Solved

HOW I CAN RUN PEER TO PEER SOFTWARES LIKE (KAZAA) INSPITE OF ISA FIREWALL BLOCKED IT'S PORTS.

Posted on 2004-04-15
10
1,242 Views
Last Modified: 2013-11-16
HI ,
MY NAME IS JAD AND I AM A STUDENT IN UNVIERSTY IN DUBIA (middel east).
AND ACCRODING TO MANY RULES
THE UNVIERSTY TECHNOLOGY STUFF  BLOCKED ALL WAYS TO CONNECT TO PEER TO PEER SOFTWARES LIKE KAZAA
THROUGH THE ISA FIREWALL AND I TRIED A LOT OF TIMES TO FIND AN ACCESS TO AVOID THIS PROBLEM BUT IN THE END I FAILED SO I HOPE THAT YOU WILL HELP ME PERFECTLY BECAUSE I HAD SEEN THE GREAT EXPERINC OF EXPERTS EXCHANGE STUFF LIKE  ==LRMOOR==.
AND JUST FOR YOUR INFORMATIONS I AM NOT A HACKER THAT I WANT TO BROKEN MY UNVIRESTY RULES  BUT I AM JUST A PERSON HOW INTERSETED TOO MUCH IN NETWORKING AND FIREWALLS
STUFF AND AS EVEY BODY KNOW IF SOMEONE WANT TO BE REAL EXPERT IN COMPUTER SECURITY
AND CREATE A HELPFUL SOLUTIONS IN THIS FIELD THEN ABSOLUTELY HE MUST KNOW HOW THE HACKERS THINKING AND I AM SURE THAT EXPERTS EXCHANGE STUFF UNDERSTAND WHAT I MEAN....
ISN'T LIKE THAT MY FRIEND ==LRMOOR==..............................

FINALLY PLEASE GIVE ME THE FULL SOLUTION FOR THIS PROBLEM........................
0
Comment
Question by:JADOOK
10 Comments
 
LVL 18

Expert Comment

by:JConchie
Comment Utility
First of all, if you are trying to bypass the security set up on the network to which you have been given access, you are hacking.......and by the user agreement you accepted when you joined EE, no one here is allowed to help you hack.
Your university has a ISA firewall and blocks services like Kazaa for a very good reason.......those services expose them to a ton of viruses, worms, adware and malware.  Stop trying to get around that....if you want to expose your own machine, do so on your own private connection.....not one that will cost someone else a bunch of money to clean up after you open a virus hole on them.
0
 
LVL 5

Accepted Solution

by:
Netminder earned 0 total points
Comment Utility
JADOOK,

First off, lose the CAPS LOCK key. Upper case type is difficult to read, and further, is considered rude.

Second, as JConchie notes, no one will give you the information you seek, since it involves violating the security of a network. Had you taken the time to read the membership guidelines, to which you agreed when you registered at Experts Exchange, you would know this.

Question closed and points forfeited.

Netminder
Site Admin
0
 

Author Comment

by:JADOOK
Comment Utility
Hi again MR.Netminder
maybe you're right about Upper case typing.but I do it to read it carfully, And as I expected you and JConchi just answered me by not logically way.
I am really want to be sorry about my way in expression but........
the important thing i wanted to mentionded is the following:
Suppouse my lord you're Attacked from an enemy which use Guns & Bombs as wepones and you have a full experince & knowldge to use same wepones but you'r learn your kids just to attack by sword ,So absolutely you will start to learn your kids how to use the advanced wepons,because it's the time to do it.......
So what i mean that if i asked
you to learn me things (which actually used for very bad Purposes) it's mean that i will used it in bad way And you  know that every body have mind to choise between the goodness & badness.
So if your site will not answred I'm sure and you know also that after day or month or year i will get the answer.
So why you're limited the freedom.........................
this is a last time i will ask you to help me and if you  want to tell me someting bad send it to my E_mail:
*** email address removed by Netminder, Site Admin ***
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 

Author Comment

by:JADOOK
Comment Utility
Firstly,
          I'm really Appreciate your fathfully for Experts Exchange members and for all programmers.
But in my opinion ,Only the Idiot & folish programmer can let his software hacked or cracked.
like an example I wrote a  program in coding Audio CD's before one year,and I sold it to a company in Dubai (where i living) and belive me until now i didn't found any software through the internet or anywhere have the capability to crack it (make illagely copy) .Also in future when i will create a program the registeration will be only through the internet.So nobody can have full version until he/she download my (128-bit) encrypted patch file.And Absolutely you know that all software companies following the policy (let the Numskulls buy our products & let the hackers crack our products,After that As Soon As possible we will release a new version of our products).
Please my darling don't tell me this is fault analogy,because that's what happend in this days........
Secondly I respect your way in analysis but Actually i put my hotmail account to gain some friends
only.anyway I don't think you will mind if i put my yahoo acount !!!!!!
*** email address removed by Netminder, Site Admin ***
Finally,
about our main case i found some solutions but actually it's not helpful like(http-tunnels)..So
if you changed your mind give me at least some hints and tips ;else please cancel my account  from this generous site???!!!
0
 
LVL 18

Expert Comment

by:JConchie
Comment Utility
Yea, cancel! cancel!
0
 

Expert Comment

by:da_mankw
Comment Utility
Um I live in Dubai, and i goto American University in Sharjah.. They have strict rules as so but its not only in the labs or computer rooms on campus, but also in dorms not only that they also block off ports for online game play. And getting an outside dial-up account is not allowed. Well I don understand the anology in that i don really care. if u want Kazaa so much just go to a netcafe with a cd-rw or get an appartment or somthing....

0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Cisco ASA 5505 NAT question 8 88
Logging pfSense on Kiwi 4 62
Questions on windows ports 13 64
Videos Blocked on espn.com 7 85
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now