first cut of the new, shiny tor website as wml.
Andrew Lewman

Andrew Lewman commited on 2010-07-09 03:55:22
Zeige 152 geänderte Dateien mit 21890 Einfügungen und 0 Löschungen.

... ...
@@ -0,0 +1,59 @@
1
+# Directions for building the website:
2
+#
3
+# FIXME: this is incorrect, because maint-0.2.1 and master merged
4
+# 1. Clone the Tor git repository, switch to branch maint-0.2.1, and
5
+# make TORSVNSTABLE point to it: 
6
+#
7
+# 	git clone git://git.torproject.org/tor/ tor-stable
8
+# 	cd tor-stable && git checkout maint-0.2.1
9
+#
10
+# 2. Clone the Tor git repository again and make TORGIT point to it:
11
+#
12
+# 	git clone git://git.torproject.org/tor/ tor
13
+#
14
+# 3. Edit include/versions.wmi or others if you like
15
+# 4. Update STABLETAG and DEVTAG below if there is a new git tag
16
+# 5. make
17
+# 6. ./publish
18
+
19
+# FIXME: these are the same
20
+#TORSVNSTABLE = tor/stable
21
+TORSVNSTABLE = tor-stable
22
+TORGIT = tor/.git
23
+STABLETAG = tor-0.2.1.26
24
+DEVTAG = tor-0.2.2.13-alpha
25
+
26
+WMLBASE = .
27
+SUBDIRS =docs eff projects press about download download getinvolved donate
28
+
29
+include $(WMLBASE)/Makefile.common
30
+all: $(SUBDIRS)
31
+
32
+docs:
33
+	$(MAKE) -C "$@" WMLBASE=..
34
+eff:
35
+	$(MAKE) -C "$@" WMLBASE=..
36
+projects:
37
+	$(MAKE) -C "$@" WMLBASE=..
38
+press:
39
+	$(MAKE) -C "$@" WMLBASE=..
40
+about:
41
+	$(MAKE) -C "$@" WMLBASE=.. 
42
+download:
43
+	$(MAKE) -C "$@" WMLBASE=.. 
44
+getinvolved:
45
+	$(MAKE) -C "$@" WMLBASE=.. 
46
+donate:
47
+	$(MAKE) -C "$@" WMLBASE=..  
48
+mirrors:
49
+	./update-mirrors.pl
50
+translations:
51
+	./po2wml.sh
52
+qrcode:
53
+	qrencode -o img/android/orbot-qr-code-latest.png \
54
+    "http://www.torproject.org/dist/android/alpha-orbot-latest.apk"
55
+
56
+# XXX: this also depends on all subs' wmlfiles.  How to fix?
57
+translation-status.html.en: $(LANGS) $(WMIFILES) $(WMLFILES)
58
+
59
+.PHONY: docs eff projects press about download download getinvolved donate
... ...
@@ -0,0 +1,244 @@
1
+# Directions for adding a new language:
2
+# 1. Add the two-letter code to LANGS below.
3
+# 2. Add a new "%.html.es: es/%.wml en/%.wml" clause below.
4
+# 3. Add a new ".deps/%.html.es.d: es/%.wml .deps/.stamp" clause below.
5
+# 4. mkdir a new two-letter directory. Make sure there's a foot.wmi
6
+#    and navigation.wmi.
7
+# 5. Edit include/perl-globals.wmi, add to @LANGUAGES and %LANGUAGES.
8
+#    You might find useful %LANGUAGES strings at the bottom of
9
+#    http://debian.org/
10
+# 6. Add a new images/es.png flag image.
11
+
12
+WMLOPT  = \
13
+          -I $(WMLBASE)/include \
14
+          -D DOCROOT=$(WMLBASE) \
15
+          -D IMGROOT=$(WMLBASE)/images \
16
+          -D TORSVNSTABLE=$(TORSVNSTABLE) \
17
+          -D TORGIT=$(TORGIT)\
18
+          -D DEVTAG=$(DEVTAG) \
19
+          -D STABLETAG=$(STABLETAG)
20
+
21
+LANGS=ar bms de en es et fa it fi fr ja ko nl no pl pt ru se tr zh-cn
22
+#LANGS=en
23
+
24
+WMLFILES=$(wildcard $(patsubst %, %/*.wml, $(LANGS)))
25
+WMIFILES=$(wildcard $(patsubst %, %/*.wmi, $(LANGS)) $(WMLBASE)/include/*.wmi )
26
+
27
+HTMLFILES = $(shell perl -le 's,  (.*)/(.*).wml  ,        $$2.html.$$1    ,x, print $$_ for @ARGV' $(WMLFILES))
28
+DEPFILES  = $(shell perl -le 's,  (.*)/(.*).wml  ,  .deps/$$2.html.$$1.d  ,x, print $$_ for @ARGV' $(WMLFILES))
29
+
30
+
31
+all: $(HTMLFILES)
32
+
33
+%.html.en: en/%.wml
34
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
35
+
36
+%.html.ar: ar/%.wml en/%.wml
37
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
38
+
39
+%.html.bms: bms/%.wml en/%.wml
40
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
41
+
42
+%.html.es: es/%.wml en/%.wml
43
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
44
+
45
+%.html.et: et/%.wml en/%.wml
46
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
47
+
48
+%.html.de: de/%.wml en/%.wml
49
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
50
+
51
+%.html.fa: fa/%.wml en/%.wml
52
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
53
+
54
+%.html.it: it/%.wml en/%.wml
55
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
56
+
57
+%.html.fi: fi/%.wml en/%.wml
58
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
59
+
60
+%.html.fr: fr/%.wml en/%.wml
61
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
62
+
63
+%.html.ja: ja/%.wml en/%.wml
64
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
65
+
66
+%.html.ko: ko/%.wml en/%.wml
67
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
68
+
69
+%.html.nl: nl/%.wml en/%.wml
70
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
71
+
72
+%.html.no: no/%.wml en/%.wml
73
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
74
+
75
+%.html.pl: pl/%.wml en/%.wml
76
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
77
+
78
+%.html.pt: pt/%.wml en/%.wml
79
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
80
+
81
+%.html.ru: ru/%.wml en/%.wml
82
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
83
+
84
+%.html.se: se/%.wml en/%.wml
85
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
86
+
87
+%.html.tr: tr/%.wml en/%.wml
88
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
89
+
90
+%.html.zh-cn: zh-cn/%.wml en/%.wml
91
+	lang=`dirname $<` && wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $@
92
+
93
+.deps/%.html.en.d: en/%.wml .deps/.stamp
94
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
95
+	lang=`dirname $<` && \
96
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
97
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
98
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
99
+	rm -f $$tmpfile
100
+.deps/%.html.ar.d: es/%.wml .deps/.stamp
101
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
102
+	lang=`dirname $<` && \
103
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
104
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
105
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
106
+	rm -f $$tmpfile
107
+.deps/%.html.bms.d: bms/%.wml .deps/.stamp
108
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
109
+	lang=`dirname $<` && \
110
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
111
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
112
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
113
+	rm -f $$tmpfile
114
+.deps/%.html.es.d: es/%.wml .deps/.stamp
115
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
116
+	lang=`dirname $<` && \
117
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
118
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
119
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
120
+	rm -f $$tmpfile
121
+.deps/%.html.et.d: et/%.wml .deps/.stamp
122
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
123
+	lang=`dirname $<` && \
124
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
125
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
126
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
127
+	rm -f $$tmpfile
128
+.deps/%.html.de.d: de/%.wml .deps/.stamp
129
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
130
+	lang=`dirname $<` && \
131
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
132
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
133
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
134
+	rm -f $$tmpfile
135
+.deps/%.html.it.d: it/%.wml .deps/.stamp
136
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
137
+	lang=`dirname $<` && \
138
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
139
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
140
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
141
+	rm -f $$tmpfile
142
+.deps/%.html.fa.d: fa/%.wml .deps/.stamp
143
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
144
+	lang=`dirname $<` && \
145
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
146
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
147
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
148
+	rm -f $$tmpfile
149
+.deps/%.html.fi.d: fi/%.wml .deps/.stamp
150
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
151
+	lang=`dirname $<` && \
152
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
153
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
154
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
155
+	rm -f $$tmpfile
156
+.deps/%.html.fr.d: fr/%.wml .deps/.stamp
157
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
158
+	lang=`dirname $<` && \
159
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
160
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
161
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
162
+	rm -f $$tmpfile
163
+.deps/%.html.ja.d: ja/%.wml .deps/.stamp
164
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
165
+	lang=`dirname $<` && \
166
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
167
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
168
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
169
+	rm -f $$tmpfile
170
+.deps/%.html.ko.d: ko/%.wml .deps/.stamp
171
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
172
+	lang=`dirname $<` && \
173
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
174
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
175
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
176
+	rm -f $$tmpfile
177
+.deps/%.html.nl.d: nl/%.wml .deps/.stamp
178
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
179
+	lang=`dirname $<` && \
180
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
181
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
182
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
183
+	rm -f $$tmpfile
184
+.deps/%.html.no.d: no/%.wml .deps/.stamp
185
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
186
+	lang=`dirname $<` && \
187
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
188
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
189
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
190
+	rm -f $$tmpfile
191
+.deps/%.html.pl.d: pl/%.wml .deps/.stamp
192
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
193
+	lang=`dirname $<` && \
194
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
195
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
196
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
197
+	rm -f $$tmpfile
198
+.deps/%.html.pt.d: pt/%.wml .deps/.stamp
199
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
200
+	lang=`dirname $<` && \
201
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
202
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
203
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
204
+	rm -f $$tmpfile
205
+.deps/%.html.ru.d: ru/%.wml .deps/.stamp
206
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
207
+	lang=`dirname $<` && \
208
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
209
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
210
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
211
+	rm -f $$tmpfile
212
+.deps/%.html.se.d: se/%.wml .deps/.stamp
213
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
214
+	lang=`dirname $<` && \
215
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
216
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
217
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
218
+	rm -f $$tmpfile
219
+.deps/%.html.tr.d: tr/%.wml .deps/.stamp
220
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
221
+	lang=`dirname $<` && \
222
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
223
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
224
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
225
+	rm -f $$tmpfile
226
+.deps/%.html.zh-cn.d: zh-cn/%.wml .deps/.stamp
227
+	tmpfile=`mktemp -t tmp.XXXXXXX` \
228
+	lang=`dirname $<` && \
229
+	OUT=`echo $@ | sed -e 's,\.deps/\(.*\)\.d$$,\1,'` && \
230
+	wml $(WMLOPT) -I $$lang -I $(WMLBASE)/$$lang -D LANG=$$lang $< -o $$OUT --depend | tee $$tmpfile > $@ && \
231
+	sed -e s',\(^[^ ]*\):,.deps/\1.d:,' < $$tmpfile >> $@ && \
232
+	rm -f $$tmpfile
233
+.deps/.stamp:
234
+	[ -d .deps ] || mkdir .deps
235
+	touch "$@"
236
+
237
+dep: $(DEPFILES)
238
+clean:
239
+	rm -f $(HTMLFILES) $(DEPFILES)
240
+	for sub in $(SUBDIRS); do \
241
+		$(MAKE) -C "$$sub" WMLBASE=../$(WMLBASE) clean; \
242
+	done
243
+
244
+include $(DEPFILES)
... ...
@@ -0,0 +1 @@
1
+include $(WMLBASE)/Makefile.common
... ...
@@ -0,0 +1,28 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Tor Overview" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/about>">About</a>
10
+  </div>
11
+  <div id="maincol">
12
+    <h1>Tor Overview</h1>
13
+    <p>Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.</p>
14
+    <p>Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, and the like when these are blocked by their local Internet providers. Tor's <a href="#">hidden services</a> let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.</p>
15
+    <p>Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.</p>
16
+    <p>Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the <a href="http://www.eff.org/">Electronic Frontier Foundation</a> (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?</p>
17
+    <p>A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.</p>
18
+    <p>The <a href="<page about/corepeople>">variety of people</a> who use Tor is actually part of <a href="<page about/overview>">what makes it so secure</a>. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.</p>
19
+  </div>
20
+  <!-- END MAINCOL -->
21
+  <div id = "sidecol">
22
+#include "side.wmi"
23
+#include "info.wmi"
24
+  </div>
25
+  <!-- END SIDECOL -->
26
+</div>
27
+<!-- END CONTENT -->
28
+#include <foot.wmi>
... ...
@@ -0,0 +1,75 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Board of Directors" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
6
+<div id="content" class="clearfix">
7
+	<div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/about>">About &raquo; </a>
10
+    <a href="<page about/board>">Board of Directors</a>
11
+  </div>
12
+	<div id="maincol">
13
+  	<h1>Board of Directors</h1>
14
+    <table>
15
+    	<tr>
16
+        <td class="beige">
17
+          <div class="name">Board Member Name</div>
18
+          <div class="caps">Board Member Title</div>
19
+          <p>Board Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
20
+        </td>
21
+        <td>
22
+          <div class="name">Board Member Name</div>
23
+          <div class="caps">Board Member Title</div>
24
+          <p>Board Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
25
+        </td>
26
+      </tr>
27
+      <tr>
28
+        <td>
29
+          <div class="name">Board Member Name</div>
30
+          <div class="caps">Board Member Title</div>
31
+          <p>Board Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
32
+        </td>
33
+        <td class="beige">
34
+          <div class="name">Board Member Name</div>
35
+          <div class="caps">Board Member Title</div>
36
+          <p>Board Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
37
+        </td>
38
+      </tr>
39
+      <tr>
40
+        <td class="beige">
41
+          <div class="name">Board Member Name</div>
42
+          <div class="caps">Board Member Title</div>
43
+          <p>Board Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
44
+        </td>
45
+        <td>
46
+          <div class="name">Board Member Name</div>
47
+          <div class="caps">Board Member Title</div>
48
+          <p>Board Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
49
+        </td>
50
+      </tr>
51
+      <tr>
52
+        <td>
53
+          <div class="name">Board Member Name</div>
54
+          <div class="caps">Board Member Title</div>
55
+          <p>Board Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
56
+        </td>
57
+        <td class="beige">
58
+          <div class="name">Board Member Name</div>
59
+          <div class="caps">Board Member Title</div>
60
+          <p>Board Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
61
+        </td>
62
+      </tr>
63
+    </table>
64
+    <!-- END TABLE -->
65
+  </div>
66
+  <!-- END MAINCOL -->
67
+  <div id = "sidecol">
68
+#include "side.wmi"
69
+#include "info.wmi"
70
+  </div>
71
+  <!-- END SIDECOL -->
72
+</div>
73
+<!-- END CONTENT -->
74
+#include <foot.wmi> 
75
+ 
... ...
@@ -0,0 +1,39 @@
1
+## translation metadata
2
+# Revision: $Revision: 22359 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Contact" CHARSET="UTF-8"
6
+
7
+<div id="content" class="clearfix">
8
+	<div id="breadcrumbs">
9
+    <a href="<page home>">Home &raquo; </a>
10
+    <a href="<page about/about>">About &raquo; </a>
11
+    <a href="<page about/contact>">Contact</a>
12
+  </div>
13
+  <div id="maincol">
14
+    <h2>Tor: Contact</h2>
15
+    
16
+    <p>First, if you have a problem or question about using Tor, go look at the <a href="<page docs/documentation>#Support">Support section</a> for how to proceed. The Tor developers spend most of their time developing Tor, and there are no people devoted to user support, so try to help yourself before <a href="<page docs/faq>#SupportMail">politely trying to find a volunteer</a>.</p>
17
+    
18
+    <p>If you really do need to reach us, here are some approaches. All of these addresses are @torproject.org. Note that in practice most of them go to the same small group of people, so please be patient and <a href="http://www.catb.org/~esr/faqs/smart-questions.html">helpful</a>, and please make sure to write your mail in English.</p>
19
+    
20
+    <ul>
21
+      <li><tt>tor-assistants</tt> is the catch-all address for everything. If you'd like to ask a more directed question, please see the descriptions below.</li>
22
+      <li><tt>tor-ops</tt> gets to the people who manage the directory authorities. Use this if you run a Tor relay and have a question or problem with your relay.</li>
23
+      <li><tt>tor-webmaster</tt> can fix typos on the website, change wrong statements or directions on the website, and add new sections and paragraphs that you send us. You might want to make a draft of your new sections on <a href="https://trac.torproject.org/projects/tor/wiki">the Tor wiki</a> first.</li>
24
+      <li><tt>tor-volunteer</tt> wants to hear about your documents, patches, testing, experiences with supporting applications, and so forth inspired by our <a href="<page getinvolved/volunteer>">volunteer page</a> (or other problems you've fixed or documented about using Tor). There's no need to mail us before you start working on something -- like all volunteer Internet projects, we hear from a lot of excited people who vanish soon after, so we are most interested in hearing about actual progress.</li>
25
+      <li><tt>tor-translation</tt> can put new <a href="<page getinvolved/translation>">website translations</a> into place, and help answer questions about existing and new translations.</li>
26
+      <li><tt>tordnsel</tt> is the alias for the people responsible for the tordns exitlist.</li>
27
+      <li><tt>donations</tt> is for questions and comments about <a href="<page donate/donate>">getting money to the developers</a>. More donations means <a href="<page docs/faq>#Funding">more Tor</a>. We're happy to help think about creative ways for you to contribute.</li>
28
+      <li><tt>execdir</tt> is for press/media, questions and comments about Tor the non-profit corporation: trademark questions, affiliation and coordination, major gifts, contract inquiries, licensing and certification, etc.</li>
29
+    </ul>
30
+  </div>
31
+  <!-- END MAINCOL -->
32
+  <div id = "sidecol">
33
+#include "side.wmi"
34
+#include "info.wmi"
35
+  </div>
36
+  <!-- END SIDECOL -->
37
+</div>
38
+<!-- END CONTENT -->
39
+#include <foot.wmi>   
... ...
@@ -0,0 +1,74 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 3-low
4
+#include "head.wmi" TITLE="Tor Project: Past Contributors" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
5
+<div id="content" class="clearfix">
6
+	<div id="breadcrumbs">
7
+    <a href="<page home>">Home &raquo; </a>
8
+    <a href="<page about/about>">About &raquo; </a>
9
+    <a href="<page about/contributors>">Past Contributors</a>
10
+  </div>
11
+	<div id="maincol">
12
+  	<h1>Past Contributors</h1>
13
+    <table>
14
+    	<tr>
15
+        <td class="beige">
16
+          <div class="name">Contributor Name</div>
17
+          <div class="caps">Contributor Title</div>
18
+          <p>Contributor is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
19
+        </td>
20
+        <td>
21
+          <div class="name">Contributor Name</div>
22
+          <div class="caps">Contributor Title</div>
23
+          <p>Contributor is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
24
+        </td>
25
+      </tr>
26
+      <tr>
27
+        <td>
28
+          <div class="name">Contributor Name</div>
29
+          <div class="caps">Contributor Title</div>
30
+          <p>Contributor is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
31
+        </td>
32
+        <td class="beige">
33
+          <div class="name">Contributor Name</div>
34
+          <div class="caps">Contributor Title</div>
35
+          <p>Contributor is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
36
+        </td>
37
+      </tr>
38
+      <tr>
39
+        <td class="beige">
40
+          <div class="name">Contributor Name</div>
41
+          <div class="caps">Contributor Title</div>
42
+          <p>Contributor is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
43
+        </td>
44
+        <td>
45
+          <div class="name">Contributor Name</div>
46
+          <div class="caps">Contributor Title</div>
47
+          <p>Contributor is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
48
+        </td>
49
+      </tr>
50
+      <tr>
51
+        <td>
52
+          <div class="name">Contributor Name</div>
53
+          <div class="caps">Contributor Title</div>
54
+          <p>Contributor is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
55
+        </td>
56
+        <td class="beige">
57
+          <div class="name">Contributor Name</div>
58
+          <div class="caps">Contributor Title</div>
59
+          <p>Contributor is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
60
+        </td>
61
+      </tr>
62
+    </table>
63
+    <!-- END TABLE -->
64
+  </div>
65
+  <!-- END MAINCOL -->
66
+  
67
+  <div id = "sidecol">
68
+#include "side.wmi"
69
+#include "info.wmi"
70
+  </div>
71
+  <!-- END SIDECOL -->
72
+</div>
73
+<!-- END CONTENT -->
74
+#include <foot.wmi> 
... ...
@@ -0,0 +1,74 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 3-low
4
+#include "head.wmi" TITLE="Tor Project: Core People" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
5
+<div id="content" class="clearfix">
6
+	<div id="breadcrumbs">
7
+    <a href="<page home>">Home &raquo; </a>
8
+    <a href="<page about/about>">About &raquo; </a>
9
+    <a href="<page about/corepeople>">Tor People</a>
10
+  </div>
11
+	<div id="maincol">
12
+  	<h1>Core Tor People</h1>
13
+    <table>
14
+    	<tr>
15
+        <td class="beige">
16
+          <div class="name">Staff Member Name</div>
17
+          <div class="caps">Staff Member Title</div>
18
+          <p>Staff Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
19
+        </td>
20
+        <td>
21
+          <div class="name">Staff Member Name</div>
22
+          <div class="caps">Staff Member Title</div>
23
+          <p>Staff Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
24
+        </td>
25
+      </tr>
26
+      <tr>
27
+        <td>
28
+          <div class="name">Staff Member Name</div>
29
+          <div class="caps">Staff Member Title</div>
30
+          <p>Staff Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
31
+        </td>
32
+        <td class="beige">
33
+          <div class="name">Staff Member Name</div>
34
+          <div class="caps">Staff Member Title</div>
35
+          <p>Staff Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
36
+        </td>
37
+      </tr>
38
+      <tr>
39
+        <td class="beige">
40
+          <div class="name">Staff Member Name</div>
41
+          <div class="caps">Staff Member Title</div>
42
+          <p>Staff Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
43
+        </td>
44
+        <td>
45
+          <div class="name">Staff Member Name</div>
46
+          <div class="caps">Staff Member Title</div>
47
+          <p>Staff Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
48
+        </td>
49
+      </tr>
50
+      <tr>
51
+        <td>
52
+          <div class="name">Staff Member Name</div>
53
+          <div class="caps">Staff Member Title</div>
54
+          <p>Staff Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
55
+        </td>
56
+        <td class="beige">
57
+          <div class="name">Staff Member Name</div>
58
+          <div class="caps">Staff Member Title</div>
59
+          <p>Staff Member is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
60
+        </td>
61
+      </tr>
62
+    </table>
63
+    <!-- END TABLE -->
64
+
65
+  </div>
66
+  <!-- END MAINCOL -->
67
+  <div id = "sidecol">
68
+#include "side.wmi"
69
+#include "info.wmi"
70
+  </div>
71
+  <!-- END SIDECOL -->
72
+</div>
73
+<!-- END CONTENT -->
74
+#include <foot.wmi> 
... ...
@@ -0,0 +1,47 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Future of Tor" CHARSET="UTF-8" <p>
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/about>">About &raquo; </a>
10
+    <a href="<page about/future>">The Future of Tor</a>
11
+  </div>
12
+  <div id="maincol">
13
+    <h1>The future of Tor</a></h1>
14
+    
15
+    <p>
16
+    Providing a usable anonymizing network on the Internet today is an
17
+    ongoing challenge. We want software that meets users' needs. We also
18
+    want to keep the network up and running in a way that handles as many
19
+    users as possible. Security and usability don't have to be at odds:
20
+    As Tor's usability increases, it will attract more users, which will
21
+    increase the possible sources and destinations of each communication,
22
+    thus increasing security for everyone.
23
+    We're making progress, but we need your help.  Please consider
24
+    <a href="<page docs/tor-doc-relay>">running a relay</a>
25
+    or <a href="<page getinvolved/volunteer>">volunteering</a> as a
26
+    <a href="<page docs/documentation>#Developers">developer</a>.
27
+    </p>
28
+    
29
+    <p>
30
+    Ongoing trends in law, policy, and technology threaten anonymity as never
31
+    before, undermining our ability to speak and read freely online. These
32
+    trends also undermine national security and critical infrastructure by
33
+    making communication among individuals, organizations, corporations,
34
+    and governments more vulnerable to analysis. Each new user and relay
35
+    provides additional diversity, enhancing Tor's ability to put control
36
+    over your security and privacy back into your hands.
37
+    </p>
38
+  </div>
39
+  <!-- END MAINCOL -->
40
+  <div id = "sidecol">
41
+#include "side.wmi"
42
+#include "info.wmi"
43
+  </div>
44
+  <!-- END SIDECOL -->
45
+</div>
46
+<!-- END CONTENT -->
47
+#include <foot.wmi>
... ...
@@ -0,0 +1,210 @@
1
+## translation metadata
2
+# Revision: $Revision: 22179 $
3
+# Translation-Priority: 4-optional
4
+
5
+#include "head.wmi" TITLE="Tor: Google Summer of Code 2010" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/gsoc>">Google Summer of Code 2010</a>
10
+  </div>
11
+  <div id="maincol"> 
12
+    <h2>Tor: Google Summer of Code 2010</h2>
13
+    <hr />
14
+    
15
+    <p>
16
+    In the last three years, The Tor Project in collaboration with <a
17
+    href="https://www.eff.org/">The Electronic Frontier Foundation</a>
18
+    successfully took part in
19
+    <a href="http://code.google.com/soc/2007/eff/about.html">Google Summer of Code
20
+    2007</a>, <a href="http://code.google.com/soc/2008/eff/about.html">2008</a>,
21
+    and <a href="http://socghop.appspot.com/gsoc/org/home/google/gsoc2009/eff">2009</a>.
22
+    In total we had 17 students as full-time developers for the summers of 2007 to
23
+    2009. Now we've been accepted to <a
24
+    href="https://socghop.appspot.com/gsoc/org/show/google/gsoc2010/tor">Google
25
+    Summer of Code 2010</a>!
26
+    </p>
27
+    
28
+    <p>
29
+    The <a
30
+    href="http://socghop.appspot.com/document/show/gsoc_program/google/gsoc2010/timeline">deadline</a>
31
+    for your <a
32
+    href="http://socghop.appspot.com/document/show/gsoc_program/google/gsoc2010/faqs#student_apply">application</a>
33
+    is <b>April 9, 2010</b> at 19:00 UTC.
34
+    </p>
35
+    
36
+    <p>
37
+    You must be self-motivated and able to work independently. We have
38
+    a thriving community of interested developers on the IRC channel and
39
+    mailing lists, and we're eager to work with you, brainstorm about design,
40
+    and so on, but you need to be able to manage your own time, and you
41
+    need to already be somewhat familiar with how free software development on the
42
+    Internet works.
43
+    </p>
44
+    
45
+    <p>
46
+    Working on Tor is rewarding because:
47
+    </p>
48
+    
49
+    <ul>
50
+    <li>You can work your own hours in your own locations. As long as you
51
+    get the job done, we don't care about the process.</li>
52
+    <li>We only write free (open source) software. The tools you make won't
53
+    be locked down or rot on a shelf.</li>
54
+    <li>You will work with a world-class team of anonymity experts and
55
+    developers on what is already the largest and most active strong anonymity
56
+    network ever.</li>
57
+    <li>The work you do could contribute to academic publications &mdash;
58
+    Tor development raises many open questions and interesting problems
59
+    in the field of <a href="http://freehaven.net/anonbib/">anonymity
60
+    systems</a>.</li>
61
+    </ul>
62
+    
63
+    <a id="GettingInvolved"></a>
64
+    <h2><a class="anchor" href="#GettingInvolved">How To Get Involved</a></h2>
65
+    
66
+    <p>
67
+    The best way to get involved is to come listen on IRC (both "#tor" and
68
+    "#tor-dev"), read our docs and other webpages, try out the various tools
69
+    that are related to the projects that interest you, and ask questions
70
+    as they come to you: <a href="<page docs/documentation>#UpToSpeed">Getting
71
+    up to speed</a>.
72
+    </p>
73
+    
74
+    <p>
75
+    In addition to getting some more development work
76
+    done on Tor and related applications, Google and Tor are most interested
77
+    in getting students involved in Tor development in a way that keeps them
78
+    involved after the summer too. That means we will give priority to students
79
+    who have demonstrated continued interest and responsiveness. We will require
80
+    students to write public status report updates for our community, either by
81
+    blogging or sending mail to our mailing list. We want to ensure that the
82
+    community and the student can both benefit from each other.
83
+    </p>
84
+    
85
+    <p>
86
+    When it comes time for us to choose projects, our impression of how well
87
+    you'll fit into our community &mdash; and how good you are at taking
88
+    the initiative to do things &mdash; will be at least as important as
89
+    the actual project you'll be working on.
90
+    </p>
91
+    
92
+    <a id="Ideas"></a>
93
+    <h2><a class="anchor" href="#Ideas">Ideas List</a></h2>
94
+    
95
+    <p>
96
+    This year, we have two ideas lists: one for projects to
97
+    <a href="<page getinvolved/volunteer>#Projects">help develop Tor</a>,
98
+    and one for <a href="https://www.eff.org/gsoc2010">EFF's projects</a>.
99
+    </p>
100
+    
101
+    <p>
102
+    The best kind of ideas are A) ones that we know we need done real soon
103
+    now (you can get a sense of urgency from the priority on the wishlist,
104
+    and from talking to the potential mentors), and B) ones where it's
105
+    clear what needs to be done, at least for the first few steps. Lots of
106
+    students try to bite off open-ended research topics; but if you're going
107
+    to be spending the first half of your summer figuring out what exactly
108
+    you should code, and there's a chance that the conclusion will be "oh,
109
+    that isn't actually a good idea to build", then your proposal will make
110
+    us very nervous. Try to figure out how much you can actually fit in a
111
+    summer, break the work down into manageable pieces, and most importantly,
112
+    figure out how to make sure your incremental milestones are actually
113
+    useful &mdash; if you don't finish everything in your plan, we want to
114
+    know that you'll still have produced something useful.
115
+    </p>
116
+    
117
+    <a id="Template"></a>
118
+    <h2><a class="anchor" href="#Template">Application Template</a></h2>
119
+    
120
+    <p>
121
+    Please use the following template for your application, to make sure you
122
+    provide enough information for us to evaluate you and your proposal.
123
+    </p>
124
+    
125
+    <ol>
126
+    
127
+    <li>What project would you like to work on? Use our ideas lists as a starting
128
+    point or make up your own idea. Your proposal should include high-level
129
+    descriptions of what you're going to do, with more details about the
130
+    parts you expect to be tricky. Your proposal should also try to break
131
+    down the project into tasks of a fairly fine granularity, and convince
132
+    us you have a plan for finishing it.</li>
133
+    
134
+    <li>Point us to a code sample: something good and clean to demonstrate
135
+    that you know what you're doing, ideally from an existing project.</li>
136
+    
137
+    <li>Why do you want to work with The Tor Project / EFF in
138
+    particular?</li>
139
+    
140
+    <li>Tell us about your experiences in free software development
141
+    environments. We especially want to hear examples of how you have
142
+    collaborated with others rather than just working on a project by
143
+    yourself.</li>
144
+    
145
+    <li>Will you be working full-time on the project for the summer, or will
146
+    you have other commitments too (a second job, classes, etc)? If you won't
147
+    be available full-time, please explain, and list timing if you know them
148
+    for other major deadlines (e.g. exams). Having other activities isn't
149
+    a deal-breaker, but we don't want to be surprised.</li>
150
+    
151
+    <li>Will your project need more work and/or maintenance after the summer
152
+    ends? What are the chances you will stick around and help out with that
153
+    and other related projects?</li>
154
+    
155
+    <li>What is your ideal approach to keeping everybody informed of your
156
+    progress, problems, and questions over the course of the project? Said
157
+    another way, how much of a "manager" will you need your mentor to be?</li>
158
+    
159
+    <li>What school are you attending? What year are you, and what's your
160
+    major/degree/focus? If you're part of a research group, which one?</li>
161
+    
162
+    <li>How can we contact you to ask you further questions? Google doesn't
163
+    share your contact details with us automatically, so you should include
164
+    that in your application. In addition, what's your IRC nickname?
165
+    Interacting with us on IRC will help us get to know you, and help you
166
+    get to know our community.</li>
167
+    
168
+    <li>Is there anything else we should know that will make us like your
169
+    project more?</li>
170
+    
171
+    </ol>
172
+    
173
+    <p>
174
+    We have picked out 10+ mentors for this year &mdash; most of the
175
+    people on the <a href="<page about/people>#Core">core Tor development team</a>
176
+    plus a few people from <a href="http://www.eff.org/about/staff">EFF's staff</a>
177
+    &mdash; so we should be able to accommodate a wide variety of projects,
178
+    ranging from work on Tor itself to work on supporting or peripheral
179
+    projects. We can figure out which mentor is appropriate while we're
180
+    discussing the project you have in mind. We plan to assign a primary
181
+    mentor to each student, along with one or two assistant mentors to help
182
+    answer questions and help you integrate with the broader Tor community.
183
+    </p>
184
+    
185
+    <p>
186
+    If you're interested, you can either contact the <a href="<page
187
+    about/contact>">tor-assistants list</a> with a brief summary of your proposal
188
+    and we'll give you feedback, or just jump right in and post your ideas
189
+    and goals to the <a href="<page docs/documentation>#MailingLists">or-talk
190
+    mailing list</a>. Make sure to be responsive during the application
191
+    selection period; if we like your application but you never answer our
192
+    mails asking for more information, that's not a good sign.
193
+    </p>
194
+    
195
+    <p>
196
+    The more applications we get, the more likely Google is to give us good
197
+    students. So if you haven't filled up your summer plans yet, please
198
+    consider spending some time working with us to make Tor better!
199
+    </p>
200
+  </div>
201
+  <!-- END MAINCOL -->
202
+  <div id = "sidecol">
203
+#include "side.wmi"
204
+#include "info.wmi"
205
+  </div>
206
+  <!-- END SIDECOL -->
207
+</div>
208
+<!-- END CONTENT -->
209
+#include <foot.wmi>
210
+
... ...
@@ -0,0 +1,261 @@
1
+## translation metadata
2
+# Revision: $Revision: 22308 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Overview" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/about>">About &raquo; </a>
10
+    <a href="<page about/about>">Overview</a>
11
+  </div>
12
+  <div id="maincol">
13
+    <a name="overview"></a>
14
+    <h2><a class="anchor" href="#overview">Tor: Overview</a></h2>
15
+    <!-- BEGIN SIDEBAR -->
16
+    <div class="sidebar-left">
17
+      <h3>Topics</h3>
18
+      <ul>
19
+        <li><a href="<page about/overview>#overview">Overview</a></li>
20
+        <li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li>
21
+        <li><a href="<page about/overview>#thesolution">The Solution</a></li>
22
+        <li><a href="<page about/overview>#hiddenservices">Hidden services</a></li>
23
+        <li><a href="<page about/overview>#stayinganonymous">Staying anonymous</a></li>
24
+        <li><a href="<page about/overview>#thefutureoftor">The future of Tor</a></li>
25
+      </ul>
26
+    </div>
27
+    <!-- END SIDEBAR -->
28
+    
29
+    <hr />
30
+    
31
+    <p>
32
+    Tor is a network of virtual tunnels that allows people and groups to
33
+    improve their privacy and security on the Internet.  It also enables
34
+    software developers to create new communication tools
35
+    with built-in privacy features.  Tor provides the foundation for
36
+    a range of applications that allow organizations and individuals
37
+    to share information over public networks without compromising their
38
+    privacy.
39
+    </p>
40
+    
41
+    <p>
42
+    Individuals use Tor to keep websites from tracking them and their family
43
+    members, or to connect to news sites, instant messaging services, or the
44
+    like when these are blocked by their local Internet providers.  Tor's <a
45
+    href="<page docs/hidden-services>">hidden services</a>
46
+    let users publish web sites and other services without needing to reveal
47
+    the location of the site. Individuals also use Tor for socially sensitive
48
+    communication: chat rooms and web forums for rape and abuse survivors,
49
+    or people with illnesses.
50
+    </p>
51
+    
52
+    <p>
53
+    Journalists use Tor to communicate more safely with whistleblowers and
54
+    dissidents. Non-governmental organizations (NGOs) use Tor to allow their
55
+    workers to connect to their home website while they're in a foreign
56
+    country, without notifying everybody nearby that they're working with
57
+    that organization.
58
+    </p>
59
+    
60
+    <p>
61
+    Groups such as Indymedia recommend Tor for safeguarding their members'
62
+    online privacy and security. Activist groups like the Electronic Frontier
63
+    Foundation (EFF) recommend Tor as a mechanism for
64
+    maintaining civil liberties online. Corporations use Tor as a safe way
65
+    to conduct competitive analysis, and to protect sensitive procurement
66
+    patterns from eavesdroppers. They also use it to replace traditional
67
+    VPNs, which reveal the exact amount and timing of communication. Which
68
+    locations have employees working late? Which locations have employees
69
+    consulting job-hunting websites? Which research divisions are communicating
70
+    with the company's patent lawyers?
71
+    </p>
72
+    
73
+    <p>
74
+    A branch of the U.S. Navy uses Tor for open source intelligence
75
+    gathering, and one of its teams used Tor while deployed in the Middle
76
+    East recently. Law enforcement uses Tor for visiting or surveilling
77
+    web sites without leaving government IP addresses in their web logs,
78
+    and for security during sting operations.
79
+    </p>
80
+    
81
+    <p>
82
+    The variety of people who use Tor is actually <a
83
+    href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes
84
+    it so secure</a>.  Tor hides you among <a href="<page about/torusers>">the
85
+    other users on the network</a>,
86
+    so the more populous and diverse the user base for Tor is, the more your
87
+    anonymity will be protected.
88
+    </p>
89
+    
90
+    <a name="whyweneedtor"></a>
91
+    <h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3>
92
+    
93
+    <p>
94
+    Using Tor protects you against a common form of Internet surveillance
95
+    known as "traffic analysis."  Traffic analysis can be used to infer
96
+    who is talking to whom over a public network.  Knowing the source
97
+    and destination of your Internet traffic allows others to track your
98
+    behavior and interests.  This can impact your checkbook if, for example,
99
+    an e-commerce site uses price discrimination based on your country or
100
+    institution of origin.  It can even threaten your job and physical safety
101
+    by revealing who and where you are. For example, if you're travelling
102
+    abroad and you connect to your employer's computers to check or send mail,
103
+    you can inadvertently reveal your national origin and professional
104
+    affiliation to anyone observing the network, even if the connection
105
+    is encrypted.
106
+    </p>
107
+    
108
+    <p>
109
+    How does traffic analysis work?  Internet data packets have two parts:
110
+    a data payload and a header used for routing.  The data payload is
111
+    whatever is being sent, whether that's an email message, a web page, or an
112
+    audio file.  Even if you encrypt the data payload of your communications,
113
+    traffic analysis still reveals a great deal about what you're doing and,
114
+    possibly, what you're saying.  That's because it focuses on the header,
115
+    which discloses source, destination, size, timing, and so on.
116
+    </p>
117
+    
118
+    <p>
119
+    A basic problem for the privacy minded is that the recipient of your
120
+    communications can see that you sent it by looking at headers.  So can
121
+    authorized intermediaries like Internet service providers, and sometimes
122
+    unauthorized intermediaries as well.  A very simple form of traffic
123
+    analysis might involve sitting somewhere between sender and recipient on
124
+    the network, looking at headers.
125
+    </p>
126
+    
127
+    <p>
128
+    But there are also more powerful kinds of traffic analysis.  Some
129
+    attackers spy on multiple parts of the Internet and use sophisticated
130
+    statistical techniques to track the communications patterns of many
131
+    different organizations and individuals.  Encryption does not help against
132
+    these attackers, since it only hides the content of Internet traffic, not
133
+    the headers.
134
+    </p>
135
+    
136
+    <a name="thesolution"></a>
137
+    <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
138
+    
139
+    <p>
140
+    Tor helps to reduce the risks of both simple and sophisticated traffic
141
+    analysis by distributing your transactions over several places on the
142
+    Internet, so no single point can link you to your destination.  The idea
143
+    is similar to using a twisty, hard-to-follow route in order to throw off
144
+    somebody who is tailing you &mdash; and then periodically erasing your
145
+    footprints.  Instead of taking a direct route from source to
146
+    destination, data packets on the Tor network take a random pathway
147
+    through several relays that cover your tracks so no observer at any
148
+    single point can tell where the data came from or where it's going.
149
+    </p>
150
+    
151
+    <p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" /></p>
152
+    
153
+    <p>
154
+    To create a private network pathway with Tor, the user's software or
155
+    client incrementally builds a circuit of encrypted connections through
156
+    relays on the network.  The circuit is extended one hop at a time, and
157
+    each relay along the way knows only which relay gave it data and which
158
+    relay it is giving data to.  No individual relay ever knows the
159
+    complete path that a data packet has taken.  The client negotiates a
160
+    separate set of encryption keys for each hop along the circuit to ensure
161
+    that each hop can't trace these connections as they pass through.
162
+    </p>
163
+    
164
+    <p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p>
165
+    
166
+    <p>
167
+    Once a circuit has been established, many kinds of data can be exchanged
168
+    and several different sorts of software applications can be deployed
169
+    over the Tor network.  Because each relay sees no more than one hop in
170
+    the circuit, neither an eavesdropper nor a compromised relay can use
171
+    traffic analysis to link the connection's source and destination.  Tor
172
+    only works for TCP streams and can be used by any application with SOCKS
173
+    support.
174
+    </p>
175
+    
176
+    <p>
177
+    For efficiency, the Tor software uses the same circuit for connections
178
+    that happen within the same ten minutes or so.  Later requests are given a
179
+    new circuit, to keep people from linking your earlier actions to the new
180
+    ones.
181
+    </p>
182
+    
183
+    <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" /></p>
184
+    
185
+    
186
+    <a name="hiddenservices"></a>
187
+    <h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3>
188
+    
189
+    <p>
190
+    Tor also makes it possible for users to hide their locations while
191
+    offering various kinds of services, such as web publishing or an instant
192
+    messaging server.  Using Tor "rendezvous points," other Tor users can
193
+    connect to these hidden services, each without knowing the other's
194
+    network identity.  This hidden service functionality could allow Tor
195
+    users to set up a website where people publish material without worrying
196
+    about censorship.  Nobody would be able to determine who was offering
197
+    the site, and nobody who offered the site would know who was posting to it.
198
+    Learn more about <a href="<page docs/tor-hidden-service>">configuring
199
+    hidden services</a> and how the <a href="<page docs/hidden-services>">hidden
200
+    service protocol</a> works.
201
+    </p>
202
+    
203
+    <a name="stayinganonymous"></a>
204
+    <h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3>
205
+    
206
+    <p>
207
+    Tor can't solve all anonymity problems.  It focuses only on
208
+    protecting the transport of data.  You need to use protocol-specific
209
+    support software if you don't want the sites you visit to see your
210
+    identifying information. For example, you can use web proxies such as
211
+    Privoxy while web browsing to block cookies and withhold information
212
+    about your browser type.
213
+    </p>
214
+    
215
+    <p>
216
+    Also, to protect your anonymity, be smart.  Don't provide your name
217
+    or other revealing information in web forms.  Be aware that, like all
218
+    anonymizing networks that are fast enough for web browsing, Tor does not
219
+    provide protection against end-to-end timing attacks: If your attacker
220
+    can watch the traffic coming out of your computer, and also the traffic
221
+    arriving at your chosen destination, he can use statistical analysis to
222
+    discover that they are part of the same circuit.
223
+    </p>
224
+    
225
+    <a name="thefutureoftor"></a>
226
+    <h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3>
227
+    
228
+    <p>
229
+    Providing a usable anonymizing network on the Internet today is an
230
+    ongoing challenge. We want software that meets users' needs. We also
231
+    want to keep the network up and running in a way that handles as many
232
+    users as possible. Security and usability don't have to be at odds:
233
+    As Tor's usability increases, it will attract more users, which will
234
+    increase the possible sources and destinations of each communication,
235
+    thus increasing security for everyone.
236
+    We're making progress, but we need your help.  Please consider
237
+    <a href="<page docs/tor-doc-relay>">running a relay</a>
238
+    or <a href="<page getinvolved/volunteer>">volunteering</a> as a
239
+    <a href="<page docs/documentation>#Developers">developer</a>.
240
+    </p>
241
+    
242
+    <p>
243
+    Ongoing trends in law, policy, and technology threaten anonymity as never
244
+    before, undermining our ability to speak and read freely online. These
245
+    trends also undermine national security and critical infrastructure by
246
+    making communication among individuals, organizations, corporations,
247
+    and governments more vulnerable to analysis. Each new user and relay
248
+    provides additional diversity, enhancing Tor's ability to put control
249
+    over your security and privacy back into your hands.
250
+    </p>
251
+    
252
+  </div>
253
+  <!-- END MAINCOL -->
254
+  <div id = "sidecol">
255
+#include "side.wmi"
256
+#include "info.wmi"
257
+  </div>
258
+  <!-- END SIDECOL -->
259
+</div>
260
+<!-- END CONTENT -->
261
+#include <foot.wmi> 
... ...
@@ -0,0 +1,357 @@
1
+## translation metadata
2
+# Revision: $Revision: 22448 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: People" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+	<div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/about>">About &raquo; </a>
10
+    <a href="<page about/board>">Board of Directors</a>
11
+  </div>
12
+  <div class="maincol">
13
+    <h2>Tor: People</h2>
14
+    
15
+    #<!-- BEGIN SIDEBAR -->
16
+    #<div class="sidebar-left">
17
+    #<h3>Sections</h3>
18
+    #<ul>
19
+    #<li><a href="<page about/corepeople>#Core">Core Tor People</a></li>
20
+    #<li><a href="<page about/people>#Board">Board of Directors</a></li>
21
+    #<li><a href="<page about/people>#GSoC">Summer Students</a></li>
22
+    #<li><a href="<page about/people>#Translators">Translators</a></li>
23
+    #<li><a href="<page about/people>#Volunteers">Volunteers</a></li>
24
+    #<li><a href="<page about/people>#Past">Past Contributors</a></li>
25
+    #</ul>
26
+    #</div>
27
+    #<!-- END SIDEBAR -->
28
+    
29
+    <p>The Tor Project is a 501(c)(3) non-profit based in
30
+    the United States. The official address of the organization is:
31
+    </p>
32
+    
33
+    <address>
34
+    The Tor Project<br />
35
+    969 Main Street, Suite 206<br />
36
+    Walpole, MA 02081 USA<br /><br />
37
+    </address>
38
+    
39
+    <p>The organization consists of many volunteers and a few employees.
40
+    Please don't contact us individually about Tor topics &mdash; if you
41
+    have a problem or question, please look through the <a href="<page
42
+    about/contact>">contact page</a> for appropriate addresses.</p>
43
+    
44
+    <div class="underline"></div>
45
+    <a id="Core"></a>
46
+    <h3><a class="anchor" href="#Core">Core Tor people:</a></h3>
47
+    
48
+    <dl>
49
+    <dt>Carolyn Anhalt (Community and Translation
50
+    Coordinator)</dt><dd>Responsible for growing Tor's community
51
+    moderators and translators.</dd>
52
+    
53
+    <dt>Jacob Appelbaum (Developer and Advocate)</dt><dd>Runs
54
+    the <a href="https://check.torproject.org/">Tor DNSEL</a> <a
55
+    href="http://exitlist.torproject.org/">site</a>, and also the in-progress
56
+    Tor weather site.</dd>
57
+    
58
+    <dt>Erinn Clark (Packaging and Build Automation)</dt><dd>Erinn is tackling
59
+    the growing needs for easy to install and configure packages on a variety
60
+    of operating systems.  Also working on automating the build system and
61
+    producing nightly builds for all operating systems we support.</dd>
62
+    
63
+    <dt>Christopher Davis</dt><dd>Worked during Google Summer of Code 2009
64
+    on porting Polipo to Windows and on helping with the libevent bufferevent
65
+    code. Now he's the Polipo maintainer.</dd>
66
+    
67
+    <dt>Roger Dingledine (Project Leader; Director)</dt><dd>Original
68
+    developer of Tor; now plays pretty much all the roles to keep everything
69
+    on track.</dd>
70
+    
71
+    <dt>Matt Edman (Developer)</dt><dd>Lead developer for <a href="<page
72
+    projects/vidalia>">Vidalia</a>, a cross-platform Tor GUI included in the
73
+    Windows and OS X bundles.</dd>
74
+    
75
+    <dt>Nathan Freitas</dt><dd>The driving force behind Tor on the Android
76
+    platform in the form of <a href="<page docs/android>">Orbot</a>.</dd>
77
+    
78
+    <dt>Christian Fromme (Developer)</dt><dd>Christian works on all things
79
+    python for Tor.  He enhanced and maintains a slew of codebases for us,
80
+    such as the get-tor email auto-responder, check.torproject.org, bridge
81
+    db, tor weather, tor controller, tor flow, etc.</dd>
82
+    
83
+    <dt>Melissa Gilroy (CFO and Internal Audit)</dt><dd>With a strong
84
+    background in non-profit accounting and auditing, Melissa is in charge of
85
+    Tor's finances, audit compliance, and keeping Tor's financial operations
86
+    moving along.</dd>
87
+    
88
+    <dt>Sebastian Hahn</dt><dd> Worked during the 2008 Google Summer of
89
+    Code on a networking application to automatically carry out tests for
90
+    Tor and during the 2009 Google Summer of Code on expanding Thandy to
91
+    include BitTorrent support. Generally helps out a lot.</dd>
92
+    
93
+    <dt>Damian Johnson</dt><dd>Builds a command-line application for monitoring
94
+    Tor relays, providing real-time status information such as the current
95
+    configuration, bandwidth usage, message log, etc. (<a
96
+    href="https://svn.torproject.org/svn/arm/trunk/README">code</a>).</dd>
97
+    
98
+    <dt>Andrew Lewman (Executive Director; Director; <a href="<page
99
+    press/press>">press contact</a>)</dt><dd>Manages the business operations
100
+    of The Tor Project, Inc.  Plays roles of finance, advocacy, project
101
+    management, and general support.  General package hacker for Windows,
102
+    OS X, and various linux distributions.</dd>
103
+    
104
+    <dt>Karsten Loesing (Developer)</dt><dd>
105
+    Worked during the 2007 Google Summer of Code on <a
106
+    href="<gitblob>doc/spec/proposals/114-distributed-storage.txt">distributing
107
+    and securing the publishing and fetching of hidden
108
+    service descriptors</a>. Currently working on <a href="<page
109
+    projects/hidserv>">making hidden services faster and more reliable</a>,
110
+    and on <a href="http://metrics.torproject.org/">metrics</a>.</dd>
111
+    
112
+    <dt>Nick Mathewson (Chief architect; Director)</dt><dd>One of the
113
+    three original designers of Tor; does a lot of the ongoing design work.
114
+    One of the two main developers, along with Roger.</dd>
115
+    
116
+    <dt>Steven Murdoch (Researcher and Developer)</dt><dd>Researcher at
117
+    the University of Cambridge, currently funded by The Tor Project to
118
+    improve the security, performance, and usability of Tor. Creator of the
119
+    <a href="<page projects/torbrowser>">Tor Browser Bundle</a>.</dd>
120
+    
121
+    <dt>Peter Palfrader</dt><dd>Manages the Debian packages, runs one of
122
+    the directory authorities, runs the website and the wiki, and generally
123
+    helps out a lot.</dd>
124
+    
125
+    <dt>Mike Perry (Developer)</dt><dd>Author of <a
126
+    href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>,
127
+    a Tor controller that builds paths through the Tor network and measures
128
+    various properties and behaviors, and new author of <a href="<page
129
+    projects/torbutton>">Torbutton</a>.</dd>
130
+    
131
+    <dt>Karen Reilly (Development Director)</dt><dd>Responsible for
132
+    fundraising, advocacy, and general marketing and outreach programs
133
+    for Tor.</dd>
134
+    
135
+    <dt>Runa A. Sandvik</dt><dd>Maintains the <a
136
+    href="https://translation.torproject.org/">Tor Translation
137
+    Portal</a>, and works on automatically converting our website wml
138
+    files to po files (and back) so that they can be handled by <a
139
+    href="http://translate.sourceforge.net/wiki/pootle/index">Pootle</a>.</dd>
140
+    
141
+    <dt>Paul Syverson</dt><dd>Inventor of <a
142
+    href="http://www.onion-router.net/">Onion Routing</a>, original designer
143
+    of Tor along with Roger and Nick, and project leader for original design,
144
+    development, and deployment of Tor. Currently helps out with research
145
+    and design.</dd>
146
+    </dl>
147
+    
148
+    <div class="underline"></div>
149
+    <a id="Board"></a>
150
+    <h3><a class="anchor" href="#Board">The Tor Project Board of
151
+    Directors:</a></h3>
152
+    
153
+    <dl>
154
+    <dt>Meredith Hoban Dunn (Director)</dt><dd>Our audit committee chair. Her
155
+    role is to help us make sure we're able to pass our upcoming corporate
156
+    audits correctly, watch for internal fraud, tell us when we're doing
157
+    things in a non-standard way, and so on.</dd>
158
+    
159
+    <dt>Ian Goldberg (Director)</dt><dd>Cryptographer,
160
+    privacy expert, and professor; one of the designers of <a
161
+    href="http://www.cypherpunks.ca/otr/">Off-the-Record Messaging</a>.</dd>
162
+    
163
+    <dt>Xianghui (Isaac) Mao (Director)</dt><dd>Chinese blogging
164
+    and privacy activist.  His current activities can be found at <a
165
+    href="http://isaacmao.com/">his website</a>.</dd>
166
+    
167
+    <dt>Frank Rieger (Director)</dt><dd>CTO of <a
168
+    href="http://www.gsmk.de/">GSMK Cryptophone</a>.</dd>
169
+    
170
+    <dt>Wendy Seltzer (Director)</dt><dd>Lawyer,
171
+    cyberlaw professor, and founder of <a
172
+    href="http://chillingeffects.org/">ChillingEffects.org</a>.</dd>
173
+    
174
+    <dt>Along with Roger, Nick, and Andrew listed above as Directors.</dt>
175
+    </dl>
176
+    
177
+    <div class="underline"></div>
178
+    <a id="GSoC"></a>
179
+    <h3><a class="anchor" href="#GSoC">Google Summer of Code 2010 students:</a></h3>
180
+    
181
+    <dl>
182
+    <dt>Kevin Berry</dt><dd>Working on a database schema to support better
183
+    node churn metrics and on a more dynamic metrics website. Mentored by
184
+    Karsten Loesing.</dd>
185
+    <dt>Harry Bock</dt><dd>Working on TorBEL, a Tor bulk exit list tracker and
186
+    service designed to replace TorDNSEL. TorBEL is written in Python using
187
+    the torflow API. Mentored by Sebastian Hahn.</dd>
188
+    <dt>Kory Kirk</dt><dd>Worked during Google Summer of Code 2009 on
189
+    extending Torbutton. Now he's working on implementing hidden services
190
+    for our java Tor client. Mentored by Bruce Leidl.</dd>
191
+    <dt>John Schanck</dt><dd>Works on improving the automated detection of
192
+    misconfigured or malicious exit nodes. Mentored by Mike Perry.</dd>
193
+    </dl>
194
+    
195
+    <div class="underline"></div>
196
+    <a id="Translators"></a>
197
+    <h3><a class="anchor" href="#Translators">Core translators:</a></h3>
198
+    
199
+    <dl>
200
+    <dt>Bogdan Drozdowski</dt><dd><a
201
+    href="https://www.torproject.org/index.html.pl">Polish</a>.</dd>
202
+    <dt>Tiago Faria</dt><dd>Portuguese.</dd>
203
+    <dt>fredzupy</dt><dd><a
204
+    href="https://www.torproject.org/index.html.fr">French</a>.</dd>
205
+    <dt>Ruben Garcia, plus further pages by <a
206
+    href="http://www.greentranslations.com/">Green Crescent</a></dt><dd><a
207
+    href="https://www.torproject.org/index.html.es">Spanish</a>.</dd>
208
+    <dt>Jens Kubieziel and Oliver Knapp</dt><dd><a
209
+    href="https://www.torproject.org/index.html.de">German</a>.</dd>
210
+    <dt>Pei Hanru and bridgefish</dt><dd><a
211
+    href="https://www.torproject.org/index.html.zh-cn">Simplified Chinese</a>.</dd>
212
+    <dt>Jan Reister</dt><dd><a
213
+    href="https://www.torproject.org/index.html.it">Italian</a>.</dd>
214
+    <dt>Masaki Taniguchi</dt><dd><a
215
+    href="https://www.torproject.org/index.html.ja">Japanese</a>.</dd>
216
+    <dt>Jan Woning</dt><dd><a
217
+    href="https://www.torproject.org/index.html.nl">Dutch</a>.</dd>
218
+    <dt>ygrek</dt><dd><a
219
+    href="https://www.torproject.org/index.html.ru">Russian</a>.</dd>
220
+    </dl>
221
+    
222
+    <div class="underline"></div>
223
+    <a id="Volunteers"></a>
224
+    <h3><a class="anchor" href="#Volunteers">More volunteers:</a></h3>
225
+    
226
+    <dl>
227
+    <dt>Anonym</dt><dd>Maintainer of the Incognito LiveCD.</dd>
228
+    <dt>Kevin Bankston</dt><dd>EFF lawyer who helped write the <a
229
+    href="<page eff/tor-legal-faq>">Tor Legal FAQ</a> and
230
+    tirelessly answers the phone when somebody in the world has a legal
231
+    question about Tor.</dd>
232
+    <dt>Marco Bonetti</dt><dd>Focusing on MobileTor for the iPhone.</dd>
233
+    <dt>Kasimir Gabert</dt><dd>Maintains the <a
234
+    href="https://torstatus.kgprog.com/">TorStatus</a> statistics pages.</dd>
235
+    <dt>Robert Hogan</dt><dd>Developer for the <a
236
+    href="http://tork.sf.net/">TorK</a> Tor controller.</dd>
237
+    <dt>Fabian Keil</dt><dd>One of the core Privoxy developers, and also a
238
+    Tor fan. He's the reason Tor and Privoxy still work well together.</dd>
239
+    <dt>Bruce Leidl</dt><dd>Working on a Tor client in Java.</dd>
240
+    <dt>Julius Mittenzwei</dt><dd>A lawyer with the CCC in
241
+    Germany. Coordinates the German Tor community with respect to legal
242
+    questions and concerns.</dd>
243
+    <dt>Shava Nerad</dt><dd>Our former Development Director. She still works
244
+    on PR and community relations.</dd>
245
+    <dt>Linus Nordberg</dt><dd>Enjoys measuring the Tor network and helps
246
+    with outreach in the Nordic countries.</dd>
247
+    <dt>Lasse &Oslash;verlier</dt><dd>Writes research papers on Tor: attacks,
248
+    defenses, and resource management, especially for hidden services.</dd>
249
+    <dt>Martin Peck</dt><dd>Working on a VM-based transparent
250
+    proxying approach for Tor clients on Windows.</dd>
251
+    <dt>rovv (a pseudonym -- he's managed to stay anonymous even from
252
+    us!)</dt><dd>The most dedicated bug reporter we've ever heard from. He
253
+    must read Tor source code every day over breakfast.</dd>
254
+    <dt>tup (another pseudonym)</dt><dd>Periodically adds new features for
255
+    making Tor easier to use as a <a
256
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy">transparent
257
+    proxy</a>. Also maintains the <a
258
+    href="http://p56soo2ibjkx23xo.onion/">TorDNSEL code</a>.</dd>
259
+    <dt>Kyle Williams</dt><dd>Developer for
260
+    JanusVM, a VMWare-based
261
+    transparent Tor proxy that makes Tor easier to set up and use.</dd>
262
+    <dt>Ethan Zuckerman</dt><dd>A blogger who has written some
263
+    <a href="http://www.ethanzuckerman.com/blog/?p=1019">interesting</a>
264
+    <a href="http://advocacy.globalvoicesonline.org/tools/guide/">tutorials</a>
265
+    for how, when, and whether to use Tor. He also teaches activists around
266
+    the world about Tor and related tools.</dd>
267
+    <dt>All our relay operators, people who write <a
268
+    href="http://freehaven.net/anonbib/">research papers</a> about Tor,
269
+    people who teach others about Tor, etc.</dt>
270
+    </dl>
271
+    
272
+    <div class="underline"></div>
273
+    <a id="Past"></a>
274
+    <h3><a class="anchor" href="#Past">Past thanks to:</a></h3>
275
+    
276
+    <dl>
277
+    <dt>John Bashinski</dt><dd> Contributed the initial rpm spec file.</dd>
278
+    <dt>Domenik Bork</dt><dd> Worked on
279
+    Configuration of Hidden Services with User Authorization in Vidalia (<a
280
+    href="http://trac.vidalia-project.net/browser/vidalia/branches/hidden-services">svn</a>) as part of Google Summer of Code 2008.</dd>
281
+    <dt>Benedikt Boss</dt><dd>Worked during the 2007 Google Summer of Code on <a
282
+    href="https://svn.torproject.org/svn/topf/trunk/README">TOPF</a>,
283
+    a fuzzer for Tor; mentored by Roger.</dd>
284
+    <dt>Ren Bucholz</dt><dd>Our fine logo and images.</dd>
285
+    <dt>Fallon Chen</dt><dd> Worked on
286
+    Improving Tor Path Selection (<a
287
+    href="https://svn.torproject.org/cgi-bin/viewcvs.cgi/torflow/branches/gsoc2008/">svn</a>)
288
+    and <a
289
+    href="<gitblob>doc/spec/proposals/151-path-selection-improvements.txt">proposal
290
+    151</a> as part of Google Summer of Code 2008.</dd>
291
+    <dt>Bram Cohen</dt><dd>Helped design our congestion control mechanisms,
292
+    in Tor's early days.</dd>
293
+    <dt>Pat Double</dt><dd>Creator of the Incognito LiveCD.</dd>
294
+    <dt>Geoff Goodell</dt><dd>Started the <a
295
+    href="https://svn.torproject.org/svn/blossom/trunk/">Blossom project</a>
296
+    which uses Tor as its overlay network; also helped motivate Tor's control
297
+    interface to be as flexible as it is.</dd>
298
+    <dt>Aleksei Gorny</dt><dd> Working on
299
+    Tor exit scanner improvements (<a
300
+    href="https://svn.torproject.org/cgi-bin/viewcvs.cgi/torflow/branches/gsoc2008/">svn</a>), originally started as part of Google Summer of Code 2008.</dd>
301
+    <dt>Christian Grothoff</dt><dd> Contributed better daemonizing behavior.</dd>
302
+    <dt>Steven Hazel</dt><dd> Made 'make install' do the right thing.</dd>
303
+    <dt>Justin Hipple</dt><dd>The other developer for Vidalia.</dd>
304
+    <dt>Jason Holt</dt><dd> Contributed patches to the instructions and the man
305
+    page.</dd>
306
+    <dt>Christian King</dt><dd> Worked during the 2007 Google Summer of Code
307
+    on making Tor relays stable on
308
+    Windows, by developing a <a
309
+    href="https://svn.torproject.org/svn/libevent-urz/trunk/README">buffer
310
+    implementation for libevent</a>; mentored by Nick.</dd>
311
+    <dt>Joe Kowalski</dt><dd>Original author and provider of the torstatus
312
+    script formerly run on nighteffect.</dd>
313
+    <dt>Adam Langley</dt><dd>Our fine eventdns code.</dd>
314
+    <dt>Rebecca MacKinnon</dt><dd>Former Director of Tor.  Co-Founder of <a
315
+    href="http://www.globalvoicesonline.org/">Global Voices Online</a>.</dd>
316
+    <dt>Chris Palmer</dt><dd>Our liaison and tech guy with EFF while EFF
317
+    was funding us. Also helped advocate and write end-user docs.</dd>
318
+    <dt>Matej Pfajfar</dt><dd>Author of the original onion routing code that
319
+    Tor is based on, so we didn't have to start from scratch.</dd>
320
+    <dt>Johannes Renner</dt><dd> Worked during the 2007 Google Summer of
321
+    Code on modifying <a
322
+    href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>
323
+    to measure various properties of the Tor network; mentored by Mike
324
+    Perry.</dd>
325
+    <dt>Scott Squires</dt><dd>The original developer of <a
326
+    href="<page projects/torbutton>">Torbutton</a>.</dd>
327
+    <dt>Aaron Turner</dt><dd> Contributed the first version of the tor.sh
328
+    initscripts shell script.</dd>
329
+    <dt>Stephen Tyree</dt><dd> Worked during Google Summer of Code 2009 to
330
+    develop a plugin API for <a href="<page projects/vidalia>">Vidalia</a>
331
+    and create a plugin to allow HerdictWeb integration, a project aiming
332
+    at identifying website inaccessibility using user submissions.</dd>
333
+    <dt>Camilo Viecco</dt><dd> Worked on
334
+    Providing Blossom functionality to Vidalia (<a
335
+    href="http://trac.vidalia-project.net/browser/vidalia/branches/exit-country">svn</a>) as part of Google Summer of Code 2008.</dd>
336
+    <dt>Fred von Lohmann</dt><dd>Fred served on our Board of Directors
337
+    from 2006 through 2009.   His complete bio can be found at the <a
338
+    href="http://www.eff.org/about/staff/?f=fred_von_lohmann.html">EFF
339
+    Staff Site</a>.</dd>
340
+    <dt>Christian Wilms</dt><dd> Worked on
341
+    Performance Enhancing Measures for Tor Hidden Services (<a
342
+    href="https://svn.torproject.org/cgi-bin/viewcvs.cgi/tor/branches/hidserv-perf/">svn</a>) as part of Google Summer of Code 2008.</dd>
343
+    <dt>Jillian C. York</dt><dd><a href="http://jilliancyork.com/">Jillian
344
+    C. York</a> is a writer, blogger, and activist based in
345
+    Boston.  She blogs on the uses of Tor and anonymity at <a
346
+    href="http://www.knightpulse.org/blog/tor">KnightPulse</a>.</dd>
347
+    </dl>
348
+  </div>
349
+  <!-- END MAINCOL -->
350
+  <div id = "sidecol">
351
+#include "side.wmi"
352
+#include "info.wmi"
353
+  </div>
354
+  <!-- END SIDECOL -->
355
+</div>
356
+<!-- END CONTENT -->
357
+#include <foot.wmi> 
... ...
@@ -0,0 +1,63 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'about/about',
21
+       'txt'  => 'Tor Overview',
22
+       'subelements' => [
23
+          {'url'  => 'about/why',
24
+           'txt'  => 'Why We Need Tor',
25
+          },
26
+          {'url'  => 'about/staying',
27
+           'txt'  => 'Staying Anonymous',
28
+          }, 
29
+          {'url'  => 'about/future',
30
+           'txt'  => 'Future of Tor',
31
+          }]
32
+      },
33
+      {'url'  => 'about/torusers',
34
+       'txt'  => 'Users of Tor',
35
+      },
36
+
37
+      {'url'  => 'about/corepeople',
38
+       'txt'  => 'Tor People',
39
+       'subelements' => [
40
+          {'url'  => 'about/board',
41
+           'txt'  => 'Board of Directors',
42
+          }, 
43
+          {'url'  => 'about/translators',
44
+           'txt'  => 'Translators',
45
+          }, 
46
+          {'url'  => 'about/volunteers',
47
+           'txt'  => 'Volunteers',
48
+          },  
49
+          {'url'  => 'about/contributors',
50
+           'txt'  => 'Past Contributors',
51
+          }]
52
+      },
53
+      {'url'  => 'about/sponsors',
54
+       'txt'  => 'Sponsors',
55
+      },
56
+      {'url'  => 'projects/clientside',
57
+       'txt'  => 'Projects',
58
+      }, 
59
+      {'url'  => 'docs/faq',
60
+       'txt'  => 'FAQ',
61
+      },  
62
+  ];
63
+:>
... ...
@@ -0,0 +1,82 @@
1
+## translation metadata
2
+# Revision: $Revision: 22225 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: Sponsors" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/about>">About &raquo; </a>
10
+    <a href="<page about/sponsors>">Sponsors</a>
11
+  </div>
12
+  <div id="maincol">
13
+    <h1>Tor: Sponsors</h1>
14
+    <p>
15
+    The Tor Project's <a href="<page about/torusers>">diversity of users</a> means we
16
+    have a diversity of funding sources too &mdash; and we're eager to diversify
17
+    even further! Our sponsorships are divided into levels based on total funding received:
18
+    </p>
19
+    
20
+    <h3><i>Magnoliophyta</i> (over $1 million)</h3>
21
+    	<ul>
22
+    		<li>You?</li>
23
+    	</ul>
24
+    
25
+    <h3><i>Liliopsida</i> (up to $750k)</h3>
26
+    	<ul>
27
+    		<li>An anonymous North American NGO (2008-2010)</li>
28
+    	</ul>
29
+    
30
+    <h3><i>Asparagales</i> (up to $500k)</h3>
31
+    	<ul>
32
+    		<li><a href="http://www.ibb.gov/">International Broadcasting Bureau</a> (2006-2010)</li>
33
+    		<li>An anonymous European NGO (2006-2008)</li>
34
+    	</ul>
35
+    
36
+    <h3><i>Alliaceae</i> (up to $200k)</h3>
37
+    	<ul>
38
+    		<li>You?</li>
39
+    	</ul>
40
+    
41
+    <h3><i>Allium</i> (up to $100k)</h3>
42
+    	<ul>
43
+    		<li><a href="http://www.nlnet.nl/">NLnet Foundation</a> (2008-2009)</li>
44
+    		<li><a href="http://chacs.nrl.navy.mil/">Naval Research Laboratory</a> (2006-2010)</li>
45
+    		<li>An anonymous North American ISP (2009-2010)</li>
46
+    	</ul>
47
+    
48
+    <h3><i>Allium cepa</i> (up to $50k)</h3>
49
+    	<ul>
50
+    		<li><a href="<page donate/donate>">More than 500 personal donations from individuals like you</a> (2006-2010)</li>
51
+    		<li><a href="http://code.google.com/opensource/">Google</a> (2008-2009)</li>
52
+    		<li><a href="http://code.google.com/soc/">Google Summer of Code</a> (2007-2009)</li>
53
+    		<li><a href="http://www.hrw.org/">Human Rights Watch</a> (2007)</li>
54
+    		<li><a href="http://www.torfox.org/">Torfox</a> (2009)</li>
55
+        <li><a href="http://www.shinjiru.com/">Shinjiru Technology</a> (2009-2010)</li>
56
+      </ul>
57
+    
58
+    <h3>Past sponsors</h3>
59
+    <p>We greatly appreciate the support provided by our past sponsors in keeping the pre-501(c)(3) Tor Project progressing through our ambitious goals:</p>
60
+    	<ul>
61
+    		<li><a href="https://www.eff.org/">Electronic Frontier Foundation</a> (2004-2005)</li>
62
+    		<li><a href="http://chacs.nrl.navy.mil/">DARPA and ONR via Naval Research Laboratory</a> (2001-2006)</li>
63
+    		<li><a href="http://www.cyber-ta.org/">Cyber-TA project</a> (2006-2008)</li>
64
+    		<li>Bell Security Solutions Inc (2006)</li>
65
+    		<li><a href="http://www.omidyar.net/">Omidyar Network Enzyme Grant</a> (2006)</li>
66
+    		<li><a href="http://seclab.cs.rice.edu/lab/2005/08/01/seclab-awarded-grant-to-study-security-of-p2p/">NSF via Rice University</a> (2006-2007)</li>
67
+    	</ul>
68
+    <p>Thank you to all the people and groups who have made Tor possible so
69
+    far, and thank you especially to the individual volunteers who have made
70
+    non-financial contributions: coding, testing, documenting, educating,
71
+    researching, and running the relays that make up the Tor network.
72
+    </p>
73
+  </div>
74
+  <!-- END MAINCOL -->
75
+  <div id = "sidecol">
76
+#include "side.wmi"
77
+#include "info.wmi"
78
+  </div>
79
+  <!-- END SIDECOL -->
80
+</div>
81
+<!-- END CONTENT -->
82
+#include <foot.wmi> 
... ...
@@ -0,0 +1,42 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Staying Anonymous" CHARSET="UTF-8" <p>
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/about>">About &raquo; </a>
10
+    <a href="<page about/staying>">Staying Anonymous</a>
11
+  </div>
12
+  <div id="maincol">
13
+    <h1>Staying anonymous</h1> 
14
+    
15
+    <p>
16
+    Tor can't solve all anonymity problems.  It focuses only on
17
+    protecting the transport of data.  You need to use protocol-specific
18
+    support software if you don't want the sites you visit to see your
19
+    identifying information. For example, you can use web proxies such as
20
+    Privoxy while web browsing to block cookies and withhold information
21
+    about your browser type.
22
+    </p>
23
+    
24
+    <p>
25
+    Also, to protect your anonymity, be smart.  Don't provide your name
26
+    or other revealing information in web forms.  Be aware that, like all
27
+    anonymizing networks that are fast enough for web browsing, Tor does not
28
+    provide protection against end-to-end timing attacks: If your attacker
29
+    can watch the traffic coming out of your computer, and also the traffic
30
+    arriving at your chosen destination, he can use statistical analysis to
31
+    discover that they are part of the same circuit.
32
+    </p> 
33
+  </div>
34
+  <!-- END MAINCOL -->
35
+  <div id = "sidecol">
36
+#include "side.wmi"
37
+#include "info.wmi"
38
+  </div>
39
+  <!-- END SIDECOL -->
40
+</div>
41
+<!-- END CONTENT -->
42
+#include <foot.wmi> 
... ...
@@ -0,0 +1,343 @@
1
+## translation metadata
2
+# Revision: $Revision: 22261 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Who uses Tor?" CHARSET="UTF-8"
6
+
7
+<div id="content" class="clearfix">
8
+  <div id="breadcrumbs">
9
+    <a href="<page home>">Home &raquo; </a>
10
+    <a href="<page about/about>">About &raquo; </a>
11
+    <a href="<page about/torusers>">Who Uses Tor</a>
12
+  </div>
13
+  <div id="maincol">
14
+
15
+    <h1>Inception</h1>
16
+    
17
+    #<!-- BEGIN SIDEBAR -->
18
+    #<div class="sidebar-left">
19
+    #<h3>Who uses Tor?</h3>
20
+    #<ul>
21
+    #<li><a href="<page about/torusers>#normalusers">Normal people use Tor</a></li>
22
+    #<li><a href="<page about/torusers>#military">Militaries use Tor</a></li>
23
+    #<li><a href="<page about/torusers>#journalist">Journalists and their audience use Tor</a></li>
24
+    #<li><a href="<page about/torusers>#lawenforcement">Law enforcement officers use Tor</a></li>
25
+    #<li><a href="<page about/torusers>#activists">Activists &amp; Whistleblowers use Tor</a></li>
26
+    #<li><a href="<page about/torusers>#spotlight">High &amp; low profile people use Tor</a></li>
27
+    #<li><a href="<page about/torusers>#executives">Business executives use Tor</a></li>
28
+    #<li><a href="<page about/torusers>#bloggers">Bloggers use Tor</a></li>
29
+    #<li><a href="<page about/torusers>#itprofessionals">IT Professionals use Tor</a></li>
30
+    #</ul>
31
+    #</div>
32
+    #<!-- END SIDEBAR -->
33
+    
34
+    <hr />
35
+    <p>
36
+    Tor was originally designed, implemented, and deployed as a third-generation
37
+    <a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>.
38
+    It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications.
39
+    Today, it is used every day for a wide variety of purposes by the military, journalists, law enforcement officers, activists, and many others. Here are some of the specific uses we've seen or recommend.
40
+    </p>
41
+    
42
+    <a name="normalusers"></a>
43
+    <h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>
44
+    <hr />
45
+    <ul>
46
+    <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
47
+    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
48
+    sell your Internet browsing records</a> to marketers or anyone else
49
+    willing to pay for it. ISPs typically say that
50
+    they anonymize the data by not providing personally identifiable information, but
51
+    <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
52
+    has proven incorrect</a>.  A full record of every site you visit, the text of every search you perform, and potentially
53
+    userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
54
+    </li>
55
+    <li><strong> They protect their communications from irresponsible corporations.</strong>
56
+    All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
57
+    private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
58
+    <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&amp;en=f6f61949c6da4d38&amp;ei=5090">giving away the data to researchers</a>,
59
+    your data is often not well protected by those you are supposed to trust to keep it safe.
60
+    </li>
61
+    <li><strong>They protect their children online.</strong>
62
+    You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply
63
+    by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
64
+    In the United States, the government is pushing to make this mapping increasingly precise.
65
+    </li>
66
+    <li><strong>They research sensitive topics.</strong>
67
+    There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
68
+    <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
69
+    or world religions is behind a national firewall.
70
+    </li>
71
+    </ul>
72
+    
73
+    <a name="military"></a>
74
+    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
75
+    <hr />
76
+    <ul>
77
+    
78
+    <li>
79
+    <strong>Field Agents:</strong>
80
+    It is not difficult for insurgents to monitor Internet traffic and
81
+    discover all the hotels and other locations from which people are
82
+    connecting to known military servers.
83
+    Military field agents deployed away from home use Tor to
84
+    mask the sites they are visiting, protecting military interests and
85
+    operations, as well as protecting themselves from physical harm.
86
+    </li>
87
+    
88
+    <li><strong>Hidden services:</strong>
89
+    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
90
+    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
91
+    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
92
+    control to be physically secure from discovery and takedown.
93
+    </li>
94
+    <li><strong>Intelligence gathering:</strong>
95
+    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
96
+    to record a military address, thereby revealing the surveillance.
97
+    </li>
98
+    </ul>
99
+    
100
+    <a name="journalist"></a>
101
+    <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
102
+    <hr />
103
+    <ul>
104
+    <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
105
+    tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
106
+    journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
107
+    </li>
108
+    <li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
109
+    (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
110
+    safe access to free media.  Tor preserves the ability of persons behind national firewalls or under
111
+    the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
112
+    economics and religion.
113
+    </li>
114
+    <li><strong>Citizen journalists in China</strong> use Tor to write about
115
+    local events to encourage social change and political reform.
116
+    </li>
117
+    <li><strong>Citizens and journalists in <a
118
+    href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black
119
+    holes</a></strong> use Tor to research state propaganda and opposing
120
+    viewpoints, to file stories with non-State controlled media, and to
121
+    avoid risking the personal consequences of intellectual curiosity.
122
+    </li>
123
+    </ul>
124
+    
125
+    <a name="lawenforcement"></a>
126
+    <h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
127
+    <hr />
128
+    <ul>
129
+    <li><strong>Online surveillance:</strong>
130
+    Tor allows officials to surf questionable web sites and services
131
+    without leaving tell-tale tracks.  If the system administrator of an
132
+    illegal gambling site, for example, were to see multiple connections from
133
+    government or law enforcement IP addresses in usage logs, investigations
134
+    may be hampered.
135
+    </li>
136
+    <li><strong>Sting operations:</strong>
137
+    Similarly, anonymity allows law officers to engage in online
138
+    &ldquo;undercover &rdquo; operations.  Regardless of how good an
139
+    undercover officer's &ldquo;street cred&rdquo; may be, if the
140
+    communications include IP ranges from police addresses, the cover is blown.
141
+    </li>
142
+    <li><strong>Truly anonymous tip lines:</strong>
143
+    While online anonymous tip lines are popular, without anonymity
144
+    software, they are far less useful.  Sophisticated sources understand that
145
+    although a name or email address is not attached to information, server
146
+    logs can identify them very quickly.  As a result, tip line web sites that
147
+    do not encourage anonymity are limiting the sources of their tips.
148
+    </li>
149
+    </ul>
150
+    
151
+    <a name="activists"></a>
152
+    <h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
153
+    <hr />
154
+    <ul>
155
+    <li><strong>Human rights activists use Tor to anonymously report abuses from
156
+    danger zones.</strong>  Internationally, labor rights workers use Tor and other
157
+    forms of online and offline anonymity to organize workers in accordance
158
+    with the Universal Declaration of Human Rights. Even though they are within
159
+    the law, it does not mean they are safe. Tor provides the ability to
160
+    avoid persecution while still raising a voice.
161
+    </li>
162
+    <li>When groups such as the <strong>Friends Service Committee and environmental
163
+    groups are increasingly <a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a>
164
+    in the United States</strong> under laws meant to protect against terrorism, many peaceful agents of
165
+    change rely on Tor for basic privacy during legitimate activities.
166
+    </li>
167
+    <li><strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
168
+    recommends Tor in their report, &ldquo;
169
+    <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
170
+    Complicity in Chinese Internet Censorship</a>.&rdquo; The study
171
+    co-author interviewed Roger Dingledine, Tor project leader,
172
+    on Tor use.  They cover Tor in the section on how to breach the <a
173
+    href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
174
+    Firewall of China,&rdquo;</a> and recommend that human rights workers throughout
175
+    the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
176
+    </li>
177
+    <li> Tor has consulted with and volunteered help to <strong>Amnesty International's
178
+    recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
179
+    See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
180
+    report</a> on China Internet issues.
181
+    </li>
182
+    <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
183
+    recommends Tor, especially for <strong>anonymous blogging</strong>,
184
+    throughout their <a href="http://advocacy.globalvoicesonline.org/projects/guide/">
185
+    web site.</a>
186
+    </li>
187
+    <li>In the US, the Supreme Court recently stripped legal protections from
188
+    government whistleblowers.  But whistleblowers working for governmental
189
+    transparency or corporate accountability can use Tor to seek justice
190
+    without personal repercussions.
191
+    </li>
192
+    <li>A contact of ours who works with a public health nonprofit in
193
+    Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>,
194
+    mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can
195
+    not afford to complain &mdash; this is the point at which open objection can
196
+    become dangerous.  So his nonprofit has been working to
197
+    <strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work.
198
+    </li>
199
+    <li>At a recent conference, a Tor staffer ran into a woman who came from
200
+    a &ldquo;company town&rdquo; in the eastern United States. She was attempting to blog anonymously to rally
201
+    local residents to <strong>urge reform in the company</strong> that dominated the town's
202
+    economic and government affairs. She is fully cognizant that the kind of
203
+    organizing she was doing <strong>could lead to harm or &ldquo;fatal
204
+    accidents.&rdquo;</strong>
205
+    </li>
206
+    <li>In east Asia, some labor organizers use anonymity to <strong>reveal information
207
+    regarding sweatshops</strong> that produce goods for western countries and to
208
+    organize local labor.
209
+    </li>
210
+    <li>
211
+    Tor can help activists avoid government or corporate censorship that hinders organization.
212
+    In one such case, a
213
+    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
214
+    to help organize a strike.
215
+    </li>
216
+    </ul>
217
+    
218
+    <a name="spotlight"></a>
219
+    <h2><a class="anchor" href="#spotlight">High &amp; low profile people use Tor</a></h2>
220
+    <hr />
221
+    <ul>
222
+    <li>Does being in the public spotlight shut you off from having a private
223
+    life, forever, online?  A rural lawyer in a New England state keeps
224
+    an anonymous blog because, with the diverse clientele at his prestigious
225
+    law firm, <strong>his political beliefs are bound to offend someone</strong>.  Yet, he
226
+    doesn't want to remain silent on issues he cares about.  Tor helps him
227
+    feel secure that he can express his opinion without consequences to his
228
+    public role.
229
+    </li>
230
+    <li>People living in poverty often don't participate fully in civil society
231
+    -- not out of ignorance or apathy, but out of fear.  If something you
232
+    write were to get back to your boss, would you lose your job?  If your
233
+    social worker read about your opinion of the system, would she treat
234
+    you differently?  Anonymity gives a voice to the voiceless.
235
+    To support this, <strong>Tor currently has an open Americorps/VISTA position</strong> pending.  This
236
+    government grant will cover a full time stipend for a volunteer to create
237
+    curricula to <strong>show low-income populations how to use anonymity online for
238
+    safer civic engagement</strong>.  Although it's often said that the poor do not use
239
+    online access for civic engagement, failing to act in their self-interests,
240
+    it is our hypothesis (based on personal conversations and anecdotal
241
+    information) that it is precisely the &ldquo;permanent record &rdquo;
242
+    left online that keeps many of the poor from speaking out on the Internet.
243
+    We hope to show people how to engage more safely online, and then at
244
+    the end of the year, evaluate how online and offline civic engagement has
245
+    changed, and how the population sees this continuing into the future.
246
+    </li>
247
+    </ul>
248
+    
249
+    <a name="executives"></a>
250
+    <h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
251
+    <hr />
252
+    <ul>
253
+    <li><strong>Security breach information clearinghouses:</strong>
254
+    Say a financial institution participates in a security clearinghouse
255
+    of information on Internet attacks.  Such a repository requires members
256
+    to report breaches to a central group, who correlates attacks to detect
257
+    coordinated patterns and send out alerts.  But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming
258
+    traffic to such a repository to be able to track where information is
259
+    coming from.  Even though every packet were encrypted, the IP
260
+    address would betray the location of a compromised system.  Tor allows
261
+    such repositories of sensitive information to resist compromises.
262
+    </li>
263
+    <li><strong>Seeing your competition as your market does:</strong>
264
+    If you try to check out a competitor's pricing, you may find no
265
+    information or misleading information on their web site.  This is because
266
+    their web server may be keyed to detect connections from competitors,
267
+    and block or spread disinformation to your staff.  Tor allows a business
268
+    to view their sector as the general public would view it.
269
+    </li>
270
+    <li><strong>Keeping strategies confidential:</strong>
271
+    An investment bank, for example, might not want industry snoopers to be
272
+    able to track what web sites their analysts are watching.  The strategic
273
+    importance of traffic patterns, and the vulnerability of the surveillance
274
+    of such data, is starting to be more widely recognized in several areas
275
+    of the business world.
276
+    </li>
277
+    <li><strong>Accountability:</strong>
278
+    In an age when irresponsible and unreported corporate activity has
279
+    undermined multi-billion dollar businesses, an executive exercising true
280
+    stewardship wants the whole staff to feel free to disclose internal
281
+    malfeasance.  Tor facilitates internal accountability before it turns
282
+    into whistleblowing.
283
+    </li>
284
+    </ul>
285
+    
286
+    <a name="bloggers"></a>
287
+    <h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
288
+    <hr />
289
+    <ul>
290
+    <li>Frequently we hear about bloggers who are
291
+    <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
292
+    <a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
293
+    for saying perfectly legal things online, in their blog.</li>
294
+    <li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
295
+    <li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li>
296
+    </ul>
297
+    
298
+    <a name="itprofessionals"></a>
299
+    <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
300
+    <hr />
301
+    <ul>
302
+    <li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li>
303
+    <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
304
+    <li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li>
305
+    <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
306
+    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li>
307
+    </ul>
308
+    
309
+    <p>
310
+    Please do send us your success stories. They are very important because
311
+    Tor provides anonymity. While it is thrilling to speculate about <a
312
+    href="<page docs/faq-abuse>">undesired effects of Tor</a>, when it succeeds, nobody notices.  This is
313
+    great for users, but not so good for us, since publishing success
314
+    stories about how people or organizations are staying anonymous could be
315
+    counterproductive.  For example, we talked to an FBI officer who
316
+    explained that he uses Tor every day for his work &mdash; but he quickly followed up with a request not to provide
317
+    details or mention his name.</p>
318
+    
319
+    <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
320
+    debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
321
+    <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
322
+    href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
323
+    just a good idea some of the time - it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
324
+    <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
325
+    <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
326
+    <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
327
+    and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
328
+    are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
329
+    the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
330
+    purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
331
+    <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
332
+    you have better options than Tor. While not dismissing the potential abuses of Tor,
333
+    this page shows a few of the many important ways anonymity is used online today.</p>
334
+  </div>
335
+  <!-- END MAINCOL -->
336
+  <div id = "sidecol">
337
+#include "side.wmi"
338
+#include "info.wmi"
339
+  </div>
340
+  <!-- END SIDECOL -->
341
+</div>
342
+<!-- END CONTENT -->
343
+#include <foot.wmi> 
... ...
@@ -0,0 +1,74 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Translators" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
6
+<div id="content" class="clearfix">
7
+	<div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/about>">About &raquo; </a>
10
+    <a href="<page about/volunteers>">Translators</a>
11
+  </div>
12
+	<div id="maincol">
13
+  	<h1>Translators</h1>
14
+    <table>
15
+    	<tr>
16
+        <td class="beige">
17
+          <div class="name">Translator Name</div>
18
+          <div class="caps">Translator Title</div>
19
+          <p>Translator is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
20
+        </td>
21
+        <td>
22
+          <div class="name">Translator Name</div>
23
+          <div class="caps">Translator Title</div>
24
+          <p>Translator is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
25
+        </td>
26
+      </tr>
27
+      <tr>
28
+        <td>
29
+          <div class="name">Translator Name</div>
30
+          <div class="caps">Translator Title</div>
31
+          <p>Translator is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
32
+        </td>
33
+        <td class="beige">
34
+          <div class="name">Translator Name</div>
35
+          <div class="caps">Translator Title</div>
36
+          <p>Translator is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
37
+        </td>
38
+      </tr>
39
+      <tr>
40
+        <td class="beige">
41
+          <div class="name">Translator Name</div>
42
+          <div class="caps">Translator Title</div>
43
+          <p>Translator is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
44
+        </td>
45
+        <td>
46
+          <div class="name">Translator Name</div>
47
+          <div class="caps">Translator Title</div>
48
+          <p>Translator is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
49
+        </td>
50
+      </tr>
51
+      <tr>
52
+        <td>
53
+          <div class="name">Translator Name</div>
54
+          <div class="caps">Translator Title</div>
55
+          <p>Translator is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
56
+        </td>
57
+        <td class="beige">
58
+          <div class="name">Translator Name</div>
59
+          <div class="caps">Translator Title</div>
60
+          <p>Translator is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
61
+        </td>
62
+      </tr>
63
+    </table>
64
+    <!-- END TABLE -->
65
+  </div>
66
+  <!-- END MAINCOL -->
67
+  <div id = "sidecol">
68
+#include "side.wmi"
69
+#include "info.wmi"
70
+  </div>
71
+  <!-- END SIDECOL -->
72
+</div>
73
+<!-- END CONTENT -->
74
+#include <foot.wmi> 
... ...
@@ -0,0 +1,74 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 3-low
4
+#include "head.wmi" TITLE="Tor Project: Volunteers" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
5
+
6
+<div id="content" class="clearfix">
7
+	<div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/about>">About &raquo; </a>
10
+    <a href="<page about/volunteers>">Volunteers</a>
11
+  </div>
12
+	<div id="maincol">
13
+  	<h1>Volunteers</h1>
14
+    <table>
15
+    	<tr>
16
+        <td class="beige">
17
+          <div class="name">Volunteer Name</div>
18
+          <div class="caps">Volunteer Title</div>
19
+          <p>Volunteer is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
20
+        </td>
21
+        <td>
22
+          <div class="name">Volunteer Name</div>
23
+          <div class="caps">Volunteer Title</div>
24
+          <p>Volunteer is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
25
+        </td>
26
+      </tr>
27
+      <tr>
28
+        <td>
29
+          <div class="name">Volunteer Name</div>
30
+          <div class="caps">Volunteer Title</div>
31
+          <p>Volunteer is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
32
+        </td>
33
+        <td class="beige">
34
+          <div class="name">Volunteer Name</div>
35
+          <div class="caps">Volunteer Title</div>
36
+          <p>Volunteer is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
37
+        </td>
38
+      </tr>
39
+      <tr>
40
+        <td class="beige">
41
+          <div class="name">Volunteer Name</div>
42
+          <div class="caps">Volunteer Title</div>
43
+          <p>Volunteer is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
44
+        </td>
45
+        <td>
46
+          <div class="name">Volunteer Name</div>
47
+          <div class="caps">Volunteer Title</div>
48
+          <p>Volunteer is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
49
+        </td>
50
+      </tr>
51
+      <tr>
52
+        <td>
53
+          <div class="name">Volunteer Name</div>
54
+          <div class="caps">Volunteer Title</div>
55
+          <p>Volunteer is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
56
+        </td>
57
+        <td class="beige">
58
+          <div class="name">Volunteer Name</div>
59
+          <div class="caps">Volunteer Title</div>
60
+          <p>Volunteer is tackling the growing needs for easy to configure packages on many operating systems. She’s also automating the build system and producing nightly builds for all operating systems we support.</p>
61
+        </td>
62
+      </tr>
63
+    </table>
64
+    <!-- END TABLE -->
65
+  </div>
66
+  <!-- END MAINCOL -->
67
+  <div id = "sidecol">
68
+#include "side.wmi"
69
+#include "info.wmi"
70
+  </div>
71
+  <!-- END SIDECOL -->
72
+</div>
73
+<!-- END CONTENT -->
74
+#include <foot.wmi> 
... ...
@@ -0,0 +1,66 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Why We Need Tor" CHARSET="UTF-8" <p>
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/about>">About &raquo; </a>
10
+    <a href="<page about/why>">Why We Need Tor</a>
11
+  </div>
12
+  <div id="maincol">
13
+    <h1>Why We Need Tor</h1>  
14
+    
15
+    <p>
16
+    Using Tor protects you against a common form of Internet surveillance
17
+    known as "traffic analysis."  Traffic analysis can be used to infer
18
+    who is talking to whom over a public network.  Knowing the source
19
+    and destination of your Internet traffic allows others to track your
20
+    behavior and interests.  This can impact your checkbook if, for example,
21
+    an e-commerce site uses price discrimination based on your country or
22
+    institution of origin.  It can even threaten your job and physical safety
23
+    by revealing who and where you are. For example, if you're travelling
24
+    abroad and you connect to your employer's computers to check or send mail,
25
+    you can inadvertently reveal your national origin and professional
26
+    affiliation to anyone observing the network, even if the connection
27
+    is encrypted.
28
+    </p>
29
+    
30
+    <p>
31
+    How does traffic analysis work?  Internet data packets have two parts:
32
+    a data payload and a header used for routing.  The data payload is
33
+    whatever is being sent, whether that's an email message, a web page, or an
34
+    audio file.  Even if you encrypt the data payload of your communications,
35
+    traffic analysis still reveals a great deal about what you're doing and,
36
+    possibly, what you're saying.  That's because it focuses on the header,
37
+    which discloses source, destination, size, timing, and so on.
38
+    </p>
39
+    
40
+    <p>
41
+    A basic problem for the privacy minded is that the recipient of your
42
+    communications can see that you sent it by looking at headers.  So can
43
+    authorized intermediaries like Internet service providers, and sometimes
44
+    unauthorized intermediaries as well.  A very simple form of traffic
45
+    analysis might involve sitting somewhere between sender and recipient on
46
+    the network, looking at headers.
47
+    </p>
48
+    
49
+    <p>
50
+    But there are also more powerful kinds of traffic analysis.  Some
51
+    attackers spy on multiple parts of the Internet and use sophisticated
52
+    statistical techniques to track the communications patterns of many
53
+    different organizations and individuals.  Encryption does not help against
54
+    these attackers, since it only hides the content of Internet traffic, not
55
+    the headers.
56
+    </p> 
57
+  </div>
58
+  <!-- END MAINCOL -->
59
+  <div id = "sidecol">
60
+#include "side.wmi"
61
+#include "info.wmi"
62
+  </div>
63
+  <!-- END SIDECOL -->
64
+</div>
65
+<!-- END CONTENT -->
66
+#include <foot.wmi> 
... ...
@@ -0,0 +1,109 @@
1
+#!/usr/bin/env wml
2
+    <div id="footer">
3
+    	<div class="onion"><img src="$(IMGROOT)/onion.jpg" alt="Tor" /></div>
4
+      <div class="about">
5
+      	<p>"Tor" and the "Onion Logo" are registered trademarks of <a href="#">The Tor Project, Inc.</a> Content on this site is licensed under a <a href="#">Creative Commons Attribution 3.0 United States License</a>, unless otherwise noted.</p>
6
+        <p> Last modified: Thu Mar 4 07:48:04 2010
7
+        # This will grab the date from svn info but formatting is tedious
8
+        #<:{
9
+        #  my $svninfo = `svn info`;
10
+        #  if ($svninfo =~ m/Last Changed Date: (\d{4}-\d{2}-\d{2})\s(\d{2}:\d{2}:\d{2})\s(.*)\s\((.*)\)/) {
11
+        #    my $modifydate = "$4 $2";
12
+        #    # remove commas from date
13
+        #    $modifydate =~ s/,//;
14
+        #    print 'Last modified: '.$modifydate."\n";
15
+        #  }
16
+        #}:>
17
+        <br />
18
+        <:{
19
+          my $compiledate = `date`;
20
+          print 'Last compiled: '.$compiledate."\n";
21
+        }:>
22
+        </p>
23
+      </div>
24
+      <!-- END ABOUT -->
25
+			<div class="newsletter">
26
+				<form action="">
27
+        	<input class="textfield" type="text" name="email" value="Sign up for our newsletter! Enter email." />
28
+          <input class="signup" type="submit" name="submit" value="Sign Up" />
29
+        </form>
30
+      </div>
31
+			<!-- END NEWSLETTER -->
32
+      <div class="col first">
33
+      	<h4>About Tor</h4>
34
+        <ul>
35
+          <li><a href="<page about/about>">What Tor Does</a></li>
36
+          <li><a href="<page about/torusers>">Users of Tor</a></li>
37
+          <li><a href="<page about/corepeople>">Core Tor People</a></li>
38
+          <li><a href="<page about/sponsors>">Sponsors</a></li>
39
+          <li><a href="<page about/contact>">Contact Us</a></li>
40
+        </ul>
41
+      </div>
42
+      <!-- END COL -->
43
+      <div class="col">
44
+      	<h4>Get Involved</h4>
45
+        <ul>
46
+          <li><a href="<page donate/donate>">Donate</a></li>
47
+          <li><a href="<page getinvolved/getinvolved>">Mailing List</a></li>
48
+          <li><a href="#">Relays</a></li>
49
+          <li><a href="<page docs/running-a-mirror>">Mirrors</a></li>
50
+          <li><a href="<page docs/hidden-services>">Hidden Services</a></li>
51
+          <li><a href="<page getinvolved/translation>">Translations</a></li>
52
+          <li><a href="<page getinvolved/open-positions>">Careers</a></li>
53
+        </ul>
54
+      </div>
55
+      <!-- END COL -->
56
+      <div class="col">
57
+      	<h4>Documentation</h4>
58
+        <ul>
59
+          <li><a href="<page docs/tor-manual>">Manuals</a></li>
60
+          <li><a href="<page docs/documentation>">Installation Guides</a></li>
61
+          <li><a href="<page docs/glossary>">Glossary</a></li>
62
+          <li><a href="http://wiki.torproject.org">Tor Wiki</a></li>
63
+          <li><a href="<page docs/faq>">FAQ</a></li>
64
+        </ul>
65
+      </div>
66
+      <!-- END COL -->
67
+      <div class="col wider">
68
+      	<h4>Languages</h4>
69
+        # this is a cgi trampoline to bounce us to the right page
70
+        # alternately, if the client supports javascript we can redirect that way
71
+        # noscript does not block onclick but clients may have disabled javascript completely
72
+        #
73
+        # for this to work we need to know the relative path from the document root
74
+        # to the current directory that wml is in. 
75
+				<form action="$(DOCROOT)/cgi-bin/languageswitch.cgi">
76
+          <select name="Language" id="lang">
77
+          <:{
78
+            #import "perl-globals.wmi";
79
+            use Cwd;
80
+            use Cwd 'abs_path';
81
+            use File::Spec;
82
+            my $urlbase = File::Spec->abs2rel(getcwd(),abs_path("$(DOCROOT)"));
83
+            my $LANGUAGES;
84
+            my $page = $WML_SRC_FILENAME;
85
+            opendir(DIR, getcwd()) or die $!;
86
+            # take a look and see what language support we have
87
+            while (my $file = readdir(DIR)) {
88
+                if (-d $file) {
89
+                    if (-e "$file/$page") {
90
+                        my $url = $urlbase.'/'.$WML_SRC_BASENAME.'.html.'.$file;
91
+                        my $url2js = $WML_SRC_BASENAME.'.html.'.$file;
92
+                        print '<option value="'.$url.'" onclick="window.location=\''.$url2js.'\'">'.$LANGUAGES{$file}.'</option>'."\n" unless not defined $LANGUAGES{$file};
93
+                    }
94
+                }
95
+            }
96
+            closedir(DIR);
97
+          }:>
98
+          </select>
99
+          <input class="go" type="submit" name="submit" value="Go" />
100
+        </form>
101
+        <p>Questions on this? Visit <a href="http://www.debian.org/intro/cn#howtoset">how to set the default document language</a>.</p>
102
+      </div>
103
+    </div>
104
+    <!-- END FOOTER -->
105
+
106
+  </div>
107
+  <!-- END WRAP -->
108
+</body>
109
+</html>
... ...
@@ -0,0 +1,39 @@
1
+#!/usr/bin/wml
2
+
3
+## translation metadata
4
+# Revision: $Revision: 22069 $
5
+# Translation-Priority: 1-high
6
+
7
+#<:
8
+#   my @navigation = (
9
+#       'index'         , 'Home',
10
+#       'overview'      , 'Overview',
11
+#       'easy-download'     , 'Download',
12
+#       'documentation'     , 'Docs',
13
+#       'volunteer'     , 'Volunteer',
14
+#       'people'        , 'People',
15
+#       'https://blog.torproject.org/', 'Blog',
16
+#       'donate'        , 'Donate!',
17
+#        'http://printfection.com/torprojectstore', 'Store',
18
+#   );
19
+#:>
20
+
21
+# order-of-appearance matters
22
+<:
23
+  # path          tag
24
+    my @navigation = (
25
+        'home'                        , 'Home',
26
+        'about/about'                 , 'About Tor',
27
+        'docs/documentation'          , 'Documentation',
28
+        'projects/projects'           , 'Projects',
29
+        'press/press'                 , 'Press',
30
+        'https://blog.torproject.org' , 'Blog',
31
+        'http://store.torproject.org' , 'Store',
32
+    );
33
+    my @calltoaction = (
34
+        'download/download'                , 'Download',
35
+        'donate/donate'               , 'Donate',
36
+        'getinvolved/getinvolved'          , 'Get Involved',
37
+    );      
38
+
39
+:>
... ...
@@ -0,0 +1,292 @@
1
+
2
+
3
+
4
+
5
+
6
+
7
+## translation metadata
8
+# Revision: $Revision: 22308 $
9
+# Translation-Priority: 2-medium
10
+#include "head.wmi" TITLE="Tor: Overview" CHARSET="UTF-8"
11
+<div class="main-column">
12
+
13
+<a name="overview"></a>
14
+<h2><a class="anchor" href="#overview">Tor :  ျခံဳငံုသံုးသပ္ခ်က္</a></h2>
15
+
16
+<!-- BEGIN SIDEBAR -->
17
+<div class="sidebar-left">
18
+<h3>အေၾကာင္းအရာမ်ား</h3>
19
+<ul>
20
+<li><a href="<page overview>#overview">ျခံဳငံုသံုးသပ္ခ်က္</a></li>
21
+<li><a href="<page overview>#whyweneedtor">ကၽြႏု္ပ္တို႕ Tor ကို
22
+ဘာေၾကာင့္လိုသလဲ</a></li>
23
+<li><a href="<page overview>#thesolution">ေျဖရွင္းမႈ</a></li>
24
+<li><a href="<page overview>#hiddenservices">ကြယ္ဝွယ္ထားေသာ ဝန္ေဆာင္မႈမ်ား</a></li>
25
+<li><a href="<page overview>#stayinganonymous">အမည္ဝွက္ ေနထုိင္မႈ</a></li>
26
+<li><a href="<page overview>#thefutureoftor">Tor ၏ အနာဂါတ္</a></li>
27
+</ul>
28
+</div>
29
+
30
+
31
+<!-- END SIDEBAR -->
32
+<hr />
33
+
34
+<p>
35
+Tor သည္ လိုဏ္ေခါင္းေယာင္ကြန္ယက္တစ္ခုျဖစ္ျပီး လူအမ်ားႏွင့္ အုပ္စုမ်ားကုိ
36
+၎တို႕၏ ကိုယ္ေရးအခ်က္အလက္သီးသန္႕တည္ရွိမႈႏွင့္ လံုျခံဳေရးမ်ား တုိးျမင့္ေစရန္
37
+လမ္းဖြင့္ေပးပါသည္။ ေဆာ့ဝဲတီထြင္ထုတ္လုပ္သူမ်ားကိုလည္း အသင့္ထည့္သြင္းျပီး
38
+ကုိယ္ေရးအခ်က္အလက္ လကၡဏာမ်ားပါဝင္ေသာ ဆက္သြယ္ေရး ကိရိယာေဆာ့ဝဲမ်ား အသစ္
39
+ဖန္တီးရန္ ကူညီေပးပါသည္။ Tor သည္ အဖဲြ႕အစည္းမ်ားႏွင့္ တစ္ဦးခ်င္းစီအတြက္
40
+၎တုိ႕၏ ကုိယ္ေရးအခ်က္အလက္မ်ားကို မထိခုိက္ေစဘဲ အမ်ားသံုးကြန္ယက္တြင္
41
+သတင္းအခ်က္အလက္မ်ားကို မွ်ေဝႏုိင္ေသာ အသံုးခ်ပရုိဂရမ္မ်ားအတြက္ အေျခခံအျဖစ္
42
+ေဆာင္ရြက္ေပးပါသည္။
43
+</p>
44
+
45
+<p>
46
+Individuals use Tor to keep websites from tracking them and their family
47
+members, or to connect to news sites, instant messaging services, or the
48
+like when these are blocked by their local Internet providers.  Tor's <a
49
+href="<page hidden-services>">hidden services</a> let users publish web
50
+sites and other services without needing to reveal the location of the
51
+site. Individuals also use Tor for socially sensitive communication: chat
52
+rooms and web forums for rape and abuse survivors, or people with illnesses.
53
+</p>
54
+
55
+<p>
56
+ဂ်ာနယ္လစ္မ်ားသည္ Tor ကို မေကာင္းမႈျပဳသူမ်ားကို ဖြင့္ခ်သူမ်ားႏွင့္
57
+အစိုးရႏွင့္ သေဘာကဲြလဲြသူမ်ားကို ပိုမိုလံုျခံဳစြာ ဆက္သြယ္ရန္ အသံုးျပဳၾကပါသည္။
58
+အစိုးရမဟုတ္ေသာ အဖဲြ႕အစည္းမ်ား (NGOs) မ်ားအေနျဖင့္ Tor ကုိ ၎တို႕၏
59
+အလုပ္သမားမ်ားသည္ အတူအလုပ္လုပ္ေနေသာ အဖဲြ႕အစည္းအနီးရွိ အျခားသူမ်ား မသိရွိေစဘဲ
60
+၎တို႕၏ မူလဝက္ဆိုက္မ်ားကို ဆက္သြယ္ႏုိင္ေစရန္ အသံုးျပဳၾကပါသည္။
61
+</p>
62
+
63
+<p>
64
+Indymedia ကဲ့သုိ႕ အုပ္စုမ်ားသည္ ၎တို႕၏ အသင္းဝင္မ်ား၏ ကုိယ္ေရးအခ်က္အလက္ႏွင့္
65
+လံုျခံဳမႈမ်ားကုိ လံုျခံဳစြာ ထိန္းသိမ္းႏုိင္ရန္ Tor ကို
66
+အၾကံျပဳေထာက္ခံၾကပါသည္။ Electronic Frontier Foundation (EFF) ကဲ့သို႕
67
+လႈပ္ရွားသူ အုပ္စုမ်ားသည္ Tor ကို ျမိဳ႕ျပအြန္လိုင္းလြပ္လပ္မႈကို ထိန္းသိမ္းရန္
68
+ယႏၱရားအျဖစ္ အၾကံျပဳေထာက္ခံပါသည္။ ေကာ္ပိုေရးရွင္းမ်ားသည္ Tor ကုိ အမ်ားႏွင့္
69
+ယွဥ္ျပိဳင္ရေသာ စိစစ္ေလ့လာခ်က္မ်ား လုပ္ကိုင္ရန္ လံုျခံဳေသာ နည္းလမ္းအျဖစ္ႏွင့္
70
+အျခားသူ၏သီးသန္႕စကားကုိ တိတ္တဆိတ္နားေထာင္သူမ်ားမွ အထိခိုက္မခံေသာ
71
+ဝယ္ယူမႈပံုစံမ်ားကုိ ကာကြယ္ရန္ အသံုးျပဳၾကပါသည္။ ၎တို႕သည္ ပမာဏအတိအက်ႏွင့္
72
+ဆက္သြယ္မႈျပဳခ်ိန္ကို သိရွိႏုိင္ေသာ အသံုးျပဳေနက် VPN မ်ားကို
73
+အစားထုိးရန္အတြက္လည္း အသံုးျပဳၾကပါသည္။ မည္သည့္ေနရာတြင္ ဝန္ထမ္းမ်ား
74
+ေနာက္က်ပါသလဲ ? မည္သည့္ေနရာတြင္ ဝန္ထမ္းမ်ား အလုပ္ရွာသည့္ ဝက္ဆုိက္မ်ားႏွင့္
75
+တုိင္ပင္ေနပါသလဲ ? မည္သည့္ သုေတသနဌာနသည္ ကုမၸဏီ၏ မူပိုင္ခြင့္ ဥပေဒသမားႏွင့္
76
+ဆက္သြယ္ေနပါသလဲ ?
77
+</p>
78
+
79
+<p>
80
+U.S ေရတပ္၏ ဌာနခဲြတစ္ခုသည္ Tor ကုိ ပြင့္လင္းေသာ အသိဉာဏ္စုေဆာင္းမႈအျဖစ္
81
+အသံုးျပဳျပီး ၎တို႕၏ အဖဲြ႕တစ္ခုသည္ အေရွ႕အလယ္ပိုင္းတြင္ မၾကာေသးမီက Tor ကုိ
82
+ထိေရာက္စြာ အသံုးခ်ခဲ့ပါသည္။ ဥပေဒအာဏာပိုင္မ်ားသည္ Tor ကုိ ၎တို႕၏ web
83
+မွတ္တမ္းမ်ားတြင္ အစိုးရအိုင္ပီကုိ မထားခဲ့ဘဲႏွင့္ web site မ်ားကုိ
84
+လည္ပတ္ေသာအခါ သို႕မဟုတ္ ေစာင့္ၾကပ္ၾကည့္ရႈေသာအခါႏွင့္ နစ္နာမႈရွိေသာ
85
+လုပ္ေဆာင္မႈမ်ား ျပဳလုပ္ေနစဥ္အတြင္း လံုျခံဳေရးအတြက္ အသံုးျပဳၾကပါသည္။
86
+</p>
87
+
88
+<p>
89
+Tor ကို အသံုးျပဳသည့္ မ်ိဳးစံုေသာ လူအမ်ားသည္ အမွန္တကယ္မွာ <a
90
+href="http://freehaven.net/doc/fc03/econymics.pdf">လံုျခံဳမႈရွိေစရန္
91
+ျပဳလုပ္ေသာ အစိတ္အပိုင္းပင္ ျဖစ္ပါသည္။</a> Tor သည္ သင့္ကို <a href="<page
92
+torusers>">ကြန္ယက္အတြင္းရွိ အျခားသူမ်ားမွ</a> ကြယ္ဝွက္ထားပါသည္။ ထုိ႕ေၾကာင့္
93
+Tor ကို အေျခခံေသာ အသံုးျပဳသူ ပိုမိုသိပ္သည္းမ်ားျပား၍ ပိုမို ကဲြျပားျခားနားေလ
94
+သင္၏ အမည္ဝွက္မႈမွာ ပိုမိုအကာအကြယ္ရေလ ျဖစ္ပါသည္။
95
+</p>
96
+
97
+<a name="whyweneedtor"></a>
98
+<h3><a class="anchor" href="#whyweneedtor">ကၽြႏု္ပ္တို႕ Tor ကို
99
+ဘာေၾကာင့္လိုသလဲ</a></h3>
100
+
101
+<p>
102
+Tor ကို အသံုးျပဳျခင္းျဖင့္ “သတင္းပို႕လႊတ္မႈ စိတ္ျဖာခ်က္မ်ား” ဟု သိရွိၾကေသာ
103
+အင္တာနက္ေစာင့္ၾကပ္ၾကည့္ရႈမႈမ်ားမွ သင့္ကုိ အကာအကြယ္ေပးပါသည္။ သတင္းပို႕လႊတ္မႈ
104
+စိတ္ျဖာခ်က္မ်ားဆုိသည္မွာ အမ်ားသံုးကြန္ယက္တြင္ မည္သူက မည္သူ႕ကို
105
+ေျပာေနသနည္းဆိုသည္ကုိ ဆိုလိုပါသည္။  သင့္အင္တာနက္ပို႕လႊတ္မႈမွ
106
+မူလအရင္းအျမစ္ႏွင့္ ဦးတည္ရာကုိ သိရွိျခင္းသည္ သင့္ အမူအက်င့္ႏွင့္
107
+စိတ္ဝင္စားမႈမ်ားကုိ ေျခရာခံခြင့္ေပးျခင္းပင္ျဖစ္ပါသည္။ အကယ္၍ အီလက္ထရြန္းနစ္
108
+စီးပြားကူးသန္းမႈ ဆုိက္တစ္ခုသည္ သင့္တုိင္းျပည္ သို႕မဟုတ္ မူလေဒသ၏
109
+အဖဲြ႕အစည္းေပၚမူတည္၍ ေစ်းႏႈန္းခဲြျခားမႈ ရွိသည္ဆိုပါက ဤအခ်က္သည္ သင့္
110
+ခ်က္လက္မွတ္စာအုပ္ကုိ ထိခိုက္ႏုိင္ပါသည္။ သင္မည္သူျဖစ္သည္ႏွင့္ မည္သည့္ေနရာမွ
111
+ျဖစ္သည္ကို သိရွိျခင္းျဖင့္ သင့္အလုပ္အကုိင္ႏွင့္ ခႏၶာကိုယ္လံုျခံဳမႈကိုပင္
112
+ထိခိုက္ႏုိင္ပါသည္။ ဥပမာအားျဖင့္ သင္ ျပည္ပခရီးသြားေနစဥ္အတြင္း သင့္ အလုပ္ရွင္၏
113
+ကြန္ပ်ဴတာသို႕ ဆက္သြယ္ကာ အီးေမးလ္စစ္ျခင္း သို႕မဟုတ္ ပို႕ျခင္းမ်ား
114
+ျပဳလုပ္မည္ဆိုပါက ကြန္ယက္ကုိ စူးစမ္းရွာေဖြေနသူ တစ္စံုတစ္ေယာက္သည္ သင့္
115
+မူလႏုိင္ငံႏွင့္ အသက္ေမြးဝမ္းေက်ာင္းမႈအဖဲြ႕အစည္းကုိ
116
+ဆက္သြယ္မႈစကားဝွက္ျပဳလုပ္ထားေသာ္လည္း မေတာ္တဆ သိရွိသြားေစႏုိင္ပါသည္။
117
+</p>
118
+
119
+<p>
120
+သတင္းပို႕လႊတ္မႈ စိတ္ျဖာခ်က္မ်ားဆိုသည္မွာ အဘယ္နည္း ? အင္တာနက္ အခ်က္အလက္
121
+အထုပ္ငယ္မ်ားသည္ အစိတ္အပိုင္း ႏွစ္ခုရွိပါသည္ : အခ်က္အလက္ဝန္ခ်ိန္ႏွင့္
122
+လမ္းေၾကာင္းရွာေဖြမႈအတြက္ ေခါင္းစည္းတို႕ျဖစ္ပါသည္။ အခ်က္အလက္ဝန္ခ်ိန္သည္
123
+ပို႕လႊတ္မည့္ မည္သည့္အရာမဆိုျဖစ္သည္။ အီးေမးလ္အခ်က္အလက္၊ web စာမ်က္ႏွာ၊
124
+အသံဖိုင္တစ္ခု စသည္တုိ႕ ျဖစ္ခ်င္ရာ ျဖစ္ေပမည္။ သင့္ဆက္သြယ္ေရး၏
125
+အခ်က္အလက္ဝန္ခ်ိန္ကို စကားဝွက္ျပဳလုပ္ထားေသာ္လည္း ပို႕လႊတ္မႈ စိတ္ျဖာျခင္းမွ
126
+သင္ဘာလုပ္ေနသည္ဆုိသည္ႏွင့္ သင္ဘာေျပာေနသည္ကို မ်ားစြာ သိရွိႏိုင္ပါသည္။
127
+ထို႕ေၾကာင့္ မူလအရင္းအျမစ္၊ ဦးတည္ရာ၊ ပမာဏ၊ အခ်ိန္ကုိက္မႈ စသည္ျဖင့္
128
+ပူးတြဲပါဝင္ေသာ ေေခါင္းစည္းပိုင္းတြင္ အာရံုစိုက္ရျခင္းျဖစ္ပါသည္။
129
+</p>
130
+
131
+<p>
132
+ကုိယ္ေရးအခ်က္အလက္ကို ဂရုျပဳရျခင္း၏ အေျခခံ ျပႆနာမွာ သင့္ဆက္သြယ္မႈ၏ လက္ခံသူမွာ
133
+ေခါင္းစည္းပိုင္းကို ၾကည့္ရႈျခင္းျဖင့္ သင္ပို႕လႊတ္သည္ကို
134
+သိရွိႏုိင္ျခင္းျဖစ္သည္။ ထို႕ေၾကာင့္
135
+အင္တာနက္ဝန္ေဆာင္မႈေပးသူကဲ့သို႕ေသာသူမ်ားကို ခ်က္ခ်င္း
136
+ခြင့္ျပဳမိန္႕ေပးႏုိင္သည္။ သို႕မဟုတ္ ခ်က္ခ်င္း ခြင့္ျပဳမိန္႕မေပးျခင္းလည္း
137
+ျပဳႏုိင္သည္။ အလြန္ရိုးရွင္းေသာ ပို႕လႊတ္မႈစိတ္ျဖာခ်က္မွာ ကြန္ယက္ေပၚမွ
138
+ပို႕လႊတ္သူႏွင့္ လက္ခံသူအၾကား တစ္ေနရာတြင္ ေနထိုင္ျပီး ေခါင္းစည္းပိုင္းကို
139
+ၾကည့္ရႈေနျခင္း ျဖစ္သည္။
140
+</p>
141
+
142
+<p>
143
+သို႕ေသာ္ ပိုမိုအားေကာင္းေသာ ပို႕လႊတ္မႈစိတ္ျဖာခ်က္အမ်ိဳးအစားမ်ားလည္း
144
+ရွိပါသည္။ အခ်ိဳ႕ တုိက္ခိုက္သူမ်ားသည္ အင္တာနက္မွ အစိတ္အပိုင္းမ်ိဳးစံုကို
145
+သူလွ်ိဳျပဳလုပ္ကာ ေခတ္မီဆန္းျပားရႈပ္ေထြးေသာ အခ်က္အလက္ခဲြျခမ္းမႈ
146
+နည္းပညာမ်ားျဖင့္ ကဲြျပားျခားနားေသာ အဖဲြ႕အစည္းမ်ားႏွင့္ တစ္ဦးခ်င္းစီ၏
147
+ဆက္သြယ္မႈ ပံုစံမ်ားကို ေျခရာခံႏုိင္ပါသည္။ စကားဝွက္ျပဳလုပ္ျခင္းသည္
148
+အင္တာနက္ပို႕လႊတ္မႈကိုသာ ကြယ္ဝွက္ေပးျပီး ေခါင္းစည္းပိုင္းကို
149
+မကာကြယ္ေပးေသာေၾကာင့္ ၎တုိက္ခိုက္သူမ်ားကုိ ကာကြယ္ရန္ မတတ္ႏုိင္ပါ။
150
+</p>
151
+
152
+<a name="thesolution"></a>
153
+<h3><a class="anchor" href="#thesolution">ေျဖရွင္းမႈ : ျဖန္႕က်က္ထားေသာ၊ အမည္ဝွက္
154
+ကြန္ယက္ တစ္ခု</a></h3>
155
+
156
+<p>
157
+Tor သည္ သင့္ပို႕လႊတ္လက္ခံမႈမ်ားကို အင္တာနက္၏ ေနရာမ်ားစြာသို႕
158
+ျဖန္႕ေဝေပးျခင္း၊ တစ္ေနရာတည္းမွသာသင့္ဦးတည္ရာသို႕
159
+သင္ႏွင့္ခ်ိတ္ဆက္ေပးျခင္းတို႕ျဖင့္ ရုိးရွင္းေသာ ပို႕လႊတ္မႈစိတ္ျဖာခ်က္ႏွင့္
160
+ဆန္းျပားရႈပ္ေထြးေသာ ပို႕လႊတ္မႈစိတ္ျဖာခ်က္ ႏွစ္ခုလံုး၏ အႏၱရာယ္ကုိ
161
+ေလ်ာ့ခ်ေပးပါသည္။ ၾကံစည္ထားမႈမွာ ေနာက္မွ လိုက္လာသူကုိ ေေလတုိက္သကဲ့သို႕၊
162
+ေနာက္ေယာင္ခံရန္ ခက္ခဲေသာ လမ္းေၾကာင္းျဖင့္ အေဝးသို႕
163
+လြင့္ထြက္သြားေစျခင္းျဖစ္ျပီး အခါအားေလ်ာ္စြာ သင့္ ေျခရာမ်ားကုိ
164
+ဖ်က္ဆီးျခင္းျဖစ္ပါသည္။ မူလအရင္းအျမစ္မွ ဦးတည္ရာသို႕
165
+တိုက္ရုိက္လမ္းေၾကာင္းဆက္သြယ္ျခင္းအစား Tor ကြန္ယက္တြင္
166
+အခ်က္အလက္အထုပ္ငယ္မ်ားကုိ ထပ္ဆင့္လႊင့္သူအမ်ားအျပားကို ျဖတ္သန္း၍ က်ဘန္း
167
+ယူေဆာင္ေစျခင္းျဖင့္ မည္သည့္စူးစမ္းရွာေဖြသူကုိမွ် မည္သည့္ေနရာတြင္မွ်
168
+အခ်က္အလက္မ်ား မည္သည့္ေနရာက လာ၍ မည္သည့္ေနရာကို သြားမည္ကုိ ေျခရာခံမႈ
169
+မျပဳလုပ္ႏုိင္ေတာ့ပါ။
170
+</p>
171
+
172
+<p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" /></p>
173
+
174
+<p>
175
+Tor ျဖင့္ သီးသန္႕ ကြန္ယက္လမ္းေၾကာင္းတစ္ခု ဖန္တီးမည္ဆုိပါက အသံုးျပဳသူ၏ ေဆာ့ဝဲ
176
+သို႕မဟုတ္ client သည္ ကြန္ယက္ေပၚမွ ထပ္ဆင့္လႊင့္သူမ်ားကုိ ျဖတ္သန္း၍
177
+စကားဝွက္ျပဳလုပ္ထားေသာ ပတ္လမ္းေၾကာင္းတစ္ခုကို တစစ တိုးခ်ဲ႕တည္ေဆာက္သြားပါသည္။
178
+ပတ္လမ္းသည္ တစ္ၾကိမ္ခုန္ကူးလွ်င္ တစ္ၾကိမ္ တုိးသြားပါသည္။ ျပီးလွ်င္
179
+လမ္းတစ္ေလွ်ာက္ရွိ ထပ္ဆင့္လႊင့္သူတိုင္းသည္ မည္သည့္ ထပ္ဆင့္လႊင့္သူမွ
180
+အခ်က္အလက္ေပးသည္ႏွင့္ မည္သည့္ ထပ္ဆင့္လႊင့္သူကို အခ်က္အလက္ေပးရမည္ဆိုသည္ကုိသာ
181
+သိပါသည္။ မည္သည့္ တစ္ဦးခ်င္း ထပ္ဆင့္လႊင့္သူမွ အခ်က္အလက္အထုပ္ငယ္သြားေရာက္ေသာ
182
+လမ္းေၾကာင္းအျပည့္အစံုကို မသိရွိႏုိင္ပါ။ client သည္
183
+အခ်က္အလက္ျဖတ္သန္းသြားလာေသာ ဆက္သြယ္မႈလမ္းေၾကာင္းကုိ ေျခရာမခံႏိုင္ေစရန္
184
+လမ္းေၾကာင္းတစ္ေလွ်ာက္တြင္ တစ္ခါခုန္ကူးမႈတုိင္းအတြက္ သီးျခား
185
+စကားဝွက္ေသာ့မ်ားကို ေဆြးေႏြးညိႇႏိႈင္းရယူပါသည္။
186
+</p>
187
+
188
+<p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p>
189
+
190
+<p>
191
+ပတ္လမ္းေၾကာင္း တစ္ခု တည္ေဆာက္ျပီးသည္ႏွင့္ Tor ကြန္ယက္ကုိ ျဖတ္သန္း၍
192
+အခ်က္အလက္မ်ိဳးစံု ကူးသန္းလဲလွယ္ႏိုင္ျပီး ေဆာ့ဝဲအသံုးခ်ပရိုဂရမ္မ်ိဳးစံုကို
193
+အသံုးခ်ႏုိင္ပါသည္။ အဘယ္ေၾကာင့္ဆုိေသာ္ ထပ္ဆင့္လႊင့္သူတိုင္းသည္
194
+ၾကားျဖတ္ခုိးယူနားေထာင္သူျဖစ္ေစ သို႕မဟုတ္ အေပးအယူညႇိႏိႈင္းထားေသာ
195
+ထပ္ဆင့္လႊင့္သူျဖစ္ေစ ပတ္လမ္းထဲတြင္ တစ္ခါခုန္ကူးမႈထက္ပို၍
196
+မျမင္ႏုိင္ေသာေၾကာင့္ ျဖစ္ပါသည္။ Tor သည္ TCP စီးဆင္းမႈအတြက္သာ အလုပ္လုပ္ျပီး
197
+SOCKS အေထာက္အကူျပဳေသာ မည္သည့္ အသံုးခ်ပရိုဂရမ္မဆို အသံုးျပဳႏုိင္ပါသည္။
198
+</p>
199
+
200
+<p>
201
+ထိေရာက္စြာအက်ိဳးရွိေစရန္ Tor ေဆာ့ဝဲသည္ တူညီေသာ ၁၀ မိနစ္အတြင္း သို႕မဟုတ္
202
+ထုိကဲ့သို႕ေသာ အခ်ိန္အတြင္းတြင္ ျဖစ္ေပၚေသာ ဆက္သြယ္မႈကုိ တူညီေသာ ပတ္လမ္းအျဖစ္
203
+အသံုးျပဳပါသည္။ ေနာက္ပိုင္း ေတာင္းဆုိမႈမ်ားကုိ လူအမ်ားအေစာပိုင္း
204
+လုပ္ေဆာင္မႈမွ အသစ္တစ္ခုသို႕ ခ်ိတ္ဆက္ႏုိင္ေစရန္ ပတ္လမ္းေၾကာင္း အသစ္တစ္ခု
205
+ေပးပါသည္။
206
+</p>
207
+
208
+<p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" /></p>
209
+
210
+
211
+<a name="hiddenservices"></a>
212
+<h3><a class="anchor" href="#hiddenservices">ကြယ္ဝွယ္ထားေသာ ဝန္ေဆာင္မႈမ်ား</a></h3>
213
+
214
+<p>
215
+Tor သည္ ဝက္ထုတ္လႊင့္မႈမ်ား သို႕မဟုတ္ အခ်က္အလက္ ခ်က္ခ်င္းပို႕ႏုိင္သည့္
216
+ဆာဗာမ်ားကဲ့သို႕ေသာ မ်ိဳးစံုသည့္ ဝန္ေဆာင္မႈမ်ားကို
217
+အသံုးျပဳေနစဥ္အတြင္းတြင္လည္း ၎တုိ႕၏ တည္ေနရာကို ဝွက္ထားရန္ အသံုးျပဳႏုိင္ပါသည္။
218
+Tor “ဆံုရပ္ ေနရာ” ကုိ အသံုးျပဳျခင္းျဖင့္ အျခား Tor အသံုးျပဳသူမ်ားသည္
219
+တစ္ဦးစီ၏ အျခား ကြန္ယက္ အမွတ္အသားကို မသိရွိဘဲ ဤကြယ္ဝွက္ထားေသာ
220
+ဝန္ေဆာင္မႈမ်ားကို ဆက္သြယ္ႏုိင္ပါသည္။ ဤ ကြယ္ဝွက္ထားေသာ ဝန္ေဆာင္မႈသည္
221
+ဆင္ဆာတည္းျဖတ္မႈကို စိုးရိမ္စရာမလုိဘဲ ဝက္ဆုိက္တည္ေထာင္ျခင္းမ်ားကုိ
222
+လုပ္ေဆာင္ႏိုင္ပါသည္။ မည္သူမွ် ဆိုက္ကို တင္ဆက္သည္ကို မဆံုးျဖတ္ႏုိင္ပါ။
223
+ဆုိက္ကို တင္ဆက္သူ မည္သူမွ် မည္သူက ေရးသားေပးပို႕ေနသည္ကုိ မသိရွိႏုိင္ပါ။ <a
224
+href="<page docs/tor-hidden-service>">ကြယ္ဝွက္ထားေသာ ဝန္ေဆာင္မႈမ်ား
225
+ျပင္ဆင္သတ္မွတ္ျခင္း</a> ႏွင့္ <a href="<page
226
+hidden-services>">ကြယ္ဝွက္ထားေသာ ဝန္ေဆာင္မႈ ဘာသာစကား</a> ကုိ ဆက္လက္ေလ့လာပါ။
227
+</p>
228
+
229
+<a name="stayinganonymous"></a>
230
+<h3><a class="anchor" href="#stayinganonymous">အမည္ဝွက္ ေနထုိင္မႈ</a></h3>
231
+
232
+<p>
233
+Tor သည္ အမည္ဝွက္ျပႆနာအားလံုးကုိ မေျဖရွင္းႏုိင္ပါ။ ၎မွ
234
+အခ်က္အလက္ပို႕ေဆာင္မႈကို ကာကြယ္ေပးျခင္းကိုသာ အေလးထားပါသည္။
235
+သင့္ကုိယ္ပုိင္အမွတ္အသား သတင္းအခ်က္အလက္မ်ားကို သင္လည္ပတ္ေသာ ဝက္ဆိုက္မ်ားမွ
236
+မျမင္ေတြ႕ေစလုိလွ်င္ သတ္မွတ္ ဘာသာစကား အေထာက္အကူျပဳ ေဆာ့ဝဲမ်ားကုိ အသံုးျပဳရန္
237
+လိုအပ္ပါသည္။ ဥပမာအားျဖင့္ သင္ web ၾကည့္ရႈေနစဥ္အတြင္း သင့္ browser
238
+အမ်ိဳးအစားႏွင့္ ပတ္သတ္ေသာ အခ်က္အလက္မ်ားႏွင့္ cookies မ်ားကို မျပသလိုလွ်င္
239
+Privoxy ကဲ့သို႕ေသာ web proxies မ်ားကုိ အသံုးျပဳႏုိင္ပါသည္။
240
+</p>
241
+
242
+<p>
243
+သင့္ အမည္ဝွက္မႈကုိ ကာကြယ္ရန္ လိမၼာပါးနပ္ရပါမည္။ Web ပံုစံစာရြက္မ်ားတြင္
244
+သင့္နာမည္ သို႕မဟုတ္ အျခား သတင္းအခ်က္အလက္မ်ားကို မေဖာ္ျပပါႏွင့္။ အျခား
245
+အမည္ဝွက္ကြန္ယက္အားလံုးကဲ့သို႕ပင္ ဝက္ၾကည့္ရႈျခင္းအတြက္ လံုေလာက္ေသာ
246
+ျမန္ဆန္ေသာ္လည္း Tor သည္ အဆံုးမွအဆံုးသို႕ တုိက္ခုိက္ျခင္းကုိ ကာကြယ္မႈ
247
+မျပဳႏိုင္ျခင္း၊ သင့္ကုိ တုိက္ခိုက္သူသည္ သင့္ကြန္ပ်ဴတာမွ ထြက္လာေသာ
248
+ပို႕လႊတ္မႈမ်ားကို ေစာင့္ၾကည့္ႏုိင္ျခင္း၊ သင္ေရြးခ်ယ္ထားေသာ ဦးတည္ရာသို႕
249
+ေရာက္ရွိလာေသာ ပို႕လႊတ္မႈမ်ားကို ေစာင့္ၾကည့္ႏုိင္ျခင္း၊
250
+စာရင္းအင္းစိတ္ျဖာမႈကုိ အသံုးျပဳ၍ သူတို႕သည္ တူညီေသာ ပတ္လမ္းအတြင္းမွ
251
+အစိတ္အပိုင္းျဖစ္သည္ကုိ ရွာေဖြႏိုင္ျခင္းတို႕ကို သတိျပဳပါ။
252
+</p>
253
+
254
+<a name="thefutureoftor"></a>
255
+<h3><a class="anchor" href="#thefutureoftor">Tor ၏ အနာဂါတ္</a></h3>
256
+
257
+<p>
258
+ယေန႕ အင္တာနက္တြင္ အသံုးဝင္ေသာ အမည္ဝွက္ကြန္ယက္ကုိ ေဖာ္ေဆာင္ျခင္းသည္
259
+ဆက္လက္လုပ္ေဆာင္ရဦးမည့္ စိန္ေခၚမႈ တစ္ခု ျဖစ္ပါသည္။ အသံုးျပဳသူမ်ား၏
260
+လိုအပ္ခ်က္ႏွင့္ ကိုက္ညီမည့္ ေဆာ့ဝဲမ်ားကုိ ကၽြႏု္ပ္တို႕ လိုလားပါသည္။
261
+အသံုးျပဳသူမ်ားႏိုင္သမွ် မ်ားမ်ားကုိ ကုိင္တြယ္ႏုိင္မည့္နည္းလမ္းႏွင့္
262
+ကြန္ယက္ကုိ ၾကီးထြားႏိုင္သမွ် ၾကီးထြားေအာင္ ထိန္းသိမ္းရန္လည္း လိုလားပါသည္။
263
+Tor ၏ အသံုးဝင္မႈ တုိးတက္လာသည္ႏွင့္ ပိုမိုမ်ားျပားေသာ အသံုးျပဳသူမ်ားကို
264
+ဆဲြေဆာင္လာႏုိင္ျခင္းျဖင့္ ဆက္သြယ္မႈတုိင္း၏ မူလအရင္းအျမစ္ႏွင့္ ဦးတည္ရာမ်ား
265
+ပိုမိုမ်ားျပားလာႏုိင္ျခင္း၊ ထုိ႕ေၾကာင့္ လူတုိင္းအတြက္ လံုျခံဳမႈ
266
+ျမင့္တက္လာျခင္းတို႕ေၾကာင့္ လံုျခံဳေရးႏွင့္ အသံုးဝင္မႈသည္
267
+ပိုလွ်ံေနသည္မရွိေစရပါ။ ကၽြႏု္ပ္တို႕ တုိးတက္ေစရန္ ျပဳလုပ္ေနေသာ္လည္း
268
+သင့္အကူအညီကုိ လိုအပ္ပါသည္။ ေက်းဇူးျပဳ၍ <a href="<page
269
+docs/tor-doc-relay>">ထပ္ဆင့္လႊင့္မႈ ျပဳလုပ္ျခင္း</a> သို႕မဟုတ္ <a
270
+href="<page documentation>#Developers">ထုတ္လုပ္ဖန္တီးသူ အျဖစ္</a> <a
271
+href="<page volunteer>">ေစတနာ့ဝန္ထမ္းလုပ္ျခင္း</a> တုိ႕ကုိ
272
+စဥ္းစားေပးေစလုိပါသည္။
273
+</p>
274
+
275
+<p>
276
+ဥပေဒ၊ မူဝါဒ ႏွင့္ နည္းပညာ တို႕၏ လားရာ တုိးတက္မႈမ်ားမွ အမည္ဝွက္မႈကုိ
277
+မၾကံဳဘူးေသးေသာ ျခိမ္းေျခာက္မႈမ်ားေၾကာင့္ ကၽြႏု္ပ္တို႕၏ အြန္လိုင္းတြင္
278
+လြတ္လပ္စြာ ေျပာဆိုႏိုင္ျခင္း၊ ဖတ္ရႈႏုိင္ျခင္းမ်ားကို  ေလ်ာ့ပါးေစပါသည္။ ၎
279
+လားရာမ်ားသည္ တစ္ဦးခ်င္းစီအတြင္း၊ အဖဲြ႕အစည္းမ်ားအတြင္း၊
280
+ေကာ္ပိုေရးရွင္းမ်ားအတြင္းႏွင့္ အစိုးရမ်ားအတြင္း အားနည္းခ်က္မ်ားကုိ
281
+စိတ္ျဖာႏုိင္ရန္ ပိုမိုဆက္သြယ္မႈမ်ား ျပဳလုပ္ျခင္းျဖင့္
282
+အမ်ိဳးသားလံုျခံဳေရးႏွင့္ အဓိက အေျခခံအေဆာက္အဦမ်ားကုိ ေအာက္ေျခမွ
283
+လိႈက္စားခ်ိနဲ႕ေစပါသည္။ အသံုးျပဳသူအသစ္တုိင္းႏွင့္ ထပ္ဆင့္လႊင့္သူတုိင္းသည္
284
+အပိုေဆာင္း ထိန္းသိမ္းေစာင့္ေရွာက္မႈမ်ား၊ Tor ၏ စြမ္းေဆာင္ႏုိင္မႈမ်ားကုိ
285
+တုိးခ်ဲ႕၍ သင့္လံုျခံဳမႈႏွင့္ တစ္ကုိယ္ေရတည္ရွိမႈမ်ားကုိ သင့္လက္ထဲသို႕
286
+ျပန္လည္ေရာက္ရွိေအာင္ လုပ္ေဆာင္ေပးၾကပါသည္။
287
+</p>
288
+
289
+  </div>
290
+
291
+
292
+#include <foot.wmi>
... ...
