Date: Tue, 20 Dec 94 15:53:55 EST From: coast-request@cs.purdue.edu (Coast Watch maintainers) Reply-To: coast-request@cs.purdue.edu Subject: Coast Watch Digest V1 #1 (part 2 of 2) To: important-people@cs.purdue.edu (Coast Watch subscribers) Precedence: bulk Coast Watch Digest Tue, 20 Dec 94 Volume 1 : Issue 1 (Continued from part 1) ---------------------------------------------------------------------- Subject: Program Announcement: ISOC '95 Symp. Net. & Distr. Sys. Security Date: Tue, 06 Dec 1994 23:49:04 -0500 From: "David M. Balenson" ============================================================================== THE INTERNET SOCIETY SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY 16-17 FEBRUARY 1995 CATAMARAN HOTEL - SAN DIEGO, CALIFORNIA The symposium will bring together people who are building software and/or hardware to provide network and distributed system security services. The symposium is intended for those interested in the more practical aspects of network and distributed system security, focusing on actual system design and implementation, rather than in theory. We hope to foster the exchange of technical information that will encourage and enable the Internet community to apply, deploy and advance the state of the available security technology. ============================================================================== P R E L I M I N A R Y P R O G R A M WEDNESDAY, FEBRUARY 15 6:00 P.M. - 8:00 P.M. REGISTRATION AND RECEPTION - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - THURSDAY, FEBRUARY 16 7:30 A.M. CONTINENTAL BREAKFAST 8:30 A.M. OPENING REMARKS 9:00 A.M. SESSION 1: DIVERSE APPROACHES TO SECURITY AT THE NETWORK LAYER Chair: Stephen T. Kent (Bolt, Beranek and Newman, USA) Multicast-Specific Security Threats and Counter-Measures, Tony Ballardie and Jon Crowcroft (University College London, United Kingdom). Design of a Key Agile Cryptographic System for OC-12c Rate ATM, Daniel Stevenson, Nathan Hillery, Greg Byrd, and Dan Winkelstein (Microelectronics Center of North Carolina - MCNC, USA). IpAccess: An Internet Service Access System for Firewall Installations, Steffen Stempel (University of Karlsruhe, Germany). 10:30 A.M. BREAK 11:00 A.M. SESSION 2: PANEL: SECURITY ARCHITECTURE FOR THE INTERNET INFRASTRUCTURE Chair: Robert W. Shirey (The MITRE Corporation, USA) Security for the Internet Protocol (IP) and IP Next Generation, Paul A. Lambert (Motorola, USA). Security for the Internet Domain Name System, James M. Galvin (Trusted Information Systems, USA). Security of Routing Protocols in the Internet, Gary Scott Malkin (Xylogics, USA). Security Approaches to Routing in the Internet, Sandra L. Murphy (Trusted Information Systems, USA). 12:30 P.M. LUNCH 2:00 P.M. SESSION 3: OFF-LINE OBJECT DISTRIBUTION SECURITY Chair: Jeffrey I. Schiller (Massachusetts Institute of Technology, USA) Trusted Distribution of Software Over the Internet, Aviel D. Rubin (Bellcore, USA). Location-Independent Information Object Security, John Lowry (Bolt Beranek and Newman, USA). 3:00 P.M. BREAK 3:30 P.M. SESSION 4: INTERNET PAYMENTS Chair: Ravi Ganesan (Bell Atlantic, USA) Electronic Cash on the Internet, Stefan Brands (Centrum voor Wiskunde en informatica - CWI, The Netherlands). PANEL: Internet Payment Mechanisms - Requirements and Architecture Chair: Ravi Ganesan (Bell Atlantic, USA) Panelists: B. Clifford Neuman (Information Sciences Institute, USA), David Crocker (Brandenburg Consulting, USA), and others TBD 7:00 P.M. DINNER BANQUET - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - FRIDAY, FEBRUARY 17 7:30 A.M. CONTINENTAL BREAKFAST 8:30 A.M. SESSION 5: SECURITY MONITORING TOOLS - PRACTICE AND EXPERIENCE Chair: Michael St. Johns (Advanced Research Projects Agency, USA) NERD: Network Event Recording Device: An Automated System for Network Anomaly Detection and Notification, David G. Simmons and Ronald Wilkins (Los Alamos National Laboratory, USA). An Overview of SNIF: A Tool for Surveying Network Information Flow, Jim Alves-Foss (University of Idaho, USA). Distributed Audit Trail Analysis, Abdelaziz Mounji, Baudouin Le Charlier, Denis Zampunieris and Naji Habra (Facultes Universitaires de Namur - FUNDP, Belgium). 10:00 A.M. BREAK 10:30 A.M. SESSION 6: AUTHENTICATION AND AUTHORIZATION Chair: B. Clifford Neuman (Information Sciences Institute, USA) SESAME V2 Public Key and Authorisation Extensions to Kerberos, Piers McMahon (ICL, United Kingdom). Yaksha: Augmenting Kerberos with Public Key Cryptography, Ravi Ganesan (Bell Atlantic, USA). GSS-API Security for ONC RPC, Barry Jaspan (OpenVision Technologies, USA). 