?
Solved

Kazaa connection

Posted on 2003-11-22
10
Medium Priority
?
844 Views
Last Modified: 2013-11-21
Is it possible to prevent a user on a network form accessing Kazaa and if so how ?
0
Comment
Question by:Raftor
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
10 Comments
 
LVL 18

Accepted Solution

by:
chicagoan earned 120 total points
ID: 9804463
1st would be to have and publicize a policy regarding using P2P software.

2nd it depends on your networking gear.
block port 1214 and block kazaa.com (212.100.253.45 212.100.253.44 207.151.118.143 207.151.118.142)
though this isn't 100% effective, it cuts it down

cisco has software to help (NBAR) and numerous 3rd party solutions are around but none are truly bulletproof.

Monitoring bandwidth is another technique, internet radio and P2P will generally use steady inbound streams, and the latter outbound as well.
0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804485
In our network only the IT staff have administrative rights on our computers.  Others cannot install software/hardware, andy the only places they have write permissions to is the folders they need to.

That makes installation of kazaa impossible for them.
0
Survive A High-Traffic Event with Percona

Your application or website rely on your database to deliver information about products and services to your customers. You can’t afford to have your database lose performance, lose availability or become unresponsive – even for just a few minutes.

 
LVL 18

Expert Comment

by:chicagoan
ID: 9804497
so the question is how to block Kazaa-lite ?
0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804513
The other thing is, if it's installed on the workstation, change permissions to the executable or the folder itself so users cannot access it.
0
 
LVL 18

Expert Comment

by:chicagoan
ID: 9804531
a little labor intensive, then there's Gnutella, Direct Connect, FileShare, GoBoogy, EDonkey, Tesla, BitTorrent, Myster, OpenNap, Blubster, WinMX, FileNavigator, SoulSeek and Softgap Ares on people's laptops. http://www.netfilter.org/documentation/pomlist/pom-summary.html is probably the most effective passive control.
A good policy, education of the users, monitor traffic, have HR drag a couple on the carpet - the word will get around.



0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804540
Exactly.  Like I said, our users can't do installations.  We also do periodic searches of PC's for software that shouldn't be there.  Both on their PC's and their personal drives on the server for unlicensed or non-approved software.
0
 

Author Comment

by:Raftor
ID: 9805715
Is there any way to get around being blocked?
0
 
LVL 18

Expert Comment

by:chicagoan
ID: 9805793
depends on how the user is blocked
i'd sneak into the equipment room and drop a WAP on the wan side of the firewall
where there's a will there's a way
which is why monitoring and reaction are important

are you asking because you've been blocked? if so by whom?
0
 
LVL 13

Assisted Solution

by:AlbertaBeef
AlbertaBeef earned 80 total points
ID: 9806797
Raftor:  There's always ways of getting around, but if you're using a secure o/s (ie: xp pro, Win2K, NT) that requires authentication and uses the NTFS then you can make it reasonably secure unless somebody gets an admin acct. and password.

And for that you fire them ;-)
0

Featured Post

Optimum High-Definition Video Viewing and Control

The ATEN VM0404HA 4x4 4K HDMI Matrix Switch supports 4K resolutions of UHD (3840 x 2160) and DCI (4096 x 2160) with refresh rates of 30 Hz (4:4:4) and 60 Hz (4:2:0). It is ideal for applications where the routing of 4K digital signals is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question