Educause Security Discussion: by author

507 messages starting Jul 14 06 and ending Jul 14 06
Date index | Thread index | Author index


Alan Amesbury

Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Alan Amesbury (Jul 14)
Re: Password entropy Alan Amesbury (Jul 25)
Re: New Video Educates Students on Illegal File Sharing Alan Amesbury (Aug 23)
Re: Rainbow Tables and Authentication Alternatives Alan Amesbury (Jul 18)
Re: Password Expiration Alan Amesbury (Jul 14)
Re: Help explaining why LogMeIn.com type programs are bad. Alan Amesbury (Jul 17)
Re: SSNs, rootkits, Incident Response, etc... Alan Amesbury (Jul 18)

Alex Campoe

University-Wide Risk Assessment Alex Campoe (Aug 18)

Anthony Maszeroski

Re: Rainbow Tables and Authentication Alternatives Anthony Maszeroski (Jul 11)

Barnes, Jeff

Re: hard drive destruction Barnes, Jeff (Aug 10)

Basgen, Brian

Poll: Anti-Spyware on servers Basgen, Brian (Jul 10)
Re: Password entropy Basgen, Brian (Jul 24)
Re: Security of Research Data Basgen, Brian (Sep 15)
Re: Password entropy Basgen, Brian (Jul 19)
Re: Quick show of hands Basgen, Brian (Aug 10)
Poll Results: Anti-Spyware on servers Basgen, Brian (Jul 13)
Re: Password entropy Basgen, Brian (Jul 20)
Re: Mass email handling Basgen, Brian (Jul 13)
Re: Password entropy Basgen, Brian (Jul 19)
Re: Password entropy Basgen, Brian (Jul 19)
Re: Password entropy Basgen, Brian (Jul 20)
Re: Password entropy Basgen, Brian (Jul 25)

BEN PIJOR

Re: Blackberry security expertise needed BEN PIJOR (Jul 27)

Bob Kehr

Re: Centralized security administration Bob Kehr (Aug 17)

Brad Judy

Re: Security of Research Data Brad Judy (Sep 05)
Campus threat models Brad Judy (Aug 10)
Re: University-Wide Risk Assessment Brad Judy (Aug 18)
Re: Security Awareness for Students Brad Judy (Sep 28)
Re: New Video Educates Students on Illegal File Sharing Brad Judy (Aug 22)

Brenda B Gombosky

Re: Quick show of hands Brenda B Gombosky (Aug 10)
Spam and Wireless Brenda B Gombosky (Sep 11)
Password Clipping Levels and Password Strength Brenda B Gombosky (Sep 26)

Brent Sweeny

Re: Password entropy Brent Sweeny (Jul 19)

Bret R Blackman

Outsourcing Forensics Bret R Blackman (Aug 28)

Brian Friday

Re: NAC Implementation Brian Friday (Jul 21)
Re: Illegal Downloads Brian Friday (Sep 06)

Brian Kaye

Re: Security Awareness for students Brian Kaye (Sep 26)

Brian Nichols

Re: Quick show of hands Brian Nichols (Aug 11)

Brian Reilly

Re: Web Content Change Management / Scanner Brian Reilly (Aug 03)

Brown, Scott

Re: Spam and Wireless Brown, Scott (Sep 11)
Re: Brown, Scott (Jul 24)

Bruce Curtis

Re: Firewall - Egress Policy Bruce Curtis (Sep 05)

Bruce Rights

Re: Disk Scrubbing/Secure Disk Erasure Bruce Rights (Jul 27)

Buz Dale

Re: Password entropy Buz Dale (Jul 19)

Cal Frye

Re: Firewall - Egress Policy Cal Frye (Sep 04)
Re: New Video Educates Students on Illegal File Sharing Cal Frye (Aug 23)
Re: Illegal Downloads Cal Frye (Sep 05)
Re: Centralized security administration Cal Frye (Aug 18)

Cam Beasley

Re: Product request - Enterprise whole disk encryption for laptops Cam Beasley (Jul 15)
Re: Outsourcing Forensics Cam Beasley (Aug 29)
Re: Data Classification Cam Beasley (Jul 28)
NewHome: SENF - SEnsitive Number Finder (Maitogai.270) Cam Beasley (Aug 18)
Re: Quick show of hands Cam Beasley (Aug 10)

CAROLE CARMODY

Re: Quick show of hands CAROLE CARMODY (Aug 11)

Cathy Hubbs

Re: Quick show of hands Cathy Hubbs (Aug 10)

Ced Bennett

Re: Data Classification Ced Bennett (Aug 02)

Chad McDonald, CISSP

Portal / Web Mail timeouts Chad McDonald, CISSP (Jul 20)
Re: Quick show of hands Chad McDonald, CISSP (Aug 10)
OS virtualization at the desktop Chad McDonald, CISSP (Jul 13)
Looking for consesus Chad McDonald, CISSP (Aug 03)

Charlie Prothero

Re: Product request - Enterprise whole disk encryption for laptops Charlie Prothero (Jul 18)
Re: Product request - Enterprise whole disk encryption for laptops Charlie Prothero (Jul 15)

Cheek, Leigh

Re: Account Lockout Policies Cheek, Leigh (Jul 11)
Re: University-Wide Risk Assessment Cheek, Leigh (Aug 18)
Re: Account Lockout Policies Cheek, Leigh (Jul 11)

Chris Bennett

Re: Quick show of hands Chris Bennett (Aug 10)

Chris D.i.s. Fontaine

Re: Call for Papers - 19th Annual FIRST Conference Chris D.i.s. Fontaine (Sep 22)

Chris Fontaine

Mass email handling Chris Fontaine (Jul 13)

Chris Golden

Firewall - Egress Policy Chris Golden (Sep 04)

Chris Green

Re: New Video Educates Students on Illegal File Sharing Chris Green (Aug 23)
Re: Encryption of university data Chris Green (Jul 21)
Re: Portal / Web Mail timeouts Chris Green (Jul 20)
Identity Protection Services Chris Green (Aug 15)
Re: Snort rule for IE / VML issue Chris Green (Sep 20)
Re: New Video Educates Students on Illegal File Sharing Chris Green (Aug 23)

Chris Harrington

Re: Snort rule for IE / VML issue Chris Harrington (Sep 20)
Snort rule for IE / VML issue Chris Harrington (Sep 19)

Christoffersen, Mark John

Change Management Christoffersen, Mark John (Aug 03)

Christopher E. Cramer

Re: Quick show of hands Christopher E. Cramer (Aug 10)

Christopher Misra

Re: Data Classification Christopher Misra (Jul 27)
Re: Wireless Guest Access Christopher Misra (Sep 28)

Christopher Penido

Re: Security Awareness for students Christopher Penido (Sep 25)
Re: Security Awareness for students Christopher Penido (Sep 25)
Security Awareness for students Christopher Penido (Sep 25)

Chris Vakhordjian

RFP for Penetration Testing Chris Vakhordjian (Jul 19)

Clyde Hoadley

Deleting Online Predators Act Clyde Hoadley (Aug 02)

Colleen Keller

Re: Security Awareness for students Colleen Keller (Sep 25)
Re: Quick show of hands Colleen Keller (Aug 16)
Re: Quick show of hands Colleen Keller (Aug 16)

Conor McGrath

Re: Quick show of hands Conor McGrath (Aug 11)

Consolvo, Corbett

Re: IPS - Tipping Point vs. ISS? Consolvo, Corbett (Jul 07)
Re: Quick show of hands Consolvo, Corbett (Aug 10)
Re: Poll: Anti-Spyware on servers Consolvo, Corbett (Jul 10)
Re: NAC Implementation Consolvo, Corbett (Jul 21)

Crawford, Tim M.

Security of Research Data Crawford, Tim M. (Aug 31)
Re: Security of Research Data Crawford, Tim M. (Sep 13)
Re: Security of Research Data Crawford, Tim M. (Sep 12)
Re: Security Awareness for students Crawford, Tim M. (Sep 25)

Daniel R Jones

Re: Outsourcing Forensics Daniel R Jones (Aug 29)
Re: October is Security Awareness Month Daniel R Jones (Sep 12)

Dan Updegrove

Frustrated USC applicant pleads guilty to break-in Dan Updegrove (Sep 11)

Darlene Quackenbush

Re: GAO Peer2Peer Survey Darlene Quackenbush (Aug 04)

Darnell Walker

Re: NAC Implementation Darnell Walker (Jul 21)
NAC Implementation Darnell Walker (Jul 20)

Dave Koontz

Re: IPS Dave Koontz (Jul 21)
Re: Product request - Enterprise whole disk encryption for laptops Dave Koontz (Jul 15)
Re: Password entropy Dave Koontz (Jul 19)
IPS - Tipping Point vs. ISS? Dave Koontz (Jul 07)

Dave Monnier REN-ISAC

REN-ISAC: Large TCP/445 traffic increase on Abilene Dave Monnier REN-ISAC (Aug 12)

David C Smith

Re: Data Classification David C Smith (Jul 27)
Re: Security Requirements of Federal Funding Agencies David C Smith (Aug 29)

David C. Smith

Re: Quick show of hands David C. Smith (Aug 10)

David Gillett

Re: Password entropy David Gillett (Jul 19)
Re: Looking for consesus David Gillett (Aug 03)
Re: Spam and Wireless David Gillett (Sep 14)
Re: Mass email handling David Gillett (Jul 13)
Re: Password entropy David Gillett (Jul 19)
Re: Disclaimers David Gillett (Sep 26)

David Grisham

Re: Quick show of hands David Grisham (Aug 10)

David LaPorte

Re: NAC Implementation David LaPorte (Aug 01)

David Lassner

Re: GAO Peer2Peer survey David Lassner (Jul 25)

David L. Rotman

Re: Looking for consesus David L. Rotman (Aug 03)

David L. Wasley

Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status David L. Wasley (Jul 13)

David Morton

Re: Product request - Enterprise whole disk encryption for laptops David Morton (Jul 14)

Davina Pruitt-Mentle

Re: October is Security Awareness Month Davina Pruitt-Mentle (Sep 12)

Delaney, Cherry L.

