Educause Security Discussion: by date

759 messages starting Jan 02 09 and ending Mar 31 09
Date index | Thread index | Author index


Friday, 02 January

Re: student malware infection occurrences Valdis Kletnieks
Re: Windows GUI diff software with masking capability? Justin Azoff
Re: Windows GUI diff software with masking capability? Vuong Phung
Re: Windows GUI diff software with masking capability? Gary Dobbins
Blackboard cross-domain frameset loading Cheng, Wang

Sunday, 04 January

Re: Windows GUI diff software with masking capability? Paul Wescott

Monday, 05 January

Re: ISO 27002 Doug Markiewicz
Re: Windows GUI diff software with masking capability? Fletcher, Robert
Job Posting - The University of Kansas Perry, Jeff

Tuesday, 06 January

Re: Blackboard cross-domain frameset loading Mike Austin

Wednesday, 07 January

Obama picks RIAA's favorite lawyer for a top Justice post Kathy Bergsma
Google Analytics Theresa Semmens
Re: Google Analytics Miller, Don C.
Re: Google Analytics Carol Myers
RFP for security assessment WILLIAM I ARNOLD
Re: Google Analytics Stanclift, Michael
Re: Google Analytics Sweeny, Jonny
Re: RFP for security assessment jeff murphy

Friday, 09 January

Re: RFP for security assessment Ken Connelly
Pen Test vendors Anand S Malwade
Re: Pen Test vendors Schumacher, Adam J
Re: Pen Test vendors randy marchany
Re: Pen Test vendors Jeff Howlett
Re: Pen Test vendors Peterman, Martin (mdp4s)
Re: Pen Test vendors Jay Tumas BSEE, NSA IAM/IEM
Re: Pen Test vendors Mike Waller

Saturday, 10 January

Re: Pen Test vendors Dick Jacobson

Sunday, 11 January

Re: Pen Test vendors Brenda B Gombosky
APB for a Volunteer Grant Writer Melissa Guenther
Re: APB for a Volunteer Grant Writer Melissa Guenther

Monday, 12 January

DNS "A Name" Records for Third Party Providers Matthew Dalton
Re: DNS "A Name" Records for Third Party Providers Greg T. Grimes
Re: DNS "A Name" Records for Third Party Providers Pace, Guy
Re: DNS "A Name" Records for Third Party Providers Ian McDonald
Re: DNS "A Name" Records for Third Party Providers Willis Marti
Re: DNS "A Name" Records for Third Party Providers HALL, NATHANIEL D.
Global account name changes Sandford, Doug
Re: Pen Test vendors Curt Wilson
Re: Global account name changes HALL, NATHANIEL D.
Re: Global account name changes Ken Connelly
Re: Global account name changes Russell Fulton
Re: DNS "A Name" Records for Third Party Providers Barbara Torney
Re: DNS "A Name" Records for Third Party Providers Barbara Torney

Tuesday, 13 January

Streaming Video and Internet Capacity Wood, Anne (wood)
Re: Streaming Video and Internet Capacity Peter Charbonneau
Network Access Control Survey Timothy Payne
Re: Streaming Video and Internet Capacity Dan Oachs
IdM: Extent of access granted to Admitted students? Marty Manjak
Re: IdM: Extent of access granted to Admitted students? Barbara Deschapelles
Re: Pen Test vendors Bob Henry
Re: Pen Test vendors Zach Jansen
Re: Pen Test vendors Mark Houpt
Re: Streaming Video and Internet Capacity Scholz, Greg
Re: Streaming Video and Internet Capacity Scholz, Greg
Re: Pen Test vendors Mike Lococo
Re: Pen Test vendors Sarah Stevens
Re: Pen Test vendors Sarah Stevens
Re: Pen Test vendors Sarah Stevens
Re: Pen Test vendors Felecia Vlahos
Re: Pen Test vendors Zach Jansen
Re: Pen Test vendors Morrow Long
Re: Streaming Video and Internet Capacity Adam Forsyth
Re: Pen Test vendors Sarah Stevens

Wednesday, 14 January

Re: Pen Test vendors Peterman, Martin (mdp4s)
Re: Streaming Video and Internet Capacity Cal Frye

Thursday, 15 January

Re: Pen Test vendors Curt Wilson
Security Checklists or Scripts Brenda B Gombosky
Re: Security Checklists or Scripts Sarazen, Daniel
Re: Security Checklists or Scripts Holland II, Richard H
electronic signatures Youngquist, Jason R.
BlueCoat with McAfee or Kaspersky Malware Engines Mark Rogowski
Re: electronic signatures Harris, Michael C.
Re: BlueCoat with McAfee or Kaspersky Malware Engines Sabo, Eric

Friday, 16 January

Do you use Email encryption software? Fusco, David (FUSCO)
Re: Do you use Email encryption software? Valdis Kletnieks
Re: BlueCoat with McAfee or Kaspersky Malware Engines Mark Rogowski
Re: BlueCoat with McAfee or Kaspersky Malware Engines Stanclift, Michael
Re: BlueCoat with McAfee or Kaspersky Malware Engines Sabo, Eric
Re: BlueCoat with McAfee or Kaspersky Malware Engines Mark Rogowski
Re: Security Checklists or Scripts Anthony Maszeroski
Establishing Program Committee for Security 2010 Cathy Hubbs
Cisco 2008 Annual Security Report Alaa Al-Din Al-Radhi
Re: Do you use Email encryption software? Miller, Don C.
Re: BlueCoat with McAfee or Kaspersky Malware Engines Valdis Kletnieks
Fresh Air Roger Safian
Re: BlueCoat with McAfee or Kaspersky Malware Engines Russell Fulton

Saturday, 17 January

Re: BlueCoat with McAfee or Kaspersky Malware Engines David Harley
Re: BlueCoat with McAfee or Kaspersky Malware Engines Ken Connelly

