Educause Security Discussion: by author

596 messages starting Mar 21 08 and ending Mar 10 08
Date index | Thread index | Author index


Aaron Cayard-Roberts

Windows server host based firewalls? Aaron Cayard-Roberts (Mar 21)

Adam Dodge

Educational Security Incidents Year in Review - 2007 is now available Adam Dodge (Feb 11)
Re: Educational Security Incidents Year in Review - 2007 is now available Adam Dodge (Feb 11)
Re: Educational Security Incidents Year in Review - 2007 is now available Adam Dodge (Feb 11)

Adam Schumacher

Re: Managing passwords. Storing passwords. Adam Schumacher (Mar 05)

Adam Stone

Job Opportunity: Head of Cyber Security, Berkeley Lab Adam Stone (Jan 23)

Alex

Re: Experiences with Web application vulnerability assessment (1) software (2) companies Alex (Feb 27)
Re: Alex (Feb 27)
Re: classifying P2P traffic Alex (Jan 29)
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Alex (Feb 28)
Re: classifying P2P traffic Alex (Jan 29)

Allison Dolan

Re: Faculty and Staff IT Security Awareness Allison Dolan (Mar 04)
Re: Identify Finder Allison Dolan (Feb 28)
Re: FERPA question Allison Dolan (Feb 29)

Andrea Beesing

Re: Authentication of remote users Andrea Beesing (Jan 03)

Avdagic, Indir

Re: Cisco VPN concentrator Replacement Recommendation Needed Avdagic, Indir (Mar 24)
Re: Firewall recommendations Avdagic, Indir (Mar 18)

Barbara Torney

Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Barbara Torney (Jan 14)
Re: classifying P2P traffic - what about legit uses? Barbara Torney (Jan 29)
Re: classifying P2P traffic - what about legit uses? Barbara Torney (Jan 29)

Basgen, Brian

Re: 3rd party want to authenticate our users Basgen, Brian (Mar 07)
Re: Data Classification: Legal criteria Basgen, Brian (Mar 18)
Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Basgen, Brian (Mar 31)
Re: Interesting spear phising attempt against IT Basgen, Brian (Feb 08)
Re: FERPA Notice [other IT potential changes] Basgen, Brian (Mar 31)
Interesting spear phising attempt against IT Basgen, Brian (Feb 05)
Re: Microsoft IIS security update ms08-006 looks critical to me Basgen, Brian (Feb 14)
Re: Value and use of penetration testing and vulnerability assessment in .edu Basgen, Brian (Jan 18)
Data Classification: Legal criteria Basgen, Brian (Mar 18)
Re: Microsoft IIS security update ms08-006 looks critical to me Basgen, Brian (Feb 14)
Re: Data Classification: Legal criteria Basgen, Brian (Mar 18)
Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Basgen, Brian (Mar 31)

Bean, Mike

Re: Firewall recommendations Bean, Mike (Feb 29)

Bill Badertscher

Re: Data Classification: Legal criteria Bill Badertscher (Mar 18)

Bill Brinkley

Re: Higher Ed Security Operation Centers - Looking for your experiences Bill Brinkley (Feb 01)
Re: consequences for student hacking Bill Brinkley (Feb 20)
Re: Question about malware research Bill Brinkley (Jan 10)

Bob Bayn

Re: Phishing attempt Bob Bayn (Feb 08)
Re: What companies do a good security audit/review Bob Bayn (Mar 14)
Re: InfoSec Alert from University of Cincinnati Bob Bayn (Jan 28)
flurry of IM worms Bob Bayn (Jan 29)
Re: Authentication of remote users Bob Bayn (Jan 03)

Bob Doyle

Re: Experiences with Web application vulnerability assessment (1) software (2) companies Bob Doyle (Feb 29)

Bob Henry

consequences for student hacking Bob Henry (Feb 19)

Bob Mahoney

Re: consequences for student hacking Bob Mahoney (Feb 19)

Bombard, Charles L

Re: Deep Freeze & Boot Times Bombard, Charles L (Mar 27)
Managing passwords. Storing passwords. Bombard, Charles L (Mar 04)
Re: Managing passwords. Storing passwords. Bombard, Charles L (Mar 04)

Brad Judy

Re: Security experiences with SharePoint Brad Judy (Jan 24)
Re: Locating Personally Identifiable Information Brad Judy (Feb 12)
Re: Identify Finder Brad Judy (Feb 27)
Re: Security Guides, Standards, Benchmarks? Brad Judy (Jan 30)
Re: Data Classification: Legal criteria Brad Judy (Mar 18)
Re: WPAD DNS floods Brad Judy (Jan 16)
Re: security for Windows logoff scripts writing to log files Brad Judy (Jan 17)
Re: Identify Finder Brad Judy (Feb 28)
Re: WPAD DNS floods Brad Judy (Jan 16)
Re: Securing / erasing hard drives in copiers? Brad Judy (Feb 11)
Re: Group encryption solutions Brad Judy (Mar 14)
Re: WPAD DNS floods Brad Judy (Jan 16)

Bradley, Stephen W. Mr.

Re: New e-mail attack using valid webmail accounts Bradley, Stephen W. Mr. (Mar 06)

Brawner, David

Re: Firewall recommendations Brawner, David (Feb 29)

Brent Sweeny

Re: E-mail from ARIN ref. Legacy Registration Services Brent Sweeny (Mar 27)

Brewer, Alex D

Re: Deep Freeze & Boot Times Brewer, Alex D (Mar 27)
[no subject] Brewer, Alex D (Feb 21)
Re: Deep Freeze & Boot Times Brewer, Alex D (Mar 27)

Brian Allen

Re: Interesting spear phising attempt against IT Brian Allen (Feb 06)

Brian Epstein

Re: Was, RE: Firewall recommendations Brian Epstein (Mar 03)

Brian Friday

Re: New e-mail attack using valid webmail accounts Brian Friday (Mar 14)

Brian K. Doré

Re: Local Administrators Brian K. Doré (Mar 27)

Bristol, Gary L.

