Home Blog Page 8

How to make log file for files being copied to USB

log file for files being copied to USB

Yes )) monitoring the files is the best thing to control them .

I am using that soft to “control” them : USB Detect .


It will help protect your files on your computer and network.

It does this by monitoring all USB drive activity.

When someone plugs any type of USB drive into the computer, the software recognizes this and will add the activity to a log.

It saves the date/time and the username logged into the computer.

When a user copies files to the USB drive, all file activity will be logged also.


Very nice soft ,many option and email notifications etc ,,, . You can try it by installing the demo version .

Good luck ,

Block Skype via GPO

Hi .

Did some post and ways to block it (skype) 🙂
But still not complete one 🙁 .. trying the best 🙂
1) Block IP Addresses to Skype Authentication Servers
Block & This won’t affect people who have already signed up and saved their Skype credentials on their PC. It only works for new users that try to authenticate for the first time. So for new users that first install Skype, it should prevent them from authenticating and thus, they won’t be able to get in. I have not verified this “tip” still works today. It updates all the time and have many new features .. . To test uninstall Skype (to similate a fresh install), block the IPs, then reinstall Skype.

2) Block Skype using ISA Server 2006
If you use ISA Server 2006 proxy server you can block various IM software clients including AOL Instant Messenger, MSN Instant Messenger, Yahoo Instant Messenger, and ICQ. It might also work with Skype as well, but Skype can be tricky to block. Although this awesome ISA Server 2006 article titled “Getting started with Microsoft ISA Server 2006, Part V: Configure HTTP Filter” seems to indicate using ISA Server 2006 to block Skype can be difficult. But it’s a great resource for blocking other IM clients and even .torrent files.

3) Block Skype using Group Policy (corporate environments)
Go to Computer Configuration / Windows Settings / Security Settings – Software Restriction Policies – Additional rules. Then create rules for the hash of the specified .exe to block no matter where it launches from. Problem with this is that Skype updates regularly, so you’d have to keep on it. So alternatively, block a specified directory, i.e. program filesskype and disallow anything from launching from within that directory.

And the way that need to pay …
Alternative methods for blocking Skype

1)NetSpective from Verso Technologies – Can be configured to block over 20 P2P and Instant Messaging programs, including Skype. NetSpective is available in enterprise and carrier versions. Verso has supplied China Telecom with their carrier class of NetSpective.
2)Packeteer’s PacketShaper – detects Skype and other P2P traffic and allows the administrator to apply Quality of Service regulations or block it completely.
3)SonicWall’s Unified Threat Management appliances – SonicWall has a PDF presentation on how to block Skype with their hardware, or you can read the HTML version in the Google cache or on the web site .
4)Fortigate from Fortinet – capable of blocking Skype and other P2P applications.
5)Check Point’s InterSpect – Using InterSpect with Check Point’s SmartDefense system can identify and block P2P applications including Skype.
6)Cisco equipment running IOS version 12.4 (4) T – This is the “free” option, providing that your network already uses a Cisco product with this IOS version. See Cisco Tips & Tricks for the instructions on there site and fenitooo skype:))) .
7) Blocking Skype Using Squid system
8) Blocking Skype Using OpenBSD software.

P.S. Its not he end of the war with skype ….
The last thing is to write the hash rule and he can block it very well 🙂

Good luck ,

CheckPoint Safe@office 500 –The movie– Security


CheckPoint Safe@office 500 –The movie– Security

Hello everyone ,I lately and finally buy a new router system to my home net and I want to share couple of points regarding this fantastic router .

The Good


This router have the most up to data version that updates itself every 60 min !!!This router has an AV function that works great and blocks the viruses and Trojan connections and custom policy’s can be modified to it .This router has an very fast and secure SSL certificate VPN ( L2TP ) connections .

Have an 4 functional firewall rules that can filter the web more clearly , low-basic , mid-filter incoming connections , high-filter all connections ,block all – blocks all the net .

This router got the most powerful SmartDefense tool that can remind us the ww-rt firmware’s that emulate this .This router got an Anti Spam functional build in and its will work great if you have an a mail server in the office but yes its working and set the custom policy’s to use this rule.The router have a n VPN site-to-site connections , for example you got 2 offices and you connect tem on the router level .

This router have an very powerful Web Filtering for any content that are marked like block news sites or blogs .This router have an Dynamic VPN function that need to buy with checkpoint packages .This router have also the function that scans the mail and called Email Antivirus .

Tip:The VPN functions can be setup very easy and very quick . In order to setup a VPN connection you need to go to the management and set the VPN connection with 3 options that you can choose and modify .

The first options is Check Point Remote Clients that uses an GUI interface that installs on the Windows/Mac commuters very easy but the configuration on that GUI is not that easy that it looks in the first time .

The second and the best option I think is to use L2TP connection with a key . The session is  limited to 60 min only and the encryption level is AES-256/SHA1 .