Educause Security Discussion: by author
507 messages
starting Jul 14 06 and
ending Jul 14 06
Date index |
Thread index |
Author index
Alan Amesbury
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Alan Amesbury (Jul 14)
Re: Password entropy Alan Amesbury (Jul 25)
Re: New Video Educates Students on Illegal File Sharing Alan Amesbury (Aug 23)
Re: Rainbow Tables and Authentication Alternatives Alan Amesbury (Jul 18)
Re: Password Expiration Alan Amesbury (Jul 14)
Re: Help explaining why LogMeIn.com type programs are bad. Alan Amesbury (Jul 17)
Re: SSNs, rootkits, Incident Response, etc... Alan Amesbury (Jul 18)
Alex Campoe
University-Wide Risk Assessment Alex Campoe (Aug 18)
Anthony Maszeroski
Re: Rainbow Tables and Authentication Alternatives Anthony Maszeroski (Jul 11)
Barnes, Jeff
Re: hard drive destruction Barnes, Jeff (Aug 10)
Basgen, Brian
Poll: Anti-Spyware on servers Basgen, Brian (Jul 10)
Re: Password entropy Basgen, Brian (Jul 24)
Re: Security of Research Data Basgen, Brian (Sep 15)
Re: Password entropy Basgen, Brian (Jul 19)
Re: Quick show of hands Basgen, Brian (Aug 10)
Poll Results: Anti-Spyware on servers Basgen, Brian (Jul 13)
Re: Password entropy Basgen, Brian (Jul 20)
Re: Mass email handling Basgen, Brian (Jul 13)
Re: Password entropy Basgen, Brian (Jul 19)
Re: Password entropy Basgen, Brian (Jul 19)
Re: Password entropy Basgen, Brian (Jul 20)
Re: Password entropy Basgen, Brian (Jul 25)
BEN PIJOR
Re: Blackberry security expertise needed BEN PIJOR (Jul 27)
Bob Kehr
Re: Centralized security administration Bob Kehr (Aug 17)
Brad Judy
Re: Security of Research Data Brad Judy (Sep 05)
Campus threat models Brad Judy (Aug 10)
Re: University-Wide Risk Assessment Brad Judy (Aug 18)
Re: Security Awareness for Students Brad Judy (Sep 28)
Re: New Video Educates Students on Illegal File Sharing Brad Judy (Aug 22)
Brenda B Gombosky
Re: Quick show of hands Brenda B Gombosky (Aug 10)
Spam and Wireless Brenda B Gombosky (Sep 11)
Password Clipping Levels and Password Strength Brenda B Gombosky (Sep 26)
Brent Sweeny
Re: Password entropy Brent Sweeny (Jul 19)
Bret R Blackman
Outsourcing Forensics Bret R Blackman (Aug 28)
Brian Friday
Re: NAC Implementation Brian Friday (Jul 21)
Re: Illegal Downloads Brian Friday (Sep 06)
Brian Kaye
Re: Security Awareness for students Brian Kaye (Sep 26)
Brian Nichols
Re: Quick show of hands Brian Nichols (Aug 11)
Brian Reilly
Re: Web Content Change Management / Scanner Brian Reilly (Aug 03)
Brown, Scott
Re: Spam and Wireless Brown, Scott (Sep 11)
Re: Brown, Scott (Jul 24)
Bruce Curtis
Re: Firewall - Egress Policy Bruce Curtis (Sep 05)
Bruce Rights
Re: Disk Scrubbing/Secure Disk Erasure Bruce Rights (Jul 27)
Buz Dale
Re: Password entropy Buz Dale (Jul 19)
Cal Frye
Re: Firewall - Egress Policy Cal Frye (Sep 04)
Re: New Video Educates Students on Illegal File Sharing Cal Frye (Aug 23)
Re: Illegal Downloads Cal Frye (Sep 05)
Re: Centralized security administration Cal Frye (Aug 18)
Cam Beasley
Re: Product request - Enterprise whole disk encryption for laptops Cam Beasley (Jul 15)
Re: Outsourcing Forensics Cam Beasley (Aug 29)
Re: Data Classification Cam Beasley (Jul 28)
NewHome: SENF - SEnsitive Number Finder (Maitogai.270) Cam Beasley (Aug 18)
Re: Quick show of hands Cam Beasley (Aug 10)
CAROLE CARMODY
Re: Quick show of hands CAROLE CARMODY (Aug 11)
Cathy Hubbs
Re: Quick show of hands Cathy Hubbs (Aug 10)
Ced Bennett
Re: Data Classification Ced Bennett (Aug 02)
Chad McDonald, CISSP
Portal / Web Mail timeouts Chad McDonald, CISSP (Jul 20)
Re: Quick show of hands Chad McDonald, CISSP (Aug 10)
OS virtualization at the desktop Chad McDonald, CISSP (Jul 13)
Looking for consesus Chad McDonald, CISSP (Aug 03)
Charlie Prothero
Re: Product request - Enterprise whole disk encryption for laptops Charlie Prothero (Jul 18)
Re: Product request - Enterprise whole disk encryption for laptops Charlie Prothero (Jul 15)
Cheek, Leigh
Re: Account Lockout Policies Cheek, Leigh (Jul 11)
