Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Kazaa connection

Posted on 2003-11-22
10
Medium Priority
?
845 Views
Last Modified: 2013-11-21
Is it possible to prevent a user on a network form accessing Kazaa and if so how ?
0
Comment
Question by:Raftor
10 Comments
 
LVL 18

Accepted Solution

by:
chicagoan earned 120 total points
ID: 9804463
1st would be to have and publicize a policy regarding using P2P software.

2nd it depends on your networking gear.
block port 1214 and block kazaa.com (212.100.253.45 212.100.253.44 207.151.118.143 207.151.118.142)
though this isn't 100% effective, it cuts it down

cisco has software to help (NBAR) and numerous 3rd party solutions are around but none are truly bulletproof.

Monitoring bandwidth is another technique, internet radio and P2P will generally use steady inbound streams, and the latter outbound as well.
0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804485
In our network only the IT staff have administrative rights on our computers.  Others cannot install software/hardware, andy the only places they have write permissions to is the folders they need to.

That makes installation of kazaa impossible for them.
0
NEW Veeam Backup for Microsoft Office 365 1.5

With Office 365, it’s your data and your responsibility to protect it. NEW Veeam Backup for Microsoft Office 365 eliminates the risk of losing access to your Office 365 data.

 
LVL 18

Expert Comment

by:chicagoan
ID: 9804497
so the question is how to block Kazaa-lite ?
0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804513
The other thing is, if it's installed on the workstation, change permissions to the executable or the folder itself so users cannot access it.
0
 
LVL 18

Expert Comment

by:chicagoan
ID: 9804531
a little labor intensive, then there's Gnutella, Direct Connect, FileShare, GoBoogy, EDonkey, Tesla, BitTorrent, Myster, OpenNap, Blubster, WinMX, FileNavigator, SoulSeek and Softgap Ares on people's laptops. http://www.netfilter.org/documentation/pomlist/pom-summary.html is probably the most effective passive control.
A good policy, education of the users, monitor traffic, have HR drag a couple on the carpet - the word will get around.



0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9804540
Exactly.  Like I said, our users can't do installations.  We also do periodic searches of PC's for software that shouldn't be there.  Both on their PC's and their personal drives on the server for unlicensed or non-approved software.
0
 

Author Comment

by:Raftor
ID: 9805715
Is there any way to get around being blocked?
0
 
LVL 18

Expert Comment

by:chicagoan
ID: 9805793
depends on how the user is blocked
i'd sneak into the equipment room and drop a WAP on the wan side of the firewall
where there's a will there's a way
which is why monitoring and reaction are important

are you asking because you've been blocked? if so by whom?
0
 
LVL 13

Assisted Solution

by:AlbertaBeef
AlbertaBeef earned 80 total points
ID: 9806797
Raftor:  There's always ways of getting around, but if you're using a secure o/s (ie: xp pro, Win2K, NT) that requires authentication and uses the NTFS then you can make it reasonably secure unless somebody gets an admin acct. and password.

And for that you fire them ;-)
0

Featured Post

Vote for the Most Valuable Expert

It’s time to recognize experts that go above and beyond with helpful solutions and engagement on site. Choose from the top experts in the Hall of Fame or on the right rail of your favorite topic page. Look for the blue “Nominate” button on their profile to vote.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of the companies I’ve worked with have embraced cloud solutions due to their desire to “get out of the datacenter business.” The ability to achieve better security and availability, and the speed with which they are able to deploy, is far grea…
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

877 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question