Blocked by school firewall for net browsing?

This answer to my inquiry is probably behind my control... I am a school teacher and have my own own set of macs in my room. Only some of my new macbooks can gain internet access. Of those that can, some only under the administrator account and not the student account. Two of my intel macs can under the student accounts as well. All of my PowerPC ibooks and older G3 iMacs and Powerbook G4 can NOT, whihc happent to be running 10.4 and 10.3. Its hard for me to see the reasons for such differences. All TCIP and proxy setting appear to be ok.
My thought is that the 10.5 machines have the ability to negotiate the absolutely ridiculous draconian firewall set up at my school....I cannot even upload to my iDisk from school, SKYPE etc. THere is no IT guy on campus- he is a 3rd party person who drops by once in a while.
Is there something I can do here like having my macs try to access the internet via a different port that by some long stretch may not be closed? Or is it that I have to work with the flaky never around System Adm.?.... He has not ever heard of iDisk..I am in Venezuela...help.
-todd

Thank you two very much ! I have allowed the local stuff (traffic via lo) and it works.
to skymt :
Thunar connects to a few local daemons (fam and hal, that I know of) using TCP. Your severely restrictive output rules aren't letting it connect. If you ran thunar from a terminal, you'd probably get a better idea of what's going on from the error message.
I did run thunar from a terminal, but it didn't produce any output, it just looped. That is why I didn't know what it wanted to do.
Restricting output like that doesn't do a whole lot of good, anyway. Even if, by some very small chance, your computer became infected, the malware would almost certainly phone home on port 80, for the maximum chance of getting through restrictive firewalls like yours or those at some companies.
Yes you're right, my rules are paranoid ones. I just wanted to build a strong firewall, but it is probably useless. Thanks for your advice.
to byte :
Thank you for confirming the fact that lo traffic is needed.

Similar Messages

  • Payment Block O and P (block for netting ED and FE) ECC6

    Dear Experts,
    There are 2 payment block indicators that are unclear to us how to use them in our business processes:
    1, Payment block O Block for netting ED
    2. Payment block P Block for Netting FE
    Can you please share your experience in what type of business processes you are using these payment blocks and are there also blocking reasons behind these payment block, like we have for payment block R
    Thank you

    Hi Ylee,
                 Three clarifications from my side in response to your process -
    1) Through IMG ---> Material Management ---> Logistics Invoice Verification ---> Incoming Invoice ---> Define Mail to Purchasing When Price Variance Occur, you can be able to set up the message determination so that the related message will be automatically sent to the buyer's inbox as soon as there is any variance between PO price and invoiced amount;
    2) Secondly, it is true that once change is made in the PO, the blocked invoice shall also be released through another transaction MRBR.
    3) You can also technically define the small difference transaction/event key DIF for automatic posting in case of small difference.
    Given your pre-defined process, I would believe that any workflow, once being activated, shall consist of three main steps -
    1) The e-mail notification shall be triggered and sent to buyer as soon as there is any variance;
    2) Once change is made in PO via ME22N transaction, the workflow will be then forwarded to A/P clerk (invoice creator) so as to either run MRBR transaction or manually remove the payment block indicator;
    3) Once this is completed, the e-mail notification will be sent to the buyer (and other related parties, if any) confirming the successful invoice posting.
    Regards
    Sridhar

  • I am using my iPhone 4s personal hotspot as the internet router for my notebook. However, I am gtting the WEB SITE IS BLOCKED BY NETGEAR FIREWALL. I've deleted some other wifi connections I had before, had system restores, clear cahes and cookie. FAILED.

    I am using my iPhone 4s personal hotspot as the internet router for my notebook. However, I am gtting the WEB SITE IS BLOCKED BY NETGEAR FIREWALL. I've deleted some other wifi connections I had before, had system restores, clear caches and cookie. Still, I failed. Whenever I tried to access FACEBOOK, it's still blocked so I still had to use https:// or tl-gp. please help asap.

    Well, aren't you all that and a bag of chips!!!!
    Oh what a relief!  What a RELIEF!  
    That just cleaned up my life.  And Cranky Boy is actually smiling!!!
    Houston, we've got dots AND BARS!!!
    P.S.  All my firware and software are always current.  If I spent as much time looking for a reset button as I spend checking for software updates, I mighta not needed to work at this!!!!
    P.P.S.  Airport Utility shows Cranky Boy's iPad as the Airport Express' Wireless Client!!!   Who knew?
    Thank you so much, m'Lord.  I am in your debt.  What would you have me do?
    Patti in Tucson AZ

  • Opening the firewall for programs you can't access via the dialog?

