Tutorials:
Overview |
By Day
(Sunday,
Monday, Tuesday) |
By Instructor | All in One File
Monday, December 3, 2001
|
Full-Day Tutorials
M1 High Performance Computing with Linux Clustering
NEW
John R. Graham, Coastal Carolina University
M2 Exploring the Potential
of LDAP
Gerald Carter, VA Linux Systems
M4 Sendmail Configuration and Operation (Updated for Sendmail 8.12)
Eric Allman, Sendmail, Inc.
M6 Practical Wireless IP: Concepts, Administration, and Security
Philip Cox and Brad C. Johnson, SystemExperts Corporation
M7 An Introduction to Computer Security NEW
Avi Rubin, AT&T LabsResearch
M8 Advanced Topics in DNS Administration
NEW
Jim Reid, Nominum
M9 Oracle Backup and Recovery
W. Curtis Preston, Storage Designs
|
 |
Half-Day Tutorials - Morning
M10 Apache 2--What's New? What's Cool? What's Hot? NEW
Jan Säll, Irial Ltd
M11 Introduction to Domain Name System Administration
William LeFebvre, CNN Internet Technologies
M12 Sendmail and
Security NEW
Gregory Neil Shapiro, Sendmail, Inc.
M13 Management 101—The Basics
Stephen Johnson and Dusty White, Consultants
Half-Day Tutorials - Afternoon
M14 Cool Apache Modules and Stuff You Can Do with Them NEW
Jan Säll, Irial Ltd
M15 Intermediate Topics in Domain Name System Administration
William LeFebvre, CNN Internet Technologies
M16 System and Network Monitoring
John Sellens, Certainty Solutions NEW
M17 Management 102--Empowerment
Steve Johnson and Dusty White, Consultants
|
M1 High Performance Computing with Linux
Clustering NEW
John R. Graham, Coastal Carolina University
Who should attend: Programmers and managers involved in the design
and implementation of high performance computing solutions for business and
scientific applications. Participants should have some programming background
(C, C++, FORTRAN) and some understanding of hardware and networking.
Participants will come away from this tutorial knowing how to begin building a
low-cost, high performance computing cluster and how to write programs to take
advantage of the cluster.
Topics include:
-
Hardware configurations and selection criteria
-
Operating system considerations
-
Parallel programming models
-
Introduction to parallel programming techniques
-
Case studies, programming examples, results
John R. Graham, (M1) is currently on the faculty at
Coastal Carolina University in Conway, South Carolina. His dissertation
"Real-time Scheduling in Distributed, Multi-Agent Systems" was an application of
highly threaded and distributed applications used to solve complex science and
business problems. He has worked professional for Sun Microsystems, NASA, Texas
Instruments and Eastman Kodak and as a consultant to clients world-wide. At the
Univesiry he teaches Systems programming, Opearting Systems Design and continues
research in development of
parallel applications.
M2 Exploring the Potential
of LDAP
Gerald Carter, VA Linux Systems
Who should attend: Administrators and programmers interested in
the potential of the Lightweight Directory Access Protocol (LDAP) and in
exploring issues related to deploying an LDAP infrastructure. This tutorial is
not a how-to for a specific LDAP server, nor is it an LDAP developers' course.
Rather, it is an evaluation of the potential of LDAP to allow the consolidation
of existing deployed directories. No familiarity with LDAP or other Directory
Access Protocols will be assumed.
System administrators today run many directory services, though they may be
called by such names as DNS and NIS. LDAP, the up-and-coming successor to the
X500 directory, promises to allow administrators to consolidate multiple
existing directories into one. Vendors across operating-system platforms are
lending support.
Topics include:
-
The basics of LDAP
-
Current technologies employing LDAP services
-
Replacing NIS using LDAP
-
Integrating authentication mechanisms for other services (e.g., Apache,
Sendmail, Samba) with LDAP
-
LDAP interoperability with other proprietary directory services, such as
Novell's NDS and Microsoft's Active Directory
-
Programming tools and languages available for implementing LDAP support in
applications
Gerald Carter (M2) has been a member of the Samba
Team since 1998 and is employed by VA Linux Systems. He is currently working
with O'Reilly Publishing on a guide to LDAP for system administrators. He holds
a master's degree in computer science from Auburn University, where he was also
previously employed as a network and systems administrator. Gerald has published
articles with various Web-based magazines such as Linuxworld and has authored
instructional course for companies such as Linuxcare. He acted as the lead
author of Teach Yourself Samba in 24 Hours (Sams Publishing.)
M4 Sendmail Configuration and Operation
(Updated for Sendmail 8.12)
Eric Allman, Sendmail, Inc.
Who should attend: System administrators who want to learn more
about the sendmail program, particularly details of configuration and
operational issues (this tutorial will not cover mail front ends). This intense,
fast-paced tutorial is aimed at people who have already been exposed to
sendmail. It describes the latest release of sendmail from Berkeley, version
8.12.
Topics include:
-
The basic concepts of configuration: mailers, options, macros, classes, keyed
files (databases), and rewriting rules and rulesets
-
Configuring sendmail using the M4 macro package
-
Day-to-day management issues, including alias and forward files, "special"
recipients (files, programs, and include files), mailing lists, command line
flags, tuning, and security
-
How sendmail interacts with DNS
Eric Allman (M4) is the original author of sendmail. He
is the author of syslog, tset, the -me troff macros, and trek. He was the chief
programmer on the INGRES database management project, designed database user and
application interfaces at Britton Lee,and contributed to the Ring Array
Processor project at the International Computer Science Institute. He is a
former member of the USENIX Board of Directors.
M6 Practical Wireless IP: Concepts, Administration, and Security
Philip Cox and Brad C. Johnson, SystemExperts Corporation
Who should attend: Users, administrators, managers, and anyone who is interested in learning about some of the fundamental security and usage issues that we all must come to grips with in purchasing, setting up, and using wireless IP services. The primary focus is on wireless IP services for laptops, although we'll glance at some popular mobile devices, such as handheld systems and cell phones with Internet access. The tutorial is targeted at beginning to intermediate wireless users. It assumes some knowledge of TCP/IP networking and client/server computing, the ability or willingness to use administrative GUIs to setup a device, and a general knowledge of common laptop environments.
This course is focused on the practical understanding and usage of wireless technologies, and is not an in-depth analysis of Radio Frequencies or the various wireless protocols (e.g., Bluetooth, CDPD, GPRS).
Whether you like it or not, wireless services are popping up everywhere. As time goes on, more of your personal and corporate data communications will be done over various types of wireless devices. Just as in the wired world, we're faced with a proliferation of business and technical choices concerning security, hardware, software, protocols, and administration.
The good news is that generally somebody else will handle these complicated issues for users (of course, that "someone else" may be you!). However, since most wireless services users are carrying their devices everywhere they go, you and your organization will still be responsible for understanding and managing the devices you possess. Since the purpose of wireless is to share data when you aren't directly attached to a wired resource, you need to understand the fundamental security and usage options.
In this course we will cover a number of topics that affect you in implementing, managing and using wireless services. Some of the topics will be demonstrated live using popular wireless devices.
Topics include:
- Cellular services basics
- What's out there?
- Who's using what?
- What really matters?
- Wireless LAN fundamentals
- 802.11b
- Antennas
- Concepts: Channels, Roaming, Signals, etc.
- Popular access points
- Cisco Aironet
- Apple Airport
- Lucent ORiNOCO
- Other popular APs
- Configuration issues
- Access Point configuration
- Setting up your client
- Building your own Access Point
- Threats
- Protocol issues
- Eavesdropping
- Bad configurations
Phil Cox (S1, M6) is a consultant for
SystemExperts
Corporation, a consulting firm that specializes in system security and
management. Phil frequently writes and lectures on issues bridging the gap
between UNIX and Windows NT. He is a featured columnist in ;login;, the
USENIX Association Magazine and has served on numerous USENIX program
committees. Phil holds a B.S. in computer science from the College of
Charleston, South Carolina.
Brad Johnson (S7, M6) is a vice
president of SystemEx
perts Corporation, a consulting firm that specializes in system security and
management. He is a well-known authority in the field of secure distributed
systems and has recently served as a technical advisor to both Dateline NBC and
CNN on network security matters. He has participated in seminal industry
initiatives, including the Open Software Foundation, X/Open, and the IETF, and
has often published about open systems.Brad was one of the original members of
the OSF DCE Evaluation Team. He has a B.A. in computer science from Rutgers
University and an M.S. from Lesley College.