@@ -0,0 +1,7 @@
1
+#!/usr/bin/env perl
2
+
3
+# This CGI tries to do as little as possible. A URL is passed from the languages
4
+# dropdown form generated in /include/foot.wmi and the client is redirected to that page
5
+use CGI qw(:standard);
6
+my $lang = param('Language');
7
+print "Status: 302 Moved\nLocation: /$lang\n\n";
... ...
@@ -0,0 +1,40 @@
1
+@charset "UTF-8";
2
+/* IE6 Only*/
3
+
4
+html * {
5
+padding: 0;
6
+margin: 0;
7
+border: 0;
8
+}
9
+
10
+#maincol-left, #maincol { width: 690px; }
11
+#sidecol-right, #sidecol { width: 210px; }
12
+#home #maincol { width: 600px; }
13
+#home #sidecol { width: 290px; }
14
+
15
+#calltoaction {
16
+	margin: 0;
17
+}
18
+
19
+#banner ul li { list-style: url(../images/white-bullet.gif) outside; }
20
+
21
+#sidenav ul li {
22
+		display: inline-block;
23
+	}
24
+
25
+.img-shadow .custom-infoblock { width: 412px; }
26
+
27
+#footer .newsletter input.textfield { border: 1px solid #ddd; }
28
+
29
+#home-our-projects {
30
+  margin-top: 25px;
31
+}
32
+
33
+#download a .download-tor {
34
+  background: url(../images/button-download-arrow.gif) right center no-repeat;
35
+}
36
+
37
+#download a:link,
38
+#download a:visited {
39
+  background: url(../images/button-download.gif) left top no-repeat;
40
+}
... ...
@@ -0,0 +1,54 @@
1
+@charset "UTF-8";
2
+/* IE7 and Lower */
3
+
4
+
5
+#nav { margin: 0; }
6
+#nav ul li a:link,
7
+#nav ul li a:visited {
8
+	display: block;
9
+	height: 50px;
10
+}
11
+
12
+h1.headline { padding: 5px 0 10px; }
13
+p.desc { margin: -10px 0 10px; }
14
+
15
+#download a:link,
16
+#download a:visited {
17
+	margin: -14px 0 0;
18
+}
19
+
20
+	#sidenav ul li ul {
21
+		display: inline-block;
22
+	}
23
+
24
+	#sidenav ul li.active,
25
+	#sidenav ul li.active-longtitle {
26
+		background: none;
27
+		width: 100%;
28
+		border-bottom: 1px solid #ddd;
29
+	}
30
+	
31
+.donate-btn {
32
+	width: 102px;
33
+	font-size: 0;
34
+	color: #fff;
35
+	text-align: right;
36
+}
37
+
38
+.focus .continue { padding-bottom: 20px; }
39
+
40
+table h2 { margin-bottom: -4px; padding-bottom: 0;}
41
+
42
+/*#footer .signup {
43
+	width: 82px;
44
+	font-size: 0;
45
+	color: #fff;
46
+	text-align: right;
47
+}
48
+
49
+#footer .go {
50
+	width: 20px;
51
+	font-size: 0;
52
+	color: #fff;
53
+	text-align: right;
54
+}*/
0 55
\ No newline at end of file
... ...
@@ -0,0 +1,579 @@
1
+@charset "UTF-8";
2
+/* Layout */
3
+
4
+/* UNIVERSAL ------------*/
5
+
6
+body {
7
+	background: #fff;
8
+}
9
+
10
+#wrap {
11
+	width: 960px;
12
+	margin: 0 auto;
13
+}
14
+
15
+.left { float: left; }
16
+.right { float: right; }
17
+.twenty { width: 20%; }
18
+.thirty { width: 30%; }
19
+.forty { width: 40%; }
20
+.fifty { width: 50%; }
21
+.sixty { width: 60%; }
22
+.hundred { width: 100%; }
23
+
24
+.nopad { padding: 0; }
25
+.toppad { padding-top: 10px; }
26
+.toptwenty { margin-top: 20px; }
27
+.topforty { margin-top: 40px; }
28
+
29
+
30
+/* HEADER ------------*/
31
+
32
+#header {
33
+	width: 960px;
34
+	height: 97px;
35
+	margin-bottom: 23px;
36
+	position: relative;
37
+}
38
+
39
+  h1#logo {
40
+    margin: 0;
41
+    float: left;
42
+  }
43
+
44
+	h1#logo a,
45
+	h1#logo a:visited {
46
+		background: url(../images/tor-logo.jpg) left top no-repeat;
47
+		text-indent: -9999px;
48
+		overflow: hidden;
49
+		width: 150px;
50
+		height: 97px;
51
+		display: block;
52
+	}
53
+	
54
+	#nav {
55
+	  float: right;
56
+	}
57
+		
58
+		#nav ul {
59
+			height: 50px;
60
+			float: right;
61
+			margin-bottom: 0;
62
+		}
63
+	
64
+			#nav ul li {
65
+				float: left;
66
+				display: inline;
67
+				width: auto;
68
+			}
69
+			
70
+	#calltoaction {
71
+		height: 30px;
72
+		float: right;
73
+		margin-top: 10px;
74
+	}
75
+	
76
+    #calltoaction ul {
77
+      padding: 0;
78
+      margin: 0;
79
+      height: 30px;
80
+      list-style: none;
81
+      float: right;
82
+    }
83
+    
84
+      #calltoaction ul li {
85
+        list-style: none;
86
+        display: inline;
87
+        float: left;
88
+        width: auto;
89
+        margin-left: 10px;
90
+      }
91
+      
92
+      #calltoaction ul li a:link,
93
+      #calltoaction ul li a:visited{
94
+        background: #96c35a;
95
+        border-top: 1px solid #6ab334;
96
+        border-left: 1px solid #6ab334;
97
+        border-bottom: 1px solid #5a952b;
98
+        border-right: 1px solid #5a952b;
99
+        padding: 8px 8px 0px;
100
+        color: #222c14;
101
+        font-weight: bold;
102
+        text-decoration: none;
103
+        font-size: 1.167em;
104
+        line-height: 1.167em;
105
+        height: 22px;
106
+        float: left;
107
+      }
108
+      
109
+      #calltoaction ul li a:hover,
110
+      #calltoaction ul li a.active { background: #6ab334; }
111
+
112
+
113
+/* BANNER ------------*/
114
+
115
+		#banner {
116
+			background: url(../images/bg-banner.jpg) left top no-repeat;
117
+			height: 200px;
118
+			width: 600px;
119
+			padding: 23px 15px;
120
+			margin-bottom: 15px;
121
+		}
122
+		
123
+		#download a:link,
124
+		#download a:visited {
125
+			margin: -17px 0 0;
126
+			background: url(../images/button-download.png) left top no-repeat;
127
+			width: 257px;
128
+			height: 79px;
129
+			float: left;
130
+			padding: 35px 0 0 80px;
131
+			text-decoration: none;
132
+		}
133
+		
134
+		#download a .download-tor {
135
+			background: url(../images/button-download-arrow.png) right center no-repeat;
136
+			font-family: "Arial Narrow", Arial, sans-serif;
137
+			color: #fff;
138
+			font-size: 2.167em;
139
+			letter-spacing: 1px;
140
+			padding-right: 25px;
141
+		}
142
+		#download a .version {
143
+			color: #bda5cc;
144
+			font-size: 1.167em;
145
+			line-height: 1.167em;
146
+		}
147
+		#download a .info {
148
+			color: #bda5cc;
149
+			font-size: 0.833em;
150
+			line-height: 0.833em;
151
+		}
152
+		
153
+		#download a:hover {
154
+			background-position: 0 -114px;
155
+		}
156
+		#download a:hover .version,
157
+		#download a:hover .info { color: #f1c6a1; }
158
+		
159
+			#banner ul {
160
+				background: #387520 url(../images/banner-gradient.jpg) left top repeat-x;
161
+				border: 1px solid #366b32;
162
+				width: 180px;
163
+				float: right;
164
+				margin: 0 15px 0 0;
165
+				padding: 10px 10px 10px 30px;
166
+			}
167
+		
168
+			#banner ul li {
169
+				list-style: url(../images/white-bullet.png) outside;
170
+				padding: 5px 0;
171
+			}
172
+
173
+/* CONTENT ------------*/
174
+
175
+#content {
176
+	width: 960px;
177
+}
178
+
179
+	#content img { max-width: 250px; }
180
+
181
+	#breadcrumbs { padding: 0 0 10px 5px; }
182
+
183
+	#home #maincol {
184
+		float: left;
185
+		width: 620px;
186
+		margin-right: 20px;
187
+	}
188
+	
189
+	#maincol {
190
+		float: right;
191
+		width: 710px;
192
+		margin-bottom: 20px;
193
+	}
194
+	
195
+	#maincol-left {
196
+		float: left;
197
+		width: 710px;
198
+		margin-bottom: 20px;
199
+	}
200
+			
201
+		.subcol {
202
+			width: 280px;
203
+			float: left;
204
+			margin: 0 0 25px;
205
+		}
206
+		
207
+			#content .first {
208
+				margin-right: 20px;
209
+			}
210
+
211
+/* SIDEBAR ------------*/
212
+		
213
+#home #sidecol {
214
+	float: right;
215
+	width: 300px;
216
+}
217
+	
218
+#sidecol {
219
+	float: left;
220
+	width: 230px;
221
+	margin-right: 20px;
222
+}
223
+	
224
+#sidecol-right {
225
+	float: right;
226
+	width: 230px;
227
+	margin-left: 20px;
228
+}
229
+	
230
+	#torusers { margin: 0 0 27px; }
231
+		.user {
232
+			margin: 0 0 12px;
233
+			height: auto;
234
+		}
235
+		.user img, .project-icon {
236
+			border: 1px solid #cac8a7;
237
+			float: left;
238
+			margin: 3px 10px 0 0;
239
+		}
240
+		.user p { margin: 0; }
241
+	
242
+/* IMGSHADOW ------------*/
243
+
244
+.img-shadow {
245
+	float:left;
246
+	background: url(../images/shadowAlpha.png) no-repeat bottom right !important;
247
+	background: url(../images/shadow.gif) no-repeat bottom right;
248
+	margin: 10px 0 10px 10px !important;
249
+	margin: 10px 0 10px 5px;
250
+}
251
+
252
+	.img-shadow .infoblock,
253
+	.img-shadow .important-infoblock,
254
+	.img-shadow .custom-infoblock,
255
+	.img-shadow #sidenav,
256
+	.img-shadow .sidenav-sub {
257
+		display: block;
258
+		position: relative;
259
+		margin: -6px 6px 6px -6px;
260
+		background-color: #fff;
261
+		border: 1px solid #ddd;
262
+	}
263
+	.img-shadow .important-infoblock {
264
+		background-color: #f7f8f0;
265
+		border: 1px solid #eeefe8;
266
+	}
267
+	
268
+	.img-shadow .infoblock,
269
+	.img-shadow .important-infoblock {
270
+		padding: 15px;
271
+		width: 188px;
272
+	}
273
+	
274
+	.img-shadow .custom-infoblock {
275
+		padding: 15px;
276
+		height: 120px;
277
+		width: 426px;
278
+	}
279
+
280
+	.img-shadow .infoblock p,
281
+	.img-shadow .important-infoblock p,
282
+	.img-shadow .custom-infoblock p {
283
+		margin: 0;
284
+	}
285
+	
286
+	
287
+/* SIDENAV ------------*/
288
+
289
+/*Note: #sidenav-sub is used on the downloads page as a tertiary navigation*/
290
+
291
+.img-shadow #sidenav,
292
+.img-shadow .sidenav-sub {
293
+	padding: 10px 0 0;
294
+	width: 218px;
295
+}
296
+		
297
+	#sidenav ul li,
298
+	.sidenav-sub ul li { border-bottom: 1px solid #ddd; }
299
+	
300
+	#sidenav ul li.dropdown a:link,
301
+	#sidenav ul li.dropdown a:visited { background: url(../images/sidenav-arrow.gif) left center no-repeat; }
302
+	#sidenav ul li.dropdown a.active { background: url(../images/sidenav-arrow-active.gif) left center no-repeat; }
303
+	
304
+	.sidenav-sub ul li.dropdown a:link,
305
+	.sidenav-sub ul li.dropdown a:visited { 
306
+		background: url(../images/sidenav-arrow.gif) left top no-repeat;
307
+		margin-top: 12px;
308
+	}
309
+	
310
+	#sidenav ul li a:link,
311
+	#sidenav ul li a:visited {
312
+		display: block;
313
+		height: auto;
314
+		padding: 8px 15px 8px 26px;
315
+	}
316
+	
317
+	#sidenav ul li ul li a:link,
318
+	#sidenav ul li ul li a:visited {
319
+		padding-left: 37px;
320
+	}
321
+	
322
+	.sidenav-sub ul li a:link,
323
+	.sidenav-sub ul li a:visited {
324
+		display: block;
325
+		padding: 0 15px 10px 26px;
326
+		line-height: 16px;
327
+	}
328
+	
329
+	#sidenav ul li.active {
330
+		background: url(../images/sidenav-active.png) left center no-repeat;
331
+		width: 230px;
332
+		border: 0;
333
+	}
334
+
335
+  #sidenav ul li ul li ul li a:link,
336
+	#sidenav ul li ul li ul li a:visited {
337
+		padding-left: 48px;
338
+	}
339
+	
340
+/* TABLE ------------*/
341
+
342
+table { width: 100%; }
343
+
344
+td { padding: 12px; }
345
+
346
+table td img,
347
+table tr img {
348
+	border: 1px solid #cac8a7;
349
+	float: left;
350
+	margin-right: 10px;
351
+}
352
+
353
+.icon {
354
+	float: left;
355
+	width: auto;
356
+	margin-right: 15px;
357
+	padding: 10px 0;
358
+	border: 0;
359
+}
360
+
361
+.calendar {
362
+	background: url(../images/icon-calendar.jpg) left top no-repeat;
363
+	float: left;
364
+	margin-right: 10px;
365
+	width: 45px;
366
+	height: 54px;
367
+	text-align: center;
368
+	padding: 4px 0;
369
+}
370
+
371
+.fauxhead {
372
+	background: url(../images/table-arrow.jpg) right top no-repeat;
373
+	width: 100%;
374
+	height: 11px;
375
+}
376
+
377
+.beige { background: #f5f5df; }
378
+
379
+.meta {
380
+	float: right;
381
+	width: auto;
382
+}
383
+
384
+/* DL TABLE ------------*/
385
+
386
+td.intro { padding: 0 0 10px; }
387
+
388
+.windows,
389
+.mac,
390
+.linux,
391
+.android { padding: 5px 0 5px 20px; }
392
+
393
+.windows { background: url(../images/icon-windows.gif) left center no-repeat; }
394
+.mac { background: url(../images/icon-mac.gif) left center no-repeat; }
395
+.linux { background: url(../images/icon-linux.gif) left center no-repeat; }
396
+.android { background: url(../images/icon-android.gif) left center no-repeat; }
397
+
398
+
399
+/* MISC ------------*/
400
+
401
+.title {
402
+	background: url(../images/table-title-arrow.jpg) right top no-repeat;
403
+	padding: 10px 25px 0 10px;
404
+	height: 33px;
405
+	float: left;
406
+}
407
+
408
+	.title a:link,
409
+	.title a:visited {
410
+		background: url(../images/table-title.jpg) left top no-repeat;
411
+		height: 33px;
412
+		display: block;
413
+	}	
414
+
415
+.paypal {
416
+	float: left;
417
+	width: auto;
418
+	min-height: 159px;
419
+	max-width: 365px;
420
+}
421
+	.paypal span { padding-right: 20px; }
422
+
423
+.warning {
424
+	background: #ebd4a9 url(../images/warning.jpg) left center no-repeat;;
425
+	border: 1px solid #deba78;
426
+	padding: 10px 15px;
427
+}
428
+	.warning p { padding-left: 40px; }
429
+	
430
+.focus {
431
+	background: #f4f2c7;
432
+	border: 1px solid #ebd4a9;
433
+	padding: 10px 15px;
434
+}
435
+
436
+	.focus .icon {
437
+		float: left;
438
+		width: auto;
439
+		margin-right: 10px;
440
+	}
441
+	
442
+.featured-project { width: 313px; }
443
+	
444
+/* FORM ------------*/
445
+
446
+input, select {
447
+	margin: 0 3px 10px 0;
448
+}
449
+
450
+input.textfield {
451
+	padding: 0 10px;
452
+	vertical-align: top;
453
+}
454
+
455
+.donate-btn {
456
+	background: url(../images/button-donate.jpg) left top no-repeat;
457
+	height: 26px;
458
+	width: 92px;
459
+	text-indent: -9999px;
460
+	overflow: hidden;
461
+	border: 0;
462
+	vertical-align: top;
463
+	margin-top: 5px;
464
+}
465
+	.donate-btn:hover {
466
+		background-position: 0 -26px;
467
+		cursor: pointer;
468
+	}
469
+
470
+.signup {
471
+	background: #96c35a;
472
+	border-top: 1px solid #6ab334;
473
+	border-left: 1px solid #6ab334;
474
+	border-bottom: 1px solid #5a952b;
475
+	border-right: 1px solid #5a952b;
476
+	height: 31px;
477
+	padding: 0 5px;
478
+	vertical-align: top;
479
+	color: #222c14;
480
+	font-weight: bold;
481
+	font-size: 1em;
482
+	line-height: 1em;
483
+}
484
+	.signup:hover { background: #6ab334; }
485
+
486
+select#lang {
487
+	float: left;
488
+	width: 160px;
489
+	margin-right: 3px;
490
+}
491
+.go {
492
+	background: #96c35a;
493
+	border-top: 1px solid #6ab334;
494
+	border-left: 1px solid #6ab334;
495
+	border-bottom: 1px solid #5a952b;
496
+	border-right: 1px solid #5a952b;
497
+	padding: 0 5px;
498
+	vertical-align: top;
499
+	color: #222c14;
500
+	font-weight: bold;
501
+	font-size: 1em;
502
+	line-height: 1em;
503
+	height: 18px;
504
+}
505
+	.go:hover { background: #6ab334; }
506
+
507
+	
508
+/* FOOTER ------------*/
509
+
510
+#footer {
511
+	width: 960px;
512
+	height: 200px;
513
+	border-top: 1px solid #ddd;
514
+	padding: 20px 0;
515
+	margin: 20px 0 0;
516
+}
517
+
518
+	.onion {
519
+		float: left;
520
+		width: 78px;
521
+		padding-right: 20px;
522
+		height: 100%;
523
+	}
524
+
525
+	#footer .about {
526
+		width: 180px;
527
+		padding-right: 30px;
528
+		border-right: 1px solid #ddd;
529
+		float: left;
530
+	}
531
+	
532
+	#footer .newsletter {
533
+		padding: 0 0 15px 30px;
534
+		width: auto;
535
+		margin-left: 308px;
536
+	}
537
+	
538
+		#footer input.textfield {
539
+			width: 220px;
540
+			height: 26px;
541
+		}
542
+		
543
+		#footer input {
544
+			margin: 0;
545
+		}
546
+	
547
+	#footer .col {
548
+		float: left;
549
+		width: 100px;
550
+		margin-left: 20px;
551
+	}
552
+	
553
+		#footer .first { margin-left: 30px; }
554
+		#footer .wider { width: 201px; }
555
+	
556
+/*
557
+** Markup free clearing
558
+** Details: http://www.positioniseverything.net/easyclearing.html
559
+*/
560
+.clearfix:after {
561
+  content: ".";
562
+  display: block;
563
+  height: 0;
564
+  clear: both;
565
+  visibility: hidden;
566
+}
567
+
568
+.clearfix {
569
+  display: inline-block;
570
+}
571
+
572
+/* Hides from IE-mac \*/
573
+* html .clearfix {
574
+  height: 1%;
575
+}
576
+.clearfix {
577
+  display: block;
578
+}
579
+/* End hide from IE-mac */
0 580
\ No newline at end of file
... ...
@@ -0,0 +1,14 @@
1
+@charset "UTF-8";
2
+/* -------------------------------------------------------------- 
3
+
4
+	Company Name: The Tor Project
5
+	Company URI: http://www.torproject.org
6
+	Author: New Eon Media.
7
+	Author URI: http://www.neweonmedia.com
8
+	Date: May 2010
9
+
10
+-------------------------------------------------------------- */
11
+
12
+@import "reset.css";
13
+@import "layout.css";
14
+@import "typography.css";
0 15
\ No newline at end of file
... ...
@@ -0,0 +1,49 @@
1
+@charset "UTF-8";
2
+/* Eric Meyer's Reset Reloaded */
3
+
4
+html, body, div, span, applet, object, iframe,
5
+h1, h2, h3, h4, h5, h6, p, blockquote, pre,
6
+a, abbr, acronym, address, big, cite, code,
7
+del, dfn, em, font, img, ins, kbd, q, s, samp,
8
+small, strike, strong, sub, sup, tt, var,
9
+dl, dt, dd, ol, ul, li,
10
+fieldset, form, label, legend,
11
+table, caption, tbody, tfoot, thead, tr, th, td {
12
+        margin: 0;
13
+        padding: 0;
14
+        border: 0;
15
+        outline: 0;
16
+        font-weight: inherit;
17
+        font-style: inherit;
18
+        font-size: 100%;
19
+        font-family: inherit;
20
+        vertical-align: baseline;
21
+}
22
+/* remember to define focus styles! */
23
+:focus {
24
+        outline: 0;
25
+}
26
+body {
27
+        line-height: 1;
28
+        color: black;
29
+        background: white;
30
+}
31
+ol, ul {
32
+        list-style: none;
33
+}
34
+/* tables still need 'cellspacing="0"' in the markup */
35
+table {
36
+        border-collapse: separate;
37
+        border-spacing: 0;
38
+}
39
+caption, th, td {
40
+        text-align: left;
41
+        font-weight: normal;
42
+}
43
+blockquote:before, blockquote:after,
44
+q:before, q:after {
45
+        content: "";
46
+}
47
+blockquote, q {
48
+        quotes: "" "";
49
+}
... ...
@@ -0,0 +1,320 @@
1
+@charset "UTF-8";
2
+/* Typography */
3
+
4
+
5
+/* UNIVERSAL ------------*/
6
+
7
+body {
8
+	font-family: Helvetica, "Helvetica Neue", Arial, sans-serif;
9
+	font-size: 9pt;
10
+	color: #1a1a1a;
11
+}
12
+
13
+h1, h2, h3, h4 {
14
+	font-family: Georgia, "Times New Roman", Times, serif;
15
+	font-weight: bold;
16
+	color: #23300e;
17
+}
18
+
19
+h1 a:link,
20
+h1 a:visited,
21
+h2 a:link,
22
+h2 a:visited,
23
+h3 a:link,
24
+h3 a:visited,
25
+h4 a:link,
26
+h4 a:visited { text-decoration: none; }
27
+
28
+
29
+h1 {
30
+	font-size: 2em;
31
+	line-height: 28px;
32
+	margin-bottom: 10px;
33
+}
34
+
35
+h2 {
36
+	font-size: 1.5em;
37
+	line-height: 28px;
38
+	margin-bottom: 10px;
39
+}
40
+	.subcol h2 { margin: 0; }
41
+	#sidenav h2,
42
+	.sidenav-sub h2 { padding: 10px 0 0 10px; }
43
+	h2.bulb {
44
+		background: url(../images/lightbulb.jpg) left top no-repeat;
45
+		padding: 0 0 0 25px;
46
+	}
47
+
48
+h3 {
49
+	font-family: Helvetica, "Helvetica Neue", Arial, sans-serif;
50
+	font-size: 1.167em;
51
+	line-height: 20px;
52
+	color: #0d1304;
53
+}
54
+
55
+h4 {
56
+	font-family: Helvetica, "Helvetica Neue", Arial, sans-serif;
57
+	line-height: 20px;
58
+	font-size: 1em;
59
+}
60
+	.focus h4 { margin-bottom: 5px; }
61
+
62
+p, blockquote, ol, ul {
63
+	font-size: 1em;
64
+	line-height: 20px;
65
+	margin-bottom: 18px;
66
+}
67
+
68
+a:link, a:visited { color: #4e6a20; }
69
+a:hover { color: #a07320; }
70
+
71
+strong { font-weight: bold; }
72
+em { font-style: italic; }
73
+
74
+blockquote {
75
+	color: #454545;
76
+	font-style: italic;
77
+	padding: 0 20px;
78
+}
79
+
80
+ol, ul {
81
+	padding-left: 40px;
82
+}
83
+ol { list-style: outside lower-alpha; }
84
+ul { list-style: outside square; }
85
+
86
+.small { font-size: 0.833em; }
87
+
88
+.caps {
89
+	font-size: 1em;
90
+	text-transform: uppercase;
91
+	margin: 2px 0 5px;
92
+}
93
+
94
+/* NAVIGATION ------------*/
95
+
96
+#nav ul { font-size: 1.167em; }
97
+
98
+  #nav ul li { list-style: none; }
99
+  
100
+  #nav ul li a:link,
101
+  #nav ul li a:visited {
102
+    color: #23300e;
103
+    text-decoration: none;
104
+    padding: 10px 20px 0;
105
+    height: 40px;
106
+    float: left;
107
+  }
108
+  #nav ul li a:hover,
109
+  #nav ul li a.active { background: url(../images/bg-nav-hover.jpg) left top repeat-x;}
110
+  #nav ul li a.active { font-weight: bold; }
111
+
112
+#breadcrumbs a:link,
113
+#breadcrumbs a:visited,
114
+.meta {
115
+	text-transform: uppercase;
116
+	font-size: 0.833em;
117
+	text-decoration: none;
118
+}
119
+
120
+.meta a:link,
121
+.meta a:visited { text-decoration: none; }
122
+
123
+
124
+/* BANNER ------------*/
125
+
126
+h1.headline {
127
+	color: #fff;
128
+	font-size: 3.5em;
129
+	line-height: 28px;
130
+	font-weight: normal;
131
+	text-shadow: 1px 1px 2px #23300e;
132
+	float: left;
133
+	width: 360px;
134
+	margin-bottom: 12px;
135
+}
136
+
137
+p.desc {
138
+	font-size: 1.417em;
139
+	line-height: 20px;
140
+	color: #fff;
141
+	text-shadow: 1px 1px 2px #23300e;
142
+	width: 360px;
143
+	float: left;
144
+}
145
+
146
+#banner ul {
147
+	color: #fff;
148
+	text-shadow: 1px 1px 2px #366b32;
149
+	line-height: 16px;
150
+	font-size: 1.167em;
151
+}
152
+
153
+#banner .incorrect a:link,
154
+#banner .incorrect a:visited {
155
+	color: #fff;
156
+	font-size: 0.833em;
157
+	text-align: right;
158
+	width: 315px;
159
+	float: left;
160
+	padding-right: 45px;
161
+	line-height: 0;
162
+	margin: -3px 0 0;
163
+}
164
+
165
+/* SIDENAV ------------*/
166
+
167
+#sidenav ul {
168
+	margin-bottom: 0;
169
+	padding-left: 0;
170
+	list-style: none;
171
+}
172
+
173
+#sidenav ul li ul li { font-size: 0.917em; }
174
+
175
+#sidenav ul li a:link,
176
+#sidenav ul li a:visited {
177
+	text-decoration: none;
178
+	color: #23300e;
179
+	line-height: 18px;
180
+}
181
+
182
+#sidenav ul li a.active,
183
+#sidenav ul li.active,
184
+#sidenav ul li a:hover { font-weight: bold; }
185
+
186
+.sidenav-sub ul {
187
+	padding-left: 0;
188
+	list-style: none;
189
+	margin-bottom: 0;
190
+}
191
+
192
+.sidenav-sub ul li a:link,
193
+.sidenav-sub ul li a:visited {
194
+	text-decoration: none;
195
+		line-height: 16px;
196
+}
197
+
198
+/* TABLE ------------*/
199
+
200
+table h2,
201
+#home-our-projects h2,
202
+#home-announcements h2 {
203
+	background: url(../images/table-head.jpg) left top repeat-x;
204
+	color: #f6f6ed;
205
+	padding-left: 10px;
206
+	margin: 0;
207
+}
208
+table h3 { font-size: 1.167em; }
209
+table p {
210
+	margin: 0; 
211
+}
212
+
213
+table .name {
214
+	font-size: 1.5em;
215
+	font-weight: bold;
216
+	color: #23300e;
217
+}
218
+
219
+.calendar .month { color: #fff; }
220
+.calendar .day {
221
+	font-weight: bold;
222
+	color: #4d4d4d;
223
+	font-size: 1.429em;
224
+	line-height: 32px;
225
+}
226
+
227
+/* DL TABLE ------------*/
228
+
229
+.column-title {
230
+	font-weight: bold;
231
+	color: #23300e;
232
+}
233
+
234
+/* MISC ------------*/
235
+
236
+.continue a:link,
237
+.continue a:visited {
238
+	float: right;
239
+	font-weight: bold;
240
+	text-decoration: none;
241
+}
242
+
243
+.paypal {
244
+	font-size: 1.167em;
245
+	color: #666;
246
+}
247
+
248
+.warning p {
249
+	color: #3a3a3a;
250
+	margin-bottom: 0;
251
+	line-height: 20px;
252
+}
253
+
254
+.focus .name {
255
+	font-size: 1.5em;
256
+	font-weight: bold;
257
+	color: #4e6a20;
258
+}
259
+.focus p { margin: 0; }
260
+
261
+.title {
262
+	font-size: 1.167em;
263
+	font-weight: bold;
264
+	color: #f6f6ed;
265
+}
266
+
267
+	.title a:link,
268
+	.title a:visited {
269
+		font-weight: bold;
270
+		color: #f6f6ed;
271
+	}
272
+	.title a:hover { color: #f6f6ed; }
273
+	
274
+.or {
275
+	color: #c0e07a;
276
+	font-size: 3em;
277
+	padding: 30px 20px;
278
+	font-weight: bold;
279
+}	
280
+
281
+.fakeol {
282
+	font-family: Georgia, "Times New Roman", Times, serif;
283
+	font-size: 3em;
284
+	color: #e4c07e;
285
+	vertical-align: text-top;
286
+	float: left;
287
+	width: 40px;
288
+}
289
+
290
+.instructions {
291
+	margin-bottom: 18px;
292
+	float: left;
293
+	width: 620px;
294
+	line-height: 18px;
295
+}
296
+
297
+.current-relay,
298
+.target-relay {
299
+	font-family: Georgia, "Times New Roman", Times, serif;
300
+	font-size: 2.5em;
301
+}
302
+.current-relay { color: #695279; }
303
+.target-relay { color: #4e6a20; }
304
+
305
+
306
+/* FOOTER ------------*/
307
+
308
+#footer p,
309
+#footer ul {
310
+	font-size: 0.833em;
311
+}
312
+#footer ul {
313
+	padding-left: 0;
314
+	list-style: none;
315
+}	
316
+
317
+#footer ul li {
318
+	line-height: 18px;
319
+}
320
+
... ...
@@ -0,0 +1,90 @@
1
+
2
+
3
+
4
+
5
+
6
+
7
+## translation metadata
8
+# Revision: $Revision: 22225 $
9
+# Translation-Priority: 3-low
10
+#include "head.wmi" TITLE="Tor: Sponsors" CHARSET="UTF-8"
11
+<div class="main-column">
12
+
13
+<h2>Tor: Sponsoren</h2>
14
+<div class="underline"></div>
15
+<p>
16
+Die <a href="<page torusers>">verschiedenen Benutzergruppen</a> des Tor
17
+Projektes führen dazu, dass wir ebenfalls ganz unterschiedliche
18
+Einnahmequellen haben, und es ist uns wichtig, diese weiter zu
19
+diversifizieren! Unsere Sponsoren können nach der Höhe des erhaltenen Geldes
20
+unterteilt werden:
21
+</p>
22
+
23
+<h3><i>Magnoliophyta</i> (über eine Million Dollar)</h3>
24
+	<ul>
25
+		<li>Sie?</li>
26
+	</ul>
27
+
28
+<h3><i>Liliopsida</i> (bis zu 750'000 Dollar)</h3>
29
+	<ul>
30
+		<li>Eine anonyme amerikanische Nichtregierungsorganisation (2008-2010)</li>
31
+	</ul>
32
+
33
+<h3><i>Asparagales</i> (bis zu 500'000 Dollar)</h3>
34
+	<ul>
35
+		<li><a href="http://www.ibb.gov/">International Broadcasting Bureau</a>
36
+(2006-2010)</li>
37
+		<li>Eine anonyme europäische Nichtregierungsorganisation (2006-2008)</li>
38
+	</ul>
39
+
40
+<h3><i>Alliaceae</i> (bis zu 200'000 Dollar)</h3>
41
+	<ul>
42
+		<li>Sie?</li>
43
+	</ul>
44
+
45
+<h3><i>Allium</i> (bis zu 100'000 Dollar)</h3>
46
+	<ul>
47
+		<li><a href="http://www.nlnet.nl/">NLnet Foundation</a> (2008-2009)</li>
48
+		<li><a href="http://chacs.nrl.navy.mil/">Naval Research Laboratory</a>
49
+(2006-2010)</li>
50
+		<li>Ein anonymer amerikanische Internet Service Provider (2009-2010)</li>
51
+	</ul>
52
+
53
+<h3><i>Allium cepa</i> (bis zu 50'000)</h3>
54
+	<ul>
55
+		<li><a href="<page donate>">Mehr als 500 persönliche Spenden von Einzelpersonen
56
+wie Sie</a> (2006-2010)</li>
57
+		<li><a href="http://code.google.com/opensource/">Google</a> (2008-2009)</li>
58
+		<li><a href="http://code.google.com/soc/">Google Summer of Code</a> (2007-2009)</li>
59
+		<li><a href="http://www.hrw.org/">Human Rights Watch</a> (2007)</li>
60
+		<li><a href="http://www.torfox.org/">Torfox</a> (2009)</li>
61
+    <li><a href="http://www.shinjiru.com/">Shinjiru Technology</a> (2009-2010)</li>
62
+  </ul>
63
+
64
+<h3>Bisherige Sponsoren</h3>
65
+<p>We greatly appreciate the support provided by our past sponsors in keeping
66
+the pre-501(c)(3) Tor Project progressing through our ambitious goals:</p>
67
+	<ul>
68
+		<li><a href="https://www.eff.org/">Electronic Frontier Foundation</a>
69
+(2004-2005)</li>
70
+		<li><a href="http://chacs.nrl.navy.mil/">DARPA and ONR via Naval Research
71
+Laboratory</a> (2001-2006)</li>
72
+		<li><a href="http://www.cyber-ta.org/">Cyber-TA Projekt</a> (2006-2008)</li>
73
+		<li>Bell Security Solutions Inc (2006)</li>
74
+		<li><a href="http://www.omidyar.net/">Omidyar Network Enzyme Grant</a> (2006)</li>
75
+		<li><a
76
+href="http://seclab.cs.rice.edu/lab/2005/08/01/seclab-awarded-grant-to-study-security-of-p2p/">NSF
77
+via Rice Universität</a> (2006-2007)</li>
78
+	</ul>
79
+<p>Grosser Dank geht an alle Personen und Gruppen, die Tor bisher ermöglicht
80
+haben. Ganz besonders bedanken möchten wir uns bei den einzelnen
81
+Freiwilligen, welche nicht-monetäre Unterstützung geleistet haben:
82
+Programmieren, Testen, Dokumentieren, Ausbildung, Forschung und Betreiben
83
+der Tor Knoten aus denen dieses Netzwerk besteht.
84
+</p>
85
+
86
+</div>
87
+
88
+
89
+
90
+#include <foot.wmi>
... ...
@@ -0,0 +1,5 @@
1
+include $(WMLBASE)/Makefile.common
2
+TORSVNSTABLE = $(WMLBASE)/tor-stable
3
+TORGIT = $(WMLBASE)/tor/.git
4
+STABLETAG = tor-0.2.1.26
5
+DEVTAG = tor-0.2.2.13-alpha
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,176 @@
1
+## translation metadata
2
+# Revision: $Revision: 22268 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian>">Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="debian"></a>
14
+    <h2><a class="anchor" href="#debian">ေရြးခ်ယ္ခ်က္ (၁) : Debian Lenny ရွိ Tor ၊
15
+    Debian sid ၊ Debian testing</a></h2>
16
+    <br />
17
+    
18
+    <p>
19
+    If you're using Debian stable (lenny), unstable (sid), or testing (squeeze),
20
+    just run<br /> <tt>apt-get install tor tor-geoipdb</tt> as root.
21
+    </p>
22
+    
23
+    <p>
24
+    Tor ၏ ေနာက္ဆံုးေပၚ versions မ်ားကိုအျမဲေပးႏိုင္သည္ဟုအာမမခံႏိုင္ေသာ္လည္း၊
25
+    အေရးၾကီးေသာ လံုျခံဳေရးႏွင့္သတ္ဆိုင္သည့္ ျပင္ဆင္မွဳမ်ားကိုရရွိမည္ျဖစ္ပါသည္။
26
+    ေနာက္ဆံုး ေပၚ Tor version ကိုအျမဲတေစသံုးလိုပါက၊ ေအာက္မွ ေရြးခ်ယ္ခ်က္ (၂)
27
+    ကိုၾကည့္ပါ။
28
+    </p>
29
+    
30
+    <p>
31
+    Tor အလုပ္လုပ္ေနပါျပီ။ "Tor on Linux/Unix" ထည့္သြင္းျခင္း၏ <a href="<page
32
+    docs/tor-doc-unix>#polipo">အဆင့္(၂)</a> သို႔ထပ္သြားပါရန္။
33
+    </p>
34
+    
35
+    <hr /> <a id="ubuntu"></a> <a id="packages မ်ား"></a>
36
+    <h2><a class="anchor" href="#ubuntu">ေရြးခ်ယ္ခ်က္ (၂) : Tor on Ubuntu or
37
+    Debian</a></h2>
38
+    <br />
39
+    
40
+    <p>
41
+    <b>Ubuntu's universe တြင္ ဤ package မ်ားကိုမသံုးပါႏွင့္။</b> ၄င္းတို႔သည္
42
+    ျပင္ဆင္မွဳမ်ားမရွိဘဲ out of date ျဖစ္ေနပါသည္။ ထို႔ေၾကာင့္ ၄င္းကိုသံုးလွ်င္
43
+    software တည္ျငိမ္မွဳမရွိျပီး လံုျခံေရးဆိုင္ရာ ျပင္ဆင္မွဳမ်ားကိုလည္း
44
+    ျပဳလုပ္၍မရႏိုင္ပါ။
45
+    </p>
46
+    
47
+    <p>
48
+    You'll need to set up our package repository before you can fetch
49
+    Tor. First, you need to figure out the name of your distribution. If you're
50
+    using Ubuntu 9.10 or 10.04, it's "karmic", while 9.04 is "jaunty", 8.10 is
51
+    "intrepid", and 8.04 is "hardy". If you're using Debian Etch, it's "etch",
52
+    and Debian Lenny is "lenny". Then add this line to your
53
+    <tt>/etc/apt/sources.list</tt> file:<br />
54
+    <pre>
55
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
56
+    </pre>
57
+    where you put the codename of your distribution (i.e. etch, lenny, sid,
58
+    karmic, jaunty, intrepid, hardy or whatever it is) in place of
59
+    &lt;DISTRIBUTION&gt;.
60
+    </p>
61
+    
62
+    <p>
63
+    Then add the gpg key used to sign the packages by running the following
64
+    commands at your command prompt:
65
+    <pre>
66
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
67
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
68
+    </pre>
69
+    Now refresh your sources and install Tor by running the following commands
70
+    at your command prompt:
71
+    <pre>
72
+    apt-get update
73
+    apt-get install tor tor-geoipdb
74
+    </pre>
75
+    </p>
76
+    
77
+    <p>
78
+    Tor အလုပ္လုပ္ေနပါျပီ။ "Tor on Linux/Unix" ထည့္သြင္းျခင္း၏ <a href="<page
79
+    docs/tor-doc-unix>#polipo">အဆင့္(၂)</a> သို႔ထပ္သြားပါရန္။
80
+    </p>
81
+    
82
+    <p style="font-size: small">
83
+    The DNS name <code>deb.torproject.org</code> is actually a set of
84
+    independent servers in a DNS round robin configuration.  If you for some
85
+    reason cannot access it you might try to use the name of one of its part
86
+    instead.  Try <code>deb-master.torproject.org</code>,
87
+    <code>mirror.netcologne.de</code> or <code>tor.mirror.youam.de</code>.
88
+    </p>
89
+    
90
+    <hr /> <a id="development"></a>
91
+    <h2><a class="anchor" href="#development">ေရြးခ်ယ္မွဳ ၃: Tor ၏ development
92
+    branch ကို Debian or Ubuntu တြင္အသံုးျပဳျခင္း</a></h2>
93
+    <br />
94
+    
95
+    <p>Tor ၏ <a href="<page download/download>#packagediff">development branch</a>
96
+    ကိုအစားထိုးသံုးလိုပါက ( Feature ႏွင့္ Bug မ်ားပိုမ်ားႏိုင္ပါသည္),
97
+    <tt>/etc/apt/sources.list</tt> file:<br /> တြင္ line
98
+    အသစ္မ်ားျဖင့္ထပ္မံအသံုးျပဳရပါလိမ့္မည္။
99
+    <pre>
100
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
101
+    deb     http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
102
+    </pre>
103
+    where you again substitute the name of your distro (etch, lenny, sid,
104
+    karmic, jaunty, intrepid, hardy) in place of &lt;DISTRIBUTION&gt;.
105
+    </p>
106
+    
107
+    <p>
108
+    Then run the following commands at your command prompt:
109
+    <pre>
110
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
111
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
112
+    apt-get update
113
+    </pre>
114
+    </p>
115
+    
116
+    <p>
117
+    Tor အလုပ္လုပ္ေနပါျပီ။ "Tor on Linux/Unix" ထည့္သြင္းျခင္း၏ <a href="<page
118
+    docs/tor-doc-unix>#polipo">အဆင့္(၂)</a> သို႔ထပ္သြားပါရန္။
119
+    </p>
120
+    
121
+    <hr /> <a id="source"></a>
122
+    <h2><a class="anchor" href="#source">source မွတည္ေဆာက္ျခင္း</a></h2>
123
+    <br />
124
+    
125
+    <p>
126
+    ကိုယ္ပိုင္ debs မ်ားကိုတည္ေဆာက္လိုပါက သင့္ေလွ်ာ္ေသာ <tt>deb-src</tt>
127
+    ကို<tt>sources.list</tt> တြင္ထည့္သြင္းရပါမည္။
128
+    <pre>
129
+    # For the stable version.
130
+    # For the unstable version.
131
+    
132
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
133
+    
134
+    
135
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
136
+    deb-src http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
137
+    </pre>
138
+    Tor: တည္ေဆာက္ရန္ ကိုယ္ပိုင္ debs ႏွင့္ packages မ်ားကိုလည္း
139
+    ထည့္သြင္းအသံုးျပဳရန္ လိုအပ္ပါလိမ့္မည္။
140
+    <pre>
141
+    apt-get install build-essential fakeroot devscripts
142
+    apt-get build-dep tor
143
+    </pre>
144
+    Tor ကို ~/debian-packages: မ်ားတြင္ တည္ေဆာက္ႏိုင္ပါသည္။
145
+    <pre>
146
+    mkdir ~/debian-packages; cd ~/debian-packages
147
+    apt-get source tor
148
+    cd tor-*
149
+    debuild -rfakeroot -uc -us
150
+    cd ..
151
+    </pre>
152
+    Package အသစ္ကိုထည့္သြင္းအသံုးျပဳႏိုင္ပါျပီ။
153
+    <pre>
154
+    sudo dpkg -i tor_*.deb
155
+    </pre>
156
+    </p>
157
+    
158
+    <p>
159
+    Tor အလုပ္လုပ္ေနပါျပီ။ "Tor on Linux/Unix" ထည့္သြင္းျခင္း၏ <a href="<page
160
+    docs/tor-doc-unix>#polipo">အဆင့္(၂)</a> သို႔ထပ္သြားပါရန္။
161
+    </p>
162
+    
163
+    <hr />
164
+    
165
+    <p>ဤစာရြက္စာတမ္းႏွင့္ပတ္သတ္၍ အၾကံေပးလိုပါက ကၽြႏု္ပ္တို႔ကို <a href="<page
166
+    about/contact>">ဆက္သြယ္လိုက္ပါ</a>. ေက်းဇူးတင္ပါတယ္။</p>
167
+  </div>
168
+  <!-- END MAINCOL -->
169
+  <div id = "sidecol">
170
+#include "side.wmi"
171
+#include "info.wmi"
172
+  </div>
173
+  <!-- END SIDECOL -->
174
+</div>
175
+<!-- END CONTENT -->
176
+#include <foot.wmi>   
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,225 @@
1
+## translation metadata
2
+# Revision: $Revision: 22305 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Mac OS X Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-osx>">Mac OS X Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Mac OS X တြင္ <a href="<page index>">Tor</a> သံုးစဲြသူအျဖစ္ လုပ္ေဆာင္ျခင္း</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>ဤညႊန္ၾကားခ်က္တို႕မွာ Mac OS X အေပၚတြင္ Tor သံုးစဲြသူအျဖစ္ ထည့္သြင္းရန္
18
+    လုပ္ေဆာင္ျခင္းအတြက္  ညႊန္ၾကားခ်က္မ်ား ျဖစ္သည္။ သင္သည္ အျခားအေပၚတြင္
19
+    သတင္းအခ်က္အလက္ သြားလာမႈမ်ားကို ထပ္ဆင့္လႊင့္ျခင္းျဖင့္ ကြန္ယက္ကုိ
20
+    ၾကီးထြားေအာင္(ေက်းဇူးျပဳ၍ လုပ္ေဆာင္ပါ) ျပဳလုပ္မည္ဆိုပါက၊ ေက်းဇူးျပဳ၍<a
21
+    href="<page docs/tor-doc-relay>">ထပ္ဆင့္လႊင့္မႈ ျပင္ဆင္သတ္မွတ္ျခင္း</a>
22
+    လမ္းညႊန္ကို ဖတ္႐ႈပါ။</b>
23
+    </p>
24
+    
25
+    <hr />
26
+    <a id="installing"></a>
27
+    <h2><a class="anchor" href="#installing">အဆင့္ တစ္: Download လုပ္၍ Tor ကုိ
28
+    ထည့္သြင္းပါ</a></h2>
29
+    <br />
30
+    
31
+    <p>
32
+    The install for Macintosh OS X bundles <a href="<page index>">Tor</a>, <a
33
+    href="<page projects/vidalia>">Vidalia</a> (a graphical interface for Tor), <a
34
+    href="<page projects/torbutton>">Torbutton</a>, and <a
35
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (a web
36
+    proxy)  into one package, with the four applications pre-configured to work
37
+    together.  Download either the <a
38
+    href="../<package-osx-bundle-stable>">stable</a> or the <a
39
+    href="../<package-osx-bundle-alpha>">experimental</a> version of the OS X
40
+    bundle for Intel, or look for more options on the <a href="<page
41
+    download/download>">download page</a>.
42
+    </p>
43
+    
44
+    <p>dmg ကုိ ေဒါင္းလုဒ္လုပ္၍ ျပီးသည္ႏွင့္ ကလစ္ႏွစ္ခ်က္ႏိွပ္၍ စတင္ပါ။ Finder တြင္
45
+    ယခု Vidala Bundle ကုိ ဖြင့္ရန္ေနရာကို သြားပါ။ Vidalia onion icon ကုိ
46
+    ရုိးရွင္းစြာ drag ဆဲြယူ၍ Applications folder ထဲသို႕ ဆဲြခ်ျခင္းျဖင့္
47
+    ထည့္သြင္းမႈကုိ လြယ္ကူစြာ ျပဳလုပ္ႏုိင္ပါသည္။ ေရြးခ်ယ္စရာရွိသည္မွာ "install
48
+    torbutton" script ကုိ ကလစ္ႏွစ္ခ်က္ႏွိပ္၍ torbutton ကုိ Firefox သို႕
49
+    ထည့္သြင္းႏုိင္ပါသည္။ Torbutton ကုိ Mozilla Add-ons တြင္ "torbutton" ဟု
50
+    ရွာေဖြျခင္းျဖင့္လည္း ရရွိႏုိင္ပါသည္။</p>
51
+    
52
+    <p>ထည့္သြင္းျခင္း ျပီးဆံုးပါက Vidalia icon ကုိ Applications folder မွ
53
+    ေရြးခ်ယ္ျခင္းျဖင့္ စတင္ႏုိင္ပါသည္။ အနီေရာင္ X ပံုစံျပေနေသာ မွိန္ေနသည့္
54
+    ၾကက္သြန္ပံုစံသည္ လက္ရွိတြင္ Tor အလုပ္လုပ္မေနေၾကာင္း ျပသပါသည္။ screen
55
+    ၏အေပၚဘက္တြင္ ရွိေသာ "Tor" menu မွ Start ကုိ ေရြးခ်ယ္ျခင္းျဖင့္ Tor ကုိ
56
+    စတင္ႏုိင္ပါသည္။
57
+    </p>
58
+    
59
+    <p>Tor အလုပ္လုပ္ေဆာင္ေနခ်ိန္တြင္ Vidalia ၏ အုိင္ကြန္သည္ ေအာက္ေဖာ္ျပပါအတုိင္း
60
+    ရွိေနပါမည္။
61
+    </p>
62
+    
63
+    <p><img alt="vidalia running tor"
64
+    src="../img/screenshot-osx-vidalia.png"
65
+    border="1"/></p>
66
+    
67
+    <p>Polipo သည္ Tor အစုအေဝး၏ ထည့္သြင္းမႈတြင္ အစိတ္အပိုင္းတစ္ခုအျဖစ္
68
+    ထည့္သြင္းေပးပါသည္။ ၎ကို ထည့္သြင္းျပီးသည့္အခါ ကြန္ပ်ဴတာ ျပန္လည္စတင္သည္ႏွင့္
69
+    အလိုအေလ်ာက္ စတင္ပါလိမ့္မည္။ Polipo ကုိ Tor &mdash အသံုးျပဳရန္အတြက္
70
+    ျပင္ဆင္သတ္မွတ္ရန္ မလိုအပ္ပါ။ Tor အတြက္ ျပင္ဆင္သတ္မွတ္ျခင္းမ်ားကုိ
71
+    ထည့္သြင္းမႈ အစုအေဝးတြင္ အစိတ္အပိုင္းတစ္ခုအျဖစ္ ထည့္သြင္းျပီးသား
72
+    ျဖစ္ေသာေၾကာင့္ ျဖစ္ပါသည္။
73
+    </p>
74
+    
75
+    <hr />
76
+    <a id="using"></a>
77
+    <h2><a class="anchor" href="#using">အဆင့္ ႏွစ္ : သင့္အသံုးခ် ေဆာ့ဝဲမ်ားကို Tor
78
+    အသံုးျပဳရန္ ျပင္ဆင္ပါ</a></h2>
79
+    <br />
80
+    
81
+    <p>Tor ႏွင့္ Polipo တို႕ကုိ ထည့္သြင္းျပီးပါက သင့္အသံုးခ်ေဆာ့ဝဲမ်ားကုိ
82
+    အသံုးျပဳႏုိင္ရန္ ျပင္ဆင္ရပါမည္။ ပထမအဆင့္မွာ Web ၾကည့္ရႈျခင္းအတြက္
83
+    ျပင္ဆင္ျခင္း ျဖစ္ပါသည္။</p>
84
+    
85
+    <p>သင့္အတြက္ အေကာင္းဆံုး လံုျခံဳမႈရႏုိင္ရန္ Tor ပါဝင္ေသာ Firefox ႏွင့္
86
+    Torbutton တို႕ကုိ အသံုးျပဳသင့္ပါသည္။ Torbutton မွာ ထည့္သြင္းျပီး ျဖစ္ပါသည္။
87
+    အနီေရာင္ "Tor Disabled" ေျပာင္းလဲမႈ ခလုပ္ကုိ ႏွိပ္၍ Tor ကို ဖြင့္ပါ။
88
+    ျပီးလွ်င္ ေအာက္ပါတုိ႕ကုိ သတ္မွတ္ပါ : </p>
89
+    
90
+    <p><img alt="Torbutton plugin for Firefox"
91
+    src="../img/screenshot-torbutton.png"
92
+    border="1"/></p>
93
+    
94
+    <p>
95
+    အျခား ကြန္ပ်ဴတာတြင္ Firefox ကုိ အသံုးျပဳမည္ဟု အစီအစဥ္ရွိပါက <a
96
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">မတူညီေသာ
97
+    ကြန္ပ်ဴတာတြင္ Tor လုပ္ေဆာင္ျခင္းအတြက္ ေမးေလ့ရွိေသာ ေမးခြန္းမ်ား</a> ကုိ
98
+    ၾကည့္ရႈပါ။
99
+    </p>
100
+    
101
+    <p>HTTP proxies ကုိ ေထာက္ပံ့ေသာ အျခား အသံုးခ်ေဆာ့ဝဲမ်ားကုိ Tor
102
+    လုပ္ေဆာင္ႏိုင္ရန္ Polipo ကုိသာ ညႊန္ျပေပးပါ(၎မွာ localhost port 8118
103
+    ျဖစ္ပါသည္။) SOCKS ကုိ တုိက္ရုိက္ အသံုးျပဳရန္(သတင္းခ်က္ခ်င္းပို႕ျခင္းမ်ား၊
104
+    Jabber, IRC စသည္ျဖင့္) Tor(localhost port 9050) သို႕
105
+    တုိက္ရုိက္ညႊန္ျပႏုိင္ပါသည္။ သို႕ေသာ္ <a
106
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">ဤ
107
+    ေမးေလ့ရွိေသာ ေမးခြန္းမ်ား</a> ကုိ ဘာေၾကာင့္ အႏၱရာယ္ရွိႏုိင္ေၾကာင္း
108
+    သိရွိႏိုင္ရန္ ၾကည့္ရႈပါ။ SOCKS ႏွင့္ HTTP ပါ ေထာက္ပံ့မႈမရွိေသာ
109
+    အသံုးခ်ေဆာ့ဝဲမ်ားအတြက္ <a
110
+    href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a> သို႕မဟုတ္
111
+    <a href="http://www.dest-unreach.org/socat/">socat</a>တြင္ ၾကည့္ပါ။</p>
112
+    
113
+    <p>အျခားအသံုးခ်ေဆာ့ဝဲမ်ားကုိ Tor လုပ္ေဆာင္ႏုိင္ရန္ မည္သို႕လုပ္ေဆာင္ရမည္ကုိ <a
114
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">မည္သို႕
115
+    Tor လုပ္ေဆာင္ႏုိင္ေစမည္လဲ</a> တြင္ၾကည့္ရႈပါ။
116
+    </p>
117
+    
118
+    <hr />
119
+    <a id="verify"></a>
120
+    <h2><a class="anchor" href="#verify">အဆင့္ သံုး : အလုပ္လုပ္ေၾကာင္း
121
+    ေသခ်ာပါေစ။</a></h2>
122
+    <br />
123
+    
124
+    <p>
125
+    ေနာက္တစ္ဆင့္တြင္ သင့္ browser တြင္ Tor ႏွင့္ သံုးစဲြၾကည့္ရႈ၍ သင့္ IP
126
+    လိပ္စာသည္ အမည္ဝွက္မႈ လုပ္ေဆာင္ထားေၾကာင္း ေသခ်ာပါေစ။ <a
127
+    href="https://check.torproject.org/">Tor စစ္ေဆးၾကည့္ရႈသူ</a> ကုိ ကလစ္ႏွိပ္၍
128
+    သင္ Tor အသံုးျပဳေနျခင္း ဟုတ္ မဟုတ္ စစ္ေဆးပါ။ (ဤ site အလုပ္မလုပ္ပါက၊ <a
129
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">ဤ
130
+    ေမးေလ့ရွိေသာ ေမးခြန္းမ်ား</a> တြင္ သင့္ Tor ကုိ မည္သို႕စမ္းသပ္ရမည္ဆိုသည့္
131
+    အၾကံျပဳခ်က္မ်ားကုိ ၾကည့္ရႈပါ။)
132
+    </p>
133
+    
134
+    <p>သင့္တြင္ သင့္ကြန္ပ်ဴတာကို ကုိယ္တုိင္ဆက္သြယ္ရန္ ကန္႕သတ္ထားေသာ တစ္ကုိယ္ေရသံုး
135
+    Firewall ရွိပါက သင့္ စက္တြင္းမွ အသံုးခ်ေဆာ့ဝဲမ်ားကုိ စက္တြင္းမွ port 8118
136
+    ႏွင့္ port 9050 တို႕သို႕ ဆက္သြယ္ႏုိင္ေၾကာင္း ေသခ်ာပါေစ။ သင့္ Firewall မွ
137
+    အျပင္သို႕ ဆက္သြယ္မႈမ်ားကုိ ပိတ္ဆို႕ထားပါက အေပါက္တစ္ခုျပဳလုပ္၍ TCP ports
138
+    မ်ားျဖစ္ေသာ 80 ႏွင့္ 443 တုိ႕ကုိ ဆက္သြယ္ႏုိင္ေစရန္ ျပဳလုပ္ပါ။ ျပီးလွ်င္ <a
139
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">ဤ
140
+    ေမးေလ့ရွိေသာ ေမးခြန္းမ်ား</a> ကို ၾကည့္ရႈပါ။
141
+    </p>
142
+    
143
+    <p>ဤသည္တို႕ႏွင့္ အလုပ္မလုပ္ေသးလွ်င္ <a
144
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">ဤ
145
+    ေမးေလ့ရွိေသာ ေမးခြန္းမ်ား</a> ကုိ အရိပ္အျမြက္သိရွိႏုိင္ရန္ ၾကည့္ရႈပါ။</p>
146
+    
147
+    <p>
148
+    အလုပ္လုပ္သည္ႏွင့္ <a href="<page download/download>#Warning">Tor မွ မည္သည္တို႕ကုိ
149
+    လုပ္ေဆာင္ႏုိင္၍ မည္သည္တို႕ကုိ မလုပ္ေဆာင္ႏိုင္ပါ</a> တို႕ကို ဆက္လက္ ေလ့လာပါ။
150
+    </p>
151
+    
152
+    <hr />
153
+    <a id="server"></a> <a id="relay"></a>
154
+    <h2><a class="anchor" href="#relay">အဆင့္ ေလး : ထပ္ဆင့္လႊင့္သူအျဖစ္
155
+    ျပင္ဆင္သတ္မွတ္ပါ။</a></h2>
156
+    <br />
157
+    
158
+    <p>Tor ကြန္ယက္သည္ ေစတနာ့ဝန္ထမ္းမ်ား၏ လိုင္းအက်ယ္လွဴဒါန္းမႈကို မီွခိုရပါသည္။
159
+    ထပ္ဆင့္လႊင့္သူ ပိုမုိမ်ားျပားေလ Tor ကြန္ယက္ပိုမိုျမန္ဆန္ေလ ျဖစ္ပါသည္။
160
+    သင့္တြင္ လမ္းတိုင္းအတြက္ အနည္းဆံုး 20 kilobytes/s ရွိလွ်င္ သင့္ Tor ကုိ
161
+    ထပ္ဆင့္လႊင့္သူအျဖစ္ ျပင္ဆင္သတ္မွတ္၍ ကူညီေပးပါ။ ကၽြႏု္ပ္တို႕တြင္ Tor
162
+    ထပ္ဆင့္လႊင့္သူမ်ားကို လြယ္ကူေစရန္ႏွင့္ သက္သာအဆင္ေျပေစရန္
163
+    လိုင္းအက်ယ္ႏႈန္းကန္႕သတ္ျခင္း၊ အလဲြသံုးမႈ ေစာဒကမ်ားမွ လြတ္ကင္းရန္
164
+    အထြက္မူဝါဒမ်ား၊ ေျပာင္းလဲေနေသာ IP လိပ္စာမ်ားစသည္ျဖင့္ စီစဥ္ထားရွိပါသည္။</p>
165
+    
166
+    <p>အင္တာနက္ေပၚတြင္ ထပ္ဆင့္လႊင့္သူမ်ား ေနရာအႏွံ႕ထားရွိျခင္းသည္ Tor
167
+    အသံုးျပဳသူမ်ားကို ပိုမိုလံုျခံဳေစပါသည္။ အေဝးရွိ site မ်ားမွ သင့္ကြန္ပ်ဴတာမွ
168
+    ဆက္သြယ္မႈ စတင္သည္ သို႕မဟုတ္ အျခားသူတို႕မွ ထပ္ဆင့္လႊင့္သည္တုိ႕ကုိ
169
+    မသိရွိႏိုင္သျဖင့္ <a
170
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">သင္ကုိယ္တုိင္
171
+    ပိုမိုေကာင္းမြန္ေသာ အမည္ဝွက္မႈကို ရရွိႏိုင္ပါသည္။</a></p>
172
+    
173
+    <p><a href="<page docs/tor-doc-relay>">ထပ္ဆင့္လႊင့္သူအျဖစ္
174
+    ျပင္ဆင္သတ္မွတ္ျခင္း</a> လမ္းညႊန္တြင္ ပိုမို ဖတ္ရႈပါ။</p>
175
+    
176
+    <hr />
177
+    <a id="uninstall"></a>
178
+    <h2><a class="anchor" href="#uninstall">Tor ႏွင့္ Privoxy ကုိ ဘယ္လို
179
+    ဖယ္ထုတ္မလဲ</a></h2>
180
+    <br />
181
+    
182
+    <p>ေဆာ့ဝဲ အစုအေဝး သင့္ကြန္ပ်ဴတာမွ ဖယ္ရွားရန္ နည္းလမ္းႏွစ္ခု ရွိပါသည္။ Finder
183
+    ကုိ အသံုးျပဳ၍ သို႕မဟုတ္ command သုိ႕မဟုတ္ Terminal-based ဖယ္ရွားမႈကုိ
184
+    အသံုးျပဳ၍ ဖယ္ရွားႏုိင္ပါသည္။ OSX မွ Tor ကုိ ဖယ္ရွားလိုလွ်င္ ေအာက္ပါအတုိင္း
185
+    ျပဳလုပ္ပါ :</p>
186
+    
187
+    <p>သင့္ အသံုးခ် ေဆာ့ဝဲ၏ ပေရာ့စီ သတ္မွတ္ခ်က္မ်ားကုိ မူလ တန္ဖုိးမ်ားသို႕
188
+    ေျပာင္းလဲပါ။ Tor ကုိ အသံုးျပဳျခင္းမွ ရပ္တန္႕လိုျခင္းသာ ျဖစ္လွ်င္ ဤေနရာတြင္
189
+    ရပ္တန္႕ႏုိင္ပါျပီ။</p>
190
+    
191
+    <p>Tor ကုိ လံုးဝအျပည့္အစံု ဖယ္ရွားလိုျပီး သင့္တြင္ ထိန္းခ်ဳပ္သူအဆင့္ account
192
+    ရွိလွ်င္ ေအာက္ပါအတုိင္း ေဆာင္ရြက္ပါ :</p>
193
+    
194
+    <ol>
195
+    <li>Finder ကုိ ဖြင့္၍ Applications ကုိ ကလစ္ႏိွပ္ပါ။</li>
196
+    <li>/Applications/Vidalia ကုိ Trash သို႕ ဆဲြထည့္လုိက္ပါ။</li>
197
+    <li>/Library/Torbutton ကုိ သင့္စနစ္မွ ဖယ္ရွားပါ။</li>
198
+    <li>သင့္ home directory တြင္ Library သုိ႕သြား၍ Vidalia directory ကုိ ဖယ္ရွားပါ။</li>
199
+    </ol>
200
+    
201
+    <p>Tor, Vidalia ႏွင့္ Polipo တို႕ သင့္စနစ္မွ လံုးဝဖယ္ရွားျပီး ျဖစ္ပါသည္။</p>
202
+    
203
+    <p>command line သို႕မဟုတ္ Terminal ႏွင့္ သင္ အကၽြမ္းတဝင္ရွိပါက ေအာက္ပါအတုိင္း
204
+    ကုိယ္တုိင္ ဖယ္ရွားႏိုင္ပါသည္။</p>
205
+    <ul>
206
+    <li>/Applications/Vidalia.app/</li>
207
+    <li>/Library/Torbutton/</li>
208
+    <li>~/Library/Vidalia</li>
209
+    <li>~/.tor</li>
210
+    </ul>
211
+    
212
+    <hr />
213
+    
214
+    <p>သင့္တြင္ ဤစာရြက္စာတမ္း ပိုမုိေကာင္းမြန္ေစႏုိင္ေသာ အၾကံဳျပဳခ်က္မ်ား ရွိပါက <a
215
+    href="<page about/contact>"> ကၽြႏု္ပ္တို႕ကုိ ေပးပို႕ပါ။</a> ေက်းဇူးတင္ပါသည္ !</p>
216
+  </div>
217
+  <!-- END MAINCOL -->
218
+  <div id = "sidecol">
219
+#include "side.wmi"
220
+#include "info.wmi"
221
+  </div>
222
+  <!-- END SIDECOL -->
223
+</div>
224
+<!-- END CONTENT -->
225
+#include <foot.wmi>   
... ...
@@ -0,0 +1,200 @@
1
+## translation metadata
2
+# Revision: $Revision: 21995 $
3
+# Translation-Priority: 1-high
4
+
5
+#include "head.wmi" TITLE="Tor Project: MS Windows Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-windows>">Windows Client</a>
11
+  </div> 
12
+  <div id="maincol">  
13
+    <h1>Microsoft Windows တြင္ <a href="<page index>">Tor</a> သံုးစဲြသူအျဖစ္
14
+    လုပ္ေဆာင္ျခင္း</h1>
15
+    <br />
16
+    
17
+    <p>
18
+    <b>ဤညႊန္ၾကားခ်က္တို႕မွာ Windows (2000, XP, Vista, 7, and Server Editions)
19
+    တို႕အေပၚတြင္ Tor သံုးစဲြသူအျဖစ္ ထည့္သြင္းရန္ လုပ္ေဆာင္ျခင္းအတြက္
20
+    ညႊန္ၾကားခ်က္မ်ား ျဖစ္သည္။ သင္သည္ အျခားအေပၚတြင္ သတင္းအခ်က္အလက္
21
+    သြားလာမႈမ်ားကို ထပ္ဆင့္လႊင့္ျခင္းျဖင့္ ကြန္ယက္ကုိ ၾကီးထြားေအာင္(ေက်းဇူးျပဳ၍
22
+    လုပ္ေဆာင္ပါ) ျပဳလုပ္မည္ဆိုပါက၊ ေက်းဇူးျပဳ၍<a href="<page
23
+    docs/tor-doc-relay>">ထပ္ဆင့္လႊင့္မႈ ျပင္ဆင္သတ္မွတ္ျခင္း</a> လမ္းညႊန္ကို
24
+    ဖတ္႐ႈပါ။</b>
25
+    </p>
26
+    
27
+    <p>Freedom House has produced a video on how to install Tor.  You can view it
28
+    at <a
29
+    href="http://media.torproject.org/video/2009-install-and-use-tor.ogv">How to
30
+    install Tor on Windows</a>.  Know of a better video, or one translated into
31
+    your language? Let us know!</p>
32
+    
33
+    <div class="center">
34
+    <p><video id="v1" src="http://media.torproject.org/video/2009-install-and-use-tor.ogv" autobuffer="true" controls="controls"></video></p>
35
+    </div>
36
+    
37
+    <hr /> <a id="installing"></a>
38
+    <h2><a class="anchor" href="#installing">အဆင့္ တစ္: Download လုပ္၍ Tor ကုိ
39
+    ထည့္သြင္းပါ</a></h2>
40
+    <br />
41
+    
42
+    <p>
43
+    Microsoft Windows စုစည္းမႈတြင္ <a href="<page index>">Tor</a>, <a
44
+    href="<page projects/vidalia>">Vidalia </a>(Tor အတြက္ GUI တစ္ခု)၊ <a
45
+    href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> (Mozilla
46
+    Firefox အတြက္ plugin တစ္ခု) ႏွင့္ <a
47
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (Web proxy
48
+    တစ္ခု) တို႕ကုိ အတူတကြ အလုပ္လုပ္ႏိုင္ရန္ ၾကိဳတင္ျပင္ဆင္ထားေသာ
49
+    စုစည္းမႈတစ္ခုထဲတြင္ ထည့္သြင္းထားပါသည္။ Windows ၏ <a
50
+    href="../<package-win32-bundle-stable>">တည္ျငိမ္ေသာ</a> သို႕မဟုတ္ <a
51
+    href="../<package-win32-bundle-alpha>">စမ္းသပ္ဆဲျဖစ္ေသာ</a>မူကုိ Download
52
+    လုပ္ပါ။ သို႕မဟုတ္ <a href="<page download/download>">download
53
+    စာမ်က္ႏွာ</a>တြင္ပိုမိုေရြးခ်ယ္ရန္ ၾကည့္ရႈပါ။
54
+    </p>
55
+    
56
+    <img alt="tor installer splash page"
57
+    src="../img/screenshot-win32-installer-splash.png" />
58
+    
59
+    <p>သင့္ထံတြင္ ယခင္ ထည့္သြင္းျပီး ျဖစ္ေသာ Tor၊ Vidalia သို႕မဟုတ္ Polipo တို႕
60
+    ရွိပါက ေအာက္တြင္ျပထားေသာ ေနရာတြင္ သင္ ထည့္သြင္းရန္မလိုေသာ
61
+    အစိတ္အပိုင္းမ်ားကို မေရြးခ်ယ္ဘဲ ေနႏိုင္ပါသည္။
62
+    </p>
63
+    
64
+    <img alt="select components to install"
65
+    src="../img/screenshot-win32-installer-components.png" />
66
+    
67
+    <p>ထည့္သြင္းမႈ ျပီးစီးပါက သင္ေရြးခ်ယ္ထားေသာ အစိတ္အပိုင္းမ်ားသည္ အလိုအေလ်ာက္
68
+    စတင္ပါလိမ့္မည္။
69
+    </p>
70
+    
71
+    <p>Tor သည္ ပံုမွန္အားျဖင့္ သံုးစဲြသူ အျဖစ္ ျပင္ဆင္သတ္မွတ္ထားပါသည္။ ၎သည္
72
+    ျပင္ဆင္သတ္မွတ္မႈ ဖုိင္ ပါဝင္ျပီး ျဖစ္၍ အမ်ားစုေသာသူတို႕အတြက္ ခ်ိန္ညွိမႈမ်ား
73
+    ျပဳလုပ္ရန္ မလိုအပ္ပါ။ Tor ကို ယခု ထည့္သြင္းျပီးပါျပီ။
74
+    </p>
75
+    
76
+    <hr /> <a id="using"></a>
77
+    <h2><a class="anchor" href="#using">အဆင့္ ႏွစ္: သင့္အသံုခ်ေဆာ့ဝဲမ်ားကုိ Tor
78
+    အသံုးျပဳရန္ ျပင္ဆင္ပါ</a></h2>
79
+    <br />
80
+    
81
+    <p>Tor ႏွင့္ Polipo တို႕ကုိ ထည့္သြင္းျပီးပါက သင့္အသံုးခ်ေဆာ့ဝဲမ်ားကုိ
82
+    အသံုးျပဳႏုိင္ရန္ ျပင္ဆင္ရပါမည္။ ပထမအဆင့္မွာ Web ၾကည့္ရႈျခင္းအတြက္
83
+    ျပင္ဆင္ျခင္း ျဖစ္ပါသည္။</p>
84
+    
85
+    <p>သင့္အတြက္ အေကာင္းဆံုး လံုျခံဳမႈရႏုိင္ရန္ Tor ပါဝင္ေသာ Firefox ႏွင့္
86
+    Torbutton တို႕ကုိ အသံုးျပဳသင့္ပါသည္။ စုစည္းမႈက ထည့္သြင္းေပးသည္မွာ သင့္အတြက္
87
+    <a href="https://addons.mozilla.org/firefox/2275/">Torbutton
88
+    plugin</a>ျဖစ္ပါသည္။ သင့္ Firefox ကုိ ျပန္လည္စတင္ပါ။ ျပီးလွ်င္
89
+    ေအာက္ပါတို႕ကုိ သတ္မွတ္ပါ :
90
+    </p>
91
+    
92
+    <img alt="Torbutton plugin for Firefox"
93
+    src="../img/screenshot-torbutton.png" border="1"/> <br />
94
+    
95
+    <p>
96
+    အျခား ကြန္ပ်ဴတာတြင္ Firefox ကုိ အသံုးျပဳမည္ဟု အစီအစဥ္ရွိပါက <a
97
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">မတူညီေသာ
98
+    ကြန္ပ်ဴတာတြင္ Tor လုပ္ေဆာင္ျခင္းအတြက္ ေမးေလ့ရွိေသာ ေမးခြန္းမ်ား</a> ကုိ
99
+    ၾကည့္ရႈပါ။
100
+    </p>
101
+    
102
+    <p>HTTP proxies ကုိ ေထာက္ပံ့ေသာ အျခား အသံုးခ်ေဆာ့ဝဲမ်ားကုိ Tor
103
+    လုပ္ေဆာင္ႏိုင္ရန္ Polipo ကုိသာ ညႊန္ျပေပးပါ(၎မွာ localhost port 8118
104
+    ျဖစ္ပါသည္။) SOCKS ကုိ တုိက္ရုိက္ အသံုးျပဳရန္(သတင္းခ်က္ခ်င္းပို႕ျခင္းမ်ား၊
105
+    Jabber, IRC စသည္ျဖင့္) Tor(localhost port 9050) သို႕
106
+    တုိက္ရုိက္ညႊန္ျပႏုိင္ပါသည္။ သို႕ေသာ္ <a
107
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">ဤ
108
+    ေမးေလ့ရွိေသာ ေမးခြန္းမ်ား</a> ကုိ ဘာေၾကာင့္ အႏၱရာယ္ရွိႏုိင္ေၾကာင္း
109
+    သိရွိႏိုင္ရန္ ၾကည့္ရႈပါ။ SOCKS ႏွင့္ HTTP ပါ ေထာက္ပံ့မႈမရွိေသာ
110
+    အသံုးခ်ေဆာ့ဝဲမ်ားအတြက္ SocksCap သို႕မဟုတ္ <a
111
+    href="http://www.freecap.ru/eng/">FreeCap</a> တြင္ ၾကည့္ပါ။ (FreeCap သည္
112
+    အခမဲ့ေဆာ့ဝဲျဖစ္၍ ကုမၸဏီပုိင္တစ္ခုျဖစ္ပါသည္။)</p>
113
+    
114
+    <p>အျခားအသံုးခ်ေဆာ့ဝဲမ်ားကုိ Tor လုပ္ေဆာင္ႏုိင္ရန္ မည္သို႕လုပ္ေဆာင္ရမည္ကုိ <a
115
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">မည္သို႕
116
+    Tor လုပ္ေဆာင္ႏုိင္ေစမည္လဲ</a> တြင္ၾကည့္ရႈပါ။
117
+    </p>
118
+    
119
+    <hr /> <a id="verify"></a>
120
+    <h2><a class="anchor" href="#verify">အဆင့္ သံုး : အလုပ္လုပ္ေၾကာင္း
121
+    ေသခ်ာပါေစ။</a></h2>
122
+    <br />
123
+    
124
+    <p>
125
+    Vidalia လုပ္ေဆာင္ေနမႈ ရွိ မရိွ စစ္ေဆးပါ။ Vidalia သည္ ေသးငယ္ေသာ အစိမ္းေရာင္
126
+    ၾကက္သြန္နီေလးကို Tor လုပ္ေဆာင္ေနေၾကာင္းျပသရန္ အသံုးျပဳပါသည္။ သို႕မဟုတ္
127
+    အနီေရာင္ "X"အမွတ္အသားႏွင့္ ညိဳမည္းေနေသာ ၾကက္သြန္နီေလးကုိ Tor အလုပ္မလုပ္ေသာ
128
+    အခါ ျပသပါသည္။ System Tray ရွိ Vidalia ရုပ္ပံုေပၚတြင္ ညာဘက္ကလစ္ႏွိပ္၍ Tor ကုိ
129
+    စတင္ျခင္း သို႕မဟုတ္ ရပ္တန္႕ျခင္း ျပဳလုပ္ႏုိင္ပါသည္။ သို႕မဟုတ္ ေအာက္တြင္
130
+    ျပသထားသကဲ့သို႕ "စတင္ရန္" သို႕မဟုတ္ "ရပ္တန္႕ရန္" တုိ႕ကုိ Menu မွ
131
+    ေရြးခ်ယ္ႏုိင္ပါသည္ :
132
+    </p>
133
+    
134
+    <img alt="Vidalia Tray Icon" src="../img/screenshot-win32-vidalia.png"/>
135
+    
136
+    <p>
137
+    ေနာက္တစ္ဆင့္တြင္ သင့္ browser တြင္ Tor ႏွင့္ သံုးစဲြၾကည့္ရႈ၍ သင့္ IP
138
+    လိပ္စာသည္ အမည္ဝွက္မႈ လုပ္ေဆာင္ထားေၾကာင္း ေသခ်ာပါေစ။ <a
139
+    href="https://check.torproject.org/">Tor စစ္ေဆးၾကည့္ရႈသူ</a> ကုိ ကလစ္ႏွိပ္၍
140
+    သင္ Tor အသံုးျပဳေနျခင္း ဟုတ္ မဟုတ္ စစ္ေဆးပါ။ (ဤ site အလုပ္မလုပ္ပါက၊ <a
141
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">ဤ
142
+    ေမးေလ့ရွိေသာ ေမးခြန္းမ်ား</a> တြင္ သင့္ Tor ကုိ မည္သို႕စမ္းသပ္ရမည္ဆိုသည့္
143
+    အၾကံျပဳခ်က္မ်ားကုိ ၾကည့္ရႈပါ။)
144
+    </p>
145
+    
146
+    <p>သင့္တြင္ သင့္ကြန္ပ်ဴတာကို ကုိယ္တုိင္ဆက္သြယ္ရန္ ကန္႕သတ္ထားေသာ တစ္ကုိယ္ေရသံုး
147
+    Firewall ရွိပါက သင့္ စက္တြင္းမွ အသံုးခ်ေဆာ့ဝဲမ်ားကုိ စက္တြင္းမွ port 8118
148
+    ႏွင့္ port 9050 တို႕သို႕ ဆက္သြယ္ႏုိင္ေၾကာင္း ေသခ်ာပါေစ။ သင့္ Firewall မွ
149
+    အျပင္သို႕ ဆက္သြယ္မႈမ်ားကုိ ပိတ္ဆို႕ထားပါက အေပါက္တစ္ခုျပဳလုပ္၍ TCP ports
150
+    မ်ားျဖစ္ေသာ 80 ႏွင့္ 443 တုိ႕ကုိ ဆက္သြယ္ႏုိင္ေစရန္ ျပဳလုပ္ပါ။ ျပီးလွ်င္ <a
151
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">ဤ
152
+    ေမးေလ့ရွိေသာ ေမးခြန္းမ်ား</a> ကို ၾကည့္ရႈပါ။
153
+    </p>
154
+    
155
+    <p>ဤသည္တို႕ႏွင့္ အလုပ္မလုပ္ေသးလွ်င္ <a
156
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">ဤ
157
+    ေမးေလ့ရွိေသာ ေမးခြန္းမ်ား</a> ကုိ အရိပ္အျမြက္သိရွိႏုိင္ရန္ ၾကည့္ရႈပါ။</p>
158
+    
159
+    <p>
160
+    အလုပ္လုပ္သည္ႏွင့္ <a href="<page download/download>#Warning">Tor မွ မည္သည္တို႕ကုိ
161
+    လုပ္ေဆာင္ႏုိင္၍ မည္သည္တို႕ကုိ မလုပ္ေဆာင္ႏိုင္ပါ</a> တို႕ကို ဆက္လက္ ေလ့လာပါ။
162
+    </p>
163
+    
164
+    <hr /> <a id="server"></a> <a id="relay"></a>
165
+    <h2><a class="anchor" href="#relay">အဆင့္ ေလး : ထပ္ဆင့္လႊင့္သူအျဖစ္
166
+    ျပင္ဆင္သတ္မွတ္ပါ။</a></h2>
167
+    <br />
168
+    
169
+    <p>Tor ကြန္ယက္သည္ ေစတနာ့ဝန္ထမ္းမ်ား၏ လိုင္းအက်ယ္လွဴဒါန္းမႈကို မီွခိုရပါသည္။
170
+    ထပ္ဆင့္လႊင့္သူ ပိုမုိမ်ားျပားေလ Tor ကြန္ယက္ပိုမိုျမန္ဆန္ေလ ျဖစ္ပါသည္။
171
+    သင့္တြင္ လမ္းတိုင္းအတြက္ အနည္းဆံုး 20 kilobytes/s ရွိလွ်င္ သင့္ Tor ကုိ
172
+    ထပ္ဆင့္လႊင့္သူအျဖစ္ ျပင္ဆင္သတ္မွတ္၍ ကူညီေပးပါ။ ကၽြႏု္ပ္တို႕တြင္ Tor
173
+    ထပ္ဆင့္လႊင့္သူမ်ားကို လြယ္ကူေစရန္ႏွင့္ သက္သာအဆင္ေျပေစရန္
174
+    လိုင္းအက်ယ္ႏႈန္းကန္႕သတ္ျခင္း၊ အလဲြသံုးမႈ ေစာဒကမ်ားမွ လြတ္ကင္းရန္
175
+    အထြက္မူဝါဒမ်ား၊ ေျပာင္းလဲေနေသာ IP လိပ္စာမ်ားစသည္ျဖင့္ စီစဥ္ထားရွိပါသည္။</p>
176
+    
177
+    <p>အင္တာနက္ေပၚတြင္ ထပ္ဆင့္လႊင့္သူမ်ား ေနရာအႏွံ႕ထားရွိျခင္းသည္ Tor
178
+    အသံုးျပဳသူမ်ားကို ပိုမိုလံုျခံဳေစပါသည္။ အေဝးရွိ site မ်ားမွ သင့္ကြန္ပ်ဴတာမွ
179
+    ဆက္သြယ္မႈ စတင္သည္ သို႕မဟုတ္ အျခားသူတို႕မွ ထပ္ဆင့္လႊင့္သည္တုိ႕ကုိ
180
+    မသိရွိႏိုင္သျဖင့္ <a
181
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">သင္ကုိယ္တုိင္
182
+    ပိုမိုေကာင္းမြန္ေသာ အမည္ဝွက္မႈကို ရရွိႏိုင္ပါသည္။</a></p>
183
+    
184
+    <p><a href="<page docs/tor-doc-relay>">ထပ္ဆင့္လႊင့္သူအျဖစ္
185
+    ျပင္ဆင္သတ္မွတ္ျခင္း</a> လမ္းညႊန္တြင္ ပိုမို ဖတ္ရႈပါ။</p>
186
+    
187
+    <hr />
188
+    
189
+    <p>သင့္တြင္ ဤစာရြက္စာတမ္း ပိုမုိေကာင္းမြန္ေစႏုိင္ေသာ အၾကံဳျပဳခ်က္မ်ား ရွိပါက <a
190
+    href="<page about/contact>"> ကၽြႏု္ပ္တို႕ကုိ ေပးပို႕ပါ။</a> ေက်းဇူးတင္ပါသည္ !</p>
191
+  </div>
192
+  <!-- END MAINCOL -->
193
+  <div id = "sidecol">
194
+#include "side.wmi"
195
+#include "info.wmi"
196
+  </div>
197
+  <!-- END SIDECOL -->
198
+</div>
199
+<!-- END CONTENT -->
200
+#include <foot.wmi>   
... ...
@@ -0,0 +1,168 @@
1
+## translation metadata
2
+# Revision: $Revision: 22268 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian>">Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="debian"></a>
14
+    <h2><a class="anchor" href="#debian">Möglichkeit eins: Tor unter Debian Lenny,
15
+    Debian Sid oder Debian Testing</a></h2>
16
+    <br />
17
+    
18
+    <p> Wenn du Debian stable (Lenny), unstable (Sid) oder Testing (squeeze) 
19
+    benutzt, musst du nur folgendes ausführen:<br /> 
20
+    <tt>apt-get install tor tor-geoipdb</tt> </p>
21
+    
22
+    <p> Beachte bitte, dass dir das nicht immer die letzte stabile Torversion 
23
+    liefert, aber du erhälst alle sicherheitsrelevanten Fehlerbehebungen. Um 
24
+    sicherzustellen, dass du immer die neueste Version einsetzt, schau dir die 
25
+    Option Zwei weiter unten an. </p>
26
+    
27
+    <p> Jetzt ist Tor installiert und läuft. Mache weiter bei <a href="<page 
28
+    docs/tor-doc-unix>#polipo">Schritt Zwei</a> der "Tor unter Linux/Unix" 
29
+    Anleitung. </p>
30
+    
31
+    <hr />
32
+    
33
+    <a id="ubuntu"></a>
34
+    <a id="packages"></a>
35
+    <h2><a class="anchor" href="#ubuntu">Option Zwei: Tor unter Ubuntu oder
36
+    Debian</a></h2>
37
+    <br />
38
+    
39
+    <p> <b>Nimm nicht die Pakete im Ubuntu universe!</b> Diese werden nicht 
40
+    gepflegt und sind veraltet. Das bedeutet, dass dir wichtige Sicherheits- und 
41
+    Stabilitätspatche fehlen! </p>
42
+    
43
+    <p> Du musst als erstes unser Paket-Repository einrichten, bevor du Tor 
44
+    installieren kannst. Als erstes musst du dafür den Namen deiner Distribution 
45
+    kennen. Wenn du Ubuntu 9.04 einsetzt, ist er "jaunty". Ubuntu 8.10 heißt 
46
+    "intrepid" und Ubuntu 8.04 ist "hardy". Wenn du Debian Etch hast, ist es 
47
+    "etch", Debian Lenny ist "lenny". Danach füge die folgende Zeile in deine <tt>
48
+    /etc/apt/sources.list</tt> Datei ein:<br />
49
+    
50
+    <pre>
51
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
52
+    </pre>
53
+    Verwende den Namen deiner Distribution (etch, lenny, sid, jaunty, intrepid,
54
+    hardy) statt &lt;DISTRIBUTION&gt;.
55
+    </p>
56
+    
57
+    <p>
58
+    Danach führe folgendes Kommando aus:
59
+    <pre>
60
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
61
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
62
+    apt-get update
63
+    apt-get install tor tor-geoipdb
64
+    </pre>
65
+    </p>
66
+    
67
+    <p> Jetzt ist Tor installiert und läuft. Mache weiter bei <a href="<page 
68
+    docs/tor-doc-unix>#polipo">Schritt Zwei</a> der "Tor unter Linux/Unix" 
69
+    Anleitung. </p>
70
+    
71
+    <p style="font-size: small"> Der DNS-Eintrag von <code>
72
+    deb.torproject.org</code> ist in Wirklichkeit eine Menge von unabhängigen 
73
+    Servern mit DNS Round Robin Konfiguration. Sollte ein Zugriff nicht möglich 
74
+    sein, kannst du auch versuchen einen der Server direkt zu erreichen. Die 
75
+    Adressen lauten:
76
+    <code>deb-master.torproject.org</code>,
77
+    <code>mirror.netcologne.de</code> oder
78
+    <code>tor.mirror.youam.de</code>.
79
+    </p>
80
+    
81
+    <hr />
82
+    
83
+    <a id="development"></a> <h2><a class="anchor" href="#development">Option 
84
+    Drei: Benutze die aktuellste Entwicklerversion unter Debian oder Ubuntu</a>
85
+    </h2> <br />
86
+    
87
+    <p>Wenn du den <a href="<page download/download>#packagediff">Entwicklerzweig</a> von 
88
+    Tor benutzen willst (mehr Features, aber vielleicht auch mehr Bugs), musst du 
89
+    folgende Zeilen in deine <tt>/etc/apt/sources.list</tt> Datei einfügen:<br />
90
+    <pre>
91
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
92
+    deb     http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
93
+    </pre>
94
+    Verwende den Namen deiner Distribution (etch, lenny, sid, jaunty, intrepid,
95
+    hardy) statt &lt;DISTRIBUTION&gt;.
96
+    </p>
97
+    
98
+    <p>
99
+    Danach führe folgende Kommandos aus:
100
+    <pre>
101
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
102
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
103
+    apt-get update
104
+    apt-get install tor tor-geoipdb
105
+    </pre>
106
+    </p>
107
+    
108
+    
109
+    <p> Jetzt ist Tor installiert und läuft. Mache weiter bei <a href="<page 
110
+    docs/tor-doc-unix>#polipo">Schritt Zwei</a> der "Tor unter Linux/Unix" 
111
+    Anleitung. </p>
112
+    
113
+    
114
+    <hr />
115
+    
116
+    <a id="source"></a>
117
+    <h2><a class="anchor" href="#source">Direkt aus den Quellen kompilieren:</a></h2>
118
+    <br />
119
+    
120
+    <p> Wenn du deine eigenen Pakete direkt aus den Quellen erstellen möchtest, 
121
+    musst du als erstes einen entsprechende <tt>deb-src</tt> Zeile in deine <tt>
122
+    sources.list</tt> einfügen.
123
+    <pre>
124
+    # Für die "stable"-Version
125
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
126
+    
127
+    # Für die "unstable"-Version
128
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
129
+    deb-src http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
130
+    </pre>
131
+    Ausserdem musst du noch folgende essentzielle Pakete installieren, damit du 
132
+    die Tor-Quellen kompilieren kannst:
133
+    <pre>
134
+    apt-get install build-essential fakeroot devscripts
135
+    apt-get build-dep tor
136
+    </pre>
137
+    Danach kannst du Tor in ~/debian-packages erzeugen:
138
+    <pre>
139
+    mkdir ~/debian-packages; cd ~/debian-packages
140
+    apt-get source tor
141
+    cd tor-*
142
+    debuild -rfakeroot -uc -us
143
+    cd ..
144
+    </pre>
145
+    Jetzt kannst du das neue Paket installieren:
146
+    <pre>
147
+    sudo dpkg -i tor_*.deb
148
+    </pre>
149
+    </p>
150
+    
151
+    <p> Jetzt ist Tor installiert und läuft. Mache weiter bei <a href="<page 
152
+    docs/tor-doc-unix>#polipo">Schritt Zwei</a> der "Tor unter Linux/Unix" 
153
+    Anleitung. </p>
154
+    
155
+    <hr />
156
+    
157
+    <p>Wenn du Vorschläge hast, wie wir diese Datei verbessern können, <a
158
+    href="<page about/contact>">schick sie uns bitte</a>. Danke!</p>
159
+  </div>
160
+  <!-- END MAINCOL -->
161
+  <div id = "sidecol">
162
+#include "side.wmi"
163
+#include "info.wmi"
164
+  </div>
165
+  <!-- END SIDECOL -->
166
+</div>
167
+<!-- END CONTENT -->
168
+#include <foot.wmi>   
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,189 @@
1
+## translation metadata
2
+# Revision: $Revision: 22305 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Mac OS X Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-osx>">Mac OS X Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Tor auf Mac OS X als Client betreiben</h1>
14
+    
15
+    <p>
16
+    <b>Diese Anweisungen betreffen den Betrieb von Tor als Client auf Mac
17
+      OS X. Wenn du für andere Netzwerkverkehr weiterleiten willst, um das
18
+      Tor-Netzwerk wachsen zu lassen, lies bitte die Anleitung zur <a
19
+      href="<page docs/tor-doc-relay>">Konfiguration eines Servers</a>.</b>
20
+    </p>
21
+    
22
+    <hr />
23
+    <a id="installing"></a>
24
+    <h2><a class="anchor" href="#installing">Schritt Eins: Lade Tor
25
+      herunter und installiere das Programm</a></h2>
26
+    
27
+    <p>Die Installationsdatei für  Mac OS X fasst <a href="<page
28
+      index>">Tor</a>, <a
29
+      href="<page projects/vidalia>">Vidalia</a> (eine grafische
30
+      Oberfläche für Tor), <a href="<page projects/torbutton>">Torbutton</a> und <a
31
+      href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (ein Proxy)
32
+      in ein Paket zusammen. Alle Anwendungen sind vorkonfiguriert und
33
+      sollten direkt nach der Installation laufen. Lade entweder die <a
34
+      href="../<package-osx-bundle-stable>">stabile</a> oder die <a
35
+      href="../<package-osx-bundle-alpha>">experimentelle</a> Version
36
+      herunter. Andere Optionen findest du auf der <a href="<page
37
+      download/download>">Downloadseite</a> beschrieben.
38
+    </p>
39
+    
40
+    <p>Nachdem du die dmg-Datei runtergeladen hast, klicke doppelt darauf, damit 
41
+    sie eingebunden wird. Danach sollte sich der Finder mit dem Vidalia-Bundle 
42
+    öffnen. Die Installation ist ganz einfach, ziehe einfach die Datei in deinem 
43
+    Anwendungsordner. Optional kannst du noch das "install torbutton" Skript 
44
+    ausführen. Es installiert dir Torbutton in den Firefox, ansonsten bekommst du 
45
+    Torbutton auch über das Mozilla Erweiterungsportal wenn du nach "torbutton" 
46
+    suchst.</p>
47
+    
48
+    <p>Wenn du mit dem Installieren beendet ist, kannst du Vidalia
49
+      starten, indem du das Icon vom Ordner Applications auswählst. Eine
50
+      dunkle Zwiebel mit einem roten X heißt, dass Tor derzeit
51
+      abgeschalten ist. Wenn du Start (aus dem Menu Tor ganz oben)
52
+      anklickst, wird Tor gestartet.
53
+    </p>
54
+    
55
+    <p>Sobald Tor aktiv ist, ändert sich das Icon folgendermaßen:
56
+    </p>
57
+    
58
+    <p><img alt="vidalia running tor"
59
+      src="../img/screenshot-osx-vidalia.png" border="1" /></p>
60
+    
61
+    <p>Polipo ist als Teil des Tor-Paketes mit installiert worden. Das
62
+      Programm startet automatisch, wenn du den Computer anschaltest. Du
63
+      musst Polipo nicht konfigurieren. Das wurde bereits während der
64
+      Installation erledigt.
65
+    </p>
66
+    
67
+    <hr />
68
+    <a id="using"></a>
69
+    <h2><a class="anchor" href="#using">Schritt Zwei: Konfiguration der Anwendungen</a></h2>
70
+    
71
+    <p>Nachdem Tor und Privoxy installiert sind, musst du deine
72
+    Anwendungen so anpassen, dass diese Tor nutzen. Wir fangen mit dem
73
+    Browser an.</p>
74
+    
75
+    <p>Du solltest für die beste Sicherheit Tor mit Firefox und Torbutton benutzen.
76
+    Torbutton ist für dich installiert worden. Klicke auf den roten Knopf <q>Tor
77
+    Disabled</q>, um Tor zu aktivieren und du bist fertig: </p>
78
+    
79
+    <p><img alt="Torbutton plugin for Firefox"
80
+    src="../img/screenshot-torbutton.png" border="1" /></p>
81
+    
82
+    <p>
83
+    Wenn Firefox auf einem anderen Rechner als Tor laufen
84
+    soll, schaue dir den <a
85
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">Eintrag
86
+    in der FAQ dazu</a> an.</p>
87
+    
88
+    <p>Wir man andere Anwendungen torifiziert, ist in einem
89
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
90
+    HOWTO</a> beschrieben.
91
+    </p>
92
+    
93
+    <hr />
94
+    <a id="verify"></a>
95
+    <h2><a class="anchor" href="#verify">Schritt Drei: Stelle sicher, dass
96
+    alles funktioniert</a></h2>
97
+    
98
+    <p>Du solltest deinen Browser mit Tor benutzen und sicherstellen, dass
99
+    deine IP-Adresse anonymisiert wird. Klicke auf den
100
+    <a href="https://check.torproject.org/">Tor-Detektor</a> und sieh
101
+    nach, ob du Tor nutzt oder nicht.
102
+    (Wenn die Seite nicht erreichbar ist, du noch andere <a
103
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">Vorschläge,
104
+    wie du es testen kannst.</a>)
105
+    </p>
106
+    
107
+    <p>Solltest du eine Personal Firewall nutzen, die die Verbindungen des
108
+    Rechners einschränkt, stelle sicher, dass du dich mit dem lokalen Port
109
+    8118 und 9050 verbinden kannst. Wenn deine Firewall ausgehende
110
+    Verbindungen blockiert, stelle sicher, dass zumindest Verbindungen zu
111
+    den Ports 80 und 443 zugelassen werden und schaue dir den <a
112
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">Eintrag
113
+    in der FAQ</a> an.
114
+    </p>
115
+    
116
+    <p>Falls es immer noch nicht funktioniert, beschreibt ein <a
117
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">weiterer
118
+    FAQ-Eintrag, woran es liegen kann</a>.</p>
119
+    
120
+    <p>Wenn es denn geht, lerne mehr darüber,
121
+    <a href="<page download/download>#Warning">was Tor bietet und was nicht</a>.
122
+    </p>
123
+    
124
+    <hr />
125
+    <a id="server"></a>
126
+    <a id="relay"></a>
127
+    <h2><a class="anchor" href="#relay">Schritt Vier: Betreibe einen Server</a></h2>
128
+    
129
+    <p>Das Tor-Netzwerk vertraut auf Freiwillige, die Verkehr
130
+    weiterleiten. Je mehr Leute dies tun, desto schneller wird das Netz
131
+    werden. Falls du mindestens 20 kilobytes/s in jede Richtung hast, hilf
132
+    bitte mit einem Server aus. Es gibt viele Einstellungen, die es
133
+    vereinfachen, einen Tor-Server zu betreiben. Das schliesst die
134
+    Limitierung der Bandbreite, ExitPolicys und Unterstützung für
135
+    dynamische IP-Adressen mit ein.</p>
136
+    
137
+    <p>Tor-Servern in unterschiedlichsten Orten im Netz macht Tor
138
+    sicher. Außerdem bietet das auch dir <a
139
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">stärkere
140
+    Anonymität</a>, denn eine entfernte Seite kann nicht erkennen, ob die
141
+    Verbindung von dir oder dem Tor-Server kam.</p>
142
+    
143
+    <p>Lies mehr bei der <a href="<page docs/tor-doc-relay>">Anleitung für
144
+    einen Tor-Server</a>.</p>
145
+    
146
+    <hr />
147
+    <a id="uninstall"></a>
148
+    <h2><a class="anchor" href="#uninstall">Wie du Tor and Privoxy deinstallierst</a></h2>
149
+    
150
+    <p>Es gibt zwei Wege das Tor-Bundle zu deinstallieren. Entweder per Finder 
151
+    oder mittels einem Terminal-basiertem Deinstallationsprogramm. Wenn du Tor 
152
+    unter OSX deinstallieren willst, hier steht wie es geht:</p>
153
+    
154
+    <p>Ändere die Einstellungen in allen Anwendungen so, dass Tor nicht
155
+       mehr benutzt wird. Dies reicht, um Tor nicht mehr aktiv zu nutzen.</p>
156
+    
157
+    <p>Wenn du Tor komplett entfernen willst und dein Zugang die nötigen
158
+    Adminrechte hat, verfahre folgendermaßen:</p>
159
+    <ol>
160
+    <li> Öffne den Finder und klick auf Anwendungen"</li>
161
+    <li> Ziehe /Anwendungen/Vidalia in den Mülleimer</li>
162
+    <li> Entferne /Bibliotheken/Torbutton von deinem System</li>
163
+    <li> Entferne das Vidalia Verzeichniss aus deinem Benutzerordner</li>
164
+    </ol>
165
+    
166
+    <p>Tor, Vidalia und Polipo sind jetzt komplett von deinem System entfernt.</p>
167
+    
168
+    <p>Wenn du dich mit der Kommandozeile auskennst, kannst du auch folgendes manuell entfernen:</p>
169
+    <ul>
170
+    <li>/Applications/Vidalia.app/</li>
171
+    <li>/Library/Vidalia/</li>
172
+    <li>/Library/Torbutton/</li>
173
+    <li>~/.tor</li>
174
+    </ul>
175
+    
176
+    <hr />
177
+    
178
+    <p>Hast du Verbesserungen für das Dokument? Dann sende diese bitte an <a
179
+    href="<page about/contact>">uns</a>. Danke!</p>
180
+  </div>
181
+  <!-- END MAINCOL -->
182
+  <div id = "sidecol">
183
+#include "side.wmi"
184
+#include "info.wmi"
185
+  </div>
186
+  <!-- END SIDECOL -->
187
+</div>
188
+<!-- END CONTENT -->
189
+#include <foot.wmi>   
... ...
@@ -0,0 +1,262 @@
1
+## translation metadata
2
+# Revision: $Revision: 22144 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Relay Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-relay>">Configure Tor Relay</a>
11
+  </div> 
12
+  <div id="maincol">  
13
+    <h1>Tor-Server konfigurieren</h1>
14
+    
15
+    <!-- BEGIN SIDEBAR -->
16
+    <div class="sidebar-left">
17
+    <h3>Schritte zur Einrichtung</h3>
18
+    <ol>
19
+    <li><a href="<page docs/tor-doc-relay>#install">Herunterladen &amp; Installieren</a></li>
20
+    <li><a href="<page docs/tor-doc-relay>#setup">Konfigurieren</a></li>
21
+    <li><a href="<page docs/tor-doc-relay>#check">Überprüfen &amp; Bestätigen</a></li>
22
+    <li><a href="<page docs/tor-doc-relay>#after">Letze Schritte</a></li>
23
+    </ol>
24
+    </div>
25
+    <!-- END SIDEBAR -->
26
+    
27
+    <hr />
28
+    
29
+    <p>Das Tor-Netzwerk beruht auf Freiwilligen, die Bandbreite zur Verfügung 
30
+    stellen. Je mehr Leute einen Tor-Server betreiben, desto schneller wird das 
31
+    Netzwerk. Wenn du wenigstens 20&nbsp;kB/s in eine Richtung hast, bitte hilf 
32
+    uns und konfiguriere Tor auch als Server. Wir haben vieles, was den Betrieb 
33
+    eines Servers einfach und bequem macht. Dazu gehören u.a. <a href="<page docs/faq> #RelayFlexible">
34
+    Bandbreitenlimitierung, flexible Exitpolicies und 
35
+    Unterstützung für dynamische IP-Adressen.</a></p>
36
+    
37
+    <p>Du kannst einen Server auf so <a 
38
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerOS"> 
39
+    ziemlich jedem Betriebssystem</a> installieren, am Besten funktioniert Tor 
40
+    aber unter Linux, FreeBSD 5.x+, OS X Tiger oder neuer und Windows Server 2003 
41
+    oder neuer.</p>
42
+    
43
+    <hr />
44
+    <a id="zero"></a>
45
+    <a id="install"></a>
46
+    <h2><a class="anchor" href="#install">Schritt Eins: Tor herunterladen und installieren</a></h2>
47
+    
48
+    <p>Vergewissere dich bevor du beginnst, dass Tor installiert ist und
49
+    läuft.</p>
50
+    
51
+    <p>Hol dir die aktuelle Installationsdatei für dein Betriebssystem von unserer 
52
+    <a href="<page download/easy-download>">Downloadseite</a>.</p>
53
+    
54
+    <p>Wenn du willst, kannst du Tor auch erst eine Weile als Client
55
+    verwenden, um sicher zu gehen, dass es auch richtig funktioniert.</p>
56
+    
57
+    <hr />
58
+    <a id="setup"></a>
59
+    <h2><a class="anchor" href="#setup">Schritt Zwei: Richte Tor als Server ein</a></h2>
60
+    
61
+    <ol>
62
+    
63
+    <li>Stelle sicher, dass die Uhrzeit korrekt eingestellt ist. Falls es möglich 
64
+    ist, synchronisiere sie mit einem <a href="http://en.wikipedia.org/wiki/Network_Time_Protocol">öffentlichen 
65
+    Zeitserver im Internet</a>.</li>
66
+    
67
+      <li><strong>Windows / OS X Configuration</strong>:
68
+      <ol>
69
+      
70
+     <ul><strong>Einfache Einrichtung</strong>:
71
+     <li>Rechtsklicke auf das Vidalia Icon in deiner Taskleiste, wähle <tt>Einstellungen</tt>.</li>
72
+      	 <li>Klicke auf Beteiligung</li>    
73
+    <li>Klicke auf <tt>Netzwerkverkehr für andere Tor-Nutzer weiterleiten</tt>, 
74
+    wenn du ein öffentliches Relay betreiben möchtest (empfohlen) oder auf "Hilf 
75
+    zensierten Nutzern" wenn du eine <a href="<page docs/faq>#RelayOrBridge">Bridge</a> 
76
+    betreiben willst um Nutzern aus Zensurländern zu helfen</li>
77
+    <li>Gib einen Namen für deinen Server an. (Optional, kannst du Kontaktdaten 
78
+    angeben, damit wir dich bei Probleme verständigen können)</li>
79
+      	 <li>Wähle <tt>Versuche automatisch die Port-Weiterleitung zu konfigurieren</tt> und klicke
80
+      	 auf den <tt>Test</tt> Button, um zu sehen, ob es geht. Wenn es geht, toll!
81
+      	 Wenn nicht, schau dir Schritt 3 weiter unten an.</li>  	 
82
+    <li>Wähle den <tt>Bandbreitenbegrenzung</tt> Karteireiter. Such dir aus, wie 
83
+    viel Bandbreite du für andere Nutzer bereitstellen willst.</li>
84
+    
85
+    <li>Klicke den <tt>Exit-Regeln</tt> Karteireiter und deaktiviere alle Dienste 
86
+    die <a href="<page docs/faq>#ExitPolicies">NICHT von deinem Relay erreicht werden 
87
+    sollen</a>. Wenn du kein Exit sein möchtest, wähle alle ab.</li>
88
+    
89
+    <li>Klicke den <tt>Ok</tt> Knopf. Schau dir Schritt Drei weiter unten an, 
90
+    damit du weißt wie du die Funktion testen kannst.</li> </ol> <br/> <strong> 
91
+    Unix / Linux Einrichtung</strong>: <ul> <li>Editiere den unteren Teil deiner 
92
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc"> 
93
+    torrc Datei</a>. Wenn du ein öffentliches Relay sein möchtest (empfohlen) 
94
+    musst du einen ORPort wählen und einen Blick auf <a href="<page docs/faq> #ExitPolicies">die ExitPolicies</a> werfen; wenn du <a href="<page docs/faq> #RelayOrBridge">eine Bridge </a>für Nutzer aus Zensurländern sein willst, 
95
+    <a href="<page docs/bridges>#RunningABridge">nimm diese Zeilen</a>. </li>
96
+    
97
+      </ul></li>
98
+    
99
+    <li>Wenn du eine Firewall verwendest, öffne einen Port, damit eingehende 
100
+    Verbindungen, die von dir konfigurierten Ports erreichen können (<var> 
101
+    ORPort</var> plus <var>DirPort</var>, falls gesetzt). Wenn du ein DSL-Modem 
102
+    oder eine andere Firewall hast, kann dir <a href="http://portforward.com/"> 
103
+    portforward.com</a> helfen. Stelle sicher, dass alle abgehenden Verbindungen 
104
+    von der Firewall zugelassen werden, damit die anderen Torserver erreicht 
105
+    werden können.</li>
106
+    
107
+    
108
+      
109
+    <li>Starte deinen Server neu: Wenn es Warnungen gibt, solltest du sie erst 
110
+    beheben.</li>
111
+    
112
+    <li>Trage dich in die Mailingliste <a 
113
+    href="http://archives.seul.org/or/announce/">or-announce</a> ein. Sie wird 
114
+    dich über neue stabile Pakete auf dem laufenden halten. Du möchtest dich 
115
+    eventuell auch bei <a href="<page docs/documentation>#MailingLists">den anderen 
116
+    Tor-Mailinglisten</a> einschreiben. Diese Listen informieren auch über neue 
117
+    Entwicklerversionen.</li>
118
+    
119
+    </ol>
120
+    
121
+    <hr />
122
+    <a id="check"></a>
123
+    <h2><a class="anchor" href="#check">Schritt Drei: Sicher gehen, dass es funktioniert</a></h2>
124
+    
125
+    <p>Sobald sich dein Server zum Netzwerk verbinden kann, wird er versuchen 
126
+    herauszufinden, ob die Ports, die du konfiguriert hast, von außen erreichbar 
127
+    sind. Normalerweise geht das sehr schnell, kann aber bis zu 20&nbsp;Minuten 
128
+    dauern. Halte nach Logeinträgen wie <samp>self-testing indicates your ORPort 
129
+    is reachable from the outside. Excellent</samp> Ausschau. Wenn du diese 
130
+    Nachricht nicht siehst, bedeutet dies, dass dein Server von außen nicht 
131
+    erreichbar ist. Stelle sicher, dass die Angaben zu IP-Adresse und Port richtig 
132
+    sind.</p>
133
+    
134
+    <p>Wenn er erreichbar ist, wird er einen &quot;Serverdescriptor&quot; in die
135
+    Verzeichnisse laden. Dadurch wissen andere Clients, welche Adresse, Ports,
136
+    Schlüssel etc. dein Server verwendet. Du kannst <a
137
+    href="http://moria.seul.org:9032/tor/status/authority">den Netzwerkstatus
138
+    manuell laden</a> und ihn nach deinem Nickname durchsuchen. So kannst du sicher
139
+    gehen, dass er existiert. Dies dauert meist einige Sekunden.</p>
140
+    
141
+    <hr />
142
+    <a id="after"></a>
143
+    <h2><a class="anchor" href="#after">Schritt Vier: Wenn es funktioniert</a></h2>
144
+    
145
+    <p>Wir empfehlen folgende Schritte zusätzlich auszuführen:</p>
146
+    
147
+    <p>In <a
148
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/operationalsecurity">diesem
149
+    Dokument</a> gibt es Anweisungen, wie du die Sicherheit des Servers
150
+    erhöhen kannst.</p>
151
+    
152
+    <p>Entscheide dich, welche Exitpolicy du willst. Standardmäßig
153
+    gewährt dein Server den Zugriff auf viele bekannte Dienste. Einige
154
+    (z.B. Port 25) werden jedoch eingeschränkt, aufgrund von vorhandenem
155
+    Missbrauchpotential. Vielleicht möchtest du eine restriktivere oder
156
+    weniger restriktive Exitpolicy wählen. Editiere dazu deine
157
+    <var>torrc</var> entsprechend. Lies die FAQ über <a href="<page
158
+    docs/faq-abuse>#typicalabuses">Probleme, die bei der Verwendung der
159
+    standardmäßigen Exitpolicy auftreten können</a>. Wenn du eine
160
+    liberale Exitpolicy wählst, stelle auch sicher, dass dein ISP damit
161
+    leben kann. Falls es Ressourcen gibt, die dein Computer nicht
162
+    erreichen kann, lehne diese bitte explizit in deiner Exitpolicy ab
163
+    &mdash; sonst werden Tornutzer auch hiervon betroffen sein.</p>
164
+    
165
+    <p>Du solltest dir Gedanken über die Limitierung der Bandbreite
166
+    machen. Modem, DSL und andere Nutzer, die asymmetrische Verbindungen
167
+    haben (z.b. höhere Downloadbandbreite) sollten den Durchsatz auf die kleinere
168
+    Bandbreite limitieren, um so Blockaden zu vermeiden. Dieser <a
169
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">FAQ-Eintrag</a>
170
+    enthält weitere Details.</p>
171
+    
172
+    <ol start="8"> <li>Mache ein Backup vom privaten Schlüssel deines
173
+    Torservers (gespeichert in <var>keys/secret_id_key</var> in deinem
174
+    Datenverzeichnis). Dies ist die &bdquo;Identität&ldquo; deines
175
+    Servers. Halte sie geheim, damit niemand deinen Server abhören
176
+    kann. Das ist die kritische Datei, um deinen Server <a
177
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#UpgradeServer">zu
178
+    verschieben oder wiederherzustellen</a>, wenn etwas schief geht.</li>
179
+    
180
+    <li>Wenn du die Nameserver für deine Domain kontrollierst, überlege
181
+    dir, ob du nicht deinen Hostnamen auf <samp>anonymous</samp> oder
182
+    <samp>proxy</samp> oder <samp>tor-proxy</samp> setzt. Wenn die Leute
183
+    die Adresse in ihren Logdateien sehen, wissen sie schneller, was los
184
+    ist.</li>
185
+    
186
+    <li>Wenn dein Server nicht als Webserver fungiert, erwäge
187
+    doch deinen ORport auf 443 und deinen DirPort auf 80 zu ändern.
188
+    Viele Tor-Benutzer stecken hinter Firewalls fest, welche sie nur
189
+    surfen lassen. Diese Änderungen würden auch den
190
+    Benutzern Zugang zu deinem Tor-Server ermöglichen. Auf einem
191
+    Win32-Server kann einfach der ORPort und DirPort direkt in der
192
+    <var>torrc</var>
193
+    geändert und Tor neu gestartet werden.  Auf OS X oder Unixservern
194
+    kann man nicht direkt diese Ports verwenden (weil Tor dort nicht
195
+    als root läuft).  Deshalb muss man da irgendeine Form von
196
+    <a
197
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients">Portweiterleitung</a>
198
+    einrichten, damit Verbindungen zum Tor-Server gemacht werden können.
199
+    Falls du die Ports 80 und 443 schon benutzt, aber trotzdem helfen willst, öffne
200
+    Port 22, 110, und 143.</li>
201
+    
202
+    <li>Falls dein Tor-Server noch andere Dienste auf der selben Adresse
203
+    anbietet &mdash; wie z.B. einen Webserver &mdash; vergewissere dich,
204
+    dass Verbindungen zum Webserver auch vom localhost zugelassen werden.
205
+    Diese Verbindungen müssen klappen, da Torclients erkennen, dass dein
206
+    Torserver der <a
207
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">sicherste
208
+    Weg ist, deinen Webserver zu erreichen</a>. Daher bauen sie immer
209
+    Verbindungen, die bei deinem Server aufhören. Wenn du diese
210
+    Verbindungen nicht erlauben willst, dann musst die sie direkt in
211
+    deiner Exitpolicy verbieten.</li>
212
+    
213
+    <li>(nur Unix). Lege einen neuen Nutzer an, welcher das Programm
214
+    ausführt. Wenn du das OS X, deb oder rpm installiert hast, so
215
+    wurde dies bereits erledigt. Ansonsten kannst du dies per Hand
216
+    erledigen. (Der Tor-Server muss nicht als root laufen, es ist also
217
+    eine gute Idee das auch nicht zu tun. Ausführen als 'tor'
218
+    Benutzer erübrigt Probleme mit inetd und anderen Diensten, welche
219
+    auf Nutzernamen prüfen. wenn du ein paranoider Zeitgenosse bist
220
+    kannst du <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorInChroot">Tor
221
+    in einer chroot-Jail ausführen</a>.)</li>
222
+    
223
+    <li>(nur Unix). Vermutlich limitiert dein Betriebssystem die Anzahl offener
224
+    Dateien pro Prozess auf 1024 (oder noch weniger). Wenn du vorhast, einen
225
+    schnellen Exitknoten zu betreiben, wird das vermutlich nicht reichen. Unter
226
+    Linux solltest du eine Zeile wie <var>toruser hard nofile 8192</var> zu deiner
227
+    <var>/etc/security/limits.conf</var>
228
+    hinzufügen (<var>toruser</var> ist hier der Benutzer, unter dem der Prozess läuft).
229
+    Anschließend musst du Tor neu starten.</li>
230
+    
231
+    <li>Wenn du Tor über ein Paket oder ein Installationsprogramm installiert
232
+    hast, wird er vermutlich automatisch beim Booten gestartet. Wenn du
233
+    jedoch aus dem Quellcode installiert hast, findest du vielleicht die
234
+    Initscripte in <var>contrib/tor.sh</var> oder <var>contrib/torctl</var>
235
+    hilfreich.</li>
236
+    
237
+    </ol>
238
+    
239
+    <p>Bei Änderungen kann <a
240
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Restarting">in
241
+    den meisten Fällen die Konfigurationsdatei neu geladen werden, ohne Tor neu
242
+    starten zu müssen</a>. Stelle sicher, dass die Option <samp>ContactInfo</samp>
243
+    gesetzt ist, so dass wir dich bei Problemen kontaktieren können. Falls du
244
+    Probleme oder Fragen hast, schaue auf die <a href="<page
245
+    docs/documentation>#Support">Support</a>-Seite oder <a href="<page
246
+    about/contact>">kontaktiere uns</a> auf der tor-ops-Mailingliste. Wir danken dir, dass
247
+    du das Netzwerk wachsen lässt!</p>
248
+    
249
+    <hr />
250
+    
251
+    <p>Wenn du Vorschläge zur Verbesserung dieses Dokuments hast, <a href="<page
252
+    about/contact>">schicke sie uns bitte</a>. Danke!</p>
253
+  </div>
254
+  <!-- END MAINCOL -->
255
+  <div id = "sidecol">
256
+#include "side.wmi"
257
+#include "info.wmi"
258
+  </div>
259
+  <!-- END SIDECOL -->
260
+</div>
261
+<!-- END CONTENT -->
262
+#include <foot.wmi>   
... ...
@@ -0,0 +1,173 @@
1
+    <h1>Tor-Client auf Linux/BSD/Unix betreiben</h1>
2
+    
3
+    <p>
4
+    <b>Das sind die Anweisungen, um ein Clientprogramm zu betreiben. Wenn du für
5
+    andere Verkehr weiterleiten möchtest und helfen willst, das Netzwerk auszubauen,
6
+    dann lies bitte die Anleitung zur <a
7
+    href="<page docs/tor-doc-relay>">Konfiguration eines Servers</a>.</b>
8
+    </p>
9
+    
10
+    <hr />
11
+    <a id="installing"></a>
12
+    <h2><a class="anchor" href="#installing">Schritt Eins: Lade Tor herunter und
13
+    installiere es</a></h2>
14
+    
15
+    <p>Die letzte Version von Tor kannst du auf der <a href="<page download/download>">
16
+    Download-Seite</a> finden. Wir haben Pakete für Debian, Red Hat, Gentoo, *BSD 
17
+    etc. Wenn du Ubuntu benutzt, nimm auf keinen Fall die standard Pakete! Nimm 
18
+    stattdessen <a href="<page docs/debian>#ubuntu">unser Deb-Repository</a>. </p>
19
+    
20
+    <p>Falls du das Programm aus dem Quellcode bauen willst, installiere zuerst <a
21
+    href="http://www.monkey.org/~provos/libevent/">libevent</a> und stelle sicher,
22
+    dass du auch OpenSSL und zlib hast (inklusive der Entwicklerpakete). Führe dann
23
+    aus:<br />
24
+    <kbd>tar xzf tor-<version-stable>.tar.gz; cd tor-<version-stable><br />
25
+    ./configure &amp;&amp; make</kbd><br />
26
+    Du kannst nun Tor mit dem Befehl <kbd>src/or/tor</kbd> ausführen oder mit <kbd>make
27
+    install</kbd> installieren, um es nach /usr/local/ zu installieren. Danach
28
+    brauchst du nur noch <kbd>tor</kbd> auszuführen.
29
+    </p>
30
+    
31
+    <p>Tor ist standardmäßig als Client eingerichtet. Es benutzt eine eingebaute
32
+    Konfigurationsdatei und meist benötigt man nichts zu ändern. Tor ist nun
33
+    installiert.
34
+    </p>
35
+    
36
+    <hr />
37
+    <a id="privoxy"></a>
38
+    <a id="polipo"></a>
39
+    <h2><a class="anchor" href="#polipo">Schritt Zwei: Installiere Polipo zum Surfen</a></h2>
40
+    <br />
41
+    
42
+    <p>Nachdem du Tor installiert hast, musst du deine Anwendungen richtig einstellen.
43
+    </p>
44
+    
45
+    <p> Der erste Schritt ist es, deinen Browser einzurichten. Dafür solltest du 
46
+    <a href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> aus 
47
+    deinem Lieblingsrepository installieren. Polipo ist ein Webproxy mit Cache, 
48
+    der auch HTTP Pipelining kann und daher sehr gut für die Latenzen des 
49
+    Tornetzwerks geeignet ist. Stelle sicher, dass du mindestens Polipo 1.0.4 
50
+    einsetzt, frühere Versionen haben keinen SOCKS Support den man für Tor 
51
+    braucht. </p>
52
+    
53
+    <p> Wenn Polipo installiert ist, <b>musst du Polipo noch für Tor 
54
+    einrichten!</b> Nimm einfach unsere <a 
55
+    href="https://svn.torproject.org/svn/torbrowser/trunk/build-scripts/config/polipo.conf">
56
+    Polipo Konfiguration für Tor</a> und kopiere sie an die Stelle deiner 
57
+    aktuellen Konfiguration (meistens in /etc/polipo/config oder ~/.polipo). 
58
+    Danach musst du Polipo noch neustarten.</p>
59
+    
60
+    <p>Wenn du lieber Privoxy verwendest, nimm diese <a 
61
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">
62
+    Beispielkonfiguration für Privoxy</a>. Aber da beide Einstellungsdateien den 
63
+    Port 8118 nutzen, solltest du nicht beide Programme gleichzeitig laufen 
64
+    lassen.</p>
65
+    
66
+    <hr />
67
+    <a id="using"></a>
68
+    <h2><a class="anchor" href="#using">Schritt Drei: Konfiguriere deine Anwendungen </a></h2>
69
+    
70
+    <p>Nachdem Tor und Polipo installiert sind, musst du die Anwendungen ebenfalls
71
+    einrichten. Der erste Schritt ist Webbrowsing.</p>
72
+    
73
+    <p>Du solltest Tor mit Firefox und Torbutton benutzen. Installiere einfach die
74
+    Erweiterung <a href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> und
75
+    starte den Firefox neu.
76
+    </p>
77
+    
78
+    <p><img alt="Torbutton plugin for Firefox" src="../img/screenshot-torbutton.png"
79
+    border="1" /></p>
80
+    
81
+    <p>Falls du Firefox auf einem anderen Computer als Tor betreiben willst, schaue
82
+    dir den <a
83
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">Eintrag
84
+    in der FAQ</a> an.
85
+    </p>
86
+    
87
+    <p>Um andere Anwendungen, die HTTP-Proxys unterstützen, konfiguriere sie,
88
+    Polipo zu nutzen (localhost port 8118). Zur direkten Verwendung von SOCKS (für
89
+    Instant Messaging, Jabber, IRC etc) kannst du die Anwendung direkt mit Tor
90
+    anwenden (localhost port 9050). Ein <a
91
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">FAQ-Eintrag</a>
92
+    sagt dir, warum das unter Umständen gefährlich ist. Anwendungen, die weder HTTP
93
+    noch SOCKS sprechen, können mit <a
94
+    href="http://tsocks.sourceforge.net/">tsocks</a> oder <a
95
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>
96
+    benutzt werden.
97
+    </p>
98
+    
99
+    <p>Das
100
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
101
+    HOWTO</a> beschreibt, wie man verschiedene Programme zusammen mit Tor benutzen
102
+    kann.
103
+    </p>
104
+    
105
+    <hr />
106
+    <a id="verify"></a>
107
+    <h2><a class="anchor" href="#verify">Schritt Vier: Stelle sicher, dass alles
108
+    funktioniert</a></h2>
109
+    
110
+    <p>Versuche nun deinen Browser mit Tor zu nutzen und stelle sicher, dass deine
111
+    IP-Adresse anonymisiert wird. Klicke auf den
112
+    <a href="https://check.torproject.org/">Tor-Detektor</a> und schaue nach, ob er
113
+    der Meinung ist, ob du Tor nutzt.
114
+    #<a href="http://ipchicken.com/">this site</a>
115
+    #to see what IP address it thinks you're using.
116
+    (Für den Fall das die Seite nicht erreichbar ist, gibt der <a
117
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">FAQ-Eintrag
118
+    weitere Wege, wie du Tor testen kannst</a>.)
119
+    </p>
120
+    
121
+    <p>Solltest du eine Personal Firewall einsetzen, die die Fähigkeiten deines
122
+    Computers einschränkt (schließt auch SELinux auf Fedora Core 4 ein), stelle
123
+    sicher, dass lokale Anwendungen zu Privoxy (Port 8118) und zu Tor (Port 9050)
124
+    verbinden können. Wenn deine Firewall ausgehende Verbindungen verbietet,
125
+    ändere dies, so dass mindestens Port 80 und 443 erlaubt sind und schaue dir
126
+    danach diesen <a
127
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">FAQ-Eintrag</a>
128
+    an. Wenn dein SELinux nicht erlaubt, Tor oder Polipo korrekt zu betreiben, lege
129
+    eine Datei namens booleans.local im Verzeichnis /etc/selinux/targeted an.
130
+    Editiere die Datei und füge die Zeile "allow_ypbind=1" hinzu. Danach musst du
131
+    deinen Rechner neu starten.
132
+    </p>
133
+    
134
+    <p>Falls es immer noch nichtgeht, schaue dir diesen <a
135
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">FAQ-Eintrag</a>
136
+    an.</p>
137
+    
138
+    <hr />
139
+    <a id="server"></a>
140
+    <a id="relay"></a>
141
+    <h2><a class="anchor" href="#relay">Schritt Fünf: Richte es als Server ein</a></h2>
142
+    
143
+    <p>Das Tor-Netzwerk vertraut auf Freiwillige, die Bandbreite spenden. Je mehr
144
+    Menschen Server betreiben, desto schneller wird das Netzwerk werden. Wenn du
145
+    mindestens 20 Kilobytes/s in jede Richtung hast, dann hilf dem Tor-Netzwerk
146
+    bitte aus. Wir haben einige Eigenschaften, die es einfach machen, Tor-Server zu
147
+    betreiben. Das schließt die Limitierung der Bandbreite, ExitPolicys und
148
+    Unterstützung für dynamische IP-Adressen mit ein.
