How can i bypass websence to open the restricted sites?

Answers were Sorted based on User's Feedback



How can i bypass websence to open the restricted sites?..

Answer / vik

To bypass a well defined websense appliance, you can try
using an Internet proxy service by setting IE to point to a
proxy server. If that doesn't work, you can try to hard
code another IP address- but you would have to have some
skills on how to set this and know which IP's are not
assigned dynamically on your network.

If the policy is well defined and the appliance is setup
properly, it should be such that you can't get around it.

Is This Answer Correct ?    6 Yes 3 No

How can i bypass websence to open the restricted sites?..

Answer / alok

You can Bypasss any security If there is no HTTPS security
because some proxy sites use the HTTPS port and provide the
user an alternate solution via their Proxy sites.there is a
several Proxy sites like Kproxy, dynapass etc .....

Is This Answer Correct ?    2 Yes 0 No

How can i bypass websence to open the restricted sites?..

Answer / nimesh maru

You do not want to access something that is restricted.
There is the reason the site would be restricted. If you
really want to visit the site and it is not malicious or
harmful then you should contact the appropriate group in
your organization and request them to open the site or
unblock/whitelist the site with valid Business
justification(reason) and your managers approval.

Is This Answer Correct ?    0 Yes 3 No

How can i bypass websence to open the restricted sites?..

Answer / viji

go to Netcafe and access restricted sites

Is This Answer Correct ?    6 Yes 13 No

Post New Answer

More Networking Security Interview Questions

What is an information security management system (isms)?

0 Answers  


How Can I recover My Hotmail Account without phone no and email?

1 Answers  


What are the 5 aspects of IT-Security?

6 Answers   Infosys,


What defensive mechanisms for viruses can be encountered?

1 Answers  


explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

0 Answers  






I want to reset the passwords of 100 users.how do you do it?

1 Answers   iGate,


What is malware?

0 Answers  


How does phishing work?

0 Answers  


Why do we use virtual private network?

0 Answers  


What are the different aspects of shadow it?

0 Answers  


how secure is SAP applications?

1 Answers   Htmt,


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)