|
TRAINING
Overview |
Tuesday | Wednesday | Thursday | Friday | Saturday |
By Instructor
Tuesday, May 30, 2006
|
Full-Day Tutorials
|
T1
Advanced Perl Programming
Tom Christiansen, Consultant
Who should attend: Anyone with a journeyman-level knowledge of Perl programming who wants to hone Perl skills. This class will cover a wide variety of advanced topics in Perl, including
many insights and tricks for using these features effectively. After
completing this class, attendees will have a much richer understanding of
Perl and will be better able to make it part of their daily routine.
Topics include:
- Symbol tables and typeglobs
- Symbolic references
- Useful typeglob tricks (aliasing)
- Modules
- Autoloading
- Overriding built-ins
- Mechanics of exporting
- Function prototypes
- References
- Implications of reference counting
- Using weak references for self-referential data structures
- Autovivification
- Data structure management, including serialization and persistence
- Closures
- Fancy object-oriented programming
- Using closures and other peculiar referents as objects
- Overloading of operators, literals, and more
- Tied objects
- Managing exceptions and warnings
- When die and eval are too primitive for your taste
- The use warnings pragma
- Creating your own warnings classes for modules and objects
- Regular expressions
- Debugging regexes
- qr// operator
- Backtracking avoidance
- Interpolation subtleties
- Embedding code in regexes
- Programming with multiple processes or threads
- The thread model
- The fork model
- Shared memory controls
- Unicode and I/O layers
- Named Unicode characters
- Accessing Unicode properties
- Unicode combined characters
- I/O layers for encoding translation
- Upgrading legacy text files to Unicode
- Unicode display tips
Tom Christiansen (T1) has been involved with Perl since day zero of its initial public release in 1987. Author of several books on Perl,
including The Perl Cookbook and Programming Perl from O'Reilly, Tom is
also a major contributor to Perl's online documentation. He holds
undergraduate degrees in computer science and Spanish and a Master's in
computer science. He now lives in Boulder, Colorado.
T2 Solaris 10 Performance, Observability, & Debugging
James Mauro and Richard McDougall, Sun Microsystems
Who should attend: Anyone who supports or may support Solaris 10 machines.
This one-day tutorial will cover the tools and utilities available
in Solaris 10 for understanding system and application behavior.
An overview of the various tools will be followed by a
drill-down on the uses of and methodology for applying the tools
to resolve performance issues and pathological behavior, or
simply to understand the system and workload better.
Topics include:
- Solaris 10 features overview
- Solaris 10 tools and utilities
- The conventional stat tools (mpstat, vmstat, etc.)
- The procfs tools (ps, prstat, map, pfiles, etc.)
- lockstat and plockstat
- Using kstat
- Dtrace, the Solaris dynamic tracing facility
- Using mdb in a live system
- Understanding memory use and performance
- Understanding thread execution flow and profiling
- Understanding I/O flow and performance
- Looking at network traffic and performance
- Application and kernel interaction
- Putting it all together
James Mauro (T2) is a Senior Staff Engineer in the Performance and Availability Engineering group at
Sun Microsystems. Jim's
current interests and
activities are centered on benchmarking Solaris 10 performance,
workload analysis, and tool development. This work includes Sun's
new Opteron-based systems and multicore performance on Sun's Chip
Multithreading (CMT) Niagara processor. Jim resides in Green Brook,
New Jersey, with his wife and two sons. He spent most of his spare
time in the past year working on the second edition of Solaris
Internals. Jim co-authored the first edition of Solaris Internals
with Richard McDougall and has been writing about Solaris in various
forums for the past eight years.
Richard McDougall (T2), had he lived 100 years ago, would have had the hood
open on the first four-stroke internal combustion gasoline-powered
vehicle, exploring new techniques for making improvements. He would be
looking for simple ways to solve complex problems and helping
pioneering owners understand how the technology works to get the most
from their new experience. These days, McDougall uses technology to
satisfy his curiosity. He is a Distinguished Engineer at Sun
Microsystems, specializing in operating systems technology and system
performance. He is co-author of Solaris Internals (Prentice Hall PTR, 2000) and Resource Management (Sun Microsystems Press, 1999).
T3 Building a Logging Infrastructure and Log Analysis for Security NEW!
Abe Singer, San Diego Supercomputer Center
Who should attend: System, network, and security administrators who want to be able to separate the wheat of warning information from the chaff of normal activity in their log files.
This tutorial will show the importance of log files for maintaining
system security and general well-being, offer some strategies for building
a centralized logging infrastructure, explain some of the types of
information that can be obtained for both real-time monitoring and
forensics, and teach techniques for analyzing log data to obtain useful
information.
The devices on a medium-sized network can generate millions of lines
of log messages a day. Although much of the information is normal activity,
hidden within that data can be the first signs of an intrusion, denial of
service, worms/viruses, and system failures. Getting a handle on your log
files can help you run your systems and networks more effectively and
can provide forensic information for post-incident investigation.
Topics include:
- Problems, issues, and scale of handling log information
- Generating useful log information: improving the quality of
your logs
- Collecting log information
- syslog and friends
- Building a log host
- Integrating MS Windows into a UNIX log architecture
- Storing log information
- Centralized log architectures
- Log file archiving
- Log analysis
- Log file parsing tools
- Data analysis of logfiles (e.g., baselining)
- Attack signatures and other interesting things to look for in your logs
- Legal issues
Abe Singer (T3, R4) is a Computer Security Researcher in the Security Technologies
Group at the San Diego Supercomputer Center. In his operational security
responsibilities, he participates in incident response and forensics
and in improving the SDSC logging infrastructure. His research is in
pattern analysis of syslog data for data mining. He is co-author of
of the SAGE booklet Building a Logging Infrastructure and author of a forthcoming O'Reilly book on log analysis.
T4 Hands-on Linux Security Class: From Hacked to Secure in Two Days (Day 1 of 2)
Rik Farrow, Security Consultant
Who should attend: System administrators of Linux and other UNIX systems; anyone who runs a public UNIX server.
We will work with systems that have been hacked and include
hidden files, services, and evidence of the intrusion. You will
learn how to uncover exploited systems and properly secure them.
You will perform hands-on exercises with dual-use tools to replicate
what intruders do, as well as tools dedicated to security. The tools
vary from the ordinary, such as find and strings, to less familiar
but important ones such as lsof, various scanners, sniffers, and
the Sleuth Kit.
The lecture portion of this class covers the background you need to
understand UNIX security principles, TCP/IP, scanning, and popular
attack strategies, as well as defenses for networks and individual
systems. The class will end with a discussion of the use of patching
and vulnerability assessment tools.
Day 1 topics begin with a quick assessment of a system, looking for
obvious signs of intrusion. We will then cover TCP/IP and
how it relates to different types of attacks and scanning, to learn
what an attacker can "see" from the network and the limitations of
certain styles of attack. The inner workings of buffer overflows,
with examples, graphically illustrate how these attacks work, and
what defenses against them exist. Day 1 concludes with an examination
of a buggy Web script, how to audit CGI scripts quickly, and what
can be done to prevent this attack from succeeding.
Day 2 begins with a look at passwords, including a quick spin with
John the Ripper. We examine suid files as potential backdoors
and show how to bypass the common defense against these
backdoors. Network services provide the necessary access for attackers,
so we practice determining exactly what services are necessary and
how UNIX systems should be hardened. Tools that look for rootkits,
often the most subtle way for an attacker to maintain a presence,
have their weak points. We learn about rootkits and how to
search for them. Then we look at the output of Sleuth Kit to discover
what happened, and when, on a poorly secured system. Finally, we look
at other defensive software, including firewalls (netfilter), patching,
and vulnerability scanning.
Class exercises require that you have an X86-based laptop
computer that can be booted from a CD. Students will receive a
live CD (KNOPPIX) which contains the tools, files, and exercises
required for the course. You can download KNOPPIX yourself
(v3.9) and see whether your laptop is supported. Some people have
come without laptops and teamed up with friendly laptop users.
Exercises include:
DAY 1:
- Searching for hidden files
- TCP/IP and its relation to probes and attacks
- Uses of ARP and ethereal
- hping2 probes
- nmap (connect and SYN scans)
- Buffer overflows in sample C programs
- Weaknesses in Web scripts (using a Perl example)
DAY 2:
- John the Ripper, password cracking
- Misuses of suid shells, finding backdoors
- Disabling network services
- Searching for evidence of rootkits
- Sleuth Kit (looking at intrusion timelines)
- netfilter
Rik Farrow (T4, W4) provides UNIX and Internet security consulting and training. He has been working with UNIX system security since 1984 and with TCP/IP networks since 1988. He has taught at the IRS, Department of Justice, NSA, NASA, US West, Canadian RCMP, Swedish Navy, and for many U.S. and European user groups. He is the author of UNIX System Security, published by Addison-Wesley in 1991, and System Administrator's Guide to System V (Prentice Hall, 1989). Farrow is the editor of ;login: and a network security columnist for Network magazine. Rik lives with his family in the high desert of northern Arizona and enjoys hiking and mountain biking when time permits.
T5 Reliable, Fast, Lightweight Data Storage: A Berkeley DB Tutorial NEW!
Margo Seltzer, Sleepycat Software
Who should attend: Application architects and developers
involved in the design and implementation of data storage solutions for
real-world applications. Software development and program managers who
are interested in understanding the services provided by Berkeley DB will
also benefit from this tutorial. Engineers familiar with Berkeley DB, as
well as those who have not yet used this product, will come away from this
tutorial with useful, practical information, sample code, and Berkeley DB
performance tuning tips.
Berkeley DB is the most widely used developer database in the world.
It is used by many open source and mission-critical proprietary
applications that require a lightweight, fast, reliable, recoverable,
scalable data storage solution. Short-circuit your learning curve or
increase the effectiveness of your existing use of Berkeley DB by
attending this tutorial.
We will review the underlying concepts, API, and implementation
recommendations for application developers using Berkeley DB. Additionally,
we will focus on performance tuning
options and usage scenarios.
Topics include:
- Databases and access methods
- Managing key/data pairs
- Using cursors
- Using secondary indices
- Database environments
- Application design
- Transactions, locking, loggin, backup and recovery
- Berkeley DB database administration
- Application tuning
- Replication overview
- Berkeley DB XML overview
- Berkeley DB Java Edition overview
- Berkeley DB access methods
- Berkeley DB subsystems
- Logging
- Locking
- Transactions
- Performance tuning
- Setting page and cache sizes
- Tuning logging and locking parameters
- Managing deadlock detection methods and timeout values
Margo Seltzer (T5) is a Herchel Smith Professor of Computer Science,
the Associate Dean for Computer Science and Engineering, and
a Harvard College Professor in the Division of Engineering and
Applied Sciences at Harvard University. Her research interests
include file systems, databases, and transaction processing
systems. She is the author of several widely used software
packages, including database and transaction libraries and the
4.4BSD log-structured file system. Dr. Seltzer is also a founder
and CTO of Sleepycat Software, the makers of Berkeley DB. She
is a Sloan Foundation Fellow in Computer Science and a Bunting Fellow,
and was the recipient of the 1996 Radcliffe Junior Faculty
Fellowship, the University of California Microelectronics
Scholarship. She is recognized as an outstanding teacher and
won the Phi Beta Kappa teaching award in 1996 and the Abrahmson
Teaching Award in 1999. Dr. Seltzer received an A.B. degree in
applied mathematics from Harvard/Radcliffe College in 1983 and a
Ph.D. in computer science from the University of California,
Berkeley, in 1992.
|
Wednesday, May 31, 2006
|
Full-Day Tutorials
|
W1 Ajax and Advanced Responsive WebApp Development NEW!
Alex Russell, JotSpot, Inc. (and Project Lead for the Dojo Toolkit)
Who should attend: Developers who are familiar with basic Web application development practice and standards (HTML, CSS, and basic JavaScript) who are
looking to add Ajax and other rich and responsive interface elements to
new or existing Web applications. Familiarity with HTTP, the DOM, and
XML are welcome but not required. The tutorial will include many
code examples of professional-quality idiomatic JavaScript, which will
be explained.
Web applications development techniques have continued to advance at a
rapid clip in server-side environments, but for several years the apparent limitations of browser technology have hindered the creation of richer experiences for end users. "Ajax" is a Web development technique for employing the latent capabilities of modern browsers, which can now be fully exploited as legacy browsers are retired. These
capabilities let developers provide better user interactions, expand
the uses of the browser as a platform, and make new types of
in-browser apps possible without plugins.
This tutorial focuses on augmenting existing applications with Ajax, and
the trade-offs involved. A strong emphasis is given to testing,
interoperability, and debugging. Tools for easing development and
debugging are also presented and used.
Attendees will leave this tutorial with a firm grasp of the underlying technologies of Ajax
and where to turn when the going gets rough in developing Ajax
applications. Examples and the slides will be made available online.
Topics include:
- Ajax: Good? Bad? Irrelevant?
- Ajax basics
- HTTP fundamentals
- The XMLHTTP object, and alternatives to it
- What to send over the wire, and when: HTML, XML, JSON, or plain text?
- JavaScript and the DOM
- Defensive client-side development
- Accessibility concerns and techniques
- Browser support "gotchas"
- Debugging
- Dissection of common Ajax apps w/ debugging tools
- Toolkits to help
- Advanced JS and visual effects
- Drag-and-drop
- Animation
- JSON-RPC
- Web services
Alex Russell (W1) is a Senior Software Engineer at JotSpot and Project Lead for
the Dojo Toolkit. Dojo is an Open Source library that helps Web
application developers spend more time building great experiences and
less time fighting browser quirks. Prior to assisting in the
development of Dojo, Alex was primary author of the netWindows DHTML
framework. He has been wrestling browsers into relative submission
since the late '90s.
W2 Introduction to VMware ESX Server NEW!
John Gannon and John Arrasjid, VMware
Who should attend: x86 sysadmins who want to dramatically improve the way
they manage systems.
Do any of these complaints sound familiar?
- Our datacenter is out of power/space/network infrastructure and adding new servers is a struggle.
- Our developers ask us for new servers constantly and we can't keep up with the demand.
- It takes us days or weeks to procure, rack, stack, and configure a new box.
- Our yearly disaster recovery simulations are hardly ever successful because the DR site has a different hardware configuration than the production site.
- Our DR site is too expensive to operate because it is an exact replica of our production environment.
- We can only do hardware upgrades late at night and on the weekends.
If yes, VMware ESX Server can help by:
- reducing your x86 server count by up to 90%
- supporting up to 80 x86-based OS instances running simultaneously (Linux, FreeBSD, Netware, and Windows) on a single physical machine
- freeing up valuable rack space, SAN, and networking ports
- providing instantaneous rollback to a "known good configuration" to
- assist in software development and testing
- allowing you to provision a new x86 server in minutes instead of weeks
- enabling Disaster Recovery despite having different hardware (and less of it) at your DR site
- eliminating downtime traditionally associated with hardware maintenance
In this tutorial, we will provide an overview of virtual machine
technology
as well as the features and functionality of ESX Server. Installation,
configuration, and best practices will be the focus of the session.
Topics include:
- Virtual infrastructure and ESX Server overview
- ESX Server installation and configuration
-
Virtual Machine (VM) creation and operation
- Installing VMs from scratch
- Using templates and cloning to provision VMs in minutes
-
Operations and administration
- Sizing the environment
- Automating tasks via scripting
- Operations best practices
- Enabling disaster recovery and business continuity with ESX Server
- Migration strategies and the P2V process (Physical-to-Virtual)
-
Advanced configuration
- SAN
- Networking
- Performance Tuning
- Security
John Gannon (W2, R5) has over ten years of experience architecting and
implementing UNIX, Linux, and Windows infrastructures. John has
worked in network engineering, operations, and professional services
roles with various companies including Sun Microsystems, University
of Pennsylvania, Scient Corporation, and FOX Sports. John's current
work at VMware involves delivering server consolidation, disaster
recovery, and virtual infrastructure solutions to FORTUNE 500
clients.
John Arrasjid (W2, R5) has 20 years experience in the computer science field. His experience includes work with companies such as AT&T, Amdahl, 3Dfx
Interactive, Kubota Graphics, Roxio, and his own company, WebNexus
Communications, where he developed consulting practices and built a cross-platform IT team. John is currently a senior member of the VMware Professional Services
Organization as a Consulting Architect. John has developed a number of PSO
engagements, including Performance, Security, and Disaster Recovery and
Backup.
W3 Implementing [Open]LDAP Directories
Gerald Carter, Samba Team/Hewlett-Packard
9:00 a.m.5:00 p.m.
Who should attend: Both LDAP directory administrators and architects. The focus is
on integrating standard network services with LDAP directories. The
examples are based on UNIX hosts and the OpenLDAP directory server
and will include actual working demonstrations throughout the course.
System administrators today run a variety of directory services,
although these are referred to by names such as DNS and NIS. The
Lightweight Directory Access Protocol (LDAP) is the successor to
the X.500 directory and has the promise of allowing administrators
to consolidate multiple existing directories into one.
Topics include:
- Replacing NIS domains
- Integration with Samba file and print servers
- Integrating MTAs such as Sendmail and Postfix
- Creating address books for mail clients
- Managing user access to HTTP and FTP services
- Integrating with DHCP and DNS servers
- Scripting with the Net::LDAP Perl module
- Defining custom attributes and object classes
Gerald Carter (W3, R7) has been a member of the Samba Development Team
since 1998. He has been developing, writing about, and teaching on open source since the late '90s. Currently employed by
Centeris as a Samba and open source developer, Gerald has written
books for SAMS Publishing and for O'Reilly Publishing.
W4 Hands-On Linux Security Class: From Hacked to Secure in Two Days (Day 2 of 2)
Rik Farrow, Security Consultant
9:00 a.m.5:00 p.m.
We will work with systems that have been hacked and include
hidden files, services, and evidence of the intrusion. You will
learn how to uncover exploited systems and properly secure them.
You will perform hands-on exercises with dual-use tools to replicate
what intruders do, as well as tools dedicated to security. The tools
vary from the ordinary, such as find and strings, to less familiar
but important ones such as lsof, various scanners, sniffers, and
the Sleuth Kit.
The lecture portion of this class covers the background you need to
understand UNIX security principles, TCP/IP, scanning, and popular
attack strategies, as well as defenses for networks and individual
systems. The class will end with a discussion of the use of patching
and vulnerability assessment tools.
Day 2 begins with a look at passwords, including a quick spin with
John the Ripper. We examine suid files as potential backdoors
and show how to bypass the common defense against these
backdoors. Network services provide the necessary access for attackers,
so we practice determining exactly what services are necessary and
how UNIX systems should be hardened. Tools that look for rootkits,
often the most subtle way for an attacker to maintain a presence,
have their weak points. We learn about rootkits and how to
search for them. Then we look at the output of Sleuth Kit to discover
what happened, and when, on a poorly secured system. Finally, we look
at other defensive software, including firewalls (netfilter), patching,
and vulnerability scanning.
Class exercises require that you have an X86-based laptop
computer that can be booted from a CD. Students will receive a
live CD (KNOPPIX) which contains the tools, files, and exercises
required for the course. You can download KNOPPIX yourself
(v3.9) and see whether your laptop is supported. Some people have
come without laptops and teamed up with friendly laptop users.
Exercises include, for Day 2:
- John the Ripper, password cracking
- Misuses of suid shells, finding backdoors
- Disabling network services
- Searching for evidence of rootkits
- Sleuth Kit (looking at intrusion timelines)
- netfilter
Rik Farrow (T4, W4) provides UNIX and Internet security consulting and training. He has been working with UNIX system security since 1984 and with TCP/IP networks since 1988. He has taught at the IRS, Department of Justice, NSA, NASA, US West, Canadian RCMP, Swedish Navy, and for many U.S. and European user groups. He is the author of UNIX System Security, published by Addison-Wesley in 1991, and System Administrator's Guide to System V (Prentice Hall, 1989). Farrow is the editor of ;login: and a network security columnist for Network magazine. Rik lives with his family in the high desert of northern Arizona and enjoys hiking and mountain biking when time permits.
W5 Issues in UNIX
Infrastructure Design
Lee Damon, University of Washington
Who should attend: Anyone who is designing, implementing, or maintaining a UNIX environment with 2 to 20,000+ hosts. System administrators, architects, and managers who need to maintain multiple hosts with few admins.
This intermediate class will examine many of the background issues that
need to be considered during the design and implementation of a
mixed-architecture or single-architecture UNIX environment. It will
cover issues from authentication (single sign-on) to the Holy Grail of
single system images.
This class won't implement a "perfect solution," as each site has
different needs. It will try to raise all the questions you should
ask (and answer) while designing the solution that will meet your
needs. We will look at some freeware and some commercial solutions,
as well as many of the tools that exist to make a workable environment
possible.
Topics include:
- Administrative domains: Who is responsible for what, and what can users do for themselves?
- Desktop services vs. farming: Do you do serious computation on the desktop, or do you build a compute farm?
- Disk layout: How do you plan for an upgrade? Where do things go?
- Free vs. purchased solutions: Should you write your own, or hire a consultant or company?
- Homogeneous vs. heterogeneous: Homogeneous is easier, but will it do what your users need?
- The essential master database: How can you keep track of what you have?
- Policies to make life easier
- Push vs. pull
- Getting the user back online in 5 minutes
- Remote administration: Lights-out operation; remote user sites; keeping up with vendor patches, etc.
- Scaling and sizing: How do you plan on scaling?
- Security vs. sharing: Your users want access to everything. So do the crackers . . .
- Single sign-on: How can you do it securely?
- Single system images: Can users see just one environment, no matter how many OSes there are?
- Tools: The free, the purchased, the homegrown
Lee Damon (W5) has a B.S. in Speech Communication from Oregon State University. He
has been a UNIX system administrator since 1985 and has been active in SAGE
since its inception. He assisted in developing a mixed AIX/SunOS environment
at IBM Watson Research and has developed mixed environments for Gulfstream
Aerospace and QUALCOMM. He is currently leading the development effort
for the Nikola project at the University of Washington Electrical Engineering
department. He is past chair of the SAGE Ethics and Policies working groups and he chaired LISA '04.
W6 Linux System Administration
Joshua Jensen, Cisco Systems Inc.
Who should attend: System administrators who plan to implement Linux in a production environment. Attendees should understand the basics of system administration in a UNIX/Linux environment, i.e., user-level commands and TCP/IP networking. Both novice admins and gurus should leave the tutorial having learned something.
From a single server to a network of workstations, maintaining a Linux environment
can be a daunting task for administrators knowledgeable in other
platforms. Starting with a single server and ending with a
multi-server, 1000+-user environment, this tutorial will provide
practical information on how to use Linux in the real world. Attendees should leave the tutorial confident in their ability to set up and manage a secure Linux server and services. The tutorial will be conducted in an open manner that allows for question-and-answer interruptions.
Topics include (with an emphasis on security):
- Installation issues
- Boot loaders and system startup
- Disk partitioning and LVM
- Software RAID
- The RPM package system
- Networking
- User management
- Automated system installation
- Network-based authentication
- User accounts and management
- Network services and xinetd
- SSH: port tunneling, keys, tricks
- New developments
Joshua Jensen (W6) has worked for IBM and Cisco Systems, and was Red Hat's
first instructor, examiner, and
RHCE. He worked with Red Hat for four and a half
years, during which he wrote and maintained large parts of the Red Hat
curriculum: Networking Services and Security, System Administration,
Apache and Secure Web Server Administration, and the Red Hat Certified
Engineer course and exam. Joshua has been working with Linux since
1996 and finds himself having come full circle: he recently left IBM to work
with Red Hat Linux for Cisco Systems. In his spare time he dabbles in
cats, fish, boats, and frequent flyer miles.
|
Thursday, June 1, 2006
|
Full-Day Tutorials
|
R1 Administering Linux in Production Environments
Æleen Frisch, Exponential Consulting
Who should attend: Both current Linux system administrators and
administrators from sites considering converting to Linux or adding
Linux systems to their current computing resources. We will be focusing on the
administrative issues that arise when Linux systems are deployed
to address a variety of real-world tasks and problems arising from
both commercial and research-and-development contexts.
