Tethering and preventing users from utilizing it
We've recently seen a problem with users attempting to use tethering with their cell phones to bypass out network security. I was wondering if anyone had any suggestions on how to prevent users from being able to attempt this or succeeding in this? Not sure if this is the correct place to ask. Thanks again.
April 15th, 2010 7:03am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics