PERFORCE change 174269 for review

Rene Ladan rene at FreeBSD.org
Wed Feb 3 21:00:26 UTC 2010


http://p4web.freebsd.org/chv.cgi?CH=174269

Change 174269 by rene at rene_self on 2010/02/03 21:00:16

	IFC

Affected files ...

.. //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml#8 integrate
.. //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2007/meetbsd/brueffer-torprvacy.sbv#2 integrate
.. //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2007/nycbsdcon/dixon-bsdisdying.sbv#2 integrate
.. //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2009/asiabsdcon/allman-internetmail.sbv#2 integrate
.. //depot/projects/docproj_nl/nl_NL.ISO8859-1/books/handbook/l10n/chapter.sgml#15 integrate
.. //depot/projects/docproj_nl/share/pgpkeys/rpaulo.key#2 integrate
.. //depot/projects/docproj_nl/www/en/donations/donors.sgml#24 integrate
.. //depot/projects/docproj_nl/www/share/sgml/news.xml#65 integrate

Differences ...

==== //depot/projects/docproj_nl/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml#8 (text+ko) ====

@@ -1,7 +1,7 @@
 <!--
      The FreeBSD Documentation Project
 
-     $FreeBSD: doc/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml,v 1.22 2009/11/17 21:50:11 bcr Exp $
+     $FreeBSD: doc/en_US.ISO8859-1/books/handbook/virtualization/chapter.sgml,v 1.23 2010/02/02 20:06:34 manolis Exp $
 -->
 
 <chapter id="virtualization">
@@ -989,10 +989,10 @@
       <title>Installing &virtualbox;</title>
 
       <para><application>&virtualbox;</application> is available as a &os; port
-	in <filename role="package">emulators/virtualbox</filename>, and
+	in <filename role="package">emulators/virtualbox-ose</filename>, and
 	may be installed using the following commands:</para>
 
-      <screen>&prompt.root; <userinput>cd /usr/ports/emulators/virtualbox</userinput>
+      <screen>&prompt.root; <userinput>cd /usr/ports/emulators/virtualbox-ose</userinput>
 &prompt.root; <userinput>make install clean</userinput></screen>
 
       <para>One useful option in the configuration dialog is the
@@ -1017,9 +1017,14 @@
 
       <programlisting>vboxdrv_load="YES"</programlisting>
 
-      <para><application>&virtualbox;</application> also requires the
-	<filename class="directory">proc</filename> file system to be
-	mounted:</para>
+      <para>Versions of <application>&virtualbox;</application> prior to 3.1.2
+	require the <filename class="directory">proc</filename> file system
+	to be mounted.  This is not needed in recent versions, which utilize
+	the functions provided by the &man.sysctl.3; library.</para>
+
+      <para>When using an older version of the port, follow the instructions
+	below to make sure <filename class="directory">proc</filename> is
+	mounted properly:</para>
 
       <screen>&prompt.root; <userinput>mount -t procfs proc /proc</userinput></screen>
 

==== //depot/projects/docproj_nl/en_US.ISO8859-1/captions/2007/meetbsd/brueffer-torprvacy.sbv#2 (text+ko) ====

@@ -1,6 +1,6 @@
 0:00:09.649,0:00:15.249
 Fortunately my slide will be centered, because
-I'll have to change resolutions, I think this works out..
+I'll have to change resolutions. I think this works out...
 
 0:00:15.249,0:00:19.310
 And, it's about protecting your privacy with FreeBSD and Tor
@@ -9,10 +9,10 @@
 and, uh...
 
 0:00:20.859,0:00:21.480
-Privacy
+Privacy.	
 
 0:00:21.480,0:00:25.859
-what I mean here is mostly anonymity
+What I mean here is mostly anonymity
 
 0:00:25.859,0:00:28.889
 but there are some other aspects that
@@ -27,10 +27,10 @@
 I want to first talk about who needs anonimity anyway
 
 0:00:39.500,0:00:42.880
-is it just for criminals or some other bad guys, right?
+Is it just for criminals or some other bad guys, right?
 
