Solved

Kazaa connection

Posted on 2003-11-22
10
841 Views
Last Modified: 2013-11-21
Is it possible to prevent a user on a network form accessing Kazaa and if so how ?
0
Comment
Question by:Raftor
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
10 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9804323
0
 
LVL 18

Accepted Solution

by:
chicagoan earned 30 total points
ID: 9804463
1st would be to have and publicize a policy regarding using P2P software.

2nd it depends on your networking gear.
block port 1214 and block kazaa.com (212.100.253.45 212.100.253.44 207.151.118.143 207.151.118.142)
though this isn't 100% effective, it cuts it down

cisco has software to help (NBAR) and numerous 3rd party solutions are around but none are truly bulletproof.

Monitoring bandwidth is another technique, internet radio and P2P will generally use steady inbound streams, and the latter outbound as well.
0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804485
In our network only the IT staff have administrative rights on our computers.  Others cannot install software/hardware, andy the only places they have write permissions to is the folders they need to.

That makes installation of kazaa impossible for them.
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 18

Expert Comment

by:chicagoan
ID: 9804497
so the question is how to block Kazaa-lite ?
0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804513
The other thing is, if it's installed on the workstation, change permissions to the executable or the folder itself so users cannot access it.
0
 
LVL 18

Expert Comment

by:chicagoan
ID: 9804531
a little labor intensive, then there's Gnutella, Direct Connect, FileShare, GoBoogy, EDonkey, Tesla, BitTorrent, Myster, OpenNap, Blubster, WinMX, FileNavigator, SoulSeek and Softgap Ares on people's laptops. http://www.netfilter.org/documentation/pomlist/pom-summary.html is probably the most effective passive control.
A good policy, education of the users, monitor traffic, have HR drag a couple on the carpet - the word will get around.



0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804540
Exactly.  Like I said, our users can't do installations.  We also do periodic searches of PC's for software that shouldn't be there.  Both on their PC's and their personal drives on the server for unlicensed or non-approved software.
0
 

Author Comment

by:Raftor
ID: 9805715
Is there any way to get around being blocked?
0
 
LVL 18

Expert Comment

by:chicagoan
ID: 9805793
depends on how the user is blocked
i'd sneak into the equipment room and drop a WAP on the wan side of the firewall
where there's a will there's a way
which is why monitoring and reaction are important

are you asking because you've been blocked? if so by whom?
0
 
LVL 13

Assisted Solution

by:AlbertaBeef
AlbertaBeef earned 20 total points
ID: 9806797
Raftor:  There's always ways of getting around, but if you're using a secure o/s (ie: xp pro, Win2K, NT) that requires authentication and uses the NTFS then you can make it reasonably secure unless somebody gets an admin acct. and password.

And for that you fire them ;-)
0

Featured Post

Salesforce Made Easy to Use

On-screen guidance at the moment of need enables you & your employees to focus on the core, you can now boost your adoption rates swiftly and simply with one easy tool.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question