Home page logo
/

280 messages starting Jul 02 12 and ending Sep 28 12
Date index | Thread index | Author index

Monday, 02 July

Free CompTIA CTP+ exam VUE voucher Di Fabio, Andrea
Re: Free CompTIA CTP+ exam VUE voucher Brewer, Alex
Students with Internet Usage Restriction Bob Henry
SANS Securing the Human and SkillPort Mike Fox
Re: SANS Securing the Human and SkillPort Delaney, Cherry L.
Re: SANS Securing the Human and SkillPort Drew Perry
Re: SANS Securing the Human and SkillPort Delaney, Cherry L.
Re: SANS Securing the Human and SkillPort Dan Han
Re: SANS Securing the Human and SkillPort Drew Perry
JumpForward NCAA Compliance and Recruiting Shawn Kohrman
National Cyber Security Awareness Month is Right Around the Corner! David C. Lyon

Tuesday, 03 July

NYU Job Postings: Network Security Analyst and Senior Network Security Analyst Brian J Smith-Sweeney
Self Service Password Reset Shawn Kohrman

Thursday, 05 July

Re: Self Service Password Reset Schumacher, Adam J.
Re: Self Service Password Reset Shawn Kohrman
Re: Self Service Password Reset Schumacher, Adam J.
student password requirements for third party sites David Pirolo
Re: Self Service Password Reset Gallese, Brady T.

Friday, 06 July

Re: Self Service Password Reset Witmer, Robert
Re: Self Service Password Reset Gary Flynn
Re: Self Service Password Reset Dexter Caldwell

Wednesday, 11 July

Re: student password requirements for third party sites Steven Alexander
Job opportunity Di Fabio, Andrea
Job Opportunities Gade, Werner

Thursday, 12 July

REN-ISAC & SANS partnership for discounted awareness and technical training - window closing soon Doug Pearson
Software Engineer for Virginia Tech PKI Support Dunker, Mary

Monday, 16 July

Job posting: Loyola University Chicago - Security Administrator ITS Jim Pardonek
CISSP Endorsement request Tarun Trivedi
Re: CISSP Endorsement request Bradley, Stephen W. Mr.
Re: CISSP Endorsement request Schoenefeld, Keith P.
Cisco ASA to Checkpoint - Firewall rule migration Shane Markley
Re: Cisco ASA to Checkpoint - Firewall rule migration Afsin Taskiran

Tuesday, 17 July

SecureDoc Pebby Garner (Information Security)
Re: SecureDoc SCHALIP, MICHAEL
Re: CISSP Endorsement request Roger A Safian
Re: SecureDoc Pebby Garner (Information Security)
Re: CISSP Endorsement request Leon DuPree
Re: SecureDoc Leon DuPree
Re: CISSP Endorsement request Doug Kahn
Re: CISSP Endorsement request Schoenefeld, Keith P.
Re: CISSP Endorsement request Valdis Kletnieks
Re: CISSP Endorsement request Wayne S. Martin
Re: CISSP Endorsement request David Pirolo
Re: CISSP Endorsement request Sigmon, Aaron
Re: CISSP Endorsement request David Gillett
Re: CISSP Endorsement request Gregory N Pendergast
Re: CISSP Endorsement request Mark Rogowski

Wednesday, 18 July

Re: CISSP Endorsement request Tarun Trivedi
Re: CISSP Endorsement request Webb, Justin
PCI SSC - Special Interest Groups Davis, Thomas R
Re: PCI SSC - Special Interest Groups David R. Millar
Re: PCI SSC - Special Interest Groups David Pirolo
Re: PCI SSC - Special Interest Groups David Pirolo

