Educause Security Discussion: by author

536 messages starting Feb 14 06 and ending Mar 14 06
Date index | Thread index | Author index


Aaron Lafferty

Re: Use of Digital Forensics Professional Services Aaron Lafferty (Feb 14)
Re: SSN Conversion Aaron Lafferty (Mar 22)

Adam Goldstein

Incident Response Plans - Quick informal survey Adam Goldstein (Jan 18)

Alan Amesbury

Re: URL switching in e-mails Alan Amesbury (Jan 03)
Re: Storing encryption strings - best practice? Alan Amesbury (Mar 07)
Re: URL switching in e-mails Alan Amesbury (Jan 03)
Re: Exchange Server Virus Scanning Alan Amesbury (Feb 17)
Re: DNS Hosting Alan Amesbury (Mar 07)
Re: Firewall Strategies Alan Amesbury (Feb 06)
Re: DNS records question Alan Amesbury (Mar 24)

Alec Yasinsac

Re: SANS Post about EDU vulnerability scanning assignment Alec Yasinsac (Mar 03)

Andrew Watson

DNS Hosting Andrew Watson (Mar 07)

Barbara Chung (DURTSCHI)

Re: Example of WMF Exploit SPAM Targetting Schools? Barbara Chung (DURTSCHI) (Jan 06)
Re: Implementing a Public Key Infrastructure Barbara Chung (DURTSCHI) (Feb 16)
Re: Implementing a Public Key Infrastructure Barbara Chung (DURTSCHI) (Feb 16)

Bill Cotter

PAT address user identification: methods? Bill Cotter (Jan 26)

Bob Kalal

Re: Do you have a CIO? Bob Kalal (Jan 06)

Bob Kehr

Re: Locally Administered servers Bob Kehr (Mar 13)

Brad Judy

Re: A Few Items to Note About Upcoming Higher Ed IT Security Conference (Security 2006) Brad Judy (Mar 20)
Re: Keyloggers in computer labs Brad Judy (Feb 07)
Re: Incident Response / Investigations / Digital Forensics strategy Brad Judy (Mar 07)

Brad Miller

Re: Other software like Google Desktop V.3 Brad Miller (Feb 15)
Re: Security Incident Handling Procedure Brad Miller (Mar 23)
Re: Security Incident Handling Procedure Brad Miller (Mar 24)

Brawner, David

Re: Jan 10 is the Microsoft stated release date for a WMF page -- was : what is your advice to your users Brawner, David (Jan 03)

Brenda B Gombosky

Email for Life? Brenda B Gombosky (Mar 29)

Bret R Blackman

IdM Suites Bret R Blackman (Mar 23)
Vulnerability scan systems Bret R Blackman (Jan 16)

Brian Baas

Re: Hard Disk Encryption Software Brian Baas (Jan 18)

Brian K . Doré

Re: Email for Life? Brian K . Doré (Mar 29)
Re: Email for Life? Brian K . Doré (Mar 29)

Brian Wheeler

Re: Hard Drive Disposal Brian Wheeler (Feb 06)

Bristol, Gary L.

Re: Login Banners Bristol, Gary L. (Mar 27)

Bruce Maas

Re: Do you have a CIO? Bruce Maas (Jan 05)

Buz Dale

Re: Digital Forensics Professional Services Costs was Use of Digital Forensics Professional Services Buz Dale (Mar 08)
Re: SSN Conversion Buz Dale (Mar 22)

Cal Frye

Re: Blocking Proxy/HTTP Tunneliing servers Cal Frye (Feb 06)
Re: A Few Items to Note About Upcoming Higher Ed IT Security Conference (Security 2006) Cal Frye (Mar 20)
Re: Public Machine Access Cal Frye (Jan 23)
Re: URL switching in e-mails Cal Frye (Jan 04)
Re: Locally Administered servers Cal Frye (Mar 13)
Re: Query on content filtering Cal Frye (Jan 31)
Re: Public Machine Access Cal Frye (Jan 23)

Cam Beasley

REMINDER -- SANS@UT-Austin Early-bird Registration [SEC-505] Cam Beasley (Mar 01)
OPEN NOW -- SANS@UT-Austin Early-bird Registration [SEC-505] Cam Beasley (Jan 26)
UT-Austin Telecommunications/Networking: Two position opportunities Cam Beasley (Mar 25)

Cary, Kim

Re: Implementing a Public Key Infrastructure Cary, Kim (Feb 20)
Can we automate some cleansing of this list?, was-Info relating to PKI Cary, Kim (Feb 16)

Ced Bennett

New "Risk Assessment Outline" now available -- seeking campus examples Ced Bennett (Jan 09)

Chad McDonald

Re: Query on content filtering Chad McDonald (Jan 31)
CISO or CSO reporting Chad McDonald (Mar 20)
Re: NCAA SSL active Friday 1/27/06 Chad McDonald (Jan 30)
FW: 2005 FBI Computer Crime Study Chad McDonald (Jan 19)
Re: Hard Disk Encryption Software Chad McDonald (Jan 18)
NCAA ?! Chad McDonald (Jan 24)
Re: Spamming of BLOGs Chad McDonald (Mar 29)
Re: Vulnerability scan systems Chad McDonald (Jan 16)
2005 FBI Computer Crime Study Chad McDonald (Jan 19)
NCAA SSL active Friday 1/27/06 Chad McDonald (Jan 26)
Re: question on nessus license Chad McDonald (Jan 07)
SSN Conversion Chad McDonald (Mar 22)

Charles R. Morrow-Jones

Re: Bare Social Social Security Numbers Charles R. Morrow-Jones (Mar 27)
Re: Login Banners Charles R. Morrow-Jones (Mar 27)

Charles Schaff

Please remove My Name from Security List Serve Charles Schaff (Feb 17)

charlie derr

Re: SANS Post about EDU vulnerability scanning assignment charlie derr (Feb 28)

