Educause Security Discussion: by author

552 messages starting Jul 14 04 and ending Jul 22 04
Date index | Thread index | Author index


Aaron Wade

Re: MS Patches Aaron Wade (Jul 14)
Re: Group Policy Object recommendations - newly migrating to AD Aaron Wade (Jul 09)

Acunis, Norm

Re: Mixed Messages about SP2 Acunis, Norm (Jul 19)

Adam Goldstein

Re: Identifying Gaobot/Korgo Botnet Drones Adam Goldstein (Jul 13)

Alan Amesbury

Re: Password Cracking & Consequences Alan Amesbury (Aug 26)

Albert Vasquez

Re: Secure File Transfers: server side? Albert Vasquez (Jul 07)

Andrew Atwell

IIS 6.0 Andrew Atwell (Sep 29)

Andrew Watson

Re: Ph0t0Sh0p.exe Andrew Watson (Sep 15)
Ph0t0Sh0p.exe Andrew Watson (Sep 13)

Andy Freed

Re: Pop-up Prevention Andy Freed (Jul 14)

Andy Weisskopf

Re: What should be done with old RAID 5 sets? Andy Weisskopf (Aug 27)

Angel L Cruz

Re: HIPAA Assessments and Network Access Angel L Cruz (Jul 29)

Ariel Silverstone

Response to WinXP SP2 Ariel Silverstone (Aug 27)
SP2 Hotfix Ariel Silverstone (Aug 17)
Re: SP2 Information and New Listserv Ariel Silverstone (Aug 11)
Re: Pop up blockers caveat Ariel Silverstone (Jul 15)
Re: Pop-up Prevention Ariel Silverstone (Jul 14)
Wireless sniffer Ariel Silverstone (Jul 23)
MS Patches Ariel Silverstone (Jul 13)
Re: Security-Related Sessions at EDUCAUSE 2004 Ariel Silverstone (Sep 16)
Re: Help with buying domain name through escrow.com Ariel Silverstone (Jul 23)
New Netscape Vulnerability? Ariel Silverstone (Sep 20)

Arlene Yetnikoff

Re: Student paper "editorial" on robust passwords Arlene Yetnikoff (Sep 23)

Barros, Jacob

User authentication through Microsoft ISA Sever for OWA Barros, Jacob (Jul 22)
FormMail on web server Barros, Jacob (Aug 10)

Ben Sookying

Re: HIPAA Assessments and Network Access Ben Sookying (Jul 29)

Berbeco, Robert W

Re: Win2003 Server, IPSEC & HackerDefender Berbeco, Robert W (Aug 10)
Re: Pop-up Prevention Berbeco, Robert W (Jul 15)

Bielawa, David

Re: Bot DDOS at 10 AM Bielawa, David (Sep 08)

Bill Frazier

Re: 15 character minimum passwords Bill Frazier (Jul 09)
Re: 15 character minimum passwords Bill Frazier (Jul 09)
Re: WSJ.com - Stop the Music! Bill Frazier (Aug 23)
Re: FW: MS Critical Updates and client management Bill Frazier (Jul 16)

Bill Kyle

Hardware tokens for remote access authentication Bill Kyle (Jul 07)

Bob Gerdes

Re: Vulnerability Scanning Bob Gerdes (Aug 30)

Bob Kalal

Re: Email for retired faculty Bob Kalal (Jul 02)
Re: HIPAA Assessments and Network Access Bob Kalal (Jul 28)

Bob Kehr

Re: Laptops on Active Directory Bob Kehr (Sep 20)

Bob Mahoney

Re: Drafting a confidentiality statement for student employees Bob Mahoney (Jul 26)
Re: [unisog] Incident Response Procedures Bob Mahoney (Jul 22)

Bob Smith

Re: Acacia Lawsuit Bob Smith (Aug 03)

Brent

Re: IIS 6.0 Brent (Sep 29)

Brent Sweeny

Re: FW: Checklist for securing Windows XP systems Brent Sweeny (Jul 29)

Brian Eckman

Re: Win2003 Server, IPSEC & HackerDefender Brian Eckman (Aug 10)
Re: Password Cracking & Consequences Brian Eckman (Aug 29)
Re: IRC, IM Proxy Implementations Brian Eckman (Sep 03)
Re: Bot DDOS at 10 AM Brian Eckman (Sep 08)

Brian Reilly

Re: Email for retired faculty Brian Reilly (Jul 01)
Re: Data classification Brian Reilly (Jul 12)
Re: smtp auth (was Re: the importance of security) Brian Reilly (Aug 17)
[Job] Network Security Analyst / Georgetown University / Washington, DC Brian Reilly (Aug 30)

Bruhn, Mark S.

Re: Security Awareness - Back to School, Resources, & October Events Bruhn, Mark S. (Aug 30)
Security Education and Awareness Materials -- Solicitation! Bruhn, Mark S. (Jul 22)
Disaster Recovery Bruhn, Mark S. (Aug 31)
Re: Mandating format/reinstall after compromise Bruhn, Mark S. (Sep 09)
Security Awareness Day...err...Month Bruhn, Mark S. (Sep 29)
Re: WSJ.com - Stop the Music! Bruhn, Mark S. (Aug 23)
Re: Data classification Bruhn, Mark S. (Jul 12)
Re: Mandating format/reinstall... Bruhn, Mark S. (Sep 10)
Re: WSJ.com - Stop the Music! Bruhn, Mark S. (Aug 23)
October 31, 2004, is Cyber Security Day Bruhn, Mark S. (Sep 28)
Re: Data classification Bruhn, Mark S. (Jul 12)
Re: mailinglist etiquette Re: WSJ.com - Stop the Music! Bruhn, Mark S. (Aug 23)

Buz Dale

Re: the importance of security Buz Dale (Aug 11)
Re: 15 character minimum passwords Buz Dale (Jul 09)
Re: WS_FTP LE & Secure File Transfers Buz Dale (Jul 06)
Re: Secure protocols Buz Dale (Jul 20)

