Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Youtube & Facebook

Posted on 2011-09-08
Medium Priority
Last Modified: 2012-06-27
Hi Guys

Can someome let me know whether there are websites available that allow you to view You Tube & Face Book content etc such that if it would not be detected and blocked by a URL filter?

Essenitially are there itermediate sites that could be used to achieve this and if so, how do i block it?  

Would anonimizers provide this functionality?

Please note that I am not asking how to circumvent security but rather if it is possible and how to prevent users from doing it.


Question by:biggiesmallzz
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Expert Comment

ID: 36505450
LVL 38

Expert Comment

by:Rich Rumble
ID: 36515062
LVL 38

Accepted Solution

BillDL earned 2000 total points
ID: 36515505
Related to this question?:
Issue an "acceptable use" policy for all (or specific) individuals to acknowledge and sign, and include "social networking sites such as Facebook" and "video sharing sites such as YouTube" amongst the activity prohibited during work time. If detected contravening this policy, dump those users into a group that blocks all internet access and if that means they can no longer do their work, then fire them.  Quite simple, although perhaps a "3rd warning and you're out" process might be easier to justify in a tribunal ;-)
Simplify Your Workload with One Tool

How do you combat today’s intelligent hacker while managing multiple domains and platforms? By simplifying your workload with one tool. With Lunarpages hosting through Plesk Onyx, you can:

Automate SSL generation and installation with two clicks
Experience total server control

LVL 46

Expert Comment

ID: 36516182
What kind of network appliances do you have at your disposal?  I think you would need to do some deep packet inspection to see what is coming back.  If the user is using https protocol, that should raise an easy check to see if the site is a proxy or actual site.
LVL 15

Expert Comment

ID: 36516235
We achieved this by white listing the Internet sites people need access to.

We have a quick process for adding new sites based on brief business justification. We don't usually have any problem adding new sites or ports based on need.

Expert Comment

ID: 36516401
As previous responses have said, one option is white-listing.  We use Microsoft ISA proxy and MS reputation services, which blocks sites based on a threat rating and classification.  In our experience, it has worked well to block proxy, social networking and chat sites.
LVL 50

Expert Comment

ID: 36516753
LVL 26

Expert Comment

ID: 36519107

Author Closing Comment

ID: 37246844
Thanks. This was the best approach.

Sorry for the delay in responding. Been out of the country
LVL 38

Expert Comment

ID: 37248512
Thank you Biggie.

Featured Post

Understanding Web Applications

Without even knowing it, most of us are using web applications on a daily basis. Gmail and Yahoo email, Twitter, Facebook, and eBay are used by most of us daily—and they are web applications. We often confuse these web applications tools for websites.  So, what is the difference?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question