It seems they've finally caught up with
ev1ldonut at work - LJ had been switched off for him from work.
However, I've just put in place a workaround for him. It's not brilliant, but it's pretty good. After trying a few search terms I found this. It's a perl-based web proxy. You put it on your server and browse to the page on your server. You then enter the URL of the page you actually want to visit and the program on the server fetches it for you and forwards it to you. This is identical to the sort of service www.anonymizer.com and other similar sites gives you, only it's free, on a non-public URL (so won't already be in their filters) and very configurable.
This circumvents the filters put in place because neither the IP address nor the name of the server you're visiting are the same. I increased the default security by uncommenting the code to do some basic encoding on the URLs displayed and the cookies cached. I tried a blowfish encryption but the Crypt::Blowfish perl module seems to be neutered.
For added security if
ev1ldonut's IT staff go to the URL he uses I put a
Additionally, I tried to get it working in mod_perl which I managed, but I couldn't get the
I discovered as well Ghostzilla, which is a branch of an old version of Mozilla modified to be a very surruptitious browser. It will appear in the largest frame of whichever window has focus when you move your mouse to the screen edges: left-right-left. It disappears when you move your mouse a small distance away from the frame. The final bonus is that it will run from a CD which gets around the uncustomisable problem with the browser that's on
ev1ldonut's work PC. Ghostzilla's been discontinued by the author on moral grounds and the browser is hard to get hold of [Update: It just seems to be a flakey download from their site]. Unfortunately I couldn't get hold of the version specifically designed for running from CD but the version I did have seems to run fine off a CD :)
Finally I put PuTTY on the CD so if he needs to tunnel through to another machine to give him access he can.
The last touch (which I haven't done yet) will be to make the web proxy available on SSL only so they can't even snoop the traffic from the websites he visits.
Although it will be slower than a standard connection (not by much if a friend of mine hosts it) I do quite like it for a couple of reasons: it doesn't actually rely on any special web settings, and because it's pretty impervious to attack without a great deal of effort.
It can also be rehosted if they end up blocking the range of IPs my server comes from, which I doubt as he's not exactly big fry. As an IT admin I know there are much better things I'd rather be spending my time on, and certainly for me I'd only be implementing web filtering if I was asked to by management, and would be pleased someone'd found a workaround ;)
However, I've just put in place a workaround for him. It's not brilliant, but it's pretty good. After trying a few search terms I found this. It's a perl-based web proxy. You put it on your server and browse to the page on your server. You then enter the URL of the page you actually want to visit and the program on the server fetches it for you and forwards it to you. This is identical to the sort of service www.anonymizer.com and other similar sites gives you, only it's free, on a non-public URL (so won't already be in their filters) and very configurable.
This circumvents the filters put in place because neither the IP address nor the name of the server you're visiting are the same. I increased the default security by uncommenting the code to do some basic encoding on the URLs displayed and the cookies cached. I tried a blowfish encryption but the Crypt::Blowfish perl module seems to be neutered.
For added security if
.htaccess file in place so anyone going there must enter a username and password. This will also preserve my bandwidth by preventing joe public using my web proxy.Additionally, I tried to get it working in mod_perl which I managed, but I couldn't get the
.htaccess file to work as well, plus I had to disable the non-parsed headers which made it less compatible so I've given up for the time being.I discovered as well Ghostzilla, which is a branch of an old version of Mozilla modified to be a very surruptitious browser. It will appear in the largest frame of whichever window has focus when you move your mouse to the screen edges: left-right-left. It disappears when you move your mouse a small distance away from the frame. The final bonus is that it will run from a CD which gets around the uncustomisable problem with the browser that's on
Finally I put PuTTY on the CD so if he needs to tunnel through to another machine to give him access he can.
The last touch (which I haven't done yet) will be to make the web proxy available on SSL only so they can't even snoop the traffic from the websites he visits.
Although it will be slower than a standard connection (not by much if a friend of mine hosts it) I do quite like it for a couple of reasons: it doesn't actually rely on any special web settings, and because it's pretty impervious to attack without a great deal of effort.
It can also be rehosted if they end up blocking the range of IPs my server comes from, which I doubt as he's not exactly big fry. As an IT admin I know there are much better things I'd rather be spending my time on, and certainly for me I'd only be implementing web filtering if I was asked to by management, and would be pleased someone'd found a workaround ;)
no subject
Date: 2004-09-17 04:24 pm (UTC)no subject
Date: 2004-09-17 04:34 pm (UTC)no subject
Date: 2004-09-18 12:21 am (UTC)no subject
Date: 2004-09-19 01:09 pm (UTC)no subject
Date: 2004-09-17 04:34 pm (UTC)I'm a competent I.T. department. If I gave a shit about people using LJ in the office, the next stage would be a formal warning not to use LJ, followed by sneaking a KeyGhost into his work PC, and/or installing a covert surveillence camera, followed by gathering sufficient evidence to get him sacked.
Personally, I prefer to keep such measures in reserve for catching people doing really naughty things. It sounds like his employer may be somewhat more anally-retentive. )-8
no subject
Date: 2004-09-17 04:41 pm (UTC)And of course it is dodgy for a company to monitor its employees in the manner you suggest, unless his work contract stipulates otherwise and it is legal to do so.
I like your phrasing: I'm a competent I.T. department ;)
no subject
Date: 2004-09-17 05:26 pm (UTC)no subject
Date: 2004-09-18 01:09 am (UTC)I'm one of those rare scarey things... An employee who really knows employment law, all my rights, and all things considered to be fair and legal practice. The guy I lived with for two years, and one of my oldest friends works for the largest legal firm in Bristol, and is a specialist Employment solicitor. Useful to know ;)
I know my contract, and I know the law. :)
no subject
Date: 2004-09-18 01:12 am (UTC)No, I think it's simply a case of they probably noticed a high volume of traffic (there are well over 2500 people in the building, the chance of me alone bringing attention to LJ is very slim) to the site, went and had a look, decided they didn't like it, so blocked it.
Trust me, it is not a competent IT dept... it's all outsourced to HP. ;)
*grin*
Date: 2004-09-20 12:02 am (UTC)*more grins*
this all makes up for me being awake until four am !
Re: *grin*
Date: 2004-09-20 01:05 am (UTC)(I hope I wasn't to do with you being awake until four am..?)
no subject
Date: 2004-09-20 01:18 am (UTC)no subject
Date: 2004-09-20 02:11 am (UTC)no subject
Date: 2004-09-20 02:22 am (UTC)If you were to write to that same CD a tool such as HTTP bouncer
That's the way that certain people break out of certain other companies... ;)
no subject
Date: 2004-09-20 11:42 am (UTC)I'll have a look into it anyway when I get a chance.
In the mean time, can I simply put it where I suggested? Can you check script execution and AllowOverride are enabled for users in the cgi-bin and subdirectories?
no subject
Date: 2004-09-20 11:54 pm (UTC)no subject
Date: 2004-09-20 06:39 am (UTC)Doesn't .htaccess leave passwords to be sent in clear? Maybe that's not too much of a worry...
no subject
Date: 2004-09-20 11:43 am (UTC)I think I should be OK for hosting, but thanks anyway :)