Re: Security of Research Data Delaney, Cherry L. (Sep 06)
Re: Outsourcing Forensics Delaney, Cherry L. (Aug 28)
Re: Quick show of hands Delaney, Cherry L. (Aug 16)

dennis

Content Security Gateway dennis (Aug 02)

Dick Jacobson

Re: Data Classification Dick Jacobson (Jul 26)

Donald, A. Wayne

Re: Quick show of hands Donald, A. Wayne (Aug 10)

Doug Pearson

paper on security implications of CALEA-VoIP Doug Pearson (Jul 15)
[REN-ISAC] MS06-040 status Doug Pearson (Aug 14)

Doug Sandford

Banner 7 Fine Grain Access Control Doug Sandford (Aug 29)

Drews, Jane E

Re: Outsourcing Forensics Drews, Jane E (Aug 28)
Re: Quick show of hands Drews, Jane E (Aug 10)

Eric Brewer

Re: Account Lockout Policies Eric Brewer (Jul 11)

Faloba,Jodi L

Social Security Numbers and Self Service Faloba,Jodi L (Jul 20)

Flagg, Martin D.

Help explaining why LogMeIn.com type programs are bad. Flagg, Martin D. (Jul 17)

Fowler, Steve

Antivirus application Fowler, Steve (Aug 09)

Franklin, Elliott

Re: Quick show of hands Franklin, Elliott (Aug 10)
Re: University-Wide Risk Assessment Franklin, Elliott (Aug 18)
Re: University-Wide Risk Assessment Franklin, Elliott (Aug 18)
Re: Illegal Downloads Franklin, Elliott (Sep 05)

Frank T. Shylkofski

Re: Disclaimers Frank T. Shylkofski (Sep 27)

Gary Dobbins

Re: SSNs, rootkits, Incident Response, etc... Gary Dobbins (Jul 06)
Re: Account Lockout Policies Gary Dobbins (Jul 11)
Re: Embedded OS vulnerabilities and patches Gary Dobbins (Jul 20)

Gary Flynn

Re: Outsourcing Forensics Gary Flynn (Aug 28)
Re: Account Lockout Policies Gary Flynn (Jul 11)
Re: Sample Policies Gary Flynn (Jul 05)
Re: Account Lockout Policies Gary Flynn (Jul 13)
Re: GWU and content monitoring Gary Flynn (Jul 18)
Re: Quick show of hands Gary Flynn (Aug 10)
Re: Firewall - Egress Policy Gary Flynn (Sep 04)
Re: Outsourcing Forensics Gary Flynn (Aug 29)

Gary Golomb

Re: GWU and content monitoring Gary Golomb (Jul 18)
Re: SSNs, rootkits, Incident Response, etc... Gary Golomb (Jul 06)
SSNs, rootkits, Incident Response, etc... Gary Golomb (Jul 06)
Re: GWU and content monitoring Gary Golomb (Jul 19)

Geoff Nathan

Re: Wireless Guest Access Geoff Nathan (Sep 29)
Re: Wireless Guest Access Geoff Nathan (Sep 28)
Re: Centralized security administration Geoff Nathan (Aug 19)

Geoffrey S. Nathan

Re: Quick show of hands Geoffrey S. Nathan (Aug 10)

George C. Russ

Re: New Video Educates Students on Illegal File Sharing George C. Russ (Aug 25)
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status George C. Russ (Jul 14)

Gerry Sneeringer

Re: GWU and content monitoring Gerry Sneeringer (Jul 19)

Gibbs, Aaron M.

Re: Gibbs, Aaron M. (Jul 20)
Illegal Downloads Gibbs, Aaron M. (Sep 05)

Graham Toal

Re: Account Lockout Policies Graham Toal (Jul 14)
Re: Mass email handling Graham Toal (Jul 13)
Re: SSNs, rootkits, Incident Response, etc... Graham Toal (Jul 07)
Re: Password entropy Graham Toal (Jul 24)
Re: Account Lockout Policies Graham Toal (Jul 11)
Re: Product request - Enterprise whole disk encryption for laptops Graham Toal (Jul 14)
Re: SSNs, rootkits, Incident Response, etc... Graham Toal (Jul 06)
Re: Poll: Anti-Spyware on servers Graham Toal (Jul 10)
Re: OS virtualization at the desktop Graham Toal (Jul 13)
Re: Password entropy Graham Toal (Jul 24)
Re: NAC Implementation Graham Toal (Jul 21)
Re: Password entropy Graham Toal (Jul 20)
Re: Password entropy Graham Toal (Jul 21)
Re: Security Requirements of Federal Funding Agencies Graham Toal (Aug 29)

Greenberg, David A

Re: Disk Scrubbing/Secure Disk Erasure Greenberg, David A (Jul 27)

Greg Schaffer

Re: GAO Peer2Peer Survey Greg Schaffer (Aug 04)

HALL, NATHANIEL D.

