Date: Wed, 3 Feb 2010 21:00:25 GMT From: Rene Ladan <rene@FreeBSD.org> To: Perforce Change Reviews <perforce@FreeBSD.org> Subject: PERFORCE change 174269 for review Message-ID: <201002032100.o13L0P4R019869@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
http://p4web.freebsd.org/chv.cgi?CH=174269 Change 174269 by rene@rene_self on 2010/02/03 21:00:16 IFC Affected files ... .. //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml#8 integrate .. //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2007/meetbsd/brueffer-torprvacy.sbv#2 integrate .. //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2007/nycbsdcon/dixon-bsdisdying.sbv#2 integrate .. //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2009/asiabsdcon/allman-internetmail.sbv#2 integrate .. //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/l10n/chapter.sgml#15 integrate .. //depot/projects/docproj_nl/share/pgpkeys/rpaulo.key#2 integrate .. //depot/projects/docproj_nl/www/en/donations/donors.sgml#24 integrate .. //depot/projects/docproj_nl/www/share/sgml/news.xml#65 integrate Differences ... ==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml#8 (text+ko) ==== @@ -1,7 +1,7 @@ <!-- The FreeBSD Documentation Project - $FreeBSD: doc/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml,v 1.22 2009/11/17 21:50:11 bcr Exp $ + $FreeBSD: doc/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml,v 1.23 2010/02/02 20:06:34 manolis Exp $ --> <chapter id="virtualization"> @@ -989,10 +989,10 @@ <title>Installing &virtualbox;</title> <para><application>&virtualbox;</application> is available as a &os; port - in <filename role="package">emulators/virtualbox</filename>, and + in <filename role="package">emulators/virtualbox-ose</filename>, and may be installed using the following commands:</para> - <screen>&prompt.root; <userinput>cd /usr/ports/emulators/virtualbox</userinput> + <screen>&prompt.root; <userinput>cd /usr/ports/emulators/virtualbox-ose</userinput> &prompt.root; <userinput>make install clean</userinput></screen> <para>One useful option in the configuration dialog is the @@ -1017,9 +1017,14 @@ <programlisting>vboxdrv_load="YES"</programlisting> - <para><application>&virtualbox;</application> also requires the - <filename class="directory">proc</filename> file system to be - mounted:</para> + <para>Versions of <application>&virtualbox;</application> prior to 3.1.2 + require the <filename class="directory">proc</filename> file system + to be mounted. This is not needed in recent versions, which utilize + the functions provided by the &man.sysctl.3; library.</para> + + <para>When using an older version of the port, follow the instructions + below to make sure <filename class="directory">proc</filename> is + mounted properly:</para> <screen>&prompt.root; <userinput>mount -t procfs proc /proc</userinput></screen> ==== //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2007/meetbsd/brueffer-torprvacy.sbv#2 (text+ko) ==== @@ -1,6 +1,6 @@ 0:00:09.649,0:00:15.249 Fortunately my slide will be centered, because -I'll have to change resolutions, I think this works out.. +I'll have to change resolutions. I think this works out... 0:00:15.249,0:00:19.310 And, it's about protecting your privacy with FreeBSD and Tor @@ -9,10 +9,10 @@ and, uh... 0:00:20.859,0:00:21.480 -Privacy +Privacy. 0:00:21.480,0:00:25.859 -what I mean here is mostly anonymity +What I mean here is mostly anonymity 0:00:25.859,0:00:28.889 but there are some other aspects that @@ -27,10 +27,10 @@ I want to first talk about who needs anonimity anyway 0:00:39.500,0:00:42.880 -is it just for criminals or some other bad guys, right? +Is it just for criminals or some other bad guys, right? 0:00:42.880,0:00:44.209 -after this +After this 0:00:44.209,0:00:50.940 anonymization concepts, then Tor. Tor's a, well, a tool @@ -52,7 +52,7 @@ when you want to be anonymous on the Web or the Internet 0:01:06.070,0:01:06.650 -and uh, +And uh, 0:01:06.650,0:01:12.280 if time permits I'd like to do a little demonstration @@ -79,16 +79,16 @@ when the military coup was going on 0:01:32.510,0:01:38.150 -and the journalists in Thailand couldn't really uh, +and the journalists in Thailand couldn't really uh 0:01:38.150,0:01:39.830 -journalists couldn't really, uh +Journalists couldn't really, uh 0:01:39.830,0:01:43.050 get the information they needed to do their work 0:01:43.050,0:01:45.750 -also, uh, informants +Also, uh, informants 0:01:45.750,0:01:49.100 whistleblowers... people who want to tell you about @@ -100,7 +100,7 @@ and don't want to lose their job for it... Dissidents 0:01:56.460,0:01:58.250 -uh, best case +Uh, best case 0:01:58.250,0:02:01.610 when in Myanmar @@ -109,19 +109,19 @@ last few weeks ago 0:02:03.750,0:02:05.290 -when the +When the 0:02:05.290,0:02:07.649 all the Buddhists monks were going to the streets and uh, 0:02:07.649,0:02:09.879 -the Internet was totally censored +the Internet was heavily censored 0:02:09.879,0:02:14.899 -it was really dangerous to do anything on the Internet +It was really dangerous to do anything on the Internet 0:02:14.899,0:02:17.719 -so, so umm +So, so umm 0:02:17.719,0:02:20.489 socialy sensitive information, like when you want to uh, @@ -140,7 +140,7 @@ as it will be very embarrassing 0:02:31.840,0:02:33.779 -also Law Enforcement, ah +Also Law Enforcement, ah 0:02:33.779,0:02:38.579 for example, uh, when you want to set up a @@ -149,7 +149,7 @@ an anonymous tipline for crime reporting 0:02:41.669,0:02:45.810 -and uh, also companies that want to, uh +And uh, also companies that want to, uh 0:02:45.810,0:02:48.079 research competition, as one case that, uh @@ -192,7 +192,7 @@ anonymization research. 0:03:24.319,0:03:26.169 -and maybe you +And maybe you 0:03:26.169,0:03:28.799 may have heard of the European Union @@ -201,7 +201,7 @@ Data Retention Directive? 0:03:30.349,0:03:33.039 -where, umm +Where, umm 0:03:33.039,0:03:35.739 collection data gets stored @@ -217,7 +217,7 @@ the law was passed in Germany 0:03:47.729,0:03:48.900 -so, uh +So, uh 0:03:48.900,0:03:50.450 from first January on, @@ -235,7 +235,7 @@ by providers for six months 0:04:00.449,0:04:02.510 -and, uh, +And, uh, 0:04:02.510,0:04:05.379 sooner or later it's going to be in Poland as well @@ -244,16 +244,16 @@ [talking] 0:04:07.689,0:04:14.689 -well, you're part of the Euro Union now, so ah, welcome! +Well, you're part of the Euro Union now, so ah, welcome! 0:04:16.989,0:04:18.529 -okay, uh +Okay, uh 0:04:18.529,0:04:21.220 that's a 0:04:21.220,0:04:27.110 -maybe you want to hide what interests you have and uh, +Maybe you want to hide what interests you have and uh, who you talk to, I mean uh, 0:04:27.110,0:04:30.889 @@ -267,15 +267,15 @@ if they bother to find out 0:04:37.780,0:04:40.709 -yeah, and also +Yeah, and also 0:04:40.709,0:04:46.279 -criminals, but um, they already do illegal stuff and they +criminals, but they already do illegal stuff and they don't care about 0:04:46.279,0:04:51.629 doing more illegal stuff to stay anonymous, right? They can -uh, steal people's identities, they can rent botnets or +steal people's identities, they can rent botnets or create them in the first place 0:04:51.629,0:04:53.829 @@ -289,7 +289,7 @@ no big deal 0:04:59.689,0:05:02.029 -so, uh +So, uh 0:05:02.029,0:05:05.199 Criminals already do this and uh, @@ -322,7 +322,7 @@ stay anonymous on your own 0:05:25.930,0:05:28.999 -you needs the help of more people +you need the help of more people 0:05:28.999,0:05:30.559 and uh, @@ -339,12 +339,8 @@ 0:05:40.979,0:05:42.949 anonymization concepts -0:05:42.949,0:05:44.539 -uh huh - 0:05:44.539,0:05:51.539 Proxy? Everyone here probably knows how a proxy works, -uh yeah 0:05:52.559,0:05:53.169 LANs connect to the proxy and request @@ -355,14 +351,8 @@ 0:05:57.290,0:06:00.359 just passes it on and pass through -0:06:00.359,0:06:03.789 -right - -0:06:03.789,0:06:04.680 -um - 0:06:04.680,0:06:09.329 -Proxys are fast