Sunday, 18 January

IPv6 Latest Report 2009 Alaa Al-Din Al-Radhi

Monday, 19 January

Re: BlueCoat with McAfee or Kaspersky Malware Engines David Harley
transferring data to vendors/outsourced services Witmer, Robert
Re: transferring data to vendors/outsourced services St Clair, Jim
Re: transferring data to vendors/outsourced services Witmer, Robert
Re: transferring data to vendors/outsourced services St Clair, Jim
Re: transferring data to vendors/outsourced services Witmer, Robert
Re: transferring data to vendors/outsourced services Theresa Rowe

Tuesday, 20 January

Reverse DNS Daniel Bennett
Re: Reverse DNS Valdis Kletnieks
Re: transferring data to vendors/outsourced services Grama, Joanna Lyn
Re: malware strategy and products used Kellogg, Brian D.
Re: Reverse DNS David Gillett
Re: malware strategy and products used Dennis Meharchand
Exporting usernames from a PGP key server Sean Maher
Re: Exporting usernames from a PGP key server Nick Lewis
Re: Pen Test vendors Walter E. Petruska

Wednesday, 21 January

Re: Do you use Email encryption software? Jesse Thompson
Re: Reverse DNS Jesse Thompson
Emerging Threat compromised rules Peter Charbonneau
Compromise Email Accounts Richard Miller
Re: Compromise Email Accounts Mike Iglesias
Re: Reverse DNS Dexter Caldwell
Re: Compromise Email Accounts Jesse Thompson
Re: Compromise Email Accounts Jesse Thompson
Re: Compromise Email Accounts Zach Jansen
credit card hack, 175,000 cards Theresa Semmens
Re: credit card hack, 175,000 cards -> merchants Theodore Pham
Re: credit card hack, 175,000 cards -> merchants Michael Sinatra
Re: credit card hack, 175,000 cards Di Fabio, Andrea
Re: credit card hack, 175,000 cards Allison Dolan
Re: credit card hack, 175,000 cards Ardoth Hassler
Re: Compromise Email Accounts Roger Safian
Re: credit card hack, 175,000 cards -> merchants Theresa Semmens
Re: Compromise Email Accounts Mike Porter
Re: Compromise Email Accounts Schumacher, Adam J
Re: Compromise Email Accounts Jesse Thompson

Thursday, 22 January

Network Backup Service Cost/Revenue Models Chris Green
Pervasive Campus Wireless Jerry Sell
Re: Pervasive Campus Wireless Don C. Miller
Re: Pervasive Campus Wireless HALL, NATHANIEL D.
Re: Pervasive Campus Wireless Mark Rogowski
Re: Pervasive Campus Wireless Di Fabio, Andrea
Re: Pervasive Campus Wireless Basgen, Brian
Re: Pervasive Campus Wireless Timothy Payne
Re: Pervasive Campus Wireless Tupker, Mike
Re: Pervasive Campus Wireless Theresa Semmens
Re: Pervasive Campus Wireless Dergenski, Todd A.
Re: Pervasive Campus Wireless Alex
Re: Pervasive Campus Wireless Randy Marchany
stopping students sharing their login credentials Russell Fulton
Re: Pervasive Campus Wireless Hugh Burley
Re: stopping students sharing their login credentials Mike Waller
Re: stopping students sharing their login credentials Jeff Kell
Re: stopping students sharing their login credentials Barry Lynam
Re: stopping students sharing their login credentials Rizzo, Jim

Friday, 23 January

Re: stopping students sharing their login credentials Ray Strubinger
Re: stopping students sharing their login credentials Rappaport,Jason
Re: stopping students sharing their login credentials Mike Wiseman
Re: stopping students sharing their login credentials randy marchany
Re: stopping students sharing their login credentials James M. Dutcher - Assoc. VP IS/IT & CIO
Re: stopping students sharing their login credentials Christopher Jones
Re: stopping students sharing their login credentials randy marchany
Re: stopping students sharing their login credentials Mike Wiseman
Re: stopping students sharing their login credentials Charlie Reitsma
Re: stopping students sharing their login credentials Neil Sindicich
Re: stopping students sharing their login credentials Barros, Jacob
Re: stopping students sharing their login credentials Basgen, Brian
Re: stopping students sharing their login credentials Brad Judy
Re: Pervasive Campus Wireless Dick Jacobson
Re: stopping students sharing their login credentials Charlie Reitsma
Re: Pervasive Campus Wireless Barros, Jacob
Re: Pervasive Campus Wireless Basgen, Brian
Re: Pervasive Campus Wireless Kevin Lanning
Re: stopping students sharing their login credentials Gary Flynn
Re: Pervasive Campus Wireless Eme Ejike
Networked Printer Best Practice Logan, Kim (loganks)
Re: Networked Printer Best Practice Brad Judy
Re: Networked Printer Best Practice Gary Dobbins
Re: Pervasive Campus Wireless Avdagic, Indir
Re: Networked Printer Best Practice Eric Case
Re: stopping students sharing their login credentials Valdis Kletnieks

Sunday, 25 January

Re: stopping students sharing their login credentials Neil Sindicich
Re: stopping students sharing their login credentials James M. Dutcher - Assoc of IS/IT & CIO

Monday, 26 January

RIAA Notices Anand S Malwade
Re: RIAA Notices David Boyer
Re: RIAA Notices Tim Cantin
Re: RIAA Notices Timothy Payne
Re: RIAA Notices Doty, Timothy T.
Re: RIAA Notices James R. Pardonek
Re: RIAA Notices Stanclift, Michael
Re: RIAA Notices John Kaftan
Re: RIAA Notices Sweeny, Jonny
Re: RIAA Notices Bob Bayn
Re: Pervasive Campus Wireless Josh Richard
Re: RIAA Notices Anand S Malwade
Re: RIAA Notices Stanclift, Michael
Re: RIAA Notices John Lerchey
Re: RIAA Notices John Kaftan
Re: RIAA Notices Anthony Maszeroski
Re: RIAA Notices Michael Sana
Re: RIAA Notices Stanclift, Michael
Re: RIAA Notices Doty, Timothy T.

