Educause Security Discussion: by date

301 messages starting Jul 02 07 and ending Sep 30 07
Date index | Thread index | Author index


Monday, 02 July

Research on BitLocker Drive Encryption HALL, NATHANIEL D.

Tuesday, 03 July

"postcard" spams. Matthew Gracie
Re: "postcard" spams. Perry, Jeff
Re: "postcard" spams. Theresa Semmens
Re: "postcard" spams. David Lundy
Re: "postcard" spams. Alan Amesbury
Re: "postcard" spams. Les LaCroix

Thursday, 05 July

sample position descriptions Steve Brukbacher

Friday, 06 July

Re: Electronic card access/facilities Matthew Gracie
Secret Service Safe School Seminar - Free event in DC @ GW Krizi Trivisani
Free Webcast Tuesday on Tor, a tool for Internet anonymity Steve Worona
Veterans Affairs Data Handling Chris Green
Re: Veterans Affairs Data Handling Valdis Kletnieks

Monday, 09 July

Re: Veterans Affairs Data Handling Schmidt, Eric W
Re: Veterans Affairs Data Handling St Clair, Jim

Friday, 13 July

Re: Training advice Bob Ono

Tuesday, 17 July

Macintosh java updates Gary Flynn
Re: Macintosh java updates Julian Y. Koh
Linux/Unix email list recommendation? Vuong Phung
Re: Linux/Unix email list recommendation? Jarrod Millman
Re: Linux/Unix email list recommendation? Valdis Kletnieks
Re: Linux/Unix email list recommendation? Vuong Phung
Re: Linux/Unix email list recommendation? Jarrod Millman
List recommendations Chris Gauthier
Re: Linux/Unix email list recommendation? Hull, Dave
Re: Linux/Unix email list recommendation? Jarrod Millman

Wednesday, 18 July

Re: List recommendations John Henry Maurice
Re: Macintosh java updates Curt Wilson

Thursday, 19 July

PCI Compliance Policies Sandford, Doug
Re: PCI Compliance Policies Brewer, Alex D
Re: PCI Compliance Policies Penn, Blake
Re: PCI Compliance Policies Chuck Dunn
Re: PCI Compliance Policies Theresa M Rowe
Re: PCI Compliance Policies Roger Safian
Re: PCI Compliance Policies Theresa M Rowe
Re: PCI Compliance Policies Doug Markiewicz
Fw: PCI Compliance Policies Nick Fasano
Re: PCI Compliance Policies Penn, Blake
Re: PCI Compliance Policies Roger Safian
Re: PCI Compliance Policies Jones, Dan
Re: PCI Compliance Policies Brad Judy
Re: Fw: PCI Compliance Policies Brad Judy
Re: Fw: PCI Compliance Policies Roger Safian

Friday, 20 July

Exceptions to not keeping accounts for ex-employees Michael Fox
Re: Exceptions to not keeping accounts for ex-employees Theresa M Rowe
Re: Exceptions to not keeping accounts for ex-employees Cheek, Leigh

Monday, 23 July

Evacuation Security Piscitello, Frank
Browser Encryption Capability for Exporting McNeil, Sharon McLawhorn
Re: Browser Encryption Capability for Exporting Chris Green
INFRAGARD Vanderbilt, Teresa
Re: INFRAGARD Pace, Guy
Re: INFRAGARD David Lundy
OK Thanks for infragard info Vanderbilt, Teresa
Re: INFRAGARD Bradley, Stephen W. Mr.
Re: INFRAGARD Ken Connelly
Re: INFRAGARD Joel Rosenblatt
Re: INFRAGARD Melissa

Tuesday, 24 July

Juniper NSM Gary Flynn
Re: Juniper NSM Greg Vickers
Re: Juniper NSM Wes Young

Wednesday, 25 July

Re: Juniper NSM John Rasmussen

Thursday, 26 July

Re: PCI Compliance Policies Curt Wilson
Re: PCI Compliance Policies Brad Judy
music download discounts Steve Brukbacher
Re: music download discounts Aaron Childs

Friday, 27 July

Use of VPN Brenda B Gombosky
Re: Use of VPN Nathan W. Labadie
Re: Use of VPN Julian Y. Koh
logging windows text-based files to central logging server Michael Bayne
Re: logging windows text-based files to central logging server Anthony Maszeroski
Re: logging windows text-based files to central logging server Deepak J. Mathew
Re: logging windows text-based files to central logging server Joel Rosenblatt
Re: Use of VPN Lopez, Diego (District)
Re: Use of VPN Julian Y. Koh
Re: logging windows text-based files to central logging server Aaron Wade
Comments on our staffing Theresa M Rowe
Re: logging windows text-based files to central logging server Edgmand, Craig
Re: Use of VPN Vuong Phung
Re: logging windows text-based files to central logging server Nathan W. Labadie
Re: logging windows text-based files to central logging server Michael Bayne

