Educause Security Discussion: by date

507 messages starting Jul 05 06 and ending Sep 29 06
Date index | Thread index | Author index


Wednesday, 05 July

Re: Sample Policies Gary Flynn
Autoreply: Re: Sample Policies Louise O'Sullivan

Thursday, 06 July

SSNs, rootkits, Incident Response, etc... Gary Golomb
Re: SSNs, rootkits, Incident Response, etc... Graham Toal
Re: SSNs, rootkits, Incident Response, etc... John Tooley
Re: SSNs, rootkits, Incident Response, etc... John
Re: SSNs, rootkits, Incident Response, etc... Gary Dobbins
Re: SSNs, rootkits, Incident Response, etc... Gary Golomb

Friday, 07 July

Re: SSNs, rootkits, Incident Response, etc... Graham Toal
Good Investigation/Forensic groups - was: SSNs, rootkits, Incident Response, etc... James H Moore
IPS - Tipping Point vs. ISS? Dave Koontz
Re: IPS - Tipping Point vs. ISS? Consolvo, Corbett
Re: Good Investigation/Forensic groups - was: SSNs, rootkits, Incident Response, etc... Jeni Li
Re: SSNs, rootkits, Incident Response, etc... Valdis Kletnieks

Saturday, 08 July

Re: Good Investigation/Forensic groups - was: SSNs, rootkits, Incident Response, etc... H. Morrow Long

Monday, 10 July

Poll: Anti-Spyware on servers Basgen, Brian
Re: Poll: Anti-Spyware on servers Lucas, Bryan
Re: Poll: Anti-Spyware on servers Graham Toal
Re: Poll: Anti-Spyware on servers Consolvo, Corbett
Rainbow Tables and Authentication Alternatives James H Moore
Re: Rainbow Tables and Authentication Alternatives Hull, Dave
Re: Poll: Anti-Spyware on servers Nick Lewis

Tuesday, 11 July

Re: Rainbow Tables and Authentication Alternatives Anthony Maszeroski
Account Lockout Policies Saburo Usami
Re: Account Lockout Policies Eric Brewer
Re: Account Lockout Policies Graham Toal
Re: Account Lockout Policies Cheek, Leigh
Re: Account Lockout Policies Valdis Kletnieks
Re: Account Lockout Policies Cheek, Leigh
Re: Account Lockout Policies Randy Marchany
Re: Account Lockout Policies Gary Flynn
Re: Account Lockout Policies Gary Dobbins
Re: Account Lockout Policies Valdis Kletnieks

Wednesday, 12 July

Re: Account Lockout Policies Russell Fulton
Re: Account Lockout Policies jack suess

Thursday, 13 July

Re: Account Lockout Policies Gary Flynn
OS virtualization at the desktop Chad McDonald, CISSP
Re: OS virtualization at the desktop Pace, Guy
Poll Results: Anti-Spyware on servers Basgen, Brian
Mass email handling Chris Fontaine
Re: OS virtualization at the desktop Graham Toal
Re: Mass email handling Graham Toal
Re: Mass email handling Basgen, Brian
Re: Mass email handling Valdis Kletnieks
Re: Mass email handling David Gillett
POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Rodney Petersen
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status David L. Wasley
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Jeffrey I. Schiller

Friday, 14 July

Re: Account Lockout Policies Jonny Sweeny
Product request - Enterprise whole disk encryption for laptops Youngquist, Jason R.
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Alan Amesbury
Re: Product request - Enterprise whole disk encryption for laptops Krizi Trivisani
Re: Product request - Enterprise whole disk encryption for laptops David Morton
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status Valdis Kletnieks
Re: POLICY ALERT: College and University CALEA Exemption Rests on Private Network Status George C. Russ
Re: Account Lockout Policies Graham Toal
Re: Product request - Enterprise whole disk encryption for laptops Graham Toal
Re: host based firewall for windows 2003 server? Vuong Phung
Re: Password Expiration Alan Amesbury
Re: host based firewall for windows 2003 server? Lucas, Bryan
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel
Re: Product request - Enterprise whole disk encryption for laptops James H Moore

