Educause Security Discussion mailing list archives

Re: firewall holes for particular machines


From: Megan Carney <carn0048 () UMN EDU>
Date: Thu, 14 May 2009 11:27:50 -0500

That's exactly what we ended up doing. :)

On Thursday 14 May 2009 09:11:57 Zach Jansen wrote:
Wouldn't it be better to run these applications through a proxy, such as
squid, instead?

Zach Jansen

--
Megan Carney
Security Coordinator
OIT Security and Assurance
612-625-3858
carn0048 () umn edu

Merlin Mann's rules for sensible email:
1. Know why you're writing and what result you would like to see.
2. Make clear whether you are providing information, requesting information,
or requesting action.
3. Write a great subject line.
4. Brevity is the soul. . .of getting a response.
5. Make clear what the next action is.
6. Keep messages and threads limited to one topic or project.

www.43folders.com/2005/09/19/writing-sensible-email-messages


Current thread: