<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"><head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1;charset=utf-8" />
<title>Cheap Hack - Border Security - Skypetunnel: A Horrifying Idea</title>
<script src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/page0000.js" type="text/javascript"></script>
<style type="text/css">
@import url("Cheap\ Hack\ -\ Border\ Security\ -\ Skypetunnel_\ A\ Horrifying\ Idea_files/page0000.css");
</style>
<link rel="shortcut icon" href="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/favicon0.htm" >
<link rel="icon" href="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/favicon-.htm" type="image/gif" >
<link rel="alternate" type="application/rss+xml" title="Cheap Hack RSS" href="http://replay.waybackmachine.org/20090615063040/http://feeds.ziffdavisenterprise.com/RSS/cheap_hack"/>

<script type="text/javascript" language="javascript">
<!--
function OpenTrackback (c) {
    window.open(c,
                    'trackback',
                    'width=480,height=480,scrollbars=yes,status=yes');
}

var HOST = 'blogs.eweek.com';

// Copyright (c) 1996-1997 Athenia Associates.
// http://replay.waybackmachine.org/20090615063040/http://www.webreference.com//js/
// License is granted if and only if this entire
// copyright notice is included. By Tomer Shiran.

function setCookie (name, value, expires, path, domain, secure) {
    var curCookie = name + "=" + escape(value) + ((expires) ? "; expires=" + expires.toGMTString() : "") + ((path) 

? "; path=" + path : "") + ((domain) ? "; domain=" + domain : "") + ((secure) ? "; secure" : "");
    document.cookie = curCookie;
}

function getCookie (name) {
    var prefix = name + '=';
    var c = document.cookie;
    var nullstring = '';
    var cookieStartIndex = c.indexOf(prefix);
    if (cookieStartIndex == -1)
        return nullstring;
    var cookieEndIndex = c.indexOf(";", cookieStartIndex + prefix.length);
    if (cookieEndIndex == -1)
        cookieEndIndex = c.length;
    return unescape(c.substring(cookieStartIndex + prefix.length, cookieEndIndex));
}

function deleteCookie (name, path, domain) {
    if (getCookie(name))
        document.cookie = name + "=" + ((path) ? "; path=" + path : "") + ((domain) ? "; domain=" + domain : "") + 

"; expires=Thu, 01-Jan-70 00:00:01 GMT";
}

function fixDate (date) {
    var base = new Date(0);
    var skew = base.getTime();
    if (skew > 0)
        date.setTime(date.getTime() - skew);
}

function rememberMe (f) {
    var now = new Date();
    fixDate(now);
    now.setTime(now.getTime() + 365 * 24 * 60 * 60 * 1000);
    setCookie('mtcmtauth', f.author.value, now, '', HOST, '');
    setCookie('mtcmtmail', f.email.value, now, '', HOST, '');
    setCookie('mtcmthome', f.url.value, now, '', HOST, '');
}

function forgetMe (f) {
    deleteCookie('mtcmtmail', '', HOST);
    deleteCookie('mtcmthome', '', HOST);
    deleteCookie('mtcmtauth', '', HOST);
    f.email.value = '';
    f.author.value = '';
    f.url.value = '';
}
//-->
</script>
</head>
<body>
<!-- BEGIN WAYBACK TOOLBAR INSERT -->

<script type="text/javascript" src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/disclaim.js" ></script>
<script type="text/javascript" src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/graph-ca.js" ></script>
<script type="text/javascript" src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/jquery00.js" ></script>
<script type="text/javascript">
//<![CDATA[
var firstDate = 820454400000;
var lastDate = 1325375999999;
var wbPrefix = "http://replay.waybackmachine.org/";
var wbCurrentUrl = "http://blogs.eweek.com/cheap_hack/content/border_security/blog_skypetunnel_a_horrifying_idea_1.html";

var curYear = -1;
var curMonth = -1;
var yearCount = 16;
var firstYear = 1996;
var imgWidth=400;
var yearImgWidth = 25;
var monthImgWidth = 2;
var trackerVal = "none";
var displayDay = "15";
var displayMonth = "Jun";
var displayYear = "2009";
var prettyMonths = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"];

function showTrackers(val) {
	if(val == trackerVal) {
		return;
	}
	if(val == "inline") {
		document.getElementById("displayYearEl").style.color = "#ec008c";
		document.getElementById("displayMonthEl").style.color = "#ec008c";
		document.getElementById("displayDayEl").style.color = "#ec008c";		
	} else {
		document.getElementById("displayYearEl").innerHTML = displayYear;
		document.getElementById("displayYearEl").style.color = "#ff0";
		document.getElementById("displayMonthEl").innerHTML = displayMonth;
		document.getElementById("displayMonthEl").style.color = "#ff0";
		document.getElementById("displayDayEl").innerHTML = displayDay;
		document.getElementById("displayDayEl").style.color = "#ff0";
	}
   document.getElementById("wbMouseTrackYearImg").style.display = val;
   document.getElementById("wbMouseTrackMonthImg").style.display = val;
   trackerVal = val;
}
function getElementX2(obj) {
	var thing = jQuery(obj);
	if((thing == undefined) 
			|| (typeof thing == "undefined") 
			|| (typeof thing.offset == "undefined")) {
		return getElementX(obj);
	}
	return Math.round(thing.offset().left);
}
function trackMouseMove(event,element) {

   var eventX = getEventX(event);
   var elementX = getElementX2(element);
   var xOff = eventX - elementX;
	if(xOff < 0) {
		xOff = 0;
	} else if(xOff > imgWidth) {
		xOff = imgWidth;
	}
   var monthOff = xOff % yearImgWidth;

   var year = Math.floor(xOff / yearImgWidth);
	var yearStart = year * yearImgWidth;
   var monthOfYear = Math.floor(monthOff / monthImgWidth);
   if(monthOfYear > 11) {
       monthOfYear = 11;
   }
   // 1 extra border pixel at the left edge of the year:
   var month = (year * 12) + monthOfYear;
   var day = 1;
	if(monthOff % 2 == 1) {
		day = 15;
	}
	var dateString = 
		zeroPad(year + firstYear) + 
		zeroPad(monthOfYear+1,2) +
		zeroPad(day,2) + "000000";

	var monthString = prettyMonths[monthOfYear];
	document.getElementById("displayYearEl").innerHTML = year + 1996;
	document.getElementById("displayMonthEl").innerHTML = monthString;
	// looks too jarring when it changes..
	//document.getElementById("displayDayEl").innerHTML = zeroPad(day,2);

	var url = wbPrefix + dateString + '/' +  wbCurrentUrl;
	document.getElementById('wm-graph-anchor').href = url;

   //document.getElementById("wmtbURL").value="evX("+eventX+") elX("+elementX+") xO("+xOff+") y("+year+") m("+month+") monthOff("+monthOff+") DS("+dateString+") Moy("+monthOfYear+") ms("+monthString+")";
   if(curYear != year) {
       var yrOff = year * yearImgWidth;
       document.getElementById("wbMouseTrackYearImg").style.left = yrOff + "px";
       curYear = year;
   }
   if(curMonth != month) {
       var mtOff = year + (month * monthImgWidth) + 1;
       document.getElementById("wbMouseTrackMonthImg").style.left = mtOff + "px";
       curMonth = month;
   }
}
//]]>
</script>

<style type="text/css">body{margin-top:0!important;padding-top:0!important;min-width:800px!important;}#wm-ipp a:hover{text-decoration:underline!important;}</style>
<div id="wm-ipp" style="display:none; position:relative;padding:0 5px;min-height:70px;min-width:800px; z-index:9000;">
<div id="wm-ipp-inside" style="position:fixed;padding:0!important;margin:0!important;width:97%;min-width:780px;border:5px solid #000;border-top:none;background-image:url(http://static.waybackmachine.org/images/toolbar/wm_tb_bk_trns.png);text-align:center;-moz-box-shadow:1px 1px 3px #333;-webkit-box-shadow:1px 1px 3px #333;box-shadow:1px 1px 3px #333;font-size:11px!important;font-family:'Lucida Grande','Arial',sans-serif!important;">
   <table style="border-collapse:collapse;margin:0;padding:0;width:100%;"><tbody><tr>
   <td style="padding:10px;vertical-align:top;min-width:110px;">
   <a href="http://waybackmachine.org/" title="Wayback Machine home page" style="background-color:transparent;border:none;"><img src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/wayback-.png" alt="Wayback Machine" width="110" height="39" border="0"/></a>
   </td>
   <td style="padding:0!important;text-align:center;vertical-align:top;width:100%;">

