Educause Security Discussion: by date

516 messages starting Oct 01 07 and ending Dec 24 07
Date index | Thread index | Author index


Monday, 01 October

Re: RIAA timestamps off Jordan Wiens
Re: RIAA timestamps off Sweeny, Jonny
Survey of Administrative Rights security policy at peer universities Davis,William
Re: RIAA timestamps off Dave Koontz
October is National Cybersecurity Awareness Month Jodi Ito

Tuesday, 02 October

Re: RIAA Timestamps Off Dennis Bohn
Risk Analysis of Electronic Shelving Units Brian Epstein
Communications to users about alleged AIM flaw Ben Woelk

Wednesday, 03 October

Re: RIAA timestamps off Chris Edwards
Re: Communications to users about alleged AIM flaw Gary Flynn
Re: RIAA timestamps off David Taylor
Limewire 4.14 jkaftan
Re: Limewire 4.14 Alex Everett
Re: RIAA Timestamps Off Scholz, Greg
Re: RIAA Timestamps Off Alex Everett
Re: FYI: new Senf release available [Java CLI/GUI] Tristan RHODES
Request for information - E-Discovery Consulting Services David Kovarik
Re: RIAA timestamps off Valdis Kletnieks
Re: FYI: new Senf release available [Java CLI/GUI] Beasley, Cam
Re: Limewire 4.14 Michael Lymbery
Re: Limewire 4.14 Alex Everett

Thursday, 04 October

No Subject Chad McDonald
Re: No Subject Branden Kirk
Re: No Subject Pace, Guy
Re: No Subject Manuel Amaral
Re: No Subject Maloney, Michael
Laptop encryption Dennis Tracz
Re: No Subject (Data Recovery) Paul Keser
Re: No Subject (Data Recovery) Lena Helmbrecht
Re: No Subject (Data Recovery) Dave Koontz
Re: Laptop encryption Greg Vickers

Friday, 05 October

Re: Laptop encryption Gary Flynn
Re: Laptop encryption Harold Winshel
Re: Laptop encryption Matthew Gracie
Re: No Subject (Data Recovery) Steve Evans
Re: Laptop encryption O'Callaghan, Daniel
Re: Laptop encryption David Taylor
Re: Laptop encryption David Seidl
Re: Laptop encryption Gary Flynn
Re: Laptop encryption Jim Dillon
Re: Laptop encryption David Taylor
Re: Laptop encryption Sarah Stevens
Network Audit Then, Keri
Re: Laptop encryption Paul Keser
Re: Laptop encryption Curt Wilson
Re: Laptop encryption Dennis Tracz
Re: Laptop encryption Dennis Tracz
Re: Laptop encryption Jeff Holden
Re: Laptop encryption Bob Ono
Re: Laptop encryption Harold Winshel
Re: Laptop encryption Paul Keser
Re: Laptop encryption Sarah Stevens
Re: Laptop encryption Eric Case

Sunday, 07 October

Re: Laptop encryption Harold Winshel
Re: Laptop encryption (what are you protecting against?) Greg Vickers
Re: Laptop encryption (what are you protecting against?) Harold Winshel

Monday, 08 October

Re: Laptop encryption David Kovarik
Re: Laptop encryption Ewing, Ashley
Re: Laptop encryption Sadler, Connie
Re: Laptop encryption Sarah Stevens
Re: Laptop encryption Theresa Semmens
Re: Laptop encryption jkaftan
Re: Laptop encryption Jody Allen
Re: Laptop encryption Jim Pollard
Re: Laptop encryption Paul Keser
Re: Laptop encryption Mayne, Jim
Laptop encryption Vanderbilt, Teresa
Re: Laptop encryption David Bruce
Re: Laptop encryption Randy Marchany
Re: Laptop encryption Harold Winshel
Re: Laptop encryption David Grisham
Re: Laptop encryption Robert Maxwell
Re: Laptop encryption Arnold Barr
Re: Laptop encryption Bristol, Gary L.
Re: Laptop encryption Joey Rego
SFTP product recomendation for Win2K3 servers Scott Koger
Re: Laptop encryption Aaron Lafferty
Re: Laptop encryption Michael Sana
Re: Laptop encryption Kutil, Charlie D.
Re: Laptop encryption David Kovarik
Re: Laptop encryption Brewer, Alex D
Re: SFTP product recomendation for Win2K3 servers Lucas, Bryan
Re: Laptop encryption Scott Koger
Re: Laptop encryption Dave Koontz
Re: Laptop encryption Allan Williams
Re: SFTP product recomendation for Win2K3 servers Scott Koger
Re: SFTP product recomendation for Win2K3 servers Buz Dale
Re: SFTP product recomendation for Win2K3 servers David Boyer
Re: SFTP product recomendation for Win2K3 servers Scott Koger
Re: SFTP product recomendation for Win2K3 servers Dugan, Darin D [EIT]
Re: SFTP product recomendation for Win2K3 servers Frederick Ullman
Re: Laptop encryption Greg Vickers
Re: Laptop encryption Sarah Stevens