Re: Releasing details Bristol, Gary L. (Jan 22)

Brock, Anthony - NET

Re: Cisco VPN concentrator Replacement Recommendation Needed Brock, Anthony - NET (Mar 24)

Bruggeman, John

Securing / erasing hard drives in copiers? Bruggeman, John (Feb 11)
Re: New e-mail attack using valid webmail accounts Bruggeman, John (Mar 07)

Bruhn, Mark Steven

Re: What companies do a good security audit/review Bruhn, Mark Steven (Mar 14)
Re: What companies do a good security audit/review Bruhn, Mark Steven (Mar 14)

Buz Dale

Re: State of Georgia Board of Regents Buz Dale (Jan 22)

Cal Frye

Re: Authentication of remote users Cal Frye (Jan 03)
Re: Authentication of remote users Cal Frye (Jan 03)
Re: Windows server host based firewalls? Cal Frye (Mar 21)
Re: classifying P2P traffic Cal Frye (Jan 29)
Re: classifying P2P traffic - what about legit uses? Cal Frye (Jan 29)
Re: classifying P2P traffic - what about legit uses? Cal Frye (Jan 29)
Re: Fraudulent Facebook Profile Cal Frye (Jan 14)
Re: Wireless Security & Gaming Systems Cal Frye (Mar 31)
Re: classifying P2P traffic Cal Frye (Jan 29)
Re: Wireless Security & Gaming Systems Cal Frye (Mar 31)
Outsourced e-mail troubleshooting Cal Frye (Mar 18)

Ced Bennett

Updated Risk Assessment resources available Ced Bennett (Mar 03)
Re: What companies do a good security audit/review Ced Bennett (Mar 14)
Re: FERPA question Ced Bennett (Mar 11)
Re: Data Classification: Legal criteria Ced Bennett (Mar 19)

Chad McDonald

Re: Releasing details Chad McDonald (Jan 23)

Charles Young

Re: Locating Personally Identifiable Information Charles Young (Feb 12)

charlie derr

Re: Authentication of remote users charlie derr (Jan 03)

Charlie Prothero

Re: Firewall recommendations Charlie Prothero (Mar 03)

Cheek, Leigh

Sharepoint servers and Exchange servers Cheek, Leigh (Feb 06)
Re: Sharepoint servers and Exchange servers Cheek, Leigh (Feb 07)

Chet Langin

Ph.D. Committee Member Sought Chet Langin (Feb 27)
Re: Network Equipment Sign Wording Chet Langin (Jan 31)

Chris Gauthier

Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Chris Gauthier (Jan 14)
Re: Data Classification: Legal criteria Chris Gauthier (Mar 18)

Chris Golden

Firewall - Outbound Ports Chris Golden (Jan 29)

Chris Green

Managing Client Side Applications and Vendor "compatibility" Chris Green (Feb 07)

Christopher Webber

Re: Authentication of remote users Christopher Webber (Jan 03)

Chris Vakhordjian

Re: Authentication of remote users Chris Vakhordjian (Jan 03)

Clyde Hoadley

E-mail from ARIN ref. Legacy Registration Services Clyde Hoadley (Mar 27)
Do you send out Bounce Notifications? Clyde Hoadley (Mar 13)
Is anyone using a "Tape Buy back" for their tapes? Clyde Hoadley (Feb 20)

Colleen Keller

Re: Data Retention Policies Colleen Keller (Feb 08)

Consolvo, Corbett D

Re: Cisco VPN concentrator Replacement Recommendation Needed Consolvo, Corbett D (Mar 24)
Re: Firewall recommendations Consolvo, Corbett D (Feb 29)
Re: Blackhole DNS. Consolvo, Corbett D (Feb 05)
Re: classifying P2P traffic Consolvo, Corbett D (Jan 29)
Re: Firewall - Outbound Ports Consolvo, Corbett D (Jan 29)
Layer 2 infrastructure security Consolvo, Corbett D (Feb 05)

Constantakos, William

Re: Firewall recommendations Constantakos, William (Mar 01)

Curt Wilson

Re: Group encryption solutions Curt Wilson (Mar 14)
Re: Windows local admin in a .edu environment Curt Wilson (Jan 31)
Value and use of penetration testing and vulnerability assessment in .edu Curt Wilson (Jan 17)
Re: classifying P2P traffic - what about legit uses? Curt Wilson (Jan 29)
Re: Was, RE: Firewall recommendations Curt Wilson (Mar 03)
Re: E-Signatures Curt Wilson (Jan 10)
Group encryption solutions Curt Wilson (Mar 14)
Re: New e-mail attack using valid webmail accounts Curt Wilson (Mar 14)
Re: Microsoft IIS security update ms08-006 looks critical to me Curt Wilson (Feb 14)

curtw () siu edu

Re: Experiences with Web application vulnerability assessment (1) software (2) companies curtw () siu edu (Feb 27)
Re: PCI Compliance vendors WAS: RE: PCI compliance curtw () siu edu (Mar 26)

Custer, William L. Mr.

Re: Credit Reporting Companies Custer, William L. Mr. (Jan 14)
Re: Credit Reporting Companies Custer, William L. Mr. (Jan 14)
PCI quarterly network scan cost? Custer, William L. Mr. (Jan 23)
PKI Certificate Practice Statement Custer, William L. Mr. (Mar 04)

Dale Fay

Re: Do you send out Bounce Notifications? Dale Fay (Mar 13)

Daniel Adinolfi

E-Signatures Daniel Adinolfi (Jan 10)

Daniel Bennett

Local Administrators Daniel Bennett (Mar 27)
Re: Security Related Questions Daniel Bennett (Mar 31)
Re: Deep Freeze & Boot Times Daniel Bennett (Mar 27)
Re: Physhing email using phone number Daniel Bennett (Mar 28)
Re: Local Administrators Daniel Bennett (Mar 27)
Deep Freeze & Boot Times Daniel Bennett (Mar 27)
Re: Physhing email using phone number Daniel Bennett (Mar 28)
Re: Physhing email using phone number Daniel Bennett (Mar 28)

Dan Johnson

Re: Credit Reporting Companies Dan Johnson (Jan 14)

Dan Oachs

Re: Was, RE: Firewall recommendations Dan Oachs (Mar 03)
Re: InfoSec Alert from University of Cincinnati Dan Oachs (Jan 28)
Re: classifying P2P traffic Dan Oachs (Jan 29)

Dan Peterson

Re: WPAD DNS floods Dan Peterson (Jan 16)

Darwin Macatiag

Re: What companies do a good security audit/review Darwin Macatiag (Mar 14)
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Darwin Macatiag (Feb 29)
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Darwin Macatiag (Feb 28)

Dave Hull

Re: Local Administrators Dave Hull (Mar 29)

Dave Mueller

Re: Authentication of remote users Dave Mueller (Jan 03)

David A. Batastini

Re: InfoSec Alert from University of Cincinnati David A. Batastini (Jan 28)

David Boyer

Re: classifying P2P traffic David Boyer (Jan 29)

David, Elaine

Locating Personally Identifiable Information David, Elaine (Feb 12)
Cell phone stipends and impact on securing confidential data David, Elaine (Feb 14)
Re: Releasing details David, Elaine (Jan 23)

David Gillett

Re: E-mail from ARIN ref. Legacy Registration Services David Gillett (Mar 27)
Re: classifying P2P traffic - what about legit uses? David Gillett (Jan 29)
Re: Network Equipment Sign Wording David Gillett (Jan 31)

David Grisham

Re: E-Signatures David Grisham (Jan 30)

David Harley

Anti-Malware Testing Standards Organization David Harley (Feb 11)

David Kovarik

Re: Data Classification: Legal criteria David Kovarik (Mar 18)
Re: Data Classification: Legal criteria David Kovarik (Mar 18)
Re: Windows local admin in a .edu environment David Kovarik (Jan 30)

David Lundy

Re: Impulse Safe Connect David Lundy (Mar 25)
Re: E-mail from ARIN ref. Legacy Registration Services David Lundy (Mar 28)
Re: E-mail from ARIN ref. Legacy Registration Services David Lundy (Mar 27)

David Seidl

Higher Ed Security Operation Centers - Looking for your experiences David Seidl (Feb 01)
Re: SOC David Seidl (Mar 13)

David Shettler

Re: Microsoft IIS security update ms08-006 looks critical to me David Shettler (Feb 12)
Re: -- Vulnerability Disclosure David Shettler (Feb 27)
[no subject] David Shettler (Feb 27)

Deepak J. Mathew

Re: Security Auditing Tool Deepak J. Mathew (Jan 15)

Di Fabio, Andrea

Physhing email using phone number Di Fabio, Andrea (Mar 28)
Re: Physhing email using phone number Di Fabio, Andrea (Mar 28)

DiGrazia, Mick A

Web Application Security Assessment DiGrazia, Mick A (Mar 19)

Doug Markiewicz

Information Security Governance Framework Doug Markiewicz (Jan 09)
Re: Locating Personally Identifiable Information Doug Markiewicz (Feb 12)
Re: consequences for student hacking Doug Markiewicz (Feb 20)
Re: External Consultants Doug Markiewicz (Jan 31)
Re: Authentication of remote users Doug Markiewicz (Jan 04)
Re: Data Classification: Legal criteria Doug Markiewicz (Mar 18)
Re: Authentication of remote users Doug Markiewicz (Jan 04)

Doug Pearson

Re: WPAD DNS floods Doug Pearson (Jan 16)

Drake, Craig

Security Guides, Standards, Benchmarks? Drake, Craig (Jan 30)

Drews, Jane E

Security Analyst Position - Univ of Iowa Drews, Jane E (Feb 19)

Ellen Smout

PCI Compliance, RFP & Audits Ellen Smout (Mar 10)

Elliot Kendall

Information Security Architect - Brandeis University Elliot Kendall (Mar 20)

Eric Case

Re: Securing / erasing hard drives in copiers? Eric Case (Feb 11)
Re: Windows local admin in a .edu environment Eric Case (Jan 30)
Re: consequences for student hacking Eric Case (Feb 19)
Re: Educational Security Incidents Year in Review - 2007 is now available Eric Case (Feb 11)

Eric Jernigan

Re: Releasing details Eric Jernigan (Jan 23)

Ewing, Ashley

Re: State of Georgia Board of Regents Ewing, Ashley (Jan 22)

Faith Mcgrath

Re: E-Signatures Faith Mcgrath (Jan 10)

Felecia Vlahos

Re: Identify Finder Felecia Vlahos (Feb 28)

Frank T. Shylkofski

Re: Windows local admin in a .edu environment Frank T. Shylkofski (Jan 30)

Fugett, Julie C

Re: Credit Reporting Companies Fugett, Julie C (Jan 14)

Gary Dobbins

Re: Securing / erasing hard drives in copiers? Gary Dobbins (Feb 11)
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Gary Dobbins (Feb 27)
Re: Data Classification: Legal criteria Gary Dobbins (Mar 18)
Re: Releasing details Gary Dobbins (Jan 22)
Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Gary Dobbins (Mar 31)
Re: Identify Finder Gary Dobbins (Feb 27)

Gary Flynn

Re: Microsoft IIS security update ms08-006 looks critical to me Gary Flynn (Feb 15)
Re: Windows local admin in a .edu environment Gary Flynn (Jan 31)
Re: Authentication of remote users Gary Flynn (Jan 04)
Re: Locating Personally Identifiable Information Gary Flynn (Feb 12)
ActiveX killbit vs IE Add-on Disable as protection from defective controls Gary Flynn (Jan 08)
Re: Microsoft the source of all evil?? Simple question Gary Flynn (Feb 13)
Authentication of remote users Gary Flynn (Jan 03)
Re: Full Disk Encryption Summary Gary Flynn (Jan 14)
Re: WPAD DNS floods Gary Flynn (Jan 16)
Microsoft IIS security update ms08-006 looks critical to me Gary Flynn (Feb 12)
sudowin Gary Flynn (Feb 15)
Re: WPAD DNS floods Gary Flynn (Jan 16)
Re: Authentication of remote users Gary Flynn (Jan 04)
Re: WPAD DNS floods Gary Flynn (Jan 16)
WPAD DNS floods Gary Flynn (Jan 16)

Gene Spafford

Re: InfoSec Alert from University of Cincinnati Gene Spafford (Jan 28)

George Russ

Re: E-mail from ARIN ref. Legacy Registration Services George Russ (Mar 28)

Georgios Mousouros

Data recovery contract Georgios Mousouros (Feb 08)

Gianforte, Danna

Info Classification Policy implementation Gianforte, Danna (Jan 03)

Glenn Forbes Fleming Larratt

Re: Microsoft the source of all evil?? Simple question Glenn Forbes Fleming Larratt (Feb 13)

Gordon Wishon

Re: heads up: Paper Submission! scam Gordon Wishon (Mar 11)

Greene, Chip

Re: classifying P2P traffic Greene, Chip (Jan 29)

Gregg, Christopher S.

Initial Response to RIAA/MPAA Complaints Gregg, Christopher S. (Feb 07)

Greg Jackson

Re: Initial Response to RIAA/MPAA Complaints Greg Jackson (Feb 07)

Greg Vickers

Re: 3rd party want to authenticate our users Greg Vickers (Mar 04)
Re: InfoSec Alert from University of Cincinnati Greg Vickers (Jan 28)
USB device encryption inquiry Greg Vickers (Feb 04)

Halliday,Paul

Re: Deep Freeze & Boot Times Halliday,Paul (Mar 27)
Re: Identify Finder Halliday,Paul (Feb 27)
Antivirus for MAC. Halliday,Paul (Mar 06)
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Halliday,Paul (Feb 27)
Blackhole DNS. Halliday,Paul (Feb 05)
Re: Windows local admin in a .edu environment Halliday,Paul (Jan 31)
Re: consequences for student hacking Halliday,Paul (Feb 19)
Re: Educational Security Incidents Year in Review - 2007 is now available Halliday,Paul (Feb 11)
Was, RE: Firewall recommendations Halliday,Paul (Mar 01)
Re: consequences for student hacking Halliday,Paul (Feb 19)
Windows local admin in a .edu environment Halliday,Paul (Jan 30)

HALL, NATHANIEL D.

Re: PCI Compliance vendors WAS: RE: PCI compliance HALL, NATHANIEL D. (Mar 26)
PCI Compliance vendors WAS: RE: PCI compliance HALL, NATHANIEL D. (Mar 26)

Harris, Michael C.

Re: classifying P2P traffic Harris, Michael C. (Jan 29)
Re: classifying P2P traffic - what about legit uses? Harris, Michael C. (Jan 29)

Harrold Ahole

Re: Blacklisted by Hotmail Harrold Ahole (Feb 11)
Re: Blacklisted by Hotmail Harrold Ahole (Feb 11)
Re: E-Signatures Harrold Ahole (Jan 10)
Re: Blacklisted by Hotmail Harrold Ahole (Feb 12)
Re: E-Signatures Harrold Ahole (Jan 10)

Hatala, Jeffrey

Re: PCI compliance Hatala, Jeffrey (Mar 26)

Havens, Ben

Re: Security Guides, Standards, Benchmarks? Havens, Ben (Jan 30)

Heather Flanagan

Re: Value and use of penetration testing and vulnerability assessment in .edu Heather Flanagan (Jan 17)
Re: Encrypted email Heather Flanagan (Mar 19)
Encrypted email Heather Flanagan (Mar 18)

Holland, Richard H

Re: Reviewing Security Policy Holland, Richard H (Mar 06)

Howell, Paul

Re: Identify Finder Howell, Paul (Feb 28)
Re: Information Security Governance Framework Howell, Paul (Jan 09)

Hughes, Scott

Re: classifying P2P traffic Hughes, Scott (Jan 29)

Hull, Dave

Re: Experiences with Web application vulnerability assessment (1) software (2) companies Hull, Dave (Feb 27)
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Hull, Dave (Feb 27)
Re: Windows local admin in a .edu environment Hull, Dave (Jan 30)

Hunt,Keith A

Re: Authentication of remote users Hunt,Keith A (Jan 04)
Re: Interesting spear phising attempt against IT Hunt,Keith A (Feb 06)
Re: Authentication of remote users Hunt,Keith A (Jan 04)
Re: Authentication of remote users Hunt,Keith A (Jan 03)
Re: Initial Response to RIAA/MPAA Complaints Hunt,Keith A (Feb 07)

Isac Balder

Re: Identify Finder Isac Balder (Feb 27)
Re: Managing passwords. Storing passwords. Isac Balder (Mar 04)

I. W. Woodle

McAfee EPO I. W. Woodle (Feb 29)

James Moore

Quick Survey - How much of Faculty/Staff directory information is made public? And How? James Moore (Jan 14)
Microsoft the source of all evil?? Simple question James Moore (Feb 13)

Jarrod Millman

Re: Firewall recommendations Jarrod Millman (Feb 29)

jason rinne

Multi User Computing jason rinne (Mar 26)

Jeff Giacobbe

Re: Phishing attempt Jeff Giacobbe (Feb 08)
Abuse of web proxy access to library databases Jeff Giacobbe (Feb 22)
Re: Antivirus for MAC. Jeff Giacobbe (Mar 06)

Jeff Holden

Firewall recommendations Jeff Holden (Feb 29)

Jeff Howlett

Re: Multi User Computing Jeff Howlett (Mar 27)
Re: Multi User Computing Jeff Howlett (Mar 27)

Jeff Kell

Re: WPAD DNS floods Jeff Kell (Jan 16)

Jeffrey Ramsay

Re: Blacklisted by Hotmail Jeffrey Ramsay (Feb 11)

Jenkins, Matthew

Re: Reviewing Security Policy Jenkins, Matthew (Mar 06)
Re: New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 10)
Re: Antivirus for MAC. Jenkins, Matthew (Mar 06)
Re: Physhing email using phone number Jenkins, Matthew (Mar 28)
Re: New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 06)
Re: Cisco VPN concentrator Replacement Recommendation Needed Jenkins, Matthew (Mar 24)
Re: New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 06)
New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 05)
Re: New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 14)
Re: New e-mail attack using valid webmail accounts Jenkins, Matthew (Mar 10)
Re: Reviewing Security Policy Jenkins, Matthew (Mar 06)
Re: Physhing email using phone number Jenkins, Matthew (Mar 28)
Wireless Security & Gaming Systems Jenkins, Matthew (Mar 31)

Jeremy Mooney

Re: Abuse of web proxy access to library databases Jeremy Mooney (Feb 22)

Jesse Thompson

Re: New e-mail attack using valid webmail accounts Jesse Thompson (Mar 07)
Re: Encrypted email Jesse Thompson (Mar 19)
Re: New e-mail attack using valid webmail accounts Jesse Thompson (Mar 07)
Re: Encrypted email Jesse Thompson (Mar 19)
Re: Encrypted email Jesse Thompson (Mar 21)
Re: Encrypted email Jesse Thompson (Mar 21)

