How can i bypass websence to open the restricted sites?

Answers were Sorted based on User's Feedback



How can i bypass websence to open the restricted sites?..

Answer / vik

To bypass a well defined websense appliance, you can try
using an Internet proxy service by setting IE to point to a
proxy server. If that doesn't work, you can try to hard
code another IP address- but you would have to have some
skills on how to set this and know which IP's are not
assigned dynamically on your network.

If the policy is well defined and the appliance is setup
properly, it should be such that you can't get around it.

Is This Answer Correct ?    6 Yes 3 No

How can i bypass websence to open the restricted sites?..

Answer / alok

You can Bypasss any security If there is no HTTPS security
because some proxy sites use the HTTPS port and provide the
user an alternate solution via their Proxy sites.there is a
several Proxy sites like Kproxy, dynapass etc .....

Is This Answer Correct ?    2 Yes 0 No

How can i bypass websence to open the restricted sites?..

Answer / nimesh maru

You do not want to access something that is restricted.
There is the reason the site would be restricted. If you
really want to visit the site and it is not malicious or
harmful then you should contact the appropriate group in
your organization and request them to open the site or
unblock/whitelist the site with valid Business
justification(reason) and your managers approval.

Is This Answer Correct ?    0 Yes 3 No

How can i bypass websence to open the restricted sites?..

Answer / viji

go to Netcafe and access restricted sites

Is This Answer Correct ?    6 Yes 13 No

Post New Answer

More Networking Security Interview Questions

What is a security policy?

1 Answers  


How to implement PIX firewall security?

0 Answers   Infosys,


How long can a ddos attack last?

0 Answers  


How can i bypass websence to open the restricted sites?

4 Answers   Welspun, Zenith,


Name firewall architectures?

4 Answers  






What are the different Kinds of Malware?

1 Answers   Infosys,


What is udp flood?

0 Answers  


congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....

0 Answers  


What are Digrams and Trigrams

0 Answers   Elgi Equipments,


What are the main components of the CERT Taxonomy?

0 Answers  


Explain what are all the technical steps involved when the data transmission from server via router?

0 Answers  


who is a hacker?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)