and simple but it's a single point of +Proxys are fast and simple but it's really a single point of failure, like uh, 0:06:09.329,0:06:13.139 @@ -379,52 +369,52 @@ break into the computer room or whatever 0:06:22.440,0:06:26.400 -it's pretty easy +It's pretty easy 0:06:26.400,0:06:30.050 -Second anonymization concept is mixed, +Second anonymization concept is MIX, 0:06:30.050,0:06:32.549 it's really old from nineteen eighty one 0:06:32.549,0:06:35.099 -so you can see, uh, +So you can see, uh, 0:06:35.099,0:06:41.150 how long the research in this area is going on 0:06:41.150,0:06:43.150 -the mix is kind of similar to a proxy +The MIX is kind of similar to a proxy 0:06:43.150,0:06:47.090 -like, trying to connect to it to send the messages +Like, trying to connect to it to send the messages 0:06:47.090,0:06:50.779 -and the mix collects them +and the MIX collects them 0:06:50.779,0:06:54.550 -and no less than um +and coalesces them 0:06:54.550,0:06:56.699 -it puts them all +Like, it puts them all 0:06:56.699,0:06:58.319 -in through different coincides and uhm, +into coming sites and uhm, 0:06:58.319,0:07:00.169 you see here it 0:07:00.169,0:07:03.849 -shuffles them and waits +shuffles them. It waits 0:07:03.849,0:07:08.930 -til there's enough data in it and just +until there's enough data in it and just 0:07:08.930,0:07:11.039 -shoves them and sends them back out so +shuffles them and sends them back out so 0:07:11.039,0:07:18.039 -um, this is to protect against correlation effects. +um, this is to protect against correlation attacks. 0:07:20.219,0:07:22.439 But second in... @@ -433,22 +423,22 @@ Oh yeah, and 0:07:23.379,0:07:27.879 -when you actually put several mixes uh +when you actually put several MIXes uh 0:07:27.879,0:07:31.259 -behind them; it's a mixed escape and uh, +behind them; it's a MIX cascade and uh, 0:07:31.259,0:07:32.149 between mixes is also 0:07:32.149,0:07:35.330 -a friction going on, uh, the first +encryption going on, uh, the first 0:07:35.330,0:07:38.349 -or the client which is +or the client which 0:07:38.349,0:07:44.069 -you could see here if this lights would be centered, uh, +you could see here if the slides would be centered, uh, 0:07:44.069,0:07:46.029 what else gets the @@ -515,10 +505,10 @@ but what's good about it it's uh 0:08:47.060,0:08:50.500 -distrinuted trust uh, +distributed trust uh, 0:08:50.500,0:08:54.940 -just one these mixes has to be secure to actually +just one these MIXes has to be secure to actually 0:08:54.940,0:08:56.840 anonymize the whole connection @@ -542,13 +532,13 @@ both these concepts 0:09:17.720,0:09:21.340 -mixes and proxies. +MIXes and proxies. 0:09:21.340,0:09:22.770 It's a TCP-Overlay network, 0:09:22.770,0:09:24.900 -means you can, uh +that means you can, uh 0:09:24.900,0:09:25.560 channel any @@ -560,29 +550,29 @@ theoretically 0:09:28.480,0:09:31.310 -uh, theoretically I will explain +Uh, theoretically I will explain 0:09:31.310,0:09:33.790 a couple of slides later 0:09:33.790,0:09:37.040 -it provides a SOCKS interface so you don't need any uh, +It provides a SOCKS interface so you don't need any uh, 0:09:37.040,0:09:42.060 special application proxies like any application that uses -SOCKS interface can just, +SOCKS interface can just 0:09:42.060,0:09:43.370 -talk to talk +talk to Tor 0:09:43.370,0:09:48.070 and it's available on, um, all major platforms 0:09:48.070,0:09:53.940 -what is uh, especially important is available in Windows +What is uh, especially important it's available in Windows 0:09:53.940,0:09:55.850 -'cause, uhm, like I said earlier once +Because, uhm, like I said earlier once 0:09:55.850,0:09:57.740 you want a really diverse, @@ -606,7 +596,7 @@ combine the positive attributes of 0:10:15.939,0:10:17.480 -proxies and mixes +proxies and MIXes 0:10:17.480,0:10:18.749 Like, proxies are fast, but @@ -615,7 +605,7 @@ seem prone to failure 0:10:20.620,0:10:21.770 -and mixes +and MIXes 0:10:21.770,0:10:24.590 distributed trust, you want to combine them @@ -624,22 +614,22 @@ so uh 0:10:29.930,0:10:31.310 -Fast, uh, Tor use not only public key +Fast, uh, Tor uses not only public key 0:10:31.310,0:10:33.220 encryption but also session keys 0:10:33.220,0:10:35.170 -symmetrically encrypted. +so it's symmetrically encrypted. 