12:00 NOON - 1:30 P.M. LUNCH 1:30 P.M. SESSION 7: MECHANISMS OF IDENTITY - THE CERTIFICATE INFRASTRUCTURE Chair: Hilarie Orman (University of Arizona, USA) A Certificate Management System: Structure, Functions and Protocols, Nada Kapidzic and Alan Davidson (Stockholm University & Royal Institute of Technology, Sweden). PEMToolKit: Building a Top-Down Certification Hierarchy for PEM from the Bottom Up, Alireza Bahreman (Bellcore, USA). A New Approach to the X.509 Framework: Allowing a Global Authentication Infrastructure Without a Global Trust Model, Suzan Mendes (TS-E3X - Research and Development Center, France) and Christian Huitema (INRIA, France). 3:00 P.M. BREAK 3:30 P.M. SESSION 8: PANEL: SECURITY ISSUES FOR MOSAIC AND THE WORLD WIDE WEB Chair: Fred Avolio (Trusted Information Systems, USA) Panelists: Peter J. Churchyard (Trusted Information Systems, USA), Allan M. Schiffman (Enterprise Integration Technologies, USA), and Bill Cheswick (AT&T Bell Laboratories, USA) ------------------------------------------------------------------------------ GENERAL CHAIR James T. Ellis, CERT Coordination Center, Carnegie Mellon University PROGRAM CO-CHAIRS David M. Balenson, Trusted Information Systems Robert W. Shirey, The MITRE Corporation PROGRAM COMMITTEE Thomas A. Berson, Anagram Laboratories Matt Bishop, University of California at Davis Ravi Ganesan, Bell Atlantic Stephen T. Kent, Bolt, Beranek and Newman Paul A. Lambert, Motorola John Linn, OpenVision Technologies B. Clifford Neuman, Information Sciences Institute Hilarie Orman, University of Arizona Michael Roe, University of Cambridge (UK) Robert Rosenthal, U.S. National Institute of Standards and Technology Jeffrey I. Schiller, Massachusetts Institute of Technology Peter Yee, U.S. National Aeronautics and Space Administration Roberto Zamparo, Telia Research (Sweden) PUBLICATIONS CHAIR Terry Mayfield, Institute for Defense Analyses REGISTRATIONS CHAIR Gloria Carrier, The MITRE Corporation LOCAL ARRANGEMENTS CHAIR Thomas Hutton, San Diego Supercomputer Center STEERING GROUP Internet Research Task Force, Privacy and Security Research Group ------------------------------------------------------------------------------ BEAUTIFUL SAN DIEGO The Symposium venue is the Catamaran Resort Hotel, providing 7 acres of gorgeous surroundings, facing Mission Bay and only 100 yards from beautiful Pacific Ocean beaches. Spouses and family members can catch a convenient Harbor Hopper for a quick trip to Sea World. After the Symposium, plan to spend the weekend visiting La Jolla, the world famous San Diego Zoo or Mexico, only 30 minutes by car or Trolley. A limited number of rooms have been reserved at the Catamaran for the very special rate of $71.56 single, $88 double. Reservations, on a space available basis, can be made by calling (800)-288-0770 and indicating you are attending the ISOC Security Symposium, or by FAXing the hotel registration form attached below. Reservations must be made before Jan. 15, 1995 to ensure the special rate. CLIMATE February weather in San Diego is normally very pleasant. Early morning temperatures average 55 degrees while afternoon temperatures average 67 degrees. Generally, a light jacket or sweater is adequate during February; although, occasionally it rains. TRANSPORTATION San Diego International Airport is 10 miles (approx. 15 minutes) from the Catamaran Hotel. Cloud9 shuttle operates a continuous service between the airport and the hotel: fare is $6.00. When you arrive at the airport, go to the shuttle loading area at either terminal and ask the attendant to radio for a Cloud9 shuttle to the Catamaran. Taxi fare between the airport and the hotel is approx. $20. The Catamaran charges $6 per day for parking. REGISTRATION FEES Postmarked Subsequent by Jan. 6 registration $320 $365 REGISTRATION INCLUDES - Attendance - Symposium Proceedings - Reception - Banquet - Two Luncheons - Coffee Breaks ON-SITE REGISTRATION is available Wednesday evening at the reception, and Thursday morning at the Symposium. FOR MORE INFORMATION on registration contact Gloria Carrier by phone at (703)-883-4508 or via email to gcarrier@mitre.org. ============================================================================== SYMPOSIUM REGISTRATION FORM Name ______________________________________________________________________ Affiliation _______________________________________________________________ Name on Badge _____________________________________________________________ Special Requirements (e.g., dietary)? _____________________________________ Mailing Address ___________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ Area Code/Phone # _________________________________________________________ Area Code/FAX # ___________________________________________________________ Email Address _____________________________________________________________ [ ] Check here if you would prefer that your name NOT be included in the list of attendees distributed at the symposium. Make check (credit cards not accepted) payable to ISOC NDSS SYMPOSIUM. (Registration is not effective until payment is received). Mail registration, no later than February 10, 1994, to: ISOC Symposium, C/O Gloria Carrier, The MITRE Corporation, 7525 Colshire Drive, M.S. Z605, McLean, VA 22102-3481, USA. ============================================================================== HOTEL REGISTRATION FORM WELCOME ISOC SECURITY SYMPOSIUM February 16-17, 1995 Single: $71.56 Double: $88.00 Triple: $103.00 Quad: $118.00 Extra Person $15.00 All rates subject to $10.50 room tax Reservations required by: January 15, 1995 Fax this form to the Catamaran Hotel at (619)-490-3328 Name ______________________________________________________________________ Street ____________________________________________________________________ City ___________________________________ State ___________ Zip ____________ Phone # ________________________________ Number in Party ________________ Arrival Date ___________________________ Departure Date _________________ Roommate(s) ____________________________ Special Needs __________________ Credit Card # __________________________ Expires ________________________ Name on Card ______________________________________________________________ Signature _________________________________________________________________ ============================================================================== ------------------------------ Date: Mon, 31 Oct 94 18:47:54 EST From: Frederick M Avolio Subject: CPF: 5th USENIX UNIX Security Symposium ANNOUNCEMENT and CALL FOR PAPERS 5th USENIX UNIX Security Symposium June 5-7, 1995 Salt Lake City Marriott Hotel Salt Lake City, Utah Sponsored by the USENIX Association, the UNIX and Advanced Computing Systems Professional and Technical Association In cooperation with: The Computer Emergency Response Team (CERT), IFIP WG 11.4, and UniForum IMPORTANT DATES DATES FOR REFEREED PAPER SUBMISSIONS Extended abstracts due: Feb 13, 1995 Program Committee decisions made: Mar 8, 1995 Camera-ready final papers due: May 1, 1995 Registration Materials Available: March 1995 PROGRAM COMMITTEE Program Chair: Fred Avolio, Trusted Information Systems, Inc. Steve Bellovin, AT&T Bell Laboratories Bill Cheswick, AT&T Bell Laboratories Ed DeHart, CERT Ed Gould, Digital Equipment Corporation Marcus Ranum, Trusted Information Systems, Inc. Jeff Schiller, MIT Gene Spafford, COAST Laboratory, Purdue University OVERVIEW The goal of this symposium is to bring together security practitioners, researchers, system administrators, systems programmers, and others with an interest in computer security as it relates to networks and the UNIX operating system. This will be a 3 day, single-track symposium. The symposium will consist of tutorials, refereed and invited technical presentations, and panel sessions. The first day will be devoted to tutorial presentations. Two days of technical sessions will follow the tutorials. TUTORIALS [June 5] This one-day tutorial program is designed to address the needs of both technical and management attendees. The tutorials will supply overviews of various security mechanisms and policies. Each will provide specifics to the system and site administrator for implementing numerous local and network security precautions, firewalls, and monitoring systems. KEYNOTE AND TECHNICAL SESSIONS [June 6-7] The keynote address by Stephen T. Walker, Founder and President of Trusted Information Systems, will begin the technical sessions program. Mr. Walker will speak on information security and privacy in computing. Mr. Walker is an electronics engineer and computer systems analyst with over 25 years of experience in system design and program management; particularly extensive is his experience with the design and implementation of large scale computer networks and information systems. He is nationally recognized for his pioneering work on the DoD Computer Security Initiative, the establishment of the National Computer Security Center, and the formation of the Defense Data Network. He is a member of the Computer System Security and Privacy Advisory Board, established by the Computer Security Act of 1987. The technical sessions program, in addition to presentations of refereed papers, will include invited talks, and possibly panel sessions. There will also be two evenings available for Birds-of-a-Feather sessions (BoFs) and Works-in-Progress Reports (WiPs). The program committee invites you to submit proposals, ideas, or