Monday, 30 July

Trusted Network Technologies Product James Van Meter
Re: logging windows text-based files to central logging server Michael Bayne
Re: logging windows text-based files to central logging server Havens, Ben
Re: logging windows text-based files to central logging server Michael Bayne

Tuesday, 31 July

Re: logging windows text-based files to central logging server Julian J Thompson (jthmpsn2)
Re: music download discounts Joe Bazeley
Re: music download discounts Roger Safian
Re: music download discounts Rick Coloccia
Re: music download discounts Julian Y. Koh
Re: music download discounts Vanderbilt, Teresa
SSH Attack from Germany Rowland Harrison
Re: music download discounts Theresa M Rowe
Re: Use of VPN Lovaas,Steven
Re: PCI Compliance Policies Scott O. Bradner
Re: PCI Compliance Policies Scott O. Bradner

Wednesday, 01 August

Experience with NOD32 antivirus product from eset? Chuck Braden
Re: Experience with NOD32 antivirus product from eset? Charlie Prothero
Re: Experience with NOD32 antivirus product from eset? Bulanda, Dave G
Re: Experience with NOD32 antivirus product from eset? Pettis, Frederick
Re: Experience with NOD32 antivirus product from eset? Deepak J. Mathew
Re: Experience with NOD32 antivirus product from eset? Lucas, Bryan
Re: Experience with NOD32 antivirus product from eset? Deepak J. Mathew
antivirus products robin
College Student Video Contest Improves Computer Security Awareness Valerie Vogel
SANS Course Mike Hanson
Re: SANS Course Michael Grinnell

Thursday, 02 August

Re: SANS Course Mike Hanson
Re: SANS Course Ken Connelly
Re: SANS Course Michael Grinnell
Vulnerability Scanners Andy Rivers
Re: Vulnerability Scanners Doug Markiewicz
Re: Vulnerability Scanners Deepak J. Mathew

Friday, 03 August

Re: Vulnerability Scanners Ferris, Joe

Monday, 06 August

Anyone know anything about the security of ActiveKB? Sadler, Connie

Wednesday, 08 August

Service Account Security and Handling Wade, Russ
Re: Service Account Security and Handling Larry Brennan

Thursday, 09 August

[REN-ISAC] Storm Worm DDoS Threat to the EDU Sector Pearson, Douglas D
Re: [LICENSING] Software license tracking systems Lerell, Thomas
Web Security Gateway Appliances Tim Lane

Sunday, 12 August

DMZ versus TRUSTED ZONES (VLANs) Deepak J. Mathew

Monday, 13 August

Re: DMZ versus TRUSTED ZONES (VLANs) Robert Winding

Tuesday, 14 August

Re: Experience with NOD32 antivirus product from eset? Felecia Vlahos

Thursday, 16 August

Re: Experience with NOD32 antivirus product from eset? Deepak J. Mathew

Friday, 17 August

FYI: new Senf release available [Java CLI/GUI] Beasley, Cam
Re: FYI: new Senf release available [Java CLI/GUI] Gene Spafford
Re: FYI: new Senf release available [Java CLI/GUI] UGA InfoSec
Re: FYI: new Senf release available [Java CLI/GUI] Beasley, Cam

Tuesday, 21 August

IT Security Insurance Allen, Jon D
Re: IT Security Insurance Gary Dobbins
Re: IT Security Insurance Chad McDonald
Share Your Campus Plans to Observe National Cyber Security Awareness Month 2007 Shirley Payne

Wednesday, 22 August

IT Security insurance Theresa M Rowe
Cybersource and PeopleSoft Daniel Adinolfi
Botnet Detection Jones, Jim R
Re: Botnet Detection Donna michaels
Re: Botnet Detection Jones, Jim R
Re: Botnet Detection Clark, Joseph K
Re: Botnet Detection Jones, Jim R
Re: Botnet Detection Stephen Gill
Joining ren-isac David Lundy
Re: Joining ren-isac Lunceford, Dan
Re: Joining ren-isac Doug Pearson
Re: Botnet Detection Jay Tumas
Re: Botnet Detection John C. A. Bambenek, CISSP
Re: Joining ren-isac jack suess
Re: Joining ren-isac base
Re: Joining ren-isac unisog
Re: Joining ren-isac Cal Frye
Re: [SPAM] Re: Joining ren-isac Stephen Gill
Re: [SPAM] Re: Joining ren-isac Ken Connelly
Re: Joining ren-isac Michael Sinatra