Tuesday, 27 January

Resilience Featuresof IPv6, DNSSEC and MPLS and Deployment Scenarios Alaa Al-Din Al-Radhi
Re: RIAA Notices Tim Cline
Re: RIAA Notices Brenda B Gombosky
Re: RIAA Notices Joel Rosenblatt
Re: RIAA Notices Scholz, Greg
Re: RIAA Notices Ken Connelly
Re: RIAA Notices Stanclift, Michael
Re: RIAA Notices Peter Charbonneau
Re: RIAA Notices Bob Bayn
Re: RIAA Notices Cal Frye
Educators see secure coding training challenges, improvements Gene Spafford
Re: RIAA Notices Valdis Kletnieks
Re: RIAA Notices Doty, Timothy T.
Email Attachment Blocking Steve Brukbacher
Re: Email Attachment Blocking Ken Connelly
Re: Email Attachment Blocking Sweeny, Jonny
Re: Email Attachment Blocking Adam Nave
Re: Email Attachment Blocking Kieper, David
Re: Email Attachment Blocking Bob Bayn
Re: Email Attachment Blocking Miller, Don C.
Re: Email Attachment Blocking Joel Rosenblatt

Wednesday, 28 January

compromised accounts Joe Vieira
Re: RIAA Notices Steve Worona
Position opening at Notre Dame Gary Dobbins
wiki best practices Barros, Jacob
Re: wiki best practices Justin Dover
Re: wiki best practices Adam Nave
Re: wiki best practices Patrick P Murphy
Re: Email Attachment Blocking Vuong Phung
Re: Email Attachment Blocking Jason C. Belford
Re: Email Attachment Blocking Jesse Thompson
Re: malware strategy and products used Mark Rogowski
Re: malware strategy and products used Dennis Meharchand
Re: Email Attachment Blocking Valdis Kletnieks
Re: Email Attachment Blocking Miller, Don C.

Thursday, 29 January

Re: Email Attachment Blocking Jesse Thompson
Faculty & Staff E-mail Forwarding to Outside Providers Stanclift, Michael
Re: Faculty & Staff E-mail Forwarding to Outside Providers Ken Connelly
Re: Faculty & Staff E-mail Forwarding to Outside Providers Stanclift, Michael
Re: Faculty & Staff E-mail Forwarding to Outside Providers Tupker, Mike
Re: Faculty & Staff E-mail Forwarding to Outside Providers Sabo, Eric
Re: RIAA Notices Manuel Amaral
Re: Faculty & Staff E-mail Forwarding to Outside Providers Ken Connelly
Re: Faculty & Staff E-mail Forwarding to Outside Providers Stanclift, Michael
Re: Faculty & Staff E-mail Forwarding to Outside Providers Miller, Don C.
Re: Faculty & Staff E-mail Forwarding to Outside Providers Moore, Frank
Re: Compromise Email Accounts Russell Fulton
Re: Compromise Email Accounts Sabo, Eric

Friday, 30 January

Re: Compromise Email Accounts Joe Vieira
Re: Faculty & Staff E-mail Forwarding to Outside Providers Bob Kalal

Monday, 02 February

references for use of DNS query logs and responses for network security Russell Fulton
Re: Compromise Email Accounts Russell Fulton

Tuesday, 03 February

Re: Compromise Email Accounts Daniel Bennett
Skype? Clark, Sean
Re: Skype? Basgen, Brian
Re: Skype? Tupker, Mike
Re: Skype? Mike Porter
Re: Skype? Basgen, Brian
Email Naming Conventions STEVE MAGRIBY
Re: Email Naming Conventions Bob Bayn
Re: Skype? Stanclift, Michael
Re: Skype? Mike Porter
Re: Compromise Email Accounts Steven Tardy
Re: Skype? Tupker, Mike
Re: Compromise Email Accounts Jeremy Mooney
Re: Compromise Email Accounts Steven Tardy

Wednesday, 04 February

Self Service Password Reset Di Fabio, Andrea
Re: Self Service Password Reset Cal Frye
Re: Self Service Password Reset Andrew Calcutt
Re: Compromise Email Accounts Jeremy Mooney
Re: Compromise Email Accounts Kellogg, Brian D.
Vulnerability Assessment Scanner qualysguard Anand S Malwade
Re: Vulnerability Assessment Scanner qualysguard Perry, Jeff
Re: Vulnerability Assessment Scanner qualysguard Hugh Burley
Re: Vulnerability Assessment Scanner qualysguard Beechey, Jim

