Browse code

Remove Unix/BSD from install on Linux doc

hiromipaw authored on 12/01/2018 16:31:27
Showing 1 changed files
... ...
@@ -2,15 +2,15 @@
2 2
 # Revision: $Revision$
3 3
 # Translation-Priority: 3-low
4 4
 
5
-#include "head.wmi" TITLE="Tor: Linux/BSD/Unix Install Instructions" CHARSET="UTF-8"
5
+#include "head.wmi" TITLE="Tor: Linux Install Instructions" CHARSET="UTF-8"
6 6
 <div id="content" class="clearfix">
7 7
   <div id="breadcrumbs">
8 8
     <a href="<page index>">Home &raquo; </a>
9 9
     <a href="<page docs/documentation>">Documentation &raquo; </a>
10
-    <a href="<page docs/tor-doc-unix>">Linux/BSD/Unix Client</a>
10
+    <a href="<page docs/tor-doc-unix>">Linux Client</a>
11 11
   </div> 
12 12
   <div id="maincol"> 
13
-    <h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1>
13
+    <h1>Running the <a href="<page index>">Tor</a> client on Linux</h1>
14 14
     <br>
15 15
     
16 16
     <h2>Note that these are the installation instructions for running a
Browse code

Update rpm instructions

Thanks cypherpunks for the patch!

Sebastian Hahn authored on 24/09/2016 10:28:33
Showing 1 changed files
... ...
@@ -30,8 +30,6 @@
30 30
     Red Hat, Gentoo, etc there too. If you're
31 31
     using Ubuntu, don't use the default packages: use <a
32 32
     href="<page docs/debian>#ubuntu">our deb repository</a> instead.
33
-    Similarly, CentOS / Fedora users should use <a href="<page
34
-    docs/rpms>">our rpm repository</a> instead.
35 33
     </p>
36 34
     
37 35
     <p>If you're building from source, first install <a
Browse code

fix wml

Peter Palfrader authored on 11/05/2015 09:26:54
Showing 1 changed files
... ...
@@ -61,7 +61,7 @@
61 61
     readily configured Tor and a browser patched for better anonymity.
62 62
     To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you
63 63
     can point your application directly at Tor (localhost
64
-    port 9050, or port 9150 for Tor Browser), but see <a href="<page docs/faq#TBBSocksPort">this FAQ
64
+    port 9050, or port 9150 for Tor Browser), but see <a href="<page docs/faq>#TBBSocksPort">this FAQ
65 65
     entry</a> for why this may be dangerous. For applications
66 66
     that support neither SOCKS nor HTTP, take a look at <a href="https://code.google.com/p/torsocks/">torsocks</a>
67 67
     or <a href="http://www.dest-unreach.org/socat/">socat</a>.
Browse code

TB socks port is 9150

Sebastian Hahn authored on 10/05/2015 00:37:20
Showing 1 changed files
... ...
@@ -56,9 +56,12 @@
56 56
     <br>
57 57
     
58 58
     <p>
59
-    If you want to use Tor for anonymous web browsing, please use <a href="<page projects/torbrowser>">Tor Browser</a>. It comes with readily configured Tor and a browser patched for better anonymity. To use SOCKS directly (for instant messaging, Jabber, IRC, etc),
60
-    you can point your application directly at Tor (localhost
61
-    port 9050), but see <a href="<page docs/faq#TBBSocksPort">this FAQ
59
+    If you want to use Tor for anonymous web browsing, please use <a
60
+    href="<page projects/torbrowser>">Tor Browser</a>. It comes with
61
+    readily configured Tor and a browser patched for better anonymity.
62
+    To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you
63
+    can point your application directly at Tor (localhost
64
+    port 9050, or port 9150 for Tor Browser), but see <a href="<page docs/faq#TBBSocksPort">this FAQ
62 65
     entry</a> for why this may be dangerous. For applications
63 66
     that support neither SOCKS nor HTTP, take a look at <a href="https://code.google.com/p/torsocks/">torsocks</a>
64 67
     or <a href="http://www.dest-unreach.org/socat/">socat</a>.
Browse code

Fix SOCKS instructions link in tor-doc-unix.wml.

Colin Childs authored on 08/05/2015 22:46:55 • Sebastian Hahn committed on 10/05/2015 00:35:05
Showing 1 changed files
... ...
@@ -58,7 +58,7 @@
58 58
     <p>
59 59
     If you want to use Tor for anonymous web browsing, please use <a href="<page projects/torbrowser>">Tor Browser</a>. It comes with readily configured Tor and a browser patched for better anonymity. To use SOCKS directly (for instant messaging, Jabber, IRC, etc),
60 60
     you can point your application directly at Tor (localhost
61
-    port 9050), but see <a href="<wikifaq>#SOCKSAndDNS">this FAQ
61
+    port 9050), but see <a href="<page docs/faq#TBBSocksPort">this FAQ
62 62
     entry</a> for why this may be dangerous. For applications
63 63
     that support neither SOCKS nor HTTP, take a look at <a href="https://code.google.com/p/torsocks/">torsocks</a>
64 64
     or <a href="http://www.dest-unreach.org/socat/">socat</a>.
Browse code

Remove reference to BSD packages

Sebastian Hahn authored on 11/02/2015 18:49:17
Showing 1 changed files
... ...
@@ -27,7 +27,7 @@
27 27
     <p>
28 28
     The latest release of Tor can be found on the <a
29 29
     href="<page download/download>">download</a> page. We have packages for Debian,
30
-    Red Hat, Gentoo, *BSD, etc there too. If you're
30
+    Red Hat, Gentoo, etc there too. If you're
31 31
     using Ubuntu, don't use the default packages: use <a
32 32
     href="<page docs/debian>#ubuntu">our deb repository</a> instead.
33 33
     Similarly, CentOS / Fedora users should use <a href="<page
Browse code

Updated config relay on install instructions

ilv authored on 11/02/2015 06:35:23
Showing 1 changed files
... ...
@@ -91,23 +91,9 @@
91 91
     <h2><a class="anchor" href="#relay">Step Three: Configure it as a relay</a></h2>
92 92
     <br>
93 93
     
94
-    <p>The Tor network relies on volunteers to donate bandwidth. The more
95
-    people who run relays, the faster the Tor network will be. If you have
96
-    at least 50 KiloBytes/s each way, please help out Tor by configuring your
97
-    Tor to be a relay too. We have many features that make Tor relays easy
98
-    and convenient, including rate limiting for bandwidth, exit policies so
99
-    you can limit your exposure to abuse complaints, and support for dynamic
100
-    IP addresses.</p>
101
-    
102
-    <p>Having relays in many different places on
103
-    the Internet is what makes Tor users secure. <a
104
-    href="<wikifaq>#DoIgetbetteranonymityifIrunarelay">You may also
105
-    get stronger anonymity yourself</a>, since remote sites can't know
106
-    whether connections originated at your computer or were relayed
107
-    from others.</p>
108
-
109
-    <p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
110
-    guide.</p>
94
+    <p>The Tor network relies on volunteers to donate bandwidth. If you
95
+    want to help <strong>make the Tor network faster</strong>, please
96
+    consider <a href="<page docs/tor-doc-relay>">running a relay</a>.</p>
111 97
     
112 98
     <hr>
113 99
     
Browse code

Replaced "the Tor Browser Bundle" in active docs.

Matt Pagan authored on 20/12/2014 16:05:28
Showing 1 changed files
... ...
@@ -14,8 +14,8 @@
14 14
     <br>
15 15
     
16 16
     <h2>Note that these are the installation instructions for running a
17
-    Tor client. The easiest way to do this is to simply download the <a
18
-    href="<page projects/torbrowser>">Tor Browser Bundle</a> and you are
17
+    Tor client. The easiest way to do this is to simply download <a
18
+    href="<page projects/torbrowser>">Tor Browser</a> and you are
19 19
     done.
20 20
     </h2>
21 21
     
... ...
@@ -56,7 +56,7 @@
56 56
     <br>
57 57
     
58 58
     <p>
59
-    If you want to use Tor for anonymous web browsing, please use the <a href="<page projects/torbrowser>">Tor Browser Bundle</a>. It comes with readily configured Tor and a browser patched for better anonymity. To use SOCKS directly (for instant messaging, Jabber, IRC, etc),
59
+    If you want to use Tor for anonymous web browsing, please use <a href="<page projects/torbrowser>">Tor Browser</a>. It comes with readily configured Tor and a browser patched for better anonymity. To use SOCKS directly (for instant messaging, Jabber, IRC, etc),
60 60
     you can point your application directly at Tor (localhost
61 61
     port 9050), but see <a href="<wikifaq>#SOCKSAndDNS">this FAQ
62 62
     entry</a> for why this may be dangerous. For applications
Browse code

we don't have opensuse RPMs, apparently

Sebastian Hahn authored on 19/10/2014 23:02:00
Showing 1 changed files
... ...
@@ -30,7 +30,7 @@
30 30
     Red Hat, Gentoo, *BSD, etc there too. If you're
31 31
     using Ubuntu, don't use the default packages: use <a
32 32
     href="<page docs/debian>#ubuntu">our deb repository</a> instead.
33
-    Similarly, CentOS / Fedora / OpenSUSE users should use <a href="<page
33
+    Similarly, CentOS / Fedora users should use <a href="<page
34 34
     docs/rpms>">our rpm repository</a> instead.
35 35
     </p>
36 36
     
Browse code

relays are bigger these days

Roger Dingledine authored on 10/06/2013 05:32:19
Showing 1 changed files
... ...
@@ -93,7 +93,7 @@
93 93
     
94 94
     <p>The Tor network relies on volunteers to donate bandwidth. The more
95 95
     people who run relays, the faster the Tor network will be. If you have
96
-    at least 20 KiloBytes/s each way, please help out Tor by configuring your
96
+    at least 50 KiloBytes/s each way, please help out Tor by configuring your
97 97
     Tor to be a relay too. We have many features that make Tor relays easy
98 98
     and convenient, including rate limiting for bandwidth, exit policies so
99 99
     you can limit your exposure to abuse complaints, and support for dynamic
Browse code

Removed Torbutton reference and outdated verification info from Linux install instructions

Moritz Bartl authored on 19/01/2013 12:46:46
Showing 1 changed files
... ...
@@ -55,62 +55,26 @@
55 55
     <h2><a class="anchor" href="#using">Step Two: Configure your applications to use Tor</a></h2>
56 56
     <br>
57 57
     
58
-    <p>After installing Tor, you need to configure your applications to
59
-    use them. The first step is to set up web browsing.</p>
60
-    
61
-    <p>You should use Tor with Firefox and Torbutton, for best safety.
62
-    Simply install the <a
63
-    href="<page torbutton/index>">Torbutton
64
-    plugin</a>, restart your Firefox, and you're all set:
65
-    </p>
66
-    
67
-    <img alt="Torbutton plugin for Firefox"
68
-    src="$(IMGROOT)/screenshot-torbutton.png"
69
-   >
70
-    
71
-    <br>
72
-    
73 58
     <p>
74
-    If you plan to run Firefox on a different computer than Tor, see the <a
75
-    href="<wikifaq>#SocksListenAddress">
76
-    FAQ
77
-    entry for running Tor on a different computer</a>.
78
-    </p>
79
-    
80
-    <p>To Torify other applications that support SOCKS proxies, just
81
-    point them at Tor's SOCKS port (127.0.0.1 port 9050). See <a
82
-    href="<wikifaq>#SOCKSAndDNS">this FAQ entry</a> for why this may be
83
-    dangerous. For applications that support neither SOCKS nor HTTP, take
84
-    a look at <a href="https://code.google.com/p/torsocks/">torsocks</a>
85
-    or <a href="<wiki>doc/TorifyHOWTO#socat">socat</a>.
59
+    If you want to use Tor for anonymous web browsing, please use the <a href="<page projects/torbrowser>">Tor Browser Bundle</a>. It comes with readily configured Tor and a browser patched for better anonymity. To use SOCKS directly (for instant messaging, Jabber, IRC, etc),
60
+    you can point your application directly at Tor (localhost
61
+    port 9050), but see <a href="<wikifaq>#SOCKSAndDNS">this FAQ
62
+    entry</a> for why this may be dangerous. For applications
63
+    that support neither SOCKS nor HTTP, take a look at <a href="https://code.google.com/p/torsocks/">torsocks</a>
64
+    or <a href="http://www.dest-unreach.org/socat/">socat</a>.
86 65
     </p>
87 66
     