Thursday, 23 August

Re: Botnet Detection David Taylor
Email signing and encryption Gudena, Chandragupta
Re: Email signing and encryption Ken Layng
Re: Email signing and encryption Georgia Killcrece
Re: Email signing and encryption Georgia Killcrece
Re: Email signing and encryption Jeff Giacobbe
Re: Email signing and encryption David Seidl
Re: Botnet Detection Wayne J. Hauber
Re: Botnet Detection Joseph Karam
blocking port 25 at the border? Bob Bayn
Re: blocking port 25 at the border? Mark Borrie
Re: blocking port 25 at the border? Gary Flynn
Re: blocking port 25 at the border? Randy Marchany
Re: blocking port 25 at the border? Gary Flynn
Re: blocking port 25 at the border? Dave Koontz
Re: blocking port 25 at the border? H. Morrow Long
Re: blocking port 25 at the border? Mark Borrie
Re: blocking port 25 at the border? Kenneth Arnold
Re: blocking port 25 at the border? Lutzen, Karl F.
Re: blocking port 25 at the border? Matthew Keller

Friday, 24 August

Re: Botnet Detection Curt Wilson
Re: Botnet Detection Joe St Sauver
Re: blocking port 25 at the border? Curt Wilson

Thursday, 30 August

iPhone security Matt Arthur
Re: iPhone security Curt Wilson
Re: iPhone security Samuel Liles
FW: FW: iPhone security Alex Everett
Re: iPhone security Noah Abrahamson
Re: FW: FW: iPhone security Samuel Liles
Re: iPhone security Brent Sweeny
Re: iPhone security Christopher Penido
Re: iPhone security Jim Dillon
Re: iPhone security Noah Abrahamson
Re: iPhone security Joel Rosenblatt

Tuesday, 04 September

Pre Production System Accreditation Chad McDonald
Re: Pre Production System Accreditation Matthew Keller
Re: Pre Production System Accreditation Lovaas,Steven
Re: Pre Production System Accreditation Dan Johnson
IT Security in Purchases and Contracts Eric Galyon
Re: Pre Production System Accreditation St Clair, Jim
Re: Pre Production System Accreditation Gary Dobbins
Re: Pre Production System Accreditation St Clair, Jim
Re: Pre Production System Accreditation Shane Bishop
Re: Pre Production System Accreditation Jones, Dan
Re: IT Security in Purchases and Contracts Theresa M Rowe
Re: IT Security in Purchases and Contracts Sarah Stevens
SIM/SIEM sample RFP Youngquist, Jason R.
Re: SIM/SIEM sample RFP Wes Young
Re: SIM/SIEM sample RFP Harris, Michael C.
email threats Mark DeSerio
Re: email threats Bob Bayn
Re: email threats Roger Safian
Re: email threats Deborah Manning
Re: email threats Roger Safian
Re: email threats Bob Bayn
Re: email threats Roger Safian
Re: Pre Production System Accreditation Jim Dillon
Contacts needed please RLVaughn
Re: IT Security in Purchases and Contracts Sarah Stevens

Wednesday, 05 September

Re: email threats Valdis Kletnieks
Re: Pre Production System Accreditation Dan Johnson
Re: email threats Joel Rosenblatt
Re: Pre Production System Accreditation Jim Dillon
Re: Pre Production System Accreditation Dan Johnson
Re: Pre Production System Accreditation Valdis Kletnieks
Re: Pre Production System Accreditation Jim Dillon
Re: Pre Production System Accreditation Chad McDonald
Re: Pre Production System Accreditation Dan Johnson
Re: Pre Production System Accreditation Valdis Kletnieks

Thursday, 06 September

Re: Pre Production System Accreditation Dan Johnson
Re: Pre Production System Accreditation Ken Hanna
Security positions, organizational structures and job descriptions Curt Wilson
Re: Security positions, organizational structures and job descriptions Shirley Payne
Re: SIM/SIEM sample RFP Greg Vickers

Friday, 07 September

Convergence of physical and logical security Eric DSouza
Re: IT Security in Purchases and Contracts Eric Galyon

Monday, 10 September

Re: IT Security in Purchases and Contracts Friedmann, Esther
Acceptable Use Policies. Matthew Gracie
Re: Acceptable Use Policies. Roger Safian
Security Analyst Position at the University of Kansas Perry, Jeff
Re: Acceptable Use Policies. Cal Frye
Re: Acceptable Use Policies. Greg Vickers

