Educause Security Discussion: by date

552 messages starting Jul 01 04 and ending Sep 30 04
Date index | Thread index | Author index


Thursday, 01 July

Re: RFP template for security requirements Martin Schulman
G-Mail Blocking Doug Sandford
Re: G-Mail Blocking Jordan Wiens
Re: G-Mail Blocking Melissa Guenther
UofRMachineCheck 1.0.3.1 available Faigle, Chris
Email for retired faculty Theresa Semmens
Re: Email for retired faculty Theresa M Rowe
Re: Email for retired faculty Edward Chase
Re: Email for retired faculty Brian Reilly

Friday, 02 July

critical Microsoft fix for download.ject Doug Pearson
Re: critical Microsoft fix for download.ject Christopher E. Cramer
Re: Email for retired faculty Bob Kalal
Re: critical Microsoft fix for download.ject Jordan Wiens
Re: critical Microsoft fix for download.ject Gary Flynn
Re: security engineer position available at UF Kathy Bergsma

Tuesday, 06 July

WS_FTP LE & Secure File Transfers Michael G Carr
Re: WS_FTP LE & Secure File Transfers Buz Dale
Re: WS_FTP LE & Secure File Transfers Jeff Bollinger
Re: WS_FTP LE & Secure File Transfers Matthew Keller

Wednesday, 07 July

Hardware tokens for remote access authentication Bill Kyle
Secure File Transfers: server side? Michael G Carr
Re: Secure File Transfers: server side? Albert Vasquez

Thursday, 08 July

Re: Secure File Transfers: server side? Dan Roberts
Group Policy Object recommendations - newly migrating to AD Todd Gunter
15 character minimum passwords Todd Gunter
Re: 15 character minimum passwords Eric Pancer
Re: 15 character minimum passwords Lucas, Bryan
Re: 15 character minimum passwords David Wall @ Yozons, Inc.
Re: 15 character minimum passwords (Vacation) Maria Gallagher

Friday, 09 July

Re: 15 character minimum passwords Bill Frazier
15 character minimum passwords Scott Bradner
Re: Group Policy Object recommendations - newly migrating to AD Aaron Wade
Re: 15 character minimum passwords Greg Jackson
Re: 15 character minimum passwords Rich Graves
Re: 15 character minimum passwords Gary Flynn
Re: 15 character minimum passwords Gary Dobbins
Re: 15 character minimum passwords (Vacation) Lucas, Bryan
Re: 15 character minimum passwords Lucas, Bryan
Re: 15 character minimum passwords Buz Dale
Re: 15 character minimum passwords Matthew Keller
Re: 15 character minimum passwords Melissa Guenther
Re: 15 character minimum passwords Leslie Maltz
Re: 15 character minimum passwords Jim Loter
Re: 15 character minimum passwords Bill Frazier
Re: 15 character minimum passwords Lucas, Bryan
Re: 15 character minimum passwords Gary Flynn
Re: 15 character minimum passwords Wayne Wilson
Annual password discussion was Re: 15 character minimum passwords Gary Flynn
Re: 15 character minimum passwords Scott Bradner
Re: 15 character minimum passwords Lucas, Bryan
Policies re: hosting/managing domains Manuel Amaral
Re: 15 character minimum passwords Gary Flynn

Saturday, 10 July

Re: Policies re: hosting/managing domains Joe St Sauver

Sunday, 11 July

Identifying Gaobot/Korgo Botnet Drones Cam Beasley, ISO

Monday, 12 July

Re: Policies re: hosting/managing domains Tracy Mitrano
Data classification Slade Griffin
Re: Data classification Melissa Guenther
Re: Data classification Hedrick, Gregory W
Re: Data classification Bruhn, Mark S.
Re: Data classification Melissa Guenther
Re: Data classification Gary Flynn
Re: Data classification Brian Reilly
Re: Data classification Melissa Guenther
Re: Data classification Bruhn, Mark S.
Re: Data classification Melissa Guenther
Re: Data classification Melissa Guenther

Tuesday, 13 July

Re: Identifying Gaobot/Korgo Botnet Drones Adam Goldstein
MS Patches Ariel Silverstone
Re: Pop-up Prevention Eric Pancer

Wednesday, 14 July

Re: MS Patches Aaron Wade
Pop-up Prevention Gibbs, Aaron M.
Re: Pop-up Prevention Ariel Silverstone
Re: Pop-up Prevention Lucas, Bryan
Re: Pop-up Prevention Rob Whalen
Re: Pop-up Prevention Jeff Giacobbe
Re: Pop-up Prevention Jon Mitchiner
Re: Pop-up Prevention Jason Richardson
Re: Pop-up Prevention Andy Freed

Thursday, 15 July

Re: Pop-up Prevention Berbeco, Robert W
Pop up blockers caveat Doug Sandford
Re: Pop up blockers caveat Jeff Bollinger
Re: Pop up blockers caveat Lucas, Bryan
Re: Pop up blockers caveat Doug Sandford
Re: Pop up blockers caveat Ariel Silverstone

Friday, 16 July

MS Critical Updates and client management O'Callaghan, Daniel
FW: MS Critical Updates and client management Chad McDonald
Internet Explorer Prahl, Robert
Re: Internet Explorer Eric Pancer
Re: FW: MS Critical Updates and client management Bill Frazier
Re: Internet Explorer Jason Richardson
Mixed Messages about SP2 Sadler, Connie
Re: Mixed Messages about SP2 Casto, Bryan J
Re: Mixed Messages about SP2 Greg Francis
Re: Mixed Messages about SP2 Shawn Kohrman
Re: Mixed Messages about SP2 Jeff Kell
Secure protocols Slade Griffin

Monday, 19 July

Re: Mixed Messages about SP2 Jim Bollinger
Re: Mixed Messages about SP2 Kay Sommers
Re: Internet Explorer Christopher Condie
Re: Mixed Messages about SP2 Casto, Bryan J
Re: Mixed Messages about SP2 Derek Spransy
Re: MS Critical Updates and client management David Dewire
Re: Secure protocols Jim Loter
Re: Secure protocols Jere Retzer
CAcert Jere Retzer
UofRMachineCheck 1.0.5.1 available Faigle, Chris
Re: Mixed Messages about SP2 Acunis, Norm
SIG Bagle/Beagle Cam Beasley, ISO

Tuesday, 20 July

Re: Secure protocols Buz Dale
Re: Secure protocols Dave Monnier, IT Security Office, Indiana University

Wednesday, 21 July

keyboard logger? Mark Wilson
Re: keyboard logger? Ken Shaurette
Re: keyboard logger? Jordan Wiens
kraes.dll Edward Chase
Re: keyboard logger? Mark Wilson
Incident Response Procedures Jason Brooks
Re: Incident Response Procedures Theresa Semmens
Re: kraes.dll Clyde Hoadley
Incident Response Schmitt, Dianne
Re: Incident Response Procedures Steve Schuster
Re: Incident Response Procedures Clyde Hoadley
Re: Incident Response Procedures Eric Pancer
Re: Incident Response Procedures Tim Howard
Re: Pop-up Prevention Gibbs, Aaron M.
Re: Incident Response Procedures Melissa Guenther
Re: Pop-up Prevention Gary Flynn

Thursday, 22 July

Re: Incident Response Procedures Julia Allen
Re: kraes.dll Nathan Hall
Re: kraes.dll Tom Gerstner
Re: kraes.dll Young, Beth A.
Re: kraes.dll Laura A. Pokalsky
Re: [unisog] Incident Response Procedures Bob Mahoney
User authentication through Microsoft ISA Sever for OWA Barros, Jacob
Re: Pop-up Prevention Jeff Giacobbe
Security Education and Awareness Materials -- Solicitation! Bruhn, Mark S.
Incident Response Ken Shaurette
Help with buying domain name through escrow.com Tim Lane

Friday, 23 July

Re: Help with buying domain name through escrow.com Jeni Li
Re: Help with buying domain name through escrow.com Ariel Silverstone
Re: Help with buying domain name through escrow.com Dennis Vich
Wireless sniffer Ariel Silverstone
Re: Wireless sniffer Jordan Wiens
Re: Wireless sniffer H. Morrow Long
Re: Wireless sniffer Slade Griffin
Previous Thread on Increased Probes Lois Lehman
Re: Previous Thread on Increased Probes Robin Jacobsen
Re: Wireless sniffer Jeff Bollinger

Monday, 26 July

Spyware, trojans and keyboard loggers? James Moore
Drafting a confidentiality statement for student employees James Moore
Re: Drafting a confidentiality statement for student employees Christopher E. Cramer
Re: Spyware, trojans and keyboard loggers? Gary Flynn
Re: Drafting a confidentiality statement for student employees Bob Mahoney
Re: Spyware, trojans and keyboard loggers? Edwards, Francis

Tuesday, 27 July

Research on Security Critical Success Factors Tim Lane
Re: Research on Security Critical Success Factors Julia Allen
Re: Research on Security Critical Success Factors William Tener
Re: Research on Security Critical Success Factors Julia Allen

Wednesday, 28 July

Fwd: SeeWhatYouShare.com Gideon T. Rasmussen, CISSP, CISM, CFSO, SCSA
Security Assessment Tom Neiss
HIPAA Assessments and Network Access Doug Sandford
Re: HIPAA Assessments and Network Access Michael Cole
Risk Assessments - Cyber Security Web cast--REGISTRATION NOW OPEN! Melissa Guenther
Re: HIPAA Assessments and Network Access Bob Kalal
Re: HIPAA Assessments and Network Access Schmidt, Eric W
Re: Security Assessment Jack Suess

Thursday, 29 July

FW: Checklist for securing Windows XP systems Ken Shaurette
Re: FW: Checklist for securing Windows XP systems Weeks, Calvin W.
Re: FW: Checklist for securing Windows XP systems Brent Sweeny
Re: FW: Checklist for securing Windows XP systems Weeks, Calvin W.
Re: HIPAA Assessments and Network Access Ben Sookying
Re: HIPAA Assessments and Network Access Angel L Cruz
Re: HIPAA Assessments and Network Access Schmidt, Eric W
Implementing Information Security: Risks vs. Cost Gideon T. Rasmussen, CISSP, CISM, CFSO, SCSA

Monday, 02 August

week-long DDoS problem Gary Dobbins
Re: Acacia Lawsuit Theresa Rowe

Tuesday, 03 August

Acacia Lawsuit Doug Sandford
Acacia Lawsuit Doug Sandford
Re: Acacia Lawsuit Bob Smith
Re: Acacia Lawsuit Steve Worona
Re: Acacia Lawsuit Michael G Carr
Re: week-long DDoS problem Gary Dobbins

Wednesday, 04 August

FW: Joint DHS/FBI Memorandum: Suspicious Activity Reporting Criteria for Infrastructure Owners and Operators, dated: 03 Aug 04 Doug Pearson

Friday, 06 August

libpng vulnerabilities - US-CERT Technical Cyber Security Alert TA04-217A Mary Ann Blair
Re: libpng vulnerabilities - US-CERT Technical Cyber Security Alert TA04-217A Eric Pancer

Monday, 09 August

Acacia Steve Worona

Tuesday, 10 August

Fw: Streaming Video Acacia Media Technologies Michael G Carr
Win2003 Server, IPSEC & HackerDefender Michael G Carr
Re: Win2003 Server, IPSEC & HackerDefender Brian Eckman
Re: Win2003 Server, IPSEC & HackerDefender Steve Schuster
Re: Win2003 Server, IPSEC & HackerDefender Weeks, Calvin W.
Re: Win2003 Server, IPSEC & HackerDefender Danny Lee
Re: Win2003 Server, IPSEC & HackerDefender Berbeco, Robert W
FormMail on web server Barros, Jacob

Wednesday, 11 August

spam from spoofed address Craig Blaha
Re: spam from spoofed address Paul Russell
the importance of security Scott Genung
Re: the importance of security Jere Retzer
Re: the importance of security Theresa M Rowe
Re: the importance of security Weeks, Calvin W.
SP2 Information and New Listserv Rodney Petersen
Re: SP2 Information and New Listserv Ariel Silverstone
Re: the importance of security Scott Genung
[no subject] Info
Re: the importance of security Jere Retzer
Re: the importance of security Dewitt Latimer
Re: the importance of security Scott Genung
Back to School Student Computer Security Resources from Microsoft Rodney Petersen
Re: the importance of security Cal Frye
Re: the importance of security Jon Mitchiner
Re: the importance of security Gary Flynn
Re: the importance of security Gary Flynn
Re: the importance of security Jon Mitchiner
Re: the importance of security Buz Dale
Re: the importance of security Rich Graves
Re: spam from spoofed address Dennis Meharchand, CEO Valt.x
Re: the importance of security Paul Russell
Re: the importance of security Mike Iglesias

Thursday, 12 August

Re: the importance of security Scott Weeks
SIUE SEVIS DB incident Morrow Long

Sunday, 15 August

IT Security Strategic Plan Tim Lane
IT Security Strategic Plan Tim Lane
IT Security Strategic Plan ( -Reply) Ed Gregory

Monday, 16 August

Handling flood of returned e-mail messages due to spam with forged sender address Gary Flynn
smtp auth (was Re: the importance of security) Kevin Shalla
Re: smtp auth (was Re: the importance of security) Matthew Keller
Re: Handling flood of returned e-mail messages due to spam with forged sender address Scott Weeks
Re: IT Security Strategic Plan Jere Retzer
VirusLogger 1.10 - Symantec AV Corp. Ed. Virus Log Mailer Faigle, Chris
Re: smtp auth (was Re: the importance of security) Dewitt Latimer

Tuesday, 17 August

Re: IT Security Strategic Plan Melissa Guenther
Re: Handling flood of returned e-mail messages due to spam with forged sender address Dick Jacobson
Re: Handling flood of returned e-mail messages due to spam with forged sender address Gary Flynn
Re: smtp auth (was Re: the importance of security) Brian Reilly
SP2 Hotfix Ariel Silverstone

Thursday, 19 August

sync'd TCP 1023, 5554, and 9898 scanning from Asia Pacific Doug Pearson
Strategies for Automating Network Policy Enforcement white paper available Christopher Misra
Re: sync'd TCP 1023, 5554, and 9898 scanning from Asia Pacific Herrera Reyna Omar
Botnet #b4u-movies Doug Pearson
blocking .ZIP attachments John C Borne
Re: blocking .ZIP attachments Jason Richardson
Re: blocking .ZIP attachments Smotherman, Brian
Re: blocking .ZIP attachments Gary Flynn
Re: blocking .ZIP attachments Dave Koontz
Re: blocking .ZIP attachments Tim Lane
Re: blocking .ZIP attachments John C Borne

Friday, 20 August

Re: blocking .ZIP attachments Davis, Thomas R.
Re: blocking .ZIP attachments Theresa M Rowe
Re: blocking .ZIP attachments Jim Bollinger
Re: blocking .ZIP attachments F.L.Ferreri
Re: blocking .ZIP attachments Matthew Keller
Re: blocking .ZIP attachments Cal Frye
Re: blocking .ZIP attachments Jenny Gluck
Re: blocking .ZIP attachments Michael_Maloney
Re: blocking .ZIP attachments Jeffrey I. Schiller
Re: blocking .ZIP attachments Scott Barker
Re: blocking .ZIP attachments Lucas, Bryan

Saturday, 21 August

Re: dictionary attacks against root Eric Pancer

Sunday, 22 August

dictionary attacks against root dodpears
Re: dictionary attacks against root Dave Monnier

Monday, 23 August

22 botnet servers dodpears
P-Synch experiences Gary Dobbins
WSJ.com - Stop the Music! Jere Retzer
Re: WSJ.com - Stop the Music! Jere Retzer
Re: WSJ.com - Stop the Music! Bruhn, Mark S.
Re: WSJ.com - Stop the Music! Scott Weeks
Re: WSJ.com - Stop the Music! Jordan Wiens
Re: WSJ.com - Stop the Music! Bruhn, Mark S.
Re: WSJ.com - Stop the Music! Bill Frazier
Re: WSJ.com - Stop the Music! Jere Retzer
Re: WSJ.com - Stop the Music! Jefferson, Ronnie V.
mailinglist etiquette Re: WSJ.com - Stop the Music! Scott Weeks
mailinglist etiquette Re: WSJ.com - Stop the Music! Jere Retzer
Re: mailinglist etiquette Re: WSJ.com - Stop the Music! Bruhn, Mark S.
24 (more) botnet C&C REN-ISAC
Assist the PITAC? Gene Spafford

Tuesday, 24 August

Security Awareness - Back to School, Resources, & October Events Rodney Petersen
Re: Security Awareness - Back to School, Resources,& October Events (Vacation) Maria Gallagher
root & other attackers REN-ISAC

Wednesday, 25 August

37 ssh scanners REN-ISAC
SEVIS system defenses Gary Dobbins
new outbreak of Slammer? Scott Genung
Re: WSJ.com - Stop the Music! Gibbs, Aaron M.
Re: new outbreak of Slammer? Doug Pearson
increase in TCP 4662? Doug Pearson
Re: WSJ.com - Stop the Music! Scott Bradner
7 new ssh scanners Doug Pearson

Thursday, 26 August

Re: 7 new ssh scanners Justin Azoff
Password Cracking & Consequences Jason Brooks
Re: Password Cracking & Consequences Sweeny, Jonny
Re: Password Cracking & Consequences CAROLE CARMODY
Re: Password Cracking & Consequences Lucas, Bryan
Re: Password Cracking & Consequences James Riden
Re: Password Cracking & Consequences Melissa Guenther
Re: Password Cracking & Consequences Scott Weeks
Re: Password Cracking & Consequences Alan Amesbury
Re: Password Cracking & Consequences Jason Richardson
Re: Password Cracking & Consequences Jeff Giacobbe
Re: Password Cracking & Consequences Geoff Nathan
Re: Password Cracking & Consequences Lucas, Bryan
Re: Password Cracking & Consequences Ron Parker
Re: Password Cracking & Consequences Stephen Bernard
Re: Password Cracking & Consequences Ron Parker
Re: Password Cracking & Consequences Eric Pancer
Re: Password Cracking & Consequences Ken Shaurette
Re: Password Cracking & Consequences Wayne J. Hauber
Re: Password Cracking & Consequences Scott Bradner
Re: Password Cracking & Consequences Scott Weeks
Re: Password Cracking & Consequences James Riden
Re: Password Cracking & Consequences Scott Bradner
Re: Password Cracking & Consequences Scott Bradner
Re: Password Cracking & Consequences James Riden
Re: Password Cracking & Consequences Michael Mills

Friday, 27 August

Re: Password Cracking & Consequences Theresa M Rowe
Re: Password Cracking & Consequences Wayne Wilson
important Cisco security advisory REN-ISAC
Re: Password Cracking & Consequences Gary Flynn
Re: Password Cracking & Consequences Lucas, Bryan
Response to WinXP SP2 Ariel Silverstone
Re: Password Cracking & Consequences Gary Flynn
(no subject) Joshua Brown
Re: Password Cracking & Consequences Lucas, Bryan
Re: important Cisco security advisory Jamie Aiello
Re: Password Cracking & Consequences Justin Azoff
Re: Response to WinXP SP2 Tracy Mitrano
Re: Password Cracking & Consequences Michael Mills
Re: Password Cracking & Consequences Christian Wilson
Re: Password Cracking & Consequences Theresa M Rowe
Re: Password Cracking & Consequences Theresa M Rowe
What should be done with old RAID 5 sets? Clyde Hoadley
Re: Password Cracking & Consequences Gary Flynn
Re: Password Cracking & Consequences Eric Pancer
Re: Password Cracking & Consequences Christian Wilson
Re: Password Cracking & Consequences Justin Azoff
Re: Password Cracking & Consequences Scott Bradner
Re: Password Cracking & Consequences Scott Bradner
Re: Password Cracking & Consequences Gary Flynn
Re: What should be done with old RAID 5 sets? Andy Weisskopf
Re: What should be done with old RAID 5 sets? Matthew Keller
Re: Password Cracking & Consequences Gary Flynn
Re: What should be done with old RAID 5 sets? Clyde Hoadley
Re: Password Cracking & Consequences Michael Mills
Re: Password Cracking & Consequences Scott Bradner
Re: Password Cracking & Consequences Michael Mills
Re: Password Cracking & Consequences Michael Mills
Re: Password Cracking & Consequences Mike Austin
Re: Password Cracking & Consequences Davis, Thomas R.
Re: Password Cracking & Consequences Gary Flynn
Re: 7 new ssh scanners Lois Lehman
Re: important Cisco security advisory Mark Bauer
Re: Password Cracking & Consequences Gary Flynn
Re: Security Awareness - Back to School, Resources, & October Events Lois Lehman
Re: Password Cracking & Consequences Michael Mills

Saturday, 28 August

Re: Password Cracking & Consequences Cal Frye
Re: Password Cracking & Consequences Jere Retzer
TippingPoint and Cisco IDSM2 IPS offerings (cross-posted to NETMAN) Skrdla, David

Sunday, 29 August

Re: Password Cracking & Consequences Brian Eckman
Re: TippingPoint and Cisco IDSM2 IPS offerings (cross-posted to NETMAN) chris Allison
Re: TippingPoint and Cisco IDSM2 IPS offerings (cross-posted to NETMAN) Ray Lombardi
Re: TippingPoint and Cisco IDSM2 IPS offerings (cross-posted to NETMAN) Scott Genung

Monday, 30 August

Re: Password Cracking & Consequences Ron Parker
Vulnerability Scanning Walsh, Brian R. (Information Services)
Re: Security Awareness - Back to School, Resources, & October Events Bruhn, Mark S.
Re: Vulnerability Scanning Scott Weeks
Re: Vulnerability Scanning Daniel Adinolfi
Re: Vulnerability Scanning Eric Pancer
Re: Vulnerability Scanning Matthew Keller
Re: Vulnerability Scanning Info
Infected Bot machines Crawford, Charles D
Re: Vulnerability Scanning Bob Gerdes
Re: TippingPoint and Cisco IDSM2 IPS offerings (cross-posted to NETMAN) Eric Van Wiltenburg
Re: Infected Bot machines Lutzen, Karl F.
Security Program Development / Staffing survey - Brief James Moore
Re: Security Program Development / Staffing survey - Brief Samuel Liles
Re: Security Program Development / Staffing survey - Not social engineering. James Moore
Re: Password Cracking & Consequences Wayne Wilson
Re: Password Cracking & Consequences Wayne Wilson
[Job] Network Security Analyst / Georgetown University / Washington, DC Brian Reilly

Tuesday, 31 August

Disaster Recovery Bruhn, Mark S.
Agreements w/ Napster, iTunes, RealNetworks, etc. Michael G Carr
Information Security Article by JMU's President Linwood Rose Rodney Petersen
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Killian, Thomas
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Patrick Saeva
Port 65531 Remote Command Prompt David Taylor
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. H. Morrow Long
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Jefferson, Ronnie V.
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Lanita
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Jason Richardson
Re: Port 65531 Remote Command Prompt Cam Beasley, ISO
Re: Port 65531 Remote Command Prompt Michael Mills

Wednesday, 01 September

Network Access Control Change Control Gary Flynn
Re: Information Security Article by JMU's President Linwood Rose Julia Allen
Current State Legislation on Cyber Security Attacks Galloway, Dan
Re: Current State Legislation on Cyber Security Attacks Joe St Sauver
Re: Information Security Article by JMU's President Linwood Rose Jefferson, Ronnie V.
Published Information Security Surveys Tim Lane
Amended - Published Information Security Surveys Tim Lane

Thursday, 02 September

IRC, IM Proxy Implementations Hearn, David L.
Re: IRC, IM Proxy Implementations Dave Monnier, IT Security Office, Indiana University
Re: IRC, IM Proxy Implementations Rick Coloccia
Re: IRC, IM Proxy Implementations Craig Blaha
RFP for formal IT security audit? Jeff
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Theresa Semmens
Re: IRC, IM Proxy Implementations Gary Flynn
Re: IRC, IM Proxy Implementations Gary Flynn
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Jefferson, Ronnie V.
Re: Amended - Published Information Security Surveys Rodney Petersen
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Rodney Petersen
Re: IRC, IM Proxy Implementations Dave Monnier, IT Security Office, Indiana University
Re: RFP for formal IT security audit? Info
Re: IRC, IM Proxy Implementations Richard Gadsden
Re: IRC, IM Proxy Implementations Dave Monnier, IT Security Office, Indiana University
Re: IRC, IM Proxy Implementations H. Morrow Long
Re: Agreements w/ Napster, iTunes, RealNetworks, etc. Steve Worona

Friday, 03 September

Re: IRC, IM Proxy Implementations Justin Azoff
Re: IRC, IM Proxy Implementations Richard Gadsden
Re: IRC, IM Proxy Implementations Dave Monnier, IT Security Office, Indiana University
Re: IRC, IM Proxy Implementations Gary Flynn
Re: IRC, IM Proxy Implementations Brian Eckman
Re: IRC, IM Proxy Implementations Mike Iglesias
Re: IRC, IM Proxy Implementations Richard Gadsden
Re: [ICPL] Electronic Signatures James Moore
Re: [ICPL] Electronic Signatures Danny Lee
Re: IRC, IM Proxy Implementations Justin Azoff
Re: [ICPL] Electronic Signatures Info
Re: [ICPL] Electronic Signatures Harold A'Hole
Re: [ICPL] Electronic Signatures Mike Austin
Re: IRC, IM Proxy Implementations Justin Azoff
Re: IRC, IM Proxy Implementations Dave Monnier, IT Security Office, Indiana University
Re: IRC, IM Proxy Implementations John Kristoff
Re: IRC, IM Proxy Implementations John Kristoff
Re: IRC, IM Proxy Implementations H. Morrow Long
Metaframe firewall location Kowal, Michael
Re: Metaframe firewall location Michael Mills

Sunday, 05 September

Re: [ICPL] Electronic Signatures King, Dennis C.
Re: IRC, IM Proxy Implementations Mike Porter

Tuesday, 07 September

Re: IRC, IM Proxy Implementations - Cornell Daniel Adinolfi
Checklist -- Hardening user passwords Ken Shaurette
Re: Checklist -- Hardening user passwords Lucas, Bryan

Wednesday, 08 September

Re: IRC, IM Proxy Implementations Mark Wilson
Re: IRC, IM Proxy Implementations Justin Azoff
Re: IRC, IM Proxy Implementations Mark Wilson
Re: IRC, IM Proxy Implementations Hearn, David L.
Re: IRC, IM Proxy Implementations Daniel Adinolfi
Re: IRC, IM Proxy Implementations Richard Gadsden
USA Today 9/8: Are hackers using your PC to spew spam and steal? H. Morrow Long
Bot DDOS at 10 AM Jim Bollinger
Re: IRC, IM Proxy Implementations Gary Flynn
Re: Bot DDOS at 10 AM Brian Eckman
Re: IRC, IM Proxy Implementations Mark Wilson
Re: Bot DDOS at 10 AM Bielawa, David
Mandating format/reinstall after compromise Gary Flynn
Re: IRC, IM Proxy Implementations Justin Azoff
Re: IRC, IM Proxy Implementations H. Morrow Long
Re: IRC, IM Proxy Implementations Herrera Reyna Omar
Re: IRC, IM Proxy Implementations Eric Pancer
Re: IRC, IM Proxy Implementations Gary Flynn
Re: IRC, IM Proxy Implementations H. Morrow Long
Re: Bot DDOS at 10 AM Jim Bollinger
Re: IRC, IM Proxy Implementations Mark Wilson
Re: Vulnerability Scanning Daniel Hay

Thursday, 09 September

Re: Mandating format/reinstall after compromise Bruhn, Mark S.
Scanning from source port 53 Lois Lehman
Re: Scanning from source port 53 Dave Monnier

Friday, 10 September

Re: Mandating format/reinstall... Tim McGovern
Re: Mandating format/reinstall... Bruhn, Mark S.

Monday, 13 September

Immediate Logoff after Login Issue [XP][Symantec Corp. 9.0][Adware.Blazefind] Faigle, Chris
Here a Bot, there a Bot, everywhere... Mark Wilson
CIS Consensus Review Process for Exchange 2003 Benchmark Rodney Petersen
Ph0t0Sh0p.exe Andrew Watson

Tuesday, 14 September

PSU Contact (fwd) Ron Parker
Re: Ph0t0Sh0p.exe Gaby
Re: Ph0t0Sh0p.exe Lucas, Bryan

Wednesday, 15 September

Please Support National Cyber Security Awareness Month Rodney Petersen
Re: Ph0t0Sh0p.exe Andrew Watson
Understanding the security implications of SAKAI? James Moore
Re: Understanding the security implications of SAKAI? Liudvikas Bukys
XP + SP2 + F-Secure AV/FW/IDS question infoSec UGA eMail
Re: XP + SP2 + F-Secure AV/FW/IDS question Matthew Keller
Review of Security Survey Tim Lane

Thursday, 16 September

Last Call - Security Awareness Resources Rodney Petersen
User Self Service Password Resets Ron Parker
Re: User Self Service Password Resets Sean Lanham
Re: User Self Service Password Resets Ken Shaurette
Re: Checking for AV software on students' machines Gibbs, Aaron M.
Re: User Self Service Password Resets Lucas, Bryan
Security-Related Sessions at EDUCAUSE 2004 Valerie Vogel
Re: Checking for AV software on students' machines Michael Mills
Re: Security-Related Sessions at EDUCAUSE 2004 Ariel Silverstone
Re: Checking for AV software on students' machines Faigle, Chris
Screening of visitor and transient systems Tim Howard

