Unauthorized Software at JLab

NOTE:  The list below is not exclusive and is subject to change.  Any exemptions must go through our Cyber Security team.

Software Type Descritpion Examples
Peer-to-peer (P2) File sharing BitTorrent, Limeware,Gnutella, Kaaza, Google Desktop
Hacking tools Tools to compromise networks and systems Cain and Abel, Metasploit, Nmap/Zenmap, Ncrack, John the Ripper
Key generators Programs to create keys for copy-protected software KeyGen, KeyGenGuru
Games Games not provided by the operating system (OS) manufacturer World of Warcraft, Call of Duty, Dark Age of Camelot
Proxy avoidance software Software used to avoid JLab proxies Bypass Proxy, Elite Proxy Switcher, Live Proxy Server Finder
Onion routing Tools to anonymize your IP address Tor, CGIProxy
IPV6 tunneling Software to communicate over the network Teredo, Miredo