Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How can i bypass websence to open the restricted sites?

Answer Posted / vik

To bypass a well defined websense appliance, you can try
using an Internet proxy service by setting IE to point to a
proxy server. If that doesn't work, you can try to hard
code another IP address- but you would have to have some
skills on how to set this and know which IP's are not
assigned dynamically on your network.

If the policy is well defined and the appliance is setup
properly, it should be such that you can't get around it.

Is This Answer Correct ?    6 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Why should you care about the OSI Reference Model

1080


How does dlp work?

1200


Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?

1000


What are major types of networks and explain

1177


What is the difference between a switch and a hub?

1120


Explain the difference between discretionary access control and mandatory access control?

1028


What is proxy firewall?

1095


Can you give me some ransomware variants?

1037


Explain what does cia stand for in security management?

1036


If you need to encrypt and compress data for transmission, how would you achieve it?

1153


What are manageable and non manageable switches?

1123


Describe a TCP connection sequence

4526


Which are the different factors that affect the security of a network?

1016


How does ransomware work?

1106


What is terminal emulation, in which layer it comes

1125