Re: Wireless Guest Access HALL, NATHANIEL D. (Sep 28)

Harold Winshel

Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 15)
Re: Encryption of university data Harold Winshel (Jul 21)
Re: Password entropy Harold Winshel (Jul 24)
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 15)
Re: Password entropy Harold Winshel (Jul 24)
Re: Password entropy Harold Winshel (Jul 20)
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 20)
Re: Centralized security administration Harold Winshel (Aug 18)
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 17)
Re: Password entropy Harold Winshel (Jul 20)
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 14)
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel (Jul 17)

H. Morrow Long

Re: Laptop recovery software H. Morrow Long (Aug 07)
Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings H. Morrow Long (Sep 10)
Re: Good Investigation/Forensic groups - was: SSNs, rootkits, Incident Response, etc... H. Morrow Long (Jul 08)
Re: Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings H. Morrow Long (Sep 10)
IT Security Professionals and the EDUCAUSE Member Directory H. Morrow Long (Sep 05)
Re: New Video Educates Students on Illegal File Sharing H. Morrow Long (Aug 23)

Howell, Paul

Re: Security of Research Data Howell, Paul (Sep 05)
Re: Security of Research Data Howell, Paul (Sep 12)
Re: Security of Research Data Howell, Paul (Sep 13)

Hull, Dave

Re: Rainbow Tables and Authentication Alternatives Hull, Dave (Jul 10)

Hunt,Keith A

Re: Centralized security administration Hunt,Keith A (Aug 18)
Re: Centralized security administration Hunt,Keith A (Aug 18)
Re: University-Wide Risk Assessment Hunt,Keith A (Aug 18)
Centralized security administration Hunt,Keith A (Aug 17)
Re: Centralized security administration Hunt,Keith A (Aug 18)

Jack Suess

Re: Firewall - Egress Policy Jack Suess (Sep 04)
Re: Account Lockout Policies jack suess (Jul 12)

James H Moore

Good Investigation/Forensic groups - was: SSNs, rootkits, Incident Response, etc... James H Moore (Jul 07)
Re: Data Classification James H Moore (Jul 26)
Re: Social Security Numbers and Self Service James H Moore (Jul 20)
Blackberry security expertise needed James H Moore (Jul 25)
Re: Password entropy James H Moore (Jul 23)
Rainbow Tables and Authentication Alternatives James H Moore (Jul 10)
Re: Product request - Enterprise whole disk encryption for laptops James H Moore (Jul 14)

Jason Richardson

HIPAA compliance auditing Jason Richardson (Sep 19)
Re: Quick show of hands Jason Richardson (Aug 16)
Re: DMCA (Ares and other) Jason Richardson (Sep 19)
Re: Quick show of hands Jason Richardson (Aug 16)
Re: Quick show of hands Jason Richardson (Aug 10)
Quick show of hands Jason Richardson (Aug 10)
RIAA Complaints (was Re: DMCA (Ares and other)) Jason Richardson (Sep 19)

Jay Tumas

Re: Outsourcing Forensics Jay Tumas (Aug 28)

Jeff Brainard

GWU and content monitoring Jeff Brainard (Jul 18)

Jeff Giacobbe

Re: Wireless Guest Access Jeff Giacobbe (Sep 28)

Jeff Kell

Re: Product request - Enterprise whole disk encryption for laptops Jeff Kell (Jul 17)
Re: Quick show of hands Jeff Kell (Aug 10)

Jeffrey I. Schiller

Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Jeffrey I. Schiller (Jul 13)

Jeni Li

Re: Good Investigation/Forensic groups - was: SSNs, rootkits, Incident Response, etc... Jeni Li (Jul 07)

Jim Dillon

Re: Outsourcing Forensics Jim Dillon (Aug 29)
Re: University-Wide Risk Assessment Jim Dillon (Aug 18)
Re: Security of Research Data Jim Dillon (Sep 01)
Re: Security Requirements of Federal Funding Agencies Jim Dillon (Aug 29)
Re: Campus threat models Jim Dillon (Aug 10)
Re: Security of Research Data Jim Dillon (Sep 05)
Re: Quick show of hands Jim Dillon (Aug 10)
Re: hard drive destruction Jim Dillon (Aug 10)
Re: Outsourcing Forensics Jim Dillon (Aug 29)

Jimmy Kuo

Re: Password entropy Jimmy Kuo (Jul 24)

Jimmy L. Fikes

Enterprise whole disk encryption Jimmy L. Fikes (Jul 18)

Jodi Ito

Re: Quick show of hands Jodi Ito (Aug 10)

Joe Barron

Re: Data Classification (Out of Ofice Reply) Joe Barron (Jul 27)

Joel Rosenblatt

Re: Laptop recovery software Joel Rosenblatt (Aug 07)
Re: Quick show of hands Joel Rosenblatt (Aug 10)