88 67
     <p>For information on how to Torify other applications, check out the
89 68
     <a href="<wiki>doc/TorifyHOWTO">Torify HOWTO</a>.
90 69
     </p>
91 70
     
92
-    <hr>
93
-    <a id="verify"></a>
94
-    <h2><a class="anchor" href="#verify">Step Three: Make sure it's working</a></h2>
95
-    <br>
96
-    
97
-    <p>
98
-    Next, you should try using your browser with Tor and make
99
-    sure that your IP address is being anonymized. Click on <a
100
-    href="https://check.torproject.org/">the Tor detector</a>
101
-    and see whether it thinks you're using Tor or not.
102
-    (If that site is down, see <a
103
-    href="<wikifaq>#IsMyConnectionPrivate">this FAQ entry</a> for more
104
-    suggestions on how to test your Tor.)
105
-    </p>
106
-    
107 71
     <p>If you have a personal firewall that limits your computer's ability
108 72
     to connect to itself (this includes something like SELinux on Fedora
109 73
     Core 4), be sure to allow connections from your local applications to
110 74
     Tor (local port 9050). If your firewall blocks outgoing connections,
111 75
     punch a hole so it can connect to at least TCP ports 80 and 443, and
112 76
     then see <a href="<wikifaq>#FirewalledClient">this FAQ entry</a>.
113
-    If your SELinux config is not allowing tor or privoxy to run
77
+    If your SELinux config is not allowing tor to run
114 78
     correctly, create a file named booleans.local in the directory
115 79
     /etc/selinux/targeted.  Edit this file in your favorite text editor
116 80
     and insert "allow_ypbind=1".  Restart your machine for this change
... ...
@@ -124,7 +88,7 @@
124 88
     <hr>
125 89
     <a id="server"></a>
126 90
     <a id="relay"></a>
127
-    <h2><a class="anchor" href="#relay">Step Four: Configure it as a relay</a></h2>
91
+    <h2><a class="anchor" href="#relay">Step Three: Configure it as a relay</a></h2>
128 92
     <br>
129 93
     
130 94
     <p>The Tor network relies on volunteers to donate bandwidth. The more
Browse code

fix link in faq per ticket 6208.

Andrew Lewman authored on 20/06/2012 23:19:11
Showing 1 changed files
... ...
@@ -135,10 +135,11 @@
135 135
     you can limit your exposure to abuse complaints, and support for dynamic
136 136
     IP addresses.</p>
137 137
     
138
-    <p>Having relays in many different places on the Internet is what
139
-    makes Tor users secure. <a href="<wikifaq>#RelayAnonymity">You may
140
-    also get stronger anonymity yourself</a>, since remote sites can't
141
-    know whether connections originated at your computer or were relayed
138
+    <p>Having relays in many different places on
139
+    the Internet is what makes Tor users secure. <a
140
+    href="<wikifaq>#DoIgetbetteranonymityifIrunarelay">You may also
141
+    get stronger anonymity yourself</a>, since remote sites can't know
142
+    whether connections originated at your computer or were relayed
142 143
     from others.</p>
143 144
 
144 145
     <p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
Browse code

address ticket 5706 by making the suggestion to use TBB far stronger.

Andrew Lewman authored on 23/05/2012 02:44:48
Showing 1 changed files
... ...
@@ -13,12 +13,11 @@
13 13
     <h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1>
14 14
     <br>
15 15
     
16
-    <p>
17
-    <b>Note that these are the installation instructions for running a
16
+    <h2>Note that these are the installation instructions for running a
18 17
     Tor client. The easiest way to do this is to simply download the <a
19 18
     href="<page projects/torbrowser>">Tor Browser Bundle</a> and you are
20
-    done. </b>
21
-    </p>
19
+    done.
20
+    </h2>
22 21
     
23 22
     <hr>
24 23
     <a id="installing"></a>
Browse code

r24866 exposed our wml comments while reformatting. remove them.

Roger Dingledine authored on 03/08/2011 02:27:48
Showing 1 changed files
... ...
@@ -99,9 +99,8 @@
99 99
     Next, you should try using your browser with Tor and make
100 100
     sure that your IP address is being anonymized. Click on <a
101 101
     href="https://check.torproject.org/">the Tor detector</a>
102
-    and see whether it thinks you're using Tor or not.  #<a
103
-    href="http://ipchicken.com/">this site</a> #to see what IP
104
-    address it thinks you're using.  (If that site is down, see <a
102
+    and see whether it thinks you're using Tor or not.
103
+    (If that site is down, see <a
105 104
     href="<wikifaq>#IsMyConnectionPrivate">this FAQ entry</a> for more
106 105
     suggestions on how to test your Tor.)
107 106
     </p>
Browse code

fix a missing >

Andrew Lewman authored on 07/07/2011 13:33:52
Showing 1 changed files
... ...
@@ -16,7 +16,7 @@
16 16
     <p>
17 17
     <b>Note that these are the installation instructions for running a
18 18
     Tor client. The easiest way to do this is to simply download the <a
19
-    href="<page projects/torbrowser>"Tor Browser Bundle</a> and you are
19
+    href="<page projects/torbrowser>">Tor Browser Bundle</a> and you are
20 20
     done. </b>
21 21
     </p>
22 22
     
Browse code

finish purging polipo from the docs.

Andrew Lewman authored on 07/07/2011 13:32:10
Showing 1 changed files
... ...
@@ -14,10 +14,10 @@
14 14
     <br>
15 15
     
16 16
     <p>
17
-    <b>Note that these are the installation instructions for running a Tor
18
-    client. If you want to relay traffic for others to help the network grow
19
-    (please do), read the <a
20
-    href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b>
17
+    <b>Note that these are the installation instructions for running a
18
+    Tor client. The easiest way to do this is to simply download the <a
19
+    href="<page projects/torbrowser>"Tor Browser Bundle</a> and you are
20
+    done. </b>
21 21
     </p>
22 22
     
23 23
     <hr>
... ...
@@ -78,20 +78,16 @@
78 78
     entry for running Tor on a different computer</a>.
79 79
     </p>
80 80
     
81
-    <p>To Torify other applications that support HTTP proxies, just
82
-    point them at Polipo (that is, localhost port 8118). To use SOCKS
83
-    directly (for instant messaging, Jabber, IRC, etc), you can point
84
-    your application directly at Tor (localhost port 9050), but see <a
85
-    href="<wikifaq>#SOCKSAndDNS">this
86
-    FAQ entry</a> for why this may be dangerous. For applications
87
-    that support neither SOCKS nor HTTP, take a look at <a
88
-    href="https://code.google.com/p/torsocks/">torsocks</a> or <a
89
-    href="<wiki>doc/TorifyHOWTO#socat">socat</a>.
81
+    <p>To Torify other applications that support SOCKS proxies, just
82
+    point them at Tor's SOCKS port (127.0.0.1 port 9050). See <a
83
+    href="<wikifaq>#SOCKSAndDNS">this FAQ entry</a> for why this may be
84
+    dangerous. For applications that support neither SOCKS nor HTTP, take
85
+    a look at <a href="https://code.google.com/p/torsocks/">torsocks</a>
86
+    or <a href="<wiki>doc/TorifyHOWTO#socat">socat</a>.
90 87
     </p>
91 88
     
92 89
     <p>For information on how to Torify other applications, check out the
93
-    <a href="<wiki>doc/TorifyHOWTO">Torify
94
-    HOWTO</a>.
90
+    <a href="<wiki>doc/TorifyHOWTO">Torify HOWTO</a>.
95 91
     </p>
96 92
     
97 93
     <hr>
... ...
@@ -101,30 +97,26 @@
101 97
     
102 98
     <p>
103 99
     Next, you should try using your browser with Tor and make
104
-    sure that your IP address is being anonymized. Click on
105
-    <a href="https://check.torproject.org/">the
106
-    Tor detector</a>
107
-    and see whether it thinks you're using Tor or not.
108
-    #<a href="http://ipchicken.com/">this site</a>
109
-    #to see what IP address it thinks you're using.
110
-    (If that site is down, see <a
111
-    href="<wikifaq>#IsMyConnectionPrivate">this
112
-    FAQ entry</a> for more suggestions on how to test your Tor.)
100
+    sure that your IP address is being anonymized. Click on <a
101
+    href="https://check.torproject.org/">the Tor detector</a>
102
+    and see whether it thinks you're using Tor or not.  #<a
103
+    href="http://ipchicken.com/">this site</a> #to see what IP
104
+    address it thinks you're using.  (If that site is down, see <a
105
+    href="<wikifaq>#IsMyConnectionPrivate">this FAQ entry</a> for more
106
+    suggestions on how to test your Tor.)
113 107
     </p>
114 108
     
115
-    <p>If you have a personal firewall that limits your computer's
116
-    ability to connect to itself (this includes something like SELinux on
117
-    Fedora Core 4), be sure to allow connections from
118
-    your local applications to Polipo (local port 8118) and Tor (local port
119
-    9050). If
120
-    your firewall blocks outgoing connections, punch a hole so
121
-    it can connect to at least TCP ports 80 and 443, and then see <a
122
-    href="<wikifaq>#FirewalledClient">this
123
-    FAQ entry</a>.  If your SELinux config is not allowing tor or privoxy to
124
-    run correctly, create a file named booleans.local in the directory
125
-    /etc/selinux/targeted.  Edit this file in your favorite text editor and
126
-    insert "allow_ypbind=1".  Restart your machine for this change to take
127
-    effect.
109
+    <p>If you have a personal firewall that limits your computer's ability
110
+    to connect to itself (this includes something like SELinux on Fedora
111
+    Core 4), be sure to allow connections from your local applications to
112
+    Tor (local port 9050). If your firewall blocks outgoing connections,
113
+    punch a hole so it can connect to at least TCP ports 80 and 443, and
114
+    then see <a href="<wikifaq>#FirewalledClient">this FAQ entry</a>.
115
+    If your SELinux config is not allowing tor or privoxy to run
116
+    correctly, create a file named booleans.local in the directory
117
+    /etc/selinux/targeted.  Edit this file in your favorite text editor
118
+    and insert "allow_ypbind=1".  Restart your machine for this change
119
+    to take effect.
128 120
     </p>
129 121
     
130 122
     <p>If it's still not working, look at <a
... ...
@@ -139,19 +131,18 @@
139 131
     
140 132
     <p>The Tor network relies on volunteers to donate bandwidth. The more
141 133
     people who run relays, the faster the Tor network will be. If you have
142
-    at least 20 kilobytes/s each way, please help out Tor by configuring your
134
+    at least 20 KiloBytes/s each way, please help out Tor by configuring your
143 135
     Tor to be a relay too. We have many features that make Tor relays easy
144 136
     and convenient, including rate limiting for bandwidth, exit policies so
145 137
     you can limit your exposure to abuse complaints, and support for dynamic
146 138
     IP addresses.</p>
147 139
     
148 140
     <p>Having relays in many different places on the Internet is what
149
-    makes Tor users secure. <a
150
-    href="<wikifaq>#RelayAnonymity">You
151
-    may also get stronger anonymity yourself</a>,
152
-    since remote sites can't know whether connections originated at your
153
-    computer or were relayed from others.</p>
154
-    
141
+    makes Tor users secure. <a href="<wikifaq>#RelayAnonymity">You may
142
+    also get stronger anonymity yourself</a>, since remote sites can't
143
+    know whether connections originated at your computer or were relayed
144
+    from others.</p>
145
+
155 146
     <p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
156 147
     guide.</p>
157 148
     
Browse code

remove the polipo section. these instructions really should be to just install TBB and be done with it.

