|  | @@ -66,8 +66,9 @@ src="http://tor.eff.org/img/screenshot-win32-dos-window.png" />
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  <p>Tor comes configured as a client by default. It uses a built-in
 | 
	
		
			
				|  |  |  default configuration file, and most people won't need to change any of
 | 
	
		
			
				|  |  | -the settings. Tor is now installed. Close the Tor client for now by
 | 
	
		
			
				|  |  | -closing the cmd window.</p>
 | 
	
		
			
				|  |  | +the settings. Tor is now installed. <!--Close the Tor client for now by
 | 
	
		
			
				|  |  | +closing the cmd window.-->
 | 
	
		
			
				|  |  | +</p>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  <a name="privoxy"></a>
 | 
	
		
			
				|  |  |  <h2>Step Two: Install Privoxy for Web Browsing</h2>
 | 
	
	
		
			
				|  | @@ -80,8 +81,9 @@ The first step is to set up web browsing. Start by installing <a
 | 
	
		
			
				|  |  |  href="http://www.privoxy.org/">Privoxy</a> (click on 'recent releases',
 | 
	
		
			
				|  |  |  then scroll down to the MS Windows installer packages). Privoxy is a filtering
 | 
	
		
			
				|  |  |  web proxy that integrates well with Tor. Once it's installed, it should
 | 
	
		
			
				|  |  | -appear in your system tray as a "P" in a circle, as pictured below: Exit from
 | 
	
		
			
				|  |  | -Privoxy for now by right clicking on the "P" icon and finding the exit option.
 | 
	
		
			
				|  |  | +appear in your system tray as a "P" in a circle, as pictured below:
 | 
	
		
			
				|  |  | +<!-- Exit from
 | 
	
		
			
				|  |  | +Privoxy for now by right clicking on the "P" icon and finding the exit option.-->
 | 
	
		
			
				|  |  |  </p>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  <img alt="privoxy icon in the system tray"
 | 
	
	
		
			
				|  | @@ -111,8 +113,7 @@ order to stop this you will need to comment out two lines by inserting a
 | 
	
		
			
				|  |  |  <tt>logfile privoxy.log</tt><br>
 | 
	
		
			
				|  |  |  and the line <br>
 | 
	
		
			
				|  |  |  <tt>jarfile jar.log</tt><br>
 | 
	
		
			
				|  |  | -Be sure to save. You'll need to exit and restart Privoxy for the changes
 | 
	
		
			
				|  |  | -to take effect.
 | 
	
		
			
				|  |  | +Be sure to save.
 | 
	
		
			
				|  |  |  </p>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  <img border="1" alt="comment out logfile"
 | 
	
	
		
			
				|  | @@ -125,7 +126,8 @@ src="http://tor.eff.org/img/screenshot-win32-privoxy-edit-3.png" />
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  <br>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -<p>Instructions for restarting Privoxy:</p>
 | 
	
		
			
				|  |  | +<p>You'll need to exit and restart Privoxy for the changes to take effect:
 | 
	
		
			
				|  |  | +</p>
 | 
	
		
			
				|  |  |  <ol>
 | 
	
		
			
				|  |  |  <li>Right click on the Privoxy systray icon and choose "Exit Privoxy".</li>
 | 
	
		
			
				|  |  |  <li>Left click on Start Menu then Programs then Privoxy.  Select the
 | 
	
	
		
			
				|  | @@ -136,70 +138,90 @@ tray again.</li>
 | 
	
		
			
				|  |  |  <a name="using"></a>
 | 
	
		
			
				|  |  |  <h2>Step Three: Configure your applications to use Tor</h2>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -<p>Then change your browser to HTTP proxy at localhost port 8118.
 | 
	
		
			
				|  |  | +<p>After installing Tor and Privoxy, you need to configure your
 | 
	
		
			
				|  |  | +applications to use them. The first step is to set up web browsing.</p>
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +<p>If you're using Firefox (we recommend it), check out our <a
 | 
	
		
			
				|  |  | +href="tor-switchproxy.html">Tor SwitchProxy howto</a> to set up
 | 
	
		
			
				|  |  | +a plugin that makes it easy to switch between using Tor and using a
 | 
	
		
			
				|  |  | +direct connection.</p>
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +<p>Otherwise, you need to manually configure your browser to HTTP proxy
 | 
	
		
			
				|  |  | +at localhost port 8118.
 | 
	
		
			
				|  |  |  (That's where Privoxy listens.)
 | 
	
		
			
				|  |  | -In Firefox it's Tools|Options|General|Connection Settings.
 | 
	
		
			
				|  |  |  In Mozilla, this is in Edit|Preferences|Advanced|Proxies.
 | 
	
		
			
				|  |  |  In Opera 7.5x it's Tools|Preferences|Network|Proxy servers.
 | 
	
		
			
				|  |  |  In IE, it's Tools|Internet Options|Connections|LAN Settings|Advanced.
 | 
	
		
			
				|  |  | -You should also set your SSL proxy (IE calls it "Secure") to the same
 | 
	
		
			
				|  |  | -thing, to hide your SSL traffic too. In IE, this looks something like:</p>
 | 
	
		
			
				|  |  | +You should click the "use the same proxy server for all protocols"
 | 
	
		
			
				|  |  | +button; but see <a
 | 
	
		
			
				|  |  | +href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">this
 | 
	
		
			
				|  |  | +note</a> about Tor and ftp proxies.
 | 
	
		
			
				|  |  | +<!--You should also set your SSL proxy (IE calls it "Secure") to the same
 | 
	
		
			
				|  |  | +thing, to hide your SSL traffic too.--> In IE, this looks something like:</p>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -<img alt="LAN settings in IE"
 | 
	
		
			
				|  |  | -src="http://tor.eff.org/img/screenshot-win32-ie-lan.jpg" />
 | 
	
		
			
				|  |  |  <img alt="Proxy settings in IE"
 | 
	
		
			
				|  |  |  src="http://tor.eff.org/img/screenshot-win32-ie-proxies.jpg" />
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  <p>Using privoxy is <strong>necessary</strong> because <a
 | 
	
		
			
				|  |  |  href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">browsers
 | 
	
		
			
				|  |  | -leak your
 | 
	
		
			
				|  |  | -DNS requests when they use a SOCKS proxy directly</a>, which is bad for
 | 
	
		
			
				|  |  | -your anonymity. Privoxy also removes certain dangerous headers from your
 | 
	
		
			
				|  |  | -web requests, and blocks obnoxious ad sites like Doubleclick.</p>
 | 
	
		
			
				|  |  | +leak your DNS requests when they use a SOCKS proxy directly</a>, which
 | 
	
		
			
				|  |  | +is bad for your anonymity. Privoxy also removes certain dangerous
 | 
	
		
			
				|  |  | +headers from your web requests, and blocks obnoxious ad sites like
 | 
	
		
			
				|  |  | +Doubleclick.</p>
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +<p>To Torify other applications that support HTTP proxies, just
 | 
	
		
			
				|  |  | +point them at Privoxy (that is, localhost port 8118). To use SOCKS
 | 
	
		
			
				|  |  | +directly (for instant messaging, Jabber, IRC, etc), you can point
 | 
	
		
			
				|  |  | +your application directly at Tor (localhost port 9050), but see <a
 | 
	
		
			
				|  |  | +href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this
 | 
	
		
			
				|  |  | +FAQ entry</a> for why this may be dangerous. For applications
 | 
	
		
			
				|  |  | +that support neither SOCKS nor HTTP, take a look at <a
 | 
	
		
			
				|  |  | +href="http://www.socks.permeo.com/Download/SocksCapDownload/index.asp">SocksCap</a>,
 | 
	
		
			
				|  |  | +<a href="http://www.freecap.ru/eng/">FreeCap</a>, or the <a
 | 
	
		
			
				|  |  | +href="http://www.hummingbird.com/products/nc/socks/index.html?cks=y">Hummingbird</a>
 | 
	
		
			
				|  |  | +SOCKS client. (FreeCap is free software; the others are proprietary.)</p>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -<p>To test if it's working, you need to know your normal IP address so you can
 | 
	
		
			
				|  |  | -verify that the address really changes when running Tor.
 | 
	
		
			
				|  |  | -Go to the Start menu, click Run and enter <tt>cmd</tt>.
 | 
	
		
			
				|  |  | -At the command prompt, enter <tt>ipconfig /a</tt>. If you are behind a NAT/Firewall/Router
 | 
	
		
			
				|  |  | -you can use one of the sites listed below to check which IP you are using.
 | 
	
		
			
				|  |  | -When that is done, clear your browser's cache, start Tor and Privoxy and visit any of the sites again.
 | 
	
		
			
				|  |  | -If everything works, your IP address should have changed.
 | 
	
		
			
				|  |  | +<p>For information on how to Torify other applications, check out the
 | 
	
		
			
				|  |  | +<a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify
 | 
	
		
			
				|  |  | +HOWTO</a>.
 | 
	
		
			
				|  |  |  </p>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | +<a name="verify"></a>
 | 
	
		
			
				|  |  | +<h2>Step Four: Make sure it's working</h2>
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  |  <p>
 | 
	