       <table style="border-collapse:collapse;margin:0 auto;padding:0;width:570px;"><tbody><tr>
       <td style="padding:3px 0;" colspan="2">
       <form target="_top" method="get" action="http://waybackmachine.org/form-submit.jsp" name="wmtb" id="wmtb" style="margin:0!important;padding:0!important;"><input type="text" name="url" id="wmtbURL" value="http://blogs.eweek.com/cheap_hack/content/border_security/blog_skypetunnel_a_horrifying_idea_1.html" style="width:400px;font-size:11px;font-family:'Lucida Grande','Arial',sans-serif;" onfocus="javascript:this.focus();this.select();" /><input type="hidden" name="type" value="replay" /><input type="hidden" name="date" value="20090615063040" /><input type="submit" value="Go" style="font-size:11px;font-family:'Lucida Grande','Arial',sans-serif;margin-left:5px;" /><span id="wm_tb_options" style="display:block;"></span></form>
       </td>
       <td style="vertical-align:bottom;padding:5px 0 0 0!important;" rowspan="2">
           <table style="border-collapse:collapse;width:110px;color:#99a;font-family:'Helvetica','Lucida Grande','Arial',sans-serif;"><tbody>
			
           <!-- NEXT/PREV MONTH NAV AND MONTH INDICATOR -->
           <tr style="width:110px;height:16px;font-size:10px!important;">
           	<td style="padding-right:9px;font-size:11px!important;font-weight:bold;text-transform:uppercase;text-align:right;white-space:nowrap;overflow:visible;" nowrap="nowrap">
               
		                <a href="http://replay.waybackmachine.org/20081007205441/http://blogs.eweek.com/cheap_hack/content/border_security/blog_skypetunnel_a_horrifying_idea_1.html" style="text-decoration:none;color:#33f;font-weight:bold;background-color:transparent;border:none;" title="7 Okt 2008"><strong>OKT</strong></a>
		                
               </td>
               <td id="displayMonthEl" style="background:#000;color:#ff0;font-size:11px!important;font-weight:bold;text-transform:uppercase;width:34px;height:15px;padding-top:1px;text-align:center;" title="You are here: 6:30:40 Jun 15, 2009">JUN</td>
				<td style="padding-left:9px;font-size:11px!important;font-weight:bold;text-transform:uppercase;white-space:nowrap;overflow:visible;" nowrap="nowrap">
               
                       Jul
                       
               </td>
           </tr>

           <!-- NEXT/PREV CAPTURE NAV AND DAY OF MONTH INDICATOR -->
           <tr>
               <td style="padding-right:9px;white-space:nowrap;overflow:visible;text-align:right!important;vertical-align:middle!important;" nowrap="nowrap">
               
		                <a href="http://replay.waybackmachine.org/20081007205441/http://blogs.eweek.com/cheap_hack/content/border_security/blog_skypetunnel_a_horrifying_idea_1.html" title="20:54:41 Okt 7, 2008" style="background-color:transparent;border:none;"><img src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/wm_tb_pr.png" alt="Previous capture" width="14" height="16" border="0" /></a>
		                
               </td>
               <td id="displayDayEl" style="background:#000;color:#ff0;width:34px;height:24px;padding:2px 0 0 0;text-align:center;font-size:24px;font-weight: bold;" title="You are here: 6:30:40 Jun 15, 2009">15</td>
				<td style="padding-left:9px;white-space:nowrap;overflow:visible;text-align:left!important;vertical-align:middle!important;" nowrap="nowrap">
               
                       <img src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/wm_tb_nx.png" alt="Next capture" width="14" height="16" border="0"/>
                       
			    </td>
           </tr>

           <!-- NEXT/PREV YEAR NAV AND YEAR INDICATOR -->
           <tr style="width:110px;height:13px;font-size:9px!important;">
				<td style="padding-right:9px;font-size:11px!important;font-weight: bold;text-align:right;white-space:nowrap;overflow:visible;" nowrap="nowrap">
               
		                <a href="http://replay.waybackmachine.org/20080606221613/http://blogs.eweek.com/cheap_hack/content/border_security/blog_skypetunnel_a_horrifying_idea_1.html" style="text-decoration:none;color:#33f;font-weight:bold;background-color:transparent;border:none;" title="6 Jun 2008"><strong>2008</strong></a>
		                
               </td>
               <td id="displayYearEl" style="background:#000;color:#ff0;font-size:11px!important;font-weight: bold;padding-top:1px;width:34px;height:13px;text-align:center;" title="You are here: 6:30:40 Jun 15, 2009">2009</td>
				<td style="padding-left:9px;font-size:11px!important;font-weight: bold;white-space:nowrap;overflow:visible;" nowrap="nowrap">
               
                       2010
                       
				</td>
           </tr>
           </tbody></table>
       </td>

       </tr>
       <tr>
       <td style="vertical-align:middle;padding:0!important;">
           <a href="http://waybackmachine.org/20090615063040*/http://blogs.eweek.com/cheap_hack/content/border_security/blog_skypetunnel_a_horrifying_idea_1.html" style="color:#33f;font-size:11px;font-weight:bold;background-color:transparent;border:none;" title="See a list of every capture for this URL"><strong>42 captures</strong></a>
           <div style="margin:0!important;padding:0!important;color:#666;font-size:9px;padding-top:2px!important;white-space:nowrap;" title="Timespan for captures of this URL">6 Jun 07 - 15 Jun 09</div>
       </td>
       <td style="padding:0!important;">
       <a style="position:relative; white-space:nowrap; width:400px;height:27px;" href="" id="wm-graph-anchor">
       <div id="wm-ipp-sparkline" style="position:relative; white-space:nowrap; width:400px;height:27px;background-color:#fff;cursor:pointer;border-right:1px solid #ccc;" title="Explore captures for this URL">
			<img id="sparklineImgId" style="position:absolute; z-index:9012; top:0px; left:0px;"
				onmouseover="showTrackers('inline');" 
				onmouseout="showTrackers('none');"
				onmousemove="trackMouseMove(event,this)"
				alt="sparklines"
				width="400"
				height="27"
				border="0"
				src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/graph000.png"></img>
			<img id="wbMouseTrackYearImg" 
				style="display:none; position:absolute; z-index:9010;"
				width="25" 
				height="27"
				border="0"
				src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/transp-y.png"></img>
			<img id="wbMouseTrackMonthImg"
				style="display:none; position:absolute; z-index:9011; " 
				width="2"
				height="27" 
				border="0"
				src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/transp-r.png"></img>
       </div>
		</a>

       </td>
       </tr></tbody></table>
   </td>
   <td style="text-align:right;padding:5px;width:65px;font-size:11px!important;">
       <a href="javascript:;" onclick="document.getElementById('wm-ipp').style.display='none';" style="display:block;padding-right:18px;background:url(http://static.waybackmachine.org/images/toolbar/wm_tb_close.png) no-repeat 100% 0;color:#33f;font-family:'Lucida Grande','Arial',sans-serif;margin-bottom:23px;background-color:transparent;border:none;" title="Close the toolbar">Close</a>
       <a href="http://faq.waybackmachine.org/" style="display:block;padding-right:18px;background:url(http://static.waybackmachine.org/images/toolbar/wm_tb_help.png) no-repeat 100% 0;color:#33f;font-family:'Lucida Grande','Arial',sans-serif;background-color:transparent;border:none;" title="Get some help using the Wayback Machine">Help</a>
   </td>
   </tr></tbody></table>

</div>
</div>
<script type="text/javascript">
 var wmDisclaimBanner = document.getElementById("wm-ipp");
 if(wmDisclaimBanner != null) {
   disclaimElement(wmDisclaimBanner);
 }
</script>
<!-- END WAYBACK TOOLBAR INSERT -->

<table width="1002" border="0" align="center" cellpadding="0" cellspacing="0" id="mainContainer">

<tr>
    <td colspan="2"><img src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/gw-heade.jpg" alt="Header" width="1002" height="84" border="0" usemap="#headerMap" title="Header" style="display:block;" />
	<map name="headerMap" id="headerMap">
       <area shape="rect" coords="870,12,999,35" href="http://replay.waybackmachine.org/20090615063040/http://www.ziffdavisenterprise.com/" target="_blank" alt="Ziff Davis Enterprise" />
       <area shape="rect" coords="6,5,444,79" href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/" />
      </map>
    <div id="topBar"><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/" target="_blank">All Blogs</a> &#149; <a href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/" target="_blank">eWEEK</a> &#149; <a href="http://replay.waybackmachine.org/20090615063040/http://www.baselinemag.com/" target="_blank">BASELINE</a> &#149; <a href="http://replay.waybackmachine.org/20090615063040/http://www.cioinsight.com/" target="_blank">CIO INSIGHT</a> &#149; <a href="http://replay.waybackmachine.org/20090615063040/http://googlewatch.eweek.com/" target="_blank">GOOGLE WATCH</a> &#149; <a href="http://replay.waybackmachine.org/20090615063040/http://www.linux-watch.com/" target="_blank">LINUX WATCH</a> &#149; <a href="http://replay.waybackmachine.org/20090615063040/http://www.webbuyersguide.com/" target="_blank">RESOURCE LIBRART</a></div></td>
  </tr>

  <tr>
    <td colspan="2" valign="top" id="topBanner"><div id="topBannerBig"><img src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/advertis.gif" alt="Advertisement" width="78" height="7" class="adSign" title="Advertisement" />
<iframe src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/script00.htm" width="728" height="90" frameborder="no" border="0" marginwidth="0" marginheight="0" scrolling="No" hspace="5"> <a href="http://replay.waybackmachine.org/20090615063040/http://ad.doubleclick.net/jump/entzd.eweek/blog/cheap_hack;abr=!ie;sz=728x90;ord=%3Cscript%3Edocument.write(Math.random()*10000000000000000)%3C/script%3E" target="_top"> <img src="http://replay.waybackmachine.org/20090615063040im_/http://ad.doubleclick.net/ad/entzd.eweek/blog/cheap_hack;abr=!ie;sz=728x90;ord=%3Cscript%3Edocument.write(Math.random()*10000000000000000)%3C/script%3E" border="0" height="90" width="728" hspace="5" /></a></iframe>
      </div>
      <div id="topBannerSmall"><img src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/advertis.gif" alt="Advertisement" width="78" height="7" class="adSign" title="Advertisement" />
<iframe src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/script01.htm" width="160" height="90" frameborder="no" border="0" marginwidth="0" marginheight="0" scrolling="No" hspace="5"> <a href="http://replay.waybackmachine.org/20090615063040/http://ad.doubleclick.net/jump/entzd.eweek/blog/cheap_hack;abr=!ie;sz=160x90;ord=%3Cscript%3Edocument.write(Math.random()*10000000000000000)%3C/script%3E" target="_top"> <img src="http://replay.waybackmachine.org/20090615063040im_/http://ad.doubleclick.net/ad/entzd.eweek/blog/cheap_hack;abr=!ie;sz=160x90;ord=%3Cscript%3Edocument.write(Math.random()*10000000000000000)%3C/script%3E" border="0" height="90" width="728" hspace="5" /></a></iframe>

      </div></td>
  </tr>
  <tr>
    <td colspan="2"><div class="sep1"></div>
      <div id="topNavBar">
        <div id="topNavBarLinks"><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/index.html">Home</a> | <a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/gotatip.php">Got a Tip?</a> | <a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/sitemap.php">Archive</a> | <a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/" target="_blank">All Blogs</a></div>
        <div id="topNavBarForm">
<form id="topSearch" name="topSearch" method="get" action="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cgi-bin/mte/mt-search.cgi">      
<input type="hidden" value="48" name="IncludeBlogs">
            <input name="search" type="text" id="search" size="30" />
<input type="image" name="submit" href="javascript document.topSearch.submit();" src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/searchBa.gif" alt="Submit" border="0" width="66" height="24" style="vertical-align: middle;margin-left:4px;border:none;">
          </form>
        </div>
      </div>
      <div class="sep2"></div></td>
  </tr>
  <tr>
    <!-- Left Column -->
    <td width="652" valign="top" id="leftColumn"><!-- Entry -->
	<div id="breadcrumbs"> <a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/index.html"> Home </a> >> <a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/border_security/">Border Security</a>  >> <a href="">Skypetunnel: A Horrifying Idea</a> </div>
	<!--
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
         xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/"
         xmlns:dc="http://purl.org/dc/elements/1.1/">
<rdf:Description
    rdf:about="http://blogs.eweek.com/cheap_hack/content/border_security/blog_skypetunnel_a_horrifying_idea_1.html"
    trackback:ping="http://blogs.eweek.com/cgi-bin/mte/mt-tb.cgi/11078"
    dc:title="Skypetunnel: A Horrifying Idea"
    dc:identifier="http://blogs.eweek.com/cheap_hack/content/border_security/blog_skypetunnel_a_horrifying_idea_1.html"
    dc:subject="Border Security"
    dc:description="Just what corporate network administrators needed to hear: Let&apos;s turn Skype into a VPN tunnel. Peeter P. M&#245;tsk&#252;la in his Skype Developer Blog proposed using the Skype client API (ap2ap) to tunnel other services over the network. Since all Skype..."
    dc:creator="Larry Seltzer"
    dc:date="2007-05-29T22:07:11-05:00" />
</rdf:RDF>
-->

      <div class="entry">
 <span class="date">Tuesday, May  29, 2007 10:07 PM/EST</span>
        <h1><a href="">Skypetunnel: A Horrifying Idea</a></h1>
        
	<table style="display:block;clear:both;float:none;border:none;" width="100%" border="0" cellspacing="0" cellpadding="0">
      <tr>
        <td style="border:none;">
          <p>Just what corporate network administrators needed to hear: Let's turn Skype into a VPN tunnel.</p>

<p>Peeter P. M&#245;tsk&#252;la in <a href="http://replay.waybackmachine.org/20090615063040/http://share.skype.com/sites/devzone/2007/05/idea_skypetunnel.html">his Skype Developer Blog proposed</a> using the Skype client API (ap2ap) to tunnel other services over the network. Since all Skype traffic is encrypted, an admin would have no way to know what was going on.</p>

<p>Some admins already do what they can to root Skype out of the network, but if you aren't blocking it, this notion should be reason enough to do so, even if you think it's futile to try. Skype is not a controllable application. At least not the free personal Skype. The business Skype version is supposedly manageable to allow blocking of the client API.</p> </td>
      </tr>
    </table>
		    
		
		<p class="entry-footer"><span class="post-footers">Posted by 
Larry Seltzer on May 29, 2007 10:07 PM</span></p><div class="entryLinks"><a class="permalink" href="">Permalink</a> | <a class="commentButton" href="">Comment (19)</a>  | 
<a class="deliciousButton" target="_blank" href="http://replay.waybackmachine.org/20090615063040/http://del.icio.us/post?url=http://blogs.eweek.com/cheap_hack/content/border_security/blog_skypetunnel_a_horrifying_idea_1.html&title=Skypetunnel%3A%20A%20Horrifying%20Idea"> del.icio.us</a> | <a class="diggButton" target="_blank" href="http://replay.waybackmachine.org/20090615063040/http://digg.com/submit?phase=2&url=http://blogs.eweek.com/cheap_hack/content/border_security/blog_skypetunnel_a_horrifying_idea_1.html&title=Skypetunnel%3A%20A%20Horrifying%20Idea">digg.com</a>
<div style="margin-top:2px;font-size:11px;">View all of <a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/border_security/">Border Security</a></div>
    </div>
      </div>

      <!-- Marketplace -->
<!-- Marketplace -->
<div id="googlemp">
	<script type="text/javascript"><!--
		google_ad_client = "pub-6422417422167576";
		//EweekBlogs 336x280, created 1/22/08
		google_ad_slot = "2815687784";
		google_ad_width = 336;
		google_ad_height = 280;
	//-->
	</script>
	<script type="text/javascript" src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/show_ads.htm"></script>
</div>
<!-- Marketplace -->
      <!-- /Marketplace -->


  <div class="trackback"><img src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/trackbac.gif" alt="TrackBack" title="TrackBack" />
    <h3>TrackBack</h3>
     http://blogs.eweek.com/cgi-bin/mte/mt-tb.cgi/11078 
    

      
   
  </div>




  <div id="comments" class="comments">
    
      
      <div class="comments-content">
        <h3 class="comments-header">Comments (19)</h3>
        