Thursday, 19 July

Re: PCI SSC - Special Interest Groups Davis, Thomas R
Re: PCI SSC - Special Interest Groups David Pirolo
Combating directory harvests Tyler T. Schoenke
Re: Combating directory harvests Roger A Safian
Re: Combating directory harvests Harry Hoffman
Re: Combating directory harvests Joel Rosenblatt
Re: PCI SSC - Special Interest Groups David Pirolo
Re: PCI SSC - Special Interest Groups John Ladwig
Barracuda Spam and Virus Firewall Christopher Jones
Re: Barracuda Spam and Virus Firewall Patrick Cannady
Re: Barracuda Spam and Virus Firewall Walter Petruska

Friday, 20 July

Re: Barracuda Spam and Virus Firewall Garza, Veronica M.
Re: PCI SSC - Special Interest Groups Davis, Thomas R
Re: Barracuda Spam and Virus Firewall Chuck Thomas
Re: Barracuda Spam and Virus Firewall Solomon Asmelash
Re: Barracuda Spam and Virus Firewall Nathaniel Hall
Google Docs abuse Dan Han
Re: Google Docs abuse Jeffrey Schiller
Re: Google Docs abuse Bob Bayn

Saturday, 21 July

Re: Google Docs abuse Jeffrey Schiller
Re: Google Docs abuse Dan Han

Monday, 23 July

IT Systems Support Professional (Information Security Office) at Kennesaw State University Stephen C. Gay
Re: Google Docs abuse Tracy Mitrano

Tuesday, 24 July

Linux sensitive number search tools David Seidl
IPICS Summer School 2012, 03 - 14 September 2012, Vienna, Austria IPICS2012
Re: Google Docs abuse Jacob Steelsmith
Barracuda Anti-Spam and Virus Firewall Christopher Jones
New ECAR CDS Spotlight Research Bulletin: Information Systems Risk Assessment Valerie Vogel
Self Provisioned AD Domain Guest Accounts Jim Pardonek
Re: Linux sensitive number search tools Woodruff, Dan

Wednesday, 25 July

Data Classificiation Policy Slocum, Stacy
Sunshine Law Email Retention Campbell, Josh
was RE: [SECURITY] Google Docs abuse David Gillett

Thursday, 26 July

Re: Sunshine Law Email Retention Berman, Mark
Re: A substitute for Google Alerts / Circumventing Google restrictions on spam suppression James H. Moore
Re: Sunshine Law Email Retention Baumstein,Avi H

Saturday, 28 July

Re: Self Provisioned AD Domain Guest Accounts Schumacher, Adam J.

Monday, 30 July

echoSign implementation Stephen C. Gay
Identity and Access Management Position at UA Nathan Zierfuss

Tuesday, 31 July

Wireless WPA2 MSCHAPv2 Parker, Ben C
Re: Wireless WPA2 MSCHAPv2 Steve Bohrer
Re: Wireless WPA2 MSCHAPv2 Caroline Couture
Re: Wireless WPA2 MSCHAPv2 Caroline Couture
Re: Wireless WPA2 MSCHAPv2 Justin Azoff
Re: Wireless WPA2 MSCHAPv2 Steve Bohrer
Re: Wireless WPA2 MSCHAPv2 Justin Azoff
Open Source or Freeware File / Free Space Erasers Tonkin, Derek K
Re: Wireless WPA2 MSCHAPv2 Harry Hoffman
Re: Open Source or Freeware File / Free Space Erasers King, Ronald A.
Re: Open Source or Freeware File / Free Space Erasers Joel Rosenblatt
Re: Open Source or Freeware File / Free Space Erasers Shamblin, Quinn
Re: Wireless WPA2 MSCHAPv2 Rich Graves
Re: Wireless WPA2 MSCHAPv2 Shamblin, Quinn
Re: Open Source or Freeware File / Free Space Erasers Hauber, Wayne [ITSEC]

Wednesday, 01 August

Re: Open Source or Freeware File / Free Space Erasers Beth Young
Re: Open Source or Freeware File / Free Space Erasers Tonkin, Derek K
Splunk Implementations in Higher Ed Martin Manjak
Microsoft Security Advisory (2737111) Roger A Safian
Re: Open Source or Freeware File / Free Space Erasers Eric C. Lukens
Re: Open Source or Freeware File / Free Space Erasers Tonkin, Derek K