Charlie Prothero

Re: DNS Hosting Charlie Prothero (Mar 07)
Re: Anti-Virus Change/Eval Charlie Prothero (Jan 30)
Re: LanSchool Monitoring Software Charlie Prothero (Jan 11)

Chris Bennett

Re: Do you have a CIO? Chris Bennett (Jan 06)
Re: IP Security Cameras Chris Bennett (Mar 22)

Chris Fontaine

Re: Firewall Products Chris Fontaine (Feb 09)

Chris Green

Re: Risks of RPC over HTTP Chris Green (Feb 15)
Use of Digital Forensics Professional Services Chris Green (Feb 13)
Re: Digital Forensics Professional Services Costs was Use of Digital Forensics Professional Services Chris Green (Mar 07)
Hard Drive Disposal Chris Green (Feb 06)

Chris Harrington

Re: what is your advice to your users Chris Harrington (Jan 02)
Re: BlackWorm Addendum Chris Harrington (Jan 24)

Christian Wilson

Re: Firewall Strategies Christian Wilson (Feb 06)

Christopher Chow

Re: Blocking Proxy/HTTP Tunneliing servers Christopher Chow (Feb 06)

Christopher E. Cramer

Re: NCAA ?! Christopher E. Cramer (Jan 24)
Re: FW: Server-Gateway Cryptography SSL Certificates....are they needed? Christopher E. Cramer (Feb 23)
Re: NCAA SSL active Friday 1/27/06 Christopher E. Cramer (Jan 30)
Re: Bare Social Social Security Numbers Christopher E. Cramer (Mar 27)

Christopher Misra

NERCOMP - SANS Security Essentials - June 5 - 10 Christopher Misra (Mar 29)
Re: Network Device Registration Christopher Misra (Jan 23)

C. Lazarus

Re: Do you have a CIO? C. Lazarus (Jan 06)

clementz.7

Re: Keyloggers in computer labs clementz.7 (Feb 07)

Conor McGrath

Re: Login Banners Conor McGrath (Mar 27)

Craig Blaha

Policy - protecting research data Craig Blaha (Jan 10)
Re: Policy - protecting research data Craig Blaha (Jan 11)

Crenshaw, Adrian D

Re: Strange message Crenshaw, Adrian D (Mar 16)

Daniel J. Cody

Re: Spamming of BLOGs Daniel J. Cody (Mar 29)

Dan Roberts

Application security / penetration testing vendor search Dan Roberts (Jan 19)

Daren Kinser

Re: Firewall Products Daren Kinser (Feb 09)

Darlene Quackenbush

Re: Security Incident Handling Procedure Darlene Quackenbush (Mar 23)

Dave Huth

IPS vulnerable to Spoofing Dave Huth (Feb 16)

Dave Koontz

Re: Keyloggers in computer labs Dave Koontz (Feb 07)
Re: Email account management for alumni Dave Koontz (Jan 26)
Re: Firewall Strategies Dave Koontz (Feb 04)
Re: Email account management for alumni Dave Koontz (Jan 25)

David Etherton

Re: Do you have a CIO? David Etherton (Jan 05)

David Gillett

Re: 2005 FBI Computer Crime Study David Gillett (Jan 19)
Re: Firewall Products David Gillett (Feb 03)
Re: Background Checks David Gillett (Feb 21)
Re: URL switching in e-mails David Gillett (Jan 03)
Re: Storing encryption strings - best practice? David Gillett (Mar 07)
Re: Example of WMF Exploit SPAM Targetting Schools? David Gillett (Jan 10)

David Grisham

Campus verses university hospital ACUP investigation authority David Grisham (Jan 31)

David LaPorte

WMF patch released David LaPorte (Jan 05)
Re: FW: Server-Gateway Cryptography SSL Certificates....are they needed? David LaPorte (Feb 23)

David Lundy

Re: Email for Life? David Lundy (Mar 29)
Re: Network Access Control David Lundy (Feb 23)
Solaris 10 Hardening Guidelines David Lundy (Mar 13)
Re: Locally Administered servers David Lundy (Mar 13)

David Millar

Network Access Control David Millar (Feb 23)

David P. Allen

Re: Blocking Proxy/HTTP Tunneliing servers David P. Allen (Feb 09)

David Taylor

Re: what is your advice to your users David Taylor (Jan 05)

Dick Jacobson

Re: Implementing a Public Key Infrastructure Dick Jacobson (Feb 15)

Donald J Westlight

Re: Physical Location Security of IT Staff Donald J Westlight (Feb 08)

Don Murdoch

Info relating to PKI Don Murdoch (Feb 15)
Query on content filtering Don Murdoch (Jan 31)

Doug Pearson

Re: WMF patch released Doug Pearson (Jan 05)

Drake, Craig

Re: what is your advice to your users Drake, Craig (Jan 04)
Re: Keyloggers in computer labs Drake, Craig (Feb 07)
Re: Keyloggers in computer labs Drake, Craig (Feb 07)

Drews, Jane E

Re: Login Banners Drews, Jane E (Mar 27)

Eric Brewer

Re: Implementing a Public Key Infrastructure Eric Brewer (Feb 20)
Re: Jan 10 is the Microsoft stated release date for a WMF page -- was : what is your advi Eric Brewer (Jan 03)

Falcon, Patricia

Tools for creating online training materials Falcon, Patricia (Mar 03)

Flagg, Martin D.

Firewall Products Flagg, Martin D. (Feb 03)
DNS records question Flagg, Martin D. (Mar 24)
Public Machine Access Flagg, Martin D. (Jan 23)
Re: what is your advice to your users Flagg, Martin D. (Jan 04)
Re: DNS records question Flagg, Martin D. (Mar 24)
Re: Exchange Server Virus Scanning Flagg, Martin D. (Feb 17)
NAT for Outside servers Flagg, Martin D. (Jan 26)
Re: what is your advice to your users Flagg, Martin D. (Jan 04)
Off topic-Phones, voice over IP Flagg, Martin D. (Jan 18)
Re: NAT for Outside servers Flagg, Martin D. (Jan 26)
Re: Public Machine Access Flagg, Martin D. (Jan 23)

Fox, Danny D.

