|  | 
| TRAINING 
Overview | 
Tuesday | Wednesday | Thursday | Friday | Saturday | 
By Instructor
 
T1 
Advanced Perl Programming| Tuesday, May 30, 2006 |  
| Full-Day Tutorials |  Tom Christiansen, Consultant
 
Who should attend: Anyone with a journeyman-level knowledge of Perl programming who wants to hone Perl skills. This class will cover a wide variety of advanced topics in Perl, including
    many insights and tricks for using these features effectively. After
    completing this class, attendees will have a much richer understanding of
    Perl and will be better able to make it part of their daily routine.
     
Topics include:
 
Tom Christiansen (T1) has been involved with Perl since day zero of its initial public releaseSymbol tables and typeglobs
	
	Symbolic references
	Useful typeglob tricks (aliasing)
	Modules
	
	Autoloading
	Overriding built-ins
	Mechanics of exporting
	Function prototypes
	References
	
	Implications of reference counting
	Using weak references for self-referential data structures
	Autovivification
	Data structure management, including serialization and persistence
	Closures
	Fancy object-oriented programming
	
	Using closures and other peculiar referents as objects
	Overloading of operators, literals, and more
	Tied objects
	Managing exceptions and warnings
	
	When die and eval are too primitive for your taste
	The use warnings pragma
	Creating your own warnings classes for modules and objects
	Regular expressions
	
	Debugging regexes
	qr// operator
	Backtracking avoidance
	Interpolation subtleties
	Embedding code in regexes
	Programming with multiple processes or threads
	
	The thread model
	The fork model
	Shared memory controls
	Unicode and I/O layers
	
	Named Unicode characters
	Accessing Unicode properties
	Unicode combined characters
	I/O layers for encoding translation
	Upgrading legacy text files to Unicode
	Unicode display tips
	  in 1987.  Author of several books on Perl,
including The Perl Cookbook and Programming Perl from O'Reilly, Tom is
also a major contributor to Perl's online documentation.  He holds
undergraduate degrees in computer science and Spanish and a Master's in
computer science.  He now lives in Boulder, Colorado. 
 T2 Solaris 10 Performance, Observability, & Debugging
 James Mauro and Richard McDougall, Sun Microsystems
 
Who should attend: Anyone who supports or may support Solaris 10 machines.
 This one-day tutorial will cover the tools and utilities available
in Solaris 10 for understanding system and application behavior.
An overview of the various tools will be followed by a
drill-down on the uses of and methodology for applying the tools
to resolve performance issues and pathological behavior, or
simply to understand the system and workload better. 
 
Topics include: 
 
James Mauro (T2) is a Senior Staff Engineer in the Performance and Availability Engineering group atSolaris 10 features overview
Solaris 10 tools and utilities
	
	The conventional stat tools (mpstat, vmstat, etc.)
	The procfs tools (ps, prstat, map, pfiles, etc.)
	lockstat and plockstat
	Using kstat
	Dtrace, the Solaris dynamic tracing facility
	Using mdb in a live system
	Understanding memory use and performance
Understanding thread execution flow and profiling
Understanding I/O flow and performance
Looking at network traffic and performance
Application and kernel interaction
Putting it all together
  Sun Microsystems. Jim's
current interests and
activities are centered on benchmarking Solaris 10 performance,
workload analysis, and tool development. This work includes Sun's
new Opteron-based systems and multicore performance on Sun's Chip
Multithreading (CMT) Niagara processor. Jim resides in Green Brook,
New Jersey, with his wife and two sons. He spent most of his spare
time in the past year working on the second edition of Solaris
Internals. Jim co-authored the first edition of Solaris Internals
with Richard McDougall and has been writing about Solaris in various
forums for the past eight years. 
Richard McDougall (T2), had he lived 100 years ago, would have had the hood
open on the first four-stroke  internal combustion gasoline-powered
vehicle, exploring new techniques for making improvements. He would be
looking for simple ways to solve complex problems and helping
pioneering owners understand how the technology works to get the most
from their new experience. These days, McDougall uses technology to
satisfy his curiosity. He is a Distinguished Engineer at Sun
Microsystems, specializing in operating systems technology and system
performance. He is co-author of Solaris Internals (Prentice Hall PTR, 2000) and Resource Management (Sun Microsystems Press, 1999). 
T3 Building a Logging Infrastructure and Log Analysis for Security NEW!Abe Singer, San Diego Supercomputer Center
 
Who should attend: System, network, and security administrators who want to be able to separate the wheat of warning information from the chaff of normal activity in their log files.
 
This tutorial will show the importance of log files for maintaining
system security and general well-being, offer some strategies for building
a centralized logging infrastructure, explain some of the types of
information that can be obtained for both real-time monitoring and
forensics, and teach techniques for analyzing log data to obtain useful
information.
 
The devices on a medium-sized network can generate millions of lines
of log messages a day. Although much of the information is normal activity,
hidden within that data can be the first signs of an intrusion, denial of
service, worms/viruses, and system failures. Getting a handle on your log
files can help you run your systems and networks more effectively and
can provide forensic information for post-incident investigation.
 
Topics include:
 
Abe Singer (T3, R4) is a Computer Security Researcher in the Security Technologies
Group at the San Diego SupercomputerProblems, issues, and scale of handling log information
Generating useful log information: improving the quality of
	your logs
Collecting log information
	
	syslog and friends
	Building a log host
	Integrating MS Windows into a UNIX log architecture
	Storing log information
	
	Centralized log architectures
	Log file archiving
	Log analysis
	
	Log file parsing tools
	Data analysis of logfiles (e.g., baselining)
	Attack signatures and other interesting things	to look for in your logs
	Legal issues
  Center. In his operational security
responsibilities, he participates in incident response and forensics
and in improving the SDSC logging infrastructure.  His research is in
pattern analysis of syslog data for data mining. He is co-author of
of the SAGE booklet Building a Logging Infrastructure and author of a forthcoming O'Reilly book on log analysis. 
T4 Hands-on Linux Security Class: From Hacked to Secure in Two Days (Day 1 of 2) Rik Farrow, Security Consultant
 
Who should attend: System administrators of Linux and other UNIX systems; anyone who runs a public UNIX server.
 
We will work with systems that have been hacked and include 
hidden files, services, and evidence of the intrusion. You will 
learn how to uncover exploited systems and properly secure them.
You will perform hands-on exercises with dual-use tools to replicate
what intruders do, as well as tools dedicated to security. The tools
vary from the ordinary, such as find and strings, to less familiar
but important ones such as lsof, various scanners, sniffers, and 
the Sleuth Kit.
 
The lecture portion of this class covers the background you need to 
understand UNIX security principles, TCP/IP, scanning, and popular
attack strategies, as well as defenses for networks and individual
systems. The class will end with a discussion of the use of patching 
and vulnerability assessment tools.
 
Day 1 topics begin with a quick assessment of a system, looking for
obvious signs of intrusion. We will then cover TCP/IP and
how it relates to different types of attacks and scanning, to learn
 what an attacker can "see" from the network and the limitations of
certain styles of attack. The inner workings of buffer overflows,
with examples, graphically illustrate how these attacks work, and
what defenses against them exist. Day 1 concludes with an examination
of a buggy Web script, how to audit CGI scripts quickly, and what
can be done to prevent this attack from succeeding.
 
Day 2 begins with a look at passwords, including a quick spin with
John the Ripper. We examine suid files as potential backdoors
and show how to bypass the common defense against these
backdoors. Network services provide the necessary access for attackers,
so we practice determining exactly what services are necessary and
how UNIX systems should be hardened. Tools that look for rootkits,
often the most subtle way for an attacker to maintain a presence,
have their weak points. We learn about rootkits and how to
search for them. Then we look at the output of Sleuth Kit to discover
what happened, and when, on a poorly secured system. Finally, we look
at other defensive software, including firewalls (netfilter), patching,
and vulnerability scanning.
 
Class exercises require that you have an X86-based laptop
computer that can be booted from a CD.  Students will receive a 
live CD (KNOPPIX) which contains the tools, files, and exercises 
required for the course. You can download KNOPPIX yourself
(v3.9) and see whether your laptop is supported. Some people have
come without laptops and teamed up with friendly laptop users.
 
