Stopping Invisible Chat

Current threats
human factors
I work for a school district and one of the hottest items for the kids to sneak onto our servers is a tool called Inviible Chat. I tried to google an answer as to how to block off this thing, since it poses a problem as far as the obvious implications of cheating and/or not paying attention in class. "Kids will be kids", I know, but the school guidelines prohibit chat/im programs and this one needs to be no exception to that rule. All of my google searches have only led me to download sites for this program and NOT to an answer as to how to stop its use. Any help would be appreciated.

Answer Wiki

Thanks. We'll let you know when a new response is added.

What kind of environment are you running? If its windows, a quick and dirty temporary solution would be to write a batch file to find and delete the executable. Schedule the task to run every few minutes on the server.

You might also be able to block execution of the program using server side antivirus software. We use Mcafee and it has an “Unwanted Programs” section that allows you to define programs to check for.


Discuss This Question: 4  Replies

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.
  • GeekDaddy665
    The environment is Windows Enterprise Server and all Windows network (Win 2k & Xp clients). Sorry I forgot to mention that.
    0 pointsBadges:
  • Ghigbee
    If you are running group policy you can use software restrictions to block the programs. Here is a link to a microsoft article about doing it.
    0 pointsBadges:
  • Dnlhaller
    You may need to install the program to find out what port is uses. Once you know what port is uses, you can block it.
    0 pointsBadges:
  • Tsmooth
    I also have to deal with users trying to run P2P programs or IM applications on my network all the time. Other than running anti-virus software or spyware applications on each system, I would recommned deploying an IPS appliance on the network in a few places to anaylze the traffic that traverses the network. I have a few these on my network and they catch P2P traffic all the time, in addition to providing information on the source and destination address, hostname, ports, etc.
    0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.


Share this item with your network: