Educause Security Discussion: by date
301 messages
starting Jul 02 07 and
ending Sep 30 07
Date index |
Thread index |
Author index
Monday, 02 July
Research on BitLocker Drive Encryption HALL, NATHANIEL D.
Tuesday, 03 July
"postcard" spams. Matthew Gracie
Re: "postcard" spams. Perry, Jeff
Re: "postcard" spams. Theresa Semmens
Re: "postcard" spams. David Lundy
Re: "postcard" spams. Alan Amesbury
Re: "postcard" spams. Les LaCroix
Thursday, 05 July
sample position descriptions Steve Brukbacher
Friday, 06 July
Re: Electronic card access/facilities Matthew Gracie
Secret Service Safe School Seminar - Free event in DC @ GW Krizi Trivisani
Free Webcast Tuesday on Tor, a tool for Internet anonymity Steve Worona
Veterans Affairs Data Handling Chris Green
Re: Veterans Affairs Data Handling Valdis Kletnieks
Monday, 09 July
Re: Veterans Affairs Data Handling Schmidt, Eric W
Re: Veterans Affairs Data Handling St Clair, Jim
Friday, 13 July
Re: Training advice Bob Ono
Tuesday, 17 July
Macintosh java updates Gary Flynn
Re: Macintosh java updates Julian Y. Koh
Linux/Unix email list recommendation? Vuong Phung
Re: Linux/Unix email list recommendation? Jarrod Millman
Re: Linux/Unix email list recommendation? Valdis Kletnieks
Re: Linux/Unix email list recommendation? Vuong Phung
Re: Linux/Unix email list recommendation? Jarrod Millman
List recommendations Chris Gauthier
Re: Linux/Unix email list recommendation? Hull, Dave
Re: Linux/Unix email list recommendation? Jarrod Millman
Wednesday, 18 July
Re: List recommendations John Henry Maurice
Re: Macintosh java updates Curt Wilson
Thursday, 19 July
PCI Compliance Policies Sandford, Doug
Re: PCI Compliance Policies Brewer, Alex D
Re: PCI Compliance Policies Penn, Blake
Re: PCI Compliance Policies Chuck Dunn
Re: PCI Compliance Policies Theresa M Rowe
Re: PCI Compliance Policies Roger Safian
Re: PCI Compliance Policies Theresa M Rowe
Re: PCI Compliance Policies Doug Markiewicz
Fw: PCI Compliance Policies Nick Fasano
Re: PCI Compliance Policies Penn, Blake
Re: PCI Compliance Policies Roger Safian
Re: PCI Compliance Policies Jones, Dan
Re: PCI Compliance Policies Brad Judy
Re: Fw: PCI Compliance Policies Brad Judy
Re: Fw: PCI Compliance Policies Roger Safian
Friday, 20 July
Exceptions to not keeping accounts for ex-employees Michael Fox
Re: Exceptions to not keeping accounts for ex-employees Theresa M Rowe
Re: Exceptions to not keeping accounts for ex-employees Cheek, Leigh
Monday, 23 July
Evacuation Security Piscitello, Frank
Browser Encryption Capability for Exporting McNeil, Sharon McLawhorn
Re: Browser Encryption Capability for Exporting Chris Green
INFRAGARD Vanderbilt, Teresa
Re: INFRAGARD Pace, Guy
Re: INFRAGARD David Lundy
OK Thanks for infragard info Vanderbilt, Teresa
Re: INFRAGARD Bradley, Stephen W. Mr.
