Educause Security Discussion: by date

596 messages starting Jan 03 08 and ending Mar 31 08
Date index | Thread index | Author index


Thursday, 03 January

Authentication of remote users Gary Flynn
Re: Authentication of remote users Robert Paterson
Re: Authentication of remote users Cal Frye
Re: Authentication of remote users Bob Bayn
Re: Authentication of remote users Scott Fendley
Re: Authentication of remote users Kees Leune
Re: Authentication of remote users Christopher Webber
Re: Authentication of remote users Dave Mueller
Re: Authentication of remote users Hunt,Keith A
Re: Authentication of remote users Andrea Beesing
Re: Authentication of remote users Robert Paterson
Re: Authentication of remote users Scott Koger
Re: Authentication of remote users Tom Peterson
Info Classification Policy implementation Gianforte, Danna
Re: Authentication of remote users Chris Vakhordjian
Re: Authentication of remote users Joel Rosenblatt
Re: Authentication of remote users Roger Safian
Re: Authentication of remote users charlie derr
Re: Authentication of remote users Roger Safian
Re: Authentication of remote users Cal Frye

Friday, 04 January

Re: Authentication of remote users Doug Markiewicz
Re: Authentication of remote users Doug Markiewicz
Re: Authentication of remote users Gary Flynn
Re: Authentication of remote users Hunt,Keith A
Re: Authentication of remote users Joel Rosenblatt
Re: Authentication of remote users Gary Flynn
Re: Authentication of remote users Joel Rosenblatt
Re: Authentication of remote users Valdis Kletnieks
Re: Authentication of remote users Hunt,Keith A
Re: Authentication of remote users Jim Dillon
Re: Authentication of remote users Joel Rosenblatt
Re: Authentication of remote users Valdis Kletnieks

Tuesday, 08 January

Enterprise Vault Melissa
ActiveX killbit vs IE Add-on Disable as protection from defective controls Gary Flynn

Wednesday, 09 January

Information Security Governance Framework Doug Markiewicz
Re: Information Security Governance Framework Howell, Paul

Thursday, 10 January

Question about malware research Justin Klein Keane
E-Signatures Daniel Adinolfi
Social Network Analysis savanted1©
Re: Question about malware research Valdis Kletnieks
Re: E-Signatures Valdis Kletnieks
Re: Social Network Analysis Sarah Stevens
Re: Social Network Analysis Sarah Stevens
Re: E-Signatures Harrold Ahole
Re: Social Network Analysis Wayne Smith
Re: Question about malware research Justin Klein Keane
Re: E-Signatures Faith Mcgrath
Re: E-Signatures Harrold Ahole
Re: E-Signatures Curt Wilson
Re: E-Signatures Randy Marchany
Re: Question about malware research Bill Brinkley
Re: Question about malware research Joe St Sauver
Re: E-Signatures Sarah Stevens

Friday, 11 January

Re: E-Signatures Ozzie Paez
Security Auditing Tool McNeil, Sharon McLawhorn
Re: E-Signatures Sarah Stevens
Re: E-Signatures Ozzie Paez

Monday, 14 January

Credit Reporting Companies Mclaughlin, Kevin (mclaugkl)
Re: Credit Reporting Companies Pace, Guy
Re: Credit Reporting Companies Custer, William L. Mr.
Re: Credit Reporting Companies Dan Johnson
Re: Credit Reporting Companies Fugett, Julie C
Full Disk Encryption Summary Mclaughlin, Kevin (mclaugkl)
Re: Credit Reporting Companies Pace, Guy
Re: Full Disk Encryption Summary Peters, Kevin
Re: Credit Reporting Companies Custer, William L. Mr.
Fraudulent Facebook Profile Kees Leune
Re: Fraudulent Facebook Profile Cal Frye
Re: Fraudulent Facebook Profile Renaud, Robert
Re: Fraudulent Facebook Profile Tracy Mitrano
Re: Fraudulent Facebook Profile Maloney, Michael
Quick Survey - How much of Faculty/Staff directory information is made public? And How? James Moore
Re: Full Disk Encryption Summary Gary Flynn
Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Chris Gauthier
Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Barbara Torney
Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Roger Safian

Tuesday, 15 January

Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Kieper, David
Re: Security Auditing Tool Deepak J. Mathew
Re: Quick Survey - How much of Faculty/Staff directory information is made public? And How? Joel Rosenblatt
Re: Fraudulent Facebook Profile Kees Leune
Social Network Analysis (SNA) savanted1©
Re: Security Auditing Tool McNeil, Sharon McLawhorn
SANS Training at VA Tech, 3/3-8/2008 Randy Marchany