Thursday, 05 February

Re: Vulnerability Assessment Scanner qualysguard Doug Markiewicz
Snort filters King, Ronald A.
Re: Self Service Password Reset Schumacher, Adam J
key topics to include in security awareness training materials Tim Cline
Re: key topics to include in security awareness training materials Roger Safian
Re: key topics to include in security awareness training materials Charles Seitz
Re: key topics to include in security awareness training materials Dave Kovarik
Re: key topics to include in security awareness training materials Dave Kovarik
Packet shaping / bandwidth enforcement Vincent Stoffer
Re: key topics to include in security awareness training materials David Seidl
Re: Packet shaping / bandwidth enforcement Leo Song
Re: key topics to include in security awareness training materials Brian Epstein
Re: Packet shaping / bandwidth enforcement Todd Bossaller
Re: Packet shaping / bandwidth enforcement Di Fabio, Andrea
Re: Packet shaping / bandwidth enforcement Michael Cole
Re: Packet shaping / bandwidth enforcement Brent Sweeny
Re: key topics to include in security awareness training materials King, Ronald A.
Re: key topics to include in security awareness training materials Donald, A. Wayne
Re: Packet shaping / bandwidth enforcement ken lindahl
Re: key topics to include in security awareness training materials Melissa Guenther
Re: Vulnerability Assessment Scanner qualysguard Beechey, Jim
Re: key topics to include in security awareness training materials Adam Stone
Re: key topics to include in security awareness training materials Gary Flynn
Re: key topics to include in security awareness training materials Karl Heins
Re: references for use of DNS query logs and responses for network security John Kristoff
Re: references for use of DNS query logs and responses for network security Valdis Kletnieks
Re: key topics to include in security awareness training materials jeff murphy

Friday, 06 February

Re: references for use of DNS query logs and responses for network security Cheek, Leigh
Re: key topics to include in security awareness training materials Matthew Gracie
Re: Packet shaping / bandwidth enforcement Cal Frye
Re: Packet shaping / bandwidth enforcement Michael J. Wheeler
Vendor contracts with security details. Follow up on vendor contracts network issues David Grisham
Re: Packet shaping / bandwidth enforcement Michael Cole
Re: Packet shaping / bandwidth enforcement Cal Frye

Monday, 09 February

Ruckus? Jason C. Belford
Re: Ruckus? Layne Wallace
Re: Ruckus? Morrow Long
Network Analyst Position - Buffalo State College Killian, Thomas
Re: Ruckus? Neil Sindicich
OSSIM? Holland II, Richard H
Re: Ruckus? Chris Green
Re: key topics to include in security awareness training materials Peterman, Martin (mdp4s)
Re: key topics to include in security awareness training materials Leon DuPree
Re: key topics to include in security awareness training materials Then, Keri
Re: key topics to include in security awareness training materials Peterman, Martin (mdp4s)

Tuesday, 10 February

Re: key topics to include in security awareness training materials mcoyle
Re: key topics to include in security awareness training materials Leon DuPree
[no subject] Greg Schaffer
P2P control solutions Greg Schaffer
Re: P2P control solutions Doug Markiewicz
Re: P2P control solutions Ray Strubinger
[no subject] Leon DuPree
Re: Ruckus? Nipper, Johnny R.
Password Self-Service software Greg Francis
Re: Password Self-Service software Christopher Jones
Re: Password Self-Service software Tupker, Mike
Re: Password Self-Service software Mark Houpt
Re: Password Self-Service software Adam Richard
Re: Password Self-Service software Dexter Caldwell
Re: Password Self-Service software Rob Whalen
ASP Session ID Reuse Neil Matatall
Re: ASP Session ID Reuse Brian Reilly
Re: ASP Session ID Reuse Ozzie Paez

Wednesday, 11 February

phishing irony Jesse Thompson
Re: phishing irony Dan Oachs
Re: phishing irony Jesse Thompson
Re: Virtualization and Security ? St Clair, Jim
Re: phishing irony Tupker, Mike
Re: phishing irony Pace, Guy
Re: phishing irony Mike Porter
Re: phishing irony Gary Flynn
Re: Password Self-Service software Rob Whalen
InfoSec Office Space Survey Mclaughlin, Kevin (mclaugkl)
Re: ASP Session ID Reuse Neil Matatall
Academic Computers Daniel Bennett
Re: ASP Session ID Reuse Brian Reilly
Re: ASP Session ID Reuse Ozzie Paez
Re: ASP Session ID Reuse Josh Drummond

Thursday, 12 February

Re: phishing irony Paul Crittenden
IDM Project - setup Ray Bruder
Re: phishing irony Ozzie Paez
Re: phishing irony HALL, NATHANIEL D.
Re: Academic Computers Strzelec, Wally
Re: Password Self-Service software Ness, Carl J
Re: phishing irony Pete Hickey
Re: phishing irony Matthew Gracie
Securing On-Campus Snail Mail Bob Henry
Re: Securing On-Campus Snail Mail Sachnoff, Neil
Re: phishing irony Valdis Kletnieks

Friday, 13 February

Re: phishing irony Gary Flynn
Re: phishing irony James
Re: phishing irony Ozzie Paez
Re: phishing irony Falcon, Patricia
Re: phishing irony HALL, NATHANIEL D.
Re: phishing irony Leo Song
Re: phishing irony Ozzie Paez
Re: phishing irony Chris Edwards
Re: phishing irony Leon DuPree
Re: phishing irony Zach Jansen
Re: phishing irony Valdis Kletnieks
Re: phishing irony HALL, NATHANIEL D.
Re: phishing irony Harris, Michael C.
Re: phishing irony Allison Dolan
keep email out of spam folders in Yahoo and Google Robert J. Rutkowski

Sunday, 15 February

New Internet for Security Theresa Rowe
Re: New Internet for Security Marty Manjak
Re: New Internet for Security Gene Spafford
Re: New Internet for Security Tracy Mitrano
Re: New Internet for Security David Shettler
Re: New Internet for Security Jeffrey I. Schiller
Re: New Internet for Security John Bambenek
Re: New Internet for Security Leo Song
Re: New Internet for Security Dennis Meharchand

Monday, 16 February

Re: New Internet for Security Kevin Shalla
Re: New Internet for Security Hugh Burley
Re: New Internet for Security Keith Schoenefeld

