Re: Test Lab Guides

2012-10-11 Thread Don Kuhlman
Thanks Steven. Very good stuff!

Don K


On Mon, Oct 8, 2012 at 4:30 PM, Steven Peck  wrote:
> I don't remember if I sent this link out previously so I am going to send it
> out again just because I sent it to my co-workers with the Windows 2012
> stuff.
>
> --
>
> There is a group at Microsoft that is working to provide a reusable base
> environment to speed setup in various test lab scenario guides.  The goal is
> to speed familiarity with various Microsoft products.  The goal being you
> create a base set of images for your lab and then use the various guides
> build on or extend them.  It appears they also take community contribution
> of guides as well.
>
>
>
> http://social.technet.microsoft.com/wiki/contents/articles/1262.test-lab-guides.aspx
>
> http://social.technet.microsoft.com/wiki/contents/articles/7807.windows-server-2012-test-lab-guides-en-us.aspx
>
>
>
> FAQ:
> http://social.technet.microsoft.com/wiki/contents/articles/2477.test-lab-guides-faq.aspx
>
> Blog:  http://blogs.technet.com/b/tlgs/
>
>
>
> Just thought I would share.
>
>
>
> Steven Peck
> http://www.blkmtn.org
>
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Test Lab Guides

2012-10-09 Thread Kurt Buff
These look damned useful.

Thanks for these.

Kurt

On Mon, Oct 8, 2012 at 4:30 PM, Steven Peck  wrote:
> I don't remember if I sent this link out previously so I am going to send it
> out again just because I sent it to my co-workers with the Windows 2012
> stuff.
>
> --
>
> There is a group at Microsoft that is working to provide a reusable base
> environment to speed setup in various test lab scenario guides.  The goal is
> to speed familiarity with various Microsoft products.  The goal being you
> create a base set of images for your lab and then use the various guides
> build on or extend them.  It appears they also take community contribution
> of guides as well.
>
>
>
> http://social.technet.microsoft.com/wiki/contents/articles/1262.test-lab-guides.aspx
>
> http://social.technet.microsoft.com/wiki/contents/articles/7807.windows-server-2012-test-lab-guides-en-us.aspx
>
>
>
> FAQ:
> http://social.technet.microsoft.com/wiki/contents/articles/2477.test-lab-guides-faq.aspx
>
> Blog:  http://blogs.technet.com/b/tlgs/
>
>
>
> Just thought I would share.
>
>
>
> Steven Peck
> http://www.blkmtn.org
>
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: Pen test vendors

2012-09-26 Thread Glen Johnson
And he is really nice guy to boot.
He knows more cisco than I'd ever dream of trying to learn.
Hate that he left his previous gig as I could call him any time for advice.  I 
think now he'd have to charge for it.

From: Shane Mullins [mailto:tsmulli...@gmail.com]
Sent: Monday, September 24, 2012 8:17 PM
To: NT System Admin Issues
Subject: Re: Pen test vendors

Sycom has an excellent pen tester.  CCIE Security, CISSP as well as pen certs.

Shane

On Mon, Sep 24, 2012 at 11:25 AM, Kennedy, Jim 
mailto:kennedy...@elyriaschools.org>> wrote:


My kid, he is famous. :)

https://www.trustedsec.com/



If he is too busy for you, or too expensive or not what you need let me know. 
He has a boatload of connections in that business that he/I can refer you to. 
He is REALLY busy this week. It's DerbyCon this week and he owns/runs that 
conference.


From: Richard Stovall [mailto:rich...@gmail.com<mailto:rich...@gmail.com>]
Sent: Monday, September 24, 2012 11:23 AM
To: NT System Admin Issues
Subject: Pen test vendors

Anyone have recommendations for reputable external pen and vulnerability 
testing vendors?

Thanks,
Richard

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Pen test vendors

2012-09-26 Thread Stu Sjouwerman
Give him Kevin’s new book Ghost In The Wires and he’s be hooked for life…

From: David Lum [mailto:david@nwea.org]
Sent: Wednesday, September 26, 2012 12:37 PM
To: NT System Admin Issues
Subject: RE: Pen test vendors

My 19yr old is a computer geek wannabe (he has done misc. work for me and picks 
stuff up QUICK). Today I asked if he was serious about wanting to be an IT guy 
like me, to which he replied in the affirmative. I told him his first task is 
to “Tell me who Kevin Mitnik is, list some things he’s done, and why might an 
IT guy care about knowing this”. I figure I’ll get him on the security slant 
first. ☺

Dave

From: Stu Sjouwerman 
[mailto:s...@sunbelt-software.com]<mailto:[mailto:s...@sunbelt-software.com]>
Sent: Wednesday, September 26, 2012 9:11 AM
To: NT System Admin Issues
Subject: RE: Pen test vendors

Hee hee!

He’s been a (very) successful security consultant since 2000,
and he’s a real business partner of mine in KnowBe4.  Great
guy to work with too. We wrote the Kevin Mitnick Security
Awareness Training together over an 8 month period.

Stu


From: Ziots, Edward 
[mailto:ezi...@lifespan.org]<mailto:[mailto:ezi...@lifespan.org]>
Sent: Tuesday, September 25, 2012 2:55 PM
To: NT System Admin Issues
Cc: rich...@gmail.com<mailto:rich...@gmail.com>
Subject: RE: Pen test vendors

LOL Stu,

You know Kevin is Banned from touching computers anymore… ☺

Z

Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org<mailto:ezi...@lifespan.org>

From: Stu Sjouwerman 
[mailto:s...@sunbelt-software.com]<mailto:[mailto:s...@sunbelt-software.com]>
Sent: Tuesday, September 25, 2012 10:50 AM
To: NT System Admin Issues
Cc: 'rich...@gmail.com'
Subject: RE: Pen test vendors

Richard,

If it’s a relatively straightforward outside-in vulnerability check that gives
you  the low-hanging fruit, combined with an hour of consulting by a white-hat
hacker, than I can do that for you here at KnowBe4 for a –very- low price.
http://www.knowbe4.com/products/vulnerability-scanning/

If you want a high-end pen test done, I can get you in touch with my business 
partner Kevin Mitnick.

Warm regards,
Stu


From: Richard Stovall [mailto:rich...@gmail.com]
Sent: Monday, September 24, 2012 11:20 AM
To: NT System Admin Issues
Subject: Pen test vendors

Anyone have recommendations for reputable external pen and vulnerability 
testing vendors?

Thanks,
Richard

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: Pen test vendors

2012-09-26 Thread Maglinger, Paul
Tell him to be an air traffic controller.  Less stress and the hours are 
better!  ☺

From: David Lum [mailto:david@nwea.org]
Sent: Wednesday, September 26, 2012 11:37 AM
To: NT System Admin Issues
Subject: RE: Pen test vendors

My 19yr old is a computer geek wannabe (he has done misc. work for me and picks 
stuff up QUICK). Today I asked if he was serious about wanting to be an IT guy 
like me, to which he replied in the affirmative. I told him his first task is 
to “Tell me who Kevin Mitnik is, list some things he’s done, and why might an 
IT guy care about knowing this”. I figure I’ll get him on the security slant 
first. ☺

Dave

From: Stu Sjouwerman 
[mailto:s...@sunbelt-software.com]<mailto:[mailto:s...@sunbelt-software.com]>
Sent: Wednesday, September 26, 2012 9:11 AM
To: NT System Admin Issues
Subject: RE: Pen test vendors

Hee hee!

He’s been a (very) successful security consultant since 2000,
and he’s a real business partner of mine in KnowBe4.  Great
guy to work with too. We wrote the Kevin Mitnick Security
Awareness Training together over an 8 month period.

Stu


From: Ziots, Edward 
[mailto:ezi...@lifespan.org]<mailto:[mailto:ezi...@lifespan.org]>
Sent: Tuesday, September 25, 2012 2:55 PM
To: NT System Admin Issues
Cc: rich...@gmail.com<mailto:rich...@gmail.com>
Subject: RE: Pen test vendors

LOL Stu,

You know Kevin is Banned from touching computers anymore… ☺

Z

Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org<mailto:ezi...@lifespan.org>

From: Stu Sjouwerman 
[mailto:s...@sunbelt-software.com]<mailto:[mailto:s...@sunbelt-software.com]>
Sent: Tuesday, September 25, 2012 10:50 AM
To: NT System Admin Issues
Cc: 'rich...@gmail.com'
Subject: RE: Pen test vendors

Richard,

If it’s a relatively straightforward outside-in vulnerability check that gives
you  the low-hanging fruit, combined with an hour of consulting by a white-hat
hacker, than I can do that for you here at KnowBe4 for a –very- low price.
http://www.knowbe4.com/products/vulnerability-scanning/

If you want a high-end pen test done, I can get you in touch with my business 
partner Kevin Mitnick.

Warm regards,
Stu


From: Richard Stovall [mailto:rich...@gmail.com]
Sent: Monday, September 24, 2012 11:20 AM
To: NT System Admin Issues
Subject: Pen test vendors

Anyone have recommendations for reputable external pen and vulnerability 
testing vendors?

Thanks,
Richard

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: Pen test vendors

2012-09-26 Thread Steven Peck
Then he could be a 'personailty' and talk about random stuff and still make
money.

On Wed, Sep 26, 2012 at 9:44 AM, Jonathan Link wrote:

> The only danger there is that he might get pulled into Steve Gibson and
> Leo Laporte land...
>
>
> On Wed, Sep 26, 2012 at 12:37 PM, David Lum  wrote:
>
>>  My 19yr old is a computer geek wannabe (he has done misc. work for me
>> and picks stuff up QUICK). Today I asked if he was serious about wanting to
>> be an IT guy like me, to which he replied in the affirmative. I told him
>> his first task is to “Tell me who Kevin Mitnik is, list some things he’s
>> done, and why might an IT guy care about knowing this”. I figure I’ll get
>> him on the security slant first. J
>>
>> ** **
>>
>> Dave
>>
>> ** **
>>
>> *From:* Stu Sjouwerman [mailto:s...@sunbelt-software.com]
>> *Sent:* Wednesday, September 26, 2012 9:11 AM
>>
>> *To:* NT System Admin Issues
>> *Subject:* RE: Pen test vendors
>>
>>  ** **
>>
>> Hee hee!
>>
>> ** **
>>
>> He’s been a (very) successful security consultant since 2000,
>>
>> and he’s a real business partner of mine in KnowBe4.  Great
>>
>> guy to work with too. We wrote the Kevin Mitnick Security
>>
>> Awareness Training together over an 8 month period.
>>
>>
>> Stu 
>>
>> ** **
>>
>> ** **
>>
>> *From:* Ziots, Edward [mailto:ezi...@lifespan.org]
>> *Sent:* Tuesday, September 25, 2012 2:55 PM
>> *To:* NT System Admin Issues
>> *Cc:* rich...@gmail.com
>> *Subject:* RE: Pen test vendors
>>
>> ** **
>>
>> LOL Stu, 
>>
>> ** **
>>
>> You know Kevin is Banned from touching computers anymore… J 
>>
>> ** **
>>
>> Z
>>
>> ** **
>>
>> Edward E. Ziots, CISSP, Security +, Network +
>>
>> Security Engineer
>>
>> Lifespan Organization
>>
>> ezi...@lifespan.org
>>
>> ** **
>>
>> *From:* Stu Sjouwerman [mailto:s...@sunbelt-software.com]
>> *Sent:* Tuesday, September 25, 2012 10:50 AM
>> *To:* NT System Admin Issues
>> *Cc:* 'rich...@gmail.com'
>> *Subject:* RE: Pen test vendors
>>
>> ** **
>>
>> Richard,
>>
>> ** **
>>
>> If it’s a relatively straightforward outside-in vulnerability check that
>> gives
>>
>> you  the low-hanging fruit, combined with an hour of consulting by a
>> white-hat
>>
>> hacker, than I can do that for you here at KnowBe4 for a –very- low price.
>> 
>>
>> http://www.knowbe4.com/products/vulnerability-scanning/
>>
>> ** **
>>
>> If you want a high-end pen test done, I can get you in touch with my
>> business partner Kevin Mitnick.
>>
>> ** **
>>
>> Warm regards,
>>
>> Stu 
>>
>> ** **
>>
>> ** **
>>
>> *From:* Richard Stovall [mailto:rich...@gmail.com ]
>> *Sent:* Monday, September 24, 2012 11:20 AM
>> *To:* NT System Admin Issues
>> *Subject:* Pen test vendors
>>
>> ** **
>>
>> Anyone have recommendations for reputable external pen and vulnerability
>> testing vendors?
>>
>> ** **
>>
>> Thanks,
>> Richard
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>> ~ Finally, powerful 

Re: Pen test vendors

2012-09-26 Thread Jonathan Link
The only danger there is that he might get pulled into Steve Gibson and Leo
Laporte land...


On Wed, Sep 26, 2012 at 12:37 PM, David Lum  wrote:

>  My 19yr old is a computer geek wannabe (he has done misc. work for me
> and picks stuff up QUICK). Today I asked if he was serious about wanting to
> be an IT guy like me, to which he replied in the affirmative. I told him
> his first task is to “Tell me who Kevin Mitnik is, list some things he’s
> done, and why might an IT guy care about knowing this”. I figure I’ll get
> him on the security slant first. J
>
> ** **
>
> Dave
>
> ** **
>
> *From:* Stu Sjouwerman [mailto:s...@sunbelt-software.com]
> *Sent:* Wednesday, September 26, 2012 9:11 AM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Pen test vendors
>
>  ** **
>
> Hee hee!
>
> ** **
>
> He’s been a (very) successful security consultant since 2000,
>
> and he’s a real business partner of mine in KnowBe4.  Great
>
> guy to work with too. We wrote the Kevin Mitnick Security
>
> Awareness Training together over an 8 month period.
>
>
> Stu 
>
> ** **
>
> ** **
>
> *From:* Ziots, Edward [mailto:ezi...@lifespan.org]
> *Sent:* Tuesday, September 25, 2012 2:55 PM
> *To:* NT System Admin Issues
> *Cc:* rich...@gmail.com
> *Subject:* RE: Pen test vendors
>
> ** **
>
> LOL Stu, 
>
> ** **
>
> You know Kevin is Banned from touching computers anymore… J 
>
> ** **
>
> Z
>
> ** **
>
> Edward E. Ziots, CISSP, Security +, Network +
>
> Security Engineer
>
> Lifespan Organization
>
> ezi...@lifespan.org****
>
> ** **
>
> *From:* Stu Sjouwerman [mailto:s...@sunbelt-software.com]
> *Sent:* Tuesday, September 25, 2012 10:50 AM
> *To:* NT System Admin Issues
> *Cc:* 'rich...@gmail.com'
> *Subject:* RE: Pen test vendors
>
> ** **
>
> Richard,
>
> ** **
>
> If it’s a relatively straightforward outside-in vulnerability check that
> gives
>
> you  the low-hanging fruit, combined with an hour of consulting by a
> white-hat
>
> hacker, than I can do that for you here at KnowBe4 for a –very- low price.
> 
>
> http://www.knowbe4.com/products/vulnerability-scanning/
>
> ** **
>
> If you want a high-end pen test done, I can get you in touch with my
> business partner Kevin Mitnick.
>
> ** **
>
> Warm regards,
>
> Stu 
>
> ** **
>
> ** **
>
> *From:* Richard Stovall [mailto:rich...@gmail.com ]
> *Sent:* Monday, September 24, 2012 11:20 AM
> *To:* NT System Admin Issues
> *Subject:* Pen test vendors
>
> ** **
>
> Anyone have recommendations for reputable external pen and vulnerability
> testing vendors?
>
> ** **
>
> Thanks,
> Richard
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Pen test vendors

2012-09-26 Thread David Lum
My 19yr old is a computer geek wannabe (he has done misc. work for me and picks 
stuff up QUICK). Today I asked if he was serious about wanting to be an IT guy 
like me, to which he replied in the affirmative. I told him his first task is 
to “Tell me who Kevin Mitnik is, list some things he’s done, and why might an 
IT guy care about knowing this”. I figure I’ll get him on the security slant 
first. ☺

Dave

From: Stu Sjouwerman [mailto:s...@sunbelt-software.com]
Sent: Wednesday, September 26, 2012 9:11 AM
To: NT System Admin Issues
Subject: RE: Pen test vendors

Hee hee!

He’s been a (very) successful security consultant since 2000,
and he’s a real business partner of mine in KnowBe4.  Great
guy to work with too. We wrote the Kevin Mitnick Security
Awareness Training together over an 8 month period.

Stu


From: Ziots, Edward 
[mailto:ezi...@lifespan.org]<mailto:[mailto:ezi...@lifespan.org]>
Sent: Tuesday, September 25, 2012 2:55 PM
To: NT System Admin Issues
Cc: rich...@gmail.com<mailto:rich...@gmail.com>
Subject: RE: Pen test vendors

LOL Stu,

You know Kevin is Banned from touching computers anymore… ☺

Z

Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org<mailto:ezi...@lifespan.org>

From: Stu Sjouwerman 
[mailto:s...@sunbelt-software.com]<mailto:[mailto:s...@sunbelt-software.com]>
Sent: Tuesday, September 25, 2012 10:50 AM
To: NT System Admin Issues
Cc: 'rich...@gmail.com'
Subject: RE: Pen test vendors

Richard,

If it’s a relatively straightforward outside-in vulnerability check that gives
you  the low-hanging fruit, combined with an hour of consulting by a white-hat
hacker, than I can do that for you here at KnowBe4 for a –very- low price.
http://www.knowbe4.com/products/vulnerability-scanning/

If you want a high-end pen test done, I can get you in touch with my business 
partner Kevin Mitnick.

Warm regards,
Stu


From: Richard Stovall [mailto:rich...@gmail.com]
Sent: Monday, September 24, 2012 11:20 AM
To: NT System Admin Issues
Subject: Pen test vendors

Anyone have recommendations for reputable external pen and vulnerability 
testing vendors?

Thanks,
Richard

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: Pen test vendors

2012-09-26 Thread Stu Sjouwerman
Hee hee!

He’s been a (very) successful security consultant since 2000,
and he’s a real business partner of mine in KnowBe4.  Great
guy to work with too. We wrote the Kevin Mitnick Security
Awareness Training together over an 8 month period.

Stu


From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Tuesday, September 25, 2012 2:55 PM
To: NT System Admin Issues
Cc: rich...@gmail.com
Subject: RE: Pen test vendors

LOL Stu,

You know Kevin is Banned from touching computers anymore… ☺

Z

Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org<mailto:ezi...@lifespan.org>

From: Stu Sjouwerman 
[mailto:s...@sunbelt-software.com]<mailto:[mailto:s...@sunbelt-software.com]>
Sent: Tuesday, September 25, 2012 10:50 AM
To: NT System Admin Issues
Cc: 'rich...@gmail.com'
Subject: RE: Pen test vendors

Richard,

If it’s a relatively straightforward outside-in vulnerability check that gives
you  the low-hanging fruit, combined with an hour of consulting by a white-hat
hacker, than I can do that for you here at KnowBe4 for a –very- low price.
http://www.knowbe4.com/products/vulnerability-scanning/

If you want a high-end pen test done, I can get you in touch with my business 
partner Kevin Mitnick.

Warm regards,
Stu


From: Richard Stovall [mailto:rich...@gmail.com]
Sent: Monday, September 24, 2012 11:20 AM
To: NT System Admin Issues
Subject: Pen test vendors

Anyone have recommendations for reputable external pen and vulnerability 
testing vendors?

Thanks,
Richard

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: Pen test vendors

2012-09-25 Thread Ziots, Edward
And yes Social engineering works pretty darn well these days…

 

Z

 

Edward E. Ziots, CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org] 
Sent: Tuesday, September 25, 2012 3:34 PM
To: NT System Admin Issues
Subject: RE: Pen test vendors

 

 

He is a master at Social Engineering. He just gets others to touch the 
computers for him.

 

 

Disclaimer:  I know Kevin…a little. And I like him both personally and 
professionally very much.