Wednesday, 16 January

WPAD DNS floods Gary Flynn
Re: WPAD DNS floods Jeff Kell
Re: WPAD DNS floods Gary Flynn
Re: WPAD DNS floods Valdis Kletnieks
Re: WPAD DNS floods Valdis Kletnieks
Re: WPAD DNS floods Dan Peterson
Re: WPAD DNS floods Gary Flynn
Re: WPAD DNS floods Brad Judy
Re: WPAD DNS floods Brad Judy
Re: WPAD DNS floods Brad Judy
Re: WPAD DNS floods Gary Flynn
Re: WPAD DNS floods Doug Pearson

Thursday, 17 January

Value and use of penetration testing and vulnerability assessment in .edu Curt Wilson
Re: Value and use of penetration testing and vulnerability assessment in .edu Heather Flanagan
security for Windows logoff scripts writing to log files Kevin Shalla
Re: security for Windows logoff scripts writing to log files Brad Judy

Friday, 18 January

Re: security for Windows logoff scripts writing to log files Mike Phillips
Re: security for Windows logoff scripts writing to log files Themba Flowers
Re: Value and use of penetration testing and vulnerability assessment in .edu Basgen, Brian
Re: Info Classification Policy implementation Sarah Stevens

Tuesday, 22 January

State of Georgia Board of Regents Mclaughlin, Kevin (mclaugkl)
Releasing details Theresa Rowe
Re: State of Georgia Board of Regents Ewing, Ashley
Re: State of Georgia Board of Regents Buz Dale
Re: Releasing details Bristol, Gary L.
Re: Releasing details Willis Marti
Re: Releasing details Gary Dobbins
Re: Releasing details Roger Safian
Re: Releasing details Joel Rosenblatt

Wednesday, 23 January

Re: Releasing details Chad McDonald
Re: Releasing details David, Elaine
Re: Releasing details Sherry, Cathy
Job Opportunity: Head of Cyber Security, Berkeley Lab Adam Stone
Re: Releasing details Eric Jernigan
Re: Releasing details Willis Marti
PCI quarterly network scan cost? Custer, William L. Mr.
SANS Course Announcement for March 10-15 in Jacksonville, Florida! (fwd) Randy Marchany

Thursday, 24 January

Attacks against Linux/Apache servers as reported in NetworkWorld Rob Tanner
Security experiences with SharePoint Knowles, Richard N. CISSP PMP Mr.
Re: Security experiences with SharePoint Brad Judy

Friday, 25 January

[(ISC)2] Associate Program savanted1©
Re: [(ISC)2] Associate Program Pace, Guy
Re: [(ISC)2] Associate Program savanted1©

Monday, 28 January

InfoSec Alert from University of Cincinnati Mclaughlin, Kevin (mclaugkl)
Re: InfoSec Alert from University of Cincinnati Ken Connelly
Re: InfoSec Alert from University of Cincinnati Dan Oachs
Re: InfoSec Alert from University of Cincinnati Bob Bayn
Re: InfoSec Alert from University of Cincinnati David A. Batastini
Re: InfoSec Alert from University of Cincinnati Gene Spafford
Re: InfoSec Alert from University of Cincinnati Greg Vickers

Tuesday, 29 January

Firewall - Outbound Ports Chris Golden
classifying P2P traffic Youngquist, Jason R.
Re: classifying P2P traffic David Boyer
Re: classifying P2P traffic Consolvo, Corbett D
Re: classifying P2P traffic Greene, Chip
Re: classifying P2P traffic Hughes, Scott
Re: classifying P2P traffic Justin Dover
Re: classifying P2P traffic Julian Y. Koh
Re: classifying P2P traffic Alex
Re: Firewall - Outbound Ports Michael Hornung
Re: classifying P2P traffic Harris, Michael C.
Re: Firewall - Outbound Ports Consolvo, Corbett D
Re: classifying P2P traffic Michael Hornung
Re: classifying P2P traffic Michael Hornung
Re: classifying P2P traffic Lutzen, Karl F.
Re: classifying P2P traffic - what about legit uses? Randy Marchany
Re: Firewall - Outbound Ports Roger Safian
Re: classifying P2P traffic jkaftan
Re: classifying P2P traffic Alex
Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt
Re: classifying P2P traffic - what about legit uses? Lutzen, Karl F.
Re: classifying P2P traffic - what about legit uses? Scholz, Greg
Re: classifying P2P traffic - what about legit uses? Michael Hornung
Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt
Re: classifying P2P traffic Samuel Young
Re: classifying P2P traffic - what about legit uses? David Gillett
Re: classifying P2P traffic - what about legit uses? Harris, Michael C.
Re: classifying P2P traffic Cal Frye
Re: classifying P2P traffic - what about legit uses? Cal Frye
Re: classifying P2P traffic - what about legit uses? Part Deux Randy Marchany
Re: classifying P2P traffic - what about legit uses? Curt Wilson
Re: classifying P2P traffic - what about legit uses? Tracy Mitrano
flurry of IM worms Bob Bayn
Re: classifying P2P traffic John Kristoff
Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt
Re: classifying P2P traffic - what about legit uses? Barbara Torney
Re: classifying P2P traffic - what about legit uses? Barbara Torney
Re: classifying P2P traffic Dan Oachs
Re: flurry of IM worms Randy Marchany
Re: classifying P2P traffic - what about legit uses? Cal Frye
Re: classifying P2P traffic - what about legit uses? Joel Rosenblatt
Re: classifying P2P traffic Cal Frye

