Educause Security Discussion: by thread
596 messages
starting Jan 03 08 and
ending Mar 31 08
Date index |
Thread index |
Author index
- Authentication of remote users Gary Flynn (Jan 03)
- <Possible follow-ups>
- Re: Authentication of remote users Robert Paterson (Jan 03)
- Re: Authentication of remote users Cal Frye (Jan 03)
- Re: Authentication of remote users Bob Bayn (Jan 03)
- Re: Authentication of remote users Scott Fendley (Jan 03)
- Re: Authentication of remote users Kees Leune (Jan 03)
- Re: Authentication of remote users Christopher Webber (Jan 03)
- Re: Authentication of remote users Dave Mueller (Jan 03)
- Re: Authentication of remote users Hunt,Keith A (Jan 03)
- Re: Authentication of remote users Andrea Beesing (Jan 03)
- Re: Authentication of remote users Robert Paterson (Jan 03)
- Re: Authentication of remote users Scott Koger (Jan 03)
- Re: Authentication of remote users Tom Peterson (Jan 03)
- Re: Authentication of remote users Chris Vakhordjian (Jan 03)
- Re: Authentication of remote users Joel Rosenblatt (Jan 03)
- Re: Authentication of remote users Roger Safian (Jan 03)
- Re: Authentication of remote users charlie derr (Jan 03)
- Re: Authentication of remote users Roger Safian (Jan 03)
- Re: Authentication of remote users Cal Frye (Jan 03)
- Re: Authentication of remote users Doug Markiewicz (Jan 04)
- Re: Authentication of remote users Doug Markiewicz (Jan 04)
- Re: Authentication of remote users Gary Flynn (Jan 04)
- Re: Authentication of remote users Hunt,Keith A (Jan 04)
- Re: Authentication of remote users Joel Rosenblatt (Jan 04)
- Re: Authentication of remote users Gary Flynn (Jan 04)
- Re: Authentication of remote users Joel Rosenblatt (Jan 04)
- Re: Authentication of remote users Valdis Kletnieks (Jan 04)
- Re: Authentication of remote users Hunt,Keith A (Jan 04)
- Re: Authentication of remote users Jim Dillon (Jan 04)
- Re: Authentication of remote users Joel Rosenblatt (Jan 04)
- Re: Authentication of remote users Valdis Kletnieks (Jan 04)
- Info Classification Policy implementation Gianforte, Danna (Jan 03)
- <Possible follow-ups>
- Re: Info Classification Policy implementation Sarah Stevens (Jan 18)
- Enterprise Vault Melissa (Jan 08)
- ActiveX killbit vs IE Add-on Disable as protection from defective controls Gary Flynn (Jan 08)
- Information Security Governance Framework Doug Markiewicz (Jan 09)
- <Possible follow-ups>
- Re: Information Security Governance Framework Howell, Paul (Jan 09)
- Question about malware research Justin Klein Keane (Jan 10)
- <Possible follow-ups>
- Re: Question about malware research Valdis Kletnieks (Jan 10)
- Re: Question about malware research Justin Klein Keane (Jan 10)
- Re: Question about malware research Bill Brinkley (Jan 10)
- Re: Question about malware research Joe St Sauver (Jan 10)
- E-Signatures Daniel Adinolfi (Jan 10)
- <Possible follow-ups>
- Re: E-Signatures Valdis Kletnieks (Jan 10)
- Re: E-Signatures Harrold Ahole (Jan 10)
- Re: E-Signatures Faith Mcgrath (Jan 10)
- Re: E-Signatures Harrold Ahole (Jan 10)
- Re: E-Signatures Curt Wilson (Jan 10)
- Re: E-Signatures Randy Marchany (Jan 10)
- Re: E-Signatures Sarah Stevens (Jan 10)
- Re: E-Signatures Ozzie Paez (Jan 11)
- Re: E-Signatures Sarah Stevens (Jan 11)
- Re: E-Signatures Ozzie Paez (Jan 11)
- Re: E-Signatures David Grisham (Jan 30)
- Social Network Analysis savanted1© (Jan 10)
- <Possible follow-ups>
- Re: Social Network Analysis Sarah Stevens (Jan 10)
- Re: Social Network Analysis Sarah Stevens (Jan 10)
- Re: Social Network Analysis Wayne Smith (Jan 10)
- Security Auditing Tool McNeil, Sharon McLawhorn (Jan 11)
- <Possible follow-ups>
- Re: Security Auditing Tool Deepak J. Mathew (Jan 15)
- Re: Security Auditing Tool McNeil, Sharon McLawhorn (Jan 15)
- Credit Reporting Companies Mclaughlin, Kevin (mclaugkl) (Jan 14)
- <Possible follow-ups>
- Re: Credit Reporting Companies Pace, Guy (Jan 14)
- Re: Credit Reporting Companies Custer, William L. Mr. (Jan 14)
- Re: Credit Reporting Companies Dan Johnson (Jan 14)
- Re: Credit Reporting Companies Fugett, Julie C (Jan 14)
- Re: Credit Reporting Companies Pace, Guy (Jan 14)
- Re: Credit Reporting Companies Custer, William L. Mr. (Jan 14)
- Full Disk Encryption Summary Mclaughlin, Kevin (mclaugkl) (Jan 14)
- <Possible follow-ups>
- Re: Full Disk Encryption Summary Peters, Kevin (Jan 14)
- Re: Full Disk Encryption Summary Gary Flynn (Jan 14)
- Fraudulent Facebook Profile Kees Leune (Jan 14)
- <Possible follow-ups>
- Re: Fraudulent Facebook Profile Cal Frye (Jan 14)
- Re: Fraudulent Facebook Profile Renaud, Robert (Jan 14)
- Re: Fraudulent Facebook Profile Tracy Mitrano (Jan 14)
- Re: Fraudulent Facebook Profile Maloney, Michael (Jan 14)
- Re: Fraudulent Facebook Profile Kees Leune (Jan 15)
- Quick Survey - How much of Faculty/Staff directory information is made public? And How? James Moore (Jan 14)
- Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Chris Gauthier (Jan 14)
- <Possible follow-ups>
- Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Barbara Torney (Jan 14)
- Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Roger Safian (Jan 14)
- Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Kieper, David (Jan 15)
- Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Joel Rosenblatt (Jan 15)
- Social Network Analysis (SNA) savanted1© (Jan 15)
- SANS Training at VA Tech, 3/3-8/2008 Randy Marchany (Jan 15)
- WPAD DNS floods Gary Flynn (Jan 16)
- <Possible follow-ups>
- Re: WPAD DNS floods Jeff Kell (Jan 16)
- Re: WPAD DNS floods Gary Flynn (Jan 16)
- Re: WPAD DNS floods Valdis Kletnieks (Jan 16)
- Re: WPAD DNS floods Valdis Kletnieks (Jan 16)
- Re: WPAD DNS floods Dan Peterson (Jan 16)
- Re: WPAD DNS floods Gary Flynn (Jan 16)
- Re: WPAD DNS floods Brad Judy (Jan 16)
- Re: WPAD DNS floods Brad Judy (Jan 16)
- Re: WPAD DNS floods Brad Judy (Jan 16)
- Re: WPAD DNS floods Gary Flynn (Jan 16)
- Re: WPAD DNS floods Doug Pearson (Jan 16)
- Value and use of penetration testing and vulnerability assessment in .edu Curt Wilson (Jan 17)
- Re: Value and use of penetration testing and vulnerability assessment in .edu Heather Flanagan (Jan 17)
- <Possible follow-ups>
- Re: Value and use of penetration testing and vulnerability assessment in .edu Basgen, Brian (Jan 18)
- security for Windows logoff scripts writing to log files Kevin Shalla (Jan 17)
- <Possible follow-ups>
- Re: security for Windows logoff scripts writing to log files Brad Judy (Jan 17)
- Re: security for Windows logoff scripts writing to log files Mike Phillips (Jan 18)
- Re: security for Windows logoff scripts writing to log files Themba Flowers (Jan 18)
- State of Georgia Board of Regents Mclaughlin, Kevin (mclaugkl) (Jan 22)
- <Possible follow-ups>
- Re: State of Georgia Board of Regents Ewing, Ashley (Jan 22)
- Re: State of Georgia Board of Regents Buz Dale (Jan 22)
- Releasing details Theresa Rowe (Jan 22)
- <Possible follow-ups>
- Re: Releasing details Bristol, Gary L. (Jan 22)
- Re: Releasing details Willis Marti (Jan 22)
- Re: Releasing details Gary Dobbins (Jan 22)
- Re: Releasing details Roger Safian (Jan 22)
- Re: Releasing details Joel Rosenblatt (Jan 22)
- Re: Releasing details Chad McDonald (Jan 23)
- Re: Releasing details David, Elaine (Jan 23)
- Re: Releasing details Sherry, Cathy (Jan 23)
- Re: Releasing details Eric Jernigan (Jan 23)
- Re: Releasing details Willis Marti (Jan 23)
- Job Opportunity: Head of Cyber Security, Berkeley Lab Adam Stone (Jan 23)
- PCI quarterly network scan cost? Custer, William L. Mr. (Jan 23)
- SANS Course Announcement for March 10-15 in Jacksonville, Florida! (fwd) Randy Marchany (Jan 23)
- Attacks against Linux/Apache servers as reported in NetworkWorld Rob Tanner (Jan 24)
- Security experiences with SharePoint Knowles, Richard N. CISSP PMP Mr. (Jan 24)
- <Possible follow-ups>
- Re: Security experiences with SharePoint Brad Judy (Jan 24)
- [(ISC)2] Associate Program savanted1© (Jan 25)
- <Possible follow-ups>
- Re: [(ISC)2] Associate Program Pace, Guy (Jan 25)
- Re: [(ISC)2] Associate Program savanted1© (Jan 25)
- InfoSec Alert from University of Cincinnati Mclaughlin, Kevin (mclaugkl) (Jan 28)
- <Possible follow-ups>
- Re: InfoSec Alert from University of Cincinnati Ken Connelly (Jan 28)
- Re: InfoSec Alert from University of Cincinnati Dan Oachs (Jan 28)
- Re: InfoSec Alert from University of Cincinnati Bob Bayn (Jan 28)
- Re: InfoSec Alert from University of Cincinnati David A. Batastini (Jan 28)
- Re: InfoSec Alert from University of Cincinnati Gene Spafford (Jan 28)
- Re: InfoSec Alert from University of Cincinnati Greg Vickers (Jan 28)
- Firewall - Outbound Ports Chris Golden (Jan 29)
- <Possible follow-ups>
- Re: Firewall - Outbound Ports Michael Hornung (Jan 29)
- Re: Firewall - Outbound Ports Consolvo, Corbett D (Jan 29)
- Re: Firewall - Outbound Ports Roger Safian (Jan 29)
- Re: Firewall - Outbound Ports Joseph Karam (Jan 30)
- Re: Firewall - Outbound Ports Roger Safian (Jan 30)
- Re: Firewall - Outbound Ports Valdis Kletnieks (Jan 30)
- classifying P2P traffic Youngquist, Jason R. (Jan 29)
- <Possible follow-ups>
- Re: classifying P2P traffic David Boyer (Jan 29)
- Re: classifying P2P traffic Consolvo, Corbett D (Jan 29)
- Re: classifying P2P traffic Greene, Chip (Jan 29)
- Re: classifying P2P traffic Hughes, Scott (Jan 29)
- Re: classifying P2P traffic Justin Dover (Jan 29)
- Re: classifying P2P traffic Julian Y. Koh (Jan 29)
- Re: classifying P2P traffic Alex (Jan 29)
- Re: classifying P2P traffic Harris, Michael C. (Jan 29)
- Re: classifying P2P traffic Michael Hornung (Jan 29)
- Re: classifying P2P traffic Michael Hornung (Jan 29)
- Re: classifying P2P traffic Lutzen, Karl F. (Jan 29)
- Re: classifying P2P traffic jkaftan (Jan 29)
- Re: classifying P2P traffic Alex (Jan 29)
- Re: classifying P2P traffic Samuel Young (Jan 29)
- Re: classifying P2P traffic Cal Frye (Jan 29)
