JOE ST SAUVER, Ph.D.

joe@stsauver.com
(541)-346-1720

PGP: 0D4FF84E (40CD 8550 019E 34CC 0AC8 23DA AB2E A530 0D4F F84E)


Selected Professional Activities

· Manager, Internet2 Nationwide Security Programs and, Manager, InCommon Certificate Program (both under contract through the University of Oregon).

· Senior Technical Advisor (one of half a dozen), for the carrier Messaging Anti-Abuse Working Group (MAAWG).
MAAWG members represents nearly 1 billion consumer mailboxes worldwide.

· Member, FCC Communications Security, Interoperability and Reliability Council (CSRIC) IV

· Strategic Advisor and Professional Member, Online Trust Alliance (OTA)

· Community Representative, Broadband Internet Technical Advisory Group

· Member, REN-ISAC (Research and Education Networking Information Sharing and Analysis Center) Technical Advisory Group

· Member, Coalition Against Unsolicited Commercial Email (CAUCE) Board of Directors

· Member (former Co-chair), Educause Security Effective Practices Working Group

· Member, Internet2 Network Technical Advisory Committee (NTAC)

· Member, DRG Advisory Council

· Member, Anti-Phishing Working Group (APWG)


Presentations/Papers/Articles/Projects

·Whither Advanced Academic Networking? WITHER Advanced Academic Networking? [pptx], [pdf]
Merit Networking Summit 2014, Ann Arbor MI, September 23rd, 2014.

·Those Dang Passwords - They're Just Driving Me Crazy! [pptx], [pdf]
Oregonian Panel on Passwords, Portland OR, September 17th, 2014.

·Cryptographic Best Practices in the Post-Snowden Era [pdf]
Security Professionals 2014, St Louis MO, May 8th, 2014.

·So What's IPv4 Address Space Actually Worth? Let's Let The "Invisible Hand" of the Market Decide
Kalorama Blog, April 29th, 2014.

·Browsing the Web More Privately and More Securely on Your Mac, Draft Version 0.1
Educause Technologies, Operations and Practices Working Group (former Security Effective Practices Working Group)

·Mitigating the Cyber Threat to University Research Data and Intellectual Property [pdf]
Internet2 Global Summit 2014, Denver, Coloroad, April 10, 2014.

·Multi-Factor Authentication: Do I Need It, and How Do I Get Started? [And If I Do Need It, Why Aren't Folks Deploying It?] [pdf]
Internet2 Global Summit 2014, Denver, Colorado, April 8, 2014.

·Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel [pdf]
Internet2 Global Summit 2014, Denver, Colorado, April 8, 2014.

·OMG: They're Inside the Walls [pdf]
Association for Computing Professionals in Education (ACPE), Spokane, WA, March 4, 2014.

·Networking in These Crazy Days: Stay Calm, Get Secure, and Get Involved [pptx], [pdf]
Merit Networking Summit Keynote, Ann Arbor MI, December 12, 2013.

·OMG: They're Inside the Walls [pptx], [pdf]
Association for Computer Professionals in Education (ACPE), Ashland OR, December 5th, 2013.

·CSRIC IV WG 6

·A Conversation About Cloud Computing and Security [pptx], [pdf]
NWACC Security Workshop, Portland Oregon, October 10th, 2013.

·Identity Management -- Background Concepts, Goals and Jargon [pptx], [pdf]
Messaging Anti-Abuse Working Group (MAAWG) Vienna AT, June 5, 2013.

·The InCommon/Net+ Multifactor Authentication Program [pptx], [pdf]
Internet2 Annual Meeting, Arlington VA, April 22nd, 2013.

·The BRIC Countries and Online Abuse [pdf]
MAAWG General Meeting #27, San Francisco, February 19-21, 2013.

·Security BoF: What Are The Community's Open Questions? [pptx], [pdf]
Joint Techs/Techs In Paradise, Honolulu, January 15th, 2013.

·Checking for Software Updates On Your Mac [pdf]

·InCommon Multifactor Authentication [pptx], [pdf]
Joint Techs/Techs In Paradise, Honolulu, January 15th, 2013.

·Draft WG 7 Botnet Metrics Guide [docx]
FCC CSRIC Working Group 7, January 2nd, 2013.

·WG 7 Botnet Metrics [pdf]
FCC CSRIC Working Group 7, Washington DC, 12/12/12.

·Online Trust Alliance's Combatting Botnets Through User Notification Across the Ecosystem [pdf], December 10th, 2012.
[contributor, as listed on page 2]

·What Remains To Be Done in Cyber Security [pdf]
University of Michigan Cyber Security Summit, Ann Arbor MI, October 19th, 2012.

·MAAWG/LAP Best Practices to Address Online and Mobile Threats, October 15th, 2012
[contributor to the "Best Practices for Individiuals" section beginning on document page 11-14 and other portions of the report]

·Large Scale Science, The Science DMZ, SDN/OpenFlow, Security and Cyberinfrastructure Architectures [pptx], [pdf]
Internet2 Member Meeting, Philadelphia PA, October 3rd, 2012.

·Client Certificates: A Security Professionals 2012 Preconference Seminar [pdf]
Security Professionals 2012, Indianapolis IN, May 15th, 2012.

·Internet2 Member Meeting Security BoF [pdf]
Internet2 Member Meeting, Arlington VA, April 25th, 2012.

·Botnets, the FCC CSRIC Botnet Working Group, and Opportunities for Internet2 Industry Partners and Researchers [pdf]
Internet2 Member Meeting, Arlington VA, April 24th, 2012.

·Internet2 Net+ Technical Architecture: An Introduction to Security Considerations [pdf]
Internet2 Member Meeting, Arlington VA, April 24th, 2012.

·Client Certs and S/MIME Signing and Encryption: An Introduction [ppt], [pdf]
Messaging Anti-Abuse Working Group (MAAWG), San Francisco, February 20th, 2012.

·Client Cert Deployment Models and Hardware Tokens/Smart Cards [ppt], [pdf]
Joint Techs, Baton Rouge LA, January 23rd, 2012.

·The Technical Filtering and Blocking Provisions of the "Stop Online Piracy Act" (H.R. 3261) And Why They Won't Work: A Whitepaper for Service Providers, Updated
and Revised to Reflect the "Amendment in the Nature of a Substitute to H.R. 3261 Offered by Mr. Smith of Texas" (also known as the "Manager's Amendment") Dated December 12th, 2011. [pdf]

·Draft Comments on the Draft Final Report of the [ICANN] Internationalized Registration Data Working Group [pdf], November 16th, 2011.

·Draft Comments on "Models to Advance Voluntary Corporate Notification to Consumers Regarding the Illicit Use of Computer Equipment by Botnets and Related Malware [pdf], November 3rd, 2011.

·Malware Analysis for Neophytes: A MAAWG Training Seminar [pdf], October 24th, 2011.

·SSL As Designed, SSL As Deployed, SSL As It Should Be [ppt], [pdf]
University of Idaho Computer Security Awareness Symposium, Moscow, Idaho, October 13th, 2011.

·Client (Personal) Certificates: Should We Be Thinking About Certificate Use Cases *OR* Should We Be Thinking
About The Sort of Credential Deployment Model We Need? [pdf]

Internet2 Member Meeting, Raleigh North Carolina, October 4th, 2011.

·Leveraging Certificates for Improved Security [ppt], [pdf]
Internet2 Member Meeting, Raleigh, North Carolina, October 4th, 2011.

·HTTP Strict Transport Security Performance: Is There An Issue? Does The Performance Working Group
Have Recommendations for Tuning SSL/TLS For Internet2-Class Traffic? [pptx]
, [pdf]

Internet2 Member Meeting, Raleigh, North Carolina, October 4th, 2011.A

·SSL/TLS Certificates: Giving Your Use of Server Certificates a Hard Look [ppt], [pdf]
Internet2 Member Meeting, Raleigh, North Carolina, October 3rd, 2011.

·Signing Microsoft Word Documents [docx], September 13th, 2011.

·Draft Comments on the National Initiative for Cybersecurity Education (NICE) Draft Strategic Plan [pdf], September 11th, 2011.

·Draft Comments to the House of Commons Science and Technology Committee Inquiry Into Malware [pdf], September 1st, 2011.

·Draft CAUCE Comments on "Cybersecurity, Innovation and the Internet Economy" from the Department of Commerce Internet Policy Task Force [pdf], August 1st, 2011.

·Draft MAAWG Comments on "Cybersecurity, Innovation and the Internet Economy" from thje Department of Commerce Internet Policy Task Force [pdf], July 29th, 2011.

·SSL/TLS Web Server Security [pptx], [pdf]
Internet2/ESCC Joint Techs, Fairbanks, July 12th, 2011.

·Security and Certificates [ppt], [pdf]
REN-ISAC Techburst, June 30th, 2011.

·Security Best Practices for Secure Socket Layer (SSL) and/or Transport Layer Security (TLS) [docx], [pdf]
This is a "one-pager"-series document, June 30th, 2011.

·Security Best Practices for Using S/MIME With Personal Certs in Thunderbird and Firefox on A Mac [docx], [pdf]
This is a "one-pager"-series document, June 30th, 2011.

·Physical Security: A Crucial (But Often Neglected) Part of Cybersecurity [ppt], [pdf]
Eugene IT Pro Forum, Eugene OR, June 21st, 2011.

·MAAWG Comments on ICANN's Draft FY2012 Budget [pdf]
Messaging Anti-Abuse Working Group (MAAWG), June 16th, 2011.

·Malware Analysis for Neophytes [ppt], [pdf]
Messaging Anti-Abuse Working Group (MAAWG) Meeting, San Francisco CA, June 6th, 2011.

·Physical Security of Advanced Network and Systems Infrastructure [ppt], [pdf]
Internet2 Member Meeting, Arlington VA, April 19th, 2011

·Internet2 Security Update, Spring 2011 Member Meeting [ppt}, [pdf]
Internet2 Member Meeting, Arlington VA, April 19th, 2011

·The Tragedy in Japan: A 9.0 Earthquake, Massive Tsunami, Large Scale Radiological Contamination, ... [ppt], [pdf]
Internet2 Member Meeting, Arlington VA, April 19th, 2011.

·A Quick 20 Minute Introduction to DNSSEC for the session "DNS: Don't Call It Insecure Any More [ppt], [pdf]
Internet2 Member Meeting, Arlington VA, April 19th, 2011.

·CAUCE North America Comments on ICANN's Whois Review Team Plan [pdf]
April 13th, 2011.

·InCommon Certificate Service [ppt], [pdf]
Security Professionals/REN-ISASC Meeting, San Antonio, Texas, April 6th, 2011.

·Securing Mobile Devices: A Security Professionals 2011 Pre-Conference Seminar [ppt], [pdf]
Security Professionals/REN-ISAC Meeting, San Antonio, Texas, April 4th, 2011.

·SUBRL-Listed Domains and Their Registrars (In Just Seven or Eight Minutes) [ppt], [pdf]
ICANN 40, San Francisco, California, March 14th, 2011.

·Beginning to Remediate Botted Hosts Abroad: India [ppt], [pdf]
Messaging Anti-Abuse Working Group (MAAWG), Orlando, Florida, February 22nd, 2011.

·Draft: Thinking About Whole Disk Encryption (WDE)? Some Things to Think About [doc], [pdf]
Educause Security Effective Practices Working Group, February 14th, 2011.

·Physical Security of Advanced Network and Systems Infrastructure [ppt], [pdf]
Joint Techs, Clemson, South Carolina, Febuary 1st, 2011.

·DNSSEC in Higher Education [ppt], [pdf]
AMSAC Call, January 27th, 2011.

·A Brief Analysis of the ECAR Study of Undergraduate Students and Information Technology 2010 [ppt], [pdf]
University of Oregon IT Council, January 26th, 2011.

·The 2011 Tour of Cybercrime [ppt], [pdf]
University of Oregon School of Law, January 18h, 2011.

·Draft: Some Mobile Device Security and Policy Recommendations and Questions (v0.1) [doc]
Educause Security Effective Practices Working Group, December 10th, 2010.

·Some Stuxnet Related Comments [excerpted from a longer presentation] [ppt], [pdf]
December 1st, 2010.

·IPv6 Technical Challenges [ppt], [pdf]
NCFTA Canada, Montreal Quebec, November 18th, 2010.

·IPv6 Obfuscation and Attribution: Some Quick Framing Slides,
Emerging Trends, Challenges and Strategies Panel [ppt]
, [pdf]

NCFTA Canada, Montreal Quebec, November 17th, 2010.