 

 

From: Webster [mailto:webs...@carlwebster.com] 
Sent: Tuesday, September 25, 2012 3:30 PM
To: NT System Admin Issues
Subject: RE: Pen test vendors

 

That is why he uses voice dictation. J

 

 

Carl Webster

Consultant and Citrix Technology Professional

http://www.CarlWebster.com <http://www.carlwebster.com/> 

 

From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Subject: RE: Pen test vendors

 

LOL Stu, 

 

You know Kevin is Banned from touching computers anymore… J 

 

Z

 

 

From: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Subject: RE: Pen test vendors

 

Richard,

 

If it’s a relatively straightforward outside-in vulnerability check that gives

you  the low-hanging fruit, combined with an hour of consulting by a white-hat

hacker, than I can do that for you here at KnowBe4 for a –very- low price.

http://www.knowbe4.com/products/vulnerability-scanning/ 
<http://www.knowbe4.com/products/vulnerability-scanning/> 

 

If you want a high-end pen test done, I can get you in touch with my business 
partner Kevin Mitnick.

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: Pen test vendors

2012-09-25 Thread Kennedy, Jim

He is a master at Social Engineering. He just gets others to touch the 
computers for him.


Disclaimer:  I know Kevin…a little. And I like him both personally and 
professionally very much.


From: Webster [mailto:webs...@carlwebster.com]
Sent: Tuesday, September 25, 2012 3:30 PM
To: NT System Admin Issues
Subject: RE: Pen test vendors

That is why he uses voice dictation. ☺


Carl Webster
Consultant and Citrix Technology Professional
http://www.CarlWebster.com<http://www.carlwebster.com/>

From: Ziots, Edward 
[mailto:ezi...@lifespan.org]<mailto:[mailto:ezi...@lifespan.org]>
Subject: RE: Pen test vendors

LOL Stu,

You know Kevin is Banned from touching computers anymore… ☺

Z


From: Stu Sjouwerman 
[mailto:s...@sunbelt-software.com]<mailto:[mailto:s...@sunbelt-software.com]>
Subject: RE: Pen test vendors

Richard,

If it’s a relatively straightforward outside-in vulnerability check that gives
you  the low-hanging fruit, combined with an hour of consulting by a white-hat
hacker, than I can do that for you here at KnowBe4 for a –very- low price.
http://www.knowbe4.com/products/vulnerability-scanning/

If you want a high-end pen test done, I can get you in touch with my business 
partner Kevin Mitnick.


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: Pen test vendors

2012-09-25 Thread Webster
That is why he uses voice dictation. ☺


Carl Webster
Consultant and Citrix Technology Professional
http://www.CarlWebster.com<http://www.carlwebster.com/>

From: Ziots, Edward [mailto:ezi...@lifespan.org]
Subject: RE: Pen test vendors

LOL Stu,

You know Kevin is Banned from touching computers anymore… ☺

Z


From: Stu Sjouwerman 
[mailto:s...@sunbelt-software.com]<mailto:[mailto:s...@sunbelt-software.com]>
Subject: RE: Pen test vendors

Richard,

If it’s a relatively straightforward outside-in vulnerability check that gives
you  the low-hanging fruit, combined with an hour of consulting by a white-hat
hacker, than I can do that for you here at KnowBe4 for a –very- low price.
http://www.knowbe4.com/products/vulnerability-scanning/

If you want a high-end pen test done, I can get you in touch with my business 
partner Kevin Mitnick.


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: Pen test vendors

2012-09-25 Thread Ziots, Edward
LOL Stu, 

 

You know Kevin is Banned from touching computers anymore… J 

 

Z

 

Edward E. Ziots, CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Sent: Tuesday, September 25, 2012 10:50 AM
To: NT System Admin Issues
Cc: 'rich...@gmail.com'
Subject: RE: Pen test vendors

 

Richard,

 

If it’s a relatively straightforward outside-in vulnerability check that gives

you  the low-hanging fruit, combined with an hour of consulting by a white-hat

hacker, than I can do that for you here at KnowBe4 for a –very- low price.

http://www.knowbe4.com/products/vulnerability-scanning/ 
<http://www.knowbe4.com/products/vulnerability-scanning/> 

 

If you want a high-end pen test done, I can get you in touch with my business 
partner Kevin Mitnick.

 

Warm regards,

Stu 

 

 

From: Richard Stovall [mailto:rich...@gmail.com] 
Sent: Monday, September 24, 2012 11:20 AM
To: NT System Admin Issues
Subject: Pen test vendors

 

Anyone have recommendations for reputable external pen and vulnerability 
testing vendors?

 

Thanks,
Richard

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: Pen test vendors

2012-09-25 Thread Stu Sjouwerman
Richard,

If it’s a relatively straightforward outside-in vulnerability check that gives
you  the low-hanging fruit, combined with an hour of consulting by a white-hat
hacker, than I can do that for you here at KnowBe4 for a –very- low price.
http://www.knowbe4.com/products/vulnerability-scanning/

If you want a high-end pen test done, I can get you in touch with my business 
partner Kevin Mitnick.

Warm regards,
Stu


From: Richard Stovall [mailto:rich...@gmail.com]
Sent: Monday, September 24, 2012 11:20 AM
To: NT System Admin Issues
Subject: Pen test vendors

Anyone have recommendations for reputable external pen and vulnerability 
testing vendors?

Thanks,
Richard

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: Pen test vendors

2012-09-24 Thread Shane Mullins
Sycom has an excellent pen tester.  CCIE Security, CISSP as well as pen
certs.

Shane


On Mon, Sep 24, 2012 at 11:25 AM, Kennedy, Jim  wrote:

>  
>
> ** **
>
> My kid, he is famous. J
>
> ** **
>
> https://www.trustedsec.com/
>
> ** **
>
> 
>
> ** **
>
> If he is too busy for you, or too expensive or not what you need let me
> know. He has a boatload of connections in that business that he/I can refer
> you to. He is REALLY busy this week. It’s DerbyCon this week and he
> owns/runs that conference.
>
> ** **
>
> ** **
>
> *From:* Richard Stovall [mailto:rich...@gmail.com]
> *Sent:* Monday, September 24, 2012 11:23 AM
> *To:* NT System Admin Issues
> *Subject:* Pen test vendors
>
> ** **
>
> Anyone have recommendations for reputable external pen and vulnerability
> testing vendors?
>
> ** **
>
> Thanks,
> Richard
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Need some help with a Beta Test

2012-06-06 Thread Graeme Carstairs
How did this go,

I thoguht the training was very good, but have received no feedback on
whetther I was one of the first 30 or not.

Graeme


On 1 June 2012 15:38, Stu Sjouwerman  wrote:

> HI All, 
>
> ** **
>
> Know anyone that can jump on this and help out? Please forward to anyone
> you know.
>
> ** **
>
> Make 30 Bucks In 30 Minutes!: Beta Test
>
> We need immediate Beta Testers for our Internet Security Awareness
> Training! This is a THIS WEEKEND thing. We need your feedback before Sunday
> night. You can make 30 bucks in 30 minutes. Do the training, fill out the
> survey and the first 10 people to respond get a $30 Amazon Gift Cert sent
> to them on Monday. Anyone else still gets a very nice surprise reward. Help
> keep the Internet safe and please do this immediately!? Thanks so much in
> advance.
>
> ** **
>
> http://blog.knowbe4.com/make-30-bucks-in-30-minutes-beta-test/
>
> ** **
>
> Warm regards,
>
>
> Stu
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>



-- 
Good news everyone, you have just received an e-mail from me!

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Need some help with a Beta Test

2012-06-01 Thread Graeme Carstairs
Done,

Very interesting and well done training would be good for all users to have
to sit this before being allowed near a computer

Well done


On 1 June 2012 15:38, Stu Sjouwerman  wrote:

> HI All, 
>
> ** **
>
> Know anyone that can jump on this and help out? Please forward to anyone
> you know.
>
> ** **
>
> Make 30 Bucks In 30 Minutes!: Beta Test
>
> We need immediate Beta Testers for our Internet Security Awareness
> Training! This is a THIS WEEKEND thing. We need your feedback before Sunday
> night. You can make 30 bucks in 30 minutes. Do the training, fill out the
> survey and the first 10 people to respond get a $30 Amazon Gift Cert sent
> to them on Monday. Anyone else still gets a very nice surprise reward. Help
> keep the Internet safe and please do this immediately!? Thanks so much in
> advance.
>
> ** **
>
> http://blog.knowbe4.com/make-30-bucks-in-30-minutes-beta-test/
>
> ** **
>
> Warm regards,
>
>
> Stu
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>



-- 
Good news everyone, you have just received an e-mail from me!

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-15 Thread Jeff Steward
I've taken a few SANS courses over the years - the week long, drink from a
fire hose marathons - and found them to be hands-down the best training
ever.

-Jeff Steward

On Tue, Mar 13, 2012 at 2:40 PM, Alan Davies wrote:

> **
> You're right - you don't see SANS all that often on JDs (though DoD ask
> for it and a few other US agencies .. I'm UK based and you also see it a
> bit more here now including some Home Office/Intelligence areas).  However,
> I've always found it something of a talking point in interviews, and having
> the written assignments published (what's called a Gold certification these
> days) can also help demonstrate writing skills and ability to explain
> highly technical data clearly.
>
> Personally, I find GSEC (and therefore CISSP since they're 75% similar) a
> nightmare to study for!  Too much information .. 10 miles high and 1cm
> deep.  Much prefer the "harder" certs where you go really deep in one area
> like GCIH.  The main advantage of SANS certs however is their instructors
> and content - the ability to hit the ground running afterwards.  You will
> do your job better after attending unless you are God-like already!
>
> Anyway, I feel the OT giant coming to tickle me, so I'll hush now before a
> huge conversation on certifications starts up! =)
>
>
>
> a
>
>  --
> *From:* Ziots, Edward [mailto:ezi...@lifespan.org]
> *Sent:* 13 March 2012 15:49
>
> *To:* NT System Admin Issues
> *Subject:* RE: Vulnerability scanning, and calling it a Pen test the rant
> continues
>
>  Yeah going to need it, got less time than CISSP to study for this one,
> but I know 3-5 domains cold from the CISSP so that is just a review, I just
> need to think about stuff through the auditors eyes. Looking for a pass the
> first time, and then off to C.E.H and CRISC in December. I have been
> thinking about the SANS certifications but I just don’t see a clammering
> for them in the job places. I was looking to possibly go the GSNA route
> which would tie in with my CISA (when I get it)
>
> ** **
>
> GL On your GSEC re-cert you should ace that pretty easy, GCIH is a little
> harder but not unachieveable. 
>
> ** **
>
> Z
>
> ** **
>
> Edward Ziots
>
> CISSP, Security +, Network +
>
> Security Engineer
>
> Lifespan Organization
>
> ezi...@lifespan.org
>
> ** **
>
> *From:* Alan Davies [mailto:adav...@cls-services.com]
> *Sent:* Tuesday, March 13, 2012 10:04 AM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Vulnerability scanning, and calling it a Pen test the rant
> continues
>
> ** **
>
> Yup, no disagreement there .. my response was more to Stu's point in that
> what he described can help increase security in a very general manner in an
> organisation, but really the business context is where the value is.
>
>  
>
> Good luck with the CISA!  I'm re-certifying my GSEC again at the moment
> and GCIH this time next year, so also under a weight of study and prep! ;o)
> 
>
>  
>
>  
>
>  
>
> a
>
> ** **
>  --
>
> *From:* Ziots, Edward [mailto:ezi...@lifespan.org ]
> *Sent:* 13 March 2012 12:59
> *To:* NT System Admin Issues
> *Subject:* RE: Vulnerability scanning, and calling it a Pen test the rant
> continues
> 
>
> Alan, 
>
> ** **
>
> I totally agree, that is why I always vet the scans I get from any VA scan
> and qualitatively risk prioritize them based on what is critical for the
> business. Again with healthcare its protection of the CIA of EPHI when
> stored, transmitted or processed and any and all systems that are in the
> eco-system of that processing. 
>
> ** **
>
> The scans are done as part testing of the controls of an information
> system, but it is not a means to an end nor is its findings absolutely
> material to an auditor in determining the controls or lack thereof in an
> information system, there are plenty of other things that an auditor must
> consider via the ISACA auditing standard ( trust me I am going to be taking
> my CISA in june, and there is a lot more to it than I even understood,
> because I was only looking at it from the Risk Management and Compliance
> aspect, and totally missed all the pieces that make up Governance)
>
> ** **
>
> But I do agree Auditors are usually not technical enough to go deep enough
> into the technologies and find the trust issues so they can be raised to
> management and corrective actions to be taken, this is one of the issues I
> have always had sometimes when dealing with

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-15 Thread Stu Sjouwerman
Thanks for the feedback guys.

Stu

From: Alan Davies [mailto:adav...@cls-services.com]
Sent: Thursday, March 15, 2012 5:44 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Hey Stu - hard to say from just the advertising onsite, but such products can 
certainly be helpful.  Nothing particularly new that I can see unless they have 
some stunning USP that hasn't been seen in other such products over the last 10 
years or so.  Being relatively new to market, they certainly have the 
opportunity to be clean and lean rather than bloated and adapted (you know .. 
the Symantec kinda way!) ;o)



a


From: Stu Sjouwerman 
[mailto:s...@sunbelt-software.com]<mailto:[mailto:s...@sunbelt-software.com]>
Sent: 14 March 2012 17:41
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues
Guys, could you do me a favor, have a look at this product (it's relevant to 
the discussion)
and tell me what you think about this new kind of functionality?  Thanks !
http://www.knowbe4.com/products/instant-revert/
Stu


From: Alan Davies 
[mailto:adav...@cls-services.com]<mailto:[mailto:adav...@cls-services.com]>
Sent: Tuesday, March 13, 2012 2:40 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

You're right - you don't see SANS all that often on JDs (though DoD ask for it 
and a few other US agencies .. I'm UK based and you also see it a bit more here 
now including some Home Office/Intelligence areas).  However, I've always found 
it something of a talking point in interviews, and having the written 
assignments published (what's called a Gold certification these days) can also 
help demonstrate writing skills and ability to explain highly technical data 
clearly.

Personally, I find GSEC (and therefore CISSP since they're 75% similar) a 
nightmare to study for!  Too much information .. 10 miles high and 1cm deep.  
Much prefer the "harder" certs where you go really deep in one area like GCIH.  
The main advantage of SANS certs however is their instructors and content - the 
ability to hit the ground running afterwards.  You will do your job better 
after attending unless you are God-like already!

Anyway, I feel the OT giant coming to tickle me, so I'll hush now before a huge 
conversation on certifications starts up! =)



a


From: Ziots, Edward 
[mailto:ezi...@lifespan.org]<mailto:[mailto:ezi...@lifespan.org]>
Sent: 13 March 2012 15:49
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues
Yeah going to need it, got less time than CISSP to study for this one, but I 
know 3-5 domains cold from the CISSP so that is just a review, I just need to 
think about stuff through the auditors eyes. Looking for a pass the first time, 
and then off to C.E.H and CRISC in December. I have been thinking about the 
SANS certifications but I just don't see a clammering for them in the job 
places. I was looking to possibly go the GSNA route which would tie in with my 
CISA (when I get it)

GL On your GSEC re-cert you should ace that pretty easy, GCIH is a little 
harder but not unachieveable.

Z

Edward Ziots
CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org<mailto:ezi...@lifespan.org>

From: Alan Davies 
[mailto:adav...@cls-services.com]<mailto:[mailto:adav...@cls-services.com]>
Sent: Tuesday, March 13, 2012 10:04 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Yup, no disagreement there .. my response was more to Stu's point in that what 
he described can help increase security in a very general manner in an 
organisation, but really the business context is where the value is.

Good luck with the CISA!  I'm re-certifying my GSEC again at the moment and 
GCIH this time next year, so also under a weight of study and prep! ;o)



a


From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: 13 March 2012 12:59
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues
Alan,

I totally agree, that is why I always vet the scans I get from any VA scan and 
qualitatively risk prioritize them based on what is critical for the business. 
Again with healthcare its protection of the CIA of EPHI when stored, 
transmitted or processed and any and all systems that are in the eco-system of 
that processing.

The scans are done as part testing of the controls of an information system, 
but it is not a means to an end nor is its findings absolutely material to an 
auditor in determining the controls or lack thereof in an information system, 
there are plenty of other things that an 

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-15 Thread Alan Davies
Hey Stu - hard to say from just the advertising onsite, but such products can 
certainly be helpful.  Nothing particularly new that I can see unless they have 
some stunning USP that hasn't been seen in other such products over the last 10 
years or so.  Being relatively new to market, they certainly have the 
opportunity to be clean and lean rather than bloated and adapted (you know .. 
the Symantec kinda way!) ;o)
 
 
 
a



From: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Sent: 14 March 2012 17:41
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues



Guys, could you do me a favor, have a look at this product (it's relevant to 
the discussion)

and tell me what you think about this new kind of functionality?  Thanks !

http://www.knowbe4.com/products/instant-revert/
Stu 

 

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Tuesday, March 13, 2012 2:40 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

You're right - you don't see SANS all that often on JDs (though DoD ask for it 
and a few other US agencies .. I'm UK based and you also see it a bit more here 
now including some Home Office/Intelligence areas).  However, I've always found 
it something of a talking point in interviews, and having the written 
assignments published (what's called a Gold certification these days) can also 
help demonstrate writing skills and ability to explain highly technical data 
clearly.

 

Personally, I find GSEC (and therefore CISSP since they're 75% similar) a 
nightmare to study for!  Too much information .. 10 miles high and 1cm deep.  
Much prefer the "harder" certs where you go really deep in one area like GCIH.  
The main advantage of SANS certs however is their instructors and content - the 
ability to hit the ground running afterwards.  You will do your job better 
after attending unless you are God-like already!

 

Anyway, I feel the OT giant coming to tickle me, so I'll hush now before a huge 
conversation on certifications starts up! =)

 

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 13 March 2012 15:49
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Yeah going to need it, got less time than CISSP to study for this one, but I 
know 3-5 domains cold from the CISSP so that is just a review, I just need to 
think about stuff through the auditors eyes. Looking for a pass the first time, 
and then off to C.E.H and CRISC in December. I have been thinking about the 
SANS certifications but I just don't see a clammering for them in the job 
places. I was looking to possibly go the GSNA route which would tie in with my 
CISA (when I get it)

 

GL On your GSEC re-cert you should ace that pretty easy, GCIH is a little 
harder but not unachieveable. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Tuesday, March 13, 2012 10:04 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

Yup, no disagreement there .. my response was more to Stu's point in that what 
he described can help increase security in a very general manner in an 
organisation, but really the business context is where the value is.

 

Good luck with the CISA!  I'm re-certifying my GSEC again at the moment and 
GCIH this time next year, so also under a weight of study and prep! ;o)

 

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 13 March 2012 12:59
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Alan, 

 

I totally agree, that is why I always vet the scans I get from any VA scan and 
qualitatively risk prioritize them based on what is critical for the business. 
Again with healthcare its protection of the CIA of EPHI when stored, 
transmitted or processed and any and all systems that are in the eco-system of 
that processing. 

 

The scans are done as part testing of the controls of an information system, 
but it is not a means to an end nor is its findings absolutely material to an 
auditor in determining the controls or lack thereof in an information system, 
there are plenty of other things that an auditor must consider via the ISACA 
auditing standard ( trust me I am going to be taking my CISA in june, and there 
is a lot more to it than I even understood, because I was only looking at it 
from the Risk Management and Compliance aspect, and totally missed all the 
pieces that make up Governance)

 

But I do agree Auditors are usually not technical enough to go deep enough 

Re: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-14 Thread Richard Stovall
Tell ya what.

We all promise to take the survey when you let us know what the plans for
Lyris are.

Deal?

On Wed, Mar 14, 2012 at 1:40 PM, Stu Sjouwerman
wrote:

> Guys, could you do me a favor, have a look at this product (it’s relevant
> to the discussion)
>
> and tell me what you think about this new kind of functionality?  Thanks !
> 
>
> http://www.knowbe4.com/products/instant-revert/
> Stu 
>
> ** **
>
> ** **
>
> *From:* Alan Davies [mailto:adav...@cls-services.com]
> *Sent:* Tuesday, March 13, 2012 2:40 PM
> *To:* NT System Admin Issues
> *Subject:* RE: Vulnerability scanning, and calling it a Pen test the rant
> continues
>
> ** **
>
> You're right - you don't see SANS all that often on JDs (though DoD ask
> for it and a few other US agencies .. I'm UK based and you also see it a
> bit more here now including some Home Office/Intelligence areas).  However,
> I've always found it something of a talking point in interviews, and having
> the written assignments published (what's called a Gold certification these
> days) can also help demonstrate writing skills and ability to explain
> highly technical data clearly.
>
>  
>
> Personally, I find GSEC (and therefore CISSP since they're 75% similar) a
> nightmare to study for!  Too much information .. 10 miles high and 1cm
> deep.  Much prefer the "harder" certs where you go really deep in one area
> like GCIH.  The main advantage of SANS certs however is their instructors
> and content - the ability to hit the ground running afterwards.  You will
> do your job better after attending unless you are God-like already!
>
>  
>
> Anyway, I feel the OT giant coming to tickle me, so I'll hush now before a
> huge conversation on certifications starts up! =)
>
>  
>
>  
>
>  
>
> a
>
> ** **
> --
>
> *From:* Ziots, Edward [mailto:ezi...@lifespan.org]
> *Sent:* 13 March 2012 15:49
> *To:* NT System Admin Issues
> *Subject:* RE: Vulnerability scanning, and calling it a Pen test the rant
> continues
>
> Yeah going to need it, got less time than CISSP to study for this one, but
> I know 3-5 domains cold from the CISSP so that is just a review, I just
> need to think about stuff through the auditors eyes. Looking for a pass the
> first time, and then off to C.E.H and CRISC in December. I have been
> thinking about the SANS certifications but I just don’t see a clammering
> for them in the job places. I was looking to possibly go the GSNA route
> which would tie in with my CISA (when I get it)
>
> ** **
>
> GL On your GSEC re-cert you should ace that pretty easy, GCIH is a little
> harder but not unachieveable. 
>
> ** **
>
> Z
>
> ** **
>
> Edward Ziots
>
> CISSP, Security +, Network +****
>
> Security Engineer
>
> Lifespan Organization
>
> ezi...@lifespan.org
>
> ** **
>
> *From:* Alan Davies [mailto:adav...@cls-services.com]
> *Sent:* Tuesday, March 13, 2012 10:04 AM
> *To:* NT System Admin Issues
> *Subject:* RE: Vulnerability scanning, and calling it a Pen test the rant
> continues
>
> ** **
>
> Yup, no disagreement there .. my response was more to Stu's point in that
> what he described can help increase security in a very general manner in an
> organisation, but really the business context is where the value is.
>
>  
>
> Good luck with the CISA!  I'm re-certifying my GSEC again at the moment
> and GCIH this time next year, so also under a weight of study and prep! ;o)
> 
>
>  
>
>  
>
>  
>
> a
>
> ** **
> --
>
> *From:* Ziots, Edward [mailto:ezi...@lifespan.org ]
> *Sent:* 13 March 2012 12:59
> *To:* NT System Admin Issues
> *Subject:* RE: Vulnerability scanning, and calling it a Pen test the rant
> continues
>
> Alan, 
>
> ** **
>
> I totally agree, that is why I always vet the scans I get from any VA scan
> and qualitatively risk prioritize them based on what is critical for the
> business. Again with healthcare its protection of the CIA of EPHI when
> stored, transmitted or processed and any and all systems that are in the
> eco-system of that processing. 
>
> ** **
>
> The scans are done as part testing of the controls of an information
> system, but it is not a means to an end nor is its findings absolutely
> material to an auditor in determining the controls or lack thereof in an
> information system, there are plenty of other things that an auditor must
> consider via the ISACA auditing stand

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-14 Thread Ziots, Edward
Just took a look, its got promise, as long as you can tie in the settings into 
what is required for compliance, for HIPAA its more risk based, and you can 
adjust what your preferred settings would be to balance function and security. 
With PCI though its very black and white, it either it is, or isn't and its 
going to take a PCI QSA to tell you whether you are PCI Compliant, no product 
is going to do it all for you.  Now if the product could map the revelant 
sections of PCI DSS 2.0 to settings that must be on the server that would be of 
help. 

 

As for Sarbanes Oxley and GLBA again no experience with those, but I would say 
that if they are driven towards financial accounting, then maybe this product 
might not hit those marks. 

 

Z 

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Sent: Wednesday, March 14, 2012 1:41 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

Guys, could you do me a favor, have a look at this product (it's relevant to 
the discussion)

and tell me what you think about this new kind of functionality?  Thanks !

http://www.knowbe4.com/products/instant-revert/
Stu 

 

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Tuesday, March 13, 2012 2:40 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

You're right - you don't see SANS all that often on JDs (though DoD ask for it 
and a few other US agencies .. I'm UK based and you also see it a bit more here 
now including some Home Office/Intelligence areas).  However, I've always found 
it something of a talking point in interviews, and having the written 
assignments published (what's called a Gold certification these days) can also 
help demonstrate writing skills and ability to explain highly technical data 
clearly.

 

Personally, I find GSEC (and therefore CISSP since they're 75% similar) a 
nightmare to study for!  Too much information .. 10 miles high and 1cm deep.  
Much prefer the "harder" certs where you go really deep in one area like GCIH.  
The main advantage of SANS certs however is their instructors and content - the 
ability to hit the ground running afterwards.  You will do your job better 
after attending unless you are God-like already!

 

Anyway, I feel the OT giant coming to tickle me, so I'll hush now before a huge 
conversation on certifications starts up! =)

 

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 13 March 2012 15:49
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Yeah going to need it, got less time than CISSP to study for this one, but I 
know 3-5 domains cold from the CISSP so that is just a review, I just need to 
think about stuff through the auditors eyes. Looking for a pass the first time, 
and then off to C.E.H and CRISC in December. I have been thinking about the 
SANS certifications but I just don't see a clammering for them in the job 
places. I was looking to possibly go the GSNA route which would tie in with my 
CISA (when I get it)

 

GL On your GSEC re-cert you should ace that pretty easy, GCIH is a little 
harder but not unachieveable. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Tuesday, March 13, 2012 10:04 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

Yup, no disagreement there .. my response was more to Stu's point in that what 
he described can help increase security in a very general manner in an 
organisation, but really the business context is where the value is.

 

Good luck with the CISA!  I'm re-certifying my GSEC again at the moment and 
GCIH this time next year, so also under a weight of study and prep! ;o)

 

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 13 March 2012 12:59
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Alan, 

 

I totally agree, that is why I always vet the scans I get from any VA scan and 
qualitatively risk prioritize them based on what is critical for the business. 
Again with healthcare its protection of the CIA of EPHI when stored, 
transmitted or processed and any and all systems that are in the eco-system of 
that processing. 

 

The scans are done as part testing of the controls of an information system, 
but it is not a means to an end nor is its findings absolutely material to an 
auditor in determining the controls or lack thereof in an information system, 

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-14 Thread Ziots, Edward
I agree on the Sans training took 501 Auditing Perimeter networks with Tanya 
Baccam and hit the the grown running working with Backtrack 4/5 auditing my 
systems well worth the price I paided for the 6 day course. I definitely 
recommend taking any course that she teaches, a lot of fun and smart also. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Sent: Wednesday, March 14, 2012 1:41 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

Guys, could you do me a favor, have a look at this product (it's relevant to 
the discussion)

and tell me what you think about this new kind of functionality?  Thanks !

http://www.knowbe4.com/products/instant-revert/
Stu 

 

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Tuesday, March 13, 2012 2:40 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

You're right - you don't see SANS all that often on JDs (though DoD ask for it 
and a few other US agencies .. I'm UK based and you also see it a bit more here 
now including some Home Office/Intelligence areas).  However, I've always found 
it something of a talking point in interviews, and having the written 
assignments published (what's called a Gold certification these days) can also 
help demonstrate writing skills and ability to explain highly technical data 
clearly.

 

Personally, I find GSEC (and therefore CISSP since they're 75% similar) a 
nightmare to study for!  Too much information .. 10 miles high and 1cm deep.  
Much prefer the "harder" certs where you go really deep in one area like GCIH.  
The main advantage of SANS certs however is their instructors and content - the 
ability to hit the ground running afterwards.  You will do your job better 
after attending unless you are God-like already!

 

Anyway, I feel the OT giant coming to tickle me, so I'll hush now before a huge 
conversation on certifications starts up! =)

 

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 13 March 2012 15:49
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Yeah going to need it, got less time than CISSP to study for this one, but I 
know 3-5 domains cold from the CISSP so that is just a review, I just need to 
think about stuff through the auditors eyes. Looking for a pass the first time, 
and then off to C.E.H and CRISC in December. I have been thinking about the 
SANS certifications but I just don't see a clammering for them in the job 
places. I was looking to possibly go the GSNA route which would tie in with my 
CISA (when I get it)

 

GL On your GSEC re-cert you should ace that pretty easy, GCIH is a little 
harder but not unachieveable. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Tuesday, March 13, 2012 10:04 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

Yup, no disagreement there .. my response was more to Stu's point in that what 
he described can help increase security in a very general manner in an 
organisation, but really the business context is where the value is.

 

Good luck with the CISA!  I'm re-certifying my GSEC again at the moment and 
GCIH this time next year, so also under a weight of study and prep! ;o)

 

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 13 March 2012 12:59
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Alan, 

 

I totally agree, that is why I always vet the scans I get from any VA scan and 
qualitatively risk prioritize them based on what is critical for the business. 
Again with healthcare its protection of the CIA of EPHI when stored, 
transmitted or processed and any and all systems that are in the eco-system of 
that processing. 

 

The scans are done as part testing of the controls of an information system, 
but it is not a means to an end nor is its findings absolutely material to an 
auditor in determining the controls or lack thereof in an information system, 
there are plenty of other things that an auditor must consider via the ISACA 
auditing standard ( trust me I am going to be taking my CISA in june, and there 
is a lot more to it than I even understood, because I was only looking at it 
from the Risk Management and Compliance aspect, and totally missed all the 
pieces that make up Governance)

 

But I do agree Auditors are usually not technical enough to go deep enough into 
the technologies a

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-14 Thread Stu Sjouwerman
Guys, could you do me a favor, have a look at this product (it's relevant to 
the discussion)
and tell me what you think about this new kind of functionality?  Thanks !
http://www.knowbe4.com/products/instant-revert/
Stu


From: Alan Davies [mailto:adav...@cls-services.com]
Sent: Tuesday, March 13, 2012 2:40 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

You're right - you don't see SANS all that often on JDs (though DoD ask for it 
and a few other US agencies .. I'm UK based and you also see it a bit more here 
now including some Home Office/Intelligence areas).  However, I've always found 
it something of a talking point in interviews, and having the written 
assignments published (what's called a Gold certification these days) can also 
help demonstrate writing skills and ability to explain highly technical data 
clearly.

Personally, I find GSEC (and therefore CISSP since they're 75% similar) a 
nightmare to study for!  Too much information .. 10 miles high and 1cm deep.  
Much prefer the "harder" certs where you go really deep in one area like GCIH.  
The main advantage of SANS certs however is their instructors and content - the 
ability to hit the ground running afterwards.  You will do your job better 
after attending unless you are God-like already!

Anyway, I feel the OT giant coming to tickle me, so I'll hush now before a huge 
conversation on certifications starts up! =)



a


From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: 13 March 2012 15:49
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues
Yeah going to need it, got less time than CISSP to study for this one, but I 
know 3-5 domains cold from the CISSP so that is just a review, I just need to 
think about stuff through the auditors eyes. Looking for a pass the first time, 
and then off to C.E.H and CRISC in December. I have been thinking about the 
SANS certifications but I just don't see a clammering for them in the job 
places. I was looking to possibly go the GSNA route which would tie in with my 
CISA (when I get it)

GL On your GSEC re-cert you should ace that pretty easy, GCIH is a little 
harder but not unachieveable.

Z

Edward Ziots
CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org<mailto:ezi...@lifespan.org>

From: Alan Davies [mailto:adav...@cls-services.com]
Sent: Tuesday, March 13, 2012 10:04 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Yup, no disagreement there .. my response was more to Stu's point in that what 
he described can help increase security in a very general manner in an 
organisation, but really the business context is where the value is.

Good luck with the CISA!  I'm re-certifying my GSEC again at the moment and 
GCIH this time next year, so also under a weight of study and prep! ;o)



a


From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: 13 March 2012 12:59
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues
Alan,

I totally agree, that is why I always vet the scans I get from any VA scan and 
qualitatively risk prioritize them based on what is critical for the business. 
Again with healthcare its protection of the CIA of EPHI when stored, 
transmitted or processed and any and all systems that are in the eco-system of 
that processing.

The scans are done as part testing of the controls of an information system, 
but it is not a means to an end nor is its findings absolutely material to an 
auditor in determining the controls or lack thereof in an information system, 
there are plenty of other things that an auditor must consider via the ISACA 
auditing standard ( trust me I am going to be taking my CISA in june, and there 
is a lot more to it than I even understood, because I was only looking at it 
from the Risk Management and Compliance aspect, and totally missed all the 
pieces that make up Governance)

But I do agree Auditors are usually not technical enough to go deep enough into 
the technologies and find the trust issues so they can be raised to management 
and corrective actions to be taken, this is one of the issues I have always had 
sometimes when dealing with auditors ( especially from the big 4 firms, they 
have had little or no background in systems administration, security 
engineering, database management, and other core responsibilities in the areas 
they are to audit, therefore they usually don't have the technical expertise 
needs to complete what needs to be done on the audit. ( which kinda goes 
contracting to what the ISACA auditing standards require)(

Z

Edward Ziots
CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lif

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-13 Thread Alan Davies
You're right - you don't see SANS all that often on JDs (though DoD ask for it 
and a few other US agencies .. I'm UK based and you also see it a bit more here 
now including some Home Office/Intelligence areas).  However, I've always found 
it something of a talking point in interviews, and having the written 
assignments published (what's called a Gold certification these days) can also 
help demonstrate writing skills and ability to explain highly technical data 
clearly.
 
Personally, I find GSEC (and therefore CISSP since they're 75% similar) a 
nightmare to study for!  Too much information .. 10 miles high and 1cm deep.  
Much prefer the "harder" certs where you go really deep in one area like GCIH.  
The main advantage of SANS certs however is their instructors and content - the 
ability to hit the ground running afterwards.  You will do your job better 
after attending unless you are God-like already!
 
Anyway, I feel the OT giant coming to tickle me, so I'll hush now before a huge 
conversation on certifications starts up! =)
 
 
 
a



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 13 March 2012 15:49
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues



Yeah going to need it, got less time than CISSP to study for this one, but I 
know 3-5 domains cold from the CISSP so that is just a review, I just need to 
think about stuff through the auditors eyes. Looking for a pass the first time, 
and then off to C.E.H and CRISC in December. I have been thinking about the 
SANS certifications but I just don't see a clammering for them in the job 
places. I was looking to possibly go the GSNA route which would tie in with my 
CISA (when I get it)

 

GL On your GSEC re-cert you should ace that pretty easy, GCIH is a little 
harder but not unachieveable. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Tuesday, March 13, 2012 10:04 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

Yup, no disagreement there .. my response was more to Stu's point in that what 
he described can help increase security in a very general manner in an 
organisation, but really the business context is where the value is.

 

Good luck with the CISA!  I'm re-certifying my GSEC again at the moment and 
GCIH this time next year, so also under a weight of study and prep! ;o)

 

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 13 March 2012 12:59
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Alan, 

 

I totally agree, that is why I always vet the scans I get from any VA scan and 
qualitatively risk prioritize them based on what is critical for the business. 
Again with healthcare its protection of the CIA of EPHI when stored, 
transmitted or processed and any and all systems that are in the eco-system of 
that processing. 

 

The scans are done as part testing of the controls of an information system, 
but it is not a means to an end nor is its findings absolutely material to an 
auditor in determining the controls or lack thereof in an information system, 
there are plenty of other things that an auditor must consider via the ISACA 
auditing standard ( trust me I am going to be taking my CISA in june, and there 
is a lot more to it than I even understood, because I was only looking at it 
from the Risk Management and Compliance aspect, and totally missed all the 
pieces that make up Governance)

 

But I do agree Auditors are usually not technical enough to go deep enough into 
the technologies and find the trust issues so they can be raised to management 
and corrective actions to be taken, this is one of the issues I have always had 
sometimes when dealing with auditors ( especially from the big 4 firms, they 
have had little or no background in systems administration, security 
engineering, database management, and other core responsibilities in the areas 
they are to audit, therefore they usually don't have the technical expertise 
needs to complete what needs to be done on the audit. ( which kinda goes 
contracting to what the ISACA auditing standards require)(

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Monday, March 12, 2012 4:59 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

I still argue that all that aside (and it can be valuable), what I generally 
want if I'm in need of a quality piece of work to free up time is a PT 
engagement where the te

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-13 Thread Ziots, Edward
Yeah going to need it, got less time than CISSP to study for this one, but I 
know 3-5 domains cold from the CISSP so that is just a review, I just need to 
think about stuff through the auditors eyes. Looking for a pass the first time, 
and then off to C.E.H and CRISC in December. I have been thinking about the 
SANS certifications but I just don't see a clammering for them in the job 
places. I was looking to possibly go the GSNA route which would tie in with my 
CISA (when I get it)

 

GL On your GSEC re-cert you should ace that pretty easy, GCIH is a little 
harder but not unachieveable. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Tuesday, March 13, 2012 10:04 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

Yup, no disagreement there .. my response was more to Stu's point in that what 
he described can help increase security in a very general manner in an 
organisation, but really the business context is where the value is.

 

Good luck with the CISA!  I'm re-certifying my GSEC again at the moment and 
GCIH this time next year, so also under a weight of study and prep! ;o)

 

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 13 March 2012 12:59
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Alan, 

 

I totally agree, that is why I always vet the scans I get from any VA scan and 
qualitatively risk prioritize them based on what is critical for the business. 
Again with healthcare its protection of the CIA of EPHI when stored, 
transmitted or processed and any and all systems that are in the eco-system of 
that processing. 

 

The scans are done as part testing of the controls of an information system, 
but it is not a means to an end nor is its findings absolutely material to an 
auditor in determining the controls or lack thereof in an information system, 
there are plenty of other things that an auditor must consider via the ISACA 
auditing standard ( trust me I am going to be taking my CISA in june, and there 
is a lot more to it than I even understood, because I was only looking at it 
from the Risk Management and Compliance aspect, and totally missed all the 
pieces that make up Governance)

 

But I do agree Auditors are usually not technical enough to go deep enough into 
the technologies and find the trust issues so they can be raised to management 
and corrective actions to be taken, this is one of the issues I have always had 
sometimes when dealing with auditors ( especially from the big 4 firms, they 
have had little or no background in systems administration, security 
engineering, database management, and other core responsibilities in the areas 
they are to audit, therefore they usually don't have the technical expertise 
needs to complete what needs to be done on the audit. ( which kinda goes 
contracting to what the ISACA auditing standards require)(

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Monday, March 12, 2012 4:59 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

I still argue that all that aside (and it can be valuable), what I generally 
want if I'm in need of a quality piece of work to free up time is a PT 
engagement where the testers are made fully aware of the business context of 
the system they are testing and the risks and exec summary framed in that 
context.  Lack of SSL on an inside VLAN may be something to fix in time, but 
it's a heck of a lot less important than the public Internet facing one; access 
to a social committee intranet server less important than a customer DB - 
stupidly simplistic, but you get the idea.

 

Canned scans are for obliging the tickbox-generation auditors and general 
information.  Business context is the only way to a valid remedial plan of 
action.