Re: INFRAGARD Ken Connelly
Re: INFRAGARD Joel Rosenblatt
Re: INFRAGARD Melissa
Tuesday, 24 July
Juniper NSM Gary Flynn
Re: Juniper NSM Greg Vickers
Re: Juniper NSM Wes Young
Wednesday, 25 July
Re: Juniper NSM John Rasmussen
Thursday, 26 July
Re: PCI Compliance Policies Curt Wilson
Re: PCI Compliance Policies Brad Judy
music download discounts Steve Brukbacher
Re: music download discounts Aaron Childs
Friday, 27 July
Use of VPN Brenda B Gombosky
Re: Use of VPN Nathan W. Labadie
Re: Use of VPN Julian Y. Koh
logging windows text-based files to central logging server Michael Bayne
Re: logging windows text-based files to central logging server Anthony Maszeroski
Re: logging windows text-based files to central logging server Deepak J. Mathew
Re: logging windows text-based files to central logging server Joel Rosenblatt
Re: Use of VPN Lopez, Diego (District)
Re: Use of VPN Julian Y. Koh
Re: logging windows text-based files to central logging server Aaron Wade
Comments on our staffing Theresa M Rowe
Re: logging windows text-based files to central logging server Edgmand, Craig
Re: Use of VPN Vuong Phung
Re: logging windows text-based files to central logging server Nathan W. Labadie
Re: logging windows text-based files to central logging server Michael Bayne
Monday, 30 July
Trusted Network Technologies Product James Van Meter
Re: logging windows text-based files to central logging server Michael Bayne
Re: logging windows text-based files to central logging server Havens, Ben
Re: logging windows text-based files to central logging server Michael Bayne
Tuesday, 31 July
Re: logging windows text-based files to central logging server Julian J Thompson (jthmpsn2)
Re: music download discounts Joe Bazeley
Re: music download discounts Roger Safian
Re: music download discounts Rick Coloccia
Re: music download discounts Julian Y. Koh
Re: music download discounts Vanderbilt, Teresa
SSH Attack from Germany Rowland Harrison
Re: music download discounts Theresa M Rowe
Re: Use of VPN Lovaas,Steven
Re: PCI Compliance Policies Scott O. Bradner
Re: PCI Compliance Policies Scott O. Bradner
Wednesday, 01 August
Experience with NOD32 antivirus product from eset? Chuck Braden
Re: Experience with NOD32 antivirus product from eset? Charlie Prothero
Re: Experience with NOD32 antivirus product from eset? Bulanda, Dave G
Re: Experience with NOD32 antivirus product from eset? Pettis, Frederick
Re: Experience with NOD32 antivirus product from eset? Deepak J. Mathew
Re: Experience with NOD32 antivirus product from eset? Lucas, Bryan
Re: Experience with NOD32 antivirus product from eset? Deepak J. Mathew
antivirus products robin
College Student Video Contest Improves Computer Security Awareness Valerie Vogel
SANS Course Mike Hanson
Re: SANS Course Michael Grinnell
Thursday, 02 August
Re: SANS Course Mike Hanson
Re: SANS Course Ken Connelly
Re: SANS Course Michael Grinnell
Vulnerability Scanners Andy Rivers
Re: Vulnerability Scanners Doug Markiewicz
Re: Vulnerability Scanners Deepak J. Mathew
Friday, 03 August
Re: Vulnerability Scanners Ferris, Joe
Monday, 06 August
Anyone know anything about the security of ActiveKB? Sadler, Connie
Wednesday, 08 August
Service Account Security and Handling Wade, Russ
Re: Service Account Security and Handling Larry Brennan
Thursday, 09 August
[REN-ISAC] Storm Worm DDoS Threat to the EDU Sector Pearson, Douglas D
Re: [LICENSING] Software license tracking systems Lerell, Thomas
Web Security Gateway Appliances Tim Lane
Sunday, 12 August
DMZ versus TRUSTED ZONES (VLANs) Deepak J. Mathew
Monday, 13 August
Re: DMZ versus TRUSTED ZONES (VLANs) Robert Winding
Tuesday, 14 August
Re: Experience with NOD32 antivirus product from eset? Felecia Vlahos
Thursday, 16 August
Re: Experience with NOD32 antivirus product from eset? Deepak J. Mathew
Friday, 17 August
FYI: new Senf release available [Java CLI/GUI] Beasley, Cam
Re: FYI: new Senf release available [Java CLI/GUI] Gene Spafford
Re: FYI: new Senf release available [Java CLI/GUI] UGA InfoSec
Re: FYI: new Senf release available [Java CLI/GUI] Beasley, Cam
Tuesday, 21 August
IT Security Insurance Allen, Jon D
Re: IT Security Insurance Gary Dobbins
Re: IT Security Insurance Chad McDonald
Share Your Campus Plans to Observe National Cyber Security Awareness Month 2007 Shirley Payne
Wednesday, 22 August
IT Security insurance Theresa M Rowe
Cybersource and PeopleSoft Daniel Adinolfi
Botnet Detection Jones, Jim R
Re: Botnet Detection Donna michaels
Re: Botnet Detection Jones, Jim R
Re: Botnet Detection Clark, Joseph K
Re: Botnet Detection Jones, Jim R
Re: Botnet Detection Stephen Gill
Joining ren-isac David Lundy
Re: Joining ren-isac Lunceford, Dan
Re: Joining ren-isac Doug Pearson
Re: Botnet Detection Jay Tumas
Re: Botnet Detection John C. A. Bambenek, CISSP
Re: Joining ren-isac jack suess
Re: Joining ren-isac base
Re: Joining ren-isac unisog
Re: Joining ren-isac Cal Frye
Re: [SPAM] Re: Joining ren-isac Stephen Gill
Re: [SPAM] Re: Joining ren-isac Ken Connelly
Re: Joining ren-isac Michael Sinatra
Thursday, 23 August
Re: Botnet Detection David Taylor
Email signing and encryption Gudena, Chandragupta
Re: Email signing and encryption Ken Layng
Re: Email signing and encryption Georgia Killcrece
Re: Email signing and encryption Georgia Killcrece
Re: Email signing and encryption Jeff Giacobbe
Re: Email signing and encryption David Seidl
Re: Botnet Detection Wayne J. Hauber
Re: Botnet Detection Joseph Karam
blocking port 25 at the border? Bob Bayn
Re: blocking port 25 at the border? Mark Borrie
Re: blocking port 25 at the border? Gary Flynn
Re: blocking port 25 at the border? Randy Marchany
Re: blocking port 25 at the border? Gary Flynn
Re: blocking port 25 at the border? Dave Koontz
Re: blocking port 25 at the border? H. Morrow Long
Re: blocking port 25 at the border? Mark Borrie
Re: blocking port 25 at the border? Kenneth Arnold
Re: blocking port 25 at the border? Lutzen, Karl F.
