February 2005, Volume 30, Number 1
Contents
Titles in blue are open to everyone. The others require USENIX membership until February 2006. All articles are in PDF format.
OPINION
MOTD by Rob Kolstad

Letters to the Editor

Who Needs an Enemy When You Can Divide
and Conquer Yourself? Marcus Ranum

SAGE-News Article on SCO Defacement Rob Kolstad
TECHNOLOGY
Voice over IP with Asterisk by Heison Chak
SECURITY
Why Teenagers Hack: A Personal Memoir by Steven Alexander

Musings by Rik Farrow

Firewalls and Fairy Tales by Tina Darmohray

The Importance of Securing Workstations by Steven Alexander

Tempting Fate by Abe Singer
SYSADMIN
ISPadmin by Robert Haskins

Getting What You Want: The Fine Art
of Proposal Writing by Thomas Sluyter

The Profession of System Administration by Mark Burgess
PROGRAMMING
Practical Perl: Error Handling Patterns in Perl by Adam Turoff

The Tclsh Spot by Clif Flynt

Working with C# Serialization by Glen McCluskey
BOOK REVIEWS
The Bookworm by Peter H. Salus

Book Reviews Reviewed by Rik Farrow and Chuck Hardin
USENIX NOTES
20 Years Ago . . . and More by Peter H. Salus

Summary of USENIX
Board of Directors Actions by Tara Mulligan
CONFERENCE REPORTS
18th Large Installation System
Administration Conference (LISA '04)

EuroBSDCon 2004