Wednesday, 30 January

Re: classifying P2P traffic John Kristoff
Re: classifying P2P traffic - what about legit uses? Part Deux Roger Safian
Re: classifying P2P traffic Valdis Kletnieks
Re: Firewall - Outbound Ports Joseph Karam
Re: classifying P2P traffic - what about legit uses? Part Deux Ozzie Paez
Re: classifying P2P traffic - what about legit uses? Vanderbilt, Teresa
ICANN SSAC Releases a Report on Fast Flux Joe St Sauver
Windows local admin in a .edu environment Halliday,Paul
Re: Firewall - Outbound Ports Roger Safian
Re: Firewall - Outbound Ports Valdis Kletnieks
Re: E-Signatures David Grisham
Re: Windows local admin in a .edu environment David Kovarik
Security Guides, Standards, Benchmarks? Drake, Craig
Re: Windows local admin in a .edu environment Hull, Dave
Re: Security Guides, Standards, Benchmarks? Brad Judy
Re: Security Guides, Standards, Benchmarks? Havens, Ben
Re: Windows local admin in a .edu environment Frank T. Shylkofski
Re: Windows local admin in a .edu environment Eric Case

Thursday, 31 January

Re: Windows local admin in a .edu environment Halliday,Paul
Re: classifying P2P traffic - what about legit uses? Part Deux Kevin Shalla
Re: Windows local admin in a .edu environment Gary Flynn
Re: Windows local admin in a .edu environment Jim Dillon
Re: Windows local admin in a .edu environment Steven Alexander
Re: Windows local admin in a .edu environment Ozzie Paez
Interesting Survey Ozzie Paez
Re: Windows local admin in a .edu environment Curt Wilson
External Consultants Taylor, James R
Re: External Consultants Willis Marti
Re: External Consultants Sherry, Cathy
Re: External Consultants Doug Markiewicz
Network Equipment Sign Wording Kutil, Charlie D.
Re: Network Equipment Sign Wording Terry Gray
Re: Network Equipment Sign Wording Ken Connelly
Re: Network Equipment Sign Wording Chet Langin
Re: Network Equipment Sign Wording David Gillett

Friday, 01 February

Re: Network Equipment Sign Wording Kees Leune
Higher Ed Security Operation Centers - Looking for your experiences David Seidl
Re: Higher Ed Security Operation Centers - Looking for your experiences Leo Song
Re: Higher Ed Security Operation Centers - Looking for your experiences Bill Brinkley
Re: Higher Ed Security Operation Centers - Looking for your experiences Justin Jurgensen Sherenco

Monday, 04 February

USB device encryption inquiry Greg Vickers

Tuesday, 05 February

Blackhole DNS. Halliday,Paul
Re: Blackhole DNS. Consolvo, Corbett D
Layer 2 infrastructure security Consolvo, Corbett D
Job Opening at Hamilton College Joseph Karam
Interesting spear phising attempt against IT Basgen, Brian
Re: Layer 2 infrastructure security Kevin Halgren

Wednesday, 06 February

Re: Interesting spear phising attempt against IT Hunt,Keith A
Re: Interesting spear phising attempt against IT Brian Allen
Re: Interesting spear phising attempt against IT Joel Rosenblatt
Re: Interesting spear phising attempt against IT Ozzie Paez
SANS Training at VA Tech, 3/3-8/2008, February Reminder (fwd) Randy Marchany
Sharepoint servers and Exchange servers Cheek, Leigh
Re: Sharepoint servers and Exchange servers Valdis Kletnieks
Re: Sharepoint servers and Exchange servers Shane Bishop

Thursday, 07 February

Managing Client Side Applications and Vendor "compatibility" Chris Green
Initial Response to RIAA/MPAA Complaints Gregg, Christopher S.
Re: Initial Response to RIAA/MPAA Complaints Joel Rosenblatt
Re: Managing Client Side Applications and Vendor "compatibility" Shawn Sines
Re: Initial Response to RIAA/MPAA Complaints Hunt,Keith A
Re: Initial Response to RIAA/MPAA Complaints Shelley Rust
Data Retention Policies Mike Hanson
Re: Initial Response to RIAA/MPAA Complaints Roger Safian
Re: Data Retention Policies Sherry, Cathy
Re: Initial Response to RIAA/MPAA Complaints Ken Connelly
Re: Managing Client Side Applications and Vendor "compatibility" Paul Keser
Re: Managing Client Side Applications and Vendor "compatibility" Shawn Sines
Miscues (was Re: Managing Client Side Applications and Vendor "compatibility" Valdis Kletnieks
Re: Sharepoint servers and Exchange servers Cheek, Leigh
Re: Initial Response to RIAA/MPAA Complaints Greg Jackson

Friday, 08 February

Phishing attempt Theresa Semmens
Data recovery contract Georgios Mousouros
Re: Phishing attempt Lewis, Kevin M (EXP)
Re: Phishing attempt Roger Safian
Re: Phishing attempt Bob Bayn
Re: Phishing attempt Theresa Semmens
Re: Data recovery contract Joel Rosenblatt
Re: Phishing attempt Joe St Sauver
Phishing attempt question - thank you Theresa Semmens
Re: Phishing attempt Jeff Giacobbe
Re: Data Retention Policies Colleen Keller
strange campus "surveys" John Quigley
Re: strange campus "surveys" Pace, Guy
Re: strange campus "surveys" Julian J Thompson (jthmpsn2)
Re: [SPAM:#### 88%] Re: strange campus "surveys" Julian J Thompson (jthmpsn2)
Re: Interesting spear phising attempt against IT Basgen, Brian

Sunday, 10 February

Re: Educational Security Incidents Year in Review - 2007 is now available Melissa
Re: Educational Security Incidents Year in Review - 2007 is now available Melissa

Monday, 11 February

Educational Security Incidents Year in Review - 2007 is now available Adam Dodge
Re: Educational Security Incidents Year in Review - 2007 is now available Halliday,Paul
Re: Educational Security Incidents Year in Review - 2007 is now available Eric Case
Re: Educational Security Incidents Year in Review - 2007 is now available Adam Dodge
Re: Educational Security Incidents Year in Review - 2007 is now available Adam Dodge
Re: Educational Security Incidents Year in Review - 2007 is now available John Kristoff
Securing / erasing hard drives in copiers? Bruggeman, John
Re: Securing / erasing hard drives in copiers? Gary Dobbins
Anti-Malware Testing Standards Organization David Harley
Re: Securing / erasing hard drives in copiers? Joel Rosenblatt
Re: Data Retention Policies Randy Marchany
Re: Securing / erasing hard drives in copiers? Eric Case
Re: Securing / erasing hard drives in copiers? Brad Judy
Re: classifying P2P traffic Shumon Huque
Blacklisted by Hotmail Tim Lane
Re: Blacklisted by Hotmail Harrold Ahole
Re: Blacklisted by Hotmail Harrold Ahole
Re: Blacklisted by Hotmail Jeffrey Ramsay

Tuesday, 12 February

Re: Blacklisted by Hotmail William Senter
Locating Personally Identifiable Information David, Elaine
Re: Locating Personally Identifiable Information Theresa Semmens
Re: Blacklisted by Hotmail Harrold Ahole
Re: Locating Personally Identifiable Information Doug Markiewicz
Re: Locating Personally Identifiable Information Brad Judy
Re: Blacklisted by Hotmail William Senter
Re: Locating Personally Identifiable Information Charles Young
Re: Locating Personally Identifiable Information Gary Flynn
Microsoft IIS security update ms08-006 looks critical to me Gary Flynn
Re: Microsoft IIS security update ms08-006 looks critical to me David Shettler

Wednesday, 13 February

Microsoft the source of all evil?? Simple question James Moore
Re: Microsoft the source of all evil?? Simple question Nick Pistentis
Re: Microsoft the source of all evil?? Simple question John Kim
Re: Microsoft the source of all evil?? Simple question Glenn Forbes Fleming Larratt
Re: Microsoft the source of all evil?? Simple question Kevin Halgren
Re: Microsoft the source of all evil?? Simple question Gary Flynn
Re: Microsoft the source of all evil?? Simple question Morrow Long

Thursday, 14 February

Re: Microsoft IIS security update ms08-006 looks critical to me Basgen, Brian
Re: Microsoft IIS security update ms08-006 looks critical to me Basgen, Brian
Cell phone stipends and impact on securing confidential data David, Elaine
Re: Microsoft IIS security update ms08-006 looks critical to me Curt Wilson

Friday, 15 February

Re: Microsoft IIS security update ms08-006 looks critical to me Gary Flynn
sudowin Gary Flynn
Re: Cell phone stipends and impact on securing confidential data Theresa Rowe
Question about sudowin? Schley Andrew Kutz

Saturday, 16 February

Listserv Change Peter B. DeBlois

Tuesday, 19 February

Security Analyst Position - Univ of Iowa Drews, Jane E
consequences for student hacking Bob Henry
Re: consequences for student hacking Valdis Kletnieks
Re: consequences for student hacking Halliday,Paul
Re: consequences for student hacking Halliday,Paul
Re: consequences for student hacking Eric Case
Re: consequences for student hacking Bob Mahoney
Re: consequences for student hacking Valdis Kletnieks

Wednesday, 20 February

Re: consequences for student hacking Bill Brinkley
Re: consequences for student hacking Doug Markiewicz
Re: consequences for student hacking Schley Andrew Kutz
Re: consequences for student hacking - Legal implications Shamblin, Quinn (shamblqn)
Is anyone using a "Tape Buy back" for their tapes? Clyde Hoadley
consequences for student hacking Tom Siu

Thursday, 21 February

[no subject] Brewer, Alex D

Friday, 22 February

Abuse of web proxy access to library databases Jeff Giacobbe
Re: Abuse of web proxy access to library databases Mark Wilson
Re: Abuse of web proxy access to library databases Mike Iglesias
Re: Abuse of web proxy access to library databases Jeremy Mooney

Monday, 25 February

FERPA question Kathy Bergsma
Security Certification Program Mclaughlin, Kevin (mclaugkl)
Re: FERPA question Kathy Bergsma
Re: FERPA question Mike Lococo
SANS Training at VA Tech, 3/3-8/2008, FINAL reminder (fwd) Randy Marchany
Call for Participation - Internet Safety Night - April 23, 2008 Raw, Randy

Wednesday, 27 February

Experiences with Web application vulnerability assessment (1) software (2) companies Morrow Long
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Gary Dobbins
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Johnson, Kevin
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Roger Safian
Experiences with Web application vulnerability scan service: WhiteHat Sherry, Cathy
Security Analyst Position - Illinois State University Tim flynn
Security Analyst - University of Northern Iowa Ken Connelly
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Hull, Dave
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Randy Marchany
Identify Finder McNeil, Sharon McLawhorn
Re: Identify Finder Gary Dobbins
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Hull, Dave
Re: Identify Finder Halliday,Paul
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Halliday,Paul
Re: Identify Finder Petreski, Samuel
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Petreski, Samuel
Re: Identify Finder Isac Balder
Re: Identify Finder Brad Judy
[no subject] David Shettler
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Alex
Ph.D. Committee Member Sought Chet Langin
Re: -- Vulnerability Disclosure David Shettler
Re: Alex
Re: Identify Finder Theodore Pham
Re: Experiences with Web application vulnerability assessment (1) software (2) companies curtw () siu edu

Thursday, 28 February

Re: Identify Finder Allison Dolan
Re: Identify Finder Nick Silkey
Re: Ph.D. Committee Member Sought Kees Leune
Re: Identify Finder Howell, Paul
Re: Identify Finder Mike Lococo
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Darwin Macatiag
Re: Identify Finder Brad Judy
Re: Identify Finder Roger Safian
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Alex
Re: Identify Finder Shamblin, Quinn (shamblqn)
Re: Identify Finder Felecia Vlahos

Friday, 29 February

Re: FERPA question Allison Dolan
Re: Profile issue for Educase Lewis, Kevin M (EXP)
McAfee EPO I. W. Woodle
Re: FERPA question Wes Hubert
Firewall recommendations Jeff Holden
Re: Firewall recommendations Brawner, David
Re: Firewall recommendations Bean, Mike
Re: Firewall recommendations Consolvo, Corbett D
Re: Firewall recommendations Jarrod Millman
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Bob Doyle
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Darwin Macatiag