Thursday, 02 August

Re: Wireless WPA2 MSCHAPv2 Joseph N Kurtin
Compliance Training for Security Analysts Wright, A J (A. J.)
Re: Compliance Training for Security Analysts Basile, Daniel L.
Re: Compliance Training for Security Analysts Dan Sarazen
Re: Compliance Training for Security Analysts Wayne S. Martin
Re: Compliance Training for Security Analysts Brad Judy

Friday, 03 August

Invitation to participate in research project: Employee Perceptions of Security Policies Martin Manjak
IDS/Data Recorder Terrance Humphries

Monday, 06 August

Re: Splunk Implementations in Higher Ed Patrick Gorsuch
Questions/thoughts around outsourcing guest wireless Perry, Jeff
University Information Security Officer at University of Arizona Banks, Teresa E - (tbanks)

Tuesday, 07 August

Re: Questions/thoughts around outsourcing guest wireless SCHALIP, MICHAEL
Re: Questions/thoughts around outsourcing guest wireless Shamblin, Quinn
Re: Questions/thoughts around outsourcing guest wireless Perry, Jeff
Re: Questions/thoughts around outsourcing guest wireless Tim Doty

Wednesday, 08 August

Private vs Publicly-Accessible IP Addresses Carr, Michael G
Re: Private vs Publicly-Accessible IP Addresses Valdis Kletnieks
Ad for UA Information Security Officer Banks, Teresa E - (tbanks)
Re: Ad for UA Information Security Officer Banks, Teresa E - (tbanks)

Thursday, 09 August

Teaching Staff How to Use Exchange/Outlook Junk Folder to Identify/Disarm Malicious Email Martin Manjak
Become a Champion of National Cyber Security Awareness Month David C. Lyon
Cloud based file storage Matt Marmet

Saturday, 11 August

Security 5 Year Strategic Plan Daniel Bennett
Do you need two Guest Wireless Networks? (Re: [SECURITY] Questions/thoughts around outsourcing guest wireless) Jeffrey Schiller

Monday, 13 August

Re: Do you need two Guest Wireless Networks? (Re: [SECURITY] Questions/thoughts around outsourcing guest wireless) randy marchany
Re: Do you need two Guest Wireless Networks? (Re: [SECURITY] Questions/thoughts around outsourcing guest wireless) Ken Connelly
Information Security Staffing Metrics Survey Carlos Lobato
Network Staffing Miller,James R
Re: Do you need two Guest Wireless Networks? (Re: [SECURITY] Questions/thoughts around outsourcing guest wireless) Jones, Dan
Re: Network Staffing Dr. Wole Akpose
Re: Information Security Staffing Metrics Survey McLaughlin, Bryan S.
Re: Information Security Staffing Metrics Survey Harry Hoffman

Tuesday, 14 August

Video Taping Patients Hudson, Edward
Job Posting: Information Security Analyst at The University of Texas at Austin Charlie Scott

Wednesday, 15 August

Job Posting - Director of Information Security @ The University of Scranton Scott Finlon
Re: Linux sensitive number search tools Randy Marchany
Social Engineering your way into someone else's iCloud Martin Manjak
Free Webcast: Conducting a Legal Investigation in Social Media (9/13, 1pm EDT) Valerie Vogel

Thursday, 16 August

Re: Job Posting: Information Security Analyst at The University of Texas at Austin Maciej Kozuszek
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Valdis Kletnieks
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Ken Connelly
Re: Job Posting: Information Security Analyst at The University of Texas at Austin SCHALIP, MICHAEL
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Maciej Kozuszek
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Jacobson, Dick
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Pratt, Benjamin E.
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Tim Doty
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Brad Judy
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Valerie Vogel
Job Postings (2): Arizona State University Evelyn Pidgeon

Tuesday, 21 August

Policy/Practices for Remote Control/Remote Access to Institutionally Owned Computers Jack Rutt