Tuesday, 17 February

Internet filtering device Kellogg, Brian D.
Re: Password Self-Service software Chancellor, Beth C.
Re: Password Self-Service software Gary Dobbins
Re: Internet filtering device HALL, NATHANIEL D.
Re: Internet filtering device Randall C Grimshaw
Re: Internet filtering device Cal Frye
Re: Password Self-Service software Chancellor, Beth C.
Re: New Internet for Security Valdis Kletnieks
Re: New Internet for Security Valdis Kletnieks
Re: Password Self-Service software Alex
Re: [Possible Spam] Re: New Internet for Security Dennis Meharchand
Re: Internet filtering device Di Fabio, Andrea
Novell 6.5 Question Sarazen, Daniel
Re: Novell 6.5 Question Rob Whalen
Job Posting: Chief Information Security Officer Ramon Hermida
Re: Password Self-Service software John Ladwig
Re: [Possible Spam] Re: New Internet for Security Valdis Kletnieks
Re: Password Self-Service software jack suess
Re: Novell 6.5 Question Hahn, Jacob
Online Student Health System risk assessment Gary Flynn
Laptop Encryption Timothy Payne
Re: Laptop Encryption Gary Dobbins
Re: Laptop Encryption Valdis Kletnieks
Remote Access to Staff Desktops Tim Lane

Wednesday, 18 February

Re: Remote Access to Staff Desktops Gary Dobbins
Re: Laptop Encryption Wes Young
Re: Remote Access to Staff Desktops Sarazen, Daniel
Re: Remote Access to Staff Desktops Di Fabio, Andrea
Re: Laptop Encryption James Farr '05'
Re: Remote Access to Staff Desktops Timothy Payne
Re: Laptop Encryption Gary Flynn
Re: Remote Access to Staff Desktops Kieper, David
Re: Remote Access to Staff Desktops Gary Flynn
ISA firewall for exchange Gary Flynn
Re: Laptop Encryption Zach Jansen
Re: Remote Access to Staff Desktops HALL, NATHANIEL D.
Re: Remote Access to Staff Desktops Mark Monroe
Re: Laptop Encryption Gregg, Christopher S.
Re: Remote Access to Staff Desktops Robin Polak
Re: Remote Access to Staff Desktops Bristol, Gary L.
Re: Laptop Encryption Warner, David F
Re: Remote Access to Staff Desktops Brawner, David
Re: Laptop Encryption Basgen, Brian
Re: Remote Access to Staff Desktops David Grisham
Re: Remote Access to Staff Desktops Justin Dover
Re: Remote Access to Staff Desktops Consolvo, Corbett D
Re: Remote Access to Staff Desktops John Ladwig
Re: Remote Access to Staff Desktops Cal Frye
Re: Remote Access to Staff Desktops Emilio Valente
Re: Remote Access to Staff Desktops Hugh Burley
Checking for old web browsers and media plugins Bob Bayn
Re: Remote Access to Staff Desktops Anthony Maszeroski
Re: Checking for old web browsers and media plugins Dean De Beer
Re: Checking for old web browsers and media plugins Gary Flynn
Re: Checking for old web browsers and media plugins Adam Carlson
Re: ISA firewall for exchange Miller, Don C.
Re: Checking for old web browsers and media plugins Gary Flynn
Re: Checking for old web browsers and media plugins Curt Wilson
Re: Remote Access to Staff Desktops Greg Francis
Re: Checking for old web browsers and media plugins John Ladwig
Re: Remote Access to Staff Desktops Stanclift, Michael
Re: Checking for old web browsers and media plugins Curt Wilson
Re: Checking for old web browsers and media plugins Adam Carlson
Re: ISA firewall for exchange Adam Carlson
Re: SECURITY Digest - 17 Feb 2009 to 18 Feb 2009 (#2009-42) Dennis Wilson

Thursday, 19 February

Re: Virtualization and Security ? Richard Hopkins
CALL FOR PAPERS: The 4th International Conference for Internet Technology and Secured Transactions (ICITST-2009), Technical Co-Sponsored by IEEE UK/RI Section Galyna Akmayeva
CALL FOR WORKSHOPS: The 4th International Conference for Internet Technology and Secured Transactions (ICITST-2009), Technical Co-Sponsored by IEEE UK/RI Section Galyna Akmayeva
CALL FOR SPECIAL TRACKS: The 4th International Conference for Internet Technology and Secured Transactions 2009 (ICITST-2009), Technical Co-Sponsored by IEEE UK/RI Section Galyna Akmayeva
Re: Remote Access to Staff Desktops Valdis Kletnieks

Friday, 20 February

Re: Remote Access to Staff Desktops Dexter Caldwell
SharePoint Shamblin, Quinn (shamblqn)
Re: SharePoint Mclaughlin, Kevin (mclaugkl)
Re: Remote Access to Staff Desktops Himes, Daniel
Re: Remote Access to Staff Desktops Hammond, Stanley
Re: Remote Access to Staff Desktops Scott Dier
Re: Checking for old web browsers and media plugins Bob Bayn
Re: Remote Access to Staff Desktops Miller, Don C.
FW: Cohesivie IP Solutions for Security and Disaster Challenges Greene, Chip
Re: Remote Access to Staff Desktops James R. Pardonek
Windows in Higher Education conference 2009 Brad Judy
AD across multiple campuses Jeff Kell
Re: AD across multiple campuses John Ladwig
Re: AD across multiple campuses Dexter Caldwell
Re: AD across multiple campuses Michael Sinatra
Re: AD across multiple campuses Scott Weyandt

Saturday, 21 February

Re: Remote Access to Staff Desktops Valdis Kletnieks

Sunday, 22 February

Re: Remote Access to Staff Desktops Dexter Caldwell
Re: AD across multiple campuses Dexter Caldwell
What "secure" file transfer products do you use on Windows? Russell Fulton
Re: What "secure" file transfer products do you use on Windows? Joel Rosenblatt
Re: What "secure" file transfer products do you use on Windows? Matthew Topper
Re: What "secure" file transfer products do you use on Windows? Bradley, Stephen W. Mr.
Re: What "secure" file transfer products do you use on Windows? Russell Fulton
Re: What "secure" file transfer products do you use on Windows? Justin Dover
Re: What "secure" file transfer products do you use on Windows? Tupker, Mike

Monday, 23 February

Re: What "secure" file transfer products do you use on Windows? Jason C. Belford
Re: What "secure" file transfer products do you use on Windows? Don Carlton
Re: What "secure" file transfer products do you use on Windows? Rappaport,Jason
Re: What "secure" file transfer products do you use on Windows? Jesse Thompson
Re: What "secure" file transfer products do you use on Windows? Di Fabio, Andrea
Re: What "secure" file transfer products do you use on Windows? Jim Pollard
User Privilege Levels. Matthew Gracie
Re: User Privilege Levels. Karen Stopford
Re: User Privilege Levels. Tupker, Mike
Re: User Privilege Levels. Stanclift, Michael
Re: User Privilege Levels. Karen Stopford
Re: User Privilege Levels. Themba Flowers
Re: What "secure" file transfer products do you use on Windows? Stanclift, Michael
Re: What "secure" file transfer products do you use on Windows? Joe Vieira
Critical Adobe Reader Vulnerability Adam Carlson
Re: AD across multiple campuses John Ladwig
Re: Remote Access to Staff Desktops Avdagic, Indir

Tuesday, 24 February

Re: User Privilege Levels. Daly, Douglas
SSL VPN Mike Wilber
Re: SSL VPN Greene, Chip
Digital Signatures - Centralized authority server Ghere, Shayne
Re: What "secure" file transfer products do you use on Windows? Vik Solem
Re: Digital Signatures - Centralized authority server Rowe, Ken
Re: User Privilege Levels. Jim Pollard
Re: SSL VPN Gary Flynn
Finding duplicate data James Moore
Re: What "secure" file transfer products do you use on Windows? Gary Flynn
Re: User Privilege Levels. Karen Stopford
Re: User Privilege Levels. Basgen, Brian
Re: User Privilege Levels. Gary Flynn
Re: User Privilege Levels. Spransy, Derek
Re: User Privilege Levels. Karen Stopford
Re: User Privilege Levels. Stanclift, Michael
Re: User Privilege Levels. Harold Winshel

Wednesday, 25 February

Re: User Privilege Levels. Gary Flynn
Re: User Privilege Levels. Spransy, Derek
Re: Finding duplicate data Dexter Caldwell
Re: Finding duplicate data Adam Nave
"Secure Delete" for Windows? Allison Dolan
Re: "Secure Delete" for Windows? Brian Epstein
Re: "Secure Delete" for Windows? Bradley, Stephen W. Mr.
Re: "Secure Delete" for Windows? Theodore Pham
Re: "Secure Delete" for Windows? King, Ronald A.
Re: "Secure Delete" for Windows? Bryan Fleming
Re: "Secure Delete" for Windows? Miller, Don C.
Re: "Secure Delete" for Windows? HALL, NATHANIEL D.
Re: Remote Access to Staff Desktops Hugh Burley

Thursday, 26 February

Re: "Secure Delete" for Windows? Sweeny, Jonny
User Privilege Levels, The Sequel. Matthew Gracie
Re: User Privilege Levels, The Sequel. Stanclift, Michael
Re: User Privilege Levels, The Sequel. Karen Stopford
Re: "Secure Delete" for Windows? Harris, Michael C.
PGP WDE jeff murphy
Re: PGP WDE Todd Clementz
Re: PGP WDE Sealey, Adam L.
Re: SSL VPN Russ Leathe
Re: SSL VPN F.M. Taylor
Re: SSL VPN Adam Richard
Re: PGP WDE Beechey, Jim

Friday, 27 February

Re: PGP WDE Gary Flynn
Re: SSL VPN Karen Stopford
Re: SSL VPN James R. Pardonek
Re: SSL VPN David Hale
Re: PGP WDE Tonkin, Derek K.
Re: SSL VPN Mike Wiseman
Re: PGP WDE Brad Sanford
Re: PGP WDE Mclaughlin, Kevin (mclaugkl)
Re: PGP WDE Tonkin, Derek K.

Monday, 02 March

Job Descriptions Daniel Bennett
Sophos NAC Product Timothy Payne
Erasure of Mobile Phone Data Tim Lane
Re: Erasure of Mobile Phone Data DAVID R. MORTON
Re: Erasure of Mobile Phone Data Hugh Burley
Re: Erasure of Mobile Phone Data Tim Lane

Tuesday, 03 March

Re: Erasure of Mobile Phone Data Tupker, Mike

Wednesday, 04 March

outrageous DNS queries of isatap.mshome. from Residential Network. schilling
Re: outrageous DNS queries of isatap.mshome. from Residential Network. Ken Connelly
Re: outrageous DNS queries of isatap.mshome. from Residential Network. John Ladwig
Re: outrageous DNS queries of isatap.mshome. from Residential Network. Joe St Sauver
Re: outrageous DNS queries of isatap.mshome. from Residential Network. Michael Sinatra
Re: outrageous DNS queries of isatap.mshome. from Residential Network. Michael Sinatra
Re: outrageous DNS queries of isatap.mshome. from Residential Network. Ken Connelly
Re: outrageous DNS queries of isatap.mshome. from Residential Network. Michael Sinatra
Cisco FWSM firewalls and IPv6 Issues Avdagic, Indir
Re: outrageous DNS queries of isatap.mshome. from Residential Network. Gary Flynn
Re: "Secure Delete" for Windows? Don C. Miller
Re: outrageous DNS queries of isatap.mshome. from Residential Network. Michael Sinatra