Saturday, 01 March

Re: Firewall recommendations Constantakos, William
Was, RE: Firewall recommendations Halliday,Paul

Monday, 03 March

Re: Was, RE: Firewall recommendations Jon Hanny
3rd party want to authenticate our users Oscar Knight
Re: Was, RE: Firewall recommendations Brian Epstein
Re: 3rd party want to authenticate our users Sealey, Adam L.
Re: 3rd party want to authenticate our users Wood, Anne M (wood)
Re: 3rd party want to authenticate our users Joel Rosenblatt
Re: Was, RE: Firewall recommendations Curt Wilson
Re: Was, RE: Firewall recommendations Dan Oachs
Re: Firewall recommendations Ramon Hermida
Re: Firewall recommendations Joey Rego
Re: Firewall recommendations Ramon Hermida
Re: Firewall recommendations Charlie Prothero
Re: Experiences with Web application vulnerability assessment (1) software (2) companies Jon Hanny
Faculty and Staff IT Security Awareness Nicolas Pachis
Updated Risk Assessment resources available Ced Bennett
Re: Faculty and Staff IT Security Awareness John Kristoff
Re: Firewall recommendations Perry, Jeff

Tuesday, 04 March

Managing passwords. Storing passwords. Bombard, Charles L
Re: Managing passwords. Storing passwords. Jon Hanny
Re: Faculty and Staff IT Security Awareness Allison Dolan
Re: Managing passwords. Storing passwords. Bombard, Charles L
Re: Managing passwords. Storing passwords. Warner, David F
PKI Certificate Practice Statement Custer, William L. Mr.
Re: Managing passwords. Storing passwords. Isac Balder
Re: Managing passwords. Storing passwords. Joseph Corey
Re: PKI Certificate Practice Statement John Kemp
Re: Managing passwords. Storing passwords. Josh Drummond
Re: Faculty and Staff IT Security Awareness Marty Manjak
Re: PKI Certificate Practice Statement Nick Lewis
Re: 3rd party want to authenticate our users Greg Vickers

Wednesday, 05 March

Re: Managing passwords. Storing passwords. Ray Bruder
Re: Managing passwords. Storing passwords. Lunceford, Dan
Re: Managing passwords. Storing passwords. Adam Schumacher
Re: Managing passwords. Storing passwords. John H. Sawyer
Power over Ethernet cameras and software WILLIAM I ARNOLD
Summary of responses to query regarding web vulnerable assessment scanners and consultants Morrow Long
New e-mail attack using valid webmail accounts Jenkins, Matthew

Thursday, 06 March

Re: New e-mail attack using valid webmail accounts John Ladwig
Antivirus for MAC. Halliday,Paul
Re: New e-mail attack using valid webmail accounts Jenkins, Matthew
Re: Antivirus for MAC. Jenkins, Matthew
Re: New e-mail attack using valid webmail accounts Bradley, Stephen W. Mr.
Re: New e-mail attack using valid webmail accounts Michael H. Martel
Reviewing Security Policy Sabo, Eric
Re: Reviewing Security Policy Holland, Richard H
Re: Reviewing Security Policy Lee Weers
Re: Reviewing Security Policy Sabo, Eric
Re: Reviewing Security Policy Jenkins, Matthew
Re: New e-mail attack using valid webmail accounts Jenkins, Matthew
Re: Reviewing Security Policy Sabo, Eric
Re: Antivirus for MAC. Mark Borrie
Soliciting Higher Education Input to the Commission on Cyber Security for the 44th Presidency Rodney Petersen
Re: Reviewing Security Policy Jenkins, Matthew
Re: Antivirus for MAC. Jeff Giacobbe

Friday, 07 March

Re: FERPA question Kathy Bergsma
Re: New e-mail attack using valid webmail accounts Jesse Thompson
Re: New e-mail attack using valid webmail accounts Jesse Thompson
Re: New e-mail attack using valid webmail accounts Bruggeman, John
Re: 3rd party want to authenticate our users Basgen, Brian
Re: 3rd party want to authenticate our users Morrow Long

Monday, 10 March

Re: New e-mail attack using valid webmail accounts Jenkins, Matthew
Device/Endpoint Security Zwe Paing
Re: New e-mail attack using valid webmail accounts Zach Jansen
Re: New e-mail attack using valid webmail accounts Jenkins, Matthew
PCI Compliance, RFP & Audits Ellen Smout
Re: Faculty and Staff IT Security Awareness Theresa Rowe