Friday, 17 September

Re: Checking for AV software on students' machines Mike Wiseman
Re: Checking for AV software on students' machines Paul Crittenden
Re: Checking for AV software on students' machines Christopher Misra
fyi: Re: Security-Related Sessions at EDUCAUSE 2004 Tracy Mitrano
Re: Checking for AV software on students' machines Nathan Hall
Re: Understanding the security implications of SAKAI? Theresa M Rowe

Sunday, 19 September

Re: Screening of visitor and transient systems jack suess

Monday, 20 September

Laptops on Active Directory Chad McDonald
Re: Screening of visitor and transient systems Dan Updegrove
Two articles about open vs. proprietary source Gene Spafford
Re: Laptops on Active Directory Michelle Mueller
Re: Two articles about open vs. proprietary source Scott Weeks
New Netscape Vulnerability? Ariel Silverstone
Re: New Netscape Vulnerability? Doug Pearson
Re: New Netscape Vulnerability? H. Morrow Long
Internet2 Security Briefing on "Strategies for Automating Network Policy Enforcement" -- 23 Sep 2004 Valerie Vogel
Re: Laptops on Active Directory Bob Kehr
Free secure programming instructional materials Gene Spafford
Two articles about open vs. proprietary source (2nd round) Gene Spafford

Tuesday, 21 September

Infected?? Peter Charbonneau
Re: Infected?? Kay Sommers
Re: Two articles about open vs. proprietary source ( 2nd round) Jere Retzer

Wednesday, 22 September

interesting article Craig Blaha
Re: interesting article Diana Orrick
Re: interesting article Mark Poepping
MS04-028 POC Exploit Code [GDI+] Faigle, Chris

Thursday, 23 September

Student paper "editorial" on robust passwords Dan Updegrove
Re: Student paper "editorial" on robust passwords David Wall @ Yozons, Inc.
Re: Student paper "editorial" on robust passwords Gordon D. Wishon
Re: Student paper "editorial" on robust passwords Lucas, Bryan
Re: Student paper "editorial" on robust passwords Ron Parker
Re: Student paper "editorial" on robust passwords Arlene Yetnikoff
Re: Student paper "editorial" on robust passwords Lucas, Bryan
Re: Student paper "editorial" on robust passwords Ryan Matteson
Re: Student paper "editorial" on robust passwords David Wall @ Yozons, Inc.
Fall 2004 Internet2 Member Meeting Security-Related Sessions Valerie Vogel

Friday, 24 September

Re: Student paper "editorial" on robust passwords David L. Wasley
Re: Student paper "editorial" on robust passwords Kevin Shalla

Saturday, 25 September

FW: [Full-Disclosure] MS04-028 Jpeg EXPLOIT with Reverse and Bind shell ... Faigle, Chris

Tuesday, 28 September

Re: Last Call - Security Awareness Resources Davina Pruitt-Mentle
new virus? Craig Blaha
Re: new virus? jack suess
Re: new virus? Craig Blaha
RSA Conference? Joseph Karam
October 31, 2004, is Cyber Security Day Bruhn, Mark S.
Re: October 31, 2004, is Cyber Security Day Wood, Anne M (wood)
Re: October 31, 2004, is Cyber Security Day Theresa M Rowe
Re: October 31, 2004, is Cyber Security Day Leslie Rankin
Re: October 31, 2004, is Cyber Security Day Howell, Paul
Re: new virus? Gary Flynn
Re: RSA Conference? Melissa Guenther

Wednesday, 29 September

Firewalls and Research Slade Griffin
Re: October 31, 2004, is Cyber Security Day Drews, Jane E
Re: Firewalls and Research Clonts, Neal D. (HSC)
Re: Firewalls and Research Eric Pancer
Security Awareness Day...err...Month Bruhn, Mark S.
Re: Firewalls and Research Jere Retzer
Re: Firewalls and Research Clonts, Neal D. (HSC)
Re: Firewalls and Research Clonts, Neal D. (HSC)
IIS 6.0 Andrew Atwell
Re: IIS 6.0 Brent

Thursday, 30 September

Network Security Audit Gibbs, Aaron M.