		
			
				|  |  | -<!--<a href="http://peertech.org/privacy-knoppix/">peertech</a>, -->
 | 
	
		
			
				|  |  |  <a href="http://ipid.shat.net">ipid.shat.net</a> and
 | 
	
		
			
				|  |  |  <a href="http://www.showmyip.com/">showmyip.com</a>
 | 
	
		
			
				|  |  | -are sites that show your current IP so you can see
 | 
	
		
			
				|  |  | -what address and country you're coming from.
 | 
	
		
			
				|  |  | +are sites that show what IP address and country you appear to be coming
 | 
	
		
			
				|  |  | +from.
 | 
	
		
			
				|  |  |  </p>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -<p>
 | 
	
		
			
				|  |  | -If you have a personal firewall that limits your computer's ability
 | 
	
		
			
				|  |  | -to connect to itself, be sure to allow connections from your local
 | 
	
		
			
				|  |  | -applications to
 | 
	
		
			
				|  |  | -local port 8118 and port 9050. If your firewall blocks outgoing connections,
 | 
	
		
			
				|  |  | -punch a hole so it can connect to at least TCP ports 80, 443, and 9001-9033.
 | 
	
		
			
				|  |  | -For more troubleshooting suggestions, see <a
 | 
	
		
			
				|  |  | -href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">the FAQ</a>.
 | 
	
		
			
				|  |  | -</p>
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -<p>To Torify another application that supports HTTP, just point it at Privoxy
 | 
	
		
			
				|  |  | -(that is, localhost port 8118). To use SOCKS directly (for example, for
 | 
	
		
			
				|  |  | -instant messaging, Jabber, IRC, etc), point your application directly at
 | 
	
		
			
				|  |  | -Tor (localhost port 9050). For applications that support neither SOCKS
 | 
	
		
			
				|  |  | -nor HTTP, take a look at <a
 | 
	
		
			
				|  |  | -href="http://www.socks.permeo.com/Download/SocksCapDownload/index.asp">SocksCap</a>,
 | 
	
		
			
				|  |  | -<a href="http://www.freecap.ru/eng/">FreeCap</a>,
 | 
	
		
			
				|  |  | -or the <a
 | 
	
		
			
				|  |  | -href="http://www.hummingbird.com/products/nc/socks/index.html?cks=y">Hummingbird</a>
 | 
	
		
			
				|  |  | -SOCKS client. (FreeCap is free software; the others are proprietary.)<br />
 | 
	
		
			
				|  |  | -For more information how to Torify other applications in detail visit
 | 
	
		
			
				|  |  | -the <a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify HOWTO</a>.
 | 
	
		
			
				|  |  | +<p>If you don't know your current public IP address, this may not be a
 | 
	
		
			
				|  |  | +very useful test. To learn your IP address, go to the Start menu, click
 | 
	
		
			
				|  |  | +Run and enter <tt>cmd</tt>. At the command prompt, enter <tt>ipconfig
 | 
	
		
			
				|  |  | +/a</tt>. If you are behind a NAT or firewall, though, you won't be able
 | 
	
		
			
				|  |  | +to learn your public IP address. In this case, you should 1) configure
 | 
	
		
			
				|  |  | +your browser to connect directly (that is, stop using Privoxy), 2) check
 | 
	
		
			
				|  |  | +your IP address with one of the sites above, 3) point your browser back
 | 
	
		
			
				|  |  | +to Privoxy, and 4) see whether your IP address has changed.
 | 
	
		
			
				|  |  | +</p>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -<p>If you have suggestions for improving this document, please <a
 | 
	
		
			
				|  |  | -href="mailto:tor-bugs@freehaven.net">send them to us</a>. Thanks!</p>
 | 
	
		
			
				|  |  | +<p> If you have a personal firewall that limits your computer's
 | 
	
		
			
				|  |  | +ability to connect to itself, be sure to allow connections from
 | 
	
		
			
				|  |  | +your local applications to local port 8118 and port 9050. If
 | 
	
		
			
				|  |  | +your firewall blocks outgoing connections, punch a hole so
 | 
	
		
			
				|  |  | +it can connect to at least TCP ports 80 and 443, and then see <a
 | 
	
		
			
				|  |  | +href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this
 | 
	
		
			
				|  |  | +FAQ entry</a>.
 | 
	
		
			
				|  |  | +</p>
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +<hr />
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +<p>If you have suggestions for improving this document, please post
 | 
	
		
			
				|  |  | +them on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in the
 | 
	
		
			
				|  |  | +website category. Thanks!</p>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  <p>$Id$</p>
 | 
	
		
			
				|  |  |  </body>
 | 
	
		
			
				|  |  |  </html>
 | 
	
		
			
				|  |  | +
 |