Educause Security Discussion: by author

825 messages starting Mar 03 10 and ending Mar 25 10
Date index | Thread index | Author index


Adam Garside

Re: IPtables versus Tcp_wrapper Adam Garside (Mar 03)
Re: IPtables versus Tcp_wrapper Adam Garside (Mar 03)
Re: Experience outsourcing student email to Live@edu Adam Nave (Jan 27)
Re: recommendations for an SSH client? Adam Nave (Feb 23)
Re: Email Spam (inbound and outbound) and Malware Protection Adam Nave (Jan 29)
Re: Listserv's Adam Nave (Feb 10)

Adam Pridgen

Reverse Engineeirng a Bot Adam Pridgen (Jan 22)
Re: Metasploit and NeXpose Adam Pridgen (Jan 13)

Alex Brown

Re: ISO 27000 Alex Brown (Jan 15)

Alex Jalso

scanning of student information systems Alex Jalso (Mar 10)
database security tools Alex Jalso (Mar 26)

Alex Keller

Re: Group Policy enforced on desktop Alex Keller (Mar 29)

Allison Dolan

Re: Are users right in rejecting security advice? Allison Dolan (Mar 17)
Re: Email account used by multiple people Allison Dolan (Mar 15)
Re: Higher Ed Breach Articles Allison Dolan (Mar 03)
Re: Are users right in rejecting security advice? Allison Dolan (Mar 17)
Re: Are users right in rejecting security advice? Allison Dolan (Mar 16)
Lower Merion YouTube lauding the LANrev management Allison Dolan (Feb 22)
Are users right in rejecting security advice? Allison Dolan (Mar 16)
Re: password vs pass-phrase Allison Dolan (Mar 23)
Lower Meridan school updates Allison Dolan (Mar 22)
Re: password vs pass-phrase (was: Are users right in rejecting security advice?) Allison Dolan (Mar 18)
The value of 'least privilege' Allison Dolan (Mar 30)

Amber Weishaar

Re: Securing common access computers Amber Weishaar (Mar 24)

Anand S Malwade

Re: Enforcement of Security Training for Faculty/Staff Anand S Malwade (Mar 01)

Andreas Paulisch

Re: Server naming conventions Andreas Paulisch (Feb 11)

Andrew Daviel

Re: Anyone using SPF/SRS/SenderID ? Andrew Daviel (Jan 07)
Address allocation on the network - DHCP, IPv6 etc. Andrew Daviel (Mar 18)
Re: Address allocation on the network - DHCP, IPv6 etc. Andrew Daviel (Mar 19)
Problems with Hotmail deleting incoming mail Andrew Daviel (Mar 25)
Uptick in SSH attempts; anyone else ? Andrew Daviel (Jan 18)
Anyone using SPF/SRS/SenderID ? Andrew Daviel (Jan 05)

Andrew Davis

Cisco ACS 3.3 Certificate Configuration Andrew Davis (Mar 17)
Re: Windows 7 and a Cisco 3000 series concentrator Andrew Davis (Mar 10)

Anna Kircher

Re: Discontinuing student email service - back to the original question Anna Kircher (Jan 27)

Anthony Maszeroski

Re: Juniper gateway choices Anthony Maszeroski (Jan 20)
Re: Uptick in SSH attempts; anyone else ? Anthony Maszeroski (Jan 18)

Barbara Ann Torney

Re: Mass E-mail to Students, Staff, and Faculty Barbara Ann Torney (Feb 03)
Re: Server naming conventions Barbara Ann Torney (Feb 11)

Barry Lynam

Re: Server naming conventions Barry Lynam (Feb 11)

Basgen, Brian

Re: Are users right in rejecting security advice? Basgen, Brian (Mar 18)
Re: Password strength (was: Are users right in rejecting security advice?) Basgen, Brian (Mar 17)
Re: Are users right in rejecting security advice? (pafwert program) Basgen, Brian (Mar 17)
Re: password vs pass-phrase (was: Are users right in rejecting security advice?) Basgen, Brian (Mar 17)
Re: PCI and common access computers Basgen, Brian (Mar 25)
Re: Are users right in rejecting security advice? Basgen, Brian (Mar 17)
Re: The value of 'least privilege' Basgen, Brian (Mar 30)

Beechey, Jim

Re: Anyone using Q1 Labs QRadar SIEM? Beechey, Jim (Mar 19)
Application Whitelisting Beechey, Jim (Mar 19)

Ben Williams

Re: Email Spam (inbound and outbound) and Malware Protection Ben Williams (Feb 01)

Ben Woelk

Re: Lost & Found mobile devices Ben Woelk (Feb 25)
Systems Acquisition and Development standard Ben Woelk (Jan 29)
Re: Security Training in new mailbox email Ben Woelk (Jan 20)
Re: Security Training in new mailbox email Ben Woelk (Jan 20)
Re: "Second Life" Information Ben Woelk (Feb 25)

Blake Penn

Re: Consultant recommendations for PCI DSS compliance work? Blake Penn (Jan 25)
Re: PCI and common access computers Blake Penn (Mar 25)
Re: PCI and common access computers Blake Penn (Mar 25)

Bob Bayn

Re: ALERT: Targeted attacks on institutional online banking Bob Bayn (Mar 31)
Re: Server naming conventions Bob Bayn (Feb 10)
Re: Discontinuing student email service Bob Bayn (Jan 26)
Re: Server naming conventions Bob Bayn (Feb 10)
Re: Discontinuing student email service Bob Bayn (Jan 26)

Bob Kalal

Re: Server naming conventions Bob Kalal (Feb 10)
Re: Retiree Email Accounts Bob Kalal (Feb 01)
Re: Retiree Email Accounts Bob Kalal (Feb 01)

Bowden, Zeb

Re: research data security Bowden, Zeb (Feb 18)

Brad Alexander

Email Archiving Brad Alexander (Jan 20)

Brad Judy

ActiveSync policy application/compatibility Brad Judy (Feb 23)
Re: Email Archiving Brad Judy (Jan 20)
Re: computer security vision for next 3-5 years Brad Judy (Jan 13)
Re: Outsourcing student email Brad Judy (Feb 08)
Re: Are users right in rejecting security advice? Brad Judy (Mar 17)
Re: Researcher seeks volunteers for interview Brad Judy (Mar 04)
Re: Streamlined PGP WDE Deployment Brad Judy (Feb 26)
PGP v10 docs posted Brad Judy (Jan 14)
Re: Consultant recommendations for PCI DSS compliance work? Brad Judy (Jan 20)
Re: Discoverability of expired tapes? Brad Judy (Jan 06)

Bradley, Stephen W. Mr.

Re: Administering OSSEC Bradley, Stephen W. Mr. (Feb 16)
Re: Best Forensic Tools? Bradley, Stephen W. Mr. (Mar 30)
Re: Vendor Access Bradley, Stephen W. Mr. (Mar 04)
Re: Open DNS Bradley, Stephen W. Mr. (Jan 14)
Re: Log Management Bradley, Stephen W. Mr. (Mar 05)
Re: Researcher seeks volunteers for interview Bradley, Stephen W. Mr. (Mar 04)
Re: Administering OSSEC Bradley, Stephen W. Mr. (Feb 16)

Bret Ingerman

Re: "Second Life" Information Bret Ingerman (Feb 25)

Brewer, Alex D

Re: Securing common access computers Brewer, Alex D (Mar 25)

Brian Desmond

Re: Converting WIM to ISO Brian Desmond (Feb 04)
Re: Batch importing into Active Directory Brian Desmond (Feb 12)

Brian Epstein

Re: Clientless SSL VPN vulnerability Brian Epstein (Mar 08)

Bristol, Gary L.

Re: Server naming conventions Bristol, Gary L. (Feb 11)

Brosey, Meg (HSC)

Unsubscribe Brosey, Meg (HSC) (Jan 20)

Bruce Carter

Re: Server naming conventions Bruce Carter (Feb 10)

Cal Frye

Re: Server naming conventions Cal Frye (Feb 10)
Re: Server naming conventions Cal Frye (Feb 12)
Juniper gateway choices Cal Frye (Jan 20)
Re: Securing common access computers Cal Frye (Mar 24)
Re: Self Service Password Reset Programs Cal Frye (Jan 14)
Re: Server naming conventions Cal Frye (Feb 11)

Casey R DeBord

Re: Converting WIM to ISO Casey R DeBord (Feb 02)
Re: Converting WIM to ISO Casey R DeBord (Feb 02)

Cathy Hubbs

Security Professionals Conference 2010: Early-Bird Registration Rates End March 15 Cathy Hubbs (Mar 01)

Charles Buchholtz

Re: password vs pass-phrase (was: Are users right in rejecting security advice?) Charles Buchholtz (Mar 18)
password vs pass-phrase (was: Are users right in rejecting security advice?) Charles Buchholtz (Mar 17)

Charles Seitz

Re: Discontinuing student email service Charles Seitz (Jan 26)

Cheek, Leigh

Group Policy enforced on desktop Cheek, Leigh (Mar 29)

Childs, Aaron

Re: Server naming conventions Childs, Aaron (Feb 11)

Chris Bennett

Re: ISO 27000 Chris Bennett (Jan 15)
Re: Server naming conventions Chris Bennett (Feb 11)

Chris Green

Re: Waiver of responsibility for emailed PHI Chris Green (Feb 18)
Re: Streamlined PGP WDE Deployment Chris Green (Mar 04)
Re: RESENT - File Sharing with Active Directory (AD) - migrating off of Novel File Sharing Chris Green (Feb 22)
Re: PCI and common access computers Chris Green (Mar 25)
Re: Administering OSSEC Chris Green (Feb 16)

Chris Kidd

Re: computer security vision for next 3-5 years Chris Kidd (Jan 12)
Re: HIPAA Business Associate/Identity Theft Prevention Agreement Chris Kidd (Feb 22)
Re: Enforcement of Security Training for Faculty/Staff Chris Kidd (Mar 01)

Christian Hroux

Re: How to Protect Campus Sensitive Servers Christian Hroux (Feb 08)

Christianson, Lorrayne K.