Satellite phone Fox, Danny D. (Mar 17)

Franklin, Elliott

Re: Network Device Registration Franklin, Elliott (Jan 23)
Re: CISO or CSO reporting Franklin, Elliott (Mar 20)

Frank T. Shylkofski

Re: Anti-Virus Change/Eval Frank T. Shylkofski (Feb 02)

Fretz, Kerry

Re: Exchange Server Virus Scanning Fretz, Kerry (Feb 16)

Gaddis, Jeremy L.

LanSchool Monitoring Software Gaddis, Jeremy L. (Jan 10)
Re: what is your advice to your users Gaddis, Jeremy L. (Jan 04)
Re: Silently unregistering shimgvw.dll via startup script Gaddis, Jeremy L. (Jan 04)

Garcia, Gisela A

Securing data transfers from mainframe to dept servers Garcia, Gisela A (Mar 23)
PGP Garcia, Gisela A (Jan 19)

Gary Dobbins

Re: Firewall Products Gary Dobbins (Feb 03)
Re: Digital Forensics Professional Services Costs was Use of Digital Forensics Professional Services Gary Dobbins (Mar 07)
Re: web browser security zones Gary Dobbins (Jan 11)
Position opportunity - InfoSec professional Gary Dobbins (Mar 02)

Gary Flynn

Re: Digital Forensics Professional Services Costs was Use of Digital Forensics Professional Services Gary Flynn (Mar 08)
Re: PAT address user identification: methods? Gary Flynn (Jan 27)
Re: Keyloggers in computer labs Gary Flynn (Feb 07)
Re: Jan 10 is the Microsoft stated release date for a WMF page -- was : what is your advice to your users Gary Flynn (Jan 03)
Re: Email account management for alumni Gary Flynn (Jan 25)
Re: SANS Post about EDU vulnerability scanning assignment Gary Flynn (Mar 02)
Re: Physical Location Security of IT Staff Gary Flynn (Feb 08)
Re: Bare Social Social Security Numbers Gary Flynn (Mar 28)
Re: Blocking Proxy/HTTP Tunneliing servers Gary Flynn (Feb 06)
Re: Locally Administered servers Gary Flynn (Mar 14)
Re: Network Device Registration Gary Flynn (Jan 23)
Re: Tools for creating online training materials Gary Flynn (Mar 03)
Re: web browser security zones Gary Flynn (Jan 11)
Re: Email for Life? Gary Flynn (Mar 30)
Re: Risks of RPC over HTTP Gary Flynn (Feb 15)
Re: what is your advice to your users Gary Flynn (Jan 02)
Re: SSN Conversion Gary Flynn (Mar 22)
Re: Keyloggers in computer labs Gary Flynn (Feb 07)
Re: Public Machine Access Gary Flynn (Jan 23)
Re: web browser security zones Gary Flynn (Jan 11)
Re: Example of WMF Exploit SPAM Targetting Schools? Gary Flynn (Jan 05)
Email account management for alumni Gary Flynn (Jan 25)
SANS Post about EDU vulnerability scanning assignment Gary Flynn (Feb 28)
Re: Firewall Strategies Gary Flynn (Feb 03)
Example of WMF Exploit SPAM Targetting Schools? Gary Flynn (Jan 05)
Re: what is your advice to your users Gary Flynn (Jan 04)

Gary Golomb

Re: Bare Social Social Security Numbers Gary Golomb (Mar 27)
Re: Use of Digital Forensics Professional Services Gary Golomb (Feb 13)

Geoff Nathan

Guest Access in a CMS Geoff Nathan (Feb 20)
Re: Policy - protecting research data Geoff Nathan (Jan 10)
Re: Email account management for alumni Geoff Nathan (Jan 26)

Geoffrey S. Nathan

Re: Security Incident Handling Procedure Geoffrey S. Nathan (Mar 24)
Bare Social Social Security Numbers Geoffrey S. Nathan (Mar 27)
Re: Bare Social Social Security Numbers--thanks Geoffrey S. Nathan (Mar 30)
Re: Login Banners Geoffrey S. Nathan (Mar 28)

George Bailey

Re: Blocking Proxy/HTTP Tunneliing servers George Bailey (Feb 07)
Doctoral Student Request for Assistance George Bailey (Feb 20)

George Russ

Re: IP Security Cameras George Russ (Mar 28)
Re: IP Security Cameras George Russ (Mar 28)

Georgia T. Killcrece

Re: Security Incident Handling Procedure Georgia T. Killcrece (Mar 24)

Gibbs, Aaron M.

IP Security Cameras Gibbs, Aaron M. (Mar 21)
Re: Query on content filtering Gibbs, Aaron M. (Jan 31)
Re: IP Security Cameras Gibbs, Aaron M. (Mar 22)
Re: Paypal Accounts for Student Activities Gibbs, Aaron M. (Jan 10)
Re: FW: Server-Gateway Cryptography SSL Certificates....are they needed? Gibbs, Aaron M. (Feb 23)

Glenn Forbes Fleming Larratt

Re: Security Incident Handling Procedure Glenn Forbes Fleming Larratt (Mar 24)
Re: Security Incident Handling Procedure Glenn Forbes Fleming Larratt (Mar 24)

Graham Toal

Re: Exchange Server Virus Scanning Graham Toal (Feb 17)
Re: Exchange Server Virus Scanning Graham Toal (Feb 17)
Re: Blocking Proxy/HTTP Tunneliing servers Graham Toal (Feb 07)
Re: Blocking Proxy/HTTP Tunneliing servers Graham Toal (Feb 06)
Re: Blocking Proxy/HTTP Tunneliing servers Graham Toal (Feb 06)
Re: DNS Hosting Graham Toal (Mar 07)
Re: DNS Hosting Graham Toal (Mar 07)
Re: Guest Access in a CMS Graham Toal (Feb 20)
Re: Strange message Graham Toal (Mar 16)
Re: Keyloggers in computer labs Graham Toal (Feb 07)
Re: Exchange Server Virus Scanning Graham Toal (Feb 17)
Re: Storing encryption strings - best practice? Graham Toal (Mar 07)
Re: Keyloggers in computer labs Graham Toal (Feb 07)
Re: Keyloggers in computer labs Graham Toal (Feb 07)
Re: Blocking Proxy/HTTP Tunneliing servers Graham Toal (Feb 06)
Re: Exchange Server Virus Scanning Graham Toal (Feb 17)
Re: SSN Conversion Graham Toal (Mar 22)
Re: Spamming of BLOGs Graham Toal (Mar 29)
Re: Exchange Server Virus Scanning Graham Toal (Feb 17)
Re: Background Checks Graham Toal (Feb 22)
Re: Exchange Server Virus Scanning Graham Toal (Feb 17)
Re: Other software like Google Desktop V.3 Graham Toal (Feb 15)
Re: PAT address user identification: methods? Graham Toal (Feb 07)
Re: FW: Server-Gateway Cryptography SSL Certificates....are they needed? Graham Toal (Feb 23)
Re: Anti-Virus Change/Eval Graham Toal (Feb 01)
Re: Security risk assessment survey for research Graham Toal (Feb 28)

GREGORY SEIBERT

Background Checks GREGORY SEIBERT (Feb 14)

Hall, Rand

Re: Exchange Server Virus Scanning Hall, Rand (Feb 17)
Re: Exchange Server Virus Scanning Hall, Rand (Feb 17)
Re: Exchange Server Virus Scanning Hall, Rand (Feb 17)

Harold Zawinsky

Re: SECURITY Digest - 6 Jan 2006 to 7 Jan 2006 (#2006-6) Harold Zawinsky (Jan 08)
question on nessus license Harold Zawinsky (Jan 07)

Hedrick, Gregory W

Re: Login Banners Hedrick, Gregory W (Mar 28)

H. Morrow Long

Re: Email for Life? H. Morrow Long (Mar 30)
Re: Bare Social Social Security Numbers H. Morrow Long (Mar 28)
Re: Bare Social Social Security Numbers H. Morrow Long (Mar 27)
Re: Example of WMF Exploit SPAM Targetting Schools? H. Morrow Long (Jan 05)
Re: Bare Social Social Security Numbers H. Morrow Long (Mar 28)
Re: NCAA ?! H. Morrow Long (Jan 24)
Re: Bare Social Social Security Numbers H. Morrow Long (Mar 27)
Jan 10 is the Microsoft stated release date for a WMF page -- was : what is your advice to your users H. Morrow Long (Jan 03)
Re: what is your advice to your users H. Morrow Long (Jan 02)
Re: Bare Social Social Security Numbers H. Morrow Long (Mar 28)

Holland, Wes

Re: Email for Life? Holland, Wes (Mar 29)

Huba Leidenfrost

Re: Solaris 10 Hardening Guidelines Huba Leidenfrost (Mar 13)
Re: Login Banners Huba Leidenfrost (Mar 27)

Hull, Dave

Re: Digital Forensics Professional Services Costs was Use of Digital Forensics Professional Services Hull, Dave (Mar 08)
Re: Digital Forensics Professional Services Costs was Use of Digital Forensics Professional Services Hull, Dave (Mar 08)

Ian McLeod

Spamming of BLOGs Ian McLeod (Mar 29)

jack suess

Re: Jan 10 is the Microsoft stated release date for a WMF page -- was : what is your advice to your users jack suess (Jan 03)
Re: Implementing a Public Key Infrastructure jack suess (Feb 15)

James Cooley

Re: Keyloggers in computer labs James Cooley (Feb 06)

James H Moore

Risks of RPC over HTTP James H Moore (Feb 15)
Incident Response / Investigations / Digital Forensics strategy James H Moore (Mar 07)
Re: Satellite phone James H Moore (Mar 17)
Re: Incident Response Plans - Quick informal survey James H Moore (Jan 18)
FW: RIT INFORMATION SECURITY ADVISORY - Nyxem/Blackmal/MyWife/Kama Sutra worm programmed to delete files on Windows PCs on Feb. 3 James H Moore (Jan 30)
Re: FW: RIT INFORMATION SECURITY ADVISORY - Nyxem/Blackmal/MyWife/Kama Sutra worm programmed to delete files on Windows PCs on Feb. 3 James H Moore (Jan 30)
Digital Forensics Professional Services Costs was Use of Digital Forensics Professional Services James H Moore (Mar 06)

James Meyers

Firewall Strategies James Meyers (Feb 03)

Jeff Giacobbe

Re: Hard Disk Encryption Software Jeff Giacobbe (Jan 18)

Jeff Kell

Re: NAT for Outside servers Jeff Kell (Jan 26)
Re: Risks of RPC over HTTP Jeff Kell (Feb 15)

Jeffrey I. Schiller

Re: Email for Life? Jeffrey I. Schiller (Mar 29)

Jeni Li

Re: Blocking Proxy/HTTP Tunneliing servers Jeni Li (Feb 07)
Re: Legal Document Management Software Jeni Li (Jan 27)
Re: SANS Post about EDU vulnerability scanning assignment Jeni Li (Feb 28)
Re: SANS Post about EDU vulnerability scanning assignment Jeni Li (Feb 28)
Re: what is your advice to your users Jeni Li (Jan 04)
Re: IP Security Cameras Jeni Li (Mar 23)
Re: WMF patch released Jeni Li (Jan 05)

