[or-cvs] Mozilla/Firefox instructions present in both win32 and osx....
thomass at seul.org
thomass at seul.org
Wed Mar 16 21:24:50 UTC 2005
Update of /home2/or/cvsroot/tor/doc
In directory moria.mit.edu:/tmp/cvs-serv10235
Modified Files:
tor-doc.html tor-doc-win32.html tor-doc-osx.html
Log Message:
Mozilla/Firefox instructions present in both win32 and osx. Added network-tools.com as a IP-test site.
Index: tor-doc.html
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/tor-doc.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -d -r1.52 -r1.53
--- tor-doc.html 15 Mar 2005 23:03:33 -0000 1.52
+++ tor-doc.html 16 Mar 2005 21:24:45 -0000 1.53
@@ -156,9 +156,8 @@
<p>Win32 users can use our Tor installer. See <a
href="tor-doc-win32.html">these instructions</a> for help with
installing, configuring, and using Tor on Win32.
-</p>
-
-<p>Mac OS X users can use our Tor installer. See <a
+<br />
+Mac OS X users can use our Tor installer. See <a
href="tor-doc-osx.html">these instructions</a> for help with
installing, configuring, and using Tor on Mac OS X.
</p>
@@ -201,10 +200,11 @@
you good html scrubbing.</p>
<p>To test if it's working, go to <a
-href="http://peertech.org/privacy-knoppix/">this site</a> and see
-what IP it says you're coming from. (If it's down, you can try the
-<a href="http://www.junkbusters.com/cgi-bin/privacy">junkbusters</a>
-site instead.)</p>
+href="http://peertech.org/privacy-knoppix/">peertech</a>,
+<a href="http://www.junkbusters.com/cgi-bin/privacy">junkbusters</a> or
+<a href="http://www.network-tools.com">network-tools</a>
+and see what IP it says you're coming from.
+</p>
<p>
If you have a personal firewall that limits your computer's ability
Index: tor-doc-win32.html
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/tor-doc-win32.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -d -r1.19 -r1.20
--- tor-doc-win32.html 15 Mar 2005 23:03:33 -0000 1.19
+++ tor-doc-win32.html 16 Mar 2005 21:24:45 -0000 1.20
@@ -92,6 +92,7 @@
<p>Then change your browser to HTTP proxy at localhost port 8118.
(That's where Privoxy listens.)
+In Firefox it's Firefox|Preferences|General|ConnectionSettings.
In Mozilla, this is in Edit|Preferences|Advanced|Proxies. In IE, it's
Tools|Internet Options|Connections|LAN Settings|Advanced.
You should also set your SSL proxy (IE calls it "Secure") to the same
@@ -109,11 +110,11 @@
web requests, and blocks obnoxious ad sites like Doubleclick.</p>
<p>To test if it's working, go to <a
-href="http://peertech.org/privacy-knoppix/">this site</a> and see
-what IP it says you're coming from. (If it's down, you can try the
-<a href="http://www.junkbusters.com/cgi-bin/privacy">junkbusters</a>
-site instead.)</p>
-
+href="http://peertech.org/privacy-knoppix/">peertech</a>,
+<a href="http://www.junkbusters.com/cgi-bin/privacy">junkbusters</a> or
+<a href="http://www.network-tools.com">network-tools</a>
+and see what IP it says you're coming from.
+</p>
<p>
If you have a personal firewall that limits your computer's ability
to connect to itself, be sure to allow connections from your local
@@ -133,10 +134,9 @@
<a href="http://www.freecap.ru/eng/">FreeCap</a>,
or the <a
href="http://www.hummingbird.com/products/nc/socks/index.html?cks=y">Hummingbird</a>
-SOCKS client. (FreeCap is free software; the others are proprietary.)
-Let us know if you get them working so we can add better
-instructions here.</p>
-
+SOCKS client. (FreeCap is free software; the others are proprietary.)<br />
+For more information how to Torify other applications in detail visit
+the <a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify HOWTO</a>.
<p>If you have suggestions for improving this document, please <a
href="mailto:tor-bugs at freehaven.net">send them to us</a>. Thanks!</p>
Index: tor-doc-osx.html
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/tor-doc-osx.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -d -r1.8 -r1.9
--- tor-doc-osx.html 15 Mar 2005 23:03:33 -0000 1.8
+++ tor-doc-osx.html 16 Mar 2005 21:24:45 -0000 1.9
@@ -114,10 +114,11 @@
web requests, and blocks obnoxious ad sites like Doubleclick.</p>
<p>To test if it's working, go to <a
-href="http://peertech.org/privacy-knoppix/">this site</a> and see
-what IP it says you're coming from. (If it's down, you can try the
-<a href="http://www.junkbusters.com/cgi-bin/privacy">junkbusters</a>
-site instead.)</p>
+href="http://peertech.org/privacy-knoppix/">peertech</a>,
+<a href="http://www.junkbusters.com/cgi-bin/privacy">junkbusters</a> or
+<a href="http://www.network-tools.com">network-tools</a>
+and see what IP it says you're coming from.
+</p>
<p>
If you have a personal firewall that limits your computer's ability
@@ -135,9 +136,10 @@
point your application directly at Tor (localhost port 9050). For
applications that support neither SOCKS nor HTTP, take a look at <a
href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a> or
-<a href="http://www.dest-unreach.org/socat/">socat</a>. Let us know if
-you get them working so we can add better instructions here.</p>
-
+<a href="http://www.dest-unreach.org/socat/">socat</a>.
+<br />
+For more information how to Torify other applications in detail visit
+the <a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify HOWTO</a>.
<p>If you have suggestions for improving this document, please post
them on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in the
website category. Thanks!</p>
More information about the tor-commits
mailing list