Exercises include:
 
DAY 1:
 
	DAY 2:Searching for hidden files
	TCP/IP and its relation to probes and attacks
	Uses of ARP and ethereal
	hping2 probes
	nmap (connect and SYN scans)
	Buffer overflows in sample C programs
	Weaknesses in Web scripts (using a Perl example)
 
	Rik Farrow (T4, W4) provides UNIX and Internet security consulting and training. He has beenJohn the Ripper, password cracking
	Misuses of suid shells, finding backdoors
	Disabling network services
	Searching for evidence of rootkits
	Sleuth Kit (looking at intrusion timelines)
	netfilter
  working with UNIX system security since 1984 and with TCP/IP networks since 1988. He has taught at the IRS, Department of Justice, NSA, NASA, US West, Canadian RCMP, Swedish Navy, and for many U.S. and European user groups. He is the author of UNIX System Security, published by Addison-Wesley in 1991, and System Administrator's Guide to System V (Prentice Hall, 1989). Farrow is the editor of ;login: and a network security columnist for Network magazine. Rik lives with his family in the high desert of northern Arizona and enjoys hiking and mountain biking when time permits. 
T5 Reliable, Fast, Lightweight Data Storage: A Berkeley DB Tutorial NEW!Margo Seltzer, Sleepycat Software
 
Who should attend: Application architects and developers
involved in the design and implementation of data storage solutions for 
real-world applications. Software development and program managers who 
are interested in understanding the services provided by Berkeley DB will 
also benefit from this tutorial. Engineers familiar with Berkeley DB, as 
well as those who have not yet used this product, will come away from this 
tutorial with useful, practical information, sample code, and Berkeley DB 
performance tuning tips. 
 
Berkeley DB is the most widely used developer database in the world. 
It is used by many open source and mission-critical proprietary 
applications that require a lightweight, fast, reliable, recoverable,
scalable data storage solution. Short-circuit your learning curve or
increase the effectiveness of your existing use of Berkeley DB by 
attending this tutorial. 
 
We will review the underlying concepts, API, and implementation
recommendations for application developers using Berkeley DB. Additionally,
we will focus on performance tuning
options and usage scenarios.
 
Topics include:
 
Margo Seltzer (T5) is a Herchel Smith Professor of Computer Science,
the Associate Dean for Computer ScienceDatabases and access methods
Managing key/data pairs
Using cursors
Using secondary indices
Database environments
Application design
Transactions, locking, loggin, backup and recovery
Berkeley DB database administration
Application tuning
Replication overview
Berkeley DB XML overview
Berkeley DB Java Edition overview
Berkeley DB access methods
	
Berkeley DB subsystems
	
	Logging
	Locking
	Transactions
	Performance tuning
	
	Setting page and cache sizes
	Tuning logging and locking parameters
	Managing deadlock detection methods and timeout values
	  and Engineering, and
a Harvard College Professor in the Division of Engineering and 
Applied Sciences at Harvard University. Her research interests 
include file systems, databases, and transaction processing 
systems. She is the author of several widely used software 
packages, including database and transaction libraries and the 
4.4BSD log-structured file system. Dr. Seltzer is also a founder 
and CTO of Sleepycat Software, the makers of Berkeley DB. She 
is a Sloan Foundation Fellow in Computer Science and a Bunting Fellow,
and was the recipient of the 1996 Radcliffe Junior Faculty 
Fellowship, the University of California Microelectronics 
Scholarship. She is recognized as an outstanding teacher and 
won the Phi Beta Kappa teaching award in 1996 and the Abrahmson 
Teaching Award in 1999. Dr. Seltzer received an A.B. degree in 
applied mathematics from Harvard/Radcliffe College in 1983 and a 
Ph.D. in computer science from the University of California,
Berkeley, in 1992. |  
 
| Wednesday, May 31, 2006 |  
| Full-Day Tutorials |  
| W1 Ajax and Advanced Responsive WebApp Development NEW! Alex Russell, JotSpot, Inc. (and Project Lead for the Dojo Toolkit)
 
Who should attend: Developers who are familiar with basic Web application development practice and standards (HTML, CSS, and basic JavaScript) who are 
looking to add Ajax and other rich and responsive interface elements to 
new or existing Web applications. Familiarity with HTTP, the DOM, and 
XML are welcome but not required. The tutorial will include many 
code examples of professional-quality idiomatic JavaScript, which will 
be explained.
 
Web applications development techniques have continued to advance at a 
rapid clip in server-side environments, but for several years the apparent limitations of browser technology have hindered the creation of richer experiences for end users. "Ajax" is a Web development technique for employing the latent capabilities of modern browsers, which can now be fully exploited as legacy browsers are retired. These 
capabilities let developers provide better user interactions, expand 
the uses of the browser as a platform, and make new types of 
in-browser apps possible without plugins.
 
This tutorial focuses on augmenting existing applications with Ajax, and 
the trade-offs involved. A strong emphasis is given to testing, 
interoperability, and debugging. Tools for easing development and 
debugging are also presented and used.
 
Attendees will leave this tutorial with a firm grasp of the underlying technologies of Ajax 
and where to turn when the going gets rough in developing Ajax 
applications. Examples and the slides will be made available online.
 
Topics include:
 
	Alex Russell (W1)   is a Senior Software Engineer at JotSpot and Project Lead for 
the Dojo Toolkit. Dojo isAjax: Good? Bad? Irrelevant?Ajax basics
		HTTP fundamentals
		The XMLHTTP object, and alternatives to it
		 What to send over the wire, and when: HTML, XML, JSON, or plain text?
	JavaScript and the DOMDefensive client-side development
		Accessibility concerns and techniques
		Browser support "gotchas"
		 DebuggingDissection of common Ajax apps w/ debugging toolsToolkits to helpAdvanced JS and visual effects
		
		Drag-and-drop
		Animation
		JSON-RPC
		Web services
		  an Open Source library that helps Web 
application developers spend more time building great experiences and 
less time fighting browser quirks. Prior to assisting in the 
development of Dojo, Alex was primary author of the netWindows DHTML 
framework. He has been wrestling browsers into relative submission 
since the late '90s. 
W2 Introduction to VMware ESX Server NEW!John Gannon and John Arrasjid, VMware
 Who should attend: x86 sysadmins who want to dramatically improve the way
they manage systems.
 
Do any of these complaints sound familiar?
 
	Our datacenter is out of power/space/network infrastructure and adding new servers is a struggle.Our developers ask us for new servers constantly and we can't keep up with the demand.It takes us days or weeks to procure, rack, stack, and configure a new box.Our yearly disaster recovery simulations are hardly ever successful because the DR site has a different hardware configuration than the production site.Our DR site is too expensive to operate because it is an exact replica of our production environment.We can only do hardware upgrades late at night and on the weekends. 
If yes, VMware ESX Server can help by:
 
	In this tutorial, we will provide an overview of virtual machine 
technology
as well as the features and functionality of ESX Server.  Installation,
configuration, and best practices will be the focus of the session.reducing your x86 server count by up to 90%supporting up to 80 x86-based OS instances running simultaneously (Linux, FreeBSD, Netware, and Windows) on a single physical machinefreeing up valuable rack space, SAN, and networking portsproviding instantaneous rollback to a "known good configuration" toassist in software development and testing allowing you to provision a new x86 server in minutes instead of weeksenabling Disaster Recovery despite having different hardware (and less of it) at your DR siteeliminating downtime traditionally associated with hardware maintenance 
Topics include:
 
	John Gannon (W2, R5) has over ten years of experience architecting and
implementing UNIX, Linux,Virtual infrastructure and ESX Server overviewESX Server installation and configuration
Virtual Machine (VM) creation and operation
	Installing VMs from scratchUsing templates and cloning to provision VMs in minutes
Operations and administration
	Sizing the environmentAutomating tasks via scriptingOperations best practicesEnabling disaster recovery and business continuity with ESX ServerMigration strategies and the P2V process (Physical-to-Virtual)
Advanced configuration
	SANNetworkingPerformance TuningSecurity  and Windows infrastructures. John has
worked in network engineering, operations, and professional services
roles with various companies including Sun Microsystems, University
of Pennsylvania, Scient Corporation, and FOX Sports. John's current
work at VMware involves delivering server consolidation, disaster
recovery, and virtual infrastructure solutions to FORTUNE 500
clients. 
John Arrasjid (W2, R5)  has 20 years experience in the computer science field. His experience includes work with companies such as AT&T, Amdahl, 3Dfx
Interactive, Kubota Graphics, Roxio, and his own company, WebNexus
Communications, where he developed consulting practices and built a cross-platform IT team. John is currently a senior member of the VMware Professional Services
Organization as a Consulting Architect. John has developed a number of PSO
engagements, including Performance, Security, and Disaster Recovery and
Backup. 
W3 Implementing [Open]LDAP Directories
Gerald Carter, Samba Team/Hewlett-Packard
 9:00 a.m.5:00 p.m.
 
Who should attend: Both LDAP directory administrators and architects. The focus is 
on integrating standard network services with LDAP directories. The 
examples are based on UNIX hosts and the OpenLDAP directory server 
and will include actual working demonstrations throughout the course.
 
System administrators today run a variety of directory services, 
although these are referred to by names such as DNS and NIS. The 
Lightweight Directory Access Protocol (LDAP) is the successor to 
the X.500 directory and has the promise of allowing administrators 
to consolidate multiple existing directories into one.
 
Topics include:
 
Gerald Carter (W3, R7) has been a member of the Samba Development Team
since 1998. He has been developing,Replacing NIS domains
Integration with Samba file and print servers
Integrating MTAs such as Sendmail and Postfix
Creating address books for mail clients
Managing user access to HTTP and FTP services
Integrating with DHCP and DNS servers
Scripting with the Net::LDAP Perl module
Defining custom attributes and object classes
  writing about, and teaching on open source since the late '90s. Currently employed by
Centeris as a Samba and open source developer, Gerald has written
books for SAMS Publishing and for O'Reilly Publishing.  
 
W4 Hands-On Linux Security Class: From Hacked to Secure in Two Days (Day 2 of 2) 
Rik Farrow, Security Consultant
 9:00 a.m.5:00 p.m.
 
We will work with systems that have been hacked and include 
hidden files, services, and evidence of the intrusion. You will 
learn how to uncover exploited systems and properly secure them.
You will perform hands-on exercises with dual-use tools to replicate
what intruders do, as well as tools dedicated to security. The tools
vary from the ordinary, such as find and strings, to less familiar
but important ones such as lsof, various scanners, sniffers, and 
the Sleuth Kit.
 
The lecture portion of this class covers the background you need to 
understand UNIX security principles, TCP/IP, scanning, and popular
attack strategies, as well as defenses for networks and individual
systems. The class will end with a discussion of the use of patching 
and vulnerability assessment tools.
 
Day 2 begins with a look at passwords, including a quick spin with
John the Ripper. We examine suid files as potential backdoors
and show how to bypass the common defense against these
backdoors. Network services provide the necessary access for attackers,
so we practice determining exactly what services are necessary and
how UNIX systems should be hardened. Tools that look for rootkits,
often the most subtle way for an attacker to maintain a presence,
have their weak points. We learn about rootkits and how to
search for them. Then we look at the output of Sleuth Kit to discover
what happened, and when, on a poorly secured system. Finally, we look
at other defensive software, including firewalls (netfilter), patching,
and vulnerability scanning.
 
Class exercises require that you have an X86-based laptop
computer that can be booted from a CD.  Students will receive a 
live CD (KNOPPIX) which contains the tools, files, and exercises 
required for the course. You can download KNOPPIX yourself
(v3.9) and see whether your laptop is supported. Some people have
come without laptops and teamed up with friendly laptop users.
 
Exercises include, for Day 2:
 
	Rik Farrow (T4, W4) provides UNIX and Internet security consulting and training. He has beenJohn the Ripper, password cracking
	Misuses of suid shells, finding backdoors
	Disabling network services
	Searching for evidence of rootkits
	Sleuth Kit (looking at intrusion timelines)
	netfilter
  working with UNIX system security since 1984 and with TCP/IP networks since 1988. He has taught at the IRS, Department of Justice, NSA, NASA, US West, Canadian RCMP, Swedish Navy, and for many U.S. and European user groups. He is the author of UNIX System Security, published by Addison-Wesley in 1991, and System Administrator's Guide to System V (Prentice Hall, 1989). Farrow is the editor of ;login: and a network security columnist for Network magazine. Rik lives with his family in the high desert of northern Arizona and enjoys hiking and mountain biking when time permits. 
W5 Issues in UNIX 
Infrastructure Design
Lee Damon, University of Washington
 
Who should attend: Anyone who is designing, implementing, or maintaining a UNIX environment with 2 to 20,000+ hosts. System administrators, architects, and managers who need to maintain multiple hosts with few admins.
 
This intermediate class will examine many of the background issues that
need to be considered during the design and implementation of a
mixed-architecture or single-architecture UNIX environment. It will
cover issues from authentication (single sign-on) to the Holy Grail of
single system images.
 
This class won't implement a "perfect solution," as each site has
different needs. It will try to raise all the questions you should
ask (and answer) while designing the solution that will meet your
needs. We will look at some freeware and some commercial solutions,
as well as many of the tools that exist to make a workable environment
possible. 
Topics include:
 
	Administrative domains: Who is responsible for what, and what can users do for themselves?
	Desktop services vs. farming: Do you do serious computation on the desktop, or do you build a compute farm?
	Disk layout: How do you plan for an upgrade? Where do things go?
	Free vs. purchased solutions: Should you write your own, or hire a consultant or company?
	Homogeneous vs. heterogeneous: Homogeneous is easier, but will it do what your users need?
	The essential master database: How can you keep track of what you have?
	Policies to make life easier
	Push vs. pull
	Getting the user back online in 5 minutes
	Remote administration: Lights-out operation; remote user sites; keeping up with vendor patches, etc.
	Scaling and sizing: How do you plan on scaling?
	Security vs. sharing: Your users want access to everything. So do the crackers . . .
	Single sign-on: How can you do it securely?
	Single system images: Can users see just one environment, no matter how many OSes there are?
	Tools: The free, the purchased, the homegrown
 
Lee Damon (W5) has a B.S. in Speech Communication from Oregon State University. He
has been a UNIX system administrator since 1985 and has been active in SAGE
since its inception. He assisted in developing a mixed AIX/SunOS environment
at IBM Watson Research and has developed mixed environments for Gulfstream
Aerospace and QUALCOMM. He is currently leading the development effort
for the Nikola project at the University of Washington Electrical Engineering
department. He is past chair of the SAGE Ethics and Policies working groups and he chaired LISA '04. 
W6 Linux System Administration
Joshua Jensen, Cisco Systems Inc.
 
Who should attend: System administrators who plan to implement Linux in a production environment. Attendees should understand the basics of system administration in a UNIX/Linux environment, i.e., user-level commands and TCP/IP networking. Both novice admins and gurus should leave the tutorial having learned something.
 
From a single server to a network of workstations, maintaining a Linux environment
can be a daunting task for administrators knowledgeable in other
platforms. Starting with a single server and ending with a
multi-server, 1000+-user environment, this tutorial will provide
practical information on how to use Linux in the real world. Attendees should leave the tutorial confident in their ability to set up and manage a secure Linux server and services. The tutorial will be conducted in an open manner that allows for question-and-answer interruptions.
 
Topics include (with an emphasis on security):
 
Installation issues
Boot loaders and system startup
Disk partitioning and LVM
Software RAID
The RPM package system
Networking
User management
Automated system installation
Network-based authentication
User accounts and management
Network services and xinetd
SSH: port tunneling, keys, tricks
New developments
 
Joshua Jensen (W6) has worked for IBM and Cisco Systems, and was Red Hat's
first instructor, examiner, and RHCE. He worked with Red Hat for four and a half
years, during which he wrote and maintained large parts of the Red Hat
curriculum: Networking Services and Security, System Administration,
Apache and Secure Web Server Administration, and the Red Hat Certified
Engineer course and exam. Joshua has been working with Linux since
1996 and finds himself having come full circle: he recently left IBM to work
with Red Hat Linux for Cisco Systems. In his spare time he dabbles in
cats, fish, boats, and frequent flyer miles. |  
 
| Thursday, June 1, 2006 |  
| Full-Day Tutorials |  
| R1 Administering Linux in Production Environments Æleen Frisch, Exponential Consulting
 
Who should attend: Both current Linux system administrators and
 administrators from sites considering converting to Linux or adding
Linux systems to their current computing resources. We will be focusing on the
administrative issues that arise when Linux systems are deployed
to address a variety of real-world tasks and problems arising from
both commercial and research-and-development contexts.
 
