First off, if this is a business, you should have an internet usage policy forbidding usage of tools to circumvent filtering. This allows you to do some firing of offenders.
Secondly, you need to review your logs to determine what ports/protocols this software uses, then you can use this information to block it.
__________________ ACE v8/SCA v9.3
...still have a v5 install disk in a box somewhere.
First off, if this is a business, you should have an internet usage policy forbidding usage of tools to circumvent filtering. This allows you to do some firing of offenders.
Secondly, you need to review your logs to determine what ports/protocols this software uses, then you can use this information to block it.
__________________ ACE v8/SCA v9.3
...still have a v5 install disk in a box somewhere.