149
+    </p>
150
+    
151
+    <p>Tor-Server an unterschiedlichen Plätzen in der Welt zu haben, macht die
152
+    Tor-Benutzer sicherer. Außerdem bekommst du selbst <a
153
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">eine
154
+    stärkere Anonymität</a>. Denn entfernte Seiten können nicht wissen, ob die
155
+    Verbindungen von dir oder von anderen kommen.</p>
156
+    
157
+    <p>Lies mehr in der <a href="<page docs/tor-doc-relay>">Anleitung zur
158
+    Konfiguration eines Servers</a>.</p>
159
+    
160
+    <hr />
161
+    
162
+    <p>Falls du Verbesserungsvorschläge für dieses Dokuments hast, dann <a
163
+    href="<page about/contact>">sende sie bitte an uns</a>. Danke!</p>
164
+  </div>
165
+  <!-- END MAINCOL -->
166
+  <div id = "sidecol">
167
+#include "side.wmi"
168
+#include "info.wmi"
169
+  </div>
170
+  <!-- END SIDECOL -->
171
+</div>
172
+<!-- END CONTENT -->
173
+#include <foot.wmi>   
... ...
@@ -0,0 +1,70 @@
1
+## translation metadata
2
+# Revision: $Revision: 21511 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: Configuring your browser to use Tor" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-web>">Configure Your Browser</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h1>Richte deinen Browser zur Nutzung von Tor ein</h1>
14
+    
15
+    <p>Wenn du Firefoxb benutzt (was wir empfehlen), brauchst du diese Seite
16
+      nicht. Installiere einfach die Erweiterung <a
17
+    href="https://addons.mozilla.org/firefox/2275/">Torbutton</a>, starte
18
+      Firefox neu und du bist fertig.
19
+    </p>
20
+    
21
+    <p><img alt="Torbutton plugin for Firefox"
22
+      src="../img/screenshot-torbutton.png" border="1" /></p>
23
+    
24
+    <p>Ansonsten musst du die Proxyeinstellungen deines Browsers selbst
25
+      einstellen.</p>
26
+      <dl>
27
+        <dt>Mozilla und Firefox unter Windows</dt>
28
+        <dd>Extras - Einstellungen - Allgemein -
29
+      Verbindungseinstellungen</dd>
30
+    
31
+      <dt>Firefox unter Mac OS X</dt>
32
+      <dd>Firefox - Preferences - General - Connection Settings</dd>
33
+    
34
+      <dt>Firefox unter Linux</dt>
35
+      <dd>Optionen - Einstellungen - Erweitert- Proxys</dd>
36
+    
37
+      <dt>Opera</dt>
38
+      <dd>Extras - Einstellungen... - Erweitert - Netzwerk -
39
+    Proxyserver...</dd>
40
+    
41
+    <dt>Internet Explorer</dt> <dd>Wir können den Einsatz des IE nicht empfehlen,
42
+    aber für die Leute die sich etwas Anonymität einbilden möchten:<br/> Extras -
43
+    Internetoptionen - Verbindungen - LAN-Einstellungen - Proxyserver -
44
+    Erweitert</dd> </dl>
45
+    
46
+    <p><img alt="Proxyeinstellungen im Firefox"
47
+      src="../img/screenshot-win32-firefox-proxies.jpg" /></p>
48
+    
49
+    <p>Du solltest die Angaben zu Host ("localhost") und zum Port ("8118")
50
+      in allen Feldern eintragen. (Auch wenn Privoxy diese Protokolle
51
+      nicht unterstützt, <a
52
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">solltest
53
+      du die eintragen</a>.) Weiterhin solltest du auch das Feld mit dem
54
+      SOCKS-Proxy ausfüllen ("localhost", "9050" und socks5), um
55
+      Protokolle außer den ersten vier abzudecken. Danach klicke auf "OK".</p>
56
+    
57
+    <hr />
58
+    
59
+    <p>Wenn du Verbesserungen für das Dokument hast, <a
60
+    href="<page about/contact>">sende diese bitte an uns</a>. Danke!</p>
61
+  </div>
62
+  <!-- END MAINCOL -->
63
+  <div id = "sidecol">
64
+#include "side.wmi"
65
+#include "info.wmi"
66
+  </div>
67
+  <!-- END SIDECOL -->
68
+</div>
69
+<!-- END CONTENT -->
70
+#include <foot.wmi>   
... ...
@@ -0,0 +1,7 @@
1
+## translation metadata
2
+# Based-On-Revision: 13195
3
+# Status: obsolete
4
+
5
+#include "head.wmi" TITLE="Redirecting" REDIRECT="docs/tor-doc-windows"
6
+
7
+#include <foot.wmi>
... ...
@@ -0,0 +1,181 @@
1
+## translation metadata
2
+# Revision: $Revision: 21995 $
3
+# Translation-Priority: 1-high
4
+
5
+#include "head.wmi" TITLE="Tor Project: MS Windows Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-windows>">Windows Client</a>
11
+  </div> 
12
+  <div id="maincol">  
13
+    <h1>Tor unter Microsoft Windows benutzen</h1>
14
+    
15
+    <p><b>Bitte beachte, das diese Anleitung die Installation für
16
+    Microsoft Windows (98, 98SE, NT4, 2000, XP, Vista, Server)
17
+    beschreibt. Wenn du Netzverkehr für andere Benutzer weiterleiten und
18
+    beim Ausbau des Tor-Netzwerks mithelfen willst (Du bist herzlich
19
+    eingeladen!), lies die <a href="<page docs/tor-doc-relay>"> Anleitung
20
+    zum Einrichten eines Servers</a>.</b> </p>
21
+    
22
+    <hr />
23
+    <a id="installing"></a>
24
+    <h2><a class="anchor" href="#installing">Schritt Eins: Download und Installation von Tor</a></h2>
25
+    
26
+    <p>Das Installationspaket für MS Windows enthält <a href="<page
27
+      index>">Tor</a>, <a
28
+      href="<page projects/vidalia>">Vidalia</a> (eine
29
+      Benutzeroberfläche für Tor), und <a
30
+      href="http://www.privoxy.org/">Privoxy</a> (ein lokaler Proxy zum
31
+      Filtern von Webseiten). Die drei Programme sind für die gemeinsame
32
+      Arbeit vorkonfiguriert. Bitte lade entweder das <a
33
+      href="../<package-win32-bundle-stable>">stabile</a> oder das <a
34
+      href="../<package-win32-bundle-alpha>">Entwicklerpaket</a> von der
35
+      <a href="<page download/download>">Download-Seite</a> herunter.</p>
36
+      
37
+    <p><img alt="tor installer splash page"
38
+      src="../img/screenshot-win32-installer-splash.png" height="386"
39
+      width="503" /></p>
40
+      
41
+    <p>Wenn Tor, Vidalia oder Privoxy bereits zuvor installiert wurden,
42
+      kannst du mit dem unten dargestellten Dialog wählen, welche
43
+      Komponenten aus dem kombinierten Softwarepaket nicht installiert
44
+      werden sollen.</p>
45
+    
46
+    <p><img alt="select components to install"
47
+      src="../img/screenshot-win32-installer-components.png" height="386"
48
+      width="503" /></p>
49
+    
50
+    <p>Nach der erfolgreichen Installation werden alle ausgewählten
51
+      Programme automatisch gestartet.</p>
52
+    
53
+    <!--
54
+    <p>
55
+    Voreingestellt ist die Installation von Tor als Dienst (client).
56
+    Die Vorgaben sind in einer eingebaute Konfigurations-Datei abgelegt.
57
+    Die meisten Anwender werden keine Änderungen an den Vorgaben vornehmen müssen.
58
+    Tor ist jetzt installiert.
59
+    </p>
60
+    -->
61
+    
62
+    <hr />
63
+    <a id="using"></a>
64
+    <h2><a class="anchor" href="#using">Schritt Zwei: Programme einrichten</a></h2>
65
+    
66
+    <p>Nach der Installation von Tor und Privoxy müssen die Programme
67
+    eingestellt werden. Zuerst wird der Web-Browser angepasst.</p>
68
+    
69
+    <p>Du solltest Tor mit Firefox und der Erweiterung TorButton für bestmögliche
70
+    Sicherheit benutzen. Das Paket installiert Vidalia den <a
71
+    href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> für
72
+    dich. Starte Firefox neu und du bist fertig:
73
+    </p>
74
+    
75
+    <p>
76
+    <img alt="Torbutton plugin for Firefox"
77
+    src="../img/screenshot-torbutton.png" border="1" height="78"
78
+    width="161" /></p>
79
+    
80
+    <p>Wenn du vorhast, Firefox auf einem anderen Computer zu
81
+    benutzen als auf dem, wo Tor installiert ist, lies den Eintrag in
82
+    der <a
83
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">FAQ
84
+    zum Betrieb von Tor auf einem anderen Computer</a>.</p>
85
+    
86
+    <p>Andere Programme, die HTTP-Proxys unterstützen, können Tor nutzen,
87
+    wenn Privoxy als HTTP-Proxy eingerichtet ist (einfach "localhost" und
88
+    "port 8118" eingeben). Bei Programmen, die SOCKS direkt nutzen
89
+    (z.B. Instant-Messaging, Jabber, IRC usw.), trage Tor als Proxy ein
90
+    ("localhost" und "port 9050"). Beachte aber diesen <a
91
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">Eintrag
92
+    in der FAQ</a>. Er erklärt, warum dies die Anonymität gefährdet. Bei
93
+    Programmen, die weder SOCKS- noch HTTP-Proxys nutzen, könnte SocksCap
94
+    oder <a href="http://www.freecap.ru/eng/">FreeCap</a> helfen.
95
+    (FreeCap ist freie Software; SocksCap ist kommerziell.)</p>
96
+    
97
+    <p>Weitere Informationen findest du im
98
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
99
+    HOWTO</a>.
100
+    </p>
101
+    
102
+    <hr />
103
+    <a id="verify"></a>
104
+    <h2><a class="anchor" href="#verify">Schritt Drei: Prüfe, ob alles funktioniert</a></h2>
105
+    
106
+    <p>
107
+    Prüfe, ob Privoxy und Vidalia in der Task-Leiste aktiv sind. Das Icon
108
+    von Privoxy ist ein blauer oder grüner Kreis mit einem "P"
109
+    darin. Vidalia zeigt eine kleine grüne Zwiebel, wenn Tor aktiv ist
110
+    oder eine dunkle Zwiebel mit einem roten Kreuz, wenn Tor inaktiv
111
+    ist. Du kannst Tor starten oder anhalten, wenn du das Vidalia-Icon in
112
+    der Taskleiste mit der rechten Maustaste anklickst und "Start" oder
113
+    "Stopp" aus dem Menü (unten) auswählst.
114
+    </p>
115
+    
116
+    <p>
117
+    <img alt="Vidalia Tray Icon" src="../img/screenshot-win32-vidalia.png"
118
+    height="215" width="161" /></p>
119
+    
120
+    <p>
121
+    Dann solltest du prüfen, ob der Browser Tor benutzt und die IP-Adresse
122
+    anonymisiert. Klicke auf <a
123
+    href="http://check.torproject.org/">Tordetektor</a>
124
+    und schaue, ob du Tor nutzt.
125
+    (Wenn die Seite nicht erreichbar ist, findest du <a
126
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">in
127
+    diesem FAQ-Eintrag</a> weitere Vorschläge, Tor zu testen.)
128
+    </p>
129
+    
130
+    <p>Wenn deine Personal Firewall auch Verbindungen des Computers mit
131
+    den eigenen Programmen blockiert, erlaube Verbindungen mit "localhost"
132
+    auf Port 8118 und Port 9050. Wenn die Personal Firewall ausgehende
133
+    Verbindungen blockiert, erlaube Verbindungen auf den TCP-Ports 80 und
134
+    443 und lese diesen <a
135
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">Eintrag
136
+    in der FAQ</a>.</p>
137
+    
138
+    <p>Wenn es immer noch nicht funktioniert, lies die <a
139
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">weiteren
140
+    Hinweise in der FAQ</a>.</p>
141
+    
142
+    <p>Sobald es funktioniert, schaue dir an, <a href="<page
143
+    download/download>#Warning">was Tor bietet und was nicht</a>.</p>
144
+    
145
+    <hr />
146
+    <a id="server"></a>
147
+    <h2><a class="anchor" href="#server">Schritt Vier: Tor als Server einrichten</a></h2>
148
+    
149
+    <p>
150
+    Das Tor-Netzwerk ist auf Freiwillige angewiesen, die Bandbreite spenden.
151
+    Je mehr Menschen einen Tor-Server betreiben, desto schneller wird das
152
+    Tor-Netzwerk. Wenn du über mindestens 20 KBytes/s verfügst, hilf bitte
153
+    dem Tor-Netzwerk, indem du auch einen Tor-Server einrichtest. Server
154
+    haben viele Eigenschaften, die ihren Betrieb einfach und bequem
155
+    machen. Dazu gehöret die Begrenzung der Bandbreite, ExitPolicys, die
156
+    das Risiko von Mißbrauch eingrenzen und Unterstützung von dynamischen
157
+    IP-Adressen.</p>
158
+    
159
+    <p>Viele Server an unterschiedlichen Stellen im Internet machen die
160
+    Tor-Benutzer sicher. Du erhälst selbst eine <a
161
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">stärkere
162
+    Anonymität</a>, weil fremde Webseiten nicht feststellen können, ob
163
+    eine Verbindung von deinem Computer ausgeht oder ob sie für andere
164
+    weitergeleitet wird.</p>
165
+    
166
+    <p>Lies mehr in unserer Anleitung, wie man einen <a href="<page
167
+    docs/tor-doc-relay>">Tor-Server konfiguriert</a>.</p>
168
+    
169
+    <hr />
170
+    <p> Sende Verbesserungsvorschläge für dieses Dokument bitte an
171
+    <a href="<page about/contact>">uns</a>. Vielen Dank!</p>
172
+  </div>
173
+  <!-- END MAINCOL -->
174
+  <div id = "sidecol">
175
+#include "side.wmi"
176
+#include "info.wmi"
177
+  </div>
178
+  <!-- END SIDECOL -->
179
+</div>
180
+<!-- END CONTENT -->
181
+#include <foot.wmi>   
... ...
@@ -0,0 +1,264 @@
1
+## translation metadata
2
+# Revision: $Revision: 22314 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Hidden Service Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-hidden-service>">Tor Hidden Service</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h1>Versteckte Dienste bei Tor einrichten</h1>
14
+    <hr />
15
+    
16
+    <p>Mit Tor ist es möglich, versteckte Dienste, so genannte Hidden Services,
17
+    anzubieten. Dies funktioniert sowohl mit einem Tor-Knoten, als auch mit einem
18
+    Client. Damit kann man zum Beispiel einen Webserver, einen Mailserver oder
19
+    einen SSH-Server anbieten, ohne die Identität preiszugeben. Es ist sogar
20
+    möglich, solch einen Dienst hinter einer Firewall zu betreiben. </p>
21
+    
22
+    <p>Wenn du bereits Tor installiert hast, kannst du unseren versteckten Dienst 
23
+    live unter <a href="http://duskgytldkxiuqc6.onion/">duskgytldkxiuqc6.onion</a> 
24
+    oder den versteckten Dienst von Wikileaks unter <a 
25
+    href="http://gaddbiwdftapglkq.onion/">gaddbiwdftapglkq.onion</a> erleben. </p>
26
+    
27
+    <p>In diesem HowTo erfährst du, wie du eine eigene, versteckte Webseite
28
+    betreiben kannst. Für technische Details, wie das Protokoll für die
29
+    versteckten Dienste funktioniert, schau dir unsere <a href="<page
30
+    docs/hidden-services>">hidden service protocol</a> Seite an.</p>
31
+    
32
+    <hr />
33
+    <a id="zero"></a>
34
+    <h2><a class="anchor" href="#zero">Schritt Null: Bekomme Tor und Privoxy zum
35
+    Laufen</a></h2>
36
+    <br />
37
+    
38
+    <p>Bevor es losgeht, überprüfe folgendes:</p>
39
+    <ol>
40
+    <li>Tor ist installiert und läuft.</li>
41
+    <li>Privoxy oder Polipo installiert und läuft.</li>
42
+    <li>Privoxy oder Polipo ist richtig eingerichtet und benutzt Tor und</li>
43
+    <li>alles funktioniert so wie es soll.</li>
44
+    </ol>
45
+    
46
+    <p>Windows Nutzer sollten dem <a href="<page docs/tor-doc-windows>">Windows
47
+    HowTo</a>, OS X Nutzer dem <a href="<page docs/tor-doc-osx>">OS X HowTo</a>,
48
+    und Linux/BSD/Unix Nutzer dem <a href="<page docs/tor-doc-unix>">Unix HowTo</a>
49
+     folgen.</p>
50
+    
51
+    <p>Wenn du alles eingerichtet hast, versuche nochmal den oben erwähnten 
52
+    versteckten Dienst unter <a href="http://duskgytldkxiuqc6.onion/"> 
53
+    duskgytldkxiuqc6.onion</a> oder den versteckten Dienst von Wikileaks unter <a 
54
+    href="http://gaddbiwdftapglkq.onion/">gaddbiwdftapglkq.onion</a> zu erreichen. 
55
+    Normalerweise dauert es zwischen 10&mdash;60 Sekunden, bis die Seite geladen 
56
+    ist (oder bis sich herausstellt, dass sie gerade unerreichbar ist). Wenn es 
57
+    gleich zu Beginn fehlschlägt und dein Browser eine Meldung bringt wie 
58
+    "www.duskgytldkxiuqc6.onion could not be found, please check the name and try 
59
+    again" scheinst du Tor und Privoxy nicht richtig konfiguriert zu haben. Zum 
60
+    dem Problem gibt es einen <a 
61
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">
62
+    Eintrag in der FAQ</a>, der dir vielleicht weiterhelfen kann. </p>
63
+    
64
+    <hr />
65
+    <a id="one"></a>
66
+    <h2><a class="anchor" href="#one">Schritt Eins: Installiere einen lokalen
67
+    Webserver</a></h2>
68
+    <br />
69
+    
70
+    <p>Als Erstes musst du einen lokalen Webserver einrichten. Das kann durchaus
71
+    kompliziert sein, daher können wir nur ganz grundlegende Hilfestellung geben.
72
+    Solltest du Probleme haben, frage einen Freund um Hilfe. Wir empfehlen die
73
+    Installation eines neuen, separaten Webservers für den versteckten Dienst,
74
+    weil du einen bereits installierten möglicherweise bereits für eine andere
75
+    Seite benutzt oder mal benutzen möchtest. </p>
76
+    
77
+    <p>Wenn du Unix oder OS X benutzt und dich mit der Kommandozeile auskennst,
78
+    ist der beste Weg, wenn du dir <a href="http://www.acme.com/software/thttpd/">
79
+    thttpd</a> installierst. Hol dir einfach den neuesten Tarball und entpacke
80
+    ihn. Mittels <kbd>./configure &amp;&amp; make</kbd> wird der Server
81
+    installiert. Danach musst du noch <kbd>mkdir hidserv; cd hidserv</kbd>
82
+    eingeben und danach mittels <kbd>../thttpd -p 5222 -h localhost</kbd> den
83
+    Server starten. Du landest wieder auf der Kommandozeile, hast aber jetzt einen
84
+    Webserver auf Port 5222 laufen. Du kannst Dateien, die er ausliefern soll,
85
+    einfach in das hidserv Verzeichnis legen. </p>
86
+    
87
+    <p>Wenn du unter Windows arbeitest, wählst du am Besten <a
88
+    href="http://savant.sourceforge.net/">Savant</a> oder <a
89
+    href="http://httpd.apache.org/">Apache</a>. Versichere dich aber, dass der
90
+    Server nur an localhost gebunden ist. Ausserdem solltest du wissen, auf
91
+    welchem Port der Server lauscht, diese Information brauchst du gleich. </p>
92
+    
93
+    <p>(Das Binden an localhost stellt sicher, dass der Server nur über Tor
94
+    ansprechbar ist. Ansonsten könnte man vielleicht auf diese Weise den Betreiber
95
+    des versteckten Dienstes enttarnen.) </p>
96
+    
97
+    <p>Wenn du den Server eingerichtet hast, solltest du dich davon überzeugen,
98
+    dass er funktioniert: starte deinen Browser und besuche <a
99
+    href="http://localhost:5222/">http://localhost:5222/</a>. 5222 ist der Port, an
100
+    dem dein Webserver lauscht. Wenn das geht, versuche eine Datei, in das
101
+    Verzeichnis zu legen und schaue, ob sie im Browser auftaucht, wenn du die
102
+    Ansicht aktualisierst. </p>
103
+    
104
+    <hr />
105
+    <a id="two"></a>
106
+    <h2><a class="anchor" href="#two">Schritt Zwei:
107
+    Einrichtung des versteckten Dienstes</a></h2>
108
+    <br />
109
+    
110
+    <p>Als nächsten Schritt musst du deinen versteckten Dienst einrichten, damit
111
+    er auf deinen Webserver zeigt. </p>
112
+    
113
+    <p>Erstens: Öffne deine torrc in einem Text-Editor. (Unter <a
114
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">torrc
115
+    FAQ Eintrag</a> steht, was das bedeutet.) Etwa in der Mitte der Datei steht
116
+    die folgende Zeile:</p>
117
+    
118
+    <pre><p> \############### This section is just for location-hidden services ###</p>
119
+    </pre>
120
+    
121
+    <p> Dieser Abschnitt besteht aus Zeilengruppen. Jede steht für einen
122
+    versteckten Dienst. Zu Beginn sind alle auskommentiert (haben also ein # als
123
+    erstes Zeichen), versteckte Dienste sind also nicht aktiv. Jede Zeilengruppe
124
+    besteht aus einer <var>HiddenServiceDir</var>-Zeile und einer oder mehreren
125
+    <var>HiddenServicePort</var>-Zeilen:</p>
126
+    <ul>
127
+    <li><var>HiddenServiceDir</var>
128
+    ist ein Verzeichnis, in dem Tor Informationen über den Hidden Service
129
+    speichert. Genauer gesagt: Tor wird hier eine Datei namens <var>hostname</var>
130
+    erstellen, in der die URL des versteckte Dienste steht. Du musst keine
131
+    Dateien in das Verzeichnis legen.</li>
132
+    <li><var>HiddenServicePort</var> lässt
133
+    dich einen virtuellen Port (das ist der Port, mit dem Nutzer auf deinen
134
+    versteckten Dienst zugreifen können) und eine IP-Adresse sowie Port (an welche
135
+    die Anfragen dann weitergeleitet werden) festlegen. </li>
136
+    </ul>
137
+    
138
+    <p>Damit unser Beispiel-Webserver funktioniert, musst du die folgenden Zeilen
139
+    in deine torrc hinzufügen: </p>
140
+    
141
+    <pre><p>HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/<br />
142
+    HiddenServicePort 80 127.0.0.1:5222</p></pre>
143
+    
144
+    <p>Du solltest die Variable <var>HiddenServiceDir</var> so wählen, dass der
145
+    Nutzer der
146
+    Tor laufen lässt, darauf Lese- und Schreibzugriff besitzt. Die Zeile oben
147
+    sollten auch für das OS X Paket funktionieren. Unter Unix, müsste
148
+    "/home/username/hidserv/" gehen (natürlich musst du "username" mit deinem
149
+    eigenen Benutzernamen ersetzen). Unter Windows sollte folgendes funktionieren
150
+    (natürlich auch mit dem richtigen Benutzernamen):</p>
151
+    <pre>HiddenServiceDir C:\Documents and Settings\username\Application Data\hidden_service\\
152
+    HiddenServicePort 80 127.0.0.1:5222 </pre>
153
+    
154
+    <p>Jetzt musst du deine veränderte torrc speichern und Tor neustarten. </p>
155
+    
156
+    <p>Wenn Tor startet, ist das schon mal super. Wenn nicht, ist etwas schief
157
+    gegangen. Als erstes solltest du in deinen Logfiles nach Hinweisen suchen. Tor
158
+    wird Warnungen oder sogar Fehler ausgeben. Damit solltest du in der Lage sein,
159
+    das Problem einzugrenzen. Typischerweise hast du Tippfehler in deiner torrc
160
+    oder fehlende Schreib- und Leserechte in den angegebenen Verzeichnissen.
161
+    (Unter <a
162
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">Der
163
+    Logfile FAQ Eintrag</a> findest du weitere Hilfe, wenn du Probleme hast die
164
+    Logs zu finden oder zu aktivieren. </p>
165
+    
166
+    <p>Wenn Tor startet wird es automatisch das Verzeichnis in
167
+    <var>HiddenServiceDir</var>, falls nötig, anlegen und darin 2 Dateien
168
+    ablegen.</p>
169
+    
170
+    <dl>
171
+    <dt><var>private_key</var></dt>
172
+    <dd>Als Erstes wird Tor ein neues
173
+    Schlüsselpaar mit öffentlichem und privatem Schlüssel für deinen versteckten
174
+    Dienst erzeugen. Dieses Paar wird in die Datei namens "private_key"
175
+    geschrieben. Diese Datei darfst du unter keinen Umständen weitergeben,
176
+    ansonsten könnten andere deine Identität annehmen.</dd>
177
+    <dt><var>hostname</var></dt>
178
+    <dd>Die andere Datei die Tor erstellt nennt sich "hostname". Dabei
179
+    handelt es sich um eine kurze Zusammenfassung deines öffentlichen Schlüssels.
180
+    Diese Zusammenfassung sieht etwa folgendermaßen aus: <tt>
181
+    duskgytldkxiuqc6.onion</tt>. Dabei handelt es sich gleichzeitig auch um die
182
+    Adresse deines versteckte Dienste, die du an andere Menschen weitergeben oder
183
+    z.B. im Internet veröffentlichen kannst.</dd>
184
+    </dl>
185
+    
186
+    <p>Wenn Tor unter einem anderen Benutzeraccount läuft, musst du möglicherweise
187
+    die Rechte des Hauptnutzers (root, Administrator) haben, damit du die Dateien
188
+    anschauen kannst.</p>
189
+    
190
+    <p>Nach einem Neustart ist Tor erstmal damit beschäftigt, sogenannte
191
+    Introduction Points auszuwählen und einen <em>hidden service descriptor</em>
192
+    zu erzeugen. Dabei handelt es sich um eine unterschriebene Liste von
193
+    Introduction Points mit dem vollständigen öffentlichen Schlüssel des
194
+    versteckten Dienstes. Diese Beschreibung veröffentlicht dein Client dann
195
+    anonym auf den Verzeichnisservern, wo andere Leute, die deinen versteckten
196
+    Dienst besuchen wollen, ihn dann ebenfalls anonym abrufen. </p>
197
+    
198
+    <p>Jetzt kannst du es versuchen: Kopiere den Inhalt der hostname-Datei in
199
+    deinen Webbrowser. Wenn es klappt, solltest du die vorher eingerichtete
200
+    HTML-Seite bekommen. Wenn es nicht geht, schau in deinen
201
+    Logs nach Hinweisen und versuche diesen nachzugehen, bis es klappt. </p>
202
+    
203
+    <hr />
204
+    <a id="three"></a>
205
+    <h2><a class="anchor" href="#three">Schritt Drei:
206
+    Tipps für Fortgeschrittene</a></h2>
207
+    <br />
208
+    
209
+    <p>Wenn du vor hast deinen versteckten Dienst über längere Zeit anzubieten,
210
+    solltest du den privaten Schlüssel des Dienstes, also die
211
+    <var>private_key</var> Datei redundant sichern. </p>
212
+    
213
+    <p>Wir haben weiter oben bewusst nicht den Webserver Apache empfohlen, weil er
214
+    a) vielleicht
215
+    schon für andere Webseiten auf dem Rechner eingesetzt wird und er b) sehr groß
216
+    und kompliziert ist und an vielen Stellen deine wirkliche IP verraten könnte
217
+    (z.B. auf 404 Seiten). Für Leute, die etwas mehr Funktionalität brauchen,
218
+    könnte Apache aber genau das Richtige sein. Wir bräuchten daher eine
219
+    Checkliste, wie man seinen Apache absichert, wenn du ihn für versteckte
220
+    Dienste nutzen willst. Es wäre toll, wenn die uns jemand erstellen könnte.
221
+    Savant hat möglicherweise ähnliche Probleme. </p>
222
+    
223
+    <p>Wenn du mehrere virtuelle Adressen an einen einzelnen versteckten Dienst
224
+    weiterleiten willst, musst du einfach mehr <var>HiddenServicePort</var>-Zeilen
225
+    einfügen. Wenn du mehrere versteckte Dienste mit dem gleichen Tor-Client
226
+    anbieten möchtest, must du einfach eine weitere
227
+    <var>HiddenServiceDir</var>-Zeile einfügen. Alle danach folgenden
228
+    <var>HiddenServicePort</var>-Zeilen
229
+    beziehen sich dann auf diese <var>HiddenServiceDir</var>-Zeile, bis du eine
230
+    neue <var>HiddenServiceDir</var>-Zeile einfügst: </p>
231
+    
232
+    <pre> HiddenServiceDir /usr/local/etc/tor/hidden_service/ HiddenServicePort 80
233
+    127.0.0.1:8080
234
+    
235
+    HiddenServiceDir /usr/local/etc/tor/other_hidden_service/ HiddenServicePort
236
+    6667 127.0.0.1:6667 HiddenServicePort 22 127.0.0.1:22 </pre>
237
+    
238
+    <p>Du solltest dir ein paar Gedanken über deine Anonymität machen: </p>
239
+    
240
+    <ul>
241
+    <li>Wie bereits erwähnt, solltest du aufpassen, dass dein Webserver keine
242
+    Informationen über dich, deinen Computer oder deinen Aufenthaltsort
243
+    herausgibt. Zum Beispiel könnte jemand herausfinden, ob du thttpd oder Apache
244
+    einsetzt und könnte dann auch noch etwas über dein Betriebssystem
245
+    herausfinden.</li>
246
+    <li>Wenn dein Rechner nicht immer online ist, ist es auch
247
+    dein verstecker Dienst nicht. Dadurch hinterlässt du Spuren, die jemand
248
+    interessieren könnten.</li> <!-- increased risks over time -->
249
+    </ul>
250
+    
251
+    <hr />
252
+    
253
+    <p>Wenn du Vorschläge hast, wie wir dieses Dokument verbessern könnten, <a
254
+    href="<page about/contact>">schick Sie uns bitte zu.</a> Danke!</p>
255
+  </div>
256
+  <!-- END MAINCOL -->
257
+  <div id = "sidecol">
258
+#include "side.wmi"
259
+#include "info.wmi"
260
+  </div>
261
+  <!-- END SIDECOL -->
262
+</div>
263
+<!-- END CONTENT -->
264
+#include <foot.wmi>   
... ...
@@ -0,0 +1,157 @@
1
+## translation metadata
2
+# Revision: $Revision: 21979 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: N900 Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/N900>">N900</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="Maemo"></a>
14
+    <h2><a class="anchor" href="#Maemo">Εγκατάσταση του Tor στο Maemo</a></h2>
15
+    <br />
16
+    <p>
17
+    Αν έχετε κάποια συσκευή Maemo εκτός της <a href="#N900">N900</a>,
18
+    προτείνουμε αν εγκαταστήσετε το πακέτο Tor από την <a
19
+    href="http://maemo.org/packages/view/tor/">ιστοσελια του Maemo</a>. Το Tor
20
+    Project δεν δημιουργεί τέτοιο πακέτο. Αυτό συντηρείται από την κοινότητα του
21
+    Maemo.
22
+    </p>
23
+    
24
+    <a id="N900"></a>
25
+    <h2><a class="anchor" href="#N900">Εγκατάσταση του Tor στο Ν900</a></h2>
26
+    <br />
27
+    <p>
28
+    Οι οδηγίες που ακολουθούν θα σας βοηθήσουν να εγκαταστήσετε έναν <a
29
+    href="https://garage.maemo.org/projects/tor-status">πειραματικό ελεγκτή
30
+    Tor</a> και το Tor στο τηλέφωνο Nokia N900. Πρόκειται για μη ελεγμένες
31
+    ρυθμίσεις. Ο φυλλομετριτής ιστού σε αυτή την ρύθμιση δεν περιλαμβάνει το
32
+    Torbutton και προς το παρόν δεν θα πρέπει να χρησιμοποιείται για ανάγκες
33
+    ανωνυμίας υψηλής ασφάλειας.
34
+    </p>
35
+    
36
+    <p>
37
+    Ανοίξτε τον διαχειριστή Εφαρμογών: <br /> <a
38
+    href="../img/N900/1_app_menu.png"> <img border="0" alt="N900 application
39
+    menu" src="../img/N900/1_app_menu-small.png"/> </a>
40
+    </p>
41
+    
42
+    <p>
43
+    Κάνετε κλικ στο μενού του διαχειριστή Εφαρμογών στην κορυφή της οθόνης: <br
44
+    /> <a href="../img/N900/2_app_manager.png"> <img border="0" alt="N900
45
+    application manager" src="../img/N900/2_app_manager-small.png"/> </a>
46
+    </p>
47
+    
48
+    <p>
49
+    Επιλέξτε 'κατάλογοι Εφαρμογών': <br /> <a
50
+    href="../img/N900/3_app_managermenu.png"> <img border="0" alt="N900
51
+    application catalogs" src="../img/N900/3_app_managermenu-small.png"/> </a>
52
+    </p>
53
+    
54
+    <p>
55
+    Πατήστε 'Νέο' για να ενεργοποιήσετε το αποθετήριο maemo extras-level. <br />
56
+    <small>Σημείωση: Το αποθετήριο αυτό περιέχει μη ελεγμένα πακέτα τα οποία
57
+    ίσως βλάψουν τη συσκεύ σας. <br /> Διαβάστε το <a
58
+    href="http://wiki.maemo.org/Extras-devel">Extras-devel</a> για
59
+    λεπτομέρειες. Ίσως χρειαστεί να απενεργοποιήσετε το αποθετήριο extras-level
60
+    μετά την εγκατάσταση του Tor, ή συνεχίστε με δική σας ευθύνη.</small> <br />
61
+    <a href="../img/N900/4_catalog_list.png"> <img border="0" alt="N900 catalog
62
+    list" src="../img/N900/4_catalog_list-small.png"/> </a>
63
+    </p>
64
+    
65
+    <p>
66
+    Εισάγετε τις ακόλουθες πληροφορίες στην οθόνη προσθήκης καταλόγου:
67
+    <p>
68
+    <pre>
69
+    Όνομα Καταλόγου:    Extras devel
70
+    Διεύθυνση Web:    http://repository.maemo.org/extras-devel/
71
+    Διανομή:        fremantle
72
+    Συστατικά:    free non-free
73
+    </pre>
74
+    </p>
75
+    <br /> Βεβαιωθείτε ότι το 'Απενεργοποιημένο' δεν είναι επιλεγμένο και
76
+    πατήστε 'Αποθήκευση' και περιμένετε να ανανεωθεί η λίστα των πακέτων.<br />
77
+    <a href="../img/N900/5_new_catalog.png"> <img border="0" alt="N900 new
78
+    catalog" src="../img/N900/5_new_catalog-small.png"/> </a>
79
+    </p>
80
+    
81
+    <p>
82
+    Πατήστε 'Λήψη' στον διαχειριστή Εφαρμογών: <br /> <a
83
+    href="../img/N900/6_app_manager.png"> <img border="0" alt="N900 app manager"
84
+    src="../img/N900/6_app_manager-small.png"/> </a>
85
+    </p>
86
+    
87
+    <p>
88
+    Επιλέξτε την κατηγορία Δικτύου (ή αναζητήστε το Tor): <br /> <a
89
+    href="../img/N900/7_app_categories.png"> <img border="0" alt="N900
90
+    application categories" src="../img/N900/7_app_categories-small.png"/> </a>
91
+    </p>
92
+    
93
+    <p>
94
+    Κυλήστε την λίστα προς τα κάτω και επιλέξτε 'Εφαρμογίδιο Περιοχής Κατάστασης
95
+    Tor': <br /> <a href="../img/N900/8_app_list.png"> <img border="0" alt="N900
96
+    application list" src="../img/N900/8_app_list-small.png"/> </a>
97
+    </p>
98
+    
99
+    <p>
100
+    Συμφωνήστε με την δήλωση και πατήστε 'Συνέχεια': <br /> <a
101
+    href="../img/N900/9_disclaimer.png"> <img border="0" alt="N900 disclaimer"
102
+    src="../img/N900/9_disclaimer-small.png"/> </a>
103
+    </p>
104
+    
105
+    <p>
106
+    Όταν η εγκατάσταση ολοκληρωθεί απενεργοποιήστε το αποθετήριο extras-level
107
+    και επανεκκινήστε την συσκευή σας: <br /> <a
108
+    href="../img/N900/10_success.png"> <img border="0" alt="N900 success"
109
+    src="../img/N900/10_success-small.png"/> </a>
110
+    </p>
111
+    
112
+    <p>
113
+    Μετά την επανεκκίνηση του Ν900 ανοίξτε το μενού κατάσταση: <br /> <a
114
+    href="../img/N900/11_after_rebooting.png"> <img border="0" alt="N900 status
115
+    menu post-reboot" src="../img/N900/11_after_rebooting-small.png"/> </a>
116
+    </p>
117
+    
118
+    <p>
119
+    Επιλέξτε από την λίστα "Ο Δρομολογητής Onion': <br /> <a
120
+    href="../img/N900/12_status_menu.png"> <img border="0" alt="N900 status menu
121
+    selection" src="../img/N900/12_status_menu-small.png"/> </a>
122
+    </p>
123
+    
124
+    <p>
125
+    Ενεργοποιήστε την δρομολόγηση onion και πατήστε 'Αποθήκευση': <br /> <a
126
+    href="../img/N900/13_enable_tor.png"> <img border="0" alt="N900 enabling
127
+    Tor" src="../img/N900/13_enable_tor-small.png"/> </a>
128
+    </p>
129
+    
130
+    <p>
131
+    Επισκεφθείτε την ιστοσελίδα <a
132
+    href="https://check.torproject.org/">TorCheck</a> για να επιβεβαιώσετε ότι
133
+    κατευθείνετε την κυκλοφορία του φυλλομετρητή σας μέσω του Tor: <br /> <a
134
+    href="../img/N900/14_check_tor.png"> <img border="0" alt="N900 check Tor"
135
+    src="../img/N900/14_check_tor-small.png"/> </a>
136
+    </p>
137
+    
138
+    <p>
139
+    Σημειώστε ότι η διαδικασία αυτή δεν παρέχει πάντοτε την πιο πρόσφατη σταθερή
140
+    έκδοση.  Επιπρόσθετε, ο φυλλομετρητής του Ν900 δεν διαθέτει Torbutton. Αυτό
141
+    δεν είναι κατάλληλο για απαιτήσεις ισχυρής ανωνυμίας.
142
+    </p>
143
+    
144
+    <hr />
145
+    
146
+    <p>Αν έχετε προτάσεις για βελτίωση αυτού του εγγράφου, παρακαλούμε να μας τις
147
+    <a href="<page about/contact>">στείλετε</a>. Ευχαριστούμε!</p>
148
+  </div>
149
+  <!-- END MAINCOL -->
150
+  <div id = "sidecol">
151
+#include "side.wmi"
152
+#include "info.wmi"
153
+  </div>
154
+  <!-- END SIDECOL -->
155
+</div>
156
+<!-- END CONTENT -->
157
+#include <foot.wmi>   
... ...
@@ -0,0 +1,120 @@
1
+## translation metadata
2
+# Revision: $Revision: 22269 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Vidalia: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian-vidalia>">Vidalia Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="debian"></a> <a id="packages"></a>
14
+    <h2><a class="anchor" href="#debian">Το Vidalia σε Ubuntu ή Debian</a></h2>
15
+    <br />
16
+    
17
+    <p>
18
+    <b>Μην χρησιμοποιείτε τα πακέτα universe του Ubuntu.</b> Δεν συντηρούνται
19
+    και είναι παρωχημένα. Αυτό σημαίνει ότι δεν θα έχετε ενημερώσεις βελτίωσης
20
+    της σταθερότητας και της ασφάλειας.
21
+    </p>
22
+    
23
+    <p>
24
+    You'll need to set up our package repository before you can fetch
25
+    Vidalia. First, you need to figure out the name of your distribution. If
26
+    you're using Ubuntu 9.10 or 10.04, it's "karmic", while 9.04 is "jaunty",
27
+    8.10 is "intrepid", and 8.04 is "hardy". If you're using Debian Etch, it's
28
+    "etch", and Debian Lenny is "lenny". Then add this line to your
29
+    <tt>/etc/apt/sources.list</tt> file:<br />
30
+    <pre>
31
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
32
+    </pre>
33
+    στην οποία πρέπει να θέσετε τις παραπάνω λέξεις (etch, lenny, sid, karmic,
34
+    jaunty, intrepid, hardy) στην θέση της λέξης &lt;DISTRIBUTION&gt;.
35
+    </p>
36
+    
37
+    <p>
38
+    Προσθέστε μετά το κλειδί gpg που χρησιμοποιείται για την υπογραφή των
39
+    πακέτων, εκτελώντας τις ακόλουθες εντολές σε ένα τερματικό:
40
+    <pre>
41
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
42
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
43
+    </pre>
44
+    Ανανεώστε τις πηγές λογισμικού και εγκαταστήστε το Vidalia εκτελώντας τις
45
+    ακόλουθες εντολές στην γραμμή εντολής:
46
+    <pre>
47
+    apt-get update
48
+    apt-get install vidalia 
49
+    </pre>
50
+    </p>
51
+    
52
+    <p>
53
+    Το Vidalia εγκαταστάθηκε και εκτελείται. Πηγαίνετε στο <a href="<page
54
+    docs/tor-doc-unix>#polipo">δεύτερο βήμα</a> των οδηγιών "Το Vidalia σε
55
+    Linux/Unix".
56
+    </p>
57
+    
58
+    <p style="font-size: small">
59
+    Το όνομα DNS <code>deb.torproject.org</code> είναι ένα σύνολο ανεξάρτητων
60
+    διακομιστών με ρύθμιση για Round Robin DNS. Αν για κάποιον λόγο δεν έχετε
61
+    πρόσβαση σε αυτό, μπορείτε αντ' αυτού να χρησιμοποιήσετε το όνομα ενός
62
+    τμήματός του. Δοκιμάστε τα <code>deb-master.torproject.org</code>,
63
+    <code>mirror.netcologne.de</code> ή <code>vidalia.mirror.youam.de</code>.
64
+    </p>
65
+    
66
+    <hr />
67
+    
68
+    <a id="source"></a>
69
+    <h2><a class="anchor" href="#source">Εγκατάσταση από τον πηγαίο κώδικα</a></h2>
70
+    <br />
71
+    
72
+    <p>
73
+    Αν θέλετε να φτιάξετε τα δικά σας αρχεία deb από τον πηγαίο κώδικα, πρέπει
74
+    πρώτα να προσθέσετε την κατάλληλη γραμμή <tt>deb-src</tt> στο αρχείο
75
+    <tt>sources.list</tt>.
76
+    <pre>
77
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
78
+    </pre>
79
+    Πρέπει επίσης να εγκαταστήσετε τα απαραίτητα πακέτα που βοηθούν στην
80
+    κατασκευή των αρχείων deb και τα πακέτα που χρειάζονται για την δημιουργία
81
+    των πακέτων deb για το Vidalia:
82
+    <pre>
83
+    apt-get install build-essential fakeroot devscripts qt4-dev-tools qt4-designer libqt4-dev g++ cmake
84
+    apt-get build-dep vidalia
85
+    </pre>
86
+    Έπειτα μπορείτε να δημιουργήσετε τα αρχεία deb για το Vidalia στον κατάλογο
87
+    ~/debian-packages:
88
+    <pre>
89
+    mkdir ~/debian-packages; cd ~/debian-packages
90
+    apt-get source vidalia
91
+    cd vidalia-*
92
+    debuild -rfakeroot -uc -us
93
+    cd ..
94
+    </pre>
95
+    Τώρα μπορείτε να εγκαταστήσετε τα νέα πακέτα:
96
+    <pre>
97
+    sudo dpkg -i vidalia_*.deb
98
+    </pre>
99
+    </p>
100
+    
101
+    <p>
102
+    Το Vidalia εγκαταστάθηκε και εκτελείται. Πηγαίνετε στο <a href="<page
103
+    docs/tor-doc-unix>#polipo">δεύτερο βήμα</a> των οδηγιών "Το Vidalia σε
104
+    Linux/Unix".
105
+    </p>
106
+    
107
+    <hr />
108
+    
109
+    <p>Αν έχετε προτάσεις για την βελτίωση του παρόντος εγγράφου, παρακαλούμε <a
110
+    href="<page about/contact>">να τις υποβάλετε</a>. Ευχαριστούμε!</p>
111
+  </div>
112
+  <!-- END MAINCOL -->
113
+  <div id = "sidecol">
114
+#include "side.wmi"
115
+#include "info.wmi"
116
+  </div>
117
+  <!-- END SIDECOL -->
118
+</div>
119
+<!-- END CONTENT -->
120
+#include <foot.wmi>   
... ...
@@ -0,0 +1,189 @@
1
+## translation metadata
2
+# Revision: $Revision: 22268 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian>">Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="debian"></a>
14
+    <h2><a class="anchor" href="#debian">Επιλογή πρώτη: Το Tor σε Debian lenny,
15
+    Debian sid ή Debian testing</a></h2>
16
+    <br />
17
+    
18
+    <p>
19
+    If you're using Debian stable (lenny), unstable (sid), or testing (squeeze),
20
+    just run<br />
21
+    <tt>apt-get install tor tor-geoipdb</tt> as root.
22
+    </p>
23
+    
24
+    <p>
25
+    Σημειώστε ότι η διαδικασία αυτή δεν παρέχει πάντοτε την τελευταία σταθερή
26
+    έκδοση, αλλά θα λαμβάνετε σημαντικές ενημερώσεις ασφαλείας. Για να
27
+    βεβαιωθείτε ότι έχετε την πιο πρόσφατη σταθερή έκδοση του Tor, δείτε την
28
+    δεύτερη επιλογή πιο κάτω.
29
+    </p>
30
+    
31
+    <p>
32
+    Το Tor είναι τώρα εγκατεστημένο και εκτελείται. Πηγαίνετε στο <a href="<page
33
+    docs/tor-doc-unix>#polipo">δεύτερο βήμα</a> των οδηγιών "Το Tor σε
34
+    Linux/Unix".
35
+    </p>
36
+    
37
+    <hr />
38
+    
39
+    <a id="ubuntu"></a> <a id="packages"></a>
40
+    <h2><a class="anchor" href="#ubuntu">Δεύτερη επιλογή: Tο Tor σε Ubuntu ή
41
+    Debian</a></h2>
42
+    <br />
43
+    
44
+    <p>
45
+    <b>Μην χρησιμοποιείτε τα πακέτα του Ubuntu universe.</b> Δεν συντηρούνται
46
+    και είναι παρωχημένα. Αυτό σημαίνει ότι δεν θα παραλαμβάνετε ενημερώσεις
47
+    σταθερότητας και ασφάλειας.
48
+    </p>
49
+    
50
+    <p>
51
+    You'll need to set up our package repository before you can fetch
52
+    Tor. First, you need to figure out the name of your distribution. If you're
53
+    using Ubuntu 9.10 or 10.04, it's "karmic", while 9.04 is "jaunty", 8.10 is
54
+    "intrepid", and 8.04 is "hardy". If you're using Debian Etch, it's "etch",
55
+    and Debian Lenny is "lenny". Then add this line to your
56
+    <tt>/etc/apt/sources.list</tt> file:<br />
57
+    <pre>
58
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
59
+    </pre>
60
+    όπου στην θέση &lt;DISTRIBUTION&gt; πληκτρολογείτε την κωδική ονομασία της
61
+    διανομής σας (δηλαδή, etch, lenny, sid, karmic, jaunty, intrepid, hardy ή
62
+    όποια είναι η ονομασία αυτή).
63
+    </p>
64
+    
65
+    <p>
66
+    Μετά προσθέστε το κλειδί gpg με το οποίο υπογράφονται τα πακέτα εκτελώντας
67
+    την ακόλουθη εντολή στην γραμμή εντολής:
68
+    <pre>
69
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
70
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
71
+    </pre>
72
+    Ανανεώστε τις πηγές λογισμικού και εγκαταστήστε το Tor εκτελώντας την
73
+    ακόλουθη εντολή στην γραμμή εντολής:
74
+    <pre>
75
+    apt-get update
76
+    apt-get install tor tor-geoipdb
77
+    </pre>
78
+    </p>
79
+    
80
+    <p>
81
+    Το Tor είναι τώρα εγκατεστημένο και εκτελείται. Πηγαίνετε στο <a href="<page
82
+    docs/tor-doc-unix>#polipo">δεύτερο βήμα</a> των οδηγιών "Το Tor σε
83
+    Linux/Unix".
84
+    </p>
85
+    
86
+    <p style="font-size: small">
87
+    Το όνομα DNS <code>deb.torproject.org</code> είναι απλώς ένα σύνολο
88
+    ανεξάρτητων διακομιστών ρυθμισμένο ως DNS round robin. Αν για κάποιον λόγο
89
+    δεν έχετε πρόσβαση σε αυτό, δοκιμάστε να χρησιμοποιήσετε κάποιο από τα μέρη
90
+    του. Δοκιμάστε <code>deb-master.torproject.org</code>,
91
+    <code>mirror.netcologne.de</code> ή <code>tor.mirror.youam.de</code>.
92
+    </p>
93
+    
94
+    <hr />
95
+    
96
+    <a id="development"></a>
97
+    <h2><a class="anchor" href="#development">Τρίτη επιλογή: Χρήση του κλάδου
98
+    ανάπτυξης του Tor σε Debian ή Ubuntu</a></h2>
99
+    <br />
100
+    
101
+    <p>If you want to use the <a href="<page download/download>#packagediff">development
102
+    branch</a> of Tor instead (more features and more bugs), you need to add a
103
+    different set of lines to your <tt>/etc/apt/sources.list</tt> file:<br />
104
+    <pre>
105
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
106
+    deb     http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
107
+    </pre>
108
+    όπου και πάλι βάζετε το όνομα της διανομής σας (etch, lenny, sid, karmic,
109
+    jaunty, intrepid, hardy) στη θέστη του &lt;DISTRIBUTION&gt;.
110
+    </p>
111
+    
112
+    <p>
113
+    Μετά εκτελέστε την ακόλουθη εντολή από την γραμμή εντολής:
114
+    <pre>
115
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
116
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
117
+    apt-get update
118
+    apt-get install tor tor-geoipdb
119
+    </pre>
120
+    </p>
121
+    
122
+    <p>
123
+    Το Tor είναι τώρα εγκατεστημένο και εκτελείται. Πηγαίνετε στο <a href="<page
124
+    docs/tor-doc-unix>#polipo">δεύτερο βήμα</a> των οδηγιών "Το Tor σε
125
+    Linux/Unix".
126
+    </p>
127
+    
128
+    <hr />
129
+    
130
+    <a id="source"></a>
131
+    <h2><a class="anchor" href="#source">Εγκατάσταση από τον πηγαίο κώδικα</a></h2>
132
+    <br />
133
+    
134
+    <p>
135
+    Εάν θέλετε να δημιουργήσετε τα δικά σας αρχεία deb από τον πηγαίο κώδικα,
136
+    πρώτα πρέπει να προσθέσετε μια κατάλληλη γραμμή <tt>deb-src</tt> στο αρχείο
137
+    <tt>sources.list</tt>.
138
+    <pre>
139
+    # For the stable version.
140
+    # For the unstable version.
141
+    
142
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
143
+    
144
+    
145
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
146
+    deb-src http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
147
+    </pre>
148
+    Πρέπει, επίσης, να εγκαταστήσετε τα αναγκαία πακέτα για την δημιουργία των
149
+    δικών σας αρχείων deb και τα πακέτα που χρειάζονται για την δημιουργία του
150
+    Tor:
151
+    <pre>
152
+    apt-get install build-essential fakeroot devscripts
153
+    apt-get build-dep tor
154
+    </pre>
155
+    Έπειτα μπορείτε να δημιουργήσετε τα αρχεία deb για το Tor στον κατάλογο
156
+    ~/debian-packages:
157
+    <pre>
158
+    mkdir ~/debian-packages; cd ~/debian-packages
159
+    apt-get source tor
160
+    cd tor-*
161
+    debuild -rfakeroot -uc -us
162
+    cd ..
163
+    </pre>
164
+    Μπορείτε, τώρα, να εγκαταστήσετε τα νέα πακέτα:
165
+    <pre>
166
+    sudo dpkg -i tor_*.deb
167
+    </pre>
168
+    </p>
169
+    
170
+    <p>
171
+    Το Tor είναι τώρα εγκατεστημένο και εκτελείται. Πηγαίνετε στο <a href="<page
172
+    docs/tor-doc-unix>#polipo">δεύτερο βήμα</a> των οδηγιών "Το Tor σε
173
+    Linux/Unix".
174
+    </p>
175
+    
176
+    <hr />
177
+    
178
+    <p>Αν έχετε προτάσεις για την βελτίωση του παρόντος εγγράφου, παρακαλούμε να
179
+    μας τις href="<page about/contact>">στείλετε</a>. Ευχαριστούμε!</p>
180
+  </div>
181
+  <!-- END MAINCOL -->
182
+  <div id = "sidecol">
183
+#include "side.wmi"
184
+#include "info.wmi"
185
+  </div>
186
+  <!-- END SIDECOL -->
187
+</div>
188
+<!-- END CONTENT -->
189
+#include <foot.wmi>   
... ...
@@ -0,0 +1,78 @@
1
+## translation metadata
2
+# Revision: $Revision: 21907 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: CentOS/Fedora/OpenSUSE Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/rpms>">RPMs</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="rpms"></a>
14
+    <h2><a class="anchor" href="#rpms">Πακέτα Tor για διανομές Linux που βασίζονται
15
+    σε rpm.</a></h2>
16
+    <br />
17
+    
18
+    <p>Μην χρησιμοποιείτε τα πακέτα των εσωτερικών ή τοπικών αποθετηρίων. Συχνά
19
+    είναι παρωχημένα. Αυτό σημαίνει ότι δεν θα έχετε ενημερώσεις σταθερότητας
20
+    και ασφάλειας.
21
+    </p>
22
+    
23
+    <p>
24
+    Πριν κατεβάσετε το Tor πρέπει να ρυθμίσετε το αποθετήριο των πακέτων
25
+    μας. Υποθέτοντας ότι χρησιμοποιείτε yum, στον κατάλογο /etc/yum.repos.d/
26
+    δημιουργείστε ένα αρχείο με όνομα torproject.repo. Επεξεργαστείτε το αρχείο
27
+    αυτό με τις ακόλουθες πληροφορίες:
28
+    <pre>[torproject]
29
+    name=Tor and Vidalia
30
+    enabled=1
31
+    autorefresh=0
32
+    baseurl=http://deb.torproject.org/torproject.org/rpm/DISTRIBUTION/
33
+    type=rpm-md
34
+    gpgcheck=1
35
+    gpgkey=http://deb.torproject.org/torproject.org/rpm/RPM-GPG-KEY-torproject.org
36
+    </pre>
37
+    
38
+    Αν θέλετε να ακολουθήσετε τις σταθερές εκδόσεις του Tor, πρέπει να
39
+    αντικαταστήσετε τη λέξη DISTRIBUTION με ένα από τα ακόλουθα: centos4,
40
+    centos5, fc10, fc11, fc12, suse</p>
41
+    
42
+    <p>Αν θέλετε να ακολουθείτε τις πειραματικές εκδόσεις, αντικαταστήστε τη λέξη
43
+    DISTRIBUTION με κάποιο από τα ακόλουθα: centos4-experimental,
44
+    centos5-experimental, fc10-experimental, fc11-experimental,
45
+    fc12-experimental, suse-experimental</p>
46
+    
47
+    <p>
48
+    To Tor είναι εγκατεστημένο και εκτελείται. Πηγαίνετε στο <a href="<page
49
+    docs/tor-doc-unix>#polipo">δεύτερο βήμα</a> των οδηγιών "Το Tor σε
50
+    Linux/Unix".
51
+    </p>
52
+    
53
+    <p style="font-size: small">
54
+    Το όνομα DNS <code>deb.torproject.org</code> είναι στην πραγματικότητα ένα
55
+    σύνολο ανεξάρτητων διακομιστών ρυθμισμένων ως DNS round robin. Αν για
56
+    κάποιον λόγο δεν έχετε πρόσβαση σε αυτό, δοκιμάστε το όνομα ενός από τα μέρη
57
+    του. Δοκιμάστε τα <code>deb-master.torproject.org</code>,
58
+    <code>mirror.netcologne.de</code> ή <code>tor.mirror.youam.de</code>.
59
+    </p>
60
+    
61
+    <hr />
62
+    
63
+    <hr />
64
+    
65
+    <a id="source"></a>
66
+    <h2><a class="anchor" href="#source">Κατασκευή από τον πηγαίο κώδικα</a></h2>
67
+    <br />
68
+    
69
+    <p>
70
+    Αν θέλετε να κατασκευάσετε τα αρχεία από τον πηγαίο κώδικα, διαβάστε τις <a
71
+    href="<gitblob>doc/tor-rpm-creation.txt">οδηγίες δημιουργίας rpm</a>.
72
+    </p>
73
+    
74
+    <hr />
75
+    
76
+    <p>Αν έχετε προτάσεις για βελτίωση του παρόντος εγγράφου, παρακαλούμε να μας
77
+    τις <a href="<page about/contact>">στείλετε</a>. Ευχαριστούμε!</p>
78
+
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,219 @@
1
+## translation metadata
2
+# Revision: $Revision: 22305 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Mac OS X Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-osx>">Mac OS X Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Εκτέλεση του προγράμματος-πελάτη <a href="<page index>">Tor</a> σε Mac OS X</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>Αυτές οι οδηγίες εγκατάστασης ενός πελάτη Tor είναι για Mac OS X.  Αν
18
+    επιθυμείτε να αναμεταδίδετε την κυκλοφορία του δικτύου για άλλους ώστε να
19
+    αναπτυχθεί το δίκτυο (παρακαλούμε να το κάνετε), διαβάστε τον οδηγό <a
20
+    href="<page docs/tordoc-relay>">Ρυθμίζοντας έναν ενδιάμεσο</a>.</b>
21
+    </p>
22
+    
23
+    <hr />
24
+    <a id="installing"></a>
25
+    <h2><a class="anchor" href="#installing">Βήμα Πρώτο: Λήψη και Εγκατάσταση του
26
+    Tor</a></h2>
27
+    <br />
28
+    
29
+    <p>
30
+    The install for Macintosh OS X bundles <a href="<page index>">Tor</a>, <a
31
+    href="<page projects/vidalia>">Vidalia</a> (a graphical interface for Tor), <a
32
+    href="<page projects/torbutton>">Torbutton</a>, and <a
33
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (a web
34
+    proxy)  into one package, with the four applications pre-configured to work
35
+    together.  Download either the <a
36
+    href="../<package-osx-bundle-stable>">stable</a> or the <a
37
+    href="../<package-osx-bundle-alpha>">experimental</a> version of the OS X
38
+    bundle for Intel, or look for more options on the <a href="<page
39
+    download/download>">download page</a>.
40
+    </p>
41
+    
42
+    <p>Όταν παραλάβετε το αρχείο dmg κάνετε δυο κλικ στην εικόνα του ώστε να
43
+    συνδεθεί.  Μέσα από τον Finder περιηγηθείτε στο Πακέτο Vidalia το οποίο
44
+    εγκαθίσταται εύκολα· απλά σύρετε την εικόνα του κρεμυδιού του Vidalia και
45
+    αποθέστε την στον κατάλογο Applications.  Εναλλακτικά, κάνετε διπλό κλικ στο
46
+    σενάριο "εγκατάσταση του torbutton" για να ενσωματωθεί το torbutton στo
47
+    Firefox.  Επίσης, μπορείτε να λάβετε το Torbutton από τα Mozilla Add-ons
48
+    αναζητώντας για "torbutton".</p>
49
+    
50
+    <p>Όταν ολοκληρώσετε την εγκατάσταση μπορείτε να εκκινήσετε το Vidalia
51
+    επιλέγοντας το εικονίδιό του απο τον κατάλογο Applications.  Το μαύρο
52
+    κρεμύδι με ένα κόκκινο Χ στην περιοχή συστήματος σημαίνει ότι το Tor δεν
53
+    εκτελείται.  Μπορείτε να εκκινήσετε το Tor επιλέγοντας "Εκκίνηση" από το
54
+    μενού Tor στο επάνω μέρος της οθόνης σας.
55
+    </p>
56
+    
57
+    <p>Ότα το Tor εκτελείται, το εικονίδιο της περιοχής συστήματος του Vidalia θα
58
+    μοιάζει με το ακόλουθο:
59
+    </p>
60
+    
61
+    <p><img alt="vidalia running tor"
62
+    src="../img/screenshot-osx-vidalia.png"
63
+    border="1"/></p>
64
+    
65
+    <p>Το Polipo εγκαθίσαται ως μέρος του πακέτου εγκατάστασης Tor.  Όταν
66
+    εγκατασταθεί θα εκκινεί κάθε φορά που θα εκκινεί ο υπολογιστής σας.  Δεν
67
+    χρειάζεται να ρυθμίσετε το Polipo για να χρησιμοποιεί το Tor &mdash· υπάρχει
68
+    εγκατεστημένη μια προσαρμοσμένη ρύθμιση του Polipo ως μέρος του πακέτου
69
+    εγκατάστασης.
70
+    </p>
71
+    
72
+    <hr />
73
+    <a id="using"></a>
74
+    <h2><a class="anchor" href="#using">Βήμα Δεύτερο: Ρυθμίστε τις εφαρμογές σας
75
+    ώστε να χρησιμοποιούν Tor</a></h2>
76
+    <br />
77
+    
78
+    <p>Μετά την εγκατάσταση, πρέπει να ρυθμίσετε τις εφαρμογές σας.  Το πρώτο βήμα
79
+    είναι η ρύθμιση του περιηγητή σας.</p>
80
+    
81
+    <p>Για μεγαλύτερη ασφάλεια, πρέπει να χρησιμοποιείται το Tor μαζί με το Firefox
82
+    και το Torbutton.  Το Torbutton έχει ήδη εγκατασταθεί.  Κάνετε κλικ στο
83
+    κόκκινο κουμπί "Απενεργοποιημένο Tor" για να το ενεργοποιήσετε και είστε
84
+    έτοιμοι: </p>
85
+    
86
+    <p><img alt="Torbutton plugin for Firefox"
87
+    src="../img/screenshot-torbutton.png"
88
+    border="1"/></p>
89
+    
90
+    <p>
91
+    Αν σκοπεύετε να εκτελείτε τον Firefox σε διαφορετικό υπολογιστή από εκείνον
92
+    του Tor, διαβάστε το <a
93
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">FAQ
94
+    για την εκτέλεση του Tor σε διαφορετικό υπολογιστή</a>.
95
+    </p>
96
+    
97
+    <p>Για να συνεργαστούν με το Tor οι άλλες εφαρμογές που χρησιμοποιούν
98
+    πληρεξούσιους διακομιστές HTTP, απλώς δηλώστε τους στο Polipo (δηλαδή, ως
99
+    localhost θύρα 8118).  Για απευθείας χρήση του SOCKS (για άμεσα μηνύματα,
100
+    Jabber, IRC, κ.λ.π.) μπορείτε να δηλώσετε την εφαρμογή σας απευθείας στο Tor
101
+    (localhost θύρα 9050), αλλά διαβάστε <a
102
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">αυτό
103
+    το FAQ</a> για τους λόγους που αυτό είναι επικίνδυνο.  Για εφαρμογές που δεν
104
+    υποστηρίζουν ούτε SOCKS ούτε HTTP, διαβάστε το <a
105
+    href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a> ή το<a
106
+    href="http://www.dest-unreach.org/socat/">socat</a>.</p>
107
+    
108
+    <p>Για πληροφορίες πώς να ρυθμίσετε άλλες εφαρμογές, διαβάστε το <a
109
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
110
+    HOWTO</a>.
111
+    </p>
112
+    
113
+    <hr />
114
+    <a id="verify"></a>
115
+    <h2><a class="anchor" href="#verify">Βήμα Τρίτο: Βεβαιωθείτε ότι δουλεύει</a></h2>
116
+    <br />
117
+    
118
+    <p>
119
+    Επόμενο βήμα, χρησιμοποσιείστε τον περιηγητή σας με το Tor βεβαιωθείτε ότι η
120
+    διεύθυνσή σας ΙΡ είναι ανώνυμη.  Κάνετε κλικ στον <a
121
+    href="https://check.torproject.org/">ανιχνευτή Tor</a> και βεβαιωθείτε ότι
122
+    πράγματι χρησιμοποιείτε το δίκτυ Tor.  (Αν ο ιστότοπος είναι εκτός
123
+    λειτουργίας, διαβάστε <a
124
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">αυτό
125
+    το FAQ</a> για περισσότερες επιλογές για τρόπους ελέγχου του Tor.
126
+    </p>
127
+    
128
+    <p>Αν έχετε κάποιο προσωπικό τείχος προστασίας που περιορίζει την δυνατότητα
129
+    σύνδεσης του υπολογιστή σας, βεβαιωθείτε ότι επιτρέπετε τις συνδέσεις από
130
+    τις εφαρμογές σας προς τις θύρες 8118 και 9050.  Αν το τείχος προστασίας
131
+    εμποδίζει τις εξερχόμενες συνδέσεις, ρυθμίστε το ώστε να επιτρέπει συνδέσεις
132
+    τουλάχιστον στις θύρες TCP 80 και 443 και έπειτα διαβάστε <a
133
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">αυτό
134
+    το FAQ</a>.
135
+    </p>
136
+    
137
+    <p>Αν εξακολουθεί να μην δουλεύει, διαβάστε <a
138
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">αυτό
139
+    το FAQ</a> για συμβουλές.</p>
140
+    
141
+    <p>
142
+    Όταν δουλέψει, διαβάστε <a href="<page download/download>#Warning">τι προσφέρει και
143
+    τι όχι το Tor</a>.
144
+    </p>
145
+    
146
+    <hr />
147
+    <a id="server"></a> <a id="relay"></a>
148
+    <h2><a class="anchor" href="#relay">Βήμα Τέταρτο: Ρυθμίστε το ως ενδιάμεσο</a></h2>
149
+    <br />
150
+    
151
+    <p>Για να παρέχει (ικανοποιητικό) εύρος ζώνης, το δίκτυο Tor βασίζεται σε
152
+    εθελοντές.  Όσο περισσότεροι λειτουργούν έναν ενδιάμεσο αναμεταδότη, τόσο
153
+    ταχύτερο θα είναι το δίκτυο Tor.  Αν διαθέτετε τουλάχιστον 20 kilobytes/sec
154
+    προς κάθε κατεύθυνση, παρακαλούμε βοηθείστε το Tor ρυθμίζοντάς το ώστε να
155
+    λειτουργεί και σαν ενδιάμεσος.  Πολλά χαρακτηριστικά κάνουν τους ενδιάμεσους
156
+    Tor εύκολους και βολικούς, όπως περιορισμός ρυθμού ευρυζωνικότητας,
157
+    πολιτικές εξόδου ώστε να μην προκαλείτε διαμαρτυρίες κακομεταχείρισης ή
158
+    κατάχρησης και υποστήριξη για δυναμικές διευθύνσεις ΙΡ.</p>
159
+    
160
+    <p>Η ύπαρξη αναμεταδοτών σε πολλές διαφορετικές τοποθεσίες στο Διαδίκτυο είναι
161
+    αυτό που καθιστά ασφαλείς τους χρηστες Tor.  <a
162
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">Έχετε
163
+    τη δυνατότητα να απολαμβάνετε και οι ίδιοι ισχυρή ανωνυμία</a>, αφού τα
164
+    sites δεν θα γνωρίζουν αν οι συνδέσεις προέρχονται από τον υπολογιστή σας ή
165
+    αναμεταδίδονται από άλλους.</p>
166
+    
167
+    <p>Για περισσοτερα, διαβάστε τον οδηγό μας <a href="<page
168
+    docs/tor-doc-relay>">Ρυθμίζοντας ένα ενδιάμεσο αναμεταδότη</a>.</p>
169
+    
170
+    <hr />
171
+    <a id="uninstall"></a>
172
+    <h2><a class="anchor" href="#uninstall">Πώς να απεγκαταστήσω το Tor και το
173
+    Privoxy</a></h2>
174
+    <br />
175
+    
176
+    <p>Δυο τρόποι υπάρχουν για την απεγκατάσταση του πακέτου από τον υπολογιστή
177
+    σας: χρησιμοποιώντας το Finder ή την γραμμή εντολής ή το πρόγραμμα
178
+    απεγκατάστασης που βασίζεται στο Τερματικό.  Ιδού πώς:</p>
179
+    
180
+    <p>Αλλάξτε τις ρυθμίσεις του πληρεξούσιου διακομιστή σας (proxy server) στις
181
+    αρχικές τους τιμές.  Μπορείτε να σταματήσετε σ' αυτό το σημείο, αν απλώς
182
+    θέλετε να διακόψετε την χρήση του Tor.</p>
183
+    
184
+    <p>Αν επιθυμείτε να απομακρύνετε ολοκληρωτικά το Tor και ο λογαριασμός σας
185
+    διαθέτει προνόμια διαχειριστή, η διαδικασία έχει ως εξής:</p>
186
+    
187
+    <ol>
188
+    <li>Ανοίξτε τον Finder και κάνετε κλικ στο Applications.</li>
189
+    <li>Σύρετε το /Applications/Vidalia στον Κάδο ανακύκλωσης.</li>
190
+    <li>Διαγράψτε τον κατάλογο /Library/Torbutton από το σύστημά σας.</li>
191
+    <li>Πηγαίνετε στον κατάλογο Library του καταλόγου χρήστη και διαγράψτε τον
192
+    κατάλογο Vidalia</li>
193
+    </ol>
194
+    
195
+    <p>Τα Tor, Vidalia και Polipo έχουν τώρα διαγραφεί από το σύστημά σας.</p>
196
+    
197
+    <p>Αν είστε εξοικειωμένοι με την γραμμή εντολής ή το Τερματικό, μπορείτε να
198
+    απομακρύνετε το Tor χειρονακτικά ως εξής:</p>
199
+    <ul>
200
+    <li>/Applications/Vidalia.app/</li>
201
+    <li>/Library/Torbutton/</li>
202
+    <li>~/Library/Vidalia</li>
203
+    <li>~/.tor</li>
204
+    </ul>
205
+    
206
+    <hr />
207
+    
208
+    <p>Αν έχετε προτάσεις βελτίωσης του παρόντος εγγράφου, παρακαλούμε <a
209
+    href="<page about/contact>">επικοινωνήστε μαζί μας</a>.  Ευχαριστούμε!</p>
210
+  </div>
211
+  <!-- END MAINCOL -->
212
+  <div id = "sidecol">
213
+#include "side.wmi"
214
+#include "info.wmi"
215
+  </div>
216
+  <!-- END SIDECOL -->
217
+</div>
218
+<!-- END CONTENT -->
219
+#include <foot.wmi>    
... ...
@@ -0,0 +1,331 @@
1
+## translation metadata
2
+# Revision: $Revision: 22144 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Relay Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-relay>">Configure Tor Relay</a>
11
+  </div> 
12
+  <div id="maincol">   
13
+    <h1>Ρύθμιση ενός ενδιάμεσου αναμεταδότη Tor</h1>
14
+    
15
+    
16
+    <!-- BEGIN SIDEBAR -->
17
+    <div class="sidebar-left">
18
+    <h3>Βήματα</h3>
19
+    <ol>
20
+    <li><a href="<page docs/tor-doc-relay>#install">Λήψη &amp; Εγκατάσταση</a></li>
21
+    <li><a href="<page docs/tor-doc-relay>#setup">Ρυθμίσεις</a></li>
22
+    <li><a href="<page docs/tor-doc-relay>#check">Έλεγχος &amp; Επιβεβαίωση</a></li>
23
+    <li><a href="<page docs/tor-doc-relay>#after">Τελικά Βήματα</a></li>
24
+    </ol>
25
+    </div>
26
+    
27
+    
28
+    <!-- END SIDEBAR -->
29
+    <hr />
30
+    
31
+    <p>
32
+    Για να προσφέρει εύρος ζώνης, το δίκτυο Tor βασίζεται σε εθελοντές.  Όσο
33
+    περισσότεροι άνθρωποι χρησιμοποιούν/λειτουργούν ενδιάμεσους αναμεταδότες,
34
+    τόσο ταχύτερο θα γίνεται το δίκτυο Tor.  Αν διαθέτετε τουλάχιστον 20
35
+    kilobytes/sec, παρακαλούμε βοηθείστε το Tor ρυθμίζοντάς το ώστε να
36
+    λειτουργεί και ως ενδιάμεσος.  Πολλά χαρακτηριστικά καθιστούν τους
37
+    αναμεταδότες Tor εύκολους και βολικούς, μεταξύ άλλων <a href="<page
38
+    docs/faq>#RelayFlexible">κλίμακες περιορισμού του εύρους ζώνης, πολιτικές εξόδου
39
+    ώστε να περιορίεζετε την έκθεσή σας σε διαμαρτυρίες κατάχρησης και
40
+    υποστήριξη για δυναμικές διευθύνσεις ΙΡ</a>.
41
+    </p>
42
+    
43
+    <p>Μπορείτε να λειτουργείτε έναν ενδιάμεσο Tor <a
44
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayOS">σε
45
+    κάθε</a> λειτουργικό σύστημα.  Οι ενδιάμεσοι Tor δουλεύουν καλύτερα σε
46
+    Linux, OS X Tiger ή νεότερο, FreeBSD 5.x+, NetBSD 5.x+ και Windows Server
47
+    2003 ή νεότερο.
48
+    </p>
49
+    
50
+    <hr /> <a id="zero"></a> <a id="install"></a>
51
+    <h2><a class="anchor" href="#install">Βήμα Πρώτο: Κατεβάστε και Εγκαταστήστε το
52
+    Tor</a></h2>
53
+    <br />
54
+    
55
+    <p>Πριν ξεκινήσετε βεβαιωθείτε ότι το Tor λειτουργεί.
56
+    </p>
57
+    
58
+    <p>Επισκεφθείτε την <a href="<page download/easy-download>">σελια λήψεων</a> και
59
+    εγκαταστείστε το το "Πακέτο Εγκατάστασης" για το δικό σας Λειτουργικό
60
+    Σύστημα.
61
+    </p>
62
+    
63
+    <p>Αν σας βολεύει, μπορείτε να το χρησιμοποιήσετε για λίγο ως πελάτη-client για
64
+    να βεβαιωθείτε ότι πράγματι δουεύει.</p>
65
+    
66
+    <hr /> <a id="setup"></a>
67
+    <h2><a class="anchor" href="#setup">Βήμα Τρίτο: Ρυθμίστε το ως ενδιάμεσο</a></h2>
68
+    <br />
69
+    <ol>
70
+    <li>Βεβαιωθείτε ότι το ρολόι σας και η ζώνη ώρας έχουν ρυθμιστεί σωστά.  Αν
71
+    είναι εφικτό, συγχρονίστε το ρολόι σας με κάποιον δημόσιο <a
72
+    href="http://en.wikipedia.org/wiki/Network_Time_Protocol">διακομιστή
73
+    ώρας</a>.
74
+    </li>
75
+    
76
+    <li><strong>Ρύθμιση του Tor μέσω του Γραφικού Περιβάλλοντος Vidalia</strong>:
77
+    <ol>
78
+    
79
+    <li>
80
+    	<dt>Κάνετε δεξιό κλικ στο εικονίδιο του Vidalia που βρισκεται στην μπάρα
81
+    εργασιών.  Επιλέξτε <tt>Πίνακας Ελέγχου</tt>.</dt>
82
+    	<dd><img alt="vidalia right click menu"
83
+    src="../img/screenshot-win32-vidalia.png"></dd>
84
+    </li>
85
+    
86
+    <li>Click <tt>Ρύθμιση αναμετάδοσης</tt>.</li>
87
+    
88
+    <li>
89
+    	<dt>Επιλεξτε <tt>Ανεμετάδοση κίνησης για το δίκτυο Tor</tt> αν θέλετε να είστε
90
+    δημόσιος αναμεταδότης (συνίσταται), ή επιλέξτε 		<tt>Βοηθείστε λογοκριμένους
91
+    χρήστες να συνδεθούν στο δίκτυο Tor</tt> αν θέλετε να γίνετε <a href="<page
92
+    docs/faq>#RelayOrBridge">γέφυρα</a> για χρήστες χωρών που λογοκρίνεται το
93
+    Διαδίκτυο.</dt>
94
+    <dd><img alt="vidalia basic settings"
95
+    src="../img/screenshot-win32-configure-relay-1.png"></dd>
96
+    </li>
97
+    
98
+    <li>Πληκτρολογήστε ένα όνομα για τον αναμεταδότη σας και γράψτε πληροφορίες
99
+    επικοινωνίας σε περίπτωση που χρειαστεί να επικοινωνήσουμε μαζί σας για
100
+    τυχόν προβλήματα.</li>
101
+    
102
+    <li>Αφήστε επιλεγμένο το <tt>Προσπάθεια αυτόματης ρύθμισης της προώθησης
103
+    θύρας</tt>.  Πατήστε το κουμπί <tt>Δοκιμή</tt> για να διαπιστώσετε ότι
104
+    δουλεύει.  Αν δεν δουλεύει, δείτε τον αριθμό 3 πιο κάτω.</li>
105
+    
106
+    <li><dt>Επιλέξτε τον φάκελο <tt>Περιορισμός εύρους ζώνης</tt>.  Διαλέξτε πόσο εύρος
107
+    δικτύου θέλετε να παράσχετε σε χρήστες Tor σαν εσάς.</dt>
108
+    <dd><img alt="vidalia bandwidth limits"
109
+    src="../img/screenshot-win32-configure-relay-2.png"></dd>
110
+    </li> 
111
+    
112
+    <li><dt>Επιλέξτε τον φάκελο <tt>Πολιτικές εξόδου</tt>.  Αν θέλετε να συνδέονται και
113
+    άλλοι στον αναμεταδότη σας για να χρησιμοποιούν τις υπηρεσίες αυτές, μην
114
+    αλλάξετε κάτι.  Απο-επιλέξτε τις υπηρεσίες που δεν θέλετε να χρησιμοποιούν
115
+    οι άλλοι χρηστες <a href="<page docs/faq>#ExitPolicies">να χρησιμοποιούν μέσω του
116
+    αναμεταδότη σας</a>.  Αν επιθυμείτε ο υπολογιστής σας να μην είναι
117
+    ενδιάμεσος εξόδου, απο-επιλέξτε όλες τις υπηρεσείς.</dt>
118
+    <dd><img alt="vidalia exit policies"
119
+    src="../img/screenshot-win32-configure-relay-3.png"></dd>
120
+    </li>
121
+    
122
+    <li>Πατήστε το κουμπί <tt>ΟΚ</tt>.  Ανατρέξτε στο Τρίτο Βήμα που ακολουθεί για
123
+    να βεβαιωθείτε ότι ο ενδιάμεσός σας λειτουργεί σωστά.</li>
124
+    </ol>
125
+    
126
+    <br /> <strong>Χειροκίνητη ρύθμιση</strong>:
127
+    <ul>
128
+    <li>Επεξεργαστείτε το τελευταίο τμήμα του αρχείου <a
129
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">torrc</a>.
130
+    Αν θέλετε να είστε δημόσιος ενδιάμεσος αναμεταδότης (συνίσταται),
131
+    βεβαιωθείτε ότι έχετε καθορίσει την τιμή ORPort και διαβάστε το <a
132
+    href="<page docs/faq>#ExitPolicies">ExitPolicy</a>· αλλιώς, αν επιθυμείτε ο
133
+    υπολογιστής σας να είναι <a href="<page docs/faq>#RelayOrBridge">γέφυρα</a> για
134
+    χρήστες σε χώρες όπου το Διαδίκτυο λογοκρίνεται, χρησιμοποιείστε <a
135
+    href="<page docs/bridges>#RunningABridge">αυτές τις γραμές</a>.
136
+    </li>
137
+    
138
+    </ul></li>
139
+    
140
+    <li>Αν χρησιμοποιείτε τείχος προστασίας δημιουργείστε ένα άνοιγμα ώστε οι
141
+    εισερχόμενες συνδέσεις να μπορούν να επικοινωνούν με τις θύρες που ρυθμίσατε
142
+    (ORPort, συν την θύρα DirPort, αν την έχετε ενεργοποιήσει).  Αν διαθέτετε
143
+    συσκευή τείχου προστασίας (Linksys, cablemodem, κ.λ.π.) συμβουλευτείτε τον
144
+    ιστότοπο <a href="http://portforward.com/">portforward.com</a>.
145
+    Βεβαιωθείτε, επίσης, ότι επιτρέπετε όλες τις <em>εξερχόμενες</em> συνδέσεις,
146
+    ώστε ο αναμεταδότης σας να επικοινωνεί με άλλους ενδιάμεσους αναμεταδότες
147
+    Tor.
148
+    </li>
149
+    
150
+    <li>Επανεκκινήστε τον ενδιάμεσο αναμεταδότη σας.  Αν <a
151
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">καταγράψει
152
+    προειδοποιητικά μηνύματα</a>, μελετήστε τα.
153
+    </li>
154
+    
155
+    <li>Γίνετε συνδρομητής/τρια στιν λίστα ταχυδρομείου <a
156
+    href="http://archives.seul.org/or/announce/">or-announce</a>.  Έχει μικρή
157
+    κίνηση και θα σας ενημερώνει για νέες σταθερές εκδόσεις.  Ίσως θελήσετε να
158
+    γίνετε συνδρομητής και στις <a href="<page
159
+    docs/documentation>#MailingLists">λίστε με μεγαλύτερη κίνηση</a>.
160
+    </li>
161
+    
162
+    </ol>
163
+    
164
+    <hr /> <a id="check"></a>
165
+    <h2><a class="anchor" href="#check">Βήμα Τρίτο: Βεβαιωθείτε ότι δουλεύει</a></h2>
166
+    <br />
167
+    
168
+    <p>Μόλις ο ενδιάμεσος αναμεταδότης σας συνδεθεί στο δίκτυο, θα προσπαθήσει να
169
+    διαπιστώσει αν οι θύρες που ρυθμίσατε  είναι ανοικτές για το δίκτυο.  Το
170
+    στάδιο αυτό είναι, συνήθως, σύντομο αλλά ίσως χρειαστούν έως και 20 λεπτά.
171
+    Αναζητείστε <a
172
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">κάποιο
173
+    στοιχείο καταγραφής</a> που να μοιάζει με <tt>Ο αυτο-έλεγχος έδειξε ότι οι
174
+    θύρες ORPort είναι ανοικτές για το δίκτυο. Έξοχα.</tt> Αν δεν δείτε αυτό το
175
+    μήνυμα σημαίνει ότι ότι ο αναμεταδότης σας δεν είναι προσβάσιμος από το
176
+    δίκτυο και θα πρέπει να ελέγξετε εκ νέου το τείχος προστασίας σας, να
177
+    βεβαιωθείτε ότι δοκιμάζει την διεύθυνση ΙΡ και τις θύρες που πρέπει, κ.λ.π.
178
+    </p>
179
+    
180
+    <p>Όταν σας δείξει ότι ο αναμεταδότης σας είναι ανοικτός για το υπόλοιπο
181
+    δίκτυο, θα αποστείλει προς τους καταλόγους μια "περιγραφή διακομηστή" ώστε
182
+    να γνωρίζουν τα προγράμματα ποιά διεύθυνση, θύρες, κλείδες,
183
+    κ.λ.π. χρησιμοποιεί ο αναμεταδότης σας.  Μπορείτε να δείτε <a
184
+    href="http://194.109.206.212/tor/status-vote/current/consensus">μια
185
+    κατάσταση του δικτύου χειροκίνητα</a> και να αναζητήσετε σε αυτή το όνομα
186
+    που επιλέξατε για τον αναμεταδότη σας και να βεβαιωθείτε ότι βρίσκεται
187
+    εκεί.  Ίσως χρειαστεί να περιμένετε έως και μια ώρα ώστε να δοθεί χρόνος για
188
+    φρέσκια κατάσταση του δικτύου.</p>
189
+    
190
+    <hr /> <a id="after"></a>
191
+    <h2><a class="anchor" href="#after">Βήμα Τέταρτο: Όταν συνδεθείτε</a></h2>
192
+    <br />
193
+    
194
+    <p>
195
+    Συνιστούμε και τα ακόλουθα βήματα:
196
+    </p>
197
+    
198
+    <p>
199
+    6.  Διαβάστε <a
200
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/OperationalSecurity">περί
201
+    ασφάλειας</a> για να μάθετε πώς θα αυξήσετε την ασφάλεια του ενδιαμέσου σας.
202
+    </p>
203
+    
204
+    <p>
205
+    7.  Αν θέλετε μπορείτε να λειτουργείτε περισσότερους του ενός ενδιάμεσους
206
+    αναμεταδότες, αλλά παρακαλείστε να ορίσετε <a
207
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#MultipleRelays">την
208
+    επιλογή MyFamily</a> σε όλα τα αρχεία ρυθμίσεων των αναμεταδοτών σας.
209
+    </p>
210
+    
211
+    <p>
212
+    8.  Αποφασίστε κάποιο όριο εύρους ζώνης.  Τα καλωδιακά μόντεμς, το DSL και
213
+    οι άλλοι χρήστες με ασύμμετρο εύρος ζώνης (π.χ. μεγαλύτερη ταχύτητα λήψεων
214
+    από ό,τι αποστολής) πρέπει να περιορίσουν το όριο αυτό στο μικρότερο εύρος
215
+    ζώνης που διαθέτου για να αποφύγουν την συμφόρηση.  Για λεπτομέρειες
216
+    διαβάστε το <a
217
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">FAQ
218
+    περιορισμού του εύρους ζώνης</a>
219
+    </p>
220
+    
221
+    <p>
222
+    9.  Διατηρείτε αντίγραφα ασφαλείας του ιδιωτικού κλειδιού για το Tor
223
+    (βρίσκεται αποθηκευμένο στον κατάλογο "keys/secret_id_key" του καταλόγου
224
+    DataDirectory).  Το κλειδί αυτό αποτελεί την "ταυτότητα" του αναμεταδότη σας
225
+    και πρέπει να αποθηκεύεται με ασφάλεια ώστε να μην μπορεί κάποιος να
226
+    εντοπίσει την κίνηση που διεξάγεται μέσω αυτού.  Η ασφαλής αποθήκευση του
227
+    αρχείου αυτού είναι ζωτικής σημασίας για την <a
228
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#UpgradeRelay">μετακίνηση
229
+    ή αποκατάσταση του αναμεταδότη σας Tor</a> σε περιπτώσεις που κάτι πάει
230
+    στραβά.
231
+    </p>
232
+    
233
+    <p>
234
+    
235
+    10.  Αν έχετε τον έλεγχο των διακομηστών (name servers) της δικτυακής
236
+    περιοχής σας (domain) φροντίστε να ρυθμίσετε τον αντίστροφο διακομιστή DNS
237
+    σε 'anonymous-relay', 'proxy' ή 'tor-proxy' ώστε, σε περίπτωση που άλλοι
238
+    χρήστες βλέπουν την διεύθυνση στις δικές τους καταγραφές web, θα αντιληφθούν
239
+    ταχύτερα το πρόβλημα.  Η προσθήκη της <a
240
+    href="<gitblob>contrib/tor-exit-notice.html">σημείωσης εξόδου Tor</a> σε
241
+    έναν vhost για το συγκεκριμένο όνομα υπολογιστή μπορεί να συμβάλει στην
242
+    παρεμπόδιση των διαμαρτυριών για κακή χρήση προς εσάς τους ιδίους και τον
243
+    ISP σας εάν λειτουργείτε έναν κόμβο εξόδου (exit node).
244
+    
245
+    </p>
246
+    
247
+    <p>
248
+    11.  Αν ο υπολογιστής σας δεν εκτελεί κάποιον webserver φροντίστε να
249
+    αλλάξετε τις θύρες ORPort σε 443 και DirPort σε 80.  Πολλοί χρήστες Tor
250
+    συσωρρεύονται πίσω από τείχη προστασίας που τους επιτρέπουν μόνον να
251
+    περιηγηθούν στον ιστό και η παραπάνω αλλαγή θα τους επιτρέψει να συνδεθούν
252
+    με τον αναμεταδοτη σας.  Οι αναμεταδότες που εκτελούνται σε Windows 32bit
253
+    μπορούν αλλάξουν τις θύρες τους ORPort και DirPort απευθείας μέσω του
254
+    αρχείου torcc και να επανεκκινήσουν το Tor.  Οι αναμεταδότες OS X και Unix
255
+    δεν δεσμεύουν απευθείας τις θύρες αυτές (αφού δεν εκτελούνται με δικαιώματα
256
+    υπερδιαχειριστή) και γι' αυτό χρειάζεται να γίνουν κάποιες ρυθμίσεις <a
257
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients">
258
+    προώθησης θύρας</a> για να επικοινωνούν οι άλλοι στο δίκτυο με τους
259
+    αναμεταδότες αυτών των Λειτουργικών Συστημάτων.  Αν ήδη χρησιμοποιείτε τις
260
+    θυρες 443 και 80 αλλά εξακολουθείτε να θέλετε να βοηθήσετε, άλλες χρήσιμες
261
+    θύρες είναι οι 22, 110 και 143.
262
+    </p>
263
+    
264
+    <p>
265
+    12.  Αν ο αναμεταδότης σας Tor παρέχει άλλες υπηρεσίες με την ίδια διεύθυνση
266
+    ΙΡ &mdash; όπως ένας δημόσιος διακομιστής ιστού &mdash; βεβαιωθείτε ότι
267
+    επιτρέπονται οι συνδέσεις στον διακομιστή από τοπικούς υπολογιστές.  Πρέπει
268
+    να επιτρέπετε αυτές τις συνδέσεις επειδή οι πελάτες Tor θα βλέπουν ότι ο
269
+    αναμεταδότης σας είναι <a
270
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">ο
271
+    ασφαλέστερος τρόπος σύνδεσης σε αυτόν τον διακομιστή</a> και θα δημιουργούν
272
+    πάντοτε ένα κύκλωμα που θα καταλήγει στον αναμεταδότη σας.  Αν δεν
273
+    επιθυμείτε να επιτρέπονται οι συνδέσεις αυτές πρέπει να τους απορρίπτετε
274
+    ρητώς μέσα από τις ρυθμίσεις σας των πολιτικών εξόδου.
275
+    </p>
276
+    
277
+    <p>
278
+    13.  (Μόνο για Unix). Δημιουργήστε ξεχωριστό χρήστη για την εκτέλεση του
279
+    αναμεταδότη.  Αν εγκαταστήσατε το πακέτο για OS X ή το πακέτο deb ή το
280
+    πακέτο rpm, έχει ήδη γίνει αυτό.  Αλλιώς μπορείτε να δημιουργήσετε νέο
281
+    χρήστη χειροκίνητα. (Ο αναμεταδότης Tor δεν χρειάζεται να εκτελείται ως
282
+    root, γι' αυτό είναι καλό να μην εκτελείται ως χρήστης root.  Η εκτέλεσή του
283
+    ως χρήστης 'tor' αποφεύγει προβλήματα με το identd και με άλλες υπηρεσίες
284
+    που ανιχνεύουν το όνομα χρήστη.  Αν είστε ριψοκίνδυνος τύπος, <a
285
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorInChroot">εγκαταστήστε
286
+    το Tor σε περιβάλλον chroot</a>.)
287
+    </p>
288
+    
289
+    <p>
290
+    14. (Μόνο Unix). Πιθανόν το λειτουργικό σας σύστημα περιορίζει τον αριθμό
291
+    των ανοικτών περιγραφικών αρχείων (file descriptors) ανά διεργασία στα 1024
292
+    (ή και ακόμη λιγότερα). Αν θέλετε να εκτελείτε έναν γρήγορο κόμβο εξόδου,
293
+    αυτός ο αριθμός πιθανόν να μην είναι αρκετός.  Στο Linux πρέπει να
294
+    προσθέσετε μια γραμμή όπως "toruser hard nofile 8192" στο αρχείο
295
+    /etc/security/limits.conf (όπου toruser είναι ο χρήστης που εκτελεί την
296
+    διεργασία Tor) και έπειτα να εκκινήσετε τον υπολογιστή σας αν εγκαταστάθηκε
297
+    ως πακέτο (ή να επανασυνδεθείτε αν την εκτελείτε ο ίδιος).
298
+    </p>
299
+    
300
+    <p>
301
+    15. Αν εγκαταστήσατε το Tor μέσω κάποιου πακέτου ή εγκαταστάτη, πιθανόν το
302
+    Tor να εκκινεί αυτόματα όταν εκκινεί ο υπολογιστής σας. Αλλά αν το
303
+    εγκαταστήσατε από τον πηγαίο κώδικα μπορείτε να βρείτε χρήσιμα τα
304
+    initscripts των αρχείων contrib/tor.sh ή contrib/torctl.
305
+    </p>
306
+    
307
+    <p>
308
+    Όταν αλλάζετε τις ρυθμίσεις του Tor, βεβαιωθείτε ότι ο αναμεταδότης σας
309
+    λειτουργεί σωστά μετά τις αλλαγές. Βεβαιωθείτε ότι ρυθμίσατε την γραμμή
310
+    "ConcactInfo" του αρχείου torrc ώστε να επικοινωνήσουμε μαζί σας αν
311
+    χρειάζεστε κάποια αναβάθμιση ή αν κάτι είναι λάθος. Αν αντιμετωπίσετε
312
+    προβλήματα ή έχετε ερωτήσεις, δείτε τις ενότητες <a href="<page
313
+    docs/documentation>#Support">Υποστήριξη</a> ή <a href="<page
314
+    about/contact>">επικοινωνία</a> στην λίστα των tor-ops. Ευχαριστούμε που βοηθάτε
315
+    στην ανάπτυξη του δικτύου Tor.
316
+    </p>
317
+    
318
+    <hr />
319
+    
320
+    <p>Αν έχετε προτάσεις βελτίωσης αυτού του εγγράφου, παρακαλώ να μας <a
321
+    href="<page about/contact>">πείτε ποιές είναι</a>.  Ευχαριστούμε!</p>
322
+  </div>
323
+  <!-- END MAINCOL -->
324
+  <div id = "sidecol">
325
+#include "side.wmi"
326
+#include "info.wmi"
327
+  </div>
328
+  <!-- END SIDECOL -->
329
+</div>
330
+<!-- END CONTENT -->
331
+#include <foot.wmi>   
... ...
@@ -0,0 +1,195 @@
1
+    <h1>Εκτέλεση του πελάτη <a href="<page index>">Tor</a> σε Linux/BSD/Unix</h1>
2
+    <br />
3
+    
4
+    <p>
5
+    <b>Σημειώστε ότι αυτές είναι οδηγίες εγκατάστασης για την εκτέλεση του
6
+    προγράμματος/πελάτη Tor. Αν θέλετε να αναμεταδίδετε κυκλοφορία για άλλους
7
+    ώστε να συμβάλλετε στην ανάπτυξη του δικτύου (παρακαλούμε να το κάνετε),
8
+    διαβάστε τον οδηγό <a href="<page docs/tor-doc-relay>">Ρύθμιση ενός
9
+    αναμεταδότη</a>.</b>
10
+    </p>
11
+    
12
+    <hr /> <a id="installing"></a>
13
+    <h2><a class="anchor" href="#installing">Πρώτο βήμα: Λήψη και εγκατάσταση του
14
+    Tor</a></h2>
15
+    <br />
16
+    
17
+    <p>
18
+    Η τελευταία έκδοση του Tor μπορεί να βρεθεί στη σελίδα <a href="<page
19
+    download/download>">λήψεων</a>. Διαθέτουμε πακέτα για Debian, Red Hat, Gentoo,
20
+    *BSD και άλλα. Αν χρησιμοποιειτε Ubuntu μην χρησιμοποιείτε τα αρχικά πακέτα:
21
+    αντ' αυτών χρησιμοποιείστε <a href="<page docs/debian>#ubuntu">το αποθετήριο
22
+    των deb</a>.
23
+    </p>
24
+    
25
+    <p>Αν κατασκευάζετε τα αρχεία από τον πηγαίο κώδικα, πρώτα εγκαταστήστε το <a
26
+    href="http://www.monkey.org/~provos/libevent/">libevent</a> και βεβαιωθείτε
27
+    ότι έχετε τα openssl και zlib (συμπεριλαμβανομένων και των πακέτων -devel,
28
+    αν υπάρχουν). Μετά εκτελέστε: <br /> <tt>tar xzf
29
+    tor-<version-stable>.tar.gz; cd tor-<version-stable></tt><br />
30
+    <tt>./configure &amp;&amp; make</tt><br />.  Τώρα μπορείτε να τρέξετε το Tor
31
+    από <tt>src/or/tor</tt> ή μπορείτε να εκτελέσετε <tt>make install</tt> (ως
32
+    root, αν είναι αναγκαίο) για να εγκατασταθεί στον κατάλογο /usr/local και
33
+    μετά μπορείτε να το ξεκινήσετε εκτελώντας <tt>tor</tt>.
34
+    </p>
35
+    
36
+    <p>Το Tor είναι προρυθμισμένο ως πελάτης. Χρησιμοποιεί ένα ενσωματωμένο αρχείο
37
+    αρχικών ρυθμίσεων και οι περισσότεροι χρήστες δεν θα χρειαστεί να κάνουν
38
+    αλλαγές. Το Tor είναι τώρα εγκατεστημένο.
39
+    </p>
40
+    
41
+    <hr /> <a id="privoxy"></a> <a id="polipo"></a>
42
+    <h2><a class="anchor" href="#polipo">Δεύτερο βήμα: Εγκατάσταση του Polipo για
43
+    περιήγηση στον Ιστό</a></h2>
44
+    <br />
45
+    
46
+    <p>Μετά την εγκατάσταση του Tor πρέπει να ρυθμίσετε τις εφαρμογές σας ώστε να
47
+    το χρησιμοποιούν.
48
+    </p>
49
+    
50
+    <p>
51
+    Το πρώτο βήμα είναι η ρύθμιση της περιήγησης στον ιστό. Ξεκινήστε
52
+    εγκαθιστώντας το <a
53
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> από το
54
+    αποθετήριο της προτίμησής σας. Το Polipo είναι ένας πληρεξουσιος διακομιστής
55
+    ιστού (proxy server) που υποστηρίζει http pipelining και γι' αυτό είναι
56
+    κατάλληλο για τις καθυστερήσεις του Tor.  Βεβαιωθείτε ότι θα παραλάβετε το
57
+    Polipo με έκδοση τουλάχιστον 1.0.4, αφού οι παλαιότερες εκδόσεις δεν
58
+    υποστηρίζουν το πρωτόκολο SOCKS που είναι απαραίτητο για το δίκτυο Tor. Σε
59
+    αυτό το σημείο πρέπει να απεγκαταστήσετε το privoxy (π.χ., apt-get remove
60
+    privoxy ή yum remove privoxy) για να μην υπάρχουν διενέξεις μεταξύ τους.
61
+    </p>
62
+    
63
+    <p>Όταν εγκαταστήσετε το Polipo (είτε από πακέτο ή από τον πηγαίο κώδικα)
64
+    <b>πρέπει να ρυθμίσετε το Polipo ώστε να χρησιμοποιεί το Tor</b>. Κατεβάστε
65
+    τις <a
66
+    href="https://svn.torproject.org/svn/torbrowser/trunk/build-scripts/config/polipo.conf">τις
67
+    ρυθμίσεις του Polipo για το Tor</a> και αντιγράψτε το στην τρέχουσα θέση του
68
+    αρχείου ρυθμίσεων (π.χ., /etc/polipo/config ή ~/.polipo). Πρέπει να
69
+    επανεκκινήσετε το Polipo για να εφαρμοστούν οι αλλαγές.  Για παράδειγμα: <br
70
+    /> <tt>/etc/init.d/polipo restart</tt>.
71
+    </p>
72
+    
73
+    <p>Αντί για το Polipo μπορείτε να χρησιμοποιήσετε το Privoxy με <a
74
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">αυτό
75
+    το παράδειγμα ρύθμισης</a>. Αλλά αφού και τα δύο αρχεία ρυθμίσεων
76
+    χρησιμοποιούν την θύρα 8118, δεν πρέπει να εκτελείτε το Polipo και το
77
+    Privoxy ταυτόχρονα.</p>
78
+    
79
+    <hr /> <a id="using"></a>
80
+    <h2><a class="anchor" href="#using">Τρίτο Βημα: Ρυθμίστε τις εφαρμογές σας ώστε
81
+    να χρησιμοποιούν το Tor</a></h2>
82
+    <br />
83
+    
84
+    <p>Μετά την εγκατάσταση των Tor και Polipo πρέπει να ρυθμίσετε τις εφαρμογές
85
+    σας για να τα χρησιμοποιούν. Το πρώτο βήμα είναι η ρύθμιση της περιήγησης
86
+    στον ιστό.</p>
87
+    
88
+    <p>You should use Tor with Firefox and Torbutton, for best safety.  Simply
89
+    install the <a href="https://addons.mozilla.org/firefox/2275/">πρόσθετο
90
+    Torbutton</a>, επανεκκινήστε το Firefox και είστε έτοιμοι.
91
+    </p>
92
+    
93
+    <img alt="Torbutton plugin for Firefox"
94
+    src="../img/screenshot-torbutton.png" border="1"> <br />
95
+    
96
+    <p>
97
+    Αν θέλετε να εκτελείτε τον Firefox σε διαφορετικό υπολογιστή, δείτε <a
98
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">
99
+    τις οδηγίες του FAQ για την εκτέλεση του Firefox σε διαφορετικό
100
+    υπολογιστή</a>.
101
+    </p>
102
+    
103
+    <p>Για να χρησιμοποιούν το Tor οι άλλες εφαρμογές που υποστηρίζουν
104
+    πληρεξούσιους διακομιστές (proxy) HTTP, ενεργοποιείστε σε αυτές το Polipo
105
+    (δηλαδή, την τοπική θύρα 8118). Για απευθείας χρήση του SOCKS (για άμεσα
106
+    μηνύματα, Jabber, IRC, κλπ) μπορείτε να κατευθύνετε την εφαρμογή σας
107
+    κατευθείαν στο Tor (τοπική θύρα 5050), αλλά διαβάστε <a
108
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">αυτή
109
+    την καταχώρηση FAQ</a> για το πώς κάτι τέτοιο μπορεί να αποδειχθεί
110
+    επικίνδυνο. Για εφαρμογές που δεν υποστήριζουν SOCKS ούτε HTTP, διαβάστε το
111
+    <a href="http://tsocks.sourceforge.net/">tsocks</a> ή το <a
112
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>.
113
+    </p>
114
+    
115
+    <p>Για πληροφορίες του τρόπου χρήσης του Tor από άλλες εφαρμογές, διαβάστε το
116
+    <a
117
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
118
+    HOWTO</a>.
119
+    </p>
120
+    
121
+    <hr /> <a id="verify"></a>
122
+    <h2><a class="anchor" href="#verify">Βήμα Τέταρτο: Βεβαιωθείτε ότι δουλεύει</a></h2>
123
+    <br />
124
+    
125
+    <p>
126
+    <!--PO4ASHARPBEGIN<a href="http://ipchicken.com/">
127
+    this site</a>PO4ASHARPEND-->
128
+    #to see what IP address it thinks you're using.
129
+    Χρησιμοποιείστε τον περιηγητή ιστού με το Tor βεβαιωθείτε ότι η διεύθυνσή
130
+    σας IP είναι ανώνυμη. Κάνετε κλικ στον <a
131
+    href="https://check.torproject.org/">Ανιχνευτή Tor</a> και θα διαπιστώσετε
132
+    αν χρησιμοποιείτε Tor. (Αν η ιστοσελίδα αυτή δεν είναι διαθέσιμη, διαβάστε
133
+    αυτό το <a
134
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">FAQ</a>
135
+    για περισσότερες προτάσεις πώς να ελέγξετε το Tor σας.
136
+    </p>
137
+    
138
+    <p>Αν έχετε κάποιο προσωπικό τείχος προστασίας που περιορίζει την δυνατότητα
139
+    σύνδεσης του υπολογιστή στον ίδιο (κάτι σαν το SELinux του Fedora Core 4,
140
+    μεταξύ άλλων), βεβαιωθείτε ότι επιτρέπετε συνδέσεις από τις τοπικές σας
141
+    εφαρμογές προς το Polipo (τοπική θύρα 8118) και το Tor (τοπική θύρα
142
+    9050). Αν το τείχος προστασίας φράσσει τις εξερχόμενες συνδέσεις,
143
+    δημιουργήστε ένα "άνοιγμα" ώστε να μπορεί να συνδέεται τουλάχιστον με τις
144
+    θύρες TCP 80 και 443 και διαβάστε <a
145
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">αυτό
146
+    το FAQ</a>. Αν οι ρυθμίσεις του SELinux δεν επιτρέπουν στο tor ή στο privoxy
147
+    να εκτελούνται ορθά, δημιουργήστε ένα αρχείο με όνομα booleans.local στον
148
+    κατάλογο /etc/selinux/targeted. Επεξεργαστείτε το αρχείο αυτό με τον
149
+    συντάκτη κειμένου της αρεσκείας σας και προσθέστε την γραμμή
150
+    "allow_ypbind=1". Επανεκκινήστε τον υπολογιστή σας ώστε να εφαρμοσθούν οι
151
+    αλλαγές.
152
+    </p>
153
+    
154
+    <p>Αν εξακολουθεί να μην δουλεύει, ρίξτε μια ματιά <a
155
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">σε
156
+    αυτό το FAQ</a> για συμβουλές.</p>
157
+    
158
+    <hr /> <a id="server"></a> <a id="relay"></a>
159
+    <h2><a class="anchor" href="#relay">Βήμα Πέμπτο: Ρύθμιση ως ενδιάμεσου
160
+    αναμεταδότη</a></h2>
161
+    <br />
162
+    
163
+    <p>Το δίκτυο Tor βασίζεται σε εθελοντές που του παρέχουν εύρος ζώνης. Όσο
164
+    περισσότεροι άνθρωποι εκτελούν ενδιάμεσους αναμεταδότες, τόσο γρηγορότερο θα
165
+    είναι το δίκτυο Tor. Αν διαθέτετε τουλάχιστον 20 kilobytes/second προς κάθε
166
+    κατεύθυνση, βοηθήστε το Tor ρυθμίζοντάς το ώστε να είναι και
167
+    αναμεταδότης. Διαθέτουμε πολλά χαρακτηριστικά που καθιστούν τους
168
+    αναμεταδότες Tor εύκολους και βολικούς, όπως τον περιορισμό του εύρους
169
+    ζώνης, πολιτικές εξόδου ώστε να περιορίζετε την έκθεση σε διαμαρτυρίες κακής
170
+    χρήσης και υποστήριξη δυναμικής διεύθυνσης ΙΡ, μεταξύ άλλων.</p>
171
+    
172
+    <p>Η ύπαρξη αναμεταδοτών σε πολλά σημεία του Διαδικτύου καθιστά το Tor ασφαλές
173
+    για τους χρήστες. <a
174
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">Εσείς
175
+    οι ίδιοι θα απολαμβάνετε ισυχρότερη ανωνυμία</a>, αφού οι απομακρυσμένοι
176
+    διαδικτυακοί τόποι δεν μπορούν να γνωρίζουν αν οι συνδέσεις προέρχονται από
177
+    τον υπολογιστή σας ή αναμεταδίδονται από άλλους.</p>
178
+    
179
+    <p>Διαβάστε περισσότερα στον οδηγό μας <a href="<page
180
+    docs/tor-doc-relay>">Ρύθμιση ενός αναμεταδότη</a>.</p>
181
+    
182
+    <hr />
183
+    
184
+    <p>Αν έχετε προτάσεις για την βελτίωση αυτού του εγγράφου, παρακαλούμε να <a
185
+    href="<page about/contact>">μας τις στείλετε</a>. Ευχαριστούμε!</p>
186
+  </div>
187
+  <!-- END MAINCOL -->
188
+  <div id = "sidecol">
189
+#include "side.wmi"
190
+#include "info.wmi"
191
+  </div>
192
+  <!-- END SIDECOL -->
193
+</div>
194
+<!-- END CONTENT -->
195
+#include <foot.wmi>   
... ...
@@ -0,0 +1,62 @@
1
+## translation metadata
2
+# Revision: $Revision: 21511 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: Configuring your browser to use Tor" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-web>">Configure Your Browser</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h1>Ρύθμιση του περιηγητή ιστού για χρήστη του <a href="<page index>">Tor</a></h1>
14
+    <br />
15
+    
16
+    <p>Αν χρησιμοποιείτε Firefox (τον συνιστούμε) δεν χρειάζεστε αυτη την
17
+    σελίδα. Απλώς εγκαταστείστε το <a
18
+    href="https://addons.mozilla.org/firefox/2275/">πρόσθετο Torbutton</a>,
19
+    επανεκκινήστε τον Firefox και είστε έτοιμοι:
20
+    </p>
21
+    
22
+    <img alt="Torbutton plugin for Firefox"
23
+    src="../img/screenshot-torbutton.png" border="1"/> <br />
24
+    
25
+    <p>Σε διαφορετική περίπτωση, πρέπει να ρυθμίσετε χειροκίνητα τις ρυθμίσεις
26
+    πληρεξούσιου διακομιστή (proxy server) του φυλλομετρητή σας. <br/>Στον
27
+    Mozilla και τον Firefox για Windows αυτό γίνεται μέσω
28
+    Εργαλεία-Επιλογές-Γενικά-Ρυθμίσεις σύνδεσης.  <br/>Στον Firefox σε OS X,
29
+    μέσω Firefox-Προτιμήσεις-Γενικά-Ρυθμίσεις σύνδεσης. <br/>Στον Firefox σε
30
+    Linux μέσω Επεξεργασία-Προτιμήσεις-Για προχωρημένους-Δίκτυο. <br/>Στον Opera
31
+    μέσω Εργαλεία-Προτιμήσεις (για προχωρημένους)-Δίκτυο-Διακομιστές. <br/>Αν
32
+    και δεν συνιστούμε την χρήση ΙΕ, οι ρυθμίσεις για ανωνυμία περιορισμένου
33
+    βαθμού είναι μέσω Εργαλείων-Επιλογές Internet-Συνδέσεις-Ρυθμίσεις
34
+    LAN-Έλεγχος Διακομιστή Proxy-Για προχωρημένους.</p>
35
+    
36
+    <img alt="Proxy settings in Firefox"
37
+    src="../img/screenshot-win32-firefox-proxies.jpg" />
38
+    
39
+    <p>
40
+    Πρέπει να συμπληρώσετε τα "localhost" και "8118" ώστε να αντιστοιχούν στα
41
+    τέσσερα πρωτόκολα του Polipo, όπως φαίνεται εδώ. (Αν και το Polipo δεν
42
+    υποστηρίζει FTP και Gopher, <a
43
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">πρέπει
44
+    παρ' όλα αυτά να τα ενεργοποιήσετε</a>. Πρέπει επίσης να συμπληρώσετε τον
45
+    πληρεξούσιο διακομιστή socks ώστε να κατευθύνεται άμεσα στο Tor
46
+    ("localhost", "9050" και socks5) ώστε να καλύπτονται και πρωτόκολα πέραν των
47
+    τεσσάρων πρώτων. Πατήστε "ΟΚ".</p>
48
+    
49
+    <hr />
50
+    
51
+    <p>Αν έχετε προτάσεις για βελτίωση αυτού του εγγράφου, παρακλούμε <a
52
+    href="<page about/contact>">να μας τις στείλετε</a>. Ευχαριστούμε!</p>
53
+  </div>
54
+  <!-- END MAINCOL -->
55
+  <div id = "sidecol">
56
+#include "side.wmi"
57
+#include "info.wmi"
58
+  </div>
59
+  <!-- END SIDECOL -->
60
+</div>
61
+<!-- END CONTENT -->
62
+#include <foot.wmi>   
... ...
@@ -0,0 +1,194 @@
1
+## translation metadata
2
+# Revision: $Revision: 21995 $
3
+# Translation-Priority: 1-high
4
+
5
+#include "head.wmi" TITLE="Tor Project: MS Windows Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-windows>">Windows Client</a>
11
+  </div> 
12
+  <div id="maincol">  
13
+    <h1>Εκτέλεση του <a href="<page index>">Tor</a> στα Microsoft Windows</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>Οι οδηγίες αυτές είναι για την εγκατάσταση του Tor ώστε να τρέχουν σε
18
+    Microsoft Windows (2000, XP, Vista, 7 και Server Edition).  Αν θέλετε να
19
+    αναμεταδίδετε κυκλοφορία προς τρίτους ώστε να βοηθήσετε στην ανάπτυξη του
20
+    δικτύου (παρακαλούμε να το κάνετε), διαβάστε τον οδηγό <a href="<page
21
+    docs/tor-doc-relay>">Ρύθμιση ενός ενδιάμεσου</a>.</b>
22
+    </p>
23
+    
24
+    <p>Η Freedom House έχει δημιουργήσει ένα βίντεο για τον τρόπο εγκατάσταση του
25
+    Tor.  Μπορείτε να το δείτε στην διεύθυνση <a
26
+    href="http://media.torproject.org/video/2009-install-and-use-tor.ogv">Πώς να
27
+    εγκαταστήσω το Tor σε Windows</a>.  Γνωρίζετε κάποι καλύτερο βίντεο;
28
+    Ενημερώστε μας!</p>
29
+    
30
+    <div class="center">
31
+    <p><video id="v1" src="http://media.torproject.org/video/2009-install-and-use-tor.ogv" autobuffer="true" controls="controls"></video></p>
32
+    </div>
33
+    
34
+    <hr /> <a id="installing"></a>
35
+    <h2><a class="anchor" href="#installing">Βήμα Πρώτο: Κατεβάστε και εγκαταστήστε
36
+    το Tor</a></h2>
37
+    <br />
38
+    
39
+    <p>
40
+    Το πακέτο Microsoft Windows περιέχει <a href="<page index>">Tor</a>, <a
41
+    href="<page projects/vidalia>">Vidalia</a> (a GUI for Tor), <a
42
+    href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> (ένα πρόσθετο
43
+    για το Mozilla Firefox), and <a
44
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (ένας
45
+    πληρεξούσιος ιστού) σε πακέτο, όπου οι τέσσερεις εφαρμογές είναι
46
+    προ-ρυθμισμένες να λειτουργούν μαζί. Κατεβάστε είτε την <a
47
+    href="../<package-win32-bundle-stable>">σταθερή</a> ή την <a
48
+    href="../<package-win32-bundle-alpha>">πειραματική</a> έκδοση του πακέτου
49
+    Windows ή βρείτε περισσότερες επιλογές στην <a href="<page download/download>">σελίδα
50
+    λήψεων</a>.
51
+    </p>
52
+    
53
+    <img alt="tor installer splash page"
54
+    src="../img/screenshot-win32-installer-splash.png" />
55
+    
56
+    <p>Αν έχετε εγκαταστήσει τα Tor, Vidalia ή Polipo προηγούμενα, μπορείτε να
57
+    αποεπιλέξετε όποιο συστατικό δεν θέλετε να εγκατασταθεί, μέσα από τον
58
+    διάλογο που φαίνεται παρακάτω.
59
+    </p>
60
+    
61
+    <img alt="select components to install"
62
+    src="../img/screenshot-win32-installer-components.png" />
63
+    
64
+    <p>Αφού ολοκληρωθεί η εγκατάσταση, τα συστατικά που επιλέξατε θα ξεκινήσουν
65
+    αυτόματα.
66
+    </p>
67
+    
68
+    <p>Το Tor λειτουργεί αρχικά ως πρόγραμμα-client. Χρησιμοποιεί ένα ενσωματωμένο
69
+    αρχικό αρχείο ρυθμίσεων και οι περισσότεροι χρήστες δεν χρειάζεται να κάνουν
70
+    αλλαγές. Το Tor έχει τώρα εγκτασταθεί.
71
+    </p>
72
+    
73
+    <hr /> <a id="using"></a>
74
+    <h2><a class="anchor" href="#using">Βήμα Δεύτερο: Ρυθμίστε τις εφαρμογές σας
75
+    ώστε να χρησιμοποιούν το Tor</a></h2>
76
+    <br />
77
+    
78
+    <p>Μετά την εγκατάσταση των Tor και Polipo πρέπει να ρυθμίσετε τις εφαρμογές
79
+    σας ώστε να τα χρησιμοποιούν. Το πρώτο βήμα είναι η ρύθμιση της περιήγησης
80
+    στον ιστό.</p>
81
+    
82
+    <p>Για μεγαλύτερη ασφάλεια χρησιμοποιείτε το Tor με Firefox και Torbutton.  Το
83
+    πακέτο θα εγκαταστήσει για εσάς το <a
84
+    href="https://addons.mozilla.org/firefox/2275/">πρόσθετο
85
+    Torbutton</a>. Επανεκκινήστε τον Firefox και είστε έτοιμοι:
86
+    </p>
87
+    
88
+    <img alt="Torbutton plugin for Firefox"
89
+    src="../img/screenshot-torbutton.png" border="1"/> <br />
90
+    
91
+    <p>
92
+    Αν σκοπεύετε να εκτελείτε τον Firefox σε υπολογιστή διαφορετικό από εκείνον
93
+    του Tor, δείτε <a
94
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">το
95
+    τμήμα του FAQ για την εκτέλεση του Tor σε άλλον υπολογιστή</a>.
96
+    </p>
97
+    
98
+    <p>Για να χρησιμοποιήσουν οι άλλες εφαρμογές που υποστηρίζουν πληρεξούσιους
99
+    HTTP το Tor, απλώς ρυθμίστε τις να  επικοινωνούν με το Polipo (δηλαδή,
100
+    ορίζοντας ως διεύθυνσή του localhost θύρα 8118). Για να χρησιμοποιείται
101
+    άμεσα το SOCKS (για άμεσα μηνύματα, Jaber, IRC, κ.λ.π.) ρυθμίστε το
102
+    πρόγραμμά σας να επικοινωνεί κατευθείαν με το Tor (localhost θύρα 9050) και
103
+    διαβάστε <a
104
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">αυτό
105
+    το θέμα στο FAQ</a>  για ποιό λόγο κάτι τέτοιο ίσως είναι επικίνδυνο. Για
106
+    εφαρμογές που δεν υποστηρίζουν ούτε SOCKS ούτε HTTP, διαβάστε το SocksCap ή
107
+    το <a href="http://www.freecap.ru/eng/">FreeCap</a>. (Το FreeCap είναι
108
+    ελεύθερο λογισμικό, το SocksCap είναι ιδιωταγές).</p>
109
+    
110
+    <p>Για πληροφορίες χρήσης άλλων εφαρμογών με το Tor δείτε το <a
111
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
112
+    HOWTO</a>.
113
+    </p>
114
+    
115
+    <hr /> <a id="verify"></a>
116
+    <h2><a class="anchor" href="#verify">Βήμα Τρίτο: Βεβαιωθείτε ότι δουλεύει</a></h2>
117
+    <br />
118
+    
119
+    <p>
120
+    Βεβαιωθείτε ότι το Vidalia εκτελείται.  Το Vidalia χρησιμοποιεί ένα μικρό
121
+    πράσινο κρεμύδι για να δείξει ότι το Tor εκτελείται, ή ένα μαύρο κρεμύδι με
122
+    ένα κόκκινο "Χ" όταν το Tor δεν εκτελείται. Μπορείτε να εκκινήσετε ή να
123
+    σταματήσετε το Tor κάνοντας δεξιό κλικ στο εικονίδιο του Vidalia στην
124
+    περιοχή ειδοποιήσεων και επιλέγονας "Έναρξη" ή "Διακοπή" από το μενού, όπως
125
+    φαίνεται πιο κάτω:
126
+    </p>
127
+    
128
+    <img alt="Vidalia Tray Icon" src="../img/screenshot-win32-vidalia.png"/>
129
+    
130
+    <p>
131
+    Έπειτα χρησιμοποιείστε τον περιηγητή σας με το Tor και βεβαιωθείτε ότι η
132
+    διεύθυνσή σας ΙΡ είναι ανώνυμη. Κάνετε κλικ στον <a
133
+    href="https://check.torproject.org/">ανιχνευτή Tor</a> και δείτε αν είστε
134
+    συνδεδεμένος στο δίκτυο Tor. (Αν αυτός ο ιστότοπος είναι εκτός λειτουργίας,
135
+    δείτε a
136
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">αυτό
137
+    το θέμα του FAQ</a> για περισσότερες πληροφορίες πώς να ελέγξετε την σύνδεσή
138
+    σας με το Tor).
139
+    </p>
140
+    
141
+    <p>Αν έχετε κάποιο τείχος προστασίας που περιορίζει τη δυνατότητα σύνδεσης στο
142
+    δίκτυο, βεβαιωθείτε ότι έχετε επιτρέψει τις συνδέσεις από τις τοπικές
143
+    εφαρμογές σας προς τις τοπικές θύρες 8118 και 9050. Αν το τείχος προστασίας
144
+    σας φράσσει τις εξερχόμενες συνδέσεις σας ρυθμίστε το ώστε να μπορεί να
145
+    συνδεθεί τουλάχιστον στις θύρες TCP 80 και 443 και μετά διαβάστε <a
146
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">αυτότ
147
+    ο θέμα στο FAQ</a>.
148
+    </p>
149
+    
150
+    <p>Αν εξακολουθεί να μην δουλεύει, διαβάστε αυτό το <a
151
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">
152
+    θέμα του FAQ</a> για συμβουλές.</p>
153
+    
154
+    <p>
155
+    Μόλις συνδεθείτε με επιτυχία στο δίκτυο Tor, διαβάστε περισσότερα <a
156
+    href="<page download/download>#Warning">τι κάνει και τι όχι το Tor</a>.
157
+    </p>
158
+    
159
+    <hr /> <a id="server"></a> <a id="relay"></a>
160
+    <h2><a class="anchor" href="#relay">Βήμα Τέταρτο: Ρυθμίστε το ως ενδιάμεσο</a></h2>
161
+    <br />
162
+    
163
+    <p>Για να προσφέρει εύρος ζώνης, το δίκτυο Tor βασίζεται στους εθελοντές. Όσο
164
+    περισσότερο άνθρωποι γίνονται ενδιάμεσοι αναμεταδότες, τόσο πιο γρήγορο θα
165
+    είναι το δίκτυο Tor.  Αν έχετε τουλάχιστον 20 kilobytes/sec προς κάθε
166
+    κατεύθυνση, βοηθείστε το Tor ρυθμίζοντάς το ως ενδιάμεσο.  Υπάρχουν πολλά
167
+    στοιχεία που καθιστούν τους ενδιάμεσους Tor εύκολους και βολικούς, όπως
168
+    περιορισμός της κλίμακας εύρους ζώνης, πολιτικές εξόδου ώστε να μην
169
+    εκτίθεστε σε διαμαρτυρίες και υποστήριξη για δυναμικές ΙΡ διευθύνσεις.</p>
170
+    
171
+    <p>Όταν υπάρχουν ενδιάμεσοι σε διάφορα σημεία το Διαδικτύου, το Tor γίνεται
172
+    ασφαλέστερο.  <a
173
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">Κι
174
+    εσει οι ίδιοι απολαμβάνεται μεγαλύτερη ανωνυμία</a>, αφού οι απομακρυσμένοι
175
+    ιστότοποι δεν γνωρίζουν αν οι συνδέσεις σας έγιναν από τον υπολογιστή σας ή
176
+    αναμεταδόθηκαν από άλλους.</p>
177
+    
178
+    <p>Διαβάστε περισσότερα στο οδηγό μας <a href="<page
179
+    docs/tor-doc-relay>">Ρυθμίζοντας έναν ενδιάμεσο αναμεταδότη</a>.</p>
180
+    
181
+    <hr />
182
+    
183
+    <p>Αν έχετε προτάσεις για βελτίωση αυτού του εγγράφου, παρακαλώ <a href="<page
184
+    about/contact>">υποβάλετέ τις εδώ</a>. Ευχαριστούμε!</p>
185
+  </div>
186
+  <!-- END MAINCOL -->
187
+  <div id = "sidecol">
188
+#include "side.wmi"
189
+#include "info.wmi"
190
+  </div>
191
+  <!-- END SIDECOL -->
192
+</div>
193
+<!-- END CONTENT -->
194
+#include <foot.wmi>   
... ...
@@ -0,0 +1,188 @@
1
+## translation metadata
2
+# Revision: $Revision: 21979 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: N900 Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/N900>">N900</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <a id="Maemo"></a>
14
+    <h2><a class="anchor" href="#Maemo">Installing Tor on Maemo</a></h2>
15
+    <br />
16
+    <p>
17
+    If you have a Maemo device that is not the <a href="#N900">N900</a>, we
18
+    suggest you install the Tor package from the
19
+    <a href="http://maemo.org/packages/view/tor/">Maemo website</a>. The Tor
20
+    Project does not produce these packages. They are maintained by the
21
+    Maemo community.
22
+    </p>
23
+    
24
+    <a id="N900"></a>
25
+    <h2><a class="anchor" href="#N900">Installing Tor on the N900</a></h2>
26
+    <br />
27
+    <p>
28
+    The following instructions should help install an
29
+    <a href="https://garage.maemo.org/projects/tor-status">experimental
30
+    Tor controller</a> and Tor as packaged for the N900 Nokia telephone. This is
31
+    currently an untested configuration. The browser in this configuration does
32
+    not have Torbutton and it should not be used for high security anonymity needs
33
+    at this time.
34
+    </p>
35
+    
36
+    <p>
37
+    Open the Application manager: <br />
38
+    <a href="../img/N900/1_app_menu.png">
39
+    <img border="0" alt="N900 application menu"
40
+    src="../img/N900/1_app_menu-small.png"/>
41
+    </a>
42
+    </p>
43
+    
44
+    <p>
45
+    Click on the Application manager menu at the top of the screen: <br />
46
+    <a href="../img/N900/2_app_manager.png">
47
+    <img border="0" alt="N900 application manager"
48
+    src="../img/N900/2_app_manager-small.png"/>
49
+    </a>
50
+    </p>
51
+    
52
+    <p>
53
+    Select 'Application catalogs': <br />
54
+    <a href="../img/N900/3_app_managermenu.png">
55
+    <img border="0" alt="N900 application catalogs"
56
+    src="../img/N900/3_app_managermenu-small.png"/>
57
+    </a>
58
+    </p>
59
+    
60
+    <p>
61
+    Press 'New' to enable the maemo extras-devel repository. <br />
62
+    <small>Note: This repository contains untested packages that might harm your
63
+    device. <br />
64
+    See <a href="http://wiki.maemo.org/Extras-devel">Extras-devel</a> for
65
+    details. You should probably disable extras-devel after installing Tor, or
66
+    proceed at your own risk.</small>
67
+    <br />
68
+    <a href="../img/N900/4_catalog_list.png">
69
+    <img border="0" alt="N900 catalog list"
70
+    src="../img/N900/4_catalog_list-small.png"/>
71
+    </a>
72
+    </p>
73
+    
74
+    <p>
75
+    Enter the following information into the catalog addition screen:
76
+    <p>
77
+    <pre>
78
+    Catalog name:    Extras devel
79
+    Web address:    http://repository.maemo.org/extras-devel/
80
+    Distribution:        fremantle
81
+    Components:    free non-free
82
+    </pre>
83
+    </p>
84
+    <br />
85
+    Make sure 'Disabled' is unchecked, hit 'Save', and wait for the package list
86
+    to update.<br />
87
+    <a href="../img/N900/5_new_catalog.png">
88
+    <img border="0" alt="N900 new catalog"
89
+    src="../img/N900/5_new_catalog-small.png"/>
90
+    </a>
91
+    </p>
92
+    
93
+    <p>
94
+    Press 'Download' in the App manager: <br />
95
+    <a href="../img/N900/6_app_manager.png">
96
+    <img border="0" alt="N900 app manager"
97
+    src="../img/N900/6_app_manager-small.png"/>
98
+    </a>
99
+    </p>
100
+    
101
+    <p>
102
+    Select the Network category (or search for Tor): <br />
103
+    <a href="../img/N900/7_app_categories.png">
104
+    <img border="0" alt="N900 application categories"
105
+    src="../img/N900/7_app_categories-small.png"/>
106
+    </a>
107
+    </p>
108
+    
109
+    <p>
110
+    Scroll down and select 'Tor Status Area Applet': <br />
111
+    <a href="../img/N900/8_app_list.png">
112
+    <img border="0" alt="N900 application list"
113
+    src="../img/N900/8_app_list-small.png"/>
114
+    </a>
115
+    </p>
116
+    
117
+    <p>
118
+    Agree to the disclaimer and press 'Continue': <br />
119
+    <a href="../img/N900/9_disclaimer.png">
120
+    <img border="0" alt="N900 disclaimer"
121
+    src="../img/N900/9_disclaimer-small.png"/>
122
+    </a>
123
+    </p>
124
+    
125
+    <p>
126
+    When the install is done, disable the extras-devel repository, and reboot
127
+    the device: <br />
128
+    <a href="../img/N900/10_success.png">
129
+    <img border="0" alt="N900 success"
130
+    src="../img/N900/10_success-small.png"/>
131
+    </a>
132
+    </p>
133
+    
134
+    <p>
135
+    After rebooting the N900, open the status menu: <br />
136
+    <a href="../img/N900/11_after_rebooting.png">
137
+    <img border="0" alt="N900 status menu post-reboot" 
138
+    src="../img/N900/11_after_rebooting-small.png"/>
139
+    </a>
140
+    </p>
141
+    
142
+    <p>
143
+    Select 'The Onion Router' from the list: <br />
144
+    <a href="../img/N900/12_status_menu.png">
145
+    <img border="0" alt="N900 status menu selection"
146
+    src="../img/N900/12_status_menu-small.png"/>
147
+    </a>
148
+    </p>
149
+    
150
+    <p>
151
+    Enable onion routing, and press 'Save': <br />
152
+    <a href="../img/N900/13_enable_tor.png">
153
+    <img border="0" alt="N900 enabling Tor"
154
+    src="../img/N900/13_enable_tor-small.png"/>
155
+    </a>
156
+    </p>
157
+    
158
+    <p>
159
+    Visit <a href="https://check.torproject.org/">TorCheck</a> to confirm that
160
+    you are routing browser traffic through Tor: <br />
161
+    <a href="../img/N900/14_check_tor.png">
162
+    <img border="0" alt="N900 check Tor"
163
+    src="../img/N900/14_check_tor-small.png"/>
164
+    </a>
165
+    </p>
166
+    
167
+    <p>
168
+    Note that this might not always give you the latest stable Tor version.
169
+    Additionally, the N900 web browser does not have Torbutton. This means that
170
+    while it may be useful for circumvention, it probably is unsuitable for strong
171
+    web browser anonymity requirements.
172
+    </p>
173
+    
174
+    <hr />
175
+    
176
+    <p>If you have suggestions for improving this document, please <a
177
+    href="<page about/contact>">send them to us</a>. Thanks!</p>
178
+  </div>
179
+  <!-- END MAINCOL -->
180
+  <div id = "sidecol">
181
+#include "side.wmi"
182
+#include "info.wmi"
183
+  </div>
184
+  <!-- END SIDECOL -->
185
+</div>
186
+<!-- END CONTENT -->
187
+#include <foot.wmi>
188
+
... ...
@@ -0,0 +1,156 @@
1
+## translation metadata
2
+# Revision: $Revision: 22402 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Android Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/android>">Android</a>
11
+  </div>
12
+  <div id="maincol">
13
+    <h2><a class="anchor" href="#Android">Tor on Android</a></h2>
14
+    <br />
15
+    <p>
16
+    Tor is available for Android by installing our package named Orbot.
17
+    </p>
18
+    <p>
19
+    Orbot is an application that allows mobile phone users to access the web,
20
+    instant messaging and email without being monitored or blocked by their mobile
21
+    internet service provider. Orbot brings the features and functionality of Tor
22
+    to the Android mobile operating system.