Topics include:
 
Æleen Frisch (R1, F1)  has been a system administrator for over 20 years. She currently
looksRecent kernel developmentsHigh-performance I/O
	
	Advanced filesystems and logical volumesDisk stripingOptimizing I/O performanceAdvanced compute-server environments
	BeowulfClusteringParallelization environments/facilitiesCPU performance optimization High availability Linux: fault-tolerance optionsEnterprise-wide authenticationFixing the security problems you didn't know you had (or, what's good
  enough for the researcher/hobbyist won't do for you)Automating installations and other mass operationsLinux in the office environment  after a pathologically heterogeneous network of UNIX and Windows
systems. She is the author of several books, including Essential
System Administration (now in its 3rd edition).  
 
R2 Solaris 10 Security Features WorkshopPeter Baer Galvin, Corporate Technologies, Inc.
 
Who should attend: Solaris systems managers and administrators interested in
the new security features in Solaris 10 (and features in previous Solaris
releases that they may not be using).
 
This course covers a variety of topics surrounding Solaris 10 and security.
Solaris 10 includes many new features, and there are new issues to consider
when deploying, implementing, and managing Solaris 10. This will be a workshop featuring instruction and practice/exploration.  Each student should have a laptop with wireless access for remote access into a Solaris 10 machine.
 
Topics include:
 
Peter Baer Galvin (R2, A2) is the Chief Technologist for Corporate Technologies, Inc., a systems integrator and VAR,Overview
N1 Grid Containers (a.k.a. Zones) (lab)
RBAC (lab)
Privileges (lab)
NFSv4
Flash archives and live upgrade
Moving from NIS to LDAP
Dtrace
FTP client and server enhancements
PAM enhancements
Auditing enhancements
BSM
Service Management Facility (lab)
Solaris Cryptographic Framework
Smartcard interfaces and APIs
Kerberos enhancements
Packet filtering
BART
  and was the Systems Manager for Brown University's Computer Science Department. He has written articles
for Byte and other magazines. He wrote the "Pete's Wicked World" and
"Pete's Super Systems" columns at SunWorld. He is currently
contributing editor for Sys Admin, where he manages the Solaris
Corner. Peter is co-author of the Operating Systems Concepts and Applied Operating Systems Concepts textbooks. As a consultant and trainer, Peter has taught tutorials on security and system administration and has given talks at many conferences and institutions on such topics as Web
services, performance tuning, and high availability. 
 
R3 Wide Area Storage Networking: Server Consolidation and Data Protection Over the WAN NEW!
|   |  
| Thursday Morning Half-Day Tutorials |  
|   |  Michael Cucchi, Cambridge Computer Services
 9:00 a.m.12:30 p.m.
 
Who should attend: System administrators, IT managers, and enterprise architects who are concerned with disaster recovery, data protection, server consolidation, and resource sharing over a WAN. This tutorial is a survey of the types
of solutions on the market today, with examples of when to choose one approach over another.
 
Storage networking over the WAN? Impossible, right? Bandwidth is too
expensive. WAN latency kills the applications. SAN replication and remote
backup are too expensive. 
 
That was yesterday. This is today. New technologies have emerged to address all of these challenges and the results are much better than you might think. This tutorial is a survey of the various technologies available for moving and accessing storage over the WAN. It
is divided into three sections. The first section focuses on backup and
restore over the WAN and describes solutions for sending backups off-site
over the WAN and for managing backups of branch offices. The second section
focuses on the various technologies for replicating live data between
sites. The third section focuses on accessing live storage over the WAN,
covering technologies such as Wide Area File Services (WAFS) and WAN
accelerators.
 
Topics include:
 
Michael Cucchi (R3)  has over 13 years of IT experience. He spent seven of those years as aRemote site backup techniques
Continuous Data Protection (CDP)
Storage encryption
Capacity optimized storage devices and WAN accelerators
Host-based vs. SAN-based vs. fabric-based replication
Filesystem vs. volume-level vs. application-level replication
Application fail-over
The impact of latency on storage-intensive applications
Compensating for WAN latencies
WAN accelerators
Wide Area File Services (WAFS)
Email server consolidation
  lead Linux/UNIX/Windows senior system admin and lead system
administrator for a major data center for the Federal Department of
Transportation. Michael did a two-year stint as a solution engineer for
Ammasso, where he helped launch the first RDMA Ethernet NIC. Mike is
currently a consultant for Cambridge Computer, a national integrator of
data protection and storage networking technologies. 
R4 Security Without Firewalls NEW!Abe Singer, San Diego Supercomputer Center
 9:00 a.m.12:30 p.m.
 
Who should attend: Administrators who want or need to explore strong, low-cost, scalable security without firewalls.
 
Good, possibly better, network security can be achieved without
relying on firewalls. The San Diego Supercomputer Center does not
use firewalls, yet managed to go almost 4 years without an intrusion.
Our approach defies some common beliefs, but it seems to work, and it
scales well.
 
"Use a firewall" is the common mantra of much security documentation,
and are the primary security "solution" in most networks.
However, firewalls don't protect against activity by insiders, nor
do firewalls provide protection against any activity that is allowed through
the firewall. And, as is true for many academic institutions, firewalls just
don't make sense in our environment. Weighting internal threats
equally with external threats, SDSC has built an effective, scalable,
host-based security model. The keys parts to our model are: centralized configuration
management; regular and frequent patching; and strong authentication
(no plaintext passwords). This model extends well to many environments beyond the academic.
 
Of course, we're not perfect, and last year we had a compromise as
part of a security incident that spanned numerous institutions.
However, firewalls would have done little if anything to have
mitigated that attack, and we believe our approach to security
reduced the scope of compromise and helped us to recover faster
than some of our peers.
 
In addition to a good security model and faster recovery, our system
administration costs scale well. The incremental cost of adding a
host to our network (beyond the cost of the hardware) is negligible,
as is the cost of reinstalling a host.
 
Topics include:
 
Abe Singer (T3, R4) is a Computer Security Researcher in the Security Technologies
Group at the San Diego SupercomputerThe threat perspective from a data-centric point of view
How to implement and maintain centralized configuration
  management using cfengine, and how to build reference systems
  for fast and consistent (re)installation of hosts
Secure configuration and management of core network services such as NFS, DNS, and SSH
Good system administration practices
Implementing strong authentication and eliminating use of
  plaintext passwords for services such as
  POP/IMAP
A sound patching strategy
An overview of last year's compromise, how we recovered, and what we learned
  Center. In his operational security
responsibilities, he participates in incident response and forensics
and in improving the SDSC logging infrastructure.  His research is in
pattern analysis of syslog data for data mining. He is co-author of
of the SAGE booklet Building a Logging Infrastructure and author of a forthcoming O'Reilly book on log analysis. 
R5 Server Consolidation and Containment Metholodology for Intel Environments NEW!
John Gannon and John Arrasjid, VMware
 9:00 a.m.12:30 p.m.
 
Who should attend: System administrators/architects and IT managers who will be responsible for planning and/or implementing server consolidation
in an x86 environment. The tutorial assumes basic familiarity with
server virtualization and software-based virtual machine technology.
 
Server sprawl is a serious problem in Wintel environments. Due to
a variety of factors, enterprises find themselves with large server
farms that operate at extremely low utilization rates, use an
excessive amount of datacenter resources, and are increasingly
costly to manage and support.
 
A compelling way to address these issues is by server consolidation
and containment through use of server virtualization technology.
Server consolidation and containment initiatives have significant
impact on an organization's people, process, and technology. Proper
assessment, planning, and execution of these initiatives are critical
to making them successful.
 
Topics include:
 
John Gannon (W2, R5) has over ten years of experience architecting and
implementing UNIX, Linux,Introduction
	
	Flavors of consolidation
	Motivations for consolidation (business and technical)
	Risks inherent in consolidation
	Assessment
	
	Defining metrics for success
	Tools and best practices for gathering performance and inventory data
	Identifying good and bad candidates for consolidation
	Planning
	
	Selecting the ideal target hardware platform(s)
	High availability and disaster recovery considerations
	Virtual machine allocation best practices
	Development of documentation and test plans
	Building
	
	Building momentum and mindshare for the consolidation
	Tools for migrating from Physical to Virtual (P2V)
	Managing
	
	Virtual infrastructure management tools
	Ongoing management considerations
	Server containment policies
	  and Windows infrastructures. John has
worked in network engineering, operations, and professional services
roles with various companies including Sun Microsystems, University
of Pennsylvania, Scient Corporation, and FOX Sports. John's current
work at VMware involves delivering server consolidation, disaster
recovery, and virtual infrastructure solutions to FORTUNE 500
clients. 
John Arrasjid (W2, R5) has 20 years experience in the computer science field. His experience includes work with companies such as AT&T, Amdahl, 3Dfx
Interactive, Kubota Graphics, Roxio, and his own company, WebNexus
Communications, where he developed consulting practices and built a cross-platform IT team. John is currently a senior member of the VMware Professional Services
Organization as a Consulting Architect. John has developed a number of PSO
engagements, including Performance, Security, and Disaster Recovery and
Backup. 
 