Saturday, 15 July

Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel
paper on security implications of CALEA-VoIP Doug Pearson
Re: Product request - Enterprise whole disk encryption for laptops Cam Beasley
Re: Product request - Enterprise whole disk encryption for laptops Dave Koontz
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel
Re: Product request - Enterprise whole disk encryption for laptops Charlie Prothero
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks

Monday, 17 July

Re: Product request - Enterprise whole disk encryption for laptops Roger Safian
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian
Re: Product request - Enterprise whole disk encryption for laptops Linda Pruss
Re: Product request - Enterprise whole disk encryption for laptops Jeff Kell
Re: Product request - Enterprise whole disk encryption for laptops Roger Safian
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks
Re: Product request - Enterprise whole disk encryption for laptops Mark Newman
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks
Help explaining why LogMeIn.com type programs are bad. Flagg, Martin D.
Re: Product request - Enterprise whole disk encryption for laptops Mark Newman
Re: Help explaining why LogMeIn.com type programs are bad. Alan Amesbury
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel
Re: Product request - Enterprise whole disk encryption for laptops Valdis Kletnieks

Tuesday, 18 July

Enterprise whole disk encryption Jimmy L. Fikes
CampusBackup.org and similar remote backup options Steve Lovaas
Re: SSNs, rootkits, Incident Response, etc... Alan Amesbury
GWU and content monitoring Jeff Brainard
Re: GWU and content monitoring Gary Flynn
Re: GWU and content monitoring Gary Golomb
Re: Product request - Enterprise whole disk encryption for laptops Charlie Prothero
Re: Rainbow Tables and Authentication Alternatives Alan Amesbury

Wednesday, 19 July

RFP for Penetration Testing Chris Vakhordjian
Re: GWU and content monitoring Gerry Sneeringer
Re: GWU and content monitoring Roger Safian
Re: GWU and content monitoring Gary Golomb
Re: Password entropy Basgen, Brian
Re: Password entropy Brent Sweeny
Re: Password entropy David Gillett
Re: Password entropy Buz Dale
Re: Password entropy Roger Safian
Re: Password entropy scott hollatz
Re: Password entropy Roger Safian
Re: Password entropy Roger Safian
Re: Password entropy Roger Safian
Re: Password entropy David Gillett
Re: Password entropy Roger Safian
Re: Password entropy scott hollatz
Encryption of university data Stephen C Gay
Re: Password entropy Valdis Kletnieks
Re: Password entropy Dave Koontz
Re: Password entropy Basgen, Brian
Re: Password entropy Basgen, Brian
Re: Product request - Enterprise whole disk encryption for laptops Russell Fulton

Thursday, 20 July

Portal / Web Mail timeouts Chad McDonald, CISSP
PCI Compliance Rose, Ryan
Re: Password entropy Roger Safian
Re: Password entropy Roger Safian
Re: Password entropy Roger Safian
Re: Password entropy Roger Safian
[no subject] John Kaftan
Re: Password entropy Roger Safian
Re: PCI Compliance Roger Safian
Re: Michael Bean
Re: Scholz, Greg
Re: PCI Compliance Theresa M Rowe
Re: Mclaughlin, Kevin L (mclaugkl)
Re: Penn, Blake
Re: Portal / Web Mail timeouts Chris Green
IPS John Kaftan
Re: IPS Wes Young
Re: IPS Wood, Anne M (wood)
Re: John Rasmussen
Re: Password entropy Graham Toal
Re: IPS Lee Weers
Re: Richard Hopkins
Re: IPS Scholz, Greg
Re: IPS John Rasmussen
Re: Wes Young
Re: IPS Wayne Bullock
Re: IPS Wayne Bullock
Re: Password entropy Valdis Kletnieks
Social Security Numbers and Self Service Faloba,Jodi L
Re: Password entropy Basgen, Brian
Re: Product request - Enterprise whole disk encryption for laptops Waller, Michael A. (HSC)
Re: Password entropy Roger Safian
Embedded OS vulnerabilities and patches Mayne, Jim
Re: Social Security Numbers and Self Service James H Moore
Re: Gibbs, Aaron M.
Re: Wayne Bullock
SOPHAS security? Marcos Vieyra
Re: Embedded OS vulnerabilities and patches Gary Dobbins
Re: Scott Genung
Re: SOPHAS security? Kevin Shalla
Re: Password entropy Basgen, Brian
NAC Implementation Darnell Walker
Re: Password entropy Harold Winshel
Re: Password entropy Harold Winshel
Re: NAC Implementation Michael Cole
Re: Product request - Enterprise whole disk encryption for laptops Harold Winshel
Re: NAC Implementation Randy Grimshaw

