Interesting approach. Keep your eyes on the signatures list - that's one of my projects for the coming week. ________________________________ From: Thomas W Shinder [mailto:tshinder@xxxxxxxxxxx] Sent: Wed 7/27/2005 7:34 AM To: [ISAserver.org Discussion List] Cc: Thomas W Shinder Subject: [isalist] Identifying P2P users using traffic analysis http://www.ISAserver.org Why blocking P2P apps isn't a simple process: Identifying P2P users using traffic analysis: http://www.securityfocus.com/infocus/1843/3 ------------------------------------------------------ List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ ------------------------------------------------------ Visit TechGenix.com for more information about our other sites: http://www.techgenix.com ------------------------------------------------------ You are currently subscribed to this ISAserver.org Discussion List as: jim@xxxxxxxxxxxx To unsubscribe visit http://www.webelists.com/cgi/lyris.pl?enter=isalist Report abuse to listadmin@xxxxxxxxxxxxx All mail to and from this domain is GFI-scanned.