- Re: classifying P2P traffic John Kristoff (Jan 29)
- Re: classifying P2P traffic Dan Oachs (Jan 29)
- Re: classifying P2P traffic Cal Frye (Jan 29)
- Re: classifying P2P traffic John Kristoff (Jan 30)
- Re: classifying P2P traffic Valdis Kletnieks (Jan 30)
- Re: classifying P2P traffic Shumon Huque (Feb 11)
- Re: classifying P2P traffic - what about legit uses? Randy Marchany (Jan 29)
- <Possible follow-ups>
- Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Lutzen, Karl F. (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Scholz, Greg (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Michael Hornung (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt (Jan 29)
- Re: classifying P2P traffic - what about legit uses? David Gillett (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Harris, Michael C. (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Cal Frye (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Curt Wilson (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Tracy Mitrano (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Barbara Torney (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Barbara Torney (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Cal Frye (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt (Jan 29)
- Re: classifying P2P traffic - what about legit uses? Vanderbilt, Teresa (Jan 30)
- Re: classifying P2P traffic - what about legit uses? Part Deux Randy Marchany (Jan 29)
- <Possible follow-ups>
- Re: classifying P2P traffic - what about legit uses? Part Deux Roger Safian (Jan 30)
- Re: classifying P2P traffic - what about legit uses? Part Deux Ozzie Paez (Jan 30)
- Re: classifying P2P traffic - what about legit uses? Part Deux Kevin Shalla (Jan 31)
- flurry of IM worms Bob Bayn (Jan 29)
- <Possible follow-ups>
- Re: flurry of IM worms Randy Marchany (Jan 29)
- ICANN SSAC Releases a Report on Fast Flux Joe St Sauver (Jan 30)
- Windows local admin in a .edu environment Halliday,Paul (Jan 30)
- <Possible follow-ups>
- Re: Windows local admin in a .edu environment David Kovarik (Jan 30)
- Re: Windows local admin in a .edu environment Hull, Dave (Jan 30)
- Re: Windows local admin in a .edu environment Frank T. Shylkofski (Jan 30)
- Re: Windows local admin in a .edu environment Eric Case (Jan 30)
- Re: Windows local admin in a .edu environment Halliday,Paul (Jan 31)
- Re: Windows local admin in a .edu environment Gary Flynn (Jan 31)
- Re: Windows local admin in a .edu environment Jim Dillon (Jan 31)
- Re: Windows local admin in a .edu environment Steven Alexander (Jan 31)
- Re: Windows local admin in a .edu environment Ozzie Paez (Jan 31)
- Re: Windows local admin in a .edu environment Curt Wilson (Jan 31)
- Security Guides, Standards, Benchmarks? Drake, Craig (Jan 30)
- <Possible follow-ups>
- Re: Security Guides, Standards, Benchmarks? Brad Judy (Jan 30)
- Re: Security Guides, Standards, Benchmarks? Havens, Ben (Jan 30)
- Interesting Survey Ozzie Paez (Jan 31)
- External Consultants Taylor, James R (Jan 31)
- <Possible follow-ups>
- Re: External Consultants Willis Marti (Jan 31)
- Re: External Consultants Sherry, Cathy (Jan 31)
- Re: External Consultants Doug Markiewicz (Jan 31)
- Network Equipment Sign Wording Kutil, Charlie D. (Jan 31)
- <Possible follow-ups>
- Re: Network Equipment Sign Wording Terry Gray (Jan 31)
- Re: Network Equipment Sign Wording Ken Connelly (Jan 31)
- Re: Network Equipment Sign Wording Chet Langin (Jan 31)
- Re: Network Equipment Sign Wording David Gillett (Jan 31)
- Re: Network Equipment Sign Wording Kees Leune (Feb 01)
- Higher Ed Security Operation Centers - Looking for your experiences David Seidl (Feb 01)
- <Possible follow-ups>
- Re: Higher Ed Security Operation Centers - Looking for your experiences Leo Song (Feb 01)
- Re: Higher Ed Security Operation Centers - Looking for your experiences Bill Brinkley (Feb 01)
- Re: Higher Ed Security Operation Centers - Looking for your experiences Justin Jurgensen Sherenco (Feb 01)
- USB device encryption inquiry Greg Vickers (Feb 04)
- Blackhole DNS. Halliday,Paul (Feb 05)
- <Possible follow-ups>
- Re: Blackhole DNS. Consolvo, Corbett D (Feb 05)
- Layer 2 infrastructure security Consolvo, Corbett D (Feb 05)
- <Possible follow-ups>
- Re: Layer 2 infrastructure security Kevin Halgren (Feb 05)
- Job Opening at Hamilton College Joseph Karam (Feb 05)
- Interesting spear phising attempt against IT Basgen, Brian (Feb 05)
- <Possible follow-ups>
- Re: Interesting spear phising attempt against IT Hunt,Keith A (Feb 06)
- Re: Interesting spear phising attempt against IT Brian Allen (Feb 06)
- Re: Interesting spear phising attempt against IT Joel Rosenblatt (Feb 06)
- Re: Interesting spear phising attempt against IT Ozzie Paez (Feb 06)
- Re: Interesting spear phising attempt against IT Basgen, Brian (Feb 08)
- SANS Training at VA Tech, 3/3-8/2008, February Reminder (fwd) Randy Marchany (Feb 06)
- Sharepoint servers and Exchange servers Cheek, Leigh (Feb 06)
- <Possible follow-ups>
- Re: Sharepoint servers and Exchange servers Valdis Kletnieks (Feb 06)
- Re: Sharepoint servers and Exchange servers Shane Bishop (Feb 06)
- Re: Sharepoint servers and Exchange servers Cheek, Leigh (Feb 07)
- Managing Client Side Applications and Vendor "compatibility" Chris Green (Feb 07)
- <Possible follow-ups>
- Re: Managing Client Side Applications and Vendor "compatibility" Shawn Sines (Feb 07)
- Re: Managing Client Side Applications and Vendor "compatibility" Paul Keser (Feb 07)
- Re: Managing Client Side Applications and Vendor "compatibility" Shawn Sines (Feb 07)
- Initial Response to RIAA/MPAA Complaints Gregg, Christopher S. (Feb 07)
- <Possible follow-ups>
- Re: Initial Response to RIAA/MPAA Complaints Joel Rosenblatt (Feb 07)
- Re: Initial Response to RIAA/MPAA Complaints Hunt,Keith A (Feb 07)
- Re: Initial Response to RIAA/MPAA Complaints Shelley Rust (Feb 07)
- Re: Initial Response to RIAA/MPAA Complaints Roger Safian (Feb 07)
- Re: Initial Response to RIAA/MPAA Complaints Ken Connelly (Feb 07)
- Re: Initial Response to RIAA/MPAA Complaints Greg Jackson (Feb 07)
- Data Retention Policies Mike Hanson (Feb 07)
- <Possible follow-ups>
- Re: Data Retention Policies Sherry, Cathy (Feb 07)
- Re: Data Retention Policies Colleen Keller (Feb 08)
- Re: Data Retention Policies Randy Marchany (Feb 11)
- Miscues (was Re: Managing Client Side Applications and Vendor "compatibility" Valdis Kletnieks (Feb 07)
- Phishing attempt Theresa Semmens (Feb 08)
- <Possible follow-ups>
- Re: Phishing attempt Lewis, Kevin M (EXP) (Feb 08)
- Re: Phishing attempt Roger Safian (Feb 08)
- Re: Phishing attempt Bob Bayn (Feb 08)
- Re: Phishing attempt Theresa Semmens (Feb 08)
- Re: Phishing attempt Joe St Sauver (Feb 08)
- Re: Phishing attempt Jeff Giacobbe (Feb 08)
- Data recovery contract Georgios Mousouros (Feb 08)
- <Possible follow-ups>
- Re: Data recovery contract Joel Rosenblatt (Feb 08)
- Phishing attempt question - thank you Theresa Semmens (Feb 08)
- strange campus "surveys" John Quigley (Feb 08)
- <Possible follow-ups>
- Re: strange campus "surveys" Pace, Guy (Feb 08)
- Re: strange campus "surveys" Julian J Thompson (jthmpsn2) (Feb 08)
- Re: [SPAM:#### 88%] Re: strange campus "surveys" Julian J Thompson (jthmpsn2) (Feb 08)
- Re: Educational Security Incidents Year in Review - 2007 is now available Melissa (Feb 10)
- <Possible follow-ups>
- Re: Educational Security Incidents Year in Review - 2007 is now available Melissa (Feb 10)
- Educational Security Incidents Year in Review - 2007 is now available Adam Dodge (Feb 11)
- Re: Educational Security Incidents Year in Review - 2007 is now available Halliday,Paul (Feb 11)
- Re: Educational Security Incidents Year in Review - 2007 is now available Eric Case (Feb 11)
- Re: Educational Security Incidents Year in Review - 2007 is now available Adam Dodge (Feb 11)
- Re: Educational Security Incidents Year in Review - 2007 is now available Adam Dodge (Feb 11)
- Re: Educational Security Incidents Year in Review - 2007 is now available John Kristoff (Feb 11)
- Securing / erasing hard drives in copiers? Bruggeman, John (Feb 11)
- <Possible follow-ups>
- Re: Securing / erasing hard drives in copiers? Gary Dobbins (Feb 11)
- Re: Securing / erasing hard drives in copiers? Joel Rosenblatt (Feb 11)
- Re: Securing / erasing hard drives in copiers? Eric Case (Feb 11)
- Re: Securing / erasing hard drives in copiers? Brad Judy (Feb 11)
- Anti-Malware Testing Standards Organization David Harley (Feb 11)
- Blacklisted by Hotmail Tim Lane (Feb 11)
- <Possible follow-ups>
- Re: Blacklisted by Hotmail Harrold Ahole (Feb 11)
- Re: Blacklisted by Hotmail Harrold Ahole (Feb 11)
- Re: Blacklisted by Hotmail Jeffrey Ramsay (Feb 11)
- Re: Blacklisted by Hotmail William Senter (Feb 12)
- Re: Blacklisted by Hotmail Harrold Ahole (Feb 12)
- Re: Blacklisted by Hotmail William Senter (Feb 12)
- Locating Personally Identifiable Information David, Elaine (Feb 12)
- <Possible follow-ups>
- Re: Locating Personally Identifiable Information Theresa Semmens (Feb 12)
- Re: Locating Personally Identifiable Information Doug Markiewicz (Feb 12)
- Re: Locating Personally Identifiable Information Brad Judy (Feb 12)
- Re: Locating Personally Identifiable Information Charles Young (Feb 12)
- Re: Locating Personally Identifiable Information Gary Flynn (Feb 12)
- Microsoft IIS security update ms08-006 looks critical to me Gary Flynn (Feb 12)
- <Possible follow-ups>
- Re: Microsoft IIS security update ms08-006 looks critical to me David Shettler (Feb 12)
- Re: Microsoft IIS security update ms08-006 looks critical to me Basgen, Brian (Feb 14)
- Re: Microsoft IIS security update ms08-006 looks critical to me Basgen, Brian (Feb 14)
- Re: Microsoft IIS security update ms08-006 looks critical to me Curt Wilson (Feb 14)
- Re: Microsoft IIS security update ms08-006 looks critical to me Gary Flynn (Feb 15)
