Solved

Kazaa connection

Posted on 2003-11-22
10
832 Views
Last Modified: 2013-11-21
Is it possible to prevent a user on a network form accessing Kazaa and if so how ?
0
Comment
Question by:Raftor
10 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9804323
0
 
LVL 18

Accepted Solution

by:
chicagoan earned 30 total points
ID: 9804463
1st would be to have and publicize a policy regarding using P2P software.

2nd it depends on your networking gear.
block port 1214 and block kazaa.com (212.100.253.45 212.100.253.44 207.151.118.143 207.151.118.142)
though this isn't 100% effective, it cuts it down

cisco has software to help (NBAR) and numerous 3rd party solutions are around but none are truly bulletproof.

Monitoring bandwidth is another technique, internet radio and P2P will generally use steady inbound streams, and the latter outbound as well.
0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804485
In our network only the IT staff have administrative rights on our computers.  Others cannot install software/hardware, andy the only places they have write permissions to is the folders they need to.

That makes installation of kazaa impossible for them.
0
 
LVL 18

Expert Comment

by:chicagoan
ID: 9804497
so the question is how to block Kazaa-lite ?
0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804513
The other thing is, if it's installed on the workstation, change permissions to the executable or the folder itself so users cannot access it.
0
New My Cloud Pro Series - organize everything!

With space to keep virtually everything, the My Cloud Pro Series offers your team the network storage to edit, save and share production files from anywhere with an internet connection. Compatible with both Mac and PC, you're able to protect your content regardless of OS.

 
LVL 18

Expert Comment

by:chicagoan
ID: 9804531
a little labor intensive, then there's Gnutella, Direct Connect, FileShare, GoBoogy, EDonkey, Tesla, BitTorrent, Myster, OpenNap, Blubster, WinMX, FileNavigator, SoulSeek and Softgap Ares on people's laptops. http://www.netfilter.org/documentation/pomlist/pom-summary.html is probably the most effective passive control.
A good policy, education of the users, monitor traffic, have HR drag a couple on the carpet - the word will get around.



0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804540
Exactly.  Like I said, our users can't do installations.  We also do periodic searches of PC's for software that shouldn't be there.  Both on their PC's and their personal drives on the server for unlicensed or non-approved software.
0
 

Author Comment

by:Raftor
ID: 9805715
Is there any way to get around being blocked?
0
 
LVL 18

Expert Comment

by:chicagoan
ID: 9805793
depends on how the user is blocked
i'd sneak into the equipment room and drop a WAP on the wan side of the firewall
where there's a will there's a way
which is why monitoring and reaction are important

are you asking because you've been blocked? if so by whom?
0
 
LVL 13

Assisted Solution

by:AlbertaBeef
AlbertaBeef earned 20 total points
ID: 9806797
Raftor:  There's always ways of getting around, but if you're using a secure o/s (ie: xp pro, Win2K, NT) that requires authentication and uses the NTFS then you can make it reasonably secure unless somebody gets an admin acct. and password.

And for that you fire them ;-)
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now