    I have a server program located in /usr/var/ (cumulus) and I need to open the firewall for it. Because Leopard seems to block access to the / directory how can I add that application to the firewall? I can't seem to browse to it...
    Better question still, how can I browse to / directory in the Finder?
    Thanks all!

    schleppy wrote:
    I have a server program located in /usr/var/ (cumulus) and I need to open the firewall for it. Because Leopard seems to block access to the / directory how can I add that application to the firewall? I can't seem to browse to it...
    Better question still, how can I browse to / directory in the Finder?
    Thanks all!
    You cannot browse these hidden system directories using Finder.
    You need to use the Terminal.
    There are free firewall add-ons for Leopard that give you a better control over the firewall. There are also stand-alone firewall replacements. You can google for them, but be careful when you modify the OS. Be sure it is fully backed up, preferably with a bootable clone, just in case.

  • I tried to download firefox, but the homepage is now all blank except for the browser bar at the top!? Normally the firefox logo would be on the homepage, along with the rest of the homepage designs. Whats wrong?

    When I downloaded firefox, the firefox home page was all blank, except for the browser bar at the top of the page. Normally, the logo would be on the homepage, in the center. Also, the other designs along both sides of the page are missing! What is wrong? I've tried at least 8 times to reload firfox to see if maybe it didn't load properly, but the same blank homepage appears! Can you email me with an answer please!?!? Thanks! Sal Cannone.

    What is the home page?
    *Tools > Options > General > Startup: Home page
    *https://support.mozilla.com/kb/How+to+set+the+home+page
    A possible cause is security software (firewall) that blocks or restricts Firefox or the plugin-container process without informing you, possibly after detecting changes (update) to the Firefox program.
    Remove all rules for Firefox from the permissions list in the firewall and let your firewall ask again for permission to get full unrestricted access to internet for Firefox and the plugin-container process and the updater process.
    See:
    *https://support.mozilla.com/kb/Server+not+found
    *https://support.mozilla.com/kb/Firewalls

  • I can't connect to my school's free wifi. i was able to do it before but not anymore i get the self assign ip agrees message .it has no password only a pop up window before you connect to agree to school terms for wifi use. i don't get that window anymore

    I can't connect to my school's free wifi. i was able to do it before but not anymore i get the self assign ip addrees message .it has no password only a pop up window before you connect to agree to school terms for wifi use. i don't get that window anymore. i tried everything I can think of. It is a 2010 macbook pro but i recentrly updated to osx lion and even with lion it was working fine so I nkow it is not the update. also Im able to connect to other internets at home it works great. starbucks too.  but i became so frustated that i reset my computer to manufactuter setting and reinstall snow leopard on it. still I cant connect. I need help please i have been searching all over the web for help and i see people has been having this same problem for years now.. oh yeah and i know it is not the internet cuz there are other macs connecting to it without a single problem so i think it is an isolated problem plase help....i have follow many advises such as delete the internet from your prefered netwoks. restar your commputer etc etc.

    Be sure Safari does not have the Block Pop-Up Windows preference set.
    Where I work now there are several unencrypted VLANs that require authentication, and Safari promptly pops up a window for me to register every time.

  • How can I block a url from accessing my browser?

    I want to block a url from accessing my browser. The url in question, djbsaqja.co.cc, flashed a pop-up saying that my computer was infected with a dangerous virus and that "Windows Security" required that I download a program to fix it.
    I maintain realtime virus protection, but ran a manual scan anyway, which proved that I was clean.
    The url listed above would not let me out of an unending chain of popups, demanding that I download their tool.
    Instead, I opened a new Firefox session (it was the only way I could re-enter Firefox without this rogue url taking control), then cleared out my history, cache and cookies.
    I'm clean...and now I'm back in control with, I believe, no damage. But since I wrote down the url, is there a way that I can block from accessing my browser again?
    Thanks for the help.

    You can add it to your hosts file - http://allthingsmarked.com/2006/08/28/howto-block-websites-using-the-hosts-file
    Sites like that pop up on a regular basis, but will often get taken down quite quickly. I have just checked and the site appears to have been taken down.

  • Win 8.1 domain workstation. Block all access, except for a fews users/groups and domain controller information/date.

