PERFORCE change 174269 for review
Rene Ladan
rene at FreeBSD.org
Wed Feb 3 21:00:26 UTC 2010
http://p4web.freebsd.org/chv.cgi?CH=174269
Change 174269 by rene at rene_self on 2010/02/03 21:00:16
IFC
Affected files ...
.. //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml#8 integrate
.. //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2007/meetbsd/brueffer-torprvacy.sbv#2 integrate
.. //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2007/nycbsdcon/dixon-bsdisdying.sbv#2 integrate
.. //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2009/asiabsdcon/allman-internetmail.sbv#2 integrate
.. //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/l10n/chapter.sgml#15 integrate
.. //depot/projects/docproj_nl/share/pgpkeys/rpaulo.key#2 integrate
.. //depot/projects/docproj_nl/www/en/donations/donors.sgml#24 integrate
.. //depot/projects/docproj_nl/www/share/sgml/news.xml#65 integrate
Differences ...
==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml#8 (text+ko) ====
@@ -1,7 +1,7 @@
<!--
The FreeBSD Documentation Project
- $FreeBSD: doc/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml,v 1.22 2009/11/17 21:50:11 bcr Exp $
+ $FreeBSD: doc/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml,v 1.23 2010/02/02 20:06:34 manolis Exp $
-->
<chapter id="virtualization">
@@ -989,10 +989,10 @@
<title>Installing &virtualbox;</title>
<para><application>&virtualbox;</application> is available as a &os; port
- in <filename role="package">emulators/virtualbox</filename>, and
+ in <filename role="package">emulators/virtualbox-ose</filename>, and
may be installed using the following commands:</para>
- <screen>&prompt.root; <userinput>cd /usr/ports/emulators/virtualbox</userinput>
+ <screen>&prompt.root; <userinput>cd /usr/ports/emulators/virtualbox-ose</userinput>
&prompt.root; <userinput>make install clean</userinput></screen>
<para>One useful option in the configuration dialog is the
@@ -1017,9 +1017,14 @@
<programlisting>vboxdrv_load="YES"</programlisting>
- <para><application>&virtualbox;</application> also requires the
- <filename class="directory">proc</filename> file system to be
- mounted:</para>
+ <para>Versions of <application>&virtualbox;</application> prior to 3.1.2
+ require the <filename class="directory">proc</filename> file system
+ to be mounted. This is not needed in recent versions, which utilize
+ the functions provided by the &man.sysctl.3; library.</para>
+
+ <para>When using an older version of the port, follow the instructions
+ below to make sure <filename class="directory">proc</filename> is
+ mounted properly:</para>
<screen>&prompt.root; <userinput>mount -t procfs proc /proc</userinput></screen>
==== //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2007/meetbsd/brueffer-torprvacy.sbv#2 (text+ko) ====
@@ -1,6 +1,6 @@
0:00:09.649,0:00:15.249
Fortunately my slide will be centered, because
-I'll have to change resolutions, I think this works out..
+I'll have to change resolutions. I think this works out...
0:00:15.249,0:00:19.310
And, it's about protecting your privacy with FreeBSD and Tor
@@ -9,10 +9,10 @@
and, uh...
0:00:20.859,0:00:21.480
-Privacy
+Privacy.
0:00:21.480,0:00:25.859
-what I mean here is mostly anonymity
+What I mean here is mostly anonymity
0:00:25.859,0:00:28.889
but there are some other aspects that
@@ -27,10 +27,10 @@
I want to first talk about who needs anonimity anyway
0:00:39.500,0:00:42.880
-is it just for criminals or some other bad guys, right?
+Is it just for criminals or some other bad guys, right?
