small	Harvard University
Jonathan Smith		University of Pennsylvania
Carl Staelin		Hewlett-Packard
Brent Welch		Sun Microsystems Laboratories

Invited Talks and Guru-Is-In Co-ordinators:
Mary Baker		Stanford University
Ed Gould		Digital Equipment Corporation 


Do you have a topic that you'd like to discuss with others? BoFs
may be perfect for you. BoFs are very interactive and informal
gatherings for attendees interested in a particular topic.
Schedule your BOF in advance or on-site. Telephone the USENIX
Conference Office at 714.588.8649 or send email to Topics are announced at the conference.

Have a question that's been bothering you? Try asking a USENIX
guru! Noted experts from the USENIX community will be available to
spark controversy and answer questions. These are informal
discussions among participants, one more way at the conference to
transmit information. Please contact the IT Coordinators via email
to if you would like to volunteer your

Weds, Jan 24, 12:00pm-6:00pm, & Thurs, Jan 25, 10:00am-4:00pm 

Ask serious questions and get serious answers at the Vendor
Display. You can talk seriously with technically savvy vendor
representatives. You can discuss how something will work with what
you've already got. Plus, you can review the newest releases from
technical and professional publishers.

Exhibitors:  This is an unusual opportunity to get feedback on
your products and ideas from our exceptional attendees -- the
system administrators, technical staff and managers, programmers,
developers, and engineers who use your products daily. They attend
USENIX because it's the authoritative place to find out what's new
and its unsurpassed technical program and tutorials.

To reserve your booth, please contact:
Cynthia Deno
Phone: 408-335-9445	Fax: 408-335-5327

Short, pithy, and fun, Work-in-Progress Reports (WIPs) introduce
interesting new or ongoing work. If you have work you would like
to share or a cool idea that is not quite ready to be published, a
WIP Report is for you! We are particularly interested in
presenting student work. To reserve your presentation slot,
contact Peg Schafer via email to A list of topics
is announced on-site.

WELCOMING RECEPTION AND KICKOFF Sunday, Jan 21, 6:00pm-9:00pm

The Welcoming Reception offers you a chance to say hello over soft
drinks and snacks. The Kickoff introduces attendees to conference
events and to San Diego. The Kickoff immediately follows the
Welcoming Reception at 8:00 pm.

RECEPTION  Wednesday, Jan 24, 7:00-9:00pm
Join the fun, mingle with old friends and make new friends at our
reception. It's free when you register for the technical sessions.
Additional tickets may be purchased on site.

Internet and dial-out access are provided in the Terminal Room.
Copying facilities will be available to create tapes of
miscellaneous GNU and public domain software. The Terminal Room
will be open all week. Look for details posted to

Email message service will be available Monday, January 22 through
Friday, January 26. Email to conference attendees should be

Telephone messages may be left by telephoning the Marriott Hotel
at 619-234-1500 and asking for the USENIX Message Desk. The
Message Desk will be open Sunday, January 21, 4:00-9:00 pm, and
during conference hours until Friday, January 26 at 3:00 pm.

Tutorials: A limited number of seats in each tutorial are reserved
for full-time students at the very special rate of $70.00 per
tutorial. To take advantage of this, you must telephone the
conference office to confirm availability and make a reservation.
You will receive a reservation code number which must appear on
your registration form. Your registration form with full payment
and a photocopy of your current student ID card must arrive within
14 days from the date of your reservation. If they do not arrive
by that date, your reservation will be canceled. This special fee
is non-transferable.

Technical Sessions: USENIX offers a discount rate of $75 for
technical sessions for full-time students. You must include a copy
of your current student I.D. card with your registration. This fee
is not transferable.

USENIX is the UNIX and Advanced Computing Systems Technical and
Professional Association. Since 1975 the USENIX Association has
brought together the community of engineers, scientists, system
administrators, and technicians working on the cutting edge of the
computing world.

The USENIX technical conferences have become the essential meeting
grounds for the presentation and discussion of the most advanced
information on new developments in all aspects of advanced
computing systems.

SAGE, The System Administrators Guild
SAGE, a Special Technical Group within the USENIX Association, is
dedicated to the recognition and advancement of system administration 
as a profession. 

To join or renew your membership, use the convenient check-off box
on the registration form.  You must be a current member of USENIX
to join SAGE. For more membership information, call 510-528-8649,
send email to, or view our World Wide Web
Site at:

USENIX has negotiated special rates for conference attendees at
the San Diego Marriott Hotel and Marina, located on the bay in
downtown San Diego. Contact the hotel directly to make your
reservation. You must mention USENIX to get the special rate. A
one night room deposit must be guaranteed to a major credit card.
To cancel your reservation, you must notify the hotel at least 24
hours before your planned arrival date.

Please note that hotel space is limited.  As this will be a very 
busy time for the hotel, with other events going on at the same
time, it is important to make your reservations early. 

333 West Harbor Drive
San Diego, CA 92101-7700
Phone: 619-234-1500	
Tollfree: 800.228.9290
Reservation Fax: 619.230.8978 

RATES:		 	City view	Bay view
Single/Double		$129.00		$149.00

Special Note: The USENIX conferences place a heavy demand on
meeting space. To get meeting space and other services free and
keep your conference registration fees low, USENIX guarantees to
use a number of sleeping rooms. Contracts are signed long in
advance. The penalty for not meeting the guarantee may exceed
$100,000. You must mention USENIX when reserving your room to
ensure that it counts against our room guarantee. If you use a
corporate rate, it will not count towards our commitment.

NEED A ROOMMATE? Usenet facilitates room sharing. If you wish to
share a room, post to and check

The San Diego Airport is 7-8 miles from the hotel. The Cloud 9
Shuttle costs $4 one way. Use the courtesy phone in the baggage
claim area to request service within 10 minutes. Taxi service is

Amtrak is only 2 miles from the hotel. Taxi service is available.
If you are driving a car, parking at the Marriott costs $11/day
for the valet and $8 if you park it yourself. Directly across from
the Marriott, Allright Parking provides parking at $3/day without
in and out privileges.

Special discounted air fares are available only through JNR, Inc.,
a full service travel agency. All restrictions apply. Please call
JNR for details. Call toll free 800-343-4546 in the USA, or
telephone 714-476-2788.

For more information, contact: 
USENIX Conference Office
22672 Lambert St., Suite 613
Lake Forest, CA USA 92630
Phone: 714.588.8649	Fax: 714.588.9706
Office Hours: M-F, 8:30am-5:00pm Pacific Time

========================cut here====================================

                    January 22-26, 1996, San Diego, CA

Please complete the form below and return with full payment to:

22672 Lambert St., Suite 613, Lake Forest, CA 92630
Telephone: (714) 588-8649 / FAX Number (714) 588-9706
Electronic Mail Address:
Office Hours: 8:30am - 5:00pm Pacific Time

         (first)                                 (last)

FIRST NAME FOR BADGE____________________________

USENIX Member ID____________________

COMPANY OR INSTITUTION______________________________________________

MAILING ADDRESS_____________________________________________________
						(mail stop)



TELEPHONE NO:_________________________FAX NO._________________________

NETWORK ADDRESS______________________________________________________
                          (one only please)

The address you provide will be used for all future USENIX
mailings unless you notify us in writing.

Please help us serve you better.  By answering the following
questions, you help us plan our activities to meet members'
needs.  All information is confidential.

[ ] I do not want to be on the attendee list
[ ] I do not want my address made available for other than USENIX
[ ] I do not want USENIX to email me notices of Association activities.

What is your affiliation? [ ]academic  [ ]commercial  [ ]gov't  [ ]R&D

What is your role in purchase decision?
1.[] final  2.[] specify  3.[] recommend 4.[] influence 5.[] no role

What is your job function? (check one)
1.[] system/network administrator    2.[] consultant 
3.[] academic/research   4.[] developer/programmer/architect 
5.[] system engineer    6.[] technical manager  7.[] student

How did you hear about this meeting:
1.[] USENIX mailing  2.[] newsgroup/bulletin board 3.[] ;login:  
4.[] World Wide Web  6.[] from a colleague  7.[] magazine

What publications or newgroups do you read releated to advanced 
computing systems?_____________________________________________


Select only one full-day tutorial per day - 9:00am-5:00pm

Monday, January 22, 1996
[ ] M1:  Advanced UNIX Security: Threats and Solutions  
[ ] M2:  IP version 6  (New)
[ ] M3:  Creating a Web Site with HTML and CGI  (New)
[ ] M4:  UNIX Kernel Internals
[ ] M5:  An Introduction to Tcl and Tk
[ ] M6:  Kerberos Approach to Network Security  (Updated)
[ ] M7:  Sendmail Inside and Out - Version 8  (Updated)
[ ] M8:  Introduction to System Performance Tuning  (New)
[ ] M9:  Windows 95 and Windows NT for UNIX Programmers  (New)
[ ] M10: Topics in System Administration 
[ ] M11: The Law and Individual Rights on the Internet  (New)

    Second Choice of first is filled:____________________________

Tuesday, January 23, 1996
[ ] T1:  UNIX Security Tools  (New)
[ ] T2:  UNIX and Firewalls
[ ] T3:  UNIX Network Programming
[ ] T4:  What's New in Networking  (New)
[ ] T5:  BSD Network Internals  (New)
[ ] T6:  Advanced Tcl/Tk  (New)
[ ] T7:  Java  (New)
[ ] T8:  Beginning Perl Programming  (Updated)
[ ] T9:  Linux Inside and Out  (New)
[ ] T10: IP Network Administration

    Second Choice of first is filled:____________________________

	Two full-day tutorials.................$590	$_________
	CEU credit (optional)..................$ 30	$_________
	One full-day tutorial..................$320	$_________
	CEU credit (optional)..................$ 15	$_________

	Late fee applies if postmarked after 
	  Friday, December 15, 1995........Add $ 50	$_________

	Full-Time Students
	CODE NO:______________________         $ 70	$_________
	CODE NO:______________________         $ 70	$_________


	Current Member Fee.....................$330	$________
        (Applies to current USENIX, EurOpen, JUS 
	 and AUUG members)

	Non-Member or Renewing Member Fee*.....$400	$________
	*Join or renew your USENIX/SAGE membership 
	and attend the conference for same low price 
                                         -Check here [ ]

	Join or renew your SAGE membership...Add $ 25	$_________
	(You must be a member of USENIX)

	Late fee applies if postmarked after 
	  Friday, December 15, 1995.........Add $ 50	$_________

	Full-Time Student Fee: pre-registered  
	                       or on-site......$ 75	$_________
	(Students must include photocopy of current 
	 student I.D.)

                       TOTAL ENCLOSED...................$_________

Payment in US Dollars must accompany this form.  Purchase orders,
vouchers, telephone or email registrations cannot be accepted.  

[ ] Payment Enclosed (Make check payable to USENIX Conference)


ACCOUNT NO.______________________________________ EXP. DATE___________

 Print Cardholder's Name                 Cardholder's Signature

You may fax your registration form if paying by credit card to 
USENIX Conference Office, fax:  714 588 9706.  (To avoid duplicate 
billing, please DO NOT mail an additional copy.)

REFUND CANCELLATION POLICY:  If you must cancel, all refund
requests must be in writing and postmarked no later than January
12, 1996.  Telephone cancellations cannot be accepted.  You may
telephone to substitute another in your place.

			        About USENET

USENET (Users’ Network) was a bulletin board shared among many computer
systems around the world. USENET was a logical network, sitting on top
of several physical networks, among them UUCP, BLICN, BERKNET, X.25, and
the ARPANET. Sites on USENET included many universities, private companies
and research organizations. See USENET Archives.

		       SCO Files Lawsuit Against IBM

March 7, 2003 - The SCO Group filed legal action against IBM in the State 
Court of Utah for trade secrets misappropriation, tortious interference, 
unfair competition and breach of contract. The complaint alleges that IBM 
made concentrated efforts to improperly destroy the economic value of 
UNIX, particularly UNIX on Intel, to benefit IBM's Linux services 
business. See SCO v IBM.

The materials and information included in this website may only be used
for purposes such as criticism, review, private study, scholarship, or

Electronic mail:			       WorldWideWeb: