Educause Security Discussion mailing list archives

Address harvesting of EDUCAUSE?


From: Alan Amesbury <amesbury () OITSEC UMN EDU>
Date: Fri, 25 Feb 2005 11:06:06 -0600

Is it common for vendors to harvest e-mail addresses from the EDUCAUSE mailing lists? I ask because I've now received a couple e-mails (which were identical except for the first paragraph) like the one below, although I'm absolutely certain I didn't contact the company that purportedly sent them. Besides, the message below clearly implies EDUCAUSE was where the sender obtained my e-mail address.

My tendency is to shy away from products that are sold via unsolicited commercial e-mail ("spam" in my book), since I think buying such products would only encourage more spam. I think the vendor can't be *too* "heavily engaged with the research community" as most researchers I know tend to despise spam (but I could be wrong).

Anyway, I was just curious if this was a common occurence or not, at least as it relates to EDUCAUSE, and whether EDUCAUSE policy encouraged this sort of thing.


--
Alan Amesbury
University of Minnesota



-------- Original Message --------
Subject:        Network Security and Monitoring
Date:   Tue, 15 Feb 2005 12:37:37 +1300
From:   Aaron Finlayson <aaron.finlayson () endace com>
Reply-To:       aaron.finlayson () endace com
Organization:   Endace
To:     amesbury () OITSEC UMN EDU



Good Morning Alan,

I have been reading through some of your conversation threads at Educause and thought you may well be interested in our network traffic cards. These cards are critical to network monitoring, testing and security. In particular, we have engineered a full range of networking interface cards that capture all data packets, all the time with near 100% CPU Offload. The advantage is simply:

  1. Capture all packets, with zero loss;
  2. Offload your CPU from the diversion of capturing or monitoring data;
  3. Optionally, accelerate key software functions such as reassembly
     or packet filtering;
  4. Full range of line interfaces to OC-192/10Gig with a single API


We are heavily engaged with the research community around the world, and know how important it is for you to have access to the very best technology.

*_Little More Detail: ENDACE_*

The Endace DAG Network Monitoring Interface Card (NMIC) is designed specifically for high-precision network monitoring and measurement applications. The targeted design architecture ensures that Endace products achieve much higher performance than generic Network Interface Cards.

Endace DAG products capture 100% of the traffic observed on a monitored network link for presentation to the host computer, with zero packet-loss guaranteed even for fully loaded 2.4Gbps and faster network links. The no-compromise DAG architecture achieves this impressive specification with almost 0% CPU utilization, focusing the full power of the host system on the analysis of incoming data.
*_ _*
*_What Other Universities and Research Groups are using Endace?_*
*_ _*
Research and University Customers like NLANR, CAIDA, San Diego Super Computing Center, Carnegie Melon, Penn State, UMASS, MIT, and PNL (Pacific Northwest Laboratory) to name a few have been using Endace’s DAG Cards for their high precision Network Monitoring and Security applications for years.

*_How can you apply Endace Technologies_*

   * Intrusion Detection and Prevention
   * Firewalls
   * Anomaly Detection and DDOS Mitigation
   * Network Measurement and Analysis
   * Protocol Analysis
   * Traffic Monitoring, QoS Measurement, and SLA Management


If you are experiencing any delays, security threats or bottlenecks with your network or applications associated with your network, please contact either myself or Peter Shaw in New Zealand, or Jason Hurd in North America at:

Endace (New Zealand) Endace (North America)
Aaron Finlayson or Jason Hurd
Peter Shaw Ph +1 716 332 6155
Ph +64 9 261 0400 Email jason.hurd () endace com <mailto:jason.hurd () endace com>
Email peter.shaw () endace com <mailto:peter.shaw () endace com>
aaron.finlayson () endace com <mailto:aaron.finlayson () endace com>

Or if you would just like any further information about our products and the way in which they can accelerate what you are currently achieving, please feel free to contact us by any of the above means.

We have a brief schematic which I can send you. It is about 600kb in size. Please let me know if you would like for me to email it through to you.

I look forward to hearing from you.


Regards

Aaron Finlayson
*Offload your CPU for what it was meant to do. *
* *
* *
* *
*ENDACE...*
*Network Acceleration Made Easy*

Postal Address P.O. Box 76204, Manukau City, Auckland, New Zealand
Physical Address Level 1, 13 Ronwood Ave Manukau City, Auckland, New Zealand
phone + 64 9 261 0400
fax + 64 9 261 0410
web site http://www.endace.com <http://www.southbritish.com/>

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- **CeBIT** Hanover, Germany, is the world's largest IT showcase. Endace will be there as part of the "New Zealand New Thinking" pavilion on Stand B15 in Hall 3 from March 10-16, 2005. If you are at CeBIT, please come and visit us. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
**********
Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at 
http://www.educause.edu/groups/.

Current thread: