archive-nl.com » NL » S » SANE.NL

Total: 288

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • A SANE 2000 presentation
    system at your site Optimizing web server performance Learn tricks of the trade to make your hot UNIX web server even hotter We ll cover measuring UNIX Web server performance and how to tune your server for optimum throughput and response What s hot on the UNIX security battlefront It s been a long year in UNIX security and now s a great time to brush up on happenings in

    Original URL path: http://www.sane.nl/events/sane2000/daily/23/nemeth.html (2016-01-30)
    Open archived version from archive


  • A SANE 2000 presentation
    DNSSEC is a set of extensions to the DNS protocol to provide for better integrity and authentication in the DNS world The building blocks are asymmetric encryption and crypto signatures Lars Johan Liman will give a technical overview of the Secure DNS extensions and their basic functions Basic knowledge of the DNS system its records and basic functions will be assumed from the audience Lars Johan Liman M Sc works

    Original URL path: http://www.sane.nl/events/sane2000/daily/25/liman.html (2016-01-30)
    Open archived version from archive

  • A SANE 2000 presentation
    appropriately configured installation server A control file on the boot disk and additional optional control files on the install medium specify which settings should be used and which packages should be installed This includes settings like language key table network setup hard disk partitioning packages to install etc After giving a quick overview of the syntax and capabilities of this installation method considerations about how to plan the automated installation at larger sites are presented This includes questions like the minimum default installation criteria how to define classes of machines with identical additional setup and security concerns Finally an extension of this methodology that allows system backups and automated restore of such system backups somewhat similar to the mksysb feature present in IBM s AIX is presented Thomas Fehr is a member of the Board of Directors of SuSE Linux AG Besides this he works as a software developer for SuSE GmbH Together with Michael Andres he developed the SuSE installation program YaST Thomas is one of the four persons founding SuSE in 1992 He has been Managing Director of SuSE GmbH and CEO of SuSE Linux AG since the creation of these companies In August 1999 he resigned from

    Original URL path: http://www.sane.nl/events/sane2000/daily/25/fehr.html (2016-01-30)
    Open archived version from archive

  • A SANE 2000 presentation
    spool servers are carefully placed in strategic network locations with lots of bandwidth 2 Fault tolerant it must be able to survive the crash of various component bits and pieces while still providing full service also makes for easier maintenance 3 Inexpensive built out of readily available PC grade components much less expensive than heavy server class machines At the same time this allows right sizing of machines to tasks and allows for more machines and therefore more redundancy two inexpensive redundant PC s are much more reliable than one expensive server class Sun for example but cost about the same 4 Scalable built to handle 320 000 dialup and DSL users designed to scale linearly at least to the 3 000 000 user mark and probably substantially beyond 5 Very Large Scale designed to store most of Usenet for months binaries for as long as you can afford the disk currently 1TB of Usenet stored on the production system will shortly be increased to 2TB The system in question should fill up at about a hundred million articles 6 High Bandwidth dealing with lots of DSL customers pounding the tar out of it and future concerns about the growth

    Original URL path: http://www.sane.nl/events/sane2000/daily/25/greco.html (2016-01-30)
    Open archived version from archive

  • A SANE 2000 presentation
    This speech will shortly discuss these problems and then move on to the design of the new state engine This will be followed by discussing implementation consequences The session will conclude with experiences with the state code and future work on the state code Network administrators that are interested in the inner workings of one of the most popular packet filters should attend this talk A little knowledge on TCP

    Original URL path: http://www.sane.nl/events/sane2000/daily/25/rooij.html (2016-01-30)
    Open archived version from archive

  • A SANE 2000 presentation
    to develop a firewalling architecture that provides fine grain access policies without requiring the overhead of a full fledged application proxy We discuss the design and a prototype implementation of our scheme which helps us to achieve the above for TCP based applications by effectively splitting the job of maintaining the firewalling state between the kernel and certain user space daemons In our scheme an application daemon implementing site application specific security policies can make use of the rules interface to indicate to the kernel to selectively redirect the packets to the daemon for further examination We will see how we can use this to provide fairly complex security policies for example in case of an FTP proxy allow user X from machine Y ftp GET but not PUT without the need for a full fledged application level relay Further we will present some of the improvements extensions that we are planning to incorporate into the scheme INTENDED AUDIENCE Anybody interested in practical network security firewalls and a bit of linux kernel hacking Gopinath completed his MTech Master of Technology Computer Science and Engineering from the Indian Institute of Technology Kanpur India in the year 1999 Interests include operating systems

    Original URL path: http://www.sane.nl/events/sane2000/daily/25/gopinath.html (2016-01-30)
    Open archived version from archive

  • A SANE 2000 presentation
    per user bandwidth consumption Performance measurements typically involve active probing of traffic into the network to assess latency or throughput characteristics of paths Broad scale latency measurements i e to thousands of relevant hosts at reasonable granularity can provide a database for isolating global problems within the infrastructure as well as assessing service quality by country or other granularity of interest Routing data includes analysis from Border Gateway Protocol BGP routing tables which reflect relationships between individual Autonomous Systems ASes at a given point in time For each area of measurement we show state of the art examples of visualization and analysis and highlight the research priorities We also show instances of correlation among different measurement type e g how actual probed topology differs from BGP articulated topology not to mention shortest path how latency and throughput relate to other measures of path length how workload and routing changes affect performance Finally we describe an infrastructural application of CAIDA s macroscopic topology mapping project skitter which focuses on assessing the optimality of root DNS server placement K C Claffy is founder and principal investigator of the Cooperative Assocication for Internet Data Analysis CAIDA based at the San Diego Supercomputer Center

    Original URL path: http://www.sane.nl/events/sane2000/daily/25/claffy.html (2016-01-30)
    Open archived version from archive

  • A SANE 2000 presentation
    random or criminal attack on system integrity One defines the ideal desired state for a computer system and agents like immunity repair cells make sure that no dangerous deviations from that state are allowed to grow The immunity model uses a principle of convergence to switch on and off repair and garbage collection mechanisms When the system is in its ideal state the immune system becomes inert When the system deviates from the ideal state the immune system guarantees to bring it only closer to that state i e the state of the system is never made worse by the agents Cfengine is an agent language framework for implementing the automatic management of large or small system installations with the immunity model It uses the idea of an expert software agent to perform automatic maintenance on each host in a Unix or NT cluster Cfengine is suitable for site wide management it can be used for large scale cloning of hosts or for individual specialization with any degree of granularity A single configuration file consisting of a specialized descriptive language is used to describe the ideal state of groups and classes of hosts on the network The purpose of this

    Original URL path: http://www.sane.nl/events/sane2000/daily/25/burgess.html (2016-01-30)
    Open archived version from archive



  •