Tuesday, 11 March

heads up: Paper Submission! scam Ken De Cruyenaere
Re: FERPA question Ced Bennett
Re: heads up: Paper Submission! scam Gordon Wishon
Re: heads up: Paper Submission! scam Morrow Long
Re: heads up: Paper Submission! scam Morrow Long
Web Application Vulnerability Assessment RFB Sherry, Cathy

Wednesday, 12 March

Re: Faculty and Staff IT Security Awareness Martin Manjak
Re: Faculty and Staff IT Security Awareness Randy Marchany

Thursday, 13 March

SOC Mclaughlin, Kevin (mclaugkl)
SOC Mclaughlin, Kevin (mclaugkl)
Re: SOC David Seidl
Do you send out Bounce Notifications? Clyde Hoadley
Re: Do you send out Bounce Notifications? Dale Fay
Re: Do you send out Bounce Notifications? Joel Rosenblatt
Re: Do you send out Bounce Notifications? Paul Russell

Friday, 14 March

What companies do a good security audit/review Mark Berman
Re: What companies do a good security audit/review Sealey, Adam L.
Re: New e-mail attack using valid webmail accounts Zach Jansen
Re: What companies do a good security audit/review St Clair, Jim
New e-mail attack using valid webmail accounts Kenneth Arnold
Re: What companies do a good security audit/review Bruhn, Mark Steven
Re: What companies do a good security audit/review Bob Bayn
Re: New e-mail attack using valid webmail accounts Brian Friday
Re: New e-mail attack using valid webmail accounts Jenkins, Matthew
Re: What companies do a good security audit/review John Ladwig
Re: What companies do a good security audit/review Bruhn, Mark Steven
Re: What companies do a good security audit/review Darwin Macatiag
Re: What companies do a good security audit/review Ced Bennett
Re: Firewall recommendations Soliwoda, Andrzej
Re: New e-mail attack using valid webmail accounts Curt Wilson
Re: What companies do a good security audit/review Jim Dillon
Group encryption solutions Curt Wilson
AD Forest Survey Juraj Ontkanin
Re: Group encryption solutions Tonkin, Derek K.
Re: Group encryption solutions Curt Wilson
Re: Group encryption solutions Tonkin, Derek K.
Re: What companies do a good security audit/review Ozzie Paez
Re: Group encryption solutions Brad Judy

Tuesday, 18 March

Re: Firewall recommendations Richard Kunert
Re: Firewall recommendations Jon Hanny
Encrypted email Heather Flanagan
Outsourced e-mail archiving Raw, Randy
Data Classification: Legal criteria Basgen, Brian
Re: Data Classification: Legal criteria Chris Gauthier
Re: Outsourced e-mail archiving Jon Mitchiner
Re: Firewall recommendations Avdagic, Indir
Re: Data Classification: Legal criteria David Kovarik
Re: Data Classification: Legal criteria Basgen, Brian
Re: Data Classification: Legal criteria Doug Markiewicz
Re: Data Classification: Legal criteria Bill Badertscher
Re: Data Classification: Legal criteria David Kovarik
Re: Data Classification: Legal criteria Basgen, Brian
Re: Encrypted email Mike Wiseman
Outsourced e-mail troubleshooting Cal Frye
Re: Data Classification: Legal criteria Sherry, Cathy
Re: Data Classification: Legal criteria Brad Judy
Re: Data Classification: Legal criteria Gary Dobbins
Re: Data Classification: Legal criteria Ozzie Paez
Re: Data Classification: Legal criteria Valdis Kletnieks

Wednesday, 19 March

Re: Encrypted email Jesse Thompson
Re: Encrypted email Jesse Thompson
Web Application Security Assessment DiGrazia, Mick A
Re: Encrypted email Mike Wiseman
Re: Encrypted email Heather Flanagan
Re: Data Classification: Legal criteria Ced Bennett

Thursday, 20 March

Re: Encrypted email Matthew Gracie
Job posting: Enterprise ERP Security Administrator Joe Bazeley
Information Security Architect - Brandeis University Elliot Kendall

Friday, 21 March

Re: Encrypted email Jesse Thompson
Re: Encrypted email Jesse Thompson
Windows server host based firewalls? Aaron Cayard-Roberts
Re: Windows server host based firewalls? Cal Frye

