[or-cvs] r20136: {website} update torusers with it pros and updated links for bloggers. (website/trunk/en)

phobos at seul.org phobos at seul.org
Fri Jul 24 14:53:29 UTC 2009

Author: phobos
Date: 2009-07-24 10:53:29 -0400 (Fri, 24 Jul 2009)
New Revision: 20136

update torusers with it pros and updated links for bloggers.

Modified: website/trunk/en/torusers.wml
--- website/trunk/en/torusers.wml	2009-07-24 12:34:21 UTC (rev 20135)
+++ website/trunk/en/torusers.wml	2009-07-24 14:53:29 UTC (rev 20136)
@@ -20,6 +20,7 @@
 <li><a href="<page torusers>#spotlight">High &amp; low profile people use Tor</a></li>
 <li><a href="<page torusers>#executives">Business executives use Tor</a></li>
 <li><a href="<page torusers>#bloggers">Bloggers use Tor</a></li>
+<li><a href="<page torusers>#itprofessionals">IT Professionals use Tor</a></li>
 <!-- END SIDEBAR -->
@@ -280,15 +281,25 @@
 <h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
 <hr />
-<li>Every day we hear about bloggers who are
+<li>Frequently we hear about bloggers who are
 <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
 <a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
-for saying perfectly legal things online, in their blog.  In addition to following
-the advice in the <a href="http://w2.eff.org/bloggers/lg/">EFF Legal Guide for Bloggers</a>
-and Reporters Without Borders' <a href="http://www.rsf.org/rubrique.php3?id_rubrique=542">Handbook for bloggers and cyber-dissidents</a>,
-we recommend using Tor.
+for saying perfectly legal things online, in their blog.</li>
+<li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
+<li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li>
+<a name="itprofessionals"></a>
+<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
+<hr />
+<li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li>
+<li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
+<li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li>
+<li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
+<li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li>
 Please do send us your success stories. They are very important because
 Tor provides anonymity. While it is thrilling to speculate about <a

More information about the tor-commits mailing list