Suggested IT Text... Edit or destroy as fitting.
houdini+tor at clanspum.net
Tue Jun 30 17:42:15 UTC 2009
Michael(cozzi at cozziconsulting.com)@Fri, Jun 26, 2009 at 11:44:03AM -0400:
> Not to jump in with both feet, but here's some possible starting text
> ideas for the "IT People Use Tor" section...
> "IT Professionals use Tor:
> * To verify IP based firewall rules: A firewall may have some policies
> that only allow certain IP addresses or ranges. Tor can be used to verify
> those configurations by using an IP number outside of the company's alloted
> IP block.
> * To bypass their own security systems for sensitive professional
> activities: For instance, a company may have a strict policy regarding the
> material employees can view on the internet. A log review reveals a
> possible violation. Tor can be used to verify the information without an
> exception being put into corporate security systems.
> * To connect back to deployed services: A network engineer can use Tor
> to remotely connect back to services, without the need for an external
> machine and user account, as part of operational testing.
> * To access internet resources: Acceptable use policy for IT Staff and
> normal employees is usually different. Tor can allow unfettered access to
> the internet while leaving standard security policies in place.
> * To work around ISP network outages: Sometimes when an ISP is having
> routing or DNS problems, Tor can make internet resources available, when
> the actual ISP is malfunctioning. This can be invaluable is crisis
Similar to all of these:
* To troubleshoot connectivity problems from the outside of their network
(i.e. to see what parts of the internet can or can't see their site).
More information about the tor-talk