{"id":167,"date":"2009-04-28T14:27:37","date_gmt":"2009-04-28T21:27:37","guid":{"rendered":"http:\/\/blog.paloaltonetworks.com\/?p=167"},"modified":"2009-08-26T15:48:49","modified_gmt":"2009-08-26T22:48:49","slug":"found-on-lifehacker-an-easy-way-past-workplace-security-controls","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2009\/04\/found-on-lifehacker-an-easy-way-past-workplace-security-controls\/","title":{"rendered":"Found On Lifehacker - an easy way past workplace security controls"},"content":{"rendered":"<p>Here's an article I found on Lifehacker, a useful, mainstream website.\u00a0 The article points to a step-by-step tutorial on how to circumvent IT's security controls using FreeProxy.\u00a0 Have a <a href=\"http:\/\/lifehacker.com\/5226972\/freeproxy-helps-you-circumvent-restrictive-firewalls\" rel=\"nofollow,noopener\" >look<\/a>.<\/p>\n<p>Matt talks a little about circumventing applications in <a href=\"http:\/\/blog.paloaltonetworks.com\/?p=153\">this post<\/a>, and they are covered extensively in our <a href=\"http:\/\/www.paloaltonetworks.com\/literature\/AUR_report0409.html\">Application Usage and Risk Report<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anybody can set up external proxies.<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4],"tags":[11],"coauthors":[],"class_list":["post-167","post","type-post","status-publish","format-standard","hentry","category-application-usage-risk-report","tag-circumvent-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=167"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/167\/revisions"}],"predecessor-version":[{"id":698,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/167\/revisions\/698"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=167"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}