        <a id="c134229"></a>
        <div class="comment" id="comment-134229">
          <div class="comment-inner">
            <div class="comment-header"> RG
              : </div>
            <div class="comment-content"> <p>Food for thought: the only reason employees would even care about something like tunneling over Skype is that they can't do their jobs in the network environment the IT group has created.  </p>

<p>Some real-world examples:<br />
 - Wall Street banker assigned to cover media companies can't get to prominent media sites because they are all blacklisted.<br />
- Corporate firewall strips all ZIPs so there is no way to exchange files with contractors.<br />
- Firewall prohibits programmers from visiting programming websites.  The workaround in this case was to install a separate dial-up phone line for the programmers.</p>

<p>And so forth.  When faced with a crappy IT environment on the one hand, and bonus-impacting goals on the other, your users will do anything possible to circumvent your controls.</p> </div>
            <p class="comment-footer"> Posted by
              RG 
              
               | <a href="">May 31, 2007  4:21 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c134250"></a>
        <div class="comment" id="comment-134250">
          <div class="comment-inner">
            <div class="comment-header"> Bob Francis
              : </div>
            <div class="comment-content"> <p>If you don't have strict rules regarding what is and what is not allowed on your network, AND ENFORCE THEM, then this truly will be horrifying.</p>

<p>Our network is business use only and even the slightest infringements have very negative repercussions.  But, once everyone got used to playing by the rules and used to not having network and virus problems, everything and everyone has been happy and smooth.</p>

<p>Skype, among many other common end user apps installed without permission,  is NOT your friend!  </p>

<p>Bob</p> </div>
            <p class="comment-footer"> Posted by
              Bob Francis 
              
               | <a href="">May 31, 2007  5:14 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c134281"></a>
        <div class="comment" id="comment-134281">
          <div class="comment-inner">
            <div class="comment-header"> <a title="http://www.MayoCommunications.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.mayocommunications.com/" rel="nofollow">George McQuade</a>
              : </div>
            <div class="comment-content"> <p>Larry,<br />
My wife uses Skype to call her sisters in<br />
Argentina, and Israel. It works great in<br />
real time, similar to Google Talk. </p>

<p>However, P2P is not a viable business model,<br />
and we totally agree with you on this one<br />
especially after reading about this study<br />
release two months ago from the USPTO Office:</p>

<p>The �Dirty Little Secrets of P2P: What Internet Users Don�t Know,� is Detailed in a Government Study on Popular networks: Don't take my word for it. Visit: <br />
<a href="http://replay.waybackmachine.org/20090615063040/http://www.uspto.gov/web/offices/dcom/olia/copyright/oir_report_on_inadvertent_sharing_v1012.pdf" rel="nofollow">http://www.uspto.gov/web/offices/dcom/olia/copyright/oir_report_on_inadvertent_sharing_v1012.pdf</a></p> </div>
            <p class="comment-footer"> Posted by
              <a title="http://www.MayoCommunications.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.mayocommunications.com/" rel="nofollow">George McQuade</a> 
              
               | <a href="">May 31, 2007  6:18 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c134371"></a>
        <div class="comment" id="comment-134371">
          <div class="comment-inner">
            <div class="comment-header"> <a title="http://security.eweek.com" href="http://replay.waybackmachine.org/20090615063040/http://security.eweek.com/" rel="nofollow">Larry Seltzer</a>
              : </div>
            <div class="comment-content"> <p>RG - I don't think that's the only reason. I can think of lots of nefarious reasons for doing it. </p> </div>
            <p class="comment-footer"> Posted by
              <a title="http://security.eweek.com" href="http://replay.waybackmachine.org/20090615063040/http://security.eweek.com/" rel="nofollow">Larry Seltzer</a> 
              
               | <a href="">May 31, 2007  7:45 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c134382"></a>
        <div class="comment" id="comment-134382">
          <div class="comment-inner">
            <div class="comment-header"> <a title="http://www.msfa.org" href="http://replay.waybackmachine.org/20090615063040/http://www.msfa.org/" rel="nofollow">Richard snader</a>
              : </div>
            <div class="comment-content"> <p>hmmmm, Skype tunnel....  I don't use skype, but then why would I need a skype tunnel, I have an RDP Tunnel.  I have a Citrix Tunnel.  I have a PC Anywhere tunnel.  You get the point.  If employees want to use encrypted methods to get external data in or internal data out, Skype is the least of the Security Administrator's problems.<br />
</p> </div>
            <p class="comment-footer"> Posted by
              <a title="http://www.msfa.org" href="http://replay.waybackmachine.org/20090615063040/http://www.msfa.org/" rel="nofollow">Richard snader</a> 
              
               | <a href="">May 31, 2007  8:24 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c134384"></a>
        <div class="comment" id="comment-134384">
          <div class="comment-inner">
            <div class="comment-header"> price
              : </div>
            <div class="comment-content"> <p>You already can use Skype for application tunneling. Timbuktu, the remote control application can already use the Skype API and run remote control sessions through a tunnel.</p>

<p>While interesting, based on my use of Timbuktu, the performance of running any apps through the tunnel is shaky at best. It is very, very slow, even on fast links.</p>

<p>If you need an 'on-demand' private VPN, use Hamachi.</p> </div>
            <p class="comment-footer"> Posted by
              price 
              
               | <a href="">May 31, 2007  8:30 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c134410"></a>
        <div class="comment" id="comment-134410">
          <div class="comment-inner">
            <div class="comment-header"> <a title="http://www.dc0de.com" href="http://replay.waybackmachine.org/20090615063040/http://www.dc0de.com/" rel="nofollow">Jim Noble</a>
              : </div>
            <div class="comment-content"> <p>Why is skype getting all of this fear mongering?</p>

<p>The Onion Router (TOR - <a href="http://replay.waybackmachine.org/20090615063040/http://tor.eff.org)" rel="nofollow">http://tor.eff.org)</a> is a fantastic way of circumventing IT controls in just about ANY network.  I can run TOR with my altirus software virtualization tool (free), and i can do it from my 4GB USB Thumbdrive.  </p>

<p>I have worked in environments where the IT security and network staff felt that they knew exactly what was going on, however, since all of my outbound network traffic was tunneled over TOR, (at least the information that I didn't want them to see), I could still perform any feat or action that I desired on the internet.</p>

<p>My main point here is not to run away from these applications.  They have their place.  I use TOR primarily to surf competitors web sites, when I don't want my company's IP Address showing up in the web logs, however, when draconian rules are applied as described by the previous posters, these people need to understand that "tightening the screws" will only make people find these tools, and deploy them.</p>

<p>For those of you who want a real experience with something truly scary, take a look at Anonym.OS,a bootable ISO image, that is a hardened BSD, not allowing any ingress traffic, that can stealthily enter most networks, and communicate to the internet anonymously... (btw, it was released to the general public on Thursday, 23 February 2006, at ShmooCon in Washington DC), you can find it here... <a href="http://replay.waybackmachine.org/20090615063040/http://sourceforge.net/projects/anonym-os/" rel="nofollow">http://sourceforge.net/projects/anonym-os/</a><br />
</p> </div>
            <p class="comment-footer"> Posted by
              <a title="http://www.dc0de.com" href="http://replay.waybackmachine.org/20090615063040/http://www.dc0de.com/" rel="nofollow">Jim Noble</a> 
              
               | <a href="">May 31, 2007  9:33 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c134470"></a>
        <div class="comment" id="comment-134470">
          <div class="comment-inner">
            <div class="comment-header"> Diogenes
              : </div>
            <div class="comment-content"> <p>As in many such matters, it's easy to blame guns (or tunnels) for the disasters, when we should be educating and making more honest the people who handle them. </p>

<p>Tunnels don't kill systems; users kill systems. </p> </div>
            <p class="comment-footer"> Posted by
              Diogenes 
              
               | <a href="">June  1, 2007  2:04 AM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c134593"></a>
        <div class="comment" id="comment-134593">
          <div class="comment-inner">
            <div class="comment-header"> RG
              : </div>
            <div class="comment-content"> <p>RG - Please.  I.T. environments are locked down because users will happily surf porn sites, download games, forward virus laden jokes and click on anything that looks remotely interesting.<br />
if user requests access to a specific web site ( business related of course) they are granted access.<br />
stop complaining that IT is making your job impossible, they are protecting your sorry ass.<br />
 another RG.</p> </div>
            <p class="comment-footer"> Posted by
              RG 
              
               | <a href="">June  1, 2007  7:13 AM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c134603"></a>
        <div class="comment" id="comment-134603">
          <div class="comment-inner">
            <div class="comment-header"> An 'IT' man
              : </div>
            <div class="comment-content"> <p>For the 'Jim Noble's' out there..</p>

