If you read ALL of the article, you will see that the author DOES discuss the reasons why you should NOT use these methods indiscriminately. In the course of doing LEGITIMATE work, many of us MUST use tricks to get around IT department security restrictions. For example, ALL HTML documents and ALL .ZIP files are blocked by our EMail server. We often need to send reports in HTML format to other people and send .ZIP files containing various types of other information. To do this, we have to change the file extension of the attachment. (Equivalent to smuggling AK-47s by putting them in a box labeled "shovels".) This article DOES discuss the risks associated with circumventing security (divulging confidential information, computer infection with viruses and other malware, etc.) Until IT department security policies become 100% based on reason, people who actually want to get their work done NEED to find ways to work around them WHEN NECESSARY. (NOT just to play games during work hours!)
John Morgan Center for Health Statistics Arkansas Department of Health and Human Services