R6 UNIX on My Mind NEW!
|   |  
| Thursday Afternoon Half-Day Tutorials |  
|   |  Bill Cheswick, Lumeta
 1:30 p.m.5:00 p.m.
 
Who should attend: Anyone developing tools for UNIX or Linux, who wants to
gain a greater understanding of "the way things are done, and why that is
the right way."  This is not a tutorial for novices, but is for
people who want to fill out their understanding of the topics with philosophy,
examples, and war stories.
 
Attendees should have used UNIX, at least a bit, and have some programming
experience.  They will gain facility in using UNIX as a powerful and efficient
prototyping tool for a number of classes of problems and will gain insight into
the simplicity and power of the original design of UNIX.
 
Attendees will benefit more if they bring their own computers running some
version of UNIX or Linux, but you can team up with someone else.
 
Topics include:
 
Bill Cheswick (R6, F3) logged into his first computer in 1968. Seven years
later, he was graduated fromThe UNIX style of prototyping
Small instructional tasks in sysadmin, network admin, small languages, data mining of Internet mapping data, and HTML generation
Bourne shell and bash programming, awk, sed, etc.
Why real cats don't have options
Why /dev/null shouldn't be special
Why man pages are so important, and so hard to get right
  Lehigh University in 1975 with a degree
resembling Computer Science. Cheswick has worked on (and against) operating system security for
over 35 years. He has worked at Lehigh University and the Naval
Air Development Center in system software and communications. At
the American Newspaper Publishers Association/Research Institute
he shared his first patent for a hardware-based spelling checker,
a device clearly after its time. For several years he consulted at a variety of universities doing
system management, software development, communications design and
installation, PC evaluations, etc. In 1998, Ches starting the Internet Mapping Project with Hal Burch. This work became to core technology of a Bell Labs spin-off, Lumeta
Corporation, which explores the extent of corporate and government
intranets and checks for host leaks that violate perimeter policies.
Ches has pinged an active duty US nuclear attack submarine (distance,
66ms). Ches has a wide interest in science and medicine.  In his spare
time he reads technical journals, hacks on Mythtv and his home, and
develops exhibit software for science museums. He eats very plain
foodboring by even American standards. 
R7 Ethereal and the Art of Debugging Networks NEW!Gerald Carter, Samba Team/Hewlett-Packard
 1:30 p.m.5:00 p.m.
 
Who should attend: System and network administrators who are interested in 
learning more about the TCP/IP protocol and how network traffic 
monitoring and analysis can be used as a debugging, auditing, 
and security tool.  
 
The focus of this course is using the Ethereal protocol analyzer 
as a debugging and auditing tool for TCP/IP networks. System 
logs can turn out to be incomplete or incorrect when you're trying to track down 
network application failures. Sometimes the quickest, or the only,
way to find the cause is to look at the raw data on the 
wire. This course is designed to help you make sense of that data.
 
Topics include:
 
Introduction to Ethereal for local and remote network tracing
TCP/IP protocol basics
Analysis of popular application protocols such as DNS, DHCP, HTTP, NFS, CIFS, and LDAP
Security
How some kinds of network attacks can be recognized
 
Gerald Carter (W3, R7) has been a member of the Samba Development Team
since 1998. He has been developing, writing about, and teaching on open source since the late '90s. Currently employed by
Centeris as a Samba and open source developer, Gerald has written
books for SAMS Publishing and for O'Reilly Publishing.  
 
R8 Practical Project Management for Sysadmins and IT Professionals NEW!Strata Rose Chalup, Project Management Consultant
 1:30 p..m.5:00 p.m.
 
Who should attend: System administrators who want to stay hands-on as team leads or 
system architects and need a new set of skills with which to tackle bigger, 
more complex challenges. No previous experience with project management is 
required. Participants will get a no-nonsense grounding in methods that work 
without adding significantly to one's workload. After completing this tutorial, participants will be able to take an
arbitrarily daunting task and reduce it to a plan of attack that will be
realistic, lend itself to tracking, and have functional, documented goals. They will be able to give succinct and useful feedback to management on
overall project viability and timelines and easily deliver regular progress 
reports.
 
People who have been through traditional multi-day project management courses 
will be shocked, yet refreshed, by the practicality of our approach. To get the 
most out of this tutorial, participants should have some real-world project or 
complex task in mind for the lab sections.
 
This tutorial focuses on complementing your own organizational style
(or lack thereof) with a toolbox of ways to organize and manage complex
tasks without drowning in paperwork or clumsy, meeting-intensive methodologies. 
Also emphasized is how to bridge the gap between ad-hoc methods and the kinds of 
tracking and reporting traditionally trained managers will understand.
 
Topics include:
 
	Strata Rose Chalup (R8, F5)  began as a fledgling sysadmin in 1983 and
has been leadingQuick basics of project management
		
		The essentials you need to know
		How to map the essentials onto real-world projects
		Skill sets
		
		Defining success
		Chunking and milestoning
		Delegating
		Tracking
		Reporting
		Problem areas
		
		Teams, interactions among people
		The albatross project
		When to go deep and when to get "pointy-haired"
		When disaster strikes, should you scrap, or salvage?
		Project management tools
		
		What tools should do for you
		Leveraging the command line: UNIX PM
		Freeware PM tool options
		The only 15 minutes of MS Project you'll ever need
		  and managing complex IT projects for many years,
serving in roles ranging from Project Manager to Director of Network
Operations.  She has written a number of articles on management and
working with teams and has applied her management skills on various
volunteer boards, including BayLISA and SAGE. Strata has a keen interest
in network information systems and new publishing technologies and built
a successful consulting practice around being an avid early adopter of
new tools, starting with ncsa_httpd and C-based CGI libraries in 1993 and
moving on to wikis, RSS readers, and blogging. Another MIT dropout,
Strata founded VirtualNet Consulting in 1993. |  
 
| Friday, June 2, 2006 |  
| Full-Day Tutorials |  
| F1 Beyond Shell Scripts: 21st-Century Automation Tools and Techniques NEW! Æleen Frisch, Exponential Consulting
 
Who should attend: System administrators who want to explore new ways of automating administrative tasks. Shell scripts are
appropriate for many jobs, but more complex operations will
often benefit from sophisticated tools.
 
Topics include:
 
Automating installations
	
	Vendor-supplied tools
	Alternative approaches
	State-of-the-art package control
	Heterogeneous environments
	Cfengine
	
	Basic and advanced configurations
	Examples
		
		Installations and beyond
		"Self-healing" system configurations
		Data collection
		More
		Cfengine limitations: when not to use it
	Other Tools
	
	Æleen Frisch (R1, F1)  has been a system administrator for over  20 years. She currentlyExpect: automating interactive processes
		
		What to Expect . . .
		Using Expect with other tools
		Security issues
		Bacula, an enterprise backup management facility 
	
	Prerequisites
	Configuration
	Getting the most from Bacula
    Nagios: monitoring network and device performance 
	
	How it works
	Sample configurations
	Extending Nagios
    RRDTool: examining retrospective system data 
	
	Basic operation
	Advanced graphing
	Options for data collection
    Other tools of interest 
	
  looks after a pathologically heterogeneous network of UNIX and Windows
systems. She is the author of several books, including Essential
System Administration (now in its 3rd edition).  
 
F2 Network Security Monitoring with Open Source ToolsRichard Bejtlich, TaoSecurity.com
 
Who should attend: Anyone who wants to know what is happening on their network. I assume command-line knowledge of UNIX and familiarity with TCP/IP.  Anyone with duties involving intrusion detection, security analysis, incident response, or network forensics will like this tutorial.
 