Jim Dillon

Re: Authentication of remote users Jim Dillon (Jan 04)
Re: What companies do a good security audit/review Jim Dillon (Mar 14)
Re: Windows local admin in a .edu environment Jim Dillon (Jan 31)

jkaftan

Re: classifying P2P traffic jkaftan (Jan 29)

Joe Bazeley

Job posting: Enterprise ERP Security Administrator Joe Bazeley (Mar 20)

Joel Rosenblatt

Re: Authentication of remote users Joel Rosenblatt (Jan 03)
Re: Authentication of remote users Joel Rosenblatt (Jan 04)
Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt (Jan 29)
Re: Physhing email using phone number Joel Rosenblatt (Mar 28)
Re: Authentication of remote users Joel Rosenblatt (Jan 04)
Re: 3rd party want to authenticate our users Joel Rosenblatt (Mar 03)
Re: Authentication of remote users Joel Rosenblatt (Jan 04)
Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt (Jan 29)
Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt (Jan 29)
Re: Interesting spear phising attempt against IT Joel Rosenblatt (Feb 06)
Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt (Jan 29)
Re: Releasing details Joel Rosenblatt (Jan 22)
Re: Data recovery contract Joel Rosenblatt (Feb 08)
Re: Securing / erasing hard drives in copiers? Joel Rosenblatt (Feb 11)
Re: Do you send out Bounce Notifications? Joel Rosenblatt (Mar 13)
Re: Initial Response to RIAA/MPAA Complaints Joel Rosenblatt (Feb 07)
Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Joel Rosenblatt (Jan 15)

Joe St Sauver

Re: Question about malware research Joe St Sauver (Jan 10)
ICANN SSAC Releases a Report on Fast Flux Joe St Sauver (Jan 30)
Re: Phishing attempt Joe St Sauver (Feb 08)

Joey Rego

Re: Firewall recommendations Joey Rego (Mar 03)

John

Re: E-mail from ARIN ref. Legacy Registration Services John (Mar 27)
Re: Impulse Safe Connect John (Mar 25)

John H. Sawyer

Re: Managing passwords. Storing passwords. John H. Sawyer (Mar 05)

John Kemp

Re: PKI Certificate Practice Statement John Kemp (Mar 04)

John Kim

Re: Microsoft the source of all evil?? Simple question John Kim (Feb 13)

John Kristoff

Re: classifying P2P traffic John Kristoff (Jan 29)
Re: Educational Security Incidents Year in Review - 2007 is now available John Kristoff (Feb 11)
Re: Faculty and Staff IT Security Awareness John Kristoff (Mar 03)
Re: classifying P2P traffic John Kristoff (Jan 30)

John Ladwig

Re: New e-mail attack using valid webmail accounts John Ladwig (Mar 06)
Re: What companies do a good security audit/review John Ladwig (Mar 14)

John Quigley

strange campus "surveys" John Quigley (Feb 08)

Johnson, Kevin

Re: Experiences with Web application vulnerability assessment (1) software (2) companies Johnson, Kevin (Feb 27)

Jon Hanny

Re: Experiences with Web application vulnerability assessment (1) software (2) companies Jon Hanny (Mar 03)
Re: Managing passwords. Storing passwords. Jon Hanny (Mar 04)
Re: Firewall recommendations Jon Hanny (Mar 18)
Re: Was, RE: Firewall recommendations Jon Hanny (Mar 03)

Jon Mitchiner

Re: Outsourced e-mail archiving Jon Mitchiner (Mar 18)

Joseph Corey

Re: Managing passwords. Storing passwords. Joseph Corey (Mar 04)

Joseph Karam

Re: Firewall - Outbound Ports Joseph Karam (Jan 30)
Job Opening at Hamilton College Joseph Karam (Feb 05)

Josh Drummond

Re: Managing passwords. Storing passwords. Josh Drummond (Mar 04)

Julian J Thompson (jthmpsn2)

Re: strange campus "surveys" Julian J Thompson (jthmpsn2) (Feb 08)
Re: [SPAM:#### 88%] Re: strange campus "surveys" Julian J Thompson (jthmpsn2) (Feb 08)

Julian Y. Koh

Re: classifying P2P traffic Julian Y. Koh (Jan 29)
Re: Cisco VPN concentrator Replacement Recommendation Needed Julian Y. Koh (Mar 24)

Juraj Ontkanin

AD Forest Survey Juraj Ontkanin (Mar 14)

Justin Dover

Re: classifying P2P traffic Justin Dover (Jan 29)

Justin Jurgensen Sherenco

Re: Higher Ed Security Operation Centers - Looking for your experiences Justin Jurgensen Sherenco (Feb 01)

Justin Klein Keane

Re: Question about malware research Justin Klein Keane (Jan 10)
Question about malware research Justin Klein Keane (Jan 10)

Kathy Bergsma

Re: FERPA question Kathy Bergsma (Mar 07)
Re: FERPA question Kathy Bergsma (Feb 25)
FERPA question Kathy Bergsma (Feb 25)

Kees Leune

Re: Ph.D. Committee Member Sought Kees Leune (Feb 28)
Re: Authentication of remote users Kees Leune (Jan 03)
Re: Fraudulent Facebook Profile Kees Leune (Jan 15)
Re: Network Equipment Sign Wording Kees Leune (Feb 01)
Fraudulent Facebook Profile Kees Leune (Jan 14)

Ken Connelly

Re: PCI compliance Ken Connelly (Mar 26)
Re: InfoSec Alert from University of Cincinnati Ken Connelly (Jan 28)
Re: Network Equipment Sign Wording Ken Connelly (Jan 31)
Re: Security Related Questions Ken Connelly (Mar 30)
Security Analyst - University of Northern Iowa Ken Connelly (Feb 27)
Re: Initial Response to RIAA/MPAA Complaints Ken Connelly (Feb 07)

Ken De Cruyenaere

heads up: Paper Submission! scam Ken De Cruyenaere (Mar 11)

Kenneth Arnold

New e-mail attack using valid webmail accounts Kenneth Arnold (Mar 14)

Kevin Halgren

Re: Microsoft the source of all evil?? Simple question Kevin Halgren (Feb 13)
Re: Layer 2 infrastructure security Kevin Halgren (Feb 05)

Kevin Shalla

security for Windows logoff scripts writing to log files Kevin Shalla (Jan 17)
Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Kevin Shalla (Mar 31)
Re: classifying P2P traffic - what about legit uses? Part Deux Kevin Shalla (Jan 31)
Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Kevin Shalla (Mar 31)

Kieper, David

Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Kieper, David (Jan 15)

Knowles, Richard N. CISSP PMP Mr.