23
+    </p>
24
+    <p>
25
+    Orbot contains Tor, libevent and privoxy. Orbot provides a local HTTP proxy
26
+    and the standard SOCKS4A/SOCKS5 proxy interfaces into the Tor network. Orbot
27
+    has the ability to transparently torify all of the TCP traffic on your Android
28
+    device when it has the correct permissions.
29
+    </p>
30
+    
31
+    <a id="QrCode"></a>
32
+    <h2><a class="anchor" href="#QrCode">Installing Tor with a QR code</a></h2>
33
+    <br />
34
+    <p>
35
+    Orbot is easy to install by simply scanning the following QR code with your
36
+    Android Barcode scanner.
37
+    </p>
38
+    
39
+    <p>
40
+    <a href="../img/android/orbot-qr-code-latest.png">
41
+    <img border="0" alt="Android QR code"
42
+    src="../img/android/orbot-qr-code-latest.png"/>
43
+    </a>
44
+    </p>
45
+    
46
+    <a id="Market"></a>
47
+    <h2><a class="anchor" href="#Market">Installing Tor from the Android Market</a></h2>
48
+    <br />
49
+    <p>
50
+    Orbot is not currently in the Android Market. It will be available in the
51
+    market in the very near future.
52
+    </p>
53
+    
54
+    <a id="Manual"></a>
55
+    <h2><a class="anchor" href="#Manual">Installing Tor from our website manually</a></h2>
56
+    <br />
57
+    <p>
58
+    You can download <a href="../<package-androidbundle-alpha>">our most recent version of Orbot</a> and <a href="../<package-androidbundle-alpha-sig>">the gpg signature</a> from our server.
59
+    </p>
60
+    
61
+    <a id="Screenshots"></a>
62
+    <h2><a class="anchor" href="#Screenshots">Screenshots of Tor on Android</a></h2>
63
+    <br />
64
+    <p>
65
+    <a href="../img/android/android-off.jpg">
66
+    <img border="0" alt="Android Tor off"
67
+    src="../img/android/android-off-150x150.jpg"/>
68
+    </a>
69
+    <a href="../img/android/android-bootstrapping.jpg">
70
+    <img border="0" alt="Android Tor bootstrapping"
71
+    src="../img/android/android-bootstrapping-150x150.jpg"/>
72
+    </a>
73
+    <a href="../img/android/android-activated.jpg">
74
+    <img border="0" alt="Android Tor activated"
75
+    src="../img/android/android-activated-150x150.jpg"/>
76
+    </a>
77
+    <a href="../img/android/android-settings.jpg">
78
+    <img border="0" alt="Android Tor settings"
79
+    src="../img/android/android-settings-150x150.jpg"/>
80
+    </a>
81
+    </p>
82
+    
83
+    <a id="ProxySettings"></a>
84
+    <h2><a class="anchor" href="#ProxySettings">Proxy settings and configuration
85
+    </a></h2>
86
+    <br />
87
+    <p>
88
+    Orbot offers three interfaces into the Tor network:
89
+    <ul>
90
+    <li>SOCKS 4A/5 proxy 127.0.0.1:9050</li>
91
+    <li>HTTP proxy 127.0.0.1:8118 </li>
92
+    <li>Transparent proxying (on select devices)</li>
93
+    </ul>
94
+    </p>
95
+    
96
+    <a id="Notes"></a>
97
+    <h2><a class="anchor" href="#Notes">Platform specific notes</a></h2>
98
+    <br />
99
+    <p>
100
+    The current version of Orbot ships with the following components:
101
+    <b><version-android-components></b>
102
+    </p>
103
+    <br />
104
+    <p>
105
+    For standard Android 1.x devices (G1, MyTouch3G, Hero, Droid Eris, Cliq, Moment):
106
+    <ul>
107
+    <li>The “ProxySurf” browser available in the Android Market allows for use
108
+        of a proxy. Simply set the HTTP Proxy to '127.0.0.1' and port '8118'.
109
+        <b>This only proxies some traffic and should not be considered secure.</b>
110
+        </li>
111
+    <li>For Instant Messsaging, try “Beem” in the market, and set the Proxy to SOCKS5 '127.0.0.1' and port '9050'.</li>
112
+    </ul>
113
+    </p>
114
+    <p>
115
+    For Android 2.x devices: Droid, Nexus One
116
+    <ul>
117
+    <li>You must root your device for Orbot to transparently proxy all TCP traffic.</li>
118
+    <li>For non-modified and non-rooted phones, you'll want to manually configure
119
+        your specific applications.</li>
120
+    <li>If you root your device, whether it is 1.x or 2.x based, Orbot will
121
+        automatically, transparently proxy all web traffic on port 80 and 443
122
+        and all DNS requests. This includes the built-in Browser, Gmail, YouTube,
123
+        Maps and any other application that uses standard web traffic.</li>
124
+    </ul>
125
+    </p>
126
+    
127
+    <a id="Source"></a>
128
+    <h2><a class="anchor" href="#Source">Source code access</a></h2>
129
+    <br />
130
+    <p>
131
+    All of the source code is available in the
132
+    <a href="https://svn.torproject.org/svn/projects/android/trunk/Orbot/">Orbot
133
+    subversion repository</a>.
134
+    </p>
135
+    
136
+    <p>
137
+    Note that this might not always give you the latest stable Tor version.
138
+    Additionally, the Android web browser does not have Torbutton. This means that
139
+    while it may be useful for circumvention, it probably is unsuitable for strong
140
+    web browser anonymity requirements.
141
+    </p>
142
+    
143
+    <hr />
144
+    
145
+    <p>If you have suggestions for improving this document, please <a
146
+    href="<page about/contact>">send them to us</a>. Thanks!</p>
147
+  </div>
148
+  <!-- END MAINCOL -->
149
+  <div id = "sidecol">
150
+#include "side.wmi"
151
+#include "info.wmi"
152
+  </div>
153
+  <!-- END SIDECOL -->
154
+</div>
155
+<!-- END CONTENT -->
156
+#include <foot.wmi> 
... ...
@@ -0,0 +1,209 @@
1
+## translation metadata
2
+# Revision: $Revision: 22432 $
3
+# Translation-Priority: 1-high
4
+
5
+#include "head.wmi" TITLE="Tor Project: Bridges" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/bridges>">Bridges</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <a id="BridgeIntroduction"></a>
14
+    <h2><a class="anchor" href="#BridgeIntroduction">Tor: Bridges</a></h2>
15
+    <hr />
16
+    
17
+    <p>
18
+    Bridge relays (or "bridges" for short) are Tor relays that aren't listed in
19
+    the main Tor directory. Since there is no complete public list of them, even if
20
+    your ISP is filtering connections to all the known Tor relays, they probably
21
+    won't be able to block all the bridges. If you suspect your access to the
22
+    Tor network is being blocked, you may want to use the bridge feature of Tor.
23
+    </p>
24
+    
25
+    <p>
26
+    The addition of bridges to Tor is a step forward in the blocking
27
+    resistance race. It is perfectly possible that even if your ISP filters
28
+    the Internet, you do not require a bridge to use Tor. Many filtering
29
+    programs look for unencrypted Tor directory requests to recognize that
30
+    you're using Tor, but Tor version 0.2.0.23-rc and later use encrypted
31
+    directory queries by default. This change means that most filtering
32
+    programs are now unable to recognize Tor connections. So you should try
33
+    to use Tor without bridges first, since it might work.
34
+    </p>
35
+    
36
+    <p>
37
+    Note that it's also possible that Tor is non-functional for other
38
+    reasons. The latest version of <a href="<page projects/torbrowser>">The
39
+    Tor Browser Bundle</a> on Windows tries to give you better hints about
40
+    why Tor is having problems connecting. You should also read <a
41
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#IinstalledTorandPolipobutitsnotworking.">the
42
+    FAQ about problems with running Tor properly</a> when you have issues.
43
+    If you feel that the issue is clearly blocking, or you'd simply like to try
44
+    because you're unsure or feeling adventurous, please read on. Ensure
45
+    that you're using the <a href="<page download/download>#Dev">latest 0.2.1.x or
46
+    0.2.2.x bundle for your platform</a>.
47
+    </p>
48
+    
49
+    <p>
50
+    To use a bridge, you'll need to locate one. Furthermore, you'll need to
51
+    configure Tor with whatever bridge address you intend to use. You'll do this
52
+    with Vidalia, the Tor controller.
53
+    If your Internet connection requires the use of a proxy, you'll probably
54
+    need to configure Vidalia to do so first. If you don't think you need
55
+    to configure a proxy for your Internet connection, you probably don't.
56
+    Give it a try and if you have issues, ask us for help.
57
+    </p>
58
+    
59
+    <p>Freedom House has produced a video on how to get and use Tor bridges.
60
+    If you don't see a video below, view it at <a
61
+    href="http://www.youtube.com/thetorproject">Youtube:
62
+    Freedom4Internet</a> Know of a better video, or one translated into
63
+    your language?  Let us know!</p>
64
+    
65
+    <div class="center">
66
+    <p><video id="v1" src="http://media.torproject.org/video/2009-using-a-bridge-relay-to-access-tor.ogv" autobuffer="true" controls="controls"></video></p>
67
+    </div>
68
+    
69
+    <p>
70
+    At the moment, you can get a bridge by visiting
71
+    <a href="https://bridges.torproject.org/">https://bridges.torproject.org/</a>
72
+    with your web browser. If this page is filtered for you, and you
73
+    don't have any other proxies or ways to reach it, there are <a
74
+    href="#FindingMore">other ways to find bridges</a> too.
75
+    </p>
76
+    
77
+    <a id="Understanding"></a>
78
+    <h2><a class="anchor" href="#Understanding">Understanding bridges</a></h2>
79
+    <hr />
80
+    
81
+    <p>
82
+    As an example, you'll get a bridge entry that looks like the
83
+    following:
84
+    </p>
85
+    <pre><samp>
86
+    bridge 141.201.27.48:443 4352e58420e68f5e40bf7c74faddccd9d1349413
87
+    </samp>
88
+    </pre>
89
+    
90
+    <p>
91
+    Understanding the components of a bridge line isn't strictly required
92
+    but may prove useful. You can skip this section if you'd like.<br />
93
+    The first element is the IP address: <tt>'141.201.27.48'</tt><br />
94
+    The second element is the port: <tt>'443'</tt><br />
95
+    The third element, the fingerprint, is optional:
96
+    <tt>'4352e58420e68f5e40bf7c74faddccd9d1349413'</tt><br />
97
+    </p>
98
+    
99
+    <a id="UsingBridges"></a>
100
+    <h2><a class="anchor" href="#UsingBridges">Using bridges with Tor and
101
+    Vidalia</a></h2>
102
+    <hr />
103
+    
104
+    <p>
105
+    To use the example bridge address above, go to Vidalia's Network settings
106
+    page, and click "My ISP blocks connections to the Tor network".  Add each
107
+    bridge address one at a time in the Vidalia Network settings page,
108
+    by pasting it into the "Add a Bridge" window and then clicking the "+"
109
+    sign. Adding a bridge is pictured below:
110
+    </p>
111
+    
112
+    <br /><br />
113
+    <img src="$(IMGROOT)/vidalia-bridges.png" alt="Vidalia's Network settings page" />
114
+    <br /><br />
115
+    
116
+    <p>
117
+    You'll want to add as many bridge addresses as you know about, since
118
+    additional bridges will increase reliability. One bridge should be enough
119
+    to reach the Tor network, but if you only have one bridge and it goes
120
+    down, you will be cut off from the Tor network.
121
+    </p>
122
+    
123
+    <a id="FindingMore"></a>
124
+    <h2><a class="anchor" href="#FindingMore">Finding more bridges for Tor</a></h2>
125
+    <hr />
126
+    
127
+    <p>
128
+    Another way to find public bridge addresses is to send mail to
129
+    bridges@torproject.org with the line "get bridges" by itself in the
130
+    body of the mail. You'll need to send this request from a gmail
131
+    account, though &mdash; otherwise we make it too easy for an attacker
132
+    to make a lot of email addresses and learn about all the bridges.
133
+    Almost instantly, you'll receive a reply that includes:
134
+    </p>
135
+    <pre>
136
+    Here are your bridge relays:
137
+    
138
+     bridge 60.16.182.53:9001 c9111bd74a710c0d25dda6b35e181f1aa7911133
139
+     bridge 87.237.118.139:444 c18dde4804e8fcb48464341ca1375eb130453a39
140
+     bridge 60.63.97.221:443 ab5c849ed5896d53052e43966ee9aba2ff92fb82
141
+    
142
+    </pre>
143
+    <p>
144
+    Once you've received the email with bridge information, you can continue the Vidalia configuration steps outlined <a href="#UsingBridges">above</a>.
145
+    </p>
146
+    
147
+    <a id="RunningABridge"></a>
148
+    <h2><a class="anchor" href="#RunningABridge">Running a Tor Bridge</a></h2>
149
+    <hr />
150
+    
151
+    <p>
152
+    If you want to help out and you can't run a <a href="<page
153
+    docs/tor-doc-relay>">normal Tor relay</a>, you should
154
+    run a bridge relay. You can configure it either way:
155
+    <ul>
156
+    <li> manually <a
157
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Imsupposedtoeditmytorrc.Whatdoesthatmean">edit
158
+    your torrc file</a> to be just these four lines:<br />
159
+    <pre><code>
160
+    SocksPort 0
161
+    ORPort 443
162
+    BridgeRelay 1
163
+    Exitpolicy reject *:*
164
+    </code></pre></li>
165
+    <li><a href="<page docs/tor-doc-relay>">or using Vidalia</a>:<br />
166
+    <img src="$(IMGROOT)/vidalia-bridges-setup.png" alt="Vidalia's Sharing
167
+    settings page" /></li>
168
+    </ul>
169
+    </p>
170
+    
171
+    <p>If you get "Could not bind to 0.0.0.0:443: Permission denied" errors
172
+    on startup, you'll need to pick a higher ORPort (e.g. 8080) or do <a
173
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Myfirewallonlyallowsafewoutgoingports.">some
174
+    complex port forwarding</a>.
175
+    </p>
176
+    
177
+    <p>
178
+    When configured as a bridge, your server will <b>not</b> appear in the public
179
+    Tor network.
180
+    </p>
181
+    
182
+    <p>
183
+    Your bridge relay will automatically publish its address to the bridge
184
+    authority, which will give it out via https or email as above. You can
185
+    also tell a user about your bridge directly: if you're using Vidalia,
186
+    you can copy-and-paste the bridge address from the Settings window. If
187
+    you're on Linux or BSD, you can construct the bridge address manually
188
+    using the <a href="#Understanding">format above</a> (you can find the
189
+    fingerprint in your Tor log files or in <tt>/var/lib/tor/fingerprint</tt>
190
+    depending on your platform).
191
+    </p>
192
+    
193
+    <p>
194
+    If you would like to learn more about our bridge
195
+    design from a technical standpoint, please read the <a
196
+    href="<gitblob>doc/spec/bridges-spec.txt">Tor bridges
197
+    specification</a>. If you're interested in running an unpublished bridge
198
+    or other non-standard uses, please do read the specification.
199
+    </p>
200
+  </div>
201
+  <!-- END MAINCOL -->
202
+  <div id = "sidecol">
203
+#include "side.wmi"
204
+#include "info.wmi"
205
+  </div>
206
+  <!-- END SIDECOL -->
207
+</div>
208
+<!-- END CONTENT -->
209
+#include <foot.wmi>  
... ...
@@ -0,0 +1,120 @@
1
+## translation metadata
2
+# Revision: $Revision: 22269 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Vidalia: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian-vidalia>">Vidalia Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <a id="debian"></a>
14
+    <a id="packages"></a>
15
+    <h2><a class="anchor" href="#debian">Vidalia on Ubuntu or Debian</a></h2>
16
+    <br />
17
+    
18
+    <p>
19
+    <b>Do not use the packages in Ubuntu's universe.</b> They are unmaintained
20
+    and out of date. That means you'll be missing stability and security
21
+    fixes.
22
+    </p>
23
+    
24
+    <p>
25
+    You'll need to set up our package repository before you can fetch
26
+    Vidalia. First, you need to figure out the name of your distribution. If
27
+    you're using Ubuntu 9.10 or 10.04, it's  "karmic", while 9.04 is "jaunty",
28
+    8.10 is "intrepid", and 8.04 is "hardy". If you're using Debian
29
+    Etch, it's "etch", and Debian Lenny is "lenny". Then add this line to your
30
+    <tt>/etc/apt/sources.list</tt>
31
+    file:<br />
32
+    <pre>
33
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
34
+    </pre>
35
+    where you substitute the above word (etch, lenny, sid, karmic, jaunty,
36
+    intrepid, hardy) in place of &lt;DISTRIBUTION&gt;.
37
+    </p>
38
+    
39
+    <p>
40
+    Then add the gpg key used to sign the packages by running the following
41
+    commands at your command prompt:
42
+    <pre>
43
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
44
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
45
+    </pre>
46
+    Now refresh your sources and install Vidalia by running the following
47
+    commands at your command prompt:
48
+    <pre>
49
+    apt-get update
50
+    apt-get install vidalia 
51
+    </pre>
52
+    </p>
53
+    
54
+    <p>
55
+    Now Vidalia is installed and running. Move on to <a href="<page
56
+    docs/tor-doc-unix>#polipo">step two</a> of the "Vidalia on Linux/Unix"
57
+    instructions.
58
+    </p>
59
+    
60
+    <p style="font-size: small">
61
+    The DNS name <code>deb.torproject.org</code> is actually a set of independent
62
+    servers in a DNS round robin configuration.  If you for some reason cannot
63
+    access it you might try to use the name of one of its part instead.  Try
64
+    <code>deb-master.torproject.org</code>,
65
+    <code>mirror.netcologne.de</code> or
66
+    <code>vidalia.mirror.youam.de</code>.
67
+    </p>
68
+    
69
+    <hr />
70
+    
71
+    <a id="source"></a>
72
+    <h2><a class="anchor" href="#source">Building from source</a></h2>
73
+    <br />
74
+    
75
+    <p>
76
+    If you want to build your own debs from source you must first add an
77
+    appropriate <tt>deb-src</tt> line to <tt>sources.list</tt>.
78
+    <pre>
79
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
80
+    </pre>
81
+    You also need to install the necessary packages to build your own debs and the
82
+    packages needed to build Vidalia:
83
+    <pre>
84
+    apt-get install build-essential fakeroot devscripts qt4-dev-tools qt4-designer libqt4-dev g++ cmake
85
+    apt-get build-dep vidalia
86
+    </pre>
87
+    Then you can build Vidalia in ~/debian-packages:
88
+    <pre>
89
+    mkdir ~/debian-packages; cd ~/debian-packages
90
+    apt-get source vidalia
91
+    cd vidalia-*
92
+    debuild -rfakeroot -uc -us
93
+    cd ..
94
+    </pre>
95
+    Now you can install the new package:
96
+    <pre>
97
+    sudo dpkg -i vidalia_*.deb
98
+    </pre>
99
+    </p>
100
+    
101
+    <p>
102
+    Now Vidalia is installed and running. Move on to <a href="<page
103
+    docs/tor-doc-unix>#polipo">step two</a> of the "Vidalia on Linux/Unix"
104
+    instructions.
105
+    </p>
106
+    
107
+    <hr />
108
+    
109
+    <p>If you have suggestions for improving this document, please <a
110
+    href="<page about/contact>">send them to us</a>. Thanks!</p>
111
+  </div>
112
+  <!-- END MAINCOL -->
113
+  <div id = "sidecol">
114
+#include "side.wmi"
115
+#include "info.wmi"
116
+  </div>
117
+  <!-- END SIDECOL -->
118
+</div>
119
+<!-- END CONTENT -->
120
+#include <foot.wmi>  
... ...
@@ -0,0 +1,187 @@
1
+## translation metadata
2
+# Revision: $Revision: 22268 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian>">Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <a id="debian"></a>
14
+    <h2><a class="anchor" href="#debian">Option one: Tor on Debian lenny,
15
+    Debian sid, or Debian testing</a></h2>
16
+    <br />
17
+    
18
+    <p>
19
+    If you're using Debian stable (lenny), unstable (sid), or testing
20
+    (squeeze), just run<br />
21
+    <tt>apt-get install tor tor-geoipdb</tt>
22
+    as root.
23
+    </p>
24
+    
25
+    <p>
26
+    Note that this might not always give you the latest stable Tor version, but
27
+    you will receive important security fixes. To make sure that you're running
28
+    the latest stable version of Tor, see option two below.
29
+    </p>
30
+    
31
+    <p>
32
+    Now Tor is installed and running. Move on to <a href="<page
33
+    docs/tor-doc-unix>#polipo">step two</a> of the "Tor on Linux/Unix"
34
+    instructions.
35
+    </p>
36
+    
37
+    <hr />
38
+    
39
+    <a id="ubuntu"></a>
40
+    <a id="packages"></a>
41
+    <h2><a class="anchor" href="#ubuntu">Option two: Tor on Ubuntu or
42
+    Debian</a></h2>
43
+    <br />
44
+    
45
+    <p>
46
+    <b>Do not use the packages in Ubuntu's universe.</b> They are unmaintained
47
+    and out of date. That means you'll be missing stability and security
48
+    fixes.
49
+    </p>
50
+    
51
+    <p>
52
+    You'll need to set up our package repository before you can fetch
53
+    Tor. First, you need to figure out the name of your distribution. If
54
+    you're using Ubuntu 9.10 or 10.04, it's  "karmic", while 9.04 is "jaunty",
55
+    8.10 is "intrepid", and 8.04 is "hardy". If you're using Debian
56
+    Etch, it's "etch", and Debian Lenny is "lenny". Then add this line to your
57
+    <tt>/etc/apt/sources.list</tt>
58
+    file:<br />
59
+    <pre>
60
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
61
+    </pre>
62
+    where you put the codename of your distribution (i.e. etch, lenny, sid, karmic,
63
+    jaunty, intrepid, hardy or whatever it is) in place of &lt;DISTRIBUTION&gt;.
64
+    </p>
65
+    
66
+    <p>
67
+    Then add the gpg key used to sign the packages by running the following
68
+    commands at your command prompt:
69
+    <pre>
70
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
71
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
72
+    </pre>
73
+    Now refresh your sources and install Tor by running the following
74
+    commands at your command prompt:
75
+    <pre>
76
+    apt-get update
77
+    apt-get install tor tor-geoipdb
78
+    </pre>
79
+    </p>
80
+    
81
+    <p>
82
+    Now Tor is installed and running. Move on to <a href="<page
83
+    docs/tor-doc-unix>#polipo">step two</a> of the "Tor on Linux/Unix"
84
+    instructions.
85
+    </p>
86
+    
87
+    <p style="font-size: small">
88
+    The DNS name <code>deb.torproject.org</code> is actually a set of independent
89
+    servers in a DNS round robin configuration.  If you for some reason cannot
90
+    access it you might try to use the name of one of its part instead.  Try
91
+    <code>deb-master.torproject.org</code>,
92
+    <code>mirror.netcologne.de</code> or
93
+    <code>tor.mirror.youam.de</code>.
94
+    </p>
95
+    
96
+    <hr />
97
+    
98
+    <a id="development"></a>
99
+    <h2><a class="anchor" href="#development">Option three: Using the
100
+    development branch of Tor on Debian or Ubuntu</a></h2>
101
+    <br />
102
+    
103
+    <p>If you want to use the <a href="<page
104
+    download/download>#packagediff">development branch</a> of Tor instead (more
105
+    features and more bugs), you need to add a different set of lines to
106
+    your <tt>/etc/apt/sources.list</tt> file:<br />
107
+    <pre>
108
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
109
+    deb     http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
110
+    </pre>
111
+    where you again substitute the name of your distro (etch, lenny, sid, karmic,
112
+    jaunty, intrepid, hardy) in place of &lt;DISTRIBUTION&gt;.
113
+    </p>
114
+    
115
+    <p>
116
+    Then run the following commands at your command prompt:
117
+    <pre>
118
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
119
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
120
+    apt-get update
121
+    apt-get install tor tor-geoipdb
122
+    </pre>
123
+    </p>
124
+    
125
+    <p>
126
+    Now Tor is installed and running. Move on to <a href="<page
127
+    docs/tor-doc-unix>#polipo">step two</a> of the "Tor on Linux/Unix"
128
+    instructions.
129
+    </p>
130
+    
131
+    <hr />
132
+    
133
+    <a id="source"></a>
134
+    <h2><a class="anchor" href="#source">Building from source</a></h2>
135
+    <br />
136
+    
137
+    <p>
138
+    If you want to build your own debs from source you must first add an
139
+    appropriate <tt>deb-src</tt> line to <tt>sources.list</tt>.
140
+    <pre>
141
+    # For the stable version.
142
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
143
+    
144
+    # For the unstable version.
145
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
146
+    deb-src http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
147
+    </pre>
148
+    You also need to install the necessary packages to build your own debs and the
149
+    packages needed to build Tor:
150
+    <pre>
151
+    apt-get install build-essential fakeroot devscripts
152
+    apt-get build-dep tor
153
+    </pre>
154
+    Then you can build Tor in ~/debian-packages:
155
+    <pre>
156
+    mkdir ~/debian-packages; cd ~/debian-packages
157
+    apt-get source tor
158
+    cd tor-*
159
+    debuild -rfakeroot -uc -us
160
+    cd ..
161
+    </pre>
162
+    Now you can install the new package:
163
+    <pre>
164
+    sudo dpkg -i tor_*.deb
165
+    </pre>
166
+    </p>
167
+    
168
+    <p>
169
+    Now Tor is installed and running. Move on to <a href="<page
170
+    docs/tor-doc-unix>#polipo">step two</a> of the "Tor on Linux/Unix"
171
+    instructions.
172
+    </p>
173
+    
174
+    <hr />
175
+    
176
+    <p>If you have suggestions for improving this document, please <a
177
+    href="<page about/contact>">send them to us</a>. Thanks!</p>
178
+  </div>
179
+  <!-- END MAINCOL -->
180
+  <div id = "sidecol">
181
+#include "side.wmi"
182
+#include "info.wmi"
183
+  </div>
184
+  <!-- END SIDECOL -->
185
+</div>
186
+<!-- END CONTENT -->
187
+#include <foot.wmi>  
... ...
@@ -0,0 +1,289 @@
1
+## translation metadata
2
+# Revision: $Revision: 22359 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor: Documentation" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation</a>
10
+  </div>
11
+  <div id="maincol"> 
12
+    <a id="RunningTor"></a>
13
+    <h1><a class="anchor" href="#RunningTor">Running Tor</a></h1>
14
+    <ul>
15
+    <li><a href="<page docs/tor-doc-windows>">Installing Tor
16
+    on Win32</a></li>
17
+    <li><a href="<page docs/tor-doc-osx>">Installing Tor on
18
+    Mac OS X</a></li>
19
+    <li><a href="<page docs/tor-doc-unix>">Installing Tor on
20
+    Linux/BSD/Unix</a></li>
21
+    <li><a href="<page projects/torbutton>">Installing
22
+    Torbutton for Tor</a></li>
23
+    <li><a href="<page docs/tor-doc-relay>">Configuring a
24
+    Tor relay</a></li>
25
+    <li><a href="<page docs/tor-hidden-service>">Configuring
26
+    a Tor hidden service</a></li>
27
+    </ul>
28
+    
29
+    <a id="Support"></a>
30
+    <a id="UpToSpeed"></a>
31
+    <h1><a class="anchor" href="#UpToSpeed">Getting up to speed on Tor's past,
32
+    present, and future</a></h1>
33
+    
34
+    <ol>
35
+    <li>
36
+    First, read the <a href="<page about/overview>">overview page</a> to get a
37
+    basic idea of how Tor works, what it's for, and who uses it.
38
+    </li>
39
+    
40
+    <li>
41
+    <a href="<page download/download>">Install the Tor bundle</a> and try it out.
42
+    Make sure you've got Firefox installed first, and be sure to read the
43
+    <a href="<page download/download>#Warning">list of warnings</a> about ways you
44
+    can screw up your anonymity.
45
+    </li>
46
+    
47
+    <li>
48
+    Our <a
49
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ">FAQ</a>
50
+    covers all sorts of topics, including questions about setting up a client
51
+    or relay, concerns about anonymity attacks, why we didn't build Tor in
52
+    other ways, etc.
53
+    There's a separate <a href="<page docs/faq-abuse>">Abuse FAQ</a> to answer
54
+    common questions from or for relay operators.
55
+    The <a href="<page eff/tor-legal-faq>">Tor Legal FAQ</a> is written by
56
+    EFF lawyers, and aims to give you an overview of some of the legal issues
57
+    that arise from the Tor project in the US.
58
+    </li>
59
+    
60
+    <li>The <a href="<page docs/tor-manual>">manual</a>
61
+    lists all the possible entries you can put in your <a
62
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Imsupposedtoeditmytorrc.Whatdoesthatmean">torrc
63
+    file</a>. We also provide a <a href="<page docs/tor-manual-dev>">manual for
64
+    the development version of Tor</a>.</li>
65
+    
66
+    <li>If you have questions, we have an IRC channel (for users, relay
67
+    operators, and developers)
68
+    at <a href="irc://irc.oftc.net/tor">#tor on irc.oftc.net</a>. If
69
+    you have a bug, especially a crash bug, read <a
70
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#MyTorkeepscrashing.">how
71
+    to report a Tor bug</a> first and then tell us as much information
72
+    about it as you can in
73
+    <a href="https://bugs.torproject.org/tor">our bugtracker</a>.
74
+    (If your bug is
75
+    with Polipo, your browser, or some other application, please don't put
76
+    it in our bugtracker.) The
77
+    <a href="#MailingLists">or-talk mailing list</a> can also be useful.
78
+    </li>
79
+    
80
+    <li>
81
+    <a href="https://blog.torproject.org/">Tor has a blog now</a>.
82
+    We try to keep it updated every week or two with the latest news.
83
+    </li>
84
+    
85
+    <li>
86
+    Download and watch Roger's overview talk from What The Hack (<a
87
+    href="http://freehaven.net/~arma/wth-anonymous-communication-58.mp4">video</a>,
88
+    <a href="http://freehaven.net/~arma/wth1.pdf">slides</a>, <a
89
+    href="http://wiki.whatthehack.org/index.php/Anonymous_communication_for_the_United_States_Department_of_Defense...and_you">abstract</a>).
90
+    This talk was given in July 2005, back when we were funded by EFF and back
91
+    when the network was quite small, but it still provides good background
92
+    on how Tor works and what it's for.
93
+    </li>
94
+    
95
+    <li>
96
+    Look through our <a href="#DesignDoc">Design
97
+    Documents</a>. Notice that we have RFC-style specs to tell you exactly
98
+    how Tor is built.
99
+    </li>
100
+    
101
+    <li>
102
+    There's a skeletal <a
103
+    href="https://svn.torproject.org/svn/projects/roadmaps/2008-12-19-roadmap-full.pdf">list
104
+    of items we'd like to tackle in the future</a>. Alas, many of those
105
+    items need to be fleshed out more before they'll make sense to people
106
+    who aren't Tor developers, but you can still get a general sense of
107
+    what issues need to be resolved next.
108
+    </li>
109
+    
110
+    <li>
111
+    Download and watch Nick's "Technical changes since 2004" talk from
112
+    Defcon in July 2007 (<a
113
+    href="http://freehaven.net/~arma/Defcon15-Mathewson-Technical_Changes_since_you_Last_Heard_about_Tor.mp4">video</a>, <a
114
+    href="http://freehaven.net/~nickm/slides/Defcon07/TorChanges.pdf">slides</a>),
115
+    Roger's "blocking-resistance
116
+    and circumvention" talk from 23C3 in December 2006 (<a
117
+    href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">video</a>,
118
+    <a href="http://freehaven.net/~arma/slides-23c3.pdf">slides</a>,
119
+    <a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">abstract</a>,
120
+    <a href="https://svn.torproject.org/svn/projects/design-paper/blocking.html">design paper</a>),
121
+    and Roger's "Current events in 2007" talk from 24C3 in December
122
+    2007 (<a
123
+    href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">video</a>,
124
+    <a href="http://freehaven.net/~arma/slides-24c3.pdf">slides</a>,
125
+    <a href="http://events.ccc.de/congress/2007/Fahrplan/events/2325.en.html">abstract</a>).
126
+    We also have the What The Hack tutorial on hidden services (<a
127
+    href="http://freehaven.net/~arma/wth_tor_hidden_services.mp4">video</a>,
128
+    <a href="http://freehaven.net/~arma/wth3.pdf">slides</a>).
129
+    </li>
130
+    
131
+    <li>
132
+    See Mike's "Securing the Tor network" talk from Defcon in July 2007
133
+    (<a href="http://freehaven.net/~arma/Defcon15-Mike_Perry-Securing_the_Tor_Network.mp4">video</a>,
134
+     <a href="http://freehaven.net/~arma/SecuringTheTorNetwork.pdf">slides</a>).
135
+    It describes common ways to attack networks like Tor and how we try
136
+    to defend against them, and it introduces the <a
137
+    href="https://svn.torproject.org/svn/torflow/trunk/README">Torflow</a>
138
+    script collection.
139
+    </li>
140
+    
141
+    <li>
142
+    Learn about the <a
143
+    href="<gitblob>doc/spec/proposals/001-process.txt">Tor
144
+    proposal process for changing our design</a>, and look over the <a
145
+    href="<gittree>doc/spec/proposals">existing proposals</a>.
146
+    </li>
147
+    
148
+    <li>
149
+    Our <a href="<gitblob>doc/TODO">developer TODO file</a> starts with a
150
+    timeline for external promises &mdash; things <a href="<page about/sponsors>">our
151
+    sponsors</a> have paid to see done. It also lists many other tasks
152
+    and topics we'd like to tackle next.
153
+    </li>
154
+    
155
+    <li>
156
+    Once you're up to speed, things will continue to change surprisingly fast.
157
+    The <a href="#MailingLists">or-dev mailing list</a> is where the complex
158
+    discussion happens, and the #tor IRC channel
159
+    is where the less complex discussion happens.
160
+    </li>
161
+    
162
+    </ol>
163
+    
164
+    <a id="MailingLists"></a>
165
+    <h1><a class="anchor" href="#MailingLists">Mailing List Information</a></h1>
166
+    <ul>
167
+    <li>The <a href="http://archives.seul.org/or/announce/">or-announce
168
+    mailing list</a> is a low volume list for announcements of new releases
169
+    and critical security updates. Everybody should be on this list.
170
+    There is also an
171
+    <a href="http://rss.gmane.org/gmane.network.onion-routing.announce">RSS
172
+    feed</a> of or-announce at <a href="http://gmane.org">gmane.org</a>.</li>
173
+    <li>The <a href="http://archives.seul.org/or/talk/">or-talk list</a>
174
+    is where a lot of discussion happens, and is where we send notifications
175
+    of prerelease versions and release candidates.</li>
176
+    <li>The <a href="http://archives.seul.org/tor/relays/">tor-relays list</a>
177
+    is where discussions about running, configuring, and handling your tor
178
+    relay happen.  If you currently run a relay, or are thinking about doing
179
+    so, this is the list for you.</li>
180
+    <li>The <a href="http://archives.seul.org/or/dev/">or-dev list</a>
181
+    is for posting by developers only, and is very low traffic.</li>
182
+    <li>A list for <a href="http://archives.seul.org/tor/mirrors/">mirror
183
+    operators</a> for new website mirrors, and supporting <a href="<page
184
+    getinvolved/mirrors>">current website mirrors</a>.</li>
185
+    <li>A list for <a href="http://archives.seul.org/or/cvs/">svn and git
186
+    commits</a> may be interesting for developers.</li>
187
+    <li>An automated list for <a href="http://archives.seul.org/tor/bugs/">bug
188
+    reports from trac</a> may be interesting for users and developers.</li>
189
+    </ul>
190
+    
191
+    <a id="DesignDoc"></a>
192
+    <h1><a class="anchor" href="#DesignDoc">Design Documents</a></h1>
193
+    <ul>
194
+    <li>The <b>design document</b> (published at Usenix Security 2004)
195
+    gives our justifications and security analysis for the Tor design:
196
+    <a href="https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf">PDF</a> and
197
+    <a href="https://svn.torproject.org/svn/projects/design-paper/tor-design.html">HTML</a>
198
+    versions available.</li>
199
+    <li>Our follow-up paper on <b>challenges in low-latency anonymity</b>
200
+    (still in draft form) details more recent experiences and directions:
201
+    <a href="https://svn.torproject.org/svn/projects/design-paper/challenges.pdf">PDF
202
+    draft</a>.</li>
203
+    <li>Our paper at WEIS 2006 &mdash; <b>Anonymity Loves Company:
204
+    Usability and the Network Effect</b> &mdash; explains why usability in
205
+    anonymity systems matters for their security: <a
206
+    href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>.</li>
207
+    <li>Our preliminary design to make it harder for large firewalls to
208
+    prevent access to the Tor network is described in
209
+    <b>design of a blocking-resistant anonymity system</b>:
210
+    <a href="https://svn.torproject.org/svn/projects/design-paper/blocking.pdf">PDF draft</a> and
211
+    <a href="https://svn.torproject.org/svn/projects/design-paper/blocking.html">HTML draft</a>.
212
+    Want to <a href="<page getinvolved/volunteer>#Coding">help us build it</a>?</li>
213
+    <li>The <b>specifications</b> aim to give
214
+    developers enough information to build a compatible version of Tor:
215
+    <ul>
216
+    <li><a href="<gitblob>doc/spec/tor-spec.txt">Main Tor specification</a></li>
217
+    <li><a href="<gitblob>doc/spec/dir-spec.txt">Tor
218
+    version 3 directory server specification</a> (and older <a
219
+    href="<gitblob>doc/spec/dir-spec-v1.txt">version 1</a> and <a
220
+    href="<gitblob>doc/spec/dir-spec-v2.txt">version 2</a> directory
221
+    specifications)</li>
222
+    <li><a href="<gitblob>doc/spec/control-spec.txt">Tor control protocol
223
+    specification</a></li>
224
+    <li><a href="<gitblob>doc/spec/rend-spec.txt">Tor rendezvous
225
+    specification</a></li>
226
+    <li><a href="<gitblob>doc/spec/path-spec.txt">Tor path selection
227
+    specification</a></li>
228
+    <li><a href="<gitblob>doc/spec/address-spec.txt">Special hostnames in
229
+    Tor</a></li>
230
+    <li><a href="<gitblob>doc/spec/socks-extensions.txt">Tor's SOCKS support
231
+    and extensions</a></li>
232
+    <li><a href="<gitblob>doc/spec/version-spec.txt">How Tor version numbers
233
+    work</a></li>
234
+    <li><a href="<gitblob>doc/spec/proposals">In-progress drafts of
235
+    new specifications and proposed changes</a></li>
236
+    </ul></li>
237
+    
238
+    </ul>
239
+    
240
+    <a id="NeatLinks"></a>
241
+    <h1><a class="anchor" href="#NeatLinks">Neat Links</a></h1>
242
+    <ul>
243
+    <li>The <a href="https://trac.torproject.org/projects/tor/wiki">Tor
244
+    wiki</a> provides a plethora of helpful contributions from Tor
245
+    users. Check it out!</li>
246
+    <li><a
247
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/SupportPrograms">A
248
+    list of supporting programs you might want to use in association with
249
+    Tor</a>.</li>
250
+    <li><a href="https://check.torproject.org/">The
251
+    Tor detector</a> or <a href="http://torcheck.xenobite.eu/">the other
252
+    Tor detector</a> try to guess if you're using Tor or not.</li>
253
+    <li>Check out one of the Tor status pages, such as <a
254
+    href="http://torstatus.blutmagie.de/">blutmagie's</a>, or <a
255
+    href="http://trunk.torstatus.kgprog.com/index.php">kgprog's</a>, or
256
+    Xenobite's <a href="https://torstat.xenobite.eu/">Tor node status</a> page.
257
+    Remember that these lists may not be as accurate as what your Tor
258
+    client uses, because your client fetches its own directory information and
259
+    examines it locally.</li>
260
+    <li>Read <a
261
+    href="http://freehaven.net/anonbib/topic.html#Anonymous_20communication">these
262
+    papers</a> (especially the ones in boxes) to get up to speed on the field
263
+    of anonymous communication systems.</li>
264
+    </ul>
265
+    
266
+    <a id="Developers"></a>
267
+    <h1><a class="anchor" href="#Developers">For Developers</a></h1>
268
+      Browse the Tor <b>source repository</b>:
269
+      <ul>
270
+        <li><a href="<gitrepo>">Browse the repository's source tree directly</a></li>
271
+        <li>Git and SVN access:
272
+          <ul>
273
+            <li><kbd>git clone git://git.torproject.org/git/tor</kbd></li>
274
+            <li>The development branch is <kbd>master</kbd>.  The active maintenance branches are <kbd>maint-0.2.0</kbd> and <kbd>maint-0.2.1</kbd>.</li>
275
+            <li><kbd>svn checkout https://svn.torproject.org/svn/website/trunk website</kbd></li>
276
+          </ul>
277
+        </li>
278
+        <li><a href="https://gitweb.torproject.org//githax.git?a=blob;f=doc/Howto.txt;hb=HEAD">Basic instructions for using Git to contribute to Tor software.</a></li>
279
+      </ul>
280
+  </div>
281
+  <!-- END MAINCOL -->
282
+  <div id = "sidecol">
283
+#include "side.wmi"
284
+#include "info.wmi"
285
+  </div>
286
+  <!-- END SIDECOL -->
287
+</div>
288
+<!-- END CONTENT -->
289
+#include <foot.wmi>  
... ...
@@ -0,0 +1,388 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Abuse FAQ" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/faq-abuse>">Abuse FAQ</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <!-- PUT CONTENT AFTER THIS TAG -->
14
+    <h1>Abuse FAQ</h1>
15
+    #<!-- BEGIN SIDEBAR -->
16
+    #<div class="sidebar-left">
17
+    #<h3>Questions</h3>
18
+    #<ul>
19
+    #<li><a href="<page docs/faq-abuse>#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></li>
20
+    #<li><a href="<page docs/faq-abuse>#DDoS">What about distributed denial of service attacks?</a></li>
21
+    #<li><a href="<page docs/faq-abuse>#WhatAboutSpammers">What about spammers?</a></li>
22
+    #<li><a href="<page docs/faq-abuse>#HowMuchAbuse">Does Tor get much abuse?</a></li>
23
+    #<li><a href="<page docs/faq-abuse>#TypicalAbuses">So what should I expect if I run an exit relay?</a></li>
24
+    #<li><a href="<page docs/faq-abuse>#IrcBans">Tor is banned from the IRC network I want to use.</a></li>
25
+    #<li><a href="<page docs/faq-abuse>#SMTPBans">Your nodes are banned from the mail server I want to use.</a></li>
26
+    #<li><a href="<page docs/faq-abuse>#Bans">I want to ban the Tor network from my service.</a></li>
27
+    #<li><a href="<page docs/faq-abuse>#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></li>
28
+    #<li><a href="<page docs/faq-abuse>#RemoveContent">I want some content removed from a .onion address.</a></li>
29
+    #<li><a href="<page docs/faq-abuse>#LegalQuestions">I have legal questions about Tor abuse.</a></li>
30
+    #</ul>
31
+    #</div>
32
+    #<!-- END SIDEBAR -->
33
+    #<hr />
34
+    
35
+    <a id="WhatAboutCriminals"></a>
36
+    <h3><a class="anchor" href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></h3>
37
+    
38
+    <p>Criminals can already do bad things. Since they're willing to
39
+    break laws, they already have lots of options available that provide
40
+    <em>better</em> privacy than Tor provides. They can steal cell phones,
41
+    use them, and throw them in a ditch; they can crack into computers
42
+    in Korea or Brazil and use them to launch abusive activities; they
43
+    can use spyware, viruses, and other techniques to take control of
44
+    literally millions of Windows machines around the world. </p>
45
+    
46
+    <p>Tor aims to provide protection for ordinary people who want to follow
47
+    the law. Only criminals have privacy right now, and we need to fix that. </p>
48
+    
49
+    <p>Some advocates of anonymity explain that it's just a tradeoff &mdash;
50
+    accepting the bad uses for the good ones &mdash; but there's more to it
51
+    than that.
52
+    Criminals and other bad people have the motivation to learn how to
53
+    get good anonymity, and many have the motivation to pay well to achieve
54
+    it. Being able to steal and reuse the identities of innocent victims
55
+    (identify theft) makes it even easier. Normal people, on the other hand,
56
+    don't have the time or money to spend figuring out how to get
57
+    privacy online. This is the worst of all possible worlds. </p>
58
+    
59
+    <p>So yes, criminals could in theory use Tor, but they already have
60
+    better options, and it seems unlikely that taking Tor away from the
61
+    world will stop them from doing their bad things. At the same time, Tor
62
+    and other privacy measures can <em>fight</em> identity theft, physical
63
+    crimes like stalking, and so on. </p>
64
+    
65
+    <!--
66
+    <a id="Pervasive"></a>
67
+    <h3><a class="anchor" href="#Pervasive">If the whole world starts using
68
+    Tor, won't civilization collapse?</a></h3>
69
+    -->
70
+    
71
+    <a id="DDoS"></a>
72
+    <h3><a class="anchor" href="#DDoS">What about distributed denial of service attacks?</a></h3>
73
+    
74
+    <p>Distributed denial of service (DDoS) attacks typically rely on having a group
75
+    of thousands of computers all sending floods of traffic to a victim. Since
76
+    the goal is to overpower the bandwidth of the victim, they typically send
77
+    UDP packets since those don't require handshakes or coordination. </p>
78
+    
79
+    <p>But because Tor only transports correctly formed TCP streams, not
80
+    all IP packets, you cannot send UDP packets over Tor. (You can't do
81
+    specialized forms of this attack like SYN flooding either.) So ordinary
82
+    DDoS attacks are not possible over Tor. Tor also doesn't allow bandwidth
83
+    amplification attacks against external sites: you need to send in a byte
84
+    for every byte that the Tor network will send to your destination. So
85
+    in general, attackers who control enough bandwidth to launch an effective
86
+    DDoS attack can do it just fine without Tor. </p>
87
+    
88
+    <a id="WhatAboutSpammers"></a>
89
+    <h3><a class="anchor" href="#WhatAboutSpammers">What about spammers?</a></h3>
90
+    
91
+    <p>First of all, the default Tor exit policy rejects all outgoing
92
+    port 25 (SMTP) traffic. So sending spam mail through Tor isn't going to
93
+    work by default. It's possible that some relay operators will enable
94
+    port 25 on their particular exit node, in which case that computer will
95
+    allow outgoing mails; but that individual could just set up an open mail
96
+    relay too, independent of Tor. In short, Tor isn't useful for spamming,
97
+    because nearly all Tor relays refuse to deliver the mail. </p>
98
+    
99
+    <p>Of course, it's not all about delivering the mail. Spammers can use
100
+    Tor to connect to open HTTP proxies (and from there to SMTP servers); to
101
+    connect to badly written mail-sending CGI scripts; and to control their
102
+    botnets &mdash; that is, to covertly communicate with armies of
103
+    compromised computers that deliver the spam.
104
+    </p>
105
+    
106
+    <p>
107
+    This is a shame, but notice that spammers are already doing great
108
+    without Tor. Also, remember that many of their more subtle communication
109
+    mechanisms (like spoofed UDP packets) can't be used over Tor, because
110
+    it only transports correctly-formed TCP connections.
111
+    </p>
112
+    
113
+    <a id="ExitPolicies"></a>
114
+    <h3><a class="anchor" href="#ExitPolicies">How do Tor exit policies work?</a></h3>
115
+    
116
+    <p>
117
+    <a href="<page docs/faq>#ExitPolicies">Moved to the new FAQ page</a>
118
+    </p>
119
+    
120
+    <a id="HowMuchAbuse"></a>
121
+    <h3><a class="anchor" href="#HowMuchAbuse">Does Tor get much abuse?</a></h3>
122
+    
123
+    <p>Not much, in the grand scheme of things. We've been running the network
124
+    since October 2003, and it's only generated a handful of complaints. Of
125
+    course, like all privacy-oriented networks on the net, we attract our
126
+    share of jerks. Tor's exit policies help separate the role of "willing
127
+    to donate resources to the network" from the role of "willing to deal
128
+    with exit abuse complaints," so we hope our network is more sustainable
129
+    than past attempts at anonymity networks. </p>
130
+    
131
+    <p>Since Tor has
132
+    <a href="<page about/overview>">many good uses as
133
+    well</a>, we feel that we're doing pretty well at striking a balance
134
+    currently. </p>
135
+    
136
+    <a id="TypicalAbuses"></a>
137
+    <h3><a class="anchor" href="#TypicalAbuses">So what should I expect if I run an exit relay?</a></h3>
138
+    
139
+    <p>If you run a Tor relay that allows exit connections (such as the
140
+    default exit policy), it's probably safe to say that you will eventually
141
+    hear from somebody. Abuse
142
+    complaints may come in a variety of forms. For example: </p>
143
+    <ul>
144
+    <li>Somebody connects to Hotmail, and sends a ransom note to a
145
+    company. The
146
+    FBI sends you a polite email, you explain that you run a Tor relay,
147
+    and they say "oh well" and leave you alone. [Port 80]</li>
148
+    <li>Somebody tries to get you shut down by using Tor to connect to Google
149
+    groups and post spam to Usenet, and then sends an angry mail to
150
+    your ISP about how you're destroying the world. [Port 80]</li>
151
+    <li>Somebody connects to an IRC network and makes a nuisance of
152
+    himself. Your ISP gets polite mail about how your computer has been
153
+    compromised; and/or your computer gets DDoSed. [Port 6667]</li>
154
+    <li>Somebody uses Tor to download a Vin Diesel movie, and
155
+    your ISP gets a DMCA takedown notice. See EFF's
156
+    <a href="<page eff/tor-dmca-response>">Tor DMCA Response
157
+    Template</a>, which explains why your ISP can probably ignore
158
+    the notice without any liability. [Arbitrary ports]</li>
159
+    </ul>
160
+    
161
+    <p>You might also find that your Tor relay's IP is blocked from accessing
162
+    some Internet sites/services. This might happen regardless of your exit
163
+    policy, because some groups don't seem to know or care that Tor has
164
+    exit policies. (If you have a spare IP not used for other activities,
165
+    you might consider running your Tor relay on it.) For example, </p>
166
+    
167
+    <ul>
168
+    <li>Because of a few cases of anonymous jerks messing with its web
169
+    pages, Wikipedia is currently blocking many Tor relay IPs from writing
170
+    (reading still works). We're talking to Wikipedia about how they might
171
+    control abuse while still providing access to anonymous contributors,
172
+    who often have hot news or inside info on a topic but don't want to risk
173
+    revealing their identities when publishing it (or don't want to reveal
174
+    to local observers that they're accessing Wikipedia). Slashdot is also
175
+    in the same boat.</li>
176
+    
177
+    <li>SORBS is putting some Tor relay IPs on their email
178
+    blacklist as well. They do this because they passively detect whether your
179
+    relay connects to certain IRC networks, and they conclude from this that
180
+    your relay is capable of spamming. We tried to work with
181
+    them to teach them that not all software works this way,
182
+    but we have given up. We recommend you avoid them, and <a
183
+    href="http://paulgraham.com/spamhausblacklist.html">teach your friends
184
+    (if they use them) to avoid abusive blacklists too</a>.</li>
185
+    
186
+    </ul>
187
+    
188
+    <a id="IrcBans"></a>
189
+    <h3><a class="anchor" href="#IrcBans">Tor is banned from the IRC network I want to use.</a></h3>
190
+    
191
+    <p>Sometimes jerks make use of Tor to troll IRC channels. This abuse
192
+    results in IP-specific temporary bans ("klines" in IRC lingo), as the
193
+    network operators try to keep the troll off of their network. </p>
194
+    
195
+    <p>This response underscores a fundamental flaw in IRC's security model:
196
+    they assume that IP addresses equate to humans, and by banning the
197
+    IP address they can ban the human. In reality this is not the case &mdash;
198
+    many such trolls routinely make use of the literally millions of open
199
+    proxies and compromised computers around the Internet. The IRC networks
200
+    are fighting a losing battle of trying to block all these nodes,
201
+    and an entire cottage industry of blacklists and counter-trolls has
202
+    sprung up based on this flawed security model (not unlike the antivirus
203
+    industry). The Tor network is just a drop in the bucket here. </p>
204
+    
205
+    <p>On the other hand, from the viewpoint of IRC server operators, security
206
+    is not an all-or-nothing thing.  By responding quickly to trolls or
207
+    any other social attack, it may be possible to make the attack scenario
208
+    less attractive to the attacker.  And most individual IP addresses do
209
+    equate to individual humans, on any given IRC network at any given time.
210
+    The exceptions include NAT gateways which may be allocated access as
211
+    special cases. While it's a losing battle to try to stop the use of open
212
+    proxies, it's not generally a losing battle to keep klining a single
213
+    ill-behaved IRC user until that user gets bored and goes away. </p>
214
+    
215
+    <p>But the real answer is to implement application-level auth systems,
216
+    to let in well-behaving users and keep out badly-behaving users. This
217
+    needs to be based on some property of the human (such as a password he
218
+    knows), not some property of the way his packets are transported. </p>
219
+    
220
+    <p>Of course, not all IRC networks are trying to ban Tor nodes. After
221
+    all, quite a few people use Tor to IRC in privacy in order to carry
222
+    on legitimate communications without tying them to their real-world
223
+    identity. Each IRC network needs to decide for itself if blocking a few
224
+    more of the millions of IPs that bad people can use is worth losing the
225
+    contributions from the well-behaved Tor users. </p>
226
+    
227
+    <p>If you're being blocked, have a discussion with the network operators
228
+    and explain the issues to them. They may not be aware of the existence of
229
+    Tor at all, or they may not be aware that the hostnames they're klining
230
+    are Tor exit nodes.  If you explain the problem, and they conclude that
231
+    Tor ought to be blocked, you may want to consider moving to a network that
232
+    is more open to free speech.  Maybe inviting them to #tor on irc.oftc.net
233
+    will help show them that we are not all evil people. </p>
234
+    
235
+    <p>Finally, if you become aware of an IRC network that seems to be
236
+    blocking Tor, or a single Tor exit node, please put that information on <a
237
+    href="https://wiki.torproject.org/wiki/TheOnionRouter/BlockingIrc">The Tor
238
+    IRC block tracker</a>
239
+    so that others can share.  At least one IRC network consults that page
240
+    to unblock exit nodes that have been blocked inadvertently. </p>
241
+    
242
+    <a id="SMTPBans"></a>
243
+    <h3><a class="anchor" href="#SMTPBans">Your nodes are banned from the mail server I want to use.</a></h3>
244
+    
245
+    <p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for
246
+    spamming</a>, some over-zealous blacklisters seem to think that all
247
+    open networks like Tor are evil &mdash; they attempt to strong-arm network
248
+    administrators on policy, service, and routing issues, and then extract
249
+    ransoms from victims. </p>
250
+    
251
+    <p>If your server administrators decide to make use of these
252
+    blacklists to refuse incoming mail, you should have a conversation with
253
+    them and explain about Tor and Tor's exit policies. </p>
254
+    
255
+    <a id="Bans"></a>
256
+    <h3><a class="anchor" href="#Bans">I want to ban the Tor network from my service.</a></h3>
257
+    
258
+    <p>We're sorry to hear that. There are some situations where it makes
259
+    sense to block anonymous users for an Internet service. But in many
260
+    cases, there are easier solutions that can solve your problem while
261
+    still allowing users to access your website securely.</p>
262
+    
263
+    <p>First, ask yourself if there's a way to do application-level decisions
264
+    to separate the legitimate users from the jerks. For example, you might
265
+    have certain areas of the site, or certain privileges like posting,
266
+    available only to people who are registered. It's easy to build an
267
+    up-to-date list of Tor IP addresses that allow connections to your
268
+    service, so you could set up this distinction only for Tor users. This
269
+    way you can have multi-tiered access and not have to ban every aspect
270
+    of your service. </p>
271
+    
272
+    <p>For example, the <a
273
+    href="http://freenode.net/policy.shtml#tor">Freenode IRC network</a>
274
+    had a problem with a coordinated group of abusers joining channels and
275
+    subtly taking over the conversation; but when they labelled all users
276
+    coming from Tor nodes as "anonymous users," removing the ability of the
277
+    abusers to blend in, the abusers moved back to using their open proxies
278
+    and bot networks. </p>
279
+    
280
+    <p>Second, consider that hundreds of thousands of
281
+    people use Tor every day simply for
282
+    good data hygiene &mdash; for example, to protect against data-gathering
283
+    advertising companies while going about their normal activities. Others
284
+    use Tor because it's their only way to get past restrictive local
285
+    firewalls. Some Tor users may be legitimately connecting
286
+    to your service right now to carry on normal activities. You need to
287
+    decide whether banning the Tor network is worth losing the contributions
288
+    of these users, as well as potential future legitimate users. (Often
289
+    people don't have a good measure of how many polite Tor users are
290
+    connecting to their service &mdash; you never notice them until there's
291
+    an impolite one.)</p>
292
+    
293
+    <p>At this point, you should also ask yourself what you do about other
294
+    services that aggregate many users behind a few IP addresses. Tor is
295
+    not so different from AOL in this respect.</p>
296
+    
297
+    <p>Lastly, please remember that Tor relays have <a
298
+    href="<page docs/faq>#ExitPolicies">individual exit policies</a>. Many Tor relays do
299
+    not allow exiting connections at all. Many of those that do allow some
300
+    exit connections might already disallow connections to
301
+    your service. When you go about banning nodes, you should parse the
302
+    exit policies and only block the ones that allow these connections;
303
+    and you should keep in mind that exit policies can change (as well as
304
+    the overall list of nodes in the network).</p>
305
+    
306
+    <p>If you really want to do this, we provide a
307
+    <a href="https://check.torproject.org/cgi-bin/TorBulkExitList.py">Tor
308
+    exit relay list</a> or a
309
+    <a href="<page projects/tordnsel>">DNS-based list you can query</a>.
310
+    </p>
311
+    
312
+    <p>
313
+    (Some system administrators block ranges of IP addresses because of
314
+    official policy or some abuse pattern, but some have also asked about
315
+    whitelisting Tor exit relays because they want to permit access to their
316
+    systems only using Tor. These scripts are usable for whitelisting as well.)
317
+    </p>
318
+    
319
+    <a id="TracingUsers"></a>
320
+    <h3><a class="anchor" href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></h3>
321
+    
322
+    <p>
323
+    There is nothing the Tor developers can do to trace Tor users. The same
324
+    protections that keep bad people from breaking Tor's anonymity also
325
+    prevent us from figuring out what's going on.
326
+    </p>
327
+    
328
+    <p>
329
+    Some fans have suggested that we redesign Tor to include a <a
330
+    href="<page docs/faq>#Backdoor">backdoor</a>.
331
+    There are two problems with this idea. First, it technically weakens the
332
+    system too far. Having a central way to link users to their activities
333
+    is a gaping hole for all sorts of attackers; and the policy mechanisms
334
+    needed to ensure correct handling of this responsibility are enormous
335
+    and unsolved. Second, the bad people <a href="#WhatAboutCriminals">aren't
336
+    going to get caught by this anyway</a>, since they will use other means
337
+    to ensure their anonymity (identity theft, compromising computers and
338
+    using them as bounce points, etc).
339
+    </p>
340
+    
341
+    <p>
342
+    But remember that this doesn't mean that Tor is invulnerable. Traditional
343
+    police techniques can still be very effective against Tor, such as
344
+    interviewing suspects, surveillance and keyboard taps, writing style
345
+    analysis, sting operations, and other physical investigations.
346
+    </p>
347
+    
348
+    <a id="RemoveContent"></a>
349
+    <h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3>
350
+    <p>The Tor Project does not host, control, nor have the ability to
351
+    discover the owner or location of a .onion address.  The .onion address is
352
+    an address from <a href="<page docs/hidden-services>">a hidden
353
+    service</a>.  The name you see ending in .onion is a hidden service descriptor.
354
+    It's an automatically generated name which can be located on any Tor
355
+    relay or client anywhere on the Internet.  Hidden services are designed
356
+    to protect both the user and service provider from discovering who they
357
+    are and where they are from.  The design of hidden services means the
358
+    owner and location of the .onion site is hidden even from us.</p>
359
+    <p>But remember that this doesn't mean that hidden services are
360
+    invulnerable. Traditional police techniques can still be very effective
361
+    against them, such as interviewing suspects, surveillance and keyboard
362
+    taps, writing style analysis, sting operations, and other physical
363
+    investigations.</p>
364
+    <p>If you have a complaint about child pornography, you may wish to report
365
+    it to the National Center for Missing and Exploited Children, which serves
366
+    as a national coordination point for investigation of child pornography:
367
+    <a href="http://www.missingkids.com/">http://www.missingkids.com/</a>.
368
+    We do not view links you report.</p>
369
+    
370
+    <a id="LegalQuestions"></a>
371
+    <h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>
372
+    
373
+    <p>We're only the developers. We can answer technical questions, but
374
+    we're not the ones to talk to about legal questions or concerns. </p>
375
+    
376
+    <p>Please take a look at the
377
+    <a href="<page eff/tor-legal-faq>">Tor Legal FAQ</a>,
378
+    and contact EFF directly if you have any further legal questions. </p>
379
+  </div>
380
+  <!-- END MAINCOL -->
381
+  <div id = "sidecol">
382
+#include "side.wmi"
383
+#include "info.wmi"
384
+  </div>
385
+  <!-- END SIDECOL -->
386
+</div>
387
+<!-- END CONTENT -->
388
+#include <foot.wmi>  
... ...
@@ -0,0 +1,1152 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: FAQ" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/faq>">FAQ</a>
11
+  </div>
12
+  <div id="maincol">
13
+    <!-- PUT CONTENT AFTER THIS TAG -->
14
+    <h1>Tor FAQ</h1>
15
+    <hr />
16
+    
17
+    <p>General questions:</p>
18
+    <ul>
19
+    <li><a href="#WhatIsTor">What is Tor?</a></li>
20
+    <li><a href="#Torisdifferent">How is Tor different from other proxies?</a></li>
21
+    <li><a href="#CompatibleApplications">What programs can I use with
22
+    Tor?</a></li>
23
+    <li><a href="#WhyCalledTor">Why is it called Tor?</a></li>
24
+    <li><a href="#Backdoor">Is there a backdoor in Tor?</a></li>
25
+    <li><a href="#DistributingTor">Can I distribute Tor on my magazine's
26
+    CD?</a></li>
27
+    <li><a href="#SupportMail">How can I get an answer to my
28
+    Tor support mail?</a></li>
29
+    <li><a href="#WhySlow">Why is Tor so slow?</a></li>
30
+    <li><a href="#Funding">What would The Tor Project do with more
31
+    funding?</a></li>
32
+    </ul>
33
+    
34
+    <p>Compilation and Installation:</p>
35
+    <ul>
36
+    <li><a href="#HowUninstallTor">How do I uninstall Tor?</a></li>
37
+    <li><a href="#PGPSigs">What are these "sig" files on the download
38
+    page?</a></li>
39
+    <li><a href="#CompileTorWindows">How do I compile Tor under Windows?</a></li>
40
+    <li><a href="#VirusFalsePositives">Why does my Tor executable appear to
41
+    have a virus or spyware?</a></li>
42
+    <li><a href="#LiveCD">Is there a LiveCD or other bundle that includes Tor?</a></li>
43
+    </ul>
44
+    
45
+    <p>Running Tor:</p>
46
+    
47
+    <p>Running a Tor client:</p>
48
+    <ul>
49
+    <li><a href="#ChooseEntryExit">Can I control which nodes (or country) are used for entry/exit?</a></li>
50
+    </ul>
51
+    
52
+    <p>Running a Tor relay:</p>
53
+    <ul>
54
+    <li><a href="#RelayFlexible">How stable does my relay need to be?</a></li>
55
+    <li><a href="#ExitPolicies">I'd run a relay, but I don't want to deal
56
+    with abuse issues.</a></li>
57
+    <li><a href="#RelayOrBridge">Should I be a normal relay or bridge
58
+    relay?</a></li>
59
+    <li><a href="#RelayMemory">Why is my Tor relay using so much memory?</a></li>
60
+    <li><a href="#WhyNotNamed">Why is my Tor relay not named?</a></li>
61
+    </ul>
62
+    
63
+    <p>Running a Tor hidden service:</p>
64
+    
65
+    <p>Anonymity and Security:</p>
66
+    <ul>
67
+    <li><a href="#KeyManagement">Tell me about all the keys Tor uses.</a></li>
68
+    </ul>
69
+    
70
+    <p>Alternate designs that we don't do (yet):</p>
71
+    <ul>
72
+    <li><a href="#EverybodyARelay">You should make every Tor user be a
73
+    relay.</a></li>
74
+    </ul>
75
+    
76
+    <p>Abuse</p>
77
+    <ul>
78
+    <li><a href="#Criminals">Doesn't Tor enable criminals to do bad things?</a></li>
79
+    <li><a href="#RespondISP">How do I respond to my ISP about my exit
80
+    relay?</a></li>
81
+    </ul>
82
+    
83
+    <p>For other questions not yet on this version of the FAQ, see the <a
84
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ">wiki
85
+    FAQ</a> for now.</p>
86
+    
87
+    <hr />
88
+    
89
+    <a id="General"></a>
90
+    
91
+    <a id="WhatIsTor"></a>
92
+    <h3><a class="anchor" href="#WhatIsTor">What is Tor?</a></h3>
93
+    
94
+    <p>
95
+    The name "Tor" can refer to several different components.
96
+    </p>
97
+    
98
+    <p>
99
+    The Tor software is a program you can run on your computer that helps keep
100
+    you safe on the Internet. Tor protects you by bouncing your communications
101
+    around a distributed network of relays run by volunteers all around
102
+    the world: it prevents somebody watching your Internet connection from
103
+    learning what sites you visit, and it prevents the sites you visit
104
+    from learning your physical location. This set of volunteer relays is
105
+    called the Tor network. You can read more about how Tor works on the <a
106
+    href="<page about/overview>">overview page</a>.
107
+    </p>
108
+    
109
+    <p>
110
+    The Tor Project is a non-profit (charity) organization that maintains
111
+    and develops the Tor software.
112
+    </p>
113
+    
114
+    <hr />
115
+    
116
+    <a id="Torisdifferent"></a>
117
+    <h3><a class="anchor" href="#Torisdifferent">How is Tor different from other proxies?</a></h3>
118
+    <p>
119
+    A typical proxy provider sets up a server somewhere on the Internet and allows you to use it to relay your traffic.  This creates a simple, easy to maintain architecture.  The users all enter and leave through the same server.  The provider may charge for use of the proxy, or fund their costs through advertisements on the server.  In the simplest configuration, you don't have to install anything.  You just have to point your browser at their proxy server.  Simple proxy providers are fine solutions if you do not want protections for your privacy and anonymity online and you trust the provider from doing bad things.  Some simple proxy providers use SSL to secure your connection to them.  This may protect you against local eavesdroppers, such as those at a cafe with free wifi Internet.
120
+    </p>
121
+    <p>
122
+    Simple proxy providers also create a single point of failure.  The provider knows who you are and where you browse on the Internet.  They can see your traffic as it passes through their server.  In some cases, they can see your encrypted traffic as they relay it to your banking site or to ecommerce stores.  You have to trust the provider isn't doing any number of things, such as watching your traffic, injecting their own advertisements into your traffic stream, and isn't recording your personal details.
123
+    </p>
124
+    <p>
125
+    Tor passes your traffic through at least 3 different servers before sending it on to the destination.  Tor does not modify, or even know, what you are sending into it.  It merely relays your traffic, completely encrypted through the Tor network and has it pop out somewhere else in the world, completely intact.  The Tor client is required because we assume you trust your local computer.  The Tor client manages the encryption and the path chosen through the network.  The relays located all over the world merely pass encrypted packets between themselves.</p>
126
+    <p>
127
+    <dl>
128
+    <dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad first of three servers can see encrypted Tor traffic coming from your computer.  It still doesn't know who you are and what you are doing over Tor.  It merely sees "This IP address is using Tor".  Tor is not illegal anywhere in the world, so using Tor by itself is fine.  You are still protected from this node figuring out who you are and where you are going on the Internet.</dd>
129
+    <dt>Can't the third server see my traffic?</dt><dd>Possibly.  A bad third of three servers can see the traffic you sent into Tor.  It won't know who sent this traffic.  If you're using encryption, such as visiting a bank or e-commerce website, or encrypted mail connections, etc, it will only know the destination.  It won't be able to see the data inside the traffic stream.  You are still protected from this node figuring out who you are and if using encryption, what data you're sending to the destination.</dd>
130
+    </dl>
131
+    </p>
132
+    
133
+    <hr />
134
+    
135
+    <a id="CompatibleApplications"></a>
136
+    <h3><a class="anchor" href="#CompatibleApplications">What programs can
137
+    I use with Tor?</a></h3>
138
+    
139
+    <p>
140
+    There are two pieces to "Torifying" a program: connection-level anonymity
141
+    and application-level anonymity. Connection-level anonymity focuses on
142
+    making sure the application's Internet connections get sent through Tor.
143
+    This step is normally done by configuring
144
+    the program to use your Tor client as a "socks" proxy, but there are
145
+    other ways to do it too. For application-level anonymity, you need to
146
+    make sure that the information the application sends out doesn't hurt
147
+    your privacy. (Even if the connections are being routed through Tor, you
148
+    still don't want to include sensitive information like your name.) This
149
+    second step needs to be done on a program-by-program basis, which is
150
+    why we don't yet recommend very many programs for safe use with Tor.
151
+    </p>
152
+    
153
+    <p>
154
+    Most of our work so far has focused on the Firefox web browser. The
155
+    bundles on the <a href="<page download/download>">download page</a> automatically
156
+    install the <a href="<page projects/torbutton>">Torbutton Firefox
157
+    extension</a> if you have Firefox installed. As of version 1.2.0,
158
+    Torbutton now takes care of a lot of the connection-level and
159
+    application-level worries.
160
+    </p>
161
+    
162
+    <p>
163
+    There are plenty of other programs you can use with Tor,
164
+    but we haven't researched the application-level anonymity
165
+    issues on them well enough to be able to recommend a safe
166
+    configuration. Our wiki has a list of instructions for <a
167
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorifyHOWTO">Torifying
168
+    specific applications</a>. There's also a <a
169
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/SupportPrograms">list
170
+    of applications that help you direct your traffic through Tor</a>.
171
+    Please add to these lists and help us keep them accurate!
172
+    </p>
173
+    
174
+    <hr />
175
+    
176
+    <a id="WhyCalledTor"></a>
177
+    <h3><a class="anchor" href="#WhyCalledTor">Why is it called Tor?</a></h3>
178
+    
179
+    <p>
180
+    Because Tor is the onion routing network. When we were starting the
181
+    new next-generation design and implementation of onion routing in
182
+    2001-2002, we would tell people we were working on onion routing,
183
+    and they would say "Neat. Which one?" Even if onion routing has
184
+    become a standard household term, Tor was born out of the actual <a
185
+    href="http://www.onion-router.net/">onion routing project</a> run by
186
+    the Naval Research Lab.
187
+    </p>
188
+    
189
+    <p>
190
+    (It's also got a fine translation from German and Turkish.)
191
+    </p>
192
+    
193
+    <p>
194
+    Note: even though it originally came from an acronym, Tor is not spelled
195
+    "TOR". Only the first letter is capitalized. In fact, we can usually
196
+    spot people who haven't read any of our website (and have instead learned
197
+    everything they know about Tor from news articles) by the fact that they
198
+    spell it wrong.
199
+    </p>
200
+    
201
+    <hr />
202
+    
203
+    <a id="Backdoor"></a>
204
+    <h3><a class="anchor" href="#Backdoor">Is there a backdoor in Tor?</a></h3>
205
+    
206
+    <p>
207
+    There is absolutely no backdoor in Tor. Nobody has asked us to put one
208
+    in, and we know some smart lawyers who say that it's unlikely that anybody
209
+    will try to make us add one in our jurisdiction (U.S.). If they do
210
+    ask us, we will fight them, and (the lawyers say) probably win.
211
+    </p>
212
+    
213
+    <p>
214
+    We think that putting a backdoor in Tor would be tremendously
215
+    irresponsible to our users, and a bad precedent for security software
216
+    in general. If we ever put a deliberate backdoor in our security
217
+    software, it would ruin our professional reputations. Nobody would
218
+    trust our software ever again &mdash; for excellent reason!
219
+    </p>
220
+    
221
+    <p>
222
+    But that said, there are still plenty of subtle attacks
223
+    people might try. Somebody might impersonate us, or break into our
224
+    computers, or something like that. Tor is open source, and you should
225
+    always check the source (or at least the diffs since the last release)
226
+    for suspicious things. If we (or the distributors) don't give you
227
+    source, that's a sure sign something funny might be going on. You
228
+    should also check the <a href="<page docs/verifying-signatures>">PGP
229
+    signatures</a> on the releases, to make sure nobody messed with the
230
+    distribution sites.
231
+    </p>
232
+    
233
+    <p>
234
+    Also, there might be accidental bugs in Tor that could affect your
235
+    anonymity. We periodically find and fix anonymity-related bugs, so make
236
+    sure you keep your Tor versions up-to-date.
237
+    </p>
238
+    
239
+    <hr />
240
+    
241
+    <a id="DistributingTor"></a>
242
+    <h3><a class="anchor" href="#DistributingTor">Can I distribute Tor on
243
+    my magazine's CD?</a></h3>
244
+    
245
+    <p>
246
+    Yes.
247
+    </p>
248
+    
249
+    <p>
250
+    The Tor software is <a href="https://www.fsf.org/">free software</a>. This
251
+    means we give you the rights to redistribute the Tor software, either
252
+    modified or unmodified, either for a fee or gratis. You don't have to
253
+    ask us for specific permission.
254
+    </p>
255
+    
256
+    <p>
257
+    However, if you want to redistribute the Tor software you must follow our
258
+    <a href="<gitblob>LICENSE">LICENSE</a>.
259
+    Essentially this means that you need to include our LICENSE file along
260
+    with whatever part of the Tor software you're distributing.
261
+    </p>
262
+    
263
+    <p>
264
+    Most people who ask us this question don't want to distribute just the
265
+    Tor software, though. They want to distribute the Tor bundles, which
266
+    typically include <a href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a>
267
+    and <a href="<page projects/vidalia>">Vidalia</a>.
268
+    You will need to follow the licenses for those programs
269
+    as well. Both of them are distributed under the <a
270
+    href="https://www.fsf.org/licensing/licenses/gpl.html">GNU General
271
+    Public License</a>. The simplest way to obey their licenses is to
272
+    include the source code for these programs everywhere you include
273
+    the bundles themselves. Look for "source" packages on the <a
274
+    href="<page projects/vidalia>">Vidalia page</a> and the <a
275
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo
276
+    download page</a>.
277
+    </p>
278
+    
279
+    <p>
280
+    Also, you should make sure not to confuse your readers about what Tor is,
281
+    who makes it, and what properties it provides (and doesn't provide). See
282
+    our <a href="<page docs/trademark-faq>">trademark FAQ</a> for details.
283
+    </p>
284
+    
285
+    <p>
286
+    Lastly, you should realize that we release new versions of the
287
+    Tor software frequently, and sometimes we make backward incompatible
288
+    changes. So if you distribute a particular version of the Tor software, it
289
+    may not be supported &mdash; or even work &mdash; six months later. This
290
+    is a fact of life for all security software under heavy development.
291
+    </p>
292
+    
293
+    <hr />
294
+    
295
+    <a id="SupportMail"></a>
296
+    <h3><a class="anchor" href="#SupportMail">How can I get an answer to my
297
+    Tor support mail?</a></h3>
298
+    
299
+    <p>
300
+    Many people send the Tor developers mail privately, or send mail to
301
+    our internal <a href="<page about/contact>">lists</a>, with questions about their
302
+    specific setup &mdash; they can't get their firewall working right,
303
+    they can't configure Polipo correctly, or so on. Sometimes our
304
+    volunteers can answer these mails, but typically they need to spend
305
+    most of their time on development tasks that will benefit more people.
306
+    This is especially true if your question is already covered in the <a
307
+    href="<page docs/documentation>">documentation</a> or on this FAQ.
308
+    </p>
309
+    
310
+    <p>
311
+    So if we don't answer your mail, first check the <a href="<page
312
+    docs/documentation>">documentation</a> page, along with this FAQ,
313
+    to make sure your question isn't already answered.  Then read <a
314
+    href="http://www.catb.org/~esr/faqs/smart-questions.html">"How to ask
315
+    questions the smart way"</a>. If this doesn't help you, note that we
316
+    have <a href="<page docs/documentation>#Support">an IRC channel</a> where you
317
+    can ask your questions (but if they are still open-ended, ill-formed,
318
+    or not about Tor, you likely won't get much help there either). Lastly,
319
+    people on the <a href="<page docs/documentation>#MailingLists">or-talk
320
+    mailing list</a> may be able to provide some hints for you, if
321
+    others have experienced your problems too. Be sure to look over <a
322
+    href="http://archives.seul.org/or/talk/">the archives</a> first.
323
+    </p>
324
+    
325
+    <p>
326
+    Another strategy is to <a href="<page docs/tor-doc-relay>">run a Tor
327
+    relay for a while</a>, and/or <a href="<page donate/donate>">donate money</a>
328
+    <a href="<page getinvolved/volunteer>">or time</a> to the effort. We're more likely
329
+    to pay attention to people who have demonstrated interest and commitment
330
+    to giving back to the Tor community.
331
+    </p>
332
+    
333
+    <p>
334
+    If you find your answer, please stick around on the IRC channel or the
335
+    mailing list and answer questions from others.
336
+    </p>
337
+    
338
+    <hr />
339
+    
340
+    <a id="WhySlow"></a>
341
+    <h3><a class="anchor" href="#WhySlow">Why is Tor so slow?</a></h3>
342
+    
343
+    <p>
344
+    There are many reasons why the Tor network is currently slow.
345
+    </p>
346
+    
347
+    <p>
348
+    Before we answer, though, you should realize that Tor is never going to
349
+    be blazing fast. Your traffic is bouncing through volunteers' computers
350
+    in various parts of the world, and some bottlenecks and network latency
351
+    will always be present. You shouldn't expect to see university-style
352
+    bandwidth through Tor.
353
+    </p>
354
+    
355
+    <p>
356
+    But that doesn't mean that it can't be improved. The current Tor network
357
+    is quite small compared to the number of people trying to use it, and
358
+    many of these users don't understand or care that Tor can't currently
359
+    handle file-sharing traffic load.
360
+    </p>
361
+    
362
+    <p>
363
+    For the much more in-depth answer, see <a
364
+    href="https://blog.torproject.org/blog/why-tor-is-slow">Roger's blog
365
+    post on the topic</a>, which includes both a detailed PDF and a video
366
+    to go with it.
367
+    </p>
368
+    
369
+    <p>
370
+    What can you do to help?
371
+    </p>
372
+    
373
+    <ul>
374
+    
375
+    <li>
376
+    <a href="<page docs/tor-doc-relay>">Configure your Tor to relay traffic
377
+    for others</a>. Help make the Tor network large enough that we can handle
378
+    all the users who want privacy and security on the Internet.
379
+    </li>
380
+    
381
+    <li>
382
+    <a href="<page projects/gui>">Help us make Tor more usable</a>. We
383
+    especially need people to help make it easier to configure your Tor
384
+    as a relay. Also, we need help with clear simple documentation to
385
+    walk people through setting it up.
386
+    </li>
387
+    
388
+    <li>
389
+    There are some bottlenecks in the current Tor network. Help us design
390
+    experiments to track down and demonstrate where the problems are, and
391
+    then we can focus better on fixing them.
392
+    </li>
393
+    
394
+    <li>
395
+    There are some steps that individuals
396
+    can take to improve their Tor performance. <a
397
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/FireFoxTorPerf">You
398
+    can configure your Firefox to handle Tor better</a>, <a
399
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/tor.html">you can use
400
+    Polipo with Tor</a>, or you can try <a href="<page download/download>">upgrading
401
+    to the latest version of Tor</a>.  If this works well, please help by
402
+    documenting what you did, and letting us know about it.
403
+    </li>
404
+    
405
+    <li>
406
+    Tor needs some architectural changes too. One important change is to
407
+    start providing <a href="#EverybodyARelay">better service to people who
408
+    relay traffic</a>. We're working on this, and we'll finish faster if we
409
+    get to spend more time on it.
410
+    </li>
411
+    
412
+    <li>
413
+    Help do other things so we can do the hard stuff. Please take a moment
414
+    to figure out what your skills and interests are, and then <a href="<page
415
+    getinvolved/volunteer>">look at our volunteer page</a>.
416
+    </li>
417
+    
418
+    <li>
419
+    Help find sponsors for Tor. Do you work at a company or government agency
420
+    that uses Tor or has a use for Internet privacy, e.g. to browse the
421
+    competition's websites discreetly, or to connect back to the home servers
422
+    when on the road without revealing affiliations? If your organization has
423
+    an interest in keeping the Tor network working, please contact them about
424
+    supporting Tor. Without sponsors, Tor is going to become even slower.
425
+    </li>
426
+    
427
+    <li>
428
+    If you can't help out with any of the above, you can still help out
429
+    individually by <a href="<page donate/donate>">donating a bit of money to the
430
+    cause</a>. It adds up!
431
+    </li>
432
+    
433
+    </ul>
434
+    
435
+    <hr />
436
+    
437
+    <a id="Funding"></a>
438
+    <h3><a class="anchor" href="#Funding">What would The Tor Project do with
439
+    more funding?</a></h3>
440
+    
441
+    <p>
442
+    We have about 1800 relays right now, pushing over 150 MB/s average
443
+    traffic. We have several hundred thousand active users. But the Tor
444
+    network is not yet self-sustaining.
445
+    </p>
446
+    
447
+    <p>
448
+    There are six main development/maintenance pushes that need attention:
449
+    </p>
450
+    
451
+    <ul>
452
+    
453
+    <li>
454
+    Scalability: We need to keep scaling and decentralizing the Tor
455
+    architecture so it can handle thousands of relays and millions of
456
+    users. The upcoming stable release is a major improvement, but there's
457
+    lots more to be done next in terms of keeping Tor fast and stable.
458
+    </li>
459
+    
460
+    <li>
461
+    User support: With this many users, a lot of people are asking questions
462
+    all the time, offering to help out with things, and so on. We need good
463
+    clean docs, and we need to spend some effort coordinating volunteers.
464
+    </li>
465
+    
466
+    <li>
467
+    Relay support: the Tor network is run by volunteers, but they still need
468
+    attention with prompt bug fixes, explanations when things go wrong,
469
+    reminders to upgrade, and so on. The network itself is a commons, and
470
+    somebody needs to spend some energy making sure the relay operators stay
471
+    happy. We also need to work on <a href="#RelayOS">stability</a> on some
472
+    platforms &mdash; e.g., Tor relays have problems on Win XP currently.
473
+    </li>
474
+    
475
+    <li>
476
+    Usability: Beyond documentation, we also need to work on usability of the
477
+    software itself. This includes installers, clean GUIs, easy configuration
478
+    to interface with other applications, and generally automating all of
479
+    the difficult and confusing steps inside Tor. We've got a start on this
480
+    with the <a href="<page projects/gui>">GUI Contest</a>, but much more work
481
+    remains &mdash; usability for privacy software has never been easy.
482
+    </li>
483
+    
484
+    <li>
485
+    Incentives: We need to work on ways to encourage people to configure
486
+    their Tors as relays and exit nodes rather than just clients.
487
+    <a href="#EverybodyARelay">We need to make it easy to become a relay,
488
+    and we need to give people incentives to do it.</a>
489
+    </li>
490
+    
491
+    <li>
492
+    Research: The anonymous communications field is full
493
+    of surprises and gotchas. In our copious free time, we
494
+    also help run top anonymity and privacy conferences like <a
495
+    href="http://petsymposium.org/">PETS</a>. We've identified a set of
496
+    critical <a href="<page getinvolved/volunteer>#Research">Tor research questions</a>
497
+    that will help us figure out how to make Tor secure against the variety of
498
+    attacks out there. Of course, there are more research questions waiting
499
+    behind these.
500
+    </li>
501
+    
502
+    </ul>
503
+    
504
+    <p>
505
+    We're continuing to move forward on all of these, but at this rate
506
+    <a href="#WhySlow">the Tor network is growing faster than the developers
507
+    can keep up</a>.
508
+    Now would be an excellent time to add a few more developers to the effort
509
+    so we can continue to grow the network.
510
+    </p>
511
+    
512
+    <p>
513
+    We are also excited about tackling related problems, such as
514
+    censorship-resistance.
515
+    </p>
516
+    
517
+    <p>
518
+    We are proud to have <a href="<page about/sponsors>">sponsorship and support</a>
519
+    from the Omidyar Network, the International Broadcasting Bureau, Bell
520
+    Security Solutions, the Electronic Frontier Foundation, several government
521
+    agencies and research groups, and hundreds of private contributors.
522
+    </p>
523
+    
524
+    <p>
525
+    However, this support is not enough to keep Tor abreast of changes in the
526
+    Internet privacy landscape. Please <a href="<page donate/donate>">donate</a>
527
+    to the project, or <a href="<page about/contact>">contact</a> our executive
528
+    director for information on making grants or major donations.
529
+    </p>
530
+    
531
+    <hr />
532
+    
533
+    <a id="HowUninstallTor"></a>
534
+    <h3><a class="anchor" href="#HowUninstallTor">How do I uninstall Tor?</a></h3>
535
+    
536
+    <p>
537
+    This depends entirely on how you installed it and which operating system you
538
+    have. If you installed a package, then hopefully your package has a way to
539
+    uninstall itself. The Windows packages include uninstallers. The proper way to
540
+    completely remove Tor, Vidalia, Torbutton for Firefox, and Polipo on any
541
+    version of Windows is as follows:
542
+    </p>
543
+    
544
+    <ol>
545
+    <li>In your taskbar, right click on Vidalia (the green onion or the black head)
546
+    and choose exit.</li>
547
+    <li>Right click on the taskbar to bring up TaskManager. Look for tor.exe in the
548
+    Process List. If it's running, right click and choose End Process.</li>
549
+    <li>Click the Start button, go to Programs, go to Vidalia, choose Uninstall.
550
+    This will remove the Vidalia bundle, which includes Tor and Polipo.</li>
551
+    <li>Start Firefox. Go to the Tools menu, choose Add-ons. Select Torbutton.
552
+    Click the Uninstall button.</li>
553
+    </ol>
554
+    
555
+    <p>
556
+    If you do not follow these steps (for example by trying to uninstall
557
+    Vidalia, Tor, and Polipo while they are still running), you will need to
558
+    reboot and manually remove the directory "Program Files\Vidalia Bundle".
559
+    </p>
560
+    
561
+    <p>
562
+    For Mac OS X, follow the <a
563
+    href="<page docs/tor-doc-osx>#uninstall">uninstall directions</a>.
564
+    </p>
565
+    
566
+    <p>
567
+    If you installed by source, I'm afraid there is no easy uninstall method. But
568
+    on the bright side, by default it only installs into /usr/local/ and it should
569
+    be pretty easy to notice things there.
570
+    </p>
571
+    
572
+    <hr />
573
+    
574
+    <a id="PGPSigs"></a>
575
+    <h3><a class="anchor" href="#PGPSigs">What are these "sig" files on the
576
+    download page?</a></h3>
577
+    
578
+    <p>
579
+    These are PGP signatures, so you can verify that the file you've downloaded is
580
+    exactly the one that we intended you to get.
581
+    </p>
582
+    
583
+    <p>
584
+    Please read the <a
585
+    href="<page docs/verifying-signatures>">verifying signatures</a> page for details.
586
+    </p>
587
+    
588
+    <hr />
589
+    
590
+    <a id="CompileTorWindows"></a>
591
+    <h3><a class="anchor" href="#CompileTorWindows">How do I compile Tor under
592
+    Windows?</a></h3>
593
+    
594
+    <p>
595
+    Try following the steps at <a href="<gitblob>doc/tor-win32-mingw-creation.txt">
596
+    tor-win32-mingw-creation.txt</a>.
597
+    </p>
598
+    
599
+    <p>
600
+    (Note that you don't need to compile Tor yourself in order to use
601
+    it. Most people just use the packages available on the <a href="<page
602
+    download/download>">download page</a>.)
603
+    </p>
604
+    
605
+    <hr />
606
+    
607
+    <a id="VirusFalsePositives"></a>
608
+    <h3><a class="anchor" href="#VirusFalsePositives">Why does my Tor
609
+    executable appear to have a virus or spyware?</a></h3>
610
+    
611
+    <p>
612
+    Sometimes, overzealous Windows virus and spyware detectors trigger on some
613
+    parts of the Tor Windows binary. Our best guess is that these are false
614
+    positives &mdash; after all, the anti-virus and anti-spyware business is just a
615
+    guessing game anyway. You should contact your vendor and explain that you have
616
+    a program that seems to be triggering false positives. Or pick a better vendor.
617
+    </p>
618
+    
619
+    <p>
620
+    In the meantime, we encourage you to not just take our word for
621
+    it. Our job is to provide the source; if you're concerned, please do <a
622
+    href="#CompileTorWindows">recompile it yourself</a>.
623
+    </p>
624
+    
625
+    <hr />
626
+    
627
+    <a id="LiveCD"></a>
628
+    <h3><a class="anchor" href="#LiveCD">Is there a LiveCD or other bundle that
629
+    includes Tor?</a></h3>
630
+    
631
+    <p>
632
+    There isn't any official LiveCD at this point. We're still trying to find good
633
+    solutions and trying to understand the security and anonymity implications of
634
+    the various options. In the mean time, feel free to check out the list below
635
+    and use your best judgement:
636
+    </p>
637
+    
638
+    <p>
639
+    LiveCDs:
640
+    </p>
641
+    
642
+    <ol>
643
+    <li><a href="https://amnesia.boum.org/">The (Amnesic) Incognito Live
644
+    System</a> is a Live System aimed at preserving your privacy and
645
+    anonymity:
646
+    <ul>
647
+    <li> All outgoing connections to the Internet are forced to go through
648
+    the Tor network.</li>
649
+    <li> No trace is left on local storage devices unless explicitely asked.</li>
650
+    <li> It includes Firefox, Tor, Torbutton, Vidalia graphical Tor
651
+    controller, Pidgin Instant Messaging client, and lots of other
652
+    software.</li>
653
+    <li> It's based upon Debian gnu/linux and comes with the GNOME desktop
654
+    environment.</li>
655
+    </ul>
656
+    <li><a href="http://tork.sourceforge.net/wiki/index.php/LiveCD">TorK LiveCD</a>
657
+    is Knoppix-based with an emphasis on user-friendliness. You can work
658
+    anonymously or non-anonymously while TorK tries to keep you informed of the
659
+    consequences of your activity. The TorK LiveCD is experimental, so the aim is
660
+    to provide regular releases through 2007 and beyond.</li>
661
+    <li><a href="http://mandalka.name/privatix/">Privatix LiveCD/USB</a> is a
662
+    debian based live-system including tor, firefox and torbutton which can save
663
+    bookmarks and other settings or data on an encrypted usb-key</li>
664
+    </li>
665
+    </ol>
666
+    
667
+    <p>
668
+    Windows bundles:
669
+    </p>
670
+    
671
+    <ol>
672
+    <li><a href="<page projects/torbrowser>">Tor Browser Bundle</a>
673
+    for Windows comes with a pre-configured web browser and is self contained
674
+    so you can run it from a USB stick.</li>
675
+    <li><a href="http://www.janusvm.com/tor_vm/">Tor VM</a> is a successor
676
+    to JanusVM. It needs testing from you!</li>
677
+    <li><a href="http://janusvm.com/">JanusVM</a> is a Linux kernel and software
678
+    running in VMWare that sits between your Windows computer and the Internet,
679
+    making sure that your Internet traffic is scrubbed and anonymized.</li>
680
+    <li><a href="http://www.xerobank.com/xB_browser.html">xB Browser</a>,
681
+    previously known as Torpark, is a Firefox+Tor package for Win32 that can
682
+    installed on a USB key. It needs a host Win32 operating system.</li>
683
+    </ol>
684
+    
685
+    <p>
686
+    Not currently maintained as far as we know:
687
+    </p>
688
+    
689
+    <ol>
690
+    <li>Polippix / Privatlivets Fred is a Danish Knoppix-based LiveCD with Tor
691
+    and utilities to encrypt IP-telephony. <a href="http://polippix.org/">Info and
692
+    download</a>.</li>
693
+    <li>ELE is a Linux LiveCD which is focused on privacy related
694
+    software. It includes Tor and you can download it at
695
+    <a
696
+    href="http://www.northernsecurity.net/download/ele/">http://www.northernsecurity.net/download/ele/</a>.</li>
697
+    <li>Virtual Privacy Machine is a Linux LiveCD that includes Firefox, Privoxy,
698
+    Tor, some IRC and IM applications, and a set of ipchains rules aimed to prevent
699
+    non-Tor traffic from accidentally leaving your computer. More information at
700
+    <a
701
+    href="https://trac.torproject.org/projects/tor/wiki/VirtualPrivacyMachine">https://trac.torproject.org/projects/tor/wiki/VirtualPrivacyMachine</a>.</li>
702
+    <li>Anonym.OS is a LiveCD similar to the above but is based on OpenBSD rather
703
+    than Linux for maximum security. It was designed to be anonymous and secure
704
+    from the ground up, and thus has some features and limitations not found in
705
+    other LiveCDs (Tor related or otherwise). You can obtain more information and
706
+    download Anonym.OS from <a href="http://theory.kaos.to/projects.html">Kaos.Theory</a>.</li>
707
+    <li>Phantomix is a LiveCD for anonymous surfing and chatting based on the most
708
+    recent KNOPPIX release. It comes preconfigured with Privoxy, Tor and Polipo. You can
709
+    get it from the <a href="http://phantomix.ytternhagen.de/">Phantomix
710
+    Website</a>.</li>
711
+    </ol>
712
+    
713
+    <p>
714
+    Please contact us if you know any others.
715
+    </p>
716
+    
717
+    <hr />
718
+    
719
+    <a id="ChooseEntryExit"></a>
720
+    <h3><a class="anchor" href="#ChooseEntryExit">Can I control which nodes (or country) are used for entry/exit?</a></h3>
721
+    
722
+    <p>
723
+    Yes. You can set preferred entry and exit nodes as well as 
724
+    inform Tor which nodes you do not want to use. 
725
+    The following options can be added to your config file "torrc" 
726
+    or specified on the command line:
727
+    </p>
728
+    <dl>
729
+      <dt><tt>EntryNodes $fingerprint,$fingerprint,...</tt></dt>
730
+        <dd>A list of preferred nodes to use for the first hop in the circuit, if possible.
731
+        </dd>
732
+      <dt><tt>ExitNodes $fingerprint,$fingerprint,...</tt></dt>
733
+        <dd>A list of preferred nodes to use for the last hop in the circuit, if possible. 
734
+        </dd>
735
+      <dt><tt>ExcludeNodes $fingerprint,$fingerprint,...</tt></dt>
736
+        <dd>A list of nodes to never use when building a circuit. 
737
+        </dd>
738
+      <dt><tt>ExcludeExitNodes $fingerprint,$fingerprint,...</tt></dt>
739
+        <dd>A list of nodes to never use when picking an exit. 
740
+            Nodes listed in <tt>ExcludeNodes</tt> are automatically in this list. 
741
+        </dd>
742
+    </dl>
743
+    <p>
744
+    <em>We recommend you do not use these</em> 
745
+    &mdash; they are intended for testing and may disappear in future versions. 
746
+    You get the best security that Tor can provide when you leave the route selection to Tor; 
747
+    overriding the entry / exit nodes can mess up your anonymity in ways we don't understand.
748
+    </p>
749
+    <p>
750
+    The <tt>EntryNodes</tt> and <tt>ExitNodes</tt> config options are treated as a request, 
751
+    meaning if the nodes are down or seem slow, Tor will still avoid them. 
752
+    You can make the option mandatory by setting 
753
+    <tt>StrictExitNodes 1</tt> or <tt>StrictEntryNodes 1</tt> 
754
+    &mdash; but if you do, your Tor connections will stop working 
755
+    if all of the nodes you have specified become unreachable. 
756
+    See the <a href="https://www.torproject.org/documentation.html.en#NeatLinks">Tor status pages</a> 
757
+    for some nodes you might pick.
758
+    </p>
759
+    <p>
760
+    Instead of <tt>$fingerprint</tt> you can also specify 
761
+    a 2 letter ISO3166 country code in curly braces 
762
+    (for example {de}), 
763
+    or an ip address pattern (for example 255.254.0.0/8), 
764
+    or a node nickname. 
765
+    Make sure there are no spaces between the commas and the list items. 
766
+    </p>
767
+    <p>
768
+    If you want to access a service directly through Tor's SOCKS interface 
769
+    (eg. using ssh via connect.c), another option is to 
770
+    set up an internal mapping in your configuration file using <tt>MapAddress</tt>. 
771
+    See the manual page for details.
772
+    </p>
773
+    
774
+    <hr />
775
+    
776
+    <a id="RelayFlexible"></a>
777
+    <h3><a class="anchor" href="#RelayFlexible">How stable does my relay
778
+    need to be?</a></h3>
779
+    
780
+    <p>
781
+    We aim to make setting up a Tor relay easy and convenient:
782
+    </p>
783
+    
784
+    <ul>
785
+    <li>Tor has built-in support for <a
786
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#LimitBandwidth">
787
+    rate limiting</a>. Further, if you have a fast
788
+    link but want to limit the number of bytes per
789
+    day (or week or month) that you donate, check out the <a
790
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Hibernation">hibernation
791
+    feature</a>.
792
+    </li>
793
+    <li>Each Tor relay has an <a href="#ExitPolicies">exit policy</a> that
794
+    specifies what sort of outbound connections are allowed or refused from
795
+    that relay. If you are uncomfortable allowing people to exit from your
796
+    relay, you can set it up to only allow connections to other Tor relays.
797
+    </li>
798
+    <li>It's fine if the relay goes offline sometimes. The directories
799
+    notice this quickly and stop advertising the relay. Just try to make
800
+    sure it's not too often, since connections using the relay when it
801
+    disconnects will break.
802
+    </li>
803
+    <li>We can handle relays with dynamic IPs just fine &mdash; simply
804
+    leave the Address config option blank, and Tor will try to guess.
805
+    </li>
806
+    <li>If your relay is behind a NAT and it doesn't know its public
807
+    IP (e.g. it has an IP of 192.168.x.y), you'll need to set up port
808
+    forwarding. Forwarding TCP connections is system dependent but 
809
+    <a href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#ServerForFirewalledClients">this FAQ entry</a> 
810
+    offers some examples on how to do this.
811
+    </li>
812
+    <li>Your relay will passively estimate and advertise its recent
813
+    bandwidth capacity, so high-bandwidth relays will attract more users than
814
+    low-bandwidth ones. Therefore having low-bandwidth relays is useful too.
815
+    </li>
816
+    </ul>
817
+    
818
+    <hr />
819
+    
820
+    <a id="RunARelayBut"></a>
821
+    <a id="ExitPolicies"></a>
822
+    <h3><a class="anchor" href="#ExitPolicies">I'd run a relay, but I don't
823
+    want to deal with abuse issues.</a></h3>
824
+    
825
+    <p>
826
+    Great. That's exactly why we implemented exit policies.
827
+    </p>
828
+    
829
+    <p>
830
+    Each Tor relay has an exit policy that specifies what sort of
831
+    outbound connections are allowed or refused from that relay. The exit
832
+    policies are propagated to Tor clients via the directory, so clients
833
+    will automatically avoid picking exit relays that would refuse to
834
+    exit to their intended destination. This way each relay can decide
835
+    the services, hosts, and networks he wants to allow connections to,
836
+    based on abuse potential and his own situation. Read the FAQ entry on 
837
+    <a href="<page docs/faq-abuse>#TypicalAbuses">issues you might encounter</a> 
838
+    if you use the default exit policy, and then read Mike Perry's 
839
+    <a href="https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment">tips
840
+    for running an exit node with minimal harassment</a>.
841
+    </p>
842
+    
843
+    <p>
844
+    The default exit policy allows access to many popular services (e.g. web browsing), but 
845
+    <a href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#DefaultPorts">restricts</a>
846
+    some due to abuse potential (e.g. mail) and some since
847
+    the Tor network can't handle the load (e.g. default
848
+    file-sharing ports). You can change your exit policy
849
+    using Vidalia's "Sharing" tab, or by manually editing your 
850
+    <a href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#torrc">torrc</a>
851
+    file. If you want to avoid most if not all abuse potential, set it to
852
+    "reject *:*" (or un-check all the boxes in Vidalia). This setting means
853
+    that your relay will be used for relaying traffic inside the Tor network,
854
+    but not for connections to external websites or other services.
855
+    </p>
856
+    
857
+    <p>
858
+    If you do allow any exit connections, make sure name resolution works
859
+    (that is, your computer can resolve Internet addresses correctly).
860
+    If there are any resources that your computer can't reach (for example,
861
+    you are behind a restrictive firewall or content filter), please
862
+    explicitly reject them in your exit policy &mdash; otherwise Tor users
863
+    will be impacted too.
864
+    </p>
865
+    
866
+    <hr />
867
+    
868
+    <a id="RelayOrBridge"></a>
869
+    <h3><a class="anchor" href="#RelayOrBridge">Should I be a normal relay
870
+    or bridge relay?</a></h3>
871
+    
872
+    <p><a href="<page docs/bridges>">Bridge relays</a> (or "bridges" for short)
873
+    are <a href="<page docs/tor-doc-relay>">Tor relays</a> that aren't listed
874
+    in the main Tor directory. That means
875
+    that even an ISP or government trying to filter connections to the Tor
876
+    network probably won't be able to block all the bridges.
877
+    </p>
878
+    
879
+    <p>Being a normal relay vs being a bridge relay is almost the same
880
+    configuration: it's just a matter of whether your relay is listed
881
+    publically or not.
882
+    </p>
883
+    
884
+    <p>Right now, there are roughly zero places in the world that filter
885
+    connections to the Tor network. So getting a lot of bridges running
886
+    right now is mostly a backup measure, a) in case the Tor network does
887
+    get blocked somewhere, and b) for people who want an extra layer of
888
+    security because they're worried somebody will recognize that it's a
889
+    public Tor relay IP address they're contacting.
890
+    </p>
891
+    
892
+    <p>So should you run a normal relay or bridge relay? If you have
893
+    lots of bandwidth, you should definitely run a normal relay &mdash;
894
+    bridge relays see very little use these days. If you're willing to 
895
+    <a href="#ExitPolicies">be an exit</a>, you should definitely run a normal
896
+    relay, since we need more exits. If you can't be an exit and only have
897
+    a little bit of bandwidth, then flip a coin. Thanks for volunteering!
898
+    </p>
899
+    
900
+    <hr />
901
+    
902
+    <a id="RelayMemory"></a>
903
+    <h3><a class="anchor" href="#RelayMemory">Why is my Tor relay using so
904
+    much memory?</a></h3>
905
+    
906
+    <p>If your Tor relay is using more memory than you'd like, here are some
907
+    tips for reducing its footprint:
908
+    </p>
909
+    
910
+    <ol>
911
+    <li>If you're on Linux, you may be encountering memory fragmentation
912
+    bugs in glibc's malloc implementation. That is, when Tor releases memory
913
+    back to the system, the pieces of memory are fragmented so they're hard
914
+    to reuse. The Tor tarball ships with OpenBSD's malloc implementation,
915
+    which doesn't have as many fragmentation bugs (but the tradeoff is higher
916
+    CPU load). You can tell Tor to use this malloc implementation instead:
917
+    <tt>./configure --enable-openbsd-malloc</tt></li>
918
+    
919
+    <li>If you're running a fast relay, meaning you have many TLS connections
920
+    open, you are probably losing a lot of memory to OpenSSL's internal
921
+    buffers (38KB+ per socket). We've patched OpenSSL to <a
922
+    href="http://archives.seul.org/or/dev/Jun-2008/msg00001.html">release
923
+    unused buffer memory more aggressively</a>. If you update to OpenSSL
924
+    1.0.0-beta5, Tor's build process will automatically recognize and use
925
+    this feature.</li>
926
+    
927
+    <li>If you're running on Solaris, OpenBSD, NetBSD, or
928
+    old FreeBSD, Tor is probably forking separate processes
929
+    rather than using threads. Consider switching to a <a
930
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#RelayOS">better
931
+    operating system</a>.</li>
932
+    
933
+    <li>If you still can't handle the memory load, consider reducing the
934
+    amount of bandwidth your relay advertises. Advertising less bandwidth
935
+    means you will attract fewer users, so your relay shouldn't grow
936
+    as large. See the <tt>MaxAdvertisedBandwidth</tt> option in the man
937
+    page.</li>
938
+    
939
+    </ol>
940
+    
941
+    <p>
942
+    All of this said, fast Tor relays do use a lot of ram. It is not unusual
943
+    for a fast exit relay to use 500-1000 MB of memory.
944
+    </p>
945
+    
946
+    <hr />
947
+    
948
+    <a id="WhyNotNamed"></a>
949
+    <h3><a class="anchor" href="#WhyNotNamed">Why is my Tor relay not named?</a></h3>
950
+    
951
+    <p>
952
+    We currently use these metrics to determine if your relay should be named:<br />
953
+    </p>
954
+    <ul>
955
+    <li>The name is not currently mapped to a different key. Existing mappings
956
+    are removed after 6 months of inactivity from a relay.</li>
957
+    <li>The relay must have been around for at least two weeks.</li>
958
+    <li>No other router may have wanted the same name in the past month.</li>
959
+    </ul>
960
+    
961
+    <hr />
962
+    
963
+    <a id="KeyManagement"></a>
964
+    <h3><a class="anchor" href="#KeyManagement">Tell me about all the keys
965
+    Tor uses.</a></h3>
966
+    
967
+    <p>
968
+    Tor uses a variety of different keys, with three goals in mind: 1)
969
+    encryption to ensure privacy of data within the Tor network, 2)
970
+    authentication so clients know they're
971
+    talking to the relays they meant to talk to, and 3) signatures to make
972
+    sure all clients know the same set of relays.
973
+    </p>
974
+    
975
+    <p>
976
+    <b>Encryption</b>: first, all connections in Tor use TLS link encryption,
977
+    so observers can't look inside to see which circuit a given cell is
978
+    intended for. Further, the Tor client establishes an ephemeral encryption
979
+    key with each relay in the circuit, so only the exit relay can read
980
+    the cells. Both sides discard the circuit key when the circuit ends,
981
+    so logging traffic and then breaking into the relay to discover the key
982
+    won't work.
983
+    </p>
984
+    
985
+    <p>
986
+    <b>Authentication</b>:
987
+    Every Tor relay has a public decryption key called the "onion key".
988
+    When the Tor client establishes circuits, at each step it <a
989
+    href="<svnprojects>design-paper/tor-design.html#subsec:circuits">demands
990
+    that the Tor relay prove knowledge of its onion key</a>. That way
991
+    the first node in the path can't just spoof the rest of the path.
992
+    Each relay rotates its onion key once a week.
993
+    </p>
994
+    
995
+    <p>
996
+    <b>Coordination</b>:
997
+    How do clients know what the relays are, and how do they know that they
998
+    have the right keys for them? Each relay has a long-term public signing
999
+    key called the "identity key". Each directory authority additionally has a
1000
+    "directory signing key". The directory authorities <a
1001
+    href="<gitblob>doc/spec/dir-spec.txt">provide a signed list</a>
1002
+    of all the known relays, and in that list are a set of certificates from
1003
+    each relay (self-signed by their identity key) specifying their keys,
1004
+    locations, exit policies, and so on. So unless the adversary can control
1005
+    a threshold of the directory authorities, he can't trick the Tor client
1006
+    into using other Tor relays.
1007
+    </p>
1008
+    
1009
+    <p>
1010
+    How do clients know what the directory authorities are? The Tor software
1011
+    comes with a built-in list of location and public key for each directory
1012
+    authority. So the only way to trick users into using a fake Tor network
1013
+    is to give them a specially modified version of the software.
1014
+    </p>
1015
+    
1016
+    <p>
1017
+    How do users know they've got the right software? When we distribute
1018
+    the source code or a package, we digitally sign it with <a
1019
+    href="http://www.gnupg.org/">GNU Privacy Guard</a>. See the <a
1020
+    href="<page docs/verifying-signatures>">instructions
1021
+    on how to check Tor's signatures</a>.
1022
+    </p>
1023
+    
1024
+    <p>
1025
+    In order to be certain that it's really signed by us, you need to have
1026
+    met us in person and gotten a copy of our GPG key fingerprint, or you
1027
+    need to know somebody who has. If you're concerned about an attack on
1028
+    this level, we recommend you get involved with the security community
1029
+    and start meeting people.
1030
+    </p>
1031
+    
1032
+    <hr />
1033
+    
1034
+    <a id="EverybodyARelay"></a>
1035
+    <h3><a class="anchor" href="#EverybodyARelay">You should make every Tor
1036
+    user be a relay.</a></h3>
1037
+    
1038
+    <p>
1039
+    Requiring every Tor user to be a relay would help with scaling the
1040
+    network to handle all our users, and <a href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#RelayAnonymity">running a Tor
1041
+    relay may help your anonymity</a>. However, many Tor users cannot be good
1042
+    relays &mdash; for example, some Tor clients operate from behind restrictive
1043
+    firewalls, connect via modem, or otherwise aren't in a position where they
1044
+    can relay traffic. Providing service to these clients is a critical
1045
+    part of providing effective anonymity for everyone, since many Tor users
1046
+    are subject to these or similar constraints and including these clients
1047
+    increases the size of the anonymity set.
1048
+    </p>
1049
+    
1050
+    <p>
1051
+    That said, we do want to encourage Tor users to run relays, so what we
1052
+    really want to do is simplify the process of setting up and maintaining
1053
+    a relay. We've made a lot of progress with easy configuration in the past
1054
+    few years: Vidalia has an easy relay configuration interface, and supports
1055
+    uPnP too. Tor is good at automatically detecting whether it's reachable and
1056
+    how much bandwidth it can offer.
1057
+    </p>
1058
+    
1059
+    <p>
1060
+    There are five steps we need to address before we can do this though:
1061
+    </p>
1062
+    
1063
+    <p>
1064
+    First, we need to make Tor stable as a relay on all common
1065
+    operating systems. The main remaining platform is Windows,
1066
+    and we plan to finally address that in 2009. See Section 4.1 of <a
1067
+    href="https://www.torproject.org/press/2008-12-19-roadmap-press-release">our
1068
+    development roadmap</a>.
1069
+    </p>
1070
+    
1071
+    <p>
1072
+    Second, we still need to get better at automatically estimating
1073
+    the right amount of bandwidth to allow. See item #7 on the
1074
+    <a href="<page getinvolved/volunteer>#Research">research section of the
1075
+    volunteer page</a>: "Tor doesn't work very well when relays
1076
+    have asymmetric bandwidth (e.g. cable or DSL)". It might be that <a
1077
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#TransportIPnotTCP">switching
1078
+    to UDP transport</a> is the simplest answer here &mdash; which alas is
1079
+    not a very simple answer at all.
1080
+    </p>
1081
+    
1082
+    <p>
1083
+    Third, we need to work on scalability, both of the network (how to
1084
+    stop requiring that all Tor relays be able to connect to all Tor
1085
+    relays) and of the directory (how to stop requiring that all Tor
1086
+    users know about all Tor relays). Changes like this can have large
1087
+    impact on potential and actual anonymity. See Section 5 of the <a
1088
+    href="<svnprojects>design-paper/challenges.pdf">Challenges</a> paper
1089
+    for details. Again, UDP transport would help here.
1090
+    </p>
1091
+    
1092
+    <p>
1093
+    Fourth, we need to better understand the risks from
1094
+    letting the attacker send traffic through your relay while
1095
+    you're also initiating your own anonymized traffic. <a
1096
+    href="http://freehaven.net/anonbib/#back01">Three</a> <a
1097
+    href="http://freehaven.net/anonbib/#clog-the-queue">different</a>
1098
+    <a href="http://freehaven.net/anonbib/#torta05">research</a> papers
1099
+    describe ways to identify the relays in a circuit by running traffic
1100
+    through candidate relays and looking for dips in the traffic while the
1101
+    circuit is active. These clogging attacks are not that scary in the Tor
1102
+    context so long as relays are never clients too. But if we're trying to
1103
+    encourage more clients to turn on relay functionality too (whether as
1104
+    <a href="<page docs/bridges>">bridge relays</a> or as normal relays), then
1105
+    we need to understand this threat better and learn how to mitigate it.
1106
+    </p>
1107
+    
1108
+    <p>
1109
+    Fifth, we might need some sort of incentive scheme to encourage people
1110
+    to relay traffic for others, and/or to become exit nodes. Here are our
1111
+    <a href="https://blog.torproject.org/blog/two-incentive-designs-tor">current
1112
+    thoughts on Tor incentives</a>.
1113
+    </p>
1114
+    
1115
+    <p>
1116
+    Please help on all of these!
1117
+    </p>
1118
+    
1119
+    <hr />
1120
+    
1121
+    <a id="Criminals"></a>
1122
+    <h3><a class="anchor" href="#Criminals">Doesn't Tor enable criminals to do bad
1123
+    things?</a></h3>
1124
+    
1125
+    <p>
1126
+    For the answer to this question and others, please see our <a
1127
+    href="<page docs/faq-abuse>">Tor Abuse FAQ</a>.
1128
+    </p>
1129
+    
1130
+    <hr />
1131
+    
1132
+    <a id="RespondISP"></a>
1133
+    <h3><a class="anchor" href="#RespondISP">How do I respond to my ISP about my
1134
+    exit relay?</a></h3>
1135
+    
1136
+    <p>
1137
+    A collection of templates for successfully responding to ISPs is <a
1138
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorAbuseTemplates">collected
1139
+    here</a>.
1140
+    </p>
1141
+    
1142
+    <hr />
1143
+  </div>
1144
+  <!-- END MAINCOL -->
1145
+  <div id = "sidecol">
1146
+#include "side.wmi"
1147
+#include "info.wmi"
1148
+  </div>
1149
+  <!-- END SIDECOL -->
1150
+</div>
1151
+<!-- END CONTENT -->
1152
+#include <foot.wmi>  
... ...
@@ -0,0 +1,24 @@
1
+## translation metadata
2
+# Revision: $Revision: 22359 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor: Glossary" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/documentation>">Glossary</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+
14
+  <h1>Tor Glossary</h1>
15
+  </div>
16
+  <!-- END MAINCOL -->
17
+  <div id = "sidecol">
18
+#include "side.wmi"
19
+#include "info.wmi"
20
+  </div>
21
+  <!-- END SIDECOL -->
22
+</div>
23
+<!-- END CONTENT -->
24
+#include <foot.wmi>  
... ...
@@ -0,0 +1,167 @@
1
+## translation metadata
2
+# Revision: $Revision: 22359 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: Hidden Service Protocol" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/hidden-services>">Hidden Services</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h2>Tor: Hidden Service Protocol</h2>
14
+    <hr />
15
+    
16
+    <p>
17
+    Tor makes it possible for users to hide their locations while offering
18
+    various kinds of services, such as web publishing or an instant
19
+    messaging server.  Using Tor "rendezvous points," other Tor users can
20
+    connect to these hidden services, each without knowing the other's
21
+    network identity. This page describes the technical details of how
22
+    this rendezvous protocol works. For a more direct how-to, see our <a
23
+    href="<page docs/tor-hidden-service>">configuring hidden services</a>
24
+    page.
25
+    </p>
26
+    
27
+    <p>
28
+    A hidden service needs to advertise its existence in the Tor network before
29
+    clients will be able to contact it. Therefore, the service randomly picks
30
+    some relays, builds circuits to them, and asks them to act as
31
+    <em>introduction points</em> by telling them its public key. Note
32
+    that in the following figures the green links are circuits rather
33
+    than direct connections. By using a full Tor circuit, it's hard for
34
+    anyone to associate an introduction point with the hidden server's IP
35
+    address. While the introduction points and others are told the hidden
36
+    service's identity (public key), we don't want them to learn about the
37
+    hidden server's location (IP address).
38
+    </p>
39
+    
40
+    <img alt="Tor hidden service step one" src="$(IMGROOT)/THS-1.png" />
41
+    # maybe add a speech bubble containing "PK" to Bob, because that's what
42
+    # Bob tells to his introduction points
43
+    
44
+    <p>
45
+    Step two: the hidden service assembles a <em>hidden service
46
+    descriptor</em>, containing its public key and a summary of each
47
+    introduction point, and signs this descriptor with its private key.
48
+    It uploads that descriptor to a distributed hash table. The descriptor will be
49
+    found by clients requesting XYZ.onion where XYZ is a 16 character
50
+    name that can be uniquely derived from the service's public key. After
51
+    this step, the hidden service is set up.
52
+    </p>
53
+    
54
+    <p>
55
+    Although it might seem impractical to use an automatically-generated
56
+    service name, it serves an important goal: Everyone &ndash; including
57
+    the introduction points, the distributed hash table directory, and of course the
58
+    clients &ndash; can verify that they are talking to the right hidden
59
+    service. See also <a href="https://zooko.com/distnames.html">Zooko's
60
+    conjecture</a> that out of Decentralized, Secure, and Human-Meaningful,
61
+    you can achieve at most two. Perhaps one day somebody will implement a <a
62
+    href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a>
63
+    design for hidden service names?
64
+    </p>
65
+    
66
+    <img alt="Tor hidden service step two" src="$(IMGROOT)/THS-2.png" />
67
+    # maybe replace "database" with "DHT"; further: how incorrect
68
+    # is it to *not* add DB to the Tor cloud, now that begin dir cells are in
69
+    # use?
70
+    
71
+    <p>
72
+    Step three: A client that wants to contact a hidden service needs to
73
+    learn about its
74
+    onion address first. After that, the client can initiate connection
75
+    establishment by downloading the descriptor from the distributed hash
76
+    table. If
77
+    there is a descriptor for XYZ.onion (the hidden service could also be
78
+    offline or have left long ago, or there could be a typo in the onion
79
+    address), the client now knows the set of introduction points and the
80
+    right public key to use. Around this time, the client also creates
81
+    a circuit to another randomly picked relay and asks it to act as
82
+    <em>rendezvous point</em> by telling it a one-time secret.
83
+    </p>
84
+    
85
+    <img alt="Tor hidden service step three" src="$(IMGROOT)/THS-3.png" />
86
+    # maybe add "cookie" to speech bubble, separated from the surrounded
87
+    # "IP1-3" and "PK"
88
+    
89
+    <p>
90
+    Step four: When the descriptor is present and the rendezvous point is
91
+    ready, the client assembles an <em>introduce</em>
92
+    message (encrypted to the hidden service's public key) including the
93
+    address of the rendezvous point and the one-time secret. The client sends
94
+    this message to one of the introduction points, requesting it be delivered
95
+    to the hidden service. Again, communication takes place via a Tor circuit:
96
+    nobody can relate sending the introduce message to the client's IP
97
+    address, so the client remains anonymous.
98
+    </p>
99
+    
100
+    <img alt="Tor hidden service step four" src="$(IMGROOT)/THS-4.png" />
101
+    
102
+    <p>
103
+    Step five: The hidden service decrypts the client's introduce message
104
+    and finds the
105
+    address of the rendezvous point and the one-time secret in it. The service
106
+    creates a circuit to the rendezvous point and sends the one-time secret to
107
+    it in a rendezvous message.
108
+    </p>
109
+    
110
+    <p>
111
+    At this point it is of special importance that the hidden service sticks to
112
+    the same set of <a
113
+    href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Whatsthisaboutentryguardformerlyknownashelpernodes">entry
114
+    guards</a> when creating new circuits. Otherwise an attacker
115
+    could run his own relay and force a hidden service to create an arbitrary
116
+    number of circuits in the hope that the corrupt relay is picked as entry
117
+    node and he learns the hidden server's IP address via timing analysis. This
118
+    attack was described by &Oslash;verlier and Syverson in their paper titled
119
+    <a href="http://freehaven.net/anonbib/#hs-attack06">Locating Hidden
120
+    Servers</a>.
121
+    </p>
122
+    
123
+    <img alt="Tor hidden service step five" src="$(IMGROOT)/THS-5.png" />
124
+    # it should say "Bob connects to Alice's ..."
125
+    
126
+    <p>
127
+    In the last step, the rendezvous point notifies the client about successful
128
+    connection establishment. After that, both client and hidden service can
129
+    use their circuits to the rendezvous point for communicating with each
130
+    other. The rendezvous point simply relays (end-to-end encrypted) messages
131
+    from client to service and vice versa.
132
+    </p>
133
+    
134
+    <p>
135
+    One of the reasons for not using the introduction circuit
136
+    for actual communication is that no single relay should
137
+    appear to be responsible for a given hidden service. This is why the
138
+    rendezvous point never learns about the hidden service's identity.
139
+    </p>
140
+    
141
+    <p>
142
+    In general, the complete connection between client and hidden service
143
+    consists of 6 relays: 3 of them were picked by the client with the third
144
+    being the rendezvous point and the other 3 were picked by the hidden
145
+    service.
146
+    </p>
147
+    
148
+    <img alt="Tor hidden service step six" src="$(IMGROOT)/THS-6.png" />
149
+    
150
+    <p>
151
+    There are more detailed descriptions about the hidden service protocol than
152
+    this one. See the
153
+    <a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>
154
+    for an in-depth design description and the
155
+    <a href="<gitblob>doc/spec/rend-spec.txt">rendezvous specification</a>
156
+    for the message formats.
157
+    </p>
158
+  </div>
159
+  <!-- END MAINCOL -->
160
+  <div id = "sidecol">
161
+#include "side.wmi"
162
+#include "info.wmi"
163
+  </div>
164
+  <!-- END SIDECOL -->
165
+</div>
166
+<!-- END CONTENT -->
167
+#include <foot.wmi>  
... ...
@@ -0,0 +1,25 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Installtion Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/installguide>">Installation Guides</a>
11
+  </div> 
12
+  <div id="maincol">
13
+    <h1>Tor Installation guides</h1>
14
+    <br />
15
+
16
+  </div>
17
+  <!-- END MAINCOL -->
18
+  <div id = "sidecol">
19
+#include "side.wmi"
20
+#include "info.wmi"
21
+  </div>
22
+  <!-- END SIDECOL -->
23
+</div>
24
+<!-- END CONTENT -->
25
+#include <foot.wmi>   
... ...
@@ -0,0 +1,23 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor: Manuals" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/documentation>">Manuals</a>
11
+  </div>
12
+  <div id="maincol">  
13
+  <h1>Tor Manuals</h1>
14
+  </div>
15
+  <!-- END MAINCOL -->
16
+  <div id = "sidecol">
17
+#include "side.wmi"
18
+#include "info.wmi"
19
+  </div>
20
+  <!-- END SIDECOL -->
21
+</div>
22
+<!-- END CONTENT -->
23
+#include <foot.wmi>   
... ...
@@ -0,0 +1,86 @@
1
+## translation metadata
2
+# Revision: $Revision: 21907 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: CentOS/Fedora/OpenSUSE Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/rpms>">RPMs</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <a id="rpms"></a>
14
+    <h2><a class="anchor" href="#rpms">Tor packages for rpm-based
15
+    linux distributions.</a></h2>
16
+    <br />
17
+    
18
+    <p>Do not use the packages in the native repositories. They are
19
+    frequently out of date. That means you'll be missing stability and
20
+    security fixes.
21
+    </p>
22
+    
23
+    <p>
24
+    You'll need to set up our package repository before you can fetch
25
+    Tor.  Assuming yum, in /etc/yum.repos.d/, create a file called
26
+    torproject.repo.  Edit this file with the following information:
27
+    <pre>[torproject]
28
+    name=Tor and Vidalia
29
+    enabled=1
30
+    autorefresh=0
31
+    baseurl=http://deb.torproject.org/torproject.org/rpm/DISTRIBUTION/
32
+    type=rpm-md
33
+    gpgcheck=1
34
+    gpgkey=http://deb.torproject.org/torproject.org/rpm/RPM-GPG-KEY-torproject.org
35
+    </pre>
36
+    
37
+    If you wish to track the stable releases of Tor, you should substitute
38
+    DISTRIBUTION with one of the following: centos4, centos5, fc10, fc11, fc12,
39
+    suse</p>
40
+    
41
+    <p>To track experimental releases, substitute DISTRIBUTION with one of these:
42
+    centos4-experimental, centos5-experimental, fc10-experimental,
43
+    fc11-experimental, fc12-experimental, suse-experimental</p>
44
+    
45
+    <p>
46
+    Now Tor is installed and running. Move on to <a href="<page
47
+    docs/tor-doc-unix>#polipo">step two</a> of the "Tor on Linux/Unix"
48
+    instructions.
49
+    </p>
50
+    
51
+    <p style="font-size: small">
52
+    The DNS name <code>deb.torproject.org</code> is actually a set of independent
53
+    servers in a DNS round robin configuration.  If you for some reason cannot
54
+    access it you might try to use the name of one of its part instead.  Try
55
+    <code>deb-master.torproject.org</code>,
56
+    <code>mirror.netcologne.de</code> or
57
+    <code>tor.mirror.youam.de</code>.
58
+    </p>
59
+    
60
+    <hr />
61
+    
62
+    <hr />
63
+    
64
+    <a id="source"></a>
65
+    <h2><a class="anchor" href="#source">Building from source</a></h2>
66
+    <br />
67
+    
68
+    <p>
69
+    If you'd like to build from source, please follow the <a
70
+    href="<gitblob>doc/tor-rpm-creation.txt">rpm creation instructions</a>.
71
+    </p>
72
+    
73
+    <hr />
74
+    
75
+    <p>If you have suggestions for improving this document, please <a
76
+    href="<page about/contact>">send them to us</a>. Thanks!</p>
77
+  </div>
78
+  <!-- END MAINCOL -->
79
+  <div id = "sidecol">
80
+#include "side.wmi"
81
+#include "info.wmi"
82
+  </div>
83
+  <!-- END SIDECOL -->
84
+</div>
85
+<!-- END CONTENT -->
86
+#include <foot.wmi>  
... ...
@@ -0,0 +1,104 @@
1
+## translation metadata
2
+# Revision: $Revision: 22356 $
3
+# Translation-Priority: 4-optional
4
+
5
+#include "head.wmi" TITLE="Tor: Running a Mirror" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/running-a-mirror>">Running a Mirror</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Tor: Running a Mirror</h1>
14
+    <hr />
15
+    
16
+    <p>Thank you for wanting to mirror the Tor website.  All of
17
+    our mirrors are publicly listed on <a href="<page getinvolved/mirrors>">our mirrors
18
+    page</a>.  We've included some sample commands and configuration below
19
+    to make the initial setup and ongoing maintenance a minimal effort.
20
+    The Tor website and distribution directory currently require 5.0 GB of
21
+    disk space.</p>
22
+    
23
+    <p>
24
+    If you would like to run a mirror, it's as easy as this command to download
25
+    everything a mirror should share with the world:
26
+    <br /> <br />
27
+    <tt>
28
+    rsync -av --delete rsync://rsync.torproject.org/tor tor-mirror/
29
+    </tt>
30
+    
31
+    <p>
32
+    In order to assure we have reliable and up to date mirrors,
33
+    please ensure your mirror does at least the following:<br/><br/>
34
+    
35
+    Updates <b>no less</b> than every six hours, but no more frequent than every
36
+    hour.<br/><br/>
37
+    
38
+    Allows "Directory Index / Indexes" (Index viewing) of the /dist
39
+    directory.<br/><br/>
40
+    
41
+    Allows "Multiviews" or equivalent for language localization.<br/><br/>
42
+    
43
+    Have a valid contact email for administrative communications should your
44
+    server have issues.<br/><br/>
45
+    
46
+    It is highly recommended for all mirror operators to subscribe to <A
47
+    href="http://archives.seul.org/tor/mirrors/">tor-mirrors mailing
48
+    list</A> where all mirror listing modification requests should go (ADD,
49
+    CHANGE, DELETE, any other requests/notifications).  Also, any technical
50
+    assistance in setting up your mirror may be found here as well.<br/><br/>
51
+    
52
+    </p>
53
+    <br /><br />
54
+    <p>
55
+    An example cronjob to update a full mirror once every 6 hours may look like so:
56
+    <tt>
57
+    <pre>
58
+    # m h  dom mon dow   command
59
+    0 */6 * * * rsync -aq --delete rsync://rsync.torproject.org/tor/ /var/www/mirrors/torproject.org
60
+    </pre>
61
+    </tt>
62
+    </p>
63
+    <br/>
64
+    For mirror operators that use Apache, we have created a sample virtual host
65
+    configuration file to use:
66
+    <tt>
67
+    <pre>
68
+    &lt;VirtualHost 0.1.2.3:80&gt;
69
+            ServerAdmin youremail@example.com<br/>
70
+            ServerName  0.1.2.3<br/>
71
+    
72
+            DocumentRoot /var/www/mirrors/torproject.org<br/>
73
+    
74
+            &lt;Directory /var/www/mirrors/torproject.org/&gt;<br/>
75
+                Options MultiViews Indexes<br/>
76
+                DirectoryIndex index<br/>
77
+                AllowOverride None<br/>
78
+            &lt;/Directory&gt;<br/>
79
+    
80
+    &lt;/VirtualHost&gt;
81
+    </pre>
82
+    </tt>
83
+    <br/> <br/>
84
+    Please ensure that you keep your mirror updated (we suggest automating this
85
+    task with something like '<tt>cron</tt>'). Our website, source code and
86
+    binary releases change often. An update frequency of six hours is recommended.  Tor users everywhere will thank you.
87
+    </p>
88
+    <br/>	
89
+    <p>
90
+    If you are running a mirror, please subscribe to the
91
+    <A href="http://archives.seul.org/tor/mirrors/">tor-mirrors mailing list</A>, and introduce yourself there.
92
+    We will add you to the mirror list.  
93
+    Help for mirror support and configuration issues may also be found on the list.
94
+    </p>
95
+  </div>
96
+  <!-- END MAINCOL -->
97
+  <div id = "sidecol">
98
+#include "side.wmi"
99
+#include "info.wmi"
100
+  </div>
101
+  <!-- END SIDECOL -->
102
+</div>
103
+<!-- END CONTENT -->
104
+#include <foot.wmi>  
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,210 @@
1
+## translation metadata
2
+# Revision: $Revision: 22305 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Mac OS X Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-osx>">Mac OS X Client</a>
11
+  </div> 
12
+  <div id="maincol">
13
+    <h1>Running the <a href="<page home>">Tor</a> client on Mac OS X</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>Note that these are the installation instructions for running a Tor client on
18
+      Mac OS X. If you want to relay traffic for others to help the network
19
+      grow (please do), read the <a
20
+      href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b>
21
+    </p>
22
+    
23
+    <hr />
24
+    <a id="installing"></a>
25
+    <h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2>
26
+    <br />
27
+    
28
+    <p>
29
+    The install for Macintosh OS X bundles
30
+    <a href="<page home>">Tor</a>,
31
+    <a href="<page projects/vidalia>">Vidalia</a> (a graphical interface for Tor),
32
+    <a href="<page projects/torbutton>">Torbutton</a>,
33
+    and <a href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (a web proxy)
34
+    into one package, with the four applications pre-configured to work
35
+    together.
36
+    Download either the <a href="../<package-osx-bundle-stable>">stable</a>
37
+    or the <a href="../<package-osx-bundle-alpha>">experimental</a> version
38
+    of the OS X bundle for Intel, or look for more options on the <a href="<page
39
+    download/download>">download page</a>.
40
+    </p>
41
+    
42
+    <p>Once you've downloaded the dmg, double-click and let it mount.
