Re: bypassing employer's proxy to surf anonymously

From: Aaron (snort@microchp.org)
Date: Tue Jun 13 2006 - 21:03:06 EDT


tor.eff.org if SSL is allow outbound.

On Wed, 14 Jun 2006 06:55:17 +1000
  "Craig Wright" <cwright@bdosyd.com.au> wrote:
>
> Or to put my comment in again as I have on this topic
>numerous times over the years as it pops up.
>
> Maybe the question should be rephrased from "how do I
>bypass the employer's proxy to surf anonymously?" to:
>
> How do I breach the terms of my employment?
> How do I seek to bypass the controls that my company has
>put in place?
> How do I show that I can not be trusted?
> How do I break systems rather than fixing or building
>them?
> How do I show that I have low moral character?
> How do I demonstrate that I should not be woirking in
>the security industry?!
>
> The issue is not how to break it. but how to stop this.
>What controls will help? What montiroing and logs will be
>of use?
>
> Craig
>
> -----Original Message-----
> From: alan [mailto:alan@clueserver.org]
> Sent: Wed 14/06/2006 5:42 AM
> To: Hubert Seiwert
> Cc: gimeshell@web.de; pen-test@securityfocus.com
> Subject: Re: bypassing employer's proxy to surf
>anonymously
>
>
>
>
>
> Liability limited by a scheme approved under
>Professional Standards Legislation in respect of matters
>arising within those States and Territories of Australia
>where such legislation exists.
>
> DISCLAIMER
> The information contained in this email and any
>attachments is confidential. If you are not the intended
>recipient, you must not use or disclose the information.
>If you have received this email in error, please inform
>us promptly by reply email or by telephoning +61 2 9286
>5555. Please delete the email and destroy any printed
>copy.
>
> Any views expressed in this message are those of the
>individual sender. You may not rely on this message as
>advice unless it has been electronically signed by a
>Partner of BDO or it is subsequently confirmed by letter
>or fax signed by a Partner of BDO.
>
> BDO accepts no liability for any damage caused by this
>email or its attachments due to viruses, interference,
>interception, corruption or unauthorised access.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:05 EDT