Re: Opinions on malwarebytes virus cleanup software? Christianson, Lorrayne K. (Feb 22)
Patching iTunes and Firefox Christianson, Lorrayne K. (Feb 09)

Christopher Jones

Re: Log Management Christopher Jones (Mar 05)

Christopher Penido

Symantec Endpoint Protection reporting latest definitions as "12/31/09" Christopher Penido (Jan 06)

Chuck Braden

Re: Higher Ed Breach Articles Chuck Braden (Mar 03)

Clark, Sean

Re: Listserv's Clark, Sean (Feb 10)

Clifford Collins

Patching practices inquiry Clifford Collins (Feb 26)

Colleen Keller

Re: Mass E-mail to Students, Staff, and Faculty Colleen Keller (Feb 03)

Conlee, Keith

Re: SECURITY Digest - 16 Feb 2010 to 17 Feb 2010 (#2010-39) Conlee, Keith (Feb 18)
RESENT - File Sharing with Active Directory (AD) - migrating off of Novel File Sharing Conlee, Keith (Feb 22)
Enforcement of Security Training for Faculty/Staff Conlee, Keith (Mar 09)

Conor McGrath

Re: Mass E-mail to Students, Staff, and Faculty Conor McGrath (Feb 03)

Consolvo, Corbett D

Re: It's all in a Domain Name Consolvo, Corbett D (Mar 18)
Re: It's all in a Domain Name Consolvo, Corbett D (Mar 18)

Craig D Rice

Re: The world of PCI and online registration gateways Craig D Rice (Feb 19)

Dallas Thornton

CISO Position at SDSC (UC San Diego) Dallas Thornton (Feb 26)

Daly, Douglas

Re: SECURITY Digest - 30 Apr 2009 to 1 May 2009 (#2009-102) Daly, Douglas (Feb 05)

Dan Oachs

Re: Address allocation on the network - DHCP, IPv6 etc. Dan Oachs (Mar 18)
Re: Server naming conventions Dan Oachs (Feb 11)

Dan Schwartz

Re: Windows 7 and a Cisco 3000 series concentrator Dan Schwartz (Mar 11)

Dave Kovarik

Re: High levels of DMCA notifications Dave Kovarik (Jan 04)
Re: Higher Ed Breach Articles Dave Kovarik (Mar 03)
Re: computer security vision for next 3-5 years Dave Kovarik (Jan 12)

David A. Greenberg

Re: Problems with Hotmail deleting incoming mail David A. Greenberg (Mar 26)

David Clift

What Control Framework are you using? David Clift (Mar 19)

David Escalante

Re: Discoverability of expired tapes? David Escalante (Jan 06)
Re: Enforcement of Security Training for Faculty/Staff David Escalante (Mar 01)
Re: Are users right in rejecting security advice? David Escalante (Mar 17)
Re: Systems Acquisition and Development standard David Escalante (Jan 29)

David Gillett

Re: Securing common access computers David Gillett (Mar 24)
Re: Best Forensic Tools? David Gillett (Mar 30)

David Grisham

Scoring Security Controls in an RFP David Grisham (Mar 18)

David LaPorte

Re: Anyone using Q1 Labs QRadar SIEM? David LaPorte (Mar 17)

David Seidl

Re: Anyone using Q1 Labs QRadar SIEM? David Seidl (Mar 17)

Davis, Thomas R

Re: ISO 27000 Davis, Thomas R (Jan 15)
Re: Mass E-mail to Students, Staff, and Faculty Davis, Thomas R (Feb 04)
Re: PCI compliance on a university network Davis, Thomas R (Jan 06)

Dee Spivey

"Second Life" Information Dee Spivey (Feb 25)

Delaney, Cherry L.

Re: Security Training in new mailbox email Delaney, Cherry L. (Jan 25)

Dennis Meharchand

Re: computer security vision for next 3-5 years Dennis Meharchand (Jan 12)
Re: Are users right in rejecting security advice? Dennis Meharchand (Mar 17)

Derek Diget

Re: Server naming conventions Derek Diget (Feb 11)

Dexter Caldwell

Re: significant incoming SSH volume Dexter Caldwell (Mar 17)
Re: The value of 'least privilege' Dexter Caldwell (Mar 30)
Re: ALERT: Targeted attacks on institutional online banking Dexter Caldwell (Mar 31)
Re: computer security vision for next 3-5 years Dexter Caldwell (Jan 13)
Re: Log Management Dexter Caldwell (Mar 05)
Re: Experience outsourcing student email to Live@edu Dexter Caldwell (Jan 25)

Dick Jacobson

Re: Are users right in rejecting security advice? Dick Jacobson (Mar 17)

Di Fabio, Andrea

Re: Content Filter Di Fabio, Andrea (Mar 15)
How to Protect Campus Sensitive Servers - Solution Di Fabio, Andrea (Feb 05)
External LDAP Authentication through the firewall Di Fabio, Andrea (Jan 08)
Re: How to Protect Campus Sensitive Servers Di Fabio, Andrea (Feb 04)
Re: Open DNS Di Fabio, Andrea (Jan 13)
Re: computer security vision for next 3-5 years Di Fabio, Andrea (Jan 13)

d.lin () icitst org

Call for Papers: ICITST-2010, Technical Co-Sponsored by IEEE UK/RI Communications Chapter d.lin () icitst org (Jan 22)
Call for Papers: ICITST-2010 d.lin () icitst org (Jan 13)
Call for Papers: ICITST-2010, Technical Co-Sponsored by IEEE UK/RI Communications Chapter d.lin () icitst org (Jan 17)

Donald, A. Wayne

Re: SANS SEC 560 "Network Pen Test & Ethical Hacking", Onsite, VA Tech, $800/person Donald, A. Wayne (Mar 12)

Don M. Blumenthal

Re: HIPAA Business Associate/Identity Theft Prevention Agreement Don M. Blumenthal (Feb 22)
Re: Consultant recommendations for PCI DSS compliance work? Don M. Blumenthal (Jan 20)

Doug Markiewicz

Re: research data security Doug Markiewicz (Feb 18)

Doug Pearson

Re: Membership in REN-ISAC? Doug Pearson (Jan 04)
ALERT: Targeted attacks on institutional online banking Doug Pearson (Jan 11)
Re: ALERT: Targeted attacks on institutional online banking Doug Pearson (Jan 14)

Drake, Craig

virtual machines Drake, Craig (Mar 22)

Drews, Adam

Retiree Email Accounts Drews, Adam (Feb 01)
Third-Party Network Connection Agreement Drews, Adam (Feb 08)
Re: Anyone using Q1 Labs QRadar SIEM? Drews, Adam (Mar 17)
Vendor Access Drews, Adam (Mar 04)

Drews, Jane E

Re: ISO 27000 Drews, Jane E (Jan 15)
Re: Email Archiving Drews, Jane E (Jan 20)
Re: Video Surveillance Requirements Drews, Jane E (Jan 14)
experience with tools for data scrubbing? Drews, Jane E (Mar 10)

Ed Gibson

Re: Anyone using SPF/SRS/SenderID ? Ed Gibson (Jan 06)

Edgmand, Craig

Re: Anyone using Q1 Labs QRadar SIEM? Edgmand, Craig (Mar 17)
Re: significant incoming SSH volume Edgmand, Craig (Mar 16)

