Solved

HOW I CAN RUN PEER TO PEER SOFTWARES LIKE (KAZAA) INSPITE OF ISA FIREWALL BLOCKED IT'S PORTS.

Posted on 2004-04-15
10
1,247 Views
Last Modified: 2013-11-16
HI ,
MY NAME IS JAD AND I AM A STUDENT IN UNVIERSTY IN DUBIA (middel east).
AND ACCRODING TO MANY RULES
THE UNVIERSTY TECHNOLOGY STUFF  BLOCKED ALL WAYS TO CONNECT TO PEER TO PEER SOFTWARES LIKE KAZAA
THROUGH THE ISA FIREWALL AND I TRIED A LOT OF TIMES TO FIND AN ACCESS TO AVOID THIS PROBLEM BUT IN THE END I FAILED SO I HOPE THAT YOU WILL HELP ME PERFECTLY BECAUSE I HAD SEEN THE GREAT EXPERINC OF EXPERTS EXCHANGE STUFF LIKE  ==LRMOOR==.
AND JUST FOR YOUR INFORMATIONS I AM NOT A HACKER THAT I WANT TO BROKEN MY UNVIRESTY RULES  BUT I AM JUST A PERSON HOW INTERSETED TOO MUCH IN NETWORKING AND FIREWALLS
STUFF AND AS EVEY BODY KNOW IF SOMEONE WANT TO BE REAL EXPERT IN COMPUTER SECURITY
AND CREATE A HELPFUL SOLUTIONS IN THIS FIELD THEN ABSOLUTELY HE MUST KNOW HOW THE HACKERS THINKING AND I AM SURE THAT EXPERTS EXCHANGE STUFF UNDERSTAND WHAT I MEAN....
ISN'T LIKE THAT MY FRIEND ==LRMOOR==..............................

FINALLY PLEASE GIVE ME THE FULL SOLUTION FOR THIS PROBLEM........................
0
Comment
Question by:JADOOK
10 Comments
 
LVL 18

Expert Comment

by:JConchie
ID: 10837872
First of all, if you are trying to bypass the security set up on the network to which you have been given access, you are hacking.......and by the user agreement you accepted when you joined EE, no one here is allowed to help you hack.
Your university has a ISA firewall and blocks services like Kazaa for a very good reason.......those services expose them to a ton of viruses, worms, adware and malware.  Stop trying to get around that....if you want to expose your own machine, do so on your own private connection.....not one that will cost someone else a bunch of money to clean up after you open a virus hole on them.
0
 
LVL 5

Accepted Solution

by:
Netminder earned 0 total points
ID: 10839540
JADOOK,

First off, lose the CAPS LOCK key. Upper case type is difficult to read, and further, is considered rude.

Second, as JConchie notes, no one will give you the information you seek, since it involves violating the security of a network. Had you taken the time to read the membership guidelines, to which you agreed when you registered at Experts Exchange, you would know this.

Question closed and points forfeited.

Netminder
Site Admin
0
 

Author Comment

by:JADOOK
ID: 10852778
Hi again MR.Netminder
maybe you're right about Upper case typing.but I do it to read it carfully, And as I expected you and JConchi just answered me by not logically way.
I am really want to be sorry about my way in expression but........
the important thing i wanted to mentionded is the following:
Suppouse my lord you're Attacked from an enemy which use Guns & Bombs as wepones and you have a full experince & knowldge to use same wepones but you'r learn your kids just to attack by sword ,So absolutely you will start to learn your kids how to use the advanced wepons,because it's the time to do it.......
So what i mean that if i asked
you to learn me things (which actually used for very bad Purposes) it's mean that i will used it in bad way And you  know that every body have mind to choise between the goodness & badness.
So if your site will not answred I'm sure and you know also that after day or month or year i will get the answer.
So why you're limited the freedom.........................
this is a last time i will ask you to help me and if you  want to tell me someting bad send it to my E_mail:
*** email address removed by Netminder, Site Admin ***
0
Register Today - IoT Current and Future Threats

Are you prepared to protect your organization from current and future IoT Threats?  Join our Wi-Fi expert in episode three of our webinar series for a look at the current state of Wi-Fi IoT and what may lie ahead. Register for our live webinar on April 20th at 9 am PDT!

 

Author Comment

by:JADOOK
ID: 10864363
Firstly,
          I'm really Appreciate your fathfully for Experts Exchange members and for all programmers.
But in my opinion ,Only the Idiot & folish programmer can let his software hacked or cracked.
like an example I wrote a  program in coding Audio CD's before one year,and I sold it to a company in Dubai (where i living) and belive me until now i didn't found any software through the internet or anywhere have the capability to crack it (make illagely copy) .Also in future when i will create a program the registeration will be only through the internet.So nobody can have full version until he/she download my (128-bit) encrypted patch file.And Absolutely you know that all software companies following the policy (let the Numskulls buy our products & let the hackers crack our products,After that As Soon As possible we will release a new version of our products).
Please my darling don't tell me this is fault analogy,because that's what happend in this days........
Secondly I respect your way in analysis but Actually i put my hotmail account to gain some friends
only.anyway I don't think you will mind if i put my yahoo acount !!!!!!
*** email address removed by Netminder, Site Admin ***
Finally,
about our main case i found some solutions but actually it's not helpful like(http-tunnels)..So
if you changed your mind give me at least some hints and tips ;else please cancel my account  from this generous site???!!!
0
 
LVL 18

Expert Comment

by:JConchie
ID: 10864549
Yea, cancel! cancel!
0
 

Expert Comment

by:da_mankw
ID: 10953317
Um I live in Dubai, and i goto American University in Sharjah.. They have strict rules as so but its not only in the labs or computer rooms on campus, but also in dorms not only that they also block off ports for online game play. And getting an outside dial-up account is not allowed. Well I don understand the anology in that i don really care. if u want Kazaa so much just go to a netcafe with a cd-rw or get an appartment or somthing....

0

Featured Post

Watch Anatomy of a Wi-Fi Hack On-Demand

In less than a weekend, anyone with Internet access and some free time can become a Wi-Fi MitM to wreak havoc on your network. View our Wi-Fi Expert in an on-demand episode of our Secure Wi-Fi mini-series as he explores the motives, execution, and anatomy of a Wi-Fi hack.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question