 

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 12 March 2012 19:20
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Yeah well it seems that I am digging a mile deep with a few of my own tools ( 
Backtrack, Nmap, Rapid 7 Nexpose, Metasploit) to verify what the issues are 
based on a Qualys Scan that a outside organization didn't have the time to 
"validate" the findings, so its been a real joy digging through 100's of pages 
of qualys scan information. 

 

Nessus is ok but seen the false positives with those also, 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organiza

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-13 Thread Alan Davies
Yup, no disagreement there .. my response was more to Stu's point in that what 
he described can help increase security in a very general manner in an 
organisation, but really the business context is where the value is.
 
Good luck with the CISA!  I'm re-certifying my GSEC again at the moment and 
GCIH this time next year, so also under a weight of study and prep! ;o)
 
 
 
a



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 13 March 2012 12:59
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues



Alan, 

 

I totally agree, that is why I always vet the scans I get from any VA scan and 
qualitatively risk prioritize them based on what is critical for the business. 
Again with healthcare its protection of the CIA of EPHI when stored, 
transmitted or processed and any and all systems that are in the eco-system of 
that processing. 

 

The scans are done as part testing of the controls of an information system, 
but it is not a means to an end nor is its findings absolutely material to an 
auditor in determining the controls or lack thereof in an information system, 
there are plenty of other things that an auditor must consider via the ISACA 
auditing standard ( trust me I am going to be taking my CISA in june, and there 
is a lot more to it than I even understood, because I was only looking at it 
from the Risk Management and Compliance aspect, and totally missed all the 
pieces that make up Governance)

 

But I do agree Auditors are usually not technical enough to go deep enough into 
the technologies and find the trust issues so they can be raised to management 
and corrective actions to be taken, this is one of the issues I have always had 
sometimes when dealing with auditors ( especially from the big 4 firms, they 
have had little or no background in systems administration, security 
engineering, database management, and other core responsibilities in the areas 
they are to audit, therefore they usually don't have the technical expertise 
needs to complete what needs to be done on the audit. ( which kinda goes 
contracting to what the ISACA auditing standards require)(

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Monday, March 12, 2012 4:59 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

I still argue that all that aside (and it can be valuable), what I generally 
want if I'm in need of a quality piece of work to free up time is a PT 
engagement where the testers are made fully aware of the business context of 
the system they are testing and the risks and exec summary framed in that 
context.  Lack of SSL on an inside VLAN may be something to fix in time, but 
it's a heck of a lot less important than the public Internet facing one; access 
to a social committee intranet server less important than a customer DB - 
stupidly simplistic, but you get the idea.

 

Canned scans are for obliging the tickbox-generation auditors and general 
information.  Business context is the only way to a valid remedial plan of 
action.

 

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 12 March 2012 19:20
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Yeah well it seems that I am digging a mile deep with a few of my own tools ( 
Backtrack, Nmap, Rapid 7 Nexpose, Metasploit) to verify what the issues are 
based on a Qualys Scan that a outside organization didn't have the time to 
"validate" the findings, so its been a real joy digging through 100's of pages 
of qualys scan information. 

 

Nessus is ok but seen the false positives with those also, 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Sent: Monday, March 12, 2012 2:55 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

That's what we do for our customers here. We scan with Nessus, but provide a 
shortlist of the real dangerous low hanging fruit and we poke around a bit, and 
do a conference call where we show them what the problem is. 

Warm regards,

Stu 

 

From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: Monday, March 05, 2012 8:36 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

Thanks, I am glad I am not the only one. 

 

Now if someone followed the Penetration test Execution Standard, and did a real 
Pen test and validated the business risks, then I would be impressed, so back 
to chewing through this Qualys scan and ma

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-13 Thread Ziots, Edward
Alan, 

 

I totally agree, that is why I always vet the scans I get from any VA scan and 
qualitatively risk prioritize them based on what is critical for the business. 
Again with healthcare its protection of the CIA of EPHI when stored, 
transmitted or processed and any and all systems that are in the eco-system of 
that processing. 

 

The scans are done as part testing of the controls of an information system, 
but it is not a means to an end nor is its findings absolutely material to an 
auditor in determining the controls or lack thereof in an information system, 
there are plenty of other things that an auditor must consider via the ISACA 
auditing standard ( trust me I am going to be taking my CISA in june, and there 
is a lot more to it than I even understood, because I was only looking at it 
from the Risk Management and Compliance aspect, and totally missed all the 
pieces that make up Governance)

 

But I do agree Auditors are usually not technical enough to go deep enough into 
the technologies and find the trust issues so they can be raised to management 
and corrective actions to be taken, this is one of the issues I have always had 
sometimes when dealing with auditors ( especially from the big 4 firms, they 
have had little or no background in systems administration, security 
engineering, database management, and other core responsibilities in the areas 
they are to audit, therefore they usually don't have the technical expertise 
needs to complete what needs to be done on the audit. ( which kinda goes 
contracting to what the ISACA auditing standards require)(

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Monday, March 12, 2012 4:59 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

I still argue that all that aside (and it can be valuable), what I generally 
want if I'm in need of a quality piece of work to free up time is a PT 
engagement where the testers are made fully aware of the business context of 
the system they are testing and the risks and exec summary framed in that 
context.  Lack of SSL on an inside VLAN may be something to fix in time, but 
it's a heck of a lot less important than the public Internet facing one; access 
to a social committee intranet server less important than a customer DB - 
stupidly simplistic, but you get the idea.

 

Canned scans are for obliging the tickbox-generation auditors and general 
information.  Business context is the only way to a valid remedial plan of 
action.

 

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 12 March 2012 19:20
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Yeah well it seems that I am digging a mile deep with a few of my own tools ( 
Backtrack, Nmap, Rapid 7 Nexpose, Metasploit) to verify what the issues are 
based on a Qualys Scan that a outside organization didn't have the time to 
"validate" the findings, so its been a real joy digging through 100's of pages 
of qualys scan information. 

 

Nessus is ok but seen the false positives with those also, 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Sent: Monday, March 12, 2012 2:55 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

That's what we do for our customers here. We scan with Nessus, but provide a 
shortlist of the real dangerous low hanging fruit and we poke around a bit, and 
do a conference call where we show them what the problem is. 

Warm regards,

Stu 

 

From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: Monday, March 05, 2012 8:36 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

Thanks, I am glad I am not the only one. 

 

Now if someone followed the Penetration test Execution Standard, and did a real 
Pen test and validated the business risks, then I would be impressed, so back 
to chewing through this Qualys scan and making heads or tails of what needs to 
be fixed and what isn't a big risk. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Monday, March 05, 2012 8:25 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

You pays for what you gets ... even reports of actions that go beyond VA into 
PT still aren't a proper PT engagement if they're not in a meaningful report, 
written in English!

 

Having said that, som

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-12 Thread Alan Davies
I still argue that all that aside (and it can be valuable), what I generally 
want if I'm in need of a quality piece of work to free up time is a PT 
engagement where the testers are made fully aware of the business context of 
the system they are testing and the risks and exec summary framed in that 
context.  Lack of SSL on an inside VLAN may be something to fix in time, but 
it's a heck of a lot less important than the public Internet facing one; access 
to a social committee intranet server less important than a customer DB - 
stupidly simplistic, but you get the idea.
 
Canned scans are for obliging the tickbox-generation auditors and general 
information.  Business context is the only way to a valid remedial plan of 
action.
 
 
 
a



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 12 March 2012 19:20
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues



Yeah well it seems that I am digging a mile deep with a few of my own tools ( 
Backtrack, Nmap, Rapid 7 Nexpose, Metasploit) to verify what the issues are 
based on a Qualys Scan that a outside organization didn't have the time to 
"validate" the findings, so its been a real joy digging through 100's of pages 
of qualys scan information. 

 

Nessus is ok but seen the false positives with those also, 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Sent: Monday, March 12, 2012 2:55 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

That's what we do for our customers here. We scan with Nessus, but provide a 
shortlist of the real dangerous low hanging fruit and we poke around a bit, and 
do a conference call where we show them what the problem is. 

Warm regards,

Stu 

 

From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: Monday, March 05, 2012 8:36 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

Thanks, I am glad I am not the only one. 

 

Now if someone followed the Penetration test Execution Standard, and did a real 
Pen test and validated the business risks, then I would be impressed, so back 
to chewing through this Qualys scan and making heads or tails of what needs to 
be fixed and what isn't a big risk. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Monday, March 05, 2012 8:25 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

You pays for what you gets ... even reports of actions that go beyond VA into 
PT still aren't a proper PT engagement if they're not in a meaningful report, 
written in English!

 

Having said that, sometimes you just want to know if something can be broken 
and do the rest yourself.  Rarely though .. I have 1better things to do with my 
time than translating someone else's results into an Exec Summary and business 
context specific findings

 

Rant welcome :o)

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 05 March 2012 13:12
To: NT System Admin Issues
Subject: Vulnerability scanning, and calling it a Pen test the rant continues

Not sure if anyone on the list is responsible for Vul Scanning in their 
organizations/business or Pen testing there systems, but it still blows my mind 
that we have folks out there providing services to organizations and business 
calling the output from a Qualys or Nessus vulnerability scanner a Pen-test.  I 
am current been going through someone else work for about 1.5 weeks validating 
the scanners findings on the systems, so I can get working on slimming down a 
225 page report to something that is realistic and achievable. 

 

Sorry about the rant, it isn't how I wanted to start my Monday morning. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



WARNING:

The information in this email and any attachments is confidential and may be 
legally privileged.

 

If you are not the named addressee, you must not use, copy or disclose this 
email (including any attachments) or the information in it save to the named 
addressee nor take any 

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-12 Thread Ziots, Edward
Yeah well it seems that I am digging a mile deep with a few of my own tools ( 
Backtrack, Nmap, Rapid 7 Nexpose, Metasploit) to verify what the issues are 
based on a Qualys Scan that a outside organization didn't have the time to 
"validate" the findings, so its been a real joy digging through 100's of pages 
of qualys scan information. 

 

Nessus is ok but seen the false positives with those also, 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Sent: Monday, March 12, 2012 2:55 PM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

That's what we do for our customers here. We scan with Nessus, but provide a 
shortlist of the real dangerous low hanging fruit and we poke around a bit, and 
do a conference call where we show them what the problem is. 

Warm regards,

Stu 

 

From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: Monday, March 05, 2012 8:36 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

Thanks, I am glad I am not the only one. 

 

Now if someone followed the Penetration test Execution Standard, and did a real 
Pen test and validated the business risks, then I would be impressed, so back 
to chewing through this Qualys scan and making heads or tails of what needs to 
be fixed and what isn't a big risk. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Monday, March 05, 2012 8:25 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

You pays for what you gets ... even reports of actions that go beyond VA into 
PT still aren't a proper PT engagement if they're not in a meaningful report, 
written in English!

 

Having said that, sometimes you just want to know if something can be broken 
and do the rest yourself.  Rarely though .. I have 1better things to do with my 
time than translating someone else's results into an Exec Summary and business 
context specific findings

 

Rant welcome :o)

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 05 March 2012 13:12
To: NT System Admin Issues
Subject: Vulnerability scanning, and calling it a Pen test the rant continues

Not sure if anyone on the list is responsible for Vul Scanning in their 
organizations/business or Pen testing there systems, but it still blows my mind 
that we have folks out there providing services to organizations and business 
calling the output from a Qualys or Nessus vulnerability scanner a Pen-test.  I 
am current been going through someone else work for about 1.5 weeks validating 
the scanners findings on the systems, so I can get working on slimming down a 
225 page report to something that is realistic and achievable. 

 

Sorry about the rant, it isn't how I wanted to start my Monday morning. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



WARNING:

The information in this email and any attachments is confidential and may be 
legally privileged.

 

If you are not the named addressee, you must not use, copy or disclose this 
email (including any attachments) or the information in it save to the named 
addressee nor take any action in reliance on it. If you receive this email or 
any attachments in error, please notify the sender immediately and then delete 
the same and any copies.

 

"CLS Services Ltd × Registered in England No 4132704 × Registered Office: 
Exchange Tower × One Harbour Exchange Square × London E14 9GE"

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsub

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-12 Thread Stu Sjouwerman
That's what we do for our customers here. We scan with Nessus, but provide a 
shortlist of the real dangerous low hanging fruit and we poke around a bit, and 
do a conference call where we show them what the problem is.
Warm regards,
Stu

From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Monday, March 05, 2012 8:36 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

Thanks, I am glad I am not the only one.

Now if someone followed the Penetration test Execution Standard, and did a real 
Pen test and validated the business risks, then I would be impressed, so back 
to chewing through this Qualys scan and making heads or tails of what needs to 
be fixed and what isn't a big risk.

Z

Edward Ziots
CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org<mailto:ezi...@lifespan.org>

From: Alan Davies [mailto:adav...@cls-services.com]
Sent: Monday, March 05, 2012 8:25 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

You pays for what you gets ... even reports of actions that go beyond VA into 
PT still aren't a proper PT engagement if they're not in a meaningful report, 
written in English!

Having said that, sometimes you just want to know if something can be broken 
and do the rest yourself.  Rarely though .. I have 1better things to do with my 
time than translating someone else's results into an Exec Summary and business 
context specific findings

Rant welcome :o)


a


From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: 05 March 2012 13:12
To: NT System Admin Issues
Subject: Vulnerability scanning, and calling it a Pen test the rant continues
Not sure if anyone on the list is responsible for Vul Scanning in their 
organizations/business or Pen testing there systems, but it still blows my mind 
that we have folks out there providing services to organizations and business 
calling the output from a Qualys or Nessus vulnerability scanner a Pen-test.  I 
am current been going through someone else work for about 1.5 weeks validating 
the scanners findings on the systems, so I can get working on slimming down a 
225 page report to something that is realistic and achievable.

Sorry about the rant, it isn't how I wanted to start my Monday morning.

Z

Edward Ziots
CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org<mailto:ezi...@lifespan.org>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin



WARNING:

The information in this email and any attachments is confidential and may be 
legally privileged.



If you are not the named addressee, you must not use, copy or disclose this 
email (including any attachments) or the information in it save to the named 
addressee nor take any action in reliance on it. If you receive this email or 
any attachments in error, please notify the sender immediately and then delete 
the same and any copies.



"CLS Services Ltd × Registered in England No 4132704 × Registered Office: 
Exchange Tower × One Harbour Exchange Square × London E14 9GE"



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-06 Thread Jon Harris
Correction "I have/had" should have been "THEY have/had"

Sorry about that not enought caffee in the system yet.

Jon

On Tue, Mar 6, 2012 at 6:20 PM, Jon Harris  wrote:

> The University has had a number of viruses run through their systems over
> the years I worked for them.  I have/had Macaffe and as of about 2 years
> ago they "took control" of all the command and control servers through out
> the University because "they were not being managed correctly".  A few of
> the colleges/research groups/campuses what ever you want to call them had
> managed to keep off Macaffee until then for the most part by just not
> purchasing licenses and buying something else.  Management became aware of
> this when the power grab happened and about a third of all the systems were
> NOT under their control.  They mandated that admins had to install
> University approved AV on the systems purchased after a certain date.  The
> rules were written without any input from any of the Windows Admins not
> associated with the core of the University.
>
> Jon
>
> On Tue, Mar 6, 2012 at 9:15 AM, Ziots, Edward  wrote:
>
>> Sad for them, be nice to fire up the Backtrax Pen test server and show
>> that the Windows systems could be toppled just as fast as the .NIX systems.
>> 
>>
>> ** **
>>
>> Z
>>
>> ** **
>>
>> Edward Ziots
>>
>> CISSP, Security +, Network +
>>
>> Security Engineer
>>
>> Lifespan Organization
>>
>> ezi...@lifespan.org
>>
>> ** **
>>
>> *From:* Jon Harris [mailto:jk.har...@gmail.com]
>> *Sent:* Monday, March 05, 2012 6:20 PM
>>
>> *To:* NT System Admin Issues
>> *Subject:* Re: Vulnerability scanning, and calling it a Pen test the
>> rant continues
>>
>> ** **
>>
>> I have seen this in a University setting.  The Unix side of the house
>> said this was all that was needed the Windows side said BS but since most
>> of Management liked the lack of real cost they took the Unix sides word and
>> that became law.
>>
>>  
>>
>> Jon
>>
>> On Mon, Mar 5, 2012 at 8:12 AM, Ziots, Edward 
>> wrote:
>>
>> Not sure if anyone on the list is responsible for Vul Scanning in their
>> organizations/business or Pen testing there systems, but it still blows my
>> mind that we have folks out there providing services to organizations and
>> business calling the output from a Qualys or Nessus vulnerability scanner a
>> Pen-test.  I am current been going through someone else work for about 1.5
>> weeks validating the scanners findings on the systems, so I can get working
>> on slimming down a 225 page report to something that is realistic and
>> achievable. 
>>
>>  
>>
>> Sorry about the rant, it isn’t how I wanted to start my Monday morning. *
>> ***
>>
>>  
>>
>> Z
>>
>>  
>>
>> Edward Ziots
>>
>> CISSP, Security +, Network +
>>
>> Security Engineer
>>
>> Lifespan Organization
>>
>> ezi...@lifespan.org
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>> ** **
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-06 Thread Jon Harris
The University has had a number of viruses run through their systems over
the years I worked for them.  I have/had Macaffe and as of about 2 years
ago they "took control" of all the command and control servers through out
the University because "they were not being managed correctly".  A few of
the colleges/research groups/campuses what ever you want to call them had
managed to keep off Macaffee until then for the most part by just not
purchasing licenses and buying something else.  Management became aware of
this when the power grab happened and about a third of all the systems were
NOT under their control.  They mandated that admins had to install
University approved AV on the systems purchased after a certain date.  The
rules were written without any input from any of the Windows Admins not
associated with the core of the University.

Jon

On Tue, Mar 6, 2012 at 9:15 AM, Ziots, Edward  wrote:

> Sad for them, be nice to fire up the Backtrax Pen test server and show
> that the Windows systems could be toppled just as fast as the .NIX systems.
> 
>
> ** **
>
> Z
>
> ** **
>
> Edward Ziots
>
> CISSP, Security +, Network +
>
> Security Engineer
>
> Lifespan Organization
>
> ezi...@lifespan.org
>
> ** **
>
> *From:* Jon Harris [mailto:jk.har...@gmail.com]
> *Sent:* Monday, March 05, 2012 6:20 PM
>
> *To:* NT System Admin Issues
> *Subject:* Re: Vulnerability scanning, and calling it a Pen test the rant
> continues
>
> ** **
>
> I have seen this in a University setting.  The Unix side of the house said
> this was all that was needed the Windows side said BS but since most of
> Management liked the lack of real cost they took the Unix sides word and
> that became law.
>
>  
>
> Jon
>
> On Mon, Mar 5, 2012 at 8:12 AM, Ziots, Edward  wrote:
> 
>
> Not sure if anyone on the list is responsible for Vul Scanning in their
> organizations/business or Pen testing there systems, but it still blows my
> mind that we have folks out there providing services to organizations and
> business calling the output from a Qualys or Nessus vulnerability scanner a
> Pen-test.  I am current been going through someone else work for about 1.5
> weeks validating the scanners findings on the systems, so I can get working
> on slimming down a 225 page report to something that is realistic and
> achievable. 
>
>  
>
> Sorry about the rant, it isn’t how I wanted to start my Monday morning. **
> **
>
>  
>
> Z
>
>  
>
> Edward Ziots
>
> CISSP, Security +, Network +
>
> Security Engineer
>
> Lifespan Organization
>
> ezi...@lifespan.org
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ** **
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-06 Thread Ziots, Edward
Sad for them, be nice to fire up the Backtrax Pen test server and show
that the Windows systems could be toppled just as fast as the .NIX
systems. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Jon Harris [mailto:jk.har...@gmail.com] 
Sent: Monday, March 05, 2012 6:20 PM
To: NT System Admin Issues
Subject: Re: Vulnerability scanning, and calling it a Pen test the rant
continues

 

I have seen this in a University setting.  The Unix side of the house
said this was all that was needed the Windows side said BS but since
most of Management liked the lack of real cost they took the Unix sides
word and that became law.

