Solved

Blocking Download Applications

Posted on 2006-11-19
2
166 Views
Last Modified: 2013-12-04
Hello,

I have a US Robotics Router that has packet filtering.
I want to block download accelerator applications like DAP and Mass Downloader so that employees don't use these applications. I'm thinking about blocking the ports needed for these applications. What are the ports?

Thanks
0
Comment
Question by:mtiexp
2 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 17975650
That's the rub, the ports are ports you need, namely port 80. The simplest solution is to take admin rights away, if they users don't need to install anything or make system changes, that will solve your issue, they can still download them, however they will likely not be able to install them. This also helps in other ways, they will not be able to get spyware or viri too!
http://richrumble.blogspot.com/2006/08/anti-admin-vs-anti-virus.html
M$ seems to have caught on to best practices about 15 years after everyone else, Linux, Mac, Unix, BSD etc...
http://www.betanews.com/article/Allchin_Suggests_Vista_Wont_Need_Antivirus/1163104965
http://www.eweek.com/article2/0,1759,1891447,00.asp
P2P software is also capable of using port 80 or 443 etc... so they are hard to stop, but easy to detect, we Snort to detect our policy violators: http://snort.org/
http://www.sans.org/resources/policies/
-rich
0
 

Author Comment

by:mtiexp
ID: 17985141
Thanks
probably, I'll make bandwidth management to control this issue. I will install "Mikrotik" OS that can do advanced bandwidth management.
In the future, we have a plan to have Domain Server to control the PCs.
Thanks for the links. A very good information.

Regards,

Mohammed
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question