Solved

Accessing Kazaa behind university firewall

Posted on 2003-11-19
6
759 Views
Last Modified: 2013-11-16
I'm studying at University and wish to use Kazaa.  However this isn't possib;le as i believe i am behind a firewall.  I'm on a LAN and use a proxy server.  I've been told to try HTTP Tunnel but it doesn't seem to work.  Is there another way around this?
0
Comment
Question by:dabrakes
6 Comments
 
LVL 24

Expert Comment

by:shivsa
ID: 9782997
tools -> tab  "Firewall", this tab should be fine how it is. If you have a proxy server this is where you put the settings of your proxy
0
 
LVL 24

Expert Comment

by:shivsa
ID: 9783005
tools -> option -> firewall.
If you have a proxy server this is where you put the settings of your proxy.
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 9783974
My advice - don't even try. I can only assume that Kazaa is not supported by the University, and you could be jeopardizing your stay by trying to circumvent the controls put in place to stop you.

We in this forum will spend much more time with your network admins trying to prevent just these types of workarounds, and EE rules prevent us from helping you with "cracks" or workarounds.

0
 
LVL 3

Expert Comment

by:nonsence
ID: 9802071
have you thought about asking where on the network p2p traffic is allowed?
at my college certain segments of the network are filtered differently then others. some allow ftp, some irc, some kazaa. just ask. it's not like it's illegal to use kazaa.
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 10976380
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:

--> Accept: lrmoore

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

tim_holman
EE Cleanup Volunteer
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Static IP 5 76
Open BDS Pf 3 44
iPhone6s - Installing Malwarebytes and/or Norton Security Deluxe 3 112
Logging pfSense on Kiwi 4 63
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now