Eric Case

Re: Are users right in rejecting security advice? Eric Case (Mar 17)
Re: computer security vision for next 3-5 years Eric Case (Jan 12)
Re: password vs pass-phrase Eric Case (Mar 18)
Re: password vs pass-phrase Eric Case (Mar 19)
Re: Are users right in rejecting security advice? Eric Case (Mar 17)
Re: password vs pass-phrase (was: Are users right in rejecting security advice?) Eric Case (Mar 17)
Re: The value of 'least privilege' Eric Case (Mar 30)
Re: Are users right in rejecting security advice? Eric Case (Mar 17)
Re: Password strength (was: Are users right in rejecting security advice?) Eric Case (Mar 17)
Re: e-discovery software and outsourcing insights? Eric Case (Feb 26)
Trojan outbreak on a College Campus Eric Case (Mar 17)
Re: password vs pass-phrase (was: Are users right in rejecting security advice?) Eric Case (Mar 18)
Re: Are users right in rejecting security advice? Eric Case (Mar 17)
Re: Best Forensic Tools? Eric Case (Mar 30)
Re: Are users right in rejecting security advice? Eric Case (Mar 17)
Re: password vs pass-phrase Eric Case (Mar 18)
Re: Are users right in rejecting security advice? (pafwert program) Eric Case (Mar 17)
Re: Discontinuing student email service Eric Case (Jan 27)
Re: Are users right in rejecting security advice? Eric Case (Mar 17)
Re: The value of 'least privilege' Eric Case (Mar 30)

Eric C. Lukens

Re: PCI and common access computers Eric C. Lukens (Mar 25)
Administering OSSEC Eric C. Lukens (Feb 16)
Re: PCI and common access computers Eric C. Lukens (Mar 25)
Re: PCI and common access computers Eric C. Lukens (Mar 25)
Re: PCI and common access computers Eric C. Lukens (Mar 25)

Eric Jernigan

Re: Are users right in rejecting security advice? Eric Jernigan (Mar 22)

E. Todd Atkins

Re: anyone using OSSIM.... E. Todd Atkins (Mar 16)

Ewing, Ashley

Re: PCI and common access computers Ewing, Ashley (Mar 25)
Re: PCI and common access computers Ewing, Ashley (Mar 25)

Faith McGrath

Re: Higher Ed Breach Articles Faith McGrath (Mar 03)

Feehan, Patrick

Email Spam (inbound and outbound) and Malware Protection Feehan, Patrick (Jan 29)

Ferris, Joe

Re: Log Management Ferris, Joe (Mar 10)

Fletcher, Robert

Re: Membership in REN-ISAC? Fletcher, Robert (Jan 04)

Flynn, Gary

Re: PCI and common access computers Flynn, Gary (Mar 25)
PCI and common access computers Flynn, Gary (Mar 25)
Re: PCI and common access computers Flynn, Gary (Mar 25)
Remote Acceses Policies - VPN vs Desktop Access Flynn, Gary (Mar 25)
Re: Remote Acceses Policies - VPN vs Desktop Access Flynn, Gary (Mar 25)
Re: PCI and common access computers Flynn, Gary (Mar 25)

Flynn, Gerald

Re: External LDAP Authentication through the firewall Flynn, Gerald (Jan 08)
Re: Mass E-mail to Students, Staff, and Faculty Flynn, Gerald (Feb 03)
Re: password vs pass-phrase Flynn, Gerald (Mar 19)
Re: Video Surveillance Requirements Flynn, Gerald (Jan 14)
Re: Email Spam (inbound and outbound) and Malware Protection Flynn, Gerald (Jan 29)

Fulton, Lora

Job Posting: Information Security Officer at Boston Univerity Fulton, Lora (Jan 29)

g.akmayeva () icitst org

​Call for Papers: ICITST-2010! g.akmayeva () icitst org (Feb 13)

Gary Dobbins

Re: Video Surveillance Requirements Gary Dobbins (Jan 14)
Re: research data security Gary Dobbins (Feb 18)

Gary Flynn

Juniper SSL VPN Training Recommendations Gary Flynn (Feb 12)
New Thawte Enterprise Certificate Center Gary Flynn (Jan 11)

Garza, Veronica M.

Re: Content Filter Garza, Veronica M. (Mar 15)

Gene Spafford

RockYou password list? Gene Spafford (Jan 22)
Re: Server naming conventions Gene Spafford (Feb 11)
Re: RockYou password list? Gene Spafford (Jan 22)

Gibson, Nathan J. (HSC)

Converting WIM to ISO Gibson, Nathan J. (HSC) (Feb 02)
Re: Converting WIM to ISO Gibson, Nathan J. (HSC) (Feb 04)
Re: Converting WIM to ISO Gibson, Nathan J. (HSC) (Feb 02)

Gina Mieszczak

Re: computer security vision for next 3-5 years Gina Mieszczak (Jan 12)

Greg Francis

Consultant recommendations for PCI DSS compliance work? Greg Francis (Jan 20)
Re: Server naming conventions Greg Francis (Feb 10)
Re: Server naming conventions Greg Francis (Feb 11)
Discoverability of expired tapes? Greg Francis (Jan 06)

Gregg, Christopher S.

Re: Discontinuing student email service Gregg, Christopher S. (Jan 26)
Re: Email Spam (inbound and outbound) and Malware Protection Gregg, Christopher S. (Jan 29)
Re: Discontinuing student email service Gregg, Christopher S. (Jan 26)

Greg Schaffer

Re: Server naming conventions Greg Schaffer (Feb 11)
Re: Listserv's Greg Schaffer (Feb 10)

Greg Vickers

Metasploit and NeXpose Greg Vickers (Jan 13)

Griese, Steven A.

IPtables versus Tcp_wrapper Griese, Steven A. (Mar 03)

Guoqi Cui

How to import CAM's root certificate to CAS? Guoqi Cui (Feb 08)

Guy Pace

Re: Best Forensic Tools? Guy Pace (Mar 30)

HALL, NATHANIEL D.

Re: Consultant recommendations for PCI DSS compliance work? HALL, NATHANIEL D. (Jan 20)

Hall, Rand

Discontinuing student email service Hall, Rand (Jan 26)

Hammond, Stanley

Re: Server naming conventions Hammond, Stanley (Feb 11)
Log Management Hammond, Stanley (Mar 05)
Re: recommendations for an SSH client? Hammond, Stanley (Feb 23)

Harry E Flowers (flowers)

Re: Discoverability of expired tapes? Harry E Flowers (flowers) (Jan 06)
Re: Experience outsourcing student email to Live@edu Harry E Flowers (flowers) (Jan 25)

Harry Pontiff

Re: Experience outsourcing student email to Live@edu Harry Pontiff (Jan 25)

Hart, Lee Anne

Re: Log Management Hart, Lee Anne (Mar 05)
Re: Log Management Hart, Lee Anne (Mar 05)

Heidi Wachs

Re: ISO 27000 Heidi Wachs (Jan 15)

Howe, Joe

Re: The value of 'least privilege' Howe, Joe (Mar 30)

Hudson, Edward

Video Surveillance Requirements Hudson, Edward (Jan 14)
Re: Discoverability of expired tapes? Hudson, Edward (Jan 06)
Re: Consultant recommendations for PCI DSS compliance work? Hudson, Edward (Jan 20)
Re: Video Surveillance Requirements Hudson, Edward (Jan 14)
Emergency Communication Tools Hudson, Edward (Mar 16)

Hugh Burley

Re: Anyone using Webdrive for secure file transfers? Hugh Burley (Jan 21)
Re: Anyone using Q1 Labs QRadar SIEM? Hugh Burley (Mar 18)
Re: ISO 27000 Hugh Burley (Jan 18)

i-Society 2010

Call for Papers: i-Society 2010! i-Society 2010 (Jan 06)

James C. Farr '05

Re: Systems Acquisition and Development standard James C. Farr '05 (Jan 29)
Re: Lost & Found mobile devices James C. Farr '05 (Feb 25)
Lost and Found James C. Farr '05 (Feb 02)
Re: Lost and Found James C. Farr '05 (Feb 05)

James Cooley

Re: External LDAP Authentication through the firewall James Cooley (Jan 08)

James R. Pardonek

Re: Securing common access computers James R. Pardonek (Mar 25)

Janine A Roeth

Security Language in Leasing Agreements. Janine A Roeth (Feb 26)

Jansen, Morgan R.