Jeremy Hansen at 065

Re: Storing encryption strings - best practice? Jeremy Hansen at 065 (Mar 07)

Jeremy Mooney

Re: Exchange Server Virus Scanning Jeremy Mooney (Feb 17)
Re: Guest Access in a CMS Jeremy Mooney (Feb 20)

Jere Retzer

Re: Bare Social Social Security Numbers Jere Retzer (Mar 28)

Jimmy Kuo

Re: Email for Life? Jimmy Kuo (Mar 29)

Jimmy L. Fikes

Re: Do you have a CIO? Jimmy L. Fikes (Jan 06)
Strange message Jimmy L. Fikes (Mar 16)

Jim Rizzo

Re: McAfee issues? Jim Rizzo (Mar 20)

Jim Schug

Do you have a CIO? Jim Schug (Jan 05)
Re: what is your advice to your users Jim Schug (Jan 04)
Re: Do you have a CIO? Jim Schug (Jan 05)

Joel Rosenblatt

Re: Storing encryption strings - best practice? Joel Rosenblatt (Mar 07)
Re: Bare Social Social Security Numbers Joel Rosenblatt (Mar 27)
Re: DNS records question Joel Rosenblatt (Mar 24)
Re: URL switching in e-mails Joel Rosenblatt (Jan 03)
Re: Physical Location Security of IT Staff Joel Rosenblatt (Feb 08)
Re: Blocking Proxy/HTTP Tunneliing servers Joel Rosenblatt (Feb 06)
Re: Email for Life? Joel Rosenblatt (Mar 30)
Re: Network Device Registration Joel Rosenblatt (Jan 23)
Re: Public Machine Access Joel Rosenblatt (Jan 23)

Joe St Sauver

Re: Anti-Virus Change/Eval Joe St Sauver (Jan 30)
Re: Implementing a Public Key Infrastructure Joe St Sauver (Feb 16)

John

Re: IP Security Cameras John (Mar 22)

John Bambenek

Re: SANS Post about EDU vulnerability scanning assignment John Bambenek (Mar 02)

John B. Chambers

short computer security survey (ymmv) John B. Chambers (Mar 14)

John Kemp

Re: IPS vulnerable to Spoofing John Kemp (Feb 16)

John Kowalczyk

Re: IP Security Cameras John Kowalczyk (Mar 22)

John Ladwig

Re: PAT address user identification: methods? John Ladwig (Jan 26)

John Lupton

SANS@Penn: Security 401 - SANS Security Essentials w/ Bootcamp, June 19-24, 2006 John Lupton (Feb 23)

John Nunnally

Re: Blocking Proxy/HTTP Tunneliing servers John Nunnally (Feb 06)
Re: Blocking Proxy/HTTP Tunneliing servers John Nunnally (Feb 06)
Re: Digital Forensics Professional Services Costs was Use of Digital Forensics Professional Services John Nunnally (Mar 07)

John Stauffacher

Re: what is your advice to your users John Stauffacher (Jan 04)
Re: Blocking Proxy/HTTP Tunneliing servers John Stauffacher (Feb 06)

Jones, Gary

Re: Fwd: ATTN: McAfee DAT 4715 problem - deleting .exe files Jones, Gary (Mar 12)
Re: IP Security Cameras Jones, Gary (Mar 22)
Re: IP Security Cameras Jones, Gary (Mar 23)

Justin Dover

Blocking Proxy/HTTP Tunneling servers Justin Dover (Feb 06)
Blocking Proxy/HTTP Tunneliing servers Justin Dover (Feb 06)
Re: Blocking Proxy/HTTP Tunneliing servers Justin Dover (Feb 07)
Re: Blocking Proxy/HTTP Tunneliing servers Justin Dover (Feb 06)
Re: Blocking Proxy/HTTP Tunneliing servers Justin Dover (Feb 06)
Re: Firewall Products Justin Dover (Feb 03)
Re: Blocking Proxy/HTTP Tunneliing servers Justin Dover (Feb 06)

Justin Sipher

Re: URL switching in e-mails Justin Sipher (Jan 03)
URL switching in e-mails Justin Sipher (Jan 03)

Karen Eft

Re: Policy - protecting research data Karen Eft (Jan 11)

Kay Sommers

Keyloggers in computer labs Kay Sommers (Feb 06)

Kees Leune

Re: Hard Disk Encryption Software Kees Leune (Jan 19)
Re: Incident Tracking System Kees Leune (Jan 18)

Keith Schoenefeld

Re: Bare Social Social Security Numbers Keith Schoenefeld (Mar 28)
Re: Email for Life? Keith Schoenefeld (Mar 29)
Re: McAfee issues? Keith Schoenefeld (Mar 20)
Re: Bare Social Social Security Numbers Keith Schoenefeld (Mar 28)
Re: what is your advice to your users Keith Schoenefeld (Jan 04)

Ken Connelly

Re: Bare Social Social Security Numbers Ken Connelly (Mar 27)
Re: what is your advice to your users Ken Connelly (Jan 03)
Re: Blocking Proxy/HTTP Tunneliing servers Ken Connelly (Feb 06)
Re: WMF patch released Ken Connelly (Jan 05)
Re: URL switching in e-mails Ken Connelly (Jan 03)
Re: Email for Life? Ken Connelly (Mar 29)
Re: what is your advice to your users Ken Connelly (Jan 02)
Re: what is your advice to your users Ken Connelly (Jan 04)

Kenneth G. Arnold

Re: Locally Administered servers Kenneth G. Arnold (Mar 13)
Re: Network Device Registration Kenneth G. Arnold (Jan 23)

Kevin Shalla

Re: Bare Social Social Security Numbers Kevin Shalla (Mar 28)
Re: IP Security Cameras Kevin Shalla (Mar 23)
web browser security zones Kevin Shalla (Jan 11)
Re: Email account management for alumni Kevin Shalla (Jan 27)
Re: NCAA ?! Kevin Shalla (Jan 24)

