In order to react quickly to website-based cyber threats, WPI employs an automated threat-blocking tool. Governed by WPI's Acceptable Use Policy (AUP), our threat blocking tool may block entire website providers, including some collateral websites that are not infected. In these instances, the ITS Information Security team can investigate and narrow the block to allow access to unaffected sites. If you need to access a blocked website URL, please email that information to its@wpi.edu. It will be investigated, which can take a few days or even longer, depending on the website provider's ability to clean their site.
Please be aware that if you simply use another network to access a blocked site, your machine may get infected, and you could bring it back to WPI and put our campus at risk.
A list of explicitly blocked servers and services appears below. We may block other services if problems arise in the future. If you are having problems with a service that is not on this list contact us.
-
Services blocked from on-campus to the Internet
- SMTP traffic from servers other than WPI's campus e-mail servers.
- ICMP Echo Request (ping, tracert)
- Simple TCP Services: echo, discard, chargen
- Trivial File Transfer Protocol (TFTP)
- Microsoft Networking protocols (NetBIOS, WINS, mapping drives, domain logins, etc.)
- Microsoft SQL Server
- Universal Plug and Play
- Napster and its clients
- Gnutella and its clients e.g. BearShare, Newtella, Limewire, Morpheus, etc.
- eDonkey and its clones e.g. eMule, Overnet
- Audio Galaxy
- Song Spy
- I-Mesh
- Cute-MX
- Scour Exchange
- KaZaA and KaZaA Lite
- Hot Line
- Aimster
- Swaptor
- Direct Connect
- Carracho
- Soulseek
- Ares
- Bit Torrent
- EarthStation V
- Share
- Winny
- Vonage IP Phone service
- Filetopia and its clones
- 100 Bao
- applejuice
- Baidu P2P
- BaiduX
- Cogaltan
- eXeem
- ExoSee
- ezPeer
- FileGuri
- FilePia
- FlashGet
- Foldero
- FreePop
- Gample
- Hanafos QBic
- Hardmoa
- JJangFile
- JXTA
- Kademlia
- Kontiki
- KooWo
- Kor-p2p
- ManoLito
- MUTE
- OFF
- OneSwarm SSL
- OpenFT
- p2pia
- Pando
- PDBox
- PeerEnabler
- Perfect Dark
- PP Live
- Pruna Plus
- QQ music
- QQdownload
- Red Swoosh
- Secure Content Downloader
- Share NT
- Soribada
- Sunfile
- SunFolder
- Thunder
- WinMX WPNP
- Xtox
- ZEPP
-
Services blocked from off-campus to WPI
You can use the WPI Virtual Private Network (VPN) to access these services from off-campus.
- SMTP traffic to servers other than WPI's campus e-mail servers
- ICMP Echo Request (ping, tracert)
- Simple TCP Services: echo, discard, chargen
- Trivial File Transfer Protocol (TFTP)
- Simple Network Management Protocol (SNMP)
- Microsoft Networking protocols (NetBIOS, WINS, mapping drives, domain logins, etc.)
- Line Printer Daemon (LPD) printer protocol
- Microsoft SQL Server
- Universal Plug and Play
- Microsoft KMS (Key Management Service) for Vista licensing
- Remote Desktop Connection (RDP) to Terminal Servers
- SSH to terminal servers
In order to react quickly to website-based cyber threats, WPI employs an automated threat-blocking tool. Our threat blocking tool may block entire website providers, including some collateral websites that are not infected. In these instances, the ITS Information Security team can investigate and narrow the block to allow access to unaffected sites. If you need to access a blocked website URL, please email that information to its@wpi.edu. It will be investigated, which can take a few days or even longer, depending on the website provider's ability to clean their site.
Please be aware that if you simply use another network to access a blocked site, your machine may get infected, and you could bring it back to WPI and put our campus at risk.
A list of explicitly blocked servers and services appears below. We may block other services if problems arise in the future. If you are having problems with a service that is not on this list contact us.
Services blocked from on-campus to the Internet
SMTP traffic from servers other than WPI's campus e-mail servers
ICMP Echo Request (ping, tracert)
Simple TCP Services: echo, discard, chargen
Trivial File Transfer Protocol (TFTP)
Microsoft Networking protocols (NetBIOS, WINS, mapping drives, domain logins, etc.)
Microsoft SQL Server
Universal Plug and Play
Napster and its clients
Gnutella and its clients e.g. BearShare, Newtella, Limewire, Morpheus, etc
eDonkey and its clones e.g. eMule, Overnet
Audio Galaxy
Song Spy
I-Mesh
Cute-MX
Scour Exchange
KaZaA and KaZaA Lite
Hot Line
Aimster
Swaptor
Direct Connect
Carracho
SoulSeek
Ares
Bit Torrent
EarthStation V
Share
Winny
Vonage IP Phone service
Filetopia and its clones
100 Bao
applejuice
Baidu P2P
BaiduX
Cogaltan
eXeem
ExoSee
ezPeer
FileGuri
FilePia
FlashGet
Foldero
FreePop
Gample
Hanafos QBic
Hardmoa
JJangFile
JXTA
Kademlia
Kontiki
KooWo
Kor-p2p
ManoLito
MUTE
OFF
OneSwarm SSL
OpenFT
p2pia
Pando
PDBox
PeerEnabler
Perfect Dark
PP Live
Pruna Plus
QQ music
QQdownload
Red Swoosh
Secure Content Downloader
Share NT
Soribada
Sunfile
SunFolder
Thunder
WinMX WPNP
Xtoc
ZEPP
Services blocked from off-campus to WPI
You can use the WPI Virtual Private Network (VPN) to access these services from off-campus.
SMTP traffic to servers other than WPI's campus e-mail servers
ICMP Echo Request (ping, tracert)
Simple TCP Services: echo, discard, chargen
Trivial File Transfer Protocol (TFTP)
Simple Network Management Protocol (SNMP)
Microsoft Networking protocols (NetBIOS, WINS, mapping drives, domain logins, etc.)
Line Printer Daemon (LPD) printer protocol
Microsoft SQL Server
Universal Plug and Play
Microsoft KMS (Key Management Service) for Vista licensing