Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

How to block it in bluecoat

Posted on 2009-03-30
4
Medium Priority
?
1,844 Views
Last Modified: 2013-11-16
we have blue coat reporter and I need to block by steps please
0
Comment
Question by:haythamqa
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 32

Expert Comment

by:Kamran Arshad
ID: 24036987
Hi,

Would you like to please elaborate your query?
0
 

Author Comment

by:haythamqa
ID: 24037315
Sorry users in our network are getting internet access through blue coat and we need to block ultrasurf application which allow users to access prohibited internet sites using beer to beer access (Random ports).
I need to prevent users from blue coat to use this software. what can i doin blue coat to prevent this.
0
 
LVL 32

Accepted Solution

by:
Kamran Arshad earned 1000 total points
ID: 24037393
0
 

Author Closing Comment

by:haythamqa
ID: 31564706
Blocking SSL intercepts is unsecure
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question