Sure is.. all you need to do is to identify the servers and then block them, and use a large bat on the abusing users to teach them to behave according to the agreed policy of use (which I assume there is one..)
Taking a look what you get in access.log when the application is used is a good measure to figure out what it is doing and on what it might be blocked. Also using tools like log_mime_hdrs helps to some extent as this shows the user agent used and other headers which may be interesting for building access controls.. Regards Henrik ons 2003-02-12 klockan 11.51 skrev Tesla 13: > If the connection is to port 443, I don't think so. > Tesla -- Henrik Nordstrom <[EMAIL PROTECTED]> MARA Systems AB, Sweden