Cal Frye

Re: blocking .ZIP attachments Cal Frye (Aug 20)
Re: the importance of security Cal Frye (Aug 11)
Re: Password Cracking & Consequences Cal Frye (Aug 28)

Cam Beasley, ISO

Identifying Gaobot/Korgo Botnet Drones Cam Beasley, ISO (Jul 11)
SIG Bagle/Beagle Cam Beasley, ISO (Jul 19)
Re: Port 65531 Remote Command Prompt Cam Beasley, ISO (Aug 31)

CAROLE CARMODY

Re: Password Cracking & Consequences CAROLE CARMODY (Aug 26)

Casto, Bryan J

Re: Mixed Messages about SP2 Casto, Bryan J (Jul 19)
Re: Mixed Messages about SP2 Casto, Bryan J (Jul 16)

Chad McDonald

FW: MS Critical Updates and client management Chad McDonald (Jul 16)
Laptops on Active Directory Chad McDonald (Sep 20)

chris Allison

Re: TippingPoint and Cisco IDSM2 IPS offerings (cross-posted to NETMAN) chris Allison (Aug 29)

Christian Wilson

Re: Password Cracking & Consequences Christian Wilson (Aug 27)
Re: Password Cracking & Consequences Christian Wilson (Aug 27)

Christopher Condie

Re: Internet Explorer Christopher Condie (Jul 19)

Christopher E. Cramer

Re: Drafting a confidentiality statement for student employees Christopher E. Cramer (Jul 26)
Re: critical Microsoft fix for download.ject Christopher E. Cramer (Jul 02)

Christopher Misra

Re: Checking for AV software on students' machines Christopher Misra (Sep 17)
Strategies for Automating Network Policy Enforcement white paper available Christopher Misra (Aug 19)

Clonts, Neal D. (HSC)

Re: Firewalls and Research Clonts, Neal D. (HSC) (Sep 29)
Re: Firewalls and Research Clonts, Neal D. (HSC) (Sep 29)
Re: Firewalls and Research Clonts, Neal D. (HSC) (Sep 29)

Clyde Hoadley

What should be done with old RAID 5 sets? Clyde Hoadley (Aug 27)
Re: Incident Response Procedures Clyde Hoadley (Jul 21)
Re: kraes.dll Clyde Hoadley (Jul 21)
Re: What should be done with old RAID 5 sets? Clyde Hoadley (Aug 27)

Craig Blaha

Re: new virus? Craig Blaha (Sep 28)
new virus? Craig Blaha (Sep 28)
Re: IRC, IM Proxy Implementations Craig Blaha (Sep 02)
interesting article Craig Blaha (Sep 22)
spam from spoofed address Craig Blaha (Aug 11)

Crawford, Charles D

Infected Bot machines Crawford, Charles D (Aug 30)

Daniel Adinolfi

Re: IRC, IM Proxy Implementations - Cornell Daniel Adinolfi (Sep 07)
Re: IRC, IM Proxy Implementations Daniel Adinolfi (Sep 08)
Re: Vulnerability Scanning Daniel Adinolfi (Aug 30)

Daniel Hay

Re: Vulnerability Scanning Daniel Hay (Sep 08)

Danny Lee

Re: [ICPL] Electronic Signatures Danny Lee (Sep 03)
Re: Win2003 Server, IPSEC & HackerDefender Danny Lee (Aug 10)

Dan Roberts

Re: Secure File Transfers: server side? Dan Roberts (Jul 08)

Dan Updegrove

Student paper "editorial" on robust passwords Dan Updegrove (Sep 23)
Re: Screening of visitor and transient systems Dan Updegrove (Sep 20)

Dave Koontz

Re: blocking .ZIP attachments Dave Koontz (Aug 19)

Dave Monnier

Re: Scanning from source port 53 Dave Monnier (Sep 09)
Re: dictionary attacks against root Dave Monnier (Aug 22)

Dave Monnier, IT Security Office, Indiana University

Re: IRC, IM Proxy Implementations Dave Monnier, IT Security Office, Indiana University (Sep 02)
Re: Secure protocols Dave Monnier, IT Security Office, Indiana University (Jul 20)
Re: IRC, IM Proxy Implementations Dave Monnier, IT Security Office, Indiana University (Sep 02)
Re: IRC, IM Proxy Implementations Dave Monnier, IT Security Office, Indiana University (Sep 02)
Re: IRC, IM Proxy Implementations Dave Monnier, IT Security Office, Indiana University (Sep 03)
Re: IRC, IM Proxy Implementations Dave Monnier, IT Security Office, Indiana University (Sep 03)

David Dewire

Re: MS Critical Updates and client management David Dewire (Jul 19)

David L. Wasley

Re: Student paper "editorial" on robust passwords David L. Wasley (Sep 24)

David Taylor

Port 65531 Remote Command Prompt David Taylor (Aug 31)

David Wall @ Yozons, Inc.

Re: Student paper "editorial" on robust passwords David Wall @ Yozons, Inc. (Sep 23)
Re: 15 character minimum passwords David Wall @ Yozons, Inc. (Jul 08)
Re: Student paper "editorial" on robust passwords David Wall @ Yozons, Inc. (Sep 23)

Davina Pruitt-Mentle

Re: Last Call - Security Awareness Resources Davina Pruitt-Mentle (Sep 28)

Davis, Thomas R.

Re: blocking .ZIP attachments Davis, Thomas R. (Aug 20)
Re: Password Cracking & Consequences Davis, Thomas R. (Aug 27)

Dennis Meharchand, CEO Valt.x

Re: spam from spoofed address Dennis Meharchand, CEO Valt.x (Aug 11)

Dennis Vich

Re: Help with buying domain name through escrow.com Dennis Vich (Jul 23)

Derek Spransy

Re: Mixed Messages about SP2 Derek Spransy (Jul 19)

Dewitt Latimer

Re: the importance of security Dewitt Latimer (Aug 11)
Re: smtp auth (was Re: the importance of security) Dewitt Latimer (Aug 16)

Diana Orrick

Re: interesting article Diana Orrick (Sep 22)

Dick Jacobson

Re: Handling flood of returned e-mail messages due to spam with forged sender address Dick Jacobson (Aug 17)

dodpears

22 botnet servers dodpears (Aug 23)
dictionary attacks against root dodpears (Aug 22)

Doug Pearson

7 new ssh scanners Doug Pearson (Aug 25)
Re: new outbreak of Slammer? Doug Pearson (Aug 25)
increase in TCP 4662? Doug Pearson (Aug 25)
sync'd TCP 1023, 5554, and 9898 scanning from Asia Pacific Doug Pearson (Aug 19)
critical Microsoft fix for download.ject Doug Pearson (Jul 02)
FW: Joint DHS/FBI Memorandum: Suspicious Activity Reporting Criteria for Infrastructure Owners and Operators, dated: 03 Aug 04 Doug Pearson (Aug 04)
Re: New Netscape Vulnerability? Doug Pearson (Sep 20)
Botnet #b4u-movies Doug Pearson (Aug 19)

Doug Sandford

Acacia Lawsuit Doug Sandford (Aug 03)
Acacia Lawsuit Doug Sandford (Aug 03)
Pop up blockers caveat Doug Sandford (Jul 15)
G-Mail Blocking Doug Sandford (Jul 01)
Re: Pop up blockers caveat Doug Sandford (Jul 15)
HIPAA Assessments and Network Access Doug Sandford (Jul 28)

Drews, Jane E

Re: October 31, 2004, is Cyber Security Day Drews, Jane E (Sep 29)

Ed Gregory

IT Security Strategic Plan ( -Reply) Ed Gregory (Aug 15)

Edward Chase

Re: Email for retired faculty Edward Chase (Jul 01)
kraes.dll Edward Chase (Jul 21)

Edwards, Francis

Re: Spyware, trojans and keyboard loggers? Edwards, Francis (Jul 26)

Eric Pancer

Re: Firewalls and Research Eric Pancer (Sep 29)
Re: Password Cracking & Consequences Eric Pancer (Aug 26)
Re: Password Cracking & Consequences Eric Pancer (Aug 27)
Re: Pop-up Prevention Eric Pancer (Jul 13)
Re: Vulnerability Scanning Eric Pancer (Aug 30)
Re: Incident Response Procedures Eric Pancer (Jul 21)
Re: Internet Explorer Eric Pancer (Jul 16)
Re: IRC, IM Proxy Implementations Eric Pancer (Sep 08)
Re: dictionary attacks against root Eric Pancer (Aug 21)
Re: 15 character minimum passwords Eric Pancer (Jul 08)
Re: libpng vulnerabilities - US-CERT Technical Cyber Security Alert TA04-217A Eric Pancer (Aug 06)

Eric Van Wiltenburg

Re: TippingPoint and Cisco IDSM2 IPS offerings (cross-posted to NETMAN) Eric Van Wiltenburg (Aug 30)

Faigle, Chris

UofRMachineCheck 1.0.5.1 available Faigle, Chris (Jul 19)
UofRMachineCheck 1.0.3.1 available Faigle, Chris (Jul 01)
Re: Checking for AV software on students' machines Faigle, Chris (Sep 16)
FW: [Full-Disclosure] MS04-028 Jpeg EXPLOIT with Reverse and Bind shell ... Faigle, Chris (Sep 25)
VirusLogger 1.10 - Symantec AV Corp. Ed. Virus Log Mailer Faigle, Chris (Aug 16)
MS04-028 POC Exploit Code [GDI+] Faigle, Chris (Sep 22)
Immediate Logoff after Login Issue [XP][Symantec Corp. 9.0][Adware.Blazefind] Faigle, Chris (Sep 13)

F.L.Ferreri

Re: blocking .ZIP attachments F.L.Ferreri (Aug 20)

Gaby

Re: Ph0t0Sh0p.exe Gaby (Sep 14)

Galloway, Dan

Current State Legislation on Cyber Security Attacks Galloway, Dan (Sep 01)

Gary Dobbins

Re: 15 character minimum passwords Gary Dobbins (Jul 09)
SEVIS system defenses Gary Dobbins (Aug 25)
P-Synch experiences Gary Dobbins (Aug 23)
Re: week-long DDoS problem Gary Dobbins (Aug 03)
week-long DDoS problem Gary Dobbins (Aug 02)

Gary Flynn

Re: Handling flood of returned e-mail messages due to spam with forged sender address Gary Flynn (Aug 17)
Re: Password Cracking & Consequences Gary Flynn (Aug 27)
Re: Password Cracking & Consequences Gary Flynn (Aug 27)
Re: IRC, IM Proxy Implementations Gary Flynn (Sep 08)
Annual password discussion was Re: 15 character minimum passwords Gary Flynn (Jul 09)
Re: IRC, IM Proxy Implementations Gary Flynn (Sep 08)
Re: Pop-up Prevention Gary Flynn (Jul 21)
Re: 15 character minimum passwords Gary Flynn (Jul 09)
Re: Password Cracking & Consequences Gary Flynn (Aug 27)
Re: Spyware, trojans and keyboard loggers? Gary Flynn (Jul 26)
Re: 15 character minimum passwords Gary Flynn (Jul 09)
Re: the importance of security Gary Flynn (Aug 11)
Re: new virus? Gary Flynn (Sep 28)
Handling flood of returned e-mail messages due to spam with forged sender address Gary Flynn (Aug 16)
Re: critical Microsoft fix for download.ject Gary Flynn (Jul 02)
Mandating format/reinstall after compromise Gary Flynn (Sep 08)
Re: IRC, IM Proxy Implementations Gary Flynn (Sep 02)
Re: the importance of security Gary Flynn (Aug 11)
Re: Data classification Gary Flynn (Jul 12)
Re: blocking .ZIP attachments Gary Flynn (Aug 19)
Network Access Control Change Control Gary Flynn (Sep 01)
Re: 15 character minimum passwords Gary Flynn (Jul 09)
Re: IRC, IM Proxy Implementations Gary Flynn (Sep 03)
Re: Password Cracking & Consequences Gary Flynn (Aug 27)
Re: Password Cracking & Consequences Gary Flynn (Aug 27)
Re: Password Cracking & Consequences Gary Flynn (Aug 27)
Re: Password Cracking & Consequences Gary Flynn (Aug 27)
Re: IRC, IM Proxy Implementations Gary Flynn (Sep 02)

Gene Spafford

Two articles about open vs. proprietary source (2nd round) Gene Spafford (Sep 20)
Two articles about open vs. proprietary source Gene Spafford (Sep 20)
Free secure programming instructional materials Gene Spafford (Sep 20)
Assist the PITAC? Gene Spafford (Aug 23)

Geoff Nathan

Re: Password Cracking & Consequences Geoff Nathan (Aug 26)

Gibbs, Aaron M.

Re: Pop-up Prevention Gibbs, Aaron M. (Jul 21)
Re: Checking for AV software on students' machines Gibbs, Aaron M. (Sep 16)
Pop-up Prevention Gibbs, Aaron M. (Jul 14)
Network Security Audit Gibbs, Aaron M. (Sep 30)
Re: WSJ.com - Stop the Music! Gibbs, Aaron M. (Aug 25)

Gideon T. Rasmussen, CISSP, CISM, CFSO, SCSA

Implementing Information Security: Risks vs. Cost Gideon T. Rasmussen, CISSP, CISM, CFSO, SCSA (Jul 29)
Fwd: SeeWhatYouShare.com Gideon T. Rasmussen, CISSP, CISM, CFSO, SCSA (Jul 28)

Gordon D. Wishon

Re: Student paper "editorial" on robust passwords Gordon D. Wishon (Sep 23)

Greg Francis

Re: Mixed Messages about SP2 Greg Francis (Jul 16)

Greg Jackson

Re: 15 character minimum passwords Greg Jackson (Jul 09)

Harold A'Hole

Re: [ICPL] Electronic Signatures Harold A'Hole (Sep 03)

Hearn, David L.

IRC, IM Proxy Implementations Hearn, David L. (Sep 02)
Re: IRC, IM Proxy Implementations Hearn, David L. (Sep 08)

Hedrick, Gregory W

Re: Data classification Hedrick, Gregory W (Jul 12)

Herrera Reyna Omar

Re: sync'd TCP 1023, 5554, and 9898 scanning from Asia Pacific Herrera Reyna Omar (Aug 19)
Re: IRC, IM Proxy Implementations Herrera Reyna Omar (Sep 08)

H. Morrow Long

Re: Agreements w/ Napster, iTunes, RealNetworks, etc. H. Morrow Long (Aug 31)
Re: IRC, IM Proxy Implementations H. Morrow Long (Sep 02)
Re: IRC, IM Proxy Implementations H. Morrow Long (Sep 08)
USA Today 9/8: Are hackers using your PC to spew spam and steal? H. Morrow Long (Sep 08)
Re: IRC, IM Proxy Implementations H. Morrow Long (Sep 03)
Re: IRC, IM Proxy Implementations H. Morrow Long (Sep 08)
Re: Wireless sniffer H. Morrow Long (Jul 23)
Re: New Netscape Vulnerability? H. Morrow Long (Sep 20)

Howell, Paul

Re: October 31, 2004, is Cyber Security Day Howell, Paul (Sep 28)

Info

Re: [ICPL] Electronic Signatures Info (Sep 03)
[no subject] Info (Aug 11)
Re: RFP for formal IT security audit? Info (Sep 02)
Re: Vulnerability Scanning Info (Aug 30)

infoSec UGA eMail

XP + SP2 + F-Secure AV/FW/IDS question infoSec UGA eMail (Sep 15)

jack suess

Re: Screening of visitor and transient systems jack suess (Sep 19)
Re: Security Assessment Jack Suess (Jul 28)
Re: new virus? jack suess (Sep 28)

James Moore

Re: [ICPL] Electronic Signatures James Moore (Sep 03)
Drafting a confidentiality statement for student employees James Moore (Jul 26)
Understanding the security implications of SAKAI? James Moore (Sep 15)
Security Program Development / Staffing survey - Brief James Moore (Aug 30)
Spyware, trojans and keyboard loggers? James Moore (Jul 26)
Re: Security Program Development / Staffing survey - Not social engineering. James Moore (Aug 30)

James Riden

Re: Password Cracking & Consequences James Riden (Aug 26)
Re: Password Cracking & Consequences James Riden (Aug 26)
Re: Password Cracking & Consequences James Riden (Aug 26)

Jamie Aiello

Re: important Cisco security advisory Jamie Aiello (Aug 27)

Jason Brooks

Password Cracking & Consequences Jason Brooks (Aug 26)
Incident Response Procedures Jason Brooks (Jul 21)

Jason Richardson

Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Jason Richardson (Aug 31)
Re: Pop-up Prevention Jason Richardson (Jul 14)
Re: Password Cracking & Consequences Jason Richardson (Aug 26)
Re: blocking .ZIP attachments Jason Richardson (Aug 19)
Re: Internet Explorer Jason Richardson (Jul 16)

Jeff

RFP for formal IT security audit? Jeff (Sep 02)

Jeff Bollinger

Re: WS_FTP LE & Secure File Transfers Jeff Bollinger (Jul 06)
Re: Pop up blockers caveat Jeff Bollinger (Jul 15)
Re: Wireless sniffer Jeff Bollinger (Jul 23)

Jefferson, Ronnie V.

Re: Information Security Article by JMU's President Linwood Rose Jefferson, Ronnie V. (Sep 01)
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Jefferson, Ronnie V. (Sep 02)
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Jefferson, Ronnie V. (Aug 31)
Re: WSJ.com - Stop the Music! Jefferson, Ronnie V. (Aug 23)

Jeff Giacobbe

Re: Pop-up Prevention Jeff Giacobbe (Jul 14)
Re: Pop-up Prevention Jeff Giacobbe (Jul 22)
Re: Password Cracking & Consequences Jeff Giacobbe (Aug 26)

Jeff Kell

Re: Mixed Messages about SP2 Jeff Kell (Jul 16)

Jeffrey I. Schiller

Re: blocking .ZIP attachments Jeffrey I. Schiller (Aug 20)

Jeni Li

Re: Help with buying domain name through escrow.com Jeni Li (Jul 23)

Jenny Gluck

Re: blocking .ZIP attachments Jenny Gluck (Aug 20)

Jere Retzer

Re: WSJ.com - Stop the Music! Jere Retzer (Aug 23)
Re: IT Security Strategic Plan Jere Retzer (Aug 16)
Re: Password Cracking & Consequences Jere Retzer (Aug 28)
Re: WSJ.com - Stop the Music! Jere Retzer (Aug 23)
Re: Two articles about open vs. proprietary source ( 2nd round) Jere Retzer (Sep 21)
mailinglist etiquette Re: WSJ.com - Stop the Music! Jere Retzer (Aug 23)
CAcert Jere Retzer (Jul 19)
WSJ.com - Stop the Music! Jere Retzer (Aug 23)
Re: the importance of security Jere Retzer (Aug 11)
Re: the importance of security Jere Retzer (Aug 11)
Re: Firewalls and Research Jere Retzer (Sep 29)
Re: Secure protocols Jere Retzer (Jul 19)

Jim Bollinger

Bot DDOS at 10 AM Jim Bollinger (Sep 08)
Re: Mixed Messages about SP2 Jim Bollinger (Jul 19)
Re: blocking .ZIP attachments Jim Bollinger (Aug 20)
Re: Bot DDOS at 10 AM Jim Bollinger (Sep 08)

Jim Loter

Re: Secure protocols Jim Loter (Jul 19)
Re: 15 character minimum passwords Jim Loter (Jul 09)

Joe St Sauver

Re: Policies re: hosting/managing domains Joe St Sauver (Jul 10)
Re: Current State Legislation on Cyber Security Attacks Joe St Sauver (Sep 01)

John C Borne

blocking .ZIP attachments John C Borne (Aug 19)
Re: blocking .ZIP attachments John C Borne (Aug 19)

John Kristoff

Re: IRC, IM Proxy Implementations John Kristoff (Sep 03)
Re: IRC, IM Proxy Implementations John Kristoff (Sep 03)

Jon Mitchiner

Re: Pop-up Prevention Jon Mitchiner (Jul 14)
Re: the importance of security Jon Mitchiner (Aug 11)
Re: the importance of security Jon Mitchiner (Aug 11)

Jordan Wiens

Re: G-Mail Blocking Jordan Wiens (Jul 01)
Re: Wireless sniffer Jordan Wiens (Jul 23)
Re: critical Microsoft fix for download.ject Jordan Wiens (Jul 02)
Re: keyboard logger? Jordan Wiens (Jul 21)
Re: WSJ.com - Stop the Music! Jordan Wiens (Aug 23)

Joseph Karam

RSA Conference? Joseph Karam (Sep 28)

Joshua Brown

(no subject) Joshua Brown (Aug 27)

Julia Allen

Re: Research on Security Critical Success Factors Julia Allen (Jul 27)
Re: Research on Security Critical Success Factors Julia Allen (Jul 27)
Re: Information Security Article by JMU's President Linwood Rose Julia Allen (Sep 01)
Re: Incident Response Procedures Julia Allen (Jul 22)

Justin Azoff

Re: IRC, IM Proxy Implementations Justin Azoff (Sep 08)
Re: IRC, IM Proxy Implementations Justin Azoff (Sep 08)
Re: IRC, IM Proxy Implementations Justin Azoff (Sep 03)
Re: IRC, IM Proxy Implementations Justin Azoff (Sep 03)
Re: Password Cracking & Consequences Justin Azoff (Aug 27)
Re: IRC, IM Proxy Implementations Justin Azoff (Sep 03)
Re: 7 new ssh scanners Justin Azoff (Aug 26)
Re: Password Cracking & Consequences Justin Azoff (Aug 27)

Kathy Bergsma

Re: security engineer position available at UF Kathy Bergsma (Jul 02)

Kay Sommers

Re: Mixed Messages about SP2 Kay Sommers (Jul 19)
Re: Infected?? Kay Sommers (Sep 21)

Ken Shaurette

Checklist -- Hardening user passwords Ken Shaurette (Sep 07)
FW: Checklist for securing Windows XP systems Ken Shaurette (Jul 29)
Re: keyboard logger? Ken Shaurette (Jul 21)
Re: User Self Service Password Resets Ken Shaurette (Sep 16)
Incident Response Ken Shaurette (Jul 22)
Re: Password Cracking & Consequences Ken Shaurette (Aug 26)

Kevin Shalla

Re: Student paper "editorial" on robust passwords Kevin Shalla (Sep 24)
smtp auth (was Re: the importance of security) Kevin Shalla (Aug 16)

Killian, Thomas

Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Killian, Thomas (Aug 31)

King, Dennis C.

