Whether you script your projects or use menu commands, you need to review your ACL log carefully.
Good analysts review their results and the log as they work in ACL, after they think they are done, and have others review their log before the ACL project is relied upon.
(You can’t imagine the dumb mistakes my team and I found that saved us a lot of embarrassment later.)
A recent Lifehacker article makes life easier (and cheaper) for users and harder for companies and their IT and security pros. Top 10 Ways to Access Blocked Stuff on The Web provides tips (not all ethical) on how to go around, over, under, or through the following fences:
Filed under Security, Top 10