This tutorial will show that there is more to network security monitoring (NSM) than
Snort and Ethereal. In fact, we won't talk about either, unless it's to
mention something you might not have seen before! NSM involves collecting
the statistical, session, full content, and alert data you need to discover
normal, malicious, and suspicious network events. You will leave this tutorial
immediately able to implement numerous new techniques and tools. Past 
participants have discovered intrusions during the class, using concepts
learned in a few hours. The instructor bases his teaching on his books,
his professional consulting experience, and the latest security research.
 
Students with VMware Player installed will be able to follow along with the
technique and tool demonstrations, using an NSM VMware image provided by the
instructor.
 
Topics include:
 
Richard Bejtlich (F2)  is founder of TaoSecurity (https://www.taosecurity.com), a companyNSM theoryBuilding and deploying NSM sensorsAccessing wired and wireless trafficFull content tools: Tcpdump, Ethereal/Tethereal, Snort as packet loggerAdditional data analysis tools: Tcpreplay, Tcpflow, Ngrep, NetdudeSession data tools: Cisco NetFlow, Fprobe, Flow-tools, Argus, SANCPStatistical data tools: Ipcad, Trafshow, Tcpdstat, Cisco accounting recordsSguil (sguil.sf.net)Case studies, personal war stories, and attendee participation  that helps clients detect, contain, and remediate intrusions using network 
security monitoring (NSM) principles. Richard was previously a principal 
consultant at Foundstone, performing incident response, emergency NSM, and 
security research and training. He has created NSM operations for ManTech 
International Corporation and Ball Aerospace & Technologies Corporation. From 
1998 to 2001 then-Captain Bejtlich defended global American information assets 
in the Air Force Computer Emergency Response Team (AFCERT), performing and 
supervising the real-time intrusion detection mission. Formally trained as an intelligence officer, Richard is a graduate of Harvard 
University and the United States Air Force Academy. He authored the critically
acclaimed Tao of Network Security Monitoring: Beyond Intrusion Detection in
2004 and Extrusion Detection: Security Monitoring for Internal Intrusions in
2005.  Richard co-authored Real Digital Forensics and contributed to Hacking 
Exposed, 4th Ed.,Incident Response, 2nd Ed.,  and several Sys Admin Magazine 
articles. He holds the CISSP, CIFI, and CCNA certifications. Richard writes
for his Web log (www.taosecurity.blogspot.com) and teaches at USENIX conferences. 
 
F3 Defense Against the Dark Arts: Repelling the Wily Hacker NEW!
|   |  
| Friday Morning Half-Day Tutorials |  
|   |  Bill Cheswick, Lumeta
 9:00 a.m.12:30 p.m.
 
Who should attend: Anyone interested in learning practical security from a person whose job is to think both offensively and defensively.  System administrators, security consultants, and software developers will all
benefit from this class. This is not a tutorial for novices, but is for
people who want to fill out their understanding of the topics with philosophy,
examples, and war stories.
 
System and network administrators with some experience administering UNIX
systems will gain an understanding of and confidence in designing sites that are
highly resistant to network attacks. 
Topics include:
 
How to nail down freshly installed UNIX systems
How to jail important server and client applications
Software safety and resistance against outside attacks
Demo of securing and then probing systems with common hacking tools
How to secure a community of systems
 
Bill Cheswick (R6, F3) logged into his first computer in 1968. Seven years
later, he was graduated from Lehigh University in 1975 with a degree
resembling Computer Science. Cheswick has worked on (and against) operating system security for
over 35 years. He has worked at Lehigh University and the Naval
Air Development Center in system software and communications. At
the American Newspaper Publishers Association/Research Institute
he shared his first patent for a hardware-based spelling checker,
a device clearly after its time. For several years he consulted at a variety of universities doing
system management, software development, communications design and
installation, PC evaluations, etc. In 1998, Ches starting the Internet Mapping Project with Hal Burch. This work became to core technology of a Bell Labs spin-off, Lumeta
Corporation, which explores the extent of corporate and government
intranets and checks for host leaks that violate perimeter policies.
Ches has pinged an active duty US nuclear attack submarine (distance,
66ms). Ches has a wide interest in science and medicine.  In his spare
time he reads technical journals, hacks on Mythtv and his home, and
develops exhibit software for science museums. He eats very plain
foodboring by even American standards. 
F4 Disk-to-Disk Backup and Eliminating Backup System Bottlenecks NEW! Jacob Farmer, Cambridge Computer Corp.
 9:00 a.m.12:30 p.m.
 
Who should attend: System administrators involved in the design
and management of backup systems and policymakers responsible for
protecting their organization's data. A general familiarity with
server and storage hardware is assumed. The class focuses on
architectures and core technologies and is relevant regardless of
what backup hardware and software you currently use. Students will
leave this lecture with immediate ideas for effective, inexpensive
improvements to their backup systems.
 
The data protection industry is going through a mini renaissance. In the
past few years, the cost of disk media has dropped to the point where it
is practical to use disk arrays in backup systems, thus minimizing and
sometimes eliminating the need for tape. In the first incarnations of
disk-to-disk backup (disk staging and virtual tape libraries), disk has
been used as a direct replacement for tape media. While this compensates
for the mechanical shortcomings of tape drives, it fails to address other
critical bottlenecks in the backup system, and thus many disk-to-disk
backup projects fell short of expectations. Meanwhile, many early adopters
of disk-to-disk backup are discovering that the longterm costs of disk
staging and virtual tape libraries are prohibitive.
 
The good news is that in the next generation, disk-enabled data protection
solutions have reached a level of maturity where they can assistand
sometimes even replaceconventional enterprise backup systems. These new
D2D solutions leverage the random-access properties of disk devices to use
capacity much more efficiently and to obviate many of the hidden backup
system bottlenecks which are not addressed by first-generation solutions.
The challenge to the backup system architect is to cut through the industry
hype, sort out all of these new technologies, and figure out how to integrate
them into an existing backup system.
 
This tutorial identifies the major bottlenecks in conventional backup
systems and explains how to address them. The emphasis is placed on the
various roles for inexpensive disk in your data protection strategy;
however, attention is given to SAN-enabled backup, the current state and
future of tape drives, and iSCSI.
 
Topics include:
 
Identifying and eliminating backup system bottlenecks
Conventional disk staging
Virtual tape libraries
Removable disk media
Incremental forever and synthetic full backup strategies
Block- and object-level incremental backups
Information lifecycle management and nearline archiving
Data replication
CDP (Continuous Data Protection)
Snapshots
Current and future tape drives
Capacity Optimization (Single-Instance File Systems)
Minimizing and even eliminating tape drives
iSCSI
 
Jacob Farmer (F4, F7)  is a well-known figure in the data storage industry. He has authored numerous papers and articles and is a regular speaker at trade
shows and conferences. In addition to his regular expert advice column
in the "Reader I/O" section of InfoStor Magazine, the leading trade
magazine of the data storage industry, Jacob also serves as the
publication's senior technical advisor. Jacob has over 18 years of
experience with storage technologies and is the CTO of Cambridge
Computer Services, a national integrator of data storage and data
protection solutions. 
F5 RSS vs. Information Overload NEW!Strata Rose Chalup, Project Management Consultant
 9:00 p.m.12:300 p.m.
 
Who should attend: People who want to manage incoming information streams and go "on
beyond Slashdot"; people who never heard of RSS before Microsoft
announced it was going to do an embrace/extend/exterminate on it.
 
There are so many sources of information out there that keeping up
can be a big challenge. Wading through folders of postings to
various lists, even quickly scanning the digest version,
is fundamentally not scalable. What if I told you there's
a tool out there designed for such things, which can publish headlines
of articles, aggregate them into a reading interface, and even be
used to fetch (or pre-fetch) the content?
 
Better yet, these tools are a natural fit for managing
some kinds of system information. And, like any hammer, RSS and
its cohorts will undoubtedly be used to pound on things that were
never nails. Look at the uses the Web is put to nowadays simply because it is a
robust, simple, well-defined protocol, although it was never intended or designed for them. RSS is in the same boat.
 
After completing this tutorial, participants will have an understanding
of how to harness RSS feeds for information management, the tradeoffs
among various publishing methods, and the toolkits available for working
with RSS. We'll discuss methods whereby RSS can augment traditional
system logging tools such as syslog and swatch, as well as hook
into conventional distribution tools such as mailman and majordomo.
Class materials will include pointers to RSS clients for a
wide range of platforms.
 
