AUUG 2001 - Always On and Everywhere |
Sunday 23 September | Time | Tut No. | Tutorial Title and Outline | ||||||
---|---|---|---|---|---|---|---|---|---|
Half Day Afternoon Tutorial | 1.30pm - 5.00pm | S1 |
Writing Secure Software, by Michael Paddon Today, it is more important than ever that the software we are writing is designed and built with security as a primary goal. The ubiquitous global connectivity of the Internet has created unparalleled opportunities for malicious attack and compromise of our systems. Most compromises occur through the exercise of bugs, limitations and unintended functionality. This tutorial covers the fundamentals of designing and implementing systems that are secure from the ground up. Areas covered:
|
||||||
Half Day Afternoon Tutorial | 1.30pm - 5.00pm | S2 |
Internet services - discovery and use, by Jan Newmarch Internet services - some new middleware systems This tutorial looks at some of the recent middleware systems that have been given publicity, and examines them from the point of view of architecture, stability and programming APIs. These include
The APIs discussed will be for Java as these are the most stable for these systems. A basic knowledge of Java (or C++) will be assumed. This tutorial will give a basic grounding in these middleware systems, enough for further exploration. More importantly, it will give enough knowledge to properly evaluate these middleware systems and see past the extravagant claims that are sometimes made. |
||||||
Monday 24 September | Time | Tut No. | Tutorial Title and Outline | ||||||
Full Day Tutorial | 9am - 5pm | M3 |
Installing a FreeBSD Server, by Warren Toomey The aim of this workshop is to try and complete most of the following objectives:
There are some caveats with this workshop. You need to have reasonable experience with using Unix, navigating around the filesystem, editing files, monitoring processes, setting file permissions etc. I am hoping to cover all of the above, but I would rather cover some topics well than cover all of the topics poorly. |
||||||
Full Day Tutorial | 9am - 5pm | M4 |
Hot Topics in System Administration, by Evi Nemeth Topics include:
|
||||||
Half Day Morning Tutorial | 9am - 12.30pm | M5 |
Solaris 64-bit programming, by David Purdue The Ultra-SPARC processor, a 64-bit architecture, has been around for a number of years, and 64-bit programming features have been available in Solaris since version 2.5.1. However, it was only in Solaris 7 that a full 64-bit address space was made available to programmers. This tutorial looks at how to construct 64-bit programs for Solaris 8. The topics covered include:
|
||||||
Half Day Morning Tutorial | 9am - 12.30pm | M6 |
A Cryptography Primer, by Lawrie Brown Data encryption algorithms form an important technical component in providing secure and authenticated electronic security and communications. This workshop is designed to provide attendees with a brief overview of the field of cryptography, the terms, techniques, and algorithms. It starts by introducing the classical cryptographic techniques which form the foundations of the field. We then survey modern private key ciphers, widely used for bulk and link data encryption, from DES to the new AES encryption algorithm Rijndael. Next we consider public key encryption algorithms and signature schemes, essential for the use of cryptography in large scale, wide area communications. We conclude with a brief look at a couple of cryptographic applications, illustrating the different ways these components are combined to build a security solution. Contents
|
||||||
Half Day Afternoon Tutorial | 1.30pm - 5pm | M7 |
Firewalls, by Lawrie Brown With the ever increasing growth and pervasiveness of the Internet, more and more organisations find that they need to connect to the Internet in order to fulfil their goals. However, there are persistent security concerns with such a connection. The usual approach to reducing these concerns is to install a firewall to provide perimeter defence around private networks which supplies a single controlled and monitored point of connection. The design, installation, and ongoing management of a firewall though, is a non-trivial task. This workshop will provide an overview of this process. This starts with the determination of an appropriate security policy, and then the specification of services to be supported and policy applied. From this a suitable firewall architecture can be selected from the range available, specific equipment chosen and configured. Then there is the ongoing management of the firewall, maintaining its safe configuration, responding to security events, and monitoring its ongoing use. The workshop will not discuss particular products, rather it is aimed to assist those who need to manage this process. Contents
|
||||||
Half Day Afternoon Tutorial | 1.30pm - 5pm | M8 |
POSIX Threads Programming, by Liam Widdowson This tutorial will provide an introduction to multi-threading and the specifics of developing and debugging threaded software based on POSIX 1003.1c with UNIX variants. The POSIX 1003.1c API will be explained in detail with many 'real code' examples. Significant time will also be spent covering the threading architecture of most popular UNIX variants and the many idiosyncrasies of each operating system. Case studies will be provided to illustrate where threads should and should not be used. Emphasis will also be placed on producing portable, high-performance software. The intended audience is developers or administrators with basic-strong c programming skills and no prior knowledge of POSIX threads is assumed. |
||||||
Tuesday 25 September | Time | Tut No. | Tutorial Title and Outline | ||||||
Full Day Tutorial | 9am - 5pm | T9 |
Introduction to Perl for Programmers, by Rob Kolstad This tutorial introduces those who already know some programming to the powerful Perl programming language. Data structures, control structures, input/output, and programming paradigms will highlight this interactive course. After this full-day introduction, students should have all the skills they need to write all but the most complex stand alone Perl scripts. |
||||||
Half Day Morning Tutorial | 9am - 12.30pm | T10 |
Practical IPSec, by Adrian Close Networks on the Internet are increasingly turning to firewalls as a means of protecting themselves against external network-based attacks, creating their own small islands of trust. However, the increasing need for secure, inter-network communications requires extending that trust across the Internet itself - a risky proposition in an increasingly hostile network environment. Implementing IPSEC is one plausible solution and this tutorial will cover the fundamentals of doing this in the real world. Practical demonstrations of the technology involved will be given throughout the tutorial, which will include debugging techniques useful for successful deployment and interoperability of various IPSEC implementations. Topics:
|
||||||
Half Day Morning Tutorial | 9am - 12.30pm | T11 |
Linux Security Tools, by Richard Keech This presentation provides an overview of available security tools for the Linux platform; both Open Source and proprietary. The scope includes firewalls, log monitoring tools, intrusion detection tools, mail virus scanners, VPN tools, system hardening tools, and secure communication facilities. The presentation will feature live demonstrations of some of the more important security tools. Audience :This talk is aimed at managers and administrators considering the use of Linux in a security role. |
||||||
Half Day Afternoon Tutorial | 1.30pm - 5pm | T12 |
NTP, by John Warburton
|
||||||
Half Day Afternoon Tutorial | 1.30pm - 5pm | T13 |
Your first web site, by Peter Moulding Peter Moulding, author of PHP Black Book, and creator of 50+ sites, will lead the group from beginning your first page through to tying the pages together in a large web site. The tutorial assumes you understand the basics of HTML and the basics of programming or scripting in any language. If you have used a <font> tag, you are ready to rip in to PHP. Section 1 Section 2 Section 3 Section 4 |
||||||
Half Day Afternoon Tutorial | 1.30pm - 5pm | T14 |
Computer History: Methods and Problems, by Peter Salus "Doing" computer history, especially over the past 60 years, seems really simple. Nearly everyone important, whether in hardware or software, is still alive. You go and talk to them. You read the publications. But two instances (one hardware, the other software) will suffice to illustrate the problems. (1) The First Computer (2) The 50 Bug Fixes "Doing" history involves more than recording tales and gossip and more than reading other folks' publications. This tutorial will discuss problems like the ones listed and methods of approaching reality. |
AUUG2001 Home | AUUG Home | Site Map | Email comment