Re: [ICPL] Electronic Signatures King, Dennis C. (Sep 05)

Kowal, Michael

Metaframe firewall location Kowal, Michael (Sep 03)

Lanita

Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Lanita (Aug 31)

Laura A. Pokalsky

Re: kraes.dll Laura A. Pokalsky (Jul 22)

Leslie Maltz

Re: 15 character minimum passwords Leslie Maltz (Jul 09)

Leslie Rankin

Re: October 31, 2004, is Cyber Security Day Leslie Rankin (Sep 28)

Liudvikas Bukys

Re: Understanding the security implications of SAKAI? Liudvikas Bukys (Sep 15)

Lois Lehman

Previous Thread on Increased Probes Lois Lehman (Jul 23)
Scanning from source port 53 Lois Lehman (Sep 09)
Re: Security Awareness - Back to School, Resources, & October Events Lois Lehman (Aug 27)
Re: 7 new ssh scanners Lois Lehman (Aug 27)

Lucas, Bryan

Re: User Self Service Password Resets Lucas, Bryan (Sep 16)
Re: Ph0t0Sh0p.exe Lucas, Bryan (Sep 14)
Re: blocking .ZIP attachments Lucas, Bryan (Aug 20)
Re: Student paper "editorial" on robust passwords Lucas, Bryan (Sep 23)
Re: Pop up blockers caveat Lucas, Bryan (Jul 15)
Re: 15 character minimum passwords Lucas, Bryan (Jul 09)
Re: Password Cracking & Consequences Lucas, Bryan (Aug 27)
Re: Password Cracking & Consequences Lucas, Bryan (Aug 26)
Re: 15 character minimum passwords (Vacation) Lucas, Bryan (Jul 09)
Re: Password Cracking & Consequences Lucas, Bryan (Aug 27)
Re: 15 character minimum passwords Lucas, Bryan (Jul 09)
Re: 15 character minimum passwords Lucas, Bryan (Jul 08)
Re: Student paper "editorial" on robust passwords Lucas, Bryan (Sep 23)
Re: Pop-up Prevention Lucas, Bryan (Jul 14)
Re: Password Cracking & Consequences Lucas, Bryan (Aug 26)
Re: 15 character minimum passwords Lucas, Bryan (Jul 09)
Re: Checklist -- Hardening user passwords Lucas, Bryan (Sep 07)

Lutzen, Karl F.

Re: Infected Bot machines Lutzen, Karl F. (Aug 30)

Manuel Amaral

Policies re: hosting/managing domains Manuel Amaral (Jul 09)

Maria Gallagher

Re: 15 character minimum passwords (Vacation) Maria Gallagher (Jul 08)
Re: Security Awareness - Back to School, Resources,& October Events (Vacation) Maria Gallagher (Aug 24)

Mark Bauer

Re: important Cisco security advisory Mark Bauer (Aug 27)

Mark Poepping

Re: interesting article Mark Poepping (Sep 22)

Mark Wilson

Re: IRC, IM Proxy Implementations Mark Wilson (Sep 08)
Re: keyboard logger? Mark Wilson (Jul 21)
Re: IRC, IM Proxy Implementations Mark Wilson (Sep 08)
keyboard logger? Mark Wilson (Jul 21)
Here a Bot, there a Bot, everywhere... Mark Wilson (Sep 13)
Re: IRC, IM Proxy Implementations Mark Wilson (Sep 08)
Re: IRC, IM Proxy Implementations Mark Wilson (Sep 08)

Martin Schulman

Re: RFP template for security requirements Martin Schulman (Jul 01)

Mary Ann Blair

libpng vulnerabilities - US-CERT Technical Cyber Security Alert TA04-217A Mary Ann Blair (Aug 06)

Matthew Keller

Re: Vulnerability Scanning Matthew Keller (Aug 30)
Re: blocking .ZIP attachments Matthew Keller (Aug 20)
Re: 15 character minimum passwords Matthew Keller (Jul 09)
Re: smtp auth (was Re: the importance of security) Matthew Keller (Aug 16)
Re: XP + SP2 + F-Secure AV/FW/IDS question Matthew Keller (Sep 15)
Re: WS_FTP LE & Secure File Transfers Matthew Keller (Jul 06)
Re: What should be done with old RAID 5 sets? Matthew Keller (Aug 27)

Melissa Guenther

Re: Data classification Melissa Guenther (Jul 12)
Re: G-Mail Blocking Melissa Guenther (Jul 01)
Re: Data classification Melissa Guenther (Jul 12)
Re: Incident Response Procedures Melissa Guenther (Jul 21)
Re: Data classification Melissa Guenther (Jul 12)
Re: 15 character minimum passwords Melissa Guenther (Jul 09)
Re: Data classification Melissa Guenther (Jul 12)
Re: Password Cracking & Consequences Melissa Guenther (Aug 26)
Re: RSA Conference? Melissa Guenther (Sep 28)
Risk Assessments - Cyber Security Web cast--REGISTRATION NOW OPEN! Melissa Guenther (Jul 28)
Re: Data classification Melissa Guenther (Jul 12)
Re: IT Security Strategic Plan Melissa Guenther (Aug 17)

Michael Cole

Re: HIPAA Assessments and Network Access Michael Cole (Jul 28)

Michael G Carr

WS_FTP LE & Secure File Transfers Michael G Carr (Jul 06)
Secure File Transfers: server side? Michael G Carr (Jul 07)
Re: Acacia Lawsuit Michael G Carr (Aug 03)
Win2003 Server, IPSEC & HackerDefender Michael G Carr (Aug 10)
Fw: Streaming Video Acacia Media Technologies Michael G Carr (Aug 10)
Agreements w/ Napster, iTunes, RealNetworks, etc. Michael G Carr (Aug 31)

Michael_Maloney

Re: blocking .ZIP attachments Michael_Maloney (Aug 20)

Michael Mills

Re: Port 65531 Remote Command Prompt Michael Mills (Aug 31)
Re: Password Cracking & Consequences Michael Mills (Aug 27)
Re: Password Cracking & Consequences Michael Mills (Aug 27)
Re: Password Cracking & Consequences Michael Mills (Aug 27)
Re: Metaframe firewall location Michael Mills (Sep 03)
Re: Password Cracking & Consequences Michael Mills (Aug 27)
Re: Password Cracking & Consequences Michael Mills (Aug 26)
Re: Password Cracking & Consequences Michael Mills (Aug 27)
Re: Checking for AV software on students' machines Michael Mills (Sep 16)

Michelle Mueller

Re: Laptops on Active Directory Michelle Mueller (Sep 20)

Mike Austin

Re: Password Cracking & Consequences Mike Austin (Aug 27)
Re: [ICPL] Electronic Signatures Mike Austin (Sep 03)

Mike Iglesias

Re: the importance of security Mike Iglesias (Aug 11)
Re: IRC, IM Proxy Implementations Mike Iglesias (Sep 03)

Mike Porter

Re: IRC, IM Proxy Implementations Mike Porter (Sep 05)

Mike Wiseman

Re: Checking for AV software on students' machines Mike Wiseman (Sep 17)

Morrow Long

SIUE SEVIS DB incident Morrow Long (Aug 12)

Nathan Hall

Re: kraes.dll Nathan Hall (Jul 22)
Re: Checking for AV software on students' machines Nathan Hall (Sep 17)

O'Callaghan, Daniel

MS Critical Updates and client management O'Callaghan, Daniel (Jul 16)

Patrick Saeva

Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Patrick Saeva (Aug 31)

Paul Crittenden

Re: Checking for AV software on students' machines Paul Crittenden (Sep 17)

Paul Russell

Re: spam from spoofed address Paul Russell (Aug 11)
Re: the importance of security Paul Russell (Aug 11)

Peter Charbonneau

Infected?? Peter Charbonneau (Sep 21)

Prahl, Robert

Internet Explorer Prahl, Robert (Jul 16)

Ray Lombardi

Re: TippingPoint and Cisco IDSM2 IPS offerings (cross-posted to NETMAN) Ray Lombardi (Aug 29)

REN-ISAC

root & other attackers REN-ISAC (Aug 24)
24 (more) botnet C&C REN-ISAC (Aug 23)
37 ssh scanners REN-ISAC (Aug 25)
important Cisco security advisory REN-ISAC (Aug 27)

Richard Gadsden

Re: IRC, IM Proxy Implementations Richard Gadsden (Sep 08)
Re: IRC, IM Proxy Implementations Richard Gadsden (Sep 03)
Re: IRC, IM Proxy Implementations Richard Gadsden (Sep 03)
Re: IRC, IM Proxy Implementations Richard Gadsden (Sep 02)

Rich Graves

Re: 15 character minimum passwords Rich Graves (Jul 09)
Re: the importance of security Rich Graves (Aug 11)

Rick Coloccia

Re: IRC, IM Proxy Implementations Rick Coloccia (Sep 02)

Robin Jacobsen

Re: Previous Thread on Increased Probes Robin Jacobsen (Jul 23)

Rob Whalen

Re: Pop-up Prevention Rob Whalen (Jul 14)

Rodney Petersen

Back to School Student Computer Security Resources from Microsoft Rodney Petersen (Aug 11)
Please Support National Cyber Security Awareness Month Rodney Petersen (Sep 15)
Last Call - Security Awareness Resources Rodney Petersen (Sep 16)
Security Awareness - Back to School, Resources, & October Events Rodney Petersen (Aug 24)
CIS Consensus Review Process for Exchange 2003 Benchmark Rodney Petersen (Sep 13)
Information Security Article by JMU's President Linwood Rose Rodney Petersen (Aug 31)
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Rodney Petersen (Sep 02)
Re: Amended - Published Information Security Surveys Rodney Petersen (Sep 02)
SP2 Information and New Listserv Rodney Petersen (Aug 11)

Ron Parker

Re: Password Cracking & Consequences Ron Parker (Aug 26)
Re: Password Cracking & Consequences Ron Parker (Aug 30)
Re: Student paper "editorial" on robust passwords Ron Parker (Sep 23)
Re: Password Cracking & Consequences Ron Parker (Aug 26)
User Self Service Password Resets Ron Parker (Sep 16)
PSU Contact (fwd) Ron Parker (Sep 14)

Ryan Matteson

Re: Student paper "editorial" on robust passwords Ryan Matteson (Sep 23)

Sadler, Connie

Mixed Messages about SP2 Sadler, Connie (Jul 16)

Samuel Liles

Re: Security Program Development / Staffing survey - Brief Samuel Liles (Aug 30)

Schmidt, Eric W

Re: HIPAA Assessments and Network Access Schmidt, Eric W (Jul 29)
Re: HIPAA Assessments and Network Access Schmidt, Eric W (Jul 28)

Schmitt, Dianne

Incident Response Schmitt, Dianne (Jul 21)

Scott Barker

Re: blocking .ZIP attachments Scott Barker (Aug 20)

Scott Bradner

Re: Password Cracking & Consequences Scott Bradner (Aug 26)
Re: Password Cracking & Consequences Scott Bradner (Aug 26)
Re: Password Cracking & Consequences Scott Bradner (Aug 27)
15 character minimum passwords Scott Bradner (Jul 09)
Re: Password Cracking & Consequences Scott Bradner (Aug 27)
Re: WSJ.com - Stop the Music! Scott Bradner (Aug 25)
Re: 15 character minimum passwords Scott Bradner (Jul 09)
Re: Password Cracking & Consequences Scott Bradner (Aug 27)
Re: Password Cracking & Consequences Scott Bradner (Aug 26)

Scott Genung

Re: the importance of security Scott Genung (Aug 11)
the importance of security Scott Genung (Aug 11)
new outbreak of Slammer? Scott Genung (Aug 25)
Re: the importance of security Scott Genung (Aug 11)
Re: TippingPoint and Cisco IDSM2 IPS offerings (cross-posted to NETMAN) Scott Genung (Aug 29)