Wednesday, 22 August

Re: Policy/Practices for Remote Control/Remote Access to Institutionally Owned Computers Dennis Bohn
PHP vs ColdFusion Security Concerns Jim Pardonek

Friday, 24 August

Patching Windows VM on Parallels/Fusion Shandon Bates
Re: Patching Windows VM on Parallels/Fusion Dave Koontz

Monday, 27 August

Password keepers Slocum, Stacy
Re: Password keepers SCHALIP, MICHAEL
Re: Password keepers Shamblin, Quinn
Re: Password keepers Woodruff, Dan
Re: Password keepers Joel Rosenblatt
Re: Password keepers Cappalli, Tim G @ LSC-OIT
Re: Password keepers David Curry
Re: Password keepers Shawn Kohrman
Re: Password keepers Clifford Collins
Re: Password keepers Dave Koontz
Re: Password keepers Daniel Bennett
Re: Password keepers Josh Drummond

Tuesday, 28 August

Java 7 Security Manager Bypass Vulnerability Bateman, Darrell
Re: Java 7 Security Manager Bypass Vulnerability - drop back to 1.6.34 if possible. Chuck Braden
Re: Java 7 Security Manager Bypass Vulnerability Shamblin, Quinn

Thursday, 30 August

Cyber-Bullying Daniel Bennett
Re: Cyber-Bullying Roger A Safian
Re: Cyber-Bullying Dan Sarazen
Re: Cyber-Bullying Daniel Bennett
Re: Cyber-Bullying Shamblin, Quinn
Re: Cyber-Bullying Mike Porter
Re: Cyber-Bullying Gioia, Matthew P.
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Chuck Braden
Rethinking the DMZ Youngquist, Jason R.
Re: Rethinking the DMZ Jeff Moore
Re: Rethinking the DMZ Joel Rosenblatt

Friday, 31 August

Re: Rethinking the DMZ Harry Hoffman
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Hanson, Mike
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Shamblin, Quinn
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released John Ladwig
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Schoenefeld, Keith P.
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Hanson, Mike
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Gary Flynn
Re: - Java 1.7.07 just released - vulnerability identified Chuck Braden
Re: Rethinking the DMZ John Hoffoss
Granting all users (or "a select few"??) administrative rights on their own computer systems?? SCHALIP, MICHAEL
Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Jeff Moore
Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Cappalli, Tim G @ LSC-OIT
Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Shalla, Kevin
Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Kriss, George N

Saturday, 01 September

Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Schumacher, Adam J.

Tuesday, 04 September

Re: Rethinking the DMZ Julian Y Koh
Re: Rethinking the DMZ Deke Kassabian

Wednesday, 05 September

Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Chris Green

Thursday, 06 September

Re: Granting all users (or "a select few"??) administrative= rights on their own computer systems?? Durfee, Jeff
2012 VA SCAN Conference Neel, Jonathon L.
Job Posting: ISD at Teachers College, Columbia University Haines, Ena
Re: Rethinking the DMZ Haines, Ena
Re: Rethinking the DMZ John Ladwig
Re: Rethinking the DMZ Mike Caudill
Re: Rethinking the DMZ David Byers
Re: Rethinking the DMZ Jeff Kell
Re: Rethinking the DMZ Mike Caudill
Re: Rethinking the DMZ Joe St Sauver
Re: Rethinking the DMZ Justin Azoff
Re: Rethinking the DMZ Harry Hoffman
Re: Rethinking the DMZ Gary Flynn
Re: Rethinking the DMZ Harry Hoffman

Friday, 07 September

FISMA Compliance Jay Graham
HEISC Speakers Bureau Brym, Petr

Sunday, 09 September

Re: FISMA Compliance Shamblin, Quinn

Monday, 10 September

VPN deployment breadth (Quick Poll) Calo, Andrew
Re: VPN deployment breadth (Quick Poll) Doug Kahn
Re: Rethinking the DMZ Brian Helman

Tuesday, 11 September

FYI: Handheld and Mobile Computing CG is now Mobile Technologies Valerie Vogel

Wednesday, 12 September

Any special preparations in anticipation of KB2661254 (Key Length) patch? Martin Manjak
Password security training - USU's latest efforts Valerie Vogel
Re: Any special preparations in anticipation of KB2661254 (Key Length) patch? Hanson, Mike
EDUCAUSE Review Article on National Cyber Security Awareness Month David C. Lyon
Re: Any special preparations in anticipation of KB2661254 (Key Length) patch? Gary Flynn
Re: Any special preparations in anticipation of KB2661254 (Key Length) patch? David Lundy
Re: Any special preparations in anticipation of KB2661254 (Key Length) patch? Louis APONTE
Re: Any special preparations in anticipation of KB2661254 (Key Length) patch? Campbell, Josh

Thursday, 13 September

Registration is OPEN for SANS LEG 523 Law of Data Security and Investigations Beth Young
Rutgers Hosting SANS Law of Data Security and Investigations Course Tom Siu, CISO, Case Western Reserve University

Monday, 17 September

Cloud Computing Security Survey Taka Kajiyama

Wednesday, 19 September

Botnet Detection Systems WILLIAM I ARNOLD
Re: Botnet Detection Systems Schattle, Donald
Re: Botnet Detection Systems Sigmon, Aaron
Re: Botnet Detection Systems Calo, Andrew
Re: Botnet Detection Systems PATRICK, MARTIN
Palo Alto Networks Webinar: Academic Freedom or Application Chaos: A Delicate Balancing Act Marty Golizio
2013 Information Security Awareness Student Video & Poster Contest David C. Lyon

Thursday, 20 September

Re: Botnet Detection Systems Dennis Bohn
Multi-platform two-factor terminal services? Mike Osterman
spamhaus drop etc. john
Re: spamhaus drop etc. Justin Azoff
Re: spamhaus drop etc. Jeff Kell
Re: spamhaus drop etc. King, Ronald A.
Enterprise DLP Solutions Barnes, Sylvia A
Re: Botnet Detection Systems Afsin Taskiran

Friday, 21 September

Re: Multi-platform two-factor terminal services? Cathy Hubbs
Re: Multi-platform two-factor terminal services? John Kaftan

Monday, 24 September

Pitney Bowes Mail & Go Postal Kiosk Elizabeth Shannon

Tuesday, 25 September

University of Missouri - St. Louis System Security Analyst - specialist job opening Mark Monroe
IT Frameworks - Quick Survey Carlos Lobato
Re: IT Frameworks - Quick Survey Carson, Larry
Compromised version of phpMyAdmin contains backdoor Chuck Braden

Wednesday, 26 September

Re: Compromised version of phpMyAdmin contains backdoor Valdis Kletnieks
Re: Compromised version of phpMyAdmin contains backdoor Basile, Daniel L.
Job, Network Monitoring/Penetration Testing - Info Sec Engineer @ Carnegie Mellon Ted Pham

Thursday, 27 September

Re: Enterprise DLP Solutions Philip Webster
Re: Compromised version of phpMyAdmin contains backdoor Chuck Braden
Re: Compromised version of phpMyAdmin contains backdoor Chuck Braden
3rd party Webform 'Services' Kimberly Heimbrock
Has Anybody upgraded McAfee Endpoint Encryption? David Grisham
Cybersecurity Awareness Resource Library: Materials for NCSAM 2012 David C. Lyon

Friday, 28 September

LAST CHANCE: Please register by October 1: Registration is OPEN for SANS LEG 523 Law of Data Security and Investigations (fwd) Beth E. Binde
Re: Security 5 Year Strategic Plan Joshua Beeman
Constant Contact--Possible Issues Geoffrey Steven Nathan
Re: Constant Contact--Possible Issues Dexter Caldwell
Email Gateway Self, Dennis
Next IAM Online: Implementing an Effective IAM Program, Oct. 10, 2012 Valerie Vogel
Previous period Next period
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]