·MAAWG IPv6 Training for Senders & Others [HTML with links to Flash Video]
Messaging Anti-Abuse Working Group, Crystal City VA, October 4th-8th, 2010.

·Internet2 Security Update: Some Excerpts From the 2nd Data Driven Collaborative Security Workshop and
Some Timely Strategic Security Areas You Should Be Thinking About [ppt]
, [pdf]

Internet2 Fall Members Meeting, Atlanta Georgia, November 4th, 2010.

·Community Expectations for Campus and Network Security: A Wrapup [ppt], [pdf], Draft Expectations [doc]
Internet2 Fall Members Meeting, Atlanta Georgia, November 3rd, 2010.

·Higher Education Experiences with DNSSEC Signing [ppt], [pdf]
Internet2 Fall Members Meeting, Atlanta Georgia, November 3rd, 2010.

·Successful Non-Governmental Threat Attribution, Containment and Deterrence: A Case Study [ppt], [pdf]
Internet2 Fall Members Meeting, Atlanta Georgia, November 2nd, 2010.

·MAAWG Comments on ICANN FY 11 Update to Plan for Enhancing Internet Security, Stability & Resiliency [pdf]
ICANN, November 2nd, 2010.

·The Security of Mobile Internet Devices [ppt], [pdf]
Northwest Academic Computing Consortium 2010 Network Security Workshop, George Fox University, Portland, October 7th, 2010.

·MAAWG IPv6 Training for Senders and Others [ppt], [pdf]
Messaging Anti-Abuse Working Group, Crystal City VA, October 4th-8th, 2010.

·MAAWG Comments on "National Broadband Plan Recommendation to Create a Cybersecurity Roadmap" [pdf],
Federal Communications Commission, PS Docket 10-146, GN Docket 09-51, September 17th, 2010.

·MAAWG Comments on "Cybersecurity, Innovation and the Internet Economy" [pdf],
Department of Commerce Docket No. 100721305-0305-01, September 17th, 2010.

·Internet2 Data Driven Collaborative Security Workshop #2 (DDCSW2),
Washington University in St Louis (WUSTL), August 17th-18th, 2010.

·MAAWG Comments on "The Initial Report Proposals for Improvements to the RAA" [pdf],
ICANN, July 28th, 2010.

·MAAWG Comments on "National Strategy for Trusted Identities in Cyberspace [pdf],"
Department of Homeland Security, July 19th, 2010

·Community Expectations for Campus Computer and Network Sercurity BoF [pdf]
Joint Techs, Columbus OH, July 13th, 2010.

·Coping with Malware: A Dozen Suggestions [html]
Educause Security Effective Practices Working Group Mailing List, June 25th, 2010.

·Internet Name and Number Resources, Cyber Crime, and Your Company: Some Technical Approaches [ppt], [pdf]
Coalition Against Domain Name Abuse (CADNA), Wells Fargo, San Francisco, CA, June 2nd, 2010.

·IPv6 Training [ppt], [pdf]
National Cyber Forensics and Training Alliance (NCFTA), Pittsburgh PA, May 5th, 2010.

·Coping With Malware and Other Sorts of Automated Abuse [ppt], [pdf]
Laboratory for Telecommunications Science, University of Maryland, April 29th, 2010.

·Community Expectations for Campus Computer and Network Security [ppt], [pdf]
Internet2 Member Meeting, Arlington VA, April 27th, 2010.

·Update On Two Topics: The Security of Cloud Computing and the Security of Mobile Internet Devices [ppt], [pdf]
Internet2 Member Meeting, Arlington VA, April 27th, 2010.

·Volcanoes (Salsa Disaster Recovery and Business Continuity BoF) [ppt], [pdf]
Internet2 Member Meeting, Arlington VA, April 27th, 2010.

·Mobile Internet Device Security [ppt], [pdf]
Educause Security Professionals 2010, Atlanta GA, April 12th-14th, 2010.

·Securing DNS: Doing DNS as if DNS Actually Mattered: An Educause Security Professionals 2010 Preconference Seminar [ppt], [pdf]
Educause Security Professionals 2010, Atlanta GA, April 12th-14th, 2010.

·A Brief Analysis of the ECAR Study of Undergraduate Students and Information Technology 2009 [ppt], [pdf]
Knight Library, University of Oregon, March 12th, 2010.

·ICANN Zone File Access Concept Paper [pdf]
(group participant)

·ICANN Draft Program Development Snapshot High Security Zone Top-Level Domains Advisory Group (HSTLD AG) [pdf]
(group participant)

·MAAWG IPv6 Session [ppt], [pdf]
Messaging Anti-Abuse Working Group (MAAWG), 18th Meeting, San Francisco, February 15-18, 2010.

·Cloud Computing Security Considerations [ppt], [pdf]
Internet2 Joint Techs, Salt Lake City Utah, February 2nd, 2010.

·DHS Cybersecurity Roadmap [pdf] [contributor, listed in Appendix C]

·The 2010 "Tour of Cyber Crimes" [ppt], [pdf]
University of Oregon Law School, January 19th, 2010.

·A Brief Analysis of the ECAR Study of Undergraduate Students and Information Technology 2009 [ppt], [pdf]
University of Oregon Departmental IT Directors Meeting, December 16th, 2009.

·Messaging and Network Security: Guest Lecture, Current Topics in Information Systems and Technology [ppt], [pdf]
Utah Valley University, Orem Utah, December 1st, 2009.

·Passwords [ppt], [pdf]
Northwest Academic Computing Consortium (NWACC) Security Meeting, George Fox University, Portland, OR, November 18th, 2009.

·Postcards From The States: Some Succinct Suggestions From a North American Cyber Security Consultant Sans
Portfolio to His African Colleagues (slides) [ppt]
, (paper) [pdf]
,
7th Wide Open Access Conference, Accra, Ghana, November 2nd, 2009.

·Bulk Account Creation [ppt], [pdf]
17th General Meeting, Messsaging Anti-Abuse Working Group (MAAWG), Philadalphia, PA, October 26th-29th, 2009.

·Articulating the Enduring eCrime Challenges and Research Approaches to Engage Them [ppt]
Introductory slides prepared for an Anti-Phishing Working Group/eCrime Researchers Summit panel, Tacoma, WA, October 21st, 2009.