Friday, 21 July

Re: IPS Dave Koontz
Re: Encryption of university data Steve Werby
Re: Password entropy Graham Toal
Re: NAC Implementation Graham Toal
Re: NAC Implementation Consolvo, Corbett
Re: NAC Implementation Darnell Walker
Re: NAC Implementation Wood, Anne M (wood)
Re: NAC Implementation Wayne Bullock
Re: NAC Implementation Kevin Amorin
Re: Encryption of university data Harold Winshel
Re: Encryption of university data Chris Green
Re: NAC Implementation Brian Friday
Re: Password entropy Roger Safian

Sunday, 23 July

Re: Password entropy Valdis Kletnieks
Re: GWU and content monitoring Randy Marchany
Re: Password entropy Roger Safian
Re: Password entropy Roger Safian
Re: Password entropy Paul Russell
Re: Password entropy James H Moore
Re: Password entropy Valdis Kletnieks

Monday, 24 July

Re: Password entropy Harold Winshel
Re: Password entropy Robert Kerr
Re: Brown, Scott
Forensic Engineer Position - GWU Krizi Trivisani
Re: Password entropy Graham Toal
Re: Password entropy Roger Safian
Re: Password entropy Graham Toal
Re: Password entropy Valdis Kletnieks
Re: Password entropy Basgen, Brian
Re: Password entropy Roger Safian
Re: Password entropy Harold Winshel
Re: Password entropy Jimmy Kuo
Re: Password entropy Valdis Kletnieks

Tuesday, 25 July

Re: Password entropy Roger Safian
Re: Password entropy Basgen, Brian
Re: Password entropy Alan Amesbury
Re: Password entropy Valdis Kletnieks
GAO Peer2Peer survey Tom Siu
Blackberry security expertise needed James H Moore
Re: GAO Peer2Peer survey David Lassner

Wednesday, 26 July

Data Classification Steve Brukbacher
Re: Data Classification James H Moore
Re: Data Classification Dick Jacobson

Thursday, 27 July

Re: Data Classification Christopher Misra
Re: Data Classification (Out of Ofice Reply) Joe Barron
Re: Data Classification Krizi Trivisani
Re: Data Classification David C Smith
Data classification Theresa M Rowe
Disk Scrubbing/Secure Disk Erasure Louis Brooks
Re: Disk Scrubbing/Secure Disk Erasure Bruce Rights
Re: Disk Scrubbing/Secure Disk Erasure Valdis Kletnieks
Re: Disk Scrubbing/Secure Disk Erasure Greenberg, David A
Re: Blackberry security expertise needed BEN PIJOR
Re: Disk Scrubbing/Secure Disk Erasure Mary Shaffer

Friday, 28 July

Re: Disk Scrubbing/Secure Disk Erasure Louis Brooks
DR/BCP questions Raw, Randy
Share Your Campus Plans to Observe National Cyber Security Awareness Month Krizi Trivisani
Data Classification Tom Siu
CALEA Webcast on Tuesday, Aug. 1 Steve Worona
Re: Data Classification Waller, Michael A. (HSC)
Re: Data Classification Cam Beasley

Monday, 31 July

Re: CALEA Webcast on Tuesday, Aug. 1 Wilson Dillaway

Tuesday, 01 August

Re: NAC Implementation Tristan RHODES
Re: GAO Peer2Peer survey Rodney Petersen
Re: NAC Implementation David LaPorte