suggestions for these presentations; your suggestions may be submitted to the program chair via email to: securitypapers@usenix.org or by post to the address given below. Papers that have been formally reviewed and accepted will be presented during the symposium and published in the symposium proceedings. Proceedings of the symposium will be published by USENIX and will be provided free to technical session attendees; additional copies will be available for purchase from USENIX. SYMPOSIUM TOPICS Presentations are being solicited in areas including but not limited to: *User/system authentication *File system security *Network security *Security and system management *Security-enhanced versions of the UNIX operating system *Security tools *security incident investigation and response *computer misuse and anomaly detection *security in heterogeneous environments *configuration management to support security *security-related testing methods *case studies REFEREED PAPER SUBMISSIONS Submissions must be received by Feb 13, 1995. Full papers should be 10 to 15 pages. Instead of a full paper, authors may submit an extended abstract which discusses key ideas. Extended abstracts should be 5-7 pages long (about 2500-3500 words), not counting references and figures. The body of the extended abstract should be in complete paragraphs. The object of an extended abstract is to convince the reviewers that a good paper and presentation will result. All submissions will be judged on originality, relevance, and correctness. Each accepted submission will be assigned a member of the program committee to act as its shepherd through the preparation of the final paper. The assigned member will act as a conduit for feedback from the committee to the authors. Camera-ready final papers are due May 1, 1995. Please accompany each submission by a cover letter stating the paper title and authors along with the name of the person who will act as the contact to the program committee. Please include a surface mail address, daytime and evening phone number, and, if available, an email address and fax number for the contact person. If you would like to receive detailed guidelines for submission and examples of extended abstracts, you may send email to: securityauthors@usenix.org or telephone the USENIX Association office at +1 510 528 8649. The UNIX Security Symposium, like most conferences and journals, requires that papers not be submitted simultaneously to another conference or publication and that submitted papers not be previously or subsequently published elsewhere. Papers accompanied by "non-disclosure agreement" forms are not acceptable and will be returned to the author(s) unread. All submissions are held in the highest confidentiality prior to publication in the Proceedings, both as a matter of policy and in accord with the U.S. Copyright Act of 1976. WHERE TO SUBMIT Please send one copy of a full paper or an extended abstract to the program committee via two of the following methods. All submissions will be acknowledged. o Preferred Method: email (Postscript or ASCII) to: securitypapers@usenix.org o Alternate Method: postal delivery to Fred Avolio Trusted Information Systems 3060 Washington Road Glenwood, MD 21738 +1 410 442 1673 o Fax: +1 301 854 5363 REGISTRATION MATERIALS Materials containing all details of the technical and tutorial programs, registration fees and forms, and hotel information will be available beginning in March 1995. If you wish to receive the registration materials, please contact USENIX at: USENIX Conference Office 22672 Lambert Street, Suite 613 Lake Forest, CA USA 92630 +1 714 588 8649; Fax: +1 714 588 9706 email: conference@usenix.org ------------------------------ From: "SANS'95 Conference Office" Subject: SANS'95: 4th UNIX SYSTEM ADMINISTRATION, NETWORKING & SECURITY CONFERENCE Date: Sun, 18 Dec 1994 10:10:09 -0500 (EST) SANS'95 4th UNIX SYSTEM ADMINISTRATION, NETWORKING & SECURITY CONFERENCE Sponsored by THE OPEN SYSTEMS CONFERENCE BOARD with the cooperation of SAGE The System Administrators Guild, a Special Technical Group of the USENIX Association April 24-29, 1995 Washington, DC ***************** DATES TO REMEMBER ***************** VERY EARLY REGISTRATION DEADLINE: February 15, 1995 VERY EARLY REGISTRATION BONUS: ************************************************************* **** Those who pay for SANS'95 before February 15 will **** **** receive a free, AUTOGRAPHED, copy of Evi Nemeth, **** **** Trent Hein, and the other authors' authoritative **** **** new, 800 page UNIX System Administration Handbook **** **** (Prentice Hall, 1995) that includes a CD-ROM with **** **** a wealth of useful software and reference materials.