[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [FW1] Blocking Access
Luckily I have remote ADMIN access to all my machines. I have a batch file I run every so often that looks for these programs. I get a report of them and remotely uninstall them. Another option is to use something like Zenworks or SMS. Figure out where the registry keys are created for these type of programs and kill them. Kill the .EXE's also... Works here.. -----Original Message----- From: [email protected] [mailto:[email protected]]On Behalf Of [email protected] Sent: Thursday, October 12, 2000 9:12 AM To: [email protected]; [email protected] Cc: [email protected] Subject: RE: [FW1] Blocking Access You can block Gnutella if you only permit proxy based services (security servers) and possibly inspect based services through your firewall. If you allow connections based only on a tcp port you have lost. If you dont have an internal dns server, then have a look at the sp2 release notes for setting up inspect based dns (not only looking at the ports). However it's possible to tunnell gnutella connections through an http tunnell or other allowed protocol. Lars -----Original Message----- From: [email protected] [mailto:[email protected]] Sent: 10. oktober 2000 18:26 To: [email protected] Cc: [email protected] Subject: RE: [FW1] Blocking Access You will never block Gnutella traffic. Dynamic ports and peer to peer communication. Look on phoneboy to block napster. Thomas Poole -----Original Message----- From: Doug Schmidt [mailto:[email protected]] Sent: Tuesday, October 10, 2000 11:23 AM To: '[email protected]' Subject: [FW1] Blocking Access Hi~ Upper management wants me to block all Napster and Gnutella traffic at the firewall. I have found how to block access for napster, but what about gnutella? Any help would be great. ~Doug ============================================================================ ==== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ============================================================================ ==== ============================================================================ ==== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ============================================================================ ==== ============================================================================ ==== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ============================================================================ ==== http://www.primeinc.com ********************************************************************** This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please reply to the sender of the message. The views expressed in this correspondence may not reflect the views of Prime, Inc. This footnote also confirms that this email message has been scanned for the presence of computer viruses. *********************************************************************** ================================================================================ To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ================================================================================
|