The
latest version
Questions you should have
How to install it
Full technical disclosure Related technical resources
Let us know! |
There's currently three contributors to this system.
1. John Sinteur. Port maintainer. Interested in a wide range of technological issues, and the effects of technology on society, John's current daytime activities include being a Technology Architect for a website for a major Dutch telco. Having done lots of front-ends for web sites, he's now working on the network architecture, including connections to back-ends, such as integration of billing systems and credit card authorization for web application servers like BroadVision. Before that, advanced multimedia projects were his main beef, and his work with Quicktime earned him a stump t-shirt. His experience in building firewalls originates from a day when one of his previous employers complained about the stability (or rather, lack thereof) of the commercial product in use. Figuring he could do better by simply taking the time to understand the underlying issues, he then built the first version of what some years and many versions later became the web site you're now looking at. 2. Bert Driehuis Alternating between developer and systems administration roles, Bert has a career spanning computer aided statistical analysis, writing chemical plant monitoring software, setting up mission critical servers within corporations, and providing access to a wide range of applications and services through firewalls (and, in ancient times, over X.25). In his copious spare time, he makes small contributions to various open source (or commercial licensed source) projects. Among the most visible are ISDN4BSD, for which he wrote the BSD/OS support, and Mozilla, for which he worked with Netscape and Mozilla engineers to tackle BSD/OS specific issues. Other areas of interest include the Web and Web caching, systems monitoring and SNMP. He was mighty surprised when all of a sudden he was in the limelight as a result of this, when all he thought he was doing was making sure his favorite platform was able to run his favorite applications. His guiding principles include providing value to his patrons as well as the community at large, making a valiant but often overly enthusiastic attempt at doing the right thing, and being a resource to those who share these principles (and quite often, to those who don't). 3. Joe Morris Prior to joining Coopers & Lybrand Joe worked as a distributed systems security specialist at Bell Atlantic. While there he created and implemented numerous enterprise systems ranging from automated monitoring of critical systems to design of intranet and extranet firewall infrastructure. Joe also performed intrusion vulnerability testing as well as internal Bell Atlantic security consulting. Joe's specialities are secure communications and intra-network transactions. Joe Morris was first involved in computer security at the National Secuirty Agency in the mid 1980's. While employed at NSA as a UNIX system administrator and network manager he performed a wide variety of critical tasks from chip level replacement to detailed network design and implentation. His efforts won him several of the highest peacetime awards from NSA and the Department of Defense. He has formal training and experience in most aspects of computer and network security, ranging from basic physical security to advanced cryptographically-enabled security solutions. Joe has presented at numerous national-level conferences on security- related matters. His professional memberships include ACM, IEEE, IETF, USENIX, SAGE and the Internet Society. |