**** ************************************************************* PRE-REGISTRATION DEADLINE: April 4, 1995 HOTEL RESERVATION DEADLINE: April 4, 1995 Note: SANS has space for 400 participants. Last year, SANS was oversubscribed, and registration was closed three weeks before the conference started. Please register early this year. All conference sessions are held at the Stouffers Concourse Hotel in Arlington. (Fly to Washington National Airport.) SUNDAY, APRIL 23, 1995: 6:00 pm - 9:00 pm REGISTRATION MONDAY, APRIL 24, 1995 9:00 am - 5:00 pm FULL-DAY COURSES 6:00 pm - 9:00 pm MOVIE NIGHT TUESDAY, APRIL 25, 1995 9:00 am - 5:00 pm FULL-DAY COURSES 6:00 pm - 9:00 pm AFFINITY GROUP BIRDS OF A FEATHER SESSIONS WEDNESDAY, APRIL 26, 1995 8:30 am - 3:45 pm FULL-DAY COURSES (early start and finish; short breaks) ***TECHNICAL CONFERENCE BEGINS*** 4:00 pm - 5:30 pm KEYNOTE: ON THE INTERNET 6:00 pm - 9:00 pm BIRDS OF A FEATHER SESSIONS THURSDAY, APRIL 27, 1995 8:30 am - 5:00 pm TRIPLE-TRACK TECHNICAL CONFERENCE 5:15 pm - 9:15 pm RECEPTION AND VENDOR EXHIBIT 7:30 pm - 9:30 pm BIRDS OF A FEATHER SESSIONS (If desired) FRIDAY, APRIL 28, 1995 8:30 am - 4:00 pm TRIPLE-TRACK TECHNICAL CONFERENCE SATURDAY, APRIL 29, 1995 8:30 am - 4:00 pm POST-CONFERENCE WORKSHOPS BIRDS-OF-A-FEATHER SESSIONS: Birds-of-a-Feather Sessions (BOFs) are informal but important aspects of the SANS program. BOFs enable attendees to discuss topics of mutual interest and to build professional relationships with other sysadmins who share similar interests. These highly interactive sessions will be held each evening and will last from one to two hours each. To schedule a BOF,contact the SANS BOF Coordinator, John Stewart (Cisco Systems) at email: jns@cisco.com, phone: +1. 408.526.8499, or call the SANS Office at 719-599-4303. COMMERCIAL TOOLS TECHNICAL SESSIONS AND VENDOR DISPLAY: This unique feature of SANS lets you compare capabilities of many of the popular network and system management software offerings from both hardware and software companies. The speakers are encouraged to offer technical briefings without marketing fluff. The Thursday, April 27, evening vendor table-top demonstrations offer additional time to get answers to your questions -- while using the tools themselves. Many UNIX installations -- especially non-research installations -- use commercial software for network and system management and security. If your site is considering commercial tools, this is an opportunity to save time in evaluating a selection of the best alternatives. CONFERENCE PROCEEDINGS AND WORKBOOK: One copy of the SANS'95 Proceedings And Workbook is included with each Technical Sessions registration fee. Additional copies may be purchased at the Conference or ordered from the USENIX Association Executive Office (510-528-8649; email: office@usenix.org). THE GURU IS IN: Facing any challenges? Have a particular problem? Find answers and solutions to your problems by talking one-on-one with the experts. Guru sessions will be scheduled throughout the Technical Conference. Suggestions or requests for particular guru sessions may be sent via email to sans@fedunix.org. The final schedule with topics, times, and guru names will be posted at the conference. TERMINAL ROOM: Once again this year, a Terminal room will be available for you at SANS. Located in Room 110 of the conference hotel, it will provide connections to the Internet. ******************** WHO'S WHO AT SANS'95 ******************** Most of the UNIX community's top-rated presenters will be speaking and/or teaching courses at SANS'95: Matt Bishop (U Cal. Davis), Tom Christiansen, Michele Crabb (Sterling Software, NASA-Ames), Tina Darmohray (Great Circle), Dan Geer (Open Vision), Trent Hein (XOR Network Engineering), Bill Howell (Glaxo), Rob Kolstad (BSDI), Amy Kreiling (Univ. North Carolina), Scott Menter (Enterprise Systems Management), Evi Nemeth (Univ. of Colorado), Marcus Ranum (Trusted Information Systems), Peter Salus, Bjorn Satdeva (/sys/admin, inc.), Gene Spafford (Purdue University), Elizabeth Zwicky (Silicon Graphics), and more than a dozen others. HOTEL INFORMATION The conference will be held at the Stouffers Concourse Hotel in Arlington, Virginia, just across the Potomac River from Washington DC. The hotel is less than a half-mile from National Airport, and transportation from the airport is free via a shuttle that runs continuously from 5:30 am to 1:00 am. From the hotel, Washington's award-winning Metro is a short three-block walk. It will take you quickly to most of the major attractions: The Capitol The White House The Smithsonian Museums (including the Air and Space Museum) The National Gallery Of Art The Washington