Topics include:
 
RSS basics
	
	Origins and standards
	Growing pains: Tim, Dave, and a cast of hundreds
	RSS 2.0: a new beginning?
	RSS in context
	
	XML, DHTML, and RSS
	Where does Tibco fit in?
	The mod_pubsub model
	Weed 'n' feed
	
	Publishing basics
	Reputation communities (Syndic8 et al.)
	Atom: RSS on steroids, or annoyance?
	Bonus: what's this "tagging" stuff, and do I give a damn?
	Getting the goodies
	
	Aggregation clients
	Pre-fetch or post-fetch?
	Archiving feeds
	If I had a hammer . . .
	
	Toolkits and libraries
	Server-side fun for everyone
	Client building blocks
	Applied RSS
	
	syslog and MRTG: the low-hanging fruit
	Filtering and tagging
	Bugzilla and Wiki hooks
	Augmenting ticket systems
	Next generation
	
	Proposed RSS extensions
	Microsoft gets on the bandwagon
	Malice aforethought
	
	Scaling aspects to consider
	The coming deluge: spamvertising via RSS
	Security caveats
	 
Strata Rose Chalup (R8, F5)  began as a fledgling sysadmin in 1983 and
has been leading and managing complex IT projects for many years,
serving in roles ranging from Project Manager to Director of Network
Operations.  She has written a number of articles on management and
working with teams and has applied her management skills on various
volunteer boards, including BayLISA and SAGE. Strata has a keen interest
in network information systems and new publishing technologies and built
a successful consulting practice around being an avid early adopter of
new tools, starting with ncsa_httpd and C-based CGI libraries in 1993 and
moving on to wikis, RSS readers, and blogging. Another MIT dropout,
Strata founded VirtualNet Consulting in 1993. 
 
F6 Databases: What You Need to Know NEW!
|   |  
| Friday Afternoon Half-Day Tutorials |  
|   |  John Sellens, SYONEX
 1:30 p.m.5:00 p.m.
 
Who should attend: System and application administrators who need
to support databases and database-backed applications.
 
Databases used to run almost exclusively on dedicated database
servers, with one or more database administrators (DBAs) dedicated
to their care. These days, with the easy availability of database
software such as MySQL and PostgreSQL, databases are popping up
in many more places, and are used by many more applications.
 
As a system administrator you need to understand databases, their care and feeding.
 
Attendees will leave the tutorial with a better understanding of
databases and their use and will be ready to deploy and support
common database software and database-backed applications.
 
Topics include:
 
An introduction to database concepts
The basics of SQL (Structured Query Language)
Common applications of databases
Berkeley DB and its applications
MySQL installation, configuration, and management
PostgreSQL installation, configuration, and management
Security, user management, and access controls
Ad-hoc queries with standard interfaces
ODBC and other access methods
Database access from other tools (Perl, PHP, sqsh, etc.)
 
John Sellens (F6, A3) has been involved in system and network administration since 1986 and is
 the author of several related USENIX papers, a number of ;login: articles, and the SAGE Short Topics in System Administration booklet #7, System and Network Administration for Higher Reliability. He holds an M.Math. in computer science from the University of Waterloo and is a chartered accountant. He is the proprietor of SYONEX, a systems and networks consultancy. From 1999 to 2004, he was the General Manager for Certainty Solutions in Toronto. Prior to joining Certainty, John was the Director of Network Engineering at UUNET Canada and was a staff member in computing and information technology at the University of Waterloo for 11 years. 
F7 Next Generation Storage Networking NEW!
1:30 p.m.5:00 p.m.
 Jacob Farmer, Cambridge Computer Services
 
Who should attend: Sysadmins running day-to-day operations and those who set or enforce
budgets. This tutorial is technical in nature, but it does not address
command-line syntax or the operation of specific products or technologies.
Rather, the focus is on general architectures and various approaches to
scaling in both performance and capacity. Since storage networking
technologies tend to be costly, there is some discussion of the relative
cost of different technologies and of strategies for managing cost and
achieving results on a limited budget.
 
There has been tremendous innovation in the data storage industry over the
past few years. Proprietary, monolithic SAN and NAS solutions are beginning
to give way to open-system solutions and distributed architectures.
Traditional storage interfaces such as parallel SCSI and Fibre Channel are
being challenged by iSCSI (SCSI over TCP/IP), SATA (serial ATA), SAS (serial
attached SCSI), and even Infiniband. New filesystem designs and alternatives
to NFS and CIFS are enabling high-performance filesharing measured in
gigabytes (yes, "bytes," not "bits") per second. New spindle management techniques are
enabling higher-performance and lower-cost disk storage. Meanwhile, a whole
new set of efficiency technologies are allowing storage protocols to
flow over the WAN with unprecedented performance. This tutorial is a survey
of the latest storage networking technologies, with commentary on where and
when these technologies are most suitably deployed.
 
Topics include:
 
Fundamentals of storage virtualization: the storage I/O path
Shortcomings of conventional SAN and NAS architectures
In-band and out-of-band virtualization architectures
The latest storage interfaces: SATA (serial ATA), SAS (serial
	attached SCSI), 4Gb Fibre Channel, Infiniband, iSCSI
Content-Addressable Storage (CAS)
Information Life Cycle Management (ILM) and Hierarchical Storage
	Management (HSM)
The convergence of SAN and NAS
High-performance file sharing
Parallel file systems
SAN-enabled file systems
Wide-area file systems (WAFS)
 
Jacob Farmer (F4, F7)  is a well-known figure in the data storage industry. He has authored numerous papers and articles and is a regular speaker at trade
shows and conferences. In addition to his regular expert advice column
in the "Reader I/O" section of InfoStor Magazine, the leading trade
magazine of the data storage industry, Jacob also serves as the
publication's senior technical advisor. Jacob has over 18 years of
experience with storage technologies and is the CTO of Cambridge
Computer Services, a national integrator of data storage and data
protection solutions. 
F8 Time Management: Getting It All Done and Not Going (More) Crazy!
1:30 p.m.5:00 p.m.
 Tom Limoncelli, Google
 1:30 p.m.5:00 p.m.
 
Who should attend: IT people, sysadmins, and other busy people who want to improve their 
time-management skills, who want to have more control over their time 
and better follow-through on assignments. If you feel overloaded, miss 
appointments, and forget deadlines and tasks, this class is for you.
 Do any of these statements sound like you?
      
     Based on a new book from O'Reilly, this tutorial will help you get  
more done in less time. You'll miss fewer deadlines, be more  
relaxed at work, and have more fun in your social life. If you think you don't have time to take this tutorial, you really need to take this tutorial!I don't have enough time to get all my work done.
     I don't have control over my schedule
     I'm spending all my time mopping the floor; I don't have
          time to fix the leaking pipe.
     My boss says I don't work hard enough, but I'm always working
          my  off!
       
Topics include:
 
Why typical "time management" books don't work for sysadmins
How to delegate tasks effectively
A way to keep from ever forgetting a user's request
Why "to do" lists fail and how to make them work
Prioritizing tasks so that users think you're a genius
Getting more out of your Palm Pilot
Having more time for fun (for people with a social life)
How to leave the office every day with a smile on your face
 
Tom Limoncelli (F8), author of O'Reilly's Time Management for System Administrators and co-author of The Practice of System and Network
Administration
 from Addison-Wesley, is Director of IT Services at Cibernet Corp. A sysadmin and network wonk since 1987, he
has worked at Dean for America, Lumeta, Bell Labs/Lucent, Mentor Graphics, and Drew
University. He is a frequent presenter at LISA conferences. 
 
 
 
| Saturday, June 3, 2006 |  
| Full-Day Tutorials |  
| A1 Learning PHP 5 NEW! David Sklar, Ning Inc.
 
Who should attend: Programmers and system administrators who want to use PHP to build database-backed Web applications. Students in the tutorial should be handy with HTML, familiar with programming in another language such as Perl, C, or Python, and not total strangers to SQL and relational databases.
 
Instead of a dry walkthrough of keywords and syntax, this tutorial 
presents an applied introduction to PHP 5 by building a complete 
database-backed Web application: a social bookmarks manager that can be 
used by a community to tag and share interesting URLs.
 
Code examples in the tutorial highlight new capabilities of PHP 5, such 
as the improved object-oriented programming model, iterators, 
overloading, and XML processing.
 
