InterviewSolution
| 1. |
Solve : Disabling P2P file sharing on the network? |
|
Answer» Hello one possibility would be to block ports used by common P2P programs.Since the OP didn't answer my last questions, yet, you may be playing with serious legal issues.Well, He's already stated to be responsible for the network itself- it would be nice to know what it means to be responsible for the Mac/WIndows operating Systems, but simply owning the network is enough to block all questionable LAN ports. I don't see how this would raise an legal issues, really- it would end up slowing down torrent downloads, but they won't be stopped entirely, and in any case, everybody knows one of the prime reasons for using a P2P program has legal issues in and of itself, which would very likely prevent anybody from pursuing any legal stance they did have with the university.Quote I work on a helpdeskI've never seen any helpdesk person, being a network owner.Quote everybody knows one of the prime reasons for using a P2P program has legal issues in and of itselfIt has to be proved in court in each individual case.Hello Yes, it is because this is an issue I have not dealt with before and is probably above me, that I am posting this message - for assistance. And yes again, it is the policy of the IT department to disconnect users who use P2P programmes on their own private computers. I did not draw up this policy, but it is one of my ROLES to ensure it is put into practice. My apologies for lack of clarity. In addition to some network issues, I am also responsible for dealing with Windows and Mac problems. That's all I was trying to say. Almost all users deny using these P2P programmes, but sometimes Wireshark picks them up and we can tell, too, by the amount of complaints which come in from other users whose connections are intermittent. My original question simply asked if there was a way of picking P2P users up from the cmd prompt on the users' own machines - would they show through tracert, for EXAMPLE, or a similar COMMAND? - because we are in a position to go through, with the users, set up configurations on their computers. I hope this clarifies things. |
|