Topics include:
- Recent kernel developments
- High-performance I/O
- Advanced filesystems and logical volumes
- Disk striping
- Optimizing I/O performance
- Advanced compute-server environments
- Beowulf
- Clustering
- Parallelization environments/facilities
- CPU performance optimization
- High availability Linux: fault-tolerance options
- Enterprise-wide authentication
- Fixing the security problems you didn't know you had (or, what's good
enough for the researcher/hobbyist won't do for you)
- Automating installations and other mass operations
- Linux in the office environment
Æleen Frisch (R1, F1) has been a system administrator for over 20 years. She currently
looks after a pathologically heterogeneous network of UNIX and Windows
systems. She is the author of several books, including Essential
System Administration (now in its 3rd edition).
R2 Solaris 10 Security Features Workshop
Peter Baer Galvin, Corporate Technologies, Inc.
Who should attend: Solaris systems managers and administrators interested in
the new security features in Solaris 10 (and features in previous Solaris
releases that they may not be using).
This course covers a variety of topics surrounding Solaris 10 and security.
Solaris 10 includes many new features, and there are new issues to consider
when deploying, implementing, and managing Solaris 10. This will be a workshop featuring instruction and practice/exploration. Each student should have a laptop with wireless access for remote access into a Solaris 10 machine.
Topics include:
- Overview
- N1 Grid Containers (a.k.a. Zones) (lab)
- RBAC (lab)
- Privileges (lab)
- NFSv4
- Flash archives and live upgrade
- Moving from NIS to LDAP
- Dtrace
- FTP client and server enhancements
- PAM enhancements
- Auditing enhancements
- BSM
- Service Management Facility (lab)
- Solaris Cryptographic Framework
- Smartcard interfaces and APIs
- Kerberos enhancements
- Packet filtering
- BART
Peter Baer Galvin (R2, A2) is the Chief Technologist for Corporate Technologies, Inc., a systems integrator and VAR, and was the Systems Manager for Brown University's Computer Science Department. He has written articles
for Byte and other magazines. He wrote the "Pete's Wicked World" and
"Pete's Super Systems" columns at SunWorld. He is currently
contributing editor for Sys Admin, where he manages the Solaris
Corner. Peter is co-author of the Operating Systems Concepts and Applied Operating Systems Concepts textbooks. As a consultant and trainer, Peter has taught tutorials on security and system administration and has given talks at many conferences and institutions on such topics as Web
services, performance tuning, and high availability.
|
Thursday Morning Half-Day Tutorials
|
|
R3 Wide Area Storage Networking: Server Consolidation and Data Protection Over the WAN NEW!
Michael Cucchi, Cambridge Computer Services
9:00 a.m.12:30 p.m.
Who should attend: System administrators, IT managers, and enterprise architects who are concerned with disaster recovery, data protection, server consolidation, and resource sharing over a WAN. This tutorial is a survey of the types
of solutions on the market today, with examples of when to choose one approach over another.
Storage networking over the WAN? Impossible, right? Bandwidth is too
expensive. WAN latency kills the applications. SAN replication and remote
backup are too expensive.
That was yesterday. This is today. New technologies have emerged to address all of these challenges and the results are much better than you might think. This tutorial is a survey of the various technologies available for moving and accessing storage over the WAN. It
is divided into three sections. The first section focuses on backup and
restore over the WAN and describes solutions for sending backups off-site
over the WAN and for managing backups of branch offices. The second section
focuses on the various technologies for replicating live data between
sites. The third section focuses on accessing live storage over the WAN,
covering technologies such as Wide Area File Services (WAFS) and WAN
accelerators.
Topics include:
- Remote site backup techniques
- Continuous Data Protection (CDP)
- Storage encryption
- Capacity optimized storage devices and WAN accelerators
- Host-based vs. SAN-based vs. fabric-based replication
- Filesystem vs. volume-level vs. application-level replication
- Application fail-over
- The impact of latency on storage-intensive applications
- Compensating for WAN latencies
- WAN accelerators
- Wide Area File Services (WAFS)
- Email server consolidation
Michael Cucchi (R3) has over 13 years of IT experience. He spent seven of those years as a lead Linux/UNIX/Windows senior system admin and lead system
administrator for a major data center for the Federal Department of
Transportation. Michael did a two-year stint as a solution engineer for
Ammasso, where he helped launch the first RDMA Ethernet NIC. Mike is
currently a consultant for Cambridge Computer, a national integrator of
data protection and storage networking technologies.
R4 Security Without Firewalls NEW!
Abe Singer, San Diego Supercomputer Center
9:00 a.m.12:30 p.m.
Who should attend: Administrators who want or need to explore strong, low-cost, scalable security without firewalls.
Good, possibly better, network security can be achieved without
relying on firewalls. The San Diego Supercomputer Center does not
use firewalls, yet managed to go almost 4 years without an intrusion.
Our approach defies some common beliefs, but it seems to work, and it
scales well.
"Use a firewall" is the common mantra of much security documentation,
and are the primary security "solution" in most networks.
However, firewalls don't protect against activity by insiders, nor
do firewalls provide protection against any activity that is allowed through
the firewall. And, as is true for many academic institutions, firewalls just
don't make sense in our environment. Weighting internal threats
equally with external threats, SDSC has built an effective, scalable,
host-based security model. The keys parts to our model are: centralized configuration
management; regular and frequent patching; and strong authentication
(no plaintext passwords). This model extends well to many environments beyond the academic.
Of course, we're not perfect, and last year we had a compromise as
part of a security incident that spanned numerous institutions.
However, firewalls would have done little if anything to have
mitigated that attack, and we believe our approach to security
reduced the scope of compromise and helped us to recover faster
than some of our peers.
In addition to a good security model and faster recovery, our system
administration costs scale well. The incremental cost of adding a
host to our network (beyond the cost of the hardware) is negligible,
as is the cost of reinstalling a host.
Topics include:
- The threat perspective from a data-centric point of view
- How to implement and maintain centralized configuration
management using cfengine, and how to build reference systems
for fast and consistent (re)installation of hosts
- Secure configuration and management of core network services such as NFS, DNS, and SSH
- Good system administration practices
- Implementing strong authentication and eliminating use of
plaintext passwords for services such as
POP/IMAP
- A sound patching strategy
- An overview of last year's compromise, how we recovered, and what we learned
Abe Singer (T3, R4) is a Computer Security Researcher in the Security Technologies
Group at the San Diego Supercomputer Center. In his operational security
responsibilities, he participates in incident response and forensics
and in improving the SDSC logging infrastructure. His research is in
pattern analysis of syslog data for data mining. He is co-author of
of the SAGE booklet Building a Logging Infrastructure and author of a forthcoming O'Reilly book on log analysis.
R5 Server Consolidation and Containment Metholodology for Intel Environments NEW!
John Gannon and John Arrasjid, VMware
9:00 a.m.12:30 p.m.
Who should attend: System administrators/architects and IT managers who will be responsible for planning and/or implementing server consolidation
in an x86 environment. The tutorial assumes basic familiarity with
server virtualization and software-based virtual machine technology.
Server sprawl is a serious problem in Wintel environments. Due to
a variety of factors, enterprises find themselves with large server
farms that operate at extremely low utilization rates, use an
excessive amount of datacenter resources, and are increasingly
costly to manage and support.
A compelling way to address these issues is by server consolidation
and containment through use of server virtualization technology.
Server consolidation and containment initiatives have significant
impact on an organization's people, process, and technology. Proper
assessment, planning, and execution of these initiatives are critical
to making them successful.
Topics include:
- Introduction
- Flavors of consolidation
- Motivations for consolidation (business and technical)
- Risks inherent in consolidation
- Assessment
- Defining metrics for success
- Tools and best practices for gathering performance and inventory data
- Identifying good and bad candidates for consolidation
- Planning
- Selecting the ideal target hardware platform(s)
- High availability and disaster recovery considerations
- Virtual machine allocation best practices
- Development of documentation and test plans
- Building
- Building momentum and mindshare for the consolidation
- Tools for migrating from Physical to Virtual (P2V)
- Managing
- Virtual infrastructure management tools
- Ongoing management considerations
- Server containment policies
John Gannon (W2, R5) has over ten years of experience architecting and
implementing UNIX, Linux, and Windows infrastructures. John has
worked in network engineering, operations, and professional services
roles with various companies including Sun Microsystems, University
of Pennsylvania, Scient Corporation, and FOX Sports. John's current
work at VMware involves delivering server consolidation, disaster
recovery, and virtual infrastructure solutions to FORTUNE 500
clients.
