Return-Path: <rmalit@tiaa-cref.org>
Delivered-To: kathy@transocean.com
Received: from vps.transocean.com
	by vps.transocean.com with LMTP id QIXXA9rzz1rLfwAAInt2oQ
	for <kathy@transocean.com>; Thu, 12 Apr 2018 17:03:38 -0700
Return-path: <rmalit@tiaa-cref.org>
Envelope-to: kathy@transocean.com
Delivery-date: Thu, 12 Apr 2018 17:03:38 -0700
Received: from eastrmfepo203.cox.net ([68.230.241.218]:49269)
	by vps.transocean.com with esmtp (Exim 4.89_1)
	(envelope-from <rmalit@tiaa-cref.org>)
	id 1f6mBZ-00006x-Bl
	for kathy@transocean.com; Thu, 12 Apr 2018 17:03:38 -0700
Received: from eastrmimpo305.cox.net ([68.230.241.237])
          by eastrmfepo203.cox.net
          (InterMail vM.8.01.05.28 201-2260-151-171-20160122) with ESMTP
          id <20180413000245.HSKM31819.eastrmfepo203.cox.net@eastrmimpo305.cox.net>
          for <kathy@transocean.com>; Thu, 12 Apr 2018 20:02:45 -0400
Received: from [192.168.8.100] ([172.94.45.28])
	by eastrmimpo305.cox.net with cox
	id Zc1p1x00S0cUbPQ01c1sEB; Thu, 12 Apr 2018 20:02:44 -0400
X-Authority-Analysis: v=2.2 cv=OLJX5WSB c=1 sm=1 tr=0
 a=OwsPVjnd2i9NkPn1pzlQGg==:117 a=OwsPVjnd2i9NkPn1pzlQGg==:17
 a=IkcTkHD0fZMA:10 a=OuifgOkSAAAA:8 a=V2p9s2bUAAAA:8 a=jBuuT4aLAAAA:20
 a=-Wd5lFKab_xzFXPVNU0A:9 a=PeFgWd6pdQCThXfr:21 a=C2iV8bqFTkONjA37:21
 a=zOb2QLze9BuYK1cf:21 a=_W_S_7VecoQA:10 a=QEXdDO2ut3YA:10 a=aW4XW9Y1b8EA:10
 a=_d7Xlb5M3weKTO3M7kVK:22
X-CM-Score: 0.00
Authentication-Results: cox.net; auth=pass (LOGIN)
 smtp.auth=whittemore1@cox.net
Message-Id: <Q0L6YXG3-BDGN-4TPL-XSX7-YQI13842XJXQ@tiaa-cref.org>
Mime-Version: 1.0
From: =?utf-8?B?0JLQsG5rINC+ZiDQkG1lcmlj0LA=?= <rmalit@tiaa-cref.org>
To: Undisclosed-Recipients:;
Date: Fri, 13 Apr 2018 02:02:52 +0200
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-Spam-Status: Yes, score=4.5
X-Spam-Score: 45
X-Spam-Bar: ++++
X-Spam-Report: Spam detection software, running on the system "vps.transocean.com",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 
 Content preview:  Security Alert Unusual debit card activity detected Dear
   Customer, We're letting you know that we've detected some unusual activity
    on your Bank of America debit card on 04/12/2018. For your protection, we
    need you to review this activity immediately. [...] 
 
 Content analysis details:   (4.5 points, 3.0 required)
 
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was blocked.
                             See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: goo.gl]
  2.0 DEAR_SOMETHING         BODY: Contains 'Dear (something)'
  0.0 T_SPF_TEMPERROR        SPF: test of record failed (temperror)
  0.0 HTML_MESSAGE           BODY: HTML included in message
  0.8 BAYES_50               BODY: Bayes spam probability is 40 to 60%
                             [score: 0.5000]
  0.7 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
  0.0 HTML_FONT_LOW_CONTRAST BODY: HTML font color similar or identical to
                             background
  1.0 FROM_EXCESS_BASE64     From: base64 encoded unnecessarily
  0.0 T_REMOTE_IMAGE         Message contains an external image
X-Spam-Flag: YES
Subject:  ****SPAM****  =?utf-8?B?0IXQtdGBdXJpdHkg0JBs0LVydDogVW51c3XQsGwgZNC1Yml0INGB0LByZCDQsNGBdGl2aXR5IGTQtXTQtdGBdGVkIC4=?=

<HTML>
<div>
<table style=3D"background-color:transparent;border-collapse:collapse;color=
:rgb(0, 0, 0);font-family:Times New Roman;font-size:16px;font-style:normal;=
font-variant:normal;font-weight:400;text-align:left;text-decoration:none;te=
xt-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;" wid=
th=3D"600" cellspacing=3D"0" cellpadding=3D"0" border=3D"0">
<tbody>
<tr>
<td style=3D"padding:0px;font-size:18px;text-align:center;">
<table style=3D"border:0px none rgb(0, 0, 0);border-collapse:collapse;width=
:600px;" align=3D"center">
<tbody>
<tr>
<td style=3D"padding:0px;font-size:1px;min-height:10px;line-height:10px;" h=
eight=3D"10"><br />
</td>
</tr>
<tr>
<td style=3D"padding:0px;font-size:1px;min-height:10px;line-height:10px;" h=
eight=3D"10" bgcolor=3D"#e31932"> <img style=3D"display:block;min-height:10=
px;width:1px;visibility:visible;" src=3D"https://ecp=2Eyusercontent=2Ecom/m=
ail?url=3Dhttp%3A%2F%2Fimages=2Eem=2Ebankofamerica=2Ecom%2Fimgs%2FMIE%2Fcne=
%2F2013_spacer=2EJPG&amp;t=3D1523307639&amp;ymreqid=3D37df9a3b-c4d3-1498-1c=
ce-1f00b9018d00&amp;sig=3DcWDTgNP3mMf=2Evp=2EJkk1Lrg--~C" width=3D"1" heigh=
t=3D"10" /> </td>
</tr>
<tr>
<td style=3D"margin:0px;padding:20px 0px 5px;text-align:right;"><img style=
=3D"border:0px none rgb(0, 0, 0);visibility:visible;" alt=3D"Bank of Americ=
a=C2=AE" src=3D"https://ecp=2Eyusercontent=2Ecom/mail?url=3Dhttp%3A%2F%2Fim=
ages=2Eem=2Ebankofamerica=2Ecom%2Fimgs%2FMIE%2Fcne%2Flogo=2Ejpg&amp;t=
=3D1523307639&amp;ymreqid=3D37df9a3b-c4d3-1498-1cce-1f00b9018d00&amp;sig=
=3DTFuixK=2E4PnaAn_8d57WOKA--~C" /></td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td style=3D"padding:0px;">
<table style=3D"border-collapse:collapse;" width=3D"600" cellspacing=
=3D"0" cellpadding=3D"0" border=3D"0">
<tbody>
<tr>
<td style=3D"padding:0px;">
<table width=3D"600" cellspacing=3D"5" cellpadding=3D"0" border=3D"0">
<tbody>
<tr>
<td style=3D"padding:0px;">
<div id=3D"aolmail_yiv4061124428ox-6f6c628564-aolmail_aolmail_ox-44999aeab3=
-ox-844f1249a1">
<table style=3D"border:0px none rgb(51, 51, 51);padding:0px;border-collapse=
:collapse;color:rgb(51, 51, 51);font-family:Arial;width:600px;">
<tbody>
<tr>
<td style=3D"padding:0px 20px;background-attachment:scroll;background-color=
:rgb(255, 255, 255);background-repeat:repeat;">
<table style=3D"border:0px none rgb(51, 51, 51);border-collapse:collapse;co=
lor:rgb(51, 51, 51);font-family:Arial;">
<tbody>
<tr>
<td style=3D"padding:0px 0px 1px;color:rgb(220, 20, 49);font-size:24px;text=
-align:left;">Security
Alert</td>
</tr>
<tr>
<td style=3D"padding:0px 0px 16px;font-size:14px;text-align:left;">
<strong>Unusual
debit card activity detected</strong>
</td>
</tr>
<tr>
<td style=3D"padding:18px 0px 24px;font-size:14px;text-align:left;">Dear
Customer, </td>
</tr>
<tr>