Tuesday, 09 October

Re: Laptop encryption Todd Clementz
Re: Laptop encryption Hoffman, Michael
Re: SFTP product recomendation for Win2K3 servers Pete Howard
Re: Laptop encryption Gary Dobbins
Full volume encryption Phil Benchoff
Re: Laptop encryption Chris Vakhordjian
Re: Laptop encryption Scott Koger
Re: Laptop encryption Anthony Maszeroski
Re: Full volume encryption Roger Safian
Re: Laptop encryption Alex Everett
Re: Laptop encryption Linda Pruss
Re: Laptop encryption Dennis Tracz
Re: Laptop encryption Brian Goodman
Re: Laptop encryption Progar, Joe J
Re: Full volume encryption Mike Wiseman
Re: Laptop encryption Christopher Penido
Re: Laptop encryption Cavender, Terry
Suggestion Sandford, Doug
Re: Laptop encryption Taylor, James R
Re: Laptop encryption Pat Ainsworth
Re: SFTP product recomendation for Win2K3 servers Fowler, Steve
Participation Guidelines - was "Laptop Encryption" Rodney Petersen
Re: Laptop encryption Alex Everett
Socks5 Proxy Recommendations? Chris Green
Re: Laptop encryption - attendees discussion Chuck Braden
Re: Socks5 Proxy Recommendations? Vuong Phung
Training opportunity: Audit focused SANS class Angela Atkins

Wednesday, 10 October

Educause/Internet 2 Security Task Force Encryption sub-committee Allen, Jon D

Thursday, 11 October

Re: Educause/Internet 2 Security Task Force Encryption sub-committee Matthew Gracie
Re: Educause/Internet 2 Security Task Force Encryption sub-committee Theresa Semmens
Blocking POP3 and IMAP Hammon, Gary
Don't Display Last Username?? Gibson, Nathan J. (HSC)
Re: Blocking POP3 and IMAP Ken Connelly
Re: Blocking POP3 and IMAP Pace, Guy
Re: Blocking POP3 and IMAP Alex Everett
Re: Blocking POP3 and IMAP Michael Sinatra
Re: Blocking POP3 and IMAP Michael Sinatra
Re: Don't Display Last Username?? Rizzo, Jim
Re: Blocking POP3 and IMAP Valdis Kletnieks
Re: Don't Display Last Username?? Jarrod Millman
Re: Don't Display Last Username?? Gregg, Christopher S.
Re: Blocking POP3 and IMAP Geoff Nathan
Re: Blocking POP3 and IMAP Harry E Flowers (flowers)
Re: Blocking POP3 and IMAP Shumon Huque
Re: Don't Display Last Username?? Gary Dobbins
Re: Don't Display Last Username?? Cal Frye
Re: Don't Display Last Username?? Dennis Tracz
Re: Blocking POP3 and IMAP Paul Russell
Re: Blocking POP3 and IMAP Mike Iglesias
Re: Blocking POP3 and IMAP Geoff Nathan
Re: Blocking POP3 and IMAP Michael Sinatra
Re: Don't Display Last Username?? Eric Case

Friday, 12 October

Re: Don't Display Last Username?? Matthew Keller
Log retention survey for servers Jason T Hardy
Re: Don't Display Last Username?? Abreu, Jose A

Monday, 15 October

Security Awareness & Training To Address Confidential Data Handling H. Morrow Long
SUMMARY: Survey on NAC, NAP and TNC (any exist yet?) implementations in Higher Ed H. Morrow Long

Tuesday, 16 October

Desktop Management Policies and Procedures Gary Flynn
Re: SUMMARY: Survey on NAC, NAP and TNC (any exist yet?) implementations in Higher Ed Anthony Maszeroski
Re: SUMMARY: Survey on NAC, NAP and TNC (any exist yet?) implementations in Higher Ed H. Morrow Long

