Solved

Blocking Download Applications

Posted on 2006-11-19
2
165 Views
Last Modified: 2013-12-04
Hello,

I have a US Robotics Router that has packet filtering.
I want to block download accelerator applications like DAP and Mass Downloader so that employees don't use these applications. I'm thinking about blocking the ports needed for these applications. What are the ports?

Thanks
0
Comment
Question by:mtiexp
2 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 17975650
That's the rub, the ports are ports you need, namely port 80. The simplest solution is to take admin rights away, if they users don't need to install anything or make system changes, that will solve your issue, they can still download them, however they will likely not be able to install them. This also helps in other ways, they will not be able to get spyware or viri too!
http://richrumble.blogspot.com/2006/08/anti-admin-vs-anti-virus.html
M$ seems to have caught on to best practices about 15 years after everyone else, Linux, Mac, Unix, BSD etc...
http://www.betanews.com/article/Allchin_Suggests_Vista_Wont_Need_Antivirus/1163104965
http://www.eweek.com/article2/0,1759,1891447,00.asp
P2P software is also capable of using port 80 or 443 etc... so they are hard to stop, but easy to detect, we Snort to detect our policy violators: http://snort.org/
http://www.sans.org/resources/policies/
-rich
0
 

Author Comment

by:mtiexp
ID: 17985141
Thanks
probably, I'll make bandwidth management to control this issue. I will install "Mikrotik" OS that can do advanced bandwidth management.
In the future, we have a plan to have Domain Server to control the PCs.
Thanks for the links. A very good information.

Regards,

Mohammed
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now