Andrew Lewman authored on 07/07/2011 13:23:55
Showing 1 changed files
... ...
@@ -51,48 +51,13 @@
51 51
     the settings. Tor is now installed.
52 52
     </p>
53 53
     
54
-    <hr>
55
-    <a id="privoxy"></a>
56
-    <a id="polipo"></a>
57
-    <h2><a class="anchor" href="#polipo">Step Two: Install Polipo for Web Browsing</a></h2>
58
-    <br>
59
-    
60
-    <p>After installing Tor, you need to configure your applications to use it.
61
-    </p>
62
-    
63
-    <p>
64
-    The first step is to set up web browsing. Start by installing <a
65
-    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> from
66
-    your favorite repository. Polipo is a caching web proxy that does http
67
-    pipelining well, so it's well-suited for Tor's latencies. Make sure
68
-    to get at least Polipo 1.0.4, since earlier versions lack the SOCKS support
69
-    required to use Polipo with Tor. You should uninstall privoxy at this
70
-    point (e.g. apt-get remove privoxy or yum remove privoxy), so they don't
71
-    conflict.
72
-    </p>
73
-    
74
-    <p>Once you've installed Polipo (either from package or from
75
-    source), <b>you will need to configure Polipo to use Tor</b>. Grab our <a
76
-    href="<tbbrepo>/build-scripts/config/polipo.conf">Polipo
77
-    configuration for Tor</a> and put it in place of your current polipo
78
-    config file (e.g. /etc/polipo/config or ~/.polipo).
79
-    You'll need to restart Polipo for the changes to take effect. For
80
-    example:<br>
81
-    <tt>/etc/init.d/polipo restart</tt>
82
-    </p>
83
-    
84
-    <p>If you prefer, you can instead use Privoxy with <a
85
-    href="<wiki>doc/PrivoxyConfig">this
86
-    sample Privoxy configuration</a>. But since the config files both use
87
-    port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p>
88
-    
89 54
     <hr>
90 55
     <a id="using"></a>
91
-    <h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2>
56
+    <h2><a class="anchor" href="#using">Step Two: Configure your applications to use Tor</a></h2>
92 57
     <br>
93 58
     
94
-    <p>After installing Tor and Polipo, you need to configure your
95
-    applications to use them. The first step is to set up web browsing.</p>
59
+    <p>After installing Tor, you need to configure your applications to
60
+    use them. The first step is to set up web browsing.</p>
96 61
     
97 62
     <p>You should use Tor with Firefox and Torbutton, for best safety.
98 63
     Simply install the <a
... ...
@@ -131,7 +96,7 @@
131 96
     
132 97
     <hr>
133 98
     <a id="verify"></a>
134
-    <h2><a class="anchor" href="#verify">Step Four: Make sure it's working</a></h2>
99
+    <h2><a class="anchor" href="#verify">Step Three: Make sure it's working</a></h2>
135 100
     <br>
136 101
     
137 102
     <p>
... ...
@@ -169,7 +134,7 @@
169 134
     <hr>
170 135
     <a id="server"></a>
171 136
     <a id="relay"></a>
172
-    <h2><a class="anchor" href="#relay">Step Five: Configure it as a relay</a></h2>
137
+    <h2><a class="anchor" href="#relay">Step Four: Configure it as a relay</a></h2>
173 138
     <br>
174 139
     
175 140
     <p>The Tor network relies on volunteers to donate bandwidth. The more
Browse code

Update wiki links

Karsten Loesing authored on 11/06/2011 20:55:49
Showing 1 changed files
... ...
@@ -82,7 +82,7 @@
82 82
     </p>
83 83
     
84 84
     <p>If you prefer, you can instead use Privoxy with <a
85
-    href="<wiki>TheOnionRouter/PrivoxyConfig">this
85
+    href="<wiki>doc/PrivoxyConfig">this
86 86
     sample Privoxy configuration</a>. But since the config files both use
87 87
     port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p>
88 88
     
... ...
@@ -121,11 +121,11 @@
121 121
     FAQ entry</a> for why this may be dangerous. For applications
122 122
     that support neither SOCKS nor HTTP, take a look at <a
123 123
     href="https://code.google.com/p/torsocks/">torsocks</a> or <a
124
-    href="<wiki>TheOnionRouter/TorifyHOWTO#socat">socat</a>.
124
+    href="<wiki>doc/TorifyHOWTO#socat">socat</a>.
125 125
     </p>
126 126
     
127 127
     <p>For information on how to Torify other applications, check out the
128
-    <a href="<wiki>TheOnionRouter/TorifyHOWTO">Torify
128
+    <a href="<wiki>doc/TorifyHOWTO">Torify
129 129
     HOWTO</a>.
130 130
     </p>
131 131
     
Browse code

Link to the Torbutton page properly

Robert Ransom authored on 11/02/2011 01:50:56
Showing 1 changed files
... ...
@@ -96,7 +96,7 @@
96 96
     
97 97
     <p>You should use Tor with Firefox and Torbutton, for best safety.
98 98
     Simply install the <a
99
-    href="https://www.torproject.org/torbutton/">Torbutton
99
+    href="<page torbutton/index>">Torbutton
100 100
     plugin</a>, restart your Firefox, and you're all set:
101 101
     </p>
102 102
     
Browse code

Don't send users to addons.mozilla.org for Torbutton

Robert Ransom authored on 11/02/2011 00:55:53
Showing 1 changed files
... ...
@@ -96,7 +96,7 @@
96 96
     
97 97
     <p>You should use Tor with Firefox and Torbutton, for best safety.
98 98
     Simply install the <a
99
-    href="https://addons.mozilla.org/firefox/2275/">Torbutton
99
+    href="https://www.torproject.org/torbutton/">Torbutton
100 100
     plugin</a>, restart your Firefox, and you're all set:
101 101
     </p>
102 102
     
Browse code

warn people about the native rpms too

Roger Dingledine authored on 08/02/2011 06:43:04
Showing 1 changed files
... ...
@@ -31,6 +31,8 @@
31 31
     Red Hat, Gentoo, *BSD, etc there too. If you're
32 32
     using Ubuntu, don't use the default packages: use <a
33 33
     href="<page docs/debian>#ubuntu">our deb repository</a> instead.
34
+    Similarly, CentOS / Fedora / OpenSUSE users should use <a href="<page
35
+    docs/rpms>">our rpm repository</a> instead.
34 36
     </p>
35 37
     
36 38
     <p>If you're building from source, first install <a
Browse code

fix the faq anchors that have been migrated already. leave ten or twenty broken anchors for the old faq.

