In order to react quickly to website-based cyber threats, WPI employs an automated threat-blocking tool. Governed by WPI's Acceptable Use Policy (AUP), our threat blocking tool may block entire website providers, including some collateral websites that are not infected. In these instances, the ITS Information Security team can investigate and narrow the block to allow access to unaffected sites. If you need to access a blocked website URL, please email that information to its@wpi.edu. It will be investigated, which can take a few days or even longer, depending on the website provider's ability to clean their site.

Please be aware that if you simply use another network to access a blocked site, your machine may get infected, and you could bring it back to WPI and put our campus at risk.

A list of explicitly blocked servers and services appears below. We may block other services if problems arise in the future. If you are having problems with a service that is not on this list contact us.

  • Services blocked from on-campus to the Internet

    • SMTP traffic from servers other than WPI's campus e-mail servers.
    • ICMP Echo Request (ping, tracert)
    • Simple TCP Services: echo, discard, chargen
    • Trivial File Transfer Protocol (TFTP)
    • Microsoft Networking protocols (NetBIOS, WINS, mapping drives, domain logins, etc.)
    • Microsoft SQL Server
    • Universal Plug and Play
    • Napster and its clients
    • Gnutella and its clients e.g. BearShare, Newtella, Limewire, Morpheus, etc.
    • eDonkey and its clones e.g. eMule, Overnet
    • Audio Galaxy
    • Song Spy
    • I-Mesh
    • Cute-MX
    • Scour Exchange
    • KaZaA and KaZaA Lite
    • Hot Line
    • Aimster
    • Swaptor
    • Direct Connect
    • Carracho
    • Soulseek
    • Ares
    • Bit Torrent
    • EarthStation V
    • Share
    • Winny
    • Vonage IP Phone service
    • Filetopia and its clones
    • 100 Bao
    • applejuice
    • Baidu P2P
    • BaiduX
    • Cogaltan
    • eXeem
    • ExoSee
    • ezPeer
    • FileGuri
    • FilePia
    • FlashGet
    • Foldero
    • FreePop
    • Gample
    • Hanafos QBic
    • Hardmoa
    • JJangFile
    • JXTA
    • Kademlia
    • Kontiki
    • KooWo
    • Kor-p2p
    • ManoLito
    • MUTE
    • OFF
    • OneSwarm SSL
    • OpenFT
    • p2pia
    • Pando
    • PDBox
    • PeerEnabler
    • Perfect Dark
    • PP Live
    • Pruna Plus
    • QQ music
    • QQdownload
    • Red Swoosh
    • Secure Content Downloader
    • Share NT
    • Soribada
    • Sunfile
    • SunFolder
    • Thunder
    • WinMX WPNP
    • Xtox
    • ZEPP
  • Services blocked from off-campus to WPI

    You can use the WPI Virtual Private Network (VPN) to access these services from off-campus.

    • SMTP traffic to servers other than WPI's campus e-mail servers
    • ICMP Echo Request (ping, tracert)
    • Simple TCP Services: echo, discard, chargen
    • Trivial File Transfer Protocol (TFTP)
    • Simple Network Management Protocol (SNMP)
    • Microsoft Networking protocols (NetBIOS, WINS, mapping drives, domain logins, etc.)
    • Line Printer Daemon (LPD) printer protocol
    • Microsoft SQL Server
    • Universal Plug and Play
    • Microsoft KMS (Key Management Service) for Vista licensing
    • Remote Desktop Connection (RDP) to Terminal Servers
    • SSH to terminal servers

In order to react quickly to website-based cyber threats, WPI employs an automated threat-blocking tool. Our threat blocking tool may block entire website providers, including some collateral websites that are not infected. In these instances, the ITS Information Security team can investigate and narrow the block to allow access to unaffected sites. If you need to access a blocked website URL, please email that information to its@wpi.edu. It will be investigated, which can take a few days or even longer, depending on the website provider's ability to clean their site.

Please be aware that if you simply use another network to access a blocked site, your machine may get infected, and you could bring it back to WPI and put our campus at risk.

A list of explicitly blocked servers and services appears below. We may block other services if problems arise in the future. If you are having problems with a service that is not on this list contact us.

Services blocked from on-campus to the Internet

SMTP traffic from servers other than WPI's campus e-mail servers

ICMP Echo Request (ping, tracert)

Simple TCP Services: echo, discard, chargen

Trivial File Transfer Protocol (TFTP)

Microsoft Networking protocols (NetBIOS, WINS, mapping drives, domain logins, etc.)

Microsoft SQL Server

Universal Plug and Play

Napster and its clients

Gnutella and its clients e.g. BearShare, Newtella, Limewire, Morpheus, etc

eDonkey and its clones e.g. eMule, Overnet

Audio Galaxy

Song Spy

I-Mesh

Cute-MX

Scour Exchange

KaZaA and KaZaA Lite

Hot Line

Aimster

Swaptor

Direct Connect

Carracho

SoulSeek

Ares

Bit Torrent

EarthStation V

Share

Winny

Vonage IP Phone service

Filetopia and its clones

100 Bao

applejuice

Baidu P2P

BaiduX

Cogaltan

eXeem

ExoSee

ezPeer

FileGuri

FilePia

FlashGet

Foldero

FreePop

Gample

Hanafos QBic

Hardmoa

JJangFile

JXTA

Kademlia

Kontiki

KooWo

Kor-p2p

ManoLito

MUTE

OFF

OneSwarm SSL

OpenFT

p2pia

Pando

PDBox

PeerEnabler

Perfect Dark

PP Live

Pruna Plus

QQ music

QQdownload

Red Swoosh

Secure Content Downloader

Share NT

Soribada

Sunfile

SunFolder

Thunder

WinMX WPNP

Xtoc

ZEPP

Services blocked from off-campus to WPI

You can use the WPI Virtual Private Network (VPN) to access these services from off-campus.

SMTP traffic to servers other than WPI's campus e-mail servers

ICMP Echo Request (ping, tracert)

Simple TCP Services: echo, discard, chargen

Trivial File Transfer Protocol (TFTP)

Simple Network Management Protocol (SNMP)

Microsoft Networking protocols (NetBIOS, WINS, mapping drives, domain logins, etc.)

Line Printer Daemon (LPD) printer protocol

Microsoft SQL Server

Universal Plug and Play

Microsoft KMS (Key Management Service) for Vista licensing