·Coping With Malware and Other Sorts of Automated Abuse [ppt], [pdf]
Internet2 Fall Member Meeting, San Antonio TX, October 5th-8th, 2009.

·Report From the Internet2 Data Driven Collaborative Security Workshop for High Performance Networks [ppt], [pdf]
Internet2 Fall Member Meeting, San Antonio TX, October 5th-8th, 2009.

·Salsa-DR BOF [ppt], [pdf]
Internet2 Fall Member Meeting, San Antonio TX, October 5th-8th, 2009.

·Draft Interim Internet2 IPv6 Netflow Anonymization Policy [html], [pdf]

·Report From the Data Driven Collaborative Security Workshop for High Performance Networks [ppt], [pdf]
ESCC/Internet2 Joint Techs, IUPUI, Indianapolis, Indiana, July 21, 2009.

·Mac OS X: Enabling Native IPv6 via Stateless Autoconfiguration [pdf]

·Mac OS X: IPv6 and Browsing the World Wide Web via Firefox, Camino, Opera and Safari [pdf]

·Windows XP: Enabling IPv6 with Teredo [pdf]

·Windows XP: IPv6 and Browsing the World Wide Web via Firefox, Opra and IE [pdf]

·Closing Panel: End Users & Cybercrime [ppt], [pdf]
Messaging Anti-Abuse Working Group (MAAWG), 16th General Meeting, Amsterdam NL, June 11th, 2009.

·Just Enough IPv6 to Make You Dangerous [ppt], [pdf]
Messaging Anti-Abuse Working Group (MAAWG), 16th General Meeting, Amsterdam NL, June 8th, 2009.

·MAAWG and IPv6 Security [ppt], [pdf]
Messaging Anti-Abuse Working Group (MAAWG), 16th General Meeting, Amsterdam NL, June 8th, 2009.

·Internet2 Data Driven Collaborative Security Workshop (DDCSW)
University of Maryland Baltimore County, May 21st-22nd, 2009.

·Electromagnetic Pulse (EMP) [ppt], [pdf]
Infragard Meeting, Eugene Public Safety Center, Eugene, OR, April 30th, 2009.

·IPv6 and the Security of Your Network and Systems [ppt], [pdf]
Internet2 Member Meeting, Arlington Virginia, April 28th, 2009.

·Internet2 Strategic Planning, Task G: Implement Security Best Practices (4/16/2009) Draft [pdf]

·Internet2 Strategic Planning, Task J: Cooperate on Security Challenges (4/16/2009) Draft [pdf]

·Internet2 Strategic Planning, Appendix I: Glossary of Acronyms, Entities and Terms (4/16/2009) Draft [pdf]

·Attacking the Phishing Problem With Technology: Options for Banks and Other Financial Institutions [ppt], [pdf]
American Bankers Association Conference Call, March 31st, 2009.

·Security Update [ppt], [pdf]
Internet2/ESnet Joint Techs, College Station Texas, February 4th, 2009.

·"If We Do IPv6, Will It Help or Hurt Our Security?" [ppt], [pdf]
Internet2/ESnet Joint Techs, College Station Texas, February 3rd, 2009.

·DNSSEC Workshop Planning BOF [ppt], [pdf]
Internet2/ESnet Joint Techs, College Station Texas, February 2nd, 2009.

·Initial Report, ICANN GNSO Fast Flux Working Group [ppt]
[working group member and contributor to the initial report], January 26, 2009.

·What To Do If Your Website Is Hacked by Phishers [pdf]
[contributing researcher], January 2009

·2009 Tour of Cyber Crimes [ppt], [pdf]
University of Oregon Law School, Jan 13th, 2009.

·Cyber War, Cyber Terrorism, and Cyber Espionage [ppt], [pdf]
IT Security Meeting, Fargo, ND, Oct 22nd, 2008.

·Doing DNS As If DNS Actually Mattered [ppt], [pdf]
IT Security Meeting, Fargo, ND, Oct 22nd, 2008.

·Loss of Network Control Incidents [ppt], [pdf]
Internet2 Fall Member Meeting, New Orleans LA, October 15th, 2008.

·DNSSEC BoF [ppt],[pdf]
Internet2 Fall Member Meeting, New Orleans LA, October 15th, 2008.

·NITRD Workshop on Research Challenges for 2015 Global Networks
Seattle, Washington, September 28th-30th, 2008.

·Malware, Bots and What We Need From Uncle Sam [ppt], [pdf]
MAAWG 14, Fort Lauderdale FL, September 22nd, 2008.

·The More You Spam, The Less I Care:
Psychological Decision Making Heuristics and Their Impact on Anti-Spam Activity [ppt]
, [pdf]

MAAWG 14, Fort Lauderdale FL, September 22nd, 2008.

·Security and Privacy Are NOT Mutually Incompatible [ppt], [pdf]
Interne2/ESCC Joint Techs, Lincoln NE, July 20, 2008.

·How Much Headroom Do You Need? Bandwidth and High Performance Networks [ppt], [pdf]
Interne2/ESCC Joint Techs, Lincoln NE, July 20, 2008.

·A Normative Campus Security Agenda [ppt], [pdf]
Educause Security Professionals 2008, Arlington VA, May 5th, 2008.

·Cyberinfrastructure Architectures, Security and Advanced Applications [ppt], [pdf]
Internet2 Member Meeting, Arlington VA, April 22nd, 2008.

·Just How Bad Is It? [ppt], [pdf]
Oregon Safe Cyberspace Meeting, Wayne Morse Federal Courthouse, Eugene, February 21st, 2008.

·Spam, Domain Names and Registrars [ppt], [pdf]
Messaging Anti-Abuse Working Group 12th General Meeting, San Francisco, February 21st, 2008

·Internet2, Security and DICE [pdf]
Dante, Internet2, Canarie and ESNet (DICE) Meeting, Athens, Greece, February 12th, 2008

·Terms for a System and Network Security/Cybercrime Glossary

·A Look at the Unidentified Half of Netflow (With an Additional Tutorial On How to Use
the Internet2 Netflow Data Archives) [ppt]
, [pdf]
ESCC/Internet2 Joint Techs Workshop, University of Hawaii, January 20-24, 2008.

·A Succinct Cyber Crime Tour Meant To Illustrate By Way of Assorted Examples The Sort of Online Crimes
Which Are Occurring -- And Why We Need More Cyber Crime-Trained Attorneys [ppt]
, [pdf]
University of Oregon Law School, January 8th, 2008.

·Some Frontiers of Security Work [ppt], [pdf]
Educause, October 24th, 2007, Seattle Washington.

·Planning for Certain High Risk Security Incidents [ppt] , [pdf]
Internet2 Member Meeting, San Diego California, October 11th, 2007.

·Pandemic Flu and Computer and Network Disaster Recovery Planning: Some Starting Thoughts [ppt] , [pdf]
Salsa-DR Working Group Meeting, ESCC/Internet2 Joint Techs, Fermilab, Batavia, Illinois, July 16th, 2007.

·Evolving Methods for Sending Spam and Malware Panel: Spammer Requirements and the Spam Ecosystem [ppt], [pdf]
FTC Spam Summit: The Next Generation of Threats and Solutions, Washington DC, July 11-12th, 2007.

·Internet2 Security Initiatives [ppt], [pdf]
Dante/Internet2/Canarie/ESNet Meeting, Lawrence Berkeley Lab, July 11-12th, 2007.

·What MAAWG Members Should Know About DNSSEC and the Security of DNS [ppt], [pdf]
Messaging Anti-Abuse Working Group (MAAWG) Meeting, Dublin, Ireland, June 5th-7th, 2007.

·We Need a Cyber CDC or Cyber World Health Organization [ppt], [pdf]
Anti-Phishing Working Group (APWG) Counter E-Crime Summit, San Francisco, California, May 31, 2007.

·Upcoming Requirements from the US Law Enforcement Community to Technically Facilitate Network Wiretaps [ppt], [pdf]
TERENA TNC2007, Lyngby, Denmark, May 22, 2007.

·Capacity Planning and System and Network Security [ppt], [pdf]
Internet2 Member Meeting, Crystal City VA, April 24, 2007.

·Real Time Notification During a Disaster or Other Emergency [ppt], [pdf]
Internet2 Member Meeting, Crystal City VA, April 23, 2007.

·Securing DNS: An Educause Security Professionals Conference Preconference Seminar [ppt], [pdf]
Educause Security Professionals 2007, Denver CO, April 10th, 2007.

·Port 53 Wars: Security of the Domain Name System and Thinking About DNSSEC [ppt], [pdf]
Internet2/ESNet Joint Techs, Minneapolis MN, February 14, 2007.

·CALEA BoF: Some Introductory Comments [ppt],[pdf]
Internet2/ESNet Joint Techs, Minneapolis MN, February 14, 2007.

·Disaster Recovery and Business Continuity Planning BoF: Some Introductory Comments [ppt],[pdf]
Internet2/ESNet Joint Techs, Minneapolis MN, February 13, 2007.

·Lambdas and Your Campus: Some Introductory Comments [ppt], [pdf]
Internet2/ESNet Joint Techs, Minneapolis MN, February 13, 2007.

·Capacity Planning: A Core Anti-Spam Competency [ppt], [pdf]
Messaging Anti-Abuse Working Group (MAAWG) 9th General Meeting, San Francisco, California, 29 January 2007.

·Higher Education Users and Spam: What Do Users Do When Things Go Wrong? How Have User Behaviors Changed Because of Spam? [ppt], [pdf]
Messaging Anti-Abuse Working Group (MAAWG) 9th General Meeting, San Francisco, California, 29 January 2007.

·Infected PCs Acting as Spam Zombies: We Need to Cure the Disease, Not Just Suppress the Symptoms
(10MB video screencast) [wmv]
, (slides only) [ppt], or (slides only) [pdf]

2nd Joint London Action Plan-CNSA Workshop, Brussels, Belgium, December 13, 2006.

·Route Injection and the Backtrackability of Cyber Misbehavior [ppt], [pdf]
Internet2 Member Meeting, Chicago, December 5, 2006.

·Disaster Planning and Recovery BOF (Introductory Slides) [ppt], [pdf]
Internet2 Member Meeting, Chicago, December 4, 2006.

·We Regret to Inform You That "Due to Insecurities Beyond Our Control, Your Privacy Has Been Cancelled for Your Convenience" [ppt], [pdf]
Pacific Institute for Ethics and Social Policy Conference on Technology, Intelligence, and the Preservation of Civil Liberties, November 18th, 2006 Cannery Pier Hotel and Maritime Museum, Astoria, OR.

·Security "Monsters:" Current Security Threats and What You Should Be Doing to Address Them (Closing Session) [ppt], [pdf]
IT Security: A Call to Action for the Education Community, November 2nd, 2006, Ramada Plaza, Fargo ND.

·Running a Server? How Does It Score on the Server Administration Self-Assessment Scorecard? [ppt], [pdf]
IT Security: A Call to Action for the Education Community, November 1st, 2006, Ramada Plaza, Fargo ND.

·Route Injection and Spam [ppt], [pdf],
Messaging Anti-Abuse Working Group (MAAWG) 8th General Meeting, Toronto, Ontario, Canada, 23-26 October 2006.

·Filtering Spam 'At Your Leisure:' A MAAWG Briefing/Look Ahead [ppt], [pdf],
Messaging Anti-Abuse Working Group (MAAWG) 7th General Meeting, Brussels, Belgium, 27-29 June 2006.

·Alpha Mail ("Blue" Webmail") Is Now the Recommended UO Web Email Interface [html],
Computing News, Summer 2006.

·CALEA Update [html],
Computing News, Summer 2006.

·Dealing With Department Email Contact Addresses and Staff Changes [html],
Computing News, Summer 2006.

·Don't Be Taken In By (Absurdly) High-Yield Investment Scams [html],
Computing News, Summer 2006.

·Showing Rather Than Telling: Capturing On-Screen Demos With Camtasia [html],
Computing News, Summer 2006.

·UO Web Programmers: Get Ready for Linux [html],
Computing News, Summer 2006.

·The Inescable Inevitability of Convergence (Unless You "Help") (Closing Session) [ppt], [pdf]
North West Academic Computing Consortium (NWACC) Annual Conference, Portland OR, June 9, 2006.

·Understanding National Optical Networks [ppt], [pdf]
NSF/EPSCoR National Workshop of Cyber Infrastructure, Nashville TN, May 11, 2006.