 0:00:42.880,0:00:44.209
-after this
+After this
 
 0:00:44.209,0:00:50.940
 anonymization concepts, then Tor. Tor's a, well, a tool
@@ -52,7 +52,7 @@
 when you want to be anonymous on the Web or the Internet
 
 0:01:06.070,0:01:06.650
-and uh,
+And uh,
 
 0:01:06.650,0:01:12.280
 if time permits I'd like to do a little demonstration
@@ -79,16 +79,16 @@
 when the military coup was going on
 
 0:01:32.510,0:01:38.150
-and the journalists in Thailand couldn't really uh,
+and the journalists in Thailand couldn't really uh
 
 0:01:38.150,0:01:39.830
-journalists couldn't really, uh
+Journalists couldn't really, uh
 
 0:01:39.830,0:01:43.050
 get the information they needed to do their work
 
 0:01:43.050,0:01:45.750
-also, uh, informants
+Also, uh, informants
 
 0:01:45.750,0:01:49.100
 whistleblowers... people who want to tell you about
@@ -100,7 +100,7 @@
 and don't want to lose their job for it... Dissidents
 
 0:01:56.460,0:01:58.250
-uh, best case
+Uh, best case
 
 0:01:58.250,0:02:01.610
 when in Myanmar
@@ -109,19 +109,19 @@
 last few weeks ago
 
 0:02:03.750,0:02:05.290
-when the
+When the
 
 0:02:05.290,0:02:07.649
 all the Buddhists monks were going to the streets and uh,
 
 0:02:07.649,0:02:09.879
-the Internet was totally censored
+the Internet was heavily censored
 
 0:02:09.879,0:02:14.899
-it was really dangerous to do anything on the Internet
+It was really dangerous to do anything on the Internet
 
 0:02:14.899,0:02:17.719
-so, so umm
+So, so umm
 
 0:02:17.719,0:02:20.489
 socialy sensitive information, like when you want to uh,
@@ -140,7 +140,7 @@
 as it will be very embarrassing
 
 0:02:31.840,0:02:33.779
-also Law Enforcement, ah
+Also Law Enforcement, ah
 
 0:02:33.779,0:02:38.579
 for example, uh, when you want to set up a
@@ -149,7 +149,7 @@
 an anonymous tipline for crime reporting
 
 0:02:41.669,0:02:45.810
-and uh, also companies that want to, uh
+And uh, also companies that want to, uh
 
 0:02:45.810,0:02:48.079
 research competition, as one case that, uh
@@ -192,7 +192,7 @@
 anonymization research.
 
 0:03:24.319,0:03:26.169
-and maybe you
+And maybe you
 
 0:03:26.169,0:03:28.799
 may have heard of the European Union
@@ -201,7 +201,7 @@
 Data Retention Directive?
 
 0:03:30.349,0:03:33.039
-where, umm
+Where, umm
 
 0:03:33.039,0:03:35.739
 collection data gets stored
@@ -217,7 +217,7 @@
 the law was passed in Germany
 
 0:03:47.729,0:03:48.900
-so, uh
+So, uh
 
 0:03:48.900,0:03:50.450
 from first January on,
@@ -235,7 +235,7 @@
 by providers for six months
 
 0:04:00.449,0:04:02.510
-and, uh,
+And, uh,
 
 0:04:02.510,0:04:05.379
 sooner or later it's going to be in Poland as well
@@ -244,16 +244,16 @@
 [talking]
 
 0:04:07.689,0:04:14.689
-well, you're part of the Euro Union now, so ah, welcome!
+Well, you're part of the Euro Union now, so ah, welcome!
 
 0:04:16.989,0:04:18.529
-okay, uh
+Okay, uh
 
 0:04:18.529,0:04:21.220
 that's a
 
 0:04:21.220,0:04:27.110
-maybe you want to hide what interests you have and uh,
+Maybe you want to hide what interests you have and uh,
 who you talk to, I mean uh,
 
 0:04:27.110,0:04:30.889
@@ -267,15 +267,15 @@
 if they bother to find out
 
 0:04:37.780,0:04:40.709
-yeah, and also
+Yeah, and also
 
 0:04:40.709,0:04:46.279
-criminals, but um, they already do illegal stuff and they
+criminals, but they already do illegal stuff and they
 don't care about
 
 0:04:46.279,0:04:51.629
 doing more illegal stuff to stay anonymous, right? They can
-uh, steal people's identities, they can rent botnets or
+steal people's identities, they can rent botnets or
 create them in the first place
 
 0:04:51.629,0:04:53.829
@@ -289,7 +289,7 @@
 no big deal
 
 0:04:59.689,0:05:02.029
-so, uh
+So, uh
 
 0:05:02.029,0:05:05.199
 Criminals already do this and uh,
@@ -322,7 +322,7 @@
 stay anonymous on your own
 
 0:05:25.930,0:05:28.999
-you needs the help of more people
+you need the help of more people
 