Roger Dingledine authored on 07/02/2011 10:40:23
Showing 1 changed files
... ...
@@ -161,7 +161,7 @@
161 161
     </p>
162 162
     
163 163
     <p>If it's still not working, look at <a
164
-    href="<wikifaq>#ItDoesntWork">this
164
+    href="<page docs/faq>#DoesntWork">this
165 165
     FAQ entry</a> for hints.</p>
166 166
     
167 167
     <hr>
Browse code

per grarpamp, reference torsocks not tsocks.

Andrew Lewman authored on 15/12/2010 13:52:49
Showing 1 changed files
... ...
@@ -118,7 +118,7 @@
118 118
     href="<wikifaq>#SOCKSAndDNS">this
119 119
     FAQ entry</a> for why this may be dangerous. For applications
120 120
     that support neither SOCKS nor HTTP, take a look at <a
121
-    href="http://tsocks.sourceforge.net/">tsocks</a> or <a
121
+    href="https://code.google.com/p/torsocks/">torsocks</a> or <a
122 122
     href="<wiki>TheOnionRouter/TorifyHOWTO#socat">socat</a>.
123 123
     </p>
124 124
     
Browse code

looks like we never set the keywords either

Roger Dingledine authored on 27/10/2010 12:31:57
Showing 1 changed files
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Revision: $Revision: 21798 $
2
+# Revision: $Revision$
3 3
 # Translation-Priority: 3-low
4 4
 
5 5
 #include "head.wmi" TITLE="Tor: Linux/BSD/Unix Install Instructions" CHARSET="UTF-8"
Browse code

use the tbbrepo tag

Sebastian Hahn authored on 11/10/2010 09:55:59
Showing 1 changed files
... ...
@@ -71,7 +71,7 @@
71 71
     
72 72
     <p>Once you've installed Polipo (either from package or from
73 73
     source), <b>you will need to configure Polipo to use Tor</b>. Grab our <a
74
-    href="https://gitweb.torproject.org/torbrowser.git/blob_plain/HEAD:/build-scripts/config/polipo.conf">Polipo
74
+    href="<tbbrepo>/build-scripts/config/polipo.conf">Polipo
75 75
     configuration for Tor</a> and put it in place of your current polipo
76 76
     config file (e.g. /etc/polipo/config or ~/.polipo).
77 77
     You'll need to restart Polipo for the changes to take effect. For
Browse code

new polipo.conf location

Roger Dingledine authored on 11/10/2010 06:43:50
Showing 1 changed files
... ...
@@ -71,7 +71,7 @@
71 71
     
72 72
     <p>Once you've installed Polipo (either from package or from
73 73
     source), <b>you will need to configure Polipo to use Tor</b>. Grab our <a
74
-    href="https://svn.torproject.org/svn/torbrowser/trunk/build-scripts/config/polipo.conf">Polipo
74
+    href="https://gitweb.torproject.org/torbrowser.git/blob_plain/HEAD:/build-scripts/config/polipo.conf">Polipo
75 75
     configuration for Tor</a> and put it in place of your current polipo
76 76
     config file (e.g. /etc/polipo/config or ~/.polipo).
77 77
     You'll need to restart Polipo for the changes to take effect. For
Browse code

Kill all the border attributes

Sebastian Hahn authored on 10/10/2010 04:10:59
Showing 1 changed files
... ...
@@ -100,7 +100,7 @@
100 100
     
101 101
     <img alt="Torbutton plugin for Firefox"
102 102
     src="$(IMGROOT)/screenshot-torbutton.png"
103
-    border="1">
103
+   >
104 104
     
105 105
     <br>
106 106
     
Browse code

We decided to go with HTML in favor of XHTML.

Sebastian Hahn authored on 10/10/2010 03:34:47
Showing 1 changed files
... ...
@@ -11,7 +11,7 @@
11 11
   </div> 
12 12
   <div id="maincol"> 
13 13
     <h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1>
14
-    <br />
14
+    <br>
15 15
     
16 16
     <p>
17 17
     <b>Note that these are the installation instructions for running a Tor
... ...
@@ -20,10 +20,10 @@
20 20
     href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b>
21 21
     </p>
22 22
     
23
-    <hr />
23
+    <hr>
24 24
     <a id="installing"></a>
25 25
     <h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2>
26
-    <br />
26
+    <br>
27 27
     
28 28
     <p>
29 29
     The latest release of Tor can be found on the <a
... ...
@@ -36,9 +36,9 @@
36 36
     <p>If you're building from source, first install <a
37 37
     href="http://www.monkey.org/~provos/libevent/">libevent</a>, and
38 38
     make sure you have openssl and zlib (including the -devel packages if
39
-    applicable). Then run:<br />
40
-    <tt>tar xzf tor-<version-stable>.tar.gz; cd tor-<version-stable></tt><br />
41
-    <tt>./configure &amp;&amp; make</tt><br />
39
+    applicable). Then run:<br>
40
+    <tt>tar xzf tor-<version-stable>.tar.gz; cd tor-<version-stable></tt><br>
41
+    <tt>./configure &amp;&amp; make</tt><br>
42 42
     Now you can run tor as <tt>src/or/tor</tt>, or you can run <tt>make install</tt>
43 43
     (as root if necessary) to install it into /usr/local/, and then you can
44 44
     start it just by running <tt>tor</tt>.
... ...
@@ -49,11 +49,11 @@
49 49
     the settings. Tor is now installed.
50 50
     </p>
51 51
     
52
-    <hr />
52
+    <hr>
53 53
     <a id="privoxy"></a>
54 54
     <a id="polipo"></a>
55 55
     <h2><a class="anchor" href="#polipo">Step Two: Install Polipo for Web Browsing</a></h2>
56
-    <br />
56
+    <br>
57 57
     
