Roger Dingledine commited on 2011-12-01 05:51:48
Zeige 1 geänderte Dateien mit 1 Einfügungen und 1 Löschungen.
| ... | ... |
@@ -297,7 +297,7 @@ |
| 297 | 297 |
<li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li> |
| 298 | 298 |
<li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li> |
| 299 | 299 |
<li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li> |
| 300 |
- <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li> |
|
| 300 |
+ <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li> |
|
| 301 | 301 |
</ul> |
| 302 | 302 |
|
| 303 | 303 |
<p> |
| 304 | 304 |