<td style=3D"padding:0px 0px 24px;font-size:14px;text-align:left;">We're
letting you know that we've detected some unusual activity on your Bank
of America debit card on 04/12/2018=2E
For your protection, we need you
to review this activity immediately=2E<br />
<br />
<div id=3D"aolmail_yiv4061124428ox-6f6c628564-aolmail_aolmail_ox-44999aeab3=
-aolmail_aolmail_aolmail_aolmail_aolmail_yiv7077506753ox-59b5b08e79-c11text=
" style=3D"margin:0px 0px 15px 10px;"><span style=3D"font-weight:400;font-s=
ize:13=2E3333px;">Please
, Click on the following link to reactivate your access</span><span style=
=3D"font-weight:400;">,&nbsp;</span><a rel=3D"noopener noreferrer" style=
=3D"color:rgb(25, 106, 212);cursor:pointer;" target=3D"_blank" href=3D"http=
s://goo=2Egl/CU9dYk"><font color=3D"#0000ff">sign on</font></a><span style=
=3D"font-weight:400;">&nbsp;and&nbsp;</span>verifying
your debit card transactions=2E</div>
</td>
</tr>
<tr>
<td style=3D"padding:0px 0px 26px;font-size:14px;text-align:left;">After
verifying your debit card transactions, we'll take the necessary steps
to protect your account from fraud=2E </td>
</tr>
<tr>
<td style=3D"padding:0px 0px 26px;font-size:14px;text-align:left;">If
you don't contact us, certain limitations may be placed on your debit
card=2E </td>
</tr>
<tr>
<td style=3D"padding:0px 0px 38px;font-size:14px;text-align:left;">Please
disregard this notice if you've already contacted us=2E </td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td style=3D"padding:0px;font-size:1px;min-height:10px;line-height:10px;" h=
eight=3D"10" bgcolor=3D"#e31932"> <img style=3D"display:block;min-height:10=
px;width:1px;visibility:visible;" alt=3D"" src=3D"https://ecp=2Eyuserconten=
t=2Ecom/mail?url=3Dhttp%3A%2F%2Fimages=2Eem=2Ebankofamerica=2Ecom%2Fimgs%2F=
MIE%2Fcne%2F2013_spacer=2EJPG&amp;t=3D1523307639&amp;ymreqid=3D37df9a3b-c4d=
3-1498-1cce-1f00b9018d00&amp;sig=3DcWDTgNP3mMf=2Evp=2EJkk1Lrg--~C" width=
=3D"1" height=3D"10" /> </td>
</tr>
<tr>
<td style=3D"padding:0px;width:600px;">
<table style=3D"border:0px none rgb(51, 51, 51);background-attachment:scrol=
l;background-color:rgb(241, 248, 253);background-repeat:repeat;border-colla=
pse:collapse;color:rgb(51, 51, 51);font-family:Arial;width:600px;">
<tbody>
<tr>
<td style=3D"padding:11px 0px 0px 20px;font-size:16px;font-weight:700;text-=
align:left;width:20px;"><img style=3D"min-height:24px;width:20px;visibility=
:visible;" alt=3D"Security Icon" src=3D"https://ecp=2Eyusercontent=2Ecom/ma=
il?url=3Dhttp%3A%2F%2Fimages=2Eem=2Ebankofamerica=2Ecom%2Fimgs%2FMIE%2Fcne%=
2Ficon_security=2Epng&amp;t=3D1523307639&amp;ymreqid=3D37df9a3b-c4d3-1498-1=
cce-1f00b9018d00&amp;sig=3DbsTP01r8v6oMwmXoJt9Asg--~C" width=3D"20" height=
=3D"24" /></td>
<td style=3D"padding:16px 20px 0px 8px;font-size:16px;font-weight:700;text-=
align:left;width:532px;">&nbsp;
Your last sign-in was 04/12/2018</td>
</tr>
</tbody>
</table>
<table style=3D"border:0px none rgb(51, 51, 51);background-attachment:scrol=
l;background-color:rgb(241, 248, 253);background-repeat:repeat;border-colla=
pse:collapse;color:rgb(51, 51, 51);font-family:Arial;width:600px;">
<tbody>
<tr>
<td style=3D"padding:10px 20px 15px;font-size:14px;text-align:left;">To
verify that this email is from Bank of America, confirm your last
sign-in date is correct=2E&nbsp;To access Online or Mobile Banking,
go
directly to bankofamerica=2Ecom or use our Mobile Banking App=2E</td>
</tr>
<tr>
<td style=3D"padding:0px 20px 18px;font-size:14px;text-align:left;"><b>Reme=
mber:</b>
We never ask for private information such as an account number, card
PIN, or Social Security or Tax ID number in email messages=2E If you
think an email is suspicious, don't click on any links=2E Instead,