Joe St Sauver

Re: Wireless Guest Access Joe St Sauver (Sep 28)

John

Re: SSNs, rootkits, Incident Response, etc... John (Jul 06)

John Kaftan

Re: Upper Midwest K-20 IT Security Conference Opportunity John Kaftan (Sep 19)
IPS John Kaftan (Jul 20)
[no subject] John Kaftan (Jul 20)

John Kemp

Re: Quick show of hands John Kemp (Aug 10)

John Piercy

Re: Quick show of hands John Piercy (Aug 16)

John Rasmussen

Re: John Rasmussen (Jul 20)
Re: IPS John Rasmussen (Jul 20)

John Tooley

Re: SSNs, rootkits, Incident Response, etc... John Tooley (Jul 06)

Jonny Sweeny

Re: Quick show of hands Jonny Sweeny (Aug 10)
Re: Account Lockout Policies Jonny Sweeny (Jul 14)

Jordan Wiens

Re: New Video Educates Students on Illegal File Sharing Jordan Wiens (Aug 25)
Re: New Video Educates Students on Illegal File Sharing Jordan Wiens (Aug 25)

Joseph Clark

Re: Spam and Wireless Joseph Clark (Sep 14)
Re: Spam and Wireless Joseph Clark (Sep 14)
Re: October is Security Awareness Month Joseph Clark (Sep 14)
Re: Frustrated USC applicant pleads guilty to break-in Joseph Clark (Sep 14)
Re: Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings Joseph Clark (Sep 14)
Re: Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings Joseph Clark (Sep 14)
Re: Security of Research Data Joseph Clark (Sep 14)
Re: Spam and Wireless Joseph Clark (Sep 14)
Re: <SPAM> Firewall Security Architecture Joseph Clark (Sep 14)

Julian Y. Koh

Re: RIAA Complaints (was Re: DMCA (Ares and other)) Julian Y. Koh (Sep 19)
Re: Disclaimers Julian Y. Koh (Sep 26)
Re: DMCA (Ares and other) Julian Y. Koh (Sep 18)

Justin St. Onge

SUNY Oneonta security scanning tool V2 available for release (MOPR) Justin St. Onge (Sep 07)

Kathy Bergsma

UF security professionals win world's largest 'hacking' competition Kathy Bergsma (Aug 10)

Ken Connelly

Re: Outsourcing Forensics Ken Connelly (Aug 29)

Kevin Amorin

Re: NAC Implementation Kevin Amorin (Jul 21)

Kevin Shalla

Re: SOPHAS security? Kevin Shalla (Jul 20)

Koerber, Jeff

Re: Wireless Guest Access Koerber, Jeff (Sep 28)

Krizi Trivisani

Re: Data Classification Krizi Trivisani (Jul 27)
Re: Quick show of hands Krizi Trivisani (Aug 10)
Share Your Campus Plans to Observe National Cyber Security Awareness Month Krizi Trivisani (Jul 28)
Re: Product request - Enterprise whole disk encryption for laptops Krizi Trivisani (Jul 14)
Forensic Engineer Position - GWU Krizi Trivisani (Jul 24)

Krulewitch, Sean V

Indiana University Security Advisory: Fuji Xerox Printing Systems (FXPS) print engine vulnerabilities Krulewitch, Sean V (Aug 24)

Lee Weers

Re: IPS Lee Weers (Jul 20)

Les LaCroix

Re: hard drive destruction Les LaCroix (Aug 10)

Linda Pruss

Re: Product request - Enterprise whole disk encryption for laptops Linda Pruss (Jul 17)

Lopez, Diego (District)

Re: Change Management Lopez, Diego (District) (Aug 03)

Louis Brooks

Disk Scrubbing/Secure Disk Erasure Louis Brooks (Jul 27)
Re: Disk Scrubbing/Secure Disk Erasure Louis Brooks (Jul 28)

Louise O'Sullivan

Autoreply: Re: Security of Research Data Louise O'Sullivan (Sep 01)
Autoreply: [BULK] Re: Quick show of hands Louise O'Sullivan (Aug 11)
Autoreply: Re: Sample Policies Louise O'Sullivan (Jul 05)

Lucas, Bryan

Re: Poll: Anti-Spyware on servers Lucas, Bryan (Jul 10)
Re: host based firewall for windows 2003 server? Lucas, Bryan (Jul 14)

Marcos Vieyra

SOPHAS security? Marcos Vieyra (Jul 20)

Mark Newman

Re: Product request - Enterprise whole disk encryption for laptops Mark Newman (Jul 17)
Re: Product request - Enterprise whole disk encryption for laptops Mark Newman (Jul 17)

Mark S. Bruhn

Re: Frustrated USC applicant pleads guilty to break-in Mark S. Bruhn (Sep 12)
Re: Identity Protection Services Mark S. Bruhn (Aug 16)

Mark T. Nardone

Re: hard drive destruction Mark T. Nardone (Aug 10)

Marty Hoag

Upper Midwest K-20 IT Security Conference Opportunity Marty Hoag (Sep 18)
Re: Upper Midwest K-20 IT Security Conference Opportunity Marty Hoag (Sep 19)