Thursday, 05 March

Cisco Pix Firewall Question Sarazen, Daniel
My DNS registration Peter Charbonneau
Re: Cisco Pix Firewall Question Greene, Chip
Re: My DNS registration Scholz, Greg
Re: My DNS registration Peter Charbonneau
Re: My DNS registration Randall C Grimshaw
Re: Cisco Pix Firewall Question Willis Marti
Re: Cisco Pix Firewall Question Sarazen, Daniel
Re: Cisco Pix Firewall Question Greene, Chip
Re: Cisco Pix Firewall Question Brown, Alexander
Re: Cisco Pix Firewall Question Greene, Chip
Re: Cisco Pix Firewall Question Sarazen, Daniel
Re: Cisco Pix Firewall Question King, Ronald A.
"Secure Delete" for Windows? Eric Jernigan
Re: Cisco Pix Firewall Question David Gillett
Re: Cisco Pix Firewall Question Chuck McCants
Re: Cisco Pix Firewall Question Adam Carlson
Re: Cisco Pix Firewall Question Jeff Kell
Re: Cisco Pix Firewall Question Warner, David F

Friday, 06 March

Securing a document management system Theresa Rowe
Administrative v/s power user Access for Staff and students Anand S Malwade
Re: Administrative v/s power user Access for Staff and students Tupker, Mike
Re: Administrative v/s power user Access for Staff and students Brian Desmond
Re: Administrative v/s power user Access for Staff and students Stanclift, Michael
Re: Administrative v/s power user Access for Staff and students Gary Flynn
Requesting feedback on Roundcube Webmail Elizabeth Shannon
Re: Requesting feedback on Roundcube Webmail Mark Montague
Re: Cisco Pix Firewall Question Jim Dillon
Re: Administrative v/s power user Access for Staff and students Brian K . Doré

Monday, 09 March

Re: Securing a document management system Allison Dolan
Please change the parameters of this listserv to reject HTML parts Kim Cary
Re: Please change the parameters of this listserv to reject HTML parts Valdis Kletnieks
Re: Please change the parameters of this listserv to reject HTML parts Patrick P Murphy
Re: Please change the parameters of this listserv to reject HTML parts Adam Nave
Re: Please change the parameters of this listserv to reject HTML parts Patrick P Murphy
Re: Please change the parameters of this listserv to reject HTML parts Marty Hoag
Re: Please change the parameters of this listserv to reject HTML parts Rodney Petersen
Re: Administrative v/s power user Access for Staff and students Kevin Shalla
Re: Securing a document management system Theresa Rowe
Penetration Testing Software James R. Pardonek

Tuesday, 10 March

Re: Penetration Testing Software Daniel Bennett
Re: Penetration Testing Software Karen Stopford
Re: Penetration Testing Software Joel Rosenblatt
Re: Penetration Testing Software Axworthy, Heather
Re: Penetration Testing Software Jay Tumas
Re: Penetration Testing Software Rue, Brian R.
Re: Penetration Testing Software King, Ronald A.
Re: Penetration Testing Software David Grisham
Cogent 100mb connection (Metro) Reyes, Esteban

Wednesday, 11 March

Re: Securing a document management system Allison Dolan
Re: Securing a document management system Morrow Long
information security reports to executive / board of governors Andy Scott
Re: Securing a document management system Karen Stopford
Re: Penetration Testing Software Curt Wilson
Re: Penetration Testing Software randy marchany
Re: Penetration Testing Software Christopher Jones
Re: information security reports to executive / board of governors Jason Testart
Electronic Signature Pad Policies/Procedures Gary Flynn

Thursday, 12 March

Re: Please change the parameters of this listserv to reject HTML parts Jesse Thompson

Friday, 13 March

Windows Domain Controllers: Risks involved Marmina Abdel Malek
Re: Windows Domain Controllers: Risks involved Tupker, Mike
Re: Windows Domain Controllers: Risks involved F.M. Taylor
Re: Windows Domain Controllers: Risks involved John Kaftan
Re: Windows Domain Controllers: Risks involved Patrick P Murphy
Re: Windows Domain Controllers: Risks involved Miller, Don C.
Re: Windows Domain Controllers: Risks involved Miller, Don C.
Re: Windows Domain Controllers: Risks involved Chris Green
Re: Windows Domain Controllers: Risks involved Anand S Malwade
Re: Windows Domain Controllers: Risks involved Brian Desmond
Re: Windows Domain Controllers: Risks involved Brian Desmond
Re: Windows Domain Controllers: Risks involved Jason Testart
Re: Windows Domain Controllers: Risks involved Brian Desmond
Re: Windows Domain Controllers: Risks involved Marmina Abdel Malek
Re: Windows Domain Controllers: Risks involved Brian Desmond

Saturday, 14 March

Second Call for Papers and Workshop Proposals: ICITST. The 4th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI Section Galyna Akmayeva

Monday, 16 March

Re: Windows Domain Controllers: Risks involved Ryan S. Johnston
ISP for Residence Halls Biggers, Anna L.