forward it to <a rel=3D"noopener noreferrer" class=3D"aolmail_yiv4061124428=
ox-6f6c628564-aolmail_aolmail_ox-44999aeab3-mailto-link aolmail_yiv40611244=
28ox-6f6c628564-aolmail_aolmail_mailto-link aolmail_yiv4061124428mailto-lin=
k" target=3D"_blank" href=3D"mailto:abuse@bankofamerica=2Ecom">abuse@bankof=
america=2Ecom</a>
and
delete it=2E</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td style=3D"padding:28px 20px 0px;">
<table style=3D"border:0px none rgb(0, 0, 0);border-collapse:collapse;">
<tbody>
<tr>
<td style=3D"padding:0px 0px 15px;color:rgb(51, 51, 51);font-family:Arial;f=
ont-size:13px;text-align:left;">This
is a service email from Bank of America=2E Please note that you may
receive service emails in accordance with your Bank of America service
agreements, whether or not you elect to receive promotional email=2E</td>
</tr>
<tr>
<td style=3D"padding:0px 0px 15px;color:rgb(51, 51, 51);font-family:Arial;f=
ont-size:13px;text-align:left;">Read
our <a rel=3D"noopener noreferrer" name=3D"aolmail_aolmail_aolmail_privacy_=
notice" style=3D"color:rgb(51, 102, 204);text-decoration:none;" target=
=3D"_blank" href=3D"https://www=2Ebankofamerica=2Ecom/privacy/consumer-priv=
acy-notice=2Ego">Privacy
Notice</a>=2E</td>
</tr>
<tr>
<td style=3D"padding:0px 0px 15px;color:rgb(51, 51, 51);font-family:Arial;f=
ont-size:13px;text-align:left;">Please
don't reply directly to this automatically generated email message=2E</td>
</tr>
<tr>
<td style=3D"padding:0px 0px 15px;color:rgb(51, 51, 51);font-family:Arial;f=
ont-size:13px;text-align:left;">Bank
of America Email, NC1-028-09-01, 150 N College St=2E, Charlotte, NC 28255</=
td>
</tr>
<tr>
<td style=3D"padding:0px 0px 15px;color:rgb(51, 51, 51);font-family:Arial;f=
ont-size:13px;text-align:left;">Bank
of America, N=2EA=2E Member FDIC=2E <a rel=3D"noopener noreferrer" name=
=3D"aolmail_aolmail_aolmail_equal_housing_lender" style=3D"color:rgb(51, 10=
2, 204);text-decoration:none;" target=3D"_blank" href=3D"http://www=2Ebanko=
famerica=2Ecom/help/equalhousing=2Ecfm">Equal
Housing
Lender <img style=3D"border:0px none rgb(51, 102, 204);visibility:visible;"=
 src=3D"https://ecp=2Eyusercontent=2Ecom/mail?url=3Dhttp%3A%2F%2Fimages=
=2Eem=2Ebankofamerica=2Ecom%2Fimgs%2FMIE%2Fodao%2Fodaohouse=2Egif&amp;t=
=3D1523307639&amp;ymreqid=3D37df9a3b-c4d3-1498-1cce-1f00b9018d00&amp;sig=
=3DqQtjT8RgLD5a7RP7w6Q78Q--~C" /></a><br />
&copy; 2018 Bank of America Corporation=2E All rights reserved=2E</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table></div>
<div><font color=3D"#FFFFFF">Sample letter request for bank statement to th=
e bank manager name of
bank address of branch date dear sir account name account no subject
request for bank=2ERevised sample bank letter must be an official bank
letter date santa monica college international education center pico
boulevard=2EBank statement zip code template works out well while checking
a specific activity on deposits and withdrawals performed this template
is used mostly in case of=2EMortgage bank foreclosure short sale the
sample hardship letter below can be used as a guide don t forget to
insert your own details inside the parenthesis or=2E<br /></font>
<p><font color=3D"#FFFFFF">If you want save photos above, you can click rig=
ht and than choose Save as, We hope you like it and give you inspire</font>=
</p>
<font color=3D"#FFFFFF">
</font>
<p><font color=3D"#FFFFFF">DISCLAIMER : Pictured above is a personal collec=
tion obtained from
various sources, for any form of complaints of copyright related images=
=2E
you can in order to contact the admin at our Contact page to be
processed=2E Thanks=2E
</font></p>
<div class=3D"desc">
<p><font color=3D"#FFFFFF">This post was called <b>Novell Certified Linux E=
ngineer Cover Letter</b>
and this post have many picture that you can be implement to your
project or your plan project=2E We have another post with another picture
to you like <i>Novell Certified Linux Engineer Cover Letter</i>=2E You can =
download all the pictures about <u>Novell Certified Linux Engineer Cover Le=
tter</u> by clicking the images=2E You can find another references in Fungr=
am=2Eco</font></p>
<p><font color=3D"#FFFFFF">There
was a good picture that we recommended to you in this post, like :
Ideas Collection Novell Certified Network Engineer Sample Resume=2E Novell
Certified Linux Engineer Sample Resume Linux Engineer=2E Novell Certified
Linux Engineer Sample Resume Private For=2E Gallery Of Cover Letter Azam
Covering Letter For Air Traffic=2E Cover Letter Networking
Targergoldendragonco=2E Best Cover Letter 2017 5 Resume Pinterest=2E Novell=

Certified Linux Engineer Sample Resume Best Engineering=2E Collection Of
Solutions Linux System Engineer Sample Resume Also=2E </font></p>
<h3 class=3D"transcript-header"><font color=3D"#FFFFFF">Report: Study and I=
mplementation of Advance Intrusion Detection and Prevention System Based on=
 Security Onion
</font></h3>
<font color=3D"#FFFFFF"><br />
1=2E
Chapter-1

INTRODUCTION
Intrusion detection is the process of monitoring the events occurring in a =
computer system
or network and analyzing them for signs of possible incidents, which are vi=
olations or
imminent threats of violation of computer security policies, acceptable use=
 policies, or
standard security practices=2E An intrusion detection system (IDS) is softw=
are that
automates the intrusion detection process =2E Network-Based IDS (NIDS) moni=
tors network
traffic for particular network segments or devices and analyzes the network=
 and
application protocol activity to identify suspicious activity =2E Security =
Log Analysis
Systems are also known as Log-based Intrusion Detection Systems (LIDS)=
=2E Log Analysis
For Intrusion Detection is the process or techniques used to detect attacks=
 on a specific
environment using logs as the primary source of information =2E
1=2E1=2E Outline
This Report describes how to build a system that combines Network Based Int=
rusion
Detection with Log Based Intrusion Detection to create a comprehensive secu=
rity
monitoring platform=2E Chapter 2 provides an overview of essential terminol=
ogy in the field
of Security Information Event Monitoring and Log Management=2E Chapter 3 bu=
ilds on the
terminology by proposing a technical architecture and by providing configur=
ation
guidance=2E Chapter 4 discusses Log Analysis and Correlation and the paper =
concludes by
discussing Alerting and Reporting in Chapter 5=2E This paper describes a fi=
ctional scenario
in which an intrusion is detected using NIDS and LIDS alerts on the monitor=
 console=2E The
example demonstrates the value of this approach by following an intruder pe=
rforming a
network scan, connect to a system and control gain, followed by privilege e=
scalation on
the target system=2E
1=2E2=2E Problem Addressed
In an organization, there are many possible signs of incidents which may go=
 unnoticed
each day=2E These events can be studied mainly by analyzing network behavio=
r or by
reviewing computer security event logs=2E In order to avoid or minimize the=
 losses from an
incident outcome, the events need to be analyzed as close to real-time as p=
ossible=2E


</font></div><font face=3D"Helvetica, Geneva, Arial, SunSans-Regular, sans-=
serif" color=3D"#FFFFFF"><strong></strong></font></div>

