Protection and restriction to the internet



Similar documents
1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy

22nd May 2008 GENEVA. THE NATIONAL COST OF VoIP BYPASS

Voice over IP (VoIP)

How To Control Your Computer With Watchguard Application Control

INTERNET USAGE GUIDE Revised 06/05/2014

Full version is >>> HERE <<<

AscenFlow - P2P Solution

More information >>> HERE <<<

Safe internet: Getting Started Guide

Safe internet for business use: Getting Started Guide

Supported Anti Virus from ESAP 2-6-1

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

From ISP/ICP Business Models to Internet Economics. Dah Ming Chiu Chinese University of Hong Kong

Architecture de Réseaux et Dimensionnement du Trafic

æ æœ 語 English Deutsch Español Franà ais Italiano Polski æ æœ 語 æ± è - OS Windows OS Windows OS Mac App Manager ã ムã ンãƒ-ームã ã OS Windows

Full version is >>> HERE <<<

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

Managing Ports and System Services using BT NetProtect Plus firewall

List of Common TCP/IP port numbers

User's voice. Safe Eyes. User 1: I was surprised how the tool was easy to install and configure. Comprehensibility:

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)

Verizon Family Protection Powered by McAfee. User Guide

Products supported by ESAP FIREWALL PRODUCTS: Product Name. AOL Firewall (1.x) AOL Privacy Wall (2.x) AVG 8.0 [Firewall] (8.

Global Endpoint Security Market

Global Security Software Market

Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or

Kerio Control. User Guide. Kerio Technologies

Fully supported Antivirus software (Managed Antivirus)

Additional details >>> HERE <<<

Products supported by ESAP FIREWALL PRODUCTS:

What is Outlook.com and how can I use it?

Unit 4 Evaluating Web Mail Services

Special Applications - Port List. Special Application Port List

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

Access h15. Access h10. Access h14. Access 2007 (UK) 58 4h42. ACDSee h35. Acrobat Pro Extended h36

ESAP Release Notes

Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services

How To Secure Your From Being Hacked On A Pc Or Mac Or Ipad (For Free) For A Long Time (For A Long Period Of Time) For Free (For Commercial) For Your Money (For Business) For The Long Term

State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center

Assuring Your Business Continuity

How To Use The Dfl-M510 On A Network With A Dfl51 On A Pc Or Mac Or Ipa (Dfl) On A Pnet 2 (Dlf51) On An Ipa 2 (Net 2) On

Henry Ford Health System Remote Access Support Details

A Brief History of the Internet. Chris Brooks Computing, Python, and Robots

Welcome to the UVU IT Help Desk

Full version is >>> HERE <<<

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

Products supported by ESAP FIREWALL PRODUCTS:

BRING YOUR WORLD TOGETHER FEEL THE MUSIC EVERYWHERE - IP MULTIROOM AUDIO A NEW DIMENSION OF HOME ENTERTAINMENT

List of Products supported by ESAP 2.2.1

Equipment Needed. Connecting to the Internet

Smart Radio Monitor (SRM) Mobile Raw Data Format

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Protecting a Corporate Network with ViPNet. Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009

P2P Traffic Manager. L7 Internet Security. IP Appliance Products

Three short case studies

Owner of the content within this article is Written by Marc Grote

USER MANUAL OPTENET WEB FILTER PC Version 9.8

Tunnels and Redirectors

Cyber Essentials PLUS. Common Test Specification

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

TCP/UDP # General Name Short Description

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Host Checker Security software requirements

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Lab Developing ACLs to Implement Firewall Rule Sets

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Figure 41-1 IP Filter Rules

Enterprise K12 Network Security Policy

Quality of Service (QoS)

Distributed Systems. 2. Application Layer

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012

Internet Traffic and Content Consolidation

Configuring Your Gateman Proxy Server

A Study of Technology in Firewall System

Instant Messaging Service Reference

Transcription:

Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours (Weekdays: 8:30am to 5pm) which: o o o may potentially pose security hazards result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am 9:30pm) or you may access via the wireless@ucti or wireless@apu network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to network@apu.edu.my from your university email with the following details: Restricted website/application that proposed to be unblocked Justification/reason for the website/application to be unblocked Thank you. Technology Services, Manager Asia Pacific University (APU) Technology Park Malaysia Bukit Jalil, Kuala Lumpur 57000 Malaysia Tel: +60 3 8992 5050

Restricted websites/applications Category Application Bypass Proxies and Tunnels Wujie/UltraSurf Battle.net Beanfun Game Call of Duty 4 Cga.com Chinagame CS Game Diablo GameTea/GameABC Hangame Legend Lineage MapleStory Nobol Our Game PK Game Pogo PopKart POPO Game QQ Farm QQ Game Realgame Sina Web Game Sohugame TEN Game Valve Steam Wolfenstein WOW Game Xbox LIVE 9158 Alicall BaiduHi Caihong Camfrog Dii ECP Etnano

Fetion Gadu-Gadu Google Talk Heyyo ICQ/AIM/iIM Imi IMVU Instan-t IPMSG IRC ISPQ Jctrans Kltx Kubao Lava-Lava Message Send Protocol MySpaceIM Netcall PaltalkScene PiIM POPO Qeshow QQ/TM Rediff BOL RenRen SOQ TELTEL Tlen UcTalk Userplane WinpopupX Wlt Xfire Yahoo Messenger Yoics AOL Mail Comcast COX

Network Protocols(2) Network Protocols(3) Excite Fastmail Gmx Mail Hushmail IlohaMail IMAP4 InfoSeek Mail Livedoor Mail.com Mail.ru MS Exchange Server NETEASE Mail NNTP Open Mail Optimum POP3 Roundcubemail Secureserver Sina Mail SMTP SquirrelMail Usermin Mail Yandex Service Status update (Sterling Software) Appletalk Update-Based Routing Pro. 100bao amule Anatomic ApexDC++ Ares Azureus BCDC++ Bearshare BitAnarch BitLord BitTorrent Series BT++ Btbbt Cabos CFos Speed

ClubBox DAAP Deepnet Explorer DianLei DirectConnect edonkey Series emule emule MorphXT emule Plus emulebt FastTrack FilePipe FileScope Foxy FreeWire G3 Torrent GNUnet Gnutella GoGoBox GreedBT Hydranode Kazaa Kazaa Lite Tools K++ Kceasy Lphant Maze MlDonkey MooPolice Morpheus mymusic MyNapster NEoNapster Pando Phex Poco PP365 PTC QQDownload RevConnect Rufus

SababaDC Share Shareaza Shareaza Plus Soulseek Thunder Series Torrentflux TorrentStorm TorrentTopia TrustyFiles Turbo Torrent TurboBT utorrent Vagaa Vuze Winny XBT Client XNap Yet ABC Zultrax Beinsync Danware Fastviewer GoToMyPC IBM Remote monitoring and Control MS Remote Desktop Protocol (RDP) Netviewer PCAnywhere Radmin Remote Secure Shell (SSH) Synergy Techinline Telnet VNC X11 Adobe Apple Avast AVG Avira

Social Network Duba Emsisoft F-Secure InstallAnyWhere Jiangmin Kaspersky Mcafee Mircosoft Windows Update NOD32 Norton Outpost Panda PCTools Sophos Spybot TrendMicro Yum Facebook Game 3TV 56.com ASF ASFV1 AVI Babelgum BARKS BBC-iplayer CNTV Cradio CSlive.tv Dailymotion FLV Freecast FreeeTV Funshion GVOD GYAO GysofTV Hulu ITVSky Justin.tv Ku6

KuGo TV LastFM Letv Live365 Livestation Meabox Metacafe Miro MMS MoodAmp Mop MOV MoveNetworks MP3 mp4 MPD Napster Netflix Netpd.org NicoNicoDouga Ooyala Orb Pandora Photobucket Player365 PPfilm PPStream PPVod QQLive QuickTime Qyule RealPlayer RMVB Rtlgemist SeeTV Shoutcast SinaTV SiriusXM Sohu TV SopCast Spotify

Voice over IP Web / Web 2.0 Web / Web 2.0 Web IM SqueezeCenter Stickam Streamaudio SWF Thunderkankan TTlive Tudou TudouVa TVUPlayer Uitzendinggemist Ustream.tv UUSee Vakaka X-TV Veetle VeohTV Vizrt System VLC Winamp Windows Media Player WMA WMV XiaoTV Yahoo Douga Youku Youtube Skype Evernote Google-earth Yahoo Web Messenger