Security experiences with SharePoint Knowles, Richard N. CISSP PMP Mr. (Jan 24)

Kutil, Charlie D.

Network Equipment Sign Wording Kutil, Charlie D. (Jan 31)

Lee Weers

Re: Reviewing Security Policy Lee Weers (Mar 06)
PCI compliance Lee Weers (Mar 26)

Leo Song

Re: Higher Ed Security Operation Centers - Looking for your experiences Leo Song (Feb 01)

Lewis, Kevin M (EXP)

Re: Phishing attempt Lewis, Kevin M (EXP) (Feb 08)
Re: Profile issue for Educase Lewis, Kevin M (EXP) (Feb 29)

Lunceford, Dan

Re: Managing passwords. Storing passwords. Lunceford, Dan (Mar 05)

Lutzen, Karl F.

Re: classifying P2P traffic - what about legit uses? Lutzen, Karl F. (Jan 29)
Re: classifying P2P traffic Lutzen, Karl F. (Jan 29)

Maloney, Michael

Re: Fraudulent Facebook Profile Maloney, Michael (Jan 14)

Mark Berman

What companies do a good security audit/review Mark Berman (Mar 14)

Mark Borrie

Re: Antivirus for MAC. Mark Borrie (Mar 06)

Mark Monroe

Re: Deep Freeze & Boot Times Mark Monroe (Mar 27)

Mark Wilson

Re: Abuse of web proxy access to library databases Mark Wilson (Feb 22)

Martin Manjak

Re: Faculty and Staff IT Security Awareness Martin Manjak (Mar 12)

Marty Manjak

Re: Faculty and Staff IT Security Awareness Marty Manjak (Mar 04)

Matthew Gracie

Re: Encrypted email Matthew Gracie (Mar 20)

McKay, Steven R

Re: Deep Freeze & Boot Times McKay, Steven R (Mar 27)

Mclaughlin, Kevin (mclaugkl)

Impulse Safe Connect Mclaughlin, Kevin (mclaugkl) (Mar 25)
Full Disk Encryption Summary Mclaughlin, Kevin (mclaugkl) (Jan 14)
State of Georgia Board of Regents Mclaughlin, Kevin (mclaugkl) (Jan 22)
Credit Reporting Companies Mclaughlin, Kevin (mclaugkl) (Jan 14)
Security Certification Program Mclaughlin, Kevin (mclaugkl) (Feb 25)
SOC Mclaughlin, Kevin (mclaugkl) (Mar 13)
InfoSec Alert from University of Cincinnati Mclaughlin, Kevin (mclaugkl) (Jan 28)
SOC Mclaughlin, Kevin (mclaugkl) (Mar 13)

McNeil, Sharon McLawhorn

Security Auditing Tool McNeil, Sharon McLawhorn (Jan 11)
Re: Security Auditing Tool McNeil, Sharon McLawhorn (Jan 15)
Identify Finder McNeil, Sharon McLawhorn (Feb 27)

Melissa

Enterprise Vault Melissa (Jan 08)
Re: Educational Security Incidents Year in Review - 2007 is now available Melissa (Feb 10)
Re: Educational Security Incidents Year in Review - 2007 is now available Melissa (Feb 10)

Michael H. Martel

Re: New e-mail attack using valid webmail accounts Michael H. Martel (Mar 06)

Michael Hornung

Re: classifying P2P traffic - what about legit uses? Michael Hornung (Jan 29)
Re: classifying P2P traffic Michael Hornung (Jan 29)
Re: Firewall - Outbound Ports Michael Hornung (Jan 29)
Re: classifying P2P traffic Michael Hornung (Jan 29)

Michael Sana

Re: Impulse Safe Connect Michael Sana (Mar 25)

Michael Sinatra

Re: E-mail from ARIN ref. Legacy Registration Services Michael Sinatra (Mar 27)

Mike Hanson

Data Retention Policies Mike Hanson (Feb 07)

Mike Iglesias

Re: Abuse of web proxy access to library databases Mike Iglesias (Feb 22)

Mike Lococo

Re: Identify Finder Mike Lococo (Feb 28)
Re: FERPA question Mike Lococo (Feb 25)

Mike Phillips

Re: security for Windows logoff scripts writing to log files Mike Phillips (Jan 18)

Mike Porter

Re: Physhing email using phone number Mike Porter (Mar 28)

Mike Wiseman

Re: Encrypted email Mike Wiseman (Mar 18)
Re: Encrypted email Mike Wiseman (Mar 19)

Morrow Long

Summary of responses to query regarding web vulnerable assessment scanners and consultants Morrow Long (Mar 05)
Re: heads up: Paper Submission! scam Morrow Long (Mar 11)
Re: 3rd party want to authenticate our users Morrow Long (Mar 07)
Experiences with Web application vulnerability assessment (1) software (2) companies Morrow Long (Feb 27)
Re: heads up: Paper Submission! scam Morrow Long (Mar 11)
Re: Microsoft the source of all evil?? Simple question Morrow Long (Feb 13)

Nick Lewis

Re: PKI Certificate Practice Statement Nick Lewis (Mar 04)

Nick Pistentis

Re: Microsoft the source of all evil?? Simple question Nick Pistentis (Feb 13)

Nick Silkey

Re: Identify Finder Nick Silkey (Feb 28)

Nicolas Pachis

Faculty and Staff IT Security Awareness Nicolas Pachis (Mar 03)

Oscar Knight

3rd party want to authenticate our users Oscar Knight (Mar 03)

Ozzie Paez

Re: What companies do a good security audit/review Ozzie Paez (Mar 14)
Re: classifying P2P traffic - what about legit uses? Part Deux Ozzie Paez (Jan 30)
Re: Deep Freeze & Boot Times Ozzie Paez (Mar 27)
Re: E-Signatures Ozzie Paez (Jan 11)
Interesting Survey Ozzie Paez (Jan 31)
Re: Data Classification: Legal criteria Ozzie Paez (Mar 18)
Re: E-Signatures Ozzie Paez (Jan 11)
Re: Windows local admin in a .edu environment Ozzie Paez (Jan 31)
Re: Interesting spear phising attempt against IT Ozzie Paez (Feb 06)
Re: Multi User Computing Ozzie Paez (Mar 27)