Memorial The Federal Bureau of Investigation The Washington Zoo (with the last remaining Chinese Panda) The Holocaust Museum and many more attractions. In addition, Georgetown and Alexandria are short cab rides away. For the shoppers, one of the great malls: Pentagon City, is very close and the hotel bus will take you and pick you up. IMPORTANT: Please make your hotel reservations early. The Stouffers Hotel is always sold out during the busy Spring season. HOTEL ADDRESS AND CONTACT: Stouffers Concourse Hotel 2399 Jefferson Davis Highway Arlington, VA 22202 Telephone: Toll Free: 1-800-468-3571 or 703-418-6800 FAX: 703-418-3763 PRICES: $129 Single or Double (Special SANS Rate) Cut Off Date for Hotel Reservations: April 4, 1995 TO MAKE YOUR HOTEL RESERVATION Special hotel rates have been arranged for SANS attendees. Call the hotel directly and ask for the Reservation Desk or use the toll free line (800-468-3571). To take advantage of our group rate, tell reservations that you are a SANS Conference attendee. A one night's deposit is required if your arrival time will be after 4:00 pm. You also may FAX your reservation to the Stouffers. IMPORTANT! Room reservation deadline is April 4, 1995. But please make your reservations earlier than that so you can be sure of getting a room GETTING TO WASHINGTON: If you come by air, it is most convenient to fly into Washington National Airport (rather than the Dulles or Baltimore-Washington airports) because the hotel is so close to National. We strongly encourage you to use excursion fares and stay over a Saturday evening. For a trip from Denver, for example, you may save as much as $700. ============================= SANS'95 Courses and Workshops ============================= MONDAY APRIL 24: 9:00 am to 5:00 pm M1: (FROM THEIR NEW BOOK) Topics in Network Administration, Evi Nemeth (Univ. of Colorado) and Trent Hein (XOR Network Engineering) M2: UNIX Security: Threats and Solutions, Matt Bishop (Univ. of California at Davis) M3: Sendmail Configuration and DNS Management, Rob Kolstad (BSDI) and Tina Darmohray (Great Circle Associates) TUESDAY APRIL 25: 9:00 am to 5:00 pm T4: (FROM THEIR NEW BOOK) Topics In System Administration, Evi Nemeth (Univ. of Colorado) and Trent Hein (XOR Network Engineering) T5: (NEW) Surfing 2000 Part I: Catching The Wave, An Introduction to The Internet, Amy Kreiling (Univ. of North Carolina) with John Stewart (Cisco) T6: UNIX Security Course 2: Threats and Solutions From The Network and Security Challenges In Programs, Matt Bishop (Univ. of California at Davis) T7: (NEW) Managing, Hiring, Ethics, and Policy for System Administrators, Rob Kolstad (BSDI) and Tina Darmohray (Great Circle Associates) WEDNESDAY APRIL 26: 9:00 am to 5:00 pm W8: Practical Perl, Tom Christiansen W9: (NEW) Surfing 2000: Building A Successful World-Wide Web, Amy Kreiling (Univ. of North Carolina) with John Stewart (Cisco) W10: (NEW) UNIX Security Course 3: UNIX Security Tools and Internal Security, Matt Bishop (Univ. of California at Davis) and Rob Kolstad (BSDI) W11: (NEW) Constucting Firewalls For Network Security Tina Darmohray (Great Circle Associates) POST-CONFERENCE WORKSHOPS SATURDAY APRIL 29: 9:00 am to 4:00 pm S12:(NEW) Four Keys To Professional Advancement: managing users,managing your boss, effective technical presentations, effective writing, Bill Howell, Rob Kolstad, Alan Paller, and Carolyn Sherman S13: (NEW) The Most Useful Tools For System Administrators: Where To Find Them, How To Use Them, Bjorn Satdeva (/sys/admin, inc.) S14: (NEW) UNIX System and Network Performance Tuning, Marcus Ranum, Trusted Information Systems (For detailed course descriptions, email SANS@fedunix.org. Put COURSES in the body or subject.) ========================= SANS TECHNICAL CONFERENCE ========================= CHAIR: ROB KOLSTAD, BSDI Keynote: Wednesday, April 26th, 4:15 pm Internet Revealed Carl Malamud Presented by the man who many claim is doing more to mainstream the Internet than all the world's governments and professional societies, together. =================================== SANS'95 SYSTEM ADMINISTRATION TRACK =================================== Thursday, April 27, 1995 9:00 am to 5:30 pm Friday, April 28, 1995 9:00 am to 4:00 pm Goals of System Administration Elizabeth Zwicky, Silicon Graphics How To Hire Good System Administrators Michele Crabb, Sterling Software-NASA Ames System Administration Ethics Rob Kolstad, BSDI The 1994 SANS Salary Survey Alan Paller, Computer Associates Advanced Topics In perl (Four separate parts) Tom Christiansen >From the other side of the desk: Observations of consumers from executives in the software and service industries Scott Menter and Rob Kolstad "Best