- Microsoft the source of all evil?? Simple question James Moore (Feb 13)
- <Possible follow-ups>
- Re: Microsoft the source of all evil?? Simple question Nick Pistentis (Feb 13)
- Re: Microsoft the source of all evil?? Simple question John Kim (Feb 13)
- Re: Microsoft the source of all evil?? Simple question Glenn Forbes Fleming Larratt (Feb 13)
- Re: Microsoft the source of all evil?? Simple question Kevin Halgren (Feb 13)
- Re: Microsoft the source of all evil?? Simple question Gary Flynn (Feb 13)
- Re: Microsoft the source of all evil?? Simple question Morrow Long (Feb 13)
- Cell phone stipends and impact on securing confidential data David, Elaine (Feb 14)
- <Possible follow-ups>
- Re: Cell phone stipends and impact on securing confidential data Theresa Rowe (Feb 15)
- sudowin Gary Flynn (Feb 15)
- Question about sudowin? Schley Andrew Kutz (Feb 15)
- Listserv Change Peter B. DeBlois (Feb 16)
- Security Analyst Position - Univ of Iowa Drews, Jane E (Feb 19)
- consequences for student hacking Bob Henry (Feb 19)
- <Possible follow-ups>
- Re: consequences for student hacking Valdis Kletnieks (Feb 19)
- Re: consequences for student hacking Halliday,Paul (Feb 19)
- Re: consequences for student hacking Halliday,Paul (Feb 19)
- Re: consequences for student hacking Eric Case (Feb 19)
- Re: consequences for student hacking Bob Mahoney (Feb 19)
- Re: consequences for student hacking Valdis Kletnieks (Feb 19)
- Re: consequences for student hacking Bill Brinkley (Feb 20)
- Re: consequences for student hacking Doug Markiewicz (Feb 20)
- Re: consequences for student hacking Schley Andrew Kutz (Feb 20)
- consequences for student hacking Tom Siu (Feb 20)
- Re: consequences for student hacking - Legal implications Shamblin, Quinn (shamblqn) (Feb 20)
- Is anyone using a "Tape Buy back" for their tapes? Clyde Hoadley (Feb 20)
- [no subject] Brewer, Alex D (Feb 21)
- Abuse of web proxy access to library databases Jeff Giacobbe (Feb 22)
- <Possible follow-ups>
- Re: Abuse of web proxy access to library databases Mark Wilson (Feb 22)
- Re: Abuse of web proxy access to library databases Mike Iglesias (Feb 22)
- Re: Abuse of web proxy access to library databases Jeremy Mooney (Feb 22)
- FERPA question Kathy Bergsma (Feb 25)
- <Possible follow-ups>
- Re: FERPA question Kathy Bergsma (Feb 25)
- Re: FERPA question Mike Lococo (Feb 25)
- Re: FERPA question Allison Dolan (Feb 29)
- Re: FERPA question Wes Hubert (Feb 29)
- Re: FERPA question Kathy Bergsma (Mar 07)
- Re: FERPA question Ced Bennett (Mar 11)
- Security Certification Program Mclaughlin, Kevin (mclaugkl) (Feb 25)
- SANS Training at VA Tech, 3/3-8/2008, FINAL reminder (fwd) Randy Marchany (Feb 25)
- Call for Participation - Internet Safety Night - April 23, 2008 Raw, Randy (Feb 25)
- Experiences with Web application vulnerability assessment (1) software (2) companies Morrow Long (Feb 27)
- <Possible follow-ups>
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Gary Dobbins (Feb 27)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Johnson, Kevin (Feb 27)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Roger Safian (Feb 27)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Hull, Dave (Feb 27)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Randy Marchany (Feb 27)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Hull, Dave (Feb 27)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Halliday,Paul (Feb 27)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Petreski, Samuel (Feb 27)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Alex (Feb 27)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies curtw () siu edu (Feb 27)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Darwin Macatiag (Feb 28)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Alex (Feb 28)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Bob Doyle (Feb 29)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Darwin Macatiag (Feb 29)
- Re: Experiences with Web application vulnerability assessment (1) software (2) companies Jon Hanny (Mar 03)
- Experiences with Web application vulnerability scan service: WhiteHat Sherry, Cathy (Feb 27)
- Security Analyst Position - Illinois State University Tim flynn (Feb 27)
- Security Analyst - University of Northern Iowa Ken Connelly (Feb 27)
- Identify Finder McNeil, Sharon McLawhorn (Feb 27)
- <Possible follow-ups>
- Re: Identify Finder Gary Dobbins (Feb 27)
- Re: Identify Finder Halliday,Paul (Feb 27)
- Re: Identify Finder Petreski, Samuel (Feb 27)
- Re: Identify Finder Isac Balder (Feb 27)
- Re: Identify Finder Brad Judy (Feb 27)
- Re: Identify Finder Theodore Pham (Feb 27)
- Re: Identify Finder Allison Dolan (Feb 28)
- Re: Identify Finder Nick Silkey (Feb 28)
- Re: Identify Finder Howell, Paul (Feb 28)
- Re: Identify Finder Mike Lococo (Feb 28)
- Re: Identify Finder Brad Judy (Feb 28)
- Re: Identify Finder Roger Safian (Feb 28)
- Re: Identify Finder Shamblin, Quinn (shamblqn) (Feb 28)