Wednesday, 02 August

Re: Data Classification Ced Bennett
Deleting Online Predators Act Clyde Hoadley
GAO Peer2Peer Survey Tom Siu
Content Security Gateway dennis
Re: NAC Implementation Wes Young

Thursday, 03 August

Change Management Christoffersen, Mark John
Web Content Change Management / Scanner Randy Grimshaw
Looking for consesus Chad McDonald, CISSP
Re: Change Management Lopez, Diego (District)
Re: Change Management Valdis Kletnieks
Re: Looking for consesus Valdis Kletnieks
Re: Looking for consesus David Gillett
Re: Looking for consesus Waller, Michael A. (HSC)
Re: Looking for consesus David L. Rotman
Re: Web Content Change Management / Scanner Brian Reilly

Friday, 04 August

Re: GAO Peer2Peer Survey Greg Schaffer
Re: GAO Peer2Peer Survey Darlene Quackenbush
Re: Enterprise whole disk encryption Robert Riley

Sunday, 06 August

Re: Enterprise whole disk encryption Sachnoff, Neil

Monday, 07 August

Banner Security Solomon Asmelash
Laptop recovery software William C. Moore II
Re: Laptop recovery software Joel Rosenblatt
Re: Laptop recovery software H. Morrow Long

Wednesday, 09 August

Antivirus application Fowler, Steve

Thursday, 10 August

UF security professionals win world's largest 'hacking' competition Kathy Bergsma
Quick show of hands Jason Richardson
Re: Quick show of hands Consolvo, Corbett
Re: Quick show of hands Franklin, Elliott
Re: Quick show of hands Steve Lape
Re: Quick show of hands Christopher E. Cramer
Re: Quick show of hands Chad McDonald, CISSP
Re: Quick show of hands Robert Maxwell
Re: Quick show of hands Scott Bradner
Re: Quick show of hands Brenda B Gombosky
Re: Quick show of hands Jason Richardson
Re: Quick show of hands Joel Rosenblatt
Re: Quick show of hands Geoffrey S. Nathan
Re: Quick show of hands David C. Smith
Re: Quick show of hands O'Callaghan, Daniel
Re: Quick show of hands Theresa Semmens
Re: Quick show of hands Gary Flynn
Re: Quick show of hands William Custer
Re: Quick show of hands Waller, Michael A. (HSC)
Re: Quick show of hands Cathy Hubbs
Re: Quick show of hands Jonny Sweeny
Re: Quick show of hands Steve Schuster
Re: Quick show of hands Schmidt, Eric W
hard drive destruction Michael Fox
Re: hard drive destruction Tony Gauvin
Re: hard drive destruction Les LaCroix
Re: Quick show of hands Rodney Petersen
Re: Quick show of hands Chris Bennett
Re: hard drive destruction Roy Hatcher
Campus threat models Brad Judy
Re: hard drive destruction Mark T. Nardone
Re: hard drive destruction Pace, Guy
Re: Quick show of hands Basgen, Brian
Re: Quick show of hands Jeff Kell
Re: Quick show of hands Sadler, Connie
Re: Quick show of hands Sherry Callahan
Re: Quick show of hands Drews, Jane E
Re: UF security professionals win world's largest 'hacking' competition Sadler, Connie
Re: hard drive destruction Barnes, Jeff
Re: Quick show of hands Jim Dillon
Re: hard drive destruction Jim Dillon
Re: Campus threat models Jim Dillon
Re: Quick show of hands David Grisham
Re: Quick show of hands Russell Fulton
Re: Quick show of hands Jodi Ito
Re: Quick show of hands Krizi Trivisani
Re: Quick show of hands John Kemp
Re: Quick show of hands Donald, A. Wayne
Re: Quick show of hands Cam Beasley

Friday, 11 August

Re: Quick show of hands Brian Nichols
Autoreply: [BULK] Re: Quick show of hands Louise O'Sullivan
Re: Quick show of hands CAROLE CARMODY
Re: Quick show of hands Conor McGrath
Phone home software & laptop encryption Wright, Sallie F
Re: Phone home software & laptop encryption Sadler, Connie
Registration Open for 2006 VA SCAN Conference Shirley Payne
Another Security Awareness Resource Melissa Guenther