 

Jon

On Mon, Mar 5, 2012 at 8:12 AM, Ziots, Edward 
wrote:

Not sure if anyone on the list is responsible for Vul Scanning in their
organizations/business or Pen testing there systems, but it still blows
my mind that we have folks out there providing services to organizations
and business calling the output from a Qualys or Nessus vulnerability
scanner a Pen-test.  I am current been going through someone else work
for about 1.5 weeks validating the scanners findings on the systems, so
I can get working on slimming down a 225 page report to something that
is realistic and achievable. 

 

Sorry about the rant, it isn't how I wanted to start my Monday morning. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-05 Thread Jon Harris
I have seen this in a University setting.  The Unix side of the house said
this was all that was needed the Windows side said BS but since most of
Management liked the lack of real cost they took the Unix sides word and
that became law.

Jon

On Mon, Mar 5, 2012 at 8:12 AM, Ziots, Edward  wrote:

> Not sure if anyone on the list is responsible for Vul Scanning in their
> organizations/business or Pen testing there systems, but it still blows my
> mind that we have folks out there providing services to organizations and
> business calling the output from a Qualys or Nessus vulnerability scanner a
> Pen-test.  I am current been going through someone else work for about 1.5
> weeks validating the scanners findings on the systems, so I can get working
> on slimming down a 225 page report to something that is realistic and
> achievable. 
>
> ** **
>
> Sorry about the rant, it isn’t how I wanted to start my Monday morning. **
> **
>
> ** **
>
> Z
>
> ** **
>
> Edward Ziots
>
> CISSP, Security +, Network +
>
> Security Engineer
>
> Lifespan Organization
>
> ezi...@lifespan.org
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-05 Thread Ziots, Edward
Thanks, I am glad I am not the only one. 

 

Now if someone followed the Penetration test Execution Standard, and did a real 
Pen test and validated the business risks, then I would be impressed, so back 
to chewing through this Qualys scan and making heads or tails of what needs to 
be fixed and what isn't a big risk. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

 

From: Alan Davies [mailto:adav...@cls-services.com] 
Sent: Monday, March 05, 2012 8:25 AM
To: NT System Admin Issues
Subject: RE: Vulnerability scanning, and calling it a Pen test the rant 
continues

 

You pays for what you gets ... even reports of actions that go beyond VA into 
PT still aren't a proper PT engagement if they're not in a meaningful report, 
written in English!

 

Having said that, sometimes you just want to know if something can be broken 
and do the rest yourself.  Rarely though .. I have 1better things to do with my 
time than translating someone else's results into an Exec Summary and business 
context specific findings

 

Rant welcome :o)

 

 

a

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 05 March 2012 13:12
To: NT System Admin Issues
Subject: Vulnerability scanning, and calling it a Pen test the rant continues

Not sure if anyone on the list is responsible for Vul Scanning in their 
organizations/business or Pen testing there systems, but it still blows my mind 
that we have folks out there providing services to organizations and business 
calling the output from a Qualys or Nessus vulnerability scanner a Pen-test.  I 
am current been going through someone else work for about 1.5 weeks validating 
the scanners findings on the systems, so I can get working on slimming down a 
225 page report to something that is realistic and achievable. 

 

Sorry about the rant, it isn't how I wanted to start my Monday morning. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



WARNING:

The information in this email and any attachments is confidential and may be 
legally privileged.

 

If you are not the named addressee, you must not use, copy or disclose this 
email (including any attachments) or the information in it save to the named 
addressee nor take any action in reliance on it. If you receive this email or 
any attachments in error, please notify the sender immediately and then delete 
the same and any copies.

 

"CLS Services Ltd × Registered in England No 4132704 × Registered Office: 
Exchange Tower × One Harbour Exchange Square × London E14 9GE"

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-05 Thread Alan Davies
You pays for what you gets ... even reports of actions that go beyond VA
into PT still aren't a proper PT engagement if they're not in a
meaningful report, written in English!
 
Having said that, sometimes you just want to know if something can be
broken and do the rest yourself.  Rarely though .. I have 1better things
to do with my time than translating someone else's results into an Exec
Summary and business context specific findings
 
Rant welcome :o)
 
 
a



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: 05 March 2012 13:12
To: NT System Admin Issues
Subject: Vulnerability scanning, and calling it a Pen test the rant
continues



Not sure if anyone on the list is responsible for Vul Scanning in their
organizations/business or Pen testing there systems, but it still blows
my mind that we have folks out there providing services to organizations
and business calling the output from a Qualys or Nessus vulnerability
scanner a Pen-test.  I am current been going through someone else work
for about 1.5 weeks validating the scanners findings on the systems, so
I can get working on slimming down a 225 page report to something that
is realistic and achievable. 

 

Sorry about the rant, it isn't how I wanted to start my Monday morning. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



WARNING:
The information in this email and any attachments is confidential and may be 
legally privileged.

If you are not the named addressee, you must not use, copy or disclose this 
email (including any attachments) or the information in it save to the named 
addressee nor take any action in reliance on it. If you receive this email or 
any attachments in error, please notify the sender immediately and then delete 
the same and any copies.

"CLS Services Ltd × Registered in England No 4132704 × Registered Office: 
Exchange Tower × One Harbour Exchange Square × London E14 9GE"


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Vulnerability scanning, and calling it a Pen test the rant continues

2012-03-05 Thread Ziots, Edward
Not sure if anyone on the list is responsible for Vul Scanning in their
organizations/business or Pen testing there systems, but it still blows
my mind that we have folks out there providing services to organizations
and business calling the output from a Qualys or Nessus vulnerability
scanner a Pen-test.  I am current been going through someone else work
for about 1.5 weeks validating the scanners findings on the systems, so
I can get working on slimming down a 225 page report to something that
is realistic and achievable. 

 

Sorry about the rant, it isn't how I wanted to start my Monday morning. 

 

Z

 

Edward Ziots

CISSP, Security +, Network +

Security Engineer

Lifespan Organization

ezi...@lifespan.org


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Test Your Malware IQ

2012-02-29 Thread Manuel Santos
A few years agoa I had a virus problema in a company where I worked and the
only one that could help me was Panda, mas in the next problem, Panda did
nothing usefull, and that doesn't make it a good anti-virus.

2012/2/29 ANDREW F OFALT 

> Comodo was one of the only 3 virus scanners that would pick up our USB
> virus.
> The other 2 were 30 day trials that expired.
>
> - Original Message -
> I'm not sure if Comodo is a good tool...
>
>
> 2012/2/29 ANDREW F OFALT < afo...@psu.edu >
>
>
> Why, when I went to the site did it say there was malware on the site?
> There was about 6-8 js scripts that Comodo said were malware.
> Then I figured that its infoworld, so it should be safe.
> Then I figured that it might be an advertisement sending the malware, so I
> cleaned them.
>
> Did I pass the test?
>
>
>
> - Original Message -
>
>
>
> How about a Furby?
>
>
>
>
> Regards,
>
>
>
> Don Guyer
>
> Directory and Messaging Services
> Catholic Health East, ITSS
>
>
>
>
>
> From: Free, Bob [mailto: r...@pge.com ]
> Sent: Tuesday, February 28, 2012 3:53 PM
> To: NT System Admin Issues
> Subject: RE: Test Your Malware IQ
>
>
>
> Affirmative and you don’t get a kewpie doll
>
>
>
>
>
> From: Richard McClary [mailto: richard.mccl...@aspca.org ]
> Sent: Tuesday, February 28, 2012 12:43 PM
> To: NT System Admin Issues
> Subject: RE: Test Your Malware IQ
>
>
>
> If we click the link provided, do we flunk the phishing test?
>
>
>
>
>
> From: Stu Sjouwerman [mailto: s...@sunbelt-software.com ]
> Sent: Tuesday, February 28, 2012 2:02 PM
> To: NT System Admin Issues
> Subject: Test Your Malware IQ
>
>
>
> This is not an easy test, but luckily all the correct answers are provided
>
> after you answer the 20 questions. This is a very interesting set of
> questions,
>
> and you will learn some cool things. Here is how InfoWorld announced it:
>
>
>
> "Find out how much you really know about the underworld of spam, botnets,
>
> viruses, and other forms of cyber crime. Malware comes in many guises.
>
> For most people it's a constant source of irritation. But for security
>
> mavens, the malware world offers all sorts of fascinating nooks and
>
> crannies -- charlatans and characters, flashes of brilliance, groaning
>
> idiocies, and irony. Think you know malware? You may be surprised. Put
>
> on your sleuth specs and set your ever-so-slightly-gray hat at a jaunty
>
> angle and see if you're in tune with the multi-billion-dollar industry
>
> -- or just a victimized bystander waiting to get duped by the next rogue
>
> bits."
>
>
> http://www.infoworld.com/d/security/are-you-cyber-sleuth-test-your-malware-iq-187066?
>
>
>
> Warm regards,
>
>
> Stu
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
>
>
>
> The information contained in this e-mail, and any attachments hereto, is
> from The American Society for the Prevention of Cruelty to Animals®
> (ASPCA®) and is intended only for use by the addressee(s) named herein and
> may contain legally privileged and/or confidential information. If you are
> not the intended recipient of this e-mail, you are hereby notified that any
> dissemination, distribution, copying or use of the contents of this e-mail,
> and any attachments hereto, is strictly prohibited. If you have received
> this e-mail in error, please immediately notify me by reply email and
> permanently delete the original and any copy of this e-mail and any
> printout thereof.
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin Confidentiality Notice:
> This e-mail, i

Re: Test Your Malware IQ

2012-02-29 Thread ANDREW F OFALT
Comodo was one of the only 3 virus scanners that would pick up our USB virus.
The other 2 were 30 day trials that expired.

- Original Message -
I'm not sure if Comodo is a good tool... 


2012/2/29 ANDREW F OFALT < afo...@psu.edu > 


Why, when I went to the site did it say there was malware on the site? There 
was about 6-8 js scripts that Comodo said were malware. 
Then I figured that its infoworld, so it should be safe. 
Then I figured that it might be an advertisement sending the malware, so I 
cleaned them. 

Did I pass the test? 



- Original Message - 



How about a Furby? 




Regards, 



Don Guyer 

Directory and Messaging Services 
Catholic Health East, ITSS 





From: Free, Bob [mailto: r...@pge.com ] 
Sent: Tuesday, February 28, 2012 3:53 PM 
To: NT System Admin Issues 
Subject: RE: Test Your Malware IQ 



Affirmative and you don’t get a kewpie doll 





From: Richard McClary [mailto: richard.mccl...@aspca.org ] 
Sent: Tuesday, February 28, 2012 12:43 PM 
To: NT System Admin Issues 
Subject: RE: Test Your Malware IQ 



If we click the link provided, do we flunk the phishing test? 





From: Stu Sjouwerman [mailto: s...@sunbelt-software.com ] 
Sent: Tuesday, February 28, 2012 2:02 PM 
To: NT System Admin Issues 
Subject: Test Your Malware IQ 



This is not an easy test, but luckily all the correct answers are provided 

after you answer the 20 questions. This is a very interesting set of questions, 

and you will learn some cool things. Here is how InfoWorld announced it: 



"Find out how much you really know about the underworld of spam, botnets, 

viruses, and other forms of cyber crime. Malware comes in many guises. 

For most people it's a constant source of irritation. But for security 

mavens, the malware world offers all sorts of fascinating nooks and 

crannies -- charlatans and characters, flashes of brilliance, groaning 

idiocies, and irony. Think you know malware? You may be surprised. Put 

on your sleuth specs and set your ever-so-slightly-gray hat at a jaunty 

angle and see if you're in tune with the multi-billion-dollar industry 

-- or just a victimized bystander waiting to get duped by the next rogue 

bits." 

http://www.infoworld.com/d/security/are-you-cyber-sleuth-test-your-malware-iq-187066
 ? 



Warm regards, 


Stu 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ 
~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~ 

--- 
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/ 
or send an email to listmana...@lyris.sunbeltsoftware.com 
with the body: unsubscribe ntsysadmin 





The information contained in this e-mail, and any attachments hereto, is from 
The American Society for the Prevention of Cruelty to Animals® (ASPCA®) and is 
intended only for use by the addressee(s) named herein and may contain legally 
privileged and/or confidential information. If you are not the intended 
recipient of this e-mail, you are hereby notified that any dissemination, 
distribution, copying or use of the contents of this e-mail, and any 
attachments hereto, is strictly prohibited. If you have received this e-mail in 
error, please immediately notify me by reply email and permanently delete the 
original and any copy of this e-mail and any printout thereof. 



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ 
~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~ 

--- 
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/ 
or send an email to listmana...@lyris.sunbeltsoftware.com 
with the body: unsubscribe ntsysadmin 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ 
~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~ 

--- 
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/ 
or send an email to listmana...@lyris.sunbeltsoftware.com 
with the body: unsubscribe ntsysadmin Confidentiality Notice: 
This e-mail, including any attachments is the 
property of Catholic Health East and is intended 
for the sole use of the intended recipient(s). 
It may contain information that is privileged and 
confidential. Any unauthorized review, use, 
disclosure, or distribution is prohibited. If you are 
not the intended recipient, please delete this message, and 
reply to the sender regarding the error in a separate email. 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ 
~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~ 

--- 
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/ 
or send an email to listmana...@lyris.sunbeltsoftware.com 
with the body: unsubscribe ntsysadmin 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ 
~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~ 

--- 
To m

Re: Test Your Malware IQ

2012-02-29 Thread Manuel Santos
I'm not sure if Comodo is a good tool...

2012/2/29 ANDREW F OFALT 

> Why, when I went to the site did it say there was malware on the site?
>  There was about 6-8 js scripts that Comodo said were malware.
> Then I figured that its infoworld, so it should be safe.
> Then I figured that it might be an advertisement sending the malware, so I
> cleaned them.
>
> Did I pass the test?
>
> - Original Message -
>
>
>
> How about a Furby?
>
>
>
>
> Regards,
>
>
>
> Don Guyer
>
> Directory and Messaging Services
> Catholic Health East, ITSS
>
>
>
>
>
> From: Free, Bob [mailto:r...@pge.com]
> Sent: Tuesday, February 28, 2012 3:53 PM
> To: NT System Admin Issues
> Subject: RE: Test Your Malware IQ
>
>
>
> Affirmative and you don’t get a kewpie doll
>
>
>
>
>
> From: Richard McClary [mailto:richard.mccl...@aspca.org]
> Sent: Tuesday, February 28, 2012 12:43 PM
> To: NT System Admin Issues
> Subject: RE: Test Your Malware IQ
>
>
>
> If we click the link provided, do we flunk the phishing test?
>
>
>
>
>
> From: Stu Sjouwerman [mailto:s...@sunbelt-software.com]
> Sent: Tuesday, February 28, 2012 2:02 PM
> To: NT System Admin Issues
> Subject: Test Your Malware IQ
>
>
>
> This is not an easy test, but luckily all the correct answers are provided
>
> after you answer the 20 questions. This is a very interesting set of
> questions,
>
> and you will learn some cool things. Here is how InfoWorld announced it:
>
>
>
> "Find out how much you really know about the underworld of spam, botnets,
>
> viruses, and other forms of cyber crime. Malware comes in many guises.
>
> For most people it's a constant source of irritation. But for security
>
> mavens, the malware world offers all sorts of fascinating nooks and
>
> crannies -- charlatans and characters, flashes of brilliance, groaning
>
> idiocies, and irony. Think you know malware? You may be surprised. Put
>
> on your sleuth specs and set your ever-so-slightly-gray hat at a jaunty
>
> angle and see if you're in tune with the multi-billion-dollar industry
>
> -- or just a victimized bystander waiting to get duped by the next rogue
>
> bits."
>
>
> http://www.infoworld.com/d/security/are-you-cyber-sleuth-test-your-malware-iq-187066?
>
>
>
> Warm regards,
>
>
> Stu
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
>
>
>
> The information contained in this e-mail, and any attachments hereto, is
> from The American Society for the Prevention of Cruelty to Animals®
> (ASPCA®) and is intended only for use by the addressee(s) named herein and
> may contain legally privileged and/or confidential information. If you are
> not the intended recipient of this e-mail, you are hereby notified that any
> dissemination, distribution, copying or use of the contents of this e-mail,
> and any attachments hereto, is strictly prohibited. If you have received
> this e-mail in error, please immediately notify me by reply email and
> permanently delete the original and any copy of this e-mail and any
> printout thereof.
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin Confidentiality Notice:
> This e-mail, including any attachments is the
> property of Catholic Health East and is intended
> for the sole use of the intended recipient(s).
> It may contain information that is privileged and
> confidential. Any unauthorized review, use,
> disclosure, or distribution is prohibited. If you are
> not the intended recipient, please delete this message, and
> reply to the sender regarding the error in a separate email.
>
>
> ~ Finally, powerful endpoint security that ISN'T a

Re: Test Your Malware IQ

2012-02-29 Thread ANDREW F OFALT
Why, when I went to the site did it say there was malware on the site?  There 
was about 6-8 js scripts that Comodo said were malware.
Then I figured that its infoworld, so it should be safe.
Then I figured that it might be an advertisement sending the malware, so I 
cleaned them.

Did I pass the test?

- Original Message -



How about a Furby? 




Regards, 



Don Guyer 

Directory and Messaging Services 
Catholic Health East, ITSS 





From: Free, Bob [mailto:r...@pge.com] 
Sent: Tuesday, February 28, 2012 3:53 PM 
To: NT System Admin Issues 
Subject: RE: Test Your Malware IQ 



Affirmative and you don’t get a kewpie doll 





From: Richard McClary [mailto:richard.mccl...@aspca.org] 
Sent: Tuesday, February 28, 2012 12:43 PM 
To: NT System Admin Issues 
Subject: RE: Test Your Malware IQ 



If we click the link provided, do we flunk the phishing test? 





From: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Sent: Tuesday, February 28, 2012 2:02 PM 
To: NT System Admin Issues 
Subject: Test Your Malware IQ 



This is not an easy test, but luckily all the correct answers are provided 

after you answer the 20 questions. This is a very interesting set of questions, 

and you will learn some cool things. Here is how InfoWorld announced it: 



"Find out how much you really know about the underworld of spam, botnets, 

viruses, and other forms of cyber crime. Malware comes in many guises. 

For most people it's a constant source of irritation. But for security 

mavens, the malware world offers all sorts of fascinating nooks and 

crannies -- charlatans and characters, flashes of brilliance, groaning 

idiocies, and irony. Think you know malware? You may be surprised. Put 

on your sleuth specs and set your ever-so-slightly-gray hat at a jaunty 

angle and see if you're in tune with the multi-billion-dollar industry 

-- or just a victimized bystander waiting to get duped by the next rogue 

bits." 

http://www.infoworld.com/d/security/are-you-cyber-sleuth-test-your-malware-iq-187066
 ? 



Warm regards, 


Stu 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ 
~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~ 

--- 
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/ 
or send an email to listmana...@lyris.sunbeltsoftware.com 
with the body: unsubscribe ntsysadmin 





The information contained in this e-mail, and any attachments hereto, is from 
The American Society for the Prevention of Cruelty to Animals® (ASPCA®) and is 
intended only for use by the addressee(s) named herein and may contain legally 
privileged and/or confidential information. If you are not the intended 
recipient of this e-mail, you are hereby notified that any dissemination, 
distribution, copying or use of the contents of this e-mail, and any 
attachments hereto, is strictly prohibited. If you have received this e-mail in 
error, please immediately notify me by reply email and permanently delete the 
original and any copy of this e-mail and any printout thereof. 