Mary Shaffer

Re: Disk Scrubbing/Secure Disk Erasure Mary Shaffer (Jul 27)

Matt Arthur

Re: Wireless Guest Access Matt Arthur (Sep 28)
Wireless Guest Access Matt Arthur (Sep 28)

Matthew Keller

Re: Illegal Downloads Matthew Keller (Sep 06)

Mayne, Jim

Embedded OS vulnerabilities and patches Mayne, Jim (Jul 20)

Mclaughlin, Kevin L (mclaugkl)

Re: Mclaughlin, Kevin L (mclaugkl) (Jul 20)
Re: Quick show of hands Mclaughlin, Kevin L (mclaugkl) (Aug 16)
Re: Outsourcing Forensics Mclaughlin, Kevin L (mclaugkl) (Aug 29)
Re: Outsourcing Forensics Mclaughlin, Kevin L (mclaugkl) (Aug 28)

Melissa Guenther

Another Security Awareness Resource Melissa Guenther (Aug 11)

Michael Bean

Re: DMCA (Ares and other) Michael Bean (Sep 18)
Re: Michael Bean (Jul 20)

Michael Cole

Re: NAC Implementation Michael Cole (Jul 20)

Michael Fox

hard drive destruction Michael Fox (Aug 10)

Michael Lymbery

802.1x for wired connections Michael Lymbery (Sep 13)

Nate Johnson

Re: New Video Educates Students on Illegal File Sharing Nate Johnson (Aug 25)

Nick Lewis

Re: Poll: Anti-Spyware on servers Nick Lewis (Jul 10)

O'Callaghan, Daniel

Re: Quick show of hands O'Callaghan, Daniel (Aug 10)
CompuSec encryption software O'Callaghan, Daniel (Sep 28)

Pace, Guy

Re: OS virtualization at the desktop Pace, Guy (Jul 13)
Re: hard drive destruction Pace, Guy (Aug 10)

Paul Russell

Re: Password entropy Paul Russell (Jul 23)

Penn, Blake

Re: Penn, Blake (Jul 20)

Randy Grimshaw

Web Content Change Management / Scanner Randy Grimshaw (Aug 03)
Re: Spam and Wireless Randy Grimshaw (Sep 11)
Re: NAC Implementation Randy Grimshaw (Jul 20)

Randy Marchany

Re: Wireless Guest Access Randy Marchany (Sep 28)
Re: University-Wide Risk Assessment Randy Marchany (Aug 18)
Re: GWU and content monitoring Randy Marchany (Jul 23)
Re: Security Awareness for students Randy Marchany (Sep 26)
Re: Security Awareness for students Randy Marchany (Sep 25)
Re: Account Lockout Policies Randy Marchany (Jul 11)

Raw, Randy

DR/BCP questions Raw, Randy (Jul 28)

Richard Hopkins

Re: Richard Hopkins (Jul 20)

Rick Coloccia

Re: DMCA (Ares and other) Rick Coloccia (Sep 18)
Re: DMCA (Ares and other) Rick Coloccia (Sep 18)

Rizzo, James

Re: New Video Educates Students on Illegal File Sharing Rizzo, James (Aug 23)

Robert Kerr

Re: Password entropy Robert Kerr (Jul 24)

Robert Maxwell

Re: Quick show of hands Robert Maxwell (Aug 10)

Robert Ono

Re: Centralized security administration Robert Ono (Aug 18)

Robert Riley

Re: Enterprise whole disk encryption Robert Riley (Aug 04)

Rob Whalen

Re: DMCA (Ares and other) Rob Whalen (Sep 18)

Rodney Petersen

Re: Deleting Online Predators Act Rodney Petersen (Aug 14)
POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Rodney Petersen (Jul 13)
Re: Quick show of hands Rodney Petersen (Aug 10)
Re: Security Awareness for students Rodney Petersen (Sep 25)
Re: University-Wide Risk Assessment Rodney Petersen (Aug 21)
New Video Educates Students on Illegal File Sharing Rodney Petersen (Aug 22)
P2P Filesharing Hearing and Related EDUCAUSE2006 Sessions Rodney Petersen (Sep 29)
Re: GAO Peer2Peer survey Rodney Petersen (Aug 01)
Security Requirements of Federal Funding Agencies Rodney Petersen (Aug 29)

Roger Safian

Re: Password entropy Roger Safian (Jul 19)
Re: Illegal Downloads Roger Safian (Sep 05)
Re: Password entropy Roger Safian (Jul 20)
Re: DMCA (Ares and other) Roger Safian (Sep 18)
Re: Password entropy Roger Safian (Jul 19)
Re: Password entropy Roger Safian (Jul 23)
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian (Jul 17)
Re: Password entropy Roger Safian (Jul 25)
Re: Password entropy Roger Safian (Jul 19)
Re: Password entropy Roger Safian (Jul 20)
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian (Jul 17)
Re: Password entropy Roger Safian (Jul 20)
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian (Jul 17)
Re: Password entropy Roger Safian (Jul 20)
Re: Password entropy Roger Safian (Jul 19)
Call for Papers - 19th Annual FIRST Conference Roger Safian (Sep 22)
Re: Password entropy Roger Safian (Jul 21)
Re: Password entropy Roger Safian (Jul 24)
Re: GWU and content monitoring Roger Safian (Jul 19)
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian (Jul 15)
Re: Password entropy Roger Safian (Jul 19)
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian (Jul 17)
Re: PCI Compliance Roger Safian (Jul 20)
Re: Password entropy Roger Safian (Jul 20)
Re: Password entropy Roger Safian (Jul 23)
Re: Password entropy Roger Safian (Jul 24)
Re: Password entropy Roger Safian (Jul 20)

ron behrang

URGENT -- WEB FARM SCALING ron behrang (Aug 18)

Rose, Ryan

Re: Quick show of hands Rose, Ryan (Aug 16)
PCI Compliance Rose, Ryan (Jul 20)

Roy Hatcher

Re: hard drive destruction Roy Hatcher (Aug 10)

Russell Fulton

Re: Quick show of hands Russell Fulton (Aug 10)
Re: Product request - Enterprise whole disk encryption for laptops Russell Fulton (Jul 19)
Re: Account Lockout Policies Russell Fulton (Jul 12)
Re: Outsourcing Forensics Russell Fulton (Aug 29)
Re: DMCA (Ares and other) Russell Fulton (Sep 18)

Saburo Usami

Account Lockout Policies Saburo Usami (Jul 11)

Sachnoff, Neil

Re: Enterprise whole disk encryption Sachnoff, Neil (Aug 06)

Sadler, Connie

Re: Centralized security administration Sadler, Connie (Aug 18)
Re: Phone home software & laptop encryption Sadler, Connie (Aug 11)
Re: UF security professionals win world's largest 'hacking' competition Sadler, Connie (Aug 10)
Re: Centralized security administration Sadler, Connie (Aug 17)
Re: Security of Research Data Sadler, Connie (Sep 11)
Re: Quick show of hands Sadler, Connie (Aug 10)

Samuel Liles

Re: Outsourcing Forensics Samuel Liles (Aug 29)

Schmidt, Eric W

Re: Quick show of hands Schmidt, Eric W (Aug 10)

Scholz, Greg

DMCA (Ares and other) Scholz, Greg (Sep 18)
Re: IPS Scholz, Greg (Jul 20)
Re: Scholz, Greg (Jul 20)
Re: RIAA Complaints (was Re: DMCA (Ares and other)) Scholz, Greg (Sep 19)

Scott Bradner

Re: Quick show of hands Scott Bradner (Aug 10)

Scott Genung

October is Security Awareness Month Scott Genung (Sep 12)
Re: Scott Genung (Jul 20)

scott hollatz

Re: Password entropy scott hollatz (Jul 19)
Re: Password entropy scott hollatz (Jul 19)

Seruya, Stewart

Disclaimers Seruya, Stewart (Sep 26)

Sheri Thompson

Data Breaches Sheri Thompson (Sep 15)

Sherry Callahan

Re: Quick show of hands Sherry Callahan (Aug 10)

Shirley Payne

Registration Open for 2006 VA SCAN Conference Shirley Payne (Aug 11)
Re: University-Wide Risk Assessment Shirley Payne (Aug 18)
Re: Security Awareness for students Shirley Payne (Sep 26)

Skinner, Lara

Re: Security Awareness for students Skinner, Lara (Sep 25)

Solomon Asmelash

Banner Security Solomon Asmelash (Aug 07)

Stephen C Gay

Encryption of university data Stephen C Gay (Jul 19)

Steve Brukbacher

Re: Security Requirements of Federal Funding Agencies Steve Brukbacher (Aug 29)
Data Classification Steve Brukbacher (Jul 26)
Re: Security of Research Data Steve Brukbacher (Sep 01)

Steve Lape

Re: Quick show of hands Steve Lape (Aug 10)

Steve Lovaas

Re: Wireless Guest Access Steve Lovaas (Sep 28)
Re: Firewall - Egress Policy Steve Lovaas (Sep 05)
CampusBackup.org and similar remote backup options Steve Lovaas (Jul 18)
Re: Wireless Guest Access Steve Lovaas (Sep 28)

Steve Schuster

Re: Quick show of hands Steve Schuster (Aug 10)

Steve Werby

Re: Encryption of university data Steve Werby (Jul 21)

Steve Worona

CALEA Webcast on Tuesday, Aug. 1 Steve Worona (Jul 28)

Stewart, Ian

Data classification Stewart, Ian (Sep 06)

Theresa M Rowe

Re: PCI Compliance Theresa M Rowe (Jul 20)
Data classification Theresa M Rowe (Jul 27)

Theresa Semmens

Re: Quick show of hands Theresa Semmens (Aug 10)

