On Tue, 15 Jan 2002, N Cleaver wrote:

> Here's what I have been told about these programs:
> Users looking for a particular song or whatever will connect with Morpheus or
> the like and make a  specific request.  Then Morpheus searches it's database for
> the location of connected users who have the requested song, returns that
> information to the requester, who then can connect to one of the locations and
> download the song.  Also, I have been told that, once one of these programs have
> been installed, that computer automatically becomes part of that file sharing
> database.  THIS MAY NOT BE CORRECT, I'm just beginning to look into the problem
> 
> We know that our networks are being hit hard by this type traffic.  Just using
> an ACL or content filter to block an IP address or URLs doesn't seen to be the
> answer.
> 
> (My preliminary search for technical information about how these programs work,
> ports used, etc. has turned up dry, but I'm still looking.)
> 

I found http://www.oofle.com/iptables/filesharing.htm to be a good 
starting point of what ports and IP addresses are involved. 

Regards,
    Garry.

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to