0:00:42.880,0:00:44.209
-after this
+After this
0:00:44.209,0:00:50.940
anonymization concepts, then Tor. Tor's a, well, a tool
@@ -52,7 +52,7 @@
when you want to be anonymous on the Web or the Internet
0:01:06.070,0:01:06.650
-and uh,
+And uh,
0:01:06.650,0:01:12.280
if time permits I'd like to do a little demonstration
@@ -79,16 +79,16 @@
when the military coup was going on
0:01:32.510,0:01:38.150
-and the journalists in Thailand couldn't really uh,
+and the journalists in Thailand couldn't really uh
0:01:38.150,0:01:39.830
-journalists couldn't really, uh
+Journalists couldn't really, uh
0:01:39.830,0:01:43.050
get the information they needed to do their work
0:01:43.050,0:01:45.750
-also, uh, informants
+Also, uh, informants
0:01:45.750,0:01:49.100
whistleblowers... people who want to tell you about
@@ -100,7 +100,7 @@
and don't want to lose their job for it... Dissidents
0:01:56.460,0:01:58.250
-uh, best case
+Uh, best case
0:01:58.250,0:02:01.610
when in Myanmar
@@ -109,19 +109,19 @@
last few weeks ago
0:02:03.750,0:02:05.290
-when the
+When the
0:02:05.290,0:02:07.649
all the Buddhists monks were going to the streets and uh,
0:02:07.649,0:02:09.879
-the Internet was totally censored
+the Internet was heavily censored
0:02:09.879,0:02:14.899
-it was really dangerous to do anything on the Internet
+It was really dangerous to do anything on the Internet
0:02:14.899,0:02:17.719
-so, so umm
+So, so umm
0:02:17.719,0:02:20.489
socialy sensitive information, like when you want to uh,
@@ -140,7 +140,7 @@
as it will be very embarrassing
0:02:31.840,0:02:33.779
-also Law Enforcement, ah
+Also Law Enforcement, ah
0:02:33.779,0:02:38.579
for example, uh, when you want to set up a
@@ -149,7 +149,7 @@
an anonymous tipline for crime reporting
0:02:41.669,0:02:45.810
-and uh, also companies that want to, uh
+And uh, also companies that want to, uh
0:02:45.810,0:02:48.079
research competition, as one case that, uh
@@ -192,7 +192,7 @@
anonymization research.
0:03:24.319,0:03:26.169
-and maybe you
+And maybe you
0:03:26.169,0:03:28.799
may have heard of the European Union
@@ -201,7 +201,7 @@
Data Retention Directive?
0:03:30.349,0:03:33.039
-where, umm
+Where, umm
0:03:33.039,0:03:35.739
collection data gets stored
@@ -217,7 +217,7 @@
the law was passed in Germany
0:03:47.729,0:03:48.900
-so, uh
+So, uh
0:03:48.900,0:03:50.450
from first January on,
@@ -235,7 +235,7 @@
by providers for six months
0:04:00.449,0:04:02.510
-and, uh,
+And, uh,
0:04:02.510,0:04:05.379
sooner or later it's going to be in Poland as well
@@ -244,16 +244,16 @@
[talking]
0:04:07.689,0:04:14.689
-well, you're part of the Euro Union now, so ah, welcome!
+Well, you're part of the Euro Union now, so ah, welcome!
0:04:16.989,0:04:18.529
-okay, uh
+Okay, uh
0:04:18.529,0:04:21.220
that's a
0:04:21.220,0:04:27.110
-maybe you want to hide what interests you have and uh,
+Maybe you want to hide what interests you have and uh,
who you talk to, I mean uh,
0:04:27.110,0:04:30.889
@@ -267,15 +267,15 @@
if they bother to find out
0:04:37.780,0:04:40.709
-yeah, and also
+Yeah, and also
0:04:40.709,0:04:46.279
-criminals, but um, they already do illegal stuff and they
+criminals, but they already do illegal stuff and they
don't care about
0:04:46.279,0:04:51.629
doing more illegal stuff to stay anonymous, right? They can
-uh, steal people's identities, they can rent botnets or
+steal people's identities, they can rent botnets or
create them in the first place
0:04:51.629,0:04:53.829
@@ -289,7 +289,7 @@
no big deal
0:04:59.689,0:05:02.029
-so, uh
+So, uh
0:05:02.029,0:05:05.199
Criminals already do this and uh,
@@ -322,7 +322,7 @@
stay anonymous on your own
0:05:25.930,0:05:28.999
-you needs the help of more people
+you need the help of more people
0:05:28.999,0:05:30.559
and uh,
@@ -339,12 +339,8 @@
0:05:40.979,0:05:42.949
anonymization concepts
-0:05:42.949,0:05:44.539
-uh huh
-
0:05:44.539,0:05:51.539
Proxy? Everyone here probably knows how a proxy works,
-uh yeah
0:05:52.559,0:05:53.169
LANs connect to the proxy and request
@@ -355,14 +351,8 @@
0:05:57.290,0:06:00.359
just passes it on and pass through
-0:06:00.359,0:06:03.789
-right
-
-0:06:03.789,0:06:04.680
-um
-
0:06:04.680,0:06:09.329