- Re: Identify Finder Felecia Vlahos (Feb 28)
- [no subject] David Shettler (Feb 27)
- Ph.D. Committee Member Sought Chet Langin (Feb 27)
- <Possible follow-ups>
- Re: Ph.D. Committee Member Sought Kees Leune (Feb 28)
- Re: -- Vulnerability Disclosure David Shettler (Feb 27)
- Re: Alex (Feb 27)
- Re: Profile issue for Educase Lewis, Kevin M (EXP) (Feb 29)
- McAfee EPO I. W. Woodle (Feb 29)
- Firewall recommendations Jeff Holden (Feb 29)
- <Possible follow-ups>
- Re: Firewall recommendations Brawner, David (Feb 29)
- Re: Firewall recommendations Bean, Mike (Feb 29)
- Re: Firewall recommendations Consolvo, Corbett D (Feb 29)
- Re: Firewall recommendations Jarrod Millman (Feb 29)
- Re: Firewall recommendations Constantakos, William (Mar 01)
- Re: Firewall recommendations Ramon Hermida (Mar 03)
- Re: Firewall recommendations Joey Rego (Mar 03)
- Re: Firewall recommendations Ramon Hermida (Mar 03)
- Re: Firewall recommendations Charlie Prothero (Mar 03)
- Re: Firewall recommendations Perry, Jeff (Mar 03)
- Re: Firewall recommendations Soliwoda, Andrzej (Mar 14)
- Re: Firewall recommendations Richard Kunert (Mar 18)
- Re: Firewall recommendations Jon Hanny (Mar 18)
- Re: Firewall recommendations Avdagic, Indir (Mar 18)
- Was, RE: Firewall recommendations Halliday,Paul (Mar 01)
- <Possible follow-ups>
- Re: Was, RE: Firewall recommendations Jon Hanny (Mar 03)
- Re: Was, RE: Firewall recommendations Brian Epstein (Mar 03)
- Re: Was, RE: Firewall recommendations Curt Wilson (Mar 03)
- Re: Was, RE: Firewall recommendations Dan Oachs (Mar 03)
- 3rd party want to authenticate our users Oscar Knight (Mar 03)
- <Possible follow-ups>
- Re: 3rd party want to authenticate our users Sealey, Adam L. (Mar 03)
- Re: 3rd party want to authenticate our users Wood, Anne M (wood) (Mar 03)
- Re: 3rd party want to authenticate our users Joel Rosenblatt (Mar 03)
- Re: 3rd party want to authenticate our users Greg Vickers (Mar 04)
- Re: 3rd party want to authenticate our users Basgen, Brian (Mar 07)
- Re: 3rd party want to authenticate our users Morrow Long (Mar 07)
- Faculty and Staff IT Security Awareness Nicolas Pachis (Mar 03)
- <Possible follow-ups>
- Re: Faculty and Staff IT Security Awareness John Kristoff (Mar 03)
- Re: Faculty and Staff IT Security Awareness Allison Dolan (Mar 04)
- Re: Faculty and Staff IT Security Awareness Marty Manjak (Mar 04)
- Re: Faculty and Staff IT Security Awareness Theresa Rowe (Mar 10)
- Re: Faculty and Staff IT Security Awareness Martin Manjak (Mar 12)
- Re: Faculty and Staff IT Security Awareness Randy Marchany (Mar 12)
- Updated Risk Assessment resources available Ced Bennett (Mar 03)
- Managing passwords. Storing passwords. Bombard, Charles L (Mar 04)
- <Possible follow-ups>
- Re: Managing passwords. Storing passwords. Jon Hanny (Mar 04)
- Re: Managing passwords. Storing passwords. Bombard, Charles L (Mar 04)
- Re: Managing passwords. Storing passwords. Warner, David F (Mar 04)
- Re: Managing passwords. Storing passwords. Isac Balder (Mar 04)
- Re: Managing passwords. Storing passwords. Joseph Corey (Mar 04)
- Re: Managing passwords. Storing passwords. Josh Drummond (Mar 04)
- Re: Managing passwords. Storing passwords. Ray Bruder (Mar 05)
- Re: Managing passwords. Storing passwords. Lunceford, Dan (Mar 05)
- Re: Managing passwords. Storing passwords. Adam Schumacher (Mar 05)
- Re: Managing passwords. Storing passwords. John H. Sawyer (Mar 05)
- PKI Certificate Practice Statement Custer, William L. Mr. (Mar 04)
- <Possible follow-ups>
- Re: PKI Certificate Practice Statement John Kemp (Mar 04)
- Re: PKI Certificate Practice Statement Nick Lewis (Mar 04)
- Power over Ethernet cameras and software WILLIAM I ARNOLD (Mar 05)
- Summary of responses to query regarding web vulnerable assessment scanners and consultants Morrow Long (Mar 05)
- New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 05)
- <Possible follow-ups>
- Re: New e-mail attack using valid webmail accounts John Ladwig (Mar 06)
- Re: New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 06)
- Re: New e-mail attack using valid webmail accounts Bradley, Stephen W. Mr. (Mar 06)
- Re: New e-mail attack using valid webmail accounts Michael H. Martel (Mar 06)
- Re: New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 06)
- Re: New e-mail attack using valid webmail accounts Jesse Thompson (Mar 07)
- Re: New e-mail attack using valid webmail accounts Jesse Thompson (Mar 07)
- Re: New e-mail attack using valid webmail accounts Bruggeman, John (Mar 07)
- Re: New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 10)
- Re: New e-mail attack using valid webmail accounts Zach Jansen (Mar 10)
- Re: New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 10)
- Re: New e-mail attack using valid webmail accounts Zach Jansen (Mar 14)
- New e-mail attack using valid webmail accounts Kenneth Arnold (Mar 14)
- Re: New e-mail attack using valid webmail accounts Brian Friday (Mar 14)