<p>How far do you want to take that game?? - Is it really worth your job?</p>

<p>Even booting into an alternate OS, there are ways of spotting you out of the herd.</p>

<p>I would suggest instead that if the bounds don't meet your needs, you tackle that issue from a political perspective, not a technological one.</p>

<p>IT is well aware that some kids never leave school behind.........</p> </div>
            <p class="comment-footer"> Posted by
              An 'IT' man 
              
               | <a href="">June  1, 2007  8:34 AM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c134630"></a>
        <div class="comment" id="comment-134630">
          <div class="comment-inner">
            <div class="comment-header"> DC
              : </div>
            <div class="comment-content"> <p>RG2 - I couln't agree with you more!  Users are simply selfish - they will click anything without forethought.  Here's a big 'Atta Boy' for you!</p> </div>
            <p class="comment-footer"> Posted by
              DC 
              
               | <a href="">June  1, 2007  9:35 AM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c135774"></a>
        <div class="comment" id="comment-135774">
          <div class="comment-inner">
            <div class="comment-header"> Mark
              : </div>
            <div class="comment-content"> <p>And to think most SMB executives complain that too much money is spent on IT!  They have NO idea of what we are saving them from...even when we try to tell them in simple language.  </p>

<p>The most common reaction is: Find sand, dig hole, insert head, cover up head. </p>

<p>Later, after the disaster, fire somebody and call an ultra expensive security contractor when if they had just listened in the first place...</p> </div>
            <p class="comment-footer"> Posted by
              Mark 
              
               | <a href="">June  4, 2007  3:38 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c135776"></a>
        <div class="comment" id="comment-135776">
          <div class="comment-inner">
            <div class="comment-header"> <a title="http://blogs.eweek.com/cheap_hack/" href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/" rel="nofollow">Larry Seltzer</a>
              : </div>
            <div class="comment-content"> <p>I'd like to apologize for a technical problem we had over the weekend with the blog. A couple of comments may have been lost.</p>

<p>Sorry.</p> </div>
            <p class="comment-footer"> Posted by
              <a title="http://blogs.eweek.com/cheap_hack/" href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/" rel="nofollow">Larry Seltzer</a> 
              
               | <a href="">June  4, 2007  3:54 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c135844"></a>
        <div class="comment" id="comment-135844">
          <div class="comment-inner">
            <div class="comment-header"> Les
              : </div>
            <div class="comment-content"> <p>The people in the IT department always know what is best for the company.  Their decisions should never be questioned by the management or other employees they are "saving".  </p>

<p>It seems the biggest problem most IT departments have is with the internet. If they could just find a way to shut it down except for about 10 minutes a day, they would not have to deal with all those people who keep coming up with ways to get around the safety net the IT has built around it.  </p>

<p>I don't know why more companies don't just shut it down.  Just think of the IT headaches that would stop.</p>

<p>Of course, it could be that the IT department at your company has an open mind and realizes that the internet is a tool to help people with their work, and that even though some people want to play and download porn, most do not.  At many companies, the management let's it's employees know that certain things will be monitored and will get you fired.</p>

<p>Skype is just a tool.  Perhaps the IT department should teach people how to use it for the benefit of the company, instead of worrying about it's abuse.</p> </div>
            <p class="comment-footer"> Posted by
              Les 
              
               | <a href="">June  4, 2007  7:08 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c136005"></a>
        <div class="comment" id="comment-136005">
          <div class="comment-inner">
            <div class="comment-header"> Gary Rathwell
              : </div>
            <div class="comment-content"> <p>Skype is a useful productivity tool, but just like the telephone that it supplements, it can be abused.  However, it is not the role of the IT Manager to control who a user calls on his telephone, his Skype, or file sharing utility.  It is the responsibility of the business management of the company to ensure that employees' efforts are focussed, that they observe the company's policies, and that they contribute to the bottom line.</p>

<p>By the same token, IT provides a service that should be purchased, or not, at the discretion of business management. If the manager responsible for a business unit choses to use Skype or other tool that is not approved by corporate IT, that should be within his (or her) authority.  He (or she) is  responsible for the performance of the business unit, not the IT manager.</p>

<p>This places the responsibility on the IT manager to offer productivity tools, monitoring systems, consulting services and training that business management want to buy.</p> </div>
            <p class="comment-footer"> Posted by
              Gary Rathwell 
              
               | <a href="">June  5, 2007  2:57 AM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c136029"></a>
        <div class="comment" id="comment-136029">
          <div class="comment-inner">
            <div class="comment-header"> <a title="http://rampart-ssh.com" href="http://replay.waybackmachine.org/20090615063040/http://rampart-ssh.com/" rel="nofollow">Vincent Biggar</a>
              : </div>
            <div class="comment-content"> <p>I am far from a security expert. My understanding of TOR is that it<br />
creates a tunnel where the data is encrypted once it hits the first<br />
router and is passed to multiple routers and handed back off to the<br />
destination unencrypted of course. Basically this ensures your privacy<br />
from the far end web site. Your data and URL history (Destination IP<br />
address and or DNS<br />
name) still passes through your corprate network and DNS servers or<br />
local internet service provider unencrypted. You aren't hiding <br />
anything,<br />
this is simply securing your privacy from the far end.</p>

<p>The bad thing is that all of your internet traffic will use the TOR<br />
network and you don't know who the owners of the TOR routers are. In <br />
the<br />
work environment this is a serious problem because you could be<br />
compromising your companys security and your own. I take pride in my<br />
work and who I work for. If you don't you should find a better job. <br />
Your<br />
company is supporting you. The better job you do for your company the<br />
better they can support you.</p> </div>
            <p class="comment-footer"> Posted by
              <a title="http://rampart-ssh.com" href="http://replay.waybackmachine.org/20090615063040/http://rampart-ssh.com/" rel="nofollow">Vincent Biggar</a> 
              
               | <a href="">June  5, 2007  5:36 AM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c137137"></a>
        <div class="comment" id="comment-137137">
          <div class="comment-inner">
            <div class="comment-header"> RJ
              : </div>
            <div class="comment-content"> <p>An additiaonal to J.N.'s<br />
<p><br />
The thing you violate by going around IT is trust. Sure people in your department may think it is cool that you can do stuff like that, but in reality they will trust you less if you blatently violate compnay guidelines. If you work in a place that this is the 'norm', then there are larger issues where you work. That situation isn't the case most places. In no way have I ever seen the end-run on IT perceived by managers as a trait that will lead promotions.  More generally it is perceived as 'If  cant maintain trust for something simple, we are not going to trust them with something complex.'  Once you violate trust it is almost impossible to get it back to the level it was at when it was lost. The thing that happened will always be in the back of the managers mind...<br />
<p></p>

<p>Depending on where you work, the thing you are doing may violate a contract the company has. Should your 'tricks' come to light they could loose the contract, lots of people would loose their jobs, not just you and some in IT.  It may take more work, but getting buy in to get restrictions modified for legitimate business use is the way it (and IT) works in the real world. Usually people doing the end-run on IT think that work is the right place to be IM'ing their friends from, visiting dating sites on the internet, trying to steal company proprietary information, or any other of a host of 'legitimate company use items'.  Don't be so selfish that you think you know what is best, or why a particular rule is implemented. Be part of the solution to change, not part of the problem.  <br />
<p></p>

<p>As for fear mongering around skype...I think the fear part should be how well is it encrypted. You can tunnel over other protocols. SSH for instance allows you to tunnel multiple ports though a single link. Those connections are secure between your host and the remote one. NO routers between you and the destination see the traffic, period.<br />
<p></p>

<p>If this had been marketed as Skype VPN would it have been spoken of differently? Yes, I know the only private part is to the skype server. Functionally there isn't much difference -- just a distinction of where the encryption/service stops.</p></p></p></p></p> </div>
            <p class="comment-footer"> Posted by
              RJ 
              
               | <a href="">June  7, 2007  7:05 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c140533"></a>
        <div class="comment" id="comment-140533">
          <div class="comment-inner">
            <div class="comment-header"> <a title="http://www.ssp-ltd.com" href="http://replay.waybackmachine.org/20090615063040/http://www.ssp-ltd.com/" rel="nofollow">David Marshall</a>
              : </div>
            <div class="comment-content"> <p>Most arguments used above are intended to instill or allay fear of the process used by Skype.  Any business that is sincere should ask its IT department to create dedicated homemade standalone networks and hardware that do the job. </p>

