Solved

Blocking Download Applications

Posted on 2006-11-19
2
164 Views
Last Modified: 2013-12-04
Hello,

I have a US Robotics Router that has packet filtering.
I want to block download accelerator applications like DAP and Mass Downloader so that employees don't use these applications. I'm thinking about blocking the ports needed for these applications. What are the ports?

Thanks
0
Comment
Question by:mtiexp
2 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 17975650
That's the rub, the ports are ports you need, namely port 80. The simplest solution is to take admin rights away, if they users don't need to install anything or make system changes, that will solve your issue, they can still download them, however they will likely not be able to install them. This also helps in other ways, they will not be able to get spyware or viri too!
http://richrumble.blogspot.com/2006/08/anti-admin-vs-anti-virus.html
M$ seems to have caught on to best practices about 15 years after everyone else, Linux, Mac, Unix, BSD etc...
http://www.betanews.com/article/Allchin_Suggests_Vista_Wont_Need_Antivirus/1163104965
http://www.eweek.com/article2/0,1759,1891447,00.asp
P2P software is also capable of using port 80 or 443 etc... so they are hard to stop, but easy to detect, we Snort to detect our policy violators: http://snort.org/
http://www.sans.org/resources/policies/
-rich
0
 

Author Comment

by:mtiexp
ID: 17985141
Thanks
probably, I'll make bandwidth management to control this issue. I will install "Mikrotik" OS that can do advanced bandwidth management.
In the future, we have a plan to have Domain Server to control the PCs.
Thanks for the links. A very good information.

Regards,

Mohammed
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now