 0:05:28.999,0:05:30.559
 and uh,
@@ -339,12 +339,8 @@
 0:05:40.979,0:05:42.949
 anonymization concepts
 
-0:05:42.949,0:05:44.539
-uh huh
-
 0:05:44.539,0:05:51.539
 Proxy? Everyone here probably knows how a proxy works,
-uh yeah
 
 0:05:52.559,0:05:53.169
 LANs connect to the proxy and request
@@ -355,14 +351,8 @@
 0:05:57.290,0:06:00.359
 just passes it on and pass through
 
-0:06:00.359,0:06:03.789
-right
-
-0:06:03.789,0:06:04.680
-um
-
 0:06:04.680,0:06:09.329
-Proxys are fast and simple but it's a single point of
+Proxys are fast and simple but it's really a single point of
 failure, like uh,
 
 0:06:09.329,0:06:13.139
@@ -379,52 +369,52 @@
 break into the computer room or whatever
 
 0:06:22.440,0:06:26.400
-it's pretty easy
+It's pretty easy
 
 0:06:26.400,0:06:30.050
-Second anonymization concept is mixed,
+Second anonymization concept is MIX,
 
 0:06:30.050,0:06:32.549
 it's really old from nineteen eighty one
 
 0:06:32.549,0:06:35.099
-so you can see, uh,
+So you can see, uh,
 
 0:06:35.099,0:06:41.150
 how long the research in this area is going on
 
 0:06:41.150,0:06:43.150
-the mix is kind of similar to a proxy
+The MIX is kind of similar to a proxy
 
 0:06:43.150,0:06:47.090
-like, trying to connect to it to send the messages
+Like, trying to connect to it to send the messages
 
 0:06:47.090,0:06:50.779
-and the mix collects them
+and the MIX collects them
 
 0:06:50.779,0:06:54.550
-and no less than um
+and coalesces them
 
 0:06:54.550,0:06:56.699
-it puts them all
+Like, it puts them all
 
 0:06:56.699,0:06:58.319
-in through different coincides and uhm,
+into coming sites and uhm,
 
 0:06:58.319,0:07:00.169
 you see here it
 
 0:07:00.169,0:07:03.849
-shuffles them and waits
+shuffles them. It waits
 
 0:07:03.849,0:07:08.930
-til there's enough data in it and just
+until there's enough data in it and just
 
 0:07:08.930,0:07:11.039
-shoves them and sends them back out so
+shuffles them and sends them back out so
 
 0:07:11.039,0:07:18.039
-um, this is to protect against correlation effects.
+um, this is to protect against correlation attacks.
 
 0:07:20.219,0:07:22.439
 But second in...
@@ -433,22 +423,22 @@
 Oh yeah, and
 
 0:07:23.379,0:07:27.879
-when you actually put several mixes uh
+when you actually put several MIXes uh
 
 0:07:27.879,0:07:31.259
-behind them; it's a mixed escape and uh,
+behind them; it's a MIX cascade and uh,
 
 0:07:31.259,0:07:32.149
 between mixes is also
 
 0:07:32.149,0:07:35.330
-a friction going on, uh, the first
+encryption going on, uh, the first
 
 0:07:35.330,0:07:38.349
-or the client which is
+or the client which
 
 0:07:38.349,0:07:44.069
-you could see here if this lights would be centered, uh,
+you could see here if the slides would be centered, uh,
 
 0:07:44.069,0:07:46.029
 what else gets the
@@ -515,10 +505,10 @@
 but what's good about it it's uh
 
 0:08:47.060,0:08:50.500
-distrinuted trust uh,
+distributed trust uh,
 
 0:08:50.500,0:08:54.940
-just one these mixes has to be secure to actually
+just one these MIXes has to be secure to actually
 
 0:08:54.940,0:08:56.840
 anonymize the whole connection
@@ -542,13 +532,13 @@
 both these concepts
 
 0:09:17.720,0:09:21.340
-mixes and proxies.
+MIXes and proxies.
 