58 58
     <p>After installing Tor, you need to configure your applications to use it.
59 59
     </p>
... ...
@@ -75,7 +75,7 @@
75 75
     configuration for Tor</a> and put it in place of your current polipo
76 76
     config file (e.g. /etc/polipo/config or ~/.polipo).
77 77
     You'll need to restart Polipo for the changes to take effect. For
78
-    example:<br />
78
+    example:<br>
79 79
     <tt>/etc/init.d/polipo restart</tt>
80 80
     </p>
81 81
     
... ...
@@ -84,10 +84,10 @@
84 84
     sample Privoxy configuration</a>. But since the config files both use
85 85
     port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p>
86 86
     
87
-    <hr />
87
+    <hr>
88 88
     <a id="using"></a>
89 89
     <h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2>
90
-    <br />
90
+    <br>
91 91
     
92 92
     <p>After installing Tor and Polipo, you need to configure your
93 93
     applications to use them. The first step is to set up web browsing.</p>
... ...
@@ -102,7 +102,7 @@
102 102
     src="$(IMGROOT)/screenshot-torbutton.png"
103 103
     border="1">
104 104
     
105
-    <br />
105
+    <br>
106 106
     
107 107
     <p>
108 108
     If you plan to run Firefox on a different computer than Tor, see the <a
... ...
@@ -127,10 +127,10 @@
127 127
     HOWTO</a>.
128 128
     </p>
129 129
     
130
-    <hr />
130
+    <hr>
131 131
     <a id="verify"></a>
132 132
     <h2><a class="anchor" href="#verify">Step Four: Make sure it's working</a></h2>
133
-    <br />
133
+    <br>
134 134
     
135 135
     <p>
136 136
     Next, you should try using your browser with Tor and make
... ...
@@ -164,11 +164,11 @@
164 164
     href="<wikifaq>#ItDoesntWork">this
165 165
     FAQ entry</a> for hints.</p>
166 166
     
167
-    <hr />
167
+    <hr>
168 168
     <a id="server"></a>
169 169
     <a id="relay"></a>
170 170
     <h2><a class="anchor" href="#relay">Step Five: Configure it as a relay</a></h2>
171
-    <br />
171
+    <br>
172 172
     
173 173
     <p>The Tor network relies on volunteers to donate bandwidth. The more
174 174
     people who run relays, the faster the Tor network will be. If you have
... ...
@@ -188,7 +188,7 @@
188 188
     <p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
189 189
     guide.</p>
190 190
     
191
-    <hr />
191
+    <hr>
192 192
     
193 193
     <p>If you have suggestions for improving this document, please <a
194 194
     href="<page about/contact>">send them to us</a>. Thanks!</p>
Browse code

more image path fixes.

Andrew Lewman authored on 10/10/2010 03:18:02
Showing 1 changed files
... ...
@@ -99,7 +99,7 @@
99 99
     </p>
100 100
     
101 101
     <img alt="Torbutton plugin for Firefox"
102
-    src="../img/screenshot-torbutton.png"
102
+    src="$(IMGROOT)/screenshot-torbutton.png"
103 103
     border="1">
104 104
     
105 105
     <br />
Browse code

clean up wiki and faq references.

Andrew Lewman authored on 08/10/2010 16:54:16
Showing 1 changed files
... ...
@@ -80,7 +80,7 @@
80 80
     </p>
81 81
     
82 82
     <p>If you prefer, you can instead use Privoxy with <a
83
-    href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">this
83
+    href="<wiki>TheOnionRouter/PrivoxyConfig">this
84 84
     sample Privoxy configuration</a>. But since the config files both use
85 85
     port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p>
86 86
     
... ...
@@ -106,7 +106,7 @@
106 106
     
107 107
     <p>
108 108
     If you plan to run Firefox on a different computer than Tor, see the <a
109
-    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">
109
+    href="<wikifaq>#SocksListenAddress">
110 110
     FAQ
111 111
     entry for running Tor on a different computer</a>.
112 112
     </p>
... ...
@@ -115,15 +115,15 @@
115 115
     point them at Polipo (that is, localhost port 8118). To use SOCKS
116 116
     directly (for instant messaging, Jabber, IRC, etc), you can point
117 117
     your application directly at Tor (localhost port 9050), but see <a
118
-    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this
118
+    href="<wikifaq>#SOCKSAndDNS">this
119 119
     FAQ entry</a> for why this may be dangerous. For applications
120 120
     that support neither SOCKS nor HTTP, take a look at <a
121 121
     href="http://tsocks.sourceforge.net/">tsocks</a> or <a
122
-    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>.
122
+    href="<wiki>TheOnionRouter/TorifyHOWTO#socat">socat</a>.
123 123
     </p>
124 124
     
125 125
     <p>For information on how to Torify other applications, check out the
126
-    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify
126
+    <a href="<wiki>TheOnionRouter/TorifyHOWTO">Torify
127 127
     HOWTO</a>.
128 128
     </p>
129 129
     
... ...
@@ -141,7 +141,7 @@
141 141
     #<a href="http://ipchicken.com/">this site</a>
142 142
     #to see what IP address it thinks you're using.
143 143
     (If that site is down, see <a
144
-    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this
144
+    href="<wikifaq>#IsMyConnectionPrivate">this
145 145
     FAQ entry</a> for more suggestions on how to test your Tor.)
146 146
     </p>
147 147
     
... ...
@@ -152,7 +152,7 @@
152 152
     9050). If
153 153
     your firewall blocks outgoing connections, punch a hole so
154 154
     it can connect to at least TCP ports 80 and 443, and then see <a
155
-    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this
155
+    href="<wikifaq>#FirewalledClient">this
156 156
     FAQ entry</a>.  If your SELinux config is not allowing tor or privoxy to
157 157
     run correctly, create a file named booleans.local in the directory
158 158
     /etc/selinux/targeted.  Edit this file in your favorite text editor and
... ...
@@ -161,7 +161,7 @@
161 161
     </p>
162 162
     
163 163
     <p>If it's still not working, look at <a
164
-    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this
164
+    href="<wikifaq>#ItDoesntWork">this
165 165
     FAQ entry</a> for hints.</p>
166 166
     
167 167
     <hr />
... ...
@@ -180,7 +180,7 @@
180 180
     
181 181
     <p>Having relays in many different places on the Internet is what
182 182
     makes Tor users secure. <a
183
-    href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">You
183
+    href="<wikifaq>#RelayAnonymity">You
184 184
     may also get stronger anonymity yourself</a>,
185 185
     since remote sites can't know whether connections originated at your
186 186
     computer or were relayed from others.</p>
Browse code

change all of the breadcrumbs from page home to page index.

