A pointer to an article about the existence of a corrupted PuTTY build  
ran through my feeds, today.

Apparently this was identified in the wild a couple of years ago, and  
there are various security filters that have been used in different  
places to prevent downloads, catch errant network activity, etcetera.

I know that PuTTY is on the UVM software download page.

Have there been any explicit actions on the UVM network taken to  
identify/intercept the bogus PuTTY activity described in the fortinet  

Scott Turnbull
EPSCoR Software Engineer