Kubb, Rick

Re: Network Device Registration Kubb, Rick (Jan 23)

Lee Weers

Re: Network Device Registration Lee Weers (Jan 23)
Re: Firewall Products Lee Weers (Feb 03)

Leigh Cheek

Re: Security risk assessment survey for research Leigh Cheek (Mar 01)

Leo Tran

HIPAA compliant Webcam application Leo Tran (Jan 02)
Re: Bare Social Social Security Numbers Leo Tran (Mar 27)
Locally Administered servers Leo Tran (Mar 13)

Les LaCroix

Re: Keyloggers in computer labs Les LaCroix (Feb 07)

Leslie Maltz

what is your advice to your users Leslie Maltz (Jan 02)

lists educ

Re: Security Incident Handling Procedure lists educ (Mar 23)

Louise O'Sullivan

Autoreply: Digital Forensics Professional Services Costs was [SECURITY] Use of Digital Forensics Professional Services Louise O'Sullivan (Mar 06)
Autoreply: Re: Background Checks Louise O'Sullivan (Feb 22)
Autoreply: Re: Exchange Server Virus Scanning Louise O'Sullivan (Feb 17)
Autoreply: Vulnerability scan systems Louise O'Sullivan (Jan 16)
Autoreply: SANS/U.Va. Windows Security Training Opportunity – June 25-30, 2006 Louise O'Sullivan (Feb 28)

Lucas, Bryan

Re: Keyloggers in computer labs Lucas, Bryan (Feb 06)
Re: Email for Life? Lucas, Bryan (Mar 29)
Re: Exchange Server Virus Scanning Lucas, Bryan (Feb 16)

Manuel Amaral

NERCOMP - SANS Security Essentials - June 5 - 10 Manuel Amaral (Jan 06)

Marcinkevicz, Mike

Re: SECURITY Digest - 6 Jan 2006 to 7 Jan 2006 (#2006-6) Marcinkevicz, Mike (Jan 07)

Mark Bauer

Re: Firewall Strategies Mark Bauer (Feb 04)

Mark Newman

Re: FW: Server-Gateway Cryptography SSL Certificates....are they needed? Mark Newman (Feb 24)

Mark Rogowski

Re: Public Machine Access Mark Rogowski (Jan 23)
Re: Public Machine Access Mark Rogowski (Jan 23)
Re: Public Machine Access Mark Rogowski (Jan 23)
Re: Public Machine Access Mark Rogowski (Jan 23)

Mark Wilson

Fwd: ATTN: McAfee DAT 4715 problem - deleting .exe files Mark Wilson (Mar 11)
Anti-Virus Change/Eval Mark Wilson (Jan 30)
Re: Fwd: ATTN: McAfee DAT 4715 problem - deleting .exe files Mark Wilson (Mar 11)
Re: Anti-Virus Change/Eval Mark Wilson (Feb 01)
McAfee issues? Mark Wilson (Mar 20)

Mary Ann Blair

Re: CISO or CSO reporting Mary Ann Blair (Mar 20)

Melissa Guenther

Re: Security Incident Handling Procedure Melissa Guenther (Mar 23)

Mercer, Susan

Storing encryption strings - best practice? Mercer, Susan (Mar 07)
FW: Server-Gateway Cryptography SSL Certificates....are they needed? Mercer, Susan (Feb 23)

Michael Cole

Re: Network Device Registration Michael Cole (Jan 23)

Michael_Maloney

Re: Exchange Server Virus Scanning Michael_Maloney (Feb 17)
Re: Hard Drive Disposal Michael_Maloney (Feb 08)

Michael Sinatra

Re: SANS Post about EDU vulnerability scanning assignment Michael Sinatra (Mar 01)

Mike Hanson

Hard Disk Encryption Mike Hanson (Mar 29)
Hard Disk Encryption Software Mike Hanson (Jan 18)

Mike Iglesias

Re: what is your advice to your users Mike Iglesias (Jan 03)

Moore, Francis

Re: Do you have a CIO? Moore, Francis (Jan 06)

Neil_Sachnoff

Re: Hard Disk Encryption Software Neil_Sachnoff (Jan 19)
Re: Off topic-Phones, voice over IP Neil_Sachnoff (Jan 18)

O'Callaghan, Daniel

Re: Blocking Proxy/HTTP Tunneliing servers O'Callaghan, Daniel (Feb 06)

Penn, Blake

Re: Vulnerability scan systems Penn, Blake (Jan 17)
Re: Hard Drive Disposal Penn, Blake (Feb 08)

Perry, Jeff

Legal Document Management Software Perry, Jeff (Jan 27)

Peter Wan

Re: Email for Life? Peter Wan (Mar 30)

Phil Rodrigues

Software Firewalls for Windows? Phil Rodrigues (Jan 31)

Pullman, Nick

Re: Implementing a Public Key Infrastructure Pullman, Nick (Feb 16)
Re: Bare Social Social Security Numbers Pullman, Nick (Mar 28)

Ramon Hermida

Re: Security risk assessment survey for research Ramon Hermida (Mar 01)

Randy Grimshaw

Re: Tools for creating online training materials Randy Grimshaw (Mar 03)

Randy Marchany

Re: SANS Post about EDU vulnerability scanning assignment Randy Marchany (Mar 03)
Re: Solaris 10 Hardening Guidelines Randy Marchany (Mar 13)
Re: SANS-EDU Training at VA Tech, March 6-11,2006 Randy Marchany (Jan 05)
Re: SANS Post about EDU vulnerability scanning assignment Randy Marchany (Mar 02)
Re: Email for Life? Randy Marchany (Mar 30)