Pace, Guy

Re: [(ISC)2] Associate Program Pace, Guy (Jan 25)
Re: Credit Reporting Companies Pace, Guy (Jan 14)
Re: Credit Reporting Companies Pace, Guy (Jan 14)
Re: strange campus "surveys" Pace, Guy (Feb 08)

Paul Keser

Re: Managing Client Side Applications and Vendor "compatibility" Paul Keser (Feb 07)

Paul Russell

Re: Do you send out Bounce Notifications? Paul Russell (Mar 13)

Perry, Jeff

Re: Firewall recommendations Perry, Jeff (Mar 03)

Peter B. DeBlois

Listserv Change Peter B. DeBlois (Feb 16)

Peter Charbonneau

Re: Impulse Safe Connect Peter Charbonneau (Mar 26)

Peters, Kevin

Re: Full Disk Encryption Summary Peters, Kevin (Jan 14)

Petreski, Samuel

Re: Experiences with Web application vulnerability assessment (1) software (2) companies Petreski, Samuel (Feb 27)
Re: Identify Finder Petreski, Samuel (Feb 27)

Ramon Hermida

Re: Firewall recommendations Ramon Hermida (Mar 03)
Re: Firewall recommendations Ramon Hermida (Mar 03)

Randy Marchany

SANS Training at VA Tech, 3/3-8/2008, February Reminder (fwd) Randy Marchany (Feb 06)
Re: flurry of IM worms Randy Marchany (Jan 29)
Re: Faculty and Staff IT Security Awareness Randy Marchany (Mar 12)
SANS Training at VA Tech, 3/3-8/2008 Randy Marchany (Jan 15)
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Randy Marchany (Feb 27)
Re: Data Retention Policies Randy Marchany (Feb 11)
Re: E-Signatures Randy Marchany (Jan 10)
SANS Training at VA Tech, 3/3-8/2008, FINAL reminder (fwd) Randy Marchany (Feb 25)
Re: classifying P2P traffic - what about legit uses? Randy Marchany (Jan 29)
SANS Course Announcement for March 10-15 in Jacksonville, Florida! (fwd) Randy Marchany (Jan 23)
Re: classifying P2P traffic - what about legit uses? Part Deux Randy Marchany (Jan 29)

Raw, Randy

Call for Participation - Internet Safety Night - April 23, 2008 Raw, Randy (Feb 25)
Outsourced e-mail archiving Raw, Randy (Mar 18)

Ray Bruder

Re: Managing passwords. Storing passwords. Ray Bruder (Mar 05)

Renaud, Robert

Re: Fraudulent Facebook Profile Renaud, Robert (Jan 14)

Richard Kunert

Re: Firewall recommendations Richard Kunert (Mar 18)

Robert Paterson

Re: Authentication of remote users Robert Paterson (Jan 03)
Re: Authentication of remote users Robert Paterson (Jan 03)

Rob Tanner

Attacks against Linux/Apache servers as reported in NetworkWorld Rob Tanner (Jan 24)

Rodney Petersen

FERPA Notice of Proposed Rulemaking Addresses Changes in IT Rodney Petersen (Mar 31)
Soliciting Higher Education Input to the Commission on Cyber Security for the 44th Presidency Rodney Petersen (Mar 06)

Roger Safian

Re: Releasing details Roger Safian (Jan 22)
Re: classifying P2P traffic - what about legit uses? Part Deux Roger Safian (Jan 30)
Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Roger Safian (Jan 14)
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Roger Safian (Feb 27)
Re: Firewall - Outbound Ports Roger Safian (Jan 30)
Re: Identify Finder Roger Safian (Feb 28)
Re: Initial Response to RIAA/MPAA Complaints Roger Safian (Feb 07)
Re: Authentication of remote users Roger Safian (Jan 03)
Re: Firewall - Outbound Ports Roger Safian (Jan 29)
Re: Phishing attempt Roger Safian (Feb 08)
Re: Authentication of remote users Roger Safian (Jan 03)

Russ Leathe

Re: Cisco VPN concentrator Replacement Recommendation Needed Russ Leathe (Mar 24)

Sabo, Eric

Re: Reviewing Security Policy Sabo, Eric (Mar 06)
Re: Reviewing Security Policy Sabo, Eric (Mar 06)
Re: Local Administrators Sabo, Eric (Mar 27)
Reviewing Security Policy Sabo, Eric (Mar 06)
Security Related Questions Sabo, Eric (Mar 30)

Samuel Young

Re: classifying P2P traffic Samuel Young (Jan 29)

Sarah Stevens

Re: E-Signatures Sarah Stevens (Jan 11)
Re: Social Network Analysis Sarah Stevens (Jan 10)
Re: E-Signatures Sarah Stevens (Jan 10)
Re: PCI compliance Sarah Stevens (Mar 26)
Re: Social Network Analysis Sarah Stevens (Jan 10)
Re: Info Classification Policy implementation Sarah Stevens (Jan 18)

savanted1©

Social Network Analysis savanted1© (Jan 10)
Re: [(ISC)2] Associate Program savanted1© (Jan 25)
[(ISC)2] Associate Program savanted1© (Jan 25)
Social Network Analysis (SNA) savanted1© (Jan 15)

schilling

Re: Cisco VPN concentrator Replacement Recommendation Needed schilling (Mar 24)
Cisco VPN concentrator Replacement Recommendation Needed schilling (Mar 24)

Schley Andrew Kutz

Question about sudowin? Schley Andrew Kutz (Feb 15)
Re: consequences for student hacking Schley Andrew Kutz (Feb 20)

Scholz, Greg

Re: classifying P2P traffic - what about legit uses? Scholz, Greg (Jan 29)

Scott Fendley

Re: Authentication of remote users Scott Fendley (Jan 03)

Scott Koger

Re: Authentication of remote users Scott Koger (Jan 03)

Sealey, Adam L.