Andrew Lewman authored on 12/08/2010 17:17:47
Showing 1 changed files
... ...
@@ -5,12 +5,12 @@
5 5
 #include "head.wmi" TITLE="Tor: Linux/BSD/Unix Install Instructions" CHARSET="UTF-8"
6 6
 <div id="content" class="clearfix">
7 7
   <div id="breadcrumbs">
8
-    <a href="<page home>">Home &raquo; </a>
8
+    <a href="<page index>">Home &raquo; </a>
9 9
     <a href="<page docs/documentation>">Documentation &raquo; </a>
10 10
     <a href="<page docs/tor-doc-unix>">Linux/BSD/Unix Client</a>
11 11
   </div> 
12 12
   <div id="maincol"> 
13
-    <h1>Running the <a href="<page home>">Tor</a> client on Linux/BSD/Unix</h1>
13
+    <h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1>
14 14
     <br />
15 15
     
16 16
     <p>
Browse code

first cut of the new, shiny tor website as wml.

Andrew Lewman authored on 09/07/2010 03:55:22
Showing 1 changed files
1 1
new file mode 100644
... ...
@@ -0,0 +1,204 @@
1
+## translation metadata
2
+# Revision: $Revision: 21798 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor: Linux/BSD/Unix Install Instructions" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page docs/documentation>">Documentation &raquo; </a>
10
+    <a href="<page docs/tor-doc-unix>">Linux/BSD/Unix Client</a>
11
+  </div> 
12
+  <div id="maincol"> 
13
+    <h1>Running the <a href="<page home>">Tor</a> client on Linux/BSD/Unix</h1>
14
+    <br />
15
+    
16
+    <p>
17
+    <b>Note that these are the installation instructions for running a Tor
18
+    client. If you want to relay traffic for others to help the network grow
19
+    (please do), read the <a
20
+    href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b>
21
+    </p>
22
+    
23
+    <hr />
24
+    <a id="installing"></a>
25
+    <h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2>
26
+    <br />
27
+    
28
+    <p>
29
+    The latest release of Tor can be found on the <a
30
+    href="<page download/download>">download</a> page. We have packages for Debian,
31
+    Red Hat, Gentoo, *BSD, etc there too. If you're
32
+    using Ubuntu, don't use the default packages: use <a
33
+    href="<page docs/debian>#ubuntu">our deb repository</a> instead.
34
+    </p>
35
+    
36
+    <p>If you're building from source, first install <a
37
+    href="http://www.monkey.org/~provos/libevent/">libevent</a>, and
38
+    make sure you have openssl and zlib (including the -devel packages if
39
+    applicable). Then run:<br />
40
+    <tt>tar xzf tor-<version-stable>.tar.gz; cd tor-<version-stable></tt><br />
41
+    <tt>./configure &amp;&amp; make</tt><br />
42
+    Now you can run tor as <tt>src/or/tor</tt>, or you can run <tt>make install</tt>
43
+    (as root if necessary) to install it into /usr/local/, and then you can
44
+    start it just by running <tt>tor</tt>.
45
+    </p>
46
+    
47
+    <p>Tor comes configured as a client by default. It uses a built-in
48
+    default configuration file, and most people won't need to change any of
49
+    the settings. Tor is now installed.
50
+    </p>
51
+    
52
+    <hr />
53
+    <a id="privoxy"></a>
54
+    <a id="polipo"></a>
55
+    <h2><a class="anchor" href="#polipo">Step Two: Install Polipo for Web Browsing</a></h2>
56
+    <br />
57
+    
58
+    <p>After installing Tor, you need to configure your applications to use it.
59
+    </p>
60
+    
61
+    <p>
62
+    The first step is to set up web browsing. Start by installing <a
63
+    href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> from
64
+    your favorite repository. Polipo is a caching web proxy that does http
65
+    pipelining well, so it's well-suited for Tor's latencies. Make sure
66
+    to get at least Polipo 1.0.4, since earlier versions lack the SOCKS support
67
+    required to use Polipo with Tor. You should uninstall privoxy at this
68
+    point (e.g. apt-get remove privoxy or yum remove privoxy), so they don't
69
+    conflict.
70
+    </p>
71
+    
72
+    <p>Once you've installed Polipo (either from package or from
73
+    source), <b>you will need to configure Polipo to use Tor</b>. Grab our <a
74
+    href="https://svn.torproject.org/svn/torbrowser/trunk/build-scripts/config/polipo.conf">Polipo
75
+    configuration for Tor</a> and put it in place of your current polipo
76
+    config file (e.g. /etc/polipo/config or ~/.polipo).
77
+    You'll need to restart Polipo for the changes to take effect. For
78
+    example:<br />
79
+    <tt>/etc/init.d/polipo restart</tt>
80
+    </p>
81
+    
82
+    <p>If you prefer, you can instead use Privoxy with <a
83
+    href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">this
84
+    sample Privoxy configuration</a>. But since the config files both use
85
+    port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p>
86
+    
87
+    <hr />
88
+    <a id="using"></a>
89
+    <h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2>
90
+    <br />
91
+    
92
+    <p>After installing Tor and Polipo, you need to configure your
93
+    applications to use them. The first step is to set up web browsing.</p>
94
+    
95
+    <p>You should use Tor with Firefox and Torbutton, for best safety.
96
+    Simply install the <a
97
+    href="https://addons.mozilla.org/firefox/2275/">Torbutton