Re: University-Wide Risk Assessment Cheek, Leigh (Aug 18)
Re: Account Lockout Policies Cheek, Leigh (Jul 11)
Chris Bennett
Re: Quick show of hands Chris Bennett (Aug 10)
Chris D.i.s. Fontaine
Re: Call for Papers - 19th Annual FIRST Conference Chris D.i.s. Fontaine (Sep 22)
Chris Fontaine
Mass email handling Chris Fontaine (Jul 13)
Chris Golden
Firewall - Egress Policy Chris Golden (Sep 04)
Chris Green
Re: New Video Educates Students on Illegal File Sharing Chris Green (Aug 23)
Re: Encryption of university data Chris Green (Jul 21)
Re: Portal / Web Mail timeouts Chris Green (Jul 20)
Identity Protection Services Chris Green (Aug 15)
Re: Snort rule for IE / VML issue Chris Green (Sep 20)
Re: New Video Educates Students on Illegal File Sharing Chris Green (Aug 23)
Chris Harrington
Re: Snort rule for IE / VML issue Chris Harrington (Sep 20)
Snort rule for IE / VML issue Chris Harrington (Sep 19)
Christoffersen, Mark John
Change Management Christoffersen, Mark John (Aug 03)
Christopher E. Cramer
Re: Quick show of hands Christopher E. Cramer (Aug 10)
Christopher Misra
Re: Data Classification Christopher Misra (Jul 27)
Re: Wireless Guest Access Christopher Misra (Sep 28)
Christopher Penido
Re: Security Awareness for students Christopher Penido (Sep 25)
Re: Security Awareness for students Christopher Penido (Sep 25)
Security Awareness for students Christopher Penido (Sep 25)
Chris Vakhordjian
RFP for Penetration Testing Chris Vakhordjian (Jul 19)
Clyde Hoadley
Deleting Online Predators Act Clyde Hoadley (Aug 02)
Colleen Keller
Re: Security Awareness for students Colleen Keller (Sep 25)
Re: Quick show of hands Colleen Keller (Aug 16)
Re: Quick show of hands Colleen Keller (Aug 16)
Conor McGrath
Re: Quick show of hands Conor McGrath (Aug 11)
Consolvo, Corbett
Re: IPS - Tipping Point vs. ISS? Consolvo, Corbett (Jul 07)
Re: Quick show of hands Consolvo, Corbett (Aug 10)
Re: Poll: Anti-Spyware on servers Consolvo, Corbett (Jul 10)
Re: NAC Implementation Consolvo, Corbett (Jul 21)
Crawford, Tim M.
Security of Research Data Crawford, Tim M. (Aug 31)
Re: Security of Research Data Crawford, Tim M. (Sep 13)
Re: Security of Research Data Crawford, Tim M. (Sep 12)
Re: Security Awareness for students Crawford, Tim M. (Sep 25)
Daniel R Jones
Re: Outsourcing Forensics Daniel R Jones (Aug 29)
Re: October is Security Awareness Month Daniel R Jones (Sep 12)
Dan Updegrove
Frustrated USC applicant pleads guilty to break-in Dan Updegrove (Sep 11)
Darlene Quackenbush
Re: GAO Peer2Peer Survey Darlene Quackenbush (Aug 04)
Darnell Walker
Re: NAC Implementation Darnell Walker (Jul 21)
NAC Implementation Darnell Walker (Jul 20)
Dave Koontz
Re: IPS Dave Koontz (Jul 21)
Re: Product request - Enterprise whole disk encryption for laptops Dave Koontz (Jul 15)
Re: Password entropy Dave Koontz (Jul 19)
IPS - Tipping Point vs. ISS? Dave Koontz (Jul 07)
Dave Monnier REN-ISAC
REN-ISAC: Large TCP/445 traffic increase on Abilene Dave Monnier REN-ISAC (Aug 12)
David C Smith
Re: Data Classification David C Smith (Jul 27)
Re: Security Requirements of Federal Funding Agencies David C Smith (Aug 29)
David C. Smith
Re: Quick show of hands David C. Smith (Aug 10)
David Gillett
Re: Password entropy David Gillett (Jul 19)
Re: Looking for consesus David Gillett (Aug 03)
Re: Spam and Wireless David Gillett (Sep 14)
Re: Mass email handling David Gillett (Jul 13)
Re: Password entropy David Gillett (Jul 19)
Re: Disclaimers David Gillett (Sep 26)
David Grisham
Re: Quick show of hands David Grisham (Aug 10)
David LaPorte
Re: NAC Implementation David LaPorte (Aug 01)
David Lassner
Re: GAO Peer2Peer survey David Lassner (Jul 25)
David L. Rotman
Re: Looking for consesus David L. Rotman (Aug 03)
David L. Wasley
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status David L. Wasley (Jul 13)
David Morton
Re: Product request - Enterprise whole disk encryption for laptops David Morton (Jul 14)
Davina Pruitt-Mentle
Re: October is Security Awareness Month Davina Pruitt-Mentle (Sep 12)
Delaney, Cherry L.