-Proxys are fast and simple but it's a single point of
+Proxys are fast and simple but it's really a single point of
failure, like uh,
0:06:09.329,0:06:13.139
@@ -379,52 +369,52 @@
break into the computer room or whatever
0:06:22.440,0:06:26.400
-it's pretty easy
+It's pretty easy
0:06:26.400,0:06:30.050
-Second anonymization concept is mixed,
+Second anonymization concept is MIX,
0:06:30.050,0:06:32.549
it's really old from nineteen eighty one
0:06:32.549,0:06:35.099
-so you can see, uh,
+So you can see, uh,
0:06:35.099,0:06:41.150
how long the research in this area is going on
0:06:41.150,0:06:43.150
-the mix is kind of similar to a proxy
+The MIX is kind of similar to a proxy
0:06:43.150,0:06:47.090
-like, trying to connect to it to send the messages
+Like, trying to connect to it to send the messages
0:06:47.090,0:06:50.779
-and the mix collects them
+and the MIX collects them
0:06:50.779,0:06:54.550
-and no less than um
+and coalesces them
0:06:54.550,0:06:56.699
-it puts them all
+Like, it puts them all
0:06:56.699,0:06:58.319
-in through different coincides and uhm,
+into coming sites and uhm,
0:06:58.319,0:07:00.169
you see here it
0:07:00.169,0:07:03.849
-shuffles them and waits
+shuffles them. It waits
0:07:03.849,0:07:08.930
-til there's enough data in it and just
+until there's enough data in it and just
0:07:08.930,0:07:11.039
-shoves them and sends them back out so
+shuffles them and sends them back out so
0:07:11.039,0:07:18.039
-um, this is to protect against correlation effects.
+um, this is to protect against correlation attacks.
0:07:20.219,0:07:22.439
But second in...
@@ -433,22 +423,22 @@
Oh yeah, and
0:07:23.379,0:07:27.879
-when you actually put several mixes uh
+when you actually put several MIXes uh
0:07:27.879,0:07:31.259
-behind them; it's a mixed escape and uh,
+behind them; it's a MIX cascade and uh,
0:07:31.259,0:07:32.149
between mixes is also
0:07:32.149,0:07:35.330
-a friction going on, uh, the first
+encryption going on, uh, the first
0:07:35.330,0:07:38.349
-or the client which is
+or the client which
0:07:38.349,0:07:44.069
-you could see here if this lights would be centered, uh,
+you could see here if the slides would be centered, uh,
0:07:44.069,0:07:46.029
what else gets the
@@ -515,10 +505,10 @@
but what's good about it it's uh
0:08:47.060,0:08:50.500
-distrinuted trust uh,
+distributed trust uh,
0:08:50.500,0:08:54.940
-just one these mixes has to be secure to actually
+just one these MIXes has to be secure to actually
0:08:54.940,0:08:56.840
anonymize the whole connection
@@ -542,13 +532,13 @@
both these concepts
0:09:17.720,0:09:21.340
-mixes and proxies.
+MIXes and proxies.
0:09:21.340,0:09:22.770
It's a TCP-Overlay network,
0:09:22.770,0:09:24.900
-means you can, uh
+that means you can, uh
0:09:24.900,0:09:25.560
channel any
@@ -560,29 +550,29 @@
theoretically
0:09:28.480,0:09:31.310
-uh, theoretically I will explain
+Uh, theoretically I will explain
0:09:31.310,0:09:33.790
a couple of slides later
0:09:33.790,0:09:37.040
-it provides a SOCKS interface so you don't need any uh,
+It provides a SOCKS interface so you don't need any uh,
0:09:37.040,0:09:42.060
special application proxies like any application that uses
-SOCKS interface can just,
+SOCKS interface can just
0:09:42.060,0:09:43.370
-talk to talk
+talk to Tor
0:09:43.370,0:09:48.070
and it's available on, um, all major platforms
0:09:48.070,0:09:53.940
-what is uh, especially important is available in Windows
+What is uh, especially important it's available in Windows
0:09:53.940,0:09:55.850
-'cause, uhm, like I said earlier once
+Because, uhm, like I said earlier once
0:09:55.850,0:09:57.740
you want a really diverse,
@@ -606,7 +596,7 @@
combine the positive attributes of
0:10:15.939,0:10:17.480
-proxies and mixes
+proxies and MIXes
0:10:17.480,0:10:18.749
Like, proxies are fast, but
@@ -615,7 +605,7 @@
seem prone to failure
0:10:20.620,0:10:21.770
-and mixes
+and MIXes
0:10:21.770,0:10:24.590
distributed trust, you want to combine them
@@ -624,22 +614,22 @@
so uh
0:10:29.930,0:10:31.310
-Fast, uh, Tor use not only public key
+Fast, uh, Tor uses not only public key
0:10:31.310,0:10:33.220
encryption but also session keys
0:10:33.220,0:10:35.170
-symmetrically encrypted.