·Top 10 Countdown: Security Vulnerabilities Higher Ed Must Face [html],
Campus Technologies Magazine, May 1st, 2006.

·A Brief Practical Security "Punchlist" [ppt], [pdf]
Internet2 Member Meeting, Arlington VA, April 25, 2006.

·Conserve Computer Energy Use [html],
Computing News, Spring 2006.

·Darkwing Users: Introducing shell [html],
Computing News, Sprint 2006.

·Recommended Web Browser and IMAP Mail Client: Firefox and Thunderbird [html],
Computing News, Spring 2006.

·Running a Server? How Does It Score on the Self Assessment Scorecard? [html],
Computing News, Spring 2006.

·SpamAssassin Available for All uoregon.edu Accounts [html],
Computing News, Spring 2006.

·Time to Replace Obsolete Windows Systems! [html],
Computing News, Spring 2006.

·uoregon.edu Accounts, maildir Format Mailboxes, and Dovecot IMAPd [html],
Computing News, Spring 2006.

·Web Presence and Influence: How Google Rates Leading American Universities in 2006 [html],
Computing News, Spring 2006.

·"Why Do I have to Change My!@$%#* Password?" [html],
Computing News, Spring 2006.

·X Windows Security [html],
Computing News, Spring 2006.

·Invited participant, IAB Workshop on Unwanted Traffic, March 9th-10th, 2006, Marina del Rey.
See http://www.ietf.org/internet-drafts/draft-iab-iwout-report-03.txt

·MAAWG Briefing/Look Ahead [ppt], [pdf]
Messaging Anti-Abuse Working Group 6th General Meeting, San Francisco California, Feb 28-Mar 2nd, 2006.

· Client-Side Spam Filtering [html]
Computing News, Winter 2006.

· Minimize Your Computer's Energy Use [html]
Computing News, Winter 2006.

· Names of the Server Formerly Known as Darkwing [html]
Computing News, Winter 2006.

· Non-UO Recursive Domain Name Server Access to Be Curtailed February 1 [html] (with Jose Dominguez)
Computing News, Winter 2006.

· What Are Those Little RSS or XML Tags on Web Pages? [html]
Computing News, Winter 2006.

· Sober-Y Virus Doubles Number of Rejected SMTP Connections During December [html]
Computing News, Winter 2006.

· Year of the $400 Budget Laptop [html]
Computing News, Winter 2006.

· Panel: The Continuing Evolution of the Zombie Threat [ppt], [pdf]
Messaging Anti-Abuse Working Group (MAAWG), Montreal, Quebec, November 9th, 2005.

· A User-Services-Driven Approach to Computer and Network Security: A SIGUCCS Tutorial [ppt], [pdf]
ACM SIGUCCS, Monterey CA, November 6th, 2005.

· Phishing: Technical Approaches to Countering the Threat [ppt], [pdf]
US DOJ Economic Fraud and Digital Evidence Conference, Eugene OR, September 22nd, 2005

·Digging Into Unlawful Email Messages [ppt], [pdf]
US DOJ Economic Fraud and Digital Evidence Conference, Eugene OR, September 22nd, 2005

· Thinking About Lambda Based Network Architectures and Your Applications [ppt], [pdf], [Windows Media Player Video]
Internet2 Member Meeting, Philadelphia PA, September 20th, 2005;

Also available in a variety of formats from The Research Channel.

· All New Student Accounts Now Being Created on Darkwing [html],
Computing News, Summer 2005.

· Clarinet (YellowBrix) News Service Dropped [html],
Computing News, Summer 2005.

· File Snapshots Now Available on Darkwing [html],
Computing News, Summer 2005.

· Information on Hard Drives in Surplus Hardware: 'Deleted' Does Not Mean 'Gone' [html],
Computing News, Summer 2005.

· Spamvertised Drugs and Dubious Medical Devices [html],
Computing News, Summer 2005.

· Survey: Please Tell Us How You Get Help With Computing And Networking Questions [html],
Computing News, Summer 2005.

· UO Moves to McAfee for Antivirus Software [html],
Computing News, Summer 2005.

· Virus Analysis Sites [html],
Computing News, Summer 2005.

· Phishing: Some Technical Suggestions for Banks and Other Financial Institutions [ppt], [pdf]
2005 Quad State [Bank] Security Conference, Welches OR, May 5, 2005.

· Explaining Distributed Denial of Service Attacks to Campus Leaders [ppt], [pdf], [Windows Mediaplayer Video]
Internet2 Member Meeting, Arlington VA, May 3, 2005.

Also available in a variety of formats from The Research Channel.

· Budget Desktop Systems: Are They Right for You?" [html],
Computing News, Spring 2005.

· The Expanding Taxonomy of Unwanted Mail: Phishing [html],
Computing News, Spring 2005.

· Linux Distributions: There's More than RedHat and Fedora Core [html],
Computing News, Spring 2005.

· The New NetApp NearStore R200 Filers [html],
Computing News, Spring 2005.

· Sharing Large Scientific Datasets with LoCI [html],
Computing News, Spring 2005.

· Time to Move Your Email Off oregon.uoregon.edu [html],
Computing News, Spring 2005.

· Dealing with Zombies and Trojans and Port 25 [pdf]
Messaging Anti-Abuse Working Group General Meeting (MAAWG), San Diego CA, March 3rd, 2005.

· Spam Zombies and Inbound Flows to Compromised Customer Systems [pdf],
Messaging Anti-Abuse Working Group General Meeting (MAAWG), San Diego CA, March 1st, 2005.

· The New Darkwing: a Briefing [html],
Computing News, Winter 2005.

· Some Technical Suggestions for Institutions Targeted By Phishers [ppt], [pdf]
Valley Fraud Working Group, Eugene OR, January 25, 2005.

· The New Darkwing [ppt], [pdf]
Computing Center General Staff Meeting, January 19, 2005.

· The Impending End of Traditional .forward-style Forwarding,
Campus Technology (formerly Syllabus), Wednesday, December 15, 2004.

· Microsoft Windows XP Service Pack 2 and Your Web Pages [html],
Computing News Fall 2004.