Re: Security of Research Data Delaney, Cherry L. (Sep 06)
Re: Outsourcing Forensics Delaney, Cherry L. (Aug 28)
Re: Quick show of hands Delaney, Cherry L. (Aug 16)
dennis
Content Security Gateway dennis (Aug 02)
Dick Jacobson
Re: Data Classification Dick Jacobson (Jul 26)
Donald, A. Wayne
Re: Quick show of hands Donald, A. Wayne (Aug 10)
Doug Pearson
paper on security implications of CALEA-VoIP Doug Pearson (Jul 15)
[REN-ISAC] MS06-040 status Doug Pearson (Aug 14)
Doug Sandford
Banner 7 Fine Grain Access Control Doug Sandford (Aug 29)
Drews, Jane E
Re: Outsourcing Forensics Drews, Jane E (Aug 28)
Re: Quick show of hands Drews, Jane E (Aug 10)
Eric Brewer
Re: Account Lockout Policies Eric Brewer (Jul 11)
Faloba,Jodi L
Social Security Numbers and Self Service Faloba,Jodi L (Jul 20)
Flagg, Martin D.
Help explaining why LogMeIn.com type programs are bad. Flagg, Martin D. (Jul 17)
Fowler, Steve
Antivirus application Fowler, Steve (Aug 09)
Franklin, Elliott
Re: Quick show of hands Franklin, Elliott (Aug 10)
Re: University-Wide Risk Assessment Franklin, Elliott (Aug 18)
Re: University-Wide Risk Assessment Franklin, Elliott (Aug 18)
Re: Illegal Downloads Franklin, Elliott (Sep 05)
Frank T. Shylkofski
Re: Disclaimers Frank T. Shylkofski (Sep 27)
Gary Dobbins
Re: SSNs, rootkits, Incident Response, etc... Gary Dobbins (Jul 06)
Re: Account Lockout Policies Gary Dobbins (Jul 11)
Re: Embedded OS vulnerabilities and patches Gary Dobbins (Jul 20)
Gary Flynn
Re: Outsourcing Forensics Gary Flynn (Aug 28)
Re: Account Lockout Policies Gary Flynn (Jul 11)
Re: Sample Policies Gary Flynn (Jul 05)
Re: Account Lockout Policies Gary Flynn (Jul 13)
Re: GWU and content monitoring Gary Flynn (Jul 18)
Re: Quick show of hands Gary Flynn (Aug 10)
Re: Firewall - Egress Policy Gary Flynn (Sep 04)
Re: Outsourcing Forensics Gary Flynn (Aug 29)
Gary Golomb
Re: GWU and content monitoring Gary Golomb (Jul 18)
Re: SSNs, rootkits, Incident Response, etc... Gary Golomb (Jul 06)
SSNs, rootkits, Incident Response, etc... Gary Golomb (Jul 06)
Re: GWU and content monitoring Gary Golomb (Jul 19)
Geoff Nathan
Re: Wireless Guest Access Geoff Nathan (Sep 29)
Re: Wireless Guest Access Geoff Nathan (Sep 28)
Re: Centralized security administration Geoff Nathan (Aug 19)
Geoffrey S. Nathan
Re: Quick show of hands Geoffrey S. Nathan (Aug 10)
George C. Russ
Re: New Video Educates Students on Illegal File Sharing George C. Russ (Aug 25)
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status George C. Russ (Jul 14)
Gerry Sneeringer
Re: GWU and content monitoring Gerry Sneeringer (Jul 19)
Gibbs, Aaron M.
Re: Gibbs, Aaron M. (Jul 20)
Illegal Downloads Gibbs, Aaron M. (Sep 05)
Graham Toal
Re: Account Lockout Policies Graham Toal (Jul 14)
Re: Mass email handling Graham Toal (Jul 13)
Re: SSNs, rootkits, Incident Response, etc... Graham Toal (Jul 07)
Re: Password entropy Graham Toal (Jul 24)
Re: Account Lockout Policies Graham Toal (Jul 11)
Re: Product request - Enterprise whole disk encryption for laptops Graham Toal (Jul 14)
Re: SSNs, rootkits, Incident Response, etc... Graham Toal (Jul 06)
Re: Poll: Anti-Spyware on servers Graham Toal (Jul 10)
Re: OS virtualization at the desktop Graham Toal (Jul 13)
Re: Password entropy Graham Toal (Jul 24)
Re: NAC Implementation Graham Toal (Jul 21)
Re: Password entropy Graham Toal (Jul 20)
Re: Password entropy Graham Toal (Jul 21)
Re: Security Requirements of Federal Funding Agencies Graham Toal (Aug 29)
Greenberg, David A
Re: Disk Scrubbing/Secure Disk Erasure Greenberg, David A (Jul 27)
Greg Schaffer
Re: GAO Peer2Peer Survey Greg Schaffer (Aug 04)
HALL, NATHANIEL D.