of Sys Admin Magazine" Joint project with Sys Admin Magazine to bring the author of 1994's year's best article to SANS. People Skills for the System Administrator P. David Parks, IEEE Managing People's Data Diana Le, NAS Systems Division, NASA Ames Research Center Client-Server Disaster Recovery: Process Organization James C. Murphy, Glaxo Inc. Maintaining Large Software Repositories with SLINK R4 Alva L. Couch, Assoc. Prof. of Computer Science, Tufts University and Greg Owen, Xerox Information Systems Experiences With Legato NetWorker: Backing-up Heterogeneity Phillip Scarr, Neuroclinical Trials Center, The Virginia Neurological Institute Some Observations and Experiences Regarding Remote Sites and Corporate Mergers in a Large, Heterogeneous Network Jody Fraser, The MacNeal-Schwendler Corporation Using Surveys To Manage Clients' Perception of Help Desk Service Delivery Tom Jordan, Vice President, Deutsche Bank A Mail Proxy Approach to Managing Shared Facilities Peter Koski, Goldman, Sachs & Co. =========================== SANS'95 SECURITY TRACK =========================== CHAIRS: Michele Crabb, Sterling and NASA, and Matt Bishop, U. Cal. Davis Thursday, April 27, 1995 9:00 am to 5:30 pm Friday, April 28, 1995 9:00 am to 4:00 pm Plenary Panel: Computer Security and the Law - Who Do You Call When Something Happens? Scott Charney, Dept. of Justice, and friends A Network Security FAQ: (Frequently Agonizing Quandaries) Marcus Ranum, Trusted Information Systems The Basics of UNIX Vulnerabilities: Case Studies and Analysis Matt Bishop, Univ. Cal. at Davis The Pros and Cos of Vulnerability Information Disclosure Gene Spafford, Purdue University Building A Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford Michele Crabb, Sterling Software, NASA Ames Security Technology: Enabler or Disabler Dan Geer, OpenVision Panel: Experience With The Internet Sniffer Attacks Arranged by Michele Crabb ================================== SANS NETWORKING AND INTERNET TRACK ================================== CHAIR: Amy Kreiling, UNC Friday, April 28, 1995 9:00 am to 4:00 pm History of UNIX and the Internet Peter Salus A Primer on Connecting to the Internet Safely and Reliably Marcus Ranum, Trusted Information Systems PONG: A Flexible Network Services Monitoring System Helen Harrison, SAS Institute, Inc. with Mike C. Mitchell and Mike E. Shaddock Internet: Hot Topics Amy Kreiling, University of North Carolina The Future Of The Internet: What's Really Happening With Communications? To Be Named Nuts and Bolts of ISDN: A Practical Guide Jack Stewart, Center for Advanced Computational Research, California Institute of Technology Performance Monitoring for Network Preemptive Maintenance F. B. Motahdi and David C. C. Wang, GTE Telephone Operations The NetScanner Network Monitoring Tool: A Quick, Simple And Extensible Network Watcher Jack Stewart, Center for Advanced Computational Research, California Institute of Technology =========================== SANS COMMERCIAL TOOLS TRACK =========================== Thursday, April 27, 1995 9:00 am to 5:30 pm Briefings by technical managers from twelve leading firms offering important commercial software and hardware products of immediate value to system administrators and security managers. Followed by The Hands-On Tools Reception (5:30 - 8:30) where you can get your hands on the tools an ask the questions you want answered, and, at the same time, you can eat and drink and talk with other SANS people, all courtesy of the vendors. ================================================================= REGISTRATION INFORMATION Mail Your Registration To SANS'95 8902 Edgefield Dr. Colorado Springs, CO 80920 or You may FAX your registration if you use a credit card. FAX: 719-599-4395. Questions: Email to sans@fedunix.org or call the conference office 719-599-4303. REFUND CANCELLATION POLICY If you must cancel, all refund requests must be in writing and postmarked no later than September 12, 1994. Direct your letter to the USENIX Conference Office. You may telephone to substitute another in your place. ================================================================= SANS'95 Registration Form NAME________________________________________________________________ (first) (last) FIRST NAME FOR BADGE____________________________ POSITION TITLE__________________________________________ COMPANY OR INSTITUTION______________________________________________ DEPARTMENT__________________________________________________________ MAILING ADDRESS_____________________________________________________ CITY___________________________STATE_____COUNTRY________ZIP_________ TELEPHONE NO:_________________________FAX NO._______________________ NETWORK ADDRESS_____________________________________________________ (Please write legibly) If you do NOT want to appear in the attendee list, check here: ___ Is this your first SANS Conference? ___Yes ___No If No, which SANS did you attend? 