Tuesday, 11 September

this reading could be fun or serious Vuong Phung
Re: this reading could be fun or serious Pace, Guy
Re: this reading could be fun or serious Curt Wilson

Wednesday, 12 September

Access Control Responsibility Wording Mclaughlin, Kevin (mclaugkl)
network access log retention survey Kathy Bergsma
CONFERENCE - Securing the eCampus 2.0 (October 9-10, 2007) Adam Goldstein
Re: network access log retention survey Joel Rosenblatt

Thursday, 13 September

Re: this reading could be fun or serious Jeffrey I. Schiller
CISO/Director of IT Security Administration position at the Medical College of Georgia... Mark Staples
2007 IT Security Conference: A Call to Action for the Education Community Theresa Semmens

Friday, 14 September

Guest wireless access at University Conference Centers John Center
Re: Guest wireless access at University Conference Centers Randy Marchany

Monday, 17 September

NACUA Fall 2007 Workshop -- Nov. 7-9, 2007 in Washington, DC Valerie Vogel
Rochester Security Summit Highlights National Cyber Security Awareness Month Spier, Peter

Tuesday, 18 September

Re: Guest wireless access at University Conference Centers Brinkman, Kathleen B. Ms.
Re: Guest wireless access at University Conference Centers Custer, William L. Mr.
Re: Guest wireless access at University Conference Centers Cal Frye
Job Posting: Security Administrator at Loyola University Chicago Joe Bazeley

Wednesday, 19 September

sample audit RFP Youngquist, Jason R.
Re: Guest wireless access at University Conference Centers Brenda B Gombosky
Re: sample audit RFP Georgia Killcrece
Re: sample audit RFP Lazor, Joseph
Anyone using OCTAVE process? David Grisham
Re: Guest wireless access at University Conference Centers Cal Frye

Thursday, 20 September

Re: Anyone using OCTAVE process? Brad Judy
Route table growth and router hardware limits Joe St Sauver
Re: Anyone using OCTAVE process? Aaron Shelmire
Re: Route table growth and router hardware limits Valdis Kletnieks

Friday, 21 September

Novell client security defects Gary Flynn
Password Management Perez, Stephen
VMWare Vulnerability Mike Lococo
Job Posting: REN-ISAC Principal Security Engineer Pearson, Douglas D

Monday, 24 September

Any higher ed institutions which have purchased commercial ILP/DLP/CMF "data at rest" scanning products? H. Morrow Long
REMINDER - CONFERENCE - Securing the eCampus 2.0 (October 9-10, 2007) Adam Goldstein
Alumni Address Verification Streeter, Margaret
Re: Alumni Address Verification Valdis Kletnieks
Re: Alumni Address Verification Streeter, Margaret
Re: Alumni Address Verification Lovaas,Steven

Tuesday, 25 September

RIAA timestamps off Sweeny, Jonny
Re: RIAA timestamps off Bob Bayn
Re: RIAA timestamps off Roger Safian
Re: RIAA timestamps off Marc Scarborough
Re: RIAA timestamps off Mike Lococo
Re: RIAA timestamps off Jeff Holden
Sr Security Analyst position at Univ of Iowa Drews, Jane E
Re: RIAA timestamps off Scholz, Greg
Re: RIAA timestamps off Jeff Kell
Re: RIAA timestamps off Jeff Holden
Re: Job Posting: REN-ISAC Principal Security Engineer Pearson, Douglas D
Re: RIAA timestamps off Steve Worona
Re: Guest wireless access at University Conference Centers Brinkman, Kathleen B. Ms.
Re: RIAA timestamps off Scholz, Greg

Wednesday, 26 September

Position opening - The College of NJ Pat Pasinski
Integrating Physical and IT Security Douglas Gale
Screen Saver Seetings Gibson, Nathan J. (HSC)
Re: Screen Saver Seetings Jeff Holden
Slow Cisco Vpn performance! Christian Hroux
Re: Slow Cisco Vpn performance! Jay Tumas
Re: Screen Saver Seetings Gibson, Nathan J. (HSC)
Re: Slow Cisco Vpn performance! Michael Sana
Re: Alumni Address Verification Streeter, Margaret

Thursday, 27 September

Re: Slow Cisco Vpn performance! Brock, Anthony - NET

Friday, 28 September

Re: RIAA timestamps off Alex Everett

Saturday, 29 September

Re: RIAA timestamps off David Taylor
Re: RIAA timestamps off Valdis Kletnieks

Sunday, 30 September

Re: RIAA timestamps off Rick Coloccia
Re: RIAA timestamps off Ken Connelly
Survey on NAC, NAP and TNC (any exist yet?) implementations in Higher Ed H. Morrow Long