A guy at work was just fired (along with others) for using a local proxie server at work, to bypass our company proxie server.
This allowed him access to anything he wanted.
Apparently, this proxie server was designed for the sole purpose of bypassing company/corporate proxies in the work place.
How would something like this work?
How would the network allow access to an external proxie without verifying the content?
I find this stuff interesting. Can anyone enlighten me?
This allowed him access to anything he wanted.
Apparently, this proxie server was designed for the sole purpose of bypassing company/corporate proxies in the work place.
How would something like this work?
How would the network allow access to an external proxie without verifying the content?
I find this stuff interesting. Can anyone enlighten me?