From:"Sys Admin News" <sanews@sysadmin.email-publisher.com> 
Subject: Sys Admin Newsletter April 2003
Date: Thu, 13 Mar 2003 08:14:35 -0700
******************************************************************

                   The Sys Admin Newsletter
                          News for the
              April 2003 issue of Sys Admin Magazine

******************************************************************
                            CONTENTS

1. Note from the Editor
2. Highlights of the April issue 
3. Call for Papers
4. Subscription Information
------------------------------------------------------------------
Sponsored by PROGNOSIS from Integrated Research
=============================================================
New release - PROGNOSIS 7.07 now available

Whether it's monitoring transient processes (without process-
Accounting overheads), or analyzing file space utilization 
and growth, PROGNOSIS delivers in-depth, real-time management 
of UNIX, Linux, Windows and HP NonStop - all via a single, 
intuitive interface. Run a FREE TRIAL NOW.

http://click.sysadmin.email-publisher.com/maaaU7ZaaWC6ia2sokSb/
------------------------------------------------------------------

NOTE FROM THE EDITOR:

The need for a thorough, up-to-date, enforceable security policy 
within every organization can hardly be overstated, and there are 
many resources to help systems administrators facilitate development 
of such policies. SANS (www.sans.org) maintains a security policy 
resource page that provides general guidelines, links, and templates, 
along with a security policy primer describing how to build a security 
policy from the ground up. SAGE (The System Administrators Guild, 
www.sage.org) offers a more general "Guide to Developing Computing 
Policy Documents", which encompasses security policies. This booklet 
explains why every site needs a policy, what it should contain, who 
should draft it, and to whom it should apply. I encourage you to check 
out these and other resources and review your organization's security 
policies on a regular basis.

Sincerely,
Amber Ankerholz
Editor in Chief

------------------------------------------------------------------
Sponsored by uptime software
============================================================

MAXIMIZE YOUR APPLICATION & SERVER UPTIME

up.time is an easy-to-install, easy-to-use, low cost, browser-based,
yet powerful realtime server performance and availability monitoring 
and graphical reporting tool, which enables rapid: Application & 
Server Monitoring, Resource Trend Analysis, Root-Cause Analysis and 
Capacity Planning.

Buy or Rent up.time from $125/month per server

Visit:
http://click.sysadmin.email-publisher.com/maaaU7ZaaWC6ka2sokSb/
for your FREE  evaluation copy.
------------------------------------------------------------------

	The April 2003 issue contains:

Coordinating Multi-Host Backups Using Perl Sockets 
by A. Clay Stephenson  
http://click.sysadmin.email-publisher.com/maaaU7ZaaWC6ja2sokSb/
To solve a sticky backup problem, Stephenson fashioned a sockets-based 
client-server pair to essentially create a set of semaphores accessible 
by multiple hosts.

Logrotate - A Backup Solution by  Sean D. Conway 
Using a Linux program called logrotate, Conway created a backup 
solution to consolidate and automate the backup process.

Backup Scripts from UnixReview.com: Part II
Edited by Ed Schaefer 
Schaefer presents three previously unpublished backup scripts that 
were submitted to the Shell Corner column on UnixReview.com.

NetWorker Savegroup Summarizer - A Legato NetWorker Reporting Tool  
by John Stoffel 
Legato NetWorker is a powerful tool to manage backups, but it has 
some limitations when it comes to reporting useful statistics from 
a completed backup, so Stoffel developed his own reporting code as 
presented in this article.

An SQL Archive for Email and MIME Attachments by Robert Bond  
Bond describes how to build an email archive, using Perl and MySQL, 
that can properly decode and extract attachments from even the most 
complex MIME messages.

Amanda Backup Enhanced with Solaris Snapshots by Julian Briggs  
Briggs discusses the development of a reliable backup system, using 
Amanda backup software and Solaris filesystem snapshots.

Writing an SNMP Agent by Damir Delija 
Delija shares some of the considerations that went into the building 
of his custom SNMP agent.
------------------------------------------------------------------
Looking For a Career Change?
How about moving into the field of Information Security?
Attend a Free Information Security seminar in Washington D.C

Register now at: 
http://click.sysadmin.email-publisher.com/maaaU7ZaaWC6oa2sokSb/
------------------------------------------------------------------
	
	COLUMNS

Questions and Answers by Amy Rich  
http://click.sysadmin.email-publisher.com/maaaU7ZaaWC6la2sokSb/

Benchmarking Systems by Henry Newman  
http://click.sysadmin.email-publisher.com/maaaU7ZaaWC6ma2sokSb/

Solaris Resource Management by Peter Baer Galvin  
http://click.sysadmin.email-publisher.com/maaaU7ZaaWC6na2sokSb/

------------------------------------------------------------------
The RSA Conference is the leading, most prestigious e-security event of
the year. If your organization is deploying, developing or 
investigating
data security or cryptography products, you can't afford to miss this
show. Now in its 12th year, the RSA Conference delivers more learning,
networking and demo opportunities than any other security gathering. 
The
RSA Conference offers access to the best and the brightest in the
industry, with decision makers networking with technology legends. 

To register, visit 
http://click.sysadmin.email-publisher.com/maaaU7ZaaWC6pa2sokSb/ 
and use priority code SA.
------------------------------------------------------------------  
     CALL FOR PAPERS  

Storage - August 2003

Proposals Due: April 1, 2003
Manuscripts Due: May 1, 2003 

Advanced Tricks for Serving Up Samba 
Approximating a SAN with Open Source Tools 
Innovative Scripts for Managing Data Storage 
Unsung Techniques for Securing Archived Data 
How I Solved a Complex Remote Storage Problem Inexpensively 

Security - September 2003

Proposals Due: May 1, 2003
Manuscripts Due: June 2, 2003

Detecting and Dealing with New Rootkits
Securing BIND 
Free UNIX Forensics Tools
Advanced Firewall Management Tips
Effective Use of Honeypots
Mobile Security

Server Management - October 2003

Proposals Due: June 2, 2003
Manuscripts Due: July 1, 2003

Remote Management Solutions
Open Source Tools for Enterprise Server Management
War Stories in Web-based System Management
Advanced Linux Server Management Techniques
High Availability Cluster Configuration

------------------------------------------------------------------
***  GET 2 EXTRA ISSUES -14 issues for the price of 12  ***

Sys Admin- the only magazine devoted to UNIX systems administration 
- solid, technical information full of ways to improve the performance 
and extend the capabilities of your system.  

Request a subscription today at: 
http://click.sysadmin.email-publisher.com/maaaU7ZaaWC6ra2sokSb/
Your discount keycode is 2sae.  

Get 2 extra issues and save 44% off the newsstand price 
(14 issues for the price of 12). 
------------------------------------------------------------------
     Newsletter Subscription Information

Please feel free to share this newsletter with interested parties
via email (not on bulletin boards).  To subscribe, see:
http://click.sysadmin.email-publisher.com/maaaU7ZaaWC6qa2sokSb/

Email comments to: aankerholz@cmp.com