Re: HIPAA Business Associate/Identity Theft Prevention Agreement Jansen, Morgan R. (Feb 23)
Re: Enforcement of Security Training for Faculty/Staff Jansen, Morgan R. (Mar 01)
Re: Lower Meridan school updates Jansen, Morgan R. (Mar 22)
Re: Are users right in rejecting security advice? Jansen, Morgan R. (Mar 17)
Re: Problems with Hotmail deleting incoming mail Jansen, Morgan R. (Mar 26)
Re: Are users right in rejecting security advice? Jansen, Morgan R. (Mar 17)

Jason C. Belford

Re: Anyone using Webdrive for secure file transfers? Jason C. Belford (Jan 21)

Jason Chambers

Re: Patching iTunes and Firefox Jason Chambers (Feb 09)

Jason Testart

Re: Discontinuing student email service Jason Testart (Jan 26)

Jay Graham

SSL VPN Question Jay Graham (Mar 05)
Mass E-mail to Students, Staff, and Faculty Jay Graham (Feb 03)
Clientless SSL VPN vulnerability Jay Graham (Mar 05)

Jeff Giacobbe

Re: Listserv's Jeff Giacobbe (Feb 10)
Re: recommendations for an SSH client? Jeff Giacobbe (Feb 23)

Jeff Hardy

Re: Email Spam (inbound and outbound) and Malware Protection Jeff Hardy (Feb 01)

Jeff Kell

Marketscore proxies... Jeff Kell (Jan 12)
torpig in holt DELL INC 172.17.72.96 00:12:3F:63:E0:95 HLT-CM-2 Fa0/10 { 239D2 } Jeff Kell (Jan 11)
Re: Policy Enforcement Jeff Kell (Mar 26)
Re: Server naming conventions Jeff Kell (Feb 11)
Re: Listserv's Jeff Kell (Feb 10)
Re: Marketscore proxies... Jeff Kell (Jan 12)
Re: Marketscore proxies... Jeff Kell (Jan 12)

Jeffrey I. Schiller

Re: The value of 'least privilege' Jeffrey I. Schiller (Mar 30)

Jesse Thompson

Re: Membership in REN-ISAC? Jesse Thompson (Jan 04)
Re: Membership in REN-ISAC? Jesse Thompson (Jan 04)
Re: Discontinuing student email service Jesse Thompson (Jan 26)
Re: Email Spam (inbound and outbound) and Malware Protection Jesse Thompson (Feb 01)
Re: Anyone using SPF/SRS/SenderID ? Jesse Thompson (Jan 07)
Re: Anyone using SPF/SRS/SenderID ? Jesse Thompson (Jan 06)
Re: Discontinuing student email service Jesse Thompson (Jan 26)
Re: Membership in REN-ISAC? Jesse Thompson (Jan 04)
Re: Anyone using SPF/SRS/SenderID ? Jesse Thompson (Jan 08)
Re: Discontinuing student email service Jesse Thompson (Jan 26)

Joe Artz

Re: Patching iTunes and Firefox Joe Artz (Feb 10)

Joel Rosenblatt

Re: password vs pass-phrase Joel Rosenblatt (Mar 18)
Re: password vs pass-phrase Joel Rosenblatt (Mar 18)
Re: High levels of DMCA notifications Joel Rosenblatt (Jan 01)
Re: Discoverability of expired tapes? Joel Rosenblatt (Jan 06)
Re: significant incoming SSH volume Joel Rosenblatt (Mar 16)
Re: Spam Counts. Joel Rosenblatt (Jan 21)
Re: Video Surveillance Requirements Joel Rosenblatt (Jan 14)
Re: Researcher seeks volunteers for interview Joel Rosenblatt (Mar 04)
Re: High levels of DMCA notifications Joel Rosenblatt (Jan 04)
Re: Mass E-mail to Students, Staff, and Faculty Joel Rosenblatt (Feb 04)
Re: Metasploit and NeXpose Joel Rosenblatt (Jan 13)

Joe St Sauver

Re: Are users right in rejecting security advice? Joe St Sauver (Mar 17)
Re: Spam Counts Joe St Sauver (Jan 22)
Re: recommendations for an SSH client? Joe St Sauver (Feb 23)

Joe Vieira

Re: Log Management Joe Vieira (Mar 05)
Re: significant incoming SSH volume Joe Vieira (Mar 16)
Re: Listserv's Joe Vieira (Feb 10)
Re: Listserv's Joe Vieira (Feb 10)

John Baines

Re: email archive program for exchange John Baines (Jan 05)
Re: Experience outsourcing student email to Live@edu John Baines (Jan 27)
Re: Email Spam (inbound and outbound) and Malware Protection John Baines (Jan 29)

John C Borne

Voice Recognition Password Reset John C Borne (Jan 19)

John Kaftan

It's all in a Domain Name John Kaftan (Mar 18)

John Kristoff

Re: recommendations for an SSH client? John Kristoff (Feb 23)
Re: Vyatta routers John Kristoff (Mar 29)
Re: significant incoming SSH volume John Kristoff (Mar 16)
Re: Vyatta routers John Kristoff (Mar 25)
Re: It's all in a Domain Name John Kristoff (Mar 18)
Re: Server naming conventions John Kristoff (Feb 10)

John Ladwig

Re: Are users right in rejecting security advice? John Ladwig (Mar 18)
Re: Are users right in rejecting security advice? John Ladwig (Mar 18)
Re: PCI and common access computers John Ladwig (Mar 25)
Re: Address allocation on the network - DHCP, IPv6 etc. John Ladwig (Mar 19)
Re: Policy Enforcement John Ladwig (Mar 26)

John Nunnally

Re: Are users right in rejecting security advice? John Nunnally (Mar 17)

Jonathan Byrne

Re: Exposing security questions Jonathan Byrne (Jan 20)

Jones, Dan

Re: Discoverability of expired tapes? Jones, Dan (Jan 06)
Re: Security Training in new mailbox email Jones, Dan (Jan 20)
Re: Higher Ed Breach Articles Jones, Dan (Mar 03)
Re: Server naming conventions Jones, Dan (Feb 10)
Re: Scoring Security Controls in an RFP Jones, Dan (Mar 18)

Joseph Clark

Re: Juniper gateway choices Joseph Clark (Jan 20)

Josh Richard

Re: IPtables versus Tcp_wrapper Josh Richard (Mar 03)
Re: IPtables versus Tcp_wrapper Josh Richard (Mar 04)
Re: IPtables versus Tcp_wrapper Josh Richard (Mar 04)
Re: IPtables versus Tcp_wrapper Josh Richard (Mar 03)

j.price

Re: PCI compliance on a university network (an unlikely occurance) j.price (Jan 05)
Re: The world of PCI and online registration gateways j.price (Mar 05)
Re: Email Archiving j.price (Jan 22)
PCI Standards Training in Phoenix February 22 & 23rd j.price (Jan 22)

Julian Y. Koh

Re: Now: BSD and Juniper VPN, was Re: Juniper SSL VPN Training Recommendations Julian Y. Koh (Feb 15)
Re: Discontinuing student email service Julian Y. Koh (Jan 26)
Re: Juniper SSL VPN Training Recommendations Julian Y. Koh (Feb 12)
Re: Juniper SSL VPN Training Recommendations Julian Y. Koh (Feb 12)
Re: Server naming conventions Julian Y. Koh (Feb 11)
Re: Listserv's Julian Y. Koh (Feb 10)
Re: virtual machines Julian Y. Koh (Mar 22)
Re: Server naming conventions Julian Y. Koh (Feb 10)
Re: Windows 7 and a Cisco 3000 series concentrator Julian Y. Koh (Mar 10)
Re: How to Protect Campus Sensitive Servers Julian Y. Koh (Feb 04)
Re: How to Protect Campus Sensitive Servers Julian Y. Koh (Feb 04)

Justin Azoff

Re: Log Management Justin Azoff (Mar 05)
Re: Are users right in rejecting security advice? Justin Azoff (Mar 17)

Justin C. Klein Keane

Re: Metasploit and NeXpose Justin C. Klein Keane (Jan 14)

Justin Sherenco

ID theft hits 3.3 million college students Justin Sherenco (Mar 27)

Justin Sipher

significant incoming SSH volume Justin Sipher (Mar 16)

Katie Weaver

Re: Are users right in rejecting security advice? Katie Weaver (Mar 18)

Ken Connelly

Re: Spam Counts Ken Connelly (Jan 23)
Re: Marketscore proxies... Ken Connelly (Jan 12)
Re: Uptick in SSH attempts; anyone else ? Ken Connelly (Jan 18)
Re: email archive program for exchange Ken Connelly (Jan 04)
Re: Membership in REN-ISAC? Ken Connelly (Jan 04)
Re: Retiree Email Accounts Ken Connelly (Feb 01)
Re: Discontinuing student email service Ken Connelly (Jan 26)
Re: Are users right in rejecting security advice? Ken Connelly (Mar 17)
SEC10 PGP keysigning party Ken Connelly (Feb 24)
Re: password vs pass-phrase Ken Connelly (Mar 18)
Re: HIPAA Business Associate/Identity Theft Prevention Agreement Ken Connelly (Feb 22)
Re: Server naming conventions Ken Connelly (Feb 10)
Re: Higher Ed Breach Articles Ken Connelly (Mar 03)
Re: Membership in REN-ISAC? Ken Connelly (Jan 04)

Kenneth Arnold

Re: It's all in a Domain Name Kenneth Arnold (Mar 18)
Re: Mass E-mail to Students, Staff, and Faculty Kenneth Arnold (Feb 03)
Re: Listserv's Kenneth Arnold (Feb 10)
Email account used by multiple people Kenneth Arnold (Mar 11)

Kerry Havens

Re: program similar to OSSEC Kerry Havens (Feb 16)