Monday, 24 March

Cisco VPN concentrator Replacement Recommendation Needed schilling
Re: Cisco VPN concentrator Replacement Recommendation Needed Consolvo, Corbett D
Re: Cisco VPN concentrator Replacement Recommendation Needed Julian Y. Koh
Re: Cisco VPN concentrator Replacement Recommendation Needed Jenkins, Matthew
Re: Cisco VPN concentrator Replacement Recommendation Needed Avdagic, Indir
Re: Cisco VPN concentrator Replacement Recommendation Needed Brock, Anthony - NET
Re: Cisco VPN concentrator Replacement Recommendation Needed Russ Leathe
Re: Cisco VPN concentrator Replacement Recommendation Needed schilling

Tuesday, 25 March

Impulse Safe Connect Mclaughlin, Kevin (mclaugkl)
Re: Impulse Safe Connect Michael Sana
Re: Impulse Safe Connect John
Re: Impulse Safe Connect David Lundy

Wednesday, 26 March

PCI compliance Lee Weers
Re: PCI compliance Ken Connelly
Re: PCI compliance Hatala, Jeffrey
Re: PCI compliance Sarah Stevens
Re: Impulse Safe Connect Peter Charbonneau
Multi User Computing jason rinne
PCI Compliance vendors WAS: RE: PCI compliance HALL, NATHANIEL D.
Re: PCI Compliance vendors WAS: RE: PCI compliance curtw () siu edu
Re: PCI Compliance vendors WAS: RE: PCI compliance HALL, NATHANIEL D.

Thursday, 27 March

Deep Freeze & Boot Times Daniel Bennett
Local Administrators Daniel Bennett
Re: Deep Freeze & Boot Times Brewer, Alex D
Re: Deep Freeze & Boot Times Daniel Bennett
Re: Local Administrators Tupker, Mike
Re: Deep Freeze & Boot Times Brewer, Alex D
Re: Deep Freeze & Boot Times Tupker, Mike
Re: Local Administrators Brian K. Doré
Re: Deep Freeze & Boot Times Bombard, Charles L
Re: Local Administrators Torres, Juan
Re: Local Administrators Daniel Bennett
Re: Local Administrators Sabo, Eric
Re: Multi User Computing Jeff Howlett
Re: Deep Freeze & Boot Times Mark Monroe
Re: Deep Freeze & Boot Times Halliday,Paul
Re: Multi User Computing Jeff Howlett
E-mail from ARIN ref. Legacy Registration Services Clyde Hoadley
Re: Deep Freeze & Boot Times McKay, Steven R
Re: Deep Freeze & Boot Times Ozzie Paez
Re: Multi User Computing Ozzie Paez
Re: E-mail from ARIN ref. Legacy Registration Services David Lundy
Re: E-mail from ARIN ref. Legacy Registration Services Teresa Beamer
Re: E-mail from ARIN ref. Legacy Registration Services Michael Sinatra
Re: E-mail from ARIN ref. Legacy Registration Services John
Re: E-mail from ARIN ref. Legacy Registration Services David Gillett
Re: E-mail from ARIN ref. Legacy Registration Services Brent Sweeny

Friday, 28 March

Physhing email using phone number Di Fabio, Andrea
Re: Physhing email using phone number Daniel Bennett
Re: Physhing email using phone number Joel Rosenblatt
Re: Physhing email using phone number Daniel Bennett
Re: Physhing email using phone number Di Fabio, Andrea
Re: Physhing email using phone number Jenkins, Matthew
Re: Physhing email using phone number Mike Porter
Re: Physhing email using phone number Daniel Bennett
Re: Physhing email using phone number Jenkins, Matthew
Re: E-mail from ARIN ref. Legacy Registration Services George Russ
Re: E-mail from ARIN ref. Legacy Registration Services David Lundy

Saturday, 29 March

Re: Local Administrators Dave Hull

Sunday, 30 March

Security Related Questions Sabo, Eric
Re: Security Related Questions Ken Connelly

Monday, 31 March

Re: Security Related Questions Daniel Bennett
Re: Security Related Questions Valdis Kletnieks
FERPA Notice of Proposed Rulemaking Addresses Changes in IT Rodney Petersen
Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Kevin Shalla
Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Basgen, Brian
Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Gary Dobbins
Wireless Security & Gaming Systems Jenkins, Matthew
Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Kevin Shalla
Re: Wireless Security & Gaming Systems Cal Frye
Re: Wireless Security & Gaming Systems Tim Cantin
Re: Wireless Security & Gaming Systems Cal Frye
Re: FERPA Notice of Proposed Rulemaking Addresses Changes in IT Basgen, Brian
[no subject] Stephen J Smoogen
Re: FERPA Notice [other IT potential changes] Basgen, Brian
[no subject] Stephen J Smoogen