Having worked at some places with what I would call "restrictive access policies" regarding internet sites and ports that can be accessed, as well as the software and configuration of computers issued to employees, I am led to the following question…