John Arrasjid (W2, R5) has 20 years experience in the computer science field. His experience includes work with companies such as AT&T, Amdahl, 3Dfx
Interactive, Kubota Graphics, Roxio, and his own company, WebNexus
Communications, where he developed consulting practices and built a cross-platform IT team. John is currently a senior member of the VMware Professional Services
Organization as a Consulting Architect. John has developed a number of PSO
engagements, including Performance, Security, and Disaster Recovery and
Backup.
|
Thursday Afternoon Half-Day Tutorials
|
|
R6 UNIX on My Mind NEW!
Bill Cheswick, Lumeta
1:30 p.m.5:00 p.m.
Who should attend: Anyone developing tools for UNIX or Linux, who wants to
gain a greater understanding of "the way things are done, and why that is
the right way." This is not a tutorial for novices, but is for
people who want to fill out their understanding of the topics with philosophy,
examples, and war stories.
Attendees should have used UNIX, at least a bit, and have some programming
experience. They will gain facility in using UNIX as a powerful and efficient
prototyping tool for a number of classes of problems and will gain insight into
the simplicity and power of the original design of UNIX.
Attendees will benefit more if they bring their own computers running some
version of UNIX or Linux, but you can team up with someone else.
Topics include:
- The UNIX style of prototyping
- Small instructional tasks in sysadmin, network admin, small languages, data mining of Internet mapping data, and HTML generation
- Bourne shell and bash programming, awk, sed, etc.
- Why real cats don't have options
- Why /dev/null shouldn't be special
- Why man pages are so important, and so hard to get right
Bill Cheswick (R6, F3) logged into his first computer in 1968. Seven years
later, he was graduated from Lehigh University in 1975 with a degree
resembling Computer Science. Cheswick has worked on (and against) operating system security for
over 35 years. He has worked at Lehigh University and the Naval
Air Development Center in system software and communications. At
the American Newspaper Publishers Association/Research Institute
he shared his first patent for a hardware-based spelling checker,
a device clearly after its time. For several years he consulted at a variety of universities doing
system management, software development, communications design and
installation, PC evaluations, etc. In 1998, Ches starting the Internet Mapping Project with Hal Burch. This work became to core technology of a Bell Labs spin-off, Lumeta
Corporation, which explores the extent of corporate and government
intranets and checks for host leaks that violate perimeter policies.
Ches has pinged an active duty US nuclear attack submarine (distance,
66ms). Ches has a wide interest in science and medicine. In his spare
time he reads technical journals, hacks on Mythtv and his home, and
develops exhibit software for science museums. He eats very plain
foodboring by even American standards.
R7 Ethereal and the Art of Debugging Networks NEW!
Gerald Carter, Samba Team/Hewlett-Packard
1:30 p.m.5:00 p.m.
Who should attend: System and network administrators who are interested in
learning more about the TCP/IP protocol and how network traffic
monitoring and analysis can be used as a debugging, auditing,
and security tool.
The focus of this course is using the Ethereal protocol analyzer
as a debugging and auditing tool for TCP/IP networks. System
logs can turn out to be incomplete or incorrect when you're trying to track down
network application failures. Sometimes the quickest, or the only,
way to find the cause is to look at the raw data on the
wire. This course is designed to help you make sense of that data.
Topics include:
- Introduction to Ethereal for local and remote network tracing
- TCP/IP protocol basics
- Analysis of popular application protocols such as DNS, DHCP, HTTP, NFS, CIFS, and LDAP
- Security
- How some kinds of network attacks can be recognized
Gerald Carter (W3, R7) has been a member of the Samba Development Team
since 1998. He has been developing, writing about, and teaching on open source since the late '90s. Currently employed by
Centeris as a Samba and open source developer, Gerald has written
books for SAMS Publishing and for O'Reilly Publishing.
R8 Practical Project Management for Sysadmins and IT Professionals NEW!
Strata Rose Chalup, Project Management Consultant
1:30 p..m.5:00 p.m.
Who should attend: System administrators who want to stay hands-on as team leads or
system architects and need a new set of skills with which to tackle bigger,
more complex challenges. No previous experience with project management is
required. Participants will get a no-nonsense grounding in methods that work
without adding significantly to one's workload. After completing this tutorial, participants will be able to take an
arbitrarily daunting task and reduce it to a plan of attack that will be
realistic, lend itself to tracking, and have functional, documented goals. They will be able to give succinct and useful feedback to management on
overall project viability and timelines and easily deliver regular progress
reports.
People who have been through traditional multi-day project management courses
will be shocked, yet refreshed, by the practicality of our approach. To get the
most out of this tutorial, participants should have some real-world project or
complex task in mind for the lab sections.
This tutorial focuses on complementing your own organizational style
(or lack thereof) with a toolbox of ways to organize and manage complex
tasks without drowning in paperwork or clumsy, meeting-intensive methodologies.
Also emphasized is how to bridge the gap between ad-hoc methods and the kinds of
tracking and reporting traditionally trained managers will understand.
Topics include:
- Quick basics of project management
- The essentials you need to know
- How to map the essentials onto real-world projects
- Skill sets
- Defining success
- Chunking and milestoning
- Delegating
- Tracking
- Reporting
- Problem areas
- Teams, interactions among people
- The albatross project
- When to go deep and when to get "pointy-haired"
- When disaster strikes, should you scrap, or salvage?
- Project management tools
- What tools should do for you
- Leveraging the command line: UNIX PM
- Freeware PM tool options
- The only 15 minutes of MS Project you'll ever need
Strata Rose Chalup (R8, F5) began as a fledgling sysadmin in 1983 and
has been leading and managing complex IT projects for many years,
serving in roles ranging from Project Manager to Director of Network
Operations. She has written a number of articles on management and
working with teams and has applied her management skills on various
volunteer boards, including BayLISA and SAGE. Strata has a keen interest
in network information systems and new publishing technologies and built
a successful consulting practice around being an avid early adopter of
new tools, starting with ncsa_httpd and C-based CGI libraries in 1993 and
moving on to wikis, RSS readers, and blogging. Another MIT dropout,
Strata founded VirtualNet Consulting in 1993.
|
Friday, June 2, 2006
|
Full-Day Tutorials
|
F1 Beyond Shell Scripts: 21st-Century Automation Tools and Techniques NEW!
Æleen Frisch, Exponential Consulting
Who should attend: System administrators who want to explore new ways of automating administrative tasks. Shell scripts are
appropriate for many jobs, but more complex operations will
often benefit from sophisticated tools.
Topics include:
- Automating installations
- Vendor-supplied tools
- Alternative approaches
- State-of-the-art package control
- Heterogeneous environments
- Cfengine
- Basic and advanced configurations
- Examples
- Installations and beyond
- "Self-healing" system configurations
- Data collection
- More
- Cfengine limitations: when not to use it
- Other Tools
- Expect: automating interactive processes
- What to Expect . . .
- Using Expect with other tools
- Security issues
- Bacula, an enterprise backup management facility
- Prerequisites
- Configuration
- Getting the most from Bacula
- Nagios: monitoring network and device performance
- How it works
- Sample configurations
- Extending Nagios
- RRDTool: examining retrospective system data
- Basic operation
- Advanced graphing
- Options for data collection
- Other tools of interest
Æleen Frisch (R1, F1) has been a system administrator for over 20 years. She currently
looks after a pathologically heterogeneous network of UNIX and Windows
systems. She is the author of several books, including Essential
System Administration (now in its 3rd edition).
F2 Network Security Monitoring with Open Source Tools
Richard Bejtlich, TaoSecurity.com
Who should attend: Anyone who wants to know what is happening on their network. I assume command-line knowledge of UNIX and familiarity with TCP/IP. Anyone with duties involving intrusion detection, security analysis, incident response, or network forensics will like this tutorial.
This tutorial will show that there is more to network security monitoring (NSM) than
Snort and Ethereal. In fact, we won't talk about either, unless it's to
mention something you might not have seen before! NSM involves collecting
the statistical, session, full content, and alert data you need to discover
normal, malicious, and suspicious network events. You will leave this tutorial
immediately able to implement numerous new techniques and tools. Past
participants have discovered intrusions during the class, using concepts
learned in a few hours. The instructor bases his teaching on his books,
his professional consulting experience, and the latest security research.
