


default search action
18th LISA 2004: Atlanta, USA
- Lee Damon:
Proceedings of the 18th Conference on Systems Administration (LISA 2004), Atlanta, USA, November 14-19, 2004. USENIX 2004
Opening Remarks, Awards, Keynote
- Howard Ginsberg:
Keynote Address: Going Digital at CNN.
SPAM/Email
- Jeremy Blosser, David Josephsen:
Scalable Centralized Bayesian Spam Mitigation with Bogofilter (Awarded Best Paper!). 1-20 - Nils Einar Eide, Andreas N. Blaafadt, Baard H. Rehn Johansen, Frode Eika Sandnes:
DIGIMIMIR: A Tool for Rapid Situation Analysis of Helpdesk and Support Email. 21-32 - Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo:
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. 33-46
Intrusion and Vulnerability Detection
- Sufatrio, Roland H. C. Yap, Liming Zhong:
A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing. 47-58 - Axelle Apvrille, David Gordon, Serge E. Hallyn, Makan Pourzandi, Vincent Roy:
DigSig: Runtime Authentication of Binaries at Kernel Level. 59-66 - Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, Erez Zadok:
I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System. 67-78
Configuration Management
- Eelco Dolstra, Merijn de Jonge, Eelco Visser:
Nix: A Safe and Policy-Free System for Software Deployment. 79-92 - William LeFebvre, David Snyder:
Auto-configuration by File Construction: Configuration Management with newfig. 93-104 - Sergei Mikhailov, Jonathan Robert Stanton:
AIS: A Fast, Disk Space Efficient "Adaptable Installation System" Supporting Multitudes of Diverse Software Configurations. 105-112
Networking
- Christopher J. Tengi, James M. Roberts, Joseph R. Crouthamel, Chris M. Miller, Christopher M. Sanchez:
autoMAC: A Tool for Automating Network Moves, Adds, and Changes. 113-120 - Carrie Gates, Michael P. Collins, Michael Duggan, Andrew Kompanek, Mark Thomas:
More Netflow Tools for Performance and Security. 121-132
Monitoring and Troubleshooting
- Chad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang:
Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. LISA 2004 - John P. Rouillard:
Real-time Log File Analysis Using the Simple Event Correlator (SEC). 133-150 - Ni Lao, Ji-Rong Wen, Wei-Ying Ma, Yi-Min Wang:
Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis. 151-158
System Integrity
- Ted Bonkenburg, Dejan Diklic, Benjamin C. Reed
, Mark A. Smith, Michael Vanover, Steve Welch, Roger Williams:
LifeBoat: An Autonomic Backup and Restore Solution. 159-170 - Joseph R. Crouthamel, James M. Roberts, Christopher M. Sanchez, Christopher J. Tengi:
PatchMaker: A Physical Network Patch Manager Tool. 171-176 - Gregory Pluta, Larry Brumbaugh, William Yurcik, Joseph A. Tucek:
Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments. 177-186
Security
- Marc Dougherty:
Making a Game of Network Security. 187-194 - Paul Brett, Mic Bowman, Jeff Sedayao, Robert Adams, Rob C. Knauerhase, Aaron Klingaman:
Securing the PlanetLab Distributed Testbed: How to Manage Security in an Environment with No Firewalls, with All Users Having Root, and No Direct Physical Control of Any System. 195-202 - Robert A. Napier:
Secure Automation: Achieving Least Privilege with SSH, Sudo, and Suid. 203-212
Theory
- Steven Schwartzberg, Alva L. Couch:
Experience in Implementing an HTTP Service Closure. 213-230 - Jon Finke:
Meta Change Queue: Tracking Changes to People, Places, and Things. 231-240 - Daniel Price, Andrew Tucker:
Solaris Zones: Operating System Support for Consolidating Commercial Workloads. 241-254
Work-in-Progress Reports (WiPs)
Invited Talks
- Alva L. Couch:
What Is This Thing Called System Configuration? - Mark Burgess:
Anomaly Detection: Whatever Happened to Computer Immunology? LISA 2004 - Lisa Phillips, Brad Fitzpatrick:
LiveJournal's Backend and memcached: Past, Present, and Future. - Michael Ciavarella:
Documentation. LISA 2004 - Peter H. Salus:
The Administrator, Then and Now. LISA 2004 - Keri Carpenter, Thomas A. Limoncelli:
Lessons Learned from Howard Dean's Digital Campaign.
Spam Mini-Symposium
- Joshua Goodman:
Filtering, Stamping, Blocking, Anti-Spoofing: How to Stop the Spam. LISA 2004 - Douglas Hughes:
Lessons Learned Reimplementing an ISP Mail Service Infrastructure to Cope with Spam. - John Graham-Cumming:
What Spammers Are Doing to Get Around Bayesian Filtering & What We Can Expect for the Future.
Plenary Session
- Bill Van Etten:
A System Administrator's Introduction to Bioinformatics.
Network/Security/Professional Track
- John Nicholson:
What Information Security Laws Mean For You. - Brian Pawlowski:
NFS, Its Applications and Future. - Jim Nisbet:
The Security Role of Linguistic Content Analysis. - Esther Filderman, Ken McInnis:
Grid Computing: Just What Is It and Why Should I Care? - Trey Harris:
A New Approach to Scripting. LISA 2004 - Daniel V. Klein:
Flying Linux. - David N. Blank-Edelman:
System Administration and Sex Therapy: The Gentle Art of Debugging. - Simson L. Garfinkel:
Used Disk Drives. - W. Curtis Preston:
Storage Security: You're Fooling Yourself. LISA 2004
Guru Sessions
- Gerald Carter:
Samba. LISA 2004 - Michael Bartosh:
Mac OS X. LISA 2004 - Bdale Garbee:
Linux. LISA 2004 - W. Curtis Preston:
Backups. LISA 2004 - Esther Filderman:
AFS. LISA 2004 - Robert Sparks:
VoIP and IETF Standards. LISA 2004 - Douglas Hughes, Darren Dunham:
RAID/HA/SAN (with a Heavy Dose of Veritas). LISA 2004 - David W. Parter:
Professional Growth. LISA 2004 - Gene Kim:
Configuration Management. LISA 2004

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.