<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE></TITLE>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<STYLE>BODY {
MARGIN-TOP: 25px; FONT-SIZE: 12pt; MARGIN-LEFT: 25px; COLOR: #000000; FONT-FAMILY: Arial, Helvetica
}
P.msoNormal {
MARGIN-TOP: 0px; FONT-SIZE: 12pt; MARGIN-LEFT: 0px; COLOR: #ffffcc; FONT-FAMILY: Helvetica, "Times New Roman"
}
LI.msoNormal {
MARGIN-TOP: 0px; FONT-SIZE: 12pt; MARGIN-LEFT: 0px; COLOR: #ffffcc; FONT-FAMILY: Helvetica, "Times New Roman"
}
</STYLE>
<META content="MSHTML 6.00.2800.1400" name=GENERATOR></HEAD>
<BODY background="">
<P><STRONG>These are just three of over 30 technology and management learning
sessions at Ohio's premier library technology conference "tech connections 5 :
secure and defend...the WILD side of technology!", June 7-8, 2004 at the Fawcett
Conference Center - OSU, Columbus, Ohio.</STRONG></P>
<P><BR><FONT color=#ff0033><STRONG>PLEASE NOTE:</STRONG></FONT> <EM>Will you
need overnight accommodations?</EM> The "tech connections 5 group" overnight
accommodations special rate is secured through Tuesday, May 25, 2004. If need to
make overnight accommodations, details are available through the tech
connections 5 Web site at <A
href="http://www.rls.lib.oh.us/tc5/generaldetails.htm"
target=_blank>www.rls.lib.oh.us/tc5/generaldetails.htm</A>. </P>
<P><BR><STRONG>Ethical Hacking I - System Exploitation using Stack-Based Buffer
Overflows</STRONG><BR><EM>Jack Koziol, InfoSec Institute [ <A
href="http://www.infosecinstitute.com/"
target=_blank>www.infosecinstitute.com/</A> ] </EM><BR>--Learn the intimate
details of the bane of modern computing --- the stack-based buffer overflow. Get
a feel for traditional exploitation techniques as well as more modern ones
including the elusive Off-By-One Overflow and Integer Overflow. See a buffer
overrun exploited live as a Windows 2000 server is compromised and interactive
desktop access is established remotely. Leave with a toolkit CD-ROM to run the
demo in your own home.</P>
<P><STRONG>Ethical Hacking II - Covert Channels</STRONG><BR><EM>Jack Koziol,
InfoSec Institute [ <A href="http://www.infosecinstitute.com/"
target=_blank>www.infosecinstitute.com/</A> ] </EM><BR>--Modern security
infrastructure is designed to discover, detect and mitigate harmful security
breaches. IDSs, IPSs, Firewalls and routers all are designed to provide good
intel to security pros. The hacking community has responded with covert
channels, a means and method to disguise malicious behavior using encrypted or
otherwise hard to detect tunnels. Traditional protocol tunnels such as ICMP,
Ack, ESP, and Frag tunnels are detailed as well. Leave with a toolkit CD-ROM to
run the demo in your own home. </P>
<P><STRONG>Meeting Patron Expectations with Next Generation Web
Sites</STRONG><BR><EM>Frank Cervone, Assistant University Librarian for
Information Technology, Northwestern University [ <A
href="http://www.cervone.com/" target=_blank>www.cervone.com/</A> ]</EM><BR><IMG
height=181 alt="Frank Cervone" src="http://66.213.1.212/tc5/images/frank_2.jpg"
width=155 align=left NOSEND="1">--The rate of change is changing, so we need to
continually scan the environment in order to understand what our patrons expect
from us. One expectation that has changed significantly in the last few years is
that web sites should be very easy to use and information must be found readily.
Recent research has uncovered some very interesting things about how people use
web sites and what they have come to expect both in design and services. Join us
for an interesting (and sometimes humorous) exploration of how federated
searching, individualized content, and new trends in usability are providing a
road map for the development of "Next Generation Library Websites".</P>
<P>The tech connections 5 Web site provides further conference details including
online registration at <A href="http://www.rls.lib.oh.us/tc5/"
target=_blank>www.rls.lib.oh.us/tc5/</A>.</P>
<P><STRONG>We hope to see you at tech connections 5!</STRONG><SPAN
class=653275619-21052004><STRONG> </STRONG><SPAN
class=793050020-21052004><FONT face=Georgia color=#0000ff> <STRONG><FONT
face=Arial color=#000000>Conference </FONT></STRONG><STRONG><FONT face=Arial
color=#000000>r</FONT></STRONG></FONT></SPAN><STRONG>egistration will be open
through June 1.</STRONG></SPAN></P>
<P><FONT color=#ff0033><STRONG>Since 1999, tech connections has been a
collaborative endeavor between Ohio's Regional Library Systems - CAMLS, GCLC,
MOLO, NOLA, NORWELD, OVAL, SOLO.</STRONG></FONT></P>
<P>"This year's tech connections conference is nicely enhanced for conference
participants thanks to the receipt of an LSTA grant from the Institute of Museum
and Library Services through the State Library of Ohio."</P>
<P align=center><BR>Margaret L. Delaney, Continuing Education
Coordinator<BR>Ohio Valley Area Libraries Regional Library System (OVAL)<BR>252
West Thirteenth Street, Wellston, OH 45692<BR>740-384-2103 x 2 ~ 740-384-2106
fax<BR><A href="http://www.oval.lib.oh.us/" target=_blank>www.oval.lib.oh.us</A>
~ <A href="mailto:ceoval@oplin.org">ceoval@oplin.org</A><BR></P></BODY></HTML>