From aa48b9603670ef98f7d16a2bbdfb6873bac2db59 Mon Sep 17 00:00:00 2001
From: Roger Dingledine
The latest stable release of Tor for Windows 32 is 0.0.9.1.
+href="http://tor.eff.org/dist/win32/tor-0.0.9.1-win32.exe">0.0.9.1.
Download it by clicking the link. You may be able to find experimental versions
-here, if you're looking for
+here, if you're looking for
new features and new bugs.
Running Tor on Win32
+Running Tor on Win32
Step One: Download and Install Tor
By default, Tor is not configured to run at startup. @@ -37,7 +37,7 @@ Be sure to leave the other boxes checked.
Once the installer is finished, it will run Tor in a DOS window so you can see its logs and errors. (You can minimize this window, but do @@ -45,7 +45,7 @@ not close it.)
Tor comes configured as a client by default. It uses a built-in default configuration file, and most people won't need to change any of @@ -63,7 +63,7 @@ appear in your system tray as a "P" in a circle, as pictured below:
You need to configure Privoxy to use Tor. Open Privoxy's main config file by selecting it from Start Menu|All @@ -71,7 +71,7 @@ Programs:
Add the line
forward-socks4a / localhost:9050 .
@@ -81,7 +81,7 @@ the file. Be sure to save.
Using privoxy is necessary because browsers leak your +href="http://tor.eff.org/cvs/tor/doc/CLIENTS">browsers leak your DNS requests when they use a SOCKS proxy directly, which is bad for your anonymity. Privoxy also removes certain dangerous headers from your web requests, and blocks obnoxious ad sites like Doubleclick.
diff --git a/doc/tor-doc.html b/doc/tor-doc.html index 9491d12ca0..ea9d6000ba 100644 --- a/doc/tor-doc.html +++ b/doc/tor-doc.html @@ -9,7 +9,7 @@ -Tor provides a distributed network of servers ("onion routers"). Users bounce their communications (web requests, IM, IRC, SSH, etc.) around @@ -159,7 +159,7 @@ installing, configuring, and using Tor on Win32.
You can get the latest releases here.
+href="http://tor.eff.org/dist/">here.If you got Tor from a tarball, unpack it: tar xzf tor-0.0.9.1.tar.gz; cd tor-0.0.9.1. Run ./configure, then @@ -191,7 +191,7 @@ top). Then change your browser to http proxy at localhost port 8118. (In Mozilla, this is in Edit|Preferences|Advanced|Proxies.) You should also set your SSL proxy to the same thing, to hide your SSL traffic. Using privoxy is necessary because -Mozilla leaks your +Mozilla leaks your DNS requests when it uses a SOCKS proxy directly. Privoxy also gives you good html scrubbing.
diff --git a/tor.spec.in b/tor.spec.in index 047bba1d9f..a8c100d90f 100644 --- a/tor.spec.in +++ b/tor.spec.in @@ -6,7 +6,7 @@ # This should be incremented whenever the spec file changes, but # can drop back to zero at a new Tor version -%define specver 3 +%define specver 0 ## Things users may want to change # @@ -95,7 +95,7 @@ Version: %{version} Release: %{release} Summary: Anonymizing overlay network for TCP (The onion router) -URL: http://freehaven.net/%{name}/ +URL: http://tor.eff.org/ Group: System Environment/Daemons License: BSD-like @@ -107,7 +107,7 @@ BuildRequires: openssl-devel >= 0.9.6, rpm-build >= 4.0 Requires(pre): shadow-utils, /usr/bin/id, /bin/date, /bin/sh Requires(pre): %{_sbindir}/useradd, %{_sbindir}/groupadd -Source0: http://freehaven.net/%{name}/dist/%{name}-%{native_version}.tar.gz +Source0: http://tor.eff.org/dist/%{name}-%{native_version}.tar.gz BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root