0:10:35.170,0:10:37.260 -so uh +So uh 0:10:37.260,0:10:41.710 -All the connection set up is this public key so you just, uh +all the connection set up is this public key so you just, uh 0:10:41.710,0:10:44.840 -authentication and stuff? +authentication and stuff 0:10:44.840,0:10:50.860 And uh, the actual communication that's going on later @@ -673,10 +663,10 @@ to patch his PC off the Operating System or something 0:11:12.680,0:11:16.070 -just be in a... workable state really fast +just be in a... workable state really fast. 0:11:16.070,0:11:19.340 -um, usability, +Um, usability, 0:11:19.340,0:11:20.600 so you get the uh, @@ -697,10 +687,10 @@ in this whole area. 0:11:32.010,0:11:33.059 -so, uh +So, uh 0:11:33.059,0:11:34.679 -the protocol to all users +the protocol Tor users 0:11:34.679,0:11:37.890 should be really flexible @@ -754,8 +744,8 @@ for example 0:12:30.380,0:12:34.280 -The first one is the entry node, middle LAN nodes, and the -uh exit nodes, I will leave thes for later +The first one is the entry node, middleman nodes, and the +uh exit nodes, I will leave these for later 0:12:34.280,0:12:41.000 uh, so this @@ -774,7 +764,8 @@ thing goes on 0:12:53.090,0:12:58.520 -in these two and these two so they can communicate later on +between these two and these two so they can communicate +later on 0:12:58.520,0:12:59.780 What's really important here @@ -792,10 +783,10 @@ So it has to be unencrypted 0:13:06.610,0:13:13.610 -so you can get your request through +so you can actually get your request through 0:13:20.690,0:13:22.700 -this is a virtual circuit +This is a virtual circuit 0:13:22.700,0:13:24.490 that gets established and uh @@ -810,10 +801,10 @@ a new circuit is built 0:13:32.450,0:13:37.250 -when a new website, when a new request come through, so uh +when a new website, when a new request comes through, so uh 0:13:37.250,0:13:40.080 -this one stays, all these connections above stays +this one stays, all these connections above stay 0:13:40.080,0:13:41.940 in this circuit @@ -840,13 +831,13 @@ in case one connection is compromised, for example. 0:14:00.220,0:14:01.600 -An these ten minutes +And these ten minutes 0:14:01.600,0:14:04.490 -are really an arbitrary value +are really an arbitrary value, 0:14:04.490,0:14:08.560 -,you can choose anything +you can choose anything 0:14:08.560,0:14:10.660 you have to do the research @@ -858,13 +849,13 @@ ten minutes is compromised. 0:14:19.840,0:14:22.240 -With all you get exit policies, +With Tor you get exit policies, 0:14:22.240,0:14:24.640 this is important for the exit node 0:14:24.640,0:14:27.880 -the one which actually send the uh, +the one which actually sends the uh, 0:14:27.880,0:14:30.410 original request to the destination server @@ -879,10 +870,10 @@ TCP connections you want 0:14:34.220,0:14:39.180 -to allow from your node if you want +to allow from your own node if you want 0:14:39.180,0:14:41.000 -that's default policy which uh +As default policy which uh 0:14:41.000,0:14:43.610 blocks SMTP and NNTP to prevent uh @@ -909,7 +900,7 @@ all the important stuff 0:15:01.630,0:15:05.250 -that you would want to minimize just works +that you would want to anonymize just works 0:15:05.250,0:15:10.290 and uh, if you uh @@ -918,7 +909,7 @@ this is important for uh, if you 0:15:13.050,0:15:18.540 -want to run you node, uh +want to run you own node, uh 0:15:18.540,0:15:19.220 waht kind of node you actually want to run @@ -928,7 +919,7 @@ 0:15:24.120,0:15:31.120 there's these three different nodes: entry node, -middleman note, and exit node +middleman node, and exit node 0:15:32.400,0:15:34.180 and uh, which node you want to run @@ -967,7 +958,7 @@ of the 0:16:05.340,0:16:11.230 -exit node in his forum and not the one +exit node in his logs and not the one 0:16:11.230,0:16:15.330 of Alice so uh he's going to have the problems later on @@ -979,8 +970,8 @@ but you have to keep this in mind 0:16:21.600,0:16:28.600 -and uh, keep up everything and uh we can play the role of -entry nodes and middle man nodes +And uh, keep up everything and uh we can play the role of +entry nodes and middleman nodes 0:16:30.170,0:16:37.170 which is also important @@ -995,7 +986,7 @@ accessed 0:16:46.990,0:16:49.420 -without having an IP address +without having the IP address of them 0:16:49.420,0:16:50.960 so uh @@ -1004,17 +995,17 @@ you can't really find them physically 0:16:56.300,0:16:57.880 -so if you want to run a +So if you want to run a 0:16:57.880,0:16:59.720 hidden service you can do it from anywhere 0:16:59.720,0:17:01.850 -do it from inside this private network here +You can even do it from inside this private network here 0:17:01.850,0:17:05.950 -instead of a service and everyone in the outside world can -actually access it +You can set up a service and everyone in the outside world +can actually access it 0:17:05.950,0:17:07.770 even if you don't have the rights to do @@ -1029,13 +1020,13 @@ resist Denial of Service, for example 0:17:15.690,0:17:20.160 -'cause every uh, +Because every uh, 0:17:20.160,0:17:20.519 every client that wants to 0:17:20.519,0:17:22.829 -access the service uh, gets +access the service uh, 0:17:22.829,0:17:25.700 gets a different route in the network @@ -1056,7 +1047,7 @@ And the addresses look like this: 0:17:38.510,0:17:43.280 -it's really a hash of a private key +it's really a hash of a public key 0:17:43.280,0:17:47.340 and each hidden service is actually, well, identified @@ -1065,7 +1056,7 @@ by a public key 0:17:53.300,0:17:59.000 -this how it works, uhm, yet Alice the client +This how it works, uhm, yet Alice the client 0:17:59.000,0:18:02.170 and the hidden server, Bob. @@ -1090,14 +1081,14 @@ and uh he sends 0:18:22.530,0:18:26.860 -this public key into each of these three introduction +this public key and the list of three introduction points to the directory server. 0:18:26.860,0:18:28.740 Now Alice wants to uh, 0:18:28.740,0:18:31.610 -connect to Bob, but first the first thing she does +connect to Bob, the first the first thing she does 0:18:31.610,0:18:34.480 is download this @@ -1109,7 +1100,7 @@ public key from the directory server. After that, uh 0:18:50.120,0:18:54.299 -she choose one of the uh introduction points +she chooses one of the uh introduction points 0:18:54.299,0:18:55.930 and uh, @@ -1217,10 +1208,10 @@ so they can decrypt it later 0:20:42.910,0:20:47.860 -and uh, yeah, it's not... +and uh, yeah, it's not really great 0:20:47.860,0:20:50.010 -and it's actually last week was the first case +and actually last week was the first case 0:20:50.010,0:20:52.890 when this was actually used in @@ -1229,13 +1220,13 @@ Great Britain 0:20:56.600,0:21:00.720 -uh, there can be special laws like in Germany +Uh, there can be special laws like in Germany 0:21:00.720,0:21:03.480 sort of like a hacker paragraph 0:21:03.480,0:21:06.990 -just a nickname, it has some cryptic legal name +It's just a nickname, it has some cryptic legal name 0:21:06.990,0:21:07.940 uh, in reality @@ -1274,7 +1265,7 @@ restrict anything. From a map to a 0:21:36.669,0:21:39.210 -to God know what? Network tools. +to God know what Network tools. 