<p>Because all commercial, and most privately used, operating systems provide and depend upon, public network access they are unsuitable for secure work.  A properly outfitted IT department will have no problem designing and installing basic systems that are totally secure and independant of external support.  Those systems will be able to network within the dedicated environment only and will be supported internally also.  Constantly changing the encoding parameters and paradigms will ensure no one can listen in.  </p>

<p>The current spending habits of most corporations include upgrading software and hardware, neither of which are under the control of the buyer.  Then the upgrades are tested, sometimes for nearly a year before the upgrades are installed.  The expense for doing these upgrades and tests are enormous, especially when you consider the end result is that someone else's product has been tested and not the corporation's own.  That is a huge waste.  </p>

<p>Get the work done first, then use the outside systems for research but keep the two separate behind very high walls.  Employees were hired to work, not play with externals, and they do not need outside access if the corporation provides all the necessary materials and data. Data mining the outside world should be done by purchasing agents who buy the product, verify its accuracy, clean and disinfect it, and then mold it for internal use.</p>

<p>All the above can be done in a nearly real-time basis if the companies are sincere about security.  I believe it is already being done. The fact you don't know about it means their systems are working.  Check it out.</p> </div>
            <p class="comment-footer"> Posted by
              <a title="http://www.ssp-ltd.com" href="http://replay.waybackmachine.org/20090615063040/http://www.ssp-ltd.com/" rel="nofollow">David Marshall</a> 
              
               | <a href="">June 15, 2007 12:57 PM</a> </p>
          </div>
        </div>
        
    
      
        <a id="c146442"></a>
        <div class="comment" id="comment-146442">
          <div class="comment-inner">
            <div class="comment-header"> jt
              : </div>
            <div class="comment-content"> <p>DC's comment that "Users are simply selfish - they will click anything without forethought" reminds me of finance executives who say, "This would be a perfect business if we could just get rid of all the f!@#g people." And Customer Support would like to do without customers, and IT would like to do without users.</p>

<p>I see lots of whining from IT types who'd like to lock down the environment, and I think we all understand how much more safe & manageable that would be.  But RG's comment stands: "The only reason employees would even care about something like tunneling over Skype is that they can't do their jobs in the network environment the IT group has created."</p>

<p>There's going to be tension between IT & users about this. Hopefully creative or positive tension, depending on how you deal with it, but until users stop having very good reasons to do things that IT doesn't support, IT had better remember that they're a service dept, there to support, enable, facilitate - not get in the way. Firms are in business to get things done to make money, not to build circumscribed networks that are safe because they're disconnected from the outside world.</p>

<p>Try this:  Imagine someone just invented the telephone and your IT dept's reaction to it: "Sure users do business with it, they'll call Mom, or a phone sex line... they'll talk to competitors, headhunters, who knows what!" Wouldn't IT race HR to ban it completely? Wouldn't IT build Private Phone Networks so users could talk just with other internal offices? Everything would be safe. And IT would realize what they need next is to put a lock on the door to stop anyone ever leaving the building...</p> </div>
            <p class="comment-footer"> Posted by
              jt 
              
               | <a href="">June 27, 2007  2:53 PM</a> </p>
          </div>
        </div>
        
      </div>
      
    
    
      <div id="commentsTbl" class="commentsTbl">
        <form action="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cgi-bin/mte/mt-comments.cgi" method="post" name="comments_form" id="comments_form" onsubmit="if (this.bakecookie.checked) rememberMe(this)">
          <input class="" name="static" value="1" type="hidden" />
          <input class="" name="entry_id" value="23303" type="hidden" />
          <h2>Post a Comment</h2>
          <table class="commentsTbl" cellpadding="2" cellspacing="0">
            <tr>
              <td align="right"><label for="comment-author">Name:</label></td>
              <td><input id="comment-author" name="author" size="35" /></td>
            </tr>
            <tr>
              <td align="right"><label for="comment-email">Email Address:</label></td>
              <td><input id="comment-email" name="email" size="35" type="" /></td>
            </tr>
            <tr>
              <td align="right"><label for="comment-url">URL:</label></td>
              <td><input id="comment-url" name="url" size="35" type="" /></td>
            </tr>
            <tr>
              <td align="right">&nbsp;</td>
              <td><label for="comment-bake-cookie">
                <input id="comment-bake-cookie" name="bakecookie" onclick="if (!this.checked) forgetMe(document.comments_form)" value="1" type="checkbox" class="noBorder" />
                Check to remember personal info</label></td>
            </tr>
            <tr>
              <td align="right" valign="top"><label for="comment-text">Comments:<br />
                <span style="font-weight:normal">(you may use<br />
                </span> <span style="font-weight:normal">HTML tags<br />
                </span> <span style="font-weight:normal">for style)</span></label></td>
              <td><textarea id="comment-text" name="text" rows="15" cols="50"></textarea></td>
            </tr>
            <tr>
              <td>&nbsp;</td>
              <td><input name="preview" id="comment-preview" href="javascript%20document.topSearch.preview%28%29;" src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/bpreview.gif" alt="Preview" style="vertical-align: middle;border:0;" type="image" />
                <input name="post" id="comment-post" href="javascript%20document.topSearch.preview%28%29;" src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/bpost000.gif" alt="Preview" style="border: medium none ; vertical-align: middle; margin-left: 4px;" border="0" type="image" />              </td>
            </tr>
          </table>
        </form>
      </div>
    
  </div>

    </td>
    <!-- /Left Column -->
    <!-- Right Column -->
    <td width="350" valign="top" id="rightColumn">

<div class="rtBar-01">
<h1><a href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Security/">Tech Security News</a></h1>

<ul><li><a href="http://replay.waybackmachine.org/20090615063040/http://feedproxy.google.com/~r/RSS/eweeksecurity/~3/x3UpxqRka14/">It May Be Time to Abandon Adobe</a></li><li><a href="http://replay.waybackmachine.org/20090615063040/http://feedproxy.google.com/~r/RSS/eweeksecurity/~3/sah-4kXJa9c/">Apple Fixes AirPort Base Station, Time Capsule Security Flaws</a></li><li><a href="http://replay.waybackmachine.org/20090615063040/http://feedproxy.google.com/~r/RSS/eweeksecurity/~3/y4xcMm0Rugg/">Security Report Ignites Firefox vs. Internet Explorer Feud</a></li><li><a href="http://replay.waybackmachine.org/20090615063040/http://feedproxy.google.com/~r/RSS/eweeksecurity/~3/D3TIoTA80G0/">Microsoft Plans Three Security Bulletins for Patch Tuesday</a></li><li><a href="http://replay.waybackmachine.org/20090615063040/http://feedproxy.google.com/~r/RSS/eweeksecurity/~3/0zEVzWdhluE/">How to Match Your Security Needs to Your IT Infrastructure Budget</a></li><li><a href="http://replay.waybackmachine.org/20090615063040/http://feedproxy.google.com/~r/RSS/eweeksecurity/~3/PR3cJwubWFo/">Security Consultant Turned Hacker Gets Prison for Running Botnet</a></li><li><a href="http://replay.waybackmachine.org/20090615063040/http://feedproxy.google.com/~r/RSS/eweeksecurity/~3/kiWsQyeCzKQ/">Protect Yourself from IT Staff Abuse: How to Manage Privileged Identities</a></li><li><a href="http://replay.waybackmachine.org/20090615063040/http://feedproxy.google.com/~r/RSS/eweeksecurity/~3/O3HbU1OZLMk/">Security Without Performance Compromise</a></li><li><a href="http://replay.waybackmachine.org/20090615063040/http://feedproxy.google.com/~r/RSS/eweeksecurity/~3/M_qvrwBOv7Y/">eWEEK Labs How-To: Using the NoScript Extension for Firefox to Protect Against Web-Based Malware</a></li><li><a href="http://replay.waybackmachine.org/20090615063040/http://feedproxy.google.com/~r/RSS/eweeksecurity/~3/Sh3tXWuL7_4/">Security Experts Weigh In on Insider Threats</a></li></ul>