Re: What companies do a good security audit/review Sealey, Adam L. (Mar 14)
Re: 3rd party want to authenticate our users Sealey, Adam L. (Mar 03)

Shamblin, Quinn (shamblqn)

Re: Identify Finder Shamblin, Quinn (shamblqn) (Feb 28)
Re: consequences for student hacking - Legal implications Shamblin, Quinn (shamblqn) (Feb 20)

Shane Bishop

Re: Sharepoint servers and Exchange servers Shane Bishop (Feb 06)

Shawn Sines

Re: Managing Client Side Applications and Vendor "compatibility" Shawn Sines (Feb 07)
Re: Managing Client Side Applications and Vendor "compatibility" Shawn Sines (Feb 07)

Shelley Rust

Re: Initial Response to RIAA/MPAA Complaints Shelley Rust (Feb 07)

Sherry, Cathy

Re: External Consultants Sherry, Cathy (Jan 31)
Re: Releasing details Sherry, Cathy (Jan 23)
Web Application Vulnerability Assessment RFB Sherry, Cathy (Mar 11)
Re: Data Retention Policies Sherry, Cathy (Feb 07)
Experiences with Web application vulnerability scan service: WhiteHat Sherry, Cathy (Feb 27)
Re: Data Classification: Legal criteria Sherry, Cathy (Mar 18)

Shumon Huque

Re: classifying P2P traffic Shumon Huque (Feb 11)

Soliwoda, Andrzej

Re: Firewall recommendations Soliwoda, Andrzej (Mar 14)

St Clair, Jim

Re: What companies do a good security audit/review St Clair, Jim (Mar 14)

Stephen J Smoogen

[no subject] Stephen J Smoogen (Mar 31)
[no subject] Stephen J Smoogen (Mar 31)

Steven Alexander

Re: Windows local admin in a .edu environment Steven Alexander (Jan 31)

Taylor, James R

External Consultants Taylor, James R (Jan 31)

Teresa Beamer

Re: E-mail from ARIN ref. Legacy Registration Services Teresa Beamer (Mar 27)

Terry Gray

Re: Network Equipment Sign Wording Terry Gray (Jan 31)

Themba Flowers

Re: security for Windows logoff scripts writing to log files Themba Flowers (Jan 18)

Theodore Pham

Re: Identify Finder Theodore Pham (Feb 27)

Theresa Rowe

Re: Faculty and Staff IT Security Awareness Theresa Rowe (Mar 10)
Releasing details Theresa Rowe (Jan 22)
Re: Cell phone stipends and impact on securing confidential data Theresa Rowe (Feb 15)

Theresa Semmens

Phishing attempt Theresa Semmens (Feb 08)
Re: Locating Personally Identifiable Information Theresa Semmens (Feb 12)
Phishing attempt question - thank you Theresa Semmens (Feb 08)
Re: Phishing attempt Theresa Semmens (Feb 08)

Tim Cantin

Re: Wireless Security & Gaming Systems Tim Cantin (Mar 31)

Tim flynn

Security Analyst Position - Illinois State University Tim flynn (Feb 27)

Tim Lane

Blacklisted by Hotmail Tim Lane (Feb 11)

Tom Peterson

Re: Authentication of remote users Tom Peterson (Jan 03)

Tom Siu

consequences for student hacking Tom Siu (Feb 20)

Tonkin, Derek K.

Re: Group encryption solutions Tonkin, Derek K. (Mar 14)
Re: Group encryption solutions Tonkin, Derek K. (Mar 14)

Torres, Juan

Re: Local Administrators Torres, Juan (Mar 27)

Tracy Mitrano

Re: classifying P2P traffic - what about legit uses? Tracy Mitrano (Jan 29)
Re: Fraudulent Facebook Profile Tracy Mitrano (Jan 14)

Tupker, Mike

Re: Deep Freeze & Boot Times Tupker, Mike (Mar 27)
Re: Local Administrators Tupker, Mike (Mar 27)

Valdis Kletnieks

Re: Firewall - Outbound Ports Valdis Kletnieks (Jan 30)
Re: Security Related Questions Valdis Kletnieks (Mar 31)
Re: WPAD DNS floods Valdis Kletnieks (Jan 16)
Re: Question about malware research Valdis Kletnieks (Jan 10)
Re: WPAD DNS floods Valdis Kletnieks (Jan 16)
Re: E-Signatures Valdis Kletnieks (Jan 10)
Re: Data Classification: Legal criteria Valdis Kletnieks (Mar 18)
Re: consequences for student hacking Valdis Kletnieks (Feb 19)
Re: Authentication of remote users Valdis Kletnieks (Jan 04)
Re: consequences for student hacking Valdis Kletnieks (Feb 19)
Re: classifying P2P traffic Valdis Kletnieks (Jan 30)
Re: Sharepoint servers and Exchange servers Valdis Kletnieks (Feb 06)
Re: Authentication of remote users Valdis Kletnieks (Jan 04)
Miscues (was Re: Managing Client Side Applications and Vendor "compatibility" Valdis Kletnieks (Feb 07)

Vanderbilt, Teresa

Re: classifying P2P traffic - what about legit uses? Vanderbilt, Teresa (Jan 30)

Warner, David F

Re: Managing passwords. Storing passwords. Warner, David F (Mar 04)

Wayne Smith

Re: Social Network Analysis Wayne Smith (Jan 10)

Wes Hubert

Re: FERPA question Wes Hubert (Feb 29)

WILLIAM I ARNOLD

Power over Ethernet cameras and software WILLIAM I ARNOLD (Mar 05)

William Senter

Re: Blacklisted by Hotmail William Senter (Feb 12)
Re: Blacklisted by Hotmail William Senter (Feb 12)

Willis Marti

Re: Releasing details Willis Marti (Jan 23)
Re: Releasing details Willis Marti (Jan 22)
Re: External Consultants Willis Marti (Jan 31)

Wood, Anne M (wood)

Re: 3rd party want to authenticate our users Wood, Anne M (wood) (Mar 03)

Youngquist, Jason R.

classifying P2P traffic Youngquist, Jason R. (Jan 29)

Zach Jansen

Re: New e-mail attack using valid webmail accounts Zach Jansen (Mar 10)
Re: New e-mail attack using valid webmail accounts Zach Jansen (Mar 14)

Zwe Paing

Device/Endpoint Security Zwe Paing (Mar 10)