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ 
~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~ 

--- 
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/ 
or send an email to listmana...@lyris.sunbeltsoftware.com 
with the body: unsubscribe ntsysadmin 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ 
~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~ 

--- 
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/ 
or send an email to listmana...@lyris.sunbeltsoftware.com 
with the body: unsubscribe ntsysadmin Confidentiality Notice: 
This e-mail, including any attachments is the 
property of Catholic Health East and is intended 
for the sole use of the intended recipient(s). 
It may contain information that is privileged and 
confidential. Any unauthorized review, use, 
disclosure, or distribution is prohibited. If you are 
not the intended recipient, please delete this message, and 
reply to the sender regarding the error in a separate email. 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ 
~ < http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > ~ 

--- 
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/ 
or send an email to listmana...@lyris.sunbeltsoftware.com 
with the body: unsubscribe ntsysadmin 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: Test Your Malware IQ

2012-02-28 Thread Steven Peck
The Furby will have a cellular modem, please place at your work with a view
of your keyboard and screen.

On Tue, Feb 28, 2012 at 1:03 PM, Guyer, Donald  wrote:

> How about a Furby?
>
> ** **
>
> Regards,
>
> ** **
>
> Don Guyer
>
> Directory and Messaging Services
> Catholic Health East, ITSS
>
> ** **
>
> *From:* Free, Bob [mailto:r...@pge.com]
> *Sent:* Tuesday, February 28, 2012 3:53 PM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Test Your Malware IQ
>
> ** **
>
> Affirmative and you don’t get a kewpie doll 
>
> ** **
>
> *From:* Richard McClary [mailto:richard.mccl...@aspca.org]
> *Sent:* Tuesday, February 28, 2012 12:43 PM
> *To:* NT System Admin Issues
> *Subject:* RE: Test Your Malware IQ
>
> ** **
>
> If we click the link provided, do we flunk the phishing test?
>
> ** **
>
> *From:* Stu Sjouwerman [mailto:s...@sunbelt-software.com]
> *Sent:* Tuesday, February 28, 2012 2:02 PM
> *To:* NT System Admin Issues
> *Subject:* Test Your Malware IQ
>
> ** **
>
> This is not an easy test, but luckily all the correct answers are provided
> 
>
> after you answer the 20 questions. This is a very interesting set of
> questions, 
>
> and you will learn some cool things. Here is how InfoWorld announced it:**
> **
>
>   
>
> "Find out how much you really know about the underworld of spam, botnets,
> 
>
> viruses, and other forms of cyber crime. Malware comes in many guises. ***
> *
>
> For most people it's a constant source of irritation. But for security ***
> *
>
> mavens, the malware world offers all sorts of fascinating nooks and 
>
> crannies -- charlatans and characters, flashes of brilliance, groaning ***
> *
>
> idiocies, and irony. Think you know malware? You may be surprised. Put ***
> *
>
> on your sleuth specs and set your ever-so-slightly-gray hat at a jaunty **
> **
>
> angle and see if you're in tune with the multi-billion-dollar industry ***
> *
>
> -- or just a victimized bystander waiting to get duped by the next rogue *
> ***
>
> bits."
>
>
> http://www.infoworld.com/d/security/are-you-cyber-sleuth-test-your-malware-iq-187066
> ?
>
> ** **
>
> Warm regards,
>
>
> Stu
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ** **
>
>
> The information contained in this e-mail, and any attachments hereto, is
> from The American Society for the Prevention of Cruelty to Animals®
> (ASPCA®) and is intended only for use by the addressee(s) named herein and
> may contain legally privileged and/or confidential information. If you are
> not the intended recipient of this e-mail, you are hereby notified that any
> dissemination, distribution, copying or use of the contents of this e-mail,
> and any attachments hereto, is strictly prohibited. If you have received
> this e-mail in error, please immediately notify me by reply email and
> permanently delete the original and any copy of this e-mail and any
> printout thereof. 
>
> ** **
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
> Confidentiality Notice:
> This e-mail, including any attachments is the
> property of Catholic Health East and is intended
> for the sole use of the intended recipient(s).
> It may contain information that is privileged and
> confidential.  Any unauthorized review, use,
> disclosure, or distribution is prohibited. If you are
> not the intended recipient, please delete this message, and
> reply to the sender regarding the error in a separate email.
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://

RE: Test Your Malware IQ

2012-02-28 Thread Guyer, Donald
How about a Furby?

Regards,

Don Guyer
Directory and Messaging Services
Catholic Health East, ITSS

From: Free, Bob [mailto:r...@pge.com]
Sent: Tuesday, February 28, 2012 3:53 PM
To: NT System Admin Issues
Subject: RE: Test Your Malware IQ

Affirmative and you don't get a kewpie doll

From: Richard McClary [mailto:richard.mccl...@aspca.org]
Sent: Tuesday, February 28, 2012 12:43 PM
To: NT System Admin Issues
Subject: RE: Test Your Malware IQ

If we click the link provided, do we flunk the phishing test?

From: Stu Sjouwerman 
[mailto:s...@sunbelt-software.com]<mailto:[mailto:s...@sunbelt-software.com]>
Sent: Tuesday, February 28, 2012 2:02 PM
To: NT System Admin Issues
Subject: Test Your Malware IQ

This is not an easy test, but luckily all the correct answers are provided
after you answer the 20 questions. This is a very interesting set of questions,
and you will learn some cool things. Here is how InfoWorld announced it:

"Find out how much you really know about the underworld of spam, botnets,
viruses, and other forms of cyber crime. Malware comes in many guises.
For most people it's a constant source of irritation. But for security
mavens, the malware world offers all sorts of fascinating nooks and
crannies -- charlatans and characters, flashes of brilliance, groaning
idiocies, and irony. Think you know malware? You may be surprised. Put
on your sleuth specs and set your ever-so-slightly-gray hat at a jaunty
angle and see if you're in tune with the multi-billion-dollar industry
-- or just a victimized bystander waiting to get duped by the next rogue
bits."
http://www.infoworld.com/d/security/are-you-cyber-sleuth-test-your-malware-iq-187066?

Warm regards,

Stu

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin


The information contained in this e-mail, and any attachments hereto, is from 
The American Society for the Prevention of Cruelty to Animals(r) (ASPCA(r)) and 
is intended only for use by the addressee(s) named herein and may contain 
legally privileged and/or confidential information. If you are not the intended 
recipient of this e-mail, you are hereby notified that any dissemination, 
distribution, copying or use of the contents of this e-mail, and any 
attachments hereto, is strictly prohibited. If you have received this e-mail in 
error, please immediately notify me by reply email and permanently delete the 
original and any copy of this e-mail and any printout thereof.


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin
Confidentiality Notice:
This e-mail, including any attachments is the 
property of Catholic Health East and is intended 
for the sole use of the intended recipient(s).  
It may contain information that is privileged and 
confidential.  Any unauthorized review, use,
disclosure, or distribution is prohibited. If you are 
not the intended recipient, please delete this message, and 
reply to the sender regarding the error in a separate email. 
 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Test Your Malware IQ

2012-02-28 Thread Richard McClary
If we click the link provided, do we flunk the phishing test?

From: Stu Sjouwerman [mailto:s...@sunbelt-software.com]
Sent: Tuesday, February 28, 2012 2:02 PM
To: NT System Admin Issues
Subject: Test Your Malware IQ

This is not an easy test, but luckily all the correct answers are provided
after you answer the 20 questions. This is a very interesting set of questions,
and you will learn some cool things. Here is how InfoWorld announced it:

"Find out how much you really know about the underworld of spam, botnets,
viruses, and other forms of cyber crime. Malware comes in many guises.
For most people it's a constant source of irritation. But for security
mavens, the malware world offers all sorts of fascinating nooks and
crannies -- charlatans and characters, flashes of brilliance, groaning
idiocies, and irony. Think you know malware? You may be surprised. Put
on your sleuth specs and set your ever-so-slightly-gray hat at a jaunty
angle and see if you're in tune with the multi-billion-dollar industry
-- or just a victimized bystander waiting to get duped by the next rogue
bits."
http://www.infoworld.com/d/security/are-you-cyber-sleuth-test-your-malware-iq-187066?

Warm regards,

Stu

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin


The information contained in this e-mail, and any attachments hereto, is from 
The American Society for the Prevention of Cruelty to Animals® (ASPCA®) and 
is intended only for use by the addressee(s) named herein and may contain 
legally privileged and/or confidential information. If you are not the intended 
recipient of this e-mail, you are hereby notified that any dissemination, 
distribution, copying or use of the contents of this e-mail, and any 
attachments hereto, is strictly prohibited. If you have received this e-mail in 
error, please immediately notify me by reply email and permanently delete the 
original and any copy of this e-mail and any printout thereof.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Test

2012-01-02 Thread Mike Sullivan
I think everyone is watching football and not emailing the list.

http://lyris.sunbelt-software.com/read/?forum=ntsysadmin

On Mon, Jan 2, 2012 at 12:45 PM, Chris Blair wrote:

> Sorry, can’t find the archives to see if anything is being sent.
>
> ** **
>
> Thanks,
>
> Chris Blair
>
> ** **
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>



-- 
Thank you,
Mike Sullivan

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Test

2012-01-02 Thread Ben Scott
On Mon, Jan 2, 2012 at 3:45 PM, Chris Blair  wrote:
> Sorry, can’t find the archives to see if anything is being sent.

http://www.lmgtfy.com/?q=ntsysadmin+archives

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



RE: Test

2012-01-02 Thread John C Owen
Happy New Year Chris

From: Chris Blair [mailto:chris_bl...@identisys.com]
Sent: Monday, January 02, 2012 3:45 PM
To: NT System Admin Issues
Subject: Test

Sorry, can't find the archives to see if anything is being sent.

Thanks,
Chris Blair


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Test

2012-01-02 Thread John Cook
Yup
John W. Cook
Systems Administrator
Partnership for Strong Families

From: Chris Blair [mailto:chris_bl...@identisys.com]
Sent: Monday, January 02, 2012 03:45 PM
To: NT System Admin Issues 
Subject: Test

Sorry, can’t find the archives to see if anything is being sent.

Thanks,
Chris Blair


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin


CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
Consider the environment. Please don't print this e-mail unless you really need 
to.

This email and any attached files are confidential and intended solely for the 
intended recipient(s). If you are not the named recipient you should not read, 
distribute, copy or alter this email. Any views or opinions expressed in this 
email are those of the author and do not represent those of the company. 
Warning: Although precautions have been taken to make sure no viruses are 
present in this email, the company cannot accept responsibility for any loss or 
damage that arise from the use of this email or attachments.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: test

2011-12-29 Thread Ben Scott
On Thu, Dec 29, 2011 at 2:52 PM, Micheal Espinola Jr
 wrote:
>> Because they’re Microsoft?
>
> I love to think that too, but I there has *got* to be a very specific reason
> for them to have simply changed this functionality.  I suspect something in
> inherently programmatically flawed here.

  There doesn't have to be a "change" made if it was broken from the start.

  I expect it prolly went something like this: Internally, Exchange is
based on X.400 more than Internet email.  The guy who wrote the code
for the out-of-office auto-responder was thus able to be mostly
ignorant of Internet mail standards.  The code does things the X.400
way and ignores any Internet info that might be present.

  It could be fixed, of course -- every message gatewayed into
Exchange from the Internet preserves all the needed headers and
properties.  But that would require assigning developer resources to
the issue.  Microsoft isn't going to do that unless they see an ROI.
I expect they don't see an ROI in following Internet email standards
here.

  This is all just guess-work, of course, but it's all I have to go on.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: test

2011-12-29 Thread Micheal Espinola Jr
I love to think that too, but I there has *got* to be a very specific
reason for them to have simply changed this functionality.  I suspect
something in inherently programmatically flawed here.

--
Espi




On Thu, Dec 29, 2011 at 10:07 AM, Maglinger, Paul wrote:

>  Because they’re Microsoft?
>
> ** **
>
> *From:* Micheal Espinola Jr [mailto:michealespin...@gmail.com]
> *Sent:* Thursday, December 29, 2011 11:16 AM
>
> *To:* NT System Admin Issues
> *Subject:* Re: test
>
> ** **
>
> I'll bite; why is this knowingly and intentionally done, when they know it
> violates the spec and pisses off many admins?
>
> --
> Espi
>
> 
>
> On Wed, Dec 28, 2011 at 2:12 PM, Michael B. Smith 
> wrote:
>
> I know why this is done, and we could discuss it until I was blue in the
> face and got irritated; but long story short - it ain't gonna change in
> Exchange.
>
> Regards,
>
> Michael B. Smith
> Consultant and Exchange MVP
> http://TheEssentialExchange.com
>
> ** **
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: test

2011-12-29 Thread Ben Scott
On Thu, Dec 29, 2011 at 11:34 AM, Matthew W. Ross
 wrote:
> My understanding is that because of the "Reply To" field being set to the
> list, when I hit Reply to your email, it is automatically sent to the list. 
> (This
> behavior is what I have observed with every email client I have used, 
> including
> Outlook.)

  The "Reply-To" header is intended to signify the address which
replies should be sent to, yes.  It is generally honored by mail
software.  But ultimately, software does whatever it's programmed to
do.

> You're saying that Exchange, before it even gets to a client (such as Outlook)
> is doing the auto response and ignoring the "Reply To" Field.

  Exactly.  The out-of-office auto-response is implemented in Exchange
server, not the Outlook client.  Otherwise, you'd need to leave
Outlook open and running during your vacation.

  And again, an automatically generated message should not look at the
RFC-822 headers at all; it should use the SMTP envelope reverse-path
("MAIL FROM:" address).  So, really, Exchange is broken twice here:
Once for using the RFC-822 headers for an auto-response, and again for
then ignoring Reply-To in the RFC-822 headers.

> Then there should be some way to determine that the traffic came from a list,
> and an auto-response is unnecessary.

  That should be possible, too.  There are various headers defined for
mailing list use, in standards-track RFCs.  Even Friggin' Lyris uses
them.  If these headers are present, the message is list traffic.
It's perhaps reasonable to suppose auto-responses should not be sent
in response to list mail.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: test

2011-12-29 Thread Maglinger, Paul
Because they're Microsoft?

From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent: Thursday, December 29, 2011 11:16 AM
To: NT System Admin Issues
Subject: Re: test

I'll bite; why is this knowingly and intentionally done, when they know it 
violates the spec and pisses off many admins?

--
Espi

On Wed, Dec 28, 2011 at 2:12 PM, Michael B. Smith 
mailto:mich...@smithcons.com>> wrote:
I know why this is done, and we could discuss it until I was blue in the face 
and got irritated; but long story short - it ain't gonna change in Exchange.

Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: test

2011-12-29 Thread Micheal Espinola Jr
I'll bite; why is this knowingly and intentionally done, when they know it
violates the spec and pisses off many admins?

--
Espi


On Wed, Dec 28, 2011 at 2:12 PM, Michael B. Smith wrote:

> I know why this is done, and we could discuss it until I was blue in the
> face and got irritated; but long story short - it ain't gonna change in
> Exchange.
>
> Regards,
>
> Michael B. Smith
> Consultant and Exchange MVP
> http://TheEssentialExchange.com
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: test

2011-12-29 Thread Matthew W. Ross
>   That would happen if that's what Exchange did.  Exchange doesn't do> that.  
> Exchange looks at the RFC-822 "From:" header, and *only that*,> when sending 
> auto-responses.
Odd.

My understanding is that because of the "Reply To" field being set to the list, 
when I hit Reply to your email, it is automatically sent to the list. (This 
behavior is what I have observed with every email client I have used, including 
Outlook.) You're saying that Exchange, before it even gets to a client (such as 
Outlook) is doing the auto response and ignoring the "Reply To" Field.

How annoying. Another notch (albeit a small one) in the "reasons not to use 
Exchange" list.

>   And I would argue that using Reply-To would still be the wrong
> thing.  Mail programs are supposed to use the SMTP envelope.  That's
> what signifies where the message came from.  An auto-response should
> go to the actual sender.   Especially an out-of-office, which is
> arguably a DSN (Delivery Status Notification).

Then there should be some way to determine that the traffic came from a list, 
and an auto-response is unnecessary. These people (Microsoft, Lyris, other 
email developers) have had years to look at problems like this, why can't this 
be done? (Said with that pipe-dream head in the clouds.)


--Matt Ross
Ephrata School District


- Original Message -
From: Ben Scott
[mailto:mailvor...@gmail.com]
To: NT System Admin Issues
[mailto:ntsysadmin@lyris.sunbelt-software.com]
Sent: Wed, 28 Dec 2011
15:10:28 -0800
Subject: Re: test


> On Wed, Dec 28, 2011 at 5:27 PM, Matthew W. Ross
>  wrote:
> >>   They never hit Lyris.  When a list message hits someone with OoO
> >> set, Exchange sends the auto-response directly to the address in the
> >> "From:" header, i.e., the person who sent the message.
> >
> > Maybe I don't know how Lyris does it, but most mail servers send a "reply
> to"
> > address of the list... So when you hit reply, it goes to the list, not the
> individual.
> > Doesn't that make the automatic replies hit Lyris?
> 
>   That would happen if that's what Exchange did.  Exchange doesn't do
> that.  Exchange looks at the RFC-822 "From:" header, and *only that*,
> when sending auto-responses.
> 
>   And I would argue that using Reply-To would still be the wrong
> thing.  Mail programs are supposed to use the SMTP envelope.  That's
> what signifies where the message came from.  An auto-response should
> go to the actual sender.   Especially an out-of-office, which is
> arguably a DSN (Delivery Status Notification).
> 
>   By analogy: If the post office can't deliver a letter, they use the
> return address on the envelope.  They don't open the letter and then
> return it to whoever it appears originally wrote the letter.
> 
>   If there's an argument for doing it the way Exchange does it, I
> haven't seen one.
> 
> -- Ben
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
> 
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
> 
> 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



RE: test

2011-12-28 Thread Erik Goldoff
No, I'm out and about ...


Erik Goldoff
IT  Consultant
Systems, Networks, & Security 

'  Security is an ongoing process, not a one time event ! '



-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org] 
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: test

2011-12-28 Thread Ben Scott
On Wed, Dec 28, 2011 at 5:27 PM, Matthew W. Ross
 wrote:
>>   They never hit Lyris.  When a list message hits someone with OoO
>> set, Exchange sends the auto-response directly to the address in the
>> "From:" header, i.e., the person who sent the message.
>
> Maybe I don't know how Lyris does it, but most mail servers send a "reply to"
> address of the list... So when you hit reply, it goes to the list, not the 
> individual.
> Doesn't that make the automatic replies hit Lyris?

  That would happen if that's what Exchange did.  Exchange doesn't do
that.  Exchange looks at the RFC-822 "From:" header, and *only that*,
when sending auto-responses.

  And I would argue that using Reply-To would still be the wrong
thing.  Mail programs are supposed to use the SMTP envelope.  That's
what signifies where the message came from.  An auto-response should
go to the actual sender.   Especially an out-of-office, which is
arguably a DSN (Delivery Status Notification).

  By analogy: If the post office can't deliver a letter, they use the
return address on the envelope.  They don't open the letter and then
return it to whoever it appears originally wrote the letter.

  If there's an argument for doing it the way Exchange does it, I
haven't seen one.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: test

2011-12-28 Thread Matthew W. Ross
>   They never hit Lyris.  When a list message hits someone with OoO> set, 
> Exchange sends the auto-response directly to the address in the> "From:" 
> header, i.e., the person who sent the message.

Maybe I don't know how Lyris does it, but most mail servers send a "reply to" 
address of the list... So when you hit reply, it goes to the list, not the 
individual. Doesn't that make the automatic replies hit Lyris?


