Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

proxy setting  require

Posted on 2006-07-17
5
Medium Priority
?
218 Views
Last Modified: 2013-12-04
Proxy setup required by customer is as follows.
Content security: Control access to websites
The software should allow you to selectively block and allow websites on your network.
Restricted words:
Software should allow you to specify restricted words and phrases like: porn, xxx,sex etc. and add them to the restricted words list. Access to any URL or page, that has these words, should automatically be blocked.

The software should also be intelligent enough, not to block or flag educational or medical sites.


List of banned sites:
Software should allow you to add URLs of banned sites. Access to these sites is immediately blocked. Some notorious sites like www.hustler.com, www.playboy.com, etc. do not change their names. Such known sites need to be blocked outright.

Banned IP:
Websites can be accessed by entering the IP (Internet Protocol) number. The software should be able to translate the IP number to its website name and block access if it contains restricted words or is on the banned list.

For e.g. www.sex-circus.com can be accessed through its IP, http://198.63.10.71 when you use other Content Security software. Software's like Web and Mail Filter for Windows are intelligent enough to translate the IP to its URL and block it.

Filter Category:
The software should allow you to create category of filters for block and allow site. Sites related to the category can be listed there. For e.g. Pornography Category will have sites related to porn and all sites for this category are blocked. It should be possible to add or remove sites from block and allow category with a mouse click. Websites under business category should be allowed. Websites under non business category should not be allowed like rediffmail.com,hotmail.com etc.

Control remote file modification Block Spammer's e-mail ID and issue warnings and notifications

0
Comment
Question by:Farooque81
  • 3
3 Comments
 
LVL 12

Accepted Solution

by:
Phil_Agcaoili earned 1000 total points
ID: 17122643
I suggest looking at a gateway solution like Websense or N2H2 that you can place on your network and use as a proxy (as you are requesting) in order for users to get Internet access.

Here's a site with a current and accurate list of content filtering solutions: http://www.timberlinetechnologies.com/products/contentfilt.html

If you are looking to provide filtering on the systems themselves, I suggest looking at CyberPatrol and Cybersitter.

Most, if not all, of these solution protect from banned sites, banned IPs, and provide a range of filtering categories.
0
 
LVL 12

Expert Comment

by:Phil_Agcaoili
ID: 17122662
I forgot to mention that N2H2 is now called Secure Computing SmartFilter.
0
 
LVL 12

Expert Comment

by:Phil_Agcaoili
ID: 17122681
Here's also a nice article on how to evaluate Web filtering technology:
http://www.isoc.org/inet2000/cdproceedings/8k/8k_5.htm
0

Featured Post

Get your problem seen by more experts

Be seen. Boost your question’s priority for more expert views and faster solutions

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension . This reminded me of questions that come up here at EE along the lines of, "How can I tell the type of file from its cont…
Eseutil Hard Recovery is part of exchange tool and ensures Exchange mailbox data recovery when mailbox gets corrupt due to some problem on Exchange server.
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question