M7 An Introduction to Computer Security
NEW
Avi Rubin, AT&T LabsResearch
Who should attend: Anyone with a computer science degree or the
equivalent experience who is not an expert in computer security. IT managers who
need to understand how to evaluate risk, what the dangers are, and what
countermeasures are available. We will emphasize issues of importance to system
administrators.
As more and more of our lives move online, we are exposing more of ourselves to
often untraceable, malicious, and automated attack: credit card numbers, data, a
group of machines that we manage, our time, our privacy. This tutorial seeks to
sweep a broad brush across the field of computer security, addressing in
particular the practical aspects of the field.
Topics include:
-
Assessing risk
-
Viruses and worms
-
Cryptography
-
Secure data storage and backup
-
Secure data transfer, including SSL and IPsec
-
Public Key Infrastructure (PKI)
-
Firewalls
-
Intrusion detection
-
Network sniffing and sniff detection
-
Denial-of-service attacks
-
E-commerce and privacy
Attendees should leave with a general understanding of the field and a direction
for learning more about each topic covered.
Avi Rubin (M7) is Principal Researcher at AT&T Labs and
a member of theboard of directors of USENIX. He has been researching security
issues in computer security since 1991. Rubin is the author of two books on
computer security: White-Hat Security Arsenal (Addison Wesley, 2001) and Web
Security Sourcebook (with Dan Geer and Marcus Ranum, John Wiley &Sons,
1997). He is the author of dozens of refereed conference and journal papers, and
co-authored two chapters of Peer-to-Peer (O'Reilly,2001). Rubin is also an
Associate Editor of Electronic Commerce Research Journal. His latest research
project, Publius, a system forcircumventing censorship on the Internet, won the
Index on Censorship's Freedom of Expression Award.
M8 Advanced Topics in DNS Administration
NEW
Jim Reid, Nominum
Who should attend: DNS administrators who wish to extend their
understanding of how to configure and manage name servers running BIND9.
Attendees should have some experience of running a name server and be familiar
with DNS jargon for resource records, as well as the syntax of zone files and
named.conf.
This tutorial will answer the question, "I've set up master (primary) and slave
(secondary) name servers. What else can I do with the name server?"
Topics include:
-
The BIND9 Logging Subsystem
-
Getting the most from the name server's logs
-
Managing the name server with rndc
-
Configuring split DNS: internal and external versions of a domain
-
Using the views mechanism of BIND9 to implement split DNS
-
Setting up an internal root server
-
Securing the name server
-
Running it chroot()ed
-
Using access control lists
-
Preventing unwanted access
-
Dynamic DNS (DDNS)
-
Dynamic updates with nsupdate
-
IPv6
-
Resolving and answering queries with IPv6
-
Setting up A6/DNAME chains and AAAA records to resolve IPv6 addresses
-
The Lightweight Resolver Daemon, lwresd
-
Secure DNS (DNSSEC)
-
Using Transaction Signatures (TSIG)
-
How to sign zones with dnssec-keygen and dnssec-signzone
Jim Reid (M8) started using a
PDP11/45 running
V7 Unix 21 years ago and has been working with Unix systems ever since. He
worked for three years at Origin on behalf of Philips Electronics where he wrote
a DNS management system and designed, built and ran the DNS infrastructure for
the corporate network, one of the biggest in the world. He has over a decade's
experience in writing and teaching training courses ranging from kernel
internals to system administration and network security to DNS administration.
He's a frequent speaker at conferences and workshops in Europe and the US. His
book on DNS Administration with BIND9 will be published in late 2001 or early
2002.
M9 Oracle Backup and
Recovery
W. Curtis Preston, Storage Designs
Who should attend: System administrators and DBAs who are
responsible for the backup and recovery of one or more Oracle databases. NT
engineers and UNIX administrators will both benefit from the Oracle architecture
and recovery sections of this tutorial. We'll briefly discuss oraback.sh, a
Bourne shell backup script for Oracle.
