Solved

disable/disconnect internet browser

Posted on 2003-11-16
3
232 Views
Last Modified: 2010-03-18
How to completely disable or disconnect internet browser in a user connected within in the netwrok.  We have an employee despite of repetitive request to him not to surf during working hours and still he does. We delete the browser, we delete the setup (internet options) and he regain it. He just go to other computer and copy the setup and he can browse again. We don’t want to remove him because we know he is a good guy but we have only this comment to him. Any idea.
0
Comment
Question by:jccm
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 21

Accepted Solution

by:
marc_nivens earned 30 total points
ID: 9760331
This really depends on your current infrastructure.  For example, if you were running proxy/isa you could restrict this at the server.  And if you were running Active Directory you could restrict much of what this user could do with group policy.  Even if he's on Win9x you could still use policy editor on the machine to lock it down somewhat.

But... if you really want to get the point accross to this employee, install this:

http://www.devicode.com/kidsplorer/

I've never used it but it claims to be a "kid safe" browser that allows you to block the launching of other browsers and restrict the sites it can visit.
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question