</div>


<div class="rtBar-mpu"> <img src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/advertis.gif" alt="Advertisement" width="78" height="7" class="adSign" style="text-align: left" title="Advertisement" />
        <div>
<IFRAME SRC="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/script02.htm" width="336" height="280" frameborder="no" border="0" MARGINWIDTH="0" MARGINHEIGHT="0" SCROLLING="no" hspace="5">
<A HREF="http://replay.waybackmachine.org/20090615063040/http://ad.doubleclick.net/jump/entzd.eweek/blog/cheap_hack;abr=!ie;sz=336x280;tile=1;ord=%3Cscript%3Edocument.write(Math.random()*10000000000000000)%3C/script%3E" TARGET="_top">
<img SRC="http://replay.waybackmachine.org/20090615063040im_/http://ad.doubleclick.net/ad/entzd.eweek/blog/cheap_hack;abr=!ie;sz=336x80;tile=1;ord=%3Cscript%3Edocument.write(Math.random()*10000000000000000)%3C/script%3E" border="0" height="90" width="728" hspace="5"></A></IFRAME>
</div></div>

<div class="rtBar-cat-cont">
	  
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/apple/">Apple</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/border_security/">Border Security</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/browsers/">browsers</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/dns/">DNS</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/dns/domain_name_market/">Domain Name Market</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/dns/domain_theft/">Domain Theft</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/email/">E-Mail</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/browsers/firefox/">Firefox</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/hacking/">Hacking</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/host_security/">Host Security</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/browsers/ie6/">IE6</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/browsers/ie7/">IE7</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/browsers/ie8/">IE8</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/internet_commerce/">Internet Commerce</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/internet_crime/">Internet Crime</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/it/">IT</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/malware/">Malware</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/microsoft/">Microsoft</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/networking/">Networking</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/microsoft/office/">Office</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/patches/">Patches</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/internet_commerce/phishing/">Phishing</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/browsers/safari/">Safari</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/security_software/">Security Software</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/microsoft/server/">Server</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/servers/">Servers</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/email/spam/">Spam</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/microsoft/vista/">Vista</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/wireless/">Wireless</a></h1>
        </div>
		
        <div class="rtBar-cat">
          <h1><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/microsoft/xp/">XP</a></h1>
        </div>
		
      </div>

<div class="rtBar-mpu"> <img src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/advertis.gif" alt="Advertisement" width="78" height="7" class="adSign" style="text-align: left" title="Advertisement" />
        <div>
	  <IFRAME SRC="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/script03.htm" width="336" height="280" frameborder="no" border="0" MARGINWIDTH="0" MARGINHEIGHT="0" SCROLLING="no" hspace="5">
<A HREF="http://replay.waybackmachine.org/20090615063040/http://ad.doubleclick.net/jump/entzd.eweek/blog/cheap_hack;abr=!ie;sz=336x280;tile=2;ord=%3Cscript%3Edocument.write(Math.random()*10000000000000000)%3C/script%3E" TARGET="_top">
<img SRC="http://replay.waybackmachine.org/20090615063040im_/http://ad.doubleclick.net/ad/entzd.eweek/blog/cheap_hack;abr=!ie;sz=336x80;tile=2;ord=%3Cscript%3Edocument.write(Math.random()*10000000000000000)%3C/script%3E" border="0" height="90" width="728" hspace="5"></A></IFRAME>
</div></div>

<div class="rtBar-rss">
        <h1><a href="http://replay.waybackmachine.org/20090615063040/http://feeds.ziffdavisenterprise.com/RSS/cheap_hack">Syndication</a></h1>
		<span style="padding-left:4px">Subscribe:</span>
        <ul style="margin-bottom: 8px;">
          <li><a href="http://replay.waybackmachine.org/20090615063040/http://feeds.ziffdavisenterprise.com/RSS/cheap_hack">RSS 2.0 </a></li>
        </ul>
		<span style="padding-left:4px">Blog Roll:</span>
         <ul class="links">
          <li><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/">eWeek</a></li>
          <li><a href="http://replay.waybackmachine.org/20090615063040/http://www.cioinsight.com/">CIO Insight</a></li>
          <li><a href="http://replay.waybackmachine.org/20090615063040/http://googlewatch.eweek.com/watch/google/default.aspx">Google Watch</a></li>
          <li><a href="http://replay.waybackmachine.org/20090615063040/http://www.microsoft-watch.com/">Microsoft Watch</a></li>
        </ul>
     </div>

</td>
    <!-- /Right Column-->
  </tr>
  <tr>
<!-- Footer -->
    <td colspan="2" id="footer"><div class="sep2"></div><div id="footerInfo">
      <h1>Cheap Hack</h1>
      <p><a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/contact.php">Contact Us</a> | <a href="http://replay.waybackmachine.org/20090615063040/http://www.ziffdavisenterpriseonline.com/advertise/overview">Advertise</a> | <a href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/sitemap.php">Site Map</a></p>
    </div><div class="sep1"></div>
    <div id="logo">
      <div align="center"> </div>
    </div>
	<div id="notice">    </div></td>
  </tr>
  <tr>
    <td colspan="2" id="footer" style="padding:12px;"><table cellspacing="0" cellpadding="0" bordercolor="#ff0000" border="0" _base_href="http://www.eweek.com/" style="border:0px;">
 <tr _base_href="http://www.eweek.com/">
  <td valign="top" align="center" _base_href="http://www.eweek.com/" style="padding: 7px; width: 120px;"><img width="108" height="21" border="0" _base_href="http://www.eweek.com/" title="eWEEK Quick LInks" alt="eWEEK Quick LInks" src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/quicklin.gif"/></td>
  <td _base_href="http://www.eweek.com/">
<p style="margin-top: 5px;" class="Footer_Text">
</p><div class="footerbox"><strong>Security:</strong><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Security/">Enterprise Security</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Enterprise-Networking/">Network Security</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/IT-Infrastructure/">Infrastructure Security</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/a/Security/How-to-Avoid-the-Next-Data-Breach/">How To: Data</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Security/News/">IT Security News</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/">Cheap Hack Blog</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://securitywatch.eweek.com/">Security Watch Blog</a><br/></div>

<div class="footerbox"><strong>Storage:</strong><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Data-Storage/">Data Storage</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Cloud-Computing/">Cloud Storage</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Virtualization/">Storage Virtualization</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.scalablenasroom.com/">Network Access Storage</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Data-Storage/Reviews/">Storage Reviews</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Data-Storage/News/">Data Storage News</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/a/Enterprise-Applications/How-to-Discover-the-Hidden-Meaning-in-Unstructured-Data/">How To: Storage</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/storage_station/">Storage Station Blog</a><br/></div>

<div class="footerbox"><strong>Computing:</strong><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Apple/">Apple OSX</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Linux-and-Open-Source/">Linux Systems</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Windows/">Windows Vista</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Printers/">Managed Print Services</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Cloud-Computing/">Cloud Computing</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Desktops-and-Notebooks/">PC Reviews</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.microsoft-watch.com/">Microsoft Watch Blog</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/applewatch">Apple Watch Blog</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://googlewatch.eweek.com/">Google Watch Blog</a><br/></div>

<div class="footerbox"><strong>Communications:</strong><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/VOIP-and-Telephony/">VoIP Solutions</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Mobile-and-Wireless/">Wireless Technology</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Messaging-and-Collaboration/">Messaging Software</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Web-Services-Web-20-and-SOA/">Web Services</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Cloud-Computing/">Mobile Applications</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Mobile-and-Wireless/News/">Wireless News</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Mobile-and-Wireless/Reviews/">Mobile Reviews</a><br/></div>

<div class="footerbox"><strong>Apps & Development:</strong><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Application-Development/">Application Development</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Enterprise-Applications/">SAAS</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Search-Engines/">Search Engines</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Database/">Database Software</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Web-Services-Web-20-and-SOA/">Web 2.0</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/IT-Management/">IT Project Management</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://etech.eweek.com/">Emerging Tech Blog</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://blogs.cioinsight.com/">CIO Insight Blogs</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.cioinsight.com/">CIOs</a><br/></div>
<p/></td>
</tr><tr _base_href="http://www.eweek.com/"><td valign="top" _base_href="http://www.eweek.com/"><a _base_href="http://www.eweek.com/" class="Footer_ZD" title="Ziff Davis Enterprise Inc." name="Ziff Davis Enterprise Inc." href="http://replay.waybackmachine.org/20090615063040/http://www.ziffdavisenterprise.com/" rel="nofollow"><img border="0" align="left" _base_href="http://www.eweek.com/" src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/zde-logo.gif"/></a></td>
  <td _base_href="http://www.eweek.com/">
<p style="margin-top: 5px;" class="Footer_Text">
</p><div class="footerbox"><strong>Vertical Markets:</strong><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Government-IT/">Federal Government IT</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Health-Care-IT/">Health Care IT</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Finance-IT/">Finance IT</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Midmarket/">Mid-Market</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Channel/">Channel Partners</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/careers/">Careers Blog</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.channelinsider.com/">Value Added Resellers</a><br/></div>