Re: blocking port 25 at the border? Matthew Keller
Friday, 24 August
Re: Botnet Detection Curt Wilson
Re: Botnet Detection Joe St Sauver
Re: blocking port 25 at the border? Curt Wilson
Thursday, 30 August
iPhone security Matt Arthur
Re: iPhone security Curt Wilson
Re: iPhone security Samuel Liles
FW: FW: iPhone security Alex Everett
Re: iPhone security Noah Abrahamson
Re: FW: FW: iPhone security Samuel Liles
Re: iPhone security Brent Sweeny
Re: iPhone security Christopher Penido
Re: iPhone security Jim Dillon
Re: iPhone security Noah Abrahamson
Re: iPhone security Joel Rosenblatt
Tuesday, 04 September
Pre Production System Accreditation Chad McDonald
Re: Pre Production System Accreditation Matthew Keller
Re: Pre Production System Accreditation Lovaas,Steven
Re: Pre Production System Accreditation Dan Johnson
IT Security in Purchases and Contracts Eric Galyon
Re: Pre Production System Accreditation St Clair, Jim
Re: Pre Production System Accreditation Gary Dobbins
Re: Pre Production System Accreditation St Clair, Jim
Re: Pre Production System Accreditation Shane Bishop
Re: Pre Production System Accreditation Jones, Dan
Re: IT Security in Purchases and Contracts Theresa M Rowe
Re: IT Security in Purchases and Contracts Sarah Stevens
SIM/SIEM sample RFP Youngquist, Jason R.
Re: SIM/SIEM sample RFP Wes Young
Re: SIM/SIEM sample RFP Harris, Michael C.
email threats Mark DeSerio
Re: email threats Bob Bayn
Re: email threats Roger Safian
Re: email threats Deborah Manning
Re: email threats Roger Safian
Re: email threats Bob Bayn
Re: email threats Roger Safian
Re: Pre Production System Accreditation Jim Dillon
Contacts needed please RLVaughn
Re: IT Security in Purchases and Contracts Sarah Stevens
Wednesday, 05 September
Re: email threats Valdis Kletnieks
Re: Pre Production System Accreditation Dan Johnson
Re: email threats Joel Rosenblatt
Re: Pre Production System Accreditation Jim Dillon
Re: Pre Production System Accreditation Dan Johnson
Re: Pre Production System Accreditation Valdis Kletnieks
Re: Pre Production System Accreditation Jim Dillon
Re: Pre Production System Accreditation Chad McDonald
Re: Pre Production System Accreditation Dan Johnson
Re: Pre Production System Accreditation Valdis Kletnieks
Thursday, 06 September
Re: Pre Production System Accreditation Dan Johnson
Re: Pre Production System Accreditation Ken Hanna
Security positions, organizational structures and job descriptions Curt Wilson
Re: Security positions, organizational structures and job descriptions Shirley Payne
Re: SIM/SIEM sample RFP Greg Vickers
Friday, 07 September
Convergence of physical and logical security Eric DSouza
Re: IT Security in Purchases and Contracts Eric Galyon
Monday, 10 September
Re: IT Security in Purchases and Contracts Friedmann, Esther
Acceptable Use Policies. Matthew Gracie
Re: Acceptable Use Policies. Roger Safian
Security Analyst Position at the University of Kansas Perry, Jeff
Re: Acceptable Use Policies. Cal Frye
Re: Acceptable Use Policies. Greg Vickers
Tuesday, 11 September
this reading could be fun or serious Vuong Phung
Re: this reading could be fun or serious Pace, Guy
Re: this reading could be fun or serious Curt Wilson
Wednesday, 12 September
Access Control Responsibility Wording Mclaughlin, Kevin (mclaugkl)
network access log retention survey Kathy Bergsma
CONFERENCE - Securing the eCampus 2.0 (October 9-10, 2007) Adam Goldstein
Re: network access log retention survey Joel Rosenblatt
Thursday, 13 September
Re: this reading could be fun or serious Jeffrey I. Schiller
CISO/Director of IT Security Administration position at the Medical College of Georgia... Mark Staples
2007 IT Security Conference: A Call to Action for the Education Community Theresa Semmens
Friday, 14 September
Guest wireless access at University Conference Centers John Center
Re: Guest wireless access at University Conference Centers Randy Marchany
Monday, 17 September
NACUA Fall 2007 Workshop -- Nov. 7-9, 2007 in Washington, DC Valerie Vogel
Rochester Security Summit Highlights National Cyber Security Awareness Month Spier, Peter
Tuesday, 18 September
Re: Guest wireless access at University Conference Centers Brinkman, Kathleen B. Ms.
