Roger Dingledine commited on 2011-12-01 05:51:48
Zeige 1 geänderte Dateien mit 1 Einfügungen und 1 Löschungen.
... | ... |
@@ -297,7 +297,7 @@ |
297 | 297 |
<li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li> |
298 | 298 |
<li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li> |
299 | 299 |
<li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li> |
300 |
- <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li> |
|
300 |
+ <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li> |
|
301 | 301 |
</ul> |
302 | 302 |
|
303 | 303 |
<p> |
304 | 304 |