Re: Wireless Guest Access HALL, NATHANIEL D. (Sep 28)
Harold Winshel
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 15)
Re: Encryption of university data Harold Winshel (Jul 21)
Re: Password entropy Harold Winshel (Jul 24)
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 15)
Re: Password entropy Harold Winshel (Jul 24)
Re: Password entropy Harold Winshel (Jul 20)
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 20)
Re: Centralized security administration Harold Winshel (Aug 18)
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 17)
Re: Password entropy Harold Winshel (Jul 20)
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 14)
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 17)
H. Morrow Long
Re: Laptop recovery software H. Morrow Long (Aug 07)
Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings H. Morrow Long (Sep 10)
Re: Good Investigation/Forensic groups - was: SSNs, rootkits, Incident Response, etc... H. Morrow Long (Jul 08)
Re: Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings H. Morrow Long (Sep 10)
IT Security Professionals and the EDUCAUSE Member Directory H. Morrow Long (Sep 05)
Re: New Video Educates Students on Illegal File Sharing H. Morrow Long (Aug 23)
Howell, Paul
Re: Security of Research Data Howell, Paul (Sep 05)
Re: Security of Research Data Howell, Paul (Sep 12)
Re: Security of Research Data Howell, Paul (Sep 13)
Hull, Dave
Re: Rainbow Tables and Authentication Alternatives Hull, Dave (Jul 10)
Hunt,Keith A
Re: Centralized security administration Hunt,Keith A (Aug 18)
Re: Centralized security administration Hunt,Keith A (Aug 18)
Re: University-Wide Risk Assessment Hunt,Keith A (Aug 18)
Centralized security administration Hunt,Keith A (Aug 17)
Re: Centralized security administration Hunt,Keith A (Aug 18)
Jack Suess
Re: Firewall - Egress Policy Jack Suess (Sep 04)
Re: Account Lockout Policies jack suess (Jul 12)
James H Moore
Good Investigation/Forensic groups - was: SSNs, rootkits, Incident Response, etc... James H Moore (Jul 07)
Re: Data Classification James H Moore (Jul 26)
Re: Social Security Numbers and Self Service James H Moore (Jul 20)
Blackberry security expertise needed James H Moore (Jul 25)
Re: Password entropy James H Moore (Jul 23)
Rainbow Tables and Authentication Alternatives James H Moore (Jul 10)
Re: Product request - Enterprise whole disk encryption for laptops James H Moore (Jul 14)
Jason Richardson
HIPAA compliance auditing Jason Richardson (Sep 19)
Re: Quick show of hands Jason Richardson (Aug 16)
Re: DMCA (Ares and other) Jason Richardson (Sep 19)
Re: Quick show of hands Jason Richardson (Aug 16)
Re: Quick show of hands Jason Richardson (Aug 10)
Quick show of hands Jason Richardson (Aug 10)
RIAA Complaints (was Re: DMCA (Ares and other)) Jason Richardson (Sep 19)
Jay Tumas
Re: Outsourcing Forensics Jay Tumas (Aug 28)
Jeff Brainard
GWU and content monitoring Jeff Brainard (Jul 18)
Jeff Giacobbe
Re: Wireless Guest Access Jeff Giacobbe (Sep 28)
Jeff Kell
Re: Product request - Enterprise whole disk encryption for laptops Jeff Kell (Jul 17)
Re: Quick show of hands Jeff Kell (Aug 10)
Jeffrey I. Schiller
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Jeffrey I. Schiller (Jul 13)
Jeni Li
Re: Good Investigation/Forensic groups - was: SSNs, rootkits, Incident Response, etc... Jeni Li (Jul 07)
Jim Dillon
Re: Outsourcing Forensics Jim Dillon (Aug 29)
Re: University-Wide Risk Assessment Jim Dillon (Aug 18)
Re: Security of Research Data Jim Dillon (Sep 01)
Re: Security Requirements of Federal Funding Agencies Jim Dillon (Aug 29)
Re: Campus threat models Jim Dillon (Aug 10)
Re: Security of Research Data Jim Dillon (Sep 05)
Re: Quick show of hands Jim Dillon (Aug 10)
Re: hard drive destruction Jim Dillon (Aug 10)
Re: Outsourcing Forensics Jim Dillon (Aug 29)
Jimmy Kuo
Re: Password entropy Jimmy Kuo (Jul 24)
Jimmy L. Fikes
Enterprise whole disk encryption Jimmy L. Fikes (Jul 18)
Jodi Ito
Re: Quick show of hands Jodi Ito (Aug 10)