· SCADA Security and Critical Infrastructure [ppt], [pdf]
Presented at the Eugene Oregon Infraguard Meeting, Lane Community College, December 7th, 2004.
(terms/glossary [ppt], or [pdf])

· Faculty Orientation 2004 [pdf],
September 24, 2004

· Welcome to Your Weekly Paradigm Shift: Very Large "Free" Web E-Mail Accounts,
Syllabus: Technology for Higher Education, July 15, 2004.

· SCADA Security [ppt], [pdf]
Presented at the EECS/Internet2 Joint Techs Meeting, Columbus Ohio, July 21, 2004

· Email Security and Anti-Spam Tutorial [ppt], [pdf]
Presented at the EECS/Internet2 Joint Techs Meeting, Columbus Ohio, July 18, 2004

· How UO Deals With Spam: A Brief Strategic Overview With Some Tactical Suggestions [ppt], [pdf],
Cornell/Educause Institute for Computer Policy and Law, Ithaca, NY, July 8, 2004.

· Geographical Limits of UO's Wireless Internet Service
Computing News, Summer 2004.

· Gmail and the New Extra Large Free Email Accounts
Computing News, Summer 2004.

· NFSv4 and NFS Security
Computing News, Summer 2004.

· Rediscovering the Shell Prompt
Computing News, Summer 2004.

· Renting versus Buying Music Online
Computing News, Summer 2004.

· How Did They Get My Email Address?
Computing News, Spring 2004

· More Selected Elements of the University 2003 Home Page Study
Computing News, Spring 2004

· OpenVMS Licenses Available Free for Educational and Hobbyist Use
Computing News, Spring 2004

· Sometimes Being Very Small Can Be Very Big: ONAMI and Nanotechnology
Computing News, Spring 2004

· Email Effective Security Practices: 5 Concrete Areas to Scrutinize [ppt], [pdf]
Presented at the Internet2 Member Meeting, Arlington, Virginia, April 20, 2004

· SCADA Security the "Most Monumental Non-Nuclear Explosion and Fire,"
Syllabus: Technology for Higher Education, April 14, 2004.

· Practical Steps to Take to Mitigate Computer and Network Risks [ppt], [pdf]
Presented at the Eugene Infraguard Meeting, Lane Community College, March 12th,

· Why Are Portalized University Home Pages Rare?
Syllabus Magazine, March 1, 2004.

· Spam Fighting Tips, Newsday, January 20, 2004

· How to Report Spam at the University of Oregon
Computing News, Winter 2004.

· More Selected Elements of the 2003 University Home Page Study
Computing News, Winter 2004.

· Want to Try Opting Out of UO Spam Filtering?
Computing News, Winter 2004.

· Web Browser Hijacking: What Is It and How Can You Protect Yourself?
Computing News, Winter 2004.

· Wonder Why Google Isn't Returning Some Hits It Should Be?
Computing News, Winter 2004.

· AMP IPv6: Putting a Key Emerging Protocol "On the Radar" [pdf],
NLANR Network Analysis Times, November 2003, page 4.

· ASNs (Autonomous System Numbers) [pdf],
Anti-Spam and Cybercrime Investigation One-Page Training Series, November 14, 2003.

· Sharing Large Files,
Syllabus: Technology for Higher Education, October 30, 2003.

· The First Step Toward Getting E-Mail Back The Way It Used to Be,
Syllabus: Technology for Higher Education, October 9, 2003.

· Picking at a Virus-Ridden Corpse: Lessons from a Post-Blaster, Post-Welchia, Post-Nachi, Post Mortem: Part I, and Part II,
Syllabus: Technology for Higher Education, September 18, 2003 and September 25, 2003.

· Virus Backscatter and Non-Delivery Notices for Mail You Didn't Send,
Computing News, Fall 2003.

· Selected Elements of 2003 University Home Page Study,
Computing News, Fall 2003.

· The Open Proxy Problem: Should I Worry About Half a Million Trivially Exploitable Hosts? [ppt], [pdf]
Presented at the Internet2/NLANR Joint Techs Meeting, University of Kansas, Lawrence, August 4th, 2003.

· Winning the War on Spam [ppt]
Presented at the North West Academic Computing Consortium (NWACC) Online Content: Policy, Strategy and Support Conference, Portland Oregon, June 6, 2003.

· Free Fortran, C/C++, and Pascal Compilers for PCs [html]
UO Computing News, Spring 2003.

· Microsoft Windows XP, Linksys DSL Routers, Universal Plug and Play, RIP, and the 'Internet Gateway Device Discovery and Control Client' [html]
UO Computing News, Spring 2003.

· Understanding the Ins and Outs of World Wide Web Addresses and Your Web Browser [html]
UO Computing News, Spring 2003.

· The Open Proxy Problem [ppt], [pdf]
Presented at the Internet2 Member Meeting, Arlington, Virginia, April 9th, 2003.

· Jumbo Clean Networking Hardware

· Practical Issues Associated with 9K MTUs [ppt], [pdf]
Presented at the Internet2/NLANR Joint Techs Meeting, Miami, Florida, February 4th, 2003.

· Just Enough Mathematica To Make You Dangerous [pdf]
UO Computing News, Winter 2003

· The Creeping Impoverishment of Online Directories and Search Engines [html]
UO Computing News, Winter 2003

· Where Geeks Go For News [html]
UO Computing News, Winter 2003

· Non-Administrative Access to OpenVMS on Oregon to Phase Out by Fall 2004 [html]
UO Computing News, Fall 2002

· Open Proxy Servers: A Growing Source of Spam [html]
UO Computing News, Fall 2002

· Spam Remedies: Some Special Federal Government Addresses for Reporting Spam [html]
UO Computing News, Fall 2002

· Considering Web Filtering Software? [html]
UO Computing News, Summer 2002

· Network Infrastructure Companies Still Struggling [html],
UO Computing News, Summer 2002

· Ten Computer Chores to Pass a Slow Summer Day [html],
UO Computing News, Summer 2002

· 2002 University Website Congruence Study [html],
UO Computing News, Spring 2002.

· Asian Spam and the Fate of Spam-Ambivalent ISPs [html],
UO Computing News, Spring 2002.

· Beware: MP3 Files Can be Written to Include Code to Launch Unwanted Web Pages [html],
UO Computing News, Spring 2002.

· Dealing with Pop-Up-Under Web Advertising [html],
UO Computing News, Spring 2002.

· Network Infrastructure Companies Continue to Struggle Financially [html],
UO Computing News, Spring 2002.

