473,405 Members | 2,187 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,405 software developers and data experts.

Is it possible to block ip addresses?

yoda
291 100+
I was wondering if anyone knew if you could block ip addresses because at my school people hack beyond belief while i try to do work, and the windows firewall is off by default and we can't change any of that. So i was wondering if any knew of freeware software or anything really that help me block ip addresses?

Thanks for your time Yoda :)
Jan 21 '09 #1
17 4591
MindBender77
234 100+
Hey, Yoda,
I hope i'm understanding your question correctly and might I suggest using an anonymous proxy. Some are free on the net and should be ok for temporary use. It really depends on what type of intrusion your experiencing.

HTH,
Bender
Jan 21 '09 #2
yoda
291 100+
well i want to block local IP addresses so with in the LAN at my school. Just so they can't run programs namely hacking programs like psexec and so forth, so if that program connects to my computer from another computer that it will block that program from accessing my computer, and not complete the connection between my computer and theirs.
Jan 21 '09 #3
MindBender77
234 100+
I see. Then you might want to try ZoneAlarm Firewall.

Hope this Helps,
Bender
Jan 21 '09 #4
yoda
291 100+
okay thanks :), i tried looking but haven't tried that software yet, but do you know of any other way? like using the command prompt?

but thank you :) Yoda
Jan 21 '09 #5
Banfa
9,065 Expert Mod 8TB
If you don't actually require network access yourself you could always just unplug the network cable.
Jan 21 '09 #6
yoda
291 100+
True, but i do have to access are network cause logins are on a server and so are are files, so not really an option lol but thanks anyways :)

Yoda
Jan 21 '09 #7
Banfa
9,065 Expert Mod 8TB
another option is netcat you might be able to redirect connections to your computer elsewhere.
Jan 21 '09 #8
yoda
291 100+
please explain netcat :) if you have the time thank you :)

Yoda
Jan 21 '09 #9
yoda
291 100+
Nvm i looked up Netcat and by the looks of it it seems like its only for linux am i wrong??

Yoda :)
Jan 22 '09 #10
Banfa
9,065 Expert Mod 8TB
yes google "netcat for windows"
Jan 22 '09 #11
yoda
291 100+
okay thanks i will :) at the moment i think i'm good, but i'll post back if i have any questions thanks Banfa and MindBender

Yoda :)
Jan 22 '09 #12
DonRayner
489 Expert 256MB
You could always just stick a router between your computer and the local network.
Jan 22 '09 #13
yoda
291 100+
true but i can't because if i do that the teacher will question me why i carry a router around school :P and it probly requires you set it up everytime which i don't have, but good suggetion :)

Yoda
Jan 22 '09 #14
DonRayner
489 Expert 256MB
Ah, then it's not your own computer that you are using, but one that belongs to the school. If they are not enabling the windows firewall then they probally won't allow you to install your own firewall on the computers. You might want to google to see if there are any USB / U3 based personal firewalls available.
Jan 22 '09 #15
yoda
291 100+
yea it belongs to the school, and yes the firewall can't be enabled, and we can install software but the school has deepfreeze which cleans all unwanted software you installed on the computer, okay thanks for the suggestion :) i'll take a look later today thanks :)

Yoda
Jan 22 '09 #16
Studlyami
464 Expert 256MB
If your at a school and you are positive people are hacking the network talk to the school. If you want to help the school fish around for traffic and save the ip/mac addresses for the computers that are sending out the unwanted data and turn that into the school. The school who administers the network could also configure their routers to not pass data off of certain ports. I'm not familiar with computer laws in Canada, but any sort of hacking in an education institution is a very serious offense in the US.
Jan 22 '09 #17
yoda
291 100+
Thats one thing i want to do to, but i want to be able to make sure they can't hack me before i monitor the connections between my computer. The schools admins aren't really up to stuff if you ask me theres always away by getting around what they have set up. And as a matter of fact i'm not familiar with the laws either, but we have a school policy which states no hacking of any sort and so on and so forth, and hackings not really a big deal to our school because usually its for a good reason, like even i hack to make sure some students do there work and not play games.

Yoda
Jan 22 '09 #18

Sign in to post your reply or Sign up for a free account.

Similar topics

8
by: markus | last post by:
This string does not work in php: $sql="UPDATE mytable SET myfield=myuserfunction(myfield)" What I want is my function to evaluate each field and put the new value in the field. For...
0
by: Pieter Linden | last post by:
Okay, the basic plan: 1. Call EnumerateServers to return an array of all the computers on the network. available at: http://datafast.cjb.net/ 2. Resolve the HostNames into IP Addresses....
3
by: Gary | last post by:
I wish to add this to a few sites to make access irksome (rather than impossible of course) for users from certain IP address blocks. There are plenty of ready-made scripts for specific IP...
6
by: jimfortune | last post by:
A long time ago in a company far, far away :-), I set up UPS WorldShip to use an A97 query to provide up-to-date shipping label addresses using a Data Source Name (DSN) created via the ODBC...
165
by: Dieter | last post by:
Hi. In the snippet of code below, I'm trying to understand why when the struct dirent ** namelist is declared with "file" scope, I don't have a problem freeing the allocated memory. But...
3
by: Ben | last post by:
Hello I am in the final stages of developing my asp.net app and have a question. The app im creating has two frames, one being a menu and the other showing the detail. I would like to prevent...
10
blyxx86
by: blyxx86 | last post by:
Alright, I am not the IT guy at my building, and our company's IT guy knows less than me (or so it seems.) We are trying to have more IP addresses available with our network. We do a lot with...
11
by: Smithers | last post by:
Just wondering if the sequence of the case(s) in the switch block might impact performance. Suppose I switch on an int, and I have 4 expected cases. Lets say I expect case 3 to happen 95% of the...
18
by: WaterWalk | last post by:
Hello. Suppose there is an implementation of C++, in which when a class object is allocated, its member functions are also allocated in addition to its data members. So that every class object has...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.