[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] Mozilla/Firefox instructions present in both win32 and osx....



Update of /home2/or/cvsroot/tor/doc
In directory moria.mit.edu:/tmp/cvs-serv10235

Modified Files:
	tor-doc.html tor-doc-win32.html tor-doc-osx.html 
Log Message:
Mozilla/Firefox instructions present in both win32 and osx. Added network-tools.com as a IP-test site.



Index: tor-doc.html
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/tor-doc.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -d -r1.52 -r1.53
--- tor-doc.html	15 Mar 2005 23:03:33 -0000	1.52
+++ tor-doc.html	16 Mar 2005 21:24:45 -0000	1.53
@@ -156,9 +156,8 @@
 <p>Win32 users can use our Tor installer. See <a
 href="tor-doc-win32.html">these instructions</a> for help with
 installing, configuring, and using Tor on Win32.
-</p>
-
-<p>Mac OS X users can use our Tor installer. See <a
+<br />
+Mac OS X users can use our Tor installer. See <a
 href="tor-doc-osx.html">these instructions</a> for help with
 installing, configuring, and using Tor on Mac OS X.
 </p>
@@ -201,10 +200,11 @@
 you good html scrubbing.</p>
 
 <p>To test if it's working, go to <a
-href="http://peertech.org/privacy-knoppix/";>this site</a> and see
-what IP it says you're coming from. (If it's down, you can try the
-<a href="http://www.junkbusters.com/cgi-bin/privacy";>junkbusters</a>
-site instead.)</p>
+href="http://peertech.org/privacy-knoppix/";>peertech</a>,
+<a href="http://www.junkbusters.com/cgi-bin/privacy";>junkbusters</a> or
+<a href="http://www.network-tools.com";>network-tools</a>
+and see what IP it says you're coming from.
+</p>
 
 <p>
 If you have a personal firewall that limits your computer's ability

Index: tor-doc-win32.html
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/tor-doc-win32.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -d -r1.19 -r1.20
--- tor-doc-win32.html	15 Mar 2005 23:03:33 -0000	1.19
+++ tor-doc-win32.html	16 Mar 2005 21:24:45 -0000	1.20
@@ -92,6 +92,7 @@
 
 <p>Then change your browser to HTTP proxy at localhost port 8118.
 (That's where Privoxy listens.)
+In Firefox it's Firefox|Preferences|General|ConnectionSettings.
 In Mozilla, this is in Edit|Preferences|Advanced|Proxies. In IE, it's
 Tools|Internet Options|Connections|LAN Settings|Advanced.
 You should also set your SSL proxy (IE calls it "Secure") to the same
@@ -109,11 +110,11 @@
 web requests, and blocks obnoxious ad sites like Doubleclick.</p>
 
 <p>To test if it's working, go to <a
-href="http://peertech.org/privacy-knoppix/";>this site</a> and see
-what IP it says you're coming from. (If it's down, you can try the
-<a href="http://www.junkbusters.com/cgi-bin/privacy";>junkbusters</a>
-site instead.)</p>
-
+href="http://peertech.org/privacy-knoppix/";>peertech</a>,
+<a href="http://www.junkbusters.com/cgi-bin/privacy";>junkbusters</a> or
+<a href="http://www.network-tools.com";>network-tools</a>
+and see what IP it says you're coming from.
+</p>
 <p>
 If you have a personal firewall that limits your computer's ability
 to connect to itself, be sure to allow connections from your local
@@ -133,10 +134,9 @@
 <a href="http://www.freecap.ru/eng/";>FreeCap</a>,
 or the <a
 href="http://www.hummingbird.com/products/nc/socks/index.html?cks=y";>Hummingbird</a>
-SOCKS client. (FreeCap is free software; the others are proprietary.)
-Let us know if you get them working so we can add better
-instructions here.</p>
-
+SOCKS client. (FreeCap is free software; the others are proprietary.)<br />
+For more information how to Torify other applications in detail visit
+the <a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO";>Torify HOWTO</a>.
 <p>If you have suggestions for improving this document, please <a
 href="mailto:tor-bugs@xxxxxxxxxxxxx";>send them to us</a>. Thanks!</p>
 

Index: tor-doc-osx.html
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/tor-doc-osx.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -d -r1.8 -r1.9
--- tor-doc-osx.html	15 Mar 2005 23:03:33 -0000	1.8
+++ tor-doc-osx.html	16 Mar 2005 21:24:45 -0000	1.9
@@ -114,10 +114,11 @@
 web requests, and blocks obnoxious ad sites like Doubleclick.</p>
 
 <p>To test if it's working, go to <a
-href="http://peertech.org/privacy-knoppix/";>this site</a> and see
-what IP it says you're coming from. (If it's down, you can try the
-<a href="http://www.junkbusters.com/cgi-bin/privacy";>junkbusters</a>
-site instead.)</p>
+href="http://peertech.org/privacy-knoppix/";>peertech</a>, 
+<a href="http://www.junkbusters.com/cgi-bin/privacy";>junkbusters</a> or
+<a href="http://www.network-tools.com";>network-tools</a>
+and see what IP it says you're coming from. 
+</p>
 
 <p>
 If you have a personal firewall that limits your computer's ability
@@ -135,9 +136,10 @@
 point your application directly at Tor (localhost port 9050). For
 applications that support neither SOCKS nor HTTP, take a look at <a
 href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html";>connect</a> or
-<a href="http://www.dest-unreach.org/socat/";>socat</a>.  Let us know if
-you get them working so we can add better instructions here.</p>
-
+<a href="http://www.dest-unreach.org/socat/";>socat</a>.  
+<br />
+For more information how to Torify other applications in detail visit
+the <a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO";>Torify HOWTO</a>.
 <p>If you have suggestions for improving this document, please post
 them on <a href="http://bugs.noreply.org/tor";>our bugtracker</a> in the
 website category. Thanks!</p>