Solved

How do you bypass program run restrictions

Posted on 2011-02-28
7
805 Views
Last Modified: 2013-12-07
Hello everyone.
I was wondering if there were any way to bypass software run restrictions. Right now I have vlc portable blocked and i want to know how some of my employees still get the program to run still.
0
Comment
Question by:chriselibama
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 28

Expert Comment

by:Dr. Klahn
ID: 35004065
We need to know how you have the program blocked in order to field theories on how the block is being defeated.
0
 
LVL 49

Expert Comment

by:dbrunton
ID: 35004085
True.  How are you blocking it.


Could they be running it from a USB stick?
0
 
LVL 16

Expert Comment

by:sjklein42
ID: 35004137
Some program blocks can be defeated by simply renaming the executable.
0
NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

 

Author Comment

by:chriselibama
ID: 35007403
hey everyone.
its set through gpo in the software restriction policies.
i know that people have renamed it before and it worked at one time.
we use macaffe DLP to prevent usb devices.
0
 
LVL 28

Expert Comment

by:Dr. Klahn
ID: 35013074
Can you take a screenshot of the block setup and post it here so that we can have a look at it?

It is possible that the block in effect works only for a single version of the program.
0
 

Author Comment

by:chriselibama
ID: 35014441
unfortunately i cant right now as im on the road. But in theory though, do you have any idea how someone would do it?
why would it only block a certain version / how would i t know
0
 
LVL 28

Accepted Solution

by:
Dr. Klahn earned 250 total points
ID: 35014499
why would it only block a certain version / how would i t know

This goes back to why we need to know specifically how the program is blocked.

One reliable method to match files is by comparing CRC values.  The can be named anything, which defeats file name matching, but if the CRC matches, it's the same file, the same program, and it shouldn't run.  But the downside of this is that while it's very reliable, it matches only one version of the program.

Another method is to look at the file attributes such as the manufacturer, version number, revision key, and authentication authority.  But these can be changed, so again, we need to know how you're blocking the program to speculate on how the block is being defeated.
0

Featured Post

Get HTML5 Certified

Want to be a web developer? You'll need to know HTML. Prepare for HTML5 certification by enrolling in July's Course of the Month! It's free for Premium Members, Team Accounts, and Qualified Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Issue: Unstable cursor in Windows XP and Windows runs extremely slow in that any click will bring up the Hour glass (sometimes for several seconds before giving you what you want) . Troubleshooting Process and the FINAL FIX: This issue see…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question