Thompson, Sheri J

Re: Disclaimers Thompson, Sheri J (Sep 27)
Security Awareness for Students Thompson, Sheri J (Sep 28)

Tim Lane

<SPAM> Firewall Security Architecture Tim Lane (Sep 12)

Tom Davis

Re: Centralized security administration Tom Davis (Aug 18)

Tom Siu

Re: Security of Research Data Tom Siu (Sep 18)
GAO Peer2Peer Survey Tom Siu (Aug 02)
GAO Peer2Peer survey Tom Siu (Jul 25)
Data Classification Tom Siu (Jul 28)

Tony Gauvin

Re: hard drive destruction Tony Gauvin (Aug 10)

Tracy Mitrano

Re: Security of Research Data Tracy Mitrano (Sep 13)
Re: Security of Research Data Tracy Mitrano (Sep 12)
Re: Security of Research Data Tracy Mitrano (Sep 13)

Tristan RHODES

Re: NAC Implementation Tristan RHODES (Aug 01)

unisog

Re: Autoreply: Re: Security of Research Data unisog (Sep 01)

Valdis Kletnieks

Re: Centralized security administration Valdis Kletnieks (Aug 18)
Re: SSNs, rootkits, Incident Response, etc... Valdis Kletnieks (Jul 07)
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Valdis Kletnieks (Jul 14)
Re: Password entropy Valdis Kletnieks (Jul 25)
Re: Change Management Valdis Kletnieks (Aug 03)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 17)
Re: Account Lockout Policies Valdis Kletnieks (Jul 11)
Re: Password entropy Valdis Kletnieks (Jul 23)
Re: Looking for consesus Valdis Kletnieks (Aug 03)
Re: Mass email handling Valdis Kletnieks (Jul 13)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 17)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 15)
Re: Disk Scrubbing/Secure Disk Erasure Valdis Kletnieks (Jul 27)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 15)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 17)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 15)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 15)
Re: Password entropy Valdis Kletnieks (Jul 24)
Re: Account Lockout Policies Valdis Kletnieks (Jul 11)
Re: Password entropy Valdis Kletnieks (Jul 20)
Re: Password entropy Valdis Kletnieks (Jul 19)
Re: Password entropy Valdis Kletnieks (Jul 24)
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks (Jul 17)
Re: Password entropy Valdis Kletnieks (Jul 23)
Re: Centralized security administration Valdis Kletnieks (Aug 18)

Valerie Vogel

Free Webcast on Aug. 16: FTC's Campaign Against Identity Theft Valerie Vogel (Aug 14)
Going Beyond Recovery to Continuity: Lessons Learned Valerie Vogel (Aug 29)
Security Task Force Open Meeting at EDUCAUSE 2006 Valerie Vogel (Aug 17)

Victoriano Casas, ISO

Re: University-Wide Risk Assessment Victoriano Casas, ISO (Aug 18)

Vuong Phung

Re: host based firewall for windows 2003 server? Vuong Phung (Jul 14)

Waller, Michael A. (HSC)

Re: Looking for consesus Waller, Michael A. (HSC) (Aug 03)
Re: Product request - Enterprise whole disk encryption for laptops Waller, Michael A. (HSC) (Jul 20)
Re: Quick show of hands Waller, Michael A. (HSC) (Aug 10)
Re: Data Classification Waller, Michael A. (HSC) (Jul 28)

Walter Reynolds

Re: Spam and Wireless Walter Reynolds (Sep 12)

Wayne Bullock

Re: IPS Wayne Bullock (Jul 20)
Re: IPS Wayne Bullock (Jul 20)
Re: Wayne Bullock (Jul 20)
Re: NAC Implementation Wayne Bullock (Jul 21)
Re: RIAA Complaints (was Re: DMCA (Ares and other)) Wayne Bullock (Sep 19)

Wes Young

Re: Data Breaches Wes Young (Sep 18)
Re: NAC Implementation Wes Young (Aug 02)
Re: IPS Wes Young (Jul 20)
Re: Wes Young (Jul 20)

William C. Moore II

Laptop recovery software William C. Moore II (Aug 07)

William Custer

Re: Quick show of hands William Custer (Aug 10)
Re: Security of Research Data William Custer (Sep 05)

Willis Marti

RIAA Complaints (was Re: DMCA (Ares and other)) Willis Marti (Sep 19)

Wilson Dillaway

Re: CALEA Webcast on Tuesday, Aug. 1 Wilson Dillaway (Jul 31)

Winders, Timothy A

Re: Disclaimers Winders, Timothy A (Sep 26)

Wood, Anne M (wood)

Re: NAC Implementation Wood, Anne M (wood) (Jul 21)
Re: IPS Wood, Anne M (wood) (Jul 20)

Wright, Sallie F

Phone home software & laptop encryption Wright, Sallie F (Aug 11)

Yasui, Michael

Re: Spam and Wireless Yasui, Michael (Sep 14)

Youngquist, Jason R.

Product request - Enterprise whole disk encryption for laptops Youngquist, Jason R. (Jul 14)