This tutorial will explain everything administrators need to know to begin
backing up and recovering their Oracle 7 or 8 database. We'll cover the basics
of Oracle architecture in sysadmin terms, including all of the backup and
recovery options for Oracle. We'll look at live demonstrations of both backup
and recovery, including the 30 possible steps of an Oracle recovery. If you'd
like to perform the backup and recovery demonstrations along with the
instructor, email curtis@backupcentral.com for instructions at least one
week prior to the class.
Topics include:
-
Oracle architecture
-
The power user's view
-
The DBA's view
-
Physical backups
-
Managing the archived redologs
-
Logical backups
-
Backup demonstrations
-
Recovery demonstrations
W. Curtis Preston (M9, T11, T15) has been specializing
in backup and recovery for over seven years and has designed, implemented, and
audited enterprisewide backup and recovery systems for many Fortune 500 and
e-commerce companies. His O'Reilly & Associates book, UNIX Backup &
Recovery, has sold over 20,000 copies, and he writes a regular column for
UnixReview online and SysAdmin magazine. Curtis's Web address is
https://www.backupcentral.com, and he can be reached at curtis@backupcentral.com.
M10 Apache 2--What's New? What's Cool?
What's Hot? NEW
Jan Säll, Irial Ltd
Who should attend: System administrators and developers who want
to learn more about Apache configuration and the changes in Apache 2, and people
who want to write Apache modules. Participants should have prior knowledge of
the Apache 1.3 server and module APIs.
Apache server version 2 will further increase the portability of Apache server.
You will leave this tutorial with all the information you need to configure and
test the new Apache.
Topics include:
-
Configuring the new multiprocessing modules (MPMs)
-
Configuring the cgid daemon
-
Using Reliable Piped Logs
-
Programming the new API
-
Using Apache Portable Runtime
-
Writing and configuring the new filtering I/O
Jan Säll (M10, M14) is a leading
UNIX consultant
operating both in Sweden and internationally. He is currently operating his own
company, Irial which provides advanced UNIX and network consultancy. Mr. Saell
is currently the chairman of EurOpen.SE, and he has been working in the UNIX
environment since 1983.
M11 Introduction to Domain Name System
Administration
William LeFebvre, CNN Internet Technologies
Who should attend: System or network administrators who have been
exposed to the Domain Name System only as users. A basic understanding of the IP
protocols, TCP and UDP, data encapsulation, and the seven-layer model will be
beneficial.
DNS, the primary method the Internet uses to name and number machines, is used
to translate names like "www.usenix.org" into addresses like 131.106.3.253. Any
site that is serious about joining the Internet community will need to
understand how to configure and administer DNS.
This tutorial will describe the basic operation of DNS and will provide
instructions and guidelines for the configuration and operation of DNS on UNIX
platforms using the BIND software distribution. This class is designed for the
beginner and is intended to provide a foundation for the tutorial on
"Intermediate Topics in Domain Name System Administration."
Topics include:
-
DNS and BIND
-
The DNS Name Hierarchy
-
The four components of DNS
-
Iterative vs. recursive querying
-
Essential resource records: SOA, A, PTR, CNAME, NS
-
Zone transfers and secondaries
-
Vendor-specific differences
William LeFebvre (M11, M15) has been
using UNIX
and Internet technologies since 1983. He has written many articles on UNIX,
networking, and systems administration issues. Currently he writes the monthly
"Daemons & Dragons" column for UNIX Review. William is the editor of
the SAGE series "Short Topics in System Administration." He has taught tutorials
since 1989 for such organizations as USENIX, the Sun User Group (SUG), MIS
Training Institute, IT Forum, and Great Circle Associates, and he is a certified
Cisco Systems Instructor. William is the primary programmer for the popular UNIX
utility top and has contributed to several widely used UNIX packages, including
Wietse Venema's logdaemon package. He can be reached at wnl@groupsys.com or via
https://www.groupsys.com/.
M12 Sendmail and
Security
Gregory Neil Shapiro, Sendmail, Inc.
Who should attend: UNIX administrators who are already familiar
with configuring and administering sendmail and who want to learn how to convert
to sendmail 8.11 or 8.12, or who want to understand sendmail security better,
particularly on firewalls and other similar systems.
Sendmail is a powerful Mail Transport Agent that can be configured for many
different environments, from firewalls through workstation mail servers. These
environments have different security requirements. Sendmail can also be used to
secure the e-mail infrastructure at your site using SMTP authentication and TLS
authentication and encryption.