Joe Barron
Re: Data Classification (Out of Ofice Reply) Joe Barron (Jul 27)
Joel Rosenblatt
Re: Laptop recovery software Joel Rosenblatt (Aug 07)
Re: Quick show of hands Joel Rosenblatt (Aug 10)
Joe St Sauver
Re: Wireless Guest Access Joe St Sauver (Sep 28)
John
Re: SSNs, rootkits, Incident Response, etc... John (Jul 06)
John Kaftan
Re: Upper Midwest K-20 IT Security Conference Opportunity John Kaftan (Sep 19)
IPS John Kaftan (Jul 20)
[no subject] John Kaftan (Jul 20)
John Kemp
Re: Quick show of hands John Kemp (Aug 10)
John Piercy
Re: Quick show of hands John Piercy (Aug 16)
John Rasmussen
Re: John Rasmussen (Jul 20)
Re: IPS John Rasmussen (Jul 20)
John Tooley
Re: SSNs, rootkits, Incident Response, etc... John Tooley (Jul 06)
Jonny Sweeny
Re: Quick show of hands Jonny Sweeny (Aug 10)
Re: Account Lockout Policies Jonny Sweeny (Jul 14)
Jordan Wiens
Re: New Video Educates Students on Illegal File Sharing Jordan Wiens (Aug 25)
Re: New Video Educates Students on Illegal File Sharing Jordan Wiens (Aug 25)
Joseph Clark
Re: Spam and Wireless Joseph Clark (Sep 14)
Re: Spam and Wireless Joseph Clark (Sep 14)
Re: October is Security Awareness Month Joseph Clark (Sep 14)
Re: Frustrated USC applicant pleads guilty to break-in Joseph Clark (Sep 14)
Re: Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings Joseph Clark (Sep 14)
Re: Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings Joseph Clark (Sep 14)
Re: Security of Research Data Joseph Clark (Sep 14)
Re: Spam and Wireless Joseph Clark (Sep 14)
Re: <SPAM> Firewall Security Architecture Joseph Clark (Sep 14)
Julian Y. Koh
Re: RIAA Complaints (was Re: DMCA (Ares and other)) Julian Y. Koh (Sep 19)
Re: Disclaimers Julian Y. Koh (Sep 26)
Re: DMCA (Ares and other) Julian Y. Koh (Sep 18)
Justin St. Onge
SUNY Oneonta security scanning tool V2 available for release (MOPR) Justin St. Onge (Sep 07)
Kathy Bergsma
UF security professionals win world's largest 'hacking' competition Kathy Bergsma (Aug 10)
Ken Connelly
Re: Outsourcing Forensics Ken Connelly (Aug 29)
Kevin Amorin
Re: NAC Implementation Kevin Amorin (Jul 21)
Kevin Shalla
Re: SOPHAS security? Kevin Shalla (Jul 20)
Koerber, Jeff
Re: Wireless Guest Access Koerber, Jeff (Sep 28)
Krizi Trivisani
Re: Data Classification Krizi Trivisani (Jul 27)
Re: Quick show of hands Krizi Trivisani (Aug 10)
Share Your Campus Plans to Observe National Cyber Security Awareness Month Krizi Trivisani (Jul 28)
Re: Product request - Enterprise whole disk encryption for laptops Krizi Trivisani (Jul 14)
Forensic Engineer Position - GWU Krizi Trivisani (Jul 24)
Krulewitch, Sean V
Indiana University Security Advisory: Fuji Xerox Printing Systems (FXPS) print engine vulnerabilities Krulewitch, Sean V (Aug 24)
Lee Weers
Re: IPS Lee Weers (Jul 20)
Les LaCroix
Re: hard drive destruction Les LaCroix (Aug 10)
Linda Pruss
Re: Product request - Enterprise whole disk encryption for laptops Linda Pruss (Jul 17)
Lopez, Diego (District)
Re: Change Management Lopez, Diego (District) (Aug 03)
Louis Brooks
Disk Scrubbing/Secure Disk Erasure Louis Brooks (Jul 27)
Re: Disk Scrubbing/Secure Disk Erasure Louis Brooks (Jul 28)
Louise O'Sullivan
Autoreply: Re: Security of Research Data Louise O'Sullivan (Sep 01)
Autoreply: [BULK] Re: Quick show of hands Louise O'Sullivan (Aug 11)
Autoreply: Re: Sample Policies Louise O'Sullivan (Jul 05)
Lucas, Bryan
Re: Poll: Anti-Spyware on servers Lucas, Bryan (Jul 10)
Re: host based firewall for windows 2003 server? Lucas, Bryan (Jul 14)
Marcos Vieyra
SOPHAS security? Marcos Vieyra (Jul 20)
Mark Newman
Re: Product request - Enterprise whole disk encryption for laptops Mark Newman (Jul 17)
Re: Product request - Enterprise whole disk encryption for laptops Mark Newman (Jul 17)
Mark S. Bruhn
Re: Frustrated USC applicant pleads guilty to break-in Mark S. Bruhn (Sep 12)
Re: Identity Protection Services Mark S. Bruhn (Aug 16)
Mark T. Nardone
Re: hard drive destruction Mark T. Nardone (Aug 10)
Marty Hoag