Wednesday, 17 October

Microsoft Forefront Consolvo, Corbett D
Re: Microsoft Forefront Lucas, Bryan
Re: Blocking POP3 and IMAP ssgsa
Re: Microsoft Forefront Harry E Flowers (flowers)

Thursday, 18 October

Data Retention & "Are universities protecting students from the RIAA?" Rodney Petersen
E-mail Account Termination Length Kutil, Charlie D.
Re: E-mail Account Termination Length Bostic, Greg K. (HSC)
Re: E-mail Account Termination Length Theresa M Rowe
Re: E-mail Account Termination Length Roger Safian
Re: E-mail Account Termination Length Beechey, Jim
Re: E-mail Account Termination Length Rachel Franke
Re: E-mail Account Termination Length Maloney, Michael
Re: E-mail Account Termination Length Gary Flynn
Participate as a presenter at the Security Professionals Conference Gary Dobbins
guest registration tools Barros, Jacob

Friday, 19 October

Windows DHCP to syslog Youngquist, Jason R.
Re: Windows DHCP to syslog Valdis Kletnieks
Re: Windows DHCP to syslog Beechey, Jim
Tpping Point mailing list Roger Safian
Re: Tpping Point mailing list Julian Y. Koh

Saturday, 20 October

Re: Windows DHCP to syslog Dawson,Scottie
Re: Windows DHCP to syslog Valdis Kletnieks

Monday, 22 October

HTML-only email John Hoffoss
Re: HTML-only email Valdis Kletnieks
Security Awareness & Social Networking Services Tim M. Crawford

Tuesday, 23 October

Password Security Mclaughlin, Kevin (mclaugkl)
Re: Password Security Samuel Young
Re: Password Security Gary Dobbins
Re: Password Security Wyman Miles
Re: Password Security Sarah Stevens
Re: Password Security Gene Spafford
Re: Password Security Vicky Walker
Re: Password Security Roger Safian
Re: Password Security Mclaughlin, Kevin (mclaugkl)
Re: Password Security Logan, Kimberly (loganks)
Re: Password Security Steven Alexander
Re: Password Security Jim Dillon
Re: Password Security Doug Markiewicz
Re: Password Security Jim Dillon
Re: Password Security David Seidl
Re: Password Security Vicky Walker
Re: Password Security Christopher Webber
Re: SUMMARY: Survey on NAC, NAP and TNC (any exist yet?) implementations in Higher Ed H. Morrow Long

Wednesday, 24 October

Unsolicited Email Regarding IT Certification Courses Rodney Petersen
Password Security Mclaughlin, Kevin (mclaugkl)
Re: Password Security David Kovarik
Shared Security/Audit Position Matthew Dalton
Re: Shared Security/Audit Position Gary Dobbins
Re: Shared Security/Audit Position Mclaughlin, Kevin (mclaugkl)
Re: Shared Security/Audit Position Joel Rosenblatt
Re: Shared Security/Audit Position Matthew Dalton
Re: Shared Security/Audit Position Steve Schuster
<SPAM> Re: Shared Security/Audit Position Chad McDonald
<SPAM> Re: Shared Security/Audit Position Matthew Dalton
<SPAM> RE: Shared Security/Audit Position Jim Dillon
Re: Password Security Paul Russell
Re: Password Security Shalla, Kevin
Re: Password Security Gary Dobbins
[POSITION] Network Security Architect -- UT Austin Beasley, Cam

Thursday, 25 October

Re: Password Security Valdis Kletnieks
Re: Password Security Scholz, Greg
Survey of Administrative Rights security policy at peer universities Davis,William
Re: Survey of Administrative Rights security policy at peer universities Harold Winshel
Re: Survey of Administrative Rights security policy at peer universities Davis,William
Re: Password Security (more law) Steven Alexander
Secure File Exchange Theresa M Rowe
Re: Password Security (more law) Valdis Kletnieks
Re: Password Security (more law) Lee Weers
Re: Password Security (more law) Valdis Kletnieks