Topics include:
-
How to configure sendmail on systems that have special security requirements,
such as firewalls
-
Securing e-mail infrastructure using SMTP authentication and TLS authentication
and encryption
-
Running sendmail without set-user-ID permissions
-
Running sendmail in a "chroot"ed jail
-
How and when to relax sendmail's file security checks
Gregory Neil Shapiro (M12) began his professional
career as a system administrator for Worcester Polytechnic Institute (WPI) after
graduating from WPI in 1992. During his tenure as senior UNIX system
administrator, he became involved with beta testing the BIND name server, the
sendmail mail transfer agent, and other UNIX utilities such as emacs and screen.
He contributed the secure zones functionality included in BIND 4.9.X. When
presented with the opportunity to join Sendmail, Inc., he packed his bags and
headed west. As lead engineer at Sendmail, Inc., he has continued to support the
open source version while working on Sendmail Pro and Sendmail Switch, the
commercial versions.
M13 Management 101—The
Basics
Stephen Johnson and Dusty White, Consultants
Who should attend: Newly promoted technical managers and those who
expect promotion in the near future.
You've done well at your technical job and have been asked to take on some
management responsibility. What do you need to succeed as a manager?
This class and the accompanying "Management 102" will orient you, introduce you
to the skills you will need to be most effective, and suggest ways you can guide
your own growth as a manager. (N.B.: The tutorial "Communicating with Everyone"
is highly recommended, but not essential.)
Topics include:
-
How to find out what your job really is
-
Developing a new definition of job satisfaction and success
-
Delegation and coaching
-
Developing your people
-
Performance reviews
-
Why being right is not enough
-
Common mistakes technical managers make
Stephen Johnson (M13, M17) has been a
technical manager on and off for nearly two decades, in both large and small
companies. At AT&T, he is best known for writing Yacc, Lint, and the
Portable C Compiler. He served as the head of the UNIX Languages Department at
AT&T's Summit Labs. He has also been involved in a number of Silicon Valley
startup companies. He served for ten years on the USENIX Board of Directors,
four of them as president. He presented an invited talk on management at LISA
three years ago, he has taught USENIX tutorials on technical subjects, and he
has led management training seminars at LISA and the USENIX Annual Conference,
as well as at Transmeta.
Dusty White (M13, M17) was an early
employee of Adobe, where she served in a variety of managerial positions. She
now works as a management consultant in Silicon Valley, where she acts as a
trainer, coach, and troubleshooter for technical companies. She has presented
tutorials at LISA and the USENIX Annual Technical Conferences.
M14 Cool Apache Modules and Stuff You Can
Do with Them NEW
Jan Säll, Irial Ltd
Who should attend: System administrators who wants to know more
about how to configure different modules and increase the use, and speed of
their Web servers.
This tutorial will cover the Apache module APIs, focusing on how to configure
them. We will give an overview of available modules and then examine a number of
modules and their configurations in more detail. Attendees should leave this
tutorial with good ideas for using Apache modules.
Topics include:
-
Using mod_alias for redirection/rewriting
-
The more complex and capable mod_rewrite
-
Authentifications with e.g., mod_auth_mysql
-
Handling secure connections with mod_ssl
-
Speeding up your CGIs with mod_perl
-
Creating dynamic Web contents with mod_php
-
Creating fast CGI processing with mod_fastcgi
Jan Säll (M10, M14) is a leading
UNIX consultant
operating both in Sweden and internationally. He is currently operating his own
company, Irial which provides advanced UNIX and network consultancy. Mr. Saell
is currently the chairman of EurOpen.SE, and he has been working in the UNIX
environment since 1983.
M15 Intermediate Topics in Domain Name
System Administration
William LeFebvre, CNN Internet Technologies
Who should attend: Network administrators with a basic
understanding of DNS and its configuration who need to learn how to create and
delegate subdomains, and administrators planning to install BIND8. Attendees are
expected either to have prior experience with DNS, including an understanding of
basic operation and zone transfers, or to have attended the "Introduction to
Domain Name System Administration" tutorial.
Attendees will move beyond the basics into a more thorough understanding of the
overall design and implementation of DNS.