Upper Midwest K-20 IT Security Conference Opportunity Marty Hoag (Sep 18)
Re: Upper Midwest K-20 IT Security Conference Opportunity Marty Hoag (Sep 19)
Mary Shaffer
Re: Disk Scrubbing/Secure Disk Erasure Mary Shaffer (Jul 27)
Matt Arthur
Re: Wireless Guest Access Matt Arthur (Sep 28)
Wireless Guest Access Matt Arthur (Sep 28)
Matthew Keller
Re: Illegal Downloads Matthew Keller (Sep 06)
Mayne, Jim
Embedded OS vulnerabilities and patches Mayne, Jim (Jul 20)
Mclaughlin, Kevin L (mclaugkl)
Re: Mclaughlin, Kevin L (mclaugkl) (Jul 20)
Re: Quick show of hands Mclaughlin, Kevin L (mclaugkl) (Aug 16)
Re: Outsourcing Forensics Mclaughlin, Kevin L (mclaugkl) (Aug 29)
Re: Outsourcing Forensics Mclaughlin, Kevin L (mclaugkl) (Aug 28)
Melissa Guenther
Another Security Awareness Resource Melissa Guenther (Aug 11)
Michael Bean
Re: DMCA (Ares and other) Michael Bean (Sep 18)
Re: Michael Bean (Jul 20)
Michael Cole
Re: NAC Implementation Michael Cole (Jul 20)
Michael Fox
hard drive destruction Michael Fox (Aug 10)
Michael Lymbery
802.1x for wired connections Michael Lymbery (Sep 13)
Nate Johnson
Re: New Video Educates Students on Illegal File Sharing Nate Johnson (Aug 25)
Nick Lewis
Re: Poll: Anti-Spyware on servers Nick Lewis (Jul 10)
O'Callaghan, Daniel
Re: Quick show of hands O'Callaghan, Daniel (Aug 10)
CompuSec encryption software O'Callaghan, Daniel (Sep 28)
Pace, Guy
Re: OS virtualization at the desktop Pace, Guy (Jul 13)
Re: hard drive destruction Pace, Guy (Aug 10)
Paul Russell
Re: Password entropy Paul Russell (Jul 23)
Penn, Blake
Re: Penn, Blake (Jul 20)
Randy Grimshaw
Web Content Change Management / Scanner Randy Grimshaw (Aug 03)
Re: Spam and Wireless Randy Grimshaw (Sep 11)
Re: NAC Implementation Randy Grimshaw (Jul 20)
Randy Marchany
Re: Wireless Guest Access Randy Marchany (Sep 28)
Re: University-Wide Risk Assessment Randy Marchany (Aug 18)
Re: GWU and content monitoring Randy Marchany (Jul 23)
Re: Security Awareness for students Randy Marchany (Sep 26)
Re: Security Awareness for students Randy Marchany (Sep 25)
Re: Account Lockout Policies Randy Marchany (Jul 11)
Raw, Randy
DR/BCP questions Raw, Randy (Jul 28)
Richard Hopkins
Re: Richard Hopkins (Jul 20)
Rick Coloccia
Re: DMCA (Ares and other) Rick Coloccia (Sep 18)
Re: DMCA (Ares and other) Rick Coloccia (Sep 18)
Rizzo, James
Re: New Video Educates Students on Illegal File Sharing Rizzo, James (Aug 23)
Robert Kerr
Re: Password entropy Robert Kerr (Jul 24)
Robert Maxwell
Re: Quick show of hands Robert Maxwell (Aug 10)
Robert Ono
Re: Centralized security administration Robert Ono (Aug 18)
Robert Riley
Re: Enterprise whole disk encryption Robert Riley (Aug 04)
Rob Whalen
Re: DMCA (Ares and other) Rob Whalen (Sep 18)
Rodney Petersen
Re: Deleting Online Predators Act Rodney Petersen (Aug 14)
POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Rodney Petersen (Jul 13)
Re: Quick show of hands Rodney Petersen (Aug 10)
Re: Security Awareness for students Rodney Petersen (Sep 25)
Re: University-Wide Risk Assessment Rodney Petersen (Aug 21)
New Video Educates Students on Illegal File Sharing Rodney Petersen (Aug 22)
P2P Filesharing Hearing and Related EDUCAUSE2006 Sessions Rodney Petersen (Sep 29)
Re: GAO Peer2Peer survey Rodney Petersen (Aug 01)
Security Requirements of Federal Funding Agencies Rodney Petersen (Aug 29)
Roger Safian
Re: Password entropy Roger Safian (Jul 19)
Re: Illegal Downloads Roger Safian (Sep 05)
Re: Password entropy Roger Safian (Jul 20)
Re: DMCA (Ares and other) Roger Safian (Sep 18)
Re: Password entropy Roger Safian (Jul 19)
Re: Password entropy Roger Safian (Jul 23)
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian (Jul 17)
Re: Password entropy Roger Safian (Jul 25)
Re: Password entropy Roger Safian (Jul 19)
Re: Password entropy Roger Safian (Jul 20)
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian (Jul 17)
Re: Password entropy Roger Safian (Jul 20)
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian (Jul 17)
