• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1253
  • Last Modified:

HOW I CAN RUN PEER TO PEER SOFTWARES LIKE (KAZAA) INSPITE OF ISA FIREWALL BLOCKED IT'S PORTS.

HI ,
MY NAME IS JAD AND I AM A STUDENT IN UNVIERSTY IN DUBIA (middel east).
AND ACCRODING TO MANY RULES
THE UNVIERSTY TECHNOLOGY STUFF  BLOCKED ALL WAYS TO CONNECT TO PEER TO PEER SOFTWARES LIKE KAZAA
THROUGH THE ISA FIREWALL AND I TRIED A LOT OF TIMES TO FIND AN ACCESS TO AVOID THIS PROBLEM BUT IN THE END I FAILED SO I HOPE THAT YOU WILL HELP ME PERFECTLY BECAUSE I HAD SEEN THE GREAT EXPERINC OF EXPERTS EXCHANGE STUFF LIKE  ==LRMOOR==.
AND JUST FOR YOUR INFORMATIONS I AM NOT A HACKER THAT I WANT TO BROKEN MY UNVIRESTY RULES  BUT I AM JUST A PERSON HOW INTERSETED TOO MUCH IN NETWORKING AND FIREWALLS
STUFF AND AS EVEY BODY KNOW IF SOMEONE WANT TO BE REAL EXPERT IN COMPUTER SECURITY
AND CREATE A HELPFUL SOLUTIONS IN THIS FIELD THEN ABSOLUTELY HE MUST KNOW HOW THE HACKERS THINKING AND I AM SURE THAT EXPERTS EXCHANGE STUFF UNDERSTAND WHAT I MEAN....
ISN'T LIKE THAT MY FRIEND ==LRMOOR==..............................

FINALLY PLEASE GIVE ME THE FULL SOLUTION FOR THIS PROBLEM........................
0
JADOOK
Asked:
JADOOK
1 Solution
 
JConchieCommented:
First of all, if you are trying to bypass the security set up on the network to which you have been given access, you are hacking.......and by the user agreement you accepted when you joined EE, no one here is allowed to help you hack.
Your university has a ISA firewall and blocks services like Kazaa for a very good reason.......those services expose them to a ton of viruses, worms, adware and malware.  Stop trying to get around that....if you want to expose your own machine, do so on your own private connection.....not one that will cost someone else a bunch of money to clean up after you open a virus hole on them.
0
 
NetminderCommented:
JADOOK,

First off, lose the CAPS LOCK key. Upper case type is difficult to read, and further, is considered rude.

Second, as JConchie notes, no one will give you the information you seek, since it involves violating the security of a network. Had you taken the time to read the membership guidelines, to which you agreed when you registered at Experts Exchange, you would know this.

Question closed and points forfeited.

Netminder
Site Admin
0
 
JADOOKAuthor Commented:
Hi again MR.Netminder
maybe you're right about Upper case typing.but I do it to read it carfully, And as I expected you and JConchi just answered me by not logically way.
I am really want to be sorry about my way in expression but........
the important thing i wanted to mentionded is the following:
Suppouse my lord you're Attacked from an enemy which use Guns & Bombs as wepones and you have a full experince & knowldge to use same wepones but you'r learn your kids just to attack by sword ,So absolutely you will start to learn your kids how to use the advanced wepons,because it's the time to do it.......
So what i mean that if i asked
you to learn me things (which actually used for very bad Purposes) it's mean that i will used it in bad way And you  know that every body have mind to choise between the goodness & badness.
So if your site will not answred I'm sure and you know also that after day or month or year i will get the answer.
So why you're limited the freedom.........................
this is a last time i will ask you to help me and if you  want to tell me someting bad send it to my E_mail:
*** email address removed by Netminder, Site Admin ***
0
The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

 
JADOOKAuthor Commented:
Firstly,
          I'm really Appreciate your fathfully for Experts Exchange members and for all programmers.
But in my opinion ,Only the Idiot & folish programmer can let his software hacked or cracked.
like an example I wrote a  program in coding Audio CD's before one year,and I sold it to a company in Dubai (where i living) and belive me until now i didn't found any software through the internet or anywhere have the capability to crack it (make illagely copy) .Also in future when i will create a program the registeration will be only through the internet.So nobody can have full version until he/she download my (128-bit) encrypted patch file.And Absolutely you know that all software companies following the policy (let the Numskulls buy our products & let the hackers crack our products,After that As Soon As possible we will release a new version of our products).
Please my darling don't tell me this is fault analogy,because that's what happend in this days........
Secondly I respect your way in analysis but Actually i put my hotmail account to gain some friends
only.anyway I don't think you will mind if i put my yahoo acount !!!!!!
*** email address removed by Netminder, Site Admin ***
Finally,
about our main case i found some solutions but actually it's not helpful like(http-tunnels)..So
if you changed your mind give me at least some hints and tips ;else please cancel my account  from this generous site???!!!
0
 
JConchieCommented:
Yea, cancel! cancel!
0
 
da_mankwCommented:
Um I live in Dubai, and i goto American University in Sharjah.. They have strict rules as so but its not only in the labs or computer rooms on campus, but also in dorms not only that they also block off ports for online game play. And getting an outside dial-up account is not allowed. Well I don understand the anology in that i don really care. if u want Kazaa so much just go to a netcafe with a cd-rw or get an appartment or somthing....

0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now