?
Solved

How do you bypass program run restrictions

Posted on 2011-02-28
7
Medium Priority
?
813 Views
Last Modified: 2013-12-07
Hello everyone.
I was wondering if there were any way to bypass software run restrictions. Right now I have vlc portable blocked and i want to know how some of my employees still get the program to run still.
0
Comment
Question by:chriselibama
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 29

Expert Comment

by:Dr. Klahn
ID: 35004065
We need to know how you have the program blocked in order to field theories on how the block is being defeated.
0
 
LVL 49

Expert Comment

by:dbrunton
ID: 35004085
True.  How are you blocking it.


Could they be running it from a USB stick?
0
 
LVL 16

Expert Comment

by:sjklein42
ID: 35004137
Some program blocks can be defeated by simply renaming the executable.
0
Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

 

Author Comment

by:chriselibama
ID: 35007403
hey everyone.
its set through gpo in the software restriction policies.
i know that people have renamed it before and it worked at one time.
we use macaffe DLP to prevent usb devices.
0
 
LVL 29

Expert Comment

by:Dr. Klahn
ID: 35013074
Can you take a screenshot of the block setup and post it here so that we can have a look at it?

It is possible that the block in effect works only for a single version of the program.
0
 

Author Comment

by:chriselibama
ID: 35014441
unfortunately i cant right now as im on the road. But in theory though, do you have any idea how someone would do it?
why would it only block a certain version / how would i t know
0
 
LVL 29

Accepted Solution

by:
Dr. Klahn earned 1000 total points
ID: 35014499
why would it only block a certain version / how would i t know

This goes back to why we need to know specifically how the program is blocked.

One reliable method to match files is by comparing CRC values.  The can be named anything, which defeats file name matching, but if the CRC matches, it's the same file, the same program, and it shouldn't run.  But the downside of this is that while it's very reliable, it matches only one version of the program.

Another method is to look at the file attributes such as the manufacturer, version number, revision key, and authentication authority.  But these can be changed, so again, we need to know how you're blocking the program to speculate on how the block is being defeated.
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Step by step guide to Clean and Sort your windows registry! Introduction: Always remember: A Clean registry = Better performance = Save your invaluable time In this article we're going to clear our registry manually! Yes, manually! The e…
Issue: Unstable cursor in Windows XP and Windows runs extremely slow in that any click will bring up the Hour glass (sometimes for several seconds before giving you what you want) . Troubleshooting Process and the FINAL FIX: This issue see…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question