Scott Weeks

mailinglist etiquette Re: WSJ.com - Stop the Music! Scott Weeks (Aug 23)
Re: Password Cracking & Consequences Scott Weeks (Aug 26)
Re: Handling flood of returned e-mail messages due to spam with forged sender address Scott Weeks (Aug 16)
Re: WSJ.com - Stop the Music! Scott Weeks (Aug 23)
Re: the importance of security Scott Weeks (Aug 12)
Re: Vulnerability Scanning Scott Weeks (Aug 30)
Re: Password Cracking & Consequences Scott Weeks (Aug 26)
Re: Two articles about open vs. proprietary source Scott Weeks (Sep 20)

Sean Lanham

Re: User Self Service Password Resets Sean Lanham (Sep 16)

Shawn Kohrman

Re: Mixed Messages about SP2 Shawn Kohrman (Jul 16)

Skrdla, David

TippingPoint and Cisco IDSM2 IPS offerings (cross-posted to NETMAN) Skrdla, David (Aug 28)

Slade Griffin

Data classification Slade Griffin (Jul 12)
Firewalls and Research Slade Griffin (Sep 29)
Re: Wireless sniffer Slade Griffin (Jul 23)
Secure protocols Slade Griffin (Jul 16)

Smotherman, Brian

Re: blocking .ZIP attachments Smotherman, Brian (Aug 19)

Stephen Bernard

Re: Password Cracking & Consequences Stephen Bernard (Aug 26)

Steve Schuster

Re: Incident Response Procedures Steve Schuster (Jul 21)
Re: Win2003 Server, IPSEC & HackerDefender Steve Schuster (Aug 10)

Steve Worona

Acacia Steve Worona (Aug 09)
Re: Acacia Lawsuit Steve Worona (Aug 03)
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Steve Worona (Sep 02)

Sweeny, Jonny

Re: Password Cracking & Consequences Sweeny, Jonny (Aug 26)

Theresa M Rowe

Re: Email for retired faculty Theresa M Rowe (Jul 01)
Re: Password Cracking & Consequences Theresa M Rowe (Aug 27)
Re: the importance of security Theresa M Rowe (Aug 11)
Re: October 31, 2004, is Cyber Security Day Theresa M Rowe (Sep 28)
Re: Password Cracking & Consequences Theresa M Rowe (Aug 27)
Re: Password Cracking & Consequences Theresa M Rowe (Aug 27)
Re: Understanding the security implications of SAKAI? Theresa M Rowe (Sep 17)
Re: blocking .ZIP attachments Theresa M Rowe (Aug 20)

Theresa Rowe

Re: Acacia Lawsuit Theresa Rowe (Aug 02)

Theresa Semmens

Re: Incident Response Procedures Theresa Semmens (Jul 21)
Email for retired faculty Theresa Semmens (Jul 01)
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Theresa Semmens (Sep 02)

Tim Howard

Screening of visitor and transient systems Tim Howard (Sep 16)
Re: Incident Response Procedures Tim Howard (Jul 21)

Tim Lane

Amended - Published Information Security Surveys Tim Lane (Sep 01)
Research on Security Critical Success Factors Tim Lane (Jul 27)
Published Information Security Surveys Tim Lane (Sep 01)
Review of Security Survey Tim Lane (Sep 15)
IT Security Strategic Plan Tim Lane (Aug 15)
Help with buying domain name through escrow.com Tim Lane (Jul 22)
IT Security Strategic Plan Tim Lane (Aug 15)
Re: blocking .ZIP attachments Tim Lane (Aug 19)

Tim McGovern

Re: Mandating format/reinstall... Tim McGovern (Sep 10)

Todd Gunter

Group Policy Object recommendations - newly migrating to AD Todd Gunter (Jul 08)
15 character minimum passwords Todd Gunter (Jul 08)

Tom Gerstner

Re: kraes.dll Tom Gerstner (Jul 22)

Tom Neiss

Security Assessment Tom Neiss (Jul 28)

Tracy Mitrano

fyi: Re: Security-Related Sessions at EDUCAUSE 2004 Tracy Mitrano (Sep 17)
Re: Policies re: hosting/managing domains Tracy Mitrano (Jul 12)
Re: Response to WinXP SP2 Tracy Mitrano (Aug 27)

Valerie Vogel

Internet2 Security Briefing on "Strategies for Automating Network Policy Enforcement" -- 23 Sep 2004 Valerie Vogel (Sep 20)
Security-Related Sessions at EDUCAUSE 2004 Valerie Vogel (Sep 16)
Fall 2004 Internet2 Member Meeting Security-Related Sessions Valerie Vogel (Sep 23)

Walsh, Brian R. (Information Services)

Vulnerability Scanning Walsh, Brian R. (Information Services) (Aug 30)

Wayne J. Hauber

Re: Password Cracking & Consequences Wayne J. Hauber (Aug 26)

Wayne Wilson

Re: Password Cracking & Consequences Wayne Wilson (Aug 27)
Re: 15 character minimum passwords Wayne Wilson (Jul 09)
Re: Password Cracking & Consequences Wayne Wilson (Aug 30)
Re: Password Cracking & Consequences Wayne Wilson (Aug 30)

Weeks, Calvin W.

Re: FW: Checklist for securing Windows XP systems Weeks, Calvin W. (Jul 29)
Re: the importance of security Weeks, Calvin W. (Aug 11)
Re: Win2003 Server, IPSEC & HackerDefender Weeks, Calvin W. (Aug 10)
Re: FW: Checklist for securing Windows XP systems Weeks, Calvin W. (Jul 29)

William Tener

Re: Research on Security Critical Success Factors William Tener (Jul 27)

Wood, Anne M (wood)

Re: October 31, 2004, is Cyber Security Day Wood, Anne M (wood) (Sep 28)

Young, Beth A.

Re: kraes.dll Young, Beth A. (Jul 22)