0:21:39.210,0:21:40.880 and uh @@ -1303,7 +1294,7 @@ and uh, the biggest Tor 0:22:00.990,0:22:02.250 -problems +problem is 0:22:02.250,0:22:07.480 that, uh @@ -1375,13 +1366,13 @@ that's random stuff that can happen 0:22:55.530,0:22:56.540 -though, uh, +So uh, 0:22:56.540,0:22:59.559 as an exit nodes provider you can get 0:22:59.559,0:23:03.690 -letters from Law Enforcement entities, and uh +letters from Law Enforcement agencies, and uh 0:23:03.690,0:23:05.649 What are you doing there? @@ -1393,7 +1384,7 @@ And you have to explain to them that you are 0:23:10.040,0:23:12.260 -providing Tor server +providing Tor server and 0:23:12.260,0:23:13.980 it wasn't you @@ -1429,7 +1420,7 @@ depends on what kind of guy you're actually talking to 0:23:41.440,0:23:47.120 -So what's... what kind of role plays FreeBSD here? +So what's... What kind of role plays FreeBSD here? 0:23:47.120,0:23:51.880 uh, FreeBSD is really well suited as a Tor node, uh @@ -1445,7 +1436,7 @@ and it shouldn't matter 0:23:59.150,0:24:00.830 -There's one of the, uh +This is one of the, uh 0:24:00.830,0:24:03.130 like I said earlier one of the design @@ -1463,7 +1454,7 @@ as actually uh, 0:24:14.290,0:24:17.320 -the security of other depends on your node +the security of others depends on your node 0:24:17.320,0:24:20.690 and uh, @@ -1493,7 +1484,7 @@ there's also audit 0:24:39.390,0:24:40.740 -and the mac framework +and the MAC framework 0:24:40.740,0:24:43.780 when you want to run your installation @@ -1520,16 +1511,16 @@ Well maintained Tor-related ports. 0:25:04.060,0:25:07.390 -There is the main port, security Tor +There is the main port, security/Tor 0:25:07.390,0:25:11.370 -Which is a client and server if you want to run +Which is a client and server if you want to run 0:25:11.370,0:25:13.610 a network node, or just a client. 0:25:13.610,0:25:15.210 -There's Tor level +There's tor-devel 0:25:15.210,0:25:16.450 and these are really up to date, uhm @@ -1538,7 +1529,7 @@ Tor development happens really fast 0:25:22.830,0:25:23.710 -and ports get updated +and the ports get updated 0:25:23.710,0:25:30.710 pretty soon after a release is made. @@ -1549,7 +1540,7 @@ 0:25:41.320,0:25:44.310 And there's net management Vidalia which is a -graphical content +graphical frontend 0:25:44.310,0:25:47.200 also for Windows @@ -1558,7 +1549,7 @@ and, uhm 0:25:48.260,0:25:53.929 -there's trans-proxy Tor +there's trans-proxy-tor 0:25:53.929,0:25:58.650 which enables you to actually @@ -1576,10 +1567,10 @@ that makes it hard for Tor to 0:26:07.510,0:26:08.860 -run with them +anonymize them 0:26:08.860,0:26:10.810 -and you can use trans-proxy Tor +and you can use trans-proxy-tor 0:26:10.810,0:26:15.510 to tunnel such connections through the Tor network. @@ -1601,7 +1592,7 @@ bypass the configured proxy 0:26:30.500,0:26:34.500 -for example FireFox versions below version 1.5, +for example Firefox versions below version 1.5, 0:26:34.500,0:26:35.700 which send every data, @@ -1703,7 +1694,7 @@ And it's really surprising how many people uh, do this. 0:28:13.450,0:28:16.700 -So, lesson learned: use secure protocol. +So, lesson learned: use secure protocols. 0:28:16.700,0:28:18.220 There are also other services that require @@ -1742,13 +1733,14 @@ Privoxy on this system 0:29:24.810,0:29:27.180 -the config files are on the usual places. +Config files are on the usual places. 0:29:27.180,0:29:34.180 -And if you read this, this little.. small.. Is this alright? +And if you read this, this little... small... +Is this alright? 0:29:46.950,0:29:50.600 -So there is this Tor I see sample file +So there is this torrc sample file 0:29:50.600,0:29:57.600 which we can use @@ -1772,7 +1764,7 @@ SOCKS port and SOCKS listen address information 0:30:24.220,0:30:31.220 -that's the +that just 0:30:32.770,0:30:34.659 tells you where to connect your uh, @@ -1818,7 +1810,7 @@ Privoxy uh, 0:31:33.809,0:31:40.809 -where to send connections requests. +where to send connection requests. 0:31:51.740,0:31:53.659 Ok, I've actually entered this earlier @@ -1839,19 +1831,19 @@ So we just start 0:32:34.120,0:32:38.870 -Ok, so we all set +Ok, so we are all set 0:32:38.870,0:32:40.480 Now we can just do 0:32:40.480,0:32:47.480 -everything with our brother +everything with our browser 0:32:50.790,0:32:52.029 -we all started times +Startup time sucks a bit >>> TRUNCATED FOR MAIL (1000 lines) <<<
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201002032100.o13L0P4R019869>