Kevin Carmical

Re: Vyatta routers Kevin Carmical (Mar 26)
Vyatta routers Kevin Carmical (Mar 19)

Kevin Kelly

Re: Email Spam (inbound and outbound) and Malware Protection Kevin Kelly (Jan 29)
Re: Retiree Email Accounts Kevin Kelly (Feb 01)
Re: Patching iTunes and Firefox Kevin Kelly (Feb 09)
Re: Server naming conventions Kevin Kelly (Feb 10)

Kevin Shalla

Re: Exposing security questions Kevin Shalla (Jan 22)

Kevin Skelly

Re: Email account used by multiple people Kevin Skelly (Mar 11)

Kevin Wilcox

Now: BSD and Juniper VPN, was Re: Juniper SSL VPN Training Recommendations Kevin Wilcox (Feb 15)
Re: SSL VPN Question Kevin Wilcox (Mar 05)
Re: Are users right in rejecting security advice? Kevin Wilcox (Mar 18)
Re: IPtables versus Tcp_wrapper Kevin Wilcox (Mar 04)
Re: IPtables versus Tcp_wrapper Kevin Wilcox (Mar 03)
Re: program similar to OSSEC Kevin Wilcox (Feb 16)
Re: Juniper SSL VPN Training Recommendations Kevin Wilcox (Feb 12)
Re: Opinions on malwarebytes virus cleanup software? Kevin Wilcox (Feb 22)
Re: Are users right in rejecting security advice? Kevin Wilcox (Mar 18)
Re: recommendations for an SSH client? Kevin Wilcox (Feb 23)
Re: Vendor Access Kevin Wilcox (Mar 04)
Re: Administering OSSEC Kevin Wilcox (Feb 16)
Re: Are users right in rejecting security advice? Kevin Wilcox (Mar 18)

Kieper, David

Re: Listserv's Kieper, David (Feb 10)

Kimberly Heimbrock

Re: Enforcement of Security Training for Faculty/Staff Kimberly Heimbrock (Mar 11)
Re: Mass E-mail to Students, Staff, and Faculty Kimberly Heimbrock (Feb 03)

King, Ronald A.

Nessus And Metasploit King, Ronald A. (Jan 26)
Re: Log Management King, Ronald A. (Mar 05)

Kris Monroe

Anyone using Webdrive for secure file transfers? Kris Monroe (Jan 21)

Lanham, Sean

Job Posting - Information Security Analyst Lanham, Sean (Mar 26)

Laurie Zirkle

Re: Server naming conventions Laurie Zirkle (Feb 11)
Re: New Thawte Enterprise Certificate Center Laurie Zirkle (Jan 12)
Re: Server naming conventions Laurie Zirkle (Feb 11)

Lazarus, Carolann

FW: Are users right in rejecting security advice? Lazarus, Carolann (Mar 19)

Leilani Lauger

ISO 27000 Leilani Lauger (Jan 14)

Leon DuPree

Re: Are users right in rejecting security advice? Leon DuPree (Mar 23)

Linda VanHorn

Experience outsourcing student email to Live@edu Linda VanHorn (Jan 25)

Logan, Kim (loganks)

Re: Higher Ed Breach Articles Logan, Kim (loganks) (Mar 03)

Lorenz, Eva

Re: HIPAA Business Associate/Identity Theft Prevention Agreement Lorenz, Eva (Feb 22)
Re: Security Training in new mailbox email Lorenz, Eva (Jan 20)
Re: Mass E-mail to Students, Staff, and Faculty Lorenz, Eva (Feb 03)
Re: ISO 27000 Lorenz, Eva (Jan 14)
Re: Email Archiving Lorenz, Eva (Jan 20)
Re: Video Surveillance Requirements Lorenz, Eva (Jan 14)
Re: High levels of DMCA notifications Lorenz, Eva (Jan 05)
Re: Uptick in SSH attempts; anyone else ? Lorenz, Eva (Jan 18)
Re: Experience outsourcing student email to Live@edu Lorenz, Eva (Jan 27)
Re: High levels of DMCA notifications Lorenz, Eva (Jan 01)
Re: Systems Acquisition and Development standard Lorenz, Eva (Jan 29)
Re: Retiree Email Accounts Lorenz, Eva (Feb 01)
Re: ISO 27000 Lorenz, Eva (Jan 19)

Manuel Amaral

Re: Streamlined PGP WDE Deployment Manuel Amaral (Mar 04)

Mark Borrie

Re: New Thawte Enterprise Certificate Center Mark Borrie (Jan 11)
Re: Email Spam (inbound and outbound) and Malware Protection Mark Borrie (Jan 31)

Mark Montague

Re: Email account used by multiple people Mark Montague (Mar 11)
Re: Researcher seeks volunteers for interview Mark Montague (Mar 04)

Mark Newman

i-Society 2010: CALL FOR WORKSHOPS AND TUTORIALS Mark Newman (Jan 06)

Mark Reboli

email archive program for exchange Mark Reboli (Jan 04)

Mark Rogowski

Re: Opinions on malwarebytes virus cleanup software? Mark Rogowski (Feb 23)

Matt Arthur

Re: Email Archiving Matt Arthur (Jan 20)

Matthew Giannetto

Enforcement of Security Training for Faculty/Staff Matthew Giannetto (Feb 28)

Matthew Gracie

Spam Counts. Matthew Gracie (Jan 21)
Re: It's all in a Domain Name Matthew Gracie (Mar 18)
Re: External LDAP Authentication through the firewall Matthew Gracie (Jan 08)
Re: Address allocation on the network - DHCP, IPv6 etc. Matthew Gracie (Mar 19)
Re: Discontinuing student email service Matthew Gracie (Jan 26)
Re: Server naming conventions Matthew Gracie (Feb 10)
Re: Discontinuing student email service Matthew Gracie (Jan 26)
Re: Email Spam (inbound and outbound) and Malware Protection Matthew Gracie (Jan 29)
Re: smart phones/mobile devices Matthew Gracie (Mar 03)
SANS Presentation in Buffalo. Matthew Gracie (Jan 25)

Matthew Wollenweber

Re: The value of 'least privilege' Matthew Wollenweber (Mar 30)
Re: Metasploit and NeXpose Matthew Wollenweber (Jan 14)
Re: High levels of DMCA notifications Matthew Wollenweber (Jan 01)
Re: Membership in REN-ISAC? Matthew Wollenweber (Jan 04)

Mayne, Jim

Waiver of responsibility for emailed PHI Mayne, Jim (Feb 18)
Re: PCI and common access computers Mayne, Jim (Mar 25)

McCrary, Barbara

Re: Email Spam (inbound and outbound) and Malware Protection McCrary, Barbara (Feb 14)
Re: computer security vision for next 3-5 years McCrary, Barbara (Jan 12)
Re: computer security vision for next 3-5 years McCrary, Barbara (Jan 13)
Re: Security Training in new mailbox email McCrary, Barbara (Jan 21)
Re: Server naming conventions McCrary, Barbara (Feb 11)
Re: Opinions on malwarebytes virus cleanup software? McCrary, Barbara (Feb 22)

Mclaughlin, Kevin (mclaugkl)

Re: Are users right in rejecting security advice? Mclaughlin, Kevin (mclaugkl) (Mar 17)
Re: Are users right in rejecting security advice? Mclaughlin, Kevin (mclaugkl) (Mar 16)
Re: Are users right in rejecting security advice? Mclaughlin, Kevin (mclaugkl) (Mar 17)
Re: Are users right in rejecting security advice? Mclaughlin, Kevin (mclaugkl) (Mar 17)

Megan Carney

Re: Researcher seeks volunteers for interview Megan Carney (Mar 08)

Melissa Muth

Re: smart phones/mobile devices Melissa Muth (Mar 05)

Michael Fertig

Re: Batch importing into Active Directory Michael Fertig (Feb 25)

Michael Fink

Re: Scoring Security Controls in an RFP Michael Fink (Mar 18)

Michael Horne

Re: significant incoming SSH volume Michael Horne (Mar 16)

Michael J. Wheeler

Re: Server naming conventions Michael J. Wheeler (Feb 11)
Re: Discontinuing student email service Michael J. Wheeler (Jan 26)
Re: Discontinuing student email service Michael J. Wheeler (Jan 26)
Re: Server naming conventions Michael J. Wheeler (Feb 11)
Re: External LDAP Authentication through the firewall Michael J. Wheeler (Jan 08)
Re: Discontinuing student email service Michael J. Wheeler (Jan 26)
Re: significant incoming SSH volume Michael J. Wheeler (Mar 16)
Re: significant incoming SSH volume Michael J. Wheeler (Mar 18)

Michael Natale

Re: Content Filter Michael Natale (Mar 16)
Content Filter Michael Natale (Mar 15)