Re: Password entropy Roger Safian (Jul 20)
Re: Password entropy Roger Safian (Jul 19)
Call for Papers - 19th Annual FIRST Conference Roger Safian (Sep 22)
Re: Password entropy Roger Safian (Jul 21)
Re: Password entropy Roger Safian (Jul 24)
Re: GWU and content monitoring Roger Safian (Jul 19)
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian (Jul 15)
Re: Password entropy Roger Safian (Jul 19)
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian (Jul 17)
Re: PCI Compliance Roger Safian (Jul 20)
Re: Password entropy Roger Safian (Jul 20)
Re: Password entropy Roger Safian (Jul 23)
Re: Password entropy Roger Safian (Jul 24)
Re: Password entropy Roger Safian (Jul 20)
ron behrang
URGENT -- WEB FARM SCALING ron behrang (Aug 18)
Rose, Ryan
Re: Quick show of hands Rose, Ryan (Aug 16)
PCI Compliance Rose, Ryan (Jul 20)
Roy Hatcher
Re: hard drive destruction Roy Hatcher (Aug 10)
Russell Fulton
Re: Quick show of hands Russell Fulton (Aug 10)
Re: Product request - Enterprise whole disk encryption for laptops Russell Fulton (Jul 19)
Re: Account Lockout Policies Russell Fulton (Jul 12)
Re: Outsourcing Forensics Russell Fulton (Aug 29)
Re: DMCA (Ares and other) Russell Fulton (Sep 18)
Saburo Usami
Account Lockout Policies Saburo Usami (Jul 11)
Sachnoff, Neil
Re: Enterprise whole disk encryption Sachnoff, Neil (Aug 06)
Sadler, Connie
Re: Centralized security administration Sadler, Connie (Aug 18)
Re: Phone home software & laptop encryption Sadler, Connie (Aug 11)
Re: UF security professionals win world's largest 'hacking' competition Sadler, Connie (Aug 10)
Re: Centralized security administration Sadler, Connie (Aug 17)
Re: Security of Research Data Sadler, Connie (Sep 11)
Re: Quick show of hands Sadler, Connie (Aug 10)
Samuel Liles
Re: Outsourcing Forensics Samuel Liles (Aug 29)
Schmidt, Eric W
Re: Quick show of hands Schmidt, Eric W (Aug 10)
Scholz, Greg
DMCA (Ares and other) Scholz, Greg (Sep 18)
Re: IPS Scholz, Greg (Jul 20)
Re: Scholz, Greg (Jul 20)
Re: RIAA Complaints (was Re: DMCA (Ares and other)) Scholz, Greg (Sep 19)
Scott Bradner
Re: Quick show of hands Scott Bradner (Aug 10)
Scott Genung
October is Security Awareness Month Scott Genung (Sep 12)
Re: Scott Genung (Jul 20)
scott hollatz
Re: Password entropy scott hollatz (Jul 19)
Re: Password entropy scott hollatz (Jul 19)
Seruya, Stewart
Disclaimers Seruya, Stewart (Sep 26)
Sheri Thompson
Data Breaches Sheri Thompson (Sep 15)
Sherry Callahan
Re: Quick show of hands Sherry Callahan (Aug 10)
Shirley Payne
Registration Open for 2006 VA SCAN Conference Shirley Payne (Aug 11)
Re: University-Wide Risk Assessment Shirley Payne (Aug 18)
Re: Security Awareness for students Shirley Payne (Sep 26)
Skinner, Lara
Re: Security Awareness for students Skinner, Lara (Sep 25)
Solomon Asmelash
Banner Security Solomon Asmelash (Aug 07)
Stephen C Gay
Encryption of university data Stephen C Gay (Jul 19)
Steve Brukbacher
Re: Security Requirements of Federal Funding Agencies Steve Brukbacher (Aug 29)
Data Classification Steve Brukbacher (Jul 26)
Re: Security of Research Data Steve Brukbacher (Sep 01)
Steve Lape
Re: Quick show of hands Steve Lape (Aug 10)
Steve Lovaas
Re: Wireless Guest Access Steve Lovaas (Sep 28)
Re: Firewall - Egress Policy Steve Lovaas (Sep 05)
CampusBackup.org and similar remote backup options Steve Lovaas (Jul 18)
Re: Wireless Guest Access Steve Lovaas (Sep 28)
Steve Schuster
Re: Quick show of hands Steve Schuster (Aug 10)
Steve Werby
Re: Encryption of university data Steve Werby (Jul 21)
Steve Worona
CALEA Webcast on Tuesday, Aug. 1 Steve Worona (Jul 28)
Stewart, Ian
Data classification Stewart, Ian (Sep 06)
Theresa M Rowe
Re: PCI Compliance Theresa M Rowe (Jul 20)
Data classification Theresa M Rowe (Jul 27)
Theresa Semmens
Re: Quick show of hands Theresa Semmens (Aug 10)
Thompson, Sheri J
Re: Disclaimers Thompson, Sheri J (Sep 27)
Security Awareness for Students Thompson, Sheri J (Sep 28)
Tim Lane
<SPAM> Firewall Security Architecture Tim Lane (Sep 12)
