A proper security policy should take into consideration both the business need to accomplish work and the need for privacy and security. HTTP tunnels are necessary for SSL web browsing. However, due to a weakness in the CONNECT method in the HTTP protocol, arbitrary connection can be made through a...