June 2003, Volume 28, Number 3
Table of Contents
MOTD by Rob Kolstad (PDF)
OPINION
Microsoft: What's Next? by Kragen Sitaker (PDF)
Getting the Problem Statement Right by Dan Geer (PDF)
BEST PRACTICES
.profile by Travis Howard (PDF)
PROGRAMMING
C# Types by Glen McCluskey (PDF)
Non-Proprietary Flash Solutions by Kragen Sitaker (PDF)
The Tclsh Spot: Capturing and Analyzing IP Packets on the AX-4000 Using AxTcl by Clif Flynt (PDF)
Practical Perl: Keeping it Simple by Adam Turoff (PDF)
SECURITY
Musings by Rik Farrow (PDF)
SYSADMIN
Organized Pruning of File Sets by Diomidis D. Spinellis (PDF)
ISPadmin: Bayesian Spam-Filtering Techniques by Robert Haskins and Rob Kolstad (PDF)
Private, HMO, and Group Support by Steven M. Tylock (PDF)
THE LAW
Trends in the Outsourcing Industry by John Nicholson (PDF)
Put Your Data Where Your Mouth Is by Erin Kenneally (PDF)
BOOK REVIEWS, ETC
The Bookworm ; Twenty Years Ago in USENIX by Peter H. Salus (PDF)
CONFERENCE REPORTS
2003 MIT Spam Conference (PDF)
4th USENIX Symposium on Internet Technologies and Systems (USITS '03) (PDF)
2nd USENIX Conference on File and Storage Technologies (PDF)