+so it's symmetrically encrypted.
0:10:35.170,0:10:37.260
-so uh
+So uh
0:10:37.260,0:10:41.710
-All the connection set up is this public key so you just, uh
+all the connection set up is this public key so you just, uh
0:10:41.710,0:10:44.840
-authentication and stuff?
+authentication and stuff
0:10:44.840,0:10:50.860
And uh, the actual communication that's going on later
@@ -673,10 +663,10 @@
to patch his PC off the Operating System or something
0:11:12.680,0:11:16.070
-just be in a... workable state really fast
+just be in a... workable state really fast.
0:11:16.070,0:11:19.340
-um, usability,
+Um, usability,
0:11:19.340,0:11:20.600
so you get the uh,
@@ -697,10 +687,10 @@
in this whole area.
0:11:32.010,0:11:33.059
-so, uh
+So, uh
0:11:33.059,0:11:34.679
-the protocol to all users
+the protocol Tor users
0:11:34.679,0:11:37.890
should be really flexible
@@ -754,8 +744,8 @@
for example
0:12:30.380,0:12:34.280
-The first one is the entry node, middle LAN nodes, and the
-uh exit nodes, I will leave thes for later
+The first one is the entry node, middleman nodes, and the
+uh exit nodes, I will leave these for later
0:12:34.280,0:12:41.000
uh, so this
@@ -774,7 +764,8 @@
thing goes on
0:12:53.090,0:12:58.520
-in these two and these two so they can communicate later on
+between these two and these two so they can communicate
+later on
0:12:58.520,0:12:59.780
What's really important here
@@ -792,10 +783,10 @@
So it has to be unencrypted
0:13:06.610,0:13:13.610
-so you can get your request through
+so you can actually get your request through
0:13:20.690,0:13:22.700
-this is a virtual circuit
+This is a virtual circuit
0:13:22.700,0:13:24.490
that gets established and uh
@@ -810,10 +801,10 @@
a new circuit is built
0:13:32.450,0:13:37.250
-when a new website, when a new request come through, so uh
+when a new website, when a new request comes through, so uh
0:13:37.250,0:13:40.080
-this one stays, all these connections above stays
+this one stays, all these connections above stay
0:13:40.080,0:13:41.940
in this circuit
@@ -840,13 +831,13 @@
in case one connection is compromised, for example.
0:14:00.220,0:14:01.600
-An these ten minutes
+And these ten minutes
0:14:01.600,0:14:04.490
-are really an arbitrary value
+are really an arbitrary value,
0:14:04.490,0:14:08.560
-,you can choose anything
+you can choose anything
0:14:08.560,0:14:10.660
you have to do the research
@@ -858,13 +849,13 @@
ten minutes is compromised.
0:14:19.840,0:14:22.240
-With all you get exit policies,
+With Tor you get exit policies,
0:14:22.240,0:14:24.640
this is important for the exit node
0:14:24.640,0:14:27.880
-the one which actually send the uh,
+the one which actually sends the uh,
0:14:27.880,0:14:30.410
original request to the destination server
@@ -879,10 +870,10 @@
TCP connections you want
0:14:34.220,0:14:39.180
-to allow from your node if you want
+to allow from your own node if you want
0:14:39.180,0:14:41.000
-that's default policy which uh
+As default policy which uh
0:14:41.000,0:14:43.610
blocks SMTP and NNTP to prevent uh
@@ -909,7 +900,7 @@
all the important stuff
0:15:01.630,0:15:05.250
-that you would want to minimize just works
+that you would want to anonymize just works
0:15:05.250,0:15:10.290
and uh, if you uh
@@ -918,7 +909,7 @@
this is important for uh, if you
0:15:13.050,0:15:18.540
-want to run you node, uh
+want to run you own node, uh
0:15:18.540,0:15:19.220
waht kind of node you actually want to run
@@ -928,7 +919,7 @@
0:15:24.120,0:15:31.120
there's these three different nodes: entry node,
-middleman note, and exit node
+middleman node, and exit node
0:15:32.400,0:15:34.180
and uh, which node you want to run
@@ -967,7 +958,7 @@
of the
0:16:05.340,0:16:11.230
-exit node in his forum and not the one
+exit node in his logs and not the one
0:16:11.230,0:16:15.330
of Alice so uh he's going to have the problems later on
@@ -979,8 +970,8 @@
but you have to keep this in mind
0:16:21.600,0:16:28.600
-and uh, keep up everything and uh we can play the role of
-entry nodes and middle man nodes
+And uh, keep up everything and uh we can play the role of
+entry nodes and middleman nodes
0:16:30.170,0:16:37.170
which is also important
@@ -995,7 +986,7 @@
accessed
0:16:46.990,0:16:49.420
-without having an IP address
+without having the IP address of them
0:16:49.420,0:16:50.960
so uh
@@ -1004,17 +995,17 @@
you can't really find them physically
0:16:56.300,0:16:57.880
-so if you want to run a
+So if you want to run a
0:16:57.880,0:16:59.720
hidden service you can do it from anywhere
0:16:59.720,0:17:01.850
-do it from inside this private network here
+You can even do it from inside this private network here
0:17:01.850,0:17:05.950
-instead of a service and everyone in the outside world can
-actually access it
+You can set up a service and everyone in the outside world
+can actually access it
0:17:05.950,0:17:07.770
even if you don't have the rights to do
@@ -1029,13 +1020,13 @@
resist Denial of Service, for example
0:17:15.690,0:17:20.160
-'cause every uh,
+Because every uh,
0:17:20.160,0:17:20.519
every client that wants to
0:17:20.519,0:17:22.829
-access the service uh, gets
+access the service uh,
0:17:22.829,0:17:25.700
gets a different route in the network
@@ -1056,7 +1047,7 @@
And the addresses look like this:
0:17:38.510,0:17:43.280
-it's really a hash of a private key
+it's really a hash of a public key
0:17:43.280,0:17:47.340
and each hidden service is actually, well, identified
@@ -1065,7 +1056,7 @@
by a public key
0:17:53.300,0:17:59.000
-this how it works, uhm, yet Alice the client
+This how it works, uhm, yet Alice the client
0:17:59.000,0:18:02.170
and the hidden server, Bob.
@@ -1090,14 +1081,14 @@
and uh he sends
0:18:22.530,0:18:26.860
-this public key into each of these three introduction
+this public key and the list of three introduction
points to the directory server.
0:18:26.860,0:18:28.740
Now Alice wants to uh,
0:18:28.740,0:18:31.610
-connect to Bob, but first the first thing she does
+connect to Bob, the first the first thing she does
0:18:31.610,0:18:34.480
is download this
@@ -1109,7 +1100,7 @@
public key from the directory server. After that, uh
0:18:50.120,0:18:54.299
-she choose one of the uh introduction points
+she chooses one of the uh introduction points
0:18:54.299,0:18:55.930
and uh,
@@ -1217,10 +1208,10 @@
so they can decrypt it later
0:20:42.910,0:20:47.860
-and uh, yeah, it's not...
+and uh, yeah, it's not really great
0:20:47.860,0:20:50.010
-and it's actually last week was the first case
+and actually last week was the first case
0:20:50.010,0:20:52.890
when this was actually used in
@@ -1229,13 +1220,13 @@
Great Britain
0:20:56.600,0:21:00.720
-uh, there can be special laws like in Germany
+Uh, there can be special laws like in Germany
0:21:00.720,0:21:03.480
sort of like a hacker paragraph
0:21:03.480,0:21:06.990
-just a nickname, it has some cryptic legal name
+It's just a nickname, it has some cryptic legal name
0:21:06.990,0:21:07.940
uh, in reality
@@ -1274,7 +1265,7 @@
restrict anything. From a map to a
0:21:36.669,0:21:39.210
-to God know what? Network tools.
+to God know what Network tools.
0:21:39.210,0:21:40.880
and uh
@@ -1303,7 +1294,7 @@
and uh, the biggest Tor
0:22:00.990,0:22:02.250
-problems
+problem is
0:22:02.250,0:22:07.480
that, uh
@@ -1375,13 +1366,13 @@
that's random stuff that can happen
0:22:55.530,0:22:56.540
-though, uh,
+So uh,
0:22:56.540,0:22:59.559
as an exit nodes provider you can get
0:22:59.559,0:23:03.690
-letters from Law Enforcement entities, and uh
+letters from Law Enforcement agencies, and uh
0:23:03.690,0:23:05.649
What are you doing there?