Raw, Randy

Re: SECURITY 508: System Forensics,Investigation and Response class Raw, Randy (Jan 17)
Re: OT: Registration deadline Tuesday for Forensics Course Raw, Randy (Feb 24)
Forensics class is made!!!!! Raw, Randy (Feb 28)
OT: Registration deadline Tuesday for Forensics Course Raw, Randy (Feb 24)
SECURITY 508: System Forensics,Investigation and Response class Raw, Randy (Jan 17)
$1000 Forensics training - registration deadline approaching soon! Raw, Randy (Feb 14)

Ricardo Lafosse

Implementing a Public Key Infrastructure Ricardo Lafosse (Feb 14)

Richard Hopkins

Re: Firewall Strategies Richard Hopkins (Feb 10)
Re: Login Banners Richard Hopkins (Mar 28)

RLVaughn

Possible BlackWorm DDay February 3rd RLVaughn (Jan 24)
BlackWorm Addendum RLVaughn (Jan 24)

Rob Whalen

Re: IdM Suites Rob Whalen (Mar 24)
Re: Email for Life? Rob Whalen (Mar 31)

Rodney Petersen

Establishing Program Committee for Security 2007 Rodney Petersen (Mar 21)
Re: A Few Items to Note About Upcoming Higher Ed IT Security Conference (Security 2006) Rodney Petersen (Mar 21)
Re: Login Banners Rodney Petersen (Mar 28)
A Few Items to Note About Upcoming Higher Ed IT Security Conference (Security 2006) Rodney Petersen (Mar 16)
Re: Do you have a CIO? Rodney Petersen (Jan 06)
Re: CISO or CSO reporting Rodney Petersen (Mar 21)
Tune In Mar. 23: Cornell's Steve Schuster on Network Quarantines Rodney Petersen (Mar 17)

Ronnie Jefferson

Re: Do you have a CIO? Ronnie Jefferson (Jan 05)
Re: Security Conference: FBI's Larkin and ISSA's Hoy Top the Program Ronnie Jefferson (Feb 25)

Rose, Ryan

RFP for video surveillance Rose, Ryan (Jan 31)

Roy Hatcher

Re: DNS records question Roy Hatcher (Mar 24)

Russell Fulton

Re: Example of WMF Exploit SPAM Targetting Schools? Russell Fulton (Jan 09)

Sadler, Connie

Re: WMF patch released Sadler, Connie (Jan 05)
Dynamic Forms - Security Feedback?? Sadler, Connie (Feb 06)
Re: what is your advice to your users Sadler, Connie (Jan 02)
Security Conference: FBI's Larkin and ISSA's Hoy Top the Program Sadler, Connie (Feb 23)
Nuesoft's Medicat System Sadler, Connie (Mar 03)
Paypal Accounts for Student Activities Sadler, Connie (Jan 10)
Login Banners Sadler, Connie (Mar 27)

Samuel Liles

Re: Satellite phone Samuel Liles (Mar 17)

Sarah Stevens

Re: Strange message Sarah Stevens (Mar 16)
Re: Application security / penetration testing vendor search Sarah Stevens (Jan 23)
Re: HIPAA compliant Webcam application Sarah Stevens (Jan 02)

Scholz, Greg

Re: Network Access Control Scholz, Greg (Feb 24)
Re: Firewall Products Scholz, Greg (Feb 03)
Re: Do you have a CIO? Scholz, Greg (Jan 05)
Re: Blocking Proxy/HTTP Tunneling servers Scholz, Greg (Feb 06)

Scott Conti

Re: Use of Digital Forensics Professional Services Scott Conti (Feb 14)

scott hollatz

Re: Email for Life? scott hollatz (Mar 29)
Re: Email for Life? scott hollatz (Mar 30)
Re: Bare Social Social Security Numbers scott hollatz (Mar 27)
Re: Bare Social Social Security Numbers scott hollatz (Mar 28)

Sherry Callahan

Re: Login Banners Sherry Callahan (Mar 27)
Re: OT: Registration deadline Tuesday for Forensics Course Sherry Callahan (Feb 24)
Re: SECURITY 508: System Forensics,Investigation and Response class Sherry Callahan (Jan 17)

Shirley Payne

SANS/U.Va. Windows Security Training Opportunity – June 25-30, 2006 Shirley Payne (Feb 28)
Registration Now Open for University of Virginia and SANS Windows Security Course on June 25-30, 2006 Shirley Payne (Mar 20)

Smith, Dena

Physical Location Security of IT Staff Smith, Dena (Feb 08)

stanislav shalunov

Re: Keyloggers in computer labs stanislav shalunov (Feb 06)

St Clair, Jim

Re: Implementing a Public Key Infrastructure St Clair, Jim (Feb 16)

Steve Brukbacher

Brepibot and variants Steve Brukbacher (Jan 30)
FFIEC two-factor guidelines Steve Brukbacher (Feb 20)
Re: Implementing a Public Key Infrastructure Steve Brukbacher (Feb 16)
Re: IP Security Cameras Steve Brukbacher (Mar 22)

Steve Devoti

Re: Implementing a Public Key Infrastructure Steve Devoti (Feb 14)

Steve Werby

Re: IP Security Cameras Steve Werby (Mar 22)

Steve Worona

Re: Bare Social Social Security Numbers Steve Worona (Mar 27)
Re: Jan 10 is the Microsoft stated release date for a WMF page -- was : what is your advice to your users Steve Worona (Jan 03)
Re: Implementing a Public Key Infrastructure Steve Worona (Feb 16)

Stewart, Ian

Re: Network Device Registration Stewart, Ian (Jan 23)

Syrigos, Panagis

Re: Keyloggers in computer labs Syrigos, Panagis (Feb 07)

T. Charles Yun

Re: 0-day Windows Metafile Defect Being Exploited T. Charles Yun (Jan 02)

Ted Frohling - SIRT

Re: CISO or CSO reporting Ted Frohling - SIRT (Mar 20)

Theodore Pham

Re: WMF patch released Theodore Pham (Jan 05)

