On Tue, 15 Jan 2002, N Cleaver wrote: > Here's what I have been told about these programs: > Users looking for a particular song or whatever will connect with Morpheus or > the like and make a specific request. Then Morpheus searches it's database for > the location of connected users who have the requested song, returns that > information to the requester, who then can connect to one of the locations and > download the song. Also, I have been told that, once one of these programs have > been installed, that computer automatically becomes part of that file sharing > database. THIS MAY NOT BE CORRECT, I'm just beginning to look into the problem > > We know that our networks are being hit hard by this type traffic. Just using > an ACL or content filter to block an IP address or URLs doesn't seen to be the > answer. > > (My preliminary search for technical information about how these programs work, > ports used, etc. has turned up dry, but I'm still looking.) >
I found http://www.oofle.com/iptables/filesharing.htm to be a good starting point of what ports and IP addresses are involved. Regards, Garry. _______________________________________________ Firewalls mailing list [EMAIL PROTECTED] http://lists.gnac.net/mailman/listinfo/firewalls