- Re: New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 14)
- Re: New e-mail attack using valid webmail accounts Curt Wilson (Mar 14)
- Antivirus for MAC. Halliday,Paul (Mar 06)
- <Possible follow-ups>
- Re: Antivirus for MAC. Jenkins, Matthew (Mar 06)
- Re: Antivirus for MAC. Mark Borrie (Mar 06)
- Re: Antivirus for MAC. Jeff Giacobbe (Mar 06)
- Reviewing Security Policy Sabo, Eric (Mar 06)
- <Possible follow-ups>
- Re: Reviewing Security Policy Holland, Richard H (Mar 06)
- Re: Reviewing Security Policy Lee Weers (Mar 06)
- Re: Reviewing Security Policy Sabo, Eric (Mar 06)
- Re: Reviewing Security Policy Jenkins, Matthew (Mar 06)
- Re: Reviewing Security Policy Sabo, Eric (Mar 06)
- Re: Reviewing Security Policy Jenkins, Matthew (Mar 06)
- Soliciting Higher Education Input to the Commission on Cyber Security for the 44th Presidency Rodney Petersen (Mar 06)
- Device/Endpoint Security Zwe Paing (Mar 10)
- PCI Compliance, RFP & Audits Ellen Smout (Mar 10)
- heads up: Paper Submission! scam Ken De Cruyenaere (Mar 11)
- <Possible follow-ups>
- Re: heads up: Paper Submission! scam Gordon Wishon (Mar 11)
- Re: heads up: Paper Submission! scam Morrow Long (Mar 11)
- Re: heads up: Paper Submission! scam Morrow Long (Mar 11)
- Web Application Vulnerability Assessment RFB Sherry, Cathy (Mar 11)
- SOC Mclaughlin, Kevin (mclaugkl) (Mar 13)
- Do you send out Bounce Notifications? Clyde Hoadley (Mar 13)
- <Possible follow-ups>
- Re: Do you send out Bounce Notifications? Dale Fay (Mar 13)
- Re: Do you send out Bounce Notifications? Joel Rosenblatt (Mar 13)
- Re: Do you send out Bounce Notifications? Paul Russell (Mar 13)
- What companies do a good security audit/review Mark Berman (Mar 14)
- <Possible follow-ups>
- Re: What companies do a good security audit/review Sealey, Adam L. (Mar 14)
- Re: What companies do a good security audit/review St Clair, Jim (Mar 14)
- Re: What companies do a good security audit/review Bruhn, Mark Steven (Mar 14)
- Re: What companies do a good security audit/review Bob Bayn (Mar 14)
- Re: What companies do a good security audit/review John Ladwig (Mar 14)
- Re: What companies do a good security audit/review Bruhn, Mark Steven (Mar 14)
- Re: What companies do a good security audit/review Darwin Macatiag (Mar 14)
- Re: What companies do a good security audit/review Ced Bennett (Mar 14)
- Re: What companies do a good security audit/review Jim Dillon (Mar 14)
- Re: What companies do a good security audit/review Ozzie Paez (Mar 14)
- Group encryption solutions Curt Wilson (Mar 14)
- <Possible follow-ups>
- Re: Group encryption solutions Tonkin, Derek K. (Mar 14)
- Re: Group encryption solutions Curt Wilson (Mar 14)
- Re: Group encryption solutions Tonkin, Derek K. (Mar 14)
- Re: Group encryption solutions Brad Judy (Mar 14)
- AD Forest Survey Juraj Ontkanin (Mar 14)
- Encrypted email Heather Flanagan (Mar 18)
- <Possible follow-ups>
- Re: Encrypted email Mike Wiseman (Mar 18)
- Re: Encrypted email Jesse Thompson (Mar 19)
- Re: Encrypted email Jesse Thompson (Mar 19)
- Re: Encrypted email Mike Wiseman (Mar 19)
- Re: Encrypted email Heather Flanagan (Mar 19)
- Re: Encrypted email Matthew Gracie (Mar 20)
- Re: Encrypted email Jesse Thompson (Mar 21)
- Re: Encrypted email Jesse Thompson (Mar 21)
- Outsourced e-mail archiving Raw, Randy (Mar 18)
- <Possible follow-ups>
- Re: Outsourced e-mail archiving Jon Mitchiner (Mar 18)
- Data Classification: Legal criteria Basgen, Brian (Mar 18)
- <Possible follow-ups>
- Re: Data Classification: Legal criteria Chris Gauthier (Mar 18)
- Re: Data Classification: Legal criteria David Kovarik (Mar 18)
- Re: Data Classification: Legal criteria Basgen, Brian (Mar 18)
- Re: Data Classification: Legal criteria Doug Markiewicz (Mar 18)
- Re: Data Classification: Legal criteria Bill Badertscher (Mar 18)
- Re: Data Classification: Legal criteria David Kovarik (Mar 18)
- Re: Data Classification: Legal criteria Basgen, Brian (Mar 18)
- Re: Data Classification: Legal criteria Sherry, Cathy (Mar 18)
- Re: Data Classification: Legal criteria Brad Judy (Mar 18)
- Re: Data Classification: Legal criteria Gary Dobbins (Mar 18)
- Re: Data Classification: Legal criteria Ozzie Paez (Mar 18)
- Re: Data Classification: Legal criteria Valdis Kletnieks (Mar 18)
- Re: Data Classification: Legal criteria Ced Bennett (Mar 19)
- Outsourced e-mail troubleshooting Cal Frye (Mar 18)
- Web Application Security Assessment DiGrazia, Mick A (Mar 19)
- Job posting: Enterprise ERP Security Administrator Joe Bazeley (Mar 20)
- Information Security Architect - Brandeis University Elliot Kendall (Mar 20)
- Windows server host based firewalls? Aaron Cayard-Roberts (Mar 21)
- <Possible follow-ups>
- Re: Windows server host based firewalls? Cal Frye (Mar 21)
- Cisco VPN concentrator Replacement Recommendation Needed schilling (Mar 24)
- <Possible follow-ups>
