Safely view PTB from office/work

While some of us are able to visit any site or blog from work, others are not as lucky. Some companies have policies that would not allow office employees to wander about online while at work. People have mastered the art of pretending to work bloghopping.

Here’s a nice tool you might want to check out: Work Friendly

The site basically rehashes your typical website or blog and makes it look like your regular Microsoft Word document. Available themes include Office 2003 Blue and Silver.

Check it out.

Disclaimer: Use at your own risk.

For more technology news and gadget reviews, follow us on Facebook, Twitter and Instagram
  • Yeah, it’s cool. But why are you posting as “Pinoytechblog admin”?

  • arthursoffice


    Typically, there is not much work to do in the office so I’m using my time surfing the net productively instead of doing nothing. Now, I don’t need to hide it from time to time. Plus, I can read the articles now from one of my favorite sites thru that because normally, they will restrict you to read it from their site. Para bang sinasabi nilang kailangan mong bilhin yung newspaper nila para mabasa mo yung article. But by using, you can read everything na! Ang galing ‘di ba?! Amazing!!!

  • I wouldn’t really recommend this. If your office has a policy against browsing the net, you could be a candidate for disciplinary action if discovered.

  • PoshNeya

    cool. hope we can play dota with this. j/k

  • It may also not work in some environments. Some corporate proxys can detect anonymizers and prevent access.

    Which brings me to alert and warn people: corporations that use proxys can log and detect your web activity. Even browse your email. So be careful. You can probably get away if you browse blogs or news sites, but you could be liable for some disciplinary action if you start viewing porn or play games.

  • *sniffer*

  • It’s basically stripping out the HTML of pages (and inserting a few font/text-related styles of its own).

    And yes, while the domains and URLs may be hidden by “anonymizers”, the actual text content of unencrypted sites can easily be caught by your network’s servers… (although I kinda doubt how many offices’ networks would have sniffers that sniffed through _everything_ like that).

  • I meant stripping out the CSS! Not the HTML. 🙂

  • Host you own server and tunnel thru SSH and you should be safe to avoid log. Unless they open 80 and plug the rest then that’s a different story.

  • Or use a VPN. I use iPIG when surfing at public WiFi hotspots.

  • Elmer/J Angelo,

    Public wi-fi spots should be ok. In fact, secure tunneling is the advised approach if you need to connect to your home or company server to avoid eavesdropping.

    But using tunneling to connect from your company PC to your home server can be risky. Some corporations won’t allow this.

    My message to all those trying this at work: be careful and read through your company’s internet policy. Any attempts to bypass the security mechanisms can lead to disciplinary actions, and it is best to assume that the network engineers know their job and can track this.