Sounds like what you really want is to surf the web at work like you do at home. These are instructions written by a friend of mine (sharp dude) on how to set up a ssh tunnel threw the work proxy to your machine at home and use your own connection to surf. It's a little technical but where there's a will there's a way... enjoy:
SSH Tunneling Through an HTTP Proxy
If you’re behind a proxy that only allows traffic to pass through on port 80 (for http), and port 443 (SSL, for https, etc) which also employs some type of filtering which blocks content, you might be interested in this document.
This document describes a method for setting up a relatively secure tunnel between a client and a server, which allows passing through of practically any data. The aimed application of this guide is to help you pass through miscellaneous personal services from your home system (the server), and any system behind a proxy that blocks content (library, work, school, etc) with the use of only portable apps on the client side.
There are many methods for achieving the desired result, but by far the simplest safe method is setting up an SSH tunnel that allows forwarding of TCP traffic. This traffic is point to point encrypted, which makes it a prime candidate for passing through an SSL proxy (that’s right, we’ll be using port 443 here, so make sure you open that up on your router, or port forward, or use whatever method you must to make sure your home computer is open on the internet on that port). I’ve skipped a lot of the principles involved here to save space, and because a lot of people have described how this works, but not how it’s implemented.
Getting Started:
On the server (Home):
First, you must have administrative privileges on the server. If you don’t, stop here and work on getting them because that’s a necessity.
Download and install copSSH, a free package for windows, which installs Cygwin with the necessary parts for running an SSH server. Follow all of the instructions for installing this program including allowing it to create a user (if it asks), and activating the user account you’ll want to login with remotely from the client.
Once you’ve installed copSSH, you’ll need to edit the sshd_config file found in the /etc directory if you’re using the Cygwin terminal, or the etc folder located in the copSSH install folder. You’ll want to change or add a couple attributes.
The first attribute is Port, which should be 22 by default. Change it to 443
The second attribute is AllowTcpForwarding, which you’ll want to change, or uncomment to Yes.
Optional (Recommended):
Install TightVNC or whatever flavor of VNC you prefer, and Filezilla Server is recommended for file transfer.
On the client (School, Work, Library, Flashdisk):
Download and install TunnelierPortable, and insert your Server’s IP into the Host field, put 443 into the Port field, enter in you proxy information. Under Authentication enter in your “Activated” user’s username, select password in Initial Method, and enter the windows password into Password.
Under the Services tab, if you wish to socks proxy local socks requests to the server, enable Socks / HTTP Proxy Forwarding. This will be used in my description for your portable browser, and is recommended. Make sure you put the Listening Interface as 127.0.0.1, you’ll be a bit safer from your local Network Nazis, however, other systems won’t be able to use you as a socks proxy.
In the C2S Fwding tab, you’ll setup all of your port forwarding. Usually, you’ll want to forward from Listening Interface: 127.0.0.1 to Destination Host:localhost, which happens to be what’s autofilled into the fields when you click the add button, where List. Port and Dest. Port are the server and client mapped ports respectively. What exactly you need to forward is completely based upon what traffic you intend on passing through the tunnel, however, you don’t need to set anything up here if all you wish to pass through is HTTP.
Install FirefoxPortable, and Goto Tools -> Options, click the gear icon, or Advanced and choose the Network tab. Under Connection, click Settings, and setup the Socks Host as you did in the services tab in TunnelierPortable. Choose Socks v5 as the proxy type, and save your settings. This is all you should need to browse remotely using your server’s internet connection.