--Matt Ross
Ephrata School District


- Original Message -
From: Ben Scott
[mailto:mailvor...@gmail.com]
To: NT System Admin Issues
[mailto:ntsysadmin@lyris.sunbelt-software.com]
Sent: Wed, 28 Dec 2011
14:03:51 -0800
Subject: Re: test


> On Wed, Dec 28, 2011 at 4:16 PM, Matthew W. Ross
>  wrote:
> > I wish there was a standard for "automatic replies" somewhere in the email
> spec.
> 
>   There is.  Machine-generated messages should be sent to the envelope
> sender (SMTP reverse path), not the RFC-822 "From:" sender.  If that
> is done, the auto-responses go to the list server, which can do
> something reasonable with them, or at least discard them.
> 
>   For some reason, Microsoft Exchange does the Wrong Thing.  The
> Internet mail community has been complaining about this for a decade
> or so, but apparently MSFT doesn't consider it worth fixing.  (There
> are other mail programs also broken in this way, but Exchange, with
> its market share, is by far the biggest offender.)
> 
> > ... so Lyris can easily just filter this stuff to the bit bucket?
> 
>   They never hit Lyris.  When a list message hits someone with OoO
> set, Exchange sends the auto-response directly to the address in the
> "From:" header, i.e., the person who sent the message.
> 
> -- Ben
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
> 
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
> 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: test

2011-12-28 Thread Ben Scott
On Wed, Dec 28, 2011 at 5:12 PM, Michael B. Smith  wrote:
> I know why this is done ...

  Can you explain why, then?  If there was a good reason, perhaps
people would be less critical.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: test

2011-12-28 Thread Kurt Buff
And it's why I always mark them as spam, for both personal and work
email - because Exchange is broken in that regard, and it's the only
way I have to avoid the problem.

Kurt

On Wed, Dec 28, 2011 at 14:12, Michael B. Smith  wrote:
> I know why this is done, and we could discuss it until I was blue in the face 
> and got irritated; but long story short - it ain't gonna change in Exchange.
>
> Regards,
>
> Michael B. Smith
> Consultant and Exchange MVP
> http://TheEssentialExchange.com
>
>
> -Original Message-
> From: Ben Scott [mailto:mailvor...@gmail.com]
> Sent: Wednesday, December 28, 2011 5:04 PM
> To: NT System Admin Issues
> Subject: Re: test
>
> On Wed, Dec 28, 2011 at 4:16 PM, Matthew W. Ross
>  wrote:
>> I wish there was a standard for "automatic replies" somewhere in the email 
>> spec.
>
>  There is.  Machine-generated messages should be sent to the envelope
> sender (SMTP reverse path), not the RFC-822 "From:" sender.  If that
> is done, the auto-responses go to the list server, which can do
> something reasonable with them, or at least discard them.
>
>  For some reason, Microsoft Exchange does the Wrong Thing.  The
> Internet mail community has been complaining about this for a decade
> or so, but apparently MSFT doesn't consider it worth fixing.  (There
> are other mail programs also broken in this way, but Exchange, with
> its market share, is by far the biggest offender.)
>
>> ... so Lyris can easily just filter this stuff to the bit bucket?
>
>  They never hit Lyris.  When a list message hits someone with OoO
> set, Exchange sends the auto-response directly to the address in the
> "From:" header, i.e., the person who sent the message.
>
> -- Ben
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here: 
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



RE: test

2011-12-28 Thread Michael B. Smith
I know why this is done, and we could discuss it until I was blue in the face 
and got irritated; but long story short - it ain't gonna change in Exchange.

Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com


-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com] 
Sent: Wednesday, December 28, 2011 5:04 PM
To: NT System Admin Issues
Subject: Re: test

On Wed, Dec 28, 2011 at 4:16 PM, Matthew W. Ross
 wrote:
> I wish there was a standard for "automatic replies" somewhere in the email 
> spec.

  There is.  Machine-generated messages should be sent to the envelope
sender (SMTP reverse path), not the RFC-822 "From:" sender.  If that
is done, the auto-responses go to the list server, which can do
something reasonable with them, or at least discard them.

  For some reason, Microsoft Exchange does the Wrong Thing.  The
Internet mail community has been complaining about this for a decade
or so, but apparently MSFT doesn't consider it worth fixing.  (There
are other mail programs also broken in this way, but Exchange, with
its market share, is by far the biggest offender.)

> ... so Lyris can easily just filter this stuff to the bit bucket?

  They never hit Lyris.  When a list message hits someone with OoO
set, Exchange sends the auto-response directly to the address in the
"From:" header, i.e., the person who sent the message.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: test

2011-12-28 Thread Kurt Buff
Maybe.

Pipe bombs sometimes work...

On Wed, Dec 28, 2011 at 13:20, Jonathan Link  wrote:
> Better than pipe bombing...
>
>
> On Wed, Dec 28, 2011 at 4:16 PM, Matthew W. Ross 
> wrote:
>>
>> I wish there was a standard for "automatic replies" somewhere in the email
>> spec. There's a lot of hidden header data, can't all the email clients just
>> agree to make a X-HEADER-AUTOMATIC-REPLY=TRUE or something, so Lyris can
>> easily just filter this stuff to the bit bucket?
>>
>> There I go, pipe-dreaming again. *sigh*
>>
>>
>> --Matt Ross
>> Ephrata School District
>>
>>
>> - Original Message -
>> From: Ben Scott
>> [mailto:mailvor...@gmail.com]
>> To: NT System Admin Issues
>> [mailto:ntsysadmin@lyris.sunbelt-software.com]
>> Sent: Wed, 28 Dec 2011
>> 09:28:21 -0800
>> Subject: Re: test
>>
>>
>> > On Wed, Dec 28, 2011 at 11:18 AM, Ben Scott 
>> > wrote:
>> > >  I noticed the same quiet, but figured it was just the usual
>> > > inter-holiday week disinterest.
>> >
>> >   I will note that mail is definitely still flowing, as I got
>> > eleventy-billion out-of-office responses to the above post.
>> >
>> >   (Yes, I filter them, but sheesh.)
>> >
>> > -- Ben
>> >
>> > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>> >
>> > ---
>> > To manage subscriptions click here:
>> > http://lyris.sunbelt-software.com/read/my_forums/
>> > or send an email to listmana...@lyris.sunbeltsoftware.com
>> > with the body: unsubscribe ntsysadmin
>> >
>> >
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: test

2011-12-28 Thread Ben Scott
On Wed, Dec 28, 2011 at 4:16 PM, Matthew W. Ross
 wrote:
> I wish there was a standard for "automatic replies" somewhere in the email 
> spec.

  There is.  Machine-generated messages should be sent to the envelope
sender (SMTP reverse path), not the RFC-822 "From:" sender.  If that
is done, the auto-responses go to the list server, which can do
something reasonable with them, or at least discard them.

  For some reason, Microsoft Exchange does the Wrong Thing.  The
Internet mail community has been complaining about this for a decade
or so, but apparently MSFT doesn't consider it worth fixing.  (There
are other mail programs also broken in this way, but Exchange, with
its market share, is by far the biggest offender.)

> ... so Lyris can easily just filter this stuff to the bit bucket?

  They never hit Lyris.  When a list message hits someone with OoO
set, Exchange sends the auto-response directly to the address in the
"From:" header, i.e., the person who sent the message.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: test

2011-12-28 Thread Jonathan Link
Better than pipe bombing...

On Wed, Dec 28, 2011 at 4:16 PM, Matthew W. Ross
wrote:

> I wish there was a standard for "automatic replies" somewhere in the email
> spec. There's a lot of hidden header data, can't all the email clients just
> agree to make a X-HEADER-AUTOMATIC-REPLY=TRUE or something, so Lyris can
> easily just filter this stuff to the bit bucket?
>
> There I go, pipe-dreaming again. *sigh*
>
>
> --Matt Ross
> Ephrata School District
>
>
> - Original Message -
> From: Ben Scott
> [mailto:mailvor...@gmail.com]
> To: NT System Admin Issues
> [mailto:ntsysadmin@lyris.sunbelt-software.com]
> Sent: Wed, 28 Dec 2011
> 09:28:21 -0800
> Subject: Re: test
>
>
> > On Wed, Dec 28, 2011 at 11:18 AM, Ben Scott 
> wrote:
> > >  I noticed the same quiet, but figured it was just the usual
> > > inter-holiday week disinterest.
> >
> >   I will note that mail is definitely still flowing, as I got
> > eleventy-billion out-of-office responses to the above post.
> >
> >   (Yes, I filter them, but sheesh.)
> >
> > -- Ben
> >
> > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
> >
> > ---
> > To manage subscriptions click here:
> > http://lyris.sunbelt-software.com/read/my_forums/
> > or send an email to listmana...@lyris.sunbeltsoftware.com
> > with the body: unsubscribe ntsysadmin
> >
> >
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: test

2011-12-28 Thread Matthew W. Ross
I wish there was a standard for "automatic replies" somewhere in the email 
spec. There's a lot of hidden header data, can't all the email clients just 
agree to make a X-HEADER-AUTOMATIC-REPLY=TRUE or something, so Lyris can easily 
just filter this stuff to the bit bucket?

There I go, pipe-dreaming again. *sigh*


--Matt Ross
Ephrata School District


- Original Message -
From: Ben Scott
[mailto:mailvor...@gmail.com]
To: NT System Admin Issues
[mailto:ntsysadmin@lyris.sunbelt-software.com]
Sent: Wed, 28 Dec 2011
09:28:21 -0800
Subject: Re: test


> On Wed, Dec 28, 2011 at 11:18 AM, Ben Scott  wrote:
> >  I noticed the same quiet, but figured it was just the usual
> > inter-holiday week disinterest.
> 
>   I will note that mail is definitely still flowing, as I got
> eleventy-billion out-of-office responses to the above post.
> 
>   (Yes, I filter them, but sheesh.)
> 
> -- Ben
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
> 
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
> 
> 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: test

2011-12-28 Thread Don Kuhlman
Home just catching up on emails ;)

 


 From: Kim Longenbaugh 
To: NT System Admin Issues  
Sent: Wednesday, December 28, 2011 9:21 AM
Subject: RE: test
 
No, I'm at work.

-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org] 
Sent: Wednesday, December 28, 2011 8:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: test

2011-12-28 Thread Ben Scott
On Wed, Dec 28, 2011 at 11:18 AM, Ben Scott  wrote:
>  I noticed the same quiet, but figured it was just the usual
> inter-holiday week disinterest.

  I will note that mail is definitely still flowing, as I got
eleventy-billion out-of-office responses to the above post.

  (Yes, I filter them, but sheesh.)

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



R: test

2011-12-28 Thread HELP_PC
Quiet like the market all over the western world

Guido Elia

HELPPC - HELPPC SERVICE


-Messaggio originale-
Da: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Inviato: mercoledì 28 dicembre 2011 16.01
A: NT System Admin Issues
Oggetto: RE: test

Everything works, it's just quiet...

Warm regards,
Stu 

-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org] 
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: test

2011-12-28 Thread Ben Scott
On Wed, Dec 28, 2011 at 9:45 AM, John Cook  wrote:
>> Yes, it seems to be very quiet this week on the list.
>
> And slow. My reply took about 10 minutes.

  At what point does that cease to be called "slow" and just become
regular speed for Friggin' Lyris?  ;-)

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: test

2011-12-28 Thread Ben Scott
On Wed, Dec 28, 2011 at 9:59 AM, Osborne, Richard
 wrote:
> Without an e-mail from the list every 30 minutes or so I start to worry
> that my Internet e-mail isn't working!

  You can check the list archives for activity using the below link,
which is conveniently included at the bottom of every list message:

http://lyris.sunbelt-software.com/read/my_forums/

  If you see posts that you haven't gotten in email, something's wrong
with your subscription or email flow.  If there's no new activity, the
list is just quiet (or posting is broken).

  I noticed the same quiet, but figured it was just the usual
inter-holiday week disinterest.  As one quote put it, "This is the one
week I don't stand-out for not doing any work."

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: test

2011-12-28 Thread Lee Douglas
Bueller? Bueller? anyone?

On Wed, Dec 28, 2011 at 9:24 AM, John C Owen wrote:

> Just us chickens
>
> -Original Message-
> From: Osborne, Richard [mailto:richard.osbo...@wth.org]
> Sent: Wednesday, December 28, 2011 9:22 AM
> To: NT System Admin Issues
> Subject: test
>
> Anyone home?
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <
> http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: test

2011-12-28 Thread Kim Longenbaugh
No, I'm at work.

-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org] 
Sent: Wednesday, December 28, 2011 8:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



RE: test

2011-12-28 Thread Stu Sjouwerman
Everything works, it's just quiet...

Warm regards,
Stu 

-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org] 
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



RE: test

2011-12-28 Thread Osborne, Richard
Without an e-mail from the list every 30 minutes or so I start to worry
that my Internet e-mail isn't working!

-Original Message-
From: Donald Bittenbender [mailto:donald.bittenben...@gfi.com] 
Sent: Wednesday, December 28, 2011 8:29 AM
To: NT System Admin Issues
Subject: RE: test

Yes, it seems to be very quiet this week on the list.


Donald Bittenbender
Software Developer
GFI Software - www.gfi.com
Tel.: +1 866 389 5597 ext 6065Mob.: +1 727 748 2708

-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org]
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin






DISCLAIMER The information contained in this electronic mail may be
confidential or legally privileged. It is for the intended recipient(s)
only. Should you receive this message in error, please notify the sender
by replying to this mail. Please do not read, copy, forward or store
this message unless you are an intended recipient of it - unauthorized
use of contents is strictly prohibited. Unless expressly stated,
opinions in this message are those of the individual sender and not of
GFI. While all care has been taken, GFI is not responsible for the
integrity or the contents of this electronic mail and any attachments
included within. (GFI2011)

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



RE: test

2011-12-28 Thread John Cook
Who?

 John W. Cook
System Administrator
Partnership For Strong Families
5950 NW 1st Place
Gainesville, Fl 32607
Office (352) 244-1610
Cell (352) 215-6944
MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4


-Original Message-
From: David Mazzaccaro [mailto:david.mazzacc...@hudsonmobility.com]
Sent: Wednesday, December 28, 2011 9:38 AM
To: NT System Admin Issues
Subject: RE: test

No, man, I'm Dave, man!

-Original Message-
From: John Cook [mailto:john.c...@pfsf.org]
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: RE: test

Dave's not here!

 John W. Cook
System Administrator
Partnership For Strong Families
5950 NW 1st Place
Gainesville, Fl 32607
Office (352) 244-1610
Cell (352) 215-6944
MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4


-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org]
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


CONFIDENTIALITY STATEMENT: The information transmitted, or contained or
attached to or with this Notice is intended only for the person or
entity to which it is addressed and may contain Protected Health
Information (PHI), confidential and/or privileged material. Any review,
transmission, dissemination, or other use of, and taking any action in
reliance upon this information by persons or entities other than the
intended recipient without the express written consent of the sender are
prohibited. This information may be protected by the Health Insurance
Portability and Accountability Act of 1996 (HIPAA), and other Federal
and Florida laws. Improper or unauthorized use or disclosure of this
information could result in civil and/or criminal penalties.
 Consider the environment. Please don't print this e-mail unless you
really need to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
 Consider the environment. Please don't print this e-mail unless you really 
need to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



RE: test

2011-12-28 Thread John Cook
And slow. My reply took about 10 minutes.

 John W. Cook
System Administrator
Partnership For Strong Families
5950 NW 1st Place
Gainesville, Fl 32607
Office (352) 244-1610
Cell (352) 215-6944
MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4


-Original Message-
From: Donald Bittenbender [mailto:donald.bittenben...@gfi.com]
Sent: Wednesday, December 28, 2011 9:29 AM
To: NT System Admin Issues
Subject: RE: test

Yes, it seems to be very quiet this week on the list.


Donald Bittenbender
Software Developer
GFI Software - www.gfi.com
Tel.: +1 866 389 5597 ext 6065Mob.: +1 727 748 2708

-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org]
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin






DISCLAIMER The information contained in this electronic mail may be 
confidential or legally privileged. It is for the intended recipient(s) only. 
Should you receive this message in error, please notify the sender by replying 
to this mail. Please do not read, copy, forward or store this message unless 
you are an intended recipient of it - unauthorized use of contents is strictly 
prohibited. Unless expressly stated, opinions in this message are those of the 
individual sender and not of GFI. While all care has been taken, GFI is not 
responsible for the integrity or the contents of this electronic mail and any 
attachments included within. (GFI2011)

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
 Consider the environment. Please don't print this e-mail unless you really 
need to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: test

2011-12-28 Thread Manuel Santos
I am...

2011/12/28 John C Owen 

> Just us chickens
>
> -Original Message-
> From: Osborne, Richard [mailto:richard.osbo...@wth.org]
> Sent: Wednesday, December 28, 2011 9:22 AM
> To: NT System Admin Issues
> Subject: test
>
> Anyone home?
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <
> http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: test

2011-12-28 Thread David Mazzaccaro
No, man, I'm Dave, man!

-Original Message-
From: John Cook [mailto:john.c...@pfsf.org] 
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: RE: test

Dave's not here!

 John W. Cook
System Administrator
Partnership For Strong Families
5950 NW 1st Place
Gainesville, Fl 32607
Office (352) 244-1610
Cell (352) 215-6944
MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4


-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org]
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


CONFIDENTIALITY STATEMENT: The information transmitted, or contained or
attached to or with this Notice is intended only for the person or
entity to which it is addressed and may contain Protected Health
Information (PHI), confidential and/or privileged material. Any review,
transmission, dissemination, or other use of, and taking any action in
reliance upon this information by persons or entities other than the
intended recipient without the express written consent of the sender are
prohibited. This information may be protected by the Health Insurance
Portability and Accountability Act of 1996 (HIPAA), and other Federal
and Florida laws. Improper or unauthorized use or disclosure of this
information could result in civil and/or criminal penalties.
 Consider the environment. Please don't print this e-mail unless you
really need to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



RE: test

2011-12-28 Thread Donald Bittenbender
Yes, it seems to be very quiet this week on the list.


Donald Bittenbender
Software Developer
GFI Software - www.gfi.com
Tel.: +1 866 389 5597 ext 6065Mob.: +1 727 748 2708

-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org]
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin






DISCLAIMER The information contained in this electronic mail may be 
confidential or legally privileged. It is for the intended recipient(s) only. 
Should you receive this message in error, please notify the sender by replying 
to this mail. Please do not read, copy, forward or store this message unless 
you are an intended recipient of it - unauthorized use of contents is strictly 
prohibited. Unless expressly stated, opinions in this message are those of the 
individual sender and not of GFI. While all care has been taken, GFI is not 
responsible for the integrity or the contents of this electronic mail and any 
attachments included within. (GFI2011)

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: test

2011-12-28 Thread Roger Wright
I just resubscribed and received your message.


Roger Wright
___

Polarvoid: The state of having no baby pictures, a condition that usually
befalls the second-born child.





On Wed, Dec 28, 2011 at 9:21 AM, Osborne, Richard
wrote:

> Anyone home?
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: test

2011-12-28 Thread John Cook
Dave's not here!