    Hi!
    Win 8.1 pro, domain workstation. How Block all access, except for a fews users/groups and domain controller information/date.
    Nuance:
    From domain AD is locked Workstation Firewall "Domain profile" edit.
    Possible?
    cenubit

    Hi GirtsR,
    I am not sure the command to use the SID to accomplish what you want to achieve, if you only know the SID, you could take use Powershell to find the related information, more information, please check:
    Working with SIDs
    And a similar thread for reference:
    How to find user/group known only SID
    More reference: Default local groups.
    Best regards
    Michael Shao
    TechNet Community Support

  • Hi looking for a bit of free  anti - virus and firewall for osx 10.8.2

    hi looking for a bit of free  anti - virus and firewall for osx 10.8.2 any pointers also any one used Mac cleaner ?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. This feature is transparent to the user, but internally Apple calls it "XProtect." The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore reduces to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    “Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    5. Java on the network (not to be confused with JavaScript, to which it's not related) is a weak point in the security of any operating system. If a Java web plugin is not installed, don't install one unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so can corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. If you don't need to do that, avoid it. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    8. The greatest danger posed by anti-virus software, in my opinion, is its effect on human behavior. When people install such software, which does little or nothing to protect them from emerging threats, they get a false sense of security from it, and then they may do things that make them more vulnerable. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use.

  • Firewall for traffic shaping and bandwidth

    Hi all,
    I want one basic firewall for my small office. I have 15 to 20 users in my office. Please suggest me which firewall suitable for me? Please help me. Thanks

    Hi Sandeep,
    I guess this is mainly for day to day general work activities like browsing etc. You can go with ASA5505 with 50User license. In future if number of users grow, you can upgrade the license as well with no additional hardware costs.
    hth,
    MS

  • Captivate 8 Continually Crashes: When trying to publish, When trying to use the Object Style Manager. Also it is blocked by Windows Firewall (adobecaptivatews) every time it launches. Working with Captivate App Packager the pane to import from Adobe Edge

    Captivate 8 Continually Crashes: When trying to publish, When trying to use the Object Style Manager. Also it is blocked by Windows Firewall (adobecaptivatews) every time it launches. Working with Captivate App Packager the pane to import from Adobe Edge is missing, so not clear how to import. Overall it seems unstable. Am I doing something wrong? Trying to evaluate before buying so working on a trial version (14 days left), but a bit concerned with Captivate 8 Performance. Please help! :-

    Hi Vikram and Lilybiri,
    Thanks for your responses :-)
    I'm working on Windows 8.1... I think that I may have found the issue... I was saving the file in a project directory rather than the default My Captivate Projects folder...
    Perhaps Captivate was struggling to find resources it needed?
    It hasn't crashed for a while now, though it is struggling - I'm working with a 54 slide PPT presentation that is linked and it takes a very long time to interact.
    Sometimes it says that I've removed slides, which I haven't?
    Best,
    Christy.

  • Configuring Mac OS X Firewall for iChat

    I understand that one must configure the firewall in Mac OS X Tiger before using iChat. It is a mystery to me that Apple does not provide a pre-configured Firewall rule for iChat AV that the user can easily just turn on or off. (Apple does have a pre-configured rule for iChat Bonjour).
    There is a How-To article on Apple's web site (see http://docs.info.apple.com/article.html?artnum=93208 ) but this article appears to be out of date. The article tells you to open up certain ports but it does not tell you whether the ports are TCP or UDP.
    From what I am been able to figure out, one needs to open up the following ports in the Mac OS X Firewall for iChat to work:
    TCP Ports -- 5190, 5297, 5298
    UDP Ports -- 5060, 5190, 5676, 16384-16403
    Is this correct? Do I need to open up these ports in the Mac OS X Tiger Firewall before I can get iChat AV to work?
    (I prefer not to open uo any unnecessary ports).
    RobK