Topics include:
-
Subdomains and delegation
-
Resource records: NS, RP, MX, TXT, AAAA
-
Migration to BIND8
-
DNS management tools
-
DNS design
-
DNS and firewalls
William LeFebvre (M11, M15) has been
using UNIX
and Internet technologies since 1983. He has written many articles on UNIX,
networking, and systems administration issues. Currently he writes the monthly
"Daemons & Dragons" column for UNIX Review. William is the editor of
the SAGE series "Short Topics in System Administration." He has taught tutorials
since 1989 for such organizations as USENIX, the Sun User Group (SUG), MIS
Training Institute, IT Forum, and Great Circle Associates, and he is a certified
Cisco Systems Instructor. William is the primary programmer for the popular UNIX
utility top and has contributed to several widely used UNIX packages, including
Wietse Venema's logdaemon package. He can be reached at wnl@groupsys.com or via
https://www.groupsys.com/.
M16 System and Network Monitoring
NEW
John Sellens, Certainty Solutions
Who should attend: Network and system administrators interested in
real-life, practical, network-based monitoring of their systems and networks.
Participants should understand the fundamentals of networking and computing and
network components and have some familiarity with UNIX and scripting languages.
This tutorial provides an introduction to system and network monitoring and a
review of effective tools and applications that can be used for monitoring. It
will introduce the concepts and functions of monitoring systems, describe the
Simple Network Management Protocol (SNMP) and SNMP-based tools, and provide
introductions to and discussion of some of the most popular monitoring tools.
The emphasis will be on the practical, and the tutorial will provide examples of
easy-to-implement monitoring techniques.
Topics include:
-
Monitoring: goals, techniques, reporting
-
SNMP: the protocol, reference materials, relevant RFCs
-
Introduction to SNMP MIBs (Management Information Bases)
-
SNMP tools and libraries
-
Security concerns when using SNMP
-
Monitoring applications
-
Special situations: remote locations, firewalls, etc.
-
Monitoring implementation roadmap
Participants should leave the tutorial able to start using a number of
monitoring systems and techniques that will improve their ability to manage and
maintain their systems and networks.
John Sellens (M16) has been involved in system and
network administration since 1986 and is the author of several related USENIX
papers and a number of ;login: articles, including the "On Reliability"series
and SAGE booklet. He has a Master's degree in Computer Science from the
University of Waterloo, and is a Chartered Accountant. He is currently the
General Manager for CertaintySolutions (formerly known as GNAC) in Toronto.
Prior to joining Certainty, John was the Director of Network Engineering at
UUNET Canada, and was a staff member in computing and information technology at
the University of Waterloo for 11 years.
M17 Management
102--Empowerment
Steve Johnson and Dusty White, Consultants
Who should attend: New technical managers or those who expect to
be managers soon. (This is a companion tutorial to "Management 101." The
tutorial on "Communicating with Everybody" is also recommended, but not
required.)
Many managers report that although their job seemed very powerful before they
stepped into it, it doesn't seem that way now. This tutorial offers practical
techniques that allow people to empower themselves and others. True empowerment
comes from within and can be developed even in a hostile environment. Empowering
yourself also helps you empower your employees and your boss.
Topics include:
-
A theory of power and empowerment
-
How to empower yourself, or, better said, to experience how empowered you
already are
-
Common disempowering mistakes and how to remain empowered in spite of them
-
Empowerment and trust
-
How to gain and keep agreement
-
Techniques for gaining and increasing trust
Stephen Johnson (M13,
M17) has been a
technical manager on and off for nearly two decades, in both large and small
companies. At AT&T, he is best known for writing Yacc, Lint, and the
Portable C Compiler. He served as the head of the UNIX Languages Department at
AT&T's Summit Labs. He has also been involved in a number of Silicon Valley
startup companies. He served for ten years on the USENIX Board of Directors,
four of them as president. He presented an invited talk on management at LISA
three years ago, he has taught USENIX tutorials on technical subjects, and he
has led management training seminars at LISA and the USENIX Annual Conference,
as well as at Transmeta.
Dusty White (M13,
M17) was an early
employee of Adobe, where she served in a variety of managerial positions. She
now works as a management consultant in Silicon Valley, where she acts as a
trainer, coach, and troubleshooter for technical companies. She has presented
tutorials at LISA and the USENIX Annual Technical Conferences.
|