Hello,
This can be done, and in such a way that your network admins will have a tough time determining what you're doing... but it's quite complicated to setup and will most likely get you fired if you're discovered. It also relies on an external machine on the internet which you're in control of.
Corporate firewalls normally allow secure web browsing on port 443 (HTTPS), so what you need to do is tunnel out of your network on this port by creating an encrypted SSH connection to your remote machine on the internet. Then, by reverse tunnelling this connection, people can connect to your remote computer which will forward the connections over the tunnel to your work machine where HFS is running. Because the tunnel is encrypted, your network admins won't be able to tell what it is that's running over this connection, but the persistent nature of the "HTTPS" connection from your work machine to the same address may eventually arouse suspicion. It can be done successfully using PuTTY and OpenSSH.
Good starting point article if you're interested:
http://www.marksanborn.net/howto/bypass-firewall-and-nat-with-reverse-ssh-tunnel/This technique is one of your network administrator's worst nightmares since it can effectively expose your entire corporate network to the internet. Use with extreme caution and be very aware of all the security you're bypassing by doing this.
Gauge