No matter how many filters you put in place... someone will figure out
how to circumvent them... (A web based napster proxy comes to mind).
Besides, if you block all UDP or create big nasty access lists you're
gonna hinder your users more than control them.
Let HR deal with it... if you want to scan once a day that's cool, but
blocking doesn't work.
Marc Renner wrote:
>
> Is there any reason you can't perform random network scans looking for the napster
>service running? Then repremand those responsible?
>
> I mean in reality you don't want to keep your users "locked down". do you REALLY
>care if they run Napster? No..you want to avoid the tidal wave of lawsuits currently
>pending. To do that you need to show "Due diligence". To show due diligence you need
>to show that you have implemented steps to prevent the use of the unauthorized
>software.
>
> "Yes I have used due diligence in my efforts to prevent the use of Napter here at
>xyz.edu, see here are my logfiles. I scan our network once a day, anyone found using
>Napster has had there network access revoked."
>
> >>> <[EMAIL PROTECTED]> 04/26/00 07:34AM >>>
>
> I dont believe you understood me, as I too am a regular Napster user, but
> the issue here, is as Administrators, we need to keep our users locked down
> and with regards to Napster, its very difficult because ANYONE can host via
> Napigator, therefore you cant use IP addresses to block access, you'll have
> to specifiy the port numbers.
>
> Also, as Napster also lets you specify the ports you use, again it can
> become difficult.
>
> regards
>
> Griff
>
>
> "Thomas Novin"
> <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]>
> Sent by: cc:
> firewalls-owner@List Subject: Re: napster
> s.GNAC.NET
>
>
> 26/04/00 15:23
>
>
>
> ----- Original Message -----
> Sent: Wednesday, April 26, 2000 3:16 PM
> Subject: Re: napster
>
> | Let Napster be...
> |
> | -Mark Whitsett
> |
>
> That's not what this is about. I personally like napster and the napster
> network.
>
> Well, I guess a way to stop napster would be to block the ports
> 4444,5555,6666/6699/7777/8888/6688/6700/8875 and block everything that's on
> www.napigator.com/list.php. Ex. xxx.xxx.xxx.0/24,zzz.zzz.zzz.0/24 etc. And
> then we have the proxy connections which could be eliminated by not
> allowing
> your users to acccess port 1080. Those who still manages to slip through
> are
> worth dooing so and should be left alone :)
>
> Thomas.
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
>
> **********************************************************************
> If you are not the intended recipient of this e-mail and have received it
> in error, you are on notice that the e-mail and any attached files are
> confidential. Please notify us immediately by reply e-mail and then delete
> this message from your system. Please do not use, distribute, copy or
> take any action in reliance on it as to do so could be a breach
> of confidence. The sender does not accept any responsibility for any
> loss, disruption or damage to your data or computer system which may occur
> whilst using data contained in, or transmitted with, this e-mail. Thank
> you for your co-operation. If you need assistance, please contact
> Maritz Ltd - tel.: +44 (0)1628 486011 or e-mail: [EMAIL PROTECTED]
> **********************************************************************
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]