This website does readability filtering of other pages. All styles, scripts, forms and ads are stripped. If you want your website excluded or have other feedback, use this form.

USENIX | The Advanced Computing Systems Association

Skip to main content USENIX Sign InCreate Account

You are here

Home » Publications » ;login:

Subscriptions now available! Purchase an annual subscription to ;login: either in print and electronic formats or electronic only.

Spring 2018, Vol. 43, No. 1

In our Spring 2018 issue, we feature the following articles:

  • Hybrid SMR and a New API
  • Infiltrating an Exploit Market
  • Vulnerabilities and Patching Open Source
  • Finding Flaws in Linux Kernels

2018

  • Spring ;login:

    Spring 2018, Vol. 43, No. 1

    In our Spring 2018 issue, we feature the following articles:

    • Hybrid SMR and a New API
    • Infiltrating an Exploit Market
    • Vulnerabilities and Patching Open Source
    • Finding Flaws in Linux Kernels

2017

  • Spring ;login:

    Spring 2017, Vol. 42, No. 1

    In our Spring 2017 issue, we feature the following articles:

    • The Linux Kernel Self-Protection Project
    • Interviews with Jeff Mogul and Amit Levy
    • How to Write Secure Parsers
    • Warm Up Your JVMs
  • Summer ;login:

    Summer 2017, Vol. 42, No. 2

    In our Summer 2017 issue, we feature the following articles:

    • How to Fragment Your File System
    • Redundancy Does Not Imply Fault Tolerance
    • It's Better to Rush Than Wear Out
    • Interviews with Eric Allman, author of sendmail
  • Fall ;login:

    Fall 2017, Vol. 42, No. 3

    In our Fall 2017 issue, we feature the following articles related to Cloud:

    • VFP: A Virtual Switch Platform for Host SDN in the Public Cloud
    • Linux Containers for Fun and Profit in HPC
    • Interview with James Bottomley
    • Knockoff: Cheap Versions in the Cloud
  • Winter ;login:

    Winter 2017, Vol. 42, No. 4

    In our Winter 2017 issue, we feature the following articles:

    • Neural Nets Improve Password Choices
    • Fixing the Bitcoin Blockchain
    • Interview with Peter G. Neumann
    • Psychological Safety in SRE Teams

2016

  • Spring ;login:

    Spring 2016, Vol. 41, No. 1

    In our Spring 2016 issue, we feature the following articles:

    • Filebench: A Flexible Framework for File System Benchmarking
    • Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems
    • Streaming Systems and Architectures: Kafka, Spark, Storm, and Flink
    • BeyondCorp: Design to Deployment at Google
  • Summer ;login:

    Summer 2016, Vol. 41, No. 2

    In our Summer 2016 issue, we feature the following articles:

    • coz: This Is the Profile You're Looking For
    • Fuzzing Code with AFL
    • Boxify: Bringing Full-Fledged App Sandboxing to Stock Android
    • Serving Data to the Lunatic Fringe: The Evolution of HPC Storage
  • Fall ;login:

    Fall 2016, Vol. 41, No. 3

    In our Fall 2016 issue, we feature the following articles:

  • Winter ;login:

    Winter 2016, Vol. 41, No. 4

    In our Winter 2016 issue, we feature the following articles:

    • Your Cores Are Slacking Off—Or Why OS Scheduling Is a Hard Problem
    • Serverless Computation with OpenLambda
    • Standing on the Shoulders of Giants by Managing Scientific Experiments Like Software
    • An interview with Gordon Lyon, author of the nmap scanning tool.

2015

  • February ;login:

    February 2015, Vol. 40, No. 1

    In our February issue, we feature the following articles plus the Conference Reports from USENIX OSDI '14.

    • Measuring the Elusive Working Set in Storage
    • Container Farms and Storage
    • Finding Faults with Error Handlers to Avoid Catastrophic Failures
    • Nail, A Secure Parser/Generator
  • April ;login:

    April 2015, Vol. 40, No. 2

    In our April issue, we focus on Sysadmin and Distributed Computing.