92___, 93___, 94___ What is your affiliation? ___ Academic ___ Commercial ___ Gov't. The address you provide will be used for all future SANS mailings unless you notify us in writing. --------------------------------------------------------- IMPORTANT: Please check all the programs you will attend. MONDAY, APRIL 24 __M1: Topics in Network Administration (Nemeth and Hein) __M2: UNIX Security: Threats and Solutions (Bishop) __M3: Sendmail Configuration and DNS Management (Darmohray and Kolstad) TUESDAY APRIL 25: 9:00 am to 5:00 pm __T4: Topics In System Administration (Nemeth and Hein) __T5: Surfing 2000 Part I: Catching The Wave, An Introduction to The Internet (Kreiling and Stewart) __T6: UNIX Security Course 2: Threats and Solutions From The Network and Security Challenges In Programs (Bishop) __T7: Managing, Hiring, Ethics, and Policy for System Administrators (Kolstad and Darmohray) WEDNESDAY APRIL 26: 8:30 am to 3:45 pm __W8: Practical Perl (Christiansen) __W9: Surfing 2000: Building A Successful World-Wide Web (Kreiling) __W10: UNIX Security Course 3: UNIX Security Tools and Internal Security (Bishop and Kolstad) __W11: Firewalls (Darmohray) TECHNICAL CONFERENCE Wednesday late afternoon plus all day Thursday and Friday. __Check here if you will attend the technical conference. POST-CONFERENCE WORKSHOPS SATURDAY APRIL 29: 9:00 am to 4:00 pm __S12: Four Keys To Professional Advancement: managing users, ethics, effective technical presentations, effective writing (Howell, Kolstad, Paller and Sherman) __S13: The Most Useful Tools For System Administrators: Where To Find Them, How To Use Them (Satdeva) __S14: UNIX System and Network Performance Tuning (Ranum) Registration fees: ================== VERY EARLY REGISTRATION: Prior to February 15, 1994 Same cost as early registration (see below) and we will send you a free, autographed copy of the 2nd Edition of Evi Nemeth's UNIX System Administration Handbook (800 pages plus a CD-ROM) which is being published in January, 1995. EARLY REGISTRATION: Prior To March 15, 1995 Conference only $495 Conference and One Day Of Courses $845 Conference and Two Days Of Courses $1145 Conference and Three Days Of Courses $1395 Conference and Four Days Of Courses $1620 One Day Of Courses (no conference) $395 Two Days Of Courses (no conference) $695 Three Days Of Courses (no conference) $975 Four Days Of Courses (no conference) $1245 REGISTRATION After March 15, AND ON-SITE REGISTRATION Conference only $545 Conference and One Day Of Courses $895 Conference and Two Days Of Courses $1195 Conference and Three Days Of Courses $1445 Conference and Four Days Of Courses $1670 One Day Of Courses (no conference) $445 Two Days Of Courses (no conference) $745 Three Days Of Courses (no conference) $1025 Four Days of Courses (no conference) $1295 Note: Conference attendance is strictly limited to 400 participants. YOU MAY ALSO USE THIS FORM TO ORDER THE FOLLOWING PUBLICATIONS: [ ] COPY OF EVI NEMETH'S "UNIX SYSTEM ADMINISTRATION HANDBOOK: 2ND EDITION" (800 pp plus a CD-ROM) (The book will be shipped to you if you if you register before March 15. There is no charge if you register and pay prior to February 15, 1995; otherwise the cost is $60) [ ] COPIES OF COURSE NOTES FOR COURSES YOU DO NOT ATTEND List the course numbers here and include $25 for each course you list: ______________________________________________________ ______________________________________________________ PAYMENT: Total fee: (from the table above plus cost of Nemeth's book and/or any extra course notes) $_____________ ___ Check Enclosed (payable to Open Systems Conference Board) ___ Federal Purchase Order Enclosed ___ Charge my credit card: ___ AMEX ___ MasterCard ___ VISA Number: ________________________________________ Expires (date): __________________________________ Your signature for credit card: __________________________________ ******************************************************************** PAYMENT OR FEDERAL PO MUST ACCOMPANY REGISTRATION FORM. REGISTRATION VIA EMAIL IS NOT ACCEPTED. ******************************************************************** Return this form, with your check to SANS'95 Conference Office, 8902 Edgefield Dr., Colorado Springs, CO 80920 or FAX it to 719-599-4395 if you are using a credit card. Questions: Email sans@fedunix.org or call the conference office at 719-599-4303. ------------------------------ End of Coast Watch Digest part 2 of 2 ------------------------------