finish purging polipo from the docs.
Andrew Lewman

Andrew Lewman commited on 2011-07-07 13:32:10
Zeige 1 geänderte Dateien mit 34 Einfügungen und 43 Löschungen.

... ...
@@ -14,10 +14,10 @@
14 14
     <br>
15 15
     
16 16
     <p>
17
-    <b>Note that these are the installation instructions for running a Tor
18
-    client. If you want to relay traffic for others to help the network grow
19
-    (please do), read the <a
20
-    href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b>
17
+    <b>Note that these are the installation instructions for running a
18
+    Tor client. The easiest way to do this is to simply download the <a
19
+    href="<page projects/torbrowser>"Tor Browser Bundle</a> and you are
20
+    done. </b>
21 21
     </p>
22 22
     
23 23
     <hr>
... ...
@@ -78,20 +78,16 @@
78 78
     entry for running Tor on a different computer</a>.
79 79
     </p>
80 80
     
81
-    <p>To Torify other applications that support HTTP proxies, just
82
-    point them at Polipo (that is, localhost port 8118). To use SOCKS
83
-    directly (for instant messaging, Jabber, IRC, etc), you can point
84
-    your application directly at Tor (localhost port 9050), but see <a
85
-    href="<wikifaq>#SOCKSAndDNS">this
86
-    FAQ entry</a> for why this may be dangerous. For applications
87
-    that support neither SOCKS nor HTTP, take a look at <a
88
-    href="https://code.google.com/p/torsocks/">torsocks</a> or <a
89
-    href="<wiki>doc/TorifyHOWTO#socat">socat</a>.
81
+    <p>To Torify other applications that support SOCKS proxies, just
82
+    point them at Tor's SOCKS port (127.0.0.1 port 9050). See <a
83
+    href="<wikifaq>#SOCKSAndDNS">this FAQ entry</a> for why this may be
84
+    dangerous. For applications that support neither SOCKS nor HTTP, take
85
+    a look at <a href="https://code.google.com/p/torsocks/">torsocks</a>
86
+    or <a href="<wiki>doc/TorifyHOWTO#socat">socat</a>.
90 87
     </p>
91 88
     
92 89
     <p>For information on how to Torify other applications, check out the
93
-    <a href="<wiki>doc/TorifyHOWTO">Torify
94
-    HOWTO</a>.
90
+    <a href="<wiki>doc/TorifyHOWTO">Torify HOWTO</a>.
95 91
     </p>
96 92
     
97 93
     <hr>
... ...
@@ -101,30 +97,26 @@
101 97
     
102 98
     <p>
103 99
     Next, you should try using your browser with Tor and make
104
-    sure that your IP address is being anonymized. Click on
105
-    <a href="https://check.torproject.org/">the
106
-    Tor detector</a>
107
-    and see whether it thinks you're using Tor or not.
108
-    #<a href="http://ipchicken.com/">this site</a>
109
-    #to see what IP address it thinks you're using.
110
-    (If that site is down, see <a
111
-    href="<wikifaq>#IsMyConnectionPrivate">this
112
-    FAQ entry</a> for more suggestions on how to test your Tor.)
100
+    sure that your IP address is being anonymized. Click on <a
101
+    href="https://check.torproject.org/">the Tor detector</a>
102
+    and see whether it thinks you're using Tor or not.  #<a
103
+    href="http://ipchicken.com/">this site</a> #to see what IP
104
+    address it thinks you're using.  (If that site is down, see <a
105
+    href="<wikifaq>#IsMyConnectionPrivate">this FAQ entry</a> for more
106
+    suggestions on how to test your Tor.)
113 107
     </p>
114 108
     
115
-    <p>If you have a personal firewall that limits your computer's
116
-    ability to connect to itself (this includes something like SELinux on
117
-    Fedora Core 4), be sure to allow connections from
118
-    your local applications to Polipo (local port 8118) and Tor (local port
119
-    9050). If
120
-    your firewall blocks outgoing connections, punch a hole so
121
-    it can connect to at least TCP ports 80 and 443, and then see <a
122
-    href="<wikifaq>#FirewalledClient">this
123
-    FAQ entry</a>.  If your SELinux config is not allowing tor or privoxy to
124
-    run correctly, create a file named booleans.local in the directory
125
-    /etc/selinux/targeted.  Edit this file in your favorite text editor and
126
-    insert "allow_ypbind=1".  Restart your machine for this change to take
127
-    effect.
109
+    <p>If you have a personal firewall that limits your computer's ability
110
+    to connect to itself (this includes something like SELinux on Fedora
111
+    Core 4), be sure to allow connections from your local applications to
112
+    Tor (local port 9050). If your firewall blocks outgoing connections,
113
+    punch a hole so it can connect to at least TCP ports 80 and 443, and
114
+    then see <a href="<wikifaq>#FirewalledClient">this FAQ entry</a>.
115
+    If your SELinux config is not allowing tor or privoxy to run
116
+    correctly, create a file named booleans.local in the directory
117
+    /etc/selinux/targeted.  Edit this file in your favorite text editor
118
+    and insert "allow_ypbind=1".  Restart your machine for this change
119
+    to take effect.
128 120
     </p>
129 121
     
130 122
     <p>If it's still not working, look at <a
... ...
@@ -139,18 +131,17 @@
139 131
     
140 132
     <p>The Tor network relies on volunteers to donate bandwidth. The more
141 133
     people who run relays, the faster the Tor network will be. If you have
142
-    at least 20 kilobytes/s each way, please help out Tor by configuring your
134
+    at least 20 KiloBytes/s each way, please help out Tor by configuring your
143 135
     Tor to be a relay too. We have many features that make Tor relays easy
144 136
     and convenient, including rate limiting for bandwidth, exit policies so
145 137
     you can limit your exposure to abuse complaints, and support for dynamic
146 138
     IP addresses.</p>
147 139
     
148 140
     <p>Having relays in many different places on the Internet is what
149
-    makes Tor users secure. <a
150
-    href="<wikifaq>#RelayAnonymity">You
151
-    may also get stronger anonymity yourself</a>,
152
-    since remote sites can't know whether connections originated at your
153
-    computer or were relayed from others.</p>
141
+    makes Tor users secure. <a href="<wikifaq>#RelayAnonymity">You may
142
+    also get stronger anonymity yourself</a>, since remote sites can't
143
+    know whether connections originated at your computer or were relayed
144
+    from others.</p>
154 145
 
155 146
     <p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
156 147
     guide.</p>
157 148