43
+    Browse to the now open Vidalia Bundle in Finder.  It's easy to install the bundle; simply drag and drop the Vidalia
44
+    onion icon to the Applications folder.  Optionally, double click the
45
+    "install torbutton" script and let it install torbutton into Firefox.
46
+    You can also get Torbutton from Mozilla Add-ons by searching for
47
+    "torbutton".</p>
48
+    
49
+    <p>When you are finished installing, you can start Vidalia by selecting its icon
50
+    from your Applications folder. A dark onion with a red X in your dock means
51
+    Tor is not currently running. You can start Tor by selecting Start from the
52
+    "Tor" menu at the top of your screen.
53
+    </p>
54
+    
55
+    <p>When Tor is running, Vidalia's dock icon will look like the following:
56
+    </p>
57
+    
58
+    <p><img alt="vidalia running tor"
59
+    src="../img/screenshot-osx-vidalia.png"
60
+    border="1"/></p>
61
+    
62
+    <p>Polipo is installed as part of the Tor bundle package
63
+    installer. Once it is installed, it will start automatically when your
64
+    computer is restarted.
65
+    You do not need to configure Polipo to use Tor &mdash; a custom Polipo 
66
+    configuration for Tor has been installed as part of the installer package.
67
+    </p>
68
+    
69
+    <hr />
70
+    <a id="using"></a>
71
+    <h2><a class="anchor" href="#using">Step Two: Configure your applications to use Tor</a></h2>
72
+    <br />
73
+    
74
+    <p>After installing, you need to configure your
75
+    applications to use them. The first step is to set up web browsing.</p>
76
+    
77
+    <p>You should use Tor with Firefox and Torbutton, for best safety.
78
+    Torbutton was installed for you.  Click on the red "Tor Disabled" toggle button to
79
+    turn Tor on, and you're all set: </p>
80
+    
81
+    <p><img alt="Torbutton plugin for Firefox"
82
+    src="../img/screenshot-torbutton.png"
83
+    border="1"/></p>
84
+    
85
+    <p>
86
+    If you plan to run Firefox on a different computer than Tor, see the <a
87
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">FAQ
88
+    entry for running Tor on a different computer</a>.
89
+    </p>
90
+    
91
+    <p>To Torify other applications that support HTTP proxies, just
92
+    point them at Polipo (that is, localhost port 8118). To use SOCKS
93
+    directly (for instant messaging, Jabber, IRC, etc), you can point
94
+    your application directly at Tor (localhost port 9050), but see <a
95
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this
96
+    FAQ entry</a> for why this may be dangerous. For applications
97
+    that support neither SOCKS nor HTTP, take a look at <a
98
+    href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a> or
99
+    <a href="http://www.dest-unreach.org/socat/">socat</a>.</p>
100
+    
101
+    <p>For information on how to Torify other applications, check out the
102
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
103
+    HOWTO</a>.
104
+    </p>
105
+    
106
+    <hr />
107
+    <a id="verify"></a>
108
+    <h2><a class="anchor" href="#verify">Step Three: Make sure it's working</a></h2>
109
+    <br />
110
+    
111
+    <p>
112
+    Next, you should try using your browser with Tor and make
113
+    sure that your IP address is being anonymized. Click on
114
+    <a href="https://check.torproject.org/">the
115
+    Tor detector</a>
116
+    and see whether it thinks you're using Tor or not.
117
+    (If that site is down, see <a
118
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this
119
+    FAQ entry</a> for more suggestions on how to test your Tor.)
120
+    </p>
121
+    
122
+    <p>If you have a personal firewall that limits your computer's
123
+    ability to connect to itself, be sure to allow connections from
124
+    your local applications to local port 8118 and port 9050. If
125
+    your firewall blocks outgoing connections, punch a hole so
126
+    it can connect to at least TCP ports 80 and 443, and then see <a
127
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this
128
+    FAQ entry</a>.
129
+    </p>
130
+    
131
+    <p>If it's still not working, look at <a
132
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this
133
+    FAQ entry</a> for hints.</p>
134
+    
135
+    <p>
136
+    Once it's working, learn more about
137
+    <a href="<page download/download>#Warning">what Tor does and does not offer</a>.
138
+    </p>
139
+    
140
+    <hr />
141
+    <a id="server"></a>
142
+    <a id="relay"></a>
143
+    <h2><a class="anchor" href="#relay">Step Four: Configure it as a relay</a></h2>
144
+    <br />
145
+    
146
+    <p>The Tor network relies on volunteers to donate bandwidth. The more
147
+    people who run relays, the faster the Tor network will be. If you have
148
+    at least 20 kilobytes/s each way, please help out Tor by configuring your
149
+    Tor to be a relay too. We have many features that make Tor relays easy
150
+    and convenient, including rate limiting for bandwidth, exit policies so
151
+    you can limit your exposure to abuse complaints, and support for dynamic
152
+    IP addresses.</p>
153
+    
154
+    <p>Having relays in many different places on the Internet is what
155
+    makes Tor users secure. <a
156
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">You
157
+    may also get stronger anonymity yourself</a>,
158
+    since remote sites can't know whether connections originated at your
159
+    computer or were relayed from others.</p>
160
+    
161
+    <p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
162
+    guide.</p>
163
+    
164
+    <hr />
165
+    <a id="uninstall"></a>
166
+    <h2><a class="anchor" href="#uninstall">How To Uninstall Tor and Privoxy</a></h2>
167
+    <br />
168
+    
169
+    <p>There are two ways to uninstall the bundle from your computer, using
170
+    Finder or a command line or Terminal-based uninstaller.  If you want to remove Tor on OSX, here's how:</p>
171
+    
172
+    <p>Change your application proxy settings back to their original values.
173
+       If you just want to stop using Tor, you can end at this point.</p>
174
+    
175
+    <p>If you want to completely remove Tor, and your account has Admin
176
+    Privileges, then proceed as follows:</p>
177
+    
178
+    <ol>
179
+    <li>Open Finder and click on Applications.</li>
180
+    <li>Drag /Applications/Vidalia to the Trash.</li>
181
+    <li>Remove /Library/Torbutton from your system.</li>
182
+    <li>In your home directory, go to Library, remove the Vidalia
183
+    directory</li>
184
+    </ol>
185
+    
186
+    <p>Tor, Vidalia, and Polipo are now completely removed from your system.</p>
187
+    
188
+    <p>If you're familiar with the command line or Terminal, you can
189
+    manually remove the following:</p>
190
+    <ul>
191
+    <li>/Applications/Vidalia.app/</li>
192
+    <li>/Library/Torbutton/</li>
193
+    <li>~/Library/Vidalia</li>
194
+    <li>~/.tor</li>
195
+    </ul>
196
+    
197
+    <hr />
198
+    
199
+    <p>If you have suggestions for improving this document, please <a
200
+    href="<page about/contact>">send them to us</a>. Thanks!</p>
201
+  </div>
202
+  <!-- END MAINCOL -->
203
+  <div id = "sidecol">
204
+#include "side.wmi"
205
+#include "info.wmi"
206
+  </div>
207
+  <!-- END SIDECOL -->
208
+</div>
209
+<!-- END CONTENT -->
210
+#include <foot.wmi>  
... ...
@@ -0,0 +1,301 @@
1
+## translation metadata
2
+# Revision: $Revision: 22144 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Relay Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-relay>">Configure Tor Relay</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+
14
+    <h1>Configuring a Tor relay</h1>
15
+    
16
+    #<!-- BEGIN SIDEBAR -->
17
+    #<div class="sidebar-left">
18
+    #<h3>Config Steps</h3>
19
+    #<ol>
20
+    #<li><a href="<page docs/tor-doc-relay>#install">Download &amp; Install</a></li>
21
+    #<li><a href="<page docs/tor-doc-relay>#setup">Configuration</a></li>
22
+    #<li><a href="<page docs/tor-doc-relay>#check">Check &amp; Confirm</a></li>
23
+    #<li><a href="<page docs/tor-doc-relay>#after">Final Steps</a></li>
24
+    #</ol>
25
+    #</div>
26
+    #<!-- END SIDEBAR -->
27
+    #
28
+    <hr />
29
+    
30
+    <p>
31
+    The Tor network relies on volunteers to donate bandwidth. The more
32
+    people who run relays, the faster the Tor network will be. If you have
33
+    at least 20 kilobytes/s each way, please help out Tor by configuring your
34
+    Tor to be a relay too. We have many features that make Tor relays easy
35
+    and convenient, including <a href="<page docs/faq>#RelayFlexible">rate limiting
36
+    for bandwidth, exit policies so you can limit your exposure to abuse
37
+    complaints, and support for dynamic IP addresses</a>.
38
+    </p>
39
+    
40
+    <p>You can run a Tor relay on <a
41
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayOS">pretty
42
+    much any</a> operating system. Tor relays work best on Linux, OS X Tiger
43
+    or later, FreeBSD 5.x+, NetBSD 5.x+, and Windows Server 2003 or later.
44
+    </p>
45
+    
46
+    <hr />
47
+    <a id="zero"></a>
48
+    <a id="install"></a>
49
+    <h2><a class="anchor" href="#install">Step One: Download and Install Tor</a></h2>
50
+    <br />
51
+    
52
+    <p>Before you start, you need to make sure that Tor is up and running.
53
+    </p>
54
+    
55
+    <p>Visit our <a href="<page download/easy-download>">download page</a> and
56
+    install the "Installation Bundle" for your OS.
57
+    </p>
58
+    
59
+    <p>If it's convenient, you might also want to use it as a client for a
60
+    while to make sure it's actually working.</p>
61
+    
62
+    <hr />
63
+    <a id="setup"></a>
64
+    <h2><a class="anchor" href="#setup">Step Two: Set it up as a relay</a></h2>
65
+    <br />
66
+    <ol>
67
+    <li>Verify that your clock and timezone are set
68
+    correctly. If possible, synchronize your clock with public <a
69
+    href="http://en.wikipedia.org/wiki/Network_Time_Protocol">time
70
+    servers</a>.
71
+    </li>
72
+    
73
+    <li><strong>Configuring Tor with the Vidalia Graphical Interface</strong>:
74
+    <ol>
75
+    
76
+    <li>
77
+    	<dt>Right click on the Vidalia icon in your task bar.  Choose <tt>Control Panel</tt>.</dt>
78
+    	<dd><img alt="vidalia right click menu" src="../img/screenshot-win32-vidalia.png"></dd>
79
+    </li>
80
+    
81
+    <li>Click <tt>Setup Relaying</tt>.</li>
82
+    
83
+    <li>
84
+    	<dt>Choose <tt>Relay Traffic for the Tor network</tt> if you want to be a public relay (recommended), or choose 		<tt>Help censored users reach the Tor network</tt> if you want to be a <a href="<page docs/faq>#RelayOrBridge">bridge</a> for users in countries that censor their Internet.</dt>
85
+    <dd><img alt="vidalia basic settings" src="../img/screenshot-win32-configure-relay-1.png"></dd>
86
+    </li>
87
+    
88
+    <li>Enter a nickname for your relay, and enter contact information in
89
+    case we need to contact you about problems.</li>
90
+    
91
+    <li>Leave <tt>Attempt to automatically configure port forwarding</tt> clicked.
92
+    Push the <tt>Test</tt> button to see if it works.  If it does work, great.
93
+    If not, see number 3 below.</li>
94
+    
95
+    <li><dt>Choose the <tt>Bandwidth Limits</tt> tab.  Select how much bandwidth you want to provide for Tor users like yourself.</dt>
96
+    <dd><img alt="vidalia bandwidth limits" src="../img/screenshot-win32-configure-relay-2.png"></dd>
97
+    </li> 
98
+    
99
+    <li><dt>Choose the <tt>Exit Policies</tt> tab.  If you want to allow others
100
+    to use your relay for these services, don't change anything.  Un-check
101
+    the services you don't want to allow people to <a href="<page
102
+    docs/faq>#ExitPolicies">reach from your relay</a>.  If you want to be a non-exit relay, un-check all services.</dt>
103
+    <dd><img alt="vidalia exit policies" src="../img/screenshot-win32-configure-relay-3.png"></dd>
104
+    </li>
105
+    
106
+    <li>Click the <tt>Ok</tt> button.  See Step Three below for confirmation
107
+    that the relay is working correctly.</li>
108
+    </ol>
109
+    
110
+    <br />
111
+    <strong>Manual Configuration</strong>:
112
+    <ul>
113
+    <li>Edit the bottom part of <a
114
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">your
115
+    torrc file</a>. If you want to be a public relay (recommended),
116
+    make sure to define ORPort and <a href="<page
117
+    docs/faq>#ExitPolicies">look at ExitPolicy</a>; otherwise
118
+    if you want to be a <a href="<page docs/faq>#RelayOrBridge">bridge</a>
119
+    for users in countries that censor their Internet,
120
+    just use <a href="<page docs/bridges>#RunningABridge">these lines</a>.
121
+    </li>
122
+    
123
+    </ul></li>
124
+    
125
+    <li>If you are using a firewall, open a hole in your firewall
126
+    so incoming connections can reach the ports you configured
127
+    (ORPort, plus DirPort if you enabled it). If you have a
128
+    hardware firewall (Linksys box, cablemodem, etc) you might like <a
129
+    href="http://portforward.com/">portforward.com</a>. Also, make sure you
130
+    allow all <em>outgoing</em> connections too, so your relay can reach the
131
+    other Tor relays.
132
+    </li>
133
+    
134
+    <li>Restart your relay. If it <a
135
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">logs
136
+    any warnings</a>, address them.
137
+    </li>
138
+    
139
+    <li>Subscribe to the <a
140
+    href="http://archives.seul.org/or/announce/">or-announce</a>
141
+    mailing list. It is very low volume, and it will keep you informed
142
+    of new stable releases. You might also consider subscribing to <a
143
+    href="<page docs/documentation>#MailingLists">the higher-volume Tor lists</a>
144
+    too.
145
+    </li>
146
+    
147
+    </ol>
148
+    
149
+    <hr />
150
+    <a id="check"></a>
151
+    <h2><a class="anchor" href="#check">Step Three: Make sure it is working</a></h2>
152
+    <br />
153
+    
154
+    <p>As soon as your relay manages to connect to the network, it will
155
+    try to determine whether the ports you configured are reachable from
156
+    the outside. This step is usually fast, but may take up to 20
157
+    minutes. Look for a
158
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">log
159
+    entry</a> like
160
+    <tt>Self-testing indicates your ORPort is reachable from the outside. Excellent.</tt>
161
+    If you don't see this message, it means that your relay is not reachable
162
+    from the outside &mdash; you should re-check your firewalls, check that it's
163
+    testing the IP and port you think it should be testing, etc.
164
+    </p>
165
+    
166
+    <p>When it decides that it's reachable, it will upload a "server
167
+    descriptor" to the directories, to let clients know
168
+    what address, ports, keys, etc your relay is using. You can <a
169
+    href="http://194.109.206.212/tor/status-vote/current/consensus">load one of
170
+    the network statuses manually</a> and
171
+    look through it to find the nickname you configured, to make sure it's
172
+    there. You may need to wait up to one hour to give enough time for it to
173
+    make a fresh directory.</p>
174
+    
175
+    <hr />
176
+    <a id="after"></a>
177
+    <h2><a class="anchor" href="#after">Step Four: Once it is working</a></h2>
178
+    <br />
179
+    
180
+    <p>
181
+    We recommend the following steps as well:
182
+    </p>
183
+    
184
+    <p>
185
+    6. Read
186
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/OperationalSecurity">about operational security</a>
187
+    to get ideas how you can increase the security of your relay.
188
+    </p>
189
+    
190
+    <p>
191
+    7. If you want to run more than one relay that's great, but please set <a
192
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#MultipleRelays">the
193
+    MyFamily option</a> in all your relays' configuration files.
194
+    </p>
195
+    
196
+    <p>
197
+    8. Decide about rate limiting. Cable modem, DSL, and other users
198
+    who have asymmetric bandwidth (e.g. more down than up) should
199
+    rate limit to their slower bandwidth, to avoid congestion. See the <a
200
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">rate
201
+    limiting FAQ entry</a> for details.
202
+    </p>
203
+    
204
+    <p>
205
+    9. Back up your Tor relay's private key (stored in "keys/secret_id_key"
206
+    in your DataDirectory). This is your relay's "identity," and
207
+    you need to keep it safe so nobody can read the traffic that goes
208
+    through your relay. This is the critical file to keep if you need to <a
209
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#UpgradeRelay">move
210
+    or restore your Tor relay</a> if something goes wrong.
211
+    </p>
212
+    
213
+    <p>
214
+    
215
+    10. If you control the name servers for your domain, consider setting your
216
+    reverse DNS hostname to 'anonymous-relay', 'proxy' or 'tor-proxy', so when
217
+    other people see the address in their web logs, they will more quickly
218
+    understand what's going on. Adding the <a
219
+    href="<gitblob>contrib/tor-exit-notice.html">Tor
220
+    exit notice</a> on a vhost for this name can go a long way to deterring abuse
221
+    complaints to you and your ISP if you are running an exit node.
222
+    
223
+    </p>
224
+    
225
+    <p>
226
+    11. If your computer isn't running a webserver, please consider
227
+    changing your ORPort to 443 and your DirPort to 80. Many Tor
228
+    users are stuck behind firewalls that only let them browse the
229
+    web, and this change will let them reach your Tor relay. Win32
230
+    relays can simply change their ORPort and DirPort directly
231
+    in their torrc and restart Tor. OS X or Unix relays can't bind
232
+    directly to these ports (since they don't run as root), so they will
233
+    need to set up some sort of <a
234
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients">
235
+    port forwarding</a> so connections can reach their Tor relay. If you are
236
+    using ports 80 and 443 already but still want to help out, other useful
237
+    ports are 22, 110, and 143.
238
+    </p>
239
+    
240
+    <p>
241
+    12. If your Tor relay provides other services on the same IP address
242
+    &mdash; such as a public webserver &mdash; make sure that connections to the
243
+    webserver are allowed from the local host too. You need to allow these
244
+    connections because Tor clients will detect that your Tor relay is the <a
245
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">safest
246
+    way to reach that webserver</a>, and always build a circuit that ends
247
+    at your relay. If you don't want to allow the connections, you must
248
+    explicitly reject them in your exit policy.
249
+    </p>
250
+    
251
+    <p>
252
+    13. (Unix only). Make a separate user to run the relay. If you
253
+    installed the OS X package or the deb or the rpm, this is already
254
+    done. Otherwise, you can do it by hand. (The Tor relay doesn't need to
255
+    be run as root, so it's good practice to not run it as root. Running
256
+    as a 'tor' user avoids issues with identd and other services that
257
+    detect user name. If you're the paranoid sort, feel free to <a
258
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorInChroot">put Tor
259
+    into a chroot jail</a>.)
260
+    </p>
261
+    
262
+    <p>
263
+    14. (Unix only.) Your operating system probably limits the number
264
+    of open file descriptors per process to 1024 (or even less). If you
265
+    plan to be running a fast exit node, this is probably not enough. On
266
+    Linux, you should add a line like "toruser hard nofile 8192" to your
267
+    /etc/security/limits.conf file (where toruser is the user that runs the
268
+    Tor process), and then restart Tor if it's installed as a package (or log
269
+    out and log back in if you run it yourself).
270
+    </p>
271
+    
272
+    <p>
273
+    15. If you installed Tor via some package or installer, it probably starts
274
+    Tor for you automatically on boot. But if you installed from source,
275
+    you may find the initscripts in contrib/tor.sh or contrib/torctl useful.
276
+    </p>
277
+    
278
+    <p>
279
+    When you change your Tor configuration, remember to verify that your
280
+    relay still works correctly after the change. Be sure to set your
281
+    "ContactInfo" line in the torrc so we can contact you if you need to
282
+    upgrade or something goes wrong. If you have problems or questions, see
283
+    the <a href="<page docs/documentation>#Support">Support</a> section or
284
+    <a href="<page about/contact>">contact us</a> on the tor-ops list. Thanks
285
+    for helping to make the Tor network grow!
286
+    </p>
287
+    
288
+    <hr />
289
+    
290
+    <p>If you have suggestions for improving this document, please <a
291
+    href="<page about/contact>">send them to us</a>. Thanks!</p>
292
+  </div>
293
+  <!-- END MAINCOL -->
294
+  <div id = "sidecol">
295
+#include "side.wmi"
296
+#include "info.wmi"
297
+  </div>
298
+  <!-- END SIDECOL -->
299
+</div>
300
+<!-- END CONTENT -->
301
+#include <foot.wmi>  
... ...
@@ -0,0 +1,204 @@
1
+## translation metadata
2
+# Revision: $Revision: 21798 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: Linux/BSD/Unix Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-unix>">Linux/BSD/Unix Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Running the <a href="<page home>">Tor</a> client on Linux/BSD/Unix</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>Note that these are the installation instructions for running a Tor
18
+    client. If you want to relay traffic for others to help the network grow
19
+    (please do), read the <a
20
+    href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b>
21
+    </p>
22
+    
23
+    <hr />
24
+    <a id="installing"></a>
25
+    <h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2>
26
+    <br />
27
+    
28
+    <p>
29
+    The latest release of Tor can be found on the <a
30
+    href="<page download/download>">download</a> page. We have packages for Debian,
31
+    Red Hat, Gentoo, *BSD, etc there too. If you're
32
+    using Ubuntu, don't use the default packages: use <a
33
+    href="<page docs/debian>#ubuntu">our deb repository</a> instead.
34
+    </p>
35
+    
36
+    <p>If you're building from source, first install <a
37
+    href="http://www.monkey.org/~provos/libevent/">libevent</a>, and
38
+    make sure you have openssl and zlib (including the -devel packages if
39
+    applicable). Then run:<br />
40
+    <tt>tar xzf tor-<version-stable>.tar.gz; cd tor-<version-stable></tt><br />
41
+    <tt>./configure &amp;&amp; make</tt><br />
42
+    Now you can run tor as <tt>src/or/tor</tt>, or you can run <tt>make install</tt>
43
+    (as root if necessary) to install it into /usr/local/, and then you can
44
+    start it just by running <tt>tor</tt>.
45
+    </p>
46
+    
47
+    <p>Tor comes configured as a client by default. It uses a built-in
48
+    default configuration file, and most people won't need to change any of
49
+    the settings. Tor is now installed.
50
+    </p>
51
+    
52
+    <hr />
53
+    <a id="privoxy"></a>
54
+    <a id="polipo"></a>
55
+    <h2><a class="anchor" href="#polipo">Step Two: Install Polipo for Web Browsing</a></h2>
56
+    <br />
57
+    
58
+    <p>After installing Tor, you need to configure your applications to use it.
59
+    </p>
60
+    
61
+    <p>
62
+    The first step is to set up web browsing. Start by installing <a
63
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> from
64
+    your favorite repository. Polipo is a caching web proxy that does http
65
+    pipelining well, so it's well-suited for Tor's latencies. Make sure
66
+    to get at least Polipo 1.0.4, since earlier versions lack the SOCKS support
67
+    required to use Polipo with Tor. You should uninstall privoxy at this
68
+    point (e.g. apt-get remove privoxy or yum remove privoxy), so they don't
69
+    conflict.
70
+    </p>
71
+    
72
+    <p>Once you've installed Polipo (either from package or from
73
+    source), <b>you will need to configure Polipo to use Tor</b>. Grab our <a
74
+    href="https://svn.torproject.org/svn/torbrowser/trunk/build-scripts/config/polipo.conf">Polipo
75
+    configuration for Tor</a> and put it in place of your current polipo
76
+    config file (e.g. /etc/polipo/config or ~/.polipo).
77
+    You'll need to restart Polipo for the changes to take effect. For
78
+    example:<br />
79
+    <tt>/etc/init.d/polipo restart</tt>
80
+    </p>
81
+    
82
+    <p>If you prefer, you can instead use Privoxy with <a
83
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">this
84
+    sample Privoxy configuration</a>. But since the config files both use
85
+    port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p>
86
+    
87
+    <hr />
88
+    <a id="using"></a>
89
+    <h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2>
90
+    <br />
91
+    
92
+    <p>After installing Tor and Polipo, you need to configure your
93
+    applications to use them. The first step is to set up web browsing.</p>
94
+    
95
+    <p>You should use Tor with Firefox and Torbutton, for best safety.
96
+    Simply install the <a
97
+    href="https://addons.mozilla.org/firefox/2275/">Torbutton
98
+    plugin</a>, restart your Firefox, and you're all set:
99
+    </p>
100
+    
101
+    <img alt="Torbutton plugin for Firefox"
102
+    src="../img/screenshot-torbutton.png"
103
+    border="1">
104
+    
105
+    <br />
106
+    
107
+    <p>
108
+    If you plan to run Firefox on a different computer than Tor, see the <a
109
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">
110
+    FAQ
111
+    entry for running Tor on a different computer</a>.
112
+    </p>
113
+    
114
+    <p>To Torify other applications that support HTTP proxies, just
115
+    point them at Polipo (that is, localhost port 8118). To use SOCKS
116
+    directly (for instant messaging, Jabber, IRC, etc), you can point
117
+    your application directly at Tor (localhost port 9050), but see <a
118
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this
119
+    FAQ entry</a> for why this may be dangerous. For applications
120
+    that support neither SOCKS nor HTTP, take a look at <a
121
+    href="http://tsocks.sourceforge.net/">tsocks</a> or <a
122
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>.
123
+    </p>
124
+    
125
+    <p>For information on how to Torify other applications, check out the
126
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
127
+    HOWTO</a>.
128
+    </p>
129
+    
130
+    <hr />
131
+    <a id="verify"></a>
132
+    <h2><a class="anchor" href="#verify">Step Four: Make sure it's working</a></h2>
133
+    <br />
134
+    
135
+    <p>
136
+    Next, you should try using your browser with Tor and make
137
+    sure that your IP address is being anonymized. Click on
138
+    <a href="https://check.torproject.org/">the
139
+    Tor detector</a>
140
+    and see whether it thinks you're using Tor or not.
141
+    #<a href="http://ipchicken.com/">this site</a>
142
+    #to see what IP address it thinks you're using.
143
+    (If that site is down, see <a
144
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this
145
+    FAQ entry</a> for more suggestions on how to test your Tor.)
146
+    </p>
147
+    
148
+    <p>If you have a personal firewall that limits your computer's
149
+    ability to connect to itself (this includes something like SELinux on
150
+    Fedora Core 4), be sure to allow connections from
151
+    your local applications to Polipo (local port 8118) and Tor (local port
152
+    9050). If
153
+    your firewall blocks outgoing connections, punch a hole so
154
+    it can connect to at least TCP ports 80 and 443, and then see <a
155
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this
156
+    FAQ entry</a>.  If your SELinux config is not allowing tor or privoxy to
157
+    run correctly, create a file named booleans.local in the directory
158
+    /etc/selinux/targeted.  Edit this file in your favorite text editor and
159
+    insert "allow_ypbind=1".  Restart your machine for this change to take
160
+    effect.
161
+    </p>
162
+    
163
+    <p>If it's still not working, look at <a
164
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this
165
+    FAQ entry</a> for hints.</p>
166
+    
167
+    <hr />
168
+    <a id="server"></a>
169
+    <a id="relay"></a>
170
+    <h2><a class="anchor" href="#relay">Step Five: Configure it as a relay</a></h2>
171
+    <br />
172
+    
173
+    <p>The Tor network relies on volunteers to donate bandwidth. The more
174
+    people who run relays, the faster the Tor network will be. If you have
175
+    at least 20 kilobytes/s each way, please help out Tor by configuring your
176
+    Tor to be a relay too. We have many features that make Tor relays easy
177
+    and convenient, including rate limiting for bandwidth, exit policies so
178
+    you can limit your exposure to abuse complaints, and support for dynamic
179
+    IP addresses.</p>
180
+    
181
+    <p>Having relays in many different places on the Internet is what
182
+    makes Tor users secure. <a
183
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">You
184
+    may also get stronger anonymity yourself</a>,
185
+    since remote sites can't know whether connections originated at your
186
+    computer or were relayed from others.</p>
187
+    
188
+    <p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
189
+    guide.</p>
190
+    
191
+    <hr />
192
+    
193
+    <p>If you have suggestions for improving this document, please <a
194
+    href="<page about/contact>">send them to us</a>. Thanks!</p>
195
+  </div>
196
+  <!-- END MAINCOL -->
197
+  <div id = "sidecol">
198
+#include "side.wmi"
199
+#include "info.wmi"
200
+  </div>
201
+  <!-- END SIDECOL -->
202
+</div>
203
+<!-- END CONTENT -->
204
+#include <foot.wmi>  
... ...
@@ -0,0 +1,64 @@
1
+## translation metadata
2
+# Revision: $Revision: 21511 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: Configuring your browser to use Tor" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-web>">Configure Your Browser</a>
11
+  </div>
12
+  <div id="maincol">
13
+    <h1>Configuring your browser to use <a href="<page home>">Tor</a></h1>
14
+    <br />
15
+    
16
+    <p>If you're using Firefox (we recommend it), you don't need this page.
17
+    Simply install the <a
18
+    href="https://addons.mozilla.org/firefox/2275/">Torbutton
19
+    plugin</a>, restart your Firefox, and you're all set:
20
+    </p>
21
+    
22
+    <img alt="Torbutton plugin for Firefox"
23
+    src="../img/screenshot-torbutton.png"
24
+    border="1"/>
25
+    
26
+    <br />
27
+    
28
+    <p>Otherwise, you need to manually configure your browser's proxy
29
+    settings.
30
+    <br/>In Mozilla and Firefox on Windows, this is in
31
+    Tools - Options - General - Connection Settings.
32
+    <br/>In Firefox on OS X, it's Firefox - Preferences - General - Connection Settings.
33
+    <br/>In Firefox on Linux, this is in
34
+    Edit - Preferences - Advanced - Proxies.
35
+    <br/>In Opera it's Tools - Preferences(Advanced) - Network - Proxy servers.
36
+    <br/>While we cannot advise using IE, for those wishing less-than-real
37
+    anonymity:  In IE, it's Tools - Internet Options - Connections - LAN Settings - Check Proxy
38
+    Server - Advanced.</p>
39
+    
40
+    <img alt="Proxy settings in Firefox"
41
+    src="../img/screenshot-win32-firefox-proxies.jpg" />
42
+    
43
+    <p>
44
+    You should fill in "localhost"
45
+    and "8118" to point the top four protocols to Polipo, as shown here. (Even
46
+    though Polipo doesn't support FTP and Gopher, <a
47
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">you
48
+    should set them up anyway</a>.) You should also fill out the socks proxy entry to point directly to Tor ("localhost", "9050", and socks5)
49
+    to cover protocols besides the first four. Then click "OK".</p>
50
+    
51
+    <hr />
52
+    
53
+    <p>If you have suggestions for improving this document, please <a
54
+    href="<page about/contact>">send them to us</a>. Thanks!</p>
55
+  </div>
56
+  <!-- END MAINCOL -->
57
+  <div id = "sidecol">
58
+#include "side.wmi"
59
+#include "info.wmi"
60
+  </div>
61
+  <!-- END SIDECOL -->
62
+</div>
63
+<!-- END CONTENT -->
64
+#include <foot.wmi>  
... ...
@@ -0,0 +1,7 @@
1
+## translation metadata
2
+# Revision: $Revision: 13195 $
3
+# Status: obsolete
4
+
5
+#include "head.wmi" TITLE="Redirecting" REDIRECT="docs/tor-doc-windows"
6
+
7
+#include <foot.wmi>
... ...
@@ -0,0 +1,187 @@
1
+## translation metadata
2
+# Revision: $Revision: 21995 $
3
+# Translation-Priority: 1-high
4
+
5
+#include "head.wmi" TITLE="Tor Project: MS Windows Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-windows>">Windows Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Running the <a href="<page home>">Tor</a> client on Microsoft Windows</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>Note that these are the installation instructions for running a Tor
18
+    client on Microsoft Windows (2000, XP, Vista, 7, and Server Editions).
19
+    If you want to relay traffic for others to help the network grow (please
20
+    do), read the <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
21
+    guide.</b>
22
+    </p>
23
+    
24
+    <p>Freedom House has produced a video on how to install Tor.  You can
25
+    view it at <a href="http://media.torproject.org/video/2009-install-and-use-tor.ogv">How
26
+    to install Tor on Windows</a>.  Know of a better video, or one
27
+    translated into your language?  Let us know!</p>
28
+    
29
+    <div class="center">
30
+    <p><video id="v1" src="http://media.torproject.org/video/2009-install-and-use-tor.ogv" autobuffer="true" controls="controls"></video></p>
31
+    </div>
32
+    
33
+    <hr />
34
+    <a id="installing"></a>
35
+    <h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2>
36
+    <br />
37
+    
38
+    <p>
39
+    Microsoft Windows bundles contain <a href="<page home>">Tor</a>, <a
40
+    href="<page projects/vidalia>">Vidalia</a> (a GUI for Tor), <a
41
+    href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> (a plugin for Mozilla Firefox), and <a
42
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a>
43
+    (a web proxy) packaged into one bundle, with the four applications
44
+    pre-configured to work together.  Download either the <a
45
+    href="../<package-win32-bundle-stable>">stable</a> or the <a
46
+    href="../<package-win32-bundle-alpha>">experimental</a> version of
47
+    the Windows bundle, or look for more options on the <a href="<page
48
+    download/download>">download page</a>.
49
+    </p>
50
+    
51
+    <img alt="tor installer splash page" src="../img/screenshot-win32-installer-splash.png" />
52
+    
53
+    <p>If you have previously installed Tor, Vidalia, or Polipo
54
+    you can deselect whichever components you do not need to install
55
+    in the dialog shown below.
56
+    </p>
57
+    
58
+    <img alt="select components to install" src="../img/screenshot-win32-installer-components.png" />
59
+    
60
+    <p>After you have completed the installer, the components
61
+    you selected will automatically be started for you.
62
+    </p>
63
+    
64
+    <p>Tor comes configured as a client by default. It uses a built-in
65
+    default configuration file, and most people won't need to change any of
66
+    the settings. Tor is now installed.
67
+    </p>
68
+    
69
+    <hr />
70
+    <a id="using"></a>
71
+    <h2><a class="anchor" href="#using">Step Two: Configure your applications to use Tor</a></h2>
72
+    <br />
73
+    
74
+    <p>After installing Tor and Polipo, you need to configure your
75
+    applications to use them. The first step is to set up web browsing.</p>
76
+    
77
+    <p>You should use Tor with Firefox and Torbutton,
78
+    for best safety. The bundle installs the <a
79
+    href="https://addons.mozilla.org/firefox/2275/">Torbutton plugin</a>
80
+    for you. Restart your Firefox, and you're all set:
81
+    </p>
82
+    
83
+    <img alt="Torbutton plugin for Firefox" src="../img/screenshot-torbutton.png" border="1"/>
84
+    
85
+    <br />
86
+    
87
+    <p>
88
+    If you plan to run Firefox on a different computer than Tor, see the <a
89
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">FAQ
90
+    entry for running Tor on a different computer</a>.
91
+    </p>
92
+    
93
+    <p>To Torify other applications that support HTTP proxies, just
94
+    point them at Polipo (that is, localhost port 8118). To use SOCKS
95
+    directly (for instant messaging, Jabber, IRC, etc), you can point
96
+    your application directly at Tor (localhost port 9050), but see <a
97
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this
98
+    FAQ entry</a> for why this may be dangerous. For applications
99
+    that support neither SOCKS nor HTTP, take a look at SocksCap or
100
+    <a href="http://www.freecap.ru/eng/">FreeCap</a>.
101
+    (FreeCap is free software; SocksCap is proprietary.)</p>
102
+    
103
+    <p>For information on how to Torify other applications, check out the
104
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
105
+    HOWTO</a>.
106
+    </p>
107
+    
108
+    <hr />
109
+    <a id="verify"></a>
110
+    <h2><a class="anchor" href="#verify">Step Three: Make sure it's working</a></h2>
111
+    <br />
112
+    
113
+    <p>
114
+    Check to see that Vidalia is running.  Vidalia uses a small green onion
115
+    to indicate Tor is running or a dark onion with a red "X" when Tor is
116
+    not running. You can start or stop Tor by right-clicking
117
+    on Vidalia's icon in your system tray and selecting "Start" or "Stop"
118
+    from the menu as shown below:
119
+    </p>
120
+    
121
+    <img alt="Vidalia Tray Icon" src="../img/screenshot-win32-vidalia.png"/>
122
+    
123
+    <p>
124
+    Next, you should try using your browser with Tor and make
125
+    sure that your IP address is being anonymized. Click on <a
126
+    href="https://check.torproject.org/">the Tor detector</a> and see
127
+    whether it thinks you're using Tor or not.  (If that site is down, see <a
128
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this
129
+    FAQ entry</a> for more suggestions on how to test your Tor.)
130
+    </p>
131
+    
132
+    <p>If you have a personal firewall that limits your computer's
133
+    ability to connect to itself, be sure to allow connections from
134
+    your local applications to local port 8118 and port 9050. If
135
+    your firewall blocks outgoing connections, punch a hole so
136
+    it can connect to at least TCP ports 80 and 443, and then see <a
137
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this
138
+    FAQ entry</a>.
139
+    </p>
140
+    
141
+    <p>If it's still not working, look at <a
142
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this
143
+    FAQ entry</a> for hints.</p>
144
+    
145
+    <p>
146
+    Once it's working, learn more about
147
+    <a href="<page download/download>#Warning">what Tor does and does not offer</a>.
148
+    </p>
149
+    
150
+    <hr />
151
+    <a id="server"></a>
152
+    <a id="relay"></a>
153
+    <h2><a class="anchor" href="#relay">Step Four: Configure it as a relay</a></h2>
154
+    <br />
155
+    
156
+    <p>The Tor network relies on volunteers to donate bandwidth. The more
157
+    people who run relays, the faster the Tor network will be. If you have
158
+    at least 20 kilobytes/s each way, please help out Tor by configuring your
159
+    Tor to be a relay too. We have many features that make Tor relays easy
160
+    and convenient, including rate limiting for bandwidth, exit policies so
161
+    you can limit your exposure to abuse complaints, and support for dynamic
162
+    IP addresses.</p>
163
+    
164
+    <p>Having relays in many different places on the Internet is what
165
+    makes Tor users secure. <a
166
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">You
167
+    may also get stronger anonymity yourself</a>,
168
+    since remote sites can't know whether connections originated at your
169
+    computer or were relayed from others.</p>
170
+    
171
+    <p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
172
+    guide.</p>
173
+    
174
+    <hr />
175
+    
176
+    <p>If you have suggestions for improving this document, please <a
177
+    href="<page about/contact>">send them to us</a>. Thanks!</p>
178
+  </div>
179
+  <!-- END MAINCOL -->
180
+  <div id = "sidecol">
181
+#include "side.wmi"
182
+#include "info.wmi"
183
+  </div>
184
+  <!-- END SIDECOL -->
185
+</div>
186
+<!-- END CONTENT -->
187
+#include <foot.wmi>  
... ...
@@ -0,0 +1,274 @@
1
+## translation metadata
2
+# Revision: $Revision: 22314 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Hidden Service Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-hidden-service>">Tor Hidden Service</a>
11
+  </div>
12
+  <div id="maincol">
13
+    <h1>Configuring Hidden Services for <a href="<page home>">Tor</a></h1>
14
+    <hr />
15
+    
16
+    <p>Tor allows clients and relays to offer hidden services. That is,
17
+    you can offer a web server, SSH server, etc., without revealing your
18
+    IP address to its users. In fact, because you don't use any public address,
19
+    you can run a hidden service from behind your firewall.
20
+    </p>
21
+    
22
+    <p>If you have Tor installed, you can see hidden services
23
+    in action by visiting <a href="http://duskgytldkxiuqc6.onion/">our
24
+    example hidden service</a>.
25
+    </p>
26
+    
27
+    <p>This howto describes the steps for setting up your own hidden service
28
+    website. For the technical details of how the hidden service protocol
29
+    works, see our <a href="<page docs/hidden-services>">hidden service protocol</a> page.
30
+    </p>
31
+    
32
+    <hr />
33
+    <a id="zero"></a>
34
+    <h2><a class="anchor" href="#zero">Step Zero: Get Tor working</a></h2>
35
+    <br />
36
+    
37
+    <p>Before you start, you need to make sure:</p>
38
+    <ol>
39
+    <li>Tor is up and running,</li>
40
+    <li>You actually set it up correctly.</li>
41
+    </ol>
42
+    
43
+    
44
+    <p>Windows users should follow the <a
45
+    href="<page docs/tor-doc-windows>">Windows
46
+    howto</a>, OS X users should follow the <a
47
+    href="<page docs/tor-doc-osx>">OS
48
+    X howto</a>, and Linux/BSD/Unix users should follow the <a
49
+    href="<page docs/tor-doc-unix>">Unix howto</a>.
50
+    </p>
51
+    
52
+    <p>Once you've got Tor installed and configured,
53
+    you can see hidden services in action by following this link to <a
54
+    href="http://duskgytldkxiuqc6.onion/">our example hidden service</a>
55
+    or the <a
56
+    href="http://gaddbiwdftapglkq.onion/">Wikileaks hidden service</a>.
57
+    It will typically take 10-60 seconds to load
58
+    (or to decide that it is currently unreachable). If it fails
59
+    immediately and your browser pops up an alert saying that
60
+    "www.duskgytldkxiuqc6.onion could not be found, please check the name and
61
+    try again" then you haven't configured Tor correctly; see <a
62
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">the
63
+    it-doesn't-work FAQ entry</a> for some help.
64
+    </p>
65
+    
66
+    <hr />
67
+    <a id="one"></a>
68
+    <h2><a class="anchor" href="#one">Step One: Install a web server locally</a></h2>
69
+    <br />
70
+    
71
+    <p>First, you need to set up a web server locally. Setting up a web
72
+    server can be tricky,
73
+    so we're just going to go over a few basics here. If you get stuck
74
+    or want to do more, find a friend who can help you. We recommend you
75
+    install a new separate web server for your hidden service, since even
76
+    if you already have one installed, you may be using it (or want to use
77
+    it later) for an actual website.
78
+    </p>
79
+    
80
+    <p>If you're on Unix or OS X and you're comfortable with
81
+    the command-line, by far the best way to go is to install <a
82
+    href="http://www.acme.com/software/thttpd/">thttpd</a>. Just grab the
83
+    latest tarball, untar it (it will create its own directory), and run
84
+    <kbd>./configure &amp;&amp; make</kbd>. Then <kbd>mkdir hidserv; cd
85
+    hidserv</kbd>, and run
86
+    <kbd>../thttpd -p 5222 -h localhost</kbd>. It will give you back your prompt,
87
+    and now you're running a webserver on port 5222. You can put files to
88
+    serve in the hidserv directory.
89
+    </p>
90
+    
91
+    <p>If you're on Windows, you might pick <a
92
+    href="http://savant.sourceforge.net/">Savant</a> or <a
93
+    href="http://httpd.apache.org/">Apache</a>, and be sure to configure it
94
+    to bind only to localhost. You should also figure out what port you're
95
+    listening on, because you'll use it below.
96
+    </p>
97
+    
98
+    <p>(The reason we bind the web server only to localhost is to make
99
+    sure it isn't publically accessible. If people could get to it directly,
100
+    they could confirm that your computer is the one offering the hidden
101
+    service.)
102
+    </p>
103
+    
104
+    <p>Once you've got your web server set up, make sure it works: open your
105
+    browser and go to <a
106
+    href="http://localhost:5222/">http://localhost:5222/</a>, where 5222 is
107
+    the port that you picked above. Then try putting a file in the main html
108
+    directory, and make sure it shows up when you access the site.
109
+    </p>
110
+    
111
+    <hr />
112
+    <a id="two"></a>
113
+    <h2><a class="anchor" href="#two">Step Two: Configure your hidden service</a></h2>
114
+    <br />
115
+    
116
+    <p>Next, you need to configure your hidden service to point to your
117
+    local web server.
118
+    </p>
119
+    
120
+    <p>First, open your torrc file in your favorite text editor. (See <a
121
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">the
122
+    torrc FAQ entry</a> to learn what this means.) Go to the middle section and
123
+    look for the line</p>
124
+    
125
+    <pre>
126
+    \############### This section is just for location-hidden services ###
127
+    </pre>
128
+    
129
+    <p>
130
+    This section of the file consists of groups of lines, each representing
131
+    one hidden service. Right now they are all commented out (the lines
132
+    start with #), so hidden services are disabled. Each group of lines
133
+    consists of one <var>HiddenServiceDir</var> line, and one or more
134
+    <var>HiddenServicePort</var> lines:</p>
135
+    <ul>
136
+    <li><var>HiddenServiceDir</var> is a directory where Tor will store information
137
+    about that hidden service.  In particular, Tor will create a file here named
138
+    <var>hostname</var> which will tell you the onion URL.  You don't need to
139
+    add any files to this directory. Make sure this is not the same directory
140
+    as the hidserv directory you created when setting up thttpd, as your
141
+    HiddenServiceDir contains secret information!</li>
142
+    <li><var>HiddenServicePort</var> lets you specify a virtual port (that is, what
143
+    port people accessing the hidden service will think they're using) and an
144
+    IP address and port for redirecting connections to this virtual port.</li>
145
+    </ul>
146
+    
147
+    <p>Add the following lines to your torrc:
148
+    </p>
149
+    
150
+    <pre>
151
+    HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
152
+    HiddenServicePort 80 127.0.0.1:5222
153
+    </pre>
154
+    
155
+    <p>You're going to want to change the <var>HiddenServiceDir</var> line, so it points
156
+    to an actual directory that is readable/writeable by the user that will
157
+    be running Tor. The above line should work if you're using the OS X Tor
158
+    package. On Unix, try "/home/username/hidden_service/" and fill in your own
159
+    username in place of "username". On Windows you might pick:</p>
160
+    <pre>
161
+    HiddenServiceDir C:\Documents and Settings\username\Application Data\hidden_service\\
162
+    HiddenServicePort 80 127.0.0.1:5222
163
+    </pre>
164
+    
165
+    <p>Now save the torrc, shut down
166
+    your Tor, and then start it again.
167
+    </p>
168
+    
169
+    <p>If Tor starts up again, great. Otherwise, something is wrong. First look at
170
+    your logfiles for hints. It will print some warnings or error messages. That
171
+    should give you an idea what went wrong. Typically there are typos in the torrc
172
+    or wrong directory permissions (See <a
173
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">the
174
+    logging FAQ entry</a> if you don't know how to enable or find your
175
+    log file.)
176
+    </p>
177
+    
178
+    <p>When Tor starts, it will automatically create the <var>HiddenServiceDir</var>
179
+    that you specified (if necessary), and it will create two files there.</p>
180
+    
181
+    <dl>
182
+    <dt><var>private_key</var></dt>
183
+    <dd>First, Tor will generate a new public/private keypair for your hidden
184
+    service. It is written into a file called "private_key". Don't share this key
185
+    with others -- if you do they will be able to impersonate your hidden
186
+    service.</dd>
187
+    <dt><var>hostname</var></dt>
188
+    <dd>The other file Tor will create is called "hostname". This contains
189
+    a short summary of your public key -- it will look something like
190
+    <tt>duskgytldkxiuqc6.onion</tt>. This is the public name for your service,
191
+    and you can tell it to people, publish it on websites, put it on business
192
+    cards, etc.</dd>
193
+    </dl>
194
+    
195
+    <p>If Tor runs as a different user than you, for example on
196
+    OS X, Debian, or Red Hat, then you may need to become root to be able
197
+    to view these files.</p>
198
+    
199
+    <p>Now that you've restarted Tor, it is busy picking introduction points
200
+    in the Tor network, and generating a <em>hidden service
201
+    descriptor</em>. This is a signed list of introduction points along with
202
+    the service's full public key. It anonymously publishes this descriptor
203
+    to the directory servers, and other people anonymously fetch it from the
204
+    directory servers when they're trying to access your service.
205
+    </p>
206
+    
207
+    <p>Try it now: paste the contents of the hostname file into your web
208
+    browser. If it works, you'll get the html page you set up in step one.
209
+    If it doesn't work, look in your logs for some hints, and keep playing
210
+    with it until it works.
211
+    </p>
212
+    
213
+    <hr />
214
+    <a id="three"></a>
215
+    <h2><a class="anchor" href="#three">Step Three: More advanced tips</a></h2>
216
+    <br />
217
+    
218
+    <p>If you plan to keep your service available for a long time, you might
219
+    want to make a backup copy of the <var>private_key</var> file somewhere.
220
+    </p>
221
+    
222
+    <p>We avoided recommending Apache above, a) because many people might
223
+    already be running it for a public web server on their computer, and b)
224
+    because it's big
225
+    and has lots of places where it might reveal your IP address or other
226
+    identifying information, for example in 404 pages. For people who need
227
+    more functionality, though, Apache may be the right answer. Can
228
+    somebody make us a checklist of ways to lock down your Apache when you're
229
+    using it as a hidden service? Savant probably has these problems too.
230
+    </p>
231
+    
232
+    <p>If you want to forward multiple virtual ports for a single hidden
233
+    service, just add more <var>HiddenServicePort</var> lines.
234
+    If you want to run multiple hidden services from the same Tor
235
+    client, just add another <var>HiddenServiceDir</var> line. All the following
236
+    <var>HiddenServicePort</var> lines refer to this <var>HiddenServiceDir</var> line, until
237
+    you add another <var>HiddenServiceDir</var> line:
238
+    </p>
239
+    
240
+    <pre>
241
+    HiddenServiceDir /usr/local/etc/tor/hidden_service/
242
+    HiddenServicePort 80 127.0.0.1:8080
243
+    
244
+    HiddenServiceDir /usr/local/etc/tor/other_hidden_service/
245
+    HiddenServicePort 6667 127.0.0.1:6667
246
+    HiddenServicePort 22 127.0.0.1:22
247
+    </pre>
248
+    
249
+    <p>There are some anonymity issues you should keep in mind too:
250
+    </p>
251
+    <ul>
252
+    <li>As mentioned above, be careful of letting your web server reveal
253
+    identifying information about you, your computer, or your location.
254
+    For example, readers can probably determine whether it's thttpd or
255
+    Apache, and learn something about your operating system.</li>
256
+    <li>If your computer isn't online all the time, your hidden service
257
+    won't be either. This leaks information to an observant adversary.</li>
258
+    <!-- increased risks over time -->
259
+    </ul>
260
+    
261
+    <hr />
262
+    
263
+    <p>If you have suggestions for improving this document, please <a
264
+    href="<page about/contact>">send them to us</a>. Thanks!</p>
265
+  </div>
266
+  <!-- END MAINCOL -->
267
+  <div id = "sidecol">
268
+#include "side.wmi"
269
+#include "info.wmi"
270
+  </div>
271
+  <!-- END SIDECOL -->
272
+</div>
273
+<!-- END CONTENT -->
274
+#include <foot.wmi>  
... ...
@@ -0,0 +1,30 @@
1
+## translation metadata
2
+# Revision: $Revision: 21567 $
3
+
4
+#include "head.wmi" TITLE="Tor Project: manual"
5
+
6
+# Translators shouldn't translate this file, unless they want
7
+# to translate the whole man page too.
8
+<div id="content" class="clearfix">
9
+  <div id="breadcrumbs">
10
+    <a href="<page home>">Home &raquo; </a>
11
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
12
+    <a href="<page docs/tor-doc-osx>">Tor Dev Manual</a>
13
+  </div>
14
+  <div id="maincol">  
15
+    <:
16
+    	die "Missing git clone at $(TORGIT)" unless -d "$(TORGIT)";
17
+    	my $man = `GIT_DIR=$(TORGIT) git show $(DEVTAG):doc/tor.1.txt | asciidoc -d manpage -s -o - -`;
18
+    	die "No manpage because of asciidoc error or file not available from git" unless $man;
19
+    	print $man;
20
+    :>
21
+  </div>
22
+  <!-- END MAINCOL -->
23
+  <div id = "sidecol">
24
+#include "side.wmi"
25
+#include "info.wmi"
26
+  </div>
27
+  <!-- END SIDECOL -->
28
+</div>
29
+<!-- END CONTENT -->
30
+#include <foot.wmi>  
... ...
@@ -0,0 +1,37 @@
1
+## translation metadata
2
+# Revision: $Revision: 13768 $
3
+
4
+#include "head.wmi" TITLE="Tor Project: manual"
5
+
6
+# Translators shouldn't translate this file, unless they want
7
+# to translate the whole man page too.
8
+
9
+<div id="content" class="clearfix">
10
+  <div id="breadcrumbs">
11
+    <a href="<page home>">Home &raquo; </a>
12
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
13
+    <a href="<page docs/tor-doc-osx>">Tor Manual</a>
14
+  </div> 
15
+  <div id="maincol"> 
16
+    <:
17
+    	#die "Missing manpage" unless -f "$(TORSVNSTABLE)/doc/tor.1.txt";
18
+    	die "Missing manpage" unless -f "$(TORSVNSTABLE)/doc/tor.1.in";
19
+    	my $man = `man2html -M '' $(TORSVNSTABLE)/doc/tor.1.in`;
20
+    	#my $man = `man2html -M '' $(TORSVNSTABLE)/doc/tor.1.txt`;
21
+    	die "No manpage" unless $man;
22
+    
23
+    	$man =~ s,.*<body>,,is;
24
+    	$man =~ s,</body>.*,,is;
25
+    
26
+    	print $man;
27
+    :>
28
+  </div>
29
+  <!-- END MAINCOL -->
30
+  <div id = "sidecol">
31
+#include "side.wmi"
32
+#include "info.wmi"
33
+  </div>
34
+  <!-- END SIDECOL -->
35
+</div>
36
+<!-- END CONTENT -->
37
+#include <foot.wmi>  
... ...
@@ -0,0 +1,93 @@
1
+## translation metadata
2
+# Revision: $Revision: 22138 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Trademark FAQ" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/trademark-faq>">Trademark FAQ</a>
11
+  </div>
12
+  <div id="maincol">
13
+    <!-- PUT CONTENT AFTER THIS TAG -->
14
+    <h1>Tor Trademark Frequently Asked Questions</h1>
15
+    <hr />
16
+    
17
+    <a id="usage"></a>
18
+    <h2>How can I use the name "Tor"?</h2>
19
+    <p>The Tor Project encourages developers to use the name Tor in ways that
20
+    do not confuse the public about the source of anonymity software and
21
+    services.  If you are building open-source non-commercial software or
22
+    services that incorporate or work with The Tor Project's code, you may
23
+    use the name “Tor” in an accurate description of your work.  We ask you
24
+    to include a link to the official Tor website
25
+    <a href="https://www.torproject.org/">https://www.torproject.org/</a> so users can verify the original source of
26
+    Tor for themselves, and a note indicating that your project is not
27
+    sponsored by The Tor Project. For example, “This product is produced
28
+    independently from the Tor&#174; anonymity software and carries no guarantee
29
+    from The Tor Project about quality, suitability or anything else.”</p>
30
+    
31
+    <a id="onionlogo"></a>
32
+    <h2>Can I use the Tor onion logo?</h2>
33
+    <p>If you're making non-commercial use of Tor software, you may also use
34
+    the Tor onion logo (as an illustration, not as a brand for your
35
+    products).  Please don't modify the design or colors of the logo.  You
36
+    can use items that look like the Tor onion logo to illustrate a point
37
+    (e.g. an exploded onion with layers, for instance), so long as they're
38
+    not used as logos in ways that would confuse people.</p>
39
+    
40
+    <a id="combining"></a>
41
+    <h2>Can I use the word "Tor" as part of the name of my product or my domain name?</h2>
42
+    <p>We recommend that you don't do this, but rather find a name that will
43
+    accurately identify <i>your</i> products or services.  Remember that our goal
44
+    is to make sure that people aren't confused about whether your product
45
+    or project is made or endorsed by The Tor Project. Creating a new brand
46
+    that incorporates the Tor brand is likely to lead to confusion.</p>
47
+    
48
+    <a id="enforcing"></a>
49
+    <h2>Does this mean you're enforcing trademark rights?</h2>
50
+    <p>The Tor Project is a non-profit corporation organized to research and
51
+    develop the Tor anonymity software and network.  We don't want to be
52
+    trademark bullies, but we will use trademark to protect the public's
53
+    ability to recognize Tor Project software.  Trademark law helps us to assure
54
+    that the name is used only in connection with genuine Tor anonymity
55
+    software and for accurate description of software and services.
56
+    After all, to protect their anonymity securely, computer users must be
57
+    able to identify the software they are using, so they can account
58
+    properly for its strengths and weaknesses.  Tor has become well-known as
59
+    a software package and associated network of onion-routing anonymizing
60
+    proxies, with online documentation, instructions for strengthening
61
+    anonymity protection, and warnings that even at this stage it remains
62
+    experimental software.  We work with developers to improve the software
63
+    and network and actively encourage researchers to document attacks to
64
+    help us strengthen its anonymity protection further.  We distribute the
65
+    software itself freely, but require correct attribution. </p>
66
+    
67
+    <a id="commercial"></a>
68
+    <h2>What if I produce non-open source, commercial products based on
69
+    Tor?</h2>
70
+    <p>Contact us, and let's talk.</p>
71
+    
72
+    <a id="licensee"></a>
73
+    <h2>Are there official licensees of the Tor trademarks?</h2>
74
+    <p>Yes.  A few open source, non-commercial projects are Tor trademark
75
+    licensees:</p>
76
+    <ul>
77
+    <li><a href="https://amnesia.boum.org/">The (Amnesic) Incognito Live
78
+    System</a></li>
79
+    <li><a href="http://portabletor.sourceforge.net/">Portable Tor</a></li>
80
+    <li><a href="http://torstatus.kgprog.com/">Kprog Tor Status</a></li>
81
+    <li><a href="<page projects/vidalia>">Vidalia</a></li>
82
+    <li><a href="http://www.anonymityanywhere.com/tork/">TorK</a></li>
83
+    </ul>
84
+  </div>
85
+  <!-- END MAINCOL -->
86
+  <div id = "sidecol">
87
+#include "side.wmi"
88
+#include "info.wmi"
89
+  </div>
90
+  <!-- END SIDECOL -->
91
+</div>
92
+<!-- END CONTENT -->
93
+#include <foot.wmi>  
... ...
@@ -0,0 +1,208 @@
1
+## translation metadata
2
+# Revision: $Revision: 22418 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Verifying Signatures" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/verifying-signatures>">Verifying Signatures</a>
10
+  </div>
11
+  <div id="maincol"> 
12
+    <h1>How to verify signatures for packages</h1>
13
+    <hr />
14
+    
15
+    <p>Each file on <a href="<page download/download>">our download page</a> is accompanied
16
+    by a file with the same name as the package and the extension
17
+    ".asc". These .asc files are GPG signatures. They allow you to verify
18
+    the file you've downloaded is exactly the one that we intended you to
19
+    get. For example, vidalia-bundle-0.2.1.25-0.2.7.exe is accompanied by
20
+    vidalia-bundle-0.2.1.25-0.2.7.exe.asc.</p>
21
+    
22
+    <p>Of course, you'll need to have our GPG keys in your keyring: if you don't
23
+    know the GPG key, you can't be sure that it was really us who signed it. The
24
+    signing keys we use are:</p>
25
+    <ul>
26
+    <li>Roger's (0x28988BF5) typically signs the source code file.</li>
27
+    <li>Nick's (0x165733EA, or its subkey 0x8D29319A).</li>
28
+    <li>Andrew's (0x31B0974B) typically signs packages for windows and mac.</li>
29
+    <li>Peter's (0x94C09C7F, or its subkey 0xAFA44BDD).</li>
30
+    <li>Matt's (0x5FA14861).</li>
31
+    <li>Jacob's (0xE012B42D).</li>
32
+    <li>Erinn's (0x63FEE659) and (0xF1F5C9B5) typically signs the linux packages.</li>
33
+    <li>Mike's (0xDDC6C0AD) signs the Torbutton xpi.</li>
34
+    </ul>
35
+    
36
+    <h3>Step Zero: Install GnuPG</h3>
37
+    <hr />
38
+    <p>You need to have GnuPG installed before you can verify
39
+    signatures.</p>
40
+    
41
+    <ul>
42
+    <li>Linux: see <a
43
+    href="http://www.gnupg.org/download/">http://www.gnupg.org/download/</a>
44
+    or install <i>gnupg</i> from the package management system.</li>
45
+    <li>Windows: see <a
46
+    href="http://www.gnupg.org/download/">http://www.gnupg.org/download/</a>. Look
47
+    for the "version compiled for MS-Windows" under "Binaries".</li>
48
+    <li>Mac: see <a
49
+    href="http://macgpg.sourceforge.net/">http://macgpg.sourceforge.net/</a>.</li>
50
+    </ul>
51
+    
52
+    <h3>Step One:  Import the keys</h3>
53
+    <hr />
54
+    <p>The next step is to import the key. This can be done directly from
55
+    GnuPG. Make sure you import the correct key. For example, if you
56
+    downloaded a Windows package, you will need to import Andrew's key.</p>
57
+    
58
+    <p><b>Windows:</b></p>
59
+    <p>GnuPG for Windows is a command line tool, and you will need to use
60
+    <i>cmd.exe</i>. Unless you edit your PATH environment variable, you will
61
+    need to tell Windows the full path to the GnuPG program. If you installed GnuPG
62
+    with the default values, the path should be something like this: <i>C:\Program
63
+    Files\Gnu\GnuPg\gpg.exe</i>.</p>
64
+    
65
+    <p>To import the key 0x28988BF5, start <i>cmd.exe</i> and type:</p>
66
+    
67
+    <pre>C:\Program Files\Gnu\GnuPg\gpg.exe --recv-keys 0x28988BF5</pre>
68
+    
69
+    <p><b>Mac and Linux</b></p>
70
+    <p>Whether you have a Mac or you run Linux, you will need to use the terminal
71
+    to run GnuPG. Mac users can find the terminal under "Applications". If you run
72
+    Linux and use Gnome, the terminal should be under "Applications menu" and
73
+    "Accessories". KDE users can find the terminal under "Menu" and "System".</p>
74
+    
75
+    <p>To import the key 0x28988BF5, start the terminal and type:</p>
76
+    
77
+    <pre>gpg --recv-keys 0x28988BF5</pre>
78
+    
79
+    <h3>Step Two:  Verify the fingerprints</h3>
80
+    <hr />
81
+    <p>After importing the key, you will want to verify that the fingerprint is correct.</p>
82
+    
83
+    <p><b>Windows:</b></p>
84
+    <pre>C:\Program Files\Gnu\GnuPg\gpg.exe --fingerprint (insert keyid here)</pre>
85
+    
86
+    <p><b>Mac and Linux</b></p>
87
+    <pre>gpg --fingerprint (insert keyid here)</pre>
88
+    
89
+    The fingerprints for the keys should be:
90
+    
91
+    <pre>
92
+    pub   1024D/28988BF5 2000-02-27
93
+          Key fingerprint = B117 2656 DFF9 83C3 042B  C699 EB5A 896A 2898 8BF5
94
+    uid                  Roger Dingledine &lt;arma@mit.edu&gt;
95
+    
96
+    pub   3072R/165733EA 2004-07-03
97
+          Key fingerprint = B35B F85B F194 89D0 4E28  C33C 2119 4EBB 1657 33EA
98
+    uid                  Nick Mathewson &lt;nickm@alum.mit.edu&gt;
99
+    uid                  Nick Mathewson &lt;nickm@wangafu.net&gt;
100
+    uid                  Nick Mathewson &lt;nickm@freehaven.net&gt;
101
+    
102
+    pub  1024D/31B0974B 2003-07-17
103
+         Key fingerprint = 0295 9AA7 190A B9E9 027E  0736 3B9D 093F 31B0 974B
104
+    uid                  Andrew Lewman (phobos) &lt;phobos@rootme.org&gt;
105
+    uid                  Andrew Lewman &lt;andrew@lewman.com&gt;
106
+    uid                  Andrew Lewman &lt;andrew@torproject.org&gt;
107
+    sub   4096g/B77F95F7 2003-07-17
108
+    
109
+    pub   1024D/94C09C7F 1999-11-10
110
+          Key fingerprint = 5B00 C96D 5D54 AEE1 206B  AF84 DE7A AF6E 94C0 9C7F
111
+    uid                  Peter Palfrader
112
+    uid                  Peter Palfrader &lt;peter@palfrader.org&gt;
113
+    uid                  Peter Palfrader &lt;weasel@debian.org&gt;
114
+    
115
+    pub   1024D/5FA14861 2005-08-17
116
+          Key fingerprint = 9467 294A 9985 3C9C 65CB  141D AF7E 0E43 5FA1 4861
117
+    uid                  Matt Edman &lt;edmanm@rpi.edu&gt;
118
+    uid                  Matt Edman &lt;Matt_Edman@baylor.edu&gt;
119
+    uid                  Matt Edman &lt;edmanm2@cs.rpi.edu&gt;
120
+    sub   4096g/EA654E59 2005-08-17
121
+    
122
+    pub   1024D/9D0FACE4 2008-03-11 [expires: 2010-10-07]
123
+          Key fingerprint = 12E4 04FF D3C9 31F9 3405  2D06 B884 1A91 9D0F ACE4
124
+    uid                  Jacob Appelbaum &lt;jacob@appelbaum.net&gt;
125
+    sub   4096R/F8D04B59 2010-03-11 [expires: 2010-10-07]
126
+    
127
+    pub   2048R/63FEE659 2003-10-16
128
+          Key fingerprint = 8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659
129
+    uid                  Erinn Clark &lt;erinn@torproject.org&gt;
130
+    uid                  Erinn Clark &lt;erinn@debian.org&gt;
131
+    uid                  Erinn Clark &lt;erinn@double-helix.org&gt;
132
+    sub   2048R/EB399FD7 2003-10-16
133
+    
134
+    pub   1024D/F1F5C9B5 2010-02-03
135
+          Key fingerprint = C2E3 4CFC 13C6 2BD9 2C75  79B5 6B8A AEB1 F1F5 C9B5
136
+    uid                  Erinn Clark &lt;erinn@torproject.org&gt;
137
+    sub   1024g/7828F26A 2010-02-03
138
+    
139
+    pub   1024D/DDC6C0AD 2006-07-26
140
+          Key fingerprint = BECD 90ED D1EE 8736 7980  ECF8 1B0C A30C DDC6 C0AD
141
+    uid                  Mike Perry &lt;mikeperry@fscked.org&gt;
142
+    uid                  Mike Perry &lt;mikepery@fscked.org&gt;
143
+    sub   4096g/AF0A91D7 2006-07-26
144
+    
145
+    </pre>
146
+    
147
+    <h3>Step Three:  Verify the downloaded package</h3>
148
+    <hr />
149
+    <p> To verify the signature of the package you downloaded, you will need
150
+    to download the ".asc" file as well.</p>
151
+    
152
+    <p>In the following examples, the user Alice downloads packages for
153
+    Windows, Mac OS X and Linux and also verifies the signature of each
154
+    package. All files are saved on the desktop.</p>
155
+    
156
+    <p><b>Windows:</b></p>
157
+    <pre>C:\Program Files\Gnu\GnuPg\gpg.exe --verify C:\Users\Alice\Desktop\vidalia-bundle-0.2.1.25-0.2.7.exe.asc C:\Users\Alice\Desktop\vidalia-bundle-0.2.1.25-0.2.7.exe</pre>
158
+    
159
+    <p><b>Mac:</b></p>
160
+    <pre>gpg --verify /Users/Alice/vidalia-bundle-0.2.1.25-0.2.7-i386.dmg.asc /Users/Alice/vidalia-bundle-0.2.1.25-0.2.7-i386.dmg</pre>
161
+    
162
+    <p><b>Linux</b></p>
163
+    <pre>gpg --verify /home/Alice/Desktop/tor-0.2.1.25.tar.gz.asc /home/Alice/Desktop/tor-0.2.1.25.tar.gz</pre>
164
+    
165
+    <p>After verifying, GnuPG will come back saying something like "Good
166
+    signature" or "BAD signature". The output should look something like
167
+    this:</p>
168
+    
169
+    <pre>
170
+    gpg: Signature made Tue 16 Mar 2010 05:55:17 AM CET using DSA key ID 28988BF5
171
+    gpg: Good signature from "Roger Dingledine &lt;arma@mit.edu&gt;"
172
+    gpg: WARNING: This key is not certified with a trusted signature!
173
+    gpg:          There is no indication that the signature belongs to the owner.
174
+    Primary key fingerprint: B117 2656 DFF9 83C3 042B  C699 EB5A 896A 2898 8BF5
175
+    </pre>
176
+    
177
+    <p>
178
+    Notice that there is a warning because you haven't assigned a trust
179
+    index to this person. This means that GnuPG verified that the key made
180
+    that signature, but it's up to you to decide if that key really belongs
181
+    to the developer. The best method is to meet the developer in person and
182
+    exchange key fingerprints.
183
+    </p>
184
+    
185
+    <p>For your reference, this is an example of a <em>BAD</em> verification. It
186
+    means that the signature and file contents do not match. In this case,
187
+    you should not trust the file contents:</p>
188
+    
189
+    <pre>
190
+    gpg: Signature made Tue 20 Apr 2010 12:22:32 PM CEST using DSA key ID 28988BF5
191
+    gpg: BAD signature from "Roger Dingledine &lt;arma@mit.edu&gt;"
192
+    </pre>
193
+    
194
+    <p>If you are running Tor on Debian you should read the instructions on
195
+    <a href="<page docs/debian>#packages">importing these keys to apt</a>.</p>
196
+    
197
+    <p>If you wish to learn more about GPG, see <a
198
+    href="http://www.gnupg.org/documentation/">http://www.gnupg.org/documentation/</a>.</p>
199
+  </div>
200
+  <!-- END MAINCOL -->
201
+  <div id = "sidecol">
202
+#include "side.wmi"
203
+#include "info.wmi"
204
+  </div>
205
+  <!-- END SIDECOL -->
206
+</div>
207
+<!-- END CONTENT -->
208
+#include <foot.wmi> 
... ...
@@ -0,0 +1,116 @@
1
+## translation metadata
2
+# Revision: $Revision: 22269 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Vidalia: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian-vidalia>">Vidalia Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="debian"></a> <a id="packages"></a>
14
+    <h2><a class="anchor" href="#debian">Vidalia en Ubuntu o Debian</a></h2>
15
+    <br />
16
+    
17
+    <p>
18
+    <b>No utilizar los paquetes en el universo de Ubuntu.</ b> Son Unmaintained
19
+    y fuera de fecha. Eso significa que se le falta estabilidad y parches de
20
+    seguridad.
21
+    </p>
22
+    
23
+    <p>
24
+    You'll need to set up our package repository before you can fetch
25
+    Vidalia. First, you need to figure out the name of your distribution. If
26
+    you're using Ubuntu 9.10 or 10.04, it's "karmic", while 9.04 is "jaunty",
27
+    8.10 is "intrepid", and 8.04 is "hardy". If you're using Debian Etch, it's
28
+    "etch", and Debian Lenny is "lenny". Then add this line to your
29
+    <tt>/etc/apt/sources.list</tt> file:<br />
30
+    <pre>
31
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
32
+    </pre>
33
+    en la que sustituir la palabra por encima de (etch, lenny, sid, kármica,
34
+    alegre, intrépido, fuerte) en lugar de &lt;DISTRIBUCIÓN&gt;
35
+    </p>
36
+    
37
+    <p>
38
+    Then add the gpg key used to sign the packages by running the following
39
+    commands at your command prompt:
40
+    <pre>
41
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
42
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
43
+    </pre>
44
+    Now refresh your sources and install Vidalia by running the following
45
+    commands at your command prompt:
46
+    <pre>
47
+    apt-get update
48
+    apt-get install vidalia 
49
+    </pre>
50
+    </p>
51
+    
52
+    <p>
53
+    Now Vidalia is installed and running. Move on to <a href="<page
54
+    docs/tor-doc-unix>#polipo">step two</a> of the "Vidalia on Linux/Unix"
55
+    instructions.
56
+    </p>
57
+    
58
+    <p style="font-size: small">
59
+    El nombre DNS <code>deb.torproject.org</code> es en realidad un conjunto de
60
+    servidores independientes en un petirrojo ronda de configuración de DNS. Si
61
+    por alguna razón no pueden acceder a él puede intentar utilizar el nombre de
62
+    uno de su parte en su lugar. Intentar
63
+    <code>deb-master.torproject.org</code>, <code>mirror.netcologne.de</code> o
64
+    <code>vidalia.mirror.youam.de</code>.
65
+    </p>
66
+    
67
+    <hr /> <a id="source"></a>
68
+    <h2><a class="anchor" href="#source">Edificio de la fuente</a></h2>
69
+    <br />
70
+    
71
+    <p>
72
+    Si desea construir su propia debs de la fuente, primero debe agregar una
73
+    línea adecuada <tt>deb-src</ tt> para <tt>sources.list</tt>.
74
+    <pre>
75
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUCIÓN&gt; main
76
+    </pre>
77
+    También es necesario instalar los paquetes necesarios para construir su
78
+    propia Debs y los paquetes necesarios para construir Vidalia:
79
+    <pre>
80
+    apt-get install build-essential fakeroot devscripts qt4-dev-tools qt4-designer libqt4-dev g++ cmake
81
+    apt-get build-dep vidalia
82
+    </pre>
83
+    Entonces usted puede construir en Vidalia ~/debian-packages:
84
+    <pre>
85
+    mkdir ~/debian-packages; cd ~/debian-packages
86
+    apt-get source vidalia
87
+    cd vidalia-*
88
+    debuild -rfakeroot -uc -us
89
+    cd ..
90
+    </pre>
91
+    Ahora usted puede instalar el nuevo paquete:
92
+    <pre>
93
+    sudo dpkg -i vidalia_*.deb
94
+    </pre>
95
+    </p>
96
+    
97
+    <p>
98
+    Now Vidalia is installed and running. Move on to <a href="<page
99
+    docs/tor-doc-unix>#polipo">step two</a> of the "Vidalia on Linux/Unix"
100
+    instructions.
101
+    </p>
102
+    
103
+    <hr />
104
+    
105
+    <p>Si tiene sugerencias para mejorar este documento, por favor <a href="<page
106
+    about/contact>">envíanoslas</a>. Gracias!</p>
107
+  </div>
108
+  <!-- END MAINCOL -->
109
+  <div id = "sidecol">
110
+#include "side.wmi"
111
+#include "info.wmi"
112
+  </div>
113
+  <!-- END SIDECOL -->
114
+</div>
115
+<!-- END CONTENT -->
116
+#include <foot.wmi>   
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,210 @@
1
+## translation metadata
2
+# Revision: $Revision: 22305 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Mac OS X Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-osx>">Mac OS X Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Ejecución de la cliente<a href="<page index>">Tor</a> en Mac OS X</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>Tenga en cuenta que estas son las instrucciones de instalación para
18
+    ejecutar un cliente Tor en Mac OS X. Si quiere retransmitir tráfico para
19
+    otros y ayudar a crecer la red (por favor), lee la guía <a href="<page
20
+    docs/tor-doc-relay>">Configurar un repetidor</a>.</b>
21
+    </p>
22
+    
23
+    <hr />
24
+    <a id="installing"></a>
25
+    <h2><a class="anchor" href="#installing">Paso Uno: Descargar e Instalar Tor</a></h2>
26
+    <br />
27
+    
28
+    <p>
29
+    The install for Macintosh OS X bundles <a href="<page index>">Tor</a>, <a
30
+    href="<page projects/vidalia>">Vidalia</a> (a graphical interface for Tor), <a
31
+    href="<page projects/torbutton>">Torbutton</a>, and <a
32
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (a web
33
+    proxy)  into one package, with the four applications pre-configured to work
34
+    together.  Download either the <a
35
+    href="../<package-osx-bundle-stable>">stable</a> or the <a
36
+    href="../<package-osx-bundle-alpha>">experimental</a> version of the OS X
37
+    bundle for Intel, or look for more options on the <a href="<page
38
+    download/download>">download page</a>.
39
+    </p>
40
+    
41
+    <p>Una vez que haya descargado el dmg, haga doble clic y se deja montar. Busque
42
+    el paquete Vidalia abierto en el Finder. Es fácil de instalar el paquete,
43
+    simplemente arrastre y suelte el icono de la cebolla Vidalia a la carpeta
44
+    Aplicaciones. Opcionalmente, haga doble clic en "Instalar Torbutton" script
45
+    y permitir que se instale Torbutton en Firefox. También puede obtener
46
+    Torbutton de Mozilla Add-ons al buscar "Torbutton".</p>
47
+    
48
+    <p>Cuando haya terminado la instalación, puede arrancar Vidalia seleccionando
49
+    su icono de la carpeta Aplicaciones. Una cebolla oscura con una X roja en su
50
+    Dock significa que Tor no está actualmente en ejecución. Puede iniciar Tor
51
+    seleccionando Start desde el menu "Tor" en la parte superior de la pantalla.
52
+    </p>
53
+    
54
+    <p>Cuando Tor se está ejecutando, el icono de Vidalia se verá como la
55
+    siguiente:
56
+    </p>
57
+    
58
+    <p><img alt="vidalia running tor"
59
+    src="../img/screenshot-osx-vidalia.png"
60
+    border="1"/></p>
61
+    
62
+    <p>Polipo se instala como parte del paquete instalador unificado de Tor. Una
63
+    vez instalado, se iniciará automáticamente cuando se reinicie el
64
+    equipo. Usted no necesita configurar Polipo para usar Tor - una
65
+    configuración a medida Polipo para Tor se instala como parte del paquete de
66
+    instalación.
67
+    </p>
68
+    
69
+    <hr />
70
+    <a id="using"></a>
71
+    <h2><a class="anchor" href="#using">Paso Dos: Configurar tus aplicaciones para
72
+    Tor</a></h2>
73
+    <br />
74
+    
75
+    <p>Después de la instalación, necesita configurar sus aplicaciones para
76
+    usarlos. El primer paso es configurar la navegación web.</p>
77
+    
78
+    <p>Usted debe usar Tor con Firefox y Torbutton, para la mejor
79
+    seguridad. Torbutton fue instalado para usted. Haga clic en el botón rojo
80
+    "Tor Disabled" para activar Tor, y eso es todo: </p>
81
+    
82
+    <p><img alt="Torbutton plugin for Firefox"
83
+    src="../img/screenshot-torbutton.png"
84
+    border="1"/></p>
85
+    
86
+    <p>
87
+    Si planea ejecutar Firefox en un ordenador distinto del de Tor, vea la <a
88
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">entrada
89
+    de la FAQ para ejecutar Tor en un ordenador distinto</a>.
90
+    </p>
91
+    
92
+    <p>Para usar con TOR otras aplicaciones que soportan proxies HTTP, simplemente
93
+    dirigirlas a Polipo (es decir, localhost, puerto 8118). Para usar SOCKS
94
+    directamente (para mensajería instantanea, Jabber, IRC, etc), puede apuntar
95
+    su aplicación directamente a Tor (localhost, puerto 9050), pero vea <a
96
+    href="https://wiki.torproject.org
97
+    noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">esta FAQ</a> por qué esto puede
98
+    ser peligroso. Para aplicaciones que no soportan ni SOCKS ni HTTP, mire <a
99
+    href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a> o <a
100
+    href="http://www.dest-unreach.org/socat/">socat</a>.</p>
101
+    
102
+    <p>Para obtener información sobre cómo usar con TOR otras aplicaciones,
103
+    compruebe el <a
104
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
105
+    HOWTO</a>.
106
+    </p>
107
+    
108
+    <hr />
109
+    <a id="verify"></a>
110
+    <h2><a class="anchor" href="#verify">Paso Tres: Asegurarse de que funciona </a></h2>
111
+    <br />
112
+    
113
+    <p>
114
+    Después, deberías intentar usar tu explorador con Tor y asegurarse de que su
115
+    dirección IP está siendo anonimizada. Haga clic en <a
116
+    href="https://check.torproject.org/">el detector de Tor</a> y compruebe si
117
+    cree que usas Tor o no. (Si el sitio está caído, vea <a
118
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">esta
119
+    FAQ</ a> para más sugerencias sobre cómo comprobar su Tor.)
120
+    </p>
121
+    
122
+    <p>Si tiene un cortafuegos personal que limita la capacidad de su ordenador
123
+    para conectarse a sí mismo, asegúrate que permite conexiones de aplicaciones
124
+    locales al puerto local 8118 y al puerto 9050. Si tu cortafuegos bloquea
125
+    conexiones salientes, abra un agujero para que pueda conectarse al menos a
126
+    los puertos TCP 80 y 443, y luego vea <a
127
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">esta
128
+    FAQ</a>.
129
+    </p>
130
+    
131
+    <p>Si aún no funciona, mire <a
132
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">esta
133
+    FAQ</a> para seguir consejos.</p>
134
+    
135
+    <p>
136
+    Una vez que funcione, aprender más acerca de <a href="<page
137
+    download/download>#Warning">lo que hace Tor y no ofrece</a>.
138
+    </p>
139
+    
140
+    <hr />
141
+    <a id="server"></a> <a id="relay"></a>
142
+    <h2><a class="anchor" href="#relay">Paso Cuatro: Configurarlo como repetidor</a></h2>
143
+    <br />
144
+    
145
+    <p>La red Tor se apoya en voluntarios que donen ancho de banda. Cuanta más
146
+    gente ejecute repetidores, más rápida será la red Tor ser. Si tiene al menos
147
+    20 kilobytes / s bidireccional, por favor ayuda a Tor configurando su Tor
148
+    para que sea repetidor también. Tenemos muchas características que hacen los
149
+    repetidores Tor fáciles y convenientes, incluyendo limitación del ancho de
150
+    banda, políticas de salida que pueden limitar su exposición a quejas de
151
+    abuso, y soporte para direcciones IP dinámicas.</p>
152
+    
153
+    <p>Tener repetidores en muchos sitios diferentes de Internet es lo que hace a
154
+    los usuarios de Tor seguros. <a
155
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">También
156
+    puede obtener más anonimato</a>, haciendo que sitios remotos no puedan saber
157
+    si las conexiones se originaron en su ordenador o fueron reenviadas desde
158
+    otros.</p>
159
+    
160
+    <p>Lea más en nuestro guía<a href="<page docs/tor-doc-relay>"> Configurar un
161
+    repetidor</a>.</p>
162
+    
163
+    <hr />
164
+    <a id="uninstall"></a>
165
+    <h2><a class="anchor" href="#uninstall">Cómo desinstalar Tor y Privoxy</a></h2>
166
+    <br />
167
+    
168
+    <p>Hay dos maneras para desinstalar el paquete de su computadora, utilizando
169
+    Finder o una línea de comandos o terminal basado en programa de
170
+    desinstalación. Si quiere eliminar Tor en OSX, he aquí cómo:</p>
171
+    
172
+    <p>Cambiar la configuración del proxy de la aplicación de vuelta a sus valores
173
+    originales. Si sólo desea dejar de usar Tor, puede detenerse en este punto.</p>
174
+    
175
+    <p>Si quiere eliminar Tor completamente, y su cuenta tiene privilegios de
176
+    administrador, proceda como sigue:</p>
177
+    
178
+    <ol>
179
+    <li>Abra Finder y haga clic en Aplicaciones.</li>
180
+    <li>Arrastre/Aplicaciones/Vidalia a la Papelera.</li>
181
+    <li>Quitar/Library/Torbutton de su sistema.</li>
182
+    <li>En su directorio principal, vaya a la Biblioteca, quitar el directorio de
183
+    Vidalia</li>
184
+    </ol>
185
+    
186
+    <p>Tor, Vidalia, y Polipo están ahora totalmente eliminados de su sistema.</p>
187
+    
188
+    <p>Si usted está familiarizado con la línea de comandos o terminal, puede
189
+    quitar manualmente la siguiente:</p>
190
+    <ul>
191
+    <li>/Applications/Vidalia.app/</li>
192
+    <li>/Library/Torbutton/</li>
193
+    <li>~/Library/Vidalia</li>
194
+    <li>~/.tor</li>
195
+    </ul>
196
+    
197
+    <hr />
198
+    
199
+    <p>Si tiene sugerencias para mejorar este documento, por favor<a href="<page
200
+    about/contact>">envíanoslas</a>. Gracias!</p>
201
+  </div>
202
+  <!-- END MAINCOL -->
203
+  <div id = "sidecol">
204
+#include "side.wmi"
205
+#include "info.wmi"
206
+  </div>
207
+  <!-- END SIDECOL -->
208
+</div>
209
+<!-- END CONTENT -->
210
+#include <foot.wmi>   
... ...
@@ -0,0 +1,313 @@
1
+## translation metadata
2
+# Revision: $Revision: 22144 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Relay Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-relay>">Configure Tor Relay</a>
11
+  </div> 
12
+  <div id="maincol">   
13
+    <h1>Configurar un servidor Tor</h1>
14
+    
15
+    
16
+    <!-- BEGIN SIDEBAR -->
17
+    <div class="sidebar-left">
18
+    <h3>Pasos de configuración</h3>
19
+    <ol>
20
+    <li><a href="<page docs/tor-doc-relay>#install">Descarga e instalación</a></li>
21
+    <li><a href="<page docs/tor-doc-relay>#setup">Configuración</a></li>
22
+    <li><a href="<page docs/tor-doc-relay>#check">Check & Confirmar</a></li>
23
+    <li><a href="<page docs/tor-doc-relay>#after">Pasos finales</a></li>
24
+    </ol>
25
+    </div>
26
+    
27
+    
28
+    <!-- END SIDEBAR -->
29
+    <hr />
30
+    
31
+    <p>
32
+    La red Tor se apoya en voluntarios que donen ancho de banda. Cuanta más
33
+    gente ejecute repetidores, más rápida será la red Tor ser. Si tiene al menos
34
+    20 kilobytes / s bidireccional, por favor ayuda a Tor configurando su Tor
35
+    para que sea repetidor también. Tenemos muchas características que hacen los
36
+    repetidores Tor fáciles y convenientes, incluyendo la <a href="<page docs/faq>
37
+    RelayFlexible">limitación del ancho de banda, políticas de salida para que
38
+    pueda limitar su exposición a quejas de abuso, y soporte para direcciones IP
39
+    dinámicas</a>.
40
+    </p>
41
+    
42
+    <p>Se puede ejecutar un repetidor Tor en <a
43
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayOS">casi
44
+    cualquier</a>sistema operativo. Los repetidores Tor funcionan mejor en
45
+    Linux, OS X Tiger o posterior, 5.x + FreeBSD, NetBSD 5.x +, y Windows Server
46
+    2003 o posterior.
47
+    </p>
48
+    
49
+    <hr /> <a id="zero"></a> <a id="install"></a>
50
+    <h2><a class="anchor" href="#install">Paso Uno: Descargar e Instalar Tor</a></h2>
51
+    <br />
52
+    
53
+    <p>Antes de empezar, es necesario asegurarse de que Tor está activo y
54
+    ejecutándose.
55
+    </p>
56
+    
57
+    <p>Visite nuestro <a href="<page download/easy-download>">página de descarga</a> e
58
+    instalar el "paquete de instalación" para su sistema operativo.
59
+    </p>
60
+    
61
+    <p>Si es oportuno, también podría utilizar como un cliente por un tiempo para
62
+    asegurarse de que realmente funciona.</p>
63
+    
64
+    <hr /> <a id="setup"></a>
65
+    <h2><a class="anchor" href="#setup">Paso Dos: Configurarlo como repetidor</a></h2>
66
+    <br />
67
+    <ol>
68
+    <li>Verifique que su reloj y la zona horaria están configurados
69
+    correctamente. Si es posible, sincronice su reloj con <a público
70
+    href="http://en.wikipedia.org/wiki/Network_Time_Protocol">servidores de
71
+    tiempo</a>.
72
+    </li>
73
+    
74
+    <li><strong>Configuración de Tor con la interfaz gráfica de Vidalia</strong>:
75
+    <ol>
76
+    
77
+    <li>
78
+    	<dt>Haga clic derecho sobre el icono de Vidalia en la barra de tareas. Elija
79
+    <tt>Panel de control</tt>.</dt>
80
+    	<dd><img alt="vidalia right click menu"
81
+    src="../img/screenshot-win32-vidalia.png"></dd>
82
+    </li>
83
+    
84
+    <li>Haga clic en <tt>Configuración de la retransmisión</tt>.</li>
85
+    
86
+    <li>
87
+    	<dt>Elija <tt>tráfico para la red Tor</tt> si desea que sea un repetidor público
88
+    (recomendado), o elegir 		<tt> Ayuda censurado llegar a los usuarios de la
89
+    red Tor</tt> si desea una <a href="<page docs/faq>#RelayOrBridge">puente</a> para
90
+    los usuarios en los países que censuran la Internet.</dt>
91
+    <dd><img alt="vidalia basic settings"
92
+    src="../img/screenshot-win32-configure-relay-1.png"></dd>
93
+    </li>
94
+    
95
+    <li>Introduzca un alias para su servidor, y escriba la información de contacto
96
+    en caso de que necesitemos comunicarnos con usted acerca de los problemas.</li>
97
+    
98
+    <li>Deja <tt>Intenta configurar automáticamente el reenvío de
99
+    puertos</tt>clic. Empuje el <tt>Test</tt> botón para ver si funciona. Si
100
+    funciona, estupendo. Si no, véase el número 3.</li>
101
+    
102
+    <li><dt>Elija el <tt>límites de ancho de banda</tt> ficha. Seleccione la cantidad de
103
+    ancho de banda que desea proporcionar a los usuarios de Tor como tú.</dt>
104
+    <dd><img alt="vidalia bandwidth limits"
105
+    src="../img/screenshot-win32-configure-relay-2.png"></dd>
106
+    </li> 
107
+    
108
+    <li><dt>Elija el <tt>políticas de salida</tt> ficha. Si desea permitir que otros
109
+    utilicen su servidor para estos servicios, no cambia nada. Elimina la marca
110
+    de los servicios que usted no quiere permitir a la gente a la <a href="<page
111
+    docs/faq>#ExitPolicies"> alcance de su servidor </a>. Si usted desea ser un
112
+    no-relé de salida, elimina la marca de todos los servicios.</dt>
113
+    <dd><img alt="vidalia exit policies"
114
+    src="../img/screenshot-win32-configure-relay-3.png"></dd>
115
+    </li>
116
+    
117
+    <li>Haga clic en el <tt>Ok</tt> botón. Vea el Paso Tres por debajo de la
118
+    confirmación de que el relé está funcionando correctamente.</li>
119
+    </ol>
120
+    
121
+    <br /> <strong>Manual de configuración</strong>:
122
+    <ul>
123
+    <li>Modificar la parte inferior de <a
124
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">su
125
+    fichero torrc</a>. Si usted desea ser un relé público (recomendado),
126
+    asegúrese de definir ORPort y <a href="<page docs/faq>#ExitPolicies">ver
127
+    ExitPolicy</a>, de lo contrario, si usted desea ser un <a href="<page
128
+    docs/faq>#RelayOrBridge">puente</a> para los usuarios en los países que censuran
129
+    la Internet, sólo tiene que utilizar <a href="<page
130
+    docs/bridges>#RunningABridge">estas líneas</a>.
131
+    </li>
132
+    
133
+    </ul></li>
134
+    
135
+    <li>Si usted está usando un cortafuegos, abra un agujero en el cortafuegos para
136
+    que las conexiones entrantes puedan alcanzar los puertos que ha configurado
137
+    (ORPort, más DirPort si lo ha activado). Si usted tiene un firewall de
138
+    hardware (cuadro de Linksys, cablemodem, etc) que te gustaría <a
139
+    href="http://portforward.com/">portforward.com</a>. También, asegúrese de
140
+    que todos los <em>saliente</em> demasiadas conexiones, por lo que su
141
+    repetidor pueda llegar a los otros repetidores Tor.
142
+    </li>
143
+    
144
+    <li>Rearranque su repetidor. Si <a
145
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">log
146
+    aparecen advertencias</a>, la dirección de ellos.
147
+    </li>
148
+    
149
+    <li>Suscribirse a la <a
150
+    href="http://archives.seul.org/or/announce/">or-announce</a> lista de
151
+    correo. Es muy poco tráfico, y le mantendrá informado de nuevas versiones
152
+    estables. También puede considerar subscribirse a la <a href="<page
153
+    docs/documentation>#MailingLists">el mayor volumen de las listas de Tor</a>
154
+    también.
155
+    </li>
156
+    
157
+    </ol>
158
+    
159
+    <hr /> <a id="check"></a>
160
+    <h2><a class="anchor" href="#check">Paso Tres: Asegurarse de que funciona</a></h2>
161
+    <br />
162
+    
163
+    <p>En cuanto su repetidor consiga conectarse a la red, intentará determinar si
164
+    los puertos que configuró son accesibles desde el exterior. Este paso suele
165
+    ser rápido, pero puede tardar hasta 20 minutos. Busque un <a
166
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">registro
167
+    de entrada</a> como <tt>Autoevaluación indica su ORPort es accesible desde
168
+    el exterior. Excelente.</tt> Si no ve este mensaje, significa que su
169
+    servidor no es accesible desde el exterior &mdash; debería re-revisar sus
170
+    cortafuegos, comprobar que esté comprobando la IP y el puerto que usted crea
171
+    que debería estar comprobando, etc.
172
+    </p>
173
+    
174
+    <p>When it decides that it's reachable, it will upload a "server descriptor" to
175
+    the directories, to let clients know what address, ports, keys, etc your
176
+    relay is using. You can <a
177
+    href="http://194.109.206.212/tor/status-vote/current/consensus">load one of
178
+    the network statuses manually</a> and look through it to find the nickname
179
+    you configured, to make sure it's there. You may need to wait up to one hour
180
+    to give enough time for it to make a fresh directory.</p>
181
+    
182
+    <hr /> <a id="after"></a>
183
+    <h2><a class="anchor" href="#after">Cuarto paso: Una vez que se está
184
+    trabajando</a></h2>
185
+    <br />
186
+    
187
+    <p>
188
+    Nosotros recomendamos los siguientes pasos, así:
189
+    </p>
190
+    
191
+    <p>
192
+    6. Leer <a
193
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/OperationalSecurity">sobre
194
+    seguridad operacional</a> para obtener ideas de cómo aumentar la seguridad
195
+    de su repetidor.
196
+    </p>
197
+    
198
+    <p>
199
+    7. Si quiere ejecutar más de un repetidor estupendo, pero por favor active
200
+    <a
201
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#MultipleRelays">la
202
+    opción MyFamily</a> en todos sus repetidores archivos de configuración.
203
+    </p>
204
+    
205
+    <p>
206
+    8. Decidir acerca de la limitación de velocidad. El módem de cable, DSL, y
207
+    otros usuarios que tienen ancho de banda asimétrico (por ejemplo, más que de
208
+    subida) deberían limitar la velocidad a su ancho de banda más lento, para
209
+    evitar la congestión. Ver la <a
210
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">limitación
211
+    de velocidad de la FAQ</a> para más detalles.
212
+    </p>
213
+    
214
+    <p>
215
+    9. Copias de seguridad de la clave privada de su servidor Tor (almacenada en
216
+    "keys/secret_id_key" en su DataDirectory). Esto es "de su repetidor de
217
+    identidad", y que necesita para mantener a salvo para que nadie pueda leer
218
+    el tráfico que pasa a través de su repetidor. Este es el fichero crítico a
219
+    guardar si necesita <a
220
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#UpgradeRelay">mover
221
+    o restaurar su servidor Tor</a> si algo va mal.
222
+    </p>
223
+    
224
+    <p>
225
+    
226
+    10. Si controla los servidores de nombres para su dominio, considere llamar
227
+    a su host 'anonymous-relay', 'proxy' o 'tor-proxy', para que cuando otra
228
+    gente vea la dirección en sus web logs, entiendan más rápido lo que está
229
+    pasando. Adición de la <a
230
+    href="<gitblob>contrib/tor-salida-notice.html">aviso de salida de Tor</a> en
231
+    un vhost para este nombre puede ir un largo camino para disuadir a las
232
+    denuncias de abuso a usted y su proveedor de Internet si usted está
233
+    ejecutando un nodo de salida.
234
+    
235
+    </p>
236
+    
237
+    <p>
238
+    11. Si su equipo no está ejecutando un servidor web, por favor considere
239
+    cambiar su ORPort a 443 y su DirPort el 80. Muchos usuarios de Tor están
240
+    atrapados detrás de cortafuegos que sólo les permiten ver la web, y este
241
+    cambio les permitirá acceder a su servidor Tor. Los repetidores en Win32
242
+    pueden simplemente cambiar su ORPort y DirPort directamente en su torrc y
243
+    reiniciar Tor. Repetidores OS X y Unix servers no pueden escuchar
244
+    directamente en esos puertos (ya que no se ejecutan como root), por lo que
245
+    tendrán que establecer algún tipo de <a
246
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients">reenvío
247
+    de puertos </a> para que las conexiones puedan acceder a su servidor Tor. Si
248
+    usted está usando los puertos 80 y 443 pero todavía quiere ayudar, otros
249
+    puertos útiles son el 22, 110 y 143.
250
+    </p>
251
+    
252
+    <p>
253
+    12. Si su servidor Tor da otros servicios en la misma dirección IP - como un
254
+    servidor web público - asegúrese de que las conexiones al servidor web se
255
+    permiten desde el host local también. Necesitará permitir estas conexiones
256
+    porque los clientes Tor detectarán que su repetidor Tor es la <a
257
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">manera
258
+    más segura de llegar a ese servidor web</a>, y siempre construirán un
259
+    circuito que termine en su relevo. Si usted no quiere permitir las
260
+    conexiones, debe rechazarlas explícitamente en su política de salida.
261
+    </p>
262
+    
263
+    <p>
264
+    13. (Sólo Unix). Cree un usuario separado para ejecutar el repetidor. Si
265
+    instaló el paquete OS X o el deb o el rpm, ya está hecho. De lo contrario,
266
+    usted puede hacerlo a mano. (El repetidor Tor no necesita ejecutarse como
267
+    root, así que es buena práctica no ejecutarlo como root. Ejecuta como el
268
+    usuario 'tor' evita problemas con identd y otros servicios que detectan el
269
+    nombre de usuario. Si usted es el paranoico tipo, no dude en <a
270
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorInChroot">poner
271
+    Tor en una cárcel chroot</a>.)
272
+    </p>
273
+    
274
+    <p>
275
+    14. (Sólo Unix.) Su sistema operativo probablemente limita el número de
276
+    descriptores de fichero abiertos por proceso a 1024 (o incluso menos). Si
277
+    planea ejecutar un nodo de salida rápido, probablemente no sea
278
+    suficiente. En Linux, debería añadir una línea como "toruser hard nofile
279
+    8192" a su archivo / etc / security / limits.conf (donde toruser es el
280
+    usuario que ejecuta el proceso Tor), y reiniciar Tor si se instaló como
281
+    paquete (o cerrar la sesión y vuelva a entrar si lo ejecuta directamente).
282
+    </p>
283
+    
284
+    <p>
285
+    15. Si instaló Tor usando algún paquete o instalador, probablemente ejecute
286
+    Tor automáticamente al arrancar. Pero si lo instaló desde las fuentes, puede
287
+    encontrar los scripts de arranque en contrib/tor.sh o contrib/torctl útiles.
288
+    </p>
289
+    
290
+    <p>
291
+    Cuando cambie su configuración Tor, recuerde verificar que su repetidor
292
+    todavía funciona correctamente tras el cambio. Asegúrese de configurar su
293
+    línea "ContactInfo" en el torrc para que podamos contactar con usted si
294
+    necesita actualizarse o algo va mal. Si tiene problemas o preguntas,
295
+    consulte la <a href="<page docs/documentation>#Support">Support</a> o <a
296
+    href="<page about/contact>">contacto</a> en el tor-ops lista. Gracias por ayudar a
297
+    hacer crecer la red Tor!
298
+    </p>
299
+    
300
+    <hr />
301
+    
302
+    <p>Si tiene sugerencias para mejorar este documento, por favor <a href="<page
303
+    about/contact>">envíanoslas</a>. Gracias!</p>
304
+  </div>
305
+  <!-- END MAINCOL -->
306
+  <div id = "sidecol">
307
+#include "side.wmi"
308
+#include "info.wmi"
309
+  </div>
310
+  <!-- END SIDECOL -->
311
+</div>
312
+<!-- END CONTENT -->
313
+#include <foot.wmi>   
... ...
@@ -0,0 +1,197 @@
1
+    <h1>Ejecutar el cliente <a href="<page index>">Tor</a> en Linux/BSD/Unix</h1>
2
+    <br />
3
+    
4
+    <p><b>N&oacute;tese que estas son las instrucciones de instalaci&oacute;n para e
5
+    jecutar un cliente Tor.
6
+    Si quieres gestionar tr&aacute;fico para otros y ayudar a crecer la red Tor,
7
+     (h&aacute;zlo por favor), lee la gu&iacute;a
8
+    <a href="<page docs/tor-doc-relay>">Configurar un repetidor</a>
9
+    </b>
10
+    </p>
11
+    
12
+    <hr />
13
+    <a id="installing"></a>
14
+    <h2><a class="anchor" href="#installing">Paso Uno: Descarga e Instala Tor</a></h2>
15
+    <br />
16
+    
17
+    <p>
18
+    La última versión de Tor se encuentra en la página de <a
19
+    href="<page download/download>">descarga</a>. También tenemos paquetes para Debian,
20
+    Red Hat, Gentoo, *BSD, etc allí.
21
+    </p>
22
+    
23
+    <p>Si vas a compilar desde las fuentes, primero instala <a
24
+    href="http://www.monkey.org/~provos/libevent/">libevent</a>, y
25
+    asegúrate de tener openssl y zlib (incluyendo los paquetes -devel si existen).
26
+    Entonces ejecuta:<br />
27
+    <tt>tar xzf tor-<version-stable>.tar.gz; cd tor-<version-stable><br />
28
+    ./configure &amp;&amp; make</tt><br />
29
+    Ahora se puede ejecutar tor como <tt>src/or/tor</tt>, o puedes ejecutar <tt>make install</tt>
30
+    (como root en caso necesario) para instalarlo en /usr/local/, tras lo cual se puede
31
+    arrancar simplemente ejecutando <tt>tor</tt>.
32
+    </p>
33
+    
34
+    <p>Tor viene configurado como cliente por defecto. Usa un fichero de configuración
35
+    integrado, y la mayoría de la gente no nesitará cambiar ningún parámetro. Tor está ya
36
+    instalado.
37
+    </p>
38
+    
39
+    <hr />
40
+    <a id="privoxy"></a>
41
+    <h2><a class="anchor" href="#privoxy">Paso Dos: Instalar Privoxy para Navegar por la Web</a></h2>
42
+    <br />
43
+    
44
+    <p>Tras instalar Tor, necesita configurar sus aplicaciones para usarlo.
45
+    </p>
46
+    
47
+    <p>
48
+    El primer paso es configurar la navegación web. Empiece instalando <a
49
+    href="http://www.privoxy.org/">Privoxy</a>: haga click en 'recent releases'
50
+    y elija su paquete favorito o instale desde las fuentes. Privoxy es un
51
+    proxy web que hace filtrado y que se integra bien con Tor.
52
+    </p>
53
+    
54
+    <p>Una vez que haya instalado Privoxy (o bien desde paquete o desde fuentes),
55
+    <b>necesitará configurar Privoxy para que use Tor</b>. Puede que <a
56
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">esta 
57
+    muestra de configuración de Privoxy</a> le sea útil. En caso contrario, debería
58
+    configurar Privoxy a mano, usando las indicaciones que siguen.
59
+    </p>
60
+     	 
61
+    <p>
62
+    Abra el fichero "config" de Privoxy (busque en /etc/privoxy/ o /usr/local/etc/)
63
+    y añada la línea <br>
64
+    <tt>forward-socks4a / 127.0.0.1:9050 .</tt><br>
65
+    al principio del fichero de configuración. No se olvide de añadir el punto al final.
66
+    </p>
67
+    
68
+    <p>Privoxy mantiene un fichero de log de todo lo que pasa a su través. Para
69
+    evitar esto tendrá que comentar tres líneas insertando un 
70
+    \# antes de la línea. Las tres líneas son:<br>
71
+    <tt>logfile logfile</tt><br>
72
+    y la línea <br>
73
+    <tt>jarfile jarfile</tt><br>
74
+    y (en algunos sistemas) la línea <br>
75
+    <tt>debug 1  # show each GET/POST/CONNECT request</tt><br>
76
+    </p>
77
+    
78
+    <p>Dependiendo de qué fichero de configuración por defecto tenga para Privoxy,
79
+    puede que también tenga que desactivar <tt>enable-remote-toggle</tt>,
80
+    <tt>enable-remote-http-toggle</tt>, y <tt>enable-edit-actions</tt>.
81
+    </p>
82
+    
83
+    <p>Tendrá que reiniciar Privoxy para que los cambios tengan efecto.</p>
84
+    
85
+    <hr />
86
+    <a id="using"></a>
87
+    <h2><a class="anchor" href="#using">Paso Tres: Configurar tus aplicaciones para que usen Tor</a></h2>
88
+    <br />
89
+    
90
+    <p>Tras instalar Tor y Privoxy, debes configurar tus aplicaciones para usarlos.
91
+    El primer paso es configurar tu navegador.</p>
92
+    
93
+    <p>Si usa Firefox (lo recomendamos), simplemente instale el <a
94
+    href="https://addons.mozilla.org/firefox/2275/">plugin Torbutton
95
+    </a>, reinicie Firefox, y eso es todo:
96
+    </p>
97
+    
98
+    <img alt="Torbutton plugin for Firefox"
99
+    src="../img/screenshot-torbutton.png"
100
+    border="1">
101
+    
102
+    <br />
103
+    
104
+    <p>
105
+    (<a href="https://torbutton.torproject.org/">Aprenda más sobre
106
+    Torbutton aquí</a>.
107
+    Si planea usar Firefox en un ordenador distinto del de Tor, vea la <a
108
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">
109
+    entrada en la FAQ para ejecutar Tor en un ordenador distinto</a>. Si necesita usar 
110
+    un navegador distinto de Firefox, tendrá que <a href="<page
111
+    docs/tor-doc-web>">configurar sus opciones de proxies usted mismo.</a>.)
112
+    </p>
113
+    
114
+    <p>Usar Privoxy es <strong>necesario</strong> porque
115
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">
116
+    los exploradores fallan al hacer peticiones DNS cuando usan un proxy SOCKS directamente</a>,
117
+    lo cual es malo para el anonimato. Privoxy también elimina ciertas cabeceras
118
+    peligrosas de tus peticiones web, y bloquea inc&oacute;modos sitios como Doubleclick.</p>
119
+    
120
+    <p>Para usar con TOR otras aplicaciones que soportan proxies HTTP, simplemente
121
+    dirigirlas a Privoxy (localhost, puerto 8118). Para usar SOCKS directamente (para
122
+    mensajer&iacute;a instantanea, Jabber, IRC, etc.) puedes dirigir tu aplicaci&oacute;n directamente
123
+    a Tor (localhost, puerto 9050), pero visita <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">esta FAQ</a>
124
+    donde se explica por qu&eacute; esto puede ser peligroso. Para aplicaciones que no soportan ni SOCKS ni HTTP,
125
+    visitar <a
126
+    href="http://tsocks.sourceforge.net/">tsocks</a> o <a
127
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>.
128
+    </p>
129
+    
130
+    <p>Para m&aacute;s informaci&oacute;n sobre como "TOR"ificar otras aplicaciones
131
+    visitar <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
132
+    HOWTO</a>.
133
+    </p>
134
+    
135
+    <hr />
136
+    <a id="verify"></a>
137
+    <h2><a class="anchor" href="#verify">Paso Cuatro: Asegurarse de que funciona</a></h2>
138
+    <br />
139
+    
140
+    <p>Despu&eacute;s, deber&iacute;as intentar usar tu explorador con Tor y asegurarte que tu dirección
141
+    IP esta siendo anonimizada.
142
+    Visite <a href="https://check.torproject.org/">el detector de Tor</a>
143
+    y compruebe si cree que usa Tor o no.
144
+    #<a href="http://ipchicken.com/">this site</a>
145
+    #to see what IP address it thinks you're using.
146
+    (Si este sitio no responde, visite <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">
147
+    esta FAQ</a> para más sugerencias sobre como testear su Tor.)
148
+    </p>
149
+    
150
+    <p>Si usa un cortafuegos personal que limita la capacidad de conexi&oacute;n de su computadora
151
+    a sí misma (esto incluye también SELinux en Fedora Core 4),
152
+    asegúrese que permite conexiones de aplicaciones locales a Privoxy (puerto local 8118) y a Tor
153
+    (puerto local 9050). Si su cortafuegos bloquea conexiones salientes, configúrelo para que puedan 
154
+    hacerse conexiones al menos a los puertos TCP 80 y 443 y visite
155
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">este apartado de la FAQ</a>. Si su fichero de configuración SELinux no permite a tor o a privoxy ejecutarse
156
+    correctamente, cree un fichero llamado booleans.local en el directorio 
157
+    /etc/selinux/targeted. Edite este fichero en su editor de textos favorito e inserte 
158
+    "allow_ypbind=1". Reinicie su máquina para que este cambio tenga efecto.
159
+    </p>
160
+    
161
+    <p>Si a&uacute;n no funciona, visite
162
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">este apartado de la FAQ</a>
163
+    para seguir consejos.</p>
164
+    
165
+    <hr />
166
+    <a id="server"></a>
167
+    <a id="relay"></a>
168
+    <h2><a class="anchor" href="#relay">Paso Cinco: Configurarlo como repetidor</a></h2>
169
+    <br/>
170
+    
171
+    <p>La red Tor se basa en voluntarios que donan su ancho de banda.
172
+    Cuantos m&aacute;s repetidores, m&aacute;s rápida ser&aacute; la red Tor. Si tienes al menos 20 Kbytes/s en ambos sentidos,
173
+    por favor ayuda a Tor configur&aacute;ndolo para que sea repetidor tambi&eacute;n. Tenemos varias caracter&iacute;sticas para que
174
+    hacer a Tor repetidor sea fácil y conveniente, incluyendo limitaci&oacute;n del ancho de banda cedido, políticas de
175
+    conexiones de salida que pueden limitar tu exposici&oacute;n a casos de abuso, y soporte para IP din&aacute;micas.
176
+    
177
+    <p>Tener repetidores en varios y diferentes sitios en la Internet es lo que convierte a los usuarios de Tor en seguros.
178
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">Puedes reforzar tu propio anonimato</a>,
179
+    haciendo que sitios remotos no puedan saber si las conexiones se originaron en
180
+    tu computadora o fueron iniciadas desde otras.</p>
181
+    
182
+    <p>Lee más en nuestra gu&iacute;a <a href="<page docs/tor-doc-relay>">Configurando un repetidor</a></p>
183
+    
184
+    <hr/>
185
+    
186
+    <p>Si tienes sugerencias para mejorar este documento, por favor <a
187
+    href="<page about/contact>">envíanoslas</a>. ¡Gracias!</p>
188
+  </div>
189
+  <!-- END MAINCOL -->
190
+  <div id = "sidecol">
191
+#include "side.wmi"
192
+#include "info.wmi"
193
+  </div>
194
+  <!-- END SIDECOL -->
195
+</div>
196
+<!-- END CONTENT -->
197
+#include <foot.wmi>   
... ...
@@ -0,0 +1,63 @@
1
+## translation metadata
2
+# Revision: $Revision: 21511 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: Configuring your browser to use Tor" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-web>">Configure Your Browser</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h1>Configurar su navegador para usar <a href="<page index>">Tor</a></h1>
14
+    <br />
15
+    
16
+    <p>Si está usando Firefox (lo recomendamos), no necesita esta página.
17
+    Simplemente instale el <a
18
+    href="https://addons.mozilla.org/firefox/2275/">plugin Torbutton
19
+    </a>, reinicie Firefox, y eso es todo:
20
+    </p>
21
+    
22
+    <img alt="Plugin Torbutton para Firefox"
23
+    src="../img/screenshot-torbutton.png"
24
+    border="1"/>
25
+    
26
+    <br />
27
+    
28
+    <p>En caso contrario, tiene que configurar manualmente los proxies del navegador.
29
+    <br/>En Mozilla y Firefox en Windows, están en 
30
+    Herramientas - Opciones - General - Opciones de Conexión.
31
+    <br/>En Firefox en OS X, es Firefox - Preferencias - General - Opciones de Conexión.
32
+    <br/>En Firefox en Linux, es
33
+    Editar - Preferencias - Advanzado - Proxies.
34
+    <br/>En Opera es Herramientas - Preferencias (Advanzado) - Red - Servidores Proxy.
35
+    <br/>En IE, es Herramientas - Opciones de Internet - Connexiones - Opciones LAN - Comprobar Servidor
36
+    Proxy - Advanzado.</p>
37
+    
38
+    <img alt="Configuración Proxy en Firefox"
39
+    src="../img/screenshot-win32-firefox-proxies.jpg" />
40
+    
41
+    <p>
42
+    Debería rellenar "localhost"
43
+    y "8118" para que los primeros cuatro protocolos señalen a  Privoxy, como se muestra aquí. (Aunque
44
+    Privoxy no soporta FTP ni Gopher, <a
45
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">debería
46
+    ponerlos de todas formas</a>.) Debería también rellenar la entrada del proxy socks
47
+    para apuntar directamente a Tor ("localhost", "9050", y socks5)
48
+    para cubrir protocolos además de los cuatro primeros. Luego pulse "OK".</p>
49
+    
50
+    <hr />
51
+    
52
+    <p>Si tiene sugerencias para mejorar este documento, por favor <a
53
+    href="<page about/contact>">envíenoslas</a>. ¡Gracias!</p>
54
+  </div>
55
+  <!-- END MAINCOL -->
56
+  <div id = "sidecol">
57
+#include "side.wmi"
58
+#include "info.wmi"
59
+  </div>
60
+  <!-- END SIDECOL -->
61
+</div>
62
+<!-- END CONTENT -->
63
+#include <foot.wmi>   
... ...
@@ -0,0 +1,7 @@
1
+## translation metadata
2
+# Based-On-Revision: 13195
3
+# Last-Translator: ruben at ugr es
4
+
5
+#include "head.wmi"
6
+TITLE="Redirecting" 
7
+REDIRECT="docs/tor-doc-windows"
... ...
@@ -0,0 +1,186 @@
1
+## translation metadata
2
+# Revision: $Revision: 21995 $
3
+# Translation-Priority: 1-high
4
+
5
+#include "head.wmi" TITLE="Tor Project: MS Windows Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-windows>">Windows Client</a>
11
+  </div> 
12
+  <div id="maincol">  
13
+    <h1>La ejecución de el cliente <a href="<page index>"> Tor</a> en Microsoft
14
+    Windows</h1>
15
+    <br />
16
+    
17
+    <p>
18
+    Tenga en cuenta que estas son las instrucciones de instalación para ejecutar
19
+    un cliente Tor en Microsoft Windows (2000, XP, Vista, 7, yediciones de
20
+    Servidor). Si quieres gestionar tráfico para otros y ayudar a crecer la red
21
+    (por favor), lee la guía de <a href="<page
22
+    docs/tor-doc-relay>">Configuración de un relé."</a></b> 
23
+    </p>
24
+    
25
+    <p>Freedom House has produced a video on how to install Tor.  You can view it
26
+    at <a
27
+    href="http://media.torproject.org/video/2009-install-and-use-tor.ogv">How to
28
+    install Tor on Windows</a>.  Know of a better video, or one translated into
29
+    your language? Let us know!</p>
30
+    
31
+    <div class="center">
32
+    <p><video id="v1" src="http://media.torproject.org/video/2009-install-and-use-tor.ogv" autobuffer="true" controls="controls"></video></p>
33
+    </div>
34
+    
35
+    <hr /> <a id="installing"></a>
36
+    <h2><a class="anchor" href="#installing">Paso Uno: Descargar e Instalar Tor</a></h2>
37
+    <br />
38
+    
39
+    <p>
40
+    Paquetes de Microsoft Windows contienen, <a href="<page index>">Tor</a>, <a
41
+    href="<page projects/vidalia>">Vidalia</a> (una GUI para Tor), <a
42
+    href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> (un plugin
43
+    para Mozilla Firefox), y <a
44
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo </a> (un proxy
45
+    web) envasados en un solo paquete, con las cuatro aplicaciones
46
+    preconfiguradas para trabajar juntas. Descargue el <a
47
+    href="../<package-win32-bundle-stable>"> estable</a> o el <a
48
+    href="../<package-win32-bundle-alpha>"> experimental</a> versión del paquete
49
+    de Windows, o buscar más opciones en la <a href="<page download/download>"> página de
50
+    descarga </a>.
51
+    </p>
52
+    
53
+    <img alt="tor installer splash page"
54
+    src="../img/screenshot-win32-installer-splash.png" />
55
+    
56
+    <p>Si ya has instalado Tor, Vidalia, o Polipo puedes deseleccionar cualquier
57
+    componente que no es necesario instalar en el diálogo que se muestra a
58
+    continuación.
59
+    </p>
60
+    
61
+    <img alt="select components to install"
62
+    src="../img/screenshot-win32-installer-components.png" />
63
+    
64
+    <p>Después de haber completado la instalación, los componentes seleccionados se
65
+    iniciarán automáticamente para usted.
66
+    </p>
67
+    
68
+    <p>Tor viene configurado como cliente por defecto. Se utiliza un incorporada en
69
+    el archivo de configuración por defecto, y la mayoría de la gente no tendrá
70
+    que cambiar cualquiera de las opciones. Tor está ya instalado.
71
+    </p>
72
+    
73
+    <hr /> <a id="using"></a>
74
+    <h2><a class="anchor" href="#using">Paso Dos: Configurar tus aplicaciones para
75
+    Tor</a></h2>
76
+    <br />
77
+    
78
+    <p>Tras instalar Tor y Polipo, necesita configurar sus aplicaciones para
79
+    usarlos. El primer paso es configurar la navegación web.</p>
80
+    
81
+    <p>Usted debe usar Tor con Firefox y Torbutton, para la mejor seguridad. El
82
+    paquete instala el <a href="https://addons.mozilla.org/firefox/2275/">plugin
83
+    Torbutton</a> para ti. Reinicia Firefox, y eso es todo:
84
+    </p>
85
+    
86
+    <img alt="Torbutton plugin for Firefox"
87
+    src="../img/screenshot-torbutton.png" border="1"/> <br />
88
+    
89
+    <p>
90
+    Si planea ejecutar Firefox en un ordenador distinto del de Tor, vea la <a
91
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">Entrada
92
+    de la FAQ para ejecutar Tor en un ordenador diferente</a>.
93
+    </p>
94
+    
95
+    <p>Para usar con Tor otras aplicaciones que soportan proxies HTTP, simplemente
96
+    dirigirlas a Polipo (es decir, localhost, puerto 8118). Para usar SOCKS
97
+    directamente (para mensajería instantanea, Jabber, IRC, etc), puede apuntar
98
+    su aplicación directamente a Tor (localhost, puerto 9050), pero vea <a
99
+    href="https://wiki.torproject.org
100
+    noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">esta FAQ</a> por qué esto puede
101
+    ser peligroso. Para aplicaciones que no soportan ni SOCKS ni HTTP, visitar
102
+    SocksCap o <a href="http://www.freecap.ru/eng/">FreeCap</a>. (FreeCap es
103
+    software libre; SocksCap es propietario).</p>
104
+    
105
+    <p>For information on how to Torify other applications, check out the <a
106
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
107
+    HOWTO</a>.
108
+    </p>
109
+    
110
+    <hr /> <a id="verify"></a>
111
+    <h2><a class="anchor" href="#verify">Paso Tres: Asegurarse de que funciona</a></h2>
112
+    <br />
113
+    
114
+    <p>
115
+    Compruebe que Vidalia se está ejecutando. Vidalia usa una pequeña cebolla
116
+    verde para indicar que Tor se está ejecutando, o una cebolla oscura con una
117
+    "X" roja cuando Tor no está ejecutándose. Puedes arrancar o detener Tor
118
+    haciendo clic derecho sobre el icono de Vidalia en la bandeja del sistema y
119
+    seleccionando "Inicio" o "Stop" del menú como se muestra a continuación:
120
+    </p>
121
+    
122
+    <img alt="Vidalia Tray Icon" src="../img/screenshot-win32-vidalia.png"/>
123
+    
124
+    <p>
125
+    Después, deberías intentar usar tu explorador con Tor y asegurarse de que su
126
+    dirección IP está siendo anonimizada. Haga clic en <a
127
+    href="https://check.torproject.org/">el detector de Tor</a> y compruebe si
128
+    cree que usas Tor o no. (Si el sitio está caído, vea <a
129
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">esta
130
+    FAQ</a> para más sugerencias sobre cómo comprobar su Tor.)
131
+    </p>
132
+    
133
+    <p>Si tiene un cortafuegos personal que limita la capacidad de su ordenador
134
+    para conectarse a sí mismo, asegúrate que permite conexiones de aplicaciones
135
+    locales al puerto local 8118 y al puerto 9050. Si tu cortafuegos bloquea
136
+    conexiones salientes, abra un agujero para que pueda conectarse al menos a
137
+    los puertos TCP 80 y 443, y luego vea <a
138
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">esta
139
+    FAQ</a>.
140
+    </p>
141
+    
142
+    <p>Si aún no funciona, mire <a
143
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">esta
144
+    FAQ</a> para seguir consejos.</p>
145
+    
146
+    <p>
147
+    Una vez que funcione, aprender más acerca de <a href="<page
148
+    download/download>#Warning">lo que hace Tor y no ofrece</a>.
149
+    </p>
150
+    
151
+    <hr /> <a id="server"></a> <a id="relay"></a>
152
+    <h2><a class="anchor" href="#relay">Paso Cuatro: Configurarlo como repetidor</a></h2>
153
+    <br />
154
+    
155
+    <p>La red Tor se apoya en voluntarios que donen ancho de banda. Cuanta más
156
+    gente ejecute repetidores, más rápida será la red Tor ser. Si tiene al menos
157
+    20 kilobytes / s bidireccional, por favor ayuda a Tor configurando su Tor
158
+    para que sea repetidor también. Tenemos muchas características que hacen los
159
+    repetidores Tor fáciles y convenientes, incluyendo limitación del ancho de
160
+    banda, políticas de salida que pueden limitar su exposición a quejas de
161
+    abuso, y soporte para direcciones IP dinámicas.</p>
162
+    
163
+    <p>Tener repetidores en muchos sitios diferentes de Internet es lo que hace a
164
+    los usuarios de Tor seguros. <a
165
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">También
166
+    puede obtener más anonimato</a>, haciendo que sitios remotos no puedan saber
167
+    si las conexiones se originaron en su ordenador o fueron reenviadas desde
168
+    otros.</p>
169
+    
170
+    <p>Lea más en nuestro guía<a href="<page docs/tor-doc-relay>"> Configurar un
171
+    repetidor</ a>.</p>
172
+    
173
+    <hr />
174
+    
175
+    <p>Si tiene sugerencias para mejorar este documento, por favor <a href="<page
176
+    about/contact>"> envíanoslas</a>. Gracias!</p>
177
+  </div>
178
+  <!-- END MAINCOL -->
179
+  <div id = "sidecol">
180
+#include "side.wmi"
181
+#include "info.wmi"
182
+  </div>
183
+  <!-- END SIDECOL -->
184
+</div>
185
+<!-- END CONTENT -->
186
+#include <foot.wmi>   
... ...
@@ -0,0 +1,269 @@
1
+## translation metadata
2
+# Revision: $Revision: 22314 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Hidden Service Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-hidden-service>">Tor Hidden Service</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h1>Configurar Servicios Ocultos para <a href="<page index>">Tor</a></h1>
14
+    <hr />
15
+    
16
+    <p>Tor permite a los clientes y a los repetidores que ofrezcan servicios ocultos.
17
+    Eso significa que puede ofrecer un servidor web, servidor SSH, etc., sin revelar
18
+    su dirección IP a sus usuarios. De hecho, como no se usa ninguna dirección pública,
19
+    puedes ejecutar un servicio oculto desde detrás de un cortafuegos.
20
+    </p>
21
+    
22
+    <p>Si tiene Tor y Privoxy instalado, puede ver los servicios ocultos 
23
+    en acción visitando <a href="http://duskgytldkxiuqc6.onion/">un ejemplo de
24
+    servicio oculto</a>.
25
+    </p>
26
+    
27
+    <p>Este howto describe los pasos para configurar tu propio sitio web en
28
+    un servicio oculto.
29
+    </p>
30
+    
31
+    <hr />
32
+    <a id="zero"></a>
33
+    <h2><a class="anchor" href="#zero">Paso Cero: Hacer que Tor y Privoxy funcionen</a></h2>
34
+    <br />
35
+    
36
+    <p>Antes de empezar, necesitará asegurarse de que: </p>
37
+    <ol>
38
+    <li>Tor está activo y ejecutándose,</li>
39
+    <li>Privoxy está activo y ejecutándose,</li>
40
+    <li>Privoxy está configurado para apuntar a Tor, y </li>
41
+    <li>Lo ha configurado correctamente.</li>
42
+    </ol>
43
+    
44
+    <p>Los usuarios de Windows deberían seguir el <a
45
+    href="<page docs/tor-doc-windows>">howto para Windows
46
+    </a>, Los usuarios de OS X deberían seguir el <a
47
+    href="<page docs/tor-doc-osx>">howto para OS
48
+    X</a>, y los usuarios de Linux/BSD/Unix deberían seguir el <a
49
+    href="<page docs/tor-doc-unix>">howto para Unix</a>.
50
+    </p>
51
+    
52
+    <p>Una vez que tenga Tor y Privoxy instalados y configurados,
53
+    puede ver los servicios ocultos en acción siguiendo este enlace a <a
54
+    href="http://duskgytldkxiuqc6.onion/">un ejemplo de servicio oculto</a>.
55
+    Tardará típicamente 10-60 segundos en cargarse
56
+    (o en decidir que no se puede acceder por el momento). Si falla
57
+    inmediatamente y tu navegador muestra una alerta diciendo que
58
+    "www.duskgytldkxiuqc6.onion no se encontró, compruebe por favor el nombre e
59
+    inténtelo de nuevo" no ha configurado Tor y Privoxy correctamente; vea <a
60
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">la
61
+    entrada Tor-o-Privoxy-no-funcionan de la FAQ</a> para ayuda.
62
+    </p>
63
+    
64
+    <hr />
65
+    <a id="one"></a>
66
+    <h2><a class="anchor" href="#one">Paso Uno: Instalar un servidor web localmente</a></h2>
67
+    <br />
68
+    
69
+    <p>Primero, necesitará configurar un servidor web localmente. Configurar un 
70
+    servidor web puede ser complicado, 
71
+    así que sólo explicaremos algunas cosas básicas. Si se atranca o 
72
+    quiere hacer más, busque un amigo que pueda ayudarle. Recomendamos que
73
+    instale un nuevo servidor web separado para su servicio oculto, ya que
74
+    incluso si ya tiene uno instalado, puede estar usándolo (o querer usarlo
75
+    más tarde) para un sitio web real.
76
+    </p>
77
+    
78
+    <p>Si está en Unix u OS X y está cómodo en la línea de órdenes,
79
+    la mejor forma con diferencia es instalar <a
80
+    href="http://www.acme.com/software/thttpd/">thttpd</a>. Coja el último
81
+    fichero tar, descomprímalo (creará su propio directorio), y ejecute
82
+    <kbd>./configure &amp;&amp; make</kbd>. Luego <kbd>mkdir hidserv; cd 
83
+    hidserv</kbd>, y ejecute
84
+    <kbd>../thttpd -p 5222 -h localhost</kbd>. Volverá a la línea de órdenes,
85
+    y ya está usted ejecutando un servidor web en el puerto 5222. Puede poner
86
+    ficheros para servir en el directorio hidserv.
87
+    </p>
88
+    
89
+    <p>Si está en Windows, podría elegir <a
90
+    href="http://savant.sourceforge.net/">Savant</a> o <a
91
+    href="http://httpd.apache.org/">Apache</a>, y asegúrese de configurarlo
92
+    para que escuche sólo a localhost. También debería averiguar en que
93
+    puerto está escuchando, porque lo usará más abajo.
94
+    </p>
95
+    
96
+    <p>(La razón de que el servidor web sólo escuche a localhost es para 
97
+    asegurarse de que no es accesible públicamente. Si la gente
98
+    pudiera conectarse a él directamente, podrían confirmar que su 
99
+    ordenador es el que está ofreciendo el servicio oculto.)
100
+    </p>
101
+    
102
+    <p>Una vez que tenga su servidor web configurado, asegúrese de que funciona:
103
+    abra su navegador y vaya a <a
104
+    href="http://localhost:5222/">http://localhost:5222/</a>, donde 5222 es
105
+    el puerto que eligió antes. Intente poner un fichero en el directorio html
106
+    principal, y asegúrese de que aparece cuando accede al sitio.
107
+    </p>
108
+    
109
+    <hr />
110
+    <a id="two"></a>
111
+    <h2><a class="anchor" href="#two">Paso Dos: Configure su servicio oculto</a></h2>
112
+    <br />
113
+    
114
+    <p>Para lo siguiente, necesita configurar su servicio oculto para que apunte
115
+    a su servidor web local.
116
+    </p>
117
+    
118
+    <p>Primero, abra su fichero torrc en su editor de texto favorito. (Vea <a
119
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">la
120
+    entrada de la FAQ torrc</a> para aprender lo que esto significa.) 
121
+    Vaya a la sección del medio y busque la línea</p>
122
+    
123
+    <pre>
124
+    \############### This section is just for location-hidden services ###
125
+    </pre>
126
+    
127
+    <p>
128
+    Esta sección del fichero consiste en grupos de líneas, cada una representando
129
+    un servicio oculto. Ahora mismo están todas comentadas (las líneas comienzan con
130
+    #), así que los servicios ocultos están deshabilitados. Cada grupo de líneas
131
+    consiste en una línea <var>HiddenServiceDir</var>, y una o más líneas 
132
+    <var>HiddenServicePort</var>:</p>
133
+    <ul>
134
+    <li><var>HiddenServiceDir</var> es un directorio donde Tor almacenará información 
135
+    acerca de ese servicio oculto. En particular, Tor creará un fichero aquí de 
136
+    nombre <var>hostname</var> que le dirá la URL onion.  No necesita añadir ningún
137
+    fichero a este directorio.</li>
138
+    <li><var>HiddenServicePort</var> le permite especificar un puerto virtual (eso es, qué
139
+    puerto creerán que están usando la gente que acceda al servicio oculto) y una
140
+    dirección IP y puerto para redireccionar conexiones a este puerto virtual.</li>
141
+    </ul>
142
+    
143
+    <p>Añada las siguientes líneas a su torrc:
144
+    </p>
145
+    
146
+    <pre>
147
+    HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
148
+    HiddenServicePort 80 127.0.0.1:5222
149
+    </pre>
150
+    
151
+    <p>Querrá cambiar la línea <var>HiddenServiceDir</var>, para que apunte
152
+    a un directorio real que sea legible/escribible por el usuario que 
153
+    ejecutará Tor. La línea anterior debería funcionar si está usando el 
154
+    paquete Tor para OS X. En Unix, pruebe "/home/username/hidserv/" y complete su propio
155
+    nombre de usuario en lugar de "username". En Windows puede escoger:</p>
156
+    <pre>
157
+    HiddenServiceDir C:\Documents and Settings\username\Application Data\hidden_service\\
158
+    HiddenServicePort 80 127.0.0.1:5222
159
+    </pre>
160
+    
161
+    <p>Ahora grabe el torrc, apague su Tor, e inícielo de nuevo.
162
+    </p>
163
+    
164
+    <p>Si tor reinicia, estupendo. En caso contrario, algo está mal. Primero
165
+    mire los logs de tor para consejos. Mostrará algunos mensajes con advertencias 
166
+    o errores. Eso debería darle alguna idea de qué está mal. Lo típico es que haya
167
+    palabras mal escritas o permisos erróneos en los directorios. (Vea  <a
168
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">la
169
+    entrada FAQ sobre log</a> si no está seguro de cómo activar o encontrar
170
+    su fichero de log.)