 0:09:21.340,0:09:22.770
 It's a TCP-Overlay network,
 
 0:09:22.770,0:09:24.900
-means you can, uh
+that means you can, uh
 
 0:09:24.900,0:09:25.560
 channel any
@@ -560,29 +550,29 @@
 theoretically
 
 0:09:28.480,0:09:31.310
-uh, theoretically I will explain
+Uh, theoretically I will explain
 
 0:09:31.310,0:09:33.790
 a couple of slides later
 
 0:09:33.790,0:09:37.040
-it provides a SOCKS interface so you don't need any uh,
+It provides a SOCKS interface so you don't need any uh,
 
 0:09:37.040,0:09:42.060
 special application proxies like any application that uses
-SOCKS interface can just,
+SOCKS interface can just
 
 0:09:42.060,0:09:43.370
-talk to talk
+talk to Tor
 
 0:09:43.370,0:09:48.070
 and it's available on, um, all major platforms
 
 0:09:48.070,0:09:53.940
-what is uh, especially important is available in Windows
+What is uh, especially important it's available in Windows
 
 0:09:53.940,0:09:55.850
-'cause, uhm, like I said earlier once
+Because, uhm, like I said earlier once
 
 0:09:55.850,0:09:57.740
 you want a really diverse,
@@ -606,7 +596,7 @@
 combine the positive attributes of
 
 0:10:15.939,0:10:17.480
-proxies and mixes
+proxies and MIXes
 
 0:10:17.480,0:10:18.749
 Like, proxies are fast, but
@@ -615,7 +605,7 @@
 seem prone to failure
 
 0:10:20.620,0:10:21.770
-and mixes
+and MIXes
 
 0:10:21.770,0:10:24.590
 distributed trust, you want to combine them
@@ -624,22 +614,22 @@
 so uh
 
 0:10:29.930,0:10:31.310
-Fast, uh, Tor use not only public key
+Fast, uh, Tor uses not only public key
 
 0:10:31.310,0:10:33.220
 encryption but also session keys
 
 0:10:33.220,0:10:35.170
-symmetrically encrypted.
+so it's symmetrically encrypted.
 
 0:10:35.170,0:10:37.260
-so uh
+So uh
 
 0:10:37.260,0:10:41.710
-All the connection set up is this public key so you just, uh
+all the connection set up is this public key so you just, uh
 
 0:10:41.710,0:10:44.840
-authentication and stuff?
+authentication and stuff
 
 0:10:44.840,0:10:50.860
 And uh, the actual communication that's going on later
@@ -673,10 +663,10 @@
 to patch his PC off the Operating System or something
 
 0:11:12.680,0:11:16.070
-just be in a... workable state really fast
+just be in a... workable state really fast.
 
 0:11:16.070,0:11:19.340
-um, usability,
+Um, usability,
 
 0:11:19.340,0:11:20.600
 so you get the uh,
@@ -697,10 +687,10 @@
 in this whole area.
 
 0:11:32.010,0:11:33.059
-so, uh
+So, uh
 
 0:11:33.059,0:11:34.679
-the protocol to all users
+the protocol Tor users
 
 0:11:34.679,0:11:37.890
 should be really flexible
@@ -754,8 +744,8 @@
 for example
 
 0:12:30.380,0:12:34.280
-The first one is the entry node, middle LAN nodes, and the
-uh exit nodes, I will leave thes for later
+The first one is the entry node, middleman nodes, and the
+uh exit nodes, I will leave these for later
 
 0:12:34.280,0:12:41.000
 uh, so this
@@ -774,7 +764,8 @@
 thing goes on
 
 0:12:53.090,0:12:58.520
-in these two and these two so they can communicate later on
+between these two and these two so they can communicate
+later on
 
 0:12:58.520,0:12:59.780
 What's really important here
@@ -792,10 +783,10 @@
 So it has to be unencrypted
 
 0:13:06.610,0:13:13.610
-so you can get your request through
+so you can actually get your request through
 
 0:13:20.690,0:13:22.700
-this is a virtual circuit
+This is a virtual circuit
 
 0:13:22.700,0:13:24.490
 that gets established and uh
@@ -810,10 +801,10 @@
 a new circuit is built
 
 0:13:32.450,0:13:37.250
-when a new website, when a new request come through, so uh
+when a new website, when a new request comes through, so uh
 
 0:13:37.250,0:13:40.080
-this one stays, all these connections above stays
+this one stays, all these connections above stay
 
 0:13:40.080,0:13:41.940
 in this circuit
@@ -840,13 +831,13 @@
 in case one connection is compromised, for example.
 
 0:14:00.220,0:14:01.600
-An these ten minutes
+And these ten minutes
 
 0:14:01.600,0:14:04.490
-are really an arbitrary value
+are really an arbitrary value,
 
 0:14:04.490,0:14:08.560
-,you can choose anything
+you can choose anything
 
 0:14:08.560,0:14:10.660
 you have to do the research
@@ -858,13 +849,13 @@
 ten minutes is compromised.
 
