On Wed, Jun 9, 2010 at 3:24 PM, Raja Subramanian <rajasuper...@gmail.com>wrote:

> On Wed, Jun 9, 2010 at 2:17 PM, Pothuraju, Naga Deepak
> <naga-deepak.pothur...@capgemini.com> wrote:
> >> Seriously, if it blocked the sys admins should have a reason to.
> > It makes sense for them to block it as there are few other secure
> projects running from the same location. And I guess it's the same issue
> with every corporate office. Having said that, I still want to understand
> the setup they have & break it for my own communication purposes.
>
> There's an excellent quote from the Camel Book (Perl):
>
> "If someone hands you a strange gadget, asks you to hold
> the barrel to your head and pull the trigger, you cannot assume
> it will dry your hair."
>
> Never mind your good intentions as to why you want to bypass
> your corporate security policies.  Look at what you are attempting
> from the company's perspective.  It's clearly 1) against corporate
> policy, and 2) against the law. You may be faced with consequences
> more severe than you currently imagine.
>
> During my time at university, out of curiosity I tired such things,
> and am thankful that I got away with only a good scolding. The
> corporate world is not so forgiving.
>

even i tried such stuff and found a way to bypass the proxy server in my
univ. wifi network, so mailed this issue anonymously to my college associate
director.. he never replied... :D but that was way safer option than getting
deeper into the intrusion and get caught at some point. :)


>
> If you still want to learn such things, suggest you setup a lab
> at home and practice all you want.  Don't do it at office or on
> someone else's infrastructure.
>
> - Raja
> _______________________________________________
> ILUGC Mailing List:
> http://www.ae.iitm.ac.in/mailman/listinfo/ilugc
>



-- 
idlecool
_______________________________________________
ILUGC Mailing List:
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc

Reply via email to