Hello everyone,

Thanks for all the great inputs – some good points have come up.
As I am a contractor on the job – I could not controle their policies to whats 
legal and whats not – so that issue was out of the question. 
Whit regards to laying down rules on legal torrents or not – these users wasn’t 
super users and if they had to download Redhat – they could download it from 
home – 
This would calculate as bandwidth theft.

The solution I came up whit – even before it was suggested in the group here; 
was to inspect for [Tt][Oo][Rr][Rr][Ee][Nn][Tt] and if this reg expression came 
flowing by, 
I blocked user and server. :-) So … even a search on google for torrent would 
block google for that user. And every request for torrent would be blocked. 
Whit this in mind – users 
Would have to bring the torrent file from home. . . . all in all, bittorrent is 
blocked alarmed and logged. So excessive use would fast result in a fired note. 

:-) problem solved – not pretty but it works. 
 
Med venlig hilsen / Kind regards
Ove Hansen


_____________________________________________
Fra: "Yan Zhai" [mailto:[EMAIL PROTECTED] 
Sendt: 22. marts 2007 20:58
Til: [EMAIL PROTECTED], [email protected]
Emne: Re: Bittorrent - utorrent

If it's not based on protocol interpretation and file type look up, maybe  
it's some technology similar to this paper( "Nabs: A System for Detecting  
Resource Abuses via Characterization of Flow Content Type"  
http://isis.poly.edu/kulesh/research/pubs/acsac-2004.pdf)?

On Thu, 22 Mar 2007 00:57:40 -0400, scott <[EMAIL PROTECTED]>  
wrote:

> Joshua_barnes wrote:We have a way in our system to check the source  
> <server for copyrighted
> <material. This way, Lord of The Rings won't be downloaded, but RedHat  
> <could
> <be. Don't kill bit torrent, it just get's mad....and then even.
>
>
> Would you care to clue us in as to what software,or hardware,this could  
> be?
> Sounds like it could possibly used in other ways as well.No more  
> IPod,Zune,possibly others downloaded across your network,also?
>
> Very intriguing,
>                 Scott
>
> PS: How large is your network,by the way?
>
> ------------------------------------------------------------------------
> Test Your IDS
>
> Is your IDS deployed correctly?
> Find out quickly and easily by testing it with real-world attacks from  
> CORE IMPACT.
> Go to  
> http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
>   
> to learn more.
> ------------------------------------------------------------------------
>



-- 
Yan Zhai
Ph.D.
Cyber-defense Lab
Dept. of Computer Science
North Carolina State University

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
to learn more.
------------------------------------------------------------------------


------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
to learn more.
------------------------------------------------------------------------

Reply via email to