- Re: Cisco VPN concentrator Replacement Recommendation Needed Consolvo, Corbett D (Mar 24)
- Re: Cisco VPN concentrator Replacement Recommendation Needed Julian Y. Koh (Mar 24)
- Re: Cisco VPN concentrator Replacement Recommendation Needed Jenkins, Matthew (Mar 24)
- Re: Cisco VPN concentrator Replacement Recommendation Needed Avdagic, Indir (Mar 24)
- Re: Cisco VPN concentrator Replacement Recommendation Needed Brock, Anthony - NET (Mar 24)
- Re: Cisco VPN concentrator Replacement Recommendation Needed Russ Leathe (Mar 24)
- Re: Cisco VPN concentrator Replacement Recommendation Needed schilling (Mar 24)
- Impulse Safe Connect Mclaughlin, Kevin (mclaugkl) (Mar 25)
- <Possible follow-ups>
- Re: Impulse Safe Connect Michael Sana (Mar 25)
- Re: Impulse Safe Connect John (Mar 25)
- Re: Impulse Safe Connect David Lundy (Mar 25)
- Re: Impulse Safe Connect Peter Charbonneau (Mar 26)
- PCI compliance Lee Weers (Mar 26)
- <Possible follow-ups>
- Re: PCI compliance Ken Connelly (Mar 26)
- Re: PCI compliance Hatala, Jeffrey (Mar 26)
- Re: PCI compliance Sarah Stevens (Mar 26)
- Multi User Computing jason rinne (Mar 26)
- <Possible follow-ups>
- Re: Multi User Computing Jeff Howlett (Mar 27)
- Re: Multi User Computing Jeff Howlett (Mar 27)
- Re: Multi User Computing Ozzie Paez (Mar 27)
- PCI Compliance vendors WAS: RE: PCI compliance HALL, NATHANIEL D. (Mar 26)
- <Possible follow-ups>
- Re: PCI Compliance vendors WAS: RE: PCI compliance curtw () siu edu (Mar 26)
- Re: PCI Compliance vendors WAS: RE: PCI compliance HALL, NATHANIEL D. (Mar 26)
- Deep Freeze & Boot Times Daniel Bennett (Mar 27)
- <Possible follow-ups>
- Re: Deep Freeze & Boot Times Brewer, Alex D (Mar 27)
- Re: Deep Freeze & Boot Times Daniel Bennett (Mar 27)
- Re: Deep Freeze & Boot Times Brewer, Alex D (Mar 27)
- Re: Deep Freeze & Boot Times Tupker, Mike (Mar 27)
- Re: Deep Freeze & Boot Times Bombard, Charles L (Mar 27)
- Re: Deep Freeze & Boot Times Mark Monroe (Mar 27)
- Re: Deep Freeze & Boot Times Halliday,Paul (Mar 27)
- Re: Deep Freeze & Boot Times McKay, Steven R (Mar 27)
- Re: Deep Freeze & Boot Times Ozzie Paez (Mar 27)
- Local Administrators Daniel Bennett (Mar 27)
- <Possible follow-ups>
- Re: Local Administrators Tupker, Mike (Mar 27)
- Re: Local Administrators Brian K. Doré (Mar 27)
- Re: Local Administrators Torres, Juan (Mar 27)
- Re: Local Administrators Daniel Bennett (Mar 27)
- Re: Local Administrators Sabo, Eric (Mar 27)
- Re: Local Administrators Dave Hull (Mar 29)
- E-mail from ARIN ref. Legacy Registration Services Clyde Hoadley (Mar 27)
- <Possible follow-ups>
- Re: E-mail from ARIN ref. Legacy Registration Services David Lundy (Mar 27)
- Re: E-mail from ARIN ref. Legacy Registration Services Teresa Beamer (Mar 27)
- Re: E-mail from ARIN ref. Legacy Registration Services Michael Sinatra (Mar 27)
- Re: E-mail from ARIN ref. Legacy Registration Services John (Mar 27)
- Re: E-mail from ARIN ref. Legacy Registration Services David Gillett (Mar 27)
- Re: E-mail from ARIN ref. Legacy Registration Services Brent Sweeny (Mar 27)
- Re: E-mail from ARIN ref. Legacy Registration Services George Russ (Mar 28)
- Re: E-mail from ARIN ref. Legacy Registration Services David Lundy (Mar 28)
- Physhing email using phone number Di Fabio, Andrea (Mar 28)
- <Possible follow-ups>
- Re: Physhing email using phone number Daniel Bennett (Mar 28)
- Re: Physhing email using phone number Joel Rosenblatt (Mar 28)
- Re: Physhing email using phone number Daniel Bennett (Mar 28)
- Re: Physhing email using phone number Di Fabio, Andrea (Mar 28)
- Re: Physhing email using phone number Jenkins, Matthew (Mar 28)
- Re: Physhing email using phone number Mike Porter (Mar 28)
- Re: Physhing email using phone number Daniel Bennett (Mar 28)
- Re: Physhing email using phone number Jenkins, Matthew (Mar 28)
- Security Related Questions Sabo, Eric (Mar 30)
- <Possible follow-ups>
- Re: Security Related Questions Ken Connelly (Mar 30)
- Re: Security Related Questions Daniel Bennett (Mar 31)
- Re: Security Related Questions Valdis Kletnieks (Mar 31)
- FERPA Notice of Proposed Rulemaking Addresses Changes in IT Rodney Petersen (Mar 31)
- <Possible follow-ups>
- Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Kevin Shalla (Mar 31)
- Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Basgen, Brian (Mar 31)
- Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Gary Dobbins (Mar 31)
- Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Kevin Shalla (Mar 31)
- Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Basgen, Brian (Mar 31)
- Wireless Security & Gaming Systems Jenkins, Matthew (Mar 31)
- <Possible follow-ups>
- Re: Wireless Security & Gaming Systems Cal Frye (Mar 31)
- Re: Wireless Security & Gaming Systems Tim Cantin (Mar 31)
- Re: Wireless Security & Gaming Systems Cal Frye (Mar 31)
- [no subject] Stephen J Smoogen (Mar 31)
- Re: FERPA Notice [other IT potential changes] Basgen, Brian (Mar 31)
- [no subject] Stephen J Smoogen (Mar 31)