Michael Sana

Re: Securing common access computers Michael Sana (Mar 24)
Re: Metasploit and NeXpose Michael Sana (Jan 13)
Re: Emergency Communication Tools Michael Sana (Mar 16)
Re: Multiple users - one PC - best product?? Michael Sana (Mar 27)
Re: Consultant recommendations for PCI DSS compliance work? Michael Sana (Jan 20)
Re: Securing common access computers Michael Sana (Mar 24)

Michael Sinatra

Re: computer security vision for next 3-5 years Michael Sinatra (Jan 12)
Re: Are users right in rejecting security advice? Michael Sinatra (Mar 17)
Re: It's all in a Domain Name Michael Sinatra (Mar 18)
Re: Are users right in rejecting security advice? Michael Sinatra (Mar 17)
Re: 7 Things You Should Know About DNSSEC Michael Sinatra (Feb 02)
Re: Are users right in rejecting security advice? Michael Sinatra (Mar 17)
Re: Are users right in rejecting security advice? Michael Sinatra (Mar 17)
Re: computer security vision for next 3-5 years Michael Sinatra (Jan 13)

Michael Van Norman

Re: Are users right in rejecting security advice? Michael Van Norman (Mar 17)

Michael Wilber

SPF or Text DNS Records for Outbound Campus Mail Michael Wilber (Feb 01)

Michelle Young

Re: Researcher seeks volunteers for interview Michelle Young (Mar 04)
Researcher seeks volunteers for interview Michelle Young (Mar 04)

Mike Hanson

Open DNS Mike Hanson (Jan 13)
Re: Content Filter Mike Hanson (Mar 16)
McAfee Web Gateway Mike Hanson (Jan 12)
Re: The value of 'least privilege' Mike Hanson (Mar 30)
Sans 509 Securing Oracle class Mike Hanson (Jan 08)

Mike Iglesias

Re: significant incoming SSH volume Mike Iglesias (Mar 16)

Mike Lococo

Re: virtual machines Mike Lococo (Mar 22)

Mike Waite

Re: Researcher seeks volunteers for interview Mike Waite (Mar 04)

Miller, Don C.

Re: Email account used by multiple people Miller, Don C. (Mar 12)
Re: significant incoming SSH volume Miller, Don C. (Mar 18)
Re: Batch importing into Active Directory Miller, Don C. (Feb 24)
Re: RESENT - File Sharing with Active Directory (AD) - migrating off of Novel File Sharing Miller, Don C. (Feb 24)
Re: RESENT - File Sharing with Active Directory (AD) - migrating off of Novel File Sharing Miller, Don C. (Feb 24)
Re: Batch importing into Active Directory Miller, Don C. (Feb 24)

Monique Yeaton

Academic Impressions courses Monique Yeaton (Feb 08)
Training Courses Monique Yeaton (Feb 09)

Montana Quiring

Re: Spam Counts. Montana Quiring (Jan 21)

Moore, Frank

Re: Experience outsourcing student email to Live@edu Moore, Frank (Jan 25)
Re: Discontinuing student email service Moore, Frank (Jan 26)
Re: Discontinuing student email service Moore, Frank (Jan 26)
Re: Discontinuing student email service Moore, Frank (Jan 26)

Nathan Hay

Re: NetEqualizer Feedback Nathan Hay (Jan 20)

Neal McCorkle

Re: program similar to OSSEC Neal McCorkle (Feb 16)

Neil Gaede

Re: Listserv's Neil Gaede (Feb 11)
Re: Server naming conventions Neil Gaede (Feb 10)

Neil Matatall

CFP/CFT OWASP AppSec USA 2010 CA Sept 7-10 2010 Neil Matatall (Feb 17)

Ness, Carl J

Re: Researcher seeks volunteers for interview Ness, Carl J (Mar 04)

O'Callaghan, Daniel

Re: Best Forensic Tools? O'Callaghan, Daniel (Mar 30)
Re: ALERT: Targeted attacks on institutional online banking O'Callaghan, Daniel (Mar 31)

Ozzie Paez

Re: computer security vision for next 3-5 years Ozzie Paez (Jan 13)
Re: Vendor Access Ozzie Paez (Mar 04)
Re: Systems Acquisition and Development standard Ozzie Paez (Jan 29)
Re: computer security vision for next 3-5 years Ozzie Paez (Jan 13)
Re: Video Surveillance Requirements Ozzie Paez (Jan 14)
Re: virtual machines Ozzie Paez (Mar 22)

Parker, Ron

Re: Server naming conventions Parker, Ron (Feb 10)

Patria, Patricia

Re: Enforcement of Security Training for Faculty/Staff Patria, Patricia (Mar 01)
Re: Systems Acquisition and Development standard Patria, Patricia (Jan 29)
Re: Systems Acquisition and Development standard Patria, Patricia (Jan 29)

Patricia Vendt

Re: PCI and common access computers Patricia Vendt (Mar 25)
Re: PCI and common access computers Patricia Vendt (Mar 25)

Patrick Goggins

Re: Content Filter Patrick Goggins (Mar 16)
Re: Securing common access computers Patrick Goggins (Mar 24)
Re: virtual machines Patrick Goggins (Mar 22)
Re: Securing common access computers Patrick Goggins (Mar 24)
Re: Best Forensic Tools? Patrick Goggins (Mar 30)

Patrick Laughran

Re: computer security vision for next 3-5 years Patrick Laughran (Jan 13)
Re: PCI and common access computers Patrick Laughran (Mar 25)
Re: Consultant recommendations for PCI DSS compliance work? Patrick Laughran (Jan 20)

Patrick Ouellette

Re: Video Surveillance Requirements Patrick Ouellette (Jan 14)
Re: Are users right in rejecting security advice? Patrick Ouellette (Mar 17)
Re: PCI and common access computers Patrick Ouellette (Mar 25)
Re: Are users right in rejecting security advice? Patrick Ouellette (Mar 17)
Re: Windows 7 and a Cisco 3000 series concentrator Patrick Ouellette (Mar 10)

Patrick P Murphy

Re: recommendations for an SSH client? Patrick P Murphy (Feb 23)
Re: recommendations for an SSH client? Patrick P Murphy (Feb 23)
Re: Video Surveillance Requirements Patrick P Murphy (Jan 14)

Paul Keser

Re: Oracle Event Notifications Paul Keser (Jan 08)
Re: Managing App/Equip/Peripheral Status and Release Information Paul Keser (Mar 18)

Payne, Shirley (scp8b)

Re: ISO 27000 Payne, Shirley (scp8b) (Jan 15)

Perloff, Jim

Re: Server naming conventions Perloff, Jim (Feb 10)
Re: Are users right in rejecting security advice? Perloff, Jim (Mar 17)
Re: Server naming conventions Perloff, Jim (Feb 10)

Pete Hickey

Re: Server naming conventions Pete Hickey (Feb 11)
Re: How to Protect Campus Sensitive Servers Pete Hickey (Feb 04)
Re: Server naming conventions Pete Hickey (Feb 10)

Peter Charbonneau

Sumo Linux Peter Charbonneau (Feb 22)
Windows 7 and a Cisco 3000 series concentrator Peter Charbonneau (Mar 10)
Re: Sumo Linux Peter Charbonneau (Feb 22)

Plesco, Todd

The world of PCI and online registration gateways Plesco, Todd (Feb 19)
Higher Ed Breach Articles Plesco, Todd (Mar 03)
Re: Lost & Found mobile devices Plesco, Todd (Feb 25)
Security Training in new mailbox email Plesco, Todd (Jan 20)
Re: Security Training in new mailbox email Plesco, Todd (Jan 20)
Re: email archive program for exchange Plesco, Todd (Jan 06)
Lost & Found mobile devices Plesco, Todd (Feb 25)

Pratt, Roberta

Re: Spam Counts Pratt, Roberta (Jan 22)

Pufahl, Jason

Re: Log Management Pufahl, Jason (Mar 05)

Quackenbush, Darlene

Re: Mass E-mail to Students, Staff, and Faculty Quackenbush, Darlene (Feb 04)
Re: Mass E-mail to Students, Staff, and Faculty Quackenbush, Darlene (Feb 04)

Randall C Grimshaw

Re: Need SQL guru to help match DNS data to malware domains Randall C Grimshaw (Feb 11)

randy marchany

Re: The value of 'least privilege' randy marchany (Mar 30)
VA Tech SEC 560 onsite class registration www site is up randy marchany (Mar 05)
Re: Video Surveillance Requirements randy marchany (Jan 14)
Re: Email account used by multiple people randy marchany (Mar 11)
SANS SEC 560 "Network Pen Test & Ethical Hacking", Onsite, VA Tech, $800/person randy marchany (Mar 11)
Re: The value of 'least privilege' randy marchany (Mar 30)

Ravi Kumar

Re: Outsourcing student email Ravi Kumar (Feb 08)

Ray McClure

Re: Content Filter Ray McClure (Mar 16)

Raymond, Jessica

Anyone using Q1 Labs QRadar SIEM? Raymond, Jessica (Mar 17)

Razi Ahmad

Re: Juniper SSL VPN Training Recommendations Razi Ahmad (Feb 12)

