Wikipedia:Reference desk/Archives/Computing/2012 October 2: Difference between revisions

Content deleted Content added
Docdave (talk | contribs)
Docdave (talk | contribs)
Line 84:
 
It's been done, even through DNS, but hopefully you can set up a conventional proxy someplace you can actually reach through your firewall. [[Special:Contributions/67.117.130.72|67.117.130.72]] ([[User talk:67.117.130.72|talk]]) 05:02, 3 October 2012 (UTC)
 
One bit of advice, if this is a corporate environment and you are looking to bypass corporate controls, it is not likely to have a very happy ending. In addition to using firewalls, many large organizations also use tools designed to identify things like tunneling which is usually a violation of acceptable use policy. Dan Kaminsky did, in fact, use DNS to tunnel data past a firewall, that was a proof of concept and not a very useful tunneling mechanism. Using an encrypted HTTPS session to any one of the available tunneling sites will work, but more and more organizations are using devices that decrypt and inspect outgoing traffic, so you might well be caught. [[User:Docdave|Docdave]] ([[User talk:Docdave|talk]]) 03:20, 8 October 2012 (UTC)
 
== low-level ram stuff ==