Saturday, 12 August

REN-ISAC: Large TCP/445 traffic increase on Abilene Dave Monnier REN-ISAC

Monday, 14 August

[REN-ISAC] MS06-040 status Doug Pearson
Free Webcast on Aug. 16: FTC's Campaign Against Identity Theft Valerie Vogel
Re: Deleting Online Predators Act Rodney Petersen

Tuesday, 15 August

Identity Protection Services Chris Green

Wednesday, 16 August

Re: Identity Protection Services Mark S. Bruhn
Re: Quick show of hands Jason Richardson
Re: Quick show of hands Rose, Ryan
Re: Quick show of hands Delaney, Cherry L.
Re: Quick show of hands John Piercy
Re: Quick show of hands Mclaughlin, Kevin L (mclaugkl)
Re: Quick show of hands Colleen Keller
Re: Quick show of hands Jason Richardson
Re: Quick show of hands Colleen Keller

Thursday, 17 August

Centralized security administration Hunt,Keith A
Re: Centralized security administration Bob Kehr
Re: Centralized security administration Sadler, Connie
Security Task Force Open Meeting at EDUCAUSE 2006 Valerie Vogel

Friday, 18 August

University-Wide Risk Assessment Alex Campoe
Re: Centralized security administration Tom Davis
Re: University-Wide Risk Assessment Franklin, Elliott
Re: University-Wide Risk Assessment Hunt,Keith A
Re: University-Wide Risk Assessment Victoriano Casas, ISO
Re: University-Wide Risk Assessment Randy Marchany
Re: University-Wide Risk Assessment Franklin, Elliott
Re: University-Wide Risk Assessment Brad Judy
Re: University-Wide Risk Assessment Jim Dillon
Re: Centralized security administration Hunt,Keith A
Re: Centralized security administration Hunt,Keith A
Re: Centralized security administration Valdis Kletnieks
Re: Centralized security administration Sadler, Connie
Re: Centralized security administration Hunt,Keith A
URGENT -- WEB FARM SCALING ron behrang
Re: Centralized security administration Robert Ono
Re: Centralized security administration Valdis Kletnieks
Re: University-Wide Risk Assessment Cheek, Leigh
Re: University-Wide Risk Assessment Shirley Payne
NewHome: SENF - SEnsitive Number Finder (Maitogai.270) Cam Beasley
Re: Centralized security administration Cal Frye
Re: Centralized security administration Harold Winshel

Saturday, 19 August

Re: Centralized security administration Geoff Nathan

Monday, 21 August

Re: University-Wide Risk Assessment Rodney Petersen

Tuesday, 22 August

New Video Educates Students on Illegal File Sharing Rodney Petersen
Re: New Video Educates Students on Illegal File Sharing Brad Judy

Wednesday, 23 August

Re: New Video Educates Students on Illegal File Sharing Cal Frye
Re: New Video Educates Students on Illegal File Sharing Alan Amesbury
Re: New Video Educates Students on Illegal File Sharing Rizzo, James
Re: New Video Educates Students on Illegal File Sharing Chris Green
Re: New Video Educates Students on Illegal File Sharing Chris Green
Re: New Video Educates Students on Illegal File Sharing H. Morrow Long

Thursday, 24 August

Indiana University Security Advisory: Fuji Xerox Printing Systems (FXPS) print engine vulnerabilities Krulewitch, Sean V

Friday, 25 August

Re: New Video Educates Students on Illegal File Sharing Nate Johnson
Re: New Video Educates Students on Illegal File Sharing George C. Russ
Re: New Video Educates Students on Illegal File Sharing Jordan Wiens
Re: New Video Educates Students on Illegal File Sharing Jordan Wiens

Monday, 28 August

Outsourcing Forensics Bret R Blackman
Re: Outsourcing Forensics Mclaughlin, Kevin L (mclaugkl)
Re: Outsourcing Forensics Jay Tumas
Re: Outsourcing Forensics Drews, Jane E
Re: Outsourcing Forensics Delaney, Cherry L.
Re: Outsourcing Forensics Gary Flynn

Tuesday, 29 August

Re: Outsourcing Forensics Russell Fulton
Re: Outsourcing Forensics Cam Beasley
Re: Outsourcing Forensics Samuel Liles
Re: Outsourcing Forensics Ken Connelly
Re: Outsourcing Forensics Daniel R Jones
Security Requirements of Federal Funding Agencies Rodney Petersen
Re: Outsourcing Forensics Jim Dillon
Re: Security Requirements of Federal Funding Agencies Jim Dillon
Re: Security Requirements of Federal Funding Agencies David C Smith
Re: Outsourcing Forensics Gary Flynn
Re: Security Requirements of Federal Funding Agencies Steve Brukbacher
Re: Outsourcing Forensics Mclaughlin, Kevin L (mclaugkl)
Going Beyond Recovery to Continuity: Lessons Learned Valerie Vogel
Re: Security Requirements of Federal Funding Agencies Graham Toal
Banner 7 Fine Grain Access Control Doug Sandford
Re: Outsourcing Forensics Jim Dillon

Thursday, 31 August

Security of Research Data Crawford, Tim M.

Friday, 01 September

Re: Security of Research Data Jim Dillon
Autoreply: Re: Security of Research Data Louise O'Sullivan
Re: Autoreply: Re: Security of Research Data unisog
Re: Security of Research Data Steve Brukbacher

Monday, 04 September

Firewall - Egress Policy Chris Golden
Re: Firewall - Egress Policy Gary Flynn
Re: Firewall - Egress Policy Cal Frye
Re: Firewall - Egress Policy Jack Suess

Tuesday, 05 September

Re: Security of Research Data Howell, Paul
Re: Firewall - Egress Policy Steve Lovaas
Re: Security of Research Data Brad Judy
Re: Security of Research Data William Custer
Re: Security of Research Data Jim Dillon
Re: Firewall - Egress Policy Bruce Curtis
Illegal Downloads Gibbs, Aaron M.
Re: Illegal Downloads Franklin, Elliott
Re: Illegal Downloads Roger Safian
Re: Illegal Downloads Cal Frye
IT Security Professionals and the EDUCAUSE Member Directory H. Morrow Long

Wednesday, 06 September

Re: Security of Research Data Delaney, Cherry L.
Re: Illegal Downloads Matthew Keller
Re: Illegal Downloads Brian Friday
Data classification Stewart, Ian

Thursday, 07 September

SUNY Oneonta security scanning tool V2 available for release (MOPR) Justin St. Onge

Sunday, 10 September

Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings H. Morrow Long
Re: Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings H. Morrow Long

Monday, 11 September

Frustrated USC applicant pleads guilty to break-in Dan Updegrove
Spam and Wireless Brenda B Gombosky
Re: Security of Research Data Sadler, Connie
Re: Spam and Wireless Randy Grimshaw
Re: Spam and Wireless Brown, Scott

Tuesday, 12 September

Re: Spam and Wireless Walter Reynolds
Re: Frustrated USC applicant pleads guilty to break-in Mark S. Bruhn
October is Security Awareness Month Scott Genung
Re: Security of Research Data Howell, Paul
Re: October is Security Awareness Month Daniel R Jones
Re: Security of Research Data Tracy Mitrano
Re: Security of Research Data Crawford, Tim M.
Re: October is Security Awareness Month Davina Pruitt-Mentle
<SPAM> Firewall Security Architecture Tim Lane

Wednesday, 13 September

Re: Security of Research Data Howell, Paul
Re: Security of Research Data Tracy Mitrano
Re: Security of Research Data Tracy Mitrano
Re: Security of Research Data Crawford, Tim M.
802.1x for wired connections Michael Lymbery