Re: Guest wireless access at University Conference Centers Custer, William L. Mr.
Re: Guest wireless access at University Conference Centers Cal Frye
Job Posting: Security Administrator at Loyola University Chicago Joe Bazeley
Wednesday, 19 September
sample audit RFP Youngquist, Jason R.
Re: Guest wireless access at University Conference Centers Brenda B Gombosky
Re: sample audit RFP Georgia Killcrece
Re: sample audit RFP Lazor, Joseph
Anyone using OCTAVE process? David Grisham
Re: Guest wireless access at University Conference Centers Cal Frye
Thursday, 20 September
Re: Anyone using OCTAVE process? Brad Judy
Route table growth and router hardware limits Joe St Sauver
Re: Anyone using OCTAVE process? Aaron Shelmire
Re: Route table growth and router hardware limits Valdis Kletnieks
Friday, 21 September
Novell client security defects Gary Flynn
Password Management Perez, Stephen
VMWare Vulnerability Mike Lococo
Job Posting: REN-ISAC Principal Security Engineer Pearson, Douglas D
Monday, 24 September
Any higher ed institutions which have purchased commercial ILP/DLP/CMF "data at rest" scanning products? H. Morrow Long
REMINDER - CONFERENCE - Securing the eCampus 2.0 (October 9-10, 2007) Adam Goldstein
Alumni Address Verification Streeter, Margaret
Re: Alumni Address Verification Valdis Kletnieks
Re: Alumni Address Verification Streeter, Margaret
Re: Alumni Address Verification Lovaas,Steven
Tuesday, 25 September
RIAA timestamps off Sweeny, Jonny
Re: RIAA timestamps off Bob Bayn
Re: RIAA timestamps off Roger Safian
Re: RIAA timestamps off Marc Scarborough
Re: RIAA timestamps off Mike Lococo
Re: RIAA timestamps off Jeff Holden
Sr Security Analyst position at Univ of Iowa Drews, Jane E
Re: RIAA timestamps off Scholz, Greg
Re: RIAA timestamps off Jeff Kell
Re: RIAA timestamps off Jeff Holden
Re: Job Posting: REN-ISAC Principal Security Engineer Pearson, Douglas D
Re: RIAA timestamps off Steve Worona
Re: Guest wireless access at University Conference Centers Brinkman, Kathleen B. Ms.
Re: RIAA timestamps off Scholz, Greg
Wednesday, 26 September
Position opening - The College of NJ Pat Pasinski
Integrating Physical and IT Security Douglas Gale
Screen Saver Seetings Gibson, Nathan J. (HSC)
Re: Screen Saver Seetings Jeff Holden
Slow Cisco Vpn performance! Christian Hroux
Re: Slow Cisco Vpn performance! Jay Tumas
Re: Screen Saver Seetings Gibson, Nathan J. (HSC)
Re: Slow Cisco Vpn performance! Michael Sana
Re: Alumni Address Verification Streeter, Margaret
Thursday, 27 September
Re: Slow Cisco Vpn performance! Brock, Anthony - NET
Friday, 28 September
Re: RIAA timestamps off Alex Everett
Saturday, 29 September
Re: RIAA timestamps off David Taylor
Re: RIAA timestamps off Valdis Kletnieks
Sunday, 30 September
Re: RIAA timestamps off Rick Coloccia
Re: RIAA timestamps off Ken Connelly
Survey on NAC, NAP and TNC (any exist yet?) implementations in Higher Ed H. Morrow Long