Educause Security Discussion: by author

446 messages starting Mar 12 07 and ending Mar 12 07
Date index | Thread index | Author index


Adam Dodge

Educational Security Incidents 2006 Year in Review Adam Dodge (Mar 12)

Alan Amesbury

Re: HD destruction Alan Amesbury (Mar 15)
Re: SYSADM and Security Alan Amesbury (Jan 03)

Alex Campoe

Re: Log management Alex Campoe (Jan 31)

Allan Williams

Re: SYSADM and Security Allan Williams (Jan 03)

Allison Henry

Re: Symantec Corporate Antivirus, Vista, and EFS Allison Henry (Mar 01)

Anderson, Sherry

Re: Patch management Anderson, Sherry (Mar 29)

Anthony Maszeroski

Security Incidents due to user error Anthony Maszeroski (Jan 30)

Ardoth Hassler

Looking for a laptop encryption policy for institutionally-owned laptops Ardoth Hassler (Mar 22)

Barros, Jacob

Re: NAC devices - opinions sought Barros, Jacob (Feb 19)

Basgen, Brian

Re: pointsec vs. Guardian Edge Basgen, Brian (Jan 16)
Public networks under CALEA Basgen, Brian (Mar 20)

Ben Spencer

Re: Extremely High Spam Statistics Ben Spencer (Feb 13)

Bill Kyle

Re: Software for Tracking Security Incidents Bill Kyle (Mar 28)

Bill Ogle

Re: PCI Compliance Bill Ogle (Mar 23)

Bill Terry

Re: summarizing squid proxy server logs Bill Terry (Jan 22)

Boaz Gelbord

Two factor authentication for Banner access Boaz Gelbord (Jan 26)
Administrative password management Boaz Gelbord (Jan 30)
Campus card security Boaz Gelbord (Mar 12)
Re: Two factor authentication for Banner access Boaz Gelbord (Jan 30)

Bob Doyle

Re: Vista Bob Doyle (Feb 02)

Botelho Marla

Re: Fortinet unified threat management evaluation feedback needed Botelho Marla (Feb 27)

Bowden, Zeb

Re: Symantec Corporate Antivirus, Vista, and EFS Bowden, Zeb (Mar 01)

Brad Alexander

Role Doc/Job Description Brad Alexander (Mar 30)

Brad Judy

Re: Use of Partial SSN as Authenticator Brad Judy (Feb 22)
Web application security scanners Brad Judy (Jan 18)
Re: Information Inventory, Classification, and BCP Brad Judy (Jan 10)
Re: Business Continuity Plans for an Information Security Office Brad Judy (Jan 10)
Re: Business Continuity Plans for an Information Security Office Brad Judy (Jan 10)

Brady McClenon

Re: Extremely High Spam Statistics Brady McClenon (Feb 13)

Brenda B Gombosky

Re: Questions about Firewall Exceptions Brenda B Gombosky (Mar 15)
Software for Tracking Security Incidents Brenda B Gombosky (Mar 28)

Brian Friday

Re: NAC devices - opinions sought Brian Friday (Feb 20)

Brian Smith-Sweeney

Re: Secure Server Procedure Brian Smith-Sweeney (Feb 27)
Job Posting: Sr. Net Sec Analyst at NYU Brian Smith-Sweeney (Jan 29)
Re: Ongoing Port 6000 attacks, Windows Xserver Compromises, keyloggers Brian Smith-Sweeney (Jan 24)
Re: Form spam Brian Smith-Sweeney (Feb 15)

Brian T Nichols

Re: NAC devices - opinions sought Brian T Nichols (Feb 17)
Re: NAC devices - opinions sought Brian T Nichols (Feb 17)

Bristol, Gary L.

Re: Remote Terminal Services / SharePoint Servers Bristol, Gary L. (Jan 10)
Re: Extremely High Spam Statistics Bristol, Gary L. (Feb 13)
Re: Remote Terminal Services / SharePoint Servers Bristol, Gary L. (Jan 11)

Br. Kenneth Arnold

Re: Extremely High Spam Statistics Br. Kenneth Arnold (Feb 13)

Brock, Anthony - NET

SANS "Early Bird" Registration Extended at OSU Brock, Anthony - NET (Feb 09)
Connectivity problems with the US Army Brock, Anthony - NET (Jan 18)
Re: Connectivity problems with the US Army Brock, Anthony - NET (Jan 19)
Re: Connectivity problems with the US Army Brock, Anthony - NET (Jan 19)
Re: Connectivity problems with the US Army Brock, Anthony - NET (Jan 19)
Re: Connectivity problems with the US Army Brock, Anthony - NET (Jan 19)