Tuesday, 17 March

Re: ISP for Residence Halls Moore, Frank
Re: ISP for Residence Halls F.M. Taylor
Re: ISP for Residence Halls Pete Hickey
Re: ISP for Residence Halls Consolvo, Corbett D
Re: ISP for Residence Halls John Kaftan
Packet Sentry: Thoughts and opinions? Jon Mitchiner
Re: Packet Sentry: Thoughts and opinions? F.M. Taylor
Vendor Contracts Daniel Bennett
Re: Windows Domain Controllers: Risks involved David Gillett
EdConnect Software Anyone? Vik Solem
SSL Certificates Mclaughlin, Kevin (mclaugkl)
Re: EdConnect Software Anyone? Dan Johnson
Re: EdConnect Software Anyone? Vik Solem
Re: SSL Certificates Rowe, Ken
Re: SSL Certificates Jeff Giacobbe
Re: SSL Certificates Consolvo, Corbett D
DRP Software Tim Lane
Re: SSL Certificates John Ladwig

Wednesday, 18 March

Re: SSL Certificates Gary Flynn
Re: SSL Certificates Brian Epstein
Re: SSL Certificates Ryan Fox
Re: SSL Certificates Charlie Prothero
Re: SSL Certificates Eric Torgersen
Re: Vendor Contracts Willis Marti
Re: SSL Certificates Doug Hoffman
Re: SSL Certificates Steven Tardy
Re: Vendor Contracts Grama, Joanna Lyn
Re: EdConnect Software Anyone? Dan Johnson
Re: User Privilege Levels. John Hoffoss

Thursday, 19 March

From Decentralized to Centralized Sarazen, Daniel
Re: From Decentralized to Centralized Joel Rosenblatt
Re: SSL Certificates Cal Frye
Re: From Decentralized to Centralized Ness, Carl J
Re: From Decentralized to Centralized Kathy Bergsma
Re: From Decentralized to Centralized Allison Dolan
Re: From Decentralized to Centralized Consolvo, Corbett D
Re: From Decentralized to Centralized Joel Rosenblatt
Re: From Decentralized to Centralized Jesse Thompson
NACUA Virtual Seminar on ESI and Electronic Discovery Rodney Petersen
Re: From Decentralized to Centralized randy marchany
Re: From Decentralized to Centralized Gary Bristol
Re: From Decentralized to Centralized Bowden, Zeb
Telephone Verification of Identity Kenneth Arnold

Friday, 20 March

Re: Telephone Verification of Identity Tonkin, Derek K.
Re: Telephone Verification of Identity Irish, Adrian L
Re: Telephone Verification of Identity Matthew Giannetto
Security Professionals Conference 2009: Low Rates End March 23 Washington, Cheryl

Tuesday, 24 March

Webex Remote Access Erik Decker
Seeking Judges for Computer Security Awareness Poster and Video Contest 2009 David C. Lyon
Mirapoint domain message filters Gary Flynn

Wednesday, 25 March

IronPort Web Security Appliance -- Performance? Ben Spencer

Thursday, 26 March

Job Posting - The University of Iowa Drews, Jane E

Friday, 27 March

Cisco ASA UPdates Daly, Douglas
Re: Cisco ASA UPdates Jeff Kell
Re: Cisco ASA UPdates Michael Grinnell

Tuesday, 31 March

Conflicker/NMAP Consolvo, Corbett D
Re: Conflicker/NMAP Stanclift, Michael
Re: Conflicker/NMAP Harris, Michael C.
Re: Conflicker/NMAP Greg T. Grimes
Re: Conflicker/NMAP Jason S. Cash
Re: Conflicker/NMAP David Boyer
Re: Conficker/NMAP Consolvo, Corbett D
Re: Conflicker/NMAP Ken Connelly
Re: Conflicker/NMAP Jason Testart
Re: Conflicker/NMAP Jason Frisvold
Re: Conflicker/NMAP Mike Austin
Re: Conflicker/NMAP King, Ronald A.
Re: Conflicker/NMAP John Sawyer
Re: Conflicker/NMAP Jerry Sell
Conflicker/Retina Wayne Bullock
Re: Conflicker/NMAP Pete Hickey
Re: Conflicker/NMAP James R. Pardonek
Re: Conflicker/NMAP Stanclift, Michael
two-factor OTP systems jeff murphy
Re: Conficker/NMAP Bob Bayn
Re: Conflicker/NMAP Dennis Meharchand
Re: Conflicker/NMAP David Harley
Re: Conflicker/NMAP Basgen, Brian
Re: Conflicker/NMAP Stanclift, Michael
Re: Conflicker/NMAP Bradley, Stephen W. Mr.
netflow Youngquist, Jason R.
Re: Conflicker/NMAP Harry E Flowers (flowers)
Re: two-factor OTP systems F.M. Taylor
Re: Conflicker/NMAP David Gillett
Re: Conflicker/NMAP Dennis Meharchand
Re: Conflicker/NMAP Dexter Caldwell
Re: netflow Peter Charbonneau
Re: netflow Truong, Joseph
Re: two-factor OTP systems Randall C Grimshaw
Re: Conflicker/NMAP Mike Iglesias
Re: Conflicker/NMAP Scott Dier
Re: netflow Joel Rosenblatt
Re: Conflicker/NMAP David Harley
Re: Conflicker/NMAP Rowe, Ken
Re: netflow Avdagic, Indir
Re: Conflicker/NMAP Emilio Valente
Re: Conflicker/NMAP David Harley
Re: Conflicker/NMAP Wyman Miles
Re: Conflicker/NMAP David Harley
Re: Conflicker/NMAP Roger Safian
Re: Conflicker/NMAP Dennis Meharchand
Re: Conflicker/NMAP Dean De Beer
Email marketing keys and contact information privacy Gary Flynn
Re: Email marketing keys and contact information privacy Jason Testart
Re: netflow Jason Frisvold
Re: Conflicker/NMAP Jerry Sell
Re: Conflicker/NMAP Ken Connelly
Re: Conflicker/NMAP Jerry Sell
Re: Conflicker/NMAP Stanclift, Michael
Re: Conflicker/NMAP Joseph Clark
Re: Conflicker/NMAP James R. Pardonek
Re: Conflicker/NMAP John Sawyer
Re: Email marketing keys and contact information privacy Dennis Meharchand
Re: Email marketing keys and contact information privacy Crim, David
Re: Conflicker/NMAP Daniel Bennett
Re: Conflicker/NMAP David Boyer
Re: SecurID query LaPorte, David