White paper discussing methodologies for accessing internal networks using HTTP tunneling and tricking end users.