171
+    </p>
172
+    
173
+    <p>Cuando Tor arranque, automáticamente creará el <var>HiddenServiceDir</var>
174
+    que especificó (en caso necesario), y creará dos ficheros allí.</p>
175
+    <dl>
176
+    <dt><var>private_key</var></dt>
177
+    <dd>
178
+    Primero, Tor generará una pareja de llaves pública/privada para su servicio
179
+    oculto. Se escribe en un fichero llamado "private_key". No comparta esta
180
+    clave con otros -- si lo hace podrán impersonar su servicio oculto.
181
+    </dd>
182
+    <dt><var>hostname</var></dt>
183
+    <dd>El otro fichero que Tor creará se llama "hostname". Contiene un pequeño
184
+    resumen de su llave pública -- parecerá algo como 
185
+    <tt>duskgytldkxiuqc6.onion</tt>. Este es el nombre público de su servicio,
186
+    y puede decírselo a la gente, publicarlo en sitios web, ponerlo en tarjetas
187
+    de visita, etc.</dd>
188
+    </dl>
189
+    
190
+    <p>Si Tor se ejecuta como un usuario diferente de usted, por
191
+    ejemplo en OS X, Debian, o Red Hat, puede que necesite hacerse root para 
192
+    poder ver esos ficheros.</p>
193
+    
194
+    <p>Ahora que ha reiniciado Tor, está ocupado eligiendo puntos de introducción en
195
+    la red Tor, y generando lo que se llama un <em>descriptor de servicio oculto</em>.
196
+    Esto es una lista firmada de puntos de introducción junto con la llave pública
197
+    completa del servicio. Publica anónimamente este descriptor a los servidores
198
+    de directorio, y otra gente lo obtiene anónimamente de los servidores de 
199
+    directorio cuando intentan acceder a su servicio.
200
+    </p>
201
+    
202
+    <p>Pruebe ahora: pegue el contenido del fichero hostname en tu navegador 
203
+    web. Si funciona, obtendrá la página html que configuró en el paso uno.
204
+    Si no funciona, mire en sus logs buscando sugerencias, y siga jugando con
205
+    él hasta que funcione.
206
+    </p>
207
+    
208
+    <hr />
209
+    <a id="three"></a>
210
+    <h2><a class="anchor" href="#three">Paso Tres: Consejos más avanzados</a></h2>
211
+    <br />
212
+    
213
+    <p>Si planea mantener su servicio disponible durante largo tiempo, puede que
214
+    quiera hacer una copia de seguridad del fichero <var>private_key</var> en alguna parte.
215
+    </p>
216
+    
217
+    <p>Hemos evitado recomendar Apache antes, a) porque mucha gente podría 
218
+    estar ya ejecutándolo para su servidor web público en su ordenador, y b)
219
+    porque es grande y tiene muchos sitios donde podría revelar su dirección
220
+    IP u otra información identificadora, por ejemplo en páginas 404. Para
221
+    la gente que necesite más funcionalidad, sin embargo, Apache puede ser la
222
+    respuesta correcta. ¿Puede alguien hacernos una lista de formas de bloquear
223
+    el Apache cuando se usa como servicio oculto? Savant probablemente también
224
+    tenga esos problemas también.
225
+    </p>
226
+    
227
+    <p>Si quiere redireccionar múltiples puertos virtuales para un mismo servicio 
228
+    oculto, simplemente añada más líneas <var>HiddenServicePort</var>.
229
+    Si quiere ejecutar múltiples servicios ocultos desde el mismo cliente Tor,
230
+    simplemente añada otra línea <var>HiddenServiceDir</var>. Todas las líneas
231
+    <var>HiddenServicePort</var> subsiguientes se refieren a esta línea <var>HiddenServiceDir</var>, hasta
232
+    que añada otra línea <var>HiddenServiceDir</var>:
233
+    </p>
234
+    
235
+    <pre>
236
+    HiddenServiceDir /usr/local/etc/tor/hidden_service/
237
+    HiddenServicePort 80 127.0.0.1:8080
238
+    
239
+    HiddenServiceDir /usr/local/etc/tor/other_hidden_service/
240
+    HiddenServicePort 6667 127.0.0.1:6667
241
+    HiddenServicePort 22 127.0.0.1:22
242
+    </pre>
243
+    
244
+    <p>Hay algunas consideraciones de anonimato que debería tener en cuenta también:
245
+    </p>
246
+    <ul>
247
+    <li>Como se mencionó antes, tenga cuidado de dejar que su servidor web
248
+    revele información identificatiba sobre usted, su ordenador, o su posición.
249
+    Por ejemplo, los lectores pueden probablemente determinar si es thttpd o 
250
+    Apache, y aprender algo acerca de su sistema operativo.</li>
251
+    <li>Si su ordenador no está online todo el tiempo, su servicio oculto
252
+    tampoco lo estará. Esto filtra información a un adversario observador.</li>
253
+    <!-- increased risks over time -->
254
+    </ul>
255
+    
256
+    <hr />
257
+    
258
+    <p>Si tiene sugerancias para mejorar este documento, por favor <a
259
+    href="<page about/contact>">envíenoslas</a>. ¡Gracias!</p>
260
+  </div>
261
+  <!-- END MAINCOL -->
262
+  <div id = "sidecol">
263
+#include "side.wmi"
264
+#include "info.wmi"
265
+  </div>
266
+  <!-- END SIDECOL -->
267
+</div>
268
+<!-- END CONTENT -->
269
+#include <foot.wmi>   
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,119 @@
1
+## translation metadata
2
+# Revision: $Revision: 21995 $
3
+# Translation-Priority: 1-high
4
+
5
+#include "head.wmi" TITLE="Tor Project: MS Windows Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-windows>">Windows Client</a>
11
+  </div> 
12
+  <div id="maincol">  
13
+    <h1>اجرای سرويس گيرنده <a href="<page index>">Tor</a> روی MS Windows</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    
18
+    <b>توجه داشته باشيد که اين دستورالعمل های نصب برای اجرای سرويس گيرنده Tor روی ويندوز MS (98، 98SE، NT4، 2000 ،XP، ويستا، سررو) است. اگر می خواهيد برای کمک به توسعه شبکه، ترافيک را برای ديگران تقويت کنيد (لطفاً اين کار را بکنيد)، راهنماي<a href="<page docs/tor-doc-relay>">پيکربندی ايستگاه واسطه</a> را مطالعه کنيد.</b>
19
+    </p>
20
+    
21
+    <hr />
22
+    <a id="installing"></a>
23
+    <h2><a class="anchor" href="#installing">گام اول: بارگيری و نصب Tor</a></h2>
24
+    <br />
25
+    
26
+    <p>
27
+    نصب برای ويندوز MS شامل <a href="<page index>">Tor</a> <a href="http://www.vidalia-project.net/">Vidalia</a> (يک GUI برای Tor) و <a href="http://www.privoxy.org">Privoxy</a> (يک پروکسی فيلترينگ وب) در يک بسته، با سه برنامه از قبل پيکربندی شده برای کار با يکديگر، می باشد. نسخه <a href="../<package-win32-bundle-stable>">ثابت</a> يا <a href="../<package-win32-bundle-alpha>">آزمايشي</a> vبسته نرم افزاری ويندوز را بارگيری کنيد، يا برای گزينه های ديگر در <a href="<page download/download>">صفحه بارگيري</a> جستجو کنيد.
28
+    
29
+    </p>
30
+    
31
+    <img alt="صفحه شروع نصب کننده Tor" src="../img/screenshot-win32-installer-splash.png" />
32
+    
33
+    <p>اگر قبلاً Tor، Vidalia، يا Privoxy را نصب کرده ايد، می توانيد هريک از مؤلفه هايی را که لازم نداريد را در کادر گفتگوی زير از حالت انتخاب بيرون آوريد.
34
+    </p>
35
+    
36
+    <img alt="مؤلفه های مورد نظر را جهت نصب انتخاب کنيد" src="../img/screenshot-win32-installer-components.png" />
37
+    
38
+    <p>پس از کامل کردن نصب کننده، مؤلفه هايی که انتخاب کرده ايد به طور خودکار شروع خواهند شد.
39
+    </p>
40
+    
41
+    <!-- <p>Tor comes configured as a client by default. It uses a built-in default configuration file, and most people won't need to change any of the settings. Tor is now installed. </p> -->
42
+    
43
+    <hr />
44
+    <a id="using"></a>
45
+    <h2><a class="anchor" href="#using">گام دوم: پيکربندی برنامه ها برای استفاده از Tor</a></h2>
46
+    
47
+    <br />
48
+    
49
+    <p>پس از نصب Tor و Privoxy، بايد برنامه های خود را برای استفاده از آنها پيکربندی کنيد. گام اول راه اندازی مرورگر وب است.</p>
50
+    
51
+    <p>اگر از Privoxy استفاده می کنيد (ما توصيه می کنيم از ان استفاده کنيد)، بسته نرم افزاری Vidalia  <a href="https://addons.mozilla.org/firefox/2275/">پلاگين Torbutton </a> را برای شما نصب می کند. Firefox را دوباره شروع کنيد، اکنون همه را تنظيم کرده ايد:
52
+    </p>
53
+    
54
+    <img alt="پلاگين Torbutton برای Firefox" src="../img/screenshot-torbutton.png" border="1">
55
+    
56
+    <br />
57
+    
58
+    <p>
59
+    (<a href="https://torbutton.torproject.org/">اطلاعات بيشتر درباره Torbutton را در اينجا مشاهده کنيد</a>. اگر می خواهيد Firefox را روی رايانه ديگری غير از آنکه Tor روی آن است، اجرا کنيد، به <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">مدخل سؤالات متدوال درمورد اجرای Tor روی رايانه متفاوت</a> مراجعه کنيد. اگر لازم است از مرورگر ديگری غير از Firefox استفاده کنيد، بايد <a href="<page docs/tor-doc-web>">تنظيمات پروکسی را خودتان پيکربندی کنيد</a>.)
60
+    
61
+    </p>
62
+    
63
+    <p>استفاده از Privoxy <strong>ضروری است</strong> زيرا <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">اگر مرورگرها مستقيماً از پروکسی SOCKS استفاده کنند، درخواست های DNS شما را فاش می کنند</a> و اين برای گمنام ماندن شما بد است. Privoxy همچنين سرصفحه های خطرناک خاص را از درخواست های وب شما حذف می کند و سايت های تبليغی مضر مانند Doubleclick را مسدود می کند.</p>
64
+    
65
+    <p>برای Torify ساير برنامه هايی که از پروکسی های HTTP پشتيبانی می کنند، فقط آنها را به Privoxy (يعنی درگاه ميزبان محلی 8118) دلالت دهيد. برای استفاده از SOCKS به طور مستقيم (برای پيام رسانی فوری، Jabber، IRC و غيره) می توانيد برنامه خود را مستقيماً در Tor (يدرگاه ميزبان محلی 9050) دلالت دهيد، اما به<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">اين مدخل سؤالات متداول</a> مراجعه کنيد تا ببينيد چرا ممکن است اين کار خطرناک باشد.  در خصوص برنامه هايی که نه از SOCKS و نه از HTTP پشتيبانی می کنند به SocksCap يا <a href="http://www.freecap.ru/eng/">FreeCap</a> مراجعه کنيد. (FreeCap يک نرم افزار رايگان است؛ SocksCap اختصاصی است.)</p>
66
+    
67
+    <p>برای کسب اطلاعات در مورد نحوه Torify ساير برنامه ها، <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify HOWTO</a> را بررسی کنيد.
68
+    </p>
69
+    
70
+    <hr />
71
+    <a id="verify"></a>
72
+    <h2><a class="anchor" href="#verify">گام سوم: کسب اطمينان از اينکه برنامه کار می کند</a></h2>
73
+    <br />
74
+    
75
+    <p>
76
+    بررسی کنيد که Privoxy و Vidalia در حال اجرا باشند. نماد Privoxy يک دايره آبی يا سبز با يک "P" در آن است، Vidalia برای نشان دادن اينکه Tor در حال اجرا است از يک پياز سبز کوچک و برای نشان دادن اينکه  در حال اجرا نيست از يک پياز تيره با يک "X" قرمز استفاده می کند. با کليک راست بر نماد Vidalia در سينی سيستم خود و انتخاب "شروع" يا "توقف" از منو (همانطور که در زير نشان داده شده است)، می توانيد Tor را شروع يا متوقف کنيد.
77
+    
78
+    </p>
79
+    
80
+    <img alt="نماد صفحه Vidalia" src="../img/screenshot-win32-vidalia.png">
81
+    
82
+    <p>
83
+    بعد، بايد می توانيد با Tor از مرورگر خود استفاده کنيد و اطمينان حاصل کنيد که آدرس IP شما ناشناخته خواهد ماند. بر روی <a href="https://check.torproject.org/">تشخيص دهنده Tor</a> کليک کنيد و ببينيد آيا فکر می کند شما از Tor استفاده می کنيد يا خير. #<a href="http://ipchicken.com/">اين سايت</a> #برای مشاهده اينکه فکر می کند شما از چه آدرس IP استفاده می کنيد. (اگر آن سايت فعال نيست، درخصوص پيشنهادات ديگر در مورد نحوه آزمايش Tor خود، به <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">اين مدخل سؤالات متداول</a> مراجعه کنيد.)
84
+    </p>
85
+    
86
+    <p>اگر از يک ديوار آتش شخصی استفاده می کنيد که قابليت رايانه شما را به اتصال به خودش محدود می کند، دقت کنيد که اتصالات از برنامه های محلی را به درگاه محلی 8118 و 9050 مجاز کنيد. اگر ديوار آتش شما اتصالات خروجی را مسدود می کند، يک منفذ ايجاد کنيد تا بتواند حداقل به درگاه های TCP 80 و 443 متصل شود، سپس به <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">اين مدخل سؤالات متداول</a> مراجعه کنيد.
87
+    </p>
88
+    
89
+    <p>اگر هنوز کار نمی کند، برای تذکرات به <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">اين مدخل سؤالات متداول</a> مراجعه کنيد.</p>
90
+    
91
+    <p>
92
+    اگر کار می کند، برای اطلاعات بيشتر به <a href="<page download/download>#Warning">Tor چه چيزهای ارائه می کند و چه چيزهايی ارائه نمی کند</a> مراجعه کنيد.
93
+    
94
+    </p>
95
+    
96
+    <hr />
97
+    <a id="server"></a> <a id="relay"></a>
98
+    <h2><a class="anchor" href="#relay">گام چهارم: پيکربندی Tor به عنوان ايستگاه واسطه</a></h2>
99
+    <br />
100
+    
101
+    <p>شبکه Tor برای اهدای پهنای باند بر داوطلبان متکی است. هرچه تعداد کسانی که ايستگاه های واسطه را اداره می کنند بيستر باشد، شبکه Tor سريع تر خواهد بود. اگر به هر طريق حداقل 20 کيلوبايت داريد، لطفاً با پيکربندی Tor خود به عنوان يک ايستگاه واسطه، کمک کنيد. استفاده از ايستگاه های واسطه Tor به دليل ويژگی های زيادی آسان و راحت است، از جمله محدودکردن سرعت پهنای باند، روش های خروج، بنابراين می توانيد خود از معرض شکايات سوء استفاده محدود کنيد، و آدرس های IP پويا را پشتيبانی کنيد.</p>
102
+    
103
+    <p>آنچه کاربران Tor را ايمن نگه می دارد، داشتن ايستگاه های واسطه در مکان های مختلف در اينترنت است. ازآنجاکه سايت های دور نمی توانند بفهمند که اتصالات از رايانه شما ايجاد شده يا توسط ديگران، <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">شما همچنين می توانيد خودتان گمنامی قوی تری داشته باشيد</a>. </p>
104
+    
105
+    <p>موارد بيشتر را در راهنمای <a href="<page docs/tor-doc-relay>">پيکربندی ايستگاه واسطه</a> مطالعه کنيد.</p>
106
+    
107
+    <hr />
108
+    
109
+    <p>اگر پيشنهاداتی برای بهبود اين سند داريد، لطفاً <a href="<page about/contact>">آنها را برای ما ارسال کنيد</a>. سپاسگزاريم!</p>
110
+  </div>
111
+  <!-- END MAINCOL -->
112
+  <div id = "sidecol">
113
+#include "side.wmi"
114
+#include "info.wmi"
115
+  </div>
116
+  <!-- END SIDECOL -->
117
+</div>
118
+<!-- END CONTENT -->
119
+#include <foot.wmi>   
... ...
@@ -0,0 +1,158 @@
1
+## translation metadata
2
+# Revision: $Revision: 21979 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: N900 Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/N900>">N900</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="Maemo"></a>
14
+    <h2><a class="anchor" href="#Maemo">Installer Tor sur Maemo</a></h2>
15
+    <br />
16
+    <p>
17
+    Si vous avez un appareil fonctionnant sous Maemo qui n'est pas <a
18
+    href="#N900">le N900</a>, nous vous suggérons d'installer le paquet Tor
19
+    depuis le <a href="http://maemo.org/packages/view/tor/">site web de
20
+    Maemo</a>. Le projet Tor ne compile pas ces paquets. Ils sont maintenus par
21
+    la communauté Maemo.
22
+    </p>
23
+    
24
+    <a id="N900"></a>
25
+    <h2><a class="anchor" href="#N900">Installer Tor sur le N900</a></h2>
26
+    <br />
27
+    <p>
28
+    Les instructions qui suivent devraient vous aider à installer <a
29
+    href="https://garage.maemo.org/projects/tor-status">un contrôleur Tor
30
+    expérimental</a> ainsi que Tor packagé pour le téléphone Nokia N900. C'est
31
+    pour le moment une configuration non testée. Le navigateur dans cette
32
+    configuration ne dispose pas de Torbutton et il ne devrait pas être utilisé
33
+    pour le moment si vous avez des besoins impératifs d'anonymat sécurisé.
34
+    </p>
35
+    
36
+    <p>
37
+    Ouvrez le gestionnaire d'applications: <br /> <a
38
+    href="../img/N900/1_app_menu.png"> <img border="0" alt="N900 application
39
+    menu" src="../img/N900/1_app_menu-small.png"/> </a>
40
+    </p>
41
+    
42
+    <p>
43
+    Cliquez sur le menu du gestionnaire d'applications en haut de l'écran: <br
44
+    /> <a href="../img/N900/2_app_manager.png"> <img border="0" alt="N900
45
+    application manager" src="../img/N900/2_app_manager-small.png"/> </a>
46
+    </p>
47
+    
48
+    <p>
49
+    Selectionnez 'Catalogues d'Applications': <br /> <a
50
+    href="../img/N900/3_app_managermenu.png"> <img border="0" alt="N900
51
+    application catalogs" src="../img/N900/3_app_managermenu-small.png"/> </a>
52
+    </p>
53
+    
54
+    <p>
55
+    Appuyez sur 'New' pour activer les dépôts développement externes Maemo. <br
56
+    /> <small>Note: Ce dépôt contient des paquets non testés qui peuvent
57
+    endommager votre appareil. <br /> Consultez <a
58
+    href="http://wiki.maemo.org/Extras-devel">Extra-devel</a> pour plus de
59
+    détails. Vous devriez probablement désactiver ces dépôts après avoir
60
+    installé Tor, vous êtes prévenus des risques.</small> <br /> <a
61
+    href="../img/N900/4_catalog_list.png"> <img border="0" alt="N900 catalog
62
+    list" src="../img/N900/4_catalog_list-small.png"/> </a>
63
+    </p>
64
+    
65
+    <p>
66
+    Entrez les informations suivantes dans l'écran d'ajout de catalogue:
67
+    <p>
68
+    <pre>
69
+    Catalog name:    Extras devel
70
+    Web address:    http://repository.maemo.org/extras-devel/
71
+    Distribution:        fremantle
72
+    Components:    free non-free
73
+    </pre>
74
+    </p>
75
+    <br /> Assurez vous que 'Désactivé' est décoché et appuyez sur 'Enregistrer'
76
+    et attendez que la liste des paquets se mette à jour.<br /> <a
77
+    href="../img/N900/5_new_catalog.png"> <img border="0" alt="N900 new catalog"
78
+    src="../img/N900/5_new_catalog-small.png"/> </a>
79
+    </p>
80
+    
81
+    <p>
82
+    Pressez sur 'Download' dans le gestionnaire d'applications: <br /> <a
83
+    href="../img/N900/6_app_manager.png"> <img border="0" alt="N900 app manager"
84
+    src="../img/N900/6_app_manager-small.png"/> </a>
85
+    </p>
86
+    
87
+    <p>
88
+    Sélectionnez la catégorie Réseau (ou recherchez Tor): <br /> <a
89
+    href="../img/N900/7_app_categories.png"> <img border="0" alt="N900
90
+    application categories" src="../img/N900/7_app_categories-small.png"/> </a>
91
+    </p>
92
+    
93
+    <p>
94
+    Descendez et sélectionnez 'Tor Status Area Applet': <br /> <a
95
+    href="../img/N900/8_app_list.png"> <img border="0" alt="N900 application
96
+    list" src="../img/N900/8_app_list-small.png"/> </a>
97
+    </p>
98
+    
99
+    <p>
100
+    Acceptez l'avertissement et appuyez sur 'Continue': <br /> <a
101
+    href="../img/N900/9_disclaimer.png"> <img border="0" alt="N900 disclaimer"
102
+    src="../img/N900/9_disclaimer-small.png"/> </a>
103
+    </p>
104
+    
105
+    <p>
106
+    Lorsque l'installation est terminée, désactivez les dépôts de développement
107
+    externes et redémarrez l'appareil: <br /> <a
108
+    href="../img/N900/10_success.png"> <img border="0" alt="N900 success"
109
+    src="../img/N900/10_success-small.png"/> </a>
110
+    </p>
111
+    
112
+    <p>
113
+    Après avoir redémarrer le N900, ouvrez le menu d'état: <br /> <a
114
+    href="../img/N900/11_after_rebooting.png"> <img border="0" alt="N900 status
115
+    menu post-reboot" src="../img/N900/11_after_rebooting-small.png"/> </a>
116
+    </p>
117
+    
118
+    <p>
119
+    Sélectionnez 'The Onion Router' dans la liste: <br /> <a
120
+    href="../img/N900/12_status_menu.png"> <img border="0" alt="N900 status menu
121
+    selection" src="../img/N900/12_status_menu-small.png"/> </a>
122
+    </p>
123
+    
124
+    <p>
125
+    Activez le routage en oignon, et appuyez sur 'Save': <br /> <a
126
+    href="../img/N900/13_enable_tor.png"> <img border="0" alt="N900 enabling
127
+    Tor" src="../img/N900/13_enable_tor-small.png"/> </a>
128
+    </p>
129
+    
130
+    <p>
131
+    Visitez <a href="https://check.torproject.org/">TorCheck</a> afin de
132
+    confirmer que vous faîtes circuler votre trafic à travers Tor: <br /> <a
133
+    href="../img/N900/14_check_tor.png"> <img border="0" alt="N900 check Tor"
134
+    src="../img/N900/14_check_tor-small.png"/> </a>
135
+    </p>
136
+    
137
+    <p>
138
+    A noter que cela ne vous installera pas forcément la dernière version stable
139
+    de Tor.  De plus, Torbutton n'est pas disponible sur le navigateur web du
140
+    N900. Ainsi, même si ce dernier reste utile pour le contournement, il est
141
+    n'est probablement pas adapté à de grandes exigences en matière d'anonymat
142
+    sur le web.
143
+    </p>
144
+    
145
+    <hr />
146
+    
147
+    <p>Si vous avez des suggestions pour améliorer ce document, n'hésitez pas <a
148
+    href="<page about/contact>">à nous les faire parvenir</a>. Merci !</p>
149
+  </div>
150
+  <!-- END MAINCOL -->
151
+  <div id = "sidecol">
152
+#include "side.wmi"
153
+#include "info.wmi"
154
+  </div>
155
+  <!-- END SIDECOL -->
156
+</div>
157
+<!-- END CONTENT -->
158
+#include <foot.wmi>   
... ...
@@ -0,0 +1,138 @@
1
+## translation metadata
2
+# Revision: $Revision: 22402 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Android Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/android>">Android</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <a id="Android"></a>
14
+    <h2><a class="anchor" href="#Android">Tor sur Android</a></h2>
15
+    <br />
16
+    <p>
17
+    Tor est disponible sous Android en installant un paquet nommé Orbot.
18
+    </p>
19
+    <p>
20
+    Orbot est une application qui permet aux utilisateurs de téléphone mobile
21
+    d'accéder au web, à la messagerie électronique et à la messagerie
22
+    instantanée sans être observé ou bloqué par le fournisseur d'accès internet
23
+    mobile. Orbot apporte les fonctionnalités de Tor sur le système
24
+    d'exploitation mobile Android.
25
+    </p>
26
+    <p>
27
+    Orbot contien Tor, libevent et privoxy. Orbot fournit un proxy HTTP local et
28
+    les interfaces de proxy standardes SOCKS4A/SOCKS pour accéder au réseau
29
+    Tor. Orbot a la possibilité, lorsqu'il dispose des autorisations requises,
30
+    de "torifier" de manière transparente l'ensemble du trafic TCP de votre
31
+    appareil Android.
32
+    </p>
33
+    
34
+    <a id="Market"></a>
35
+    <h2><a class="anchor" href="#Market">Installer Tor depuis l'Android Market</a></h2>
36
+    <br />
37
+    <p>
38
+    Orbot n'est pas pour le moment dans l'Android Market. Il le sera dans un
39
+    futur assez proche.
40
+    </p>
41
+    
42
+    <a id="Manual"></a>
43
+    <h2><a class="anchor" href="#Manual">Installer Tor depuis notre site web</a></h2>
44
+    <br />
45
+    <p>
46
+    Vous pouvez télécharger notre version béta la plus récente d'Orbot ainsi
47
+    qu'une signature gpg depuis notre serveur.
48
+    </p>
49
+    
50
+    <a id="Screenshots"></a>
51
+    <h2><a class="anchor" href="#Screenshots">Copies d'écran de Tor sur Android</a></h2>
52
+    <br />
53
+    <p>
54
+    <a href="../img/android/android-off.jpg"> <img border="0" alt="Android Tor
55
+    off" src="../img/android/android-off-150x150.jpg"/> </a> <a
56
+    href="../img/android/android-bootstrapping.jpg"> <img border="0"
57
+    alt="Android Tor bootstrapping"
58
+    src="../img/android/android-bootstrapping-150x150.jpg"/> </a> <a
59
+    href="../img/android/android-activated.jpg"> <img border="0" alt="Android
60
+    Tor activated" src="../img/android/android-activated-150x150.jpg"/> </a> <a
61
+    href="../img/android/android-settings.jpg"> <img border="0" alt="Android Tor
62
+    settings" src="../img/android/android-settings-150x150.jpg"/> </a>
63
+    </p>
64
+    
65
+    <a id="ProxySettings"></a>
66
+    <h2><a class="anchor" href="#ProxySettings">Paramètres de proxy et configuration
67
+    </a></h2>
68
+    <br />
69
+    <p>
70
+    Orbot offre trois interfaces pour accéder au réseau Tor:
71
+    <ul>
72
+    <li>SOCKS 4A/5 proxy 127.0.0.1:9050</li>
73
+    <li>HTTP proxy 127.0.0.1:8118 </li>
74
+    <li>Proxy transparent (sur certains appareils)</li>
75
+    </ul>
76
+    </p>
77
+    
78
+    <a id="Notes"></a>
79
+    <h2><a class="anchor" href="#Notes">Notes spécifiques à cette platforme</a></h2>
80
+    <br />
81
+    <p>
82
+    Pour les appareils Android 1.x (G1, MyTouch3G, Hero, Droid Eris, Cliq,
83
+    Moment):
84
+    <ul>
85
+    <li>Le navigateur "ProxySurf" disponible sur l'Android Market permet d'utiliser
86
+    un proxy. Paramétrez simplement le proxy HTTP avec l'adresse '127.0.0.1' et
87
+    le port '8118'.</li>
88
+    <li>En ce qui concerne la messagerie instantanée, vous pouvez essayer "Beem"
89
+    disponible sur le marché et de paramétrer le proxy sur SOCKS5 '127.0.0.1' et
90
+    sur le port '9050'.</li>
91
+    </ul>
92
+    </p>
93
+    <p>
94
+    Pour les appareils Android 2.x: Droid, Nexus One
95
+    <ul>
96
+    <li>Vous devez être disposer du mot de passe root pour qu'Orbot relaye
97
+    l'ensemble du traffic TCP de manière transparente.</li>
98
+    <li>Pour les téléphones non-modifiés et qui ne disposent pas d'un accès root,
99
+    vous devrez configurer manuellement chacune de vos applications.</li>
100
+    <li>Si vous disposez du mot de passe root, que votre appareil soit basé sur
101
+    Android 1.x ou 2.x , Orbot relayera automatiquement tout le traffic vers les
102
+    ports 80 et 443 ainsi que l'intégralité des requêtes DNS de manière
103
+    transparente. Cela inclus le navigateur web interne, Gmail, YouTube, Maps et
104
+    toutes les applications qui utilisent le trafic web standard.</li>
105
+    </ul>
106
+    </p>
107
+    
108
+    <a id="Source"></a>
109
+    <h2><a class="anchor" href="#Source">Accès au code source</a></h2>
110
+    <br />
111
+    <p>
112
+    L'intégralité du code source est disponible sur le <a
113
+    href="https://svn.torproject.org/svn/projects/android/trunk/Orbot/">dépôt
114
+    subversion Orbot</a>.
115
+    </p>
116
+    
117
+    <p>
118
+    A noter que cela ne vous installera pas forcément la dernière version stable
119
+    de Tor.  De plus, Torbutton n'est pas disponible sur le navigateur web
120
+    d'Android. Ainsi, même si ce dernier reste utile pour le contournement, il
121
+    est n'est probablement pas adapté à un de grandes exigences en matière
122
+    d'anonymat sur le web.
123
+    </p>
124
+    
125
+    <hr />
126
+    
127
+    <p>Si vous avez des suggestions pour améliorer ce document, n'hésitez pas <a
128
+    href="<page contact>">à nous les faire parvenir</a>. Merci !</p>
129
+  </div>
130
+  <!-- END MAINCOL -->
131
+  <div id = "sidecol">
132
+#include "side.wmi"
133
+#include "info.wmi"
134
+  </div>
135
+  <!-- END SIDECOL -->
136
+</div>
137
+<!-- END CONTENT -->
138
+#include <foot.wmi>   
... ...
@@ -0,0 +1,121 @@
1
+## translation metadata
2
+# Revision: $Revision: 22269 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Vidalia: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian-vidalia>">Vidalia Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="debian"></a> <a id="packages"></a>
14
+    <h2><a class="anchor" href="#debian">Vidalia sur Ubuntu ou Debian</a></h2>
15
+    <br />
16
+    
17
+    <p>
18
+    <b>N'utilisez pas les paquets du dépôt Ubuntu universe.</b> Ils ne sont pas
19
+    maintenus et sont périmés. En les utilisant, vous passez à côté de
20
+    nombreuses corrections de failles de sécurité et vous manquerez de
21
+    stabilité.
22
+    </p>
23
+    
24
+    <p>
25
+    You'll need to set up our package repository before you can fetch
26
+    Vidalia. First, you need to figure out the name of your distribution. If
27
+    you're using Ubuntu 9.10 or 10.04, it's "karmic", while 9.04 is "jaunty",
28
+    8.10 is "intrepid", and 8.04 is "hardy". If you're using Debian Etch, it's
29
+    "etch", and Debian Lenny is "lenny". Then add this line to your
30
+    <tt>/etc/apt/sources.list</tt> file:<br />
31
+    <pre>
32
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
33
+    </pre>
34
+    substituez le mot approprié (etch, lenny, sid, karmic, jaunty, intrepid,
35
+    hardy) à la place de &lt;DISTRIBUTION&gt;.
36
+    </p>
37
+    
38
+    <p>
39
+    Ensuite, ajoutez la clef gpg utilisée pour signer les paquets en lançant les
40
+    commandes suivantes sur votre shell:
41
+    <pre>
42
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
43
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
44
+    </pre>
45
+    Rafraîchissez ensuite vos sources et installez Vidalia en lançant les
46
+    commandes suivantes dans voter shell:
47
+    <pre>
48
+    apt-get update
49
+    apt-get install vidalia 
50
+    </pre>
51
+    </p>
52
+    
53
+    <p>
54
+    Maintenant, Vidalia est installé et fonctionne. Allez à <a href="<page
55
+    docs/tor-doc-unix>#polipo">la deuxième étape</a> des instructions "Vidalia
56
+    sur Linux/Unix".
57
+    </p>
58
+    
59
+    <p style="font-size: small">
60
+    Le nom DNS <code>deb.torproject.org</code> est en fait un jeu de serveurs
61
+    indépendants conservés dans une base de données DNS tournante.  Si pour une
62
+    raison quelconque, vous ne pouvez y accéder, vous pouvez utiliser l'un des
63
+    noms spécifiques à la place. Essayez avec
64
+    <code>deb-master.torproject.org</code>, <code>mirror.netcologne.de</code> ou
65
+    <code>vidalia.mirror.youam.de</code>.
66
+    </p>
67
+    
68
+    <hr />
69
+    
70
+    <a id="source"></a>
71
+    <h2><a class="anchor" href="#source">Construire à partir des sources</a></h2>
72
+    <br />
73
+    
74
+    <p>
75
+    Si vous désirez construire vos propres paquets deb à partir des sources,
76
+    vous devez ajouter la bonne configuration <tt>deb-src</tt> à votre fichier
77
+    <tt>sources.list</tt>.
78
+    <pre>
79
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
80
+    </pre>
81
+    Vous aurez également besoin d'installer les paquets nécéssaires à la
82
+    construction des paquets debian et des paquets de Vidalia.
83
+    <pre>
84
+    apt-get install build-essential fakeroot devscripts qt4-dev-tools qt4-designer libqt4-dev g++ cmake
85
+    apt-get build-dep vidalia
86
+    </pre>
87
+    Ensuite, vous pouvez lancer la construction de Vidalia dans
88
+    ~/debian-packages!
89
+    <pre>
90
+    mkdir ~/debian-packages; cd ~/debian-packages
91
+    apt-get source vidalia
92
+    cd vidalia-*
93
+    debuild -rfakeroot -uc -us
94
+    cd ..
95
+    </pre>
96
+    Maintenant, vous pouvez installer le nouveau paquet:
97
+    <pre>
98
+    sudo dpkg -i vidalia_*.deb
99
+    </pre>
100
+    </p>
101
+    
102
+    <p>
103
+    Maintenant, Vidalia est installé et fonctionne. Allez à <a href="<page
104
+    docs/tor-doc-unix>#polipo">la deuxième étape</a> des instructions "Vidalia
105
+    sur Linux/Unix".
106
+    </p>
107
+    
108
+    <hr />
109
+    
110
+    <p>Si vous avez des suggestions pour améliorer le contenu de ce document, merci
111
+    <a href="<page about/contact>">de nous les faire parvenir</a>. Merci !</p>
112
+  </div>
113
+  <!-- END MAINCOL -->
114
+  <div id = "sidecol">
115
+#include "side.wmi"
116
+#include "info.wmi"
117
+  </div>
118
+  <!-- END SIDECOL -->
119
+</div>
120
+<!-- END CONTENT -->
121
+#include <foot.wmi>   
... ...
@@ -0,0 +1,189 @@
1
+## translation metadata
2
+# Revision: $Revision: 22268 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian>">Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="debian"></a>
14
+    <h2><a class="anchor" href="#debian">Option un: Tor sur Debian lenny, Debian
15
+    sid, ou Debian testing</a></h2>
16
+    <br />
17
+    
18
+    <p>
19
+    If you're using Debian stable (lenny), unstable (sid), or testing (squeeze),
20
+    just run<br />
21
+    <tt>apt-get install tor tor-geoipdb</tt> as root.
22
+    </p>
23
+    
24
+    <p>
25
+    Attention, cela n'installe pas forcément la toute dernière version stable de
26
+    Tor. Néanmoins, vous recevrez d'importantes corrections de failles de
27
+    sécurité. Pour être certain d'utiliser la dernière version stable de Tor,
28
+    utilisez la deuxième option ci-dessous.
29
+    </p>
30
+    
31
+    <p>
32
+    Désormais, Tor est installé et fonctionne. Rendez-vous à <a href="<page
33
+    docs/tor-doc-unix>#polipo">l'étape deux</a> des instructions "Tor sur
34
+    Linux/Unix".
35
+    </p>
36
+    
37
+    <hr />
38
+    
39
+    <a id="ubuntu"></a> <a id="packages"></a>
40
+    <h2><a class="anchor" href="#ubuntu">Option deux: Tor sur Ubuntu ou Debian</a></h2>
41
+    <br />
42
+    
43
+    <p>
44
+    <b>N'utilisez pas les paquets du dépôt universe d'Ubuntu.</b> Ils ne sont
45
+    pas maintenus et sont périmés. Cela signifie que vous manquerez de stabilité
46
+    et de correction de failles de sécurité.
47
+    </p>
48
+    
49
+    <p>
50
+    You'll need to set up our package repository before you can fetch
51
+    Tor. First, you need to figure out the name of your distribution. If you're
52
+    using Ubuntu 9.10 or 10.04, it's "karmic", while 9.04 is "jaunty", 8.10 is
53
+    "intrepid", and 8.04 is "hardy". If you're using Debian Etch, it's "etch",
54
+    and Debian Lenny is "lenny". Then add this line to your
55
+    <tt>/etc/apt/sources.list</tt> file:<br />
56
+    <pre>
57
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
58
+    </pre>
59
+    ou vous substituez le nom de votre distribution (etch, lenny, sid, karmic,
60
+    jaunty, intrepid, hardy ou n'importe quoi d'autre) à la place de
61
+    &lt;DISTRIBUTION&gt;.
62
+    </p>
63
+    
64
+    <p>
65
+    Ajoutez alors la clef gpg utilisée pour signer les paquets en lançant les
66
+    commandes suivantes dans votre shell:
67
+    <pre>
68
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
69
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
70
+    </pre>
71
+    Maintenant, vous pouvez rafraîchir vos sources et installer Tor en lançant
72
+    les commandes suivantes dans votre shell:
73
+    <pre>
74
+    apt-get update
75
+    apt-get install tor tor-geoipdb
76
+    </pre>
77
+    </p>
78
+    
79
+    <p>
80
+    Désormais, Tor est installé et fonctionne. Rendez-vous à <a href="<page
81
+    docs/tor-doc-unix>#polipo">l'étape deux</a> des instructions "Tor sur
82
+    Linux/Unix".
83
+    </p>
84
+    
85
+    <p style="font-size: small">
86
+    Le nom DNS <code>deb.torproject.org</code> est en fait un ensemble de
87
+    serveurs indépendants dans une configuration DNS round-robin.  Si pour une
88
+    raison, vous ne pouvez pas y accéder, vous pouvez utiliser le nom d'un
89
+    serveur dans la liste suivante à la place.  Essayez
90
+    <code>deb-master.torproject.org</code>, <code>mirror.netcologne.de</code> ou
91
+    <code>tor.mirror.youam.de</code>.
92
+    </p>
93
+    
94
+    <hr />
95
+    
96
+    <a id="development"></a>
97
+    <h2><a class="anchor" href="#development">Option trois: Utiliser la branche de
98
+    développement de Tor sur Debian ou Ubuntu</a></h2>
99
+    <br />
100
+    
101
+    <p>If you want to use the <a href="<page download/download>#packagediff">development
102
+    branch</a> of Tor instead (more features and more bugs), you need to add a
103
+    different set of lines to your <tt>/etc/apt/sources.list</tt> file:<br />
104
+    <pre>
105
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
106
+    deb     http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
107
+    </pre>
108
+    ou vous substituez, une fois de plus, le nom de votre distribution (etch,
109
+    lenny, sid, karmic, jaunty, intrepid, hardy) à la place de
110
+    &lt;DISTRIBUTION&gt;.
111
+    </p>
112
+    
113
+    <p>
114
+    Lancez ensuite les commandes qui suivent dans vote shell:
115
+    <pre>
116
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
117
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
118
+    apt-get update
119
+    apt-get install tor tor-geoipdb
120
+    </pre>
121
+    </p>
122
+    
123
+    <p>
124
+    Désormais, Tor est installé et fonctionne. Rendez-vous à <a href="<page
125
+    docs/tor-doc-unix>#polipo">l'étape deux</a> des instructions "Tor sur
126
+    Linux/Unix".
127
+    </p>
128
+    
129
+    <hr />
130
+    
131
+    <a id="source"></a>
132
+    <h2><a class="anchor" href="#source">Construire à partir du code source</a></h2>
133
+    <br />
134
+    
135
+    <p>
136
+    Si vous désirez construire vos propres paquets deb à partir des fichiers
137
+    sources, vous devez d'abord ajouter un <tt>deb-src</tt> approprié à
138
+    <tt>sources.list</tt>.
139
+    <pre>
140
+    # For the stable version.
141
+    # For the unstable version.
142
+    
143
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
144
+    
145
+    
146
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
147
+    deb-src http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
148
+    </pre>
149
+    Vous avez également besoin d'installer les paquets nécessaires pour
150
+    construire vos propres paquets deb ainsi que les paquets requis pour
151
+    construire Tor:
152
+    <pre>
153
+    apt-get install build-essential fakeroot devscripts
154
+    apt-get build-dep tor
155
+    </pre>
156
+    Maintenant, vous pouvez construire Tor dans ~/debian-packages:
157
+    <pre>
158
+    mkdir ~/debian-packages; cd ~/debian-packages
159
+    apt-get source tor
160
+    cd tor-*
161
+    debuild -rfakeroot -uc -us
162
+    cd ..
163
+    </pre>
164
+    Maintenant, vous pouvez installer le nouveau paquet:
165
+    <pre>
166
+    sudo dpkg -i tor_*.deb
167
+    </pre>
168
+    </p>
169
+    
170
+    <p>
171
+    Désormais, Tor est installé et fonctionne. Rendez-vous à <a href="<page
172
+    docs/tor-doc-unix>#polipo">l'étape deux</a> des instructions "Tor sur
173
+    Linux/Unix".
174
+    </p>
175
+    
176
+    <hr />
177
+    
178
+    <p>Si vous avez des suggestions pour améliorer ce document, merci de <a
179
+    href="<page about/contact>">nous en faire part</a>. Merci !</p>
180
+  </div>
181
+  <!-- END MAINCOL -->
182
+  <div id = "sidecol">
183
+#include "side.wmi"
184
+#include "info.wmi"
185
+  </div>
186
+  <!-- END SIDECOL -->
187
+</div>
188
+<!-- END CONTENT -->
189
+#include <foot.wmi>   
... ...
@@ -0,0 +1,88 @@
1
+## translation metadata
2
+# Revision: $Revision: 21907 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: CentOS/Fedora/OpenSUSE Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/rpms>">RPMs</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="rpms"></a>
14
+    <h2><a class="anchor" href="#rpms">Paquets Tor pour les distributions basées sur
15
+    RPM.</a></h2>
16
+    <br />
17
+    
18
+    <p>N'utilisez pas les paquets des dépôts officiels. Ils sont très souvent
19
+    périmés et vous ne bénéficieriez pas de corrections de sécurité et de
20
+    stabilité.
21
+    </p>
22
+    
23
+    <p>
24
+    Vous aurez besoin de configurer votre dépôt de paquets avant de récupérer
25
+    Tor.  En assumant que yum utilise le fichier /etc/yum.repos.d/, créez un
26
+    fichier nommé torproject.repo.  Editez ce fichier avec les informations
27
+    suivantes:
28
+    <pre>[torproject]
29
+    name=Tor and Vidalia
30
+    enabled=1
31
+    autorefresh=0
32
+    baseurl=http://deb.torproject.org/torproject.org/rpm/DISTRIBUTION/
33
+    type=rpm-md
34
+    gpgcheck=1
35
+    gpgkey=http://deb.torproject.org/torproject.org/rpm/RPM-GPG-KEY-torproject.org
36
+    </pre>
37
+    
38
+    Si vous désirez suivre les versions stables de Tor, vous devriez remplacer
39
+    le mot DISTRIBUTION par l'un des mots suivants: centos4, centos5, fc10,
40
+    fc11, fc12, suse</p>
41
+    
42
+    <p>Pour suivre les versions expérimentales, remplacez le mot DISTRIBUTION avec
43
+    l'un des mots suivants: centos4-experimental, centos5-experimental,
44
+    fc10-experimental, fc11-experimental, fc12-experimental, suse-experimental</p>
45
+    
46
+    <p>
47
+    Maintenant, Tor est installé et fonctionne. Allez à <a href="<page
48
+    docs/tor-doc-unix>#polipo">la deuxième étape</a> des instructions "Tor sur
49
+    Linux/Unix".
50
+    </p>
51
+    
52
+    <p style="font-size: small">
53
+    Le nom DNS <code>deb.torproject.org</code> est en fait un jeu de serveurs
54
+    indépendant dans une configuration DNS round robin.  Si pour une raison ou
55
+    une autre, vous ne pouvez pas y accéder, vous pouvez utiliser le nom d'un
56
+    des serveurs à la place.  Essayez avec
57
+    <code>deb-master.torproject.org</code>, <code>mirror.netcologne.de</code> ou
58
+    <code>tor.mirror.youam.de</code>.
59
+    </p>
60
+    
61
+    <hr />
62
+    
63
+    <hr />
64
+    
65
+    <a id="source"></a>
66
+    <h2><a class="anchor" href="#source">Compiler à partir des sources</a></h2>
67
+    <br />
68
+    
69
+    <p>
70
+    Si vous désirez compiler à partir des sources, merci de suivre <a
71
+    href="<gitblob>doc/tor-rpm-creation.txt">les instructions de création des
72
+    RPM</a>.
73
+    </p>
74
+    
75
+    <hr />
76
+    
77
+    <p>Si vous avez des suggestions pour améliorer le contenu de ce document, merci
78
+    <a href="<page about/contact>">de nous les faire parvenir</a>. Merci !</p>
79
+  </div>
80
+  <!-- END MAINCOL -->
81
+  <div id = "sidecol">
82
+#include "side.wmi"
83
+#include "info.wmi"
84
+  </div>
85
+  <!-- END SIDECOL -->
86
+</div>
87
+<!-- END CONTENT -->
88
+#include <foot.wmi>   
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,221 @@
1
+## translation metadata
2
+# Revision: $Revision: 22305 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Mac OS X Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-osx>">Mac OS X Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Utiliser le client <a href="<page index>">Tor</a> sous Mac OS X</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>Notez que ce sont les instructions d'installation pour utiliser le client
18
+    Tor sous MacOSX. Si vous désirez installer un relais Tor pour agrandir le
19
+    réseau (n'hésitez pas), lisez la page <a href="<page
20
+    docs/tor-doc-relay>">Configurer un serveur</a>.</b>
21
+    </p>
22
+    
23
+    <hr />
24
+    <a id="installing"></a>
25
+    <h2><a class="anchor" href="#installing">Étape une : Télécharger et installer
26
+    Tor</a></h2>
27
+    <br />
28
+    
29
+    <p>
30
+    The install for Macintosh OS X bundles <a href="<page index>">Tor</a>, <a
31
+    href="<page projects/vidalia>">Vidalia</a> (a graphical interface for Tor), <a
32
+    href="<page projects/torbutton>">Torbutton</a>, and <a
33
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (a web
34
+    proxy)  into one package, with the four applications pre-configured to work
35
+    together.  Download either the <a
36
+    href="../<package-osx-bundle-stable>">stable</a> or the <a
37
+    href="../<package-osx-bundle-alpha>">experimental</a> version of the OS X
38
+    bundle for Intel, or look for more options on the <a href="<page
39
+    download/download>">download page</a>.
40
+    </p>
41
+    
42
+    <p>Une fois que vous avez téléchargé le fichier dmg, double-cliquez dessus pour
43
+    le monter.  Naviguez sur le Pack Vidalia qui est maintenant ouvert dans
44
+    Finder.  L'installation de ce pack est facile: glissez-déposez l'icône en
45
+    oignon de Vidalia dans le répertoire Applications.  Optionnellement,
46
+    double-cliquez sur le script "install torbutton" et laissez torbutton
47
+    s'installer dans Firefox.  Vous pouvez également récupérer Torbutton depuis
48
+    le site des extensions Mozilla en recherchant "torbutton".</p>
49
+    
50
+    <p>Une fois l'installation terminée, vous pouvez lancer Vidalia en
51
+    sélectionnant son icône depuis le répertoire "Applications". Un oignon noir
52
+    avec une croix rouge signifie que Tor n'est pas actif. Vous pouvez le
53
+    démarrer en sélectionnant "Start" dans le menu « Tor » en haut de votre
54
+    écran. 
55
+    </p>
56
+    
57
+    <p>Lorsque Tor est lancé, l'icône Vidalia ressemble à ce qui suit : 
58
+    </p>
59
+    
60
+    <p><img alt="vidalia running tor"
61
+    src="../img/screenshot-osx-vidalia.png"
62
+    border="1"/></p>
63
+    
64
+    <p>Polipo est installé avec le reste du paquet Tor. Une fois qu'il est
65
+    installé, il sera démarré automatiquement au prochain redémarrage de votre
66
+    machine.  Il n'est pas nécessaire de configurer Polipo pour utiliser Tor
67
+    &mdash; une version adaptée pour Tor de Polipo a été installée avec le reste
68
+    du paquet.
69
+    </p>
70
+    
71
+    <hr />
72
+    <a id="using"></a>
73
+    <h2><a class="anchor" href="#using">Étape deux : Configurer vos applications
74
+    pour utiliser Tor</a></h2>
75
+    <br />
76
+    
77
+    <p>Après l'installation, vous aurez besoin de configurer vos applications pour
78
+    les utiliser. La première étape est de configurer le navigateur web.</p>
79
+    
80
+    <p>Vous devriez utiliser Tor avec Firefox et Torbutton, pour une meilleur
81
+    sécurité.  Torbutton a été installé pour vous.  Cliquez sur le bouton rouge
82
+    "Tor Disabled" pour l'activer, et vous êtes prêt :  </p>
83
+    
84
+    <p><img alt="Torbutton plugin for Firefox"
85
+    src="../img/screenshot-torbutton.png"
86
+    border="1"/></p>
87
+    
88
+    <p>
89
+    Si vous envisagez de faire tourner Firefox sur un ordinateur différent de
90
+    celui qui fait tourner Tor, jetez un œil à <a
91
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">l'entrée
92
+    FAQ traitant de l'utilisation de Tor sur un ordinateur différent</a>.
93
+    </p>
94
+    
95
+    <p>Pour torréfier d'autres applications qui savent utiliser des proxys HTTP, il
96
+    suffit de leur indiquer de passer par Polipo (c'est à dire "localhost" sur
97
+    le port "8118"). Pour celles qui utilisent SOCKS directement (messagerie
98
+    instantanée, Jabber, IRC, etc), vous pouvez les faire passer directement par
99
+    Tor ("localhost", port "9050"), mais consultez d'abord <a
100
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">cette
101
+    entrée de la FAQ</a> qui vous indiquera quels sont les risques que cela
102
+    comporte. Pour les applications qui n'utilisent ni SOCKS ni HTTP, jetez un
103
+    oeil à <a href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a>
104
+    ou <a href="http://www.dest-unreach.org/socat/">socat</a>.</p>
105
+    
106
+    <p>Pour davantage d'information sur comment torréfier d'autres applications,
107
+    consultez <a
108
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">le
109
+    HOWTO Torréfaction</a>. 
110
+    </p>
111
+    
112
+    <hr />
113
+    <a id="verify"></a>
114
+    <h2><a class="anchor" href="#verify">Étape trois : s'assurer que ça
115
+    fonctionne</a></h2>
116
+    <br />
117
+    
118
+    <p>
119
+    Ensuite, vous devriez essayer d'utiliser votre navigateur avec Tor et vous
120
+    assurer que votre adresse IP est bien anonymisée. Cliquez sur <a
121
+    href="https://check.torproject.org/">le détecteur Tor</a> et voyez s'il
122
+    pense que vous passez par Tor ou non. (si ce site est inaccessible,
123
+    consultez <a
124
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">cette
125
+    entrée de la FAQ</a> pour davantage de suggestions sur le sujet des tests de
126
+    votre noeud Tor.) 
127
+    </p>
128
+    
129
+    <p>Si vous avez un pare-feu personnel qui limite la capacité de votre
130
+    ordinateur à se connecter à lui même, assurez vous de permettre les
131
+    connexions à vos applications locales aux ports 8118 et 9050. Si votre
132
+    pare-feu bloque les connexions sortantes, faites un trou pour qu'il puisse
133
+    au moins se connecter sur les ports 80 et 443, et lisez <a
134
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">cette
135
+    entrée de la FAQ</a>.
136
+    </p>
137
+    
138
+    <p>Si ça ne marche toujours pas, consultez <a
139
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">cette
140
+    entrée de la FAQ</a> pour quelques astuces.</p>
141
+    
142
+    <p>
143
+    Une fois que tout fonctionne, vous pouvez apprendre en davantage sur <a
144
+    href="<page download/download>#Warning">ce que Tor peut et ne peut pas offrir</a>. 
145
+    </p>
146
+    
147
+    <hr />
148
+    <a id="server"></a> <a id="relay"></a>
149
+    <h2><a class="anchor" href="#relay">Étape quatre : configurer Tor comme
150
+    relais</a></h2>
151
+    <br />
152
+    
153
+    <p>Le réseau Tor repose sur des contributeurs qui fournissent de la bande
154
+    passante. Plus il y a de gens qui font tourner un noeuds, plus le réseau
155
+    sera rapide. Si vous avez au moins 20 kilo octets/s dans chaque sens, aidez
156
+    Tor en configurant votre logiciel en tant que noeud. Nous avons plusieurs
157
+    options qui rendent Tor facile et agréable, par exemple la limitation de
158
+    bande passante consommée, les contrôles sur ports de sortie pour que vous
159
+    puissiez limiter votre exposition aux utilisations abusives, et le support
160
+    des adresses dynamiques.</p>
161
+    
162
+    <p>Avoir des relais dans plein de lieux différents sur Internet c'est ce qui
163
+    sécurise les utilisateurs. Cela peut également <a
164
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">vous
165
+    apporter d'avantage d'anonymat</a>, puisque les sites distants ne peuvent
166
+    pas savoir si une connexion vient de votre ordinateur ou si elle est relayée
167
+    d'un autre.</p>
168
+    
169
+    <p>Lisez d'avantage sur le guide <a href="<page docs/tor-doc-relay>">Configurer
170
+    un noeud</a> </p>
171
+    
172
+    <hr />
173
+    <a id="uninstall"></a>
174
+    <h2><a class="anchor" href="#uninstall">Comment désinstaller Tor et Privoxy</a></h2>
175
+    <br />
176
+    
177
+    <p>Il existe deux moyens de désinstaller le pack de votre ordinateur: en
178
+    utilisant Finder ou bien en utilisant la ligne de commande ou un
179
+    désinstalleur en mode Terminal.  Voici comment procéder pour supprimer Tor
180
+    sur OSX:</p>
181
+    
182
+    <p>Mettez les paramètres d'origine sur votre proxy.  Si vous souhaitez
183
+    simplement ne plus passer par Tor, vous pouvez vous arrêter là.</p>
184
+    
185
+    <p>Si vous désirez complètement supprimer Tor , et que votre compte dispose des
186
+    privilèges d'administrateur, procédez comme suit :</p>
187
+    
188
+    <ol>
189
+    <li>Ouvrez Finder et cliquez sur Applications.</li>
190
+    <li>Glissez /Applications/Vidalia dans la Corbeille.</li>
191
+    <li>Supprimez /Library/Torbutton de votre système.</li>
192
+    <li>Dans votre répertoire home, allez dans Library, supprimez le répertoire
193
+    Vidalia</li>
194
+    </ol>
195
+    
196
+    <p>Tor, Vidalia, and Polipo sont maintenant complètement supprimés de votre
197
+    système.</p>
198
+    
199
+    <p>Si vous êtes familier de la ligne de commande ou du Terminal, vous pouvez
200
+    supprimer manuellement ce qui suit:</p>
201
+    <ul>
202
+    <li>/Applications/Vidalia.app/</li>
203
+    <li>/Library/Torbutton/</li>
204
+    <li>~/Library/Vidalia</li>
205
+    <li>~/.tor</li>
206
+    </ul>
207
+    
208
+    <hr />
209
+    
210
+    <p>Si vous avez des suggestions pour étoffer ce document, n'hésitez pas <a
211
+    href="<page about/contact>">à nous les faire parvenir</a>. Merci !</p>
212
+  </div>
213
+  <!-- END MAINCOL -->
214
+  <div id = "sidecol">
215
+#include "side.wmi"
216
+#include "info.wmi"
217
+  </div>
218
+  <!-- END SIDECOL -->
219
+</div>
220
+<!-- END CONTENT -->
221
+#include <foot.wmi>   
... ...
@@ -0,0 +1,328 @@
1
+## translation metadata
2
+# Revision: $Revision: 22144 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Relay Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-relay>">Configure Tor Relay</a>
11
+  </div> 
12
+  <div id="maincol">   
13
+    <h1>Configurer un relais Tor</h1>
14
+    
15
+    
16
+    <!-- BEGIN SIDEBAR -->
17
+    <div class="sidebar-left">
18
+    <h3>Étapes de configuration</h3>
19
+    <ol>
20
+    <li><a href="<page docs/tor-doc-relay>#install">Télécharger &amp; Installer</a></li>
21
+    <li><a href="<page docs/tor-doc-relay>#setup">Configuration</a></li>
22
+    <li><a href="<page docs/tor-doc-relay>#check">Vérifier &amp; Confirmer</a></li>
23
+    <li><a href="<page docs/tor-doc-relay>#after">Étapes terminales</a></li>
24
+    </ol>
25
+    </div>
26
+    
27
+    
28
+    <!-- END SIDEBAR -->
29
+    <hr />
30
+    
31
+    <p>
32
+    Le réseau Tor repose sur des contributeurs qui fournissent de la bande
33
+    passante. Plus il y aura de personnes que feront tourner un relais, plus le
34
+    réseau sera rapide. Si vous avez au moins 20 kilo-octets/s dans chaque sens,
35
+    aidez Tor en configurant votre logiciel comme relais. Nous avons plusieurs
36
+    options qui rendent les relais de Tor facile et agréable à mettre en place,
37
+    par exemple <a href="<page docs/faq>#RelayFlexible">la limitation de bande
38
+    passante consommée, le contrôle sur ports de sortie pour que vous puissiez
39
+    limiter votre exposition aux plaintes, et le support des adresses IP
40
+    dynamiques</a>.
41
+    </p>
42
+    
43
+    <p>Vous pouvez faire tourner un relais Tor sur pratiquement <a
44
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayOS">n'importe
45
+    quel système d'exploitation</a>. Les relais Tor fonctionnent mieux sur
46
+    Linux, OS X à partir de Tiger, FreeBSD 5.x+, NetBSD 5.x+, et Windows Server
47
+    2003 ou plus.
48
+    </p>
49
+    
50
+    <hr /> <a id="zero"></a> <a id="install"></a>
51
+    <h2><a class="anchor" href="#install">Première étape: télécharger et installer
52
+    Tor</a></h2>
53
+    <br />
54
+    
55
+    <p>Avant de commencer, vous devez vous assurer que Tor fonctionne
56
+    correctement. 
57
+    </p>
58
+    
59
+    <p>Visitez notre <a href="<download/page easy-download>">page de téléchargement</a> et
60
+    installez le paquet complet pour votre système d'exploitation.
61
+    </p>
62
+    
63
+    <p>Si vous pensez que c'est utile, vous pouvez également utiliser Tor comme un
64
+    client pour être sûr qu'il fonctionne.</p>
65
+    
66
+    <hr /> <a id="setup"></a>
67
+    <h2><a class="anchor" href="#setup">Deuxième étape: le paramétrer comme
68
+    relais</a></h2>
69
+    <br />
70
+    <ol>
71
+    <li>Vérifiez que votre horloge est à l'heure. Si possible, synchronisez là sur
72
+    un <a href="http://en.wikipedia.org/wiki/Network_Time_Protocol">serveur de
73
+    temps</a> public. 
74
+    </li>
75
+    
76
+    <li><strong>Configurer Tor à l'aide de l'interface graphique de
77
+    Vidalia</strong>:
78
+    <ol>
79
+    
80
+    <li>
81
+    	<dt>Faîtes un clic droit sur l'icône de Vidalia dans votre barre de tâches.
82
+    Choisissez <tt>Panneau de Contrôle</tt>.</dt>
83
+    	<dd><img alt="Menu bouton droit de Vidalia"
84
+    src="../img/screenshot-win32-vidalia.png"></dd>
85
+    </li>
86
+    
87
+    <li>Cliquez sur <tt>Configuration du Relais</tt>.</li>
88
+    
89
+    <li>
90
+    	<dt>Choisir <tt>Relayer le trafic pour le réseau Tor</tt> si vous voulez devenir
91
+    un relais public (recommandé), ou choisissez 		<tt>Aidez les utilisateurs
92
+    censurés à se connecter au réseau Tor</tt> si vous désirez devenir une <a
93
+    href="<page docs/faq>#RelayOrBridge">passerelle</a> pour les utilisateurs situés
94
+    dans des pays qui censurent Internet.</dt>
95
+    <dd><img alt="Paramètres de base de Vidalia"
96
+    src="../img/screenshot-win32-configure-relay-1.png"></dd>
97
+    </li>
98
+    
99
+    <li>Entrer un surnom pour votre relais, et vos informations de contact au cas où
100
+    nous aurions besoin de vous faire remonter des problèmes.</li>
101
+    
102
+    <li>Choisissez <tt>Tenter de configurer automatiquement la translation de
103
+    port</tt>.  Appuyez sur le bouton <tt>Test</tt> pour voir si ça fonctionne.
104
+    Si ça marche, super. Sinon, voyez le point 3 ci-dessous.</li>
105
+    
106
+    <li><dt>Choisisser le panneau <tt>Limitation de bande passante</tt>.  Sélectionnez
107
+    combien de bande passante vous souhaitez fournir aux utilisateurs comme à
108
+    vous même.</dt>
109
+    <dd><img alt="Limites de bande passante sous vidalia"
110
+    src="../img/screenshot-win32-configure-relay-2.png"></dd>
111
+    </li> 
112
+    
113
+    <li><dt>Choisissez le panneau <tt>Politique de sortie</tt>.  Si vous souhaitez
114
+    autoriser d'autres personnes à utiliser votre relais pour ces services, ne
115
+    changez rien.  Décochez les services que vous ne souhaitez pas <a
116
+    href="<page docs/faq>#ExitPolicies">autoriser à travers votre relais</a>.  Si
117
+    vous ne souhaitez pas être un relais de sortie décochez tous les services.</dt>
118
+    <dd><img alt="Politiques de sortie de Vidalia"
119
+    src="../img/screenshot-win32-configure-relay-3.png"></dd>
120
+    </li>
121
+    
122
+    <li>Cliquez sur le bouton <tt>Valider</tt>.  Consultez la troisième étape pour
123
+    confirmer que votre relais fonctionne correctement.</li>
124
+    </ol>
125
+    
126
+    <br /> <strong>Configuration Manuelle</strong>:
127
+    <ul>
128
+    <li>Éditez la partie basse de votre <a
129
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">fichier
130
+    torrc</a>. Si vous désirez être un relais public (recommandé), assurez vous
131
+    de définir au moins la variable ORPort et jeter un oeil à <a href="<page
132
+    docs/faq>#ExitPolicies">ExitPolicy</a>. Si vous désirez être <a href="<page
133
+    faq>#RelayOrBridge">une passerelle</a> pour les utilisateurs situés dans des
134
+    pays qui censurent Internet, utilisez <a href="<page
135
+    docs/bridges>#RunningABridge">ces quelques lignes</a>.
136
+    </li>
137
+    
138
+    </ul></li>
139
+    
140
+    <li>Si vous utilisez un pare-feu, ouvrez y un trou de manière à ce que les
141
+    connexions entrantes puissent atteindre le port que vous avez configuré
142
+    (ORPort, et DirPort si vous l'avez activé). Si vous avez un pare-feu
143
+    matériel (un boitier Linksys, un modem câble, etc...) vous aurez besoin de
144
+    <a href="http://portforward.com/">portforward.com</a>. Assurez vous qu'il
145
+    autorise toutes les connexions <em>sortantes</em> pour que votre relais
146
+    puisse atteindre les autres relais Tor. 
147
+    </li>
148
+    
149
+    <li>Relancer votre relais. S'il <a
150
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">trace
151
+    n'importe quel dysfonctionnement</a>, faites nous en part.
152
+    </li>
153
+    
154
+    <li>Inscrivez vous à la liste de diffusion <a
155
+    href="http://archives.seul.org/or/announce/">or-announce</a>. Il y a
156
+    relativement peu de messages, et elle vous tiendra informé des nouvelles
157
+    versions stables. Vous devriez aussi envisager de vous inscrire aux <a
158
+    href="<page docs/documentation>#MailingLists">listes de diffusions de Tor</a>
159
+    avec un trafic plus important.
160
+    </li>
161
+    
162
+    </ol>
163
+    
164
+    <hr /> <a id="check"></a>
165
+    <h2><a class="anchor" href="#check">Troisième étape s'assurer que ça
166
+    fonctionne</a></h2>
167
+    <br />
168
+    
169
+    <p>Dès que votre relais va tenter de se connecter au réseau, il va essayer de
170
+    déterminer si le port que vous avez configuré est joignable de
171
+    l'extérieur. Ceci peut prendre jusqu'à 20 minutes. Jetez un œil sur les <a
172
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">entrées
173
+    de logs</a> du genre <tt>Self-testing indicates your ORPort is reachable
174
+    from the outside. Excellent</tt>. Si vous ne voyez pas ce message, ça
175
+    signifie que votre relais n'est pas joignable de l'extérieur &mdash; vous
176
+    devriez revérifier vos pare-feux, vérifier qu'il teste l'adresse IP et le
177
+    port que vous pensez qu'il devrait tester, etc. 
178
+    </p>
179
+    
180
+    <p>Lorsque votre relais a décidé qu'il était joignable, il envoie un
181
+    "descripteur de serveur" aux annuaires. Ceci permettra aux clients de
182
+    connaître l' adresse, les ports, les clés, etc que votre relais
183
+    utilise. Vous pouvez manuellement <a
184
+    href="http://194.109.206.212/tor/status/authority">télécharger l'un des
185
+    états du réseau</a> et voir si vous y trouvez le nom que vous avez
186
+    configuré, pour être certain de sa présence. Vous aurez probablement à
187
+    attendre quelques secondes pour avoir un rafraîchissement du répertoire.</p>
188
+    
189
+    <hr /> <a id="after"></a>
190
+    <h2><a class="anchor" href="#after">Quatrième étape: une fois que ça
191
+    fonctionne</a></h2>
192
+    <br />
193
+    
194
+    <p>
195
+    Nous recommandons de suivre les étapes suivantes : 
196
+    </p>
197
+    
198
+    <p>
199
+    6. Lisez <a
200
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/OperationalSecurity">ce
201
+    document</a> pour avoir des idées sur comment accroître la sécurité de votre
202
+    relais. 
203
+    </p>
204
+    
205
+    <p>
206
+    7. Si vous désirez faire tourner plus d'un seul relais, c'est bien mais
207
+    merci de configurer <a
208
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#MultipleRelays">l'option
209
+    MyFamily</a> dans tous les fichiers de configuration de tous vos relais.
210
+    </p>
211
+    
212
+    <p>
213
+    8. Décidez de la limitation de débit. Le câble, le xDSL, et les utilisateurs
214
+    qui ont une bande passante asymétrique (par exemple : plus de débit en
215
+    téléchargement qu'en envoi) doivent limiter leur débit à la plus petite
216
+    bande passante pour éviter les congestions. Voyez <a
217
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">l'entrée
218
+    FAQ sur la limitation du débit</a> pour plus de détails. 
219
+    </p>
220
+    
221
+    <p>
222
+    9. Sauvegardez la clé privée de votre relais Tor (stockée dans
223
+    "keys/secret_id_key" de votre DataDirectory). C'est l'« identité » de votre
224
+    relais, et prenez soin de la garder en sécurité pour que personne ne puisse
225
+    lire le trafic qui passe au travers de votre nœud. C'est un fichier critique
226
+    à conserver si vous comptez <a
227
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#UpgradeRelay">déplacer
228
+    ou restorer votre relais Tor</a> si quelque chose se passe mal. 
229
+    </p>
230
+    
231
+    <p>
232
+    
233
+    10. Si vous contrôlez le serveur de nom de votre domaine, n'hésitez pas à
234
+    paramétrer votre nom d'hôte inversé avec 'anonymous' or 'proxy' or
235
+    'tor-proxy', pour que les autres personnes voyant l'adresse dans les traces
236
+    web puissent facilement comprendre ce qui se passe. Ajoutez une <a
237
+    href="<gitblob>contrib/tor-exit-notice.html">Note de Sortie Tor</a> sur un
238
+    hôte virtuel du même nom peut simplement décourager l'envoi de plaintes à
239
+    vous et votre fournisseur d'accès Internet si vous utilisez un noeud de
240
+    sortie. 
241
+    
242
+    </p>
243
+    
244
+    <p>
245
+    11. Si votre ordinateur ne fait pas tourner de serveur web, envisagez de
246
+    changer l'option ORPort à 443 et votre DirPort à 80. Un certain nombre
247
+    d'utilisateurs Tor sont cloisonnés derrière des pare-feux qui ne leur
248
+    permettent que d'aller sur le web, et ce changement leur permettra
249
+    d'atteindre votre relais Tor. Les relais Windows peuvent simplement changer
250
+    leurs options ORPort et DirPort directement dans leur configuration torrc et
251
+    relancer Tor. Les relais OS X ou Unix ne peuvent pas attacher directement
252
+    ces ports (puisqu'ils doivent être lancé en root), alors ils doivent
253
+    paramétrer une sorte de <a
254
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients">translation
255
+    de port</a> pour que les connexions puissent atteindre leur relais Tor. Si
256
+    vos ports 80 et 443 sont déjà utilisés mais que vous souhaitez quand même
257
+    aider, d'autres sont intéressants comme les ports 22, 110, et 143. 
258
+    </p>
259
+    
260
+    <p>
261
+    12. Si votre relais Tor fournit d'autres services sur la même adresse IP
262
+    &mdash; comme par exemple un site web &mdash; assurez vous que les
263
+    connexions au serveur web sont autorisées à partir de l'hôte local
264
+    également. Cette autorisation est indispensable car les clients Tor
265
+    détecteront que le relais Tor est <a
266
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">le
267
+    chemin le plus sûr pour atteindre ce serveur web</a>, et construiront
268
+    toujours un chemin qui finira par votre relais. Si vous ne souhaitez pas
269
+    autoriser les connexions, vous devrez explicitement les rejeter dans votre
270
+    politique de sortie. 
271
+    </p>
272
+    
273
+    <p>
274
+    13. (Uniquement pour Unix). Créez un utilisateur séparé pour faire tourner
275
+    le relais. Si vous installez le paquet OS X ou deb ou rpm, ceci est déjà
276
+    fait. Sinon, vous devez le faire à la main. (Le relais Tor ne nécessite pas
277
+    d'être lancé sous root, c'est une bonne pratique de ne pas le faire. Le
278
+    lancer sous l'utilisateur 'tor' évite les problèmes avec identd et d'autres
279
+    services qui détectent le nom d'utilisateur. Si vous êtes dans le genre
280
+    paranoïaque, rien ne vous empêche <a
281
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorInChroot">de
282
+    mettre Tor dans une prison chroot</a>.) 
283
+    </p>
284
+    
285
+    <p>
286
+    14. (Uniquement pour Unix). Votre système d'exploitation limite probablement
287
+    le nombre de fichiers ouverts par processus à 1024 (voir moins). Si vous
288
+    envisagez de faire tourner un nœud de sortie rapide, ceci ne sera sans doute
289
+    pas suffisant. Sous Linux, vous devriez ajouter une ligne genre "toruser
290
+    hard nofile 8192" à votre fichier /etc/security/limits.conf (ou toruser est
291
+    l'utilisateur qui fait tourner le processus Tor), et ensuite relancer Tor
292
+    s'il est installé comme paquet (ou déconnectez vous puis reconnectez vous si
293
+    vous le lancez par vous même).
294
+    </p>
295
+    
296
+    <p>
297
+    15. Si vous avez installé Tor à partir d'un paquet ou d'une installation
298
+    automatisée, il est probable que Tor se le lance automatiquement au
299
+    démarrage du système. Mais si vous l'avez installé par les sources, vous
300
+    trouverez utiles les scripts de démarrage présents dans contrib/tor.sh ou
301
+    contrib/torctl.
302
+    </p>
303
+    
304
+    <p>
305
+    Lorsque vous changez la configuration de Tor, assurez-vous qu'il fonctionne
306
+    encore après les modifications. Assurez-vous de bien positionner votre ligne
307
+    « ContactInfo » dans le fichier torrc pour que nous puissions vous contacter
308
+    en cas de mise à jour ou si quelque chose se passait mal. Si vous avez des
309
+    problèmes ou des questions, voyez la <a href="<page
310
+    docs/documentation>#Support">section d'aide</a> ou <a href="<page
311
+    about/contact>">contactez-nous</a> sur la liste tor-ops. Merci de nous aider à
312
+    faire croître le réseau Tor !
313
+    </p>
314
+    
315
+    <hr />
316
+    
317
+    <p>Si vous avez des suggestions pour améliorer le contenu de ce document, merci
318
+    <a href="<page about/contact>">de nous les faire parvenir</a>. Merci !</p>
319
+  </div>
320
+  <!-- END MAINCOL -->
321
+  <div id = "sidecol">
322
+#include "side.wmi"
323
+#include "info.wmi"
324
+  </div>
325
+  <!-- END SIDECOL -->
326
+</div>
327
+<!-- END CONTENT -->
328
+#include <foot.wmi>   
... ...
@@ -0,0 +1,8 @@
1
+## translation metadata
2
+# Based-On-Revision: 12076
3
+# Last-Translator: fredzupy@gmail.com
4
+
5
+#include "head.wmi" CHARSET="UTF-8" TITLE="Redirecting" REDIRECT="docs/tor-doc-relay"
6
+
7
+#include <foot.wmi>
8
+
... ...
@@ -0,0 +1,192 @@
1
+    <h1>Installer un client <a href="<page index>">Tor</a> sur système
2
+    Linux/BSD/Unix</h1>
3
+    <br />
4
+    
5
+    <p>
6
+    <b>Ces instructions ne s'appliquent qu'à l'installation d'un client Tor. Si
7
+    vous voulez aider à la croissance du réseau Tor en relayant du trafic pour
8
+    les autres (ce qui est une très bonne idée), lisez <a href="<page
9
+    docs/tor-doc-relay>">le guide sur la configuration d'un noeud</a>.</b>
10
+    </p>
11
+    
12
+    <hr /> <a id="installing"></a>
13
+    <h2><a class="anchor" href="#installing">Étape 1 : Télécharger et Installer
14
+    Tor</a></h2>
15
+    <br />
16
+    
17
+    <p>
18
+    Vous pouvez trouver la dernière version de Tor sur la page de <a href="<page
19
+    download/download>">téléchargement</a>. Des paquets pour Debian, Red Hat,
20
+    Gentoo, *BSD, etc... y sont également présents. Si vous utilisez Ubuntu,
21
+    n'utilisez pas les paquets officiels de l'archive Ubuntu: utilisez <a
22
+    href="<page docs/debian>#ubuntu">notre répertoire deb</a> à la place.
23
+    </p>
24
+    
25
+    <p>Si vous compilez Tor à partir du code source, installez d'abord <a
26
+    href="http://www.monkey.org/~provos/libevent/">libevent</a>, et assurez-vous
27
+    de disposer d'openssl et de zlib (avec les paquets -devel si
28
+    possible). Tapez ensuite :<br /> <tt>tar xzf tor-<version-stable>.tar.gz; cd
29
+    tor-<version-stable><br /> ./configure &amp;&amp; make</tt><br /> Vous
30
+    pouvez maintenant lancer tor depuis <tt>src/or/tor</tt>, ou bien vous pouvez
31
+    l'installer dans /usr/local/ avec <tt>make install</tt> (en root si
32
+    nécessaire), ce qui vous permettra de le lancer en tapant simplement
33
+    <tt>tor</tt>.
34
+    </p>
35
+    
36
+    <p>Tor est préconfiguré par défaut en tant que client. Le fichier de
37
+    configuration qu'il utilise par défaut conviendra à la plupart des
38
+    utilisateurs. Tor est maintenant installé. 
39
+    </p>
40
+    
41
+    <hr /> <a id="privoxy"></a> <a id="polipo"></a>
42
+    <h2><a class="anchor" href="#polipo">Étape 2 : Installer Polipo pour la
43
+    navigation web</a></h2>
44
+    <br />
45
+    
46
+    <p>Une fois Tor installé, vous devez configurer vos applications pour
47
+    l'utiliser. 
48
+    </p>
49
+    
50
+    <p>
51
+    Il faut tout d'abord s'occuper de la navigation web. Commencez par installer
52
+    <a href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> depuis
53
+    votre dépôt préféré. Polipo est un proxy cache web filtrant qui gère
54
+    correctement les files http; il est bien adapté à la latence de
55
+    Tor. Assurez-vous de disposer d'au moins la version 1.0.4 de Polipo car les
56
+    versions antérieures ne gère pas le protocole SOCKS indispensable pour que
57
+    Polipo puisse fonctionner avec Tor. Vous devriez dès maintenant désinstaller
58
+    privoxy (e.g. apt-get remove privoxy ou yum remove privoxy) de manière à ce
59
+    qu'ils n'y ait pas de conflit entre les deux.
60
+    </p>
61
+    
62
+    <p>Une fois  Polipo installé (par un paquet, ou par les sources), <b>il vous
63
+    faudra configurer  Polipo pour utiliser Tor</b>. Récupérez notre <a
64
+    href="https://svn.torproject.org/svn/torbrowser/trunk/build-scripts/config/polipo.conf">configuration
65
+    de Polipo pour Tor</a> et copiez la dans votre fichier de configuration de
66
+    polipo (ex: /etc/polipo/config ou ~/.polipo).  Vous aurez besoin de
67
+    redémarrer Polipo pour les changements prennent effet. Par exemple:<br />
68
+    <tt>/etc/init.d/polipo restart</tt>
69
+    </p>
70
+    
71
+    <p>Si vous le préférez, vous pouvez utiliser Privoxy à la place avec <a
72
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">cet
73
+    exemple de fichier de configuration</a>. Mais étant donné que les fichiers
74
+    de configuration de Polipo et de Privoxy font appel au port 8118, vous ne
75
+    devriez pas les faire tourner tous les deux en même temps.</p>
76
+    
77
+    <hr /> <a id="using"></a>
78
+    <h2><a class="anchor" href="#using">Étape 3 : Configurer vos applications pour
79
+    utiliser Tor</a></h2>
80
+    <br />
81
+    
82
+    <p>Une fois Tor installé, vous devez configurer vos applications pour
83
+    l'utiliser.</p>
84
+    
85
+    <p>Vous devriez utiliser Tor avec Firefox et Torbutton pour plus de sécurité.
86
+    Installez tout simplement <a
87
+    href="https://addons.mozilla.org/firefox/2275/">l'extension Torbutton</a>,
88
+    redémarrer Firefox et c'est terminé :
89
+    </p>
90
+    
91
+    <img alt="Torbutton plugin for Firefox"
92
+    src="../img/screenshot-torbutton.png" border="1"> <br />
93
+    
94
+    <p>
95
+    Si vous envisagez d'utiliser Firefox sur un ordinateur différent de Tor,
96
+    jetez un œil à <a
97
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">l'entrée
98
+    FAQ traitant de l'utilisation de Tor sur un ordinateur différent</a>.
99
+    </p>
100
+    
101
+    <p>Pour Torréfier d'autres applications qui gèrent les proxies HTTP, faites les
102
+    simplement utiliser Polipo (c'est à dire, localhost port 8118). Pour
103
+    utiliser SOCKS directement (pour la messagerie instantanée, Jabber, IRC,
104
+    etc), faites pointer votre application directement sur Tor (localhost port
105
+    9050), mais consultez <a
106
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">cet
107
+    article de la FAQ</a> pour comprendre en quoi cela peut être dangereux. Pour
108
+    les applications qui ne gèrent ni SOCKS, ni le HTTP, vous pouvez utiliser <a
109
+    href="http://tsocks.sourceforge.net/">tsocks</a> ou <a
110
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>.
111
+    </p>
112
+    
113
+    <p>Vous pouvez trouver des informations sur la Torréfaction d'autres
114
+    applications sur <a
115
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">le
116
+    HOWTO Torréfaction</a.
117
+    </p>
118
+    
119
+    <hr /> <a id="verify"></a>
120
+    <h2><a class="anchor" href="#verify">Étape 4 : Vérifier que ça fonctionne</a></h2>
121
+    <br />
122
+    
123
+    <p>
124
+    <!--PO4ASHARPBEGIN<a href="http://ipchicken.com/">
125
+    this site</a>PO4ASHARPEND-->
126
+    #to see what IP address it thinks you're using.
127
+    Vous devriez ensuite essayer d'utiliser votre navigateur avec Tor, et
128
+    vérifier que votre adresse IP est anonyme. Rendez vous sur <a
129
+    href="https://check.torproject.org/">le détecteur Tor</a>, vous verrez s'il
130
+    pense que vous utilisez Tor ou non.  (Si ce site ne marche pas, voyez <a
131
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">cet
132
+    article de la FAQ</a> pour des suggestions supplémentaires sur la manière de
133
+    tester Tor.)
134
+    </p>
135
+    
136
+    <p>Si vous avez un pare-feu personnel qui limite la possibilité de votre
137
+    ordinateur à se connecter en local (par exemple SELinux sur Fedora Core 4),
138
+    assurez vous de permettre les connexions de vos applications vers Polipo
139
+    (local port 8118) et Tor (local port 9050). Si votre pare-feu bloque les
140
+    connexions sortantes, faites une brèche dedans pour pouvoir vous connecter
141
+    au moins sur les ports 80 et 443, et consultez ensuite <a
142
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">cet
143
+    article de la FAQ</a>.  Si votre configuration de SELinux ne permet pas à
144
+    tor ou privoxy de fonctionner correctement, créez un fichier nommé
145
+    booleans.local dans votre répertoire /etc/selinux/targeted.  Éditez le avec
146
+    votre éditeur de texte favori, et écrivez "allow_ypbind=1".  Redémarrez
147
+    votre machine pour que cette modification prenne effet. 
148
+    </p>
149
+    
150
+    <p>Si cela ne fonctionne toujours pas, consultez <a
151
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">cet
152
+    article de la FAQ</a>.</p>
153
+    
154
+    <hr /> <a id="server"></a> <a id="relay"></a>
155
+    <h2><a class="anchor" href="#relay">Étape 5 : Configurer Tor en tant que
156
+    relais</a></h2>
157
+    <br />
158
+    
159
+    <p>Le réseau Tor se base sur des volontaires qui fournissent de la bande
160
+    passante. Plus il y a de personnes qui font tourner de relais, plus le
161
+    réseau Tor sera rapide. Si vous disposez d'au moins 20 Ko/s dans chaque sens
162
+    (débit montant et descendant), vous pouvez aider Tor en configurant votre
163
+    noeud Tor en tant que relais. Nous avons beaucoup de fonctionnalités qui
164
+    rendent les relais Tor simples et pratiques, comme la gestion des adresses
165
+    IP dynamiques, ou la limitation de la bande passante maximale et les
166
+    politiques de sortie afin que vous puissiez limiter votre exposition aux
167
+    possibles plaintes suite à une utilisation abusive de Tor.</p>
168
+    
169
+    <p>Tor est un système dont la sécurité dépend de la diversité des lieux
170
+    géographiques où tournent les relais. Faire tourner un relais <a
171
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">renforce
172
+    votre anonymat</a>, car les sites distants ne peuvent pas savoir si les
173
+    connexions proviennent de votre ordinateur, ou si vous les avez juste
174
+    relayées depuis un autre endroit.</p>
175
+    
176
+    <p>Pour en savoir plus, consultez le guide de <a href="<page
177
+    docs/tor-doc-relay>">configuration d'un relais</a>.</p>
178
+    
179
+    <hr />
180
+    
181
+    <p>Si vous avez des suggestions pour améliorer ce document, merci de <a
182
+    href="<page about/contact>">nous les envoyez</a>. Merci !</p>
183
+  </div>
184
+  <!-- END MAINCOL -->
185
+  <div id = "sidecol">
186
+#include "side.wmi"
187
+#include "info.wmi"
188
+  </div>
189
+  <!-- END SIDECOL -->
190
+</div>
191
+<!-- END CONTENT -->
192
+#include <foot.wmi>   
... ...
@@ -0,0 +1,61 @@
1
+## translation metadata
2
+# Revision: $Revision: 21511 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: Configuring your browser to use Tor" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-web>">Configure Your Browser</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h1>Configurer votre navigateur pour l'utilisation de <a href="<page
14
+    index>">Tor</a></h1>
15
+    <br />
16
+    
17
+    <p>Si vous utilisez Firefox (ce que nous recommandons), vous n'avez pas besoin
18
+    de cette page.  Installez simplement le <a
19
+    href="https://addons.mozilla.org/firefox/2275/">Plugiciel Torbutton</a>,
20
+    relancez Firefox, et c'est tout :
21
+    </p>
22
+    
23
+    <img alt="Plugiciel Torbutton pour Firefox"
24
+    src="../img/screenshot-torbutton.png" border="1"/> <br />
25
+    
26
+    <p>Sinon, vous devez configurer manuellement les paramètres du mandataire de
27
+    votre navigateur.  <br/>Dans Mozilla et Firefox sous Windows, ceci est dans
28
+    Outils - Options - Général - Paramètres de connexion.  <br/>Dans Firefox
29
+    sous OS X, c'est - Firefox - Préférences - Général - Paramètres de
30
+    connexion.  <br/>Dans Firefox sous Linux, c'est dans Édition - Préférences -
31
+    Avancées - Proxy.  <br/>Dans Opera c'est Fichier - Préférences - Réseau -
32
+    Serveurs proxy.  <br/>Dans IE, c'est Outils - Options Internet - Connexions
33
+    - Paramètres Réseau - cocher Serveur proxy - Avancé.</p>
34
+    
35
+    <img alt="Paramètres Proxy dans Firefox"
36
+    src="../img/screenshot-win32-firefox-proxies.jpg" />
37
+    
38
+    <p>
39
+    Vous devriez remplir "localhost" et "8118" sur les quatres protocoles du
40
+    haut pour pointer sur Polipo, comme montré ici. (Même si Polipo ne supporte
41
+    pas les protocoles FTP et Gopher, <a
42
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">vous
43
+    devriez les mettre aussi tout de même</a>.) Vous devriez également remplir
44
+    le mandataire socks Pour pointer direcrement sur Tor ("localhost", "9050",
45
+    et socks5)  pour couvrir l'ensemble des protocoles au delà des quatres
46
+    premiers. Puis cliquer sur "OK".</p>
47
+    
48
+    <hr />
49
+    
50
+    <p>Si vous avez des commentaires pour améliorer ce document, n'hésitez pas à <a
51
+    href="<page about/contact>">nous écrire</a>. Merci !</p>
52
+  </div>
53
+  <!-- END MAINCOL -->
54
+  <div id = "sidecol">
55
+#include "side.wmi"
56
+#include "info.wmi"
57
+  </div>
58
+  <!-- END SIDECOL -->
59
+</div>
60
+<!-- END CONTENT -->
61
+#include <foot.wmi>   
... ...
@@ -0,0 +1,9 @@
1
+## translation metadata
2
+# Based-On-Revision: 13195
3
+# Last-Translator: fredzupy@gmail.com
4
+
5
+#include "head.wmi" CHARSET="UTF-8" TITLE="Redirection"
6
+REDIRECT="docs/tor-doc-windows"
7
+
8
+#include <foot.wmi>
9
+
... ...
@@ -0,0 +1,199 @@
1
+## translation metadata
2
+# Revision: $Revision: 21995 $
3
+# Translation-Priority: 1-high
4
+
5
+#include "head.wmi" TITLE="Tor Project: MS Windows Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-windows>">Windows Client</a>
11
+  </div> 
12
+  <div id="maincol">  
13
+    <h1>Installer et utiliser le client <a href="<page index>">Tor</a> sous MS
14
+    Windows</h1>
15
+    <br />
16
+    
17
+    <p>
18
+    <b>Notez que ce sont les instructions d'installation pour utiliser le client
19
+    Tor sous MS Windows (2000, XP, Vista, 7, et les éditions Serveur).  Si vous
20
+    voulez installer un relais Tor pour faire grandir le réseau (n'hésitez pas
21
+    !), lisez le guide <a href="<page docs/tor-doc-relay>">Configurer un
22
+    serveur</a>.</b>
23
+    </p>
24
+    
25
+    <p>Freedom House a produit une vidéo qui montre comment installer Tor.  Vous
26
+    pouvez la regarder sur <a
27
+    href="http://media.torproject.org/video/2009-install-and-use-tor.ogv">How to
28
+    install Tor on Windows</a>.  Vous connaissez une meilleure vidéo ou une
29
+    traduite dans votre lague ? Dites-le nous !</p>
30
+    
31
+    <div class="center">
32
+    <p><video id="v1" src="http://media.torproject.org/video/2009-install-and-use-tor.ogv" autobuffer="true" controls="controls"></video></p>
33
+    </div>
34
+    
35
+    <hr /> <a id="installing"></a>
36
+    <h2><a class="anchor" href="#installing">Étape un : Télécharger et installer
37
+    Tor</a></h2>
38
+    <br />
39
+    
40
+    <p>
41
+    L'installateur pour MS Windows contient <a href="<page index>">Tor</a>, <a
42
+    href="<page projects/vidalia>">Vidalia</a> (Une interface graphique pour Tor),
43
+    <a href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> (une
44
+    extension pour Mozilla Firefox), et <a
45
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (un proxy
46
+    web filtrant) en un seul paquet, avec ces quatres applications
47
+    pré-configurées pour fonctionner ensemble. Téléchargez soit la version <a
48
+    href="../<package-win32-bundle-stable>">stable</a>, soit la version <a
49
+    href="../<package-win32-bundle-alpha>">expérimentale</a> du paquet Windows,
50
+    ou consultez les autres options sur <a href="<page download/download>">la  page de
51
+    téléchargement</a>. 
52
+    </p>
53
+    
54
+    <img alt="tor installer splash page"
55
+    src="../img/screenshot-win32-installer-splash.png" />
56
+    
57
+    <p>Si vous aviez précédemment installé Tor, Vidalia ou Polipo, vous pouvez
58
+    désélectionner les composants dont vous n'avez pas besoin dans la fenêtre
59
+    présentée ci-dessous.
60
+    </p>
61
+    
62
+    <img alt="select components to install"
63
+    src="../img/screenshot-win32-installer-components.png" />
64
+    
65
+    <p>Une fois que vous aurez terminé l'installation, les composants logiciels que
66
+    vous aurez sélectionnés seront automatiquement démarrés pour vous. 
67
+    </p>
68
+    
69
+    <p>Tor est configuré en client par défaut. Il utilise un fichier de
70
+    configuration par défaut que la majorité des utilisateurs n'ont pas besoin
71
+    de modifier. Tor est maintenant installé.
72
+    </p>
73
+    
74
+    <hr /> <a id="using"></a>
75
+    <h2><a class="anchor" href="#using">Étape deux : Configurer vos applications
76
+    pour qu'elles utilisent Tor</a></h2>
77
+    <br />
78
+    
79
+    <p>Après avoir installé Tor et Polipo, vous devez configurer vos applications
80
+    pour les utiliser. La prochaine action consiste à configurer le navigateur
81
+    web. </p>
82
+    
83
+    <p>Vous devriez utiliser Tor avec Firefox et Torbutton, pour une meilleur
84
+    assurance. Le Pack d'installation installe le <a
85
+    href="https://addons.mozilla.org/firefox/2275/">l'extension Torbutton</a>
86
+    pour vous. Redémarrez votre Firefox et c'est tout : 
87
+    </p>
88
+    
89
+    <img alt="Torbutton plugin for Firefox"
90
+    src="../img/screenshot-torbutton.png" border="1"/> <br />
91
+    
92
+    <p>
93
+    Si vous envisagez de faire tourner Firefox sur un ordinateur différent de
94
+    celui de Tor, consultez <a
95
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">l'entrée
96
+    de la FAQ sur comment faire tourner Tor sur un ordinateur différent</a>. 
97
+    </p>
98
+    
99
+    <p>Pour "Torréfier" d'autres application qui savent utiliser des proxys HTTP,
100
+    il suffit de leur indiquer de passer par Polipo (c'est à dire "localhost"
101
+    sur le port "8118"). Pour celles qui utilisent SOCKS directement (messagerie
102
+    instantanée, Jabber, IRC, etc.), vous pouvez les faire passer directement
103
+    par Tor ("localhost", port "9050"), mais regardez d'abord <a
104
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">cette
105
+    entrée de la FAQ</a> qui vous dira les risques que cela comporte. Pour les
106
+    applications qui n'utilisent ni SOCKS ni HTTP, jetez un oeil à SocksCap ou à
107
+    <a href="http://www.freecap.ru/eng/">FreeCap</a>. (FreeCap est un logiciel
108
+    libre; SocksCap est propriétaire.)</p>
109
+    
110
+    <p>Pour davantage d'informations sur "comment torréfier d'autres applications",
111
+    regardez <a
112
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">le
113
+    HOWTO Torréfaction</a>. 
114
+    </p>
115
+    
116
+    <hr /> <a id="verify"></a>
117
+    <h2><a class="anchor" href="#verify">Étape trois : S'assurer que ça
118
+    fonctionne</a></h2>
119
+    <br />
120
+    
121
+    <p>
122
+    Vérifiez que Vidalia est fonctionel.  Vidalia utilise un petit oignon vert
123
+    pour indiquer que Tor fonctionne ou un oignon gris avec un "X" rouge lorsque
124
+    Tor ne fonctionne pas. Vous pouvez démarrer ou arrêter Tor en effectuant un
125
+    clic-droit sur l'icône de Vidalia dans votre barre des tâches et en
126
+    sélectionnant "Démarrer" ou "Arrêter" depuis le menu présenté ci-dessous:
127
+    </p>
128
+    
129
+    <img alt="Vidalia Tray Icon" src="../img/screenshot-win32-vidalia.png"/>
130
+    
131
+    <p>
132
+    Ensuite, vous devriez essayer votre navigateur web avec Tor activé pour vous
133
+    assurer que votre adresse IP est anonymisée. Cliquez sur le <a
134
+    href="https://check.torproject.org/">Tor detector</a> et voyez si vous
135
+    utilisez bien Tor ou non.  (Si le site n'est pas disponible, regardez cette
136
+    <a
137
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">rubrique
138
+    de la FAQ</a> pour trouver d'autres moyens de tester le fonctionnement de
139
+    votre client Tor.) 
140
+    </p>
141
+    
142
+    <p>Si vous avez un pare-feu personnel qui empêche votre ordinateur de se
143
+    connecter à lui-même, assurez-vous d'autoriser les connexions depuis vos
144
+    applications locales vers les ports local "8118" et "9050". Si votre
145
+    pare-feu bloque les connexions sortantes, ouvrez-le un peu, au moins pour
146
+    les ports "TCP 80" et "TCP 443", et ensuite regardez <a
147
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">cette
148
+    rubrique de la FAQ</a>. 
149
+    </p>
150
+    
151
+    <p>Si ça ne marche toujours pas, allez-voir <a
152
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">cette
153
+    rubrique de la FAQ</a> pour trouver des conseils.</p>
154
+    
155
+    <p>
156
+    Une fois que cela fonctionne, apprenez en plus sur <a href="<page
157
+    download/download>#Warning">ce que Tor propose et ne propose pas</a>. 
158
+    </p>
159
+    
160
+    <hr /> <a id="server"></a> <a id="relay"></a>
161
+    <h2><a class="anchor" href="#relay">Étape quatre : Configurez Tor en mode
162
+    relais</a></h2>
163
+    <br />
164
+    
165
+    <p>Le réseau Tor repose sur les personnes volontaires pour donner de la bande
166
+    passante. Plus il y aura de personnes qui hébergent des relais Tor, plus le
167
+    réseau Tor sera rapide. Si vous avez au moins 20ko/s symétriques, aidez le
168
+    réseau Tor en configurant votre Tor en mode relais également. Nous avons
169
+    implanté de nombreuses options pour faire que ce ne soit pas une grosse
170
+    contrainte, par exemple la possibilité de fixer la bande-passante utilisée,
171
+    celle de définir les règles de sorties du réseau Tor de manière à limiter
172
+    les risques d'être ennuyé par des plaintes, ainsi que la gestion des
173
+    connexions à adresses IP dynamiques. </p>
174
+    
175
+    <p>C'est le fait d'avoir des relais partout sur internet qui sécurise son
176
+    utilisation. C'est aussi <a
177
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">avantageux
178
+    pour son propre anonymat</a> d'héberger un noeud Tor , car les sites
179
+    distants auxquels vous vous connectez personnellement ne pourront pas savoir
180
+    si c'est vous qui vous connectez ou si vous ne faites que relayer les
181
+    connexions d'autres.</p>
182
+    
183
+    <p>Pour plus d'informations, lire le guide : <a href="<page
184
+    docs/tor-doc-relay>">Configurer un relais</a>. </p>
185
+    
186
+    <hr />
187
+    
188
+    <p>Si vous avez des suggestions à faire pour améliorer ce document, <a
189
+    href="<page about/contact>">envoyez-nous un message</a>. Merci !</p>
190
+  </div>
191
+  <!-- END MAINCOL -->
192
+  <div id = "sidecol">
193
+#include "side.wmi"
194
+#include "info.wmi"
195
+  </div>
196
+  <!-- END SIDECOL -->
197
+</div>
198
+<!-- END CONTENT -->
199
+#include <foot.wmi>   
... ...
@@ -0,0 +1,286 @@
1
+## translation metadata
2
+# Revision: $Revision: 22314 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Hidden Service Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-hidden-service>">Tor Hidden Service</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h1>Configurer des Services Cachés pour <a href="<page index>">Tor</a></h1>
14
+    <hr />
15
+    
16
+    <p>Tor permet aux clients et aux relais d'offrir des services cachés. Ainsi,
17
+    vous pouvez rendre disponible un serveur web, un serveur SSH, etc., sans
18
+    avoir à révéler votre adresse IP aux utilisateurs. Et même, du fait que vous
19
+    n'utilisez pas d'adresse publique, vous pouvez faire tourner un service
20
+    caché derrière votre pare-feu.
21
+    </p>
22
+    
23
+    <p>If you have Tor installed, you can see hidden services in action by visiting
24
+    <a href="http://duskgytldkxiuqc6.onion/">our example hidden service</a>.
25
+    </p>
26
+    
27
+    <p>Ce « howto » décrit les étapes pour paramétrer votre propre site web en
28
+    service caché. Si vous désirez plus de détails techniques sur le
29
+    fonctionnement du protocole de service caché, consultez notre page sur <a
30
+    href="<page docs/hidden-services>">le protocole de service caché</a>.
31
+    </p>
32
+    
33
+    <hr />
34
+    <a id="zero"></a>
35
+    <h2><a class="anchor" href="#zero">Étape zéro : s'assurer que Tor fonctionne</a></h2>
36
+    <br />
37
+    
38
+    <p>Avant de commencer, il est nécessaire de s'assurer que :</p>
39
+    <ol>
40
+    <li>Tor est lancé et fonctionne ;</li>
41
+    <li>Vous l'avez configuré correctement.</li>
42
+    </ol>
43
+    
44
+    
45
+    <p>Les utilisateurs Windows devraient suivre le <a href="<page
46
+    docs/tor-doc-windows>">howto Windows</a>, les utilisateurs d'OS X devraient
47
+    regarder le <a href="<page docs/tor-doc-osx>">howto OS X</a>, et les
48
+    utilisateurs Linux/BSD/Unix devraient suivre le <a href="<page
49
+    docs/tor-doc-unix>">howto Unix</a>.
50
+    </p>
51
+    
52
+    <p>Une fois que vous avez installé et configuré Tor, vous pouvez accéder à des
53
+    services cachés actifs sur le web en visitant <a
54
+    href="http://duskgytldkxiuqc6.onion/">notre exemple de service caché</a> ou
55
+    <a href="http://gaddbiwdftapglkq.onion/">le service caché Wikileaks</a>.  Ça
56
+    prend généralement de 10 à 60 secondes pour charger (ou décider de
57
+    l'inaccessibilité).  Si ça ne fonctionne pas immédiatement et que votre
58
+    navigateur envoie une alerte disant que "www.duskgytldkxiuqc6.onion ne peut
59
+    pas être trouvé, merci de vérifier le nom et de réessayer." alors vous
60
+    n'avez pas configuré Tor correctement ; consultez <a
61
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">l'entrée
62
+    « ça ne marche pas » de la FAQ</a> pour plus d'aide. 
63
+    </p>
64
+    
65
+    <hr />
66
+    <a id="one"></a>
67
+    <h2><a class="anchor" href="#one">Première étape : installer un serveur Web
68
+    localement</a></h2>
69
+    <br />
70
+    
71
+    <p>Premièrement, vous avez besoin de configurer un serveur web
72
+    local. Paramétrer un serveur web peut s'avérer délicat, nous n'allons donc
73
+    que survoler les bases ici. Si vous n'y arrivez pas ou cherchez à en faire
74
+    plus, demandez à un ami de vous aider. Nous vous recommandons d'installer un
75
+    serveur web séparé pour votre service caché, puisque même si vous en avez
76
+    déjà un d'installé, vous l'utilisez peut-être déjà (ou planifiez de
77
+    l'utiliser plus tard) pour un usage différent. 
78
+    </p>
79
+    
80
+    <p>Si vous êtes sous Unix ou OS X et que vous vous sentez à l'aise avec la
81
+    ligne de commande, le plus simple, et de loin, est d'installer <a
82
+    href="http://www.acme.com/software/thttpd/">thttpd</a>. Rapatriez juste la
83
+    dernière archive, décompressez la (elle créé son propre répertoire), et
84
+    lancez <kbd>./configure &amp;&amp; make</kbd>. Puis <kbd>mkdir hidserv; cd
85
+    hidserv</kbd>, et lancez <kbd>../thttpd -p 5222 -h localhost</kbd>. Vous
86
+    devriez retrouver le prompt, et à ce stade vous êtes en train de faire
87
+    tourner un serveur web sur le port 5222. Vous pouvez mettre des fichiers
88
+    dans le répertoire hidserv.
89
+    </p>
90
+    
91
+    <p>Si vous êtes sous Windows, vous devriez prendre <a
92
+    href="http://savant.sourceforge.net/">Savant</a> ou <a
93
+    href="http://httpd.apache.org/">Apache</a>, et vous assurer que vous l'avez
94
+    mis en écoute uniquement sur localhost. Vous devriez aussi connaître le port
95
+    sur lequel vous écoutez, parce que vous allez l'utiliser plus tard. 
96
+    </p>
97
+    
98
+    <p>(La raison pour laquelle nous connectons le serveur web seulement sur
99
+    localhost est de s'assurer qu'il ne sera pas accessible publiquement. Si des
100
+    gens peuvent se connecter directement, ils pourraient confirmer que votre
101
+    ordinateur est bien celui qui offre le service caché.) 
102
+    </p>
103
+    
104
+    <p>Une fois votre serveur web paramétré, assurez-vous qu'il fonctionne : ouvrez
105
+    votre navigateur et allez sur <a
106
+    href="http://localhost:5222/">http://localhost:5222/</a>, où 5222 est le
107
+    port que vous avez choisi plus haut. Puis, essayez de mettre un fichier dans
108
+    le repertoire html principal, et assurez-vous que vous pouvez y accéder. 
109
+    </p>
110
+    
111
+    <hr />
112
+    <a id="two"></a>
113
+    <h2><a class="anchor" href="#two">Deuxième étape : configurer votre service
114
+    caché</a></h2>
115
+    <br />
116
+    
117
+    <p>Ensuite, vous devez configurer votre service caché pour qu'il pointe sur
118
+    votre serveur web local.
119
+    </p>
120
+    
121
+    <p>Premièrement, ouvrez votre fichier torrc dans votre éditeur de texte
122
+    favoris. (Consultez <a
123
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">la
124
+    FAQ torrc</a> pour plus d'information.) Allez au milieu du fichier et
125
+    cherchez la ligne</p>
126
+    
127
+    <pre>
128
+    \############### This section is just for location-hidden services ###
129
+    </pre>
130
+    
131
+    <p>
132
+    Cette section du fichier consiste en un groupe de lignes, chacune
133
+    représentant un service caché. Actuellement elles sont toutes en commentaire
134
+    (les lignes commençant par #), ainsi les services cachés sont
135
+    désactivés. Chaque groupe de lignes consiste en une ligne
136
+    <var>HiddenServiceDir</var>, et une ou plus <var>HiddenServicePort</var> : </p>
137
+    <ul>
138
+    <li><var>HiddenServiceDir</var> is a directory where Tor will store information
139
+    about that hidden service.  In particular, Tor will create a file here named
140
+    <var>hostname</var> which will tell you the onion URL.  You don't need to
141
+    add any files to this directory. Make sure this is not the same directory as
142
+    the hidserv directory you created when setting up thttpd, as your
143
+    HiddenServiceDir contains secret information!</li>
144
+    <li><var>HiddenServicePort</var> vous permet de spécifier un port virtuel (c'est
145
+    celui que les gens penseront utiliser en accédant à votre service) et une
146
+    adresse IP et un port pour les redirections vers ce port virtuel.</li>
147
+    </ul>
148
+    
149
+    <p>Ajoutez les lignes suivantes dans votre torrc : 
150
+    </p>
151
+    
152
+    <pre>
153
+    HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
154
+    HiddenServicePort 80 127.0.0.1:5222
155
+    </pre>
156
+    
157
+    <p>You're going to want to change the <var>HiddenServiceDir</var> line, so it
158
+    points to an actual directory that is readable/writeable by the user that
159
+    will be running Tor. The above line should work if you're using the OS X Tor
160
+    package. On Unix, try "/home/username/hidden_service/" and fill in your own
161
+    username in place of "username". On Windows you might pick:</p>
162
+    <pre>
163
+    HiddenServiceDir C:\Documents and Settings\username\Application Data\hidden_service\\
164
+    HiddenServicePort 80 127.0.0.1:5222
165
+    </pre>
166
+    
167
+    <p>Maintenant sauvegardez votre torrc, coupez votre Tor, et ensuite redémarrez
168
+    le.
169
+    </p>
170
+    
171
+    <p>Si Tor redémarre, c'est génial ! Sinon, quelque chose se passe
172
+    mal. Premièrement regardez les logs pour avoir des pistes. Il devrait y
173
+    avoir des avertissements ou des erreurs. Ça devrait vous donner une idée du
174
+    pourquoi ça se passe mal. Souvent des erreurs de frappe dans le fichier
175
+    torrc ou de droits d'accès aux répertoires. (Voyez <a
176
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">la FAQ
177
+    sur les logs</a> si vous ne savez pas comment les activer ou bien où les
178
+    trouver.) 
179
+    </p>
180
+    
181
+    <p>Quand Tor se lance, il doit automatiquement créer le
182
+    <var>HiddenServiceDir</var> que vous avez spécifié (si nécessaire), et il
183
+    devrait y créer deux fichiers.</p>
184
+    
185
+    <dl>
186
+    <dt><var>private_key</var></dt>
187
+    <dd>Premièrement, Tor va générer une nouvelle paire de clés publique/privée pour
188
+    votre service caché, et les écrire dans un fichier appelé "private_key". Ne
189
+    partagez pas cette clé avec d'autre ; si vous le faite ils peuvent découvrir
190
+    qui fait fonctionner votre service caché.</dd>
191
+    <dt><var>hostname</var></dt>
192
+    <dd>L'autre fichier qui va être créé s'appelle "hostname". Il contient un court
193
+    résumé de votre clé publique -- ça devrait ressembler à quelque chose comme
194
+    <tt>duskgytldkxiuqc6.onion</tt>. C'est le nom public pour votre service, et
195
+    vous pouvez l'annoncer à d'autre gens, le publier, le mettre sur votre carte
196
+    de visite, etc.</dd>
197
+    </dl>
198
+    
199
+    <p>Si Tor tourne sous un utilisateur différent du votre, par exemple sous OS X,
200
+    Debian, or Red Hat, vous devrez devenir root pour être autorisé à consulter
201
+    ces fichiers.</p>
202
+    
203
+    <p>Maintenant que vous avez redémarré Tor, il collecte des points
204
+    d'introduction dans le réseau Tor, et génère ce qui est appelé un
205
+    <em>descripteur de service caché</em>, qui est une liste de points
206
+    d'introduction signée avec la pleine clé publique. Il publie ce descripteur
207
+    anonymement aux serveurs d'annuaires, et d'autres utilisateurs peuvent
208
+    anonymement le rapatrier à partir des serveurs d'annuaires lorsqu'ils
209
+    souhaitent accéder à votre service.
210
+    </p>
211
+    
212
+    <p>Essayez maintenant : coller le contenu du fichier hostname dans votre
213
+    navigateur web. Si ça marche, vous devriez avoir la page html que vous avez
214
+    paramétré à la première étape.  Si ça ne fonctionne pas, jetez un œil dans
215
+    vos logs pour vous aider, et continuez d'essayer jusqu'à ce que ça
216
+    fonctionne. 
217
+    </p>
218
+    
219
+    <hr />
220
+    <a id="three"></a>
221
+    <h2><a class="anchor" href="#three">Troisième étape : astuces plus avancées</a></h2>
222
+    <br />
223
+    
224
+    <p>Si vous envisagez de maintenir votre service pendant quelques temps, il est
225
+    conseillé de faire une copie de votre fichier <var>private_key</var> quelque
226
+    part.
227
+    </p>
228
+    
229
+    <p>Nous avons évité de recommander Apache au dessus, a) parce que beaucoup de
230
+    personnes le font déjà tourner comme serveur public sur leur ordinateur et
231
+    b) parce que c'est un programme assez lourd et qu'li est en mesure de
232
+    révéler votre adresse IP ou des informations permettant de vous identifier à
233
+    un grand nombre d'endroits, par exemple dans les pages 404. Pour les gens
234
+    qui ont besoin de plus de fonctionnalités, Apache devrait-être la réponse
235
+    juste. Est-ce que quelqu'un pourrait faire une liste des points sensibles
236
+    pour verrouiller Apache lorsque vous l'utilisez comme service caché ? «
237
+    Savant » doit aussi avoir ce genre de problème. 
238
+    </p>
239
+    
240
+    <p>Si vous souhaitez renvoyer plusieurs ports virtuels pour un seul service
241
+    caché, ajoutez simplement plus de lignes <var>HiddenServicePort</var>. Si
242
+    vous voulez faire tourner plusieurs service cachés à partir du même client
243
+    Tor, rajoutez simplement une autre ligne <var>HiddenServiceDir</var>. Toutes
244
+    les lignes suivant le <var>HiddenServicePort</var> se réfèrent a la ligne
245
+    <var>HiddenServiceDir</var> jusqu'a ce que vous ajoutiez une autre ligne
246
+    <var>HiddenServiceDir</var> : 
247
+    </p>
248
+    
249
+    <pre>
250
+    HiddenServiceDir /usr/local/etc/tor/hidden_service/
251
+    HiddenServicePort 80 127.0.0.1:8080
252
+    
253
+    HiddenServiceDir /usr/local/etc/tor/other_hidden_service/
254
+    HiddenServicePort 6667 127.0.0.1:6667
255
+    HiddenServicePort 22 127.0.0.1:22
256
+    </pre>
257
+    
258
+    <p>Il y a quelques problèmes d'anonymat que vous devriez également garder à
259
+    l'esprit : 
260
+    </p>
261
+    <ul>
262
+    <li>Comme cité au dessus, soyez vigilant sur ce que votre serveur web révèle de
263
+    vous, de votre ordinateur, de votre emplacement géographique. Par exemple,
264
+    les lecteurs peuvent facilement déterminer s'il s'agit de thttpd ou
265
+    d'Apache, et apprendre quelque chose sur votre système d'exploitation.</li>
266
+    <li>Si votre ordinateur n'est pas en ligne en permanence, votre service caché ne
267
+    le sera pas non plus. Ceci apporte une information à un adversaire
268
+    observateur.</li>
269
+    
270
+    <!-- increased risks over time -->
271
+    </ul>
272
+    
273
+    <hr />
274
+    
275
+    <p>Si vous avez des suggestions pour améliorer ce document, n'hésitez pas à <a
276
+    href="<page about/contact>">nous écrire</a>. Merci !</p>
277
+  </div>
278
+  <!-- END MAINCOL -->
279
+  <div id = "sidecol">
280
+#include "side.wmi"
281
+#include "info.wmi"
282
+  </div>
283
+  <!-- END SIDECOL -->
284
+</div>
285
+<!-- END CONTENT -->
286
+#include <foot.wmi>   
... ...
@@ -0,0 +1,156 @@
1
+## translation metadata
2
+# Revision: $Revision: 21979 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: N900 Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/N900>">N900</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="Maemo"></a>
14
+    <h2><a class="anchor" href="#Maemo">Installare Tor su Maemo</a></h2>
15
+    <br />
16
+    <p>
17
+    If you have a Maemo device that is not the <a href="#N900">N900</a>, we
18
+    suggest you install the Tor package from the <a
19
+    href="http://maemo.org/packages/view/tor/">Maemo website</a>. The Tor
20
+    Project does not produce these packages. They are maintained by the Maemo
21
+    community.
22
+    </p>
23
+    
24
+    <a id="N900"></a>
25
+    <h2><a class="anchor" href="#N900">Installare Tor sull'N900</a></h2>
26
+    <br />
27
+    <p>
28
+    Le seguenti istruzioni dovrebbero permettere di installare un <a
29
+    href="https://garage.maemo.org/projects/tor-status">controller Tor
30
+    sperimentale</a> e Tor in pacchetti per il telefono N900. Attualmente questa
31
+    è una configurazione non adeguatamente testata:il browser non dispone di
32
+    Torbutton e non dovrebbe essere usato ancora per necessità di
33
+    anonimizzazione in alta sicurezza.
34
+    </p>
35
+    
36
+    <p>
37
+    Open the Application manager: <br /> <a href="../img/N900/1_app_menu.png">
38
+    <img border="0" alt="N900 application menu"
39
+    src="../img/N900/1_app_menu-small.png"/> </a>
40
+    </p>
41
+    
42
+    <p>
43
+    Clicca sul menù di Gestione Applicazioni in alto nello schermo: <br /> <a
44
+    href="../img/N900/2_app_manager.png"> <img border="0" alt="N900 application
45
+    manager" src="../img/N900/2_app_manager-small.png"/> </a>
46
+    </p>
47
+    
48
+    <p>
49
+    Seleziona 'Cataloghi applicazioni': <br /> <a
50
+    href="../img/N900/3_app_managermenu.png"> <img border="0" alt="N900
51
+    application catalogs" src="../img/N900/3_app_managermenu-small.png"/> </a>
52
+    </p>
53
+    
54
+    <p>
55
+    Clicca su 'Nuovo' per abilitare il catalogo di maemo extras-devel. <br />
56
+    <small>Nota: questo catalogo contiene pacchetti non testati che potrebbero
57
+    danneggiare il tuo dispositivo. <br /> Vedi <a
58
+    href="http://wiki.maemo.org/Extras-devel">Extras-devel</a> per i
59
+    dettagli. Probabilmente è preferibile disabilitare questo catalogo dopo aver
60
+    installato Tor oppure continuare a tuo rischio.</small> <br /> <a
61
+    href="../img/N900/4_catalog_list.png"> <img border="0" alt="N900 catalog
62
+    list" src="../img/N900/4_catalog_list-small.png"/> </a>
63
+    </p>
64
+    
65
+    <p>
66
+    Inserisci i seguenti dati nella sezione di aggiunta di cataloghi:
67
+    <p>
68
+    <pre>
69
+    Nome catalogo:    Extras devel
70
+    Indirizzo web:    http://repository.maemo.org/extras-devel/
71
+    Distribuzione:        fremantle
72
+    Componenti:    free non-free
73
+    </pre>
74
+    </p>
75
+    <br /> Assicurati che il bottone 'Disattivato' non sia selezionato, clicca
76
+    su 'Salva' e attendi che la lista dei pacchetti sia aggiornata.<br /> <a
77
+    href="../img/N900/5_new_catalog.png"> <img border="0" alt="N900 new catalog"
78
+    src="../img/N900/5_new_catalog-small.png"/> </a>
79
+    </p>
80
+    
81
+    <p>
82
+    Clicca su 'Installa' in Gestione Applicazioni: <br /> <a
83
+    href="../img/N900/6_app_manager.png"> <img border="0" alt="N900 app manager"
84
+    src="../img/N900/6_app_manager-small.png"/> </a>
85
+    </p>
86
+    
87
+    <p>
88
+    Seleziona la categoria 'Rete' (oppure cerca Tor): <br /> <a
89
+    href="../img/N900/7_app_categories.png"> <img border="0" alt="N900
90
+    application categories" src="../img/N900/7_app_categories-small.png"/> </a>
91
+    </p>
92
+    
93
+    <p>
94
+    Scorri fino a 'Tor Status Area Applet': <br /> <a
95
+    href="../img/N900/8_app_list.png"> <img border="0" alt="N900 application
96
+    list" src="../img/N900/8_app_list-small.png"/> </a>
97
+    </p>
98
+    
99
+    <p>
100
+    Accetta l'informativa e clicca su 'Continua': <br /> <a
101
+    href="../img/N900/9_disclaimer.png"> <img border="0" alt="N900 disclaimer"
102
+    src="../img/N900/9_disclaimer-small.png"/> </a>
103
+    </p>
104
+    
105
+    <p>
106
+    Quando l'installazione è terminata, disabilita il catalogo extras-devel e
107
+    riavvia il telefono: <br /> <a href="../img/N900/10_success.png"> <img
108
+    border="0" alt="N900 success" src="../img/N900/10_success-small.png"/> </a>
109
+    </p>
110
+    
111
+    <p>
112
+    Dopo il riavvio dell'N900 apri il menù di stato: <br /> <a
113
+    href="../img/N900/11_after_rebooting.png"> <img border="0" alt="N900 status
114
+    menu post-reboot" src="../img/N900/11_after_rebooting-small.png"/> </a>
115
+    </p>
116
+    
117
+    <p>
118
+    Seleziona 'The Onion Router' dalla lista: <br /> <a
119
+    href="../img/N900/12_status_menu.png"> <img border="0" alt="N900 status menu
120
+    selection" src="../img/N900/12_status_menu-small.png"/> </a>
121
+    </p>
122
+    
123
+    <p>
124
+    Abilita l'onion routing e clicca su 'Save': <br /> <a
125
+    href="../img/N900/13_enable_tor.png"> <img border="0" alt="N900 enabling
126
+    Tor" src="../img/N900/13_enable_tor-small.png"/> </a>
127
+    </p>
128
+    
129
+    <p>
130
+    Collegati a <a href="https://check.torproject.org/">TorCheck</a> per avere
131
+    la conferma che il traffico del browser sia istradato via Tor: <br /> <a
132
+    href="../img/N900/14_check_tor.png"> <img border="0" alt="N900 check Tor"
133
+    src="../img/N900/14_check_tor-small.png"/> </a>
134
+    </p>
135
+    
136
+    <p>
137
+    Nota che questa procedura potrebbe non renderti disponibile sempre l'ultima
138
+    versione stabile di Tor.  Inoltre, poiché il browser dell'N900 non ha a
139
+    disposizione Torbutton, rende tutto ciò utile valido per l'elusione ma
140
+    probabilmente non adatto a necessità di forte anonimizzazione del browser.
141
+    </p>
142
+    
143
+    <hr />
144
+    
145
+    <p>Se hai suggerimenti per migliorare questo documento <a  href="<page
146
+    about/contact>">scrivici</a>. Grazie!</p>
147
+  </div>
148
+  <!-- END MAINCOL -->
149
+  <div id = "sidecol">
150
+#include "side.wmi"
151
+#include "info.wmi"
152
+  </div>
153
+  <!-- END SIDECOL -->
154
+</div>
155
+<!-- END CONTENT -->
156
+#include <foot.wmi>   
... ...
@@ -0,0 +1,185 @@
1
+## translation metadata
2
+# Revision: $Revision: 22268 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian>">Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">      
13
+    <a id="debian"></a>
14
+    <h2><a class="anchor" href="#debian">Prima possibilit&agrave;: Tor su Debian lenny,
15
+    Debian sid, o Debian testing</a></h2>
16
+    <br />
17
+    
18
+    <p>
19
+    Se usi Debian stable (lenny), unstable (sid), o testing
20
+    (squeeze), esegui semplicemente<br />
21
+    <tt>apt-get install tor tor-geoipdb</tt>
22
+    </p>
23
+    
24
+    <p>
25
+    Non otterrai sempre l'ultima versione stabile di Tor, ma riceverai
26
+    gli aggiornamenti di sicurezza importanti. Per utilizzare invece
27
+    l'ultima versione stabile di Tor, vedi pi&ugrave; sotto la seconda possibilit&agrave;.
28
+    </p>
29
+    
30
+    <p>
31
+    Ora Tor &egrave; installato ed attivo. Vai al <a href="<page
32
+    docs/tor-doc-unix>#polipo">passo due</a> delle istruzioni per "Tor su Linux/Unix".
33
+    </p>
34
+    
35
+    <hr />
36
+    
37
+    <a id="ubuntu"></a>
38
+    <a id="packages"></a>
39
+    <h2><a class="anchor" href="#ubuntu">Seconda possibilit&agrave;: Tor su Ubuntu o
40
+    Debian</a></h2>
41
+    <br />
42
+    
43
+    <p>
44
+    <b>Non usare i pacchetti in Ubuntu universe.</b> Non sono mantenuti
45
+    e non sono aggiornati. Potresti non avere importanti aggiornamenti di stabilit&agrave;
46
+    e sicurezza.
47
+    </p>
48
+    
49
+    <p>
50
+    Devi anzitutto configurare un repository di pacchetti per potere installare
51
+    Tor. Per prima cosa trova il nome della tua distribuzione. Se usi 
52
+    Ubuntu 9.04, &egrave; "jaunty". Ubuntu 8.10 &egrave; "intrepid",
53
+    ed Ubuntu 8.04 &egrave; "hardy". Se usi Debian Etch, &egrave; "etch", Debian
54
+    Lenny &egrave; "lenny". Poi aggiungi al file <tt>/etc/apt/sources.list</tt>
55
+    questa riga:<br />
56
+    <pre>
57
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
58
+    </pre>
59
+    dove sostituisci il nome (etch, lenny, sid, jaunty, intrepid,
60
+    hardy) al posto di &lt;DISTRIBUTION&gt;.
61
+    </p>
62
+    
63
+    <p>
64
+    Per ora non abbiamo pacchetti per Ubuntu 9.10 (Karmic Koala), ma quelli per
65
+    Debian sid funzionano. Invece di mettere "karmic" nelle sources.list,
66
+    usa "sid".
67
+    </p>
68
+    
69
+    <p>
70
+    Esegui poi:
71
+    <pre>
72
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
73
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
74
+    apt-get update
75
+    apt-get install tor tor-geoipdb
76
+    </pre>
77
+    </p>
78
+    
79
+    <p>
80
+    Ora Tor &egrave; installato ed attivo. Vai al <a href="<page
81
+    docs/tor-doc-unix>#polipo">passo due</a> delle istruzioni"Tor su Linux/Unix"
82
+    .
83
+    </p>
84
+    
85
+    <p style="font-size: small">
86
+    Il nome DNS <code>deb.torproject.org</code> &egrave; in realt&agrave; un gruppo di server
87
+    DNS indipendenti in configurazione round robin. Se per qualche motivo non puoi
88
+    accedervi, prova ad usare il nome di uno dei suoi componenti, come
89
+    <code>deb-master.torproject.org</code>,
90
+    <code>mirror.netcologne.de</code> or
91
+    <code>tor.mirror.youam.de</code>.
92
+    </p>
93
+    
94
+    <hr />
95
+    
96
+    <a id="development"></a>
97
+    <h2><a class="anchor" href="#development">Terza possibilit&agrave;: usare la versione
98
+    di sviluppo di Tor su Debian od Ubuntu</a></h2>
99
+    <br />
100
+    
101
+    <p>Se vuoi usare la <a href="<page
102
+    download/download>#packagediff">versione di sviluppo</a> di Tor (pi&ugrave; funzionalit&agrave; e
103
+    pi&ugrave; bachi), devi aggiungere delle righe diverse al
104
+    tuo file <tt>/etc/apt/sources.list</tt>:<br />
105
+    <pre>
106
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
107
+    deb     http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
108
+    </pre>
109
+    dove sostituisci la tua distribuzione (etch, lenny, sid, jaunty,
110
+    intrepid, hardy) al posto di &lt;DISTRIBUTION&gt;.
111
+    </p>
112
+    
113
+    <p>
114
+    Poi esegui
115
+    <pre>
116
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
117
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
118
+    apt-get update
119
+    apt-get install tor tor-geoipdb
120
+    </pre>
121
+    </p>
122
+    
123
+    <p>
124
+    Ora Tor &egrave; installato ed attivo. Vai al <a href="<page
125
+    docs/tor-doc-unix>#polipo">passo due</a> delle istruzioni "Tor su Linux/Unix"
126
+    .
127
+    </p>
128
+    
129
+    <hr />
130
+    
131
+    <a id="source"></a>
132
+    <h2><a class="anchor" href="#source">Compilare dai sorgenti</a></h2>
133
+    <br />
134
+    
135
+    <p>
136
+    Se vuoi compilare i tuoi deb dai sorgenti devi aggiungere la riga
137
+    appropriata <tt>deb-src</tt> a <tt>sources.list</tt>.
138
+    <pre>
139
+    # Per la versione stabile
140
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
141
+    
142
+    # Per la versione instabile
143
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
144
+    deb-src http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
145
+    </pre>
146
+    Devi anche installare i pacchetti necessari a compilare i tuoi deb e 
147
+    Tor:
148
+    <pre>
149
+    apt-get install build-essential fakeroot devscripts
150
+    apt-get build-dep tor
151
+    </pre>
152
+    Dopodich&eacute; puoi compilare Tor in ~/debian-packages:
153
+    <pre>
154
+    mkdir ~/debian-packages; cd ~/debian-packages
155
+    apt-get source tor
156
+    cd tor-*
157
+    debuild -rfakeroot -uc -us
158
+    cd ..
159
+    </pre>
160
+    Ora puoi installare il nuovo pacchetto:
161
+    <pre>
162
+    sudo dpkg -i tor_*.deb
163
+    </pre>
164
+    </p>
165
+    
166
+    <p>
167
+    Ora Tor &egrave; installato ed attivo. Vai al <a href="<page
168
+    docs/tor-doc-unix>#polipo">passo due</a> delle istruzioni "Tor su Linux/Unix"
169
+    .
170
+    </p>
171
+    
172
+    <hr />
173
+    
174
+    <p>Se hai dei suggerimenti per migliorare questo documento, allora <a
175
+    href="<page about/contact>">diccelo</a>. Grazie!</p>
176
+  </div>
177
+  <!-- END MAINCOL -->
178
+  <div id = "sidecol">
179
+#include "side.wmi"
180
+#include "info.wmi"
181
+  </div>
182
+  <!-- END SIDECOL -->
183
+</div>
184
+<!-- END CONTENT -->
185
+#include <foot.wmi>   
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,207 @@
1
+ ## translation metadata
2
+# Revision: $Revision: 22305 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Mac OS X Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-osx>">Mac OS X Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Usare il client <a href="<page index>">Tor</a> su Mac OS X</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>Queste sono le istruzioni per installare e usare un client Tor
18
+    su Mac OS X. Se invece vuoi offrire banda e traffico per aiutare a fare crescere la rete Tor
19
+    (s&igrave;, grazie!), leggi la guida per <a
20
+     href="<page docs/tor-doc-relay>">configurare un relay</a>.</b>
21
+    </p>
22
+    
23
+    <hr />
24
+    <a id="installing"></a>
25
+    <h2><a class="anchor" href="#installing">Uno: scarica e installa Tor</a></h2>
26
+    <br />
27
+    
28
+    <p>
29
+    L'installer per Macintosh OS X comprende
30
+    <a href="<page index>">Tor</a>,
31
+    <a href="<page projects/vidalia>">Vidalia</a> (una interfaccia grafica per Tor),
32
+    <a href="<page projects/torbutton>">Torbutton</a>,
33
+    e <a href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (un proxy web)
34
+    in  un pacchetto comprendente le quattro applicazioni preconfigurate in modo
35
+    da funzionare insieme.
36
+    Scarica la versione <a href="../<package-osx-bundle-stable>">stabile</a>
37
+    o quella <a href="../<package-osx-bundle-alpha>">sperimentale</a>
38
+    del pacchetto OS X, oppure scegli tra pi&ugrave; opzioni dalla <a href="<page
39
+    download/download>">pagina di download</a>.
40
+    </p>
41
+    
42
+    <p>Una volta scaricato il file dmg, fai doppio clic per montarlo.
43
+    Vai ora al Vidalia Bundle nel Finder. &Egrave; facile installare il pacchetto, trascina semplicemente
44
+    l'icona a cipolla di Vidalia nella cartella Applicazioni. Facoltativamente, fai doppio clic sullo script
45
+    "install torbutton" ed installa torbutton in Firefox.
46
+    Puoi anche scaricare Torbutton dai componenti aggiuntivi di Mozilla facendo una ricerca per
47
+    "torbutton".</p>
48
+    
49
+    <p>Dopo aver finito l'installazione puoi avviare Vidalia selezionandone l'icona
50
+    dalla cartella Applicazioni. Una cipolla di colore scuro con una X rossa nel dock significa
51
+    che Tor non &egrave; in esecuzione. Puoi eseguire Tor selezionando Start dal menu
52
+    "Tor" nella parte superiore dello schermo.
53
+    </p>
54
+    
55
+    <p>Quando Tor &egrave; in esecuzione, l'icona del dock di Vidalia ha questo aspetto:
56
+    </p>
57
+    
58
+    <p><img alt="vidalia running tor"
59
+    src="../img/screenshot-osx-vidalia.png"
60
+    border="1"/></p>
61
+    
62
+    <p>Polipo viene installato insieme al pacchetto di installazione di Tor.
63
+    Una volta installato viene eseguito automaticamente quando
64
+    riavii il tuo computer.
65
+    Non occorre configurare Polipo per usare Tor. Infatti col pacchetto di installazione
66
+    &egrave; stata installata anche una configurazione ad hoc di Polipo per Tor.
67
+    </p>
68
+    
69
+    <hr />
70
+    <a id="using"></a>
71
+    <h2><a class="anchor" href="#using">Due: configura i tuoi programmi per usare Tor</a></h2>
72
+    <br />
73
+    
74
+    <p>Dopo avere installato Tor e Polipo, occorre configuare i propri
75
+    programmi perch&eacute; li usino. Per prima cosa configuriamo il browser web.</p>
76
+    
77
+    <p>Per una sicurezza ottimale dovresti usare Tor con Firefox e Torbutton.
78
+    Torbutton &egrave; gi&agrave; installato per te: fai clic sul pulsante "Tor disattivato" per
79
+    avviare Tor, ed &egrave; tutto:
80
+    
81
+    <p><img alt="Torbutton plugin for Firefox"
82
+    src="../img/screenshot-torbutton.png"
83
+    border="1"/></p>
84
+    
85
+    <p>
86
+    Se usi Firefox su un computer diverso da quello su cui gira Tor, leggi la <a
87
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">FAQ
88
+    per usare Tor su un computer diverso</a>.
89
+    </p>
90
+    
91
+    <p>Per usare Tor con altre applicazioni che supportano proxy HTTP, basta
92
+    puntarli a Polpipo (ovvero a localhost porta 8118). Per usare SOCKS
93
+    direttamente (per l'instant messaging, Jabber, IRC, etc), puoi puntare la tua applicazione
94
+    direttamente a Tor (localhost porta 9050), ma leggi anche <a
95
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">questa
96
+    FAQ</a> che spiega perch&eacute; pu&ograve; essere pericoloso. Per le applicazioni
97
+    che non supportano n&eacute; SOCKS n&eacute; HTTP, dai un'occhiata a <a
98
+    href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a> o a
99
+    <a href="http://www.dest-unreach.org/socat/">socat</a>.</p>
100
+    
101
+    <p>Per informazioni su come torificare altri programmi, guarda il
102
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
103
+    HOWTO</a>.
104
+    </p>
105
+    
106
+    <hr />
107
+    <a id="verify"></a>
108
+    <h2><a class="anchor" href="#verify">Tre: controlla che funzioni</a></h2>
109
+    <br />
110
+    
111
+    <p>
112
+    Ora devi provare Tor col tuo browser per controllare
113
+    che il tuo indirizzo IP sia anonimo. Fai clic sul 
114
+    <a href="https://check.torproject.org/">Tor
115
+    detector</a> e controlla se rileva che stai usando Tor oppure no
116
+    (se questo sito &egrave; gi&ugrave;, vedi <a
117
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">questa
118
+    FAQ</a> per altri modi di testare il tuo Tor).
119
+    </p>
120
+    
121
+    <p>Se hai un personal firewall che limita le connessioni del tuo pc
122
+    a se stesso, controlla che siano permesse le connessioni dalle
123
+    applicazioni locali alla porta locale 8118 e alla porta 9050. Se
124
+    il tuo firewall blocca le connessioni in uscita, permettigli di
125
+    collegarsi almeno alle porte TCP 80 e 443, poi leggi <a
126
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">questa
127
+    FAQ</a>.
128
+    </p>
129
+    
130
+    <p>Se nemmeno ora funziona, guarda <a
131
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">questa
132
+    FAQ</a> per ulteriori indicazioni.</p>
133
+    
134
+    <p>
135
+    Una volta che funziona, leggi bene
136
+    <a href="<page download/download>#Warning">che cosa Tor fa e non fa</a>.
137
+    </p>
138
+    
139
+    <hr />
140
+    <a id="server"></a>
141
+    <a id="relay"></a>
142
+    <h2><a class="anchor" href="#relay">Quattro: configura Tor come relay</a></h2>
143
+    <br />
144
+    
145
+    <p>La rete Tor funziona grazie alla banda donata dai volontari. Pi&ugrave;
146
+    persone aprono un relay, pi&ugrave; veloce sar&agrave; la rete Tor. Se hai almeno
147
+    20 kilobyte/s in download e upload, aiuta Tor e configura la tua installazione
148
+    Tor come relay. Ci sono tante funzionalit&agrave; che rendono un Tor relay facile
149
+    e pratico, come il controllo della banda, exit policy per
150
+    limitare il rischio di abusi e lamentele, e il supporto per indirizzi
151
+    IP dinamici.</p>
152
+    
153
+    <p>La distribuzione di relay in tanti luoghi diversi della rete
154
+    rende pi&ugrave; sicuri gli utenti di Tor. <a
155
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">Puoi
156
+    ottenere un migliore anonimato tu stesso</a>,
157
+    dato che non sar&agrave; possibile sapere se una connessione &egrave; partita dal tuo
158
+    computer o &egrave; stata trasportata da un altro nodo Tor.</p>
159
+    
160
+    <p>Leggi la guida <a href="<page docs/tor-doc-relay>">come configurare un relay</a>
161
+    .</p>
162
+    
163
+    <hr />
164
+    <a id="uninstall"></a>
165
+    <h2><a class="anchor" href="#uninstall">Disinstallare Tor e Polipo</a></h2>
166
+    <br />
167
+    
168
+    <p>Puoi disinstallare il pacchetto dal tuo computer in due modi, con il
169
+    Finder o con un disinstallatore da Terminale o riga di comando. Se vuoi rimuovere Tor da OSX, ecco come fare:</p>
170
+    
171
+    <p>Riporta la configurazione proxy dei tuoi programmi ai valori originali.
172
+    Se ti interessa semplicemente smettere di usare Tor, puoi fermarti qui.</p>
173
+    
174
+    <p>Se invece vuoi rimuovere completamente Tor, e il tuo account ha privilegi di
175
+    amministratore, fai cos&igrave;:</p>
176
+    <ol>
177
+    <li>Apri il Finder e fai clic su Applicazioni.</li>
178
+    <li>Sposta /Applicazioni/Vidalia nel Cestino.</li>
179
+    <li>Cancella /Libreria/Torbutton dal sistema.</li>
180
+    <li>Nella tua cartella Inizio, vai a Libreria e cancella la cartella
181
+    Vidalia</li>
182
+    </ol>
183
+    <p>Tor, Vidalia e Polipo sono ora completamente rimossi dal tuo sistema.</p>
184
+    
185
+    <p>Se ti trovi a tuo agio con la riga di comando o con Terminale, puoi
186
+    cancellare manualmente i file e cartelle seguenti:</p>
187
+    <ul>
188
+    <li>/Applicazioni/Vidalia.app/</li>
189
+    <li>/Libreria/Torbutton/</li>
190
+    <li>~/Libreria/Vidalia</li>
191
+    <li>~/.tor</li>
192
+    </ul>
193
+    
194
+    <hr />
195
+    
196
+    <p>Se hai delle proposte per migliorare questo documento, per favore
197
+    <a href="<page about/contact>">inviacele</a>. Grazie!</p>
198
+  </div>
199
+  <!-- END MAINCOL -->
200
+  <div id = "sidecol">
201
+#include "side.wmi"
202
+#include "info.wmi"
203
+  </div>
204
+  <!-- END SIDECOL -->
205
+</div>
206
+<!-- END CONTENT -->
207
+#include <foot.wmi>   
... ...
@@ -0,0 +1,295 @@
1
+## translation metadata
2
+# Revision: $Revision: 22144 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Relay Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-relay>">Configure Tor Relay</a>
11
+  </div> 
12
+  <div id="maincol">   
13
+    <h1>Configurare un relay Tor</h1>
14
+    
15
+    <!-- BEGIN SIDEBAR -->
16
+    <div class="sidebar-left">
17
+    <h3>Istruzioni per la configurazione</h3>
18
+    <ol>
19
+    <li><a href="<page docs/tor-doc-relay>#install">Scarica &amp; Installa</a></li>
20
+    <li><a href="<page docs/tor-doc-relay>#setup">Configura</a></li>
21
+    <li><a href="<page docs/tor-doc-relay>#check">verifica &amp; Conferma</a></li>
22
+    <li><a href="<page docs/tor-doc-relay>#after">Ultimi Passi</a></li>
23
+    </ol>
24
+    </div>
25
+    <!-- END SIDEBAR -->
26
+    
27
+    <hr />
28
+    
29
+    <p>
30
+    La rete Tor &egrave; formata da volontari che offrono la propria banda. Quante
31
+    pi&ugrave; persone hanno un relay, tanto pi&ugrave; veloce sar&agrave; la rete Tor. Se hai
32
+    almeno 20 kilobyte/s sia up che down, aiuta la rete configurando il tuo software Tor
33
+    come relay. Gestire un relay Tor &egrave; semplice e ci sono funzionalit&agrave;
34
+    molto comode, come il <a href="<page docs/faq>#RelayFlexible">controllo della banda</a> usata,
35
+    exit policy che permettono di ridurre il rischio di lamentele ed abusi,
36
+    ed il supporto per indirizzi IP dinamici.
37
+    </p>
38
+    
39
+    <p>Puoi realizzare un relay Tor su <a
40
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayOS">quasi
41
+    tutti</a> i sistemi operativi, ma Linux, FreeBSD 5.x+, OS X Tiger o
42
+    successivi, Windows Server 2003 e successivi funzionano al meglio.
43
+    </p>
44
+    
45
+    <hr />
46
+    <a id="zero"></a>
47
+    <a id="install"></a>
48
+    <h2><a class="anchor" href="#install">Fase Uno: Scarica e Installa Tor</a></h2>
49
+    <br />
50
+    
51
+    <p>Prima di iniziare, assicurati che Tor sia installato e funzioni.
52
+    </p>
53
+    
54
+    <p>Visita la <a href="<page download/easy-download>">pagina dei download</a> ed
55
+    installa il "Pacchetto di installazione" per il tuo sistema operativo.
56
+    </p>
57
+    
58
+    <p>Per comodit&agrave; potresti usarlo come client per un po', in
59
+    modo da assicurarti che funzioni correttamente.</p>
60
+    
61
+    <hr />
62
+    <a id="setup"></a>
63
+    <h2><a class="anchor" href="#setup">Fase Due: configura Tor come relay</a></h2>
64
+    <br />
65
+    
66
+    <ol>
67
+    <li> Controlla che l'orologio di sistema ed il fuso orario siano precisi. Se possibile sincronizzalo
68
+    con un <a href="http://en.wikipedia.org/wiki/Network_Time_Protocol">time server</a> pubbico.
69
+    </li>
70
+    
71
+    <li> <strong>Configurare Tor con l'interfaccia grafica Vidalia</strong>:
72
+    <ol>
73
+    
74
+    <li>
75
+           <dt>Fai clic destro sull'icona Vidalia nella barra delle attivit&agrave;. Seleziona <tt>Pannello di controllo</tt>.</dt>
76
+           <dd><img src="../img/screenshot-win32-vidalia.png"></dd>
77
+    </li>
78
+    
79
+    <li>Fai clic su <tt>Avviamento del relaying</tt>.</li>
80
+    <li>
81
+    <dt>Scegli <tt>Dona traffico alla rete Tor</tt> Se vuoi essere un
82
+    relay pubblico (raccomandato), o scegli <tt>Aiuta gli utenti sotto censura a raggiungere
83
+    la rete Tor</tt> se vuoi fare da <a href="<page	docs/faq>#RelayOrBridge">bridge</a>
84
+    per gli utenti in paesi che censurano Internet.</dt>
85
+    <dd><img src="../img/screenshot-win32-configure-relay-1.png"></dd>
86
+    </li>
87
+    <li>Scegli un nickname per il tuo relay ed inserisci i tuoi contatti nel
88
+    caso dobbiamo contattarti per qualche problema.</li>
89
+    <li>Lascia selezionato <tt>Cerca di configurare automaticamente il port forwarding</tt>.
90
+    Premi il pulsante <tt>Test</tt> per vedere se tutto funziona. Se funziona, bene.
91
+    Altrimenti, vedi il numero 3 qui sotto.</li>
92
+    <li><dt>Seleziona la scheda <tt>Limiti di Banda</tt>. Scegli quanta banda donare agli utenti Tor come te.</dt>
93
+    <dd><img src="../img/screenshot-win32-configure-relay-2.png"></dd></li>
94
+    <li><dt>Seleziona la scheda <tt>Policy delle uscite</tt>. Se vuoi permettere agli altri di
95
+    usare il tuo relay per questi servizi, non cambiare nulla. Deseleziona
96
+    i servizi <a href="<page docs/faq>#ExitPolicies">che non vuoi che la gente raggiunga dal tuo relay</a>.
97
+    Se vuoi essere un relay intermedio, deseleziona tutti  servizi.</dt>
98
+    <dd><img src="../img/screenshot-win32-configure-relay-3.png"></dd></li>
99
+    <li>Fai clic sul pulsante <tt>Ok</tt>. Vedi il passo 3 qui sotto per controllare che
100
+    il relay funzioni correttamente.</li>
101
+    </ol>
102
+    
103
+    <br />
104
+    
105
+    <strong>Configurazione Manuale</strong>: 
106
+    <ul>
107
+    <li>Modifica la parte finale del <a
108
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">file
109
+    torrc</a>. Se vuoi essere un relay pubblico (raccomandato),
110
+    definisci la ORPort e <a href="<page
111
+    docs/faq>#ExitPolicies">dai un'occhiata alla ExitPolicy</a>; altrimenti
112
+    se vuoi essere un <a href="<page docs/faq>#RelayOrBridge">bridge</a>
113
+    per gli utenti nei paesi che censurano Internet,
114
+    usa solo <a href="<page docs/bridges>#RunningABridge">queste righe</a>.
115
+    </li>
116
+    
117
+    </ul></li>
118
+    
119
+    <li>Se usi un firewall, aprilo in modo da permettere alle connessioni
120
+    in arrivo di raggiungerele porte che hai configurato (ORPort, anche
121
+    DirPort se l'hai abilitata). Se hai un firewall hardware (Linksys box,
122
+    cablemodem, etc) potrebbe interessarti <a
123
+    href="http://portforward.com/">portforward.com</a>. Controlla inoltre che
124
+    siano consentite anche le connessioni  <em>in uscita</em>, in modo che il tuo
125
+    relay possa raggiungere gli altri relay Tor.
126
+    </li>
127
+    
128
+    <li> Riavvia il relay. Se <a
129
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">segnala
130
+    dei messaggi di avviso</a>, esaminali.
131
+    
132
+    </li>
133
+    
134
+    <li>Iscriviti alla mailing list <a
135
+    href="http://archives.seul.org/or/announce/">or-announce</a>.
136
+    Ha un traffico molto basso e serve ad informarsi sulle
137
+    nuove versioni stabili. Potresti anche iscriverti alle <a
138
+    href="<page docs/documentation>#MailingLists">liste Tor ad alto traffico</a>.
139
+    </li>
140
+    
141
+    </ol>
142
+    
143
+    <hr />
144
+    <a id="check"></a>
145
+    <h2><a class="anchor" href="#check">Fase Tre: controlla che funzioni</a></h2>
146
+    <br />
147
+    
148
+    <p>Appena il relay si collega alla rete, cerca
149
+    di capire se le porte che hai configurato sono raggiungibili dall'
150
+    esterno. Di solito &egrave; un'operazione rapida, ma potrebbe richiedere
151
+    fino a 20 minuti. Cerca
152
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">riga del
153
+    log</a> cos&igrave;
154
+    
155
+    <tt>Self-testing indicates your ORPort is reachable from the outside. Excellent.</tt>
156
+    Se non trovi questo messaggio, significa che il tuo relay non &egrave; raggiungibile
157
+    dall'esterno &mdash; ricontrolla il firewall, controlla che il relay usi 
158
+    l'IP giusto, etc.
159
+    </p>
160
+    
161
+    <p>Quando il relay stabilisce di essere raggiungibile, invia un "server
162
+    descriptor" alle directory per comunicare ai client
163
+    quale indirizzo, che porta, che chiave, etc usi il tuo server. Puoi <a
164
+    href="http://moria.seul.org:9032/tor/status/authority">caricare manualmente
165
+    uno dei network status</a> e
166
+    scorrerlo per cercare il nickname che hai configurato, per essere certo che
167
+    sia l&igrave;. Potrebbe volerci qualche secondo per dare il tempo di
168
+    creare una directory aggiornata.</p>
169
+    
170
+    <hr />
171
+    <a id="after"></a>
172
+    <h2><a class="anchor" href="#after">Fase Quattro: quando funziona</a></h2>
173
+    <br />
174
+    
175
+    <p>
176
+    Raccomandiamo anche le seguenti operazioni:
177
+    </p>
178
+    
179
+    <p>
180
+    6. Leggi
181
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/OperationalSecurity">documentazione sulla sicurezza operativa</a>
182
+    per sapere come aumentare la sicurezza del tuo relay.
183
+    </p>
184
+    
185
+    <p>
186
+    7. Se vuoi gestire pi&ugrave; di un relay va benissimo, ma per favore definisci <a
187
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#MultipleRelays">l'opzione
188
+    MyFamily</a> nei file di configurazione di tutti i tuoi relay.
189
+    </p>
190
+    
191
+    <p>
192
+    8. Decidi se applicare un rate limiting. Le ADSL, i modem via cavo e tutti
193
+    coloro che hanno banda asimmetrica (es. pi&ugrave; down che up) dovrebbero
194
+    definire un rate limit alla banda pi&ugrave; lenta, per evitare congestioni. vedi la <a
195
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">rate
196
+    limiting FAQ </a> per maggiori dettagli.
197
+    </p>
198
+    
199
+    <p>
200
+    9. Fai un backup della chiave privata del tuo relay Tor (&egrave; in "keys/secret_id_key"
201
+    nella tua DataDirectory). Essa costituisce l'identit&agrave; del tuo relay ed
202
+    &egrave; importante custodirla al sicuro in modo che nessuno possa leggere il traffico
203
+    che passa dal tuo relay. Questo &egrave; un file importante da conservare se dovessi <a
204
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#UpgradeServer">spostare o
205
+    ripristinare il tuo server Tor</a> in caso di prolemi.
206
+    </p>
207
+    
208
+    <p>
209
+    10. Se controlli il name server del tuo dominio, potresti impostare
210
+    il reverse DNS hostname a 'anonymous-relay', 'proxy' o 'tor-proxy', in modo che quando
211
+    altri ne vedranno l'indirizzo nel loro log sar&agrave; pi&ugrave; facile per loro
212
+    capire di cosa si tratta. E' anche utilissimo aggiungere la <a
213
+    href="https://tor-svn.freehaven.net/svn/tor/trunk/contrib/tor-exit-notice.html">Tor
214
+    exit notice</a> su un virtual host configurato per l'hostname, per evitare segnalazioni di abuso
215
+    a te e al tuo ISP se gestisci un exit node.
216
+    
217
+    </p>
218
+    
219
+    <p>
220
+    11. Se non hai un webserver sul tuo computer, potresti cambiare
221
+    la ORPort a 443 e la DirPort a 80. Molti utenti Tor
222
+    si trovano dietro dei firewall che consentono solo di navigare
223
+    sul web, e in questo modo potranno raggiungere comunque il tuo Tor relay. I relay Win32
224
+    possono semplicemente cambiare la ORPort e la DirPort
225
+    nel file torrc e riavviare Tor. I server OS X o Unix non possono
226
+    collegare direttamente queste porte (perch&eacute; non girano come root), e quindi
227
+    devono usare un apposito <a
228
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients">
229
+    port forwarding</a> per permettere alle connessioni di raggiungere il Tor relay. Se usi gi&agrave;
230
+    le porte 80 e 443, ma vuoi aiutare comunque, altre porte
231
+    molto utili sono la 22, 110, e 143.
232
+    </p>
233
+    
234
+    <p>
235
+    12. Se il tuo relay Tor fornisce altri servizi sul medesimo indirizzo IP
236
+    &mdash; ad esempio, un webserver &mdash; controlla che sia possibile collegarsi al
237
+    webserver anche da localhost. &#200; necessario
238
+    perch&eacute; i client Tor rileveranno che il tuo server &egrave; <a
239
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">il modo
240
+    pi&ugrave; sicuro per raggiungere il webserver</a>, e creeranno sempre un circuito che termini
241
+    sul tuo relay Tor. Se non vuoi permettere queste connessioni, devi
242
+    rifiutarle esplicitamente nella tua exit policy.
243
+    </p>
244
+    
245
+    <p>
246
+    13. (Solo per Unix). Crea un utente separato per il relay. Se hai
247
+    installato il pacchetto OS X, il deb o l'rpm, &egrave; gi&agrave; cos&igrave;.
248
+    Altrimenti puoi farlo a mano. (Il relay Tor non ha bisogno di girare
249
+    come root, anzi &egrave; buona prassi non eseguirlo come root. Girando
250
+    come utente 'tor' si evitano problemi con identd e altri serviziche
251
+    rilevano il nome dell'utente. Se sei una persona paranoica, puoi <a
252
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorInChroot">mettere Tor
253
+    in un chroot jail</a>.)
254
+    </p>
255
+    
256
+    <p>
257
+    14. (Solo per Unix). Il tuo sistema operativo probabilmente limita il numero
258
+    dei file descriptor aperti per ogni processo a 1024 (o meno). Se vuoi
259
+    gestire un exit node veloce, probabilmente non basta. Su
260
+    Linux, aggiungi una riga come "toruser hard nofile 8192" al file
261
+    /etc/security/limits.conf (dove toruser &egrave; l'utente del processo
262
+    Tor), poi riavvia Tor se &egrave; stato installato da pacchetto (o fai un
263
+    logout e login se lo avvii tu stesso).
264
+    </p>
265
+    
266
+    <p>
267
+    15. Se hai installato Tor da qualche pacchetto o installer, Tor si avvier&agrave;
268
+    automaticamente al boot del sistema. Se per&ograve; l'hai installato dai sorgenti,
269
+    potrebbero esserti utili gli initscript in contrib/tor.sh o contrib/torctl.
270
+    </p>
271
+    
272
+    <p>
273
+    Quando modifichi la configurazione di Tor, ricordati di controllare che
274
+    il tuo relay funzioni regolarmente dopo le modifiche. Completa la voce
275
+    "ContactInfo" nel file torrc in modo che possiamo contattarti se ci fosse bisogno
276
+    di aggiornare o ci fossero dei problemi. Se hai problemi o domande, vedi
277
+    la sezione <a href="<page docs/documentation>#Support">Supporto</a> o la pagina
278
+    <a href="<page about/contact>">contact us</a> sulla lista tor-ops. Grazie
279
+    del tuo aiuto per far crescere la rete Tor!
280
+    </p>
281
+    
282
+    <hr />
283
+    
284
+    <p>Se hai suggerimenti per migliorare questo documento, per favore <a
285
+    href="<page about/contact>">segnalaceli</a>. Grazie!</p>
286
+  </div>
287
+  <!-- END MAINCOL -->
288
+  <div id = "sidecol">
289
+#include "side.wmi"
290
+#include "info.wmi"
291
+  </div>
292
+  <!-- END SIDECOL -->
293
+</div>
294
+<!-- END CONTENT -->
295
+#include <foot.wmi>   
... ...
@@ -0,0 +1,8 @@
1
+## translation metadata
2
+# Based-On-Revision: 12076
3
+# Last-Translator: jan at seul org
4
+
5
+#include "head.wmi" TITLE="Redirecting" REDIRECT="docs/tor-doc-relay"
6
+
7
+#include <foot.wmi>
8
+
... ...
@@ -0,0 +1,189 @@
1
+    <h1>Usare il client <a href="<page index>">Tor</a> su Linux/BSD/Unix</h1>
2
+    <br />
3
+    
4
+    <p>
5
+    <b>Queste sono le istruzioni per installare e usare un client Tor.
6
+    Se invece vuoi donare banda e traffico per aiutare a fare crescere
7
+    la rete Tor (s&igrave; per favore), leggi la guida <a
8
+    href="<page docs/tor-doc-relay>">Configurare un relay</a>.</b>
9
+    </p>
10
+    
11
+    <hr />
12
+    <a id="installing"></a>
13
+    <h2><a class="anchor" href="#installing">Uno: scarica e installa Tor</a></h2>
14
+    <br />
15
+    
16
+    <p>
17
+    L'ultima versione di Tor si trova sulla pagina <a
18
+    href="<page download/download>">scarica</a>. Ci sono anche pacchetti per Debian,
19
+    Red Hat, Gentoo, *BSD, etc. Se usi
20
+    Ubuntu, non usare i pacchetti di default: usa invece <a
21
+    href="<page docs/debian>#ubuntu">il nostro deb repository</a>.
22
+    </p>
23
+    
24
+    <p>Se compili dai sorgenti, installa prima <a
25
+    href="http://www.monkey.org/~provos/libevent/">libevent</a>, e
26
+    controlla di avere openssl e zlib (inclui i pacchetti -devel se
27
+    necessario). Poi esegui <br />
28
+    <tt>tar xzf tor-<version-stable>.tar.gz; cd tor-<version-stable><br />
29
+    ./configure &amp;&amp; make</tt><br />
30
+    Ora puoi eseguire tor come <tt>src/or/tor</tt>, oppure puoi eseguire <tt>make install</tt>
31
+    (come root, se necessario) per installarlo in /usr/local/. Infine, puoi
32
+    avviare Tor eseguendo <tt>tor</tt>.
33
+    </p>
34
+    
35
+    <p>In partenza, Tor &egrave; configurato sempre come client e usa un file di
36
+    configurazione di default, di cui la maggior parte delle persone non dovr&agrave;
37
+    modificare i valori. Dopo queste operazioni, Tor &egrave; installato.
38
+    </p>
39
+    
40
+    <hr />
41
+    <a id="privoxy"></a>
42
+    <a id="polipo"></a>
43
+    <h2><a class="anchor" href="#polipo">Due: installa Polipo per navigare sul web</a></h2>
44
+    <br />
45
+    
46
+    <p>Dopo avere installato Tor, occorre configurare i programmi affinch&eacute; lo usino.
47
+    </p>
48
+    
49
+    <p>
50
+    Per prima cosa va configurata la navigazione web. Inizia installando <a
51
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> dal tuo
52
+    repository preferito. Polipo &egrave; un caching web proxy che fa anche bene http
53
+    pipelining, ed &egrave; quindi adatto alla latenza di Tor. Installa come minimo
54
+    Polipo 1.0.4, perch&eacute; le versioni precedenti non hanno il supporto SOCKS
55
+    pecessario per usare Polipo con Tor.
56
+    </p>
57
+    
58
+    <p>Una volta installato Polipo (da un pacchetto o dai sorgenti),
59
+    <b>devi configurare Polipo per usare Tor</b>. Usa la nostra <a
60
+    href="https://svn.torproject.org/svn/torbrowser/trunk/build-scripts/config/polipo.conf">configurazione Polipo
61
+    per Tor</a> e mettila al posto dell'attuale file di configurazione
62
+    di Polipo (es. /etc/polipo/config o ~/.polipo).
63
+    Devi riavviare Polipo per applicare i cambiamenti.</p>
64
+    
65
+    <p>Se preferisci puoi usare invece Privoxy con <a
66
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">questa
67
+    configurazione base di Privoxy</a>. Tuttavia dato che entrambi i file di configurazione usano
68
+    la porta 8118, non devi far girare Polipo e Privoxy contemporaneamente.</p>
69
+    </p>
70
+    
71
+    <hr />
72
+    <a id="using"></a>
73
+    <h2><a class="anchor" href="#using">Tre: configura i tuoi programmi per usare Tor</a></h2>
74
+    <br />
75
+    
76
+    <p>Dopo aver installato Tor e Polipo, devi configurare i tuoi programmi per
77
+    usarli. Il primo passo è la configurazione della navigazione web.</p>
78
+    
79
+    <p>Per una protezione ottimale dovresti usare Tor con Firefox e Torbutton.
80
+    Installa semplicemente il <a
81
+    href="https://addons.mozilla.org/firefox/2275/">plugin Torbutton
82
+    </a> e riavvia Firefox:
83
+    </p>
84
+    
85
+    <img alt="Torbutton plugin for Firefox"
86
+    src="../img/screenshot-torbutton.png"
87
+    border="1">
88
+    
89
+    <br />
90
+    
91
+    <p>
92
+    Se vuoi usare Firefox su un computer diverso da quello su cui gira Tor, leggi la <a
93
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">
94
+    FAQ
95
+    per usare Tor su un pc diverso</a>. 
96
+    </p>
97
+    
98
+    <p>Per torificare altri programmi che supportino un proxy HTTP, basta
99
+    farli puntare a Polipo (ovvero, a localhost porta 8118). Per usare SOCKS
100
+    direttamente (per instant messaging, Jabber, IRC, etc), puoi puntare
101
+    l'applicazione direttamente a Tor (localhost porta 9050), ma leggi <a
102
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">questa
103
+    FAQ</a> per capire perch&eacute; ci&ograve; pu&ograve; essere pericoloso. Per i programmi
104
+    che non supportano n&eacute; SOCKS ne&eacute; HTTP, dai un'occhiata a <a
105
+    href="http://tsocks.sourceforge.net/">tsocks</a> o a <a
106
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>.
107
+    </p>
108
+    
109
+    <p>Per informazioni su come torificare altre applicazioni, leggi il
110
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
111
+    HOWTO</a>.
112
+    </p>
113
+    
114
+    <hr />
115
+    <a id="verify"></a>
116
+    <h2><a class="anchor" href="#verify">Quattro: controlla che tutto funzioni</a></h2>
117
+    <br />
118
+    
119
+    <p>
120
+    Ora prova ad usare il tuo browser con Tor e controlla
121
+    che il tuo indirizzo IP address venga anonimizzato. Fai clic sul
122
+    <a href="https://check.torproject.org/">
123
+    Tor detector</a>
124
+    e controlla se secondo lui stai usando Tor o no.
125
+    #<a href="http://ipchicken.com/">iquesto sito</a>
126
+    #per vedere quale indirizzo IP crede che tu stia usando.
127
+    
128
+    (Se questo sito non risponde, vedi <a
129
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">questa
130
+    FAQ</a> per conoscere altri modi di verificare il tuo Tor.)
131
+    </p>
132
+    
133
+    <p>Se usi un personal firewall che limita le connessioni del tuo computer
134
+    verso se stesso (compreso ad esempio SELinux su
135
+    Fedora Core 4), devi consentire le connessioni dalla
136
+    tua applicazione locale a Polipo (porta locale 8118) ed a Tor (porta locale
137
+    9050). Se
138
+    il tuo firewall blocca le connessioni in uscita, abilita almeno 
139
+    le connessioni alle porte TCP 80 e 443, e poi vedi <a
140
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">questa
141
+    FAQ</a>.  Se la tua configurazione di SELinux non permette a tor o privoxy di
142
+    girare correttamente, crea un file di nome booleans.local nella directory
143
+    /etc/selinux/targeted.  Modifica questo file con un editor di testo e
144
+    inserisci "allow_ypbind=1".  Riavvia la macchina perch&eacute; questa modifica abbia
145
+    effetto.
146
+    </p>
147
+    
148
+    <p>Se ancora non funziona, leggi <a
149
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">questa
150
+    FAQ</a> per altre indicazioni.</p>
151
+    
152
+    <hr />
153
+    <a id="server"></a>
154
+    <a id="relay"></a>
155
+    <h2><a class="anchor" href="#relayr">Cinque: configura Tor come relay</a></h2>
156
+    <br />
157
+    
158
+    <p>La rete Tor si fonda sulla banda donata da volontari. Pi&ugrave;
159
+    persone aprono un relay, pi&ugrave; veloce sar&agrave; la rete Tor. Se hai almeno
160
+    20 kilobyte/s sia up che down, per favore aiuta la rete Tor e configura
161
+    il tuo Tor relay. Ci sono molte funzionalit&agrave; che facilitano la gestione
162
+    di un relay Tor, come la limitazione della banda, exit policy per
163
+    ridurre il rischio di abusi e lamentele, ed il supporto per indirizzi
164
+    IP dinamici.</p>
165
+    
166
+    <p>Con molti relay sparsi in luoghi diversi di Internet gli utenti
167
+    Tor sono pi&ugrave; sicuri. <a
168
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">Puoi
169
+    anche avere un anonimato pi&ugrave; forte tu stesso</a>,
170
+    dato che i siti remoti non potranno sapere se le connessioni nascono
171
+    dal tuo computer o provengono da altrove.</p>
172
+    
173
+    <p>Puoi approfondire leggendo la nostra guida <a href="<page docs/tor-doc-relay>">Configurare un relay</a>.
174
+    </p>
175
+    
176
+    <hr />
177
+    
178
+    <p>Se hai dei suggerimenti per migliorare questo documento, per favore <a
179
+    href="<page about/contact>">contattaci</a>. Grazie!</p>
180
+  </div>
181
+  <!-- END MAINCOL -->
182
+  <div id = "sidecol">
183
+#include "side.wmi"
184
+#include "info.wmi"
185
+  </div>
186
+  <!-- END SIDECOL -->
187
+</div>
188
+<!-- END CONTENT -->
189
+#include <foot.wmi>   
... ...
@@ -0,0 +1,65 @@
1
+## translation metadata
2
+# Revision: $Revision: 21511 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: Configuring your browser to use Tor" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-web>">Configure Your Browser</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h1>Configurire il browser per usare <a href="<page index>">Tor</a></h1>
14
+    <br />
15
+    
16
+    <p>Se usi Firefox (lo consigliamo), non hai bisogno di questa pagina.
17
+    Basta installare il<a
18
+    href="https://addons.mozilla.org/firefox/2275/">plugin Torbutton
19
+    </a> e riavviare Firefox:
20
+    </p>
21
+    
22
+    <img alt="Torbutton plugin for Firefox"
23
+    src="../img/screenshot-torbutton.png"
24
+    border="1"/>
25
+    
26
+    <br />
27
+    
28
+    <p>Altrimenti devi configurare a mano il proxy del tuo
29
+    browser.
30
+    <br/>In Mozilla e Firefox su Windows, vai a
31
+    Strumenti - Opzioni - Generale - Impostazioni Connessione.
32
+    <br/>In Firefox su OS X, &egrave; Firefox - Preferenze - Generale - Impostazini Connessione.
33
+    <br/>In Firefox su Linux, si trova in
34
+    Modifica - Preferenze - Avanzate - Proxies.
35
+    <br/>In Opera &egrave; Strumenti - Preferenze(Avanzate) - Rete - Proxy servers.
36
+    <br/>Noi sconsigliamo di usare IE, ma se qualcuno vuole comunque un anonimato inferiore,
37
+    &egrave; Strumenti - Opzioni Internet - Connessioni - Impostazioni LAN - Proxy
38
+    Server - Avanzate.</p>
39
+    
40
+    <img alt="Proxy settings in Firefox"
41
+    src="../img/screenshot-win32-firefox-proxies.jpg" />
42
+    
43
+    <p>
44
+    Devi scrivere "localhost"
45
+    e "8118" per puntare i primi 4 protocolli a Privoxy, come mostrato qui. (Anche
46
+    se Privoxy non supporta FTP e Gopher, <a
47
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">devi
48
+    configurarlo lo stesso</a>.) Devi anche compilare il socks
49
+    proxy perch&eacute; punti direttamente a Tor ("localhost", "9050", e socks5)
50
+    per coprire gli altri protocolli dopo i primi 4. Poi fai clic su "OK".</p>
51
+    
52
+    <hr />
53
+    
54
+    <p>Se hai proposte per migliorare questo documento, per favore <a
55
+    href="<page about/contact>">scrivicele</a>. Grazie!</p>
56
+  </div>
57
+  <!-- END MAINCOL -->
58
+  <div id = "sidecol">
59
+#include "side.wmi"
60
+#include "info.wmi"
61
+  </div>
62
+  <!-- END SIDECOL -->
63
+</div>
64
+<!-- END CONTENT -->
65
+#include <foot.wmi>   
... ...
@@ -0,0 +1,6 @@
1
+## translation metadata
2
+# Based-On-Revision: 13195
3
+# Last-Translator: jan at seul . org
4
+# Status: obsolete
5
+
6
+#include "head.wmi" TITLE="Redirecting" REDIRECT="docs/tor-doc-windows"
... ...
@@ -0,0 +1,177 @@
1
+## translation metadata
2
+# Revision: $Revision: 21995 $
3
+# Translation-Priority: 1-high
4
+
5
+#include "head.wmi" TITLE="Tor Project: MS Windows Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-windows>">Windows Client</a>
11
+  </div> 
12
+  <div id="maincol">  
13
+    <h1>Usare il client <a href="<page index>">Tor</a> su Microsoft Windows</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>Queste sono le istruzioni per installare e usare un client Tor
18
+    su Microsoft Windows (versioni 2000, XP, Vista, 7, Server).
19
+    Se invece vuoi offrire banda e traffico per aiutare a fare crescere la rete Tor (s&igrave;,
20
+    per favore!), leggi la guida per <a href="<page docs/tor-doc-relay>">Configurare un relay</a>.
21
+    </b>
22
+    </p>
23
+    
24
+    <hr />
25
+    <a id="installing"></a>
26
+    <h2><a class="anchor" href="#installing">Uno: scarica e installa Tor</a></h2>
27
+    <br />
28
+    
29
+    <p>
30
+    Il pacchetto per Microsoft Windows comprende <a href="<page index>">Tor</a>,
31
+    <a href="<page projects/vidalia>">Vidalia</a> (una interfaccia grafica per Tor), Torbutton (un
32
+    plugin per Mozilla Firefox), e <a
33
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (un web proxy) in
34
+    un pacchetto unico contenente le 4 applicazioni preconfigurate.
35
+    Scarica la versione <a href="../<package-win32-bundle-stable>">stabile</a>
36
+    o quella <a href="../<package-win32-bundle-alpha>">sperimentale</a>
37
+    del pacchetto Windows, oppure scegli altre opzioni dalla
38
+    <a href="<page download/download>">pagina di download</a>.
39
+    </p>
40
+    
41
+    <img alt="tor installer splash page" src="../img/screenshot-win32-installer-splash.png" />
42
+    
43
+    <p>Se avevi gi&agrave; installato in precedenza Tor, Vidalia, o Polipo
44
+    puoi deselezionare i componenti di cui non hai bisogno
45
+    nella finestra di dialogo qui sotto.
46
+    </p>
47
+    
48
+    <img alt="select components to install" src="../img/screenshot-win32-installer-components.png" />
49
+    
50
+    <p>Dopo aver terminato l'installazione, i componenti
51
+    che hai scelto verranno avviati automaticamente.
52
+    </p>
53
+    
54
+    <p>Di default Tor &egrave; configurato come client. Usa un file di configurazione
55
+    predefinito che la maggior parte degli utenti non avr&agrave; bisogno
56
+    di modificare. Ora Tor &egrave; installato.
57
+    </p>
58
+    
59
+    <hr />
60
+    <a id="using"></a>
61
+    <h2><a class="anchor" href="#using">Due: configura i tuoi programmi per usare Tor</a></h2>
62
+    <br />
63
+    
64
+    <p>Dopo l'installazione di Tor e di Polipo, devi configurare i tuoi programmi affinch&eacute;
65
+    li usino. Il primo passo &egrave; configurare il browser web.</p>
66
+    
67
+    <p>Per una sicurezza ottimale dovresti usare Tor con Firefox e Torbutton. Il
68
+    pacchetto installa
69
+    il <a href="https://addons.mozilla.org/firefox/2275/">plugin Torbutton
70
+    </a> e basta poi riavviare Firefox:
71
+    </p>
72
+    
73
+    <img alt="Torbutton plugin for Firefox" src="../img/screenshot-torbutton.png" border="1"/>
74
+    
75
+    <br />
76
+    
77
+    <p>
78
+    Se vuoi usare Firefox su un computer diverso da dove gira To, leggi la <a
79
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">FAQ
80
+    per usare Tor su un pc differente</a>.
81
+    </p>
82
+     
83
+    <p>Per usare Tor con altre applicazioni che supportano un HTTP proxy, basta
84
+    puntarle a Polipo (ossia, a localhost porta 8118). Per usare SOCKS
85
+    direttamente (con l'instant messaging, Jabber, IRC, etc), si pu&ograve; puntare
86
+    il programma direttamente a Tor (localhost porta 9050), ma leggi <a
87
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">questa
88
+    FAQ</a> che spiega perch&eacute; &egrave; pericoloso. Per quei programmi
89
+    che non supportano n&eacute; SOCKS n&eacute; HTTP, vedi SocksCap o
90
+    <a href="http://www.freecap.ru/eng/">FreeCap</a>.
91
+    (FreeCap &egrave; software libero; SocksCap &egrave; proprietario.)</p>
92
+    
93
+    <p>Per informazioni su come Torificare altri programmi, guarda il
94
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
95
+    HOWTO</a>.
96
+    </p>
97
+    
98
+    <hr />
99
+    <a id="verify"></a>
100
+    <h2><a class="anchor" href="#verify">Tre: controlla che tutto funzioni</a></h2>
101
+    <br />
102
+    
103
+    <p>
104
+    Controlla che Vidalia sia attivo.  Vidalia usa una piccola cipolla verde
105
+    per indicare che Tor &egrave; attivo, ed una cipolla scura con una "X" rossa
106
+    quando Tor &egrave; spento. Puoi avviare o fermare Tor facendo clic col tasto destro del mouse
107
+    sulla icona di Vidalia nella barra di sistema e selezionando "Start" o "Stop"
108
+    dal menu come mostrato qui sotto:
109
+    </p>
110
+    
111
+    <img alt="Vidalia Tray Icon" src="../img/screenshot-win32-vidalia.png"/>
112
+    
113
+    <p>
114
+    Ora devi provare Tor col tuo browser per controllare
115
+    che il tuo indirizzo IP sia anonimizzato. Fai clic sul
116
+    <a href="https://check.torproject.org/">
117
+    Tor detector</a> e verifica se stai usando o meno Tor
118
+    (se questo sito &egrave; gi&ugrave;, vedi <a
119
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">questa
120
+    FAQ</a> per altri modi di testare il tuo client Tor).
121
+    </p>
122
+    
123
+    <p>Se hai un personal firewall che limita le connessioni del tuo pc
124
+    verso se stesso, controlla che siano permesse le connessioni dalle
125
+    applicazioni locali alla porta locale 8118 e alla porta 9050. Se
126
+    il tuo firewall blocca le connessioni in uscita, permettigli di
127
+    collegarsi almeno alle porte TCP 80 e 443, poi leggi <a
128
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">questa
129
+    FAQ</a>.
130
+    </p>
131
+    
132
+    <p>Se nemmeno ora funziona, guarda <a
133
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">questa
134
+    FAQ</a> per ulteriori indicazioni.</p>
135
+    
136
+    <p>
137
+    Una volta che tutto funziona, leggi meglio
138
+    <a href="<page download/download>#Warning">quello che Tor fa e quello che non fa</a>.
139
+    </p>
140
+    
141
+    <hr />
142
+    <a id="server"></a>
143
+    <h2><a class="anchor" href="#relay">Quattro: configura Tor come relay</a></h2>
144
+    <br />
145
+    
146
+    <p>La rete Tor funziona grazie alla banda donata dai volontari. Pi&ugrave;
147
+    persone aprono un relay, pi&ugrave; veloce sar&agrave; la rete Tor. Se hai almeno
148
+    20 kilobyte/s in download e upload, aiutaci e configura la tua installazione
149
+    Tor come relay. Ci sono tante funzionalit&agrave; che rendono un Tor relay facile
150
+    e pratico, come il controllo della banda, exit policy per
151
+    limitare il rischio di abusi e lamentele, ed il supporto per indirizzi
152
+    IP dinamici.</p>
153
+    
154
+    <p>La distribuzione di relay in tanti luoghi diversi della rete
155
+    rende pi&ugrave; sicuri gli utenti di Tor. <a
156
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">Puoi
157
+    ottenere un migliore anonimato tu stesso</a>,
158
+    dato che non sar&agrave; possibile sapere se una connessione &egrave; partita dal tuo
159
+    computer o &egrave; stata trasportata da un altro nodo Tor.</p>
160
+    
161
+    <p>Leggi la guida su <a href="<page docs/tor-doc-relay>">come configurare un relay</a>
162
+    .</p>
163
+    
164
+    <hr />
165
+    
166
+    <p>Se hai delle proposte per migliorare questo documento, per favore <a
167
+    href="<page about/contact>">contattaci</a>. Grazie!</p>
168
+  </div>
169
+  <!-- END MAINCOL -->
170
+  <div id = "sidecol">
171
+#include "side.wmi"
172
+#include "info.wmi"
173
+  </div>
174
+  <!-- END SIDECOL -->
175
+</div>
176
+<!-- END CONTENT -->
177
+#include <foot.wmi>   
... ...
@@ -0,0 +1,278 @@
1
+## translation metadata
2
+# Revision: $Revision: 22314 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Hidden Service Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-hidden-service>">Tor Hidden Service</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h1>Configurare i servizi nascosti (Hidden Service) per <a href="<page index>">Tor</a></h1>
14
+    <hr />
15
+    
16
+    <p>Tor permette a client e relay di offrire dei "servizi nascosti" (hidden service). In altre parole,
17
+    puoi realizzare un server web, un server SSH, etc., senza rivelare il tuo
18
+    indirizzo IP agli altri utenti. Di fatto, non usando un indirizzo IP pubblico,
19
+    puoi avere un hidden service anche da dietro un firewall.
20
+    </p>
21
+    
22
+    <p>Se hai installato Tor e Privoxy, puoi vedere dei servizi nascoi
23
+    dal vivo visitando <a href="http://duskgytldkxiuqc6.onion/">il nostro
24
+    hidden service dimostrativo</a> od il <a
25
+    href="http://gaddbiwdftapglkq.onion/">hidden service di Wikileaks</a>.
26
+    </p>
27
+    
28
+    <p>Questa guida spiega come realizzare il proprio sito web come hidden
29
+    service. Per i dettagli tecnici sul funzionamento del protocollo hidden service,
30
+    vedi la nostra pagina <a href="<page docs/hidden-services>">il protocollo hidden service</a>.
31
+    </p>
32
+    
33
+    <hr />
34
+    <a id="zero"></a>
35
+    <h2><a class="anchor" href="#zero">Zero: installa Tor e Privoxy</a></h2>
36
+    <br />
37
+    
38
+    <p>Prima di iniziare occorre che:</p>
39
+    <ol>
40
+    <li>Tor sia attivo e funzioni correttamente,</li>
41
+    <li>Privoxy sia attivo e funzioni,</li>
42
+    <li>Privoxy sia configurato per puntare a Tor e che</li>
43
+    <li>l'installazione sia corretta e funzionante.</li>
44
+    </ol>
45
+    
46
+    <p>Gli utenti Windows possono seguire il <a
47
+    href="<page docs/tor-doc-windows>">Windows
48
+    howto</a>, gli utenti OS X possono seguire il <a
49
+    href="<page docs/tor-doc-osx>">OS
50
+    X howto</a>, e infine gli utenti Linux/BSD/Unix possono seguire lo <a
51
+    href="<page docs/tor-doc-unix>">Unix howto</a>.
52
+    </p>
53
+    
54
+    <p>Una volta installati e configurati Tor e Privoxy,
55
+    puoi vedere i hidden service dal vivo seguendo questo link al <a
56
+    <a href="http://duskgytldkxiuqc6.onion/"> nostro
57
+    hidden service dimostrativo</a> od al <a
58
+    href="http://gaddbiwdftapglkq.onion/">hidden service di Wikileaks</a>.
59
+    Ci impieger&agrave; di solito 10-60 secondi a caricare
60
+    (o a decidere che non &egrave; raggiungibile al momento). Se d&agrave; un errore
61
+    subito e il tuo browser mostra un messaggio che dice
62
+    "Impossibile trovare www.duskgytldkxiuqc6.onion , controlla l'indirizzo
63
+    e riprova", significa che Tor e Privoxy non sono configurati correttamente; leggi <a
64
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">questa
65
+    FAQ</a> per aiuto e suggerimenti.
66
+    </p>
67
+    
68
+    <hr />
69
+    <a id="one"></a>
70
+    <h2><a class="anchor" href="#one">Uno: installa localmente un web server</a></h2>
71
+    <br />
72
+    
73
+    <p>Per prima cosa devi installare un web server in locale. Pu&ograve;
74
+    essere una cosa delicata,
75
+    per cui qui descriveremo solo alcuni passaggi elementari.Se ti trovi in difficolt&agrave;
76
+    o se vuoi fare di pi&ugrave; cerca un amico che ti aiuti. Ti consigliamo di
77
+    di installare un web server separato per il tuo hidden service, dato che
78
+    se ne hai gi&agrave; uno installato forse lo stai gi&agrave; usando (o vorrai
79
+    usarlo in futuro) per un altro sito web.
80
+    
81
+    </p>
82
+    
83
+    <p>Se usi Unix o OS X e sei a tuo agio con la linea di
84
+    comando, la cosa migliore &egrave; installare <a
85
+    href="http://www.acme.com/software/thttpd/">thttpd</a>. Piglia la tarball
86
+    pi&ugrave; recente, scompattala (creer&agrave; la sua directory), ed esegui
87
+    <kbd>./configure &amp;&amp; make</kbd>. Poi <kbd>mkdir hidserv; cd
88
+    hidserv</kbd>, ed esegui
89
+    <kbd>../thttpd -p 5222 -h localhost</kbd>. Ti restituir&agrave; il prompt
90
+    e avrai un webserver sulla porta 5222. Puoi mettere dei file 
91
+    nella directory hidserv.
92
+    </p>
93
+    
94
+    <p>Su Windows, puoi usare <a
95
+    href="http://savant.sourceforge.net/">Savant</a> o <a
96
+    href="http://httpd.apache.org/">Apache</a>, e configurarlo per collegarsi
97
+    solo da localhost. Devi anche sapere su quale porta &egrave; in
98
+    ascolto, dato che servir&agrave; pi&ugrave; sotto.
99
+    </p>
100
+    
101
+    <p>(Il motivo per collegare il web server solo a localhost &egrave; per
102
+    assicurarsi che non sia accessibile pubblicamente. Se si potesse accedere direttamente,
103
+    si potrebbe avere la prova che &egrave; il tuo computer a offire l'hidden
104
+    service.)
105
+    </p>
106
+    
107
+    <p>Una volta installato il web server, controlla che funzioni: apri un browser
108
+    e vai a <a
109
+    href="http://localhost:5222/">http://localhost:5222/</a>, dove 5222 &egrave;
110
+    la porta scelta poco pi&ugrave; sopra. Prova poi a mettere unfile nella directory
111
+    html principale e controlla che sia visibile quando accedi al sito.
112
+    </p>
113
+    
114
+    <hr />
115
+    <a id="two"></a>
116
+    <h2><a class="anchor" href="#two">Due: Configura il tuo hidden service</a></h2>
117
+    <br />
118
+    
119
+    <p>Ora devi configurare l'hidden service perch&eacute; punti al
120
+    web server locale
121
+    </p>
122
+    
123
+    <p>Per prima cosa, apri il file torrc con un editor di testo. (Vedi <a
124
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">la
125
+    torrc FAQ</a> per maggiori informazioni.) Vai alla sezione di mezzo e
126
+    cerca la riga</p>
127
+    
128
+    <pre>
129
+    \############### This section is just for location-hidden services ###
130
+    </pre>
131
+    
132
+    <p>
133
+    Questa sezione del file contiene un gruppo di righe che rappresentano ciascuna
134
+    un hidden service. Per ora sono tutte commentate via (le linee
135
+    iniziano con #), infatti i hidden service sono disabilitati. Ogni gruppo di righe
136
+    consiste in una riga <var>HiddenServiceDir</var> e una o pi&ugrave; 
137
+    righe <var> HiddenServicePort</var>:</p>
138
+    
139
+    <ul>
140
+    <li><var>HiddenServiceDir</var> &egrave; una directory dove Tor metter&agrave; le informazioni
141
+    su quel hidden service.  In particolare Tor vi creer&agrave; un file di nome
142
+    <var>hostname</var> che indica l'onion URL.  Non occorre aggiungere
143
+    altri file a questa directory.</li>
144
+    <li><var>HiddenServicePort</var> permette di specificare una porta virtuale (ovvero, la porta
145
+    che chi accede al servizio creder&agrave; di usare), e un
146
+    indirizzo IP e una porta per redirigere le connessioni verso questa porta virtuale.</li>
147
+    </ul>
148
+    
149
+    <p>Aggiungi le seguenti righe a torrc:
150
+    </p>
151
+    
152
+    <pre>
153
+    HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
154
+    HiddenServicePort 80 127.0.0.1:5222 
155
+    </pre>
156
+    
157
+    <p>Sar&agrave; necessario modificare la riga <var>HiddenServiceDir</var> in modo che punti
158
+    a una directory vera che sia leggibile e scrivibile dall'utente con cui
159
+    gira Tor. L'esempio sopra dovrebbe funzionare con il pacchetto Tor
160
+    per OS X. In Unix, prova "/home/nomeutente/hidserv/" e metti il tuo nome
161
+    utente al posto di "nomeutente". Su Windows puoi provare:</p>
162
+    <pre>
163
+    HiddenServiceDir C:\Documents and Settings\nomeutente\Dati applicazioni\hidden_service\\
164
+    HiddenServicePort 80 127.0.0.1:5222
165
+    </pre>
166
+    
167
+    <p>Ora salva il file torrc, chiudi
168
+    Tor e riavvialo.  
169
+    </p>
170
+    
171
+    <p>Se Tor riparte, bene. Altrimenti c'&egrave; qualcosa che non va. Per prima cosa dai
172
+    un'occhiata ai file di log, che riportano avvisi o messaggi di errore. Ci&ograve;
173
+    dovrebbe darti indicazioni sui problemi incontrati. Spesso ci sono errori di battitura nel file torrc
174
+    o permessi di directory errati. (Vedi la <a
175
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">logging
176
+    FAQ</a> se non sai come abilitare o trovare
177
+    i file di log.)
178
+    
179
+    </p>
180
+    
181
+    <p>Quando Tor parte creer&agrave; automaticamente la  <var>HiddenServiceDir </var>
182
+    che hai indicato (se serve), e vi creer&agrave; due file.</p>
183
+    <dl>
184
+    <dt><var>private_key</var></dt>
185
+    <dd>Anzitutto Tor creer&agrave; un nuovo paio di chiavi pubblica/privata per il tuo hidden
186
+    service. Esso viene scritto in un file detto "private_key". Non condividere questa chiave
187
+    co altri -- altrimenti un altro otrebbe impersonare il tuo hidden
188
+    service.</dd>
189
+    <dt><var>hostname</var></dt>
190
+    <dd>L'altro file creato da Tor &egrave; detto "hostname". Esso contiene
191
+    un breve sommario della tua chiave pubblica -- qualcosa di smile a
192
+    <tt>duskgytldkxiuqc6.onion</tt>. &#200; il nome pubblico del tuo servizio
193
+    e puoi comunicarlo a tutti, pubblicarlo su siti web, scriverlo sul biglietto
194
+    da visita, etc. .</dd>
195
+    </dl>
196
+    
197
+    <p>Se Tor gira con un diverso utente, ad esempio su
198
+    OS X, Debian, o Red Hat, forse devi diventare root per leggere
199
+    questi file.</p>
200
+    
201
+    <p>Ora che hai riavviato Tor, lui cerca degli introduction point
202
+    nella rete Tor, generando un cosiddetto <em>hidden service
203
+    descriptor</em>. Esso &egrave; una lista firmata di introduction point e della chiave
204
+    pubblica del servizio. Tor pubblica anonimamente questa descrizione
205
+    ai directory server, cos&igrave; gli altri possono prelevarla anonimamente dai
206
+    directory server quando cercano di accedere al tuo servizio.
207
+    </p>
208
+    
209
+    <p>Ora fai una prova: copia e incolla il contenuto del file hostname nel tuo
210
+    browser. Se funziona vedrai la pagina html che hai preparato al punto uno.
211
+    Se non funziona, guarda nei log e fai altre prove e modifiche finch&eacute; non 
212
+    funziona.
213
+    </p>
214
+    
215
+    <hr />
216
+    <a id="three"></a>
217
+    <h2><a class="anchor" href="#three">Tre: argomenti avanzati</a></h2>
218
+    <br />
219
+    
220
+    <p>Se pensi di rendere disponibile a lungo il tuo servizio, dovresti fare
221
+    una copia di backup del file <var>private_key</var>.
222
+    </p>
223
+    
224
+    <p>Nell'esempio sopra abbiamo evitato di proposito Apache, a) perch&eacute; molti
225
+    potrebbero gi&agrave; usarlo per un server web pubblico sul loro computer, e b)
226
+    perch&eacute; &egrave; una grande applicazione
227
+    che ha molti posti in cui potrebbe rivelare il tuo vero indirizzo IP o altre
228
+    informazioni atte a identificarti, ad esempio nelle pagine 404. Per chi avesse bisogno
229
+    di pi&ugrave; funzionalit&agrave;, Apache potrebbe essere la soluzione giusta. Puoi
230
+    scrivere una lista di azioni per blindare Apache quando lo si usa come
231
+    hidden service? Anche Savant probabilmente ha problemi del genere.
232
+    </p>
233
+    
234
+    <p>Se vuoi inoltrare pi&ugrave; porte virtuali a un unico hidden
235
+    service, basta aggiungere altre righe <var>HiddenServicePort</var>.
236
+    Se vuoi gestire pi&ugrave; hidden services dallo stesso client Tor,
237
+    aggiungi un'altra riga <var>HiddenServiceDir</var>. Tutte le seguenti righe
238
+    <var>HiddenServicePort</var> si riferiscono a questa riga <var>HiddenServiceDir</var>, fino
239
+    a quando non aggiungi un'altra riga <var>HiddenServiceDir</var>:
240
+    </p>
241
+    
242
+    <pre>
243
+    HiddenServiceDir /usr/local/etc/tor/hidden_service/
244
+    HiddenServicePort 80 127.0.0.1:8080
245
+    
246
+    HiddenServiceDir /usr/local/etc/tor/other_hidden_service/
247
+    HiddenServicePort 6667 127.0.0.1:6667
248
+    HiddenServicePort 22 127.0.0.1:22
249
+    </pre>
250
+    
251
+    <p>Alcuni problemi di anonimato da tenere a mente:
252
+    </p>
253
+    <ul>
254
+    <li>Come detto sopra, fai attenzione che il server web non riveli
255
+    informazioni che possano identificare te, il tuo computer, la tua posizione.
256
+    Ad esempio, un visitatore potr&agrave; probabilmente capire se si tratta di thttpd o
257
+    di Apache e che sistema operativo usi.</li>
258
+    <li>Se il tuo computer non &egrave; sempre online, non lo sar&agrave; nemmeno il tuo
259
+    hidden service. Questo rivela informazioni all'osservazione di un avversario.</li>
260
+    <!-- increased risks over time -->
261
+    </ul>
262
+    
263
+    
264
+    
265
+    <hr />
266
+    
267
+    <p>se hai suggerimenti per migliorare questo documento, per favore <a
268
+    href="<page about/contact>">scrivici</a>. Grazie!</p>
269
+  </div>
270
+  <!-- END MAINCOL -->
271
+  <div id = "sidecol">
272
+#include "side.wmi"
273
+#include "info.wmi"
274
+  </div>
275
+  <!-- END SIDECOL -->
276
+</div>
277
+<!-- END CONTENT -->
278
+#include <foot.wmi>   
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,269 @@
1
+## translation metadata
2
+# Revision: $Revision: 22305 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Mac OS X Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-osx>">Mac OS X Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>맥 OS X에서<a href="<page index>">Tor</a> 클라이언트 운영하기</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>이 문서는 맥 OS X에서 Tor 클라이언트 운영을 위한 설치 매뉴얼입니다.
18
+    만약 다른 이용자들에게 중계 트래픽을 제공해서 
19
+    Tor 네트워크가 더 커지도록 돕고싶다면(꼭 해주세요),
20
+    <a href="<page docs/tor-doc-relay>">중계서버 설정하기</a>를 읽어주세요.</b>
21
+    </p>
22
+    
23
+    <hr />
24
+    <a id="installing"></a>
25
+    <h2><a class="anchor" href="#installing">1단계: Tor 다운받아 설치하기</a></h2>
26
+    <br />
27
+    
28
+    <p>
29
+    매킨토시 OS X 통합배포판은<a href="<page index>">Tor</a>,
30
+    <a href="http://www.vidalia-project.net/">Vidalia</a> (Tor GUI),
31
+    <a href="http://www.privoxy.org/">Privoxy</a> (필터링 웹 프록시)
32
+    를 포함하고 있습니다. 그리고 이것들은 함께 작동하도록 설정되어 있습니다.
33
+    <a href="../<package-osx-bundle-stable>">안정화된 버전</a>이나
34
+    <a href="../<package-osx-bundle-alpha>">개발 버전</a>
35
+    중 하나를 다운받을 수도 있고,<a href="<page
36
+    download/download>">다운로드 페이지</a>에 가서 다른 버전들을 찾아볼 수도 있습니다.
37
+    </p>
38
+    
39
+    <p>Tor 인스톨러 사용은 아주 간단합니다. 아래는 셋업 페이지를 캡쳐한 모습입니다:
40
+    </p>
41
+    
42
+    <p><img alt="tor installer splash page"
43
+    src="../img/screenshot-osx-installer-splash.png"
44
+    border="1"></p>
45
+    
46
+    <p>설치가 끝나면, Applications 폴더에서 Vidalia 아이콘을 선택해서 그것을 실행시킬 수 있습니다.
47
+    빨간색 "X"가 새겨진 어두운 양파가 dock에 보인다면, Tor가 실행되지 않고 있는 것입니다.
48
+    화면 위에 있는 Tor 메뉴에서 Start를 선택해서 Tor를 실행시킬 수 있습니다.
49
+    </p>
50
+    
51
+    <p>Tor가 실행 중일 때는 dock에 있는 Vidalia의 아이콘이 아래와 같이 보일 것입니다:
52
+    </p>
53
+    
54
+    <p><img alt="vidalia running tor"
55
+    src="../img/screenshot-osx-vidalia.png"
56
+    border="1"></p>
57
+    
58
+    <p>Privoxy는 Tor 통합배포판에 포함되어 설치되어 있습니다. 일단 설치가 되고 나면, Privoxy는 
59
+    컴퓨터가 다시 시작할 때 자동으로 실행됩니다.
60
+    Privoxy가 Tor를 사용하도록 설정할 필요는 없습니다 &mdash; Tor 사용을 위한 Privoxy 설정은
61
+    이미 되어 있는 상태입니다.
62
+    </p>
63
+    
64
+    <hr />
65
+    <a id="using"></a>
66
+    <h2><a class="anchor" href="#using">2단계: 당신의 프로그램이 Tor를 사용하도록 설정하기</a></h2>
67
+    <br />
68
+    
69
+    <p>Tor와 Privoxy를 설치한 후에, 당신이 운영중인 프로그램들이 Tor를 사용하도록 설정해야 합니다.
70
+    가장 먼저 할 일은 웹브라우저 설정을 변경하는 것입니다.</p>
71
+    
72
+    <p>
73
+    만약에 당신이 파이어폭스를 사용중이라면(파이어폭스를 권장합니다), Vidalia 통합배포판이 
74
+    <a href="https://addons.mozilla.org/firefox/2275/">Torbutton
75
+    플러그인</a>을 자동으로 설치할 것입니다. 
76
+    설치 후 파이어폭스를 다시 시작하면, 모든 설정이 끝난 것입니다:
77
+    </p>
78
+    
79
+    <p><img alt="Torbutton plugin for Firefox"
80
+    src="../img/screenshot-torbutton.png"
81
+    border="1"></p>
82
+    
83
+    <p>
84
+    (<a href="https://torbutton.torproject.org/">Torbutton에 대해 더 알고 싶으면 여기를 클릭하세요</a>.
85
+    만약에 다른 컴퓨터에서도 파이어폭스와 Tor를 사용할 계획이라면, 다음의
86
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">
87
+    FAQ</a>를 참고하세요.
88
+    만약에 파이어폭스가 아닌 다른 브라우저를 사용해야 한다면,
89
+    <a href="<page docs/tor-doc-web>">프록시 설정을 직접 해줘야 합니다</a>.)
90
+    </p>
91
+    
92
+    
93
+    <h3>애플 사파리</h3>
94
+    
95
+    <p>  
96
+    사파리에서 Tor를 사용하려면 네트워크 설정을 변경해줘야 합니다. 
97
+    아래 그림에 보이는 것처럼 Apple - Location - Network Preference를 선택합니다.</p>
98
+    
99
+    <p><img alt="Network settings"
100
+    src="../img/screenshot-osx-choose-network.png"
101
+    border="1"></p>
102
+    
103
+    <p>Network Interface를 선택한 후, Tor를 사용하도록 프록시 설정을 변경해줘야 합니다. 
104
+    만약에 다수의 인터페이스에서 Tor를 사용하고 싶다면 각각의 설정을 모두 변경해줘야 합니다.</p>
105
+    
106
+    <p><img alt="Network preferences"
107
+    src="../img/screenshot-osx-choose-interface.png"
108
+    border="1"></p>
109
+    
110
+    <p>웹 프록시(HTTP)와 HTTPS 모두에 127.0.0.1과 포트번호 8118을 입력하세요. 
111
+    FTP 프록시와 Gopher 프록시의 설정도 위와 같이 변경해줘야 합니다; 
112
+    Tor와 FTP 프록시들에 대해 더 알고 싶다면<a
113
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FtpProxy"> 이 노트</a>
114
+    를 참고하세요. Passive FTP 모드 (PASV)는 원래 있던대로 놔두면 됩니다.</p>
115
+    
116
+    <p><img alt="Proxy settings"
117
+    src="../img/screenshot-osx-proxy-settings.png"
118
+    border="1"></p>
119
+    
120
+    <p>Privoxy를 사용하는 것은 <strong>필수입니다</strong>. 왜냐하면 <a 
121
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">브라우저들은
122
+    SOCKS 프록시를 직접 운영하면서 당신이 보내는 DNS 요청을 곳곳에 흘리기 때문입니다</a>. 
123
+    이것은 당신의 익명성에 안 좋은 영향을 줍니다. 또 Privoxy는 당신의 통신요청에서
124
+    위험한 헤더들을 제거하고, Doubleclick같은 불쾌한 광고사이트를 차단해주는 일도 합니다.</p>
125
+    
126
+    
127
+    <p>HTTP 프록시를 사용하는 다른 프로그램에서도 Tor를 사용하려면, 
128
+    그들이 Privoxy를 가르키도록 설정하면 됩니다(즉, localhost 포트 8118로 연결). 
129
+    SOCKS를 직접 연결해서 사용하려면(메신저, Jabber, IRC 등), 당신의 프로그램이
130
+    Tor를 가르키도록 직접 설정할 수 있습니다(localhost 포트 9050), 
131
+    그러나 이것이 왜 위험한지 알기 위해서 다음의<a
132
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">
133
+    FAQ</a>를 한 번 볼 필요가 있습니다. SOCKS나 HTTP가 사용불가능한 프로그램을 위해선
134
+    <a href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a>나
135
+    <a href="http://www.dest-unreach.org/socat/">socat</a>를 참고하세요.</p>
136
+    
137
+    
138
+    
139
+    
140
+    <p>이밖에 다른 프로그램들에서 어떻게 Tor를 사용할 수 있는지에 대한 정보가 필요하다면,
141
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
142
+    HOWTO</a>를 참고하세요.
143
+    </p>
144
+    
145
+    
146
+    <hr />
147
+    <a id="verify"></a>
148
+    <h2><a class="anchor" href="#verify">3단계: 제대로 작동하는지 확인하기</a></h2>
149
+    <br />
150
+    
151
+    <p>
152
+    다음으로, Tor를 사용하도록 설정된 브라우저를 통해 통신을 할 때 
153
+    IP주소가 제대로 익명화되고 있는지 확인해야 합니다.
154
+    <a href="https://check.torproject.org/">Tor 확인기</a>를 클릭한 후
155
+    당신이 Tor를 사용하고 있는지 아닌지 결과를 확인하세요.
156
+    #<a href="http://ipchicken.com/">이 사이트</a>
157
+    #에서는 당신이 사용하고 있다고 생각되는 IP주소를 알려줍니다. 
158
+    (만약 이 사이트가 안 열린다면, Tor를 테스트할 수 있는 다른 방법들이 나와있는 다음의<a
159
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate"> 
160
+    FAQ</a>를 확인하세요.)
161
+    </p>
162
+    
163
+    
164
+    <p>만약에 접속제한을 하는 개인 파이어월을 사용 중이라면,
165
+    당신이 사용하는 프로그램들이 당신 컴퓨터의 8118 포트와 9050 포트에 접근을 
166
+    할 수 있도록 되어있는지 확인해야 합니다. 만약에 파이어월이
167
+    밖으로 나가는 연결을 차단한다면, 최소한 TCP 포트 80번과 443번은 
168
+    연결이 되도록 허용해야 합니다. 그리고나서 다음의 <a
169
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">
170
+    FAQ</a>를 참고하세요.
171
+    </p>
172
+    
173
+    
174
+    <p>그래도 작동하지 않는다면, 다음의<a
175
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">
176
+    FAQ</a>에서 몇가지 힌트를 얻을 수 있습니다.</p>
177
+    
178
+    <p>
179
+    일단 Tor가 작동하기 시작했다면,
180
+    <a href="<page download/download>#Warning">Tor가 무엇을 하고 무엇을 할 수 없는지</a> 
181
+    확인해보는 것이 좋습니다.
182
+    </p>
183
+    
184
+    
185
+    <hr />
186
+    <a id="server"></a>
187
+    <a id="relay"></a>
188
+    <h2><a class="anchor" href="#relay">4단계: 중계서버로 설정하기</a></h2>
189
+    <br />
190
+    
191
+    <p>
192
+    Tor 네트워크는 자발적으로 대역폭을 제공하는 자원자들에 의해 운영됩니다. 중계서버를
193
+    운영하는 사람이 많아질수록, Tor 네트워크가 더 빨라질 것입니다.
194
+    만약에 당신이 양방향으로 최소 20Kilobytes/s의 대역폭을 가지고 있다면,
195
+    당신의 Tor도 중계서버로 운영되도록 설정할 것을 부탁드립니다.
196
+    제공되는 대역폭을 제한하는 것, 당신의 컴퓨터를 이용해 인터넷을
197
+    사용하는 사람들이 그것을 악용할 수 없도록 Exit 정책을 설정하는 것,
198
+    그리고 동적 IP 주소를 지원하는 것 등, Tor중계서버를 설정하는 것은 아주 간단합니다.
199
+    </p>
200
+    
201
+    
202
+    <p>광활한 네트의 곳곳에서 중계서버가 운영되는 것이 Tor 이용자들을 안전하게 해줍니다.
203
+    또 당신이 중계서버를 운영하는 경우, 웹사이트들은 당신의 컴퓨터에서 온 통신요청이 당신이 보낸 것인지
204
+    아니면 다른 이의 통신요청을 중계해주는 것인지 알 수 없기 때문에<a
205
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">
206
+    당신에게는 더욱 강한 익명성이 만들어질 수도 있습니다</a>
207
+    .</p>
208
+    
209
+    
210
+    <p><a href="<page docs/tor-doc-relay>">중계서버 설정하기</a>
211
+    를 참고하시면, 더 많은 정보들을 얻을 수 있습니다.</p>
212
+    
213
+    <hr />
214
+    <a id="uninstall"></a>
215
+    <h2><a class="anchor" href="#uninstall">Tor와 Privoxy를 제거하는 방법</a></h2>
216
+    <br />
217
+    
218
+    <p> Tor 0.1.0.x 시리즈 이상의 버전들은 커맨드라인을 통해 입력가능한
219
+    제거명령을 가지고 있습니다. 만약에 OSX에서 Tor를 제거하고 싶다면,
220
+    아래와 같이 하면 됩니다:</p>
221
+    
222
+    <p>프로그램들의 프록시 설정을 기존의 초기값으로 돌려놓습니다.
223
+    만약에 단순히 Tor의 사용을 중단하고 싶은 것이라면, 이것만으로 충분합니다.</p>
224
+    
225
+    <p>만약에 당신이 Tor를 완전히 제거하고 싶다면, 그리고 당신계정이
226
+    Admin 권한을 가지고 있다면, 아래와 같이 진행하면 됩니다:</p>
227
+    
228
+    <ol>
229
+    <li> 터미널이나 x-term 세션을 연다.</li>
230
+    <li> cd /Library/Tor</li>
231
+    <li> sudo -s</li>
232
+    <li> ./uninstall_tor_bundle.sh</li>
233
+    </ol>
234
+    
235
+    <p>이제 컴퓨터에서 Tor와 Privoxy가 완전히 제거되었습니다.</p>
236
+    
237
+    <p>만약에 당신이  Tor 제거 스크립트가 포함되지 않은 버전을 사용중이라면, 
238
+    아래와 같은 방법으로 수동적인 삭제를 할 수 있습니다:</p>
239
+    <ul>
240
+    <li>/Library/Tor</li>
241
+    <li>/Library/Privoxy</li>
242
+    <li>/usr/bin/tor</li>
243
+    <li>/usr/bin/tor_resolve</li>
244
+    <li>/var/log/tor</li>
245
+    <li>/usr/share/man/man1/tor.1</li>
246
+    <li>/usr/share/man/man1/tor-resolve.1</li>
247
+    <li>/usr/share/man/man1/torify.1</li>
248
+    <li>/Library/Receipts/Privoxy.pkg/</li>
249
+    <li>/Library/Receipts/privoxyconf.pkg/</li>
250
+    <li>/Library/Receipts/Tor.pkg/</li>
251
+    <li>/Library/Receipts/torstartup.pkg/</li>
252
+    <li>/Library/StartupItems/Tor</li>
253
+    <li>/Library/StartupItems/Privoxy</li>
254
+    </ul>
255
+    
256
+    <hr />
257
+    
258
+    <p>이 문서를 개선시킬 수 있는 제안이 있다면,  <a
259
+    href="<page about/contact>">우리에게 보내주세요</a>. 감사합니다!</p>
260
+  </div>
261
+  <!-- END MAINCOL -->
262
+  <div id = "sidecol">
263
+#include "side.wmi"
264
+#include "info.wmi"
265
+  </div>
266
+  <!-- END SIDECOL -->
267
+</div>
268
+<!-- END CONTENT -->
269
+#include <foot.wmi>   
... ...
@@ -0,0 +1,324 @@
1
+## translation metadata
2
+# Revision: $Revision: 22144 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Relay Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-relay>">Configure Tor Relay</a>
11
+  </div> 
12
+  <div id="maincol">   
13
+    <h1><a href="<page index>">Tor</a> 중계서버 설정하기</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    Tor 네트워크는 자발적으로 대역폭을 제공하는 자원자들에 의해 운영됩니다. 중계서버를
18
+    운영하는 사람이 많아질수록, Tor 네트워크가 더 빨라질 것입니다.
19
+    만약에 당신이 양방향으로 최소 20Kilobytes/s의 대역폭을 가지고 있다면,
20
+    당신의 Tor도 중계서버로 운영되도록 설정할 것을 부탁드립니다.
21
+    제공되는 대역폭을 제한하는 것, 당신의 컴퓨터를 이용해 인터넷을
22
+    사용하는 사람들이 그것을 악용할 수 없도록 Exit 정책을 설정하는 것,
23
+    그리고 동적 IP 주소를 지원하는 것 등, Tor중계서버를 설정하는 것은 아주 간단합니다.
24
+    </p>
25
+    
26
+    
27
+    <p> 광활한 네트의 곳곳에서 중계서버가 운영되는 것이 Tor 이용자들을 안전하게 해줍니다.
28
+    또 당신이 중계서버를 운영하는 경우, 웹사이트들은 당신의 컴퓨터에서 온 통신요청이 당신이 보낸 것인지
29
+    아니면 다른 이의 통신요청을 중계해주는 것인지 알 수 없기 때문에<a
30
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">
31
+    당신에게는 더욱 강한 익명성이 만들어질 수 있습니다</a>
32
+    .</p>
33
+    
34
+    
35
+    <p>Tor 중계서버를 설정하는 것은 쉽고 간단합니다:
36
+    <ul>
37
+    
38
+    <li>Tor 중계서버에는<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">
39
+    대역폭 제한기능</a>이 내장되어 있습니다. 또, 당신이 충분한 대역폭을 가지고 있지만 
40
+    하루(혹은 일주일, 한달)에 제공하는 byte를 제한하고 싶다면
41
+    <a
42
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Hibernation">hibernation
43
+    기능</a>을 이용할 수 있습니다.
44
+    </li>
45
+    
46
+    <li>각각의 Tor 중계서버는 어떤 종류의 통신을 허용/거부하는지 설정하는
47
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RunARelayBut">
48
+    출구 정책(exit policy)</a>을 가지고 있습니다.
49
+    만약에 사람들이 당신의 중계서버를 통해 Tor 네트워크를 빠져나가는 것이 불편하다면
50
+    다른 Tor 중계서버로 연결되는 것만을 허용하도록 설정할 수도 있습니다.
51
+    </li>
52
+    
53
+    <li>때때로 중계서버가 꺼지는 것은 괜찮습니다. Tor 디렉토리가 이러한 상태를
54
+    재빠르게 공지하고 중지된 중계서버를 홍보하는 것을 그만둘 것입니다. 다만 
55
+    통신이 오가는 와중에 중계서버가 꺼진다면 통신이 날아가므로,
56
+    너무 자주 꺼지는 것은 곤란합니다.
57
+    </li>
58
+    
59
+    <li>동적 IP주소로 운영되는 중계서버도 가능합니다. &mdash; IP주소
60
+    설정칸을 빈칸으로 남겨놓기만 하면, Tor가 IP주소를 찾아낼 것입니다.
61
+    </li>
62
+    
63
+    
64
+    <li>만약에 당신의 중계서버가 공유기에 연결되어 있고, 공적 IP주소가 무엇인지 모른다면 
65
+    (예를 들어 IP주소 192.168.x.y), 포트 포워딩을 설정해야 합니다. 
66
+    TCP 연결을 포워딩하는 것은 시스템마다 다르지만 <a
67
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients">이
68
+    FAQ</a>를 보면 몇가지 방법을 확인할 수 있습니다.
69
+    </li>
70
+    
71
+    <li>Tor 중계서버는 최신의 가능한 대역폭을 측정하고 공지/홍보할 것입니다.
72
+    따라서 높은 대역폭의 중계서버가 더 많은 사용자들을 끌어들이게 됩니다. 그러므로
73
+    낮은 대역폭의 중계서버들도 매우 유용합니다.
74
+    </li>
75
+    
76
+    </ul>
77
+    
78
+    <p>Tor 중계서버는 어떤 운영체제에서도 운영이 가능합니다만 
79
+    어느 운영체제에서 더 잘 작동하는지 어떤 문제가 있을 수 있는지에 대한 조언들을  
80
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayOS">이 FAQ</a> 
81
+    에서 확인할 수 있습니다.</p>
82
+    
83
+    
84
+    <hr />
85
+    <a id="zero"></a>
86
+    <h2><a class="anchor" href="#zero">0단계: Tor를 다운받아 설치하기</a></h2>
87
+    <br />
88
+    
89
+    <p>시작하기 전에, Tor가 설치되어 있고, 운영되고 있는지 확인해야 합니다.</p>
90
+    
91
+    <p>윈도우 사용자들은 윈도우 Tor 설치매뉴얼에서 최소한<a
92
+    href="<page docs/tor-doc-windows>#installing">1단계</a>
93
+    까지 완료가 된 상태여야 합니다.  맥 OS X 사용자들도 최소한
94
+    설치매뉴얼의 <a href="<page docs/tor-doc-osx>#installing">1단계</a>
95
+    까지 진행된 상태여야 하고,  리눅스/BSD/유닉스 사용자들도
96
+    유닉스 설치설명서에서
97
+    <a href="<page docs/tor-doc-unix>#installing">1단계</a>
98
+    까지 진행된 상태여야 합니다.
99
+    </p>
100
+    
101
+    <p>제대로 작동하는지 확인하기 위해 당분간은 Tor를 클라이언트로 사용해볼 수도 있습니다.</p>
102
+    
103
+    <hr />
104
+    <a id="setup"></a>
105
+    <h2><a class="anchor" href="#setup">1단계: 중계서버로 설정하기</a></h2>
106
+    <br />
107
+    
108
+    <p>
109
+    1. 컴퓨터의 시계가 정확한 시각을 가르키고 있는지 확인합니다. 가능하다면, 공공
110
+    시계 서버들과 당신 컴퓨터의 시계를 일치시켜야 합니다.
111
+    </p>
112
+    
113
+    <p>
114
+    2. 도메인 연결 시스템이 제대로 작동하고 있어야 합니다. (당신의
115
+    컴퓨터가 인터넷 도메인 주소들을 제대로 찾아가고 있으면 된 것입니다.)
116
+    </p>
117
+    
118
+    <p>
119
+    3. torrc의 아랫부분을 수정해야 합니다. (도움말을 위해<a
120
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">이 
121
+    FAQ</a>를 보세요.)
122
+    최소한 별명Nickname과 ORPort는 입력해야 합니다. 필요하다면 데이터 디렉토리DataDirectory를
123
+    생성하고, 그 디렉토리가 Tor를 운영하는 사용자의 소유가 되도록 해야합니다.
124
+    <em>만약 당신이 한 개 이상의 Tor 중계서버를 운영하길 원한다면 정말 대환영입니다. 하지만 
125
+    당신이 운영하는 모든 중계서버에서 <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#MultipleRelays">MyFamily 옵션</a>을 설정해줘야 합니다.</em>
126
+    </p>
127
+    
128
+    
129
+    <p>
130
+    4. 만약에 당신이 파이어월을 사용하고 있다면, 연결요청들이 당신이 설정한 포트(ORPort, DirPort)
131
+    에 도달할 수 있도록 파이어월을 열어줘야 합니다. 나가는 연결들은 모두 허용되도록 해야합니다.
132
+    그래야만 당신의 중계서버가 다른 중계서버로 통신들을 전달할 수 있습니다.
133
+    </p>
134
+    
135
+    
136
+    <p>
137
+    5. 이제 중계서버를 다시 시작하세요. 만약에 <a
138
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">경고메세지</a>가 
139
+    나온다면, 기록해 두세요.
140
+    </p>
141
+    
142
+    <p>
143
+    6. <a
144
+    href="http://archives.seul.org/or/announce/">or-announce</a>
145
+    메일링리스트에 가입하세요. 이 메일링리스트는 아주 가끔 사용됩니다.
146
+    안정화된 새로운 버전이 출시되는 것을 알려줄 것입니다. 
147
+    또는 새로운 개발버전이 나올 때마다 알려주는<a
148
+    href="http://archives.seul.org/or/talk/">or-talk</a> 메일링리스트에 가입할 수도 있습니다
149
+    (이 메일링리스트는 좀 더 자주 사용됩니다).
150
+    </p>
151
+    
152
+    <p>
153
+    7. 매뉴얼을 읽어보세요.
154
+    최신의 안정화된 버전에 대한 <a href="<page docs/tor-manual>">매뉴얼</a>은
155
+    클라이언트와 중계서버 모두에 해당하는 모든 설정옵션을 알려줍니다.
156
+    만약에 당신이 Tor의 개발버전을 사용중이라면,
157
+    <a href="<page docs/tor-manual-dev>">여기</a>에 있는 매뉴얼을 보면 됩니다.
158
+    </p>
159
+    
160
+    
161
+    
162
+    <hr />
163
+    <a id="check"></a>
164
+    <h2><a class="anchor" href="#check">2단계: 제대로 작동하는지 확인하기</a></h2>
165
+    <br />
166
+    
167
+    <p>Tor 중계서버가 네트워크에 연결을 시도하자 마자, 설정된 포트가
168
+    바깥쪽에서 접속가능한지 스스로 확인할 것입니다. 이 과정은 최대 20분정도 걸릴 수 있습니다.
169
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">로그기록</a>에서
170
+    다음과 같은 문장이 있는지 찾아보세요
171
+    <tt>Self-testing indicates your ORPort is reachable from the outside. Excellent.</tt>
172
+    만약에 위와 같은 메세지가 없다면, 중계서버가 바깥쪽에서 접속할 수 없다는 뜻입니다
173
+    &mdash; 이럴 경우 파이어월을 다시 한번 확인해야 합니다. 테스트해야한다고 생각하는
174
+    IP주소와 포트를 테스트하고 있는지 확인하세요.
175
+    </p>
176
+    
177
+    <p>일단 접속이 가능하다고 판단이 되면, 디렉토리에 "server
178
+    descriptor"를 올릴 것입니다.  이것을 통해 클라이언트들이 
179
+    Tor 중계서버의 주소, 포트, 키, 등의 정보를 알게 될 것입니다. 중계서버가 올라왔는지 확인하기 위해, <a
180
+    href="http://moria.seul.org:9032/tor/status/authority">네트워크 상태 중 하나를 
181
+    보고</a> 앞에서 입력한 별명Nickname을 찾아볼 수도 있습니다. 
182
+    최신의 디렉토리 상태로 새로고침 하기 위해서 몇 초간 기다려야 합니다. 
183
+    </p>
184
+    
185
+    
186
+    <hr />
187
+    <a id="after"></a>
188
+    <h2><a class="anchor" href="#after">3단계: 제대로 작동을 시작한 후에</a></h2>
189
+    <br />
190
+    
191
+    <p>
192
+    아래의 단계들도 진행할 것을 권장합니다:
193
+    </p>
194
+    
195
+    <p>
196
+    8. Tor 중계서버의 보안을 어떻게 강화할 수 있는지 
197
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/OperationalSecurity">이 문서</a>
198
+    를 읽어보세요.
199
+    </p>
200
+    
201
+    <p>
202
+    9. 어떤 출구정책을 원하는지 결정하세요. 몇 가지를 제외하고(예를 들어 포트 25) 
203
+    기본적으로 Tor 중계서버는 대부분의 서비스를 허용합니다. 출구정책이 좀 더 
204
+    많은 제한을 하게 하거나, 혹은 좀 더 적은 제한을 하게 할 수 있습니다; 
205
+    torrc 파일을 적당하게 수정하면 됩니다.
206
+    <a
207
+    href="<page docs/faq-abuse>#TypicalAbuses">기본 출구정책을 사용할 때 발생할 수 있는 문제들
208
+    에 대한 FAQ</a>를 읽어보세요.
209
+    만약에 개방된 출구정책을 정한다면, 당신이 사용하는 ISP가 그런 결정을 
210
+    수용할 수 있는지 확인해야 합니다.
211
+    만약에 컴퓨터에 특정 접속제한이 있다면 (예를 들어,
212
+    파이어월이나 콘테트 필터를 사용중이라면), 출구정책에도 그것들을 반영해야 합니다 &mdash; 
213
+    그렇지 않다면 Tor 이용자들이 영향을 받을 것입니다.
214
+    </p>
215
+    
216
+    <p>
217
+    10. 대역폭 제한 문제도 결정해야 합니다. 케이블 모뎀 , DSL, 그리고 
218
+    비대칭적 대역폭을 가지고 있는 사용자들은 
219
+    (예를 들어, 다운로드 대역폭이 업로드 대역폭보다 큰 경우) 
220
+    통신이 느려지거나 혼잡해지는 것을 방지하기 위해 대역폭 제한 설정을 해줘야 합니다. 
221
+    구체적인 내용들은 <a
222
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">대역폭 제한 FAQ</a>에서 확인할 수 있습니다.
223
+    </p>
224
+    
225
+    <p>
226
+    11. Tor 중계서버의 비밀키를 백업해야 합니다 (데이터디렉토리DataDirectory의 "keys/secret_id_key"
227
+    에 저장되어 있습니다). 이것이 Tor 중계서버의 "identity"입니다. 그리고 
228
+    중계서버를 지나가는 트래픽들을 아무도 읽을 수 없도록 하기 위해서 이것을
229
+    안전하게 보관해야 합니다. 이것은 무언가 잘못되어서 <a
230
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#UpgradeRelay">Tor 중계서버를 옮기거나 
231
+    복구</a>해야할 때 필요한 매우 중요한 파일입니다.</p>
232
+    
233
+    <p>
234
+    12. 만약 당신의 도메인이 설정되어 있는 네임서버를 직접 관리한다면, 역 DNS 호스트네임을 
235
+     'anonymous-relay', 'proxy' 혹은 'tor-proxy'로 설정하는 것을 고려해 주세요. 이럴 경우
236
+    다른 사람들이 그들의 웹로그에서 주소를 볼 때, 그들은 무슨 일이 일어나고 있는지
237
+    더 빨리 이해할 수 있을 것입니다. 당신이 출구노드로서 Tor 중계서버를 운영하고 있는 경우,
238
+    이러한 이름으로 가상 호스트vhost 에<a
239
+    href="https://tor-svn.freehaven.net/svn/tor/trunk/contrib/tor-exit-notice.html">Tor
240
+    출구 공지</a>를 추가하는 것은 당신과 당신의 ISP에 악의적인 불평을 하려는 시도들을
241
+    막는데 큰 도움이 됩니다.
242
+    </p>
243
+    
244
+    
245
+    <p>
246
+    13. 만약 당신의 컴퓨터가 웹서버를 운영하는 것이 아니라면, 
247
+    ORPort를 443으로, DirPort를  80으로 바꾸는 것을 고려해주세요.
248
+    많은 Tor 이용자들 웹브라우징만 허용하는 파이어월 뒤에 갇히게 되는데, 
249
+    이 변화가 그들로 하여금 당신의 Tor 중계서버에 접속할 수 있도록 해줄 것입니다.  
250
+    윈도우 중계서버들은 torrc에서 ORPort 와 DirPort 수정해준 다음에
251
+    Tor를 다시 시작하면 됩니다. OS X 나 Unix 중계서버들은  (루트가 아닌 이상) 이 포트들에 직접 
252
+    연결될 수 없습니다, 그래서 통신요청들이 Tor 중계서버에 도달할 수 있도록 <a
253
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients">
254
+    포트 포워딩</a>같은 설정이 필요합니다. 만약 당신이 포트 80과 443을 사용중인데도, 
255
+    제대로 작동하지 않는다면, 포트 22, 110, 143을 사용해보는 것도 할 수 있습니다.</p>
256
+    
257
+    <p>
258
+    14. 만약 당신의 Tor 중계서버가 같은 IP주소에서 다른 서비스를 제공하고 있다면 
259
+    &mdash; 예를 들어 웹서버 &mdash; 로컬호스트를 통해서도 웹서버에 
260
+    연결될 수 있도록 해야합니다. Tor 클라이언트가 Tor 중계서버를 <a
261
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">
262
+    웹서버에 접속하는 가장 안전한 방법</a>으로 
263
+    인식하기 때문에 이러한 연결을 허용해줘야 합니다. 
264
+    그리고 중계서버로 끝나는 회로를 꼭 구성해야 합니다.
265
+    만약에 연결을 허용하고 싶지 않다면,
266
+    출구정책에서 그것들을 명확하게 차단해야 합니다.
267
+    </p>
268
+    
269
+    <p>
270
+    15. (유닉스만 해당). 중계서버를 운영하는 별도의 계정을 만드세요.
271
+    만약에 OS x 패키지나 deb나 rpm 을 설치했다면, 이 작업은 이미 되어 
272
+    있을 것입니다. 
273
+    그렇지않다면, 직접할 수 있습니다. (Tor 중계서버는 루트계정으로
274
+    운영되어야 할 필요가 없습니다. 
275
+    그러므로 루트계정으로 운영하지 않는 것이 좋습니다. 'tor' 계정으로
276
+    중계서버를 운영하는 것은  identd 데몬과 사용자 이름과 관련된 몇가지 
277
+    문제들을 해결해줍니다. 만약에 당신이 걱정이 많은 사람이라면, <a
278
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorInChroot">
279
+    chroot jail에 Tor를 놓을 수도 있습니다</a>.)
280
+    </p>
281
+    
282
+    <p>
283
+    16. (유닉스만 해당) 당신의 운영체제는
284
+    아마도 프로세스당 열려있는 파일 디스크립터의 갯수를 1024개로 제한하고 있을 것입니다.(때로는 더 적게)
285
+    만약에 빠른 출구 노드를 운영할 계획이라면, 이 갯수는 충분하지 않습니다.
286
+    리눅스에서는, /etc/security/limits.conf 파일에  "toruser hard nofile 8192"
287
+    라고 추가해야 합니다. (toruser는 Tor 프로세스를 운영하는 계정을 말합니다)
288
+    그리고 패키지 상태로 설치가 되었다면 Tor를 재시작해야 합니다.
289
+    만약에 이것이 적용되지 않는다면, 
290
+    Tor를 시작하기 전에 "ulimit -n 8192"를 실행시킬 수 있는 다른 방법들이 나와있는<a
291
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FileDescriptors">이 FAQ</a>
292
+    를 참고하세요. </p>
293
+    
294
+    
295
+    <p>
296
+    17. 만약에 당신이 패키지나 인스톨러를 통해 Tor를 설치했다면, 
297
+    Tor는 컴퓨터가 켜질 때 자동으로 실행될 것입니다. 그러나 만약에 소스에서 직접 설치했다면
298
+    contrib/tor.sh나 contrib/torctl의 스크립트를 유용하게 사용할 수 있을 것입니다.
299
+    </p>
300
+    
301
+    <p>
302
+    Tor 설정을 변경할 때는, 변경이 후에도 Tor 중계서버가 잘 작동하고 있는지
303
+    꼭 확인해야 합니다. 만약에 당신의 Tor 중계서버가 업그레이드가 필요하거나
304
+    무언가 잘못되고 있을 때 우리가 당신에게 연락할 수 있도록 torrc 파일에서 
305
+    "ContactInfo" 라인을 설정/유지하는 것을 잊지마세요.
306
+    문제나 질문이 있다면, <a href="<page docs/documentation>#Support">지원 섹션</a>을 보거나 
307
+    tor-ops 리스트에서 <a href="<page about/contact>">contact us</a> 부분을 참고하세요. 
308
+    Tor 네트워크가 자랄 수 있도록 도와주셔서 감사합니다!</p>
309
+    
310
+    
311
+    <hr />
312
+    
313
+    <p>이 문서를 개선하기 위한 제안이 있다면, <a
314
+    href="<page about/contact>">우리에게 보내주세요</a>.감사합니다!</p>
315
+  </div>
316
+  <!-- END MAINCOL -->
317
+  <div id = "sidecol">
318
+#include "side.wmi"
319
+#include "info.wmi"
320
+  </div>
321
+  <!-- END SIDECOL -->
322
+</div>
323
+<!-- END CONTENT -->
324
+#include <foot.wmi>   
... ...
@@ -0,0 +1,218 @@
1
+    <h1>리눅스/BSD/유닉스에서 <a href="<page index>">Tor</a> 운영하기</h1>
2
+    <br />
3
+    
4
+    <p>
5
+    <b>이 안내서는 Tor 클라이언트 
6
+    운영울 위한 설치 매뉴얼 입니다. 만약 다른 이용자들에게 중계 트래픽을 제공해서 
7
+    Tor 네트워크가 더 커지도록 돕고싶다면(꼭 해주세요),
8
+    <a href="<page docs/tor-doc-relay>">중계서버 설정하기</a>를 읽어주세요.</b>
9
+    </p>
10
+    
11
+    <hr />
12
+    <a id="installing"></a>
13
+    <h2><a class="anchor" href="#installing">1단계: Tor 다운받아 설치하기</a></h2>
14
+    <br />
15
+    
16
+    <p>
17
+    Tor의 최신버전은
18
+    <a href="<page download/download>">다운로드 페이지</a>에서 찾을 수 있습니다. 
19
+    데비안, 레드햇, 젠투, *BSD 등을 위한 Tor 패키지를 다운받을 수 있습니다.</p>
20
+    
21
+    <p>소스를 가지고 직접 설치를 하려면 , 먼저 <a
22
+    href="http://www.monkey.org/~provos/libevent/">libevent</a>를 설치해야 합니다.
23
+    그리고 openssl과 zlib도 설치되어 있는지 확인해야 합니다. (가능하다면 -devel 패키지도 포함해서)
24
+    설치와 확인이 끝나면 다음 명령을 실행하세요:<br />
25
+    <tt>tar xzf tor-<version-stable>.tar.gz; cd tor-<version-stable><br />
26
+    ./configure &amp;&amp; make</tt><br />
27
+    이제 <tt>src/or/tor</tt>를 통해 Tor를 실행시키거나, 
28
+    <tt>make install</tt>을 (필요하다면 루트권한으로) 실행시켜서 
29
+    /usr/local/에 인스톨한 후 <tt>tor</tt>
30
+    명령어를 통해 Tor를 실행시킬 수 있습니다.
31
+    </p>
32
+    
33
+    <p>
34
+    Tor는 기본적으로 클라이언트로 설정 되어 있습니다. 기본 설정 파일이 내장되어 있는데,
35
+    대부분의 경우 이 설정을 변경할 필요가 없습니다. 이제 Tor가 설치된 것입니다.
36
+    </p>
37
+    
38
+    <hr />
39
+    <a id="privoxy"></a>
40
+    <h2><a class="anchor" href="#privoxy">2단계: 웹브라우저를 위해 Privoxy 설치하기</a></h2>
41
+    <br />
42
+    
43
+    <p>Tor를 설치한 다음에는, 프로그램들이 Tor를 사용하도록 설정해야 합니다.</p>
44
+    
45
+    <p>
46
+    첫 번째 할 일은 웹브라우저를 설정하는 것입니다. 우선 <a
47
+    href="http://www.privoxy.org/">Privoxy</a>를 설치해야 합니다: 
48
+    'recent releases'를 클릭하고
49
+    가장 적합한 패키지를 선택하거나, 소스를 가지고 직접 설치할 수 있습니다. Privoxy는
50
+    Tor와 함께 작동하는 필터링 웹 프록시입니다.
51
+    </p>
52
+    
53
+    
54
+    <p>Privoxy를 설치하고 나면(패키지로 했던 소스로 했던지 간에),
55
+    <b>Privoxy가 Tor를 사용하도록 설정해야 합니다</b>. 
56
+    <a
57
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">Privoxy 설정 샘플</a>
58
+    을 보는게 도움이 될 수 있습니다. 아니면 아래 나와있는 방법을 이용해
59
+    Privoxy 설정을 직접 할 수도 있습니다.</p>
60
+    
61
+    
62
+    <p>
63
+    Privoxy의 "config" 파일을 엽니다.(/etc/privoxy/나 /usr/local/etc/에 있을 것입니다)
64
+    그리고 config 파일의 맨 위에 다음 줄을 추가하세요.<br>
65
+    <tt>forward-socks4a / 127.0.0.1:9050 .</tt><br>
66
+    마지막에 있는 점dot까지 입력해야 합니다.
67
+    </p>
68
+    
69
+    <p>Privoxy는 그것을 통과한 모든 것에 대한 기록을 로그파일로 보관합니다. 
70
+    이것을 멈추게 하기 위해서 아래의 세줄을 주석처리 해야합니다. 
71
+    맨 앞에 \#를 입력하면 주석처리가 됩니다. 그 세줄은: <br>
72
+    <tt>logfile logfile</tt><br>
73
+    그리고<br>
74
+    <tt>jarfile jarfile</tt><br>
75
+    그리고 (몇몇 시스템에서는) <br>
76
+    <tt>debug 1  # show each GET/POST/CONNECT request</tt><br>
77
+    입니다.
78
+    </p>
79
+    
80
+    <p>기본 config 파일이 어떤 것이냐에 따라,
81
+    <tt>enable-remote-toggle</tt>와,
82
+    <tt>enable-remote-http-toggle</tt>, 그리고 <tt>enable-edit-actions</tt>
83
+    기능을 꺼야할 수도 있습니다.
84
+    </p>
85
+    
86
+    
87
+    <p>변경된 설정을 적용하기 위해서 Privoxy를 다시 시작해야 합니다.</p>
88
+    
89
+    <hr />
90
+    <a id="using"></a>
91
+    <h2><a class="anchor" href="#using">3단계: 당신의 프로그램이 Tor를 사용하도록 설정하기</a></h2>
92
+    <br />
93
+    
94
+    <p>Tor와 Privoxy를 설치한 후에, 당신이 운영중인 프로그램들이 Tor를 사용하도록 설정해야 합니다.
95
+    가장 먼저 할 일은 웹브라우저 설정을 변경하는 것입니다.</p>
96
+    
97
+    <p>
98
+    만약에 당신이 파이어폭스를 사용중이라면(파이어폭스를 권장합니다), 
99
+    <a href="https://addons.mozilla.org/firefox/2275/">Torbutton
100
+    플러그인</a>만 설치하면 됩니다. 그러면 모든 설정이 끝난 것입니다:
101
+    </p>
102
+    
103
+    <img alt="Torbutton plugin for Firefox"
104
+    src="../img/screenshot-torbutton.png"
105
+    border="1">
106
+    
107
+    <br />
108
+    
109
+    <p>
110
+    (<a href="https://torbutton.torproject.org/">Torbutton에 대해 더 알고 싶으면 여기를 클릭하세요</a>.
111
+    만약에 다른 컴퓨터에서도 파이어폭스와 Tor를 사용할 계획이라면, 다음의
112
+    <a
113
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">
114
+    FAQ</a>를 참고하세요.
115
+    만약에 파이어폭스가 아닌 다른 브라우저를 사용해야 한다면,
116
+    <a href="<page docs/tor-doc-web>">프록시 설정을 직접 해줘야 합니다</a>.)
117
+    </p>
118
+    
119
+    
120
+    <p>Privoxy를 사용하는 것은 <strong>필수입니다</strong>. 왜냐하면 <a
121
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">브라우저들은
122
+    SOCKS 프록시를 직접 운영하면서 당신이 보내는 DNS 요청을 곳곳에 흘리기 때문입니다</a>. 
123
+    이것은 당신의 익명성에 안 좋은 영향을 줍니다. 또 Privoxy는 당신의 통신요청에서
124
+    위험한 헤더들을 제거하고, Doubleclick같은 불쾌한 광고사이트를 차단해주는 일도 합니다.</p>
125
+    
126
+    
127
+    <p>HTTP 프록시를 사용하는 다른 프로그램에서도 Tor를 사용하려면, 
128
+    그들이 Privoxy를 가르키도록 설정하면 됩니다(즉, localhost 포트 8118로 연결). 
129
+    SOCKS를 직접 연결해서 사용하려면(메신저, Jabber, IRC 등), 당신의 프로그램이
130
+    Tor를 가르키도록 직접 설정할 수 있습니다(localhost 포트 9050), 
131
+    그러나 이것이 왜 위험한지 알기 위해서 다음의<a
132
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">
133
+    FAQ</a>를 한 번 볼 필요가 있습니다. SOCKS나 HTTP가 사용불가능한 프로그램을 위해선
134
+    <a href="http://tsocks.sourceforge.net/">tsocks</a> or <a
135
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>을 참고하세요.
136
+    </p>
137
+    
138
+    
139
+    <p>이밖에 다른 프로그램들에서 어떻게 Tor를 사용할 수 있는지에 대한 정보가 필요하다면,
140
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
141
+    HOWTO</a>를 참고하세요.
142
+    </p>
143
+    
144
+    <hr />
145
+    <a id="verify"></a>
146
+    <h2><a class="anchor" href="#verify">4단계: 제대로 작동하는지 확인하기</a></h2>
147
+    <br />
148
+    
149
+    <p>
150
+    다음으로, Tor를 사용하도록 설정된 브라우저를 통해 통신을 할 때 IP주소가 제대로 익명화되고 있는지 확인해야 합니다.
151
+    <a href="https://check.torproject.org/">Tor 확인기</a>를 클릭한 후
152
+    당신이 Tor를 사용하고 있는지 아닌지 결과를 확인하세요.
153
+    #<a href="http://ipchicken.com/">이 사이트</a>
154
+    #에서는 당신이 사용하고 있다고 생각되는 IP주소를 알려줍니다. 
155
+    (만약 이 사이트가 안 열린다면, Tor를 테스트할 수 있는 다른 방법들이 나와있는 다음의<a
156
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate"> 
157
+    FAQ</a>를 확인하세요.)
158
+    </p>
159
+    
160
+    <p>만약에 접속제한을 하는 개인 파이어월을 사용 중이라면(예를 들어, 페도라 코어 4의 SELinux),
161
+    당신이 사용하는 프로그램들이 Privoxy(8118 포트)와 Tor(9050 포트)에 접속 
162
+    할 수 있도록 되어있는지 확인해야 합니다. 만약에 파이어월이
163
+    밖으로 나가는 연결을 차단한다면, 최소한 TCP 포트 80번과 443번은 
164
+    연결이 되도록 허용해야 합니다. 그리고나서 다음의 <a
165
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">
166
+    FAQ</a>를 참고하세요. 만약에 SELinux가 tor나 privoxy가 제대로 작동하지 못하도록
167
+    설정되어 있다면, /etc/selinux/targeted 폴더에 booleans.local 이라는 이름의 파일을 생성하세요.
168
+    그리고 당신이 가장 좋아하는 텍스트 편집기로 
169
+    "allow_ypbind=1"이라고 파일에 입력한 후 저장합니다. 이제
170
+    컴퓨터를 다시 시작하면, 이 설정이 적용될 것입니다.
171
+    </p>
172
+    
173
+    
174
+    <p>그래도 작동하지 않는다면, 다음의<a
175
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">
176
+    FAQ</a>에서 몇가지 힌트를 얻을 수 있습니다.</p>
177
+    
178
+    <hr />
179
+    <a id="server"></a>
180
+    <a id="relay"></a>
181
+    <h2><a class="anchor" href="#relay">5단계: 중계서버로 설정하기</a></h2>
182
+    <br />
183
+    
184
+    <p>
185
+    Tor 네트워크는 자발적으로 대역폭을 제공하는 자원자들에 의해 운영됩니다. 중계서버를
186
+    운영하는 사람이 많아질수록, Tor 네트워크가 더 빨라질 것입니다.
187
+    만약에 당신이 양방향으로 최소 20Kilobytes/s의 대역폭을 가지고 있다면,
188
+    당신의 Tor도 중계서버로 운영되도록 설정할 것을 부탁드립니다.
189
+    제공되는 대역폭을 제한하는 것, 당신의 컴퓨터를 이용해 인터넷을
190
+    사용하는 사람들이 그것을 악용할 수 없도록 Exit 정책을 설정하는 것,
191
+    그리고 동적 IP 주소를 지원하는 것 등, Tor중계서버를 설정하는 것은 아주 간단합니다.
192
+    </p>
193
+    
194
+    <p>광활한 네트의 곳곳에서 중계서버가 운영되는 것이 Tor 이용자들을 안전하게 해줍니다.
195
+    또 당신이 중계서버를 운영하는 경우, 웹사이트들은 당신의 컴퓨터에서 온 통신요청이 당신이 보낸 것인지
196
+    아니면 다른 이의 통신요청을 중계해주는 것인지 알 수 없기 때문에<a
197
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">
198
+    당신에게는 더욱 강한 익명성이 만들어질 수도 있습니다</a>
199
+    .</p>
200
+    
201
+    
202
+    <p><a href="<page docs/tor-doc-relay>">중계서버 설정하기</a>
203
+    를 참고하시면, 더 많은 정보들을 얻을 수 있습니다.</p>
204
+    
205
+    <hr />
206
+    
207
+    <p>이 문서를 개선시킬 수 있는 제안이 있다면,  <a
208
+    href="<page about/contact>">우리에게 보내주세요</a>. 감사합니다!</p>
209
+  </div>
210
+  <!-- END MAINCOL -->
211
+  <div id = "sidecol">
212
+#include "side.wmi"
213
+#include "info.wmi"
214
+  </div>
215
+  <!-- END SIDECOL -->
216
+</div>
217
+<!-- END CONTENT -->
218
+#include <foot.wmi>   
... ...
@@ -0,0 +1,206 @@
1
+## translation metadata
2
+# Revision: $Revision: 21995 $
3
+# Translation-Priority: 1-high
4
+
5
+#include "head.wmi" TITLE="Tor Project: MS Windows Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-windows>">Windows Client</a>
11
+  </div> 
12
+  <div id="maincol">  
13
+    <h1>윈도우에서 <a href="<page index>">Tor</a> 운영하기</h1>
14
+    <br />
15
+    
16
+    
17
+    <p>
18
+    <b>이 안내서는 윈도우(98m 98SE, NT4, 2000, XP, Vista, Server)에서의 Tor 클라이언트 
19
+    운영울 위한 설치 매뉴얼 입니다. 만약 다른 이용자들에게 중계 트래픽을 제공해서 
20
+    Tor 네트워크가 더 커지도록 돕고싶다면(꼭 해주세요),
21
+    <a href="<page docs/tor-doc-relay>">중계서버 설정하기</a>를 읽어주세요.</b>
22
+    </p>
23
+    
24
+    <hr />
25
+    <a id="installing"></a>
26
+    <h2><a class="anchor" href="#installing">1단계: Tor 다운받아 설치하기</a></h2>
27
+    <br />
28
+    
29
+    <p>
30
+    윈도우 버전 통합배포판은 Tor, Vidalia, <a
31
+    href="http://www.privoxy.org">Privoxy</a>(필터핑 웹 프록시)를 포함하고 있습니다.
32
+    그리고 이것들은 함께 작동하도록 설정되어 있습니다.
33
+    <a href="../<package-win32-bundle-stable>">안정화된 버전</a>이나 
34
+    <a href="../<package-win32-bundle-alpha>">개발 버전</a> 중 하나를 다운받을 수도 있고,
35
+    <a href="<page download/download>">다운로드 페이지</a>에서 다른 버전들을 찾아볼 수도 있습니다.
36
+    </p>
37
+    
38
+    <img alt="tor installer splash page"
39
+    src="../img/screenshot-win32-installer-splash.png" />
40
+    
41
+    <p>
42
+    만약에 당신 컴퓨터에 기존에 설치해 놓은 Tor, Vidalia, Privoxy가 있다면
43
+    아래에 보이는 대화창에서처럼 설치할 필요가 없는 프로그램을 제외시킬 수 있습니다.
44
+    </p>
45
+    
46
+    <img alt="select components to install"
47
+    src="../img/screenshot-win32-installer-components.png" />
48
+    
49
+    <p>설치가 끝나면, 당신이 선택한 프로그램이 자동적으로 실행될 것입니다.
50
+    </p>
51
+    
52
+    <!--
53
+    <p>
54
+    Tor는 기본적으로 클라이언트로 설정 되어 있습니다. 기본 설정 파일이 내장되어 있는데,
55
+    대부분의 경우 이 설정을 변경할 필요가 없습니다. 이제 Tor가 설치된 것입니다.
56
+    </p>
57
+    -->
58
+    
59
+    <hr />
60
+    <a id="using"></a>
61
+    <h2><a class="anchor" href="#using">2단계: 당신의 프로그램이 Tor를 사용하도록 설정하기</a></h2>
62
+    <br />
63
+    
64
+    <p>Tor와 Privoxy를 설치한 후에, 당신이 운영중인 프로그램들이 Tor를 사용하도록 설정해야 합니다.
65
+    가장 먼저 할 일은 웹브라우저 설정을 변경하는 것입니다.</p>
66
+    
67
+    <p>
68
+    만약에 당신이 파이어폭스를 사용중이라면(파이어폭스를 권장합니다), Vidalia 통합배포판이 
69
+    <a href="https://addons.mozilla.org/firefox/2275/">Torbutton
70
+    플러그인</a>을 자동으로 설치할 것입니다. 설치 후 파이어폭스를 다시 시작하면, 모든 설정이 끝난 것입니다:
71
+    </p>
72
+    
73
+    <img alt="Torbutton plugin for Firefox"
74
+    src="../img/screenshot-torbutton.png"
75
+    border="1">
76
+    
77
+    <br />
78
+    
79
+    <p>
80
+    (<a href="https://torbutton.torproject.org/">Torbutton에 대해 더 알고 싶으면 여기를 클릭하세요</a>.
81
+    만약에 다른 컴퓨터에서도 파이어폭스와 Tor를 사용할 계획이라면, 다음의
82
+    <a
83
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">
84
+    FAQ</a>를 참고하세요.
85
+    만약에 파이어폭스가 아닌 다른 브라우저를 사용해야 한다면,
86
+    <a href="<page docs/tor-doc-web>">프록시 설정을 직접 해줘야 합니다</a>.)
87
+    </p>
88
+    
89
+    
90
+    <p>Privoxy를 사용하는 것은 <strong>필수입니다</strong>. 왜냐하면 <a
91
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">브라우저들은
92
+    SOCKS 프록시를 직접 운영하면서 당신이 보내는 DNS 요청을 곳곳에 흘리기 때문입니다</a>. 
93
+    이것은 당신의 익명성에 안 좋은 영향을 줍니다. 또 Privoxy는 당신의 통신요청에서
94
+    위험한 헤더들을 제거하고, Doubleclick같은 불쾌한 광고사이트를 차단해주는 일도 합니다.</p>
95
+    
96
+    
97
+    
98
+    
99
+    <p>HTTP 프록시를 사용하는 다른 프로그램에서도 Tor를 사용하려면, 
100
+    그들이 Privoxy를 가르키도록 설정하면 됩니다(즉, localhost 포트 8118로 연결). 
101
+    SOCKS를 직접 연결해서 사용하려면(메신저, Jabber, IRC 등), 당신의 프로그램이
102
+    Tor를 가르키도록 직접 설정할 수 있습니다(localhost 포트 9050), 
103
+    그러나 이것이 왜 위험한지 알기 위해서 다음의<a
104
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">
105
+    FAQ</a>를 한 번 볼 필요가 있습니다. SOCKS나 HTTP가 사용불가능한 프로그램을 위해선
106
+    <a
107
+    href="http://www.socks.permeo.com/Download/SocksCapDownload/index.asp">SocksCap</a> 이나 
108
+    <a href="http://www.freecap.ru/eng/">FreeCap</a>을 참고하세요.
109
+    (FreeCap는 자유소프트웨어이고, SocksCap은 상용프로그램입니다.)</p>
110
+    
111
+    
112
+    <p>이밖에 다른 프로그램들에서 어떻게 Tor를 사용할 수 있는지에 대한 정보가 필요하다면,
113
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
114
+    HOWTO</a>를 참고하세요.
115
+    </p>
116
+    
117
+    <hr />
118
+    <a id="verify"></a>
119
+    <h2><a class="anchor" href="#verify">3단계: 제대로 작동하는지 확인하기</a></h2>
120
+    <br />
121
+    
122
+    <p>
123
+    설치를 한 후에 Privoxy와 Vidalia가 잘 작동하고 있는지 확인이 필요합니다. 
124
+    파란색이나 녹색 원 안에  "P"가 쓰여져 있는 것이 Privoxy 아이콘입니다.
125
+    Vidalia 아이콘은 Tor가 작동중일 때는 녹색 양파로 나타나며,
126
+    작동중이지 않을 때는 빨간색 "X"가 새겨진 어두운 양파로 나타납니다.
127
+    시스템 트레이에 있는 Vidalia 아이콘을 마우스 오른쪽 버튼으로 클릭한 후
128
+    아래 그림에 보이는 메뉴에서 "Start"나 "Stop"을 선택해서 
129
+    Tor를 시작하거나 끝낼 수 있습니다. 
130
+    </p>
131
+    
132
+    <img alt="Vidalia Tray Icon"
133
+    src="../img/screenshot-win32-vidalia.png">
134
+    
135
+    <p>
136
+    다음으로, Tor를 사용하도록 설정된 브라우저를 통해 통신을 할 때 IP주소가 제대로 익명화되고 있는지 확인해야 합니다.
137
+    <a href="https://check.torproject.org/">Tor 확인기</a>를 클릭한 후
138
+    당신이 Tor를 사용하고 있는지 아닌지 결과를 확인하세요.
139
+    #<a href="http://ipchicken.com/">이 사이트</a>
140
+    #에서는 당신이 사용하고 있다고 생각되는 IP주소를 알려줍니다. 
141
+    (만약 이 사이트가 안 열린다면, Tor를 테스트할 수 있는 다른 방법들이 나와있는 다음의<a
142
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate"> 
143
+    FAQ</a>를 확인하세요.)
144
+    </p>
145
+    
146
+    <p>만약에 접속제한을 하는 개인 파이어월을 사용 중이라면,
147
+    당신이 사용하는 프로그램들이 당신 컴퓨터의 8118 포트와 9050 포트에 접근을 
148
+    할 수 있도록 되어있는지 확인해야 합니다. 만약에 파이어월이
149
+    밖으로 나가는 연결을 차단한다면, 최소한 TCP 포트 80번과 443번은 
150
+    연결이 되도록 허용해야 합니다. 그리고나서 다음의 <a
151
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">
152
+    FAQ</a>를 참고하세요.
153
+    </p>
154
+    
155
+    
156
+    <p>그래도 작동하지 않는다면, 다음의<a
157
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">
158
+    FAQ</a>에서 몇가지 힌트를 얻을 수 있습니다.</p>
159
+    
160
+    <p>
161
+    일단 Tor가 작동하기 시작했다면,
162
+    <a href="<page download/download>#Warning">Tor가 무엇을 하고 무엇을 할 수 없는지</a> 
163
+    확인해보는 것이 좋습니다.
164
+    </p>
165
+    
166
+    <hr />
167
+    <a id="server"></a>
168
+    <a id="relay"></a>
169
+    <h2><a class="anchor" href="#relay">4단계: 중계서버로 설정하기</a></h2>
170
+    <br />
171
+    
172
+    <p>
173
+    Tor 네트워크는 자발적으로 대역폭을 제공하는 자원자들에 의해 운영됩니다. 중계서버를
174
+    운영하는 사람이 많아질수록, Tor 네트워크가 더 빨라질 것입니다.
175
+    만약에 당신이 양방향으로 최소 20Kilobytes/s의 대역폭을 가지고 있다면,
176
+    당신의 Tor도 중계서버로 운영되도록 설정할 것을 부탁드립니다.
177
+    제공되는 대역폭을 제한하는 것, 당신의 컴퓨터를 이용해 인터넷을
178
+    사용하는 사람들이 그것을 악용할 수 없도록 Exit 정책을 설정하는 것,
179
+    그리고 동적 IP 주소를 지원하는 것 등, Tor중계서버를 설정하는 것은 아주 간단합니다.
180
+    </p>
181
+    
182
+    <p>광활한 네트의 곳곳에서 중계서버가 운영되는 것이 Tor 이용자들을 안전하게 해줍니다.
183
+    또 당신이 중계서버를 운영하는 경우, 웹사이트들은 당신의 컴퓨터에서 온 통신요청이 당신이 보낸 것인지
184
+    아니면 다른 이의 통신요청을 중계해주는 것인지 알 수 없기 때문에<a
185
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">
186
+    당신에게는 더욱 강한 익명성이 만들어질 수도 있습니다</a>
187
+    .</p>
188
+    
189
+    
190
+    <p><a href="<page docs/tor-doc-relay>">중계서버 설정하기</a>
191
+    를 참고하시면, 더 많은 정보들을 얻을 수 있습니다.</p>
192
+    
193
+    <hr />
194
+    
195
+    <p>이 문서를 개선시킬 수 있는 제안이 있다면,  <a
196
+    href="<page about/contact>">우리에게 보내주세요</a>. 감사합니다!</p>
197
+  </div>
198
+  <!-- END MAINCOL -->
199
+  <div id = "sidecol">
200
+#include "side.wmi"
201
+#include "info.wmi"
202
+  </div>
203
+  <!-- END SIDECOL -->
204
+</div>
205
+<!-- END CONTENT -->
206
+#include <foot.wmi>       
... ...
@@ -0,0 +1,156 @@
1
+## translation metadata
2
+# Revision: $Revision: 21979 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: N900 Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/N900>">N900</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="Maemo"></a>
14
+    <h2><a class="anchor" href="#Maemo">Instalacja Tora na Maemo</a></h2>
15
+    <br />
16
+    <p>
17
+    Jeśli macie urządzenie z Maemo, które nie jest <a href="#N900">N900</a>,
18
+    zalecamy instalację paczki Tora ze <a
19
+    href="http://maemo.org/packages/view/tor/">strony Maemo</a>. Projekt Tor nie
20
+    produkuje tych paczek. Zajmuje się nimi społeczeństwo Maemo
21
+    </p>
22
+    
23
+    <a id="N900"></a>
24
+    <h2><a class="anchor" href="#N900">Instalacja Tora na N900</a></h2>
25
+    <br />
26
+    <p>
27
+    Następujące instrukcje powinny pomóc w instalacji <a
28
+    href="https://garage.maemo.org/projects/tor-status">eksperymentalnego
29
+    kontrolera Tora</a> i Tora spakowanych dla telefonu Nokia N900. W chwili
30
+    obenej jest to niesprawdzona konfiguracja. Przeglądarka w tej konfiguracji
31
+    nie ma Torbuttona i nie powinna obecnie być wykorzystywana do działań
32
+    wymagających anonimowości o wysokim bezpieczeństwie.
33
+    </p>
34
+    
35
+    <p>
36
+    Otwórz Menadżera aplikacji: <br /> <a href="../img/N900/1_app_menu.png">
37
+    <img border="0" alt="menu aplikacji N900"
38
+    src="../img/N900/1_app_menu-small.png"/> </a>
39
+    </p>
40
+    
41
+    <p>
42
+    Kliknij na menu Menadżera aplikacji na górze ekranu: <br /> <a
43
+    href="../img/N900/2_app_manager.png"> <img border="0" alt="N900 menadżer
44
+    aplikacji" src="../img/N900/2_app_manager-small.png"/> </a>
45
+    </p>
46
+    
47
+    <p>
48
+    Wybierz 'Katalogi Aplikacji': <br /> <a
49
+    href="../img/N900/3_app_managermenu.png"> <img border="0" alt="katalogi
50
+    aplikacji N900" src="../img/N900/3_app_managermenu-small.png"/> </a>
51
+    </p>
52
+    
53
+    <p>
54
+    Wciśnij 'Nowy', by włączyć repozytorium maemo extras-devel. <br />
55
+    <small>Uwaga: To repozytorium zawiera nieprzetestowane paczki, które mogą
56
+    uszkodzić Twoje urządzenie. <br /> Zobacz <a
57
+    href="http://wiki.maemo.org/Extras-devel">Extras-devel</a> po więcej
58
+    szczegółów. Powinieneś/aś raczej wyłączyć extras-devel po instalacji Tora
59
+    lub kontynuować na własne ryzyko.</small> <br /> <a
60
+    href="../img/N900/4_catalog_list.png"> <img border="0" alt="lista katalogów
61
+    N900" src="../img/N900/4_catalog_list-small.png"/> </a>
62
+    </p>
63
+    
64
+    <p>
65
+    Wprowadź następujące informacje na ekranie dodawania katalogu:
66
+    <p>
67
+    <pre>
68
+    Catalog name:    Extras devel
69
+    Web address:    http://repository.maemo.org/extras-devel/
70
+    Distribution:        fremantle
71
+    Components:    free non-free
72
+    </pre>
73
+    </p>
74
+    <br /> Sprawdź, czy 'Disabled' ('Wyłączone') jest niezaznaczone, wciśnij
75
+    'Save' ('Zapisz'), i poczekaj na aktualizację listy pakietów. <br /> <a
76
+    href="../img/N900/5_new_catalog.png"> <img border="0" alt="nowy katalog
77
+    N900" src="../img/N900/5_new_catalog-small.png"/> </a>
78
+    </p>
79
+    
80
+    <p>
81
+    Wciśnij 'Download' ('Pobierz') w Menadżerze aplikacji: <br /> <a
82
+    href="../img/N900/6_app_manager.png"> <img border="0" alt="menadżer
83
+    aplikacji N900" src="../img/N900/6_app_manager-small.png"/> </a>
84
+    </p>
85
+    
86
+    <p>
87
+    Wybierz kategosię Sieć (lub wyszukaj Tora): <br /> <a
88
+    href="../img/N900/7_app_categories.png"> <img border="0" alt="kategorie
89
+    aplikacji N900" src="../img/N900/7_app_categories-small.png"/> </a>
90
+    </p>
91
+    
92
+    <p>
93
+    Przewiń w dół i wybierz 'Tor Status Area Applet' ('Aplet Obszaru Statusu
94
+    Tora): <br /> <a href="../img/N900/8_app_list.png"> <img border="0"
95
+    alt="lista aplikacji N900" src="../img/N900/8_app_list-small.png"/> </a>
96
+    </p>
97
+    
98
+    <p>
99
+    Zgódź się na warunki i wciśnij 'Continue' ('Kontynuuj'): <br /> <a
100
+    href="../img/N900/9_disclaimer.png"> <img border="0" alt="warunki N900"
101
+    src="../img/N900/9_disclaimer-small.png"/> </a>
102
+    </p>
103
+    
104
+    <p>
105
+    Po instalacji wyłącz repozytorium extras-devel i ponownie uruchom
106
+    urządzenie: <br /> <a href="../img/N900/10_success.png"> <img border="0"
107
+    alt="sukces N900" src="../img/N900/10_success-small.png"/> </a>
108
+    </p>
109
+    
110
+    <p>
111
+    Po ponownym uruchomieniu N900 otwórz menu statusu: <br /> <a
112
+    href="../img/N900/11_after_rebooting.png"> <img border="0" alt="menu statusu
113
+    N900 po ponownym uruchomieniu"
114
+    src="../img/N900/11_after_rebooting-small.png"/> </a>
115
+    </p>
116
+    
117
+    <p>
118
+    Wybierz 'The Onion Router' z listy: <br /> <a
119
+    href="../img/N900/12_status_menu.png"> <img border="0" alt="wybór menu
120
+    statusu N900" src="../img/N900/12_status_menu-small.png"/> </a>
121
+    </p>
122
+    
123
+    <p>
124
+    Włącz trasowanie cebulowe (onion routing), i wciśnij 'Save' ('Zapisz'): <br
125
+    /> <a href="../img/N900/13_enable_tor.png"> <img border="0" alt="N900 włącza
126
+    Tora" src="../img/N900/13_enable_tor-small.png"/> </a>
127
+    </p>
128
+    
129
+    <p>
130
+    Odwiedź <a href="https://check.torproject.org/">TorCheck</a>, by
131
+    potwierdzić, że przekierowujesz ruch z przeglądarki przez Tora: <br /> <a
132
+    href="../img/N900/14_check_tor.png"> <img border="0" alt="N900 sprawdza
133
+    Tora" src="../img/N900/14_check_tor-small.png"/> </a>
134
+    </p>
135
+    
136
+    <p>
137
+    Zauważ, że to nie zawsze może dać Ci najnowszą stabilną wersję Tora. W
138
+    dodatku, przeglądarka N900 nie ma Torbutton. To oznacza, że podczas gdy może
139
+    być przydatna do obchodzenia, to prawdopodobnie nie nadaje się do działań
140
+    wymagających mocnej anonimowości w przeglądarce.
141
+    </p>
142
+    
143
+    <hr />
144
+    
145
+    <p>Jeśli masz pomysły na ulepszenie tej strony, prosimy <a href="<page
146
+    about/contact>">je do nas wysłać</a>. Dziękujemy!</p>
147
+  </div>
148
+  <!-- END MAINCOL -->
149
+  <div id = "sidecol">
150
+#include "side.wmi"
151
+#include "info.wmi"
152
+  </div>
153
+  <!-- END SIDECOL -->
154
+</div>
155
+<!-- END CONTENT -->
156
+#include <foot.wmi>   
... ...
@@ -0,0 +1,117 @@
1
+## translation metadata
2
+# Revision: $Revision: 22269 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Vidalia: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian-vidalia>">Vidalia Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="debian"></a> <a id="packages"></a>
14
+    <h2><a class="anchor" href="#debian">Vidalia na Ubuntu lub Debianie</a></h2>
15
+    <br />
16
+    
17
+    <p>
18
+    <b>Nie używajcie paczek ze wszechświata Ubuntu.</b> Nikt się nimi nie
19
+    zajmuje i są przestarzałe. To oznacza, że będziecie pozbawieni poprawek
20
+    stabilności i bezpieczeństwa.
21
+    </p>
22
+    
23
+    <p>
24
+    You'll need to set up our package repository before you can fetch
25
+    Vidalia. First, you need to figure out the name of your distribution. If
26
+    you're using Ubuntu 9.10 or 10.04, it's "karmic", while 9.04 is "jaunty",
27
+    8.10 is "intrepid", and 8.04 is "hardy". If you're using Debian Etch, it's
28
+    "etch", and Debian Lenny is "lenny". Then add this line to your
29
+    <tt>/etc/apt/sources.list</tt> file:<br />
30
+    <pre>
31
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
32
+    </pre>
33
+    w której wstawicie powyższą nazwę (etch, lenny, sid, karmic, jaunty,
34
+    intrepid, hardy) w miejsce &lt;DISTRIBUTION&gt;.
35
+    </p>
36
+    
37
+    <p>
38
+    Potem dodajcie klucz gpg wykorzystywany do podpisywania paczek, wykonując
39
+    następujące komendy w linii poleceń:
40
+    <pre>
41
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
42
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
43
+    </pre>
44
+    Teraz odświeżcie swoje źródła i zainstalujcie Vidalię, wykonując następujące
45
+    komendy w linii poleceń:
46
+    <pre>
47
+    apt-get update
48
+    apt-get install vidalia 
49
+    </pre>
50
+    </p>
51
+    
52
+    <p>
53
+    Teraz Vidalia jest zainstalowana i działa. Przejdźcie do <a href="<page
54
+    docs/tor-doc-unix>#polipo">kroku drugiego</a> w instrukcji "Vidalia na
55
+    Linux/Unix".
56
+    </p>
57
+    
58
+    <p style="font-size: small">
59
+    Nazwa DNS <code>deb.torproject.org</code> jest w rzeczywistości zestawem
60
+    niezależnych serwerów skonfigurowanych w okrężnej struktuzre DNS. Jeśli z
61
+    jakiegoś powodu nie macie do niego dostępu, możecie spróbować nazwy jednej z
62
+    jej części. Wypróbujcie <code>deb-master.torproject.org</code>,
63
+    <code>mirror.netcologne.de</code> lub <code>tor.mirror.youam.de</code>.
64
+    </p>
65
+    
66
+    <hr />
67
+    
68
+    <a id="source"></a>
69
+    <h2><a class="anchor" href="#source">Kompilacja ze źródeł</a></h2>
70
+    <br />
71
+    
72
+    <p>
73
+    Jeśli chcecie kompilować własne deby ze źródeł, musicie najpierw dodać
74
+    odpowiednią linię <tt>deb-src</tt> do <tt>sources.list</tt>.
75
+    <pre>
76
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
77
+    </pre>
78
+    Musicie też zainstalować niezbędne pakiety, by budować własne deby i pakiety
79
+    nezbędne do kompilacji Vidalii:
80
+    <pre>
81
+    apt-get install build-essential fakeroot devscripts qt4-dev-tools qt4-designer libqt4-dev g++ cmake
82
+    apt-get build-dep vidalia
83
+    </pre>
84
+    Wtedy możecie skompilować Vidalię w ~/debian-packages:
85
+    <pre>
86
+    mkdir ~/debian-packages; cd ~/debian-packages
87
+    apt-get source vidalia
88
+    cd vidalia-*
89
+    debuild -rfakeroot -uc -us
90
+    cd ..
91
+    </pre>
92
+    Teraz możecie zainstalować nową paczkę:
93
+    <pre>
94
+    sudo dpkg -i vidalia_*.deb
95
+    </pre>
96
+    </p>
97
+    
98
+    <p>
99
+    Teraz Vidalia jest zainstalowana i działa. Przejdźcie do <a href="<page
100
+    docs/tor-doc-unix>#polipo">kroku drugiego</a> w instrukcji "Vidalia na
101
+    Linux/Unix".
102
+    </p>
103
+    
104
+    <hr />
105
+    
106
+    <p>Jeśli macie pomysły na ulepszenie tej strony, prosimy <a href="<page
107
+    about/contact>">je do nas wysłać</a>. Dziękujemy!</p>
108
+  </div>
109
+  <!-- END MAINCOL -->
110
+  <div id = "sidecol">
111
+#include "side.wmi"
112
+#include "info.wmi"
113
+  </div>
114
+  <!-- END SIDECOL -->
115
+</div>
116
+<!-- END CONTENT -->
117
+#include <foot.wmi>   
... ...
@@ -0,0 +1,184 @@
1
+## translation metadata
2
+# Revision: $Revision: 22268 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian>">Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="debian"></a>
14
+    <h2><a class="anchor" href="#debian">Opcja pierwsza: Tor na Debianie lenny,
15
+    Debianie sid lub Debianie testing</a></h2>
16
+    <br />
17
+    
18
+    <p>
19
+    If you're using Debian stable (lenny), unstable (sid), or testing (squeeze),
20
+    just run<br />
21
+    <tt>apt-get install tor tor-geoipdb</tt> as root.
22
+    </p>
23
+    
24
+    <p>
25
+    Zauważ, że to nie zawsze może dać Ci najnowszą stabilną wersję Tora, ale
26
+    będziesz otrzymywać ważne poprawki bezpieczeństwa. By upewnić się, że masz
27
+    najnowszą stabilną wersję Tora, spójrz na opcję drugą poniżej.
