Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
license_violation_procedures [2025/02/26 14:25]
24.60.181.186 [Identify compromised account]
license_violation_procedures [2025/08/20 17:42] (current)
172.24.102.139 [Lift block on IP]
Line 1: Line 1:
 ======License Violation Procedures====== ======License Violation Procedures======
  
-Violations are reported by vendors to us via eleres. The IP address and timestamp of violation are often noted. Sometimes a special string is sent by the vendor ​to the proxy server so you can find the offending time/​IP/​account in the proxy logs. The vendor will let you know what it is in their communication+Violations are reported by vendors to us via email or to DBHelp. The IP address and timestamp of violation are often noted. Sometimes a vendor ​includes their logs containing ​the information
  
-Our proxy server address is 128.119.168.112+Our proxy server address is 128.119.201.53. This is the external IP address.
  
  
-  - Identify the compromised account. +  - Identify the compromised ​or offending ​account. 
-  - Temporarily block the IP.+  - Temporarily block the IP address or user.
   - Report account to [[mailto: abuse@umass.edu|abuse@umass.edu]]   - Report account to [[mailto: abuse@umass.edu|abuse@umass.edu]]
   - Respond to vendor letting them know you have blocked and reported the account.   - Respond to vendor letting them know you have blocked and reported the account.
Line 70: Line 70:
  
 ====Lift block on IP==== ====Lift block on IP====
-Using a FTP client (preferably WinSCP- Put in a SysHelp Ticket to have it installed on your machine) access the Proxy Server+Using a FTP client (preferably WinSCP, put in a SysHelp Ticket to have it installed on your machine) access the EZProxy server
-      * The Username and Password can be obtained from Scott, Kat, or Jack.+      * The Username and Password can be obtained from Jaime or Margaret.
   * Once logged in, Identify the user.txt file in the main directory.   * Once logged in, Identify the user.txt file in the main directory.
       * There are a couple old files and backups that are not used anymore. Make sure you select the correct one.       * There are a couple old files and backups that are not used anymore. Make sure you select the correct one.
license_violation_procedures.1740579958.txt.gz · Last modified: 2025/02/26 14:25 by 24.60.181.186
[unknown link type]Back to top
www.chimeric.de Creative Commons License Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0