    • Jumping the Queue with QJUMP
    • Working with Zombies
    • Using Selenium from Perl
    • Testing Shell Scripts
  • June ;login:

    June 2015, Vol. 40, No. 3

    Our June issue, focuses on File Systems and Storage, Sysadmins, and features a peak at one of the original issues of UNIX News from 1976:

    • Is NFSv4.1 Ready for Prime Time?
    • On Making GPFS Truly General
    • Daemon Management Under Systemd
    • The Systems Engineering Side of Site Reliability Engineering
  • August ;login:

    August 2015, Vol. 40, No. 4

    Our August issue, focuses on Security and Sysadmins, and features a peak at one of the original issues of UNIX News from 1976:

    • The Problem with Parsers and How to Secure Them
    • Smartphone Sensor Monitoring
    • What Bugs Live in the Cloud?
    • Unpredictability and Deception as OS Features
  • October ;login:

    October 2015, Vol. 40, No. 5

    Our October issue focuses on Operating Systems and Sysadmin, and features a peek at UNIX News from 1977:

    • Trading Latency for Performance Using Distributed Shared Memory
    • An Introduction to Bε-trees and Write-Optimization
    • Being an On-Call Engineer: A Google SRE Perspective
    • It’s Time to End Monolithic Apps for Connected Devices
  • December ;login:

    December 2015, Vol. 40, No. 6

    Our December issue focuses on security and also includes an interview about the advent of NVRAM, and the last in the series of articles about USENIX history

    • Ian Foster and Karl Koscher: CAN Bus and Car Security
    • Simson Garfinkel: The Future of Digital Forensics
    • Roel Verdult and Flavio D. Garcia: The Failure of Megamos Crypto
    • Darrell Long: How NVM Changes Everything

2014

  • January ;login:

    January 2014 ;login: logout

    Published every other month ;login: logout will appear during the months when ;login: magazine is not published, giving you ;login: content year round. Each issue will contain at least three new articles. The January 2014 issue features:

    • /var/log/manager: Message Not Received by Andrew Seely
    • Code Review for System Administrators by Elizabeth Krumbach Joseph
    • This World of Ours by James Mickens
  • February ;login:

    February 2014, Vol. 39, No. 1

    In our February issue, we focus on File Systems and Sysadmin.

    • HADOOP 2
    • Data Loss Prevention Tools
    • Logging Reports and Dashboards
    • Smart Storage Devices
    • Evolution of Managed Change
  • March ;login:

    March 2014 ;login: logout

    The March 2014 issue features:

    • To Wash It All Away by James Mickens
    • Fold Time to Navigate Faster by Emma Jane Westby
    • Using the R Software for Log File Analysis by Mihalis Tsoukalos
  • April ;login:

    April 2014, Vol. 39, No. 2

    In our April issue, we focus on Sysadmin and Networking:

    • SDN, Beyond the Hyperbole
    • The Case of the Clumsy Kernel
    • System Administration Is Dead
    • I Am Not a Sysadmin
    • Splunk Performance Tuning
  • June ;login:

    June 2014, Vol. 39, No. 3

    In our June issue, we feature articles on File Systems and Storage, Cloud, Troubleshooting, and Sysadmin.

    • ~okeanos: Large-Scale Cloud Service Using Ceph
    • Analysis of HDFS under HBase: A Facebook Messages Case Study
    • OpenStack
    • When the Stars Align, and When They Don’t
    • Solving Rsyslog Performance Issues
    • Rock Stars and Shift Schedules
  • August ;login:

    August 2014, Vol. 39, No. 4

    In our August issue, we feature articles on Security, Diversity, and Sysadmin, plus the Conference Reports from NSDI '14.

    • USB Insecurity Exposed
    • Security at CERN
    • Build Web Applications with Encrypted Data
    • Hostbased SSH
  • October ;login:

    October 2014, Vol. 39, No. 5

    In our October issue, we feature the following articles plus the Conference Reports from ATC '14, ICAC '14, and WiAC '14.

    • Linux Containers
    • Rump Kernels
    • Push on Green
    • Parables for Sysadmins
  • December ;login:

    December 2014, Vol. 39, No. 6

    In our December issue, we feature the following articles plus the Conference Reports from USENIX Security '14.

    • Sandboxing with Capsicum
    • Making Offline Cracking Unfeasible
    • Debugging with Failure in Mind
    • Python Constants and Enums

2013

  • February ;login:

    February 2013, Volume 38, Number 1

    In the February issue:

    • Flat Datacenter Storage
    • Samba’s Way Toward SMB 3.0
    • Temperature Management in Datacenters: Cranking Up the Thermostat Without Feeling the Heat
    • Allen Wittenauer on Hadoop: An Interview
    • Kadeploy3: Efficient and Scalable Operating System Provisioning for Clusters
    • The Owl Embedded Python Environment: Microcontroller Development for the Modern World
    • Plus columns, book reviews, conference reports, and more
  • April ;login:

    April 2013, Volume 38, Number 2

    In the April 2013 issue:

    • Is DevOps the Future of Sysadmin?
    • Theia: Visual Signatures for Problem Diagnosis in Large Hadoop Clusters
    • Cory Lueninghoener on Managing HPC Clusters
    • Wireless Means Radio
    • Improving the Performance of fsck in FreeBSD
    • Analyzing Network Traffic with Chimera
    • Plus columns, book reviews, conference reports, and more
  • May ;login:

    May 2013, ;login: logout

    Introducing ;login: logout, our new electronic-only supplement to ;login: magazine. Published every other month, ;login: logout will appear during the months when ;login: magazine is not published, giving you ;login: content year round. Each issue will contain at least three new articles. The inaugural issue for May 2013 features:

    • The Saddest Moment by James Mickens
    • The Disambiguator: Learning about Operating Systems by Selena Deckelmann
    • So many filesystems by Rik Farrow
  • June ;login:

    June 2013, Volume 38, Number 3

    In our June issue, we focus on File Systems:

    A Study of Linux File System Evolution by Lanyue Lu, Andrea Arpaci-Dusseau, Remzi Arpaci-Dusseau, and Shan Lu

    Ted Ts'o on Linux File Systems: An Interview by Rik Farrow

    Shingled Magnetic Recording: Areal Density Increase Requires New Data Management by Tim Feldman and Garth Gibson

    Also, don't miss our FAST '13 conference reports and our web-exclusive publication, ;login: logout.

  • July ;login:

    July 2013, ;login: logout

    Published every other month, ;login: logout will appear during the months when ;login: magazine is not published, giving you ;login: content year round. Each issue will contain at least three new articles. The July 2013 issue features:

    • Mobile Computing Research Is a Hornet's Nest of Deception and Chicanery by James Mickens
    • Monitor the Monitors by Selena Deckelmann
    • Setting Up a Vagrant Workflow by Matt Simmons
  • August ;login:

    August 2013, Volume 38, Number 4

    Our August issue focuses on Security:

    • Uncovering Zero-Days
    • Software Liability, a Lawyer's Perspective
    • Setting up Enterprise Logging
    • Rethinking Passwords
    • Plus Python, Perl, inotify, NSDI '13 reports, and more

    Purchase an annual subscription to ;login: either in print and electronic formats or electronic only.

  • September ;login:

    September 2013 ;login: logout

    Published every other month, ;login: logout will appear during the months when ;login: magazine is not published, giving you ;login: content year round. Each issue will contain at least three new articles. The September 2013 issue features:

    • Sysadmin Tools for Tackling the Cloud by Mark Hinkle
    • Deploying a Python App with Puppet by Spencer Krum and William Van Hevelingen
    • Configuring Your Linux System with the CFEngine Design Center by Diego Zamboni
    • The Slow Winter by James Mickens
  • October ;login:

    October 2013, Volume 38, Number 5

    Our October issue dives into system administration:

    • On Leadership
    • Synnefo, Cloud Management System
    • Log Filtering with Rsyslog
    • Clientside SSD and Network Storage
    • Plus Perl, Python, monitoring systems, cyber security, job hunting, and conference reports
  • November ;login:

    November 2013 ;login: logout

    Published every other month, ;login: logout will appear during the months when ;login: magazine is not published, giving you ;login: content year round. Each issue will contain at least three new articles. The November 2013 issue features:

    • Uncertain Infrastructures by Mark Burgess
    • The Night Watch by James Mickens
    • What Every Admin Should Know About Email by Joe Brockmeier
  • December ;login:

    December 2013, Volume 38, Number 6

    In our December issue, we focus on Security:

    • Bitcoins
    • The 10-Kilobyte Web Browser
    • DDoS for Hire
    • Trusting PGP
    • Security Event Correlator

2012

  • February ;login:

    February 2012, Volume 37, Number 1

    File systems and more, including a new column on Python.

  • April ;login:

    April 2012, Volume 37, Number 2

    Sysadmin issue, and more, including LISA '11 conference reports.

  • June ;login:

    June 2012, Volume 37, Number 3

    Includes articles on storage for cluster applications, CDMI, TCP Incast, HyperDex, Cassandra, and much more, plus conference reports from FAST '12.

  • August ;login:

    August 2012, Volume 37, Number 4

    In our August issue, we look at the future of security, passwords for mobile and desktop computers, Mosh, and conference reports from NSDI'12 and LEET'12:

    • ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets
    • Mosh: A State-of-the-Art Good Old-Fashioned Mobile Shell
    • Passwords for Both Mobile and Desktop Computers: ObPwd for Firefox and Android
    • Looking Within to Improve American Cybersecurity
    • The Future of Security: Criticality, Rejectionists, Risk Tolerance
    • Fast and Interactive Analytics over Hadoop Data with Spark
    • When Disasters Collide: A Many-Fanged Tale of Woe, Coincidence, Patience, and Stress
    • Practical Perl Tools: Taking the XPath Less Traveled
  • October ;login:

    October 2012, Volume 37, Number 5

    In the October issue:

    • For Extreme Parallelism, Your OS Is Sooooo Last-Millennium
    • Overview of Multipath TCP
    • VXLAN: Extended Networking to Fit the Cloud
    • HBase Schema Design
    • Jacob Farmer on Managing Research Data
    • Practical Perl Tools: Mind Those Stables, I Mean Files
    • Secrets of the Mulitprocessing Module
    • Reports from the 2012 Annual Technical Conference
  • December ;login:

    December 2012, Volume 37, Number 6

    In the December issue:

    • kGuard: Lightweight Kernel Protection
    • Detecting and Tracking the Rise of DGA-Based Malware
    • Anatomy of SIP Attacks
    • AdSplit: Separating Smartphone Advertising from Applications
    • The Great Firewall of China: How It Blocks Tor and Why It Is Hard to Pinpoint
    • Helping Users Create Better Passwords
    • ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
    • Plus conference reports, columns, book reviews, and more

2011

  • February ;login:

    February 2011, Volume 36, Number 1

  • April ;login:

    April 2011, Volume 36, Number 2

  • June ;login:

    June 2011, Volume 36, Number 3

  • August ;login:

    August 2011, Volume 36, Number 4

  • October ;login:

    October 2011, Volume 36, Number 5

  • December ;login:

    December 2011, Volume 36, Number 6

2010

  • February ;login:

    February 2010, Volume 35, Number 1

  • April ;login:

    April 2010, Volume 35, Number 2

  • June ;login:

    June 2010, Volume 35, Number 3

  • August ;login:

    August 2010, Volume 35, Number 4

  • October ;login:

    October 2010, Volume 35, Number 5

  • December ;login:

    December 2010, Volume 35, Number 6

2009

  • February ;login:

    February 2009, Volume 34, Number 1

  • April ;login:

    April 2009, Volume 34, Number 2

  • June ;login:

    June 2009, Volume 34, Number 3

  • August ;login:

    August 2009, Volume 34, Number 4

  • October ;login:

    October 2009, Volume 34, Number 5

  • December ;login:

    December 2009, Volume 34, Number 6

2008

  • February ;login:

    February 2008, Volume 33, Number 1

  • April ;login:

    April 2008, Volume 33, Number 2

  • June ;login:

    June 2008, Volume 33, Number 3

  • August ;login:

    August 2008, Volume 33, Number 4

  • October ;login:

    October 2008, Volume 33, Number 5

  • December ;login:

    December 2008, Volume 33, Number 6

2007

  • February ;login:

    February 2007, Volume 32, Number 1

  • April ;login:

    April 2007, Volume 32, Number 2

  • June ;login:

    June 2007, Volume 32, Number 3

  • August ;login:

    August 2007, Volume 32, Number 4

  • October ;login:

    October 2007, Volume 32, Number 5

  • December ;login:

    December 2007, Volume 32, Number 6

2006

  • February ;login:

    February 2006, Volume 31, Number 1

  • April ;login:

    April 2006, Volume 31, Number 2

  • June ;login:

    June 2006, Volume 31, Number 3

  • August ;login:

    August 2006, Volume 31, Number 4

  • October ;login:

    October 2006, Volume 31, Number 5

  • December ;login:

    December 2006, Volume 31, Number 6

2005

  • February ;login:

    February 2005, Volume 30, Number 1

  • April ;login:

    April 2005, Volume 30, Number 2

  • June ;login:

    June 2005, Volume 30, Number 3

  • August ;login:

    August 2005, Volume 30, Number 4

  • October ;login:

    October 2005, Volume 30, Number 5

  • December ;login:

    December 2005, Volume 30, Number 6

2004

  • February ;login:

    February 2004, Volume 29, Number 1

  • April ;login:

    April 2004, Volume 29, Number 2

  • June ;login:

    June 2004, Volume 29, Number 3

  • August ;login:

    August 2004, Volume 29, Number 4

  • October ;login:

    October 2004, Volume 29, Number 5

  • December ;login:

    December 2004, Volume 29, Number 6

2003

  • February ;login:

    February 2003, Volume 28, Number 1

  • April ;login:

    April 2003, Volume 28, Number 2

  • June ;login:

    June 2003, Volume 28, Number 3

  • August ;login:

    August 2003, Volume 28, Number 4

  • October ;login:

    October 2003, Volume 28, Number 5

  • December ;login:

    December 2003, Volume 28, Number 6

2002

  • February ;login:

    February 2002, Volume 27, Number 1

  • April ;login:

    April 2002, Volume 27, Number 2

  • June ;login:

    June 2002, Volume 27, Number 3

  • August ;login:

    August 2002, Volume 27, Number 4

  • October ;login:

    October 2002, Volume 27, Number 5

  • December ;login:

    December 2002, Volume 27, Number 6

2001

  • February ;login:

    February 2001, Volume 26, Number 1

  • April ;login:

    April 2001, Volume 26, Number 2

  • June ;login:

    June 2001, Volume 26, Number 3

  • July ;login:

    July 2001, Volume 26, Number 4

  • August ;login:

    August 2001, Volume 26, Number 5

  • October ;login:

    October 2001, Volume 26, Number 6

  • November ;login:

    November 2001, Volume 26, Number 7

  • December ;login:

    December 2001, Volume 26, Number 8

2000

  • February ;login:

    February 2000, Volume 25, Number 1

    This issue is not currently available. We are in the process of updating our digital library, so please check back.

  • April ;login:

    April 2000, Volume 25, Number 2

  • June ;login:

    June 2000, Volume 25, Number 3

  • July ;login:

    July 2000, Volume 25, Number 4

  • August ;login:

    August 2000, Volume 25, Number 5

  • October ;login:

    October 2000, Volume 25, Number 6

  • November ;login:

    November 2000, Volume 25, Number 7

  • December ;login:

    December 2000, Volume 25, Number 8

1999

  • January ;login:

    January 1999, Special Issue

  • February ;login:

    February 1999, Volume 24, Number 1

  • April ;login:

    April 1999, Volume 24, Number 2

  • June ;login:

    June 1999, Volume 24, Number 3

  • August ;login:

    August 1999, Volume 24, Number 4

  • September ;login:

    September 1999, Volume 24, Number

  • October ;login:

    October 1999, Volume 24, Number 5

  • November ;login:

    November 1999, Special Issue

  • December ;login:

    December 1999, Volume 24, Number 6

1998

  • February ;login:

    February 1998, Volume 23, Number 1

  • April ;login:

    April 1998, Volume 23, Number 2

  • May ;login:

    May 1998, Volume 23, Number 3

  • June ;login:

    June 1998, Volume 23, Number 4

  • August ;login:

    August 1998, Volume 23, Number 5

  • October ;login:

    October 1998, Volume 23, Number 6

  • December ;login:

    December 1998, Volume 23, Number 7

1997

  • October ;login:

    October 1997, Volume 22, Number 1

  • November ;login:

    November 1997, Volume 22, Number 2

  • December ;login:

    December 1997, Volume 22, Number 3

© USENIX