Students with VMware Player installed will be able to follow along with the
technique and tool demonstrations, using an NSM VMware image provided by the
instructor.
Topics include:
- NSM theory
- Building and deploying NSM sensors
- Accessing wired and wireless traffic
- Full content tools: Tcpdump, Ethereal/Tethereal, Snort as packet logger
- Additional data analysis tools: Tcpreplay, Tcpflow, Ngrep, Netdude
- Session data tools: Cisco NetFlow, Fprobe, Flow-tools, Argus, SANCP
- Statistical data tools: Ipcad, Trafshow, Tcpdstat, Cisco accounting records
- Sguil (sguil.sf.net)
- Case studies, personal war stories, and attendee participation
Richard Bejtlich (F2) is founder of TaoSecurity (https://www.taosecurity.com), a company that helps clients detect, contain, and remediate intrusions using network
security monitoring (NSM) principles. Richard was previously a principal
consultant at Foundstone, performing incident response, emergency NSM, and
security research and training. He has created NSM operations for ManTech
International Corporation and Ball Aerospace & Technologies Corporation. From
1998 to 2001 then-Captain Bejtlich defended global American information assets
in the Air Force Computer Emergency Response Team (AFCERT), performing and
supervising the real-time intrusion detection mission. Formally trained as an intelligence officer, Richard is a graduate of Harvard
University and the United States Air Force Academy. He authored the critically
acclaimed Tao of Network Security Monitoring: Beyond Intrusion Detection in
2004 and Extrusion Detection: Security Monitoring for Internal Intrusions in
2005. Richard co-authored Real Digital Forensics and contributed to Hacking
Exposed, 4th Ed.,Incident Response, 2nd Ed., and several Sys Admin Magazine
articles. He holds the CISSP, CIFI, and CCNA certifications. Richard writes
for his Web log (www.taosecurity.blogspot.com) and teaches at USENIX conferences.
|
Friday Morning Half-Day Tutorials
|
|
F3 Defense Against the Dark Arts: Repelling the Wily Hacker NEW!
Bill Cheswick, Lumeta
9:00 a.m.12:30 p.m.
Who should attend: Anyone interested in learning practical security from a person whose job is to think both offensively and defensively. System administrators, security consultants, and software developers will all
benefit from this class. This is not a tutorial for novices, but is for
people who want to fill out their understanding of the topics with philosophy,
examples, and war stories.
System and network administrators with some experience administering UNIX
systems will gain an understanding of and confidence in designing sites that are
highly resistant to network attacks.
Topics include:
- How to nail down freshly installed UNIX systems
- How to jail important server and client applications
- Software safety and resistance against outside attacks
- Demo of securing and then probing systems with common hacking tools
- How to secure a community of systems
Bill Cheswick (R6, F3) logged into his first computer in 1968. Seven years
later, he was graduated from Lehigh University in 1975 with a degree
resembling Computer Science. Cheswick has worked on (and against) operating system security for
over 35 years. He has worked at Lehigh University and the Naval
Air Development Center in system software and communications. At
the American Newspaper Publishers Association/Research Institute
he shared his first patent for a hardware-based spelling checker,
a device clearly after its time. For several years he consulted at a variety of universities doing
system management, software development, communications design and
installation, PC evaluations, etc. In 1998, Ches starting the Internet Mapping Project with Hal Burch. This work became to core technology of a Bell Labs spin-off, Lumeta
Corporation, which explores the extent of corporate and government
intranets and checks for host leaks that violate perimeter policies.
Ches has pinged an active duty US nuclear attack submarine (distance,
66ms). Ches has a wide interest in science and medicine. In his spare
time he reads technical journals, hacks on Mythtv and his home, and
develops exhibit software for science museums. He eats very plain
foodboring by even American standards.
F4 Disk-to-Disk Backup and Eliminating Backup System Bottlenecks NEW!
Jacob Farmer, Cambridge Computer Corp.
9:00 a.m.12:30 p.m.
Who should attend: System administrators involved in the design
and management of backup systems and policymakers responsible for
protecting their organization's data. A general familiarity with
server and storage hardware is assumed. The class focuses on
architectures and core technologies and is relevant regardless of
what backup hardware and software you currently use. Students will
leave this lecture with immediate ideas for effective, inexpensive
improvements to their backup systems.
The data protection industry is going through a mini renaissance. In the
past few years, the cost of disk media has dropped to the point where it
is practical to use disk arrays in backup systems, thus minimizing and
sometimes eliminating the need for tape. In the first incarnations of
disk-to-disk backup (disk staging and virtual tape libraries), disk has
been used as a direct replacement for tape media. While this compensates
for the mechanical shortcomings of tape drives, it fails to address other
critical bottlenecks in the backup system, and thus many disk-to-disk
backup projects fell short of expectations. Meanwhile, many early adopters
of disk-to-disk backup are discovering that the longterm costs of disk
staging and virtual tape libraries are prohibitive.
The good news is that in the next generation, disk-enabled data protection
solutions have reached a level of maturity where they can assistand
sometimes even replaceconventional enterprise backup systems. These new
D2D solutions leverage the random-access properties of disk devices to use
capacity much more efficiently and to obviate many of the hidden backup
system bottlenecks which are not addressed by first-generation solutions.
The challenge to the backup system architect is to cut through the industry
hype, sort out all of these new technologies, and figure out how to integrate
them into an existing backup system.
This tutorial identifies the major bottlenecks in conventional backup
systems and explains how to address them. The emphasis is placed on the
various roles for inexpensive disk in your data protection strategy;
however, attention is given to SAN-enabled backup, the current state and
future of tape drives, and iSCSI.
Topics include:
- Identifying and eliminating backup system bottlenecks
- Conventional disk staging
- Virtual tape libraries
- Removable disk media
- Incremental forever and synthetic full backup strategies
- Block- and object-level incremental backups
- Information lifecycle management and nearline archiving
- Data replication
- CDP (Continuous Data Protection)
- Snapshots
- Current and future tape drives
- Capacity Optimization (Single-Instance File Systems)
- Minimizing and even eliminating tape drives
- iSCSI
Jacob Farmer (F4, F7) is a well-known figure in the data storage industry. He has authored numerous papers and articles and is a regular speaker at trade
shows and conferences. In addition to his regular expert advice column
in the "Reader I/O" section of InfoStor Magazine, the leading trade
magazine of the data storage industry, Jacob also serves as the
publication's senior technical advisor. Jacob has over 18 years of
experience with storage technologies and is the CTO of Cambridge
Computer Services, a national integrator of data storage and data
protection solutions.
F5 RSS vs. Information Overload NEW!
Strata Rose Chalup, Project Management Consultant
9:00 p.m.12:300 p.m.
Who should attend: People who want to manage incoming information streams and go "on
beyond Slashdot"; people who never heard of RSS before Microsoft
announced it was going to do an embrace/extend/exterminate on it.
There are so many sources of information out there that keeping up
can be a big challenge. Wading through folders of postings to
various lists, even quickly scanning the digest version,
is fundamentally not scalable. What if I told you there's
a tool out there designed for such things, which can publish headlines
of articles, aggregate them into a reading interface, and even be
used to fetch (or pre-fetch) the content?
Better yet, these tools are a natural fit for managing
some kinds of system information. And, like any hammer, RSS and
its cohorts will undoubtedly be used to pound on things that were
never nails. Look at the uses the Web is put to nowadays simply because it is a
robust, simple, well-defined protocol, although it was never intended or designed for them. RSS is in the same boat.
After completing this tutorial, participants will have an understanding
of how to harness RSS feeds for information management, the tradeoffs
among various publishing methods, and the toolkits available for working
with RSS. We'll discuss methods whereby RSS can augment traditional
system logging tools such as syslog and swatch, as well as hook
into conventional distribution tools such as mailman and majordomo.
Class materials will include pointers to RSS clients for a
wide range of platforms.
Topics include:
- RSS basics
- Origins and standards
- Growing pains: Tim, Dave, and a cast of hundreds
- RSS 2.0: a new beginning?
- RSS in context
- XML, DHTML, and RSS
- Where does Tibco fit in?
- The mod_pubsub model
- Weed 'n' feed
- Publishing basics
- Reputation communities (Syndic8 et al.)
- Atom: RSS on steroids, or annoyance?
- Bonus: what's this "tagging" stuff, and do I give a damn?
- Getting the goodies
- Aggregation clients
- Pre-fetch or post-fetch?
- Archiving feeds
- If I had a hammer . . .
- Toolkits and libraries
- Server-side fun for everyone
- Client building blocks
- Applied RSS
- syslog and MRTG: the low-hanging fruit
- Filtering and tagging
- Bugzilla and Wiki hooks
- Augmenting ticket systems
- Next generation
- Proposed RSS extensions
- Microsoft gets on the bandwagon
- Malice aforethought
- Scaling aspects to consider
- The coming deluge: spamvertising via RSS
- Security caveats
Strata Rose Chalup (R8, F5) began as a fledgling sysadmin in 1983 and
has been leading and managing complex IT projects for many years,
serving in roles ranging from Project Manager to Director of Network
Operations. She has written a number of articles on management and
working with teams and has applied her management skills on various
volunteer boards, including BayLISA and SAGE. Strata has a keen interest
in network information systems and new publishing technologies and built
a successful consulting practice around being an avid early adopter of
new tools, starting with ncsa_httpd and C-based CGI libraries in 1993 and
moving on to wikis, RSS readers, and blogging. Another MIT dropout,
Strata founded VirtualNet Consulting in 1993.
|
Friday Afternoon Half-Day Tutorials
|
|
F6 Databases: What You Need to Know NEW!
John Sellens, SYONEX
1:30 p.m.5:00 p.m.
Who should attend: System and application administrators who need
to support databases and database-backed applications.
Databases used to run almost exclusively on dedicated database
servers, with one or more database administrators (DBAs) dedicated
to their care. These days, with the easy availability of database
software such as MySQL and PostgreSQL, databases are popping up
in many more places, and are used by many more applications.
As a system administrator you need to understand databases, their care and feeding.
Attendees will leave the tutorial with a better understanding of
databases and their use and will be ready to deploy and support
common database software and database-backed applications.
Topics include:
- An introduction to database concepts
- The basics of SQL (Structured Query Language)
- Common applications of databases
- Berkeley DB and its applications
- MySQL installation, configuration, and management
- PostgreSQL installation, configuration, and management
- Security, user management, and access controls
- Ad-hoc queries with standard interfaces
- ODBC and other access methods
- Database access from other tools (Perl, PHP, sqsh, etc.)
John Sellens (F6, A3) has been involved in system and network administration since 1986 and is
the author of several related USENIX papers, a number of ;login: articles, and the SAGE Short Topics in System Administration booklet #7, System and Network Administration for Higher Reliability. He holds an M.Math. in computer science from the University of Waterloo and is a chartered accountant. He is the proprietor of SYONEX, a systems and networks consultancy. From 1999 to 2004, he was the General Manager for Certainty Solutions in Toronto. Prior to joining Certainty, John was the Director of Network Engineering at UUNET Canada and was a staff member in computing and information technology at the University of Waterloo for 11 years.
F7 Next Generation Storage Networking NEW!
1:30 p.m.5:00 p.m.
Jacob Farmer, Cambridge Computer Services
Who should attend: Sysadmins running day-to-day operations and those who set or enforce
budgets. This tutorial is technical in nature, but it does not address
command-line syntax or the operation of specific products or technologies.
Rather, the focus is on general architectures and various approaches to
scaling in both performance and capacity. Since storage networking
technologies tend to be costly, there is some discussion of the relative
cost of different technologies and of strategies for managing cost and
achieving results on a limited budget.
There has been tremendous innovation in the data storage industry over the
past few years. Proprietary, monolithic SAN and NAS solutions are beginning
to give way to open-system solutions and distributed architectures.
Traditional storage interfaces such as parallel SCSI and Fibre Channel are
being challenged by iSCSI (SCSI over TCP/IP), SATA (serial ATA), SAS (serial
attached SCSI), and even Infiniband. New filesystem designs and alternatives
to NFS and CIFS are enabling high-performance filesharing measured in
gigabytes (yes, "bytes," not "bits") per second. New spindle management techniques are
enabling higher-performance and lower-cost disk storage. Meanwhile, a whole
new set of efficiency technologies are allowing storage protocols to
flow over the WAN with unprecedented performance. This tutorial is a survey
of the latest storage networking technologies, with commentary on where and
when these technologies are most suitably deployed.
Topics include:
- Fundamentals of storage virtualization: the storage I/O path
- Shortcomings of conventional SAN and NAS architectures
- In-band and out-of-band virtualization architectures
- The latest storage interfaces: SATA (serial ATA), SAS (serial
attached SCSI), 4Gb Fibre Channel, Infiniband, iSCSI
- Content-Addressable Storage (CAS)
- Information Life Cycle Management (ILM) and Hierarchical Storage
Management (HSM)
- The convergence of SAN and NAS
- High-performance file sharing
- Parallel file systems
- SAN-enabled file systems
- Wide-area file systems (WAFS)
Jacob Farmer (F4, F7) is a well-known figure in the data storage industry. He has authored numerous papers and articles and is a regular speaker at trade
shows and conferences. In addition to his regular expert advice column
in the "Reader I/O" section of InfoStor Magazine, the leading trade
magazine of the data storage industry, Jacob also serves as the
publication's senior technical advisor. Jacob has over 18 years of
experience with storage technologies and is the CTO of Cambridge
Computer Services, a national integrator of data storage and data
protection solutions.
F8 Time Management: Getting It All Done and Not Going (More) Crazy!
1:30 p.m.5:00 p.m.
Tom Limoncelli, Google
1:30 p.m.5:00 p.m.
Who should attend: IT people, sysadmins, and other busy people who want to improve their
time-management skills, who want to have more control over their time
and better follow-through on assignments. If you feel overloaded, miss
appointments, and forget deadlines and tasks, this class is for you.
Do any of these statements sound like you?
- I don't have enough time to get all my work done.
- I don't have control over my schedule
- I'm spending all my time mopping the floor; I don't have
time to fix the leaking pipe.
- My boss says I don't work hard enough, but I'm always working
my off!
Based on a new book from O'Reilly, this tutorial will help you get
more done in less time. You'll miss fewer deadlines, be more
relaxed at work, and have more fun in your social life. If you think you don't have time to take this tutorial, you really need to take this tutorial!
Topics include:
- Why typical "time management" books don't work for sysadmins
- How to delegate tasks effectively
- A way to keep from ever forgetting a user's request
- Why "to do" lists fail and how to make them work
- Prioritizing tasks so that users think you're a genius
- Getting more out of your Palm Pilot
- Having more time for fun (for people with a social life)
- How to leave the office every day with a smile on your face
Tom Limoncelli (F8), author of O'Reilly's Time Management for System Administrators and co-author of The Practice of System and Network
Administration
from Addison-Wesley, is Director of IT Services at Cibernet Corp. A sysadmin and network wonk since 1987, he
has worked at Dean for America, Lumeta, Bell Labs/Lucent, Mentor Graphics, and Drew
University. He is a frequent presenter at LISA conferences.
Saturday, June 3, 2006
|
Full-Day Tutorials
|
A1 Learning PHP 5 NEW!
David Sklar, Ning Inc.
Who should attend: Programmers and system administrators who want to use PHP to build database-backed Web applications. Students in the tutorial should be handy with HTML, familiar with programming in another language such as Perl, C, or Python, and not total strangers to SQL and relational databases.
Instead of a dry walkthrough of keywords and syntax, this tutorial
presents an applied introduction to PHP 5 by building a complete
database-backed Web application: a social bookmarks manager that can be
used by a community to tag and share interesting URLs.
Code examples in the tutorial highlight new capabilities of PHP 5, such
as the improved object-oriented programming model, iterators,
overloading, and XML processing.
Topics include:
- Displaying and processing HTML forms
- Talking to a database
- Identifying users with sessions and cookies
- Securing your code against common hacker attacks
- Manipulating numbers, strings, and arrays
- Debugging and troubleshooting problems in your code
- Cleaning up your URL structure
- Using PEAR modules such as HTML_QuickForm and Mail_mime
- Generating dynamic images with GD
- Caching and tuning your application's performance
- Interfacing PHP with client-side Javascript
- Working with the Zend Framework
David Sklar (A1) is a Software Architect at Ning. He is also the author of Learning PHP 5 (O'Reilly), Essential PHP Tools (Apress), and PHP
Cookbook (O'Reilly). After discovering PHP as a solution to his Web programming needs in
1996, he created the PX, which enables PHP users to exchange programs.
Since then, he has continued to rely on PHP for personal and
professional projects. When away from the computer, Sklar eats mini-donuts, plays records, and likes to cook. He lives in New York City and has a degree in computer
science from Yale University.
A2 Solaris 10 Administration Workshop NEW!
Peter Baer Galvin, Corporate Technologies, Inc.
Who should attend: Solaris system managers and administrators interested in learning the new administration features in Solaris 10 (and features in previous Solaris releases that they may not be using).
This tutorial covers a variety of topics concerning Solaris 10. Solaris 10
includes many new features, and there are new issues to consider when
deploying, implementing, and managing Solaris 10. This will be a workshop
featuring instruction and practice/exploration. Each student should have
a laptop with wireless access for remote access into a provided Solaris 10
machine.
Note that, except for a few instances, Solaris 10 security is not covered in
this workshop.
Topics include:
- Overview
- Solaris releases (official, Solaris Express, OpenSolaris, others)
- Installing and upgrading to Solaris 10
- Planning your installation, filesystem layout, post-installation steps
- Installing (and removing) patches and packages
- Advanced features of Solaris 10
- Flash archives and live upgrade
- Patching
- Service Management Facility (lab)
- The kernel
- Crash and core dumps
- Cool commands
- ZFS (lab)
- N1 Grid Containers (a.k.a. Zones) (lab)
- Installation
- Management
- Resource management
- Dtrace
- FMA
- Performance
- Networking
- Sysadmin best practices
Peter Baer Galvin (R2, A2) is the Chief Technologist for Corporate Technologies, Inc., a systems integrator and VAR, and was the Systems Manager for Brown University's Computer Science Department. He has written articles
for Byte and other magazines. He wrote the "Pete's Wicked World" and
"Pete's Super Systems" columns at SunWorld. He is currently
contributing editor for Sys Admin, where he manages the Solaris
Corner. Peter is co-author of the Operating Systems Concepts and Applied Operating Systems Concepts textbooks. As a consultant and trainer, Peter has taught tutorials on security and system administration and has given talks at many conferences and institutions on such topics as Web
services, performance tuning, and high availability.
A3 System and Network Monitoring: Tools in Depth
John Sellens, SYONEX
Who should attend: Network and system administrators ready to
implement comprehensive monitoring of their systems and networks
using the best of the freely available tools. Participants should
have an understanding of the fundamentals of networking, familiarity
with computing and network components, UNIX system administration
experience, and some understanding of UNIX programming and scripting
languages.
This tutorial will provide in-depth instruction in the installation
and configuration of some of the most popular and effective system
and network monitoring tools, including Nagios, Cricket, MRTG, and
Orca.
Participants should expect to leave the tutorial with the information
needed to immediately implement, extend, and manage popular monitoring
tools on their systems and networks.
Topics include, for each of Nagios, Cricket, MRTG, and Orca:
- InstallationBasic steps, prerequisites, common problems, and solutions
- Configuration, setup options, and how to manage larger and non-trivial configurations
- Reporting and notificationsproactive and reactive
- Special caseshow to deal with interesting problems
- Extending the toolshow to write scripts or programs to extend the functionality of the basic package
- Dealing effectively with network boundaries and remote sites
- Security concerns and access control
- Ongoing operation
John Sellens (F6, A3) has been involved in system and network administration
since 1986 and is the author of several related USENIX papers, a number of ;login: articles, and the SAGE Short Topics in System Administration booklet #7, System and Network Administration for Higher Reliability. He holds an M.Math. in computer science from the University of Waterloo and is a chartered accountant. He is the proprietor of SYONEX, a systems and networks consultancy. From 1999 to 2004, he was the General Manager for Certainty Solutions in Toronto. Prior to joining Certainty, John was the Director of Network Engineering at UUNET Canada and was a staff member in computing and information technology at the University of Waterloo for 11 years.
A4 Measuring Security NEW!
Dan Geer, Geer Risk Services
Who should attend: Operations and security managers who need to design or interpret a metric structure for security risk
management.
"You cannot manage what you cannot measure": every business
school says this, so it must be true. "Cyber security is about
risk management": almost everyone believes this, and for good
reason. The sum of the two says that with respect to
computer-related security we are hosed if we don't get on the
ball and design some decent security metrics. So far, so
good, but what in tarnation is a decent security metric? "Ay,
there's the rub," as Hamlet would say. This tutorial makes a
healthy stab in the direction of security metrics and hopes
that its students soon surpass their teacher, which may not be
all that hard, as security metrics design is somewhere between
infancy and toddlerhood.
Topics include:
- Where You Stand Depends on Where You Sit: What management
texts/schools mean when they say, "Measure what you manage"
- Good Artists Create, Great Artists Steal: Styles and
methods of measurements used in other fields that are applicable to
security risk, and how to steal them
- Modeling: Is there any point in lifecycle or other models
of how security works; is there any unifying abstraction worth
using?
- Large Numbers: The state of the world and how to compare
yourself to it
- Information Sharing: Data fusion is dangerously powerful
but essential (with a sidebar on de-identification as a pre-sharing
safety mechanism)
- Where to Begin: How to roll your own, and a few pitfalls to
avoid, assuming that decision support is your real deliverable
- How to Communicate What You Find: Being simple without
being simplistic
Topics do not include:
- Secure coding standards, disaster recovery planning, firewall
log analysis, or anything else that is already a solved problem
or a side effect of low/no discipline
Dan Geer (A4)Milestones: The X Window System and Kerberos (1988), the first information security consulting firm on Wall Street (1992), convenor
of the first academic conference on electronic commerce (1995), the
"Risk Management Is Where the Money Is" speech that changed the
focus of security (1998), the presidency of the USENIX Association
(2000), the first call for the eclipse of authentication by
accountability (2002), principal author of and spokesman for
Cyberinsecurity: The Cost of Monopoly (2003), and co-founder of
SecurityMetrics.Org (2004).
A7 Inside the Linux Kernel (Updated for Version 2.6)
Theodore Ts'o, IBM
Who should attend: Application programmers and kernel developers. You should be reasonably familiar with C
programming in the UNIX environment, but no prior experience with the UNIX or Linux kernel code is assumed.
This tutorial will give you an introduction to the structure of the Linux kernel, the basic features it provides, and the most important algorithms it employs.
The Linux kernel aims to achieve conformance with existing standards and compatibility with existing operating systems; however, it is not a reworking of existing UNIX kernel code. The Linux kernel was written from scratch to provide both standard and novel features, and it takes advantage of the best practice of existing UNIX kernel designs.
Although the material will focus on the latest release version of the Linux kernel (v. 2.6), it will also address aspects of the development kernel codebase (v. 2.7) where its substance differs from 2.6. It will not contain any detailed examination of the source code but will, rather, offer an overview and roadmap of the kernel's design and functionality.
Topics include:
- How the kernel is organized (scheduler, virtual memory system,
filesystem layers, device driver layers, networking stacks)
- The interface between each module and the rest of the kernel
- Kernel support functions and algorithms used by each module
- How modules provide for multiple implementations of similar functionality
- Ground rules of kernel programming (races, deadlock conditions)
- Implementation and properties of the most important algorithms
- Portability
- Performance
- Functionality
- Comparison between Linux and UNIX kernels, with emphasis on differences in algorithms
- Details of the Linux scheduler
- Its VM system
- The ext2fs filesystem
- The requirements for portability between architectures
Theodore Ts'o (A7) has been a Linux kernel developer since almost the very
beginnings of Linux: he implemented POSIX job control in the
0.10 Linux kernel. He is the maintainer and author of the Linux COM
serial port driver and the Comtrol Rocketport driver, and he architected
and implemented Linux's tty layer. Outside of the kernel, he is
the maintainer of the e2fsck filesystem consistency checker. Ted
is currently employed by IBM Linux Technology Center.
|
|
|