While I know you might identify with network administrators, these are unfortunately not doing their job.
Apparently the notable qualifications such as "ignoring requests for access to legitimate resources" and "nothing can access the net except IE" are being gazed past. Yes, three cheers...
I have to admit that the network at one company I deal with is simply too locked down to make me want to bother with tunneling a VNC connection out to my home PC through the proxy.
First, the proxy is restricted to only allowing http / https connections. No problem. Just use an http...
It's hard finding sites dedicated to reviewing the various alternatives for DVR security systems. I'm looking for a total solution, including a dedicated DVR box as oppsed to just a card that I plop in an existing machine. If anyone here has recommendations on a particular system that has a...
:laugh:
"How dare you use a lot of encrypted traffic on my network?!?!" It sounds to me more like it's the network admin whining "that's unfair!" more than the students.
"Chancelor, Chancelor!! We have to alter the rules! Students are using encryption and preventing me from observing all...
You only know what method I'm using to do something. Not what I'm doing. There is, of course, a chasm of difference.
"I know exactly what you're doing behind that closed door!"
"Oh really? What?"
"You're existing behind that door! See! Technically I'm right! That's exactly what...
I think we're talking apples and oranges. The challenge was "I dare you to get around my security." Well, they just did, right? And the traffic is encrypted in such a way that the only excuse you can give is "I don't understand what they're doing, so I'm unplugging them." You didn't for...
I'm aware of that. I'm simply saying that yes, that upstream bandwidth could easily be utilized by other users leaving the external user with nothing. I want to prevent that and I assume QoS would be one way of doing it. Correct?
Yeah, but isn't that a bit of a cop-out? Who defines "a legit amount of SSL traffic" and based on what? I would personally prefer that everything I do be encrypted.
In other words, you could give that excuse for reason to do almost anything. I'm asking how you conclusively justify it above...
Out of curiosity, what are you going to do to justify dealing with someone using a SSL proxy? I mean, sure you can "detect a lot of SSL traffic", but you have no idea what's transpiring there. It seems like all you'd be left with is saying "Well, I don't know what's going on there, so I'm...
I'm an infant in the world of traffic prioritization so I apologize if I'm completely barking up the wrong tree here. One of my managers has began working from home and is using Remote Desktop a good bit. The connection here at the office is through Comcast (6 mbps down, 768 kbps up). We do...
I want a flash drive primarily for data transfer to a couple systems that don't have network access as well as bringing files to and from home. I'd like to have one with hardware encryption since I might use it to store some sensetive account info. I've been digging around some basic reviews...
The system in question has no current RAID controller. It's simply a SCSI HD connected strait to a SCSI controller.
I have access to Ghost 9.0 (standard) and all I've read basically echos what is mentioned here. "Maybe Ghost will work with the RAID array, and maybe it won't." You all...
I'm performing a variety of IT functions for a small but booming company. One of their forseeable issues is that their primary Win 2k server (which is responsible for AD, DHCP, DNS, backups, and a few other miscellaneous jobs) is running on a single quality SCSI hard drive. I'm pushing the...
Yeah, I may try one of those programs. But since I don't carry a PDA, I picture myself sitting down to a friends computer and needing to access my webmail and not being able to recall the password since I don't have the said password storage program on that machine.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.