Friday, 26 October

Traffic to UDP Port 80 Babb, Robert
Re: Password Security (more law) Roger Safian
Re: Traffic to UDP Port 80 John Kristoff
Re: Traffic to UDP Port 80 Matthew Gracie
Re: Traffic to UDP Port 80 Andres Almanza
Re: Traffic to UDP Port 80 RLVaughn
Re: Traffic to UDP Port 80 Curt Wilson
FW: Traffic to UDP Port 80 Babb, Robert
Terminal Credit Card devices Gibson, Nathan J. (HSC)
Re: Terminal Credit Card devices Gibson, Nathan J. (HSC)
Re: Terminal Credit Card devices HALL, NATHANIEL D.
Interwoven Deployments in Higher Ed Mike Lococo

Monday, 29 October

Automatic Password Resets Sadler, Connie
Re: Automatic Password Resets Torres, Juan

Tuesday, 30 October

Re: Automatic Password Resets Steve Schuster
Re: Automatic Password Resets Mclaughlin, Kevin (mclaugkl)

Wednesday, 31 October

Cornell University Computer Policy and Law November Programs Tracy Mitrano
Re: Interwoven Deployments in Higher Ed Mike Lococo
November UCPL: Take 2 Tracy Mitrano
Re: November UCPL: Take 2 Bruce Carter
Re: November UCPL: Take 2 Jay Tumas
Re: November UCPL: Take 2 Jay Tumas
Re: November UCPL: Take 2 Bruce Carter

Thursday, 01 November

literature-free.com Mark Wilson
Re: literature-free.com - BEWARE OF URL REFERENCED IN MESSAGE Mark Wilson
Vulnerability scanning and reporting software David Taylor
Re: Vulnerability scanning and reporting software Kevin Halgren
Re: Vulnerability scanning and reporting software Beasley, Cam
Re: Vulnerability scanning and reporting software Ferris, Joe

Friday, 02 November

Re: Vulnerability scanning and reporting software David Taylor
Policies for personally-owned computers connecting to staff network? Drake, Craig
Re: Policies for personally-owned computers connecting to staff network? HALL, NATHANIEL D.

Saturday, 03 November

What level of logging do you turn on (and keep) on Windows file servers with ePHI? Do you audit? How long do you keep the data? H. Morrow Long
Security Metrics Wes Young

Sunday, 04 November

Re: Security Metrics Karen Duncanson
Re: Security Metrics Lovaas,Steven

Monday, 05 November

National Cyber Security Awareness Month Wrap-up Jodi Ito
Re: Vulnerability scanning and reporting software Adam Goldstein
Re: Security Metrics Mike Lococo
ASA 5510 and VPN Vanderbilt, Teresa
Re: ASA 5510 and VPN Winders, Timothy A
Re: ASA 5510 and VPN Babb, Robert
Re: ASA 5510 and VPN Justin Dover
Re: ASA 5510 and VPN Mike Iglesias

Tuesday, 06 November

Local Admin Access for Enduser's University Computer Harold Winshel
ASPs and FERPA compliance Justin Sherenco
Re: ASPs and FERPA compliance Mark Montague
Re: Security Metrics Wes Young

Wednesday, 07 November

FERPA and ASP compliance Theresa M Rowe
Re: What level of logging do you turn on (and keep) on Windows file servers with ePHI? Do you audit? How long do you keep the data? Harris, Michael C.
RDP and Campus Computers Carroll, John
Re: RDP and Campus Computers Jeni Li
Re: RDP and Campus Computers Aaron B. Bewley
Re: RDP and Campus Computers Scholz, Greg
Re: RDP and Campus Computers Greg Vickers
Re: RDP and Campus Computers Ozzie Paez
FW: RDP and Campus Computers Charlie Prothero

Friday, 09 November

Handling the spate of bad browser plug-in vulnerabilities David Escalante
IT Security Engineer position available at the University of Florida Kathy Bergsma
Xbox jkaftan
Re: Xbox Brawner, David
Re: Xbox Julian Y. Koh
Re: Xbox Christopher Webber
Re: Xbox jkaftan
Re: Xbox Michael Sana

Monday, 12 November

Reminder -- Tune In Nov. 14: IT Security Essential Body of Knowledge for Workforce Development Valerie Vogel
Re: Xbox Walter E. Petruska

Tuesday, 13 November

Reminder: Fred Schneider on Network Security Tonight! Tracy Mitrano

Friday, 16 November

Sr Information Security Officer position at Yale University (Requisition ID # 2658BR) H. Morrow Long

Saturday, 17 November

Job Posting: Berkeley Lab Computer Security Program Adam Stone
"Adding Math to List of Security Threats" - from New York Times Sadler, Connie

Monday, 19 November

Passwords & Passphrases Brian T Nichols
Re: Passwords & Passphrases Torres, Juan
Re: Passwords & Passphrases J. Alex Campoe
Re: Passwords & Passphrases Roger Safian
Re: Passwords & Passphrases HALL, NATHANIEL D.
Re: Passwords & Passphrases Randy Marchany
Re: Passwords & Passphrases Randy Marchany
Re: Passwords & Passphrases Steve Worona
Re: Passwords & Passphrases Julian J Thompson (jthmpsn2)
Re: Passwords & Passphrases Bob Bayn
Re: Passwords & Passphrases Julian J Thompson (jthmpsn2)
Re: Passwords & Passphrases Shane Bishop
Re: Passwords & Passphrases Sweeny, Jonny
Re: Passwords & Passphrases Shane Bishop
Re: Passwords & Passphrases Martin Manjak
Re: Passwords & Passphrases Gary Flynn
Re: Passwords & Passphrases Peters, Kevin
Re: Passwords & Passphrases Randy Marchany
Password Guessing Re: Passwords & Passphrases Gary Flynn
Re: Password Guessing Re: Passwords & Passphrases Shane Bishop
Re: Passwords & Passphrases Gene Spafford
Re: Password Guessing Re: Passwords & Passphrases Randy Marchany
Re: Passwords & Passphrases Roger Safian
Re: Passwords & Passphrases Roger Safian
Re: Passwords & Passphrases Harold Winshel
Re: Passwords & Passphrases Steven Alexander
Re: Passwords & Passphrases Alex
Re: Passwords & Passphrases Harold Winshel
Re: Passwords & Passphrases Harold Winshel
Re: Passwords & Passphrases Peters, Kevin
Re: Passwords & Passphrases Gene Spafford
Re: Passwords & Passphrases Peters, Kevin
Re: Passwords & Passphrases Bob Bayn
Re: Passwords & Passphrases Gene Spafford
Re: Passwords & Passphrases Mike Iglesias
Re: Passwords & Passphrases Benjamin Bennett
Re: Passwords & Passphrases Eric Case

Tuesday, 20 November

Re: Passwords & Passphrases Harold Winshel
Re: Passwords & Passphrases Gary Dobbins
Re: Passwords & Passphrases Peters, Kevin
Re: Passwords & Passphrases Mike Porter
Re: Passwords & Passphrases Willis Marti
Re: Passwords & Passphrases Bob Bayn
Re: Passwords & Passphrases Steven Carmody
Re: Passwords & Passphrases Roger Safian
Re: Passwords & Passphrases Harold Winshel
Re: Passwords & Passphrases Steven Alexander
Re: Passwords & Passphrases John Ladwig
Data integrity requirements for compliance David Grisham
Re: Passwords & Passphrases Ozzie Paez
Re: Passwords & Passphrases David Harley
Re: Passwords & Passphrases Zach Jansen
Re: Passwords & Passphrases Gary Flynn
Re: Data integrity requirements for compliance Matthew Gracie
Re: Passwords & Passphrases Matthew Gracie
Re: Fwd: Passwords & Passphrases Andrea Beesing
Re: Data integrity requirements for compliance Martin Manjak
Two or multi-factor authentication inquiry Greg Vickers

Wednesday, 21 November

Survey: DMCA and network bandwidth policy/practices Elliot Kendall
Re: Passwords & Passphrases Eric Case

Sunday, 25 November

Re: Passwords & Passphrases Andrea Beesing

Monday, 26 November

Re: Passwords & Passphrases Kees Leune
Re: Passwords & Passphrases Paul Keser

Tuesday, 27 November

Early release - free commercial grade PII/NPI discovery software Gary Golomb
Re: Passwords & Passphrases (strength and entropy) Basgen, Brian
Re: Early release - free commercial grade PII/NPI discovery software Gary Golomb

Thursday, 29 November

Visual Interpretation of Internet Threats Sadler, Connie
Re: Visual Interpretation of Internet Threats Aaron Wade
Re: Visual Interpretation of Internet Threats Kathy Bergsma
Re: Visual Interpretation of Internet Threats Gary Flynn
Re: Visual Interpretation of Internet Threats Brent Sweeny
Re: Visual Interpretation of Internet Threats Peter Charbonneau
StoneGate IPS Steven Osit
Re: Visual Interpretation of Internet Threats Hull, Dave
Re: Visual Interpretation of Internet Threats Ozzie Paez
Re: Visual Interpretation of Internet Threats Willis Marti
Re: Visual Interpretation of Internet Threats Jay Tumas
Re: Visual Interpretation of Internet Threats Basgen, Brian
Network Security Auditors Then, Keri
Re: Network Security Auditors Joel Rosenblatt
Re: Visual Interpretation of Internet Threats John McNair
Re: Network Security Auditors Sealey, Adam L.
Re: Network Security Auditors Then, Keri

Friday, 30 November

Re: Network Security Auditors Joseph Karam
Re: Network Security Auditors Peters, Kevin
Re: Network Security Auditors Then, Keri
Patch Management In Higher Ed Survey Anthony Maszeroski

Monday, 03 December

Product request - auditing/change management Youngquist, Jason R.
Re: Product request - auditing/change management Ewing, Ashley
Re: Patch Management In Higher Ed Survey Lovaas,Steven
Re: Patch Management In Higher Ed Survey Lovaas,Steven
EDPACS - A Call for Articles Dan Swanson
Re: Product request - auditing/change management Nick Lewis
Re: Product request - auditing/change management Spier, Peter
IT Process Institute Study Reveals Specific Change, Configuration and Release Practices That Predict Top Levels of Performance Dan Swanson

Wednesday, 05 December

VA Tech SANS-EDU Training, 3/3-8/2008, $700/person Randy Marchany
Survey results: DMCA and network bandwidth policy/practices Elliot Kendall

Thursday, 06 December

Re: Survey results: DMCA and network bandwidth policy/practices Brad Judy
Re: VA Tech SANS-EDU Training, 3/3-8/2008, $700/person Deepak J. Mathew
Juniper Firewalls Clark, Joseph K
Re: Juniper Firewalls jkaftan
Re: Juniper Firewalls Clark, Joseph K
Re: Juniper Firewalls John Kemp
Re: Juniper Firewalls Marsh, Todd
Re: Juniper Firewalls Clark, Joseph K
Re: Juniper Firewalls John Kemp

Friday, 07 December

Re: Juniper Firewalls Lovaas,Steven

Saturday, 08 December

Palo Alto Networks firewal Michael Natale

Monday, 10 December

Recommendations on Email Filtering System Anthony "Tony" Quigg
Re: Recommendations on Email Filtering System Childs, Aaron
Re: Recommendations on Email Filtering System Justin Dover
Re: Recommendations on Email Filtering System Christopher Webber
Re: Recommendations on Email Filtering System Charlie Prothero
Re: Recommendations on Email Filtering System Vuong Phung
Re: Recommendations on Email Filtering System Ben Spencer
Re: Recommendations on Email Filtering System Paul Russell
Re: Recommendations on Email Filtering System HALL, NATHANIEL D.

Tuesday, 11 December

Printers, printers, printers Martin Manjak
Patch Management In Higher Ed Survey Anthony Maszeroski
Re: Printers, printers, printers Roger Safian
Re: Printers, printers, printers Bristol, Gary L.
Re: Printers, printers, printers Julian Y. Koh
MS Exchange - Anti-virus Cheek, Leigh
Re: MS Exchange - Anti-virus Consolvo, Corbett D
Re: MS Exchange - Anti-virus Kieper, David
Re: MS Exchange - Anti-virus John Ladwig
Re: MS Exchange - Anti-virus Charlie Prothero
Re: MS Exchange - Anti-virus Gary Flynn
Re: Printers, printers, printers Jones, Dan

Wednesday, 12 December

Re: MS Exchange - Anti-virus Chris Steele
Re: Printers, printers, printers Nick Silkey
Active Directory Auditing JASON LANGDOC
Re: Active Directory Auditing HALL, NATHANIEL D.
Privacy Seminars at EDUCAUSE Regional Conferences Rodney Petersen
Re: Active Directory Auditing Brad Judy

Thursday, 13 December

ESM technologies (catching unsuccessful logins, other Windows critical events) Merlino, Thomas
Full Disk Encryption Mclaughlin, Kevin (mclaugkl)
Re: Full Disk Encryption Gary Dobbins
Re: Full Disk Encryption Matthew Gracie
Re: Full Disk Encryption Sherry Callahan
Re: Full Disk Encryption Sealey, Adam L.

Friday, 14 December

Prg Banking Trojan information? Peter Charbonneau
Re: Full Disk Encryption Howell, Paul
Re: Full Disk Encryption Gary Dobbins
Re: Full Disk Encryption Scott O. Bradner
Re: Full Disk Encryption Harold Winshel
Re: Full Disk Encryption Gary Dobbins
Re: Full Disk Encryption Scott O. Bradner
Outside Entities Computers jason rinne
Re: Full Disk Encryption Spransy, Derek
Re: Full Disk Encryption Julian Y. Koh
Re: Full Disk Encryption Spransy, Derek
Re: Full Disk Encryption Todd Clementz
Re: Full Disk Encryption Justin Sherenco
Re: Outside Entities Computers HALL, NATHANIEL D.
Re: Outside Entities Computers Buz Dale
Re: Full Disk Encryption Mike Wiseman
Re: Outside Entities Computers Lovaas,Steven
Re: Full Disk Encryption Linda Pruss
Re: Outside Entities Computers Brad Judy
Re: Outside Entities Computers Adam Stone
Re: Outside Entities Computers Torres, Juan
Re: Full Disk Encryption Jones, Dan
Re: Full Disk Encryption Howell, Paul
Re: Outside Entities Computers Valdis Kletnieks
Don't Fall for the 90# Vuong Phung

Saturday, 15 December

Re: Don't Fall for the 90# David Harley

Monday, 17 December

Voice Over IP - Retention of Call Content and Call Activity Sherry, Cathy
[no subject] Mclaughlin, Kevin (mclaugkl)
Re: Gary Dobbins
Re: Allan Williams
Re: Custer, William L. Mr.
Re: Joel Rosenblatt
Re: Mclaughlin, Kevin (mclaugkl)
Re: Glenn Forbes Fleming Larratt
SEM Question: High Tower Software Spier, Peter
Re: Ardoth Hassler
Re: David Kovarik
Re: Peters, Kevin
Re: Harold Winshel
Re: Harold Winshel
Re: SEM Question: High Tower Software Beechey, Jim

Tuesday, 18 December

Re: Sam Stelfox
Re: Chad McDonald
Re: Geoffrey S. Nathan
Re: Hatala, Jeffrey
Re: Eric Case
Re: Schneider, David A
Re: Brad Judy

Wednesday, 19 December

SKYPE - What's the latest in terms of Risk... Sadler, Connie

Thursday, 20 December

Network Analyst Position - Buffalo State College Killian, Thomas
Re: SKYPE - What's the latest in terms of Risk... Scott Koger
Re: SKYPE - What's the latest in terms of Risk... Mike Corcoran
Re: SKYPE - What's the latest in terms of Risk... Terry Gray
Incident Classifications Wes Young
Re: SKYPE - What's the latest in terms of Risk... Tristan RHODES
Re: Incident Classifications Aaron Wade
Re: Incident Classifications Roger Safian
Re: SKYPE - What's the latest in terms of Risk... David Morton
Re: Incident Classifications Hull, Dave
Re: SKYPE - What's the latest in terms of Risk... David Gillett
Re: paloalto firewall Mike Corcoran
Re: paloalto firewall Alex
Re: SKYPE - What's the latest in terms of Risk... Cal Frye
Re: SKYPE - What's the latest in terms of Risk... Randall C Grimshaw
Re: paloalto firewall Jeff Holden
Re: Prg Banking Trojan information? David Harley
Re: paloalto firewall Mark Boolootian
Re: paloalto firewall Valdis Kletnieks
Re: SKYPE - What's the latest in terms of Risk... Bill Brinkley
Re: Incident Classifications Bill Brinkley
Re: SKYPE - What's the latest in terms of Risk... Charlie Prothero

Friday, 21 December

Re: SKYPE - What's the latest in terms of Risk... Chris Edwards
Re: paloalto firewall Chris Edwards
UPS Security Contact Mclaughlin, Kevin (mclaugkl)
Re: UPS Security Contact Custer, William L. Mr.
Re: UPS Security Contact Peter Charbonneau
Re: SKYPE - What's the latest in terms of Risk... Vincent Stoffer
Re: paloalto firewall Jeff Holden
Re: paloalto firewall Gene Spafford
UPS Follow-Up Mclaughlin, Kevin (mclaugkl)

Monday, 24 December

FileNet IDM Desktop v4.x (or 3.x) Training Melissa
Re: Incident Classifications Wes Young