Educause Security Discussion mailing list archives
Re: Address harvesting of EDUCAUSE?
From: Dewitt Latimer <dewitt () ND EDU>
Date: Fri, 25 Feb 2005 12:18:20 -0500
We see this behavior on a number of the more technical lists (wireless-lan, etc). All EDUCAUSE constituent lists are open and searchable. Moreover, there are no policies that keep vendors from joining the lists..they just can't push their services directly on the list. So yes, you can rest assured that contact information is being harvested. -d ------------------------------ Dewitt Latimer, Ph.D. Deputy CIO and Chief Technology Officer The University of Notre Dame dewitt () nd edu -----Original Message----- From: The EDUCAUSE Security Discussion Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Alan Amesbury Sent: Friday, February 25, 2005 12:06 PM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: [SECURITY] Address harvesting of EDUCAUSE? Is it common for vendors to harvest e-mail addresses from the EDUCAUSE mailing lists? I ask because I've now received a couple e-mails (which were identical except for the first paragraph) like the one below, although I'm absolutely certain I didn't contact the company that purportedly sent them. Besides, the message below clearly implies EDUCAUSE was where the sender obtained my e-mail address. My tendency is to shy away from products that are sold via unsolicited commercial e-mail ("spam" in my book), since I think buying such products would only encourage more spam. I think the vendor can't be *too* "heavily engaged with the research community" as most researchers I know tend to despise spam (but I could be wrong). Anyway, I was just curious if this was a common occurence or not, at least as it relates to EDUCAUSE, and whether EDUCAUSE policy encouraged this sort of thing. -- Alan Amesbury University of Minnesota -------- Original Message -------- Subject: Network Security and Monitoring Date: Tue, 15 Feb 2005 12:37:37 +1300 From: Aaron Finlayson <aaron.finlayson () endace com> Reply-To: aaron.finlayson () endace com Organization: Endace To: amesbury () OITSEC UMN EDU Good Morning Alan, I have been reading through some of your conversation threads at Educause and thought you may well be interested in our network traffic cards. These cards are critical to network monitoring, testing and security. In particular, we have engineered a full range of networking interface cards that capture all data packets, all the time with near 100% CPU Offload. The advantage is simply: 1. Capture all packets, with zero loss; 2. Offload your CPU from the diversion of capturing or monitoring data; 3. Optionally, accelerate key software functions such as reassembly or packet filtering; 4. Full range of line interfaces to OC-192/10Gig with a single API We are heavily engaged with the research community around the world, and know how important it is for you to have access to the very best technology. *_Little More Detail: ENDACE_* The Endace DAG Network Monitoring Interface Card (NMIC) is designed specifically for high-precision network monitoring and measurement applications. The targeted design architecture ensures that Endace products achieve much higher performance than generic Network Interface Cards. Endace DAG products capture 100% of the traffic observed on a monitored network link for presentation to the host computer, with zero packet-loss guaranteed even for fully loaded 2.4Gbps and faster network links. The no-compromise DAG architecture achieves this impressive specification with almost 0% CPU utilization, focusing the full power of the host system on the analysis of incoming data. *_ _* *_What Other Universities and Research Groups are using Endace?_* *_ _* Research and University Customers like NLANR, CAIDA, San Diego Super Computing Center, Carnegie Melon, Penn State, UMASS, MIT, and PNL (Pacific Northwest Laboratory) to name a few have been using Endace's DAG Cards for their high precision Network Monitoring and Security applications for years. *_How can you apply Endace Technologies_* * Intrusion Detection and Prevention * Firewalls * Anomaly Detection and DDOS Mitigation * Network Measurement and Analysis * Protocol Analysis * Traffic Monitoring, QoS Measurement, and SLA Management If you are experiencing any delays, security threats or bottlenecks with your network or applications associated with your network, please contact either myself or Peter Shaw in New Zealand, or Jason Hurd in North America at: Endace (New Zealand) Endace (North America) Aaron Finlayson or Jason Hurd Peter Shaw Ph +1 716 332 6155 Ph +64 9 261 0400 Email jason.hurd () endace com <mailto:jason.hurd () endace com> Email peter.shaw () endace com <mailto:peter.shaw () endace com> aaron.finlayson () endace com <mailto:aaron.finlayson () endace com> Or if you would just like any further information about our products and the way in which they can accelerate what you are currently achieving, please feel free to contact us by any of the above means. We have a brief schematic which I can send you. It is about 600kb in size. Please let me know if you would like for me to email it through to you. I look forward to hearing from you. Regards Aaron Finlayson *Offload your CPU for what it was meant to do. * * * * * * * *ENDACE...* *Network Acceleration Made Easy* Postal Address P.O. Box 76204, Manukau City, Auckland, New Zealand Physical Address Level 1, 13 Ronwood Ave Manukau City, Auckland, New Zealand phone + 64 9 261 0400 fax + 64 9 261 0410 web site http://www.endace.com <http://www.southbritish.com/> ---------------------------------------------------------------------------- ---------------------------------------------------------------------------- ------------------------------------------------------- **CeBIT** Hanover, Germany, is the world's largest IT showcase. Endace will be there as part of the "New Zealand New Thinking" pavilion on Stand B15 in Hall 3 from March 10-16, 2005. If you are at CeBIT, please come and visit us. ---------------------------------------------------------------------------- ---------------------------------------------------------------------------- ------------------------------------------------------- ********** Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at http://www.educause.edu/groups/. ********** Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at http://www.educause.edu/groups/.
Current thread:
- Address harvesting of EDUCAUSE? Alan Amesbury (Feb 25)
- <Possible follow-ups>
- Re: Address harvesting of EDUCAUSE? Dewitt Latimer (Feb 25)
- Re: Address harvesting of EDUCAUSE? Jim Barlow (Feb 25)
- Re: Address harvesting of EDUCAUSE? Brawner, David (Feb 25)
- Re: Address harvesting of EDUCAUSE? Gene Spafford (Feb 25)
- Re: Address harvesting of EDUCAUSE? Dick Jacobson (Feb 25)
- Re: Address harvesting of EDUCAUSE? Joel Rosenblatt (Feb 25)
- Re: Address harvesting of EDUCAUSE? David Taylor (Feb 25)
- Re: Address harvesting of EDUCAUSE? Dick Jacobson (Feb 25)
- Re: Address harvesting of EDUCAUSE? Manuel Amaral (Feb 25)
- Re: Address harvesting of EDUCAUSE? David Bendtsen (Feb 25)
- Re: Address harvesting of EDUCAUSE? Bill Kyle (Feb 25)
(Thread continues...)