Mfr commited on 2008-08-01 11:54:17
Zeige 5 geänderte Dateien mit 7 Einfügungen und 8 Löschungen.
... | ... |
@@ -99,8 +99,7 @@ directly (for instant messaging, Jabber, IRC, etc), you can point |
99 | 99 |
your application directly at Tor (localhost port 9050), but see <a |
100 | 100 |
href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this |
101 | 101 |
FAQ entry</a> for why this may be dangerous. For applications |
102 |
-that support neither SOCKS nor HTTP, take a look at <a |
|
103 |
-href="http://www.socks.permeo.com/Download/SocksCapDownload/index.asp">SocksCap</a> or |
|
102 |
+that support neither SOCKS nor HTTP, take a look at SocksCap or |
|
104 | 103 |
<a href="http://www.freecap.ru/eng/">FreeCap</a>. |
105 | 104 |
(FreeCap is free software; SocksCap is proprietary.)</p> |
106 | 105 |
|
... | ... |
@@ -135,10 +135,10 @@ Be a Whistleblower</a>. Wired recommends Tor for whistleblowers who wish to rem |
135 | 135 |
<tr> |
136 | 136 |
<td>2007 Sep 16</td> |
137 | 137 |
<td>Cnet</td> |
138 |
-<td><a href="http://www.cnet.com/surveillance-state/8301-13739_1-9779225-46.html?"> |
|
138 |
+<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html"> |
|
139 | 139 |
Tor anonymity server admin arrested</a>. A Tor exit node operator from Germany was arrested and then released once the police realized |
140 | 140 |
their mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>. |
141 |
- We have an <a href="<page faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="page eff/tor-legal-faq>"> |
|
141 |
+ We have an <a href="<page faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="<page eff/tor-legal-faq>"> |
|
142 | 142 |
Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay. |
143 | 143 |
</td> |
144 | 144 |
</tr> |
... | ... |
@@ -626,7 +626,7 @@ Mentions EFF funding for Tor as one of its significant nonlitigation projects. |
626 | 626 |
</td> |
627 | 627 |
<td> |
628 | 628 |
HCC magazine</td> |
629 |
-<td> <a href="http://www.hccmagazine.nl/index.cfm?fuseaction=home.showNieuws&id=44063"> |
|
629 |
+<td> <a href="http://www.hcc.nl/eCache/DEF/21/083.html"> |
|
630 | 630 |
Anoniem surfen met hulp van marine VS</a> (Dutch)<br> |
631 | 631 |
</td> |
632 | 632 |
</tr> |
... | ... |
@@ -124,7 +124,7 @@ Likely Mentors: <i>Mike</i> |
124 | 124 |
Applications as of 1 Apr 00:00 UTC: <i>5</i> |
125 | 125 |
<br /> |
126 | 126 |
The Tor exit node scanner 'SoaT', part of the <a |
127 |
-href="<svnsandbox>torflow/">Torflow project</a>, makes connections out |
|
127 |
+href="<svnsandbox>../torflow/">Torflow project</a>, makes connections out |
|
128 | 128 |
of each Tor exit node and compares the content it gets back with what it |
129 | 129 |
"should" get back. The goal is to notice misconfigured, broken, and even |
130 | 130 |
malicious exit relays. Alas, the code is |
... | ... |
@@ -1158,7 +1158,7 @@ present themselves without introducing regressions. |
1158 | 1158 |
</p><div class="sect3" lang="en" xml:lang="en"><div class="titlepage"><div><div><h4 class="title"><a id="id3007076"></a>Java and Plugin Decloaking</h4></div></div></div><p> |
1159 | 1159 |
As <a class="link" href="#plugins" title="5.2. Disable plugins on Tor Usage (crucial)">mentioned above</a>, Java and plugins <a class="ulink" href="http://java.sun.com/j2se/1.5.0/docs/api/java/net/class-use/NetworkInterface.html" target="_top">can query</a> the <a class="ulink" href="http://www.rgagnon.com/javadetails/java-0095.html" target="_top">local IP |
1160 | 1160 |
address</a> and report it back to the |
1161 |
-remote site. They can also <a class="ulink" href="http://metasploit.com/research/misc/decloak/index.htm" target="_top">bypass proxy settings</a> and directly connect to a |
|
1161 |
+remote site. They can also <a class="ulink" href="http://www.metasploit.com/research/projects/decloak/" target="_top">bypass proxy settings</a> and directly connect to a |
|
1162 | 1162 |
remote site without Tor. Every browser plugin we have tested with Firefox has |
1163 | 1163 |
some form of network capability, and every one ignores proxy settings or worse - only |
1164 | 1164 |
partially obeys them. This includes but is not limited to: |
... | ... |
@@ -110,7 +110,7 @@ repository</a> or simply unzip the xpi. |
110 | 110 |
<strong>Bug Reports:</strong> <a href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5">Torproject flyspray</a><br/> |
111 | 111 |
<strong>Documents:</strong> <b>[</b> <a href="<page torbutton/faq>">FAQ</a> <b>|</b> |
112 | 112 |
<a href="https://svn.torproject.org/svn/torbutton/trunk/src/CHANGELOG">changelog</a> <b>|</b> |
113 |
-<a href="https://svn.torproject.org/svn/torbutton/trunk/src/LICENCE">license</a> <b>|</b> |
|
113 |
+<a href="https://svn.torproject.org/svn/torbutton/trunk/src/LICENSE">license</a> <b>|</b> |
|
114 | 114 |
<a href="https://svn.torproject.org/svn/torbutton/trunk/src/CREDITS">credits</a> <b>]</b><br/> |
115 | 115 |
|
116 | 116 |
<br/> |
117 | 117 |