[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Suggested IT Text... Edit or destroy as fitting.
Michael(cozzi@xxxxxxxxxxxxxxxxxxx)@Fri, Jun 26, 2009 at 11:44:03AM -0400:
>
> Not to jump in with both feet, but here's some possible starting text
> ideas for the "IT People Use Tor" section...
>
> Ahem...
>
> "IT Professionals use Tor:
>
> * To verify IP based firewall rules: A firewall may have some policies
> that only allow certain IP addresses or ranges. Tor can be used to verify
> those configurations by using an IP number outside of the company's alloted
> IP block.
>
> * To bypass their own security systems for sensitive professional
> activities: For instance, a company may have a strict policy regarding the
> material employees can view on the internet. A log review reveals a
> possible violation. Tor can be used to verify the information without an
> exception being put into corporate security systems.
>
> * To connect back to deployed services: A network engineer can use Tor
> to remotely connect back to services, without the need for an external
> machine and user account, as part of operational testing.
>
> * To access internet resources: Acceptable use policy for IT Staff and
> normal employees is usually different. Tor can allow unfettered access to
> the internet while leaving standard security policies in place.
>
> * To work around ISP network outages: Sometimes when an ISP is having
> routing or DNS problems, Tor can make internet resources available, when
> the actual ISP is malfunctioning. This can be invaluable is crisis
> situations.
Similar to all of these:
* To troubleshoot connectivity problems from the outside of their network
(i.e. to see what parts of the internet can or can't see their site).
?
--
Bill Weiss