Problems for encryption security

From: <reginal..._at_hotmail.com>
Date: Fri, 22 Feb 2008 09:39:21 -0800 (PST)

>From - Sat Mar 02 00:57:17 2024
Received: by 10.114.157.1 with SMTP id f1mr3563972wae.16.1203710538274;
        Fri, 22 Feb 2008 12:02:18 -0800 (PST)
Return-Path: <steveg..._at_hotmail.com>
Received: from bay0-omc3-s35.bay0.hotmail.com (bay0-omc3-s35.bay0.hotmail.com [65.54.246.235])
        by mx.google.com with ESMTP id k36si553491waf.0.2008.02.22.12.02.18;
        Fri, 22 Feb 2008 12:02:18 -0800 (PST)
Received-SPF: pass (google.com: domain of steveg..._at_hotmail.com designates 65.54.246.235 as permitted sender) client-ip=65.54.246.235;
Authentication-Results: mx.google.com; spf=pass (google.com: domain of steveg..._at_hotmail.com designates 65.54.246.235 as permitted sender) smtp.mail=steveg..._at_hotmail.com
Received: from BAY123-W40 ([207.46.11.75]) by bay0-omc3-s35.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959);
         Fri, 22 Feb 2008 12:00:59 -0800
Message-ID: <BAY123-W4031B5115BA30D933D4640CE1D0_at_phx.gbl>
Return-Path: steveg..._at_hotmail.com
Mime-Version: 1.0
Content-Type: multipart/alternative;
        boundary="_d2dd4c32-3602-4da7-abca-2ae30ae5231e_"
X-Originating-IP: [76.187.186.101]
From: Steve Griffith <steveg..._at_hotmail.com>
To: <tscm-..._at_googlegroups.com>
Subject: TSCM for N. Texas companies
Date: Fri, 22 Feb 2008 14:00:59 -0600
Importance: Normal
In-Reply-To: <7.0.1.0.2.20080222135324.124b4730_at_tscm.com>
References:
 <ea956638-e4ad-4ba1-be2c-357fd9376910_at_k2g2000hse.googlegroups.com>
 <7.0.1.0.2.20080222135324.124b4730_at_tscm.com>
X-OriginalArrivalTime: 22 Feb 2008 20:00:59.0646 (UTC) FILETIME=[A4D721E0:01C8758D]

--_d2dd4c32-3602-4da7-abca-2ae30ae5231e_
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable


I'm an IT network and software consultant. I deal with companies that want =
to cover all the bases of security for their networks as well as their phys=
cial locations. A few customers inquire about having someone come in to do =
counter-surveillence sweeps on their offices , communications, as well as t=
he physical infrastructure of their network. =20
I know there are plenty of incompetents, PI's with a box, and con-artist TS=
CM services. How and where can I find the true, high quality TSCMers in Nor=
th Texas or someone that travels to engagements in the area ?
Thanks,
Steve Griffith
=20
=20
--_d2dd4c32-3602-4da7-abca-2ae30ae5231e_
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<style>
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
FONT-SIZE: 10pt;
FONT-FAMILY:Tahoma
}
</style>
</head>
<body class=3D'hmmessage'>
I'm an IT network and software&nbsp;consultant. I deal with companies that =
want to cover all the bases of security for their networks as well as their=
 physcial locations. A few customers inquire about having someone come in t=
o do counter-surveillence sweeps on their offices , communications, as well=
 as the physical infrastructure of their network.&nbsp;&nbsp;<BR>
I know there are plenty of incompetents, PI's with a box,&nbsp;and&nbsp;con=
-artist TSCM services. How and where can I find the true, high quality TSCM=
ers in North Texas or someone that travels to engagements in the area ?<BR>
Thanks,<BR>
Steve Griffith<BR>
&nbsp;<BR>
&nbsp;<BR></body>
</html>
--_d2dd4c32-3602-4da7-abca-2ae30ae5231e_--
Received on Sat Mar 02 2024 - 00:57:17 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:44 CST