Topics include:
 
Displaying and processing HTML forms
Talking to a database
Identifying users with sessions and cookies
Securing your code against common hacker attacks
Manipulating numbers, strings, and arrays
Debugging and troubleshooting problems in your code
Cleaning up your URL structure
Using PEAR modules such as HTML_QuickForm and Mail_mime
Generating dynamic images with GD
Caching and tuning your application's performance
Interfacing PHP with client-side Javascript
Working with the Zend Framework
 
David Sklar (A1) is a Software Architect at Ning. He is also the author of Learning PHP 5 (O'Reilly), Essential PHP Tools (Apress), and PHP 
Cookbook (O'Reilly). After discovering PHP as a solution to his Web programming needs in 
1996, he created the PX, which enables PHP users to exchange programs. 
Since then, he has continued to rely on PHP for personal and 
professional projects. When away from the computer, Sklar eats mini-donuts, plays records, and likes to cook. He lives in New York City and has a degree in computer 
science from Yale University. 
A2 Solaris 10 Administration Workshop NEW!
Peter Baer Galvin, Corporate Technologies, Inc.
 
Who should attend: Solaris system managers and administrators interested in learning the new administration features in Solaris 10 (and features in previous Solaris releases that they may not be using).
 
This tutorial covers a variety of topics concerning Solaris 10. Solaris 10
includes many new features, and there are new issues to consider when
deploying, implementing, and managing Solaris 10. This will be a workshop
featuring instruction and practice/exploration. Each student should have
a laptop with wireless access for remote access into a provided Solaris 10
machine. 
 
Note that, except for a few instances, Solaris 10 security is not covered in
this workshop.
 
Topics include:
 
Overview
Solaris releases (official, Solaris Express, OpenSolaris, others)
Installing and upgrading to Solaris 10
	
	Planning your installation, filesystem layout, post-installation steps
	Installing (and removing) patches and packages
	Advanced features of Solaris 10
	
	Flash archives and live upgrade
	Patching
Service Management Facility (lab)
The kernel
	
Crash and core dumps
	
Cool commands
ZFS (lab)
N1 Grid Containers (a.k.a. Zones) (lab)
	
	Installation
	Management
	Resource management
	Dtrace
FMA
Performance
	
Networking
	
Sysadmin best practices
 
Peter Baer Galvin (R2, A2) is the Chief Technologist for Corporate Technologies, Inc., a systems integrator and VAR,  and was the Systems Manager for Brown University's Computer Science Department. He has written articles
for Byte and other magazines. He wrote the "Pete's Wicked World" and
"Pete's Super Systems" columns at SunWorld. He is currently
contributing editor for Sys Admin, where he manages the Solaris
Corner. Peter is co-author of the Operating Systems Concepts and Applied Operating Systems Concepts textbooks. As a consultant and trainer, Peter has taught tutorials on security and system administration and has given talks at many conferences and institutions on such topics as Web
services, performance tuning, and high availability. 
A3 System and Network Monitoring: Tools in Depth
John Sellens, SYONEX
 
Who should attend: Network and system administrators ready to
implement comprehensive monitoring of their systems and networks
using the best of the freely available tools.  Participants should
have an understanding of the fundamentals of networking, familiarity
with computing and network components, UNIX system administration
experience, and some understanding of UNIX programming and scripting
languages.
 This tutorial will provide in-depth instruction in the installation
and configuration of some of the most popular and effective system
and network monitoring tools, including Nagios, Cricket, MRTG, and
Orca. 
Participants should expect to leave the tutorial with the information
needed to immediately implement, extend, and manage popular monitoring
tools on their systems and networks.
 
Topics include, for each of Nagios, Cricket, MRTG, and Orca:
 
	InstallationBasic steps, prerequisites, common problems, and solutions
	Configuration, setup options, and how to manage larger and non-trivial configurations
	Reporting and notificationsproactive and reactive
	Special caseshow to deal with interesting problems
	Extending the toolshow to write scripts or programs to extend the functionality of the basic package
	Dealing effectively with network boundaries and remote sites
	Security concerns and access control
	Ongoing operation
 
John Sellens (F6, A3) has been involved in system and network administration
 since 1986 and is the author of several related USENIX papers, a number of ;login: articles, and the SAGE Short Topics in System Administration booklet #7, System and Network Administration for Higher Reliability. He holds an M.Math. in computer science from the University of Waterloo and is a chartered accountant. He is the proprietor of SYONEX, a systems and networks consultancy. From 1999 to 2004, he was the General Manager for Certainty Solutions in Toronto. Prior to joining Certainty, John was the Director of Network Engineering at UUNET Canada and was a staff member in computing and information technology at the University of Waterloo for 11 years. 
A4 Measuring Security NEW!Dan Geer, Geer Risk Services
 
Who should attend: Operations and security managers who need to design or interpret a metric structure for security risk
management.
 
"You cannot manage what you cannot measure": every business
school says this, so it must be true. "Cyber security is about
risk management": almost everyone believes this, and for good
reason. The sum of the two says that with respect to
computer-related security we are hosed if we don't get on the
ball and design some decent security metrics. So far, so
good, but what in tarnation is a decent security metric? "Ay,
there's the rub," as Hamlet would say. This tutorial makes a
healthy stab in the direction of security metrics and hopes
that its students soon surpass their teacher, which may not be
all that hard, as security metrics design is somewhere between
infancy and toddlerhood.
 
Topics include:
 
Topics do not include:Where You Stand Depends on Where You Sit: What management
    texts/schools mean when they say, "Measure what you manage"Good Artists Create, Great Artists Steal: Styles and
    methods of measurements used in other fields that are applicable to
    security risk, and how to steal themModeling: Is there any point in lifecycle or other models
    of how security works; is there any unifying abstraction worth
    using?Large Numbers: The state of the world and how to compare
    yourself to itInformation Sharing: Data fusion is dangerously powerful
    but essential (with a sidebar on de-identification as a pre-sharing
    safety mechanism)Where to Begin: How to roll your own, and a few pitfalls to
    avoid, assuming that decision support is your real deliverableHow to Communicate What You Find: Being simple without
    being simplistic 
Dan Geer (A4)Milestones: The X Window System and Kerberos (1988), the first information securitySecure coding standards, disaster recovery planning, firewall
log analysis, or anything else that is already a solved problem
or a side effect of low/no discipline  consulting firm on Wall Street (1992), convenor
of the first academic conference on electronic commerce (1995), the
"Risk Management Is Where the Money Is" speech that changed the
focus of security (1998), the presidency of the USENIX Association
(2000), the first call for the eclipse of authentication by
accountability (2002), principal author of and spokesman for
Cyberinsecurity: The Cost of Monopoly (2003), and co-founder of
SecurityMetrics.Org (2004). 
A7 Inside the Linux Kernel (Updated for Version 2.6) Theodore Ts'o, IBM
 
Who should attend: Application programmers and kernel developers. You should be reasonably familiar with C
programming in the UNIX environment, but no prior experience with the UNIX or Linux kernel code is assumed.
 This tutorial will give you an introduction to the structure of the Linux kernel, the basic features it provides, and the most important algorithms it employs.
 The Linux kernel aims to achieve conformance with existing standards and compatibility with existing operating systems; however, it is not a reworking of existing UNIX kernel code. The Linux kernel was written from scratch to provide both standard and novel features, and it takes advantage of the best practice of existing UNIX kernel designs.
 Although the material will focus on the latest release version of the Linux kernel (v. 2.6), it will also address aspects of the development kernel codebase (v. 2.7) where its substance differs from 2.6. It will not contain any detailed examination of the source code but will, rather, offer an overview and roadmap of the kernel's design and functionality.
 
Topics include:
 
How the kernel is organized (scheduler, virtual memory system,
filesystem layers, device driver layers, networking stacks)
	The interface between each module and the rest of the kernelKernel support functions and algorithms used by each moduleHow modules provide for multiple implementations of similar functionality Ground rules of kernel programming (races, deadlock conditions)Implementation and properties of the most important algorithms
	PortabilityPerformanceFunctionality Comparison between Linux and UNIX kernels, with emphasis on differences in algorithmsDetails of the Linux scheduler
	Its VM systemThe ext2fs filesystem The requirements for portability between architectures 
Theodore Ts'o (A7) has been a Linux kernel developer since almost the very
beginnings of Linux: he implemented POSIX job control in the
0.10 Linux kernel. He is the maintainer and author of the Linux COM
serial port driver and the Comtrol Rocketport driver, and he architected
and implemented Linux's tty layer. Outside of the kernel, he is 
the maintainer of the e2fsck filesystem consistency checker. Ted
is currently employed by IBM Linux Technology Center. |  |  |