@@ -1393,7 +1384,7 @@
And you have to explain to them that you are
0:23:10.040,0:23:12.260
-providing Tor server
+providing Tor server and
0:23:12.260,0:23:13.980
it wasn't you
@@ -1429,7 +1420,7 @@
depends on what kind of guy you're actually talking to
0:23:41.440,0:23:47.120
-So what's... what kind of role plays FreeBSD here?
+So what's... What kind of role plays FreeBSD here?
0:23:47.120,0:23:51.880
uh, FreeBSD is really well suited as a Tor node, uh
@@ -1445,7 +1436,7 @@
and it shouldn't matter
0:23:59.150,0:24:00.830
-There's one of the, uh
+This is one of the, uh
0:24:00.830,0:24:03.130
like I said earlier one of the design
@@ -1463,7 +1454,7 @@
as actually uh,
0:24:14.290,0:24:17.320
-the security of other depends on your node
+the security of others depends on your node
0:24:17.320,0:24:20.690
and uh,
@@ -1493,7 +1484,7 @@
there's also audit
0:24:39.390,0:24:40.740
-and the mac framework
+and the MAC framework
0:24:40.740,0:24:43.780
when you want to run your installation
@@ -1520,16 +1511,16 @@
Well maintained Tor-related ports.
0:25:04.060,0:25:07.390
-There is the main port, security Tor
+There is the main port, security/Tor
0:25:07.390,0:25:11.370
-Which is a client and server if you want to run
+Which is a client and server if you want to run
0:25:11.370,0:25:13.610
a network node, or just a client.
0:25:13.610,0:25:15.210
-There's Tor level
+There's tor-devel
0:25:15.210,0:25:16.450
and these are really up to date, uhm
@@ -1538,7 +1529,7 @@
Tor development happens really fast
0:25:22.830,0:25:23.710
-and ports get updated
+and the ports get updated
0:25:23.710,0:25:30.710
pretty soon after a release is made.
@@ -1549,7 +1540,7 @@
0:25:41.320,0:25:44.310
And there's net management Vidalia which is a
-graphical content
+graphical frontend
0:25:44.310,0:25:47.200
also for Windows
@@ -1558,7 +1549,7 @@
and, uhm
0:25:48.260,0:25:53.929
-there's trans-proxy Tor
+there's trans-proxy-tor
0:25:53.929,0:25:58.650
which enables you to actually
@@ -1576,10 +1567,10 @@
that makes it hard for Tor to
0:26:07.510,0:26:08.860
-run with them
+anonymize them
0:26:08.860,0:26:10.810
-and you can use trans-proxy Tor
+and you can use trans-proxy-tor
0:26:10.810,0:26:15.510
to tunnel such connections through the Tor network.
@@ -1601,7 +1592,7 @@
bypass the configured proxy
0:26:30.500,0:26:34.500
-for example FireFox versions below version 1.5,
+for example Firefox versions below version 1.5,
0:26:34.500,0:26:35.700
which send every data,
@@ -1703,7 +1694,7 @@
And it's really surprising how many people uh, do this.
0:28:13.450,0:28:16.700
-So, lesson learned: use secure protocol.
+So, lesson learned: use secure protocols.
0:28:16.700,0:28:18.220
There are also other services that require
@@ -1742,13 +1733,14 @@
Privoxy on this system
0:29:24.810,0:29:27.180
-the config files are on the usual places.
+Config files are on the usual places.
0:29:27.180,0:29:34.180
-And if you read this, this little.. small.. Is this alright?
+And if you read this, this little... small...
+Is this alright?
0:29:46.950,0:29:50.600
-So there is this Tor I see sample file
+So there is this torrc sample file
0:29:50.600,0:29:57.600
which we can use
@@ -1772,7 +1764,7 @@
SOCKS port and SOCKS listen address information
0:30:24.220,0:30:31.220
-that's the
+that just
0:30:32.770,0:30:34.659
tells you where to connect your uh,
@@ -1818,7 +1810,7 @@
Privoxy uh,
0:31:33.809,0:31:40.809
-where to send connections requests.
+where to send connection requests.
0:31:51.740,0:31:53.659
Ok, I've actually entered this earlier
@@ -1839,19 +1831,19 @@
So we just start
0:32:34.120,0:32:38.870
-Ok, so we all set
+Ok, so we are all set
0:32:38.870,0:32:40.480
Now we can just do
0:32:40.480,0:32:47.480
-everything with our brother
+everything with our browser
0:32:50.790,0:32:52.029
-we all started times
+Startup time sucks a bit
>>> TRUNCATED FOR MAIL (1000 lines) <<<
More information about the p4-projects
mailing list