· Virtual Private Network Services Ready for UO Off-Campus Cable Modem/DSL Users [html] with Dan Albrich in
UO Computing News, Spring 2002.

· MPEG1 IP Multicast Video, UO and Internet2 [ppt], [pdf],
Presented via H.323 video at the meeting of the Michigan chapter meeting of the Society of Motion Picture and Television Engineers (SMPTE), April 16th, 2002.

· The Case for Traffic Shaping at Internet2 Schools [ppt], [pdf]
Presented at the NLANR/Internet2 Joint Techs Workshop, 27-30 January 2002

· Percentage of Total Internet2 Traffic Consisting of Kazaa/Morpheus/FastTrack (Source Port=1214) By Core Node [pdf], [html], [xls]
Presented at Collaborative Computing in Higher Education: Peer-to-Peer and Beyond workshop, 30-31 January 2002

· What's Missing From (At Least Some) Current Traffic Shaping Appliances? [pdf]
Presented at Collaborative Computing in Higher Education: Peer-to-Peer and Beyond workshop, 30-31 January 2002

· Ten Odd Strategies For Picking Numerical Values for Your Traffic Shaper [pdf]
Presented at the Collaborative Computing in Higher Education: Peer-to-Peer and Beyond workshop, 30-31 January 2002

· Sample Simple Graphical Representation of a Hypothetical Traffic Shaper Policy [pdf]
Presented at the Collaborative Computing in Higher Education: Peer-to-Peer and Beyond workshop, 30-31 January 2002

· Beware of '4-1-9' or 'Nigerian Advance Fee Fraud' Scams,
UO Computing News, Winter 2002

· How Load Director/SSL Accelerator Boxes Work [html],
UO Computing News, Winter 2002

· Understanding The Basics of Traffic Shaping [html],
UO Computing News, Winter 2002

· Traveling? Check Out These Online Resources [html],
UO Computing News, Fall 2001

· Itanium-Based Systems Beginning to Ship [html],
UO Computing News, Fall 2001

· Volatile Market Conditions Affect Network Infrastructure Companies [html],
UO Computing News, Fall 2001

· Using Chime to View Chemical Molecules [html],
UO Computing News, Fall 2001

· Cisco 675 DSL Router Users Should Upgrade to a Current Version of CBOS [html],
UO Computing News, Fall 2001

· 1931 UO Yearbook Now Online [html],
UO Computing News, Summer 2001

· Prices of Computer Components Continue to Drop [html],
UO Computing News, Summer 2001

· What's Wrong with High Bit Rate DSL Offerings? [html]
UO Computing News, Summer 2001

· Thinking About Your Wide Area Network Connectivity [ppt], [pdf],
Presented at the NWACC Networking for the 21st Century Conference, Portland OR, 6/15/2001

· Oregon Gigapop Traffic Characterization [ppt], [pdf],
Presented at the Internet2/NLANR Joint Techs, Lincoln NE, 5/16/2001

· Internet2 and Oregon [ppt],
Presented at the Southeast Technology Consortium I2 Day, 5/9/2001

· I2 End-to-End Performance Initiative Planning Meeting [pdf],
Prepared for the I2 End-to-End Performance Initiative Planning Meeting, Ann Arbor, MI

· OWEN/NERO Bandwidth Audit, June 12, 2000

· Provisioning for Peer-to-Peer Applications and Their Impact on Our Campuses [pdf],
Comments on the topics submitted for the panelists for the Internet2 Spring 2001 Member Meeting, Washington DC

· Monitoring Traffic Exits in a Multihomed I2 Environment [ppt],
Presented at the NLANR/I2 Joint Techs, Minneapolis, 5/18/2000

· Going Fast(er) on Internet2 [ppt],
Presented at the Campus Focused Workshop on Advanced Networks, San Diego, 4/12/2000

· Threat of Regional Power Shortages Increases Need for Local Uninterruptable Power Supplies [html],
UO Computing News, Winter 2001

· What to Look for When Selecting and Evaluating DSL Service Providers [html],
UO Computing News, Winter 2001

· Look Carefully at Prepaid Cell Phone Plans [html],
UO Computing News, Winter 2001

· What's IPv6 [html],
UO Computing News, Spring 2001

· IPv6 Exchange Points Becoming More Common [html],
UO Computing News, Spring 2001

· DNS Names Poised to Become Multilingual [html],
UO Computing News, Spring 2001

· Internet2 News [html],
UO Computing News, Spring 2001

· Are SDRs [Software Defined Radios] the Wave of the Future? [html],
UO Computing News, Spring 2001

· Wide Area Bandwidth Questions [html],
UO Computing News, Spring 2000

· Internet2 and UO [html],
UO Computing News, Fall 2000

· Curious About WAP/WML? [html],
UO Computing News, Summer 2000

· Fiber Optic Primer and Tutorial [html],
UO Computing News, Summer 2000

· State Higher Education Research and Education Networks and State Agency Networks (3/24/2000) [pdf]

· Coping with Spam: Should You Try to Unsubscribe? [html],
UO Computing News, Summer 1999

· Parallel Approaches to the Facilities Layout Problem,
Ph.D. Dissertation, University of Oregon Decision Sciences Department, 1999.

· Internet2 Update: A quick overview of recent developments in high-speed academic networking,
UO Computing News, Spring 1999.

· Writing Applications for Internet2,
UO Computing News, Spring 1999.

· Save Space and Speed Up Your Web Pages by Converting Gifs to Jpgs,
UO Computing News, Spring 1999.

· System Administrators: What to Do if Your System is Hacked/Cracked,
UO Computing News, Winter 1999.

· Internet2 Links and Glossary,
UO Computing News, Winter 1999.

· Intel Donates Additional NetPCs to UO, [pdf]
UO Computing News, Fall 1999.

· UONet and Oregon Gigapop Get Significant Boost from 3Com, [pdf]
UO Computing News, Fall 1999.

· Intel Donates 100 NetPCs to UO, [pdf]
UO Computing News, Fall 1998.

· Ricochet Wireless Modem Service to Continue in Eugene, [pdf]
UO Computing News, Fall 1998.

· Invitation to Submit Designs for the 1997 Redesign of www.uoregon.edu

· Using TeX on the VAX to Typeset Documents, December 1990 [TeX]



https://www.stsauver.com/joe/index.html
joe@uoregon.edu