Here's an article I found on Lifehacker, a useful, mainstream website. The article points to a step-by-step tutorial on how to circumvent IT's security controls using FreeProxy. Have a look.
Matt talks a little about circumventing applications in this post, and they are covered extensively in our Application Usage and Risk Report.