Sure is.. all you need to do is to identify the servers and then block
them, and use a large bat on the abusing users to teach them to behave
according to the agreed policy of use (which I assume there is one..)

Taking a look what you get in access.log when the application is used is
a good measure to figure out what it is doing and on what it might be
blocked. Also using tools like log_mime_hdrs helps to some extent as
this shows the user agent used and other headers which may be
interesting for building access controls..

Regards
Henrik

ons 2003-02-12 klockan 11.51 skrev Tesla 13:
> If the connection is to port 443, I don't think so.
> Tesla

-- 
Henrik Nordstrom <[EMAIL PROTECTED]>
MARA Systems AB, Sweden

Reply via email to