Reyes, Esteban

NetEqualizer Feedback Reyes, Esteban (Jan 19)

Richard A MacLaughlin

Re: Identity Finder Richard A MacLaughlin (Jan 05)

Richard Hopkins

Re: Opinions on malwarebytes virus cleanup software? Richard Hopkins (Feb 23)
Re: Mass E-mail to Students, Staff, and Faculty Richard Hopkins (Feb 05)
Re: How to Protect Campus Sensitive Servers Richard Hopkins (Feb 05)
Re: Lost & Found mobile devices Richard Hopkins (Feb 26)
Re: Lost and Found Richard Hopkins (Feb 05)
Re: Lost and Found Richard Hopkins (Feb 08)

Robert Kerr

Re: Address allocation on the network - DHCP, IPv6 etc. Robert Kerr (Mar 19)
Re: Sumo Linux Robert Kerr (Feb 22)

Rob Tanner

Exposing security questions Rob Tanner (Jan 20)

Rodney Petersen

Introducing IAM Online - a new resource for Identity and Access Management Rodney Petersen (Feb 02)

Roger Safian

Re: password vs pass-phrase (was: Are users right in rejecting security advice?) Roger Safian (Mar 18)
Re: Retiree Email Accounts Roger Safian (Feb 01)
Re: Are users right in rejecting security advice? Roger Safian (Mar 17)

Ronald Blitz

Re: Mass E-mail to Students, Staff, and Faculty Ronald Blitz (Feb 03)

Russell Fulton

mariposa arrests Russell Fulton (Mar 03)
Re: New Thawte Enterprise Certificate Center Russell Fulton (Jan 12)
Re: password vs pass-phrase Russell Fulton (Mar 18)
anyone using OSSIM.... Russell Fulton (Mar 15)
Re: Are users right in rejecting security advice? Russell Fulton (Mar 17)
Re: significant incoming SSH volume Russell Fulton (Mar 17)
Re: Third-Party Network Connection Agreement Russell Fulton (Feb 11)
Re: password vs pass-phrase Russell Fulton (Mar 19)
Need SQL guru to help match DNS data to malware domains Russell Fulton (Feb 11)
Re: Are users right in rejecting security advice? Russell Fulton (Mar 18)
Re: Are users right in rejecting security advice? Russell Fulton (Mar 18)
Re: password vs pass-phrase Russell Fulton (Mar 27)
Re: Membership in REN-ISAC? Russell Fulton (Jan 08)
Re: Server naming conventions Russell Fulton (Feb 10)
Re: Email Spam (inbound and outbound) and Malware Protection Russell Fulton (Jan 31)
Re: Email account used by multiple people Russell Fulton (Mar 11)

Russ Harvey

Re: anyone using OSSIM.... Russ Harvey (Mar 16)

Sam Hooker

Re: Lost & Found mobile devices Sam Hooker (Feb 25)

Sam Stelfox

Re: SPF or Text DNS Records for Outbound Campus Mail Sam Stelfox (Feb 01)
Re: How to Protect Campus Sensitive Servers Sam Stelfox (Feb 04)
Re: Metasploit and NeXpose Sam Stelfox (Jan 14)

Sandra Barclay

Re: Server naming conventions Sandra Barclay (Feb 11)
Re: The world of PCI and online registration gateways Sandra Barclay (Feb 19)

Sarazen, Daniel

Re: The value of 'least privilege' Sarazen, Daniel (Mar 30)
Re: How to Protect Campus Sensitive Servers Sarazen, Daniel (Feb 04)

Sauvigne, Craig M

Re: Server naming conventions Sauvigne, Craig M (Feb 10)
Re: New Thawte Enterprise Certificate Center Sauvigne, Craig M (Jan 13)

SCHALIP, MICHAEL

Re: Securing common access computers SCHALIP, MICHAEL (Mar 24)
Re: Securing common access computers SCHALIP, MICHAEL (Mar 24)
Re: Are users right in rejecting security advice? SCHALIP, MICHAEL (Mar 23)
Re: virtual machines SCHALIP, MICHAEL (Mar 22)
Multiple users - one PC - best product?? SCHALIP, MICHAEL (Mar 26)
Re: virtual machines SCHALIP, MICHAEL (Mar 22)
Re: Best Forensic Tools - the ones that law enforcement use.... SCHALIP, MICHAEL (Mar 30)
Re: Multiple users - one PC - best product?? SCHALIP, MICHAEL (Mar 27)

schilling

Re: How to Protect Campus Sensitive Servers - Solution schilling (Feb 05)
Re: Anyone using Q1 Labs QRadar SIEM? schilling (Mar 17)
Re: How to Protect Campus Sensitive Servers schilling (Feb 04)
Re: How to Protect Campus Sensitive Servers schilling (Feb 04)
Re: External LDAP Authentication through the firewall schilling (Jan 08)
Re: How to Protect Campus Sensitive Servers - Solution schilling (Feb 05)
How to Protect Campus Sensitive Servers schilling (Feb 04)

Schoenefeld, Keith

Re: Standards? Whitepaper? RE: virtual machines Schoenefeld, Keith (Mar 22)

Scott Beardsley

Re: significant incoming SSH volume Scott Beardsley (Mar 19)

Scott O. Bradner

Re: Exposing security questions Scott O. Bradner (Jan 20)

Scott Sweren

Oracle Event Notifications Scott Sweren (Jan 08)
Policy Enforcement Scott Sweren (Mar 26)
Re: ISO 27000 Scott Sweren (Jan 15)

Sean Maher

Re: Streamlined PGP WDE Deployment Sean Maher (Feb 26)

Sheri J Thompson

Re: Retiree Email Accounts Sheri J Thompson (Feb 01)

Sherry Callahan

Re: Enforcement of Security Training for Faculty/Staff Sherry Callahan (Mar 01)

Sherry Horeanopoulos

Re: Server naming conventions Sherry Horeanopoulos (Feb 11)
Re: Higher Ed Breach Articles Sherry Horeanopoulos (Mar 03)
Re: Server naming conventions Sherry Horeanopoulos (Feb 10)
Re: Experience outsourcing student email to Live@edu Sherry Horeanopoulos (Jan 25)

Solomon Asmelash

Re: Content Filter Solomon Asmelash (Mar 15)

Stanclift, Michael

Re: Server naming conventions Stanclift, Michael (Feb 10)
Re: Server naming conventions Stanclift, Michael (Feb 11)
Microsoft KB979352 & Adobe Reader Stanclift, Michael (Jan 25)
Re: Email Spam (inbound and outbound) and Malware Protection Stanclift, Michael (Jan 29)
Extorting student file sharers Stanclift, Michael (Feb 09)
Re: Patching iTunes and Firefox Stanclift, Michael (Feb 10)
Re: Server naming conventions Stanclift, Michael (Feb 10)
Re: Email Archiving Stanclift, Michael (Jan 20)
Re: Are users right in rejecting security advice? Stanclift, Michael (Mar 16)

St Clair, Jim

Re: computer security vision for next 3-5 years St Clair, Jim (Jan 13)

Stephen C. Gay

Streamlined PGP WDE Deployment Stephen C. Gay (Feb 26)
Re: Streamlined PGP WDE Deployment Stephen C. Gay (Mar 04)
Re: computer security vision for next 3-5 years Stephen C. Gay (Jan 12)

Stephen John Smoogen

Re: Discontinuing student email service Stephen John Smoogen (Jan 27)

Steve Brukbacher

research data security Steve Brukbacher (Feb 18)

STEVE MAGRIBY

Re: Outsourcing student email STEVE MAGRIBY (Feb 08)
Batch importing into Active Directory STEVE MAGRIBY (Feb 12)
Outsourcing student email STEVE MAGRIBY (Feb 08)
Re: Email Spam (inbound and outbound) and Malware Protection STEVE MAGRIBY (Jan 29)
Re: research data security STEVE MAGRIBY (Feb 18)

Steven Alexander

Re: password vs pass-phrase (was: Are users right in rejecting security advice?) Steven Alexander (Mar 18)
Re: Are users right in rejecting security advice? Steven Alexander (Mar 17)
Re: password vs pass-phrase (was: Are users right in rejecting security advice?) Steven Alexander (Mar 17)
Re: Researcher seeks volunteers for interview Steven Alexander (Mar 04)

Steven Bourdon

HIPAA Business Associate/Identity Theft Prevention Agreement Steven Bourdon (Feb 22)
Re: HIPAA Business Associate/Identity Theft Prevention Agreement Steven Bourdon (Feb 23)

Steven Tardy

Re: Server naming conventions Steven Tardy (Feb 11)

Steve Werby

Re: The value of 'least privilege' Steve Werby (Mar 30)
Re: ID theft hits 3.3 million college students Steve Werby (Mar 27)
Re: e-discovery software and outsourcing insights? Steve Werby (Mar 10)
Re: Enforcement of Security Training for Faculty/Staff Steve Werby (Mar 11)
e-discovery software and outsourcing insights? Steve Werby (Feb 26)
Re: e-discovery software and outsourcing insights? Steve Werby (Mar 10)

Stewart James

Re: Need SQL guru to help match DNS data to malware domains Stewart James (Feb 11)
Re: Need SQL guru to help match DNS data to malware domains Stewart James (Feb 11)

Stucky, David

Re: Server naming conventions Stucky, David (Feb 11)

Terence Ma

Re: Discontinuing student email service Terence Ma (Jan 26)
Re: Securing common access computers Terence Ma (Mar 24)
Re: email archive program for exchange Terence Ma (Jan 04)

Terry Gray

Re: Experience outsourcing student email to Live@edu Terry Gray (Jan 27)

Then, Keri

List of Products to Manage App/Equip/Peripheral Status and Release Information Then, Keri (Mar 22)
Managing App/Equip/Peripheral Status and Release Information Then, Keri (Mar 18)
List of Products to Manage App/Equip/Peripheral Status and Release Information Then, Keri (Mar 22)

Theresa Semmens

Request for questions/suggestions for Educause IT Security Conference Hot Topic Theresa Semmens (Mar 23)
Standards? Whitepaper? RE: virtual machines Theresa Semmens (Mar 22)

Thomas Siu, Case CISO

Security Staffing Survey Thomas Siu, Case CISO (Mar 16)

Tim Cline

recommendations for an SSH client? Tim Cline (Feb 23)

Tim Gurganus

Re: RockYou password list? Tim Gurganus (Jan 22)

Timothy Fairlie

Re: Server naming conventions Timothy Fairlie (Feb 11)

Timothy Payne

Re: Exposing security questions Timothy Payne (Jan 20)
Re: Streamlined PGP WDE Deployment Timothy Payne (Feb 26)

Todd Britton

Re: The world of PCI and online registration gateways Todd Britton (Feb 19)
Re: Securing common access computers Todd Britton (Mar 24)
Re: Higher Ed Breach Articles Todd Britton (Mar 03)

Todd Gould

Re: Cisco ACS 3.3 Certificate Configuration Todd Gould (Mar 17)

Tom Jackson

Re: Anyone using Webdrive for secure file transfers? Tom Jackson (Jan 21)

Tonkin, Derek K

Re: Streamlined PGP WDE Deployment Tonkin, Derek K (Feb 26)

Tracy Mitrano

Re: Mass E-mail to Students, Staff, and Faculty Tracy Mitrano (Feb 04)
High levels of DMCA notifications Tracy Mitrano (Jan 04)
Re: Video Surveillance Requirements Tracy Mitrano (Jan 14)
Re: research data security Tracy Mitrano (Feb 18)
Re: Experience outsourcing student email to Live@edu Tracy Mitrano (Jan 27)
Re: Email Archiving Tracy Mitrano (Jan 20)

Truong, Joseph

Re: Cisco ACS 3.3 Certificate Configuration Truong, Joseph (Mar 17)

Usami, Saburo

Re: Content Filter Usami, Saburo (Mar 16)

Valdis Kletnieks

Re: password vs pass-phrase (was: Are users right in rejecting security advice?) Valdis Kletnieks (Mar 18)
Re: IPtables versus Tcp_wrapper Valdis Kletnieks (Mar 04)
Re: Policy Enforcement Valdis Kletnieks (Mar 26)
Re: Standards? Whitepaper? RE: virtual machines Valdis Kletnieks (Mar 22)
Re: computer security vision for next 3-5 years Valdis Kletnieks (Jan 12)
Re: It's all in a Domain Name Valdis Kletnieks (Mar 18)
Re: Server naming conventions Valdis Kletnieks (Feb 10)
Re: Are users right in rejecting security advice? Valdis Kletnieks (Mar 17)
Re: How to Protect Campus Sensitive Servers Valdis Kletnieks (Feb 04)
Re: e-discovery software and outsourcing insights? Valdis Kletnieks (Feb 26)
Re: Researcher seeks volunteers for interview Valdis Kletnieks (Mar 04)
Re: Policy Enforcement Valdis Kletnieks (Mar 26)
Re: Are users right in rejecting security advice? Valdis Kletnieks (Mar 17)
Re: IPtables versus Tcp_wrapper Valdis Kletnieks (Mar 04)
Re: computer security vision for next 3-5 years Valdis Kletnieks (Jan 12)
Re: Sumo Linux Valdis Kletnieks (Feb 22)
Re: Listserv's Valdis Kletnieks (Feb 10)
Re: HIPAA Business Associate/Identity Theft Prevention Agreement Valdis Kletnieks (Feb 22)

Valerie Vogel

7 Things You Should Know About DNSSEC Valerie Vogel (Feb 02)
Free Webcast Next Wednesday: ISAAC (Information Security Awareness, Assessment, and Compliance)--A Success Story Valerie Vogel (Feb 19)
EDUCAUSE Live! Spotlight on Cloud Computing - Starting March 18 Valerie Vogel (Mar 15)
Next IAM Online: Provisioning Remote Users, 11-Mar-2010 Valerie Vogel (Mar 01)
Exploring or Supporting Federated Access? Come to InCommon CAMP Valerie Vogel (Mar 31)
April 8: IAM Online -- Making Federated Identity Management Happen Valerie Vogel (Mar 22)
Reminder: IAM Online Series begins this Friday Valerie Vogel (Feb 11)

Vaughn, Randal L.

CFP IEEE eCrime Researchers' Summit 2010 Vaughn, Randal L. (Mar 15)
Call for papers fifth annual IEEE eCrime Researchers summit Vaughn, Randal L. (Mar 01)

Vik Solem

Re: Membership in REN-ISAC? Vik Solem (Jan 04)
Re: Membership in REN-ISAC? Vik Solem (Jan 04)
Re: Remote Acceses Policies - VPN vs Desktop Access Vik Solem (Mar 25)
Re: Policy Enforcement Vik Solem (Mar 26)
Re: Are users right in rejecting security advice? Vik Solem (Mar 17)

Vincent Stoffer

Re: NetEqualizer Feedback Vincent Stoffer (Jan 19)

Walter Petruska

Re: Multiple users - one PC - best product?? Walter Petruska (Mar 26)

Walters, Caroline (cw8de)

Re: Email Archiving Walters, Caroline (cw8de) (Jan 20)
Re: e-discovery software and outsourcing insights? Walters, Caroline (cw8de) (Feb 26)

Warren Petrofsky

Re: Higher Ed Breach Articles Warren Petrofsky (Mar 03)

Wayne Samardzich

Re: Server naming conventions Wayne Samardzich (Feb 10)
Listserv's Wayne Samardzich (Feb 10)
Best Forensic Tools? Wayne Samardzich (Mar 30)
Re: Best Forensic Tools? Wayne Samardzich (Mar 30)

Wes Young

Re: Membership in REN-ISAC? Wes Young (Jan 04)

Whinston Antion

Laptop tracking and theft deterrents, enterprise-wide Whinston Antion (Feb 03)

Wiam Younes

Carnegie Mellon is hosting SANS "Securing Windows" course Wiam Younes (Feb 15)
Security 505: Securing Windows at Carnegie Mellon University-May 17 - 21 Wiam Younes (Mar 15)

Wier, Timothy A.

Re: Log Management Wier, Timothy A. (Mar 05)

Will Froning

Re: RESENT - File Sharing with Active Directory (AD) - migrating off of Novel File Sharing Will Froning (Feb 23)
Re: Administering OSSEC Will Froning (Feb 16)
Re: Content Filter Will Froning (Mar 15)

WILLIAM I ARNOLD

Self Service Password Reset Programs WILLIAM I ARNOLD (Jan 14)

Willis Marti

Re: Video Surveillance Requirements Willis Marti (Jan 14)
Re: Experience outsourcing student email to Live@edu Willis Marti (Jan 27)

Witmer, Robert

Re: Securing common access computers Witmer, Robert (Mar 25)
Securing common access computers Witmer, Robert (Mar 24)
Re: Remote Acceses Policies - VPN vs Desktop Access Witmer, Robert (Mar 25)

Woodruff, Daniel

Server naming conventions Woodruff, Daniel (Feb 10)
Re: Server naming conventions Woodruff, Daniel (Feb 11)

Youngquist, Jason R.

computer security vision for next 3-5 years Youngquist, Jason R. (Jan 12)
program similar to OSSEC Youngquist, Jason R. (Feb 16)
smart phones/mobile devices Youngquist, Jason R. (Mar 03)

Zach Jansen

Re: PCI and common access computers Zach Jansen (Mar 25)
Re: password vs pass-phrase (was: Are users right in rejecting security advice?) Zach Jansen (Mar 18)
Re: Best Forensic Tools? Zach Jansen (Mar 30)
Re: Securing common access computers Zach Jansen (Mar 24)
Re: Securing common access computers Zach Jansen (Mar 25)