<div class="footerbox"><strong>More eWeek Links:</strong><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/IT-Knowledge-Center/">Tech Knowledge Center</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/newsletter-manage/">Tech Newsletters</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/a/Past-News/Ziff-Davis-Enterprise-RSS-Feeds/">Tech RSS Feeds</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.webbuyersguide.com/bguide/Whitepaper/Wplibrary.asp_Q_sitename_E_webbuyersguide">White Papers</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Podcasts/">Tech Podcasts</a><br/>
<a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.eweek.com/c/s/Videos/">Tech Videos</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.omeda.com/ziff/ewk/ewk.cgi?&t=whback&p=lz3home">eWeek Magazine Subscriptions</a><br/></div>

<div class="footerbox"><strong>Enterprise Websites:</strong><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.ziffdavisenterprise.com/">ZDE Home</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.baselinemag.com/">Baseline</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.channelinsider.com/">Channel Insider</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.cioinsight.com/">CIO Insight</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.eseminarslive.com/">eSeminars</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.midmarket.eweek.com/">eWeek Mid-Market</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.publish.com/">Publish Online</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.webbuyersguide.com/">Web Buyers Guide</a><br/></div>

<div class="footerbox"><strong>Developer Websites:</strong><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.devshed.com/">Dev Shed</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.developershed.com/">DeveloperShed</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.aspfree.com/">ASP Free</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.devsource.com/">MS DevSource</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.seochat.com/">SEO Chat</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.codewalkers.com/">Codewalkers</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.tutorialized.com/">Tutorialized</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.scripts.com/">Scripts.com</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.devmechanic.com/">Dev Mechanic</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.devarticles.com/">Dev Articles</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.webhosters.com/">Web Hosters</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.devhardware.com/">Dev Hardware</a><br/></div>

<div class="footerbox"><strong>Technology Websites:</strong><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.deviceforge.com/">Device Forge</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.desktoplinux.com/">Desktop Linux</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.linuxdevices.com/">Linux Devices</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.windowsfordevices.com/">Windows for Devices</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.igrep.com/">iGrep Search Engine</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.pdfzone.com/">PDF Zone</a><br/>
<a _base_href="http://www.eweek.com/" target="_new" href="http://replay.waybackmachine.org/20090615063040/http://www.linux-watch.com/">Linux Watch</a><br/></div>
<p/></td>


 </tr>
<tr valign="top" bgcolor="#ffffff" align="left" _base_href="http://www.eweek.com/">
	<td _base_href="http://www.eweek.com/"><img width="108" height="15" align="left" _base_href="http://www.eweek.com/" src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/spacer00.gif"/></td>
	<td _base_href="http://www.eweek.com/"><p style="margin-top: 5px;" class="Footer_Text">Use of this site is governed by our <a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.ziffdavisenterprise.com/TermsofService.htm" rel="nofollow">Terms of Use</a> and <a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://www.ziffdavisenterprise.com/PrivacyPolicy.htm" rel="nofollow">Privacy Policy</a><br/>Copyright &copy;1996-2008 <a _base_href="http://www.eweek.com/" class="Footer_ZD" title="Ziff Davis Enterprise Holdings Inc." href="http://replay.waybackmachine.org/20090615063040/http://www.ziffdavisenterprise.com/">Ziff Davis Enterprise Holdings Inc.</a> All Rights Reserved. eWEEK and Spencer F. Katt, and Cheap Hack are trademarks of Ziff Davis Enterprise Holdings, Inc. Reproduction in whole or in part in any form or medium without express written permission of Ziff Davis Enterprise Inc. is prohibited.<br/>eWeek is your best source for the latest <a _base_href="http://www.eweek.com/" href="http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/">Technology News</a>.<br/>Hosted by <span onclick="window.location='http://replay.waybackmachine.org/20090615063040/http://www.hostway.com/'" class="botoverlink"><font color="blue">Hostway</font></span>. </p><p/></td>
</tr>

</tbody></table></td>
    <!-- /Footer -->

  </tr>
</table>
<!--################################################START OMNITURE CODE HERE########################################-->


<div class="omniture" style="display:none">
<!-- SiteCatalyst code version: G.9.Copyright 1997-2004 Omniture, Inc. More info available athttp://www.omniture.com -->
<script language="JavaScript"><!--
var s_pageName="Skypetunnel: A Horrifying Idea-Page001-23303"
var s_server=""
var s_channel="eWEEK Home>Blogs>Cheap Hack Home>Border Security"
var s_pageType=""
var s_prop1="Skypetunnel: A Horrifying Idea"
var s_prop2=""
var s_prop3="Larry Seltzer"
var s_prop4=""
var s_prop5="Online Article"
var s_prop6="Article Page"
var s_prop7="Unregistered"
var s_prop8=""
var s_prop9=""
var s_prop11="Tuesday, May  29, 2007"
var s_prop12="entzd.eweek/blog/cheap_hack"
var s_prop13=""
var s_campaign=""

var s_state=""
var s_zip=""
var s_events="event4"
var s_products=""
var s_purchaseID=""
var s_eVar1=""
var s_eVar2=""
var s_eVar3=""
var s_eVar4=""
var s_eVar5=""
var s_hier1="eWEEK Home>Blogs>Cheap Hack Home>Border Security>Skypetunnel: A Horrifying Idea-Page001-23303"

var s_account="ziffdavisglobal,ziffdavisenterpriseglobal,ziffdaviseweek"
//--></script>

<script language="JavaScript" src="Cheap%20Hack%20-%20Border%20Security%20-%20Skypetunnel_%20A%20Horrifying%20Idea_files/s_code_r.js"></script>

<script language="JavaScript">
<!--
    function sendAnalyticsEvent(accnt) {
	    s_prop13 += " | " + getBrowserURL();
        accnt=accnt?accnt:s_account;void(s_gs(accnt));
    }

    function getBrowserURL() {
		urlelements = document.location.href.split("/");
		returnvalue = "";
		
		for (var i = 2;i<urlelements.length;i++) {
			if (i>1) {
				subelements = urlelements[i].split(".");
				for (var u=0;u<subelements.length;u++) {
	                if (subelements[u]!="www") {
						returnvalue += subelements[u];
						if (u<subelements.length-1) {
                                         returnvalue += ".";
                        }
                     }
          	} 

            if (i<urlelements.length-1) {
               returnvalue += "/";
			   }   
			}
		}

		return returnvalue;
	}

              

    function sendLinkEvent(accnt,lnkname,type){
		accnt=accnt?accnt:s_account;s_linkType=type?type:"o";s_lnk=true;
		s_linkName=lnkname?lnkname:s_linkName?s_linkName:"Flash Link Event";
		void(s_gs(accnt))}
		
//--></script>
</div>

<!--################################################END OMNITURE CODE HERE########################################-->
<!-- eWeek Google Analytics Tracking Code-->
<script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://replay.waybackmachine.org/20090615063040/http://www/");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
try {
var pageTracker = _gat._getTracker("UA-2464436-1");
pageTracker._trackPageview();
} catch(err) {}</script>

<!-- Cheap Hack Google Analytics Tracking Code-->
<script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://replay.waybackmachine.org/20090615063040/http://www/");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
try {
var pageTracker = _gat._getTracker("UA-2464436-26");
pageTracker._trackPageview();
} catch(err) {}</script>


</body>
</html>





<!--
     FILE ARCHIVED ON 6:30:40 Jun 15, 2009 AND RETRIEVED FROM THE
     INTERNET ARCHIVE ON 20:34:45 Apr 6, 2011.
     JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE.

     ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C.
     SECTION 108(a)(3)).
-->

<!-- This document saved from http://replay.waybackmachine.org/20090615063040/http://blogs.eweek.com/cheap_hack/content/border_security/blog_skypetunnel_a_horrifying_idea_1.html -->