Tom Davis
Re: Centralized security administration Tom Davis (Aug 18)
Tom Siu
Re: Security of Research Data Tom Siu (Sep 18)
GAO Peer2Peer Survey Tom Siu (Aug 02)
GAO Peer2Peer survey Tom Siu (Jul 25)
Data Classification Tom Siu (Jul 28)
Tony Gauvin
Re: hard drive destruction Tony Gauvin (Aug 10)
Tracy Mitrano
Re: Security of Research Data Tracy Mitrano (Sep 13)
Re: Security of Research Data Tracy Mitrano (Sep 12)
Re: Security of Research Data Tracy Mitrano (Sep 13)
Tristan RHODES
Re: NAC Implementation Tristan RHODES (Aug 01)
unisog
Re: Autoreply: Re: Security of Research Data unisog (Sep 01)
Valdis Kletnieks
Re: Centralized security administration Valdis Kletnieks (Aug 18)
Re: SSNs, rootkits, Incident Response, etc... Valdis Kletnieks (Jul 07)
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Valdis Kletnieks (Jul 14)
Re: Password entropy Valdis Kletnieks (Jul 25)
Re: Change Management Valdis Kletnieks (Aug 03)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 17)
Re: Account Lockout Policies Valdis Kletnieks (Jul 11)
Re: Password entropy Valdis Kletnieks (Jul 23)
Re: Looking for consesus Valdis Kletnieks (Aug 03)
Re: Mass email handling Valdis Kletnieks (Jul 13)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 17)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 15)
Re: Disk Scrubbing/Secure Disk Erasure Valdis Kletnieks (Jul 27)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 15)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 17)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 15)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 15)
Re: Password entropy Valdis Kletnieks (Jul 24)
Re: Account Lockout Policies Valdis Kletnieks (Jul 11)
Re: Password entropy Valdis Kletnieks (Jul 20)
Re: Password entropy Valdis Kletnieks (Jul 19)
Re: Password entropy Valdis Kletnieks (Jul 24)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 17)
Re: Password entropy Valdis Kletnieks (Jul 23)
Re: Centralized security administration Valdis Kletnieks (Aug 18)
Valerie Vogel
Free Webcast on Aug. 16: FTC's Campaign Against Identity Theft Valerie Vogel (Aug 14)
Going Beyond Recovery to Continuity: Lessons Learned Valerie Vogel (Aug 29)
Security Task Force Open Meeting at EDUCAUSE 2006 Valerie Vogel (Aug 17)
Victoriano Casas, ISO
Re: University-Wide Risk Assessment Victoriano Casas, ISO (Aug 18)
Vuong Phung
Re: host based firewall for windows 2003 server? Vuong Phung (Jul 14)
Waller, Michael A. (HSC)
Re: Looking for consesus Waller, Michael A. (HSC) (Aug 03)
Re: Product request - Enterprise whole disk encryption for laptops Waller, Michael A. (HSC) (Jul 20)
Re: Quick show of hands Waller, Michael A. (HSC) (Aug 10)
Re: Data Classification Waller, Michael A. (HSC) (Jul 28)
Walter Reynolds
Re: Spam and Wireless Walter Reynolds (Sep 12)
Wayne Bullock
Re: IPS Wayne Bullock (Jul 20)
Re: IPS Wayne Bullock (Jul 20)
Re: Wayne Bullock (Jul 20)
Re: NAC Implementation Wayne Bullock (Jul 21)
Re: RIAA Complaints (was Re: DMCA (Ares and other)) Wayne Bullock (Sep 19)
Wes Young
Re: Data Breaches Wes Young (Sep 18)
Re: NAC Implementation Wes Young (Aug 02)
Re: IPS Wes Young (Jul 20)
Re: Wes Young (Jul 20)
William C. Moore II
Laptop recovery software William C. Moore II (Aug 07)
William Custer
Re: Quick show of hands William Custer (Aug 10)
Re: Security of Research Data William Custer (Sep 05)
Willis Marti
RIAA Complaints (was Re: DMCA (Ares and other)) Willis Marti (Sep 19)
Wilson Dillaway
Re: CALEA Webcast on Tuesday, Aug. 1 Wilson Dillaway (Jul 31)
Winders, Timothy A
Re: Disclaimers Winders, Timothy A (Sep 26)
Wood, Anne M (wood)
Re: NAC Implementation Wood, Anne M (wood) (Jul 21)
Re: IPS Wood, Anne M (wood) (Jul 20)
Wright, Sallie F
Phone home software & laptop encryption Wright, Sallie F (Aug 11)
Yasui, Michael
Re: Spam and Wireless Yasui, Michael (Sep 14)
Youngquist, Jason R.
Product request - Enterprise whole disk encryption for laptops Youngquist, Jason R. (Jul 14)