 John W. Cook
System Administrator
Partnership For Strong Families
5950 NW 1st Place
Gainesville, Fl 32607
Office (352) 244-1610
Cell (352) 215-6944
MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4


-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org]
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
 Consider the environment. Please don't print this e-mail unless you really 
need to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



RE: test

2011-12-28 Thread John C Owen
Just us chickens

-Original Message-
From: Osborne, Richard [mailto:richard.osbo...@wth.org] 
Sent: Wednesday, December 28, 2011 9:22 AM
To: NT System Admin Issues
Subject: test

Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



test

2011-12-28 Thread Osborne, Richard
Anyone home?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: test message

2011-12-09 Thread Kurt Buff
Is that better or worse than "Peck, Peck, Peck"? :)

On Fri, Dec 9, 2011 at 15:18, Steven Peck  wrote:
> pick pick pick.
>
> On Fri, Dec 9, 2011 at 2:41 PM, Michael B. Smith 
> wrote:
>>
>> FYI, based on headers, it took 7 minutes to appear; in the past, it’s been
>> under 1 minute.
>>
>>
>>
>> Regards,
>>
>>
>>
>> Michael B. Smith
>>
>> Consultant and Exchange MVP
>>
>> http://TheEssentialExchange.com
>>
>>
>>
>> From: Donald Bittenbender [mailto:donald.bittenben...@gfi.com]
>> Sent: Friday, December 09, 2011 5:10 PM
>>
>>
>> To: NT System Admin Issues
>> Subject: test message
>>
>>
>>
>> Just posting a friendly test message to the list.
>>
>>
>>
>>
>>
>> Donald Bittenbender – dbittenben...@gfi.com
>>
>> Software Developer - GFI Software - www.gfi.com
>> Salesforce / SharePoint Admin
>> Web & Mail Security, Archiving & Fax, Networking & Security
>> Tel.: +1 866 389 5597 ext 6065Mob.: +1 727 748 2708
>> Join us on: Facebook | Twitter | LinkedIn | TalkTechToMe | YouTube.com |
>> GFI.com
>>
>>
>>
>> DISCLAIMER The information contained in this electronic mail may be
>> confidential or legally privileged. It is for the intended recipient(s)
>> only. Should you receive this message in error, please notify the sender by
>> replying to this mail. Please do not read, copy, forward or store this
>> message unless you are an intended recipient of it - unauthorized use of
>> contents is strictly prohibited. Unless expressly stated, opinions in this
>> message are those of the individual sender and not of GFI. While all care
>> has been taken, GFI is not responsible for the integrity or the contents of
>> this electronic mail and any attachments included within. (GFI2011)
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



RE: test message

2011-12-09 Thread Donald Bittenbender
This version of Lyris does have an SMTP connections limiter on it, something 
they must have implemented in the newer versions. I think this is the best 
we'll get, which is better than the hour delay we had the other day. Thanks for 
testing!

Donald Bittenbender
Software Developer
GFI Software - www.gfi.com<http://www.gfi.com/>
Tel.: +1 866 389 5597 ext 6065Mob.: +1 727 748 2708

From: Steven Peck [mailto:sep...@gmail.com]
Sent: Friday, December 09, 2011 6:19 PM
To: NT System Admin Issues
Subject: Re: test message

pick pick pick.
On Fri, Dec 9, 2011 at 2:41 PM, Michael B. Smith 
mailto:mich...@smithcons.com>> wrote:
FYI, based on headers, it took 7 minutes to appear; in the past, it's been 
under 1 minute.

Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Donald Bittenbender 
[mailto:donald.bittenben...@gfi.com<mailto:donald.bittenben...@gfi.com>]
Sent: Friday, December 09, 2011 5:10 PM

To: NT System Admin Issues
Subject: test message

Just posting a friendly test message to the list.


Donald Bittenbender - 
dbittenben...@gfi.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=mailto%3adbittenbender%40gfi.com>
Software Developer - GFI Software - 
www.gfi.com<https://webmail.gfi.com/owa/UrlBlockedError.aspx>
Salesforce / SharePoint Admin
Web & Mail Security, Archiving & Fax, Networking & Security
Tel.: +1 866 389 5597 ext 6065Mob.: +1 727 748 2708
Join us on: 
Facebook<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=https%3a%2f%2fwww.facebook.com%2fgfisoftware>
 | 
Twitter<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2ftwitter.com%2fgfisoftware>
 | 
LinkedIn<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.linkedin.com%2fgroups%3fgid%3d1833394>
 | 
TalkTechToMe<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.gfi.com%2fblog%2f>
 | 
YouTube.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.youtube.com%2fgfisoftware>
 | 
GFI.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.gfi.com%2f>

DISCLAIMER The information contained in this electronic mail may be 
confidential or legally privileged. It is for the intended recipient(s) only. 
Should you receive this message in error, please notify the sender by replying 
to this mail. Please do not read, copy, forward or store this message unless 
you are an intended recipient of it - unauthorized use of contents is strictly 
prohibited. Unless expressly stated, opinions in this message are those of the 
individual sender and not of GFI. While all care has been taken, GFI is not 
responsible for the integrity or the contents of this electronic mail and any 
attachments included within. (GFI2011)

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: test message

2011-12-09 Thread Steven Peck
pick pick pick.

On Fri, Dec 9, 2011 at 2:41 PM, Michael B. Smith wrote:

>  FYI, based on headers, it took 7 minutes to appear; in the past, it’s
> been under 1 minute.
>
> ** **
>
> Regards,
>
> ** **
>
> Michael B. Smith
>
> Consultant and Exchange MVP
>
> http://TheEssentialExchange.com
>
> ** **
>
> *From:* Donald Bittenbender [mailto:donald.bittenben...@gfi.com]
> *Sent:* Friday, December 09, 2011 5:10 PM
>
> *To:* NT System Admin Issues
> *Subject:* test message
>
>  ** **
>
> Just posting a friendly test message to the list. 
>
>  
>
>  
>
> Donald Bittenbender – 
> dbittenben...@gfi.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=mailto%3adbittenbender%40gfi.com>
> 
>
> Software Developer - GFI Software - 
> www.gfi.com<https://webmail.gfi.com/owa/UrlBlockedError.aspx>
> Salesforce / SharePoint Admin
> Web & Mail Security, Archiving & Fax, Networking & Security
> Tel.: +1 866 389 5597 ext 6065Mob.: +1 727 748 2708
> Join us on: 
> Facebook<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=https%3a%2f%2fwww.facebook.com%2fgfisoftware>|
> Twitter<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2ftwitter.com%2fgfisoftware>
>  |
> LinkedIn<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.linkedin.com%2fgroups%3fgid%3d1833394>|
> TalkTechToMe<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.gfi.com%2fblog%2f>|
> YouTube.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.youtube.com%2fgfisoftware>|
> GFI.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.gfi.com%2f>
> 
>
>  
>
> DISCLAIMER The information contained in this electronic mail may be
> confidential or legally privileged. It is for the intended recipient(s)
> only. Should you receive this message in error, please notify the sender by
> replying to this mail. Please do not read, copy, forward or store this
> message unless you are an intended recipient of it - unauthorized use of
> contents is strictly prohibited. Unless expressly stated, opinions in this
> message are those of the individual sender and not of GFI. While all care
> has been taken, GFI is not responsible for the integrity or the contents of
> this electronic mail and any attachments included within. (GFI2011) 
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: test message

2011-12-09 Thread Michael B. Smith
FYI, based on headers, it took 7 minutes to appear; in the past, it's been 
under 1 minute.

Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Donald Bittenbender [mailto:donald.bittenben...@gfi.com]
Sent: Friday, December 09, 2011 5:10 PM
To: NT System Admin Issues
Subject: test message

Just posting a friendly test message to the list.


Donald Bittenbender - 
dbittenben...@gfi.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=mailto%3adbittenbender%40gfi.com>
Software Developer - GFI Software - 
www.gfi.com<https://webmail.gfi.com/owa/UrlBlockedError.aspx>
Salesforce / SharePoint Admin
Web & Mail Security, Archiving & Fax, Networking & Security
Tel.: +1 866 389 5597 ext 6065Mob.: +1 727 748 2708
Join us on: 
Facebook<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=https%3a%2f%2fwww.facebook.com%2fgfisoftware>
 | 
Twitter<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2ftwitter.com%2fgfisoftware>
 | 
LinkedIn<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.linkedin.com%2fgroups%3fgid%3d1833394>
 | 
TalkTechToMe<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.gfi.com%2fblog%2f>
 | 
YouTube.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.youtube.com%2fgfisoftware>
 | 
GFI.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.gfi.com%2f>

DISCLAIMER The information contained in this electronic mail may be 
confidential or legally privileged. It is for the intended recipient(s) only. 
Should you receive this message in error, please notify the sender by replying 
to this mail. Please do not read, copy, forward or store this message unless 
you are an intended recipient of it - unauthorized use of contents is strictly 
prohibited. Unless expressly stated, opinions in this message are those of the 
individual sender and not of GFI. While all care has been taken, GFI is not 
responsible for the integrity or the contents of this electronic mail and any 
attachments included within. (GFI2011)

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: test message

2011-12-09 Thread Donald Bittenbender
Yes. A few members noticed some major delays in Lyris so we gave it a healthy 
upgrade. May take a while to catch up to the last hour but just making sure 
mailflow is smooth again for the weekend. Have a good one!

Donald Bittenbender
Software Developer
GFI Software - www.gfi.com<http://www.gfi.com/>
Tel.: +1 866 389 5597 ext 6065Mob.: +1 727 748 2708

From: Tammy Stewart [mailto:copper...@personainternet.com]
Sent: Friday, December 09, 2011 5:25 PM
To: NT System Admin Issues
Subject: RE: test message

passed test?

From: Donald Bittenbender 
[mailto:donald.bittenben...@gfi.com]<mailto:[mailto:donald.bittenben...@gfi.com]>
Sent: December-09-11 5:10 PM
To: NT System Admin Issues
Subject: test message

Just posting a friendly test message to the list.


Donald Bittenbender - 
dbittenben...@gfi.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=mailto%3adbittenbender%40gfi.com>
Software Developer - GFI Software - 
www.gfi.com<https://webmail.gfi.com/owa/UrlBlockedError.aspx>
Salesforce / SharePoint Admin
Web & Mail Security, Archiving & Fax, Networking & Security
Tel.: +1 866 389 5597 ext 6065Mob.: +1 727 748 2708
Join us on: 
Facebook<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=https%3a%2f%2fwww.facebook.com%2fgfisoftware>
 | 
Twitter<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2ftwitter.com%2fgfisoftware>
 | 
LinkedIn<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.linkedin.com%2fgroups%3fgid%3d1833394>
 | 
TalkTechToMe<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.gfi.com%2fblog%2f>
 | 
YouTube.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.youtube.com%2fgfisoftware>
 | 
GFI.com<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&URL=http%3a%2f%2fwww.gfi.com%2f>

DISCLAIMER The information contained in this electronic mail may be 
confidential or legally privileged. It is for the intended recipient(s) only. 
Should you receive this message in error, please notify the sender by replying 
to this mail. Please do not read, copy, forward or store this message unless 
you are an intended recipient of it - unauthorized use of contents is strictly 
prohibited. Unless expressly stated, opinions in this message are those of the 
individual sender and not of GFI. While all care has been taken, GFI is not 
responsible for the integrity or the contents of this electronic mail and any 
attachments included within. (GFI2011)

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: test message

2011-12-09 Thread Tammy Stewart
passed test?

 

From: Donald Bittenbender [mailto:donald.bittenben...@gfi.com] 
Sent: December-09-11 5:10 PM
To: NT System Admin Issues
Subject: test message

 

Just posting a friendly test message to the list. 

 

 

Donald Bittenbender -
<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&U
RL=mailto%3adbittenbender%40gfi.com> dbittenben...@gfi.com

Software Developer - GFI Software -
<https://webmail.gfi.com/owa/UrlBlockedError.aspx> www.gfi.com
Salesforce / SharePoint Admin
Web & Mail Security, Archiving & Fax, Networking & Security
Tel.: +1 866 389 5597 ext 6065Mob.: +1 727 748 2708
Join us on:
<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&U
RL=https%3a%2f%2fwww.facebook.com%2fgfisoftware> Facebook |
<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&U
RL=http%3a%2f%2ftwitter.com%2fgfisoftware> Twitter |
<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&U
RL=http%3a%2f%2fwww.linkedin.com%2fgroups%3fgid%3d1833394> LinkedIn |
<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&U
RL=http%3a%2f%2fwww.gfi.com%2fblog%2f> TalkTechToMe |
<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&U
RL=http%3a%2f%2fwww.youtube.com%2fgfisoftware> YouTube.com |
<https://webmail.gfi.com/owa/redir.aspx?C=a061496bcac84696837344716007c6e8&U
RL=http%3a%2f%2fwww.gfi.com%2f> GFI.com

 

DISCLAIMER The information contained in this electronic mail may be
confidential or legally privileged. It is for the intended recipient(s)
only. Should you receive this message in error, please notify the sender by
replying to this mail. Please do not read, copy, forward or store this
message unless you are an intended recipient of it - unauthorized use of
contents is strictly prohibited. Unless expressly stated, opinions in this
message are those of the individual sender and not of GFI. While all care
has been taken, GFI is not responsible for the integrity or the contents of
this electronic mail and any attachments included within. (GFI2011) 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: [test] Thing thing on?

2011-10-21 Thread Micheal Espinola Jr
No, now stop asking.

--
Espi





On Fri, Oct 21, 2011 at 10:16 AM, Ben Scott  wrote:

>  Is the list back up yet?
>
> -- Ben
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Test

2011-10-21 Thread Micheal Espinola Jr
Not any more :-)

--
Espi





On Fri, Oct 21, 2011 at 9:47 AM, Sam Cayze  wrote:

> My messages to the list are getting bounced back…
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

[test] Thing thing on?

2011-10-21 Thread Ben Scott
  Is the list back up yet?

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: server load / stress test

2011-09-07 Thread Ziots, Edward
Have used SQLIOSTRESS and IOMeter, along with the HP CD's for burn in
testing of the hardware before the OS in on. The previous tools I use
for IO for SQL database LUNS. 

 

Z

 

Edward E. Ziots

CISSP, Network +, Security +

Security Engineer

Lifespan Organization

Email:ezi...@lifespan.org

Cell:401-639-3505

 

 

From: Paul Hutchings [mailto:paul.hutchi...@mira.co.uk] 
Sent: Saturday, September 03, 2011 7:11 AM
To: NT System Admin Issues
Subject: RE: server load / stress test

 

Combination of something like prime and iometer should do a reasonable
job i'd have though? 

 

Depending on the vendor they probably have a diagnostic CD/utility that
you can leave looping.



From: Daniele Bartoli [danielebart...@gmail.com]
Sent: 02 September 2011 11:32 PM
To: NT System Admin Issues
Subject: Re: server load / stress test

Primarly for Windows 2008 to stress test the hardware.



 

On Fri, Sep 2, 2011 at 3:29 PM, Michael B. Smith 
wrote:

Yes.

 

But for what application(s)?

 

Regards,

 

Michael B. Smith

Consultant and Exchange MVP

http://TheEssentialExchange.com <http://theessentialexchange.com/> 

 

From: Daniele Bartoli [mailto:danielebart...@gmail.com] 
Sent: Friday, September 02, 2011 6:26 PM
To: NT System Admin Issues
Subject: server load / stress test

 

Does anyone know of any decent server load / stress testing software?
Specifically that is free or low cost.

 

Daniele

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



MIRA Ltd

 

Watling Street, Nuneaton, Warwickshire, CV10 0TU, England

Registered in England and Wales No. 402570

VAT Registration  GB 100 1464 84

 

The contents of this e-mail are confidential and are solely for the use
of the intended recipient.  If you receive this e-mail in error, please
delete it and notify us either by e-mail, telephone or fax.  You should
not copy, forward or otherwise disclose the content of the e-mail as
this is prohibited.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin<>

Re: server load / stress test

2011-09-03 Thread kz20fl
Citrix has an EdgeSight load testing feature, but unless you are actually using 
citrix its kinda useless :-) if you are though, it is very handy for recording 
sequences of actions to run on the servers automatically

Sent from my POS BlackBerry  wireless device, which may wipe itself at any 
moment

-Original Message-
From: Daniele Bartoli 
Date: Fri, 2 Sep 2011 15:26:20 
To: NT System Admin Issues
Reply-To: "NT System Admin Issues" 
Subject: server load / stress test

Does anyone know of any decent server load / stress testing software?
Specifically that is free or low cost.

Daniele

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: server load / stress test

2011-09-03 Thread Paul Hutchings
Combination of something like prime and iometer should do a reasonable job i'd 
have though?

Depending on the vendor they probably have a diagnostic CD/utility that you can 
leave looping.

From: Daniele Bartoli [danielebart...@gmail.com]
Sent: 02 September 2011 11:32 PM
To: NT System Admin Issues
Subject: Re: server load / stress test

Primarly for Windows 2008 to stress test the hardware.



On Fri, Sep 2, 2011 at 3:29 PM, Michael B. Smith 
mailto:mich...@smithcons.com>> wrote:
Yes.

But for what application(s)?

Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com<http://theessentialexchange.com/>

From: Daniele Bartoli 
[mailto:danielebart...@gmail.com<mailto:danielebart...@gmail.com>]
Sent: Friday, September 02, 2011 6:26 PM
To: NT System Admin Issues
Subject: server load / stress test

Does anyone know of any decent server load / stress testing software?  
Specifically that is free or low cost.

Daniele

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

--
MIRA Ltd

Watling Street, Nuneaton, Warwickshire, CV10 0TU, England
Registered in England and Wales No. 402570
VAT Registration  GB 100 1464 84

The contents of this e-mail are confidential and are solely for the use of the 
intended recipient.  If you receive this e-mail in error, please delete it and 
notify us either by e-mail, telephone or fax.  You should not copy, forward or 
otherwise disclose the content of the e-mail as this is prohibited.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: server load / stress test

2011-09-02 Thread Jacob
Ultimate boot CD?

 

Various hardware tests

 

From: Daniele Bartoli [mailto:danielebart...@gmail.com] 
Sent: Friday, September 02, 2011 3:32 PM
To: NT System Admin Issues
Subject: Re: server load / stress test

 

Primarly for Windows 2008 to stress test the hardware.



 

On Fri, Sep 2, 2011 at 3:29 PM, Michael B. Smith 
wrote:

Yes.

 

But for what application(s)?

 

Regards,

 

Michael B. Smith

Consultant and Exchange MVP

http://TheEssentialExchange.com <http://theessentialexchange.com/> 

 

From: Daniele Bartoli [mailto:danielebart...@gmail.com] 
Sent: Friday, September 02, 2011 6:26 PM
To: NT System Admin Issues
Subject: server load / stress test

 

Does anyone know of any decent server load / stress testing software?
Specifically that is free or low cost.

 

Daniele

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: server load / stress test

2011-09-02 Thread Daniele Bartoli
Primarly for Windows 2008 to stress test the hardware.



On Fri, Sep 2, 2011 at 3:29 PM, Michael B. Smith wrote:

>  Yes.
>
> ** **
>
> But for what application(s)?
>
> ** **
>
> Regards,
>
> ** **
>
> Michael B. Smith
>
> Consultant and Exchange MVP
>
> http://TheEssentialExchange.com <http://theessentialexchange.com/>
>
> ** **
>
> *From:* Daniele Bartoli [mailto:danielebart...@gmail.com]
> *Sent:* Friday, September 02, 2011 6:26 PM
> *To:* NT System Admin Issues
> *Subject:* server load / stress test
>
> ** **
>
> Does anyone know of any decent server load / stress testing software?
> Specifically that is free or low cost.
>
>  
>
> Daniele
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: server load / stress test

2011-09-02 Thread Michael B. Smith
Yes.

But for what application(s)?

Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Daniele Bartoli [mailto:danielebart...@gmail.com]
Sent: Friday, September 02, 2011 6:26 PM
To: NT System Admin Issues
Subject: server load / stress test

Does anyone know of any decent server load / stress testing software?  
Specifically that is free or low cost.

Daniele

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

server load / stress test

2011-09-02 Thread Daniele Bartoli
Does anyone know of any decent server load / stress testing software?
Specifically that is free or low cost.

Daniele

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Tips or Guides to doing a Video Streaming stress test

2011-06-10 Thread Don Kuhlman
Hi folks.   I have been assigned the task of doing some base tests on how video 
streaming performance behaves for several different scenarios across the lan. 
This is for users to watch training videos, etc. from their PCs.
I have looked around and found some free tools - LanSpeed Test and Qcheck from 
Ixia, that do some stuff on performance.

I also did some research on using perfmon and came up with these counters that 
may give some indication of how the machine is doing while testing:

Memory/Available MBytes
Memory/Pages Input/Sec
Network/Bytes Total/sec
Network Interface/Output Queue Length
Network Interface/Packets Received Errors
PhysicalDisk/Total/Current Disk Queue Length
PhysicalDisk/Total/Disk Bytes/Sec
Process/Total/Working Set
Processor/Total/%Processor Time
System/Processor Queue Length


Does anyone have a link or some other guidance as to whether these counters 
make 
sense or if I should be looking elsewhere?

Thanks!

Don K
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

  1   2   3   4   5   6   >