Theresa M Rowe

Re: IP Security Cameras Theresa M Rowe (Mar 23)
Re: Implementing a Public Key Infrastructure Theresa M Rowe (Feb 16)
Re: Off topic-Phones, voice over IP Theresa M Rowe (Jan 18)

Theresa Semmens

VoIP security experts? Theresa Semmens (Mar 21)
Re: Public Machine Access Theresa Semmens (Jan 23)
Re: Other software like Google Desktop V.3 Theresa Semmens (Feb 15)
Other software like Google Desktop V.3 Theresa Semmens (Feb 15)

Thomas R. Davis

Re: Bare Social Social Security Numbers Thomas R. Davis (Mar 27)
Re: Locally Administered servers Thomas R. Davis (Mar 14)
Re: Hard Drive Disposal Thomas R. Davis (Feb 08)

Tim Howard

Re: Do you have a CIO? Tim Howard (Jan 05)
Re: Campus verses university hospital ACUP investigation authority Tim Howard (Jan 31)

Tim Lane

Security Incident Handling Procedure Tim Lane (Mar 23)

Tim Rhoades

Exchange Server Virus Scanning Tim Rhoades (Feb 16)
Re: Exchange Server Virus Scanning Tim Rhoades (Feb 17)

Todd Kisida

Re: what is your advice to your users Todd Kisida (Jan 03)
Re: WMF patch released Todd Kisida (Jan 05)
Re: what is your advice to your users Todd Kisida (Jan 04)
Re: what is your advice to your users Todd Kisida (Jan 02)
Re: what is your advice to your users Todd Kisida (Jan 04)

Tom Neiss

MS update today Tom Neiss (Jan 05)

Tracy Beth Mitrano

Re: Network Device Registration Tracy Beth Mitrano (Jan 23)

Tracy Mitrano

Fwd: UCPL and co-sponsors host Pamela Samuelson on 3/27 Tracy Mitrano (Mar 21)
Re: Query on content filtering Tracy Mitrano (Jan 31)
Diana Oblinger on UCPL Stream Tracy Mitrano (Feb 28)

Tran , Lieu D

Re: Blocking Proxy/HTTP Tunneliing servers Tran , Lieu D (Feb 07)

Tristan RHODES

Re: PAT address user identification: methods? Tristan RHODES (Jan 27)
Re: Hard Drive Disposal Tristan RHODES (Feb 06)

Tsao, Johnny

Vendor evaluation scorecard Tsao, Johnny (Jan 27)

Valdis Kletnieks

Re: Public Machine Access Valdis Kletnieks (Jan 23)
Re: Blocking Proxy/HTTP Tunneliing servers Valdis Kletnieks (Feb 06)
Re: $1000 Forensics training - registration deadline approaching soon! Valdis Kletnieks (Feb 14)
Re: Keyloggers in computer labs Valdis Kletnieks (Feb 06)
Re: URL switching in e-mails Valdis Kletnieks (Jan 03)
Re: IPS vulnerable to Spoofing Valdis Kletnieks (Feb 17)
Re: Public Machine Access Valdis Kletnieks (Jan 23)
Re: web browser security zones Valdis Kletnieks (Jan 11)
Re: URL switching in e-mails Valdis Kletnieks (Jan 03)
Re: IP Security Cameras Valdis Kletnieks (Mar 23)
Re: Background Checks Valdis Kletnieks (Feb 21)
Re: Query on content filtering Valdis Kletnieks (Jan 31)
Re: Implementing a Public Key Infrastructure Valdis Kletnieks (Feb 20)
Re: Public Machine Access Valdis Kletnieks (Jan 23)
Re: Keyloggers in computer labs Valdis Kletnieks (Feb 07)
Re: URL switching in e-mails Valdis Kletnieks (Jan 03)
Re: IPS vulnerable to Spoofing Valdis Kletnieks (Feb 17)
Re: Implementing a Public Key Infrastructure Valdis Kletnieks (Feb 14)
Re: Background Checks Valdis Kletnieks (Feb 22)
Re: Firewall Strategies Valdis Kletnieks (Feb 06)

Valerie Vogel

SANS-EDU Training at VA Tech, March 6-11, 2006 Valerie Vogel (Feb 13)

Victoriano Casas, ISO

Re: Security risk assessment survey for research Victoriano Casas, ISO (Mar 01)
Re: Security risk assessment survey for research Victoriano Casas, ISO (Feb 28)
Security risk assessment survey for research Victoriano Casas, ISO (Feb 21)

Waller, Michael A. (HSC)

Re: Digital Forensics Professional Services Costs was Use of Digital Forensics Professional Services Waller, Michael A. (HSC) (Mar 07)
Re: Implementing a Public Key Infrastructure Waller, Michael A. (HSC) (Feb 15)
Re: Locally Administered servers Waller, Michael A. (HSC) (Mar 14)

Wehner, Paul (wehnerpl)

Re: Exchange Server Virus Scanning Wehner, Paul (wehnerpl) (Feb 16)
Re: Exchange Server Virus Scanning Wehner, Paul (wehnerpl) (Feb 17)

William Custer

Ohio HB 104 Data Exposure Notification William Custer (Jan 12)
Re: Incident Response Plans - Quick informal survey William Custer (Jan 18)

Wright, Sallie F

Re: Network Device Registration Wright, Sallie F (Jan 23)
Network Device Registration Wright, Sallie F (Jan 23)
Re: Network Device Registration Wright, Sallie F (Jan 23)

Yandro Chavez Rubio

Incident Tracking System Yandro Chavez Rubio (Jan 17)
Re: Incident Tracking System Yandro Chavez Rubio (Jan 19)

Yung Ng

Re: Fwd: ATTN: McAfee DAT 4715 problem - deleting .exe files Yung Ng (Mar 14)
Re: Fwd: ATTN: McAfee DAT 4715 problem - deleting .exe files Yung Ng (Mar 14)