Quote from: ch0sen on December 06, 2012, 08:52 pmIf you are in a big company then I wouldn't worry about it. There is so much traffic in and out that you would have to do somethinglarge to get noticed. Lots of traffic to strange ports. Even then it might go unnoticed. Use obfuscation like suggested above.I work at a big company and I run back doors over 443 to avoid their corp. VPN. I have been doing this for years and have never been asked anything about my traffic. -I think we're long past the days of network monitoring being a simple history of ports and their associated protocols and connection times. Deep packet inspection can do very scary things. Things I don't even know about, really, because I don't spend my days making sure Iran and China can satisfactorily control their citizens with my company's hardware.What I'm thinking of is an article I saw several months ago about how an American company was selling one-piece-solutions to foreign countries so that they could accurately monitor and control their citizens online. The features they claimed/included were able to reveal a shocking amount of data, even to me -- a paranoid geek.I'm just pointing it out so that everyone's informed and all: very scary levels of monitoring are not only possible but done every day with existing hardware and software solutions. Whether or not they're done on you and me... well, of course -- but how much? Who knows.