update torusers with it pros and updated links for bloggers.
Andrew Lewman

Andrew Lewman commited on 2009-07-24 16:53:29
Zeige 1 geänderte Dateien mit 17 Einfügungen und 6 Löschungen.

... ...
@@ -20,6 +20,7 @@
20 20
 <li><a href="<page torusers>#spotlight">High &amp; low profile people use Tor</a></li>
21 21
 <li><a href="<page torusers>#executives">Business executives use Tor</a></li>
22 22
 <li><a href="<page torusers>#bloggers">Bloggers use Tor</a></li>
23
+<li><a href="<page torusers>#itprofessionals">IT Professionals use Tor</a></li>
23 24
 </ul>
24 25
 </div>
25 26
 <!-- END SIDEBAR -->
... ...
@@ -280,15 +281,25 @@ into whistleblowing.
280 281
 <h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
281 282
 <hr />
282 283
 <ul>
283
-<li>Every day we hear about bloggers who are
284
+<li>Frequently we hear about bloggers who are
284 285
 <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
285 286
 <a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
286
-for saying perfectly legal things online, in their blog.  In addition to following
287
-the advice in the <a href="http://w2.eff.org/bloggers/lg/">EFF Legal Guide for Bloggers</a>
288
-and Reporters Without Borders' <a href="http://www.rsf.org/rubrique.php3?id_rubrique=542">Handbook for bloggers and cyber-dissidents</a>,
289
-we recommend using Tor.
290
-</li>
287
+for saying perfectly legal things online, in their blog.</li>
288
+<li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
289
+<li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li>
290
+</ul>
291
+
292
+<a name="itprofessionals"></a>
293
+<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
294
+<hr />
295
+<ul>
296
+<li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li>
297
+<li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
298
+<li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li>
299
+<li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
300
+<li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li>
291 301
 </ul>
302
+
292 303
 <p>
293 304
 Please do send us your success stories. They are very important because
294 305
 Tor provides anonymity. While it is thrilling to speculate about <a
295 306