Cal Frye

Re: spam return address backlash Cal Frye (Jan 10)
Re: ipsCA and free .edu certs Cal Frye (Feb 13)
Re: spam return address backlash Cal Frye (Jan 11)
Re: NAC devices - opinions sought Cal Frye (Feb 16)
Re: Connectivity problems with the US Army Cal Frye (Jan 19)
Re: Fortinet unified threat management evaluation feedback needed Cal Frye (Feb 27)
Re: spam return address backlash Cal Frye (Jan 11)
Re: spam return address backlash Cal Frye (Jan 13)

Casas, Victoriano (ISO)

Re: Secure Server Procedure Casas, Victoriano (ISO) (Feb 27)

Chad McDonald

Re: Secure Server Procedure Chad McDonald (Feb 27)

Charles L. Bombard

Log management Charles L. Bombard (Jan 31)
Patch management Charles L. Bombard (Mar 29)
Re: Log management Charles L. Bombard (Jan 31)
Network access control Charles L. Bombard (Jan 19)
Re: Network access control Charles L. Bombard (Jan 19)

Charlie D. Kutil

Secure Server Procedure Charlie D. Kutil (Feb 23)
Re: New VA FISMA Requirements for PIs in Research Institutions Charlie D. Kutil (Mar 12)

Charlie Prothero

Re: Extremely High Spam Statistics Charlie Prothero (Feb 13)
Re: NAC devices - opinions sought Charlie Prothero (Feb 16)
Terminal Services Security - Authorized Applications? Charlie Prothero (Mar 29)

Charlie Reitsma

Re: ipsCA and free .edu certs Charlie Reitsma (Feb 14)
Re: Use of Partial SSN as Authenticator Charlie Reitsma (Feb 22)
Re: ipsCA and free .edu certs Charlie Reitsma (Feb 13)

Chris Edwards

Re: Ongoing Port 6000 attacks, Windows Xserver Compromises, keyloggers Chris Edwards (Jan 26)
Re: UDP Port scans Chris Edwards (Feb 02)

Chris Gauthier

Re: Patch management Chris Gauthier (Mar 29)

Chris Green

SURVEY: Research Institutions / Border Firewalls Chris Green (Feb 12)
Re: SURVEY: Research Institutions / Border Firewalls Chris Green (Feb 13)
Re: Log management Chris Green (Jan 31)
Re: Web application security scanners Chris Green (Jan 18)

Chris Harrington

NAC devices - opinions sought Chris Harrington (Feb 19)

Chris Steele

Re: Extremely High Spam Statistics Chris Steele (Feb 13)

Christian Hroux

Fortinet unified threat management evaluation feedback needed Christian Hroux (Feb 27)

clementz.7

Laptop Encryption Software clementz.7 (Feb 26)

Clifford Collins

Re: pointsec vs. Guardian Edge Clifford Collins (Jan 19)

Conor McGrath

Re: spam return address backlash Conor McGrath (Jan 09)
Re: NAC devices - opinions sought Conor McGrath (Feb 17)

Consolvo, Corbett

Re: SSL VPN Consolvo, Corbett (Jan 29)

Daniel J. Cody

Re: Extremely High Spam Statistics Daniel J. Cody (Feb 13)

Dan Roberts

Re: Cisco Security Agent and other HIPS Dan Roberts (Jan 23)

Dave Koontz

Re: Administrative password management Dave Koontz (Jan 30)
Re: Cisco Security Agent and other HIPS Dave Koontz (Jan 19)
Remote Terminal Services / SharePoint Servers Dave Koontz (Jan 10)

David Boyer

NAC devices - opinions sought David Boyer (Feb 16)
Re: NAC devices - opinions sought David Boyer (Feb 16)

David C. Smith

Re: Untrusted VLANs on Core Gear David C. Smith (Feb 08)

David Dean

Form spam David Dean (Feb 15)

David Gillett

Re: NAC devices - opinions sought David Gillett (Mar 08)
Re: NAC devices - opinions sought David Gillett (Feb 20)
Re: Untrusted VLANs on Core Gear David Gillett (Feb 12)
Re: Connectivity problems with the US Army David Gillett (Jan 19)
Re: "Yay" Malware David Gillett (Jan 12)

David Grisham

Authorizing password changes in a health science center David Grisham (Feb 13)
Re: Cisco Security Agent and other HIPS David Grisham (Jan 19)

David LaPorte

Re: Untrusted VLANs on Core Gear David LaPorte (Feb 08)

David Taylor

Re: "Yay" Malware David Taylor (Jan 12)

Deke Kassabian

Re: SURVEY: Research Institutions / Border Firewalls Deke Kassabian (Feb 14)

Delaney, Cherry L.

Re: HD destruction Delaney, Cherry L. (Mar 15)

Dick Jacobson

Re: spam return address backlash Dick Jacobson (Jan 10)

Dodge, Adam

Re: Security Incidents due to user error Dodge, Adam (Jan 30)

Donald, A. Wayne

Public Machines Donald, A. Wayne (Feb 05)

Doug Pearson

FW: Joint Techs Session Proposal Deadline is this Friday, January 5 Doug Pearson (Jan 02)

Everett, Alex

Re: Software for Tracking Security Incidents Everett, Alex (Mar 28)
LDAP Authentication and Web-based Applications Everett, Alex (Mar 22)

Flagg, Martin D.

Re: "Yay" Malware Flagg, Martin D. (Jan 12)

Fowler, Steve

Re: vista KMS security Fowler, Steve (Mar 04)
Re: vista KMS security Fowler, Steve (Mar 22)
SANS SEC505: Securing Windows - at Oregon State University Mar 12-16, 2007 Fowler, Steve (Jan 18)
Re: Patch management Fowler, Steve (Mar 31)

Friedmann, Esther

Re: New VA FISMA Requirements for PIs in Research Institutions Friedmann, Esther (Mar 13)

Gary Dobbins

Re: Looking for a laptop encryption policy for institutionally-owned laptops Gary Dobbins (Mar 22)

Gary Flynn

Re: Use of Partial SSN as Authenticator Gary Flynn (Feb 22)
Re: spam return address backlash Gary Flynn (Jan 10)
Cisco Security Agent and other HIPS Gary Flynn (Jan 11)
Symantec Corporate Antivirus, Vista, and EFS Gary Flynn (Feb 28)
Use of Partial SSN as Authenticator Gary Flynn (Feb 22)
Re: Symantec Corporate Antivirus, Vista, and EFS Gary Flynn (Mar 01)
Re: Questions about Firewall Exceptions Gary Flynn (Mar 15)
Re: Symantec Corporate Antivirus, Vista, and EFS Gary Flynn (Mar 02)
Re: Laptop Encryption Software Gary Flynn (Mar 05)
Re: Vista Gary Flynn (Feb 01)
Re: Fortinet unified threat management evaluation feedback needed Gary Flynn (Feb 27)
Re: Security Incidents due to user error Gary Flynn (Jan 30)
Re: Laptop Encryption Software Gary Flynn (Mar 05)
Re: Laptop Encryption Software Gary Flynn (Mar 05)

Gary Golomb

Finding and securing sensitive data Gary Golomb (Jan 10)

Geoff Nathan

Re: return to service fee Geoff Nathan (Feb 07)

Geoffrey S. Nathan

ID Theft Credit Insurance Geoffrey S. Nathan (Jan 26)
Re: SSL VPN Geoffrey S. Nathan (Jan 29)

George Bailey

Re: Symantec Corporate Antivirus, Vista, and EFS George Bailey (Mar 13)

George Russ

New Information from RIAA Sent to Presidents by ACE George Russ (Feb 28)
Re: Patch management George Russ (Mar 29)

Gibson, Nathan J. (HSC)

ISS Vul Scan Gibson, Nathan J. (HSC) (Mar 28)
Re: Looking for a laptop encryption policy for institutionally-owned laptops Gibson, Nathan J. (HSC) (Mar 22)
Proximity Authentication Gibson, Nathan J. (HSC) (Mar 23)
Re: Data in SYN Packets Gibson, Nathan J. (HSC) (Mar 26)

Glenn Forbes Fleming Larratt

Re: Untrusted VLANs on Core Gear Glenn Forbes Fleming Larratt (Feb 07)

Greg T. Grimes

Questions about Firewall Exceptions Greg T. Grimes (Mar 14)
Re: Questions about Firewall Exceptions Greg T. Grimes (Mar 19)
Re: HD destruction Greg T. Grimes (Mar 15)

Greg Vickers

Re: SIM (security information management) and SEM (Security Event Management) Greg Vickers (Feb 08)
Re: Log management Greg Vickers (Jan 31)

Hall, Carol

Re: Role Doc/Job Description Hall, Carol (Mar 31)

HALL, NATHANIEL D.

Re: Connectivity problems with the US Army HALL, NATHANIEL D. (Jan 19)
Re: Untrusted VLANs on Core Gear HALL, NATHANIEL D. (Feb 07)
Re: Looking for a laptop encryption policy for institutionally-owned laptops HALL, NATHANIEL D. (Mar 22)
Re: Extremely High Spam Statistics HALL, NATHANIEL D. (Feb 13)

Hall, Rand

Re: Extremely High Spam Statistics Hall, Rand (Feb 13)

Harold Winshel

Re: passworded screen savers with timeouts, do you enforce? Harold Winshel (Jan 09)
Re: pointsec vs. Guardian Edge Harold Winshel (Jan 19)

Hedrick, Gregory W

Security Position at Purdue University Hedrick, Gregory W (Feb 28)

Henry Hua

Questions regarding COBIT Implementation in Higher Education Henry Hua (Jan 31)

H. Morrow Long

Re: Form spam H. Morrow Long (Feb 15)
Any opinions on the SANS Institute Writing Secure Web Applications: Developer Training class? H. Morrow Long (Feb 19)
Re: Vista H. Morrow Long (Feb 02)
Re: spam return address backlash H. Morrow Long (Jan 11)

Hunt,Keith A

Re: Extremely High Spam Statistics Hunt,Keith A (Feb 13)

Irene Sandler (iyao)

Re: Public Access Library Ports (was Re: Open access to student labs Irene Sandler (iyao) (Jan 02)

Isaac Straley

Re: Log management Isaac Straley (Jan 31)
Re: Log management Isaac Straley (Jan 31)
Re: Log management Isaac Straley (Jan 31)

James J. Barlow

Re: Ongoing Port 6000 attacks, Windows Xserver Compromises, keyloggers James J. Barlow (Jan 24)

James Moore

Business Continuity Plans for an Information Security Office James Moore (Jan 09)
Re: Business Continuity Plans for an Information Security Office James Moore (Jan 10)
Any one know about CE-Infosys compsec encryption James Moore (Feb 21)
Information Inventory, Classification, and BCP James Moore (Jan 10)
Re: Software for Tracking Security Incidents James Moore (Mar 29)
Re: Software for Tracking Security Incidents James Moore (Mar 28)

Jamie A. Stapleton

Re: Patch management Jamie A. Stapleton (Mar 29)
Re: Connectivity problems with the US Army Jamie A. Stapleton (Jan 19)

Jason Richardson

Re: Network access control Jason Richardson (Jan 22)
Re: Cisco Security Agent and other HIPS Jason Richardson (Jan 19)
Re: Log management Jason Richardson (Feb 01)

Jay Tumas

Re: Network access control Jay Tumas (Jan 19)
Re: Public networks under CALEA Jay Tumas (Mar 20)
Re: Connectivity problems with the US Army Jay Tumas (Jan 19)

Jeff Giacobbe

Re: spam return address backlash Jeff Giacobbe (Jan 11)
Re: Log management Jeff Giacobbe (Jan 31)

Jeff Kell

Re: Extremely High Spam Statistics Jeff Kell (Feb 13)
test Jeff Kell (Feb 08)
Re: HD destruction Jeff Kell (Mar 15)

Jeff Murphy

Re: Network access control Jeff Murphy (Jan 19)
Re: NAC devices - opinions sought Jeff Murphy (Feb 16)

Jere Retzer

Re: Fortinet unified threat management evaluation feedback needed Jere Retzer (Feb 27)
Re: Fortinet unified threat management evaluation feedback needed Jere Retzer (Feb 27)

Jill B Gemmill

Re: New VA FISMA Requirements for PIs in Research Institutions Jill B Gemmill (Mar 13)
Risk Assessment Software Jill B Gemmill (Mar 23)

Jim Dillon

Re: Secure Server Procedure Jim Dillon (Feb 27)
Re: Business Continuity Plans for an Information Security Office Jim Dillon (Jan 10)

Jimmy Kuo

Re: Use of Partial SSN as Authenticator Jimmy Kuo (Feb 22)

Jim Schug

Active-X Jim Schug (Jan 22)

jkaftan

Re: Fortinet unified threat management evaluation feedback needed jkaftan (Mar 01)
Fortigate vs Cisco ASA jkaftan (Feb 16)
Re: Untrusted VLANs on Core Gear jkaftan (Feb 08)
Re: Network access control jkaftan (Jan 25)
Untrusted VLANs on Core Gear jkaftan (Feb 07)

Joel Rosenblatt

Re: Laptop Encryption Software Joel Rosenblatt (Feb 26)
Re: Extremely High Spam Statistics Joel Rosenblatt (Feb 13)

Joe St Sauver

WPA/WPA2 and Apple Airport (not Airport Extreme) cards Joe St Sauver (Feb 26)

John

Re: NAC devices - opinions sought John (Feb 20)

John Bullock

Re: HD destruction John Bullock (Mar 15)
Re: Log management John Bullock (Jan 31)

John C. A. Bambenek

Re: Security Position at Purdue University John C. A. Bambenek (Mar 20)

John Kemp

Re: Fortinet unified threat management evaluation feedback needed John Kemp (Mar 09)
Re: NAC devices - opinions sought John Kemp (Mar 08)

John Kristoff

Re: Data in SYN Packets John Kristoff (Mar 27)

John Ladwig

Re: Log management John Ladwig (Feb 01)
Re: Untrusted VLANs on Core Gear John Ladwig (Feb 07)

John Piercy

Re: passworded screen savers with timeouts, do you enforce? John Piercy (Jan 09)

John Turner

Re: Cisco Security Agent and other HIPS John Turner (Jan 20)

Jones, Dan

Re: Proximity Authentication Jones, Dan (Mar 27)

Jonny Sweeny

Re: Software for Tracking Security Incidents Jonny Sweeny (Mar 29)

Jordan Wiens

Re: Administrative password management Jordan Wiens (Jan 31)

Joseph Clark

CALEA Products and Solutions Joseph Clark (Jan 10)

Joseph Karam

UDP Port scans Joseph Karam (Feb 02)

j.price

Re: PCI Compliance for external e-commerce vendors j.price (Feb 12)

Julian Thompson

Re: Laptop Encryption Software Julian Thompson (Feb 26)

Julian Y. Koh

Re: Network access control Julian Y. Koh (Jan 19)
Re: SSL VPN Julian Y. Koh (Jan 29)
Re: Network access control Julian Y. Koh (Jan 21)
Re: WPA/WPA2 and Apple Airport (not Airport Extreme) cards Julian Y. Koh (Feb 26)

Justin Dover

Re: Patch management Justin Dover (Mar 29)

Justin Klein Keane

Re: Data in SYN Packets Justin Klein Keane (Mar 26)

Kathy Bergsma

IT security position available at U Florida Kathy Bergsma (Feb 20)

Kees Leune

Re: Log management Kees Leune (Feb 20)
Re: PCI Compliance Kees Leune (Mar 23)

Keith Furrow

Re: Role Doc/Job Description Keith Furrow (Mar 30)

Kelly, Brian J.

SIM (security information management) and SEM (Security Event Management) Kelly, Brian J. (Feb 08)

Ken Connelly

Re: spam return address backlash Ken Connelly (Jan 09)
Re: Extremely High Spam Statistics Ken Connelly (Feb 12)
Re: return to service fee Ken Connelly (Feb 06)
Re: WPA/WPA2 and Apple Airport (not Airport Extreme) cards Ken Connelly (Feb 26)
Re: Veriresume question Ken Connelly (Mar 05)
Re: Extremely High Spam Statistics Ken Connelly (Feb 13)

Ken De Cruyenaere

summarizing squid proxy server logs Ken De Cruyenaere (Jan 22)

Kenneth Arnold

Re: ipsCA and free .edu certs Kenneth Arnold (Feb 13)
Re: ipsCA and free .edu certs Kenneth Arnold (Feb 13)

Kim Cary

PCI Compliance for external e-commerce vendors Kim Cary (Feb 12)
Firewall Exceptions Kim Cary (Mar 16)

Krizi Trivisani

Sr. Computer Forensic Info Security Systems Engineer Krizi Trivisani (Feb 16)

Lazarus, Carolann

Oregon SANS Training Opportunity Lazarus, Carolann (Jan 30)

Logan, Kimberly (loganks)

Re: pointsec vs. Guardian Edge Logan, Kimberly (loganks) (Jan 16)

Lovaas,Steven

Re: Laptop Encryption Software Lovaas,Steven (Feb 26)
Re: Proximity Authentication Lovaas,Steven (Mar 23)
Re: ipsCA and free .edu certs Lovaas,Steven (Feb 14)
Re: PCI Compliance Lovaas,Steven (Mar 23)
Re: ipsCA and free .edu certs Lovaas,Steven (Feb 13)
Re: SSL VPN Lovaas,Steven (Jan 29)
Re: Using Reverse Proxies Lovaas,Steven (Feb 18)
Re: Laptop Encryption Software Lovaas,Steven (Mar 05)

Lovaas,Steven R

Re: Web application security scanners Lovaas,Steven R (Jan 18)
Re: Business Continuity Plans for an Information Security Office Lovaas,Steven R (Jan 10)
Re: Business Continuity Plans for an Information Security Office Lovaas,Steven R (Jan 10)
Re: Web application security scanners Lovaas,Steven R (Jan 18)
Re: Remote Terminal Services / SharePoint Servers Lovaas,Steven R (Jan 10)
Re: pointsec vs. Guardian Edge Lovaas,Steven R (Jan 13)

Lunceford, Dan

Re: Two factor authentication for Banner access Lunceford, Dan (Jan 26)

Lynn Dorendorf

Challenge Questions Lynn Dorendorf (Jan 18)

Maloney, Michael

Re: pointsec vs. Guardian Edge Maloney, Michael (Jan 12)

Manuel Amaral

Early registration pricing extended to March 16th for - SANS Hacker Techniques - March 26 - 31 Manuel Amaral (Mar 09)
Early registration ends Feb 7th for - SANS Hacker Techniques - March 26 - 31 Manuel Amaral (Feb 02)

Mark Bauer

Re: Log management Mark Bauer (Feb 01)

Mark Borrie

Re: Extremely High Spam Statistics Mark Borrie (Feb 12)
Re: spam return address backlash Mark Borrie (Jan 09)

Mark Bruhn

Re: Extremely High Spam Statistics Mark Bruhn (Feb 13)

Mark Newman

Re: Data in SYN Packets Mark Newman (Mar 26)

Mark Poepping

Re: Extremely High Spam Statistics Mark Poepping (Feb 13)

Mark Rogowski

Re: Fortinet unified threat management evaluation feedback needed Mark Rogowski (Feb 27)

Mark Staples

SYSADM and Security Mark Staples (Jan 03)
<SPAM> Data Protection in the Real World: Guarding the Institution While Maintaining Academic Integrity Mark Staples (Feb 15)