Thursday, 14 September

Re: Security of Research Data Joseph Clark
Re: October is Security Awareness Month Joseph Clark
Re: <SPAM> Firewall Security Architecture Joseph Clark
Re: Spam and Wireless Joseph Clark
Re: Frustrated USC applicant pleads guilty to break-in Joseph Clark
Re: Spam and Wireless Joseph Clark
Re: Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings Joseph Clark
Re: Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings Joseph Clark
Re: Spam and Wireless Yasui, Michael
Re: Spam and Wireless Joseph Clark
Re: Spam and Wireless David Gillett

Friday, 15 September

Data Breaches Sheri Thompson
Re: Security of Research Data Basgen, Brian

Monday, 18 September

Re: Data Breaches Wes Young
Re: Security of Research Data Tom Siu
Upper Midwest K-20 IT Security Conference Opportunity Marty Hoag
DMCA (Ares and other) Scholz, Greg
Re: DMCA (Ares and other) Rick Coloccia
Re: DMCA (Ares and other) Roger Safian
Re: DMCA (Ares and other) Julian Y. Koh
Re: DMCA (Ares and other) Rick Coloccia
Re: DMCA (Ares and other) Rob Whalen
Re: DMCA (Ares and other) Michael Bean
Re: DMCA (Ares and other) Russell Fulton

Tuesday, 19 September

Re: DMCA (Ares and other) Jason Richardson
RIAA Complaints (was Re: DMCA (Ares and other)) Willis Marti
Re: RIAA Complaints (was Re: DMCA (Ares and other)) Scholz, Greg
Re: Upper Midwest K-20 IT Security Conference Opportunity John Kaftan
Re: RIAA Complaints (was Re: DMCA (Ares and other)) Julian Y. Koh
RIAA Complaints (was Re: DMCA (Ares and other)) Jason Richardson
Re: Upper Midwest K-20 IT Security Conference Opportunity Marty Hoag
Re: RIAA Complaints (was Re: DMCA (Ares and other)) Wayne Bullock
HIPAA compliance auditing Jason Richardson
Snort rule for IE / VML issue Chris Harrington

Wednesday, 20 September

Re: Snort rule for IE / VML issue Chris Green
Re: Snort rule for IE / VML issue Chris Harrington

Friday, 22 September

Call for Papers - 19th Annual FIRST Conference Roger Safian
Re: Call for Papers - 19th Annual FIRST Conference Chris D.i.s. Fontaine

Monday, 25 September

Security Awareness for students Christopher Penido
Re: Security Awareness for students Colleen Keller
Re: Security Awareness for students Christopher Penido
Re: Security Awareness for students Randy Marchany
Re: Security Awareness for students Rodney Petersen
Re: Security Awareness for students Skinner, Lara
Re: Security Awareness for students Christopher Penido
Re: Security Awareness for students Crawford, Tim M.

Tuesday, 26 September

Password Clipping Levels and Password Strength Brenda B Gombosky
Re: Security Awareness for students Shirley Payne
Re: Security Awareness for students Brian Kaye
Re: Security Awareness for students Randy Marchany
Disclaimers Seruya, Stewart
Re: Disclaimers David Gillett
Re: Disclaimers Winders, Timothy A
Re: Disclaimers Julian Y. Koh

Wednesday, 27 September

Re: Disclaimers Thompson, Sheri J
Re: Disclaimers Frank T. Shylkofski

Thursday, 28 September

Security Awareness for Students Thompson, Sheri J
Re: Security Awareness for Students Brad Judy
Wireless Guest Access Matt Arthur
Re: Wireless Guest Access Randy Marchany
Re: Wireless Guest Access HALL, NATHANIEL D.
Re: Wireless Guest Access Christopher Misra
Re: Wireless Guest Access Steve Lovaas
Re: Wireless Guest Access Geoff Nathan
Re: Wireless Guest Access Joe St Sauver
Re: Wireless Guest Access Matt Arthur
Re: Wireless Guest Access Steve Lovaas
CompuSec encryption software O'Callaghan, Daniel
Re: Wireless Guest Access Jeff Giacobbe
Re: Wireless Guest Access Koerber, Jeff

Friday, 29 September

Re: Wireless Guest Access Geoff Nathan
P2P Filesharing Hearing and Related EDUCAUSE2006 Sessions Rodney Petersen