28
+    </p>
29
+    
30
+    <p>
31
+    Teraz Tor jest zainstalowany i działa. Przejdźcie do <a href="<page
32
+    docs/tor-doc-unix>#polipo">kroku drugiego</a> w instrukcjach dla "Tora na
33
+    Linux/Unix"
34
+    </p>
35
+    
36
+    <hr />
37
+    
38
+    <a id="ubuntu"></a> <a id="packages"></a>
39
+    <h2><a class="anchor" href="#ubuntu">Opcja druga: Tor na Ubuntu lub Debianie</a></h2>
40
+    <br />
41
+    
42
+    <p>
43
+    <b>Nie używajcie paczek ze wszechświata Ubuntu.</b> Nikt się nimi nie
44
+    zajmuje i są przestarzałe. To oznacza, że będziecie pozbawieni poprawek
45
+    stabilności i bezpieczeństwa.
46
+    </p>
47
+    
48
+    <p>
49
+    You'll need to set up our package repository before you can fetch
50
+    Tor. First, you need to figure out the name of your distribution. If you're
51
+    using Ubuntu 9.10 or 10.04, it's "karmic", while 9.04 is "jaunty", 8.10 is
52
+    "intrepid", and 8.04 is "hardy". If you're using Debian Etch, it's "etch",
53
+    and Debian Lenny is "lenny". Then add this line to your
54
+    <tt>/etc/apt/sources.list</tt> file:<br />
55
+    <pre>
56
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
57
+    </pre>
58
+    w której wstawicie powyższą nazwę kodową swojej dystrybucji (etch, lenny,
59
+    sid, karmic, jaunty, intrepid, hardy czy cokolwiek to jest) w miejsce
60
+    &lt;DISTRIBUTION&gt;.
61
+    </p>
62
+    
63
+    <p>
64
+    Potem dodajcie klucz gpg wykorzystywany do podpisywania paczek, wykonując
65
+    następujące komendy w linii poleceń:
66
+    <pre>
67
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
68
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
69
+    </pre>
70
+    Teraz odświeżcie swoje źródła i zainstalujcie Tora, wykonując następujące
71
+    komendy w linii poleceń:
72
+    <pre>
73
+    apt-get update
74
+    apt-get install tor tor-geoipdb
75
+    </pre>
76
+    </p>
77
+    
78
+    <p>
79
+    Teraz Tor jest zainstalowany i działa. Przejdźcie do <a href="<page
80
+    docs/tor-doc-unix>#polipo">kroku drugiego</a> w instrukcjach dla "Tora na
81
+    Linux/Unix"
82
+    </p>
83
+    
84
+    <p style="font-size: small">
85
+    Nazwa DNS <code>deb.torproject.org</code> jest w rzeczywistości zestawem
86
+    niezależnych serwerów skonfigurowanych w okrężnej struktuzre DNS. Jeśli z
87
+    jakiegoś powodu nie macie do niego dostępu, możecie spróbować nazwy jednej z
88
+    jej części. Wypróbujcie <code>deb-master.torproject.org</code>,
89
+    <code>mirror.netcologne.de</code> lub <code>tor.mirror.youam.de</code>.
90
+    </p>
91
+    
92
+    <hr />
93
+    
94
+    <a id="development"></a>
95
+    <h2><a class="anchor" href="#development">Opcja trzecia: Używanie gałęzi
96
+    rozwojowej Tora na Debianie lub Ubuntu</a></h2>
97
+    <br />
98
+    
99
+    <p>If you want to use the <a href="<page download/download>#packagediff">development
100
+    branch</a> of Tor instead (more features and more bugs), you need to add a
101
+    different set of lines to your <tt>/etc/apt/sources.list</tt> file:<br />
102
+    <pre>
103
+    deb     http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
104
+    deb     http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
105
+    </pre>
106
+    w których ponownie wpisujecie nazwę swojej dystrybucji (etch, lenny, sid,
107
+    karmic, jaunty, intrepid, hardy) zamiast &lt;DISTRIBUTION&gt;.
108
+    </p>
109
+    
110
+    <p>
111
+    Potem wykonajcie następujące komendy w linii poleceń:
112
+    <pre>
113
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
114
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
115
+    apt-get update
116
+    apt-get install tor tor-geoipdb
117
+    </pre>
118
+    </p>
119
+    
120
+    <p>
121
+    Teraz Tor jest zainstalowany i działa. Przejdźcie do <a href="<page
122
+    docs/tor-doc-unix>#polipo">kroku drugiego</a> w instrukcjach dla "Tora na
123
+    Linux/Unix"
124
+    </p>
125
+    
126
+    <hr />
127
+    
128
+    <a id="source"></a>
129
+    <h2><a class="anchor" href="#source">Kompilacja ze źródeł</a></h2>
130
+    <br />
131
+    
132
+    <p>
133
+    Jeśli chcecie kompilować własne deby ze źródeł, musicie najpierw dodać
134
+    odpowiednią linię <tt>deb-src</tt> do <tt>sources.list</tt>.
135
+    <pre>
136
+    # For the stable version.
137
+    # For the unstable version.
138
+    
139
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
140
+    
141
+    
142
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
143
+    deb-src http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
144
+    </pre>
145
+    Musicie też zainstalować niezbędne pakiety, by budować własne deby i pakiety
146
+    nezbędne do kompilacji Tora:
147
+    <pre>
148
+    apt-get install build-essential fakeroot devscripts
149
+    apt-get build-dep tor
150
+    </pre>
151
+    Wtedy możecie skompilować Tora w ~/debian-packages:
152
+    <pre>
153
+    mkdir ~/debian-packages; cd ~/debian-packages
154
+    apt-get source tor
155
+    cd tor-*
156
+    debuild -rfakeroot -uc -us
157
+    cd ..
158
+    </pre>
159
+    Teraz możecie zainstalować nową paczkę:
160
+    <pre>
161
+    sudo dpkg -i tor_*.deb
162
+    </pre>
163
+    </p>
164
+    
165
+    <p>
166
+    Teraz Tor jest zainstalowany i działa. Przejdźcie do <a href="<page
167
+    docs/tor-doc-unix>#polipo">kroku drugiego</a> w instrukcjach dla "Tora na
168
+    Linux/Unix"
169
+    </p>
170
+    
171
+    <hr />
172
+    
173
+    <p>Jeśli macie pomysły na ulepszenie tej strony, prosimy <a href="<page
174
+    about/contact>">je do nas wysłać</a>. Dziękujemy!</p>
175
+  </div>
176
+  <!-- END MAINCOL -->
177
+  <div id = "sidecol">
178
+#include "side.wmi"
179
+#include "info.wmi"
180
+  </div>
181
+  <!-- END SIDECOL -->
182
+</div>
183
+<!-- END CONTENT -->
184
+#include <foot.wmi>   
... ...
@@ -0,0 +1,86 @@
1
+## translation metadata
2
+# Revision: $Revision: 21907 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: CentOS/Fedora/OpenSUSE Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/rpms>">RPMs</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="rpms"></a>
14
+    <h2><a class="anchor" href="#rpms">PAczki Tora dla dystrybucji Linuksa opartych
15
+    na RPM.</a></h2>
16
+    <br />
17
+    
18
+    <p>Nie używajcie paczek z natywnych repozytoriów. Są często przestarzałe. To
19
+    oznacza, że będziecie pozbawieni poprawek stabilności i bezpieczeństwa.
20
+    </p>
21
+    
22
+    <p>
23
+    Musicie skonfigurować nasze repozytorium z paczkami, zanim będziecie mogli
24
+    pobrać Tora. Zakładając, że macie program yum, w katalogu /etc/yum.repos.d/
25
+    stwórzcie plik o nazwie torproject.repo. Otwórzcie go w edytorze i wpiszcie
26
+    następujące informacje:
27
+    <pre>[torproject]
28
+    name=Tor and Vidalia
29
+    enabled=1
30
+    autorefresh=0
31
+    baseurl=http://deb.torproject.org/torproject.org/rpm/DISTRIBUTION/
32
+    type=rpm-md
33
+    gpgcheck=1
34
+    gpgkey=http://deb.torproject.org/torproject.org/rpm/RPM-GPG-KEY-torproject.org
35
+    </pre>
36
+    
37
+    Jeśli chcecie być na bieżąco z wersjami stabilnymi Tora, powinniście zmienić
38
+    DISTRIBUTION na jedno z następujących: centos4, centos5, fc10, fc11, fc12,
39
+    suse</p>
40
+    
41
+    <p>Jeśli chcecie być na bieżąco z wersjami eksperymentalnymi, zmieńcie
42
+    DISTRIBUTION na jedno z następujących: centos4-experimental,
43
+    centos5-experimental, fc10-experimental, fc11-experimental,
44
+    fc12-experimental, suse-experimental</p>
45
+    
46
+    <p>
47
+    Teraz Tor jest zainstalowany i działa. Przejdźcie do <a href="<page
48
+    docs/tor-doc-unix>#polipo">kroku drugiego</a> w instrukcjach dla "Tora na
49
+    Linux/Unix"
50
+    </p>
51
+    
52
+    <p style="font-size: small">
53
+    Nazwa DNS <code>deb.torproject.org</code> jest w rzeczywistości zestawem
54
+    niezależnych serwerów skonfigurowanych w okrężnej struktuzre DNS. Jeśli z
55
+    jakiegoś powodu nie macie do niego dostępu, możecie spróbować nazwy jednej z
56
+    jej części. Wypróbujcie <code>deb-master.torproject.org</code>,
57
+    <code>mirror.netcologne.de</code> lub <code>tor.mirror.youam.de</code>.
58
+    </p>
59
+    
60
+    <hr />
61
+    
62
+    <hr />
63
+    
64
+    <a id="source"></a>
65
+    <h2><a class="anchor" href="#source">Kompilacja ze źródeł</a></h2>
66
+    <br />
67
+    
68
+    <p>
69
+    Jeśli chcecie kompilować ze źródeł, postępujcie zgodnie z <a
70
+    href="<gitblob>doc/tor-rpm-creation.txt">instrukcjami tworzenia rpm</a>.
71
+    </p>
72
+    
73
+    <hr />
74
+    
75
+    <p>Jeśli macie pomysły na ulepszenie tej strony, prosimy <a href="<page
76
+    about/contact>">je do nas wysłać</a>. Dziękujemy!</p>
77
+  </div>
78
+  <!-- END MAINCOL -->
79
+  <div id = "sidecol">
80
+#include "side.wmi"
81
+#include "info.wmi"
82
+  </div>
83
+  <!-- END SIDECOL -->
84
+</div>
85
+<!-- END CONTENT -->
86
+#include <foot.wmi>   
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,210 @@
1
+## translation metadata
2
+# Revision: $Revision: 22305 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Mac OS X Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-osx>">Mac OS X Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Uruchamianie klienta <a href="<page index>">Tor</a> na Mac OS X</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    To są instrukcje do instalacji klienta Tora na systemie Mac OS X. Jeśli
18
+    chcesz przekazywać ruch innych, by wspomóc rozwój sieci (prosimy),
19
+    przeczytaj poradnik o <a href="<page docs/tor-doc-relay>">Konfigurowaniu
20
+    przekaźnika sieci Tor</a>.
21
+    </p>
22
+    
23
+    <hr />
24
+    <a id="installing"></a>
25
+    <h2><a class="anchor" href="#installing">Krok 1: Pobranie i instalacja Tora</a></h2>
26
+    <br />
27
+    
28
+    <p>
29
+    The install for Macintosh OS X bundles <a href="<page index>">Tor</a>, <a
30
+    href="<page projects/vidalia>">Vidalia</a> (a graphical interface for Tor), <a
31
+    href="<page projects/torbutton>">Torbutton</a>, and <a
32
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (a web
33
+    proxy)  into one package, with the four applications pre-configured to work
34
+    together.  Download either the <a
35
+    href="../<package-osx-bundle-stable>">stable</a> or the <a
36
+    href="../<package-osx-bundle-alpha>">experimental</a> version of the OS X
37
+    bundle for Intel, or look for more options on the <a href="<page
38
+    download/download>">download page</a>.
39
+    </p>
40
+    
41
+    <p>Po pobraniu dmg, kliknij go dwukrotnie i pozwól, by się zamontował. Przejdź
42
+    do teraz otwartej paczki Vidalia (Vidalia Bundle) w Finderze. Paczkę łatwo
43
+    jest zainstalować; po prostu przenieś i upuść cebulową ikonę Vidalii do
44
+    folderu Aplikacji. Opcjonalnie, kliknij dwukrotnie skrypt "install
45
+    torbutton", by zainstalować Torbutton do Firefoksa. Możesz też pobrać
46
+    Torbuttona ze strony z dodatkami Mozilli, wyszukując "torbutton".</p>
47
+    
48
+    <p>Po zakończeniu instalacji możesz uruchomić program Vidalia poprzez wybranie
49
+    jego ikony z twojego folderu Aplikacji. Ciemna cebula z czerwonym krzyżykiem
50
+    na pasku oznacza, że w tej chwili Tor nie jest uruchomiony. Możesz uruchomić
51
+    Tora wybierając Start z menu "Tor" u góry ekranu.
52
+    </p>
53
+    
54
+    <p>Gdy Tor działa, ikonka programu Vidalia wygląda następująco:
55
+    </p>
56
+    
57
+    <p><img alt="vidalia running tor"
58
+    src="../img/screenshot-osx-vidalia.png"
59
+    border="1"/></p>
60
+    
61
+    <p>Polipo jest instalowane jako część pakietu Tora. Po jego instalacji,
62
+    uruchomi się automatycznie po restarcie komputera. Nie musisz konfigurować
63
+    Polipo, by używało Tora &mdash; odpowiednia konfiguracja Polipo została
64
+    zainstalowana jako część pakietu instalacyjnego.
65
+    </p>
66
+    
67
+    <hr />
68
+    <a id="using"></a>
69
+    <h2><a class="anchor" href="#using">Krok 2: Konfiguracja aplikacji, by używały
70
+    Tora</a></h2>
71
+    <br />
72
+    
73
+    <p>Po instalacji musisz skonfigurować swoje aplikacje, by ich
74
+    używały. Pierwszym krokiem jest ustawienie sposobu przeglądania sieci WWW.</p>
75
+    
76
+    <p>Powinieneś/aś używać Tora z Firefoksem i Torbuttonem, dla najlepszego
77
+    bezpieczeństwa. Torbutton został zainstalowany za Ciebie. Kliknij na
78
+    czerwony przycisk "Tor Disabled" ("Tor wyłączony"), by włączyć Tora i
79
+    gotowe: </p>
80
+    
81
+    <p><img alt="Torbutton plugin for Firefox"
82
+    src="../img/screenshot-torbutton.png"
83
+    border="1"/></p>
84
+    
85
+    <p>
86
+    Jeśli masz zamiar używać Firefoksa na innym komputerze niż tam, gdzie jest
87
+    Tor, spójrz na <a
88
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">wpis
89
+    w FAQ na temat uruchamiania Tora na innym komputerze</a>.
90
+    </p>
91
+    
92
+    <p>By "storyfikować" inne aplikacje, które używają proxy dla HTTP, po prostu
93
+    skieruj je na Polipo (czyli localhost, port 8118). By aplikacje bezpośrednio
94
+    używały serwera SOCKS (do komunikatorów, Jabbera, IRC, itp.), możesz
95
+    skierować je bezpośrednio na Tora (localhost, port 9050), ale przeczytaj <a
96
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">ten
97
+    wpis do FAQ</a>, dlaczego to może być niebezpieczne. Jeśli aplikacja nie
98
+    obsługuje ani proxy dla HTTP, ani dla SOCKS, spójrz na  <a
99
+    href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a> lub <a
100
+    href="http://www.dest-unreach.org/socat/">socat</a>.</p>
101
+    
102
+    <p>Po informacje, jak "storyfikować" inne aplikacje, spójrz na <a
103
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
104
+    HOWTO</a>.
105
+    </p>
106
+    
107
+    <hr />
108
+    <a id="verify"></a>
109
+    <h2><a class="anchor" href="#verify">Krok 3: Upewnij się, że wszystko działa</a></h2>
110
+    <br />
111
+    
112
+    <p>
113
+    Teraz powinieneś spróbować użyć swojej przeglądarki z Torem i upewnić się,
114
+    że Twój adres IP jest anonimizowany. Kliknij na <a
115
+    href="https://check.torproject.org/">wykrywacz Tora</a> i sprawdź, cze jego
116
+    zdaniem używasz Tora czy nie. (Jeśli ta strona akurat nie działa, przeczytaj
117
+    <a
118
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">ten
119
+    wpis w FAQ</a>, by poznać więcej sposobów na testowanie swojego Tora.)
120
+    </p>
121
+    
122
+    <p>Jeśli masz zaporę ogniową, która ogranicza możliwości Twojego komputera co
123
+    do łączenia się z samym sobą, zezwól w niej na połączenia od programów
124
+    lokalnych na porty lokalne 8118 i 9050. Jeśli zapora blokuje połączenia
125
+    wychodzące, spraw, by można się było połączyć choć z portami 80 i 433, po
126
+    czym przeczytaj <a
127
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">ten
128
+    wpis do FAQ</a>.
129
+    </p>
130
+    
131
+    <p>Jeśli dalej nie działa, spójrz na <a
132
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">ten
133
+    wpis FAQ</a>, by poszukać wskazówek.</p>
134
+    
135
+    <p>
136
+    Gdy Tor już działa, poczytaj o tym, <a href="<page download/download>#Warning">co Tor
137
+    oferuje, a czego nie</a>.
138
+    </p>
139
+    
140
+    <hr />
141
+    <a id="server"></a> <a id="relay"></a>
142
+    <h2><a class="anchor" href="#relay">Krok 4: Konfiguracja Tora jako przekaźnika
143
+    sieci</a></h2>
144
+    <br />
145
+    
146
+    <p>Sieć Tora polega na ochotnikach oddających część swojego łącza. Im więcej
147
+    ludzi uruchomi przekaxnik sieci, tym szybsza będzie sieć Tora. Jeśli masz co
148
+    najmniej 20 kilobajtów/s w obie strony, pomóż Torowi, konfigurując swojego
149
+    klienta tak, by był także przekaźikiem sieci. Mamy wiele cech, które czynią
150
+    przekaźniki Tora łatwymi i wygodnymi, łącznie z ograniczeniem
151
+    przepustowości, politykami wyjścia, byś mógł zmniejszyć ryzyko skarg, oraz
152
+    obsługą dynamicznych adresów IP.</p>
153
+    
154
+    <p>Posiadanie przekaźników w wielu różnych miejscach w sieci sprawia, że
155
+    użytkownicy Tora są bezpieczni. <a
156
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">Ty
157
+    też możesz mieć lepszą anonimowość</a>, gdyż serwery, do których się
158
+    łączysz, nie mogą stwierdzić, czy połączenie pochodzi z Twojego komputera,
159
+    czy zostało przekierowane z innych.</p>
160
+    
161
+    <p>Przeczytaj szczegóły w naszym przewodniku <a href="<page
162
+    docs/tor-doc-relay>">Konfiguracji przekaźnika sieci Tor</a>.</p>
163
+    
164
+    <hr />
165
+    <a id="uninstall"></a>
166
+    <h2><a class="anchor" href="#uninstall">Jak odinstalować Tora i Privoxy</a></h2>
167
+    <br />
168
+    
169
+    <p>Są dwa sposoby na odinstalowanie paczki z komputera, z wykorzystaniem
170
+    Findera albo poprzez program odinstalowujący uruchamiany z linii poleceń
171
+    (Terminala). Jeśli chcesz usunąć Tora z systemu OSX, oto jak to zrobić:</p>
172
+    
173
+    <p>Przywróć ustawienia Proxy w aplikacjach do ich poprzednich wartości. Jeśli
174
+    chcesz tylko przestać używać Tora, możesz przerwać na tym kroku.</p>
175
+    
176
+    <p>Jeśli chcesz całkowicie usunąć Tora, a twoje konto ma prawa Administratora,
177
+    wykonaj co następuje:</p>
178
+    
179
+    <ol>
180
+    <li>Otwórz Findera i kliknij Aplikacje.</li>
181
+    <li>Przeciągnij /Applications/Vidalia do Kosza.</li>
182
+    <li>Usuń /Library/Torbutton z systemu.</li>
183
+    <li>W swoim katalogu domowym przejdź do Library, usuń katalog Vidalia</li>
184
+    </ol>
185
+    
186
+    <p>Tor, Vidalia i Polipo są teraz całkowicie usunięte z systemu.</p>
187
+    
188
+    <p>Jeśli znasz linię poleceń lub Terminal, możesz ręcznie usunąć następujące
189
+    elementy:</p>
190
+    <ul>
191
+    <li>/Applications/Vidalia.app/</li>
192
+    <li>/Library/Torbutton/</li>
193
+    <li>~/Library/Vidalia</li>
194
+    <li>~/.tor</li>
195
+    </ul>
196
+    
197
+    <hr />
198
+    
199
+    <p>Jeśli masz pomysły na ulepszenie tej strony, prosimy <a href="<page
200
+    about/contact>">je do nas wysłać</a>. Dziękujemy!</p>
201
+  </div>
202
+  <!-- END MAINCOL -->
203
+  <div id = "sidecol">
204
+#include "side.wmi"
205
+#include "info.wmi"
206
+  </div>
207
+  <!-- END SIDECOL -->
208
+</div>
209
+<!-- END CONTENT -->
210
+#include <foot.wmi>   
... ...
@@ -0,0 +1,319 @@
1
+## translation metadata
2
+# Revision: $Revision: 22144 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Relay Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-relay>">Configure Tor Relay</a>
11
+  </div> 
12
+  <div id="maincol">   
13
+    <h1>Konfiguracja przekaźnika Tora</h1>
14
+    
15
+    
16
+    <!-- BEGIN SIDEBAR -->
17
+    <div class="sidebar-left">
18
+    <h3>Kroki konfiguracji</h3>
19
+    <ol>
20
+    <li><a href="<page docs/tor-doc-relay>#install">Pobieranie i instalacja</a></li>
21
+    <li><a href="<page docs/tor-doc-relay>#setup">Konfiguracja</a></li>
22
+    <li><a href="<page docs/tor-doc-relay>#check">Sprawdzenie i Potwierdzenie</a></li>
23
+    <li><a href="<page docs/tor-doc-relay>#after">Ostatnie kroki</a></li>
24
+    </ol>
25
+    </div>
26
+    
27
+    
28
+    <!-- END SIDEBAR -->
29
+    <hr />
30
+    
31
+    <p>
32
+    Sieć Tora polega na ochotnikach oddających część swojego łącza. Im więcej
33
+    ludzi uruchomi przekaźnik, tym szybsza będzie sieć Tora. Jeśli masz co
34
+    najmniej 20 kilobajtów/s w obie strony, pomóż Torowi, konfigurując swojego
35
+    klienta tak, by był także przekaźnikiem sieci. Mamy wiele cech, które czynią
36
+    przekaźniki Tora łatwymi i wygodnymi, łącznie z <a href="<page
37
+    docs/faq>#RelayFlexible">ograniczeniem przepustowości, politykami wyjścia, byś
38
+    mógł zmniejszyć ryzyko skarg, oraz obsługą dynamicznych adresów IP</a>.
39
+    </p>
40
+    
41
+    <p>Możesz uruchomić przekaźnik sieci Tora na <a
42
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayOS">prawie
43
+    każdym</a> systemie operacyjnym. Przekaźniki Tora działają najlepiej na
44
+    systemach Linux, OS X Tiger lub późniejszym, FreeBSD 5.x+, NetBSD 5.x+ oraz
45
+    Windows Server 2003 lub późniejszym.
46
+    </p>
47
+    
48
+    <hr /> <a id="zero"></a> <a id="install"></a>
49
+    <h2><a class="anchor" href="#install">Krok 1: Pobranie i instalacja Tora</a></h2>
50
+    <br />
51
+    
52
+    <p>Zanim zaczniesz, upewnij się, że Tor jest uruchomiony i działa.
53
+    </p>
54
+    
55
+    <p>Odwiedź naszą <a href="<page download/easy-download>">stronę pobierania</a> i
56
+    zainstaluj "Paczkę Instalacyjną" dla swojego systemu.
57
+    </p>
58
+    
59
+    <p>Jeśli uznasz to za wygodne, możesz najpierw poużywać Tora jako klienta przez
60
+    jakiś czas, by upewnić się, czy rzeczywiście działa.</p>
61
+    
62
+    <hr /> <a id="setup"></a>
63
+    <h2><a class="anchor" href="#setup">Krok 2: Ustawienie Tora jako przekaźnika
64
+    sieci</a></h2>
65
+    <br />
66
+    <ol>
67
+    <li>Sprawdź, czy twój zegar i strefa czasowa są dobrze ustawione. Jeśli jest to
68
+    możliwe, zsynchronizuj swój zegar z publicznymi <a
69
+    href="http://en.wikipedia.org/wiki/Network_Time_Protocol">serwerami
70
+    czasu</a>.
71
+    </li>
72
+    
73
+    <li><strong>Konfiguracja Tora z Interfejsem Graficznym Vidalia</strong>:
74
+    <ol>
75
+    
76
+    <li>
77
+    	<dt>Kliknij prawym klawiszem na ikonkę Vidalii w zasobniku systemowym. Wybierz
78
+    <tt>Control Panel</tt> (Panel sterowania).</dt>
79
+    	<dd><img alt="vidalia right click menu"
80
+    src="../img/screenshot-win32-vidalia.png"></dd>
81
+    </li>
82
+    
83
+    <li>Klinkij <tt>Setup Relaying</tt> (Uruchomienie przekazywania).</li>
84
+    
85
+    <li>
86
+    	<dt>Wybierz <tt>Relay Traffic for the Tor network</tt> (Przekazuj ruch dla sieci
87
+    Tor), jeśli chcesz być publicznym przekaźnikiem (zalecane), lub wybierz
88
+    		<tt>Help censored users reach the Tor network</tt> (Pomóż cenzorowanym
89
+    użytkownikom dostać się do sieci Tora), jeśli chcesz być <a href="<page
90
+    docs/faq>#RelayOrBridge">mostkiem</a> dla użytkowników w krajach cenzurujących
91
+    swój Internet.</dt>
92
+    <dd><img alt="vidalia basic settings"
93
+    src="../img/screenshot-win32-configure-relay-1.png"></dd>
94
+    </li>
95
+    
96
+    <li>Wprowadź nazwę dla swojego przekaźnika i wprowadź informacje kontaktowe, w
97
+    razie gdybyśmy musieli skontaktować się z Tobą w przypadku problemów.</li>
98
+    
99
+    <li>Zostaw <tt>Attempt to automatically configure port forwarding</tt> (Spróbuj
100
+    automatycznie skonfigurować przekazywanie portów) włączone. Wciśnij przycisk
101
+    <tt>Test</tt>, by sprawdzić, czy to działa. Jeśli tak, to wspaniale. Jeśli
102
+    nie, spójrz na punkt numer 3 poniżej.</li>
103
+    
104
+    <li><dt>Wybierz kartę <tt>Bandwidth Limits</tt> (Ograniczenia łącza). Określ, ile z
105
+    przepustowości łącza chcesz dać uzytkownikom Tora, takim jak Ty.</dt>
106
+    <dd><img alt="vidalia bandwidth limits"
107
+    src="../img/screenshot-win32-configure-relay-2.png"></dd>
108
+    </li> 
109
+    
110
+    <li><dt>Wybierz kartę <tt>Exit Policies</tt> (Polityki wyjścia). Jeśli chcesz, by
111
+    inni mogli używać Twojego przekaźnika dla tych usług, nie zmieniaj
112
+    niczego. Wyłącz te usługi, co do których nie chcesz, by były osiągalne przez
113
+    ludzi z <a href="<page docs/faq>#ExitPolicies">Twojego przekaźnika</a>. Jeśli
114
+    chcesz być przekaźnikiem nie-wyjściowym, wyłącz wszystkie usługi.</dt>
115
+    <dd><img alt="vidalia exit policies"
116
+    src="../img/screenshot-win32-configure-relay-3.png"></dd>
117
+    </li>
118
+    
119
+    <li>Kliknij przycisk <tt>Ok</tt>. Spójrz na krok 3 poniżej w celu potwierdzenia,
120
+    że przekaźnik działa prawidłowo.</li>
121
+    </ol>
122
+    
123
+    <br /> <strong>Konfiguracja ręczna</strong>:
124
+    <ul>
125
+    <li>Wyedytuj dolną część <a
126
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">swojego
127
+    pliku torrc</a>.) Jeśli chcesz być publicznym przekaźnikiem (zalecane),
128
+    upewnij się, że podałeś ORPort i <a href="<page docs/faq>#ExitPolicies">sprawdź
129
+    ExitPolicy</a>; w innym przypadku, jeśli chcesz być <a href="<page
130
+    docs/faq>#RelayOrBridge">mostkiem</a> dla użytkowników w krajach cenzurujących
131
+    swój Internet, skorzystaj z <a href="<page docs/bridges>#RunningABridge">tych
132
+    linii</a>.
133
+    </li>
134
+    
135
+    </ul></li>
136
+    
137
+    <li>Jeśli używasz zapory ogniowej, otwórz w niej przejście, by połączenia
138
+    przychodzące mogły dostać się do skonfigurowanych portów (ORPort, plus
139
+    DirPort, jeśli go włączyłeś). Jeśli masz firewall sprzętowy (Linksys, modem
140
+    kablowy, itd), może spodobać Ci się <a
141
+    href="http://portforward.com/">portforward.com</a>. Upewnij się też, że
142
+    dozwolone są też wszystkie połączenia <em>wychodzące</em>, aby twój
143
+    przekaźnik mógł dotrzeć do innych przekaźników Tora.
144
+    </li>
145
+    
146
+    <li>Uruchom ponownie swój przekaźnik. Jeśli <a
147
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">wypisze
148
+    jakieś ostrzeżenia</a>, zajmij się nimi.
149
+    </li>
150
+    
151
+    <li>Zapisz się na listę mailingową <a
152
+    href="http://archives.seul.org/or/announce/">or-announce</a>. Ma ona mały
153
+    ruch, dzięki niej będziesz informowany o nowych stabilnych wydaniach. Możesz
154
+    także zapisać się na <a href="<page docs/documentation>#MailingLists">listy Tora
155
+    o większym ruchu</a>. 
156
+    </li>
157
+    
158
+    </ol>
159
+    
160
+    <hr /> <a id="check"></a>
161
+    <h2><a class="anchor" href="#check">Krok 3: Sprawdzenie, czy wszystko działa</a></h2>
162
+    <br />
163
+    
164
+    <p>Jak tylko twój przekaźnik zdoła połączyć się z siecią, spróbuje określić,
165
+    czy skonfigurowane porty są dostępne z zewnątrz. Ten krok jest zazwyczaj
166
+    szybki, ale może potrwać do 20 minut. Szukaj <a
167
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">wpisów
168
+    do logów</a> w postaci <tt>Self-testing indicates your ORPort is reachable
169
+    from the outside. Excellent.</tt> Jeśli nie widzisz tej wiadomości, to
170
+    znaczy, że twój przekaźnik nie jest osiągalny z zewnątrz &mdash;
171
+    powinieneś/aś ponownie sprawdzić ustawienia zapory ogniowej, zobaczyć, czy
172
+    sprawdza ten IP i port, który powinien sprawdzać etc.
173
+    </p>
174
+    
175
+    <p>When it decides that it's reachable, it will upload a "server descriptor" to
176
+    the directories, to let clients know what address, ports, keys, etc your
177
+    relay is using. You can <a
178
+    href="http://194.109.206.212/tor/status-vote/current/consensus">load one of
179
+    the network statuses manually</a> and look through it to find the nickname
180
+    you configured, to make sure it's there. You may need to wait up to one hour
181
+    to give enough time for it to make a fresh directory.</p>
182
+    
183
+    <hr /> <a id="after"></a>
184
+    <h2><a class="anchor" href="#after">Krok 4: Gdy już wszystko działa</a></h2>
185
+    <br />
186
+    
187
+    <p>
188
+    Polecamy też następujące kroki:
189
+    </p>
190
+    
191
+    <p>
192
+    6. Przeczytaj <a
193
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/OperationalSecurity">o
194
+    zabezpieczaniu działania</a>, by dowiedzieć się, jak możesz podnieść
195
+    bezpieczeństwo swojego przekaźnika.
196
+    </p>
197
+    
198
+    <p>
199
+    7. Jeśli chcesz prowadzić więcej niż jeden przekaźnik, to wspaniale, ale
200
+    prosimy o ustawienie <a
201
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#MultipleRelays">opcji
202
+    MyFamily</a> w plikach konfiguracyjnych wszystkich Twoich przekaźników.
203
+    </p>
204
+    
205
+    <p>
206
+    8. Pomyśl o ograniczaniu przepustowości łącza. Użytkownicy sieci kablowych,
207
+    DSL oraz inni z asymetrycznym łączem (np. większy download niż upload)
208
+    powinni ograniczyć przepustowość Tora do tej mniejszej wartości, by uniknąć
209
+    zatorów. Przeczytaj <a
210
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">wpis
211
+    do FAQ na temat ograniczania przepustowości</a>.
212
+    </p>
213
+    
214
+    <p>
215
+    9. Zrób kopię zapasową prywatnego klucza swojego przekaźnika
216
+    (przechowywanego w "keys/secret_id_key" w katalogu DataDirectory). To jest
217
+    "tożsamość" Twojego przekaźnika i musisz trzymać ją w bezpiecznym miejscu,
218
+    by nikt nie mógł podsłuchać ruchu, który przechodzi przez Twój
219
+    przekaźnik. To jest najważniejszy plik do zachowania w przypadku, gdy musisz
220
+    <a
221
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#UpgradeRelay">przenieść
222
+    lub odbudować swój przekaźnik Tora</a> jeśli coś pójdzie nie tak.
223
+    </p>
224
+    
225
+    <p>
226
+    
227
+    10. Jeśli kontrolujesz serwery nazw w swojej domenie, rozważ ustawienie
228
+    swojej nazwy hosta w odwrotnym DNSie na 'anonymous-relay' lub 'proxy' lub
229
+    'tor-proxy', aby inni mogli szybciej zrozumieć co się dzieje, gdy zobaczą
230
+    twój adres w swoich logach. Dodanie <a
231
+    href="https://tor-svn.freehaven.net/svn/tor/trunk/contrib/tor-exit-notice.html">infomracji
232
+    o punkcie wyjścia z Tora</a> na wirtualnym hoście dla tej nazwy może bardzo
233
+    pomóc w razie skarg o nadużycia kierowanych do Ciebie lub Twojego ISP, jeśli
234
+    prowadzisz węzeł wyjściowy Tora.
235
+    
236
+    </p>
237
+    
238
+    <p>
239
+    11. Jeśli na twoim komputerze nie ma serwera WWW, rozważ zmianę portu ORPort
240
+    na 443, a portu katalogowego DirPort na 80. Wielu z użytkowników Tora jest
241
+    za zaporami ogniowymi, które pozwalają tylko przeglądać sieć WWW, ta zmiana
242
+    pozwoli takim użytkownikom połączyć się z Twoim przekaźnikiem. Operatorzy
243
+    przekaźników pod Win32 mogą po prostu bezpośrednio zmienić swój ORPort i
244
+    DirPort w pliku torrc i ponownie uruchomić Tora. Przekaźniki pod OS X i Unix
245
+    nie mogą bezpośrednio podłączyć się do tych portów (gdyż nie są uruchamiane
246
+    jako root), więc dla nich trzeba uruchomić jakieś <a
247
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients">przekierowanie
248
+    portów</a>, by połączenia mogły do nich dotrzeć. Jeśli już używasz portów 80
249
+    i 443, ale i tak chcesz pomóc, to innymi użytecznymi portami są 22, 110 i
250
+    143.
251
+    </p>
252
+    
253
+    <p>
254
+    12. Jeśli twój przekaźnik sieci Tora ma też inne usługi na tym samym adresie
255
+    IP &mdash; jak na przykład publiczny serwer WWW &mdash; upewnij się, że
256
+    połączenia do tego serwera są dozwolone także z tego samego
257
+    komputera. Musisz zezwolić na te połączenia, gdyż klienci Tora odkryją, że
258
+    Twój przekaźnik Tora jest <a
259
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">najbezpieczniejszą
260
+    drogą do połączenia się z tym serwerem</a>, i zawsze zbudują obwód, który
261
+    będzie kończył się na Twoim przekaźniku. Jeśli nie chcesz zezwalać na takie
262
+    połączenia, musisz jawnie wykluczyć je w swojej polityce wyjścia.
263
+    </p>
264
+    
265
+    <p>
266
+    13. (Tylko Unix). Utwórz osobnego użytkownika, na którego prawach będzie
267
+    uruchamiany przekaźnik. Jeśli zainstalowałeś paczkę OS X lub deb lub rpm, to
268
+    wszystko już jest zrobione. W innym przypadku możesz zrobić to
269
+    ręcznie. (Przekaźnik Tora nie musi być uruchamiany jako root, więc dobrze
270
+    jest nie uruchamiać go jako root. Uruchamianie jako użytkownik 'tor' unika
271
+    problemów z indent i innymi usługami, które sprawdzają nazwę
272
+    użytkownika. Jeśli jesteś paranoikiem, możesz śmiało <a
273
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorInChroot">umieścić
274
+    Tora w chrootowanym środowisku</a>.)
275
+    </p>
276
+    
277
+    <p>
278
+    14. (Tylko Unix) Twój system operacyjny prawdopodobnie ogranicza liczbę
279
+    otwartych deskryptorów plików dla każdego procesu do 1024 (lub nawet
280
+    mniej). Jeśli planujesz uruchomienie szybkiego węzła wyjściowego, to ta
281
+    ilość prawdopodobnie nie wystarczy. W systemie Linux powinieneś dodać linię
282
+    postaci "toruser hard nofile 8192" do swojego pliku
283
+    /etc/security/limits.conf (gdzie toruser oznacza użytkownika, na którego
284
+    prawach uruchomiony jest Tor), po czym ponownie uruchomić Tora, jeśli jest
285
+    zainstalowany jako pakiet (lub wylogować się i zalogować ponownie, jeśli
286
+    uruchamiasz go sam).
287
+    </p>
288
+    
289
+    <p>
290
+    15. Jeśli zainstalowałeś Tora z jakiejś paczki lub instalatora,
291
+    prawdopodobnie uruchamia to Tora automatycznie w czasie ładowania
292
+    systemu. Ale jeśli instalowałeś ze źródeł, to mogą ci się przydać skrypty
293
+    inicjalizacyjne contrib/tor.sh lub contrib/torctl.
294
+    </p>
295
+    
296
+    <p>
297
+    Gdy zmieniasz konfigurację Tora, pamiętaj sprawdzić, czy Twój przekaźnik
298
+    dalej działa po tych zmianach. Ustaw w pliku torrc opcję "ContactInfo",
299
+    byśmy mogli się z Tobą skontaktować, jeśli powinieneś zainstalować nowszą
300
+    wersję lub coś działa nie tak. Jeśli masz jakieś problemy lub pytania,
301
+    przeczytaj sekcję the <a href="<page docs/documentation>#Support">Uzyskiwanie
302
+    pomocy</a> lub <a href="<page about/contact>">skontaktuj się z nami</a> na liście
303
+    tor-ops. Dziękujemy, że pomagasz rosnąć sieci Tora!
304
+    </p>
305
+    
306
+    <hr />
307
+    
308
+    <p>Jeśli masz pomysły na ulepszenie tej strony, prosimy <a href="<page
309
+    about/contact>">je do nas wysłać</a>. Dziękujemy!</p>
310
+  </div>
311
+  <!-- END MAINCOL -->
312
+  <div id = "sidecol">
313
+#include "side.wmi"
314
+#include "info.wmi"
315
+  </div>
316
+  <!-- END SIDECOL -->
317
+</div>
318
+<!-- END CONTENT -->
319
+#include <foot.wmi>   
... ...
@@ -0,0 +1,8 @@
1
+## translation metadata
2
+# Based-On-Revision: 12076
3
+# Status: obsolete
4
+# Last-Translator: bogdandr_at_op . pl
5
+
6
+#include "head.wmi" TITLE="Przekierowanie" REDIRECT="docs/tor-doc-relay" CHARSET="UTF-8"
7
+
8
+#include <foot.wmi>
... ...
@@ -0,0 +1,179 @@
1
+    <h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1>
2
+    <br />
3
+    
4
+    <p>
5
+    <b>To są instrukcje do instalacji klienta Tora. Jeśli chcesz przekazywać
6
+    ruch innych, by wspomóc rozwój sieci (prosimy), przeczytaj poradnik o <a
7
+    href="<page docs/tor-doc-relay>">Konfigurowaniu przekaźnika sieci
8
+    Tor</a>.</b>
9
+    </p>
10
+    
11
+    <hr /> <a id="installing"></a>
12
+    <h2><a class="anchor" href="#installing">Krok 1: Pobranie i instalacja Tora</a></h2>
13
+    <br />
14
+    
15
+    <p>
16
+    Najnowsze wydanie Tora można znaleźć na stronie <a href="<page
17
+    download/download>">pobierania</a>. Mamy tam też pakiety dla systemów Debian, Red
18
+    Hat, Gentoo, *BSD, etc. Jeśli używasz Ubuntu, nie używaj domyślnych paczek:
19
+    zamiast nich użyj <a href="<page docs/debian>#ubuntu">naszego repozytorium
20
+    deb</a>.
21
+    </p>
22
+    
23
+    <p>Jeśli masz zamiar kompilować Tora, najpierw zainstaluj <a
24
+    href="http://www.monkey.org/~provos/libevent/">libevent</a>, i upewnij się,
25
+    że masz OpenSSL i zlib (łącznie z pakietami -devel, jeśli są). Potem
26
+    uruchom:<br /> <tt>tar xzf tor-<version-stable>.tar.gz; cd
27
+    tor-<version-stable><br /> ./configure &amp;&amp; make</tt><br /> Możesz
28
+    teraz uruchomić Tora poprzez <tt>src/or/tor</tt>, lub możesz uruchomić
29
+    <tt>make install</tt> (jako root, jeśli potrzeba), by zainstalować Tora do
30
+    /usr/local, wtedy możesz go uruchamiać po prostu pisząc <tt>tor</tt>.
31
+    </p>
32
+    
33
+    <p>Tor comes configured as a client by default. It uses a built-in default
34
+    configuration file, and most people won't need to change any of the
35
+    settings. Tor is now installed.
36
+    </p>
37
+    
38
+    <hr /> <a id="privoxy"></a> <a id="polipo"></a>
39
+    <h2><a class="anchor" href="#polipo">Krok 2: Instalacja Polipo do przeglądania
40
+    sieci WWW</a></h2>
41
+    <br />
42
+    
43
+    <p>Po instalacji Tora musisz skonfigurować swoje aplikacje, by go używały.
44
+    </p>
45
+    
46
+    <p>
47
+    The first step is to set up web browsing. Start by installing <a
48
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> from your
49
+    favorite repository. Polipo is a caching web proxy that does http pipelining
50
+    well, so it's well-suited for Tor's latencies. Make sure to get at least
51
+    Polipo 1.0.4, since earlier versions lack the SOCKS support required to use
52
+    Polipo with Tor. You should uninstall privoxy at this point (e.g. apt-get
53
+    remove privoxy or yum remove privoxy), so they don't conflict.
54
+    </p>
55
+    
56
+    <p>Po instalacji Polipo (z paczki lub źródeł)  <b>musisz skonfigurować Polipo,
57
+    by używało Tora</b>. Pobierz naszą <a
58
+    href="https://svn.torproject.org/svn/torbrowser/trunk/build-scripts/config/polipo.conf">konfigurację
59
+    Polipo dla Tora</a> i umieść go zamiast swojego bieżącego pliku
60
+    konfiguracyjnego Polipo (np. /etc/polipo/config lub ~/.polipo). Musisz
61
+    ponownie uruchomić Polipo, by zmiany odniosły skutek. Na przykład:<br />
62
+    <tt>/etc/init.d/polipo restart</tt>
63
+    </p>
64
+    
65
+    <p>Jeśli wolisz, możesz używać Privoxy z <a
66
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">tą
67
+    przykładową konfiguracją Privoxy</a>. Ale jako że oba pliki konfiguracyjne
68
+    używają portu 8118, nie powinieneś/aś używać Polipo i Privoxy jednocześnie.</p>
69
+    
70
+    <hr /> <a id="using"></a>
71
+    <h2><a class="anchor" href="#using">Krok 3: Konfiguracja aplikacji, by używały
72
+    Tora</a></h2>
73
+    <br />
74
+    
75
+    <p>After installing Tor and Polipo, you need to configure your applications to
76
+    use them. The first step is to set up web browsing.</p>
77
+    
78
+    <p>You should use Tor with Firefox and Torbutton, for best safety.  Simply
79
+    install the <a href="https://addons.mozilla.org/firefox/2275/">Torbutton
80
+    plugin</a>, restart your Firefox, and you're all set:
81
+    </p>
82
+    
83
+    <img alt="Rozszerzenie Torbutton dla Firefoksa"
84
+    src="../img/screenshot-torbutton.png" border="1"> <br />
85
+    
86
+    <p>
87
+    Jeśli masz zamiar używać Firefoksa na innym komputerze niż tam, gdzie jest
88
+    Tor, spójrz na <a
89
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">wpis
90
+    w FAQ na temat uruchamiania Tora na innym komputerze</a>.
91
+    </p>
92
+    
93
+    <p>By "storyfikować" inne aplikacje, które używają proxy dla HTTP, po prostu
94
+    skieruj je na Polipo (czyli localhost, port 8118). By aplikacje bezpośrednio
95
+    używały serwera SOCKS (do komunikatorów, Jabbera, IRC, itp.), skieruj je
96
+    bezpośrednio na Tora (localhost, port 9050), ale przeczytaj <a
97
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">ten
98
+    wpis do FAQ</a>, dlaczego to może być niebezpieczne. Jeśli aplikacja nie
99
+    obsługuje ani proxy dla HTTP, ani dla SOCKS, spójrz na <a
100
+    href="http://tsocks.sourceforge.net/">tsocks</a> lub <a
101
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>.
102
+    </p>
103
+    
104
+    <p>Po informacje, jak "storyfikować" inne aplikacje, spójrz na <a
105
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
106
+    HOWTO</a>.
107
+    </p>
108
+    
109
+    <hr /> <a id="verify"></a>
110
+    <h2><a class="anchor" href="#verify">Krok 4: Upewnij się, że wszystko działa</a></h2>
111
+    <br />
112
+    
113
+    <p>
114
+    <!--PO4ASHARPBEGIN<a href="http://ipchicken.com/">
115
+    this site</a>PO4ASHARPEND-->
116
+    #to see what IP address it thinks you're using.
117
+    Next, you should try using your browser with Tor and make sure that your IP
118
+    address is being anonymized. Click on <a
119
+    href="https://check.torproject.org/">the Tor detector</a> and see whether it
120
+    thinks you're using Tor or not.  (If that site is down, see <a
121
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this
122
+    FAQ entry</a> for more suggestions on how to test your Tor.)
123
+    </p>
124
+    
125
+    <p>If you have a personal firewall that limits your computer's ability to
126
+    connect to itself (this includes something like SELinux on Fedora Core 4),
127
+    be sure to allow connections from your local applications to Polipo (local
128
+    port 8118) and Tor (local port 9050). If your firewall blocks outgoing
129
+    connections, punch a hole so it can connect to at least TCP ports 80 and
130
+    443, and then see <a
131
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this
132
+    FAQ entry</a>.  If your SELinux config is not allowing tor or privoxy to run
133
+    correctly, create a file named booleans.local in the directory
134
+    /etc/selinux/targeted.  Edit this file in your favorite text editor and
135
+    insert "allow_ypbind=1".  Restart your machine for this change to take
136
+    effect.
137
+    </p>
138
+    
139
+    <p>Jeśli dalej nie działa, spójrz na <a
140
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">ten
141
+    wpis FAQ</a>, by poszukać wskazówek.</p>
142
+    
143
+    <hr /> <a id="server"></a> <a id="relay"></a>
144
+    <h2><a class="anchor" href="#relay">Krok 5: Konfiguracja Tora jako przekaźnika
145
+    sieci</a></h2>
146
+    <br />
147
+    
148
+    <p>Sieć Tora polega na ochotnikach oddających część swojego łącza. Im więcej
149
+    ludzi uruchomi przekaźnik sieci, tym szybsza będzie sieć Tora. Jeśli masz co
150
+    najmniej 20 kilobajtów/s w obie strony, pomóż Torowi, konfigurując swojego
151
+    klienta tak, by był także przekaźnikiem sieci Tor. Mamy wiele cech, które
152
+    czynią przekaźniki Tora łatwymi i wygodnymi, łącznie z ograniczeniem
153
+    przepustowości, politykami wyjścia, byś mógł zmniejszyć ryzyko skarg, oraz
154
+    obsługą dynamicznych adresów IP.</p>
155
+    
156
+    <p>Posiadanie przekaźników w wielu różnych miejscach w sieci sprawia, że
157
+    użytkownicy są bezpieczni. <a
158
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">Ty
159
+    też możesz mieć lepszą anonimowość</a>, gdyż serwery, do których się
160
+    łączysz, nie mogą stwierdzić, czy połączenie pochodzi z Twojego komputera,
161
+    czy zostało przekierowane z innych.</p>
162
+    
163
+    <p>Przeczytaj szczegóły w naszym przewodniku <a href="<page
164
+    docs/tor-doc-relay>">Konfiguracji przekaźnika sieci Tor</a>.</p>
165
+    
166
+    <hr />
167
+    
168
+    <p>Jeśli masz pomysły na ulepszenie tej strony, prosimy <a href="<page
169
+    about/contact>">je do nas wysłać</a>. Dziękujemy!</p>
170
+  </div>
171
+  <!-- END MAINCOL -->
172
+  <div id = "sidecol">
173
+#include "side.wmi"
174
+#include "info.wmi"
175
+  </div>
176
+  <!-- END SIDECOL -->
177
+</div>
178
+<!-- END CONTENT -->
179
+#include <foot.wmi>   
... ...
@@ -0,0 +1,64 @@
1
+## translation metadata
2
+# Revision: $Revision: 21511 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: Configuring your browser to use Tor" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-web>">Configure Your Browser</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h1>Konfiguracja przeglądarki, by używała <a href="<page index>">Tora</a></h1>
14
+    <br />
15
+    
16
+    <p>Jeśli używasz przeglądarki Firefox (co zalecamy), nie musisz czytać tej strony.
17
+     Po prostu zainstaluj <a
18
+     href="https://addons.mozilla.org/firefox/2275/">rozszerzenie
19
+     Torbutton</a>, ponownie uruchom Firefoksa i gotowe:
20
+    </p>
21
+    
22
+    <img alt="Rozszerzenie Torbutton dla Firefoksa"
23
+     src="../img/screenshot-torbutton.png"
24
+     border="1" />
25
+    
26
+    <br />
27
+    
28
+    <p>W innym przypadku, musisz ręcznie skonfigurować ustawienia proxy w swojej przeglądarce.
29
+    <br />W przeglądarkach Mozilla i Firefox pod Windows, znajdują się w
30
+    	Narzędzia - Opcje - Ogólne - Ustawienia połączenia.
31
+    <br />W Firefoksie na OS X, są w Firefox - Preferencje - Ogólne - Ustawienia połączenia.
32
+    <br />W Firefoksie pod systemem Linux, znajdują się w
33
+      	 Edycja - Preferencje - Zaawansowane - Proxy [od tłum:
34
+    	 W Firefoksie 1.5: Edycja - Preferencje - Ogólne - Ustawienia połączenia;
35
+    	 w Firefoksie 2.0: Edycja - Preferencje - Zaawansowane - Sieć - Ustawienia ]
36
+    <br />W Operze są w Narzędzia - Preferencje(Zaawansowane) - Sieć - Serwery Proxy.
37
+    <br />Nie możemy zalecać używania IE, ale dla tych, którzy chcą mniej-niż-pełnej anonimowości:
38
+      W IE, są w Narzędzia - Opcje internetowe - Połączenia - Ustawienia sieci LAN - zaznacz Serwer Proxy
39
+    - Zaawansowane.</p>
40
+    
41
+    <img alt="Ustawienia proxy w Firefoksie"
42
+     src="../img/screenshot-win32-firefox-proxies.jpg" />
43
+    
44
+    <p>Powinieneś wpisać "localhost" i "8118", by skierować górne cztery protokoły na
45
+     Polipo, jak pokazano. (Nawet mimo tego, że Polipo nie obsługuje FTP i Gophera, <a
46
+     href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">powinieneś
47
+     i tak je ustawić</a>.) Powinieneś też wypełnić pole SOCKS Proxy, by wskazywało
48
+     bezpośrednio na Tora ("localhost", "9050" i socks5), by pokryć inne protokoły
49
+     poza pierwszymi czterema. Po wszystkim kliknij "OK".</p>
50
+    
51
+    <hr />
52
+    
53
+    <p>Jeśli masz pomysły na ulepszenie tej strony, prosimy <a
54
+    href="<page about/contact>">je do nas wysłać</a>. Dziękujemy!</p>
55
+  </div>
56
+  <!-- END MAINCOL -->
57
+  <div id = "sidecol">
58
+#include "side.wmi"
59
+#include "info.wmi"
60
+  </div>
61
+  <!-- END SIDECOL -->
62
+</div>
63
+<!-- END CONTENT -->
64
+#include <foot.wmi>   
... ...
@@ -0,0 +1,10 @@
1
+## translation metadata
2
+# Based-On-Revision: 13195
3
+# Status: obsolete
4
+# Translation-Priority: 2-medium
5
+# Last-Translator: bogdandr_at_op . pl
6
+
7
+#include "head.wmi" TITLE="Przekierowanie" CHARSET="UTF-8" REDIRECT="docs/tor-doc-windows"
8
+
9
+#include <foot.wmi>
10
+
... ...
@@ -0,0 +1,189 @@
1
+## translation metadata
2
+# Revision: $Revision: 21995 $
3
+# Translation-Priority: 1-high
4
+
5
+#include "head.wmi" TITLE="Tor Project: MS Windows Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-windows>">Windows Client</a>
11
+  </div> 
12
+  <div id="maincol">  
13
+    <h1>Uruchamianie klienta <a href="<page index>">Tor</a> na Microsoft Windows</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>Note that these are the installation instructions for running a Tor
18
+    client on Microsoft Windows (2000, XP, Vista, 7, and Server Editions).  If
19
+    you want to relay traffic for others to help the network grow (please do),
20
+    read the <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
21
+    guide.</b>
22
+    </p>
23
+    
24
+    <p>Freedom House has produced a video on how to install Tor.  You can view it
25
+    at <a
26
+    href="http://media.torproject.org/video/2009-install-and-use-tor.ogv">How to
27
+    install Tor on Windows</a>.  Know of a better video, or one translated into
28
+    your language? Let us know!</p>
29
+    
30
+    <div class="center">
31
+    <p><video id="v1" src="http://media.torproject.org/video/2009-install-and-use-tor.ogv" autobuffer="true" controls="controls"></video></p>
32
+    </div>
33
+    
34
+    <hr /> <a id="installing"></a>
35
+    <h2><a class="anchor" href="#installing">Krok 1: Pobranie i instalacja Tora</a></h2>
36
+    <br />
37
+    
38
+    <p>
39
+    Paczki dla Microsoft Windows zawierają programy: <a href="<page
40
+    index>">Tor</a>, <a href="<page projects/vidalia>">Vidalia</a> (GUI dla Tora),
41
+    <a href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> (dodatek do
42
+    Mozilla Firefox) i <a
43
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (serwer
44
+    proxy do WWW)  w jednej paczce, wszystkie cztery aplikacje prekonfigurowane
45
+    do współpracy ze sobą. Pobierz albo <a
46
+    href="../<package-win32-bundle-stable>">stabilną</a> albo <a
47
+    href="../<package-win32-bundle-alpha>">eksperymentalną</a> wersję paczki dla
48
+    Windows, lub poszukaj innych rozwiązań na <a href="<page download/download>">stronie
49
+    pobierania</a>.
50
+    </p>
51
+    
52
+    <img alt="Ekran instalacji Tora"
53
+    src="../img/screenshot-win32-installer-splash.png" />
54
+    
55
+    <p>Jeśli już wcześniej zainstalowałeś Tora, Vidalię lub Polipo, możesz
56
+    odznaczyć elementy, których nie musisz instalować w oknie dialogowym
57
+    pokazanym niżej.
58
+    </p>
59
+    
60
+    <img alt="Wybór składników instalacji"
61
+    src="../img/screenshot-win32-installer-components.png" />
62
+    
63
+    <p>Po zakończeniu instalacji wybrane składniki zostaną automatycznie
64
+    uruchomione.
65
+    </p>
66
+    
67
+    <p>Tor jest domyślnie skonfigurowany jako klient. Używa wbudowanego domyślnego
68
+    pliku konfiguracji, i większość użytkowników nie będzie musiała zmieniać
69
+    żadnych ustawień. Tor jest teraz zainstalowany.
70
+    </p>
71
+    
72
+    <hr /> <a id="using"></a>
73
+    <h2><a class="anchor" href="#using">Krok 2: Konfiguracja aplikacji, by używały
74
+    Tora</a></h2>
75
+    <br />
76
+    
77
+    <p>Po instalacji Tora i Polipo musisz skonfigurować swoje aplikacje, by ich
78
+    używały.  Pierwszym krokiem jest ustawienie sposobu przeglądania sieci WWW.</p>
79
+    
80
+    <p>Powinieneś/aś używać Tora z Firefoksem i Torbuttonem, dla najlepszego
81
+    bezpieczeństwa. Instalator programu zainstaluje <a
82
+    href="https://addons.mozilla.org/firefox/2275/">rozszerzenie Torbutton</a>
83
+    za Ciebie. Uruchom ponownie Firefoksa i gotowe:
84
+    </p>
85
+    
86
+    <img alt="Rozszerzenie Torbutton dla Firefoksa"
87
+    src="../img/screenshot-torbutton.png" border="1" /> <br />
88
+    
89
+    <p>
90
+    Jeśli masz zamiar używać Firefoksa na innym komputerze niż tam, gdzie jest
91
+    Tor, spójrz na <a
92
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">wpis
93
+    w FAQ na temat uruchamiania Tora na innym komputerze</a>.
94
+    </p>
95
+    
96
+    <p>To Torify other applications that support HTTP proxies, just point them at
97
+    Polipo (that is, localhost port 8118). To use SOCKS directly (for instant
98
+    messaging, Jabber, IRC, etc), you can point your application directly at Tor
99
+    (localhost port 9050), but see <a
100
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this
101
+    FAQ entry</a> for why this may be dangerous. For applications that support
102
+    neither SOCKS nor HTTP, take a look at SocksCap or <a
103
+    href="http://www.freecap.ru/eng/">FreeCap</a>.  (FreeCap is free software;
104
+    SocksCap is proprietary.)</p>
105
+    
106
+    <p>Po informacje, jak "storyfikować" inne aplikacje, spójrz na <a
107
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
108
+    HOWTO</a>.
109
+    </p>
110
+    
111
+    <hr /> <a id="verify"></a>
112
+    <h2><a class="anchor" href="#verify">Krok 3: Upewnij się, że wszystko działa</a></h2>
113
+    <br />
114
+    
115
+    <p>
116
+    Sprawdź, czy Vidalia jest uruchomione. Vidalia używa małej zielonej cebuli,
117
+    gdy Tor działa lub ciemnej cebuli z czerwonym "X", gdy Tor nie
118
+    działa. Możesz zatrzymać lub uruchomić Tora, klikając prawym klawiszem
119
+    myszki na ikonę Vidalii w zasobniku systemowym i wybierając "Start" lub
120
+    "Stop" z menu, jak pokazano niżej:
121
+    </p>
122
+    
123
+    <img alt="Ikona Vidalii w zasobniku"
124
+    src="../img/screenshot-win32-vidalia.png" />
125
+    
126
+    <p>
127
+    Teraz powinieneś spróbować użyć swojej przeglądarki z Torem i upewnić się,
128
+    że Twój adres IP jest anonimizowany. Kliknij na <a
129
+    href="https://check.torproject.org/">wykrywacz Tora</a> i sprawdź, czy jego
130
+    zdaniem używasz Tora czy nie. (Jeśli ta strona akurat nie działa, przeczytaj
131
+    <a
132
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">ten
133
+    wpis w FAQ</a>, by poznać więcej sposobów na testowanie swojego Tora.)
134
+    </p>
135
+    
136
+    <p>Jeśli masz zaporę ogniową, która ogranicza możliwości Twojego komputera co
137
+    do łączenia się z samym sobą, zezwól w niej na połączenia od programów
138
+    lokalnych na porty lokalne 8118 i 9050. Jeśli zapora blokuje połączenia
139
+    wychodzące, spraw, by można się było połączyć choć z portami 80 i 433, po
140
+    czym przeczytaj <a
141
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">ten
142
+    wpis do FAQ</a>.
143
+    </p>
144
+    
145
+    <p>Jeśli dalej nie działa, spójrz na <a
146
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">ten
147
+    wpis FAQ</a>, by poszukać wskazówek.</p>
148
+    
149
+    <p>
150
+    Gdy Tor już działa, poczytaj o tym, <a href="<page download/download>#Warning">co Tor
151
+    oferuje, a czego nie</a>.
152
+    </p>
153
+    
154
+    <hr /> <a id="server"></a> <a id="relay"></a>
155
+    <h2><a class="anchor" href="#relay">Krok 4: Konfiguracja Tora jako przekaźnika
156
+    sieci</a></h2>
157
+    <br />
158
+    
159
+    <p>The Tor network relies on volunteers to donate bandwidth. The more people
160
+    who run relays, the faster the Tor network will be. If you have at least 20
161
+    kilobytes/s each way, please help out Tor by configuring your Tor to be a
162
+    relay too. We have many features that make Tor relays easy and convenient,
163
+    including rate limiting for bandwidth, exit policies so you can limit your
164
+    exposure to abuse complaints, and support for dynamic IP addresses.</p>
165
+    
166
+    <p>Posiadanie przekaźników w wielu różnych miejscach w sieci sprawia, że
167
+    użytkownicy są bezpieczni. <a
168
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">Ty
169
+    też możesz mieć lepszą anonimowość</a>, gdyż serwery, do których się
170
+    łączysz, nie mogą stwierdzić, czy połączenie pochodzi z Twojego komputera,
171
+    czy zostało przekierowane z innych.</p>
172
+    
173
+    <p>Przeczytaj szczegóły w naszym przewodniku <a href="<page
174
+    docs/tor-doc-relay>">Konfiguracji przekaźnika sieci Tor</a>.</p>
175
+    
176
+    <hr />
177
+    
178
+    <p>Jeśli masz pomysły na ulepszenie tej strony, prosimy <a href="<page
179
+    about/contact>">je do nas wysłać</a>. Dziękujemy!</p>
180
+  </div>
181
+  <!-- END MAINCOL -->
182
+  <div id = "sidecol">
183
+#include "side.wmi"
184
+#include "info.wmi"
185
+  </div>
186
+  <!-- END SIDECOL -->
187
+</div>
188
+<!-- END CONTENT -->
189
+#include <foot.wmi>   
... ...
@@ -0,0 +1,269 @@
1
+## translation metadata
2
+# Revision: $Revision: 22314 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Hidden Service Configuration Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-hidden-service>">Tor Hidden Service</a>
11
+  </div>
12
+  <div id="maincol"> 
13
+    <h1>Konfiguracja usług ukrytych <a href="<page index>">Tora</a></h1>
14
+    <hr />
15
+    
16
+    <p>Tor umożliwia klientom i przekaźnikom sieci Tor oferowanie usług ukrytych. To znaczy,
17
+     że możesz mieć serwer WWW, SSH etc. bez podawania swojego IP użytkownikom.
18
+     Ponieważ nie używasz żadnego adresu publicznego, możesz prowadzić
19
+     usługę ukrytą zza zapory ogniowej.
20
+    </p>
21
+    
22
+    <p>Jeśli masz zainstalowanego Tora, możesz zobaczyć usługi
23
+     ukryte w działaniu, odwiedzając <a href="http://duskgytldkxiuqc6.onion/">naszą przykładową
24
+     usługę ukrytą</a> lub <a
25
+     href="http://gaddbiwdftapglkq.onion/">usługę ukrytą Wikileaks</a>.
26
+    </p>
27
+    
28
+    <p>Ten dokument opisuje kroki potrzebne do uruchomienia własnej ukrytej usługi WWW.
29
+    By poznać szczegóły techniczne tego, jak działa protokół usług ukrytych, przeczytaj
30
+    naszą stronę <a href="<page docs/hidden-services>">protokołu usług ukrytych</a>.
31
+    </p>
32
+    
33
+    <hr />
34
+    <a id="zero"></a>
35
+    <h2><a class="anchor" href="#zero">Krok 0: Uruchomienie Tora</a></h2>
36
+    <br />
37
+    
38
+    <p>Zanim zaczniesz sprawdź, czy:</p>
39
+    <ol>
40
+    <li> Tor jest uruchomiony i działa,</li>
41
+    <li> rzeczywiście wszystko dobrze ustawiłeś.</li>
42
+    </ol>
43
+    <p>Użytkownicy Windows powinni przeczytać <a
44
+     href="<page docs/tor-doc-windows>">instrukcje dla
45
+     Windows</a>, użytkownicy OS X powinni przeczytać <a
46
+     href="<page docs/tor-doc-osx>">instrukcje dla
47
+     OS X</a>, a użytkownicy Linux/BSD/Unix powinni przeczytać <a
48
+     href="<page docs/tor-doc-unix>">instrukcje dla systemów Unix</a>.
49
+    </p>
50
+    
51
+    <p>Po instalacji i konfiguracji Tora możesz zobaczyć ukryte usługi
52
+     w działaniu, wchodząc na <a
53
+     href="http://duskgytldkxiuqc6.onion/">naszą przykładową
54
+     usługę ukrytą</a> lub <a
55
+     href="http://gaddbiwdftapglkq.onion/">usługę ukrytą Wikileaks</a>.
56
+     Zwykle trzeba poczekać 10-60 na załadowanie strony (lub stwierdzenie, że w
57
+     danej chwili jest niedostępna). Jeśli próba od razu kończy się błędem mówiącym, że
58
+     nie można znaleźć serwera "www.duskgytldkxiuqc6.onion", to znaczy, że nie skonfigurowałeś
59
+     Tora poprawnie; zajrzyj do <a
60
+     href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">wpisu
61
+     "to nie działa" w FAQ</a> po pomoc.
62
+    </p>
63
+    
64
+    
65
+    <hr />
66
+    <a id="one"></a>
67
+    <h2><a class="anchor" href="#one">Krok 1: Zainstaluj lokalnie serwer WWW</a></h2>
68
+    <br />
69
+    
70
+    <p>Teraz gdy już masz działające usługi ukryte w Torze, musisz uruchomić
71
+     lokalnie serwer WWW. Uruchamianie serwera WWW jest skomplikowane,
72
+     więc podamy tu tylko trochę podstawowych informacji. Jeśli utkniesz
73
+     lub będziesz chciał zrobić coś więcej, znajdź znajomego, który ci pomoże.
74
+     Zalecamy instalację nowego, oddzielnego serwera do usługi ukrytej, gdyż
75
+     nawet jeśli już masz jeden zainstalowany, możesz już go używać (lub
76
+     później będziesz chciał go używać) do normalnego serwisu WWW.
77
+    </p>
78
+    
79
+    <p>Jeśli jesteś na systemie Unix lub OS X i nie przeszkadza ci używanie
80
+     linii poleceń, najlepszym sposobem jest instalacja <a
81
+     href="http://www.acme.com/software/thttpd/">thttpd</a>. Po prostu
82
+     pobierz archiwum tar, rozpakuj je (utworzy się osobny katalog) i uruchom
83
+     <kbd>./configure &amp;&amp; make</kbd>. Potem wykonaj <kbd>mkdir hidserv; cd hidserv</kbd>,
84
+     i uruchom <kbd>../thttpd -p 5222 -h localhost</kbd>. Powrócisz do wiersza poleceń,
85
+     a od tej pory masz uruchomiony serwer WWW na porcie 5222. Możesz umieścić
86
+     pliki dla serwera w katalogu hidserv.
87
+    </p>
88
+    
89
+    <p>Jeśli używasz systemu Windows, możesz wybrać serwer WWW <a
90
+     href="http://savant.sourceforge.net/">Savant</a> lub <a
91
+     href="http://httpd.apache.org/">Apache</a>,
92
+     konfigurując go tak, by podłączał się tylko do komputera, na którym jest
93
+     zainstalowany (localhost). Powinieneś też jakoś sprawdzić na jakim porcie
94
+     nasłuchuje, gdyż ta informacja przyda się potem.
95
+    </p>
96
+    
97
+    <p>(Powodem, dla którego serwer powinien działać tylko lokalnie jest upewnienie
98
+     się, że nie jest on dostępny z zewnątrz. Jeśli ktoś mógłby się do niego
99
+     połączyć bezpośrednio, mógłby potwierdzić, że to twój komputer oferuje
100
+     tą ukrytą usługę.)
101
+    </p>
102
+    
103
+    <p>Po ustawieniu serwera WWW, sprawdź, czy działa: otwórz przeglądarkę i
104
+     przejdź pod adres <a
105
+     href="http://localhost:5222/">http://localhost:5222/</a>, gdzie 5222 jest numerem portu
106
+     wybranym wcześniej. Potem spróbuj
107
+     umieścić jakiś plik w głównym katalogu HTML serwera i sprawdź, czy pokazuje
108
+     się on, gdy łączysz się ze swoim serwerem WWW.
109
+    </p>
110
+    
111
+    
112
+    <hr />
113
+    <a id="two"></a>
114
+    <h2><a class="anchor" href="#two">Krok 2: Konfiguracja twojej usługi ukrytej</a></h2>
115
+    <br />
116
+    
117
+    <p>Teraz musisz skonfigurować swoją usługę ukrytą, by wskazywała na twój lokalny
118
+     serwer WWW.
119
+    </p>
120
+    
121
+    <p>Najpierw otwórz swój plik torrc swoim ulubionym edytorem. (Przeczytaj <a
122
+     href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">wpis
123
+     o torrc w FAQ</a>, by dowiedzieć się, co to znaczy.) Przejdź do środkowej sekcji i
124
+     szukaj linii</p>
125
+    
126
+    <pre>
127
+    \############### This section is just for location-hidden services ###
128
+    </pre>
129
+    
130
+    <p>Ta sekcja pliku składa się z grup linii, z których każda reprezentuje
131
+     jedną usługę ukrytą. W tej chwili wszystkie są zakomentowane (linie zaczynają
132
+     się od krzyżyka #), więc usługi ukryte są wyłączone. Każda grupa linii
133
+     składa się z jednej linii <var>HiddenServiceDir</var> i jednej lub więcej linii
134
+     <var>HiddenServicePort</var>:</p>
135
+    <ul>
136
+    <li><var>HiddenServiceDir</var> jest katalogiem, w którym Tor będzie przechowywał
137
+     informacje o tej usłudze ukrytej. W szczególności, Tor utworzy w tym katalogu
138
+     plik o nazwie <var>hostname</var>, z którego odczytasz "adres cebulowy" (onion URL).
139
+     Nie musisz dodawać żadnych plików do tego katalogu.</li>
140
+    <li><var>HiddenServicePort</var> pozwala określić port wirtualny (tzn. użytkownikom
141
+     łączącym się z usługą ukrytą będzie się zdawało, że używają tego właśnie portu) i
142
+     adres IP wraz z portem do przekierowywania połączeń na ten wirtualny port.</li>
143
+    </ul>
144
+    
145
+    <p>Dodaj następujące linie do swojego pliku torrc:
146
+    </p>
147
+    
148
+    <pre>
149
+    HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
150
+    HiddenServicePort 80 127.0.0.1:5222
151
+    </pre>
152
+    
153
+    <p>Powinieneś zmienić linię <var>HiddenServiceDir</var> tak, by pokazywała na istniejący
154
+     katalog, który jest odczytywalny/zapisywalny przez użytkownika, który uruchamia
155
+     Tora. Powyższa linia powinna działać, gdy używasz paczki z Torem dla OS X.
156
+     Pod systemem Unix, sprobuj "/home/użytkownik/hidserv/", podając własną nazwę użytkownika
157
+     w miejsce "użytkownik". Pod systemem Windows mógłbyś wpisać:</p>
158
+    <pre>
159
+    HiddenServiceDir C:\Documents and Settings\username\Application Data\hidden_service\\
160
+    HiddenServicePort 80 127.0.0.1:5222
161
+    </pre>
162
+    
163
+    <p>Teraz zapisz zmiany w pliku torrc, zamknij Tora i uruchom go ponownie.
164
+    </p>
165
+    
166
+    <p>Jeśli Tor ponownie się uruchomi, to świetnie. W innym przypadku coś musi być
167
+     źle. Najpierw przejrzyj plik z logami, by poszukać przyczyn. Będą w nim
168
+     ostrzeżenia i błędy. Powinny one wskazać, co poszło nie tak. Zazwyczaj chodzi o
169
+     literówki w pliku torrc lub złe uprawnienia do katalogów. (Przeczytaj <a
170
+     href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">wpis
171
+     o logach w FAQ</a>, jeśli nie wiesz jak włączyć lub znaleźć plik z logami.)
172
+    </p>
173
+    
174
+    <p>Gdy Tor się uruchomi, automatycznie utworzy podany katalog <var>HiddenServiceDir</var>
175
+     (jeśli trzeba), a w nim utworzy dwa pliki.</p>
176
+     <dl>
177
+     <dt><var>private_key</var></dt>
178
+     <dd>Po pierwsze, Tor wygeneruje nową
179
+     parę kluczy publiczny/prywatny do twojej usługi ukrytej. Zostaje ona zapisana w
180
+     pliku o nazwie "private_key". Nie dawaj tego klucza nikomu -- jeśli to zrobisz,
181
+     inni będą mogli podszyć się pod twoją usługę ukrytą.</dd>
182
+     <dt><var>hostname</var></dt>
183
+     <dd>Drugim plikiem, który zostanie utworzony, jest plik o nazwie "hostname".
184
+     Zawiera on krótkie podsumowanie twojego klucza publicznego -- będzie wyglądać
185
+     podobnie do tego: <tt>duskgytldkxiuqc6.onion</tt>. To jest publiczna nazwa
186
+     twojej usługi i możesz podawać ją innym, rozgłaszać w internecie,
187
+     umieszczać na wizytówkach etc.</dd>
188
+     </dl>
189
+    
190
+    <p>Jeśli Tor jest uruchomiony z prawami innego
191
+     użytkownika niż ty, np. na systemach OS X, Debian, Red Hat, możesz potrzebować
192
+     uprawnień roota, by zobaczyć te pliki.
193
+    </p>
194
+    
195
+    <p>Po ponownym uruchomieniu, Tor zajmuje się pobieraniem punktów wstępu
196
+     w sieci Tora i generowaniem <em>deskryptorem usługi ukrytej</em>.
197
+     Jest to podpisana lista punktów wstępnych razem z pełnym publicznym kluczem
198
+     usługi. Tor anonimowo umieszcza ten deskryptor na serwerach katalogowych, a
199
+     inni ludzie anonimowo go pobierają z serwerów katalogowych, gdy próbują połączyć
200
+     się z twoją usługą.
201
+    </p>
202
+    
203
+    <p>Wypróbuj to: wklej zawartość pliku "hostname" do swojej przeglądarki WWW.
204
+     Jeśli działa, zobaczysz stronę Google, ale adres w przeglądarce będzie
205
+     adresem twojej usługi. Jeśli nie działa, poszukaj wskazówek w logach i
206
+     zajmuj się tym do chwili, w której zadziała.
207
+    </p>
208
+    
209
+    <hr />
210
+    <a id="three"></a>
211
+    <h2><a class="anchor" href="#three">Krok 3: Wskazówki dla zaawansowanych</a></h2>
212
+    <br />
213
+    
214
+    <p>Jeśli planujesz udostępniać swoją usługę przez dłuższy czas, zrób kopię
215
+     zapasową pliku <var>private_key</var>.
216
+    </p>
217
+    
218
+    <p>Wcześniej unikaliśmy polecania serwera Apache, a) gdyż wielu ludzi
219
+     może już go używać jako publicznego serwera na ich komputerach, i
220
+     b) gdyż jest duży i ma wiele miejsc, w których mógłby podać twój adres IP
221
+     lub inne informacje identyfikujące, np. na stronach 404. Jednak dla ludzi,
222
+     którzy chcą więcej funkcjonalności, Apache może być dobrym rozwiązaniem.
223
+     Czy ktoś mógłby napisać nam listę sposobów na zabezpieczenie Apache, gdy
224
+     jest używany jako usługa ukryta? Savant prawdopodobnie też ma takie problemy.
225
+    </p>
226
+    
227
+    <p>Jeśli chcesz przekierować wiele portów wirtualnych w ramach pojedynczej
228
+     usługi ukrytej, po prostu dodaj więcej linii <var>HiddenServicePort</var>.
229
+     Jeśli chcesz uruchomić wiele usług ukrytych z tego samego klienta Tora,
230
+     po prostu dodaj kolejną linię <var>HiddenServiceDir</var>. Wszystkie następujące po
231
+     niej linie <var>HiddenServicePort</var> odnoszą się do aktualnej linii <var>HiddenServiceDir</var>,
232
+     dopóki nie dodasz kolejnej linii <var>HiddenServiceDir</var>:
233
+    </p>
234
+    
235
+    <pre>
236
+    HiddenServiceDir /usr/local/etc/tor/hidden_service/
237
+    HiddenServicePort 80 127.0.0.1:8080
238
+    
239
+    HiddenServiceDir /usr/local/etc/tor/other_hidden_service/
240
+    HiddenServicePort 6667 127.0.0.1:6667
241
+    HiddenServicePort 22 127.0.0.1:22
242
+    </pre>
243
+    
244
+    <p>Są też pewne sprawy dotyczące anonimowości, o których trzeba pamiętać:
245
+    </p>
246
+    <ul>
247
+    <li>Jak wspomniano wyżej, uważaj z pozwoleniem dla serwera o podawaniu
248
+     informacji identyfikujących ciebie, twój komputer lub położenie.
249
+     Na przykład, czytelnicy mogą prawdopodobnie dowiedzieć się, czy
250
+     używasz Apache czy thttpd i dowiedzieć sie czegoś o twoim systemie operacyjnym.</li>
251
+    <li>Jeśli twój komputer nie jest cały czas on-line, twoja usługa ukryta też
252
+     nie będzie. Jest to wyciek informacji dla obserwującego przeciwnika.</li>
253
+    <!-- increased risks over time -->
254
+    </ul>
255
+    
256
+    <hr />
257
+    
258
+    <p>Jeśli masz pomysły na ulepszenie tej strony, prosimy <a
259
+    href="<page about/contact>">je do nas wysłać</a>. Dziękujemy!</p>
260
+  </div>
261
+  <!-- END MAINCOL -->
262
+  <div id = "sidecol">
263
+#include "side.wmi"
264
+#include "info.wmi"
265
+  </div>
266
+  <!-- END SIDECOL -->
267
+</div>
268
+<!-- END CONTENT -->
269
+#include <foot.wmi>   
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,211 @@
1
+    <p>
2
+    [Note that this translation is very wrong at this point -- we
3
+    include it here to encourage people to update it. -RD]
4
+    </p>
5
+    
6
+    <h1>Usando o cliente <a href="<page index>">Tor</a> em MS Windows</h1>
7
+    <br />
8
+    
9
+    <a name="installing"></a>
10
+    <h2>Passo 1: Download e Instala��o do Tor</h2>
11
+    <p>
12
+    <b>Note que estas instru�es s�o para a instala��o do cliente <b>Tor</b> em MS Windows
13
+    (98, 98SE, NT4, 2000, XP, Server). Se voc� pretende rodar um servidor (todos os servidores
14
+    s�o bem-vindos), leia a se��o "Configurando um servidor" em
15
+    <a href="<page docs/bridges>">tor-doc-server.html</a>.</b>
16
+    </p>
17
+    <p>
18
+    Este documento foi atualizado em 14/06/2005.
19
+    </p>
20
+    <p>
21
+    #A �ltima vers�o beta de Tor para MS Windows �
22
+    #<a href="https://www.torproject.org/dist/win32/tor-0.1.0.10-win32.exe">0.1.0.10</a>.
23
+    #Fa�a o download clicando no link.
24
+    Voc� pode encontrar vers�es experimentais
25
+    <a href="<page download/download>">aqui</a>, se voc� estiver procurando
26
+    por novas facilidades e novos bugs.
27
+    </p>
28
+    
29
+    <p>
30
+    Se voc� deseja rodar o Tor no SYSTRAY, ou como um servi�o, consulte o
31
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Win32SystemTrayService">nosso FAQ</a>.
32
+    Se voc� n�o se importa em rodar o programa em uma janela (de forma que voc� possa ver
33
+    os seus <i>logs</i> e mensagens de erro), ent�o o Instalador do Tor deve lhe servir
34
+    de maneira bem simples. Abaixo vemos uma imagem do programa de instala��o (provavelmente
35
+    a sua vers�o ser� mais nova do que a mostrada na imagem):
36
+    </p>
37
+    <p>
38
+    <small>(NT: O Programa de instala��o, por enquanto, est� dispon�vel apenas em ingl�s.)</small>
39
+    </p>
40
+    
41
+    <img alt="tor installer splash page"
42
+    src="../img/screenshot-win32-installer-splash.jpg" />
43
+    
44
+    <p>
45
+    Pof <i>default</i>, Tor n�o � configurado para ser executado na inicializa��o.
46
+    <!--No entanto, n�s recomendamos fortemente que voc� ative esta op��o.-->
47
+    Voc� pode ativar esta op��o clicando no controle <i>"Run at Startup"</i> como
48
+    mostrado abaixo.
49
+    Certifique-se de manter os outros controles ligados.
50
+    </p>
51
+    
52
+    <img alt="select components to install"
53
+    src="../img/screenshot-win32-installer-components.jpg" />
54
+    
55
+    <p>
56
+    Assim que a instala��o � terminada, o programa Tor ser� executado numa janela,
57
+    de forma que voc� possa ver seus <i>logs</i> e mensagens de erro.<br />
58
+    Aten��o: Voc� pode minimizar esta janela, mas n�o fech�-la, ou o programa n�o
59
+    estar� mais dispon�vel.
60
+    </p>
61
+    
62
+    <img alt="tor window screenshot"
63
+    src="../img/screenshot-win32-dos-window.jpg" />
64
+    
65
+    <p>
66
+    O programa Tor vem pr�-configurado como cliente, por <i>default</i>. Ele usa
67
+    um arquivo de configura��o interno pr�-definido, e na maioria das vezes n�o
68
+    ser� necess�rio alterar nenhum dos seus ajustes.<br />
69
+    Neste momento, o programa Tor j� estar� instalado e pronto para uso.
70
+    </p>
71
+    
72
+    <a name="privoxy"></a>
73
+    <h2>Passo 2: Instalar o Privoxy para Navega��o Web</h2>
74
+    
75
+    <p>
76
+    Depois de instalar o programa Tor, voc� precisa configurar suas aplica�es para
77
+    us�-lo. O primeiro passo � configurar a navega��o web. Comece instalando o programa
78
+    <a href="http://www.privoxy.org/">Privoxy</a>
79
+    (clique em 'recent releases' para baixar a vers�o mais atual, ent�o role a janela para
80
+    selecionar os pacotes de instala��o para MS Windows).
81
+    Privoxy � um proxy com filtros de navega��o que permite boa integra��o com o
82
+    programa Tor. Assim que o Privoxy estiver instalado, ele aparecer� no seu SYSTRAY
83
+    como um "P" num c�rculo, como na figura abaixo:
84
+    </p>
85
+    
86
+    <img alt="privoxy icon in the system tray"
87
+    src="../img/screenshot-win32-privoxy-icon.jpg" />
88
+    
89
+    <p>
90
+    Voc� deve configurar o Privoxy para usar o Tor.
91
+    Abra o arquivo de configura��o principal do Privoxy selecionando-o em "Iniciar &gt; Todos os Programas":
92
+    </p>
93
+    
94
+    <img border="1" alt="editing privoxy config"
95
+    src="../img/screenshot-win32-privoxy-config.jpg" />
96
+    
97
+    <p>
98
+    Adicione a linha<br />
99
+    <var>forward-socks4a / 127.0.0.1:9050 .</var><br />
100
+    ao arquivo de configura��o do Privoxy. N�o esque�a de colocar o "." no final da linha.
101
+    A maneira mais f�cil de fazer isso � copiar a linha acima e colar dentro do arquivo.
102
+    N�o esque�a de salvar as altera�es.
103
+    </p>
104
+    
105
+    <img border="1" alt="privoxy points to tor"
106
+    src="../img/screenshot-win32-privoxy-edit.jpg" />
107
+    
108
+    <a name="using"></a>
109
+    <h2>Passo 3: Configurando suas aplica�es para usar Tor</h2>
110
+    
111
+    <p>
112
+    Agora, mude a configura�ao de proxy HTTP do seu navegador para o endere�o 'localhost',
113
+    porta 8118 (Essa � a porta onde o Privoxy trabalha).
114
+    No Firefox, o caminho � "Ferramentas &gt; Op�es &gt; Geral &gt; Conex�o &gt; Proxy".
115
+    No Mozilla, o caminho � "Editar &gt; Prefer�ncias &gt; Rede &gt; Servidores Proxy".
116
+    No Internet Explorer, o caminho � "Ferramentas &gt; Op�es da Internet &gt; Conex�o &gt; Servidores Proxy".
117
+    </p>
118
+    <small>NT: Estes caminhos s�o para as vers�es em portugu�s dos navegadores, e podem variar
119
+    conforme a vers�o em uso.</small>
120
+    <p>
121
+    Voc� tamb�m deve ajustar o seu proxy SSL (chamado pelo IE de "Seguro") para os mesmos
122
+    valores, para esconder seu tr�fego SSL tamb�m. No Internet Explorer, essa configura��o
123
+    fica parecida com isto:
124
+    </p>
125
+    
126
+    <img alt="LAN settings in IE"
127
+    src="../img/screenshot-win32-ie-lan.jpg" />
128
+    <img alt="Proxy settings in IE"
129
+    src="../img/screenshot-win32-ie-proxies.jpg" />
130
+    
131
+    <p>
132
+    O uso do Privoxy � <strong>necess�rio</strong> pois
133
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">
134
+    os navegadores deixam vazar as suas requisi�es DNS quando eles
135
+    usam um proxy SOCKS diretamente</a>,
136
+    o que � ruim para seu anonimato.
137
+    Privoxy tamb�m remove certos cabe�alhos problem�ticos das suas requisi�es, e
138
+    bloqueia sites irritantes de an�ncios tais como "DoubleClick".
139
+    </p>
140
+    
141
+    <p>
142
+    Para testar o funcionamento, voc� deve conhecer o seu endere�o IP normal,
143
+    de maneira que voc� possa comprovar que o endere�o realmente mude quando Tor
144
+    est� em uso.
145
+    Clique em "Iniciar &gt; Executar" e em seguida digite <kbd>cmd</kbd> para abrir
146
+    uma janela de prompt de comando. Ao chegar ao prompt de comando, execute o
147
+    comando <kbd>ipconfig</kbd>.
148
+    Se voc� estiver trabalhando atr�s de um Firewall com NAT (<small>NT: Isso acontece
149
+    se voc� usa um modem ADSL em modo router, ou usa conex�o de r�dio sem IP registrado.</small>),
150
+    voc� pode usar um dos sites listados abaixo para verificar qual o IP da sua conex�o
151
+    internet.<br />
152
+    Quando souber o seu IP, inicie o Tor e o Privoxy e visite qualquer um desses sites
153
+    novamente. Se tudo estiver funcionando corretamente, o endere�o IP mostrado ter� mudado.
154
+    </p>
155
+    
156
+    <p>
157
+    <a href="http://www.showmyip.com/">showmyip.com</a> e
158
+    <a href="http://ipid.shat.net">ipid.shat.net</a>
159
+    s�o sites que mostram o seu endere�o IP atual, de forma que voc� pode saber
160
+    qual o seu endere�o e pa�s de origem.
161
+    </p>
162
+    
163
+    <p>
164
+    Se voc� usa um firewall pessoal que limita a capacidade de seu computador de
165
+    abrir conex�es consigo mesmo, certifique-se de permitir conex�es das suas aplica�es locais
166
+    para as portas locais 8118 e 9050. Se o seu firewall barra conex�es de sa�da, abra
167
+    uma passagem nele de forma que se possa conectar pelo menos as portas TCP 80, 443 e 9001-9033.
168
+    <br />
169
+    Para mais sugest�es de resolu��o de problemas, visite o
170
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ">FAQ</a>.
171
+    </p>
172
+    
173
+    <p>
174
+    Para "Torificar" outra aplica��o que suporte HTTP, simplesmente ajuste ela para
175
+    usar o Privoxy como proxy HTTP (em localhost, porta 8118).
176
+    Para usar diretamente o proxy SOCKS (por exemplo, para programas de mensagens
177
+    instant�neas, Jabber, IRC, etc), ajuste sua aplica��o para usar diretamente
178
+    o Tor (localhost, porta 9050).
179
+    </p>
180
+    
181
+    <p>
182
+    Para aplica�es que n�o suportem nem SOCKS nem HTTP,
183
+    tente
184
+    <a href="http://www.socks.permeo.com/Download/SocksCapDownload/index.asp">SocksCap</a>,
185
+    <a href="http://www.freecap.ru/eng/">FreeCap</a>,
186
+    ou ent�o o cliente SOCKS
187
+    <a href="http://www.hummingbird.com/products/nc/socks/index.html?cks=y">Hummingbird</a>.
188
+    <br />
189
+    (FreeCap � software livre; os outros s�o propriet�rios)
190
+    </p>
191
+    
192
+    <p>
193
+    Para mais informa�es detalhadas sobre como "Torificar" outras aplica�es,visite o
194
+    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify HOWTO</a>.
195
+    Se voc� tem mais sugest�es sobre como melhorar este documento, por favor
196
+    <a href="<page about/contact>">envie-as para a gente</a>.
197
+    </p>
198
+    
199
+    <p>
200
+    Obrigado!
201
+    </p>
202
+  </div>
203
+  <!-- END MAINCOL -->
204
+  <div id = "sidecol">
205
+#include "side.wmi"
206
+#include "info.wmi"
207
+  </div>
208
+  <!-- END SIDECOL -->
209
+</div>
210
+<!-- END CONTENT -->
211
+#include <foot.wmi>   
... ...
@@ -0,0 +1,159 @@
1
+## translation metadata
2
+# Revision: $Revision: 21979 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: N900 Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/N900>">N900</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="Maemo"></a>
14
+    <h2><a class="anchor" href="#Maemo">Установка TOR на Maemo</a></h2>
15
+    <br />
16
+    <p>
17
+    Если у Вас телефон Maemo модели, отличной от <a href="#N900">N900</a>, мы
18
+    рекомендуем установить пакет TOR с <a
19
+    href="http://maemo.org/packages/view/tor/">офф.сайта Maemo</a>. Tor Project
20
+    не работает над этими пакетами, они разрабатываются сообществом Maemo.
21
+    </p>
22
+    
23
+    <a id="N900"></a>
24
+    <h2><a class="anchor" href="#N900">Установка Tor на N900</a></h2>
25
+    <br />
26
+    <p>
27
+    Данное руководство может облегчить Вам установку<a
28
+    href="https://garage.maemo.org/projects/tor-status">опытного образца
29
+    Tor-оператора</a> и собственно TOR в формате пакета для телефона N900 фирмы
30
+    Nokia. На данный момент эта сборка не испытывалась. Браузер при
31
+    использовании этой сборки не имеет средств наподобие Torbutton, настоятельно
32
+    рекомендуется в ближайшее время не использовать сборку в целях, требующих
33
+    высокую степень конфиденциальности пользователя.
34
+    </p>
35
+    
36
+    <p>
37
+    Откройте Менеджер приложений: <br /> <a href="../img/N900/1_app_menu.png">
38
+    <img border="0" alt="N900 application menu"
39
+    src="../img/N900/1_app_menu-small.png"/> </a>
40
+    </p>
41
+    
42
+    <p>
43
+    Вызовите меню Менеджера приложений в верху экрана: <br /> <a
44
+    href="../img/N900/2_app_manager.png"> <img border="0" alt="N900 application
45
+    manager" src="../img/N900/2_app_manager-small.png"/> </a>
46
+    </p>
47
+    
48
+    <p>
49
+    Выберите 'Разделы приложений': <br /> <a
50
+    href="../img/N900/3_app_managermenu.png"> <img border="0" alt="N900
51
+    application catalogs" src="../img/N900/3_app_managermenu-small.png"/> </a>
52
+    </p>
53
+    
54
+    <p>
55
+    Нажмите 'Создать', чтобы добавить источник разрабатываемых версий
56
+    дополнительного ПО.<br /> <small>Обратите внимание: данный источник содержит
57
+    непроверенные пакеты, которые могут нарушить работу Вашего устройства. <br
58
+    /> Ознакомьтесь с  <a href="http://wiki.maemo.org/Extras-devel">информацией
59
+    об источнике</a>. Вам стоит отключить источник разрабатываемого
60
+    дополнительного ПО после установки TOR, или оставить его, на свой
61
+    риск.</small> <br /> <a href="../img/N900/4_catalog_list.png"> <img
62
+    border="0" alt="N900 catalog list"
63
+    src="../img/N900/4_catalog_list-small.png"/> </a>
64
+    </p>
65
+    
66
+    <p>
67
+    Enter the following information into the catalog addition screen:Введите
68
+    следующую информацию в форму добавления дополнительного раздела:
69
+    <p>
70
+    <pre>
71
+    Название каталога:    Extras devel
72
+    Адрес каталога:    http://repository.maemo.org/extras-devel/
73
+    Дистрибутив:        fremantle
74
+    Компоненты:    free non-free
75
+    </pre>
76
+    </p>
77
+    <br />Снимите опцию 'Раздел отключён', нажмите 'Сохранить'. Обновление
78
+    разделов займёт некоторое время.<br /> <a
79
+    href="../img/N900/5_new_catalog.png"> <img border="0" alt="N900 new catalog"
80
+    src="../img/N900/5_new_catalog-small.png"/> </a>
81
+    </p>
82
+    
83
+    <p>
84
+    Нажмите 'Скачать' в Менеджере приложений: <br /> <a
85
+    href="../img/N900/6_app_manager.png"> <img border="0" alt="N900 app manager"
86
+    src="../img/N900/6_app_manager-small.png"/> </a>
87
+    </p>
88
+    
89
+    <p>
90
+    Выберите раздел Сеть (или воспользуйтесь поиском по ключевому слову TOR):
91
+    <br /> <a href="../img/N900/7_app_categories.png"> <img border="0" alt="N900
92
+    application categories" src="../img/N900/7_app_categories-small.png"/> </a>
93
+    </p>
94
+    
95
+    <p>
96
+    Просмотрите раздел полностью и выберите 'Tor Status Area Applet': <br /> <a
97
+    href="../img/N900/8_app_list.png"> <img border="0" alt="N900 application
98
+    list" src="../img/N900/8_app_list-small.png"/> </a>
99
+    </p>
100
+    
101
+    <p>
102
+    Ознакомьтесь с соглашением и нажмите 'Продолжить': <br /> <a
103
+    href="../img/N900/9_disclaimer.png"> <img border="0" alt="N900 disclaimer"
104
+    src="../img/N900/9_disclaimer-small.png"/> </a>
105
+    </p>
106
+    
107
+    <p>
108
+    По завершению установки отключите раздел разрабатываемого доп.ПО и
109
+    перезагрузите устройство: <br /> <a href="../img/N900/10_success.png"> <img
110
+    border="0" alt="N900 success" src="../img/N900/10_success-small.png"/> </a>
111
+    </p>
112
+    
113
+    <p>
114
+    После перезагрузки N900, откройте меню состояния: <br /> <a
115
+    href="../img/N900/11_after_rebooting.png"> <img border="0" alt="N900 status
116
+    menu post-reboot" src="../img/N900/11_after_rebooting-small.png"/> </a>
117
+    </p>
118
+    
119
+    <p>
120
+    Выберите 'The Onion Router' из списка: <br /> <a
121
+    href="../img/N900/12_status_menu.png"> <img border="0" alt="N900 status menu
122
+    selection" src="../img/N900/12_status_menu-small.png"/> </a>
123
+    </p>
124
+    
125
+    <p>
126
+    Включите шифруемую маршрутизацию и нажмите 'Save': <br /> <a
127
+    href="../img/N900/13_enable_tor.png"> <img border="0" alt="N900 enabling
128
+    Tor" src="../img/N900/13_enable_tor-small.png"/> </a>
129
+    </p>
130
+    
131
+    <p>
132
+    Откройте <a href="https://check.torproject.org/">страницу проверки</a>,
133
+    чтобы убедиться, что маршрутизация производится корректно: <br /> <a
134
+    href="../img/N900/14_check_tor.png"> <img border="0" alt="N900 check Tor"
135
+    src="../img/N900/14_check_tor-small.png"/> </a>
136
+    </p>
137
+    
138
+    <p>
139
+    Обращаем Ваше внимание, что в репозитории ОС не всегда находятся последние
140
+    версии TOR. Также браузер N900 не имеет дополнения Torbutton. Т.е. будучи
141
+    пригодным для обхода ограничений по IP-адресам, браузер N900 не
142
+    рекомендуется к использованию, если конфиденциальность просмотра является
143
+    критическим требованием.
144
+    </p>
145
+    
146
+    <hr />
147
+    
148
+    <p>Если у Вас есть предложения к правке этого документа, пожалуйста, <a
149
+    href="<page about/contact>">присылайте их нам</a>. Спасибо!</p>
150
+  </div>
151
+  <!-- END MAINCOL -->
152
+  <div id = "sidecol">
153
+#include "side.wmi"
154
+#include "info.wmi"
155
+  </div>
156
+  <!-- END SIDECOL -->
157
+</div>
158
+<!-- END CONTENT -->
159
+#include <foot.wmi>   
... ...
@@ -0,0 +1,117 @@
1
+## translation metadata
2
+# Revision: $Revision: 22269 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Vidalia: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian-vidalia>">Vidalia Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="debian"></a> <a id="packages"></a>
14
+    <h2><a class="anchor" href="#debian">Vidalia на Ubuntu или Debian</a></h2>
15
+    <br />
16
+    
17
+    <p>
18
+    <b>Не используйте пакеты из репозитория Ubuntu.</b> Они не поддерживаются и
19
+    являются устаревшими. Вы не сможете получать важные обновления компонентов и
20
+    критические обновления.
21
+    </p>
22
+    
23
+    <p>
24
+    You'll need to set up our package repository before you can fetch
25
+    Vidalia. First, you need to figure out the name of your distribution. If
26
+    you're using Ubuntu 9.10 or 10.04, it's "karmic", while 9.04 is "jaunty",
27
+    8.10 is "intrepid", and 8.04 is "hardy". If you're using Debian Etch, it's
28
+    "etch", and Debian Lenny is "lenny". Then add this line to your
29
+    <tt>/etc/apt/sources.list</tt> file:<br />
30
+    <pre>
31
+    deb     http://deb.torproject.org/torproject.org &lt;ИМЯ_ДИСТРИБУТИВА&gt; main
32
+    </pre>
33
+    где Вы подставляете имя дистрибутива (etch, lenny, sid, karmic, jaunty,
34
+    intrepid, hardy) вместо строки &lt;ИМЯ_ДИСТРИБУТИВА&gt;.
35
+    </p>
36
+    
37
+    <p>
38
+    Then add the gpg key used to sign the packages by running the following
39
+    commands at your command prompt:
40
+    <pre>
41
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
42
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
43
+    </pre>
44
+    Now refresh your sources and install Vidalia by running the following
45
+    commands at your command prompt:
46
+    <pre>
47
+    apt-get update
48
+    apt-get install vidalia 
49
+    </pre>
50
+    </p>
51
+    
52
+    <p>
53
+    Теперь Vidalia установлена и запущена. Ознакомьтесь со <a href="<page
54
+    docs/tor-doc-unix>#polipo">следующим шагом</a> руководства "Vidalia на
55
+    Linux/Unix".
56
+    </p>
57
+    
58
+    <p style="font-size: small">
59
+    DNS-запись <code>deb.torproject.org</code> ссылается на множество
60
+    независимых серверов. Если у Вас не получается получить доступ к серверам с
61
+    использованием этого имени, вы моете попробовать одно из следующих имён:
62
+    <code>deb-master.torproject.org</code>, <code>mirror.netcologne.de</code>
63
+    или <code>vidalia.mirror.youam.de</code>.
64
+    </p>
65
+    
66
+    <hr />
67
+    
68
+    <a id="source"></a>
69
+    <h2><a class="anchor" href="#source">Сборка из исходных кодов</a></h2>
70
+    <br />
71
+    
72
+    <p>
73
+    Если Вы хотите собрать свой пакет из исходных кодов, Вам потребуется
74
+    добавить запись <tt>deb-src</tt> в файл <tt>sources.list</tt>.
75
+    <pre>
76
+    deb-src http://deb.torproject.org/torproject.org &lt;ИМЯ_ДИСТРИБУТИВА&gt; main
77
+    </pre>
78
+    Вам также потребуется установить пакеты, необходимые для сборки собственных
79
+    пакетов, а также пакеты, необходимые для сборки Vidalia:
80
+    <pre>
81
+    apt-get install build-essential fakeroot devscripts qt4-dev-tools qt4-designer libqt4-dev g++ cmake
82
+    apt-get build-dep vidalia
83
+    </pre>
84
+    Теперь Вы можете собрать Vidalia в ~/debian-packages:
85
+    <pre>
86
+    mkdir ~/debian-packages; cd ~/debian-packages
87
+    apt-get source vidalia
88
+    cd vidalia-*
89
+    debuild -rfakeroot -uc -us
90
+    cd ..
91
+    </pre>
92
+    Теперь Вы можете установить созданный пакет: 
93
+    <pre>
94
+    sudo dpkg -i vidalia_*.deb
95
+    </pre>
96
+    </p>
97
+    
98
+    <p>
99
+    Теперь Vidalia установлена и запущена. Ознакомьтесь со <a href="<page
100
+    docs/tor-doc-unix>#polipo">следующим шагом</a> руководства "Vidalia на
101
+    Linux/Unix".
102
+    </p>
103
+    
104
+    <hr />
105
+    
106
+    <p>Если у Вас есть предложения по улучшению этого документа, пожалуйста, <a
107
+    href="<page about/contact>">ознакомьте нас с ними</a>. Спасибо!</p>
108
+  </div>
109
+  <!-- END MAINCOL -->
110
+  <div id = "sidecol">
111
+#include "side.wmi"
112
+#include "info.wmi"
113
+  </div>
114
+  <!-- END SIDECOL -->
115
+</div>
116
+<!-- END CONTENT -->
117
+#include <foot.wmi>   
... ...
@@ -0,0 +1,177 @@
1
+## translation metadata
2
+# Revision: $Revision: 22268 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Debian/Ubuntu Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/debian>">Debian/Ubuntu Instructions</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="debian"></a>
14
+    <h2><a class="anchor" href="#debian">Вариант 1: TOR на Debian lenny, Debian sid
15
+    или Debian testing</a></h2>
16
+    <br />
17
+    
18
+    <p>
19
+    Если у Вас Debian lenny, sid или squeeze, просто выполните команду<br />
20
+    <tt>apt-get install tor tor-geoipdb</tt>
21
+    </p>
22
+    
23
+    <p>
24
+    Обратите внимание, что этот способ не гарантирует установку последней версии
25
+    TOR, но у Вас будет возможность получать важные обновления
26
+    безопасности. Чтобы установить последнюю версию TOR, см.вариант 2 ниже. 
27
+    </p>
28
+    
29
+    <p>
30
+    Теперь TOR установлен и работает. Ознакомьтесь со <a href="<page
31
+    docs/tor-doc-unix>#polipo">следующим разделом</a> руководства "Tor на
32
+    Linux/Unix". 
33
+    </p>
34
+    
35
+    <hr /> <a id="ubuntu"></a> <a id="packages"></a>
36
+    <h2><a class="anchor" href="#ubuntu">Вариант 2: Tor на Ubuntu или Debian</a></h2>
37
+    <br />
38
+    
39
+    <p>
40
+    <b>Не используйте пакеты из репозиториев Ubuntu.</b> Они не поддерживаются и
41
+    являются устаревшими. Т.е. Вы не сможете получать обновления компонентов и
42
+    критические обновления. 
43
+    </p>
44
+    
45
+    <p>
46
+    You'll need to set up our package repository before you can fetch
47
+    Tor. First, you need to figure out the name of your distribution. If you're
48
+    using Ubuntu 9.10 or 10.04, it's "karmic", while 9.04 is "jaunty", 8.10 is
49
+    "intrepid", and 8.04 is "hardy". If you're using Debian Etch, it's "etch",
50
+    and Debian Lenny is "lenny". Then add this line to your
51
+    <tt>/etc/apt/sources.list</tt> file:<br />
52
+    <pre>
53
+    deb     http://deb.torproject.org/torproject.org &lt;ИМЯ_ДИСТРИБУТИВА&gt; main
54
+    </pre>
55
+    Где &lt;ИМЯ_ДИСТРИБУТИВА&gt; следует заменить на имя вашего дистрибутива
56
+    (например, etch, lenny, sid, karmic, jaunty, intrepid, hardy и т.д.). 
57
+    </p>
58
+    
59
+    <p>
60
+    Then add the gpg key used to sign the packages by running the following
61
+    commands at your command prompt:
62
+    <pre>
63
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
64
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
65
+    </pre>
66
+    Now refresh your sources and install Tor by running the following commands
67
+    at your command prompt:
68
+    <pre>
69
+    apt-get update
70
+    apt-get install tor tor-geoipdb
71
+    </pre>
72
+    </p>
73
+    
74
+    <p>
75
+    Теперь TOR установлен и работает. Ознакомьтесь со <a href="<page
76
+    docs/tor-doc-unix>#polipo">следующим разделом</a> руководства "Tor на
77
+    Linux/Unix". 
78
+    </p>
79
+    
80
+    <p style="font-size: small">
81
+    DNS-запись <code>deb.torproject.org</code> ссылается на множество
82
+    независимых серверов. Если у Вас не получается получить доступ к серверам с
83
+    использованием этого имени, вы моете попробовать одно из следующих имён:
84
+    <code>deb-master.torproject.org</code>, <code>mirror.netcologne.de</code>
85
+    или <code>tor.mirror.youam.de</code>.
86
+    </p>
87
+    
88
+    <hr /> <a id="development"></a>
89
+    <h2><a class="anchor" href="#development">Вариант 3: Использование текущей ветки
90
+    разработки TOR на Debian или Ubuntu</a></h2>
91
+    <br />
92
+    
93
+    <p>Если Вы хотите использовать <a href="<page
94
+    download/download>#packagediff">разрабатываемую версию</a> TOR (более функциональную,
95
+    но и более «сырую»), Вам понадобится установить другой набор источников в
96
+    файл <tt>/etc/apt/sources.list</tt>:<br />
97
+    <pre>
98
+    deb     http://deb.torproject.org/torproject.org &lt;ИМЯ_ДИСТРИБУТИВА&gt; main
99
+    deb     http://deb.torproject.org/torproject.org experimental-&lt;ИМЯ_ДИСТРИБУТИВА&gt; main
100
+    </pre>
101
+    Где Вы также подставляете имя своего дистрибутива (etch, lenny, sid, karmic,
102
+    jaunty, intrepid, hardy) вместо строки &lt;ИМЯ_ДИСТРИБУТИВА&gt;.
103
+    </p>
104
+    
105
+    <p>
106
+    Then run the following commands at your command prompt:
107
+    <pre>
108
+    gpg --keyserver keys.gnupg.net --recv 886DDD89
109
+    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
110
+    apt-get update
111
+    apt-get install tor tor-geoipdb
112
+    </pre>
113
+    </p>
114
+    
115
+    <p>
116
+    Теперь TOR установлен и работает. Ознакомьтесь со <a href="<page
117
+    docs/tor-doc-unix>#polipo">следующим разделом</a> руководства "Tor на
118
+    Linux/Unix". 
119
+    </p>
120
+    
121
+    <hr /> <a id="source"></a>
122
+    <h2><a class="anchor" href="#source">Сборка из исходных кодов</a></h2>
123
+    <br />
124
+    
125
+    <p>
126
+    Если Вы хотите собрать свой пакет из исходных кодов, Вам потребуется
127
+    добавить запись <tt>deb-src</tt> в файл <tt>sources.list</tt>.
128
+    <pre>
129
+    # For the stable version.
130
+    # For the unstable version.
131
+    
132
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
133
+    
134
+    
135
+    deb-src http://deb.torproject.org/torproject.org &lt;DISTRIBUTION&gt; main
136
+    deb-src http://deb.torproject.org/torproject.org experimental-&lt;DISTRIBUTION&gt; main
137
+    </pre>
138
+    Вам также потребуется установить пакеты, необходимые для сборки собственных
139
+    пакетов, а также пакеты, необходимые для сборки TOR: 
140
+    <pre>
141
+    apt-get install build-essential fakeroot devscripts
142
+    apt-get build-dep tor
143
+    </pre>
144
+    Теперь Вы можете собрать TOR в ~/debian-packages: 
145
+    <pre>
146
+    mkdir ~/debian-packages; cd ~/debian-packages
147
+    apt-get source tor
148
+    cd tor-*
149
+    debuild -rfakeroot -uc -us
150
+    cd ..
151
+    </pre>
152
+    Теперь Вы можете установить собранный пакет: 
153
+    <pre>
154
+    sudo dpkg -i tor_*.deb
155
+    </pre>
156
+    </p>
157
+    
158
+    <p>
159
+    Теперь TOR установлен и работает. Ознакомьтесь со <a href="<page
160
+    docs/tor-doc-unix>#polipo">следующим разделом</a> руководства "Tor на
161
+    Linux/Unix". 
162
+    </p>
163
+    
164
+    <hr />
165
+    
166
+    <p>Если у Вас есть предложения по улучшению этого документа, пожалуйста, <a
167
+    href="<page about/contact>">присылайте их нам</a>. Спасибо!</p>
168
+  </div>
169
+  <!-- END MAINCOL -->
170
+  <div id = "sidecol">
171
+#include "side.wmi"
172
+#include "info.wmi"
173
+  </div>
174
+  <!-- END SIDECOL -->
175
+</div>
176
+<!-- END CONTENT -->
177
+#include <foot.wmi>   
... ...
@@ -0,0 +1,88 @@
1
+## translation metadata
2
+# Revision: $Revision: 21907 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: CentOS/Fedora/OpenSUSE Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/rpms>">RPMs</a>
11
+  </div>
12
+  <div id="maincol">  
13
+    <a id="rpms"></a>
14
+    <h2><a class="anchor" href="#rpms">Пакеты Tor для дистрибутивов, основанных на
15
+    Red Hat Packages' Manager (RPM).</a></h2>
16
+    <br />
17
+    
18
+    <p>Не используйте пакеты в основных репозиториях. Зачастую они являются
19
+    устаревшими. То есть Вы не сможете получать обновления компонентов и
20
+    критические обновления безопасности.
21
+    </p>
22
+    
23
+    <p>
24
+    Вам потребуется настроить репозиторий Tor, прежде чем Вы сможете загрузить
25
+    программу. В случае с использованием менеджера пакетов Yum, в каталоге
26
+    /etc/yum.repos.d/, создайте файл с названием torproject.repo.  Заполните
27
+    файл, как показано ниже:
28
+    <pre>[torproject]
29
+    name=Tor and Vidalia
30
+    enabled=1
31
+    autorefresh=0
32
+    baseurl=http://deb.torproject.org/torproject.org/rpm/DISTRIBUTION/
33
+    type=rpm-md
34
+    gpgcheck=1
35
+    gpgkey=http://deb.torproject.org/torproject.org/rpm/RPM-GPG-KEY-torproject.org
36
+    </pre>
37
+    
38
+    Если Вы хотите поддерживать Tor в актуальном состоянии, Вам потребуется
39
+    изменить строку DISTRIBUTION на одну из следующих: centos4, centos5, fc10,
40
+    fc11, fc12, suse</p>
41
+    
42
+    <p>Если же Вы хотите, чтобы у Вас была установлена самая последняя (опытная)
43
+    версия Tor, замените строку DISTRIBUTION одной из этих:
44
+    centos4-experimental, centos5-experimental, fc10-experimental,
45
+    fc11-experimental, fc12-experimental, suse-experimental</p>
46
+    
47
+    <p>
48
+    Теперь Tor установлен и запущен. Ознакомьтесь со <a href="<page
49
+    docs/tor-doc-unix>#polipo">следующим разделом</a> руководства "Tor on
50
+    Linux/Unix".
51
+    </p>
52
+    
53
+    <p style="font-size: small">
54
+    DNS-запись <code>deb.torproject.org</code> ссылается на множество
55
+    независимых серверов. Если у Вас не получается получить доступ к серверам
56
+    обновления с использованием этого имени, вы моете попробовать одно из
57
+    следующих имён: <code>deb-master.torproject.org</code>,
58
+    <code>mirror.netcologne.de</code> или <code>tor.mirror.youam.de</code>.
59
+    </p>
60
+    
61
+    <hr />
62
+    
63
+    <hr />
64
+    
65
+    <a id="source"></a>
66
+    <h2><a class="anchor" href="#source">Сборка из исходных кодов</a></h2>
67
+    <br />
68
+    
69
+    <p>
70
+    Если вы хотите собрать пакет с Tor из исходных кодов, пожалуйста
71
+    ознакомьтесь с <a href="<gitblob>doc/tor-rpm-creation.txt">инструкциями по
72
+    созданию пакета</a>.
73
+    </p>
74
+    
75
+    <hr />
76
+    
77
+    <p>Если у Вас есть предложения по улучшению этого документа <a href="<page
78
+    about/contact>">сообщите нам</a>. Спасибо!</p>
79
+  </div>
80
+  <!-- END MAINCOL -->
81
+  <div id = "sidecol">
82
+#include "side.wmi"
83
+#include "info.wmi"
84
+  </div>
85
+  <!-- END SIDECOL -->
86
+</div>
87
+<!-- END CONTENT -->
88
+#include <foot.wmi>   
... ...
@@ -0,0 +1,77 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 2-medium
4
+
5
+# this structure defines the side nav bar for the /about pages
6
+# and is the input for include/side.wmi
7
+
8
+# fields:
9
+#
10
+# url - the path to the wml page, as used the the <page> tag. This tag ensures
11
+# that links will point to the current language if supported, and alternately
12
+# the english version 
13
+#
14
+# txt - the link text to be displayed. Different translations will
15
+# need to supply alternate txt 
16
+
17
+<:
18
+  my $sidenav;
19
+  $sidenav = [
20
+      {'url'  => 'docs/documentation',
21
+       'txt'  => 'Documentation Overview',
22
+      }, 
23
+      {
24
+       'url'  => 'docs/installguide',
25
+       'txt'  => 'Installation Guides',
26
+       'subelements' => [
27
+          {'url'  => 'docs/tor-doc-windows',
28
+           'txt'  => 'Installing on Windows',
29
+          },
30
+          {'url'  => 'docs/tor-doc-unix',
31
+           'txt'  => 'Installing on Linux/BSD/Unix',
32
+          },
33
+          {'url'  => 'docs/tor-doc-osx',
34
+           'txt'  => 'Installing on Mac OS X',
35
+          },
36
+          {'url'  => 'docs/tor-doc-web',
37
+           'txt'  => 'Configuring your browser to use Tor',
38
+          }],
39
+      },
40
+      {'url'  => 'docs/manual',
41
+       'txt'  => 'Manuals',
42
+       'subelements' => [
43
+          {'url'  => 'docs/tor-doc-relay',
44
+           'txt'  => 'Configuring a Relay',
45
+          },
46
+          {'url'  => 'docs/tor-hidden-service',
47
+           'txt'  => 'Configuring a Hidden Service',
48
+          }, 
49
+          {'url'  => 'docs/running-a-mirror',
50
+           'txt'  => 'Configuring a Mirror',
51
+          },
52
+          {'url'  => 'docs/tor-manual',
53
+           'txt'  => 'Tor Manual',
54
+          },
55
+          {'url'  => 'docs/tor-manual-dev',
56
+           'txt'  => 'Tor Developer Manual',
57
+          }],
58
+      },
59
+      {'url' => 'docs/glossary',
60
+       'txt' => 'Glossary',
61
+      },
62
+      {
63
+       'url'  => 'http://wiki.torproject.org',
64
+       'txt'  => 'Tor Wiki',
65
+      }, 
66
+      {'url'  => 'docs/faq',
67
+       'txt'  => 'FAQ',  #maybe stick this in about instead...
68
+       'subelements' => [
69
+          {'url'  => 'docs/faq-abuse',
70
+           'txt'  => 'Abuse FAQ',
71
+          },
72
+          {'url'  => 'docs/trademark-faq',
73
+           'txt'  => 'Trademark FAQ',
74
+          }]
75
+      },  
76
+  ];
77
+:>
... ...
@@ -0,0 +1,229 @@
1
+## translation metadata
2
+# Revision: $Revision: 22305 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Mac OS X Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-osx>">Mac OS X Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Работа с клиентом <a href="<page index>">Tor</a> в операционной системе Mac
14
+    OS X</h1>
15
+    <br />
16
+    
17
+    <p>
18
+    <b>Обратите внимание на то, что в этом тексте представлены инструкции по
19
+    установке клиента Tor в операционной системе Mac OS X. Если вы хотите
20
+    ретранслировать трафик для других и, таким образом, поддержать рост сети
21
+    (пожалуйста, сделайте это), прочитайте руководство <a href="<page
22
+    docs/tor-doc-relay>">Настройка ретранслятора</a>.</b>
23
+    </p>
24
+    
25
+    <hr />
26
+    <a id="installing"></a>
27
+    <h2><a class="anchor" href="#installing">Шаг первый: Скачивание и Установка
28
+    Tor</a></h2>
29
+    <br />
30
+    
31
+    <p>
32
+    The install for Macintosh OS X bundles <a href="<page index>">Tor</a>, <a
33
+    href="<page projects/vidalia>">Vidalia</a> (a graphical interface for Tor), <a
34
+    href="<page projects/torbutton>">Torbutton</a>, and <a
35
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> (a web
36
+    proxy)  into one package, with the four applications pre-configured to work
37
+    together.  Download either the <a
38
+    href="../<package-osx-bundle-stable>">stable</a> or the <a
39
+    href="../<package-osx-bundle-alpha>">experimental</a> version of the OS X
40
+    bundle for Intel, or look for more options on the <a href="<page
41
+    download/download>">download page</a>.
42
+    </p>
43
+    
44
+    <p>Когда вы скачали dmg-файл, кликните по нему два раза и
45
+    установите. Просмотрите открывшийся пакет Vidalia Bundle в файловом
46
+    менеджере Finder.  Установить пакет очень легко. Просто перенесите иконку
47
+    Vidalia (луковица) в папку Приложения (Applications). При желании кликните
48
+    два раза по скрипту "установить torbutton" (install torbutton) и он
49
+    установит плагин torbutton в браузер Firefox. Вы можете получить плагин
50
+    torbutton также на сайте Mozilla Add-ons путем поиска "torbutton".</p>
51
+    
52
+    <p>После завершения установки вы можете запустить Vidalia, выбрав его иконку в
53
+    папке "Приложения". Черная перечеркнутая луковица означает, что Tor не
54
+    работает. Вы можете запустить работу Tor, выбрав Старт в меню "Tor",
55
+    расположенном вверху экрана.
56
+    </p>
57
+    
58
+    <p>Когда Tor запущен, иконка программы Vidalia будет выглядеть следующим
59
+    образом:
60
+    </p>
61
+    
62
+    <p><img alt="vidalia running tor"
63
+    src="../img/screenshot-osx-vidalia.png"
64
+    border="1"/></p>
65
+    
66
+    <p>Программа Polipo устанавливается как часть установочного пакета Tor. После
67
+    установки, она запустится автоматически сразу после перезагрузки вашего
68
+    компьютера. Нет необходимости настраивать приложение Polipo на использование
69
+    Tor; необходимая конфигурация Polipo для Tor была прописана во время
70
+    установки.
71
+    </p>
72
+    
73
+    <hr />
74
+    <a id="using"></a>
75
+    <h2><a class="anchor" href="#using">Шаг второй: Настройка ваших приложений на
76
+    использование сервиса Tor</a></h2>
77
+    <br />
78
+    
79
+    <p>После установки вам необходимо настроить ваши приложения на работу через
80
+    Tor. Первым делом нужно настроить ваш браузер (программа для просмотра веб
81
+    страниц).</p>
82
+    
83
+    <p>Вам следует использовать Tor с браузером Firefox и дополнением Torbutton для
84
+    обеспечения наилучшей безопасности. Чтобы включить Tor, кликните по красной
85
+    кнопке "Tor отключен" и все настроено: </p>
86
+    
87
+    <p><img alt="Torbutton plugin for Firefox"
88
+    src="../img/screenshot-torbutton.png"
89
+    border="1"/></p>
90
+    
91
+    <p>
92
+    Если вы планируете использовать Firefox не на том компьютере, куда
93
+    установлен Tor, ознакомьтесь со <a
94
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">Списком
95
+    часто задаваемых вопросов по использованию Tor на другом компьютере (FAQ for
96
+    running Tor on a different computer)</a>.
97
+    </p>
98
+    
99
+    <p>Для "Торификации" других приложений, которые поддерживают HTTP прокси,
100
+    просто укажите им на Polipo (который расположен здесь: localhost порт
101
+    8118). Чтобы использовать SOCKS напрямую (для обмена мгновенными
102
+    сообщениями, Jabber, IRC, и т.д.), вы можете направить свое приложение на
103
+    Tor (localhost порт 9050), но прежде ознакомьтесь с содержимым<a
104
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">этого
105
+    Списка часто задаваемых вопросов</a>, чтобы узнать почему это может быть
106
+    опасно. Для настройки приложений, не поддерживающих ни SOCKS не HTTP,
107
+    обратите внимание на <a
108
+    href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a> или <a
109
+    href="http://www.dest-unreach.org/socat/">socat</a>.</p>
110
+    
111
+    <p>Чтобы получить информацию о том, как "Торифицировать" другие приложения,
112
+    ознакомьтесь с <a
113
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Инструкцией
114
+    по "Торификации"</a>.
115
+    </p>
116
+    
117
+    <hr />
118
+    <a id="verify"></a>
119
+    <h2><a class="anchor" href="#verify">Шаг третий: Убедитесь в том, что все
120
+    работает корректно</a></h2>
121
+    <br />
122
+    
123
+    <p>
124
+    Далее вам необходимо протестировать работу вашего браузера с Tor и
125
+    убедиться, что ваш IP-адрес анонимизирован (т.е. скрыт). Откройте страницу
126
+    <a href="https://check.torproject.org/">детектор Tor</a> и посмотрите,
127
+    подтверждается ли сайтом использование сервиса Tor. (Если сайт не работает,
128
+    обратитесь к <a
129
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">содержимому
130
+    этого Списка часто задаваемых вопросов</a>, чтобы получить информацию о
131
+    других методах тестирования работы Tor.)
132
+    </p>
133
+    
134
+    <p>Если у вас установлен персональный брандмауэр, который ограничивает
135
+    возможность подключения вашего компьютера  к самому себе, убедитесь что вы
136
+    разрешили подключения локальных приложений к локальным портам 8118 и
137
+    9050. Если ваш брандмауэр блокирует исходящие подключения, измените
138
+    настройки так, чтобы он мог подключаться хотя бы к TCP портам 80 и 443, а
139
+    затем ознакомьтесь с <a
140
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">содержанием
141
+    этого списка часто задаваемых вопросов</a>.
142
+    </p>
143
+    
144
+    <p>Если ничего из вышеперечисленного не помогло, обратитесь к <a
145
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">содержанию
146
+    этого Списка часто задаваемых вопросов</a> для получения дополнительной
147
+    информации.</p>
148
+    
149
+    <p>
150
+    Когда все заработало, узнайте больше о том <a href="<page
151
+    download/download>#Warning">что предлагает, и что не предлагает сервис Tor </a>.
152
+    </p>
153
+    
154
+    <hr />
155
+    <a id="server"></a> <a id="relay"></a>
156
+    <h2><a class="anchor" href="#relay">Шаг четвертый: Настройте ретранслятор
157
+    Tor</a></h2>
158
+    <br />
159
+    
160
+    <p>Сеть Tor полагается на волонтеров, предоставляющих пропускную способность
161
+    своих компьютеров. Чем больше людей предоставляют ретрансляторы, тем быстрей
162
+    будет работать сеть Tor. Если у вас есть как минимум 20Кб/сек. в обоих
163
+    направлениях, пожалуйста поддержите Tor, настроив ретранслятор Tor. Мы
164
+    создали множество возможностей, делающих ретрансляторы Tor простыми и
165
+    удобными, включая ограничение предоставляемой пропускной способности,
166
+    правила вывода (с тем чтобы вы могли ограничить вашу незащищенность к
167
+    возможным жалобам), и поддержку динамических IP-адресов.</p>
168
+    
169
+    <p>Наличие ретрансляторов в разных уголках сети Интернет - это то, что
170
+    обеспечивает безопасность пользователей Tor. <a
171
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">Создавая
172
+    ретранслятор вы можете улучшить свою собственную анонимность</a>, так как
173
+    удаленные сайты не могут установить происхождение запроса, ведь он может
174
+    исходить как от вас, так и от других пользователей сети Tor, использующих
175
+    ваш ретранслятор.</p>
176
+    
177
+    <p>Больше информации на эту тему можно получить из руководства <a href="<page
178
+    docs/tor-doc-relay>">Настройка ретранслятора</a>.</p>
179
+    
180
+    <hr />
181
+    <a id="uninstall"></a>
182
+    <h2><a class="anchor" href="#uninstall">Как удалить Tor и Privoxy</a></h2>
183
+    <br />
184
+    
185
+    <p>Есть два пути удаления пакета с компьютера, с использованием системного
186
+    файлового менеджера Finder; или с помощью командной строки или основанного
187
+    на терминале (Terminal-based) деинсталлятора. Если вы хотите удалить Tor в
188
+    операционной системе OS X, вот как это можно сделать:</p>
189
+    
190
+    <p>Поменяйте настройки прокси в ваших приложениях на их изначальные значения.
191
+    Если вы хотите просто перестать пользоваться сервисом Tor, вы можете
192
+    остановиться на этом этапе.</p>
193
+    
194
+    <p>Если вы хотите полностью удалить Tor и ваша учетная запись на компьютере
195
+    обладает правами администратора, сделайте следующее:</p>
196
+    
197
+    <ol>
198
+    <li>Откройте системный файловый менеджер Finder и нажмите Приложения.</li>
199
+    <li>Перенесите папку /Applications/Vidalia в корзину.</li>
200
+    <li>Удалите из вашей системы папку /Library/Torbutton.</li>
201
+    <li>В домашней директории перейдите в папку Library и удалите из неё директорию
202
+    Vidalia.</li>
203
+    </ol>
204
+    
205
+    <p>Приложения Tor, Vidalia, и Polipo окончательно удалены из вашей системы.</p>
206
+    
207
+    <p>Если вы умеете работать с командной строкой или Терминалом, вы можете
208
+    удалить приложения вручную, как показано ниже:</p>
209
+    <ul>
210
+    <li>/Applications/Vidalia.app/</li>
211
+    <li>/Library/Torbutton/</li>
212
+    <li>~/Library/Vidalia</li>
213
+    <li>~/.tor</li>
214
+    </ul>
215
+    
216
+    <hr />
217
+    
218
+    <p>Если у вас есть предложения по улучшению этого документа, пожалуйста <a
219
+    href="<page about/contact>">отправьте их нам</径。客户端与环路上的每一跳都协商一组独立的密钥,这样可以保证数据通过任何一跳时都无法跟踪。
220
+</p>
221
+
222
+<p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p>
223
+
224
+<p>
225
+一旦环路建立完成,多种类型的数据可以在上面进行交换,不同种类的应用程序也可以在 Tor
226
+网络上部署。因为每一台中继最多只能知道环路中的一跳,窃听者或者被入侵的中继都无法通过流量分析把连接的来源和目的地联系起来。Tor 仅作用于 TCP
227
+数据流,任何支持 SOCKS 的应用程序都可以使用它。
228
+</p>
229
+
230
+<p>
231
+为了提高效率,Tor 为大约在相同的十分钟内发起的连接请求分配同一环路。以后的请求被分配不同的环路,这样他人就不能把你早先的行为和新的行为联系起来。
232
+</p>
233
+
234
+<p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" /></p>
235
+
236
+
237
+<a name="hiddenservices"></a>
238
+<h3><a class="anchor" href="#hiddenservices">隐匿服务</a></h3>
239
+
240
+<p>
241
+Tor 同样使得用户能够在隐藏自身位置的前提下提供各类服务,例如 Web 发布和及时通讯服务器。其他 Tor 用户使用 Tor
242
+的“聚合点”(rendezvous points)连接到这些隐匿服务,互相都不知道对方的网络标识。Tor
243
+用户能够使用这项隐匿服务功能建立网站,人们在网站上发布资料而不用担心遭到审查。没人能够确认到底是谁在运行网站,网站的运行者也不知道到底是谁发布了资料。了解更多有关
244
+<a href="<page docs/tor-hidden-service>">配置隐匿服务</a> 的信息以及 <a href="<page
245
+hidden-services>">隐匿服务协议</a> 的原理。
246
+</p>
247
+
248
+<a name="stayinganonymous"></a>
249
+<h3><a class="anchor" href="#stayinganonymous">保持匿名</a></h3>
250
+
251
+<p>
252
+Tor 并不能解决所有匿名问题。它所关注的仅仅是保护数据的传输。如果你不想让你所访问的网站知道你的身份信息,你需要使用支持特定协议的软件。比如,浏览
253
+Web 时你可以使用 Privoxy 之类的 Web 代理软件阻挡 cookies,隐藏浏览器的类型。
254
+</p>
255
+
256
+<p>
257
+同样,在保护匿名时要学得聪明些。不要在 Web 表单里输入你的名字和其他会泄露身份的信息。要知道,和其他速度快到可以进行 Web
258
+浏览的匿名网络一样,Tor对于端到端的计时攻击(end-to-end timing
259
+attacks)不提供保护:如果攻击者知道出自你电脑的流量,也知道到达你所选目的地的流量,他就可以使用统计分析发现它们是同一环路的一部分。
260
+</p>
261
+
262
+<a name="thefutureoftor"></a>
263
+<h3><a class="anchor" href="#thefutureoftor">Tor 的未来</a></h3>
264
+
265
+<p>
266
+今天,在互联网上提供一个可用的匿名网络是一项持续的挑战。我们希望软件能满足用户的需求。我们也需要网络以一种支持尽可能多的用户的方式运行。安全性和可用性并非互相矛盾:随着
267
+Tor
268
+的可用性的增加,它会吸引更多的用户,用户的增加提高了每次通信的来源与目的地的可能性,从而增强了每个人的安全性。我们在进步,但我们需要你的帮助。请考虑
269
+<a href="<page docs/tor-doc-relay>">运行中继</a> 或者 <a href="<page
270
+volunteer>">志愿</a> 作一名 <a href="<page documentation>#Developers">开发者</a>。
271
+</p>
272
+
273
+<p>
274
+法律、政策和技术的当前趋势以前所未有的程度威胁着匿名,破坏着我们在线言论与阅读的自由。这些趋势也使得个人、组织、公司、政府间的通信更易分析,削弱了国家和关键基础设施的安全。每一个新的用户、每一台新的中继都会增加网络的多样性,Tor
275
+由此更能帮助你把安全和隐私的控制权重新掌握在自己手中。
276
+</p>
277
+
278
+  </div>
279
+
280
+
281
+#include <foot.wmi>
0 282