    By default the Mac OS X firewall doesn't block UDP traffic. So unless you have clicked on the "Advanced" button in your firewall settings and told the firewall to block UDP you don't need to bother with the UDP ports (and indeed, including them in your firewall rule they wont even be used).
    There is absolutely no need whatsoever to open up TCP ports 5222 or 5223.
    While ports 5222 and 5223 are used by XMPP/Jabber SERVERS iChat doesn't receive inbound connections on those ports. iChat will make an outbound connection on a random high port (mine's currently using port 54804 to connect to Google Talk on port 5223) and there's no need for a firewall rule for these (and it's impossible to predict what port iChat will use anyway).
    Port 5190 (TCP) is used for AIM server connection. Just like above iChat will use a random high port to connect to the AIM server on this port so this does not need to be opened.
    Port 5190 (UDP) is used for AIM file transfers i believe. It may be that iChat also uses it for XMPP/Jabber and Bonjour file transfers too (though i suspect not since the Bonjour firewall rule doesn't open up this port). If you haven't blocked UDP traffic you wont need to open this port.
    Port 5220. As far as i know this port has nothing to do with XMPP/Jabber. The only thing i can think of is that perhaps iChat uses it as a custom file transfer port (though since Bonjour is just serverless XMPP/Jabber and this port isn't opened the Bonjour rule i suspect not). There is probably no need to open this port.
    Port 5298. I believe this is used for message exchange via Bonjour. If you're not planning on using Bonjour you shouldn't need to open it.
    Anyway, after this long rambling post the conclusion is:
    So long as you haven't blocked UDP traffic in the Advanced section of your Mac OS X firewall you shouldn't need to open up any ports for iChat to work (on your Mac anyway. Gateway/router is another story).
    If you have blocked UDP you will need to open the following:
    UDP: 5060, 5190, 5297, 5298, 5353, 5678, 16384-16403
    No TCP ports should need to be opened.
    Forwarding the above UDP ports to your machine on your gateway or router should enable things to work perfectly.

  • Firewall for iPodTouch

    Hi
    I am not sure if this is the right place to post this question. I want to develop an application that can block the internet access (drop the tcp packets) in an ipod touch. If it was a mac - i would use the IPFW driver. Can i do the same with an iPod touch ? Are there any alternatives ?
    Or atleast is it possible to develop a firewall from scratch for the iPodTouch os ?
    Many Thanks
    Hazem

    Hello Ibrahim,
    Its common sense, a server farm got to be carefully placed into your network.
    You will have the most important information on your company on those serves, why would not you have a firewall for them, would be the right question?
    Each single network has a lot of vulnerabilities, we as security engineers are in charge of reducing the amount of vulnerabilities so people on the outside of our network cannot compromise our servers.
    And that is the whole point of a firewall, reduce the possibility of an attack to our servers.
    Hope this helps.
    Julio
    Security Engineer
    Do rate all the helpful posts!!!

  • Every time I launch the browser the popup blocker option is unchecked. Why does the pop up blocker keep getting unchecked every time browser is launched?

    Every time I launch the browser the popup blocker option is unchecked. Why does the pop up blocker keep getting unchecked every time browser is launched?

    Your above posted system details show outdated plugin(s) with known security and stability risks.
    *Java Plug-in 1.6.0_05 for Netscape Navigator (DLL Helper)
    Update the [[Java]] plugin to the latest version.
    *http://java.sun.com/javase/downloads/index.jsp (Java Platform: Download JRE)

  • Why won't safari let me open my school website in its browser?

    why won't safari let me open my school website in its browser?

    I can access it fine with the iMac in my profile running Safari 5.0.5
    What OS versions is on your Mac and what version of Safari are you running.
    NOTE: "iOS" is not a computer operating system. It;s for Phone Pads, adn Pods. Your COMPUTER IS is probably 10.something, available from :Aboutt hsi Mac':

Maybe you are looking for

  • F-04 Post with clearing - Document Splitting issue

    Hi Guru, In the system I have implemented the document splitting by Profit Centre and Segment. I'm trying to post an Incoming Payment (Tcode F-04) with clearing related to two customer. During the invoices I inserted two different Profit Centre by cu

  • Recording 2 inputs at the same time in LE8

    I am using Logic Express 8 on snow leopard and a digidesign Mbox pro 2. I am trying to record my cello through two different inputs on the box, one of them a direct line from an FX pedal im running my cello pickup into, the other an audiotechnica AT2

  • Picture "slides" and keeps scrolling after I stop

    When I use the touch pad and I scroll something on-line, the picture stops as it should. After a couple of seconds the screen moves a bit as if I am scrolling some more, then moves again, then sometimes again! What the...? Any ideas? Thanks, Mike

  • How to install client certificate in Jdeveloper 10.1.3.41.57

    Hi, We need to connect to another website by presenting client certificate. This certifficate is provided by this website and password is required. Though I tried to tried to launch the JSP that redirects the page to the URL to connec to that website

  • TS50000058 and UWL

    When I execute the task TS50000058, (Process Change Request (R/3))- based on BUS7051.EDITASYNCHRONOUS, from the UWL, the transaction IQS22 is called.  The problem is that the "Action Box" doesn't show up when the notification is displayed??  Also, Is