Marty Hoag

Re: Form spam Marty Hoag (Feb 15)

Marty Peterman

Early-bird Registration Ends April 16th for UVA-SANS Hacking Techniques Course (June 18-23, 2007) Marty Peterman (Mar 29)
Registration Now Open for University of Virginia and SANS Hacker Techniques Course on June 18-23, 2007 Marty Peterman (Mar 02)

Matthew Keller

Re: HD destruction Matthew Keller (Mar 15)
Re: Software for Tracking Security Incidents Matthew Keller (Mar 28)
Re: Questions about Firewall Exceptions Matthew Keller (Mar 15)

Mayne, Jim

Separation of University and personal records at termination Mayne, Jim (Feb 15)

McKay, Steven R

Re: Symantec Corporate Antivirus, Vista, and EFS McKay, Steven R (Mar 13)
Re: Symantec Corporate Antivirus, Vista, and EFS McKay, Steven R (Mar 12)

Mclaughlin, Kevin L (mclaugkl)

Re: Log management Mclaughlin, Kevin L (mclaugkl) (Jan 31)
Vista Mclaughlin, Kevin L (mclaugkl) (Feb 01)
Re: Laptop Encryption Software Mclaughlin, Kevin L (mclaugkl) (Feb 26)
FW: Paypal/Ebay Mclaughlin, Kevin L (mclaugkl) (Jan 11)
Re: Extremely High Spam Statistics Mclaughlin, Kevin L (mclaugkl) (Feb 13)

Mclaughlin, Kevin (mclaugkl)

Veriresume question Mclaughlin, Kevin (mclaugkl) (Mar 05)
Re: Software for Tracking Security Incidents Mclaughlin, Kevin (mclaugkl) (Mar 29)

Melissa Guenther

Re: Security Incidents due to user error Melissa Guenther (Jan 30)

Michael Cole

Re: NAC devices - opinions sought Michael Cole (Feb 16)

Michael Fox

passworded screen savers with timeouts, do you enforce? Michael Fox (Jan 08)
passworded screen savers with timeouts, do you enforce? Michael Fox (Jan 08)

Michael Hornung

Re: Questions about Firewall Exceptions Michael Hornung (Mar 14)

Michael Sana

Re: pointsec vs. Guardian Edge Michael Sana (Jan 12)

Michael Sinatra

Re: Untrusted VLANs on Core Gear Michael Sinatra (Feb 08)
Re: SURVEY: Research Institutions / Border Firewalls Michael Sinatra (Feb 13)

Michelle Mueller

Re: passworded screen savers with timeouts, do you enforce? Michelle Mueller (Jan 08)

Mike Hanson

Data in SYN Packets Mike Hanson (Mar 26)
SSL VPN Mike Hanson (Jan 29)

Mike Iglesias

Re: Connectivity problems with the US Army Mike Iglesias (Jan 19)
Re: Connectivity problems with the US Army Mike Iglesias (Jan 18)

Mike Wiseman

Re: ipsCA and free .edu certs Mike Wiseman (Feb 13)
Re: Network access control Mike Wiseman (Jan 21)

Nathan W. Labadie

Re: SSL VPN Nathan W. Labadie (Jan 29)

Nick Lewis

Re: Administrative password management Nick Lewis (Jan 31)
Re: Log management Nick Lewis (Jan 31)

Pace, Guy

Re: Veriresume question Pace, Guy (Mar 05)
Re: Connectivity problems with the US Army Pace, Guy (Jan 19)
Re: Laptop Encryption Software Pace, Guy (Feb 26)
Re: Use of Partial SSN as Authenticator Pace, Guy (Feb 22)
Re: Software for Tracking Security Incidents Pace, Guy (Mar 28)

Parker, Ron

Re: passworded screen savers with timeouts, do you enforce? Parker, Ron (Jan 09)
Re: passworded screen savers with timeouts, do you enforce? Parker, Ron (Jan 09)
Re: "Yay" Malware Parker, Ron (Jan 12)

Paul DeStefano

Re: pointsec vs. Guardian Edge Paul DeStefano (Jan 12)

Paul Keser

Re: Firewall Question Paul Keser (Jan 17)
Re: Looking for a laptop encryption policy for institutionally-owned laptops Paul Keser (Mar 22)

Paul Russell

Re: spam return address backlash Paul Russell (Jan 11)

Penn, Blake

Cisco CSA Issues Penn, Blake (Mar 19)
Re: Security Incidents due to user error Penn, Blake (Jan 30)
Re: Authorizing password changes in a health science center Penn, Blake (Feb 13)
Re: PCI Compliance Penn, Blake (Mar 22)
Re: PCI Compliance Penn, Blake (Mar 23)

Pettis, Frederick

Re: pointsec vs. Guardian Edge Pettis, Frederick (Jan 12)
Re: Patch management Pettis, Frederick (Mar 29)
Re: pointsec vs. Guardian Edge Pettis, Frederick (Jan 12)
Re: pointsec vs. Guardian Edge Pettis, Frederick (Jan 12)

Piscitello, Frank

Firewall Question Piscitello, Frank (Jan 15)

Randy Grimshaw

Re: Use of Partial SSN as Authenticator Randy Grimshaw (Feb 22)
Re: windows AV policy support Randy Grimshaw (Jan 10)

Randy Marchany

Re: Use of Partial SSN as Authenticator Randy Marchany (Feb 22)
Re: Questions about Firewall Exceptions Randy Marchany (Mar 14)
Re: SANS Institute Forensics Course, 3/5-10/07, $620/person, VA Tech Randy Marchany (Jan 10)
VA Tech SANS-EDU Forensics (SEC 508) Registration reminder Randy Marchany (Feb 20)
Re: Connectivity problems with the US Army Randy Marchany (Jan 19)

Raw, Randy

SANS 504 Hacker Techniques,Exploits & Incident Handling class June 18-23, 2007 Raw, Randy (Mar 19)
SANS 505 Securing Windows class July 16-21, 2007 sponsored by MOREnet Raw, Randy (Mar 19)
Re: Untrusted VLANs on Core Gear Raw, Randy (Feb 08)

Ray Bruder

HD destruction Ray Bruder (Mar 15)

Richard Gadsden

Re: Proximity Authentication Richard Gadsden (Mar 23)

Rick Coloccia

Re: return to service fee Rick Coloccia (Feb 06)
Re: Software for Tracking Security Incidents Rick Coloccia (Mar 28)

RL Vaughn

Re: "Yay" Malware RL Vaughn (Jan 12)
Re: passworded screen savers with timeouts, do you enforce? RL Vaughn (Jan 09)
Re: "Yay" Malware RL Vaughn (Jan 11)
Re: "Yay" Malware RL Vaughn (Jan 12)

Robert Riley

enterprise vulnerability scanning Robert Riley (Jan 26)
vista KMS security Robert Riley (Feb 15)

Rob Tanner

ipsCA and free .edu certs Rob Tanner (Feb 13)

Rob Whalen

Re: ipsCA and free .edu certs Rob Whalen (Feb 16)

Rodney Petersen

Re: Business Continuity Plans for an Information Security Office Rodney Petersen (Jan 09)
Important Announcement on CALEA Reporting Rodney Petersen (Jan 04)
Establishing Program Committee for Security 2008 Rodney Petersen (Jan 25)
Higher Ed Business Continuity Discussion List Rodney Petersen (Jan 03)

Roger Safian

Re: spam return address backlash Roger Safian (Jan 11)
spam return address backlash Roger Safian (Jan 09)
Re: Ongoing Port 6000 attacks, Windows Xserver Compromises, keyloggers Roger Safian (Jan 24)
Re: spam return address backlash Roger Safian (Jan 11)
Re: pointsec vs. Guardian Edge Roger Safian (Jan 12)
Re: pointsec vs. Guardian Edge Roger Safian (Jan 12)
Security Duty Roger Safian (Mar 20)
Re: Extremely High Spam Statistics Roger Safian (Feb 13)
Re: HD destruction Roger Safian (Mar 15)
Re: spam return address backlash Roger Safian (Jan 11)
Re: Extremely High Spam Statistics Roger Safian (Feb 13)
Security Duty Roger Safian (Mar 20)
Re: PCI Compliance Roger Safian (Mar 23)

Ronnie Jefferson

Re: New VA FISMA Requirements for PIs in Research Institutions Ronnie Jefferson (Mar 12)

Russell Fulton

Re: Network access control Russell Fulton (Jan 25)
Re: SYSADM and Security Russell Fulton (Jan 03)
Re: Network access control Russell Fulton (Jan 21)
Re: SYSADM and Security Russell Fulton (Jan 06)
Re: Administrative password management Russell Fulton (Jan 30)
Re: spam return address backlash Russell Fulton (Jan 12)
Re: Remote Terminal Services / SharePoint Servers Russell Fulton (Jan 11)
Re: UDP Port scans Russell Fulton (Feb 02)
Re: spam return address backlash Russell Fulton (Jan 09)
Re: Network access control Russell Fulton (Jan 21)
Re: UDP Port scans Russell Fulton (Feb 02)
Re: spam return address backlash Russell Fulton (Jan 10)

Sadler, Connie

Re: Laptop Encryption Software Sadler, Connie (Mar 05)
New VA FISMA Requirements for PIs in Research Institutions Sadler, Connie (Mar 12)

Samuel Liles

Re: Connectivity problems with the US Army Samuel Liles (Jan 19)

Samuel Young

Re: return to service fee Samuel Young (Feb 07)

Schmidt, Eric W

Re: pointsec vs. Guardian Edge Schmidt, Eric W (Jan 16)

Scott Fendley

Re: "Yay" Malware Scott Fendley (Jan 11)

scott hollatz

Re: Data in SYN Packets scott hollatz (Mar 26)
Re: Data in SYN Packets scott hollatz (Mar 27)

Sherry Callahan

SANS EDU at the University of Kansas Sherry Callahan (Jan 23)
SANS-EDU Hacker Techniques (SEC 504) at University of Kansas Sherry Callahan (Feb 21)

Shirley Payne

Confidential/Sensitive Data Handling Blueprint Now Available Shirley Payne (Jan 19)

Solomon Asmelash

Re: pointsec vs. Guardian Edge Solomon Asmelash (Jan 12)

St Clair, Jim

Re: New VA FISMA Requirements for PIs in Research Institutions St Clair, Jim (Mar 13)

Stephen G. Lotho

Re: Patch management Stephen G. Lotho (Mar 29)

Steve Brukbacher

pointsec vs. Guardian Edge Steve Brukbacher (Jan 12)
Re: pointsec vs. Guardian Edge Steve Brukbacher (Jan 19)
Re: Looking for a laptop encryption policy for institutionally-owned laptops Steve Brukbacher (Mar 22)
Re: pointsec vs. Guardian Edge Steve Brukbacher (Jan 13)
Re: Software for Tracking Security Incidents Steve Brukbacher (Mar 28)
Re: Web application security scanners Steve Brukbacher (Jan 18)

Steve Devoti

Re: Authorizing password changes in a health science center Steve Devoti (Feb 13)

Steve Olshansky

Internet2 Salsa-FWNA Visitor Access Survey Steve Olshansky (Mar 19)

Steve Worona

Re: Use of Partial SSN as Authenticator Steve Worona (Feb 22)

Tammy Clark

Security Professionals Conference 2007 - Denver, CO April 10-12 Tammy Clark (Jan 29)

Theresa M Rowe

Re: PCI Compliance for external e-commerce vendors Theresa M Rowe (Feb 13)
Re: SYSADM and Security Theresa M Rowe (Jan 03)
PCI Compliance Theresa M Rowe (Mar 22)

Tim Lane

Re: Extremely High Spam Statistics Tim Lane (Feb 13)
Anyone Using Ironport Anti-Spam? Tim Lane (Mar 04)
Using Reverse Proxies Tim Lane (Feb 18)
"Yay" Malware Tim Lane (Jan 11)
Extremely High Spam Statistics Tim Lane (Feb 12)

Tina Darmohray

Re: Patch management Tina Darmohray (Mar 30)

Tom Davis

Re: Public Machines Tom Davis (Feb 05)

Tom Siu

return to service fee Tom Siu (Feb 06)
Re: return to service fee Tom Siu (Feb 16)

Valdis Kletnieks

Re: vista KMS security Valdis Kletnieks (Mar 05)
Re: Firewall Question Valdis Kletnieks (Jan 17)
Re: Ongoing Port 6000 attacks, Windows Xserver Compromises, keyloggers Valdis Kletnieks (Jan 25)
Re: Data in SYN Packets Valdis Kletnieks (Mar 26)
Re: Active-X Valdis Kletnieks (Jan 22)
Re: Laptop Encryption Software Valdis Kletnieks (Mar 05)

Vicky Walker

Re: SURVEY: Research Institutions / Border Firewalls Vicky Walker (Feb 13)

Vuong Phung

Re: ipsCA and free .edu certs Vuong Phung (Feb 13)
Re: Remote Terminal Services / SharePoint Servers Vuong Phung (Jan 11)

Waller, Michael A. (HSC)

Re: passworded screen savers with timeouts, do you enforce? Waller, Michael A. (HSC) (Jan 08)

Walter E. Petruska

Re: NAC devices - opinions sought Walter E. Petruska (Feb 19)
Re: Laptop Encryption Software Walter E. Petruska (Feb 28)
Re: Extremely High Spam Statistics Walter E. Petruska (Feb 12)

Warren Petrofsky

Ongoing Port 6000 attacks, Windows Xserver Compromises, keyloggers Warren Petrofsky (Jan 24)
Re: Ongoing Port 6000 attacks, Windows Xserver Compromises, keyloggers Warren Petrofsky (Jan 24)

Wes Young

Re: Network access control Wes Young (Jan 21)
Re: Network access control Wes Young (Jan 21)
[OT] Incident / Problem management Wes Young (Mar 14)
Re: Log management Wes Young (Feb 01)
Re: Ongoing Port 6000 attacks, Windows Xserver Compromises, keyloggers Wes Young (Jan 24)

William Custer

Survey Software / Security Standards or Procedures William Custer (Jan 18)

Winders, Timothy A

Re: ipsCA and free .edu certs Winders, Timothy A (Feb 13)

Wood, Anne M (wood)

Campus Mobility Initiative Wood, Anne M (wood) (Mar 12)