 0:14:19.840,0:14:22.240
-With all you get exit policies,
+With Tor you get exit policies,
 
 0:14:22.240,0:14:24.640
 this is important for the exit node
 
 0:14:24.640,0:14:27.880
-the one which actually send the uh,
+the one which actually sends the uh,
 
 0:14:27.880,0:14:30.410
 original request to the destination server
@@ -879,10 +870,10 @@
 TCP connections you want
 
 0:14:34.220,0:14:39.180
-to allow from your node if you want
+to allow from your own node if you want
 
 0:14:39.180,0:14:41.000
-that's default policy which uh
+As default policy which uh
 
 0:14:41.000,0:14:43.610
 blocks SMTP and NNTP to prevent uh
@@ -909,7 +900,7 @@
 all the important stuff
 
 0:15:01.630,0:15:05.250
-that you would want to minimize just works
+that you would want to anonymize just works
 
 0:15:05.250,0:15:10.290
 and uh, if you uh
@@ -918,7 +909,7 @@
 this is important for uh, if you
 
 0:15:13.050,0:15:18.540
-want to run you node, uh
+want to run you own node, uh
 
 0:15:18.540,0:15:19.220
 waht kind of node you actually want to run
@@ -928,7 +919,7 @@
 
 0:15:24.120,0:15:31.120
 there's these three different nodes: entry node,
-middleman note, and exit node
+middleman node, and exit node
 
 0:15:32.400,0:15:34.180
 and uh, which node you want to run
@@ -967,7 +958,7 @@
 of the
 
 0:16:05.340,0:16:11.230
-exit node in his forum and not the one
+exit node in his logs and not the one
 
 0:16:11.230,0:16:15.330
 of Alice so uh he's going to have the problems later on
@@ -979,8 +970,8 @@
 but you have to keep this in mind
 
 0:16:21.600,0:16:28.600
-and uh, keep up everything and uh we can play the role of
-entry nodes and middle man nodes
+And uh, keep up everything and uh we can play the role of
+entry nodes and middleman nodes
 
 0:16:30.170,0:16:37.170
 which is also important
@@ -995,7 +986,7 @@
 accessed
 
 0:16:46.990,0:16:49.420
-without having an IP address
+without having the IP address of them
 
 0:16:49.420,0:16:50.960
 so uh
@@ -1004,17 +995,17 @@
 you can't really find them physically
 
 0:16:56.300,0:16:57.880
-so if you want to run a
+So if you want to run a
 
 0:16:57.880,0:16:59.720
 hidden service you can do it from anywhere
 
 0:16:59.720,0:17:01.850
-do it from inside this private network here
+You can even do it from inside this private network here
 
 0:17:01.850,0:17:05.950
-instead of a service and everyone in the outside world can
-actually access it
+You can set up a service and everyone in the outside world
+can actually access it
 
 0:17:05.950,0:17:07.770
 even if you don't have the rights to do
@@ -1029,13 +1020,13 @@
 resist Denial of Service, for example
 
 0:17:15.690,0:17:20.160
-'cause every uh,
+Because every uh,
 
 0:17:20.160,0:17:20.519
 every client that wants to
 
 0:17:20.519,0:17:22.829
-access the service uh, gets
+access the service uh,
 
 0:17:22.829,0:17:25.700
 gets a different route in the network
@@ -1056,7 +1047,7 @@
 And the addresses look like this:
 
 0:17:38.510,0:17:43.280
-it's really a hash of a private key
+it's really a hash of a public key
 
 0:17:43.280,0:17:47.340
 and each hidden service is actually, well, identified
@@ -1065,7 +1056,7 @@
 by a public key
 
 0:17:53.300,0:17:59.000
-this how it works, uhm, yet Alice the client
+This how it works, uhm, yet Alice the client
 
 0:17:59.000,0:18:02.170
 and the hidden server, Bob.
@@ -1090,14 +1081,14 @@
 and uh he sends
 
 0:18:22.530,0:18:26.860
-this public key into each of these three introduction
+this public key and the list of three introduction
 points to the directory server.
 
 0:18:26.860,0:18:28.740
 Now Alice wants to uh,
 
 0:18:28.740,0:18:31.610
-connect to Bob, but first the first thing she does
+connect to Bob, the first the first thing she does
 
 0:18:31.610,0:18:34.480
 is download this
@@ -1109,7 +1100,7 @@
 public key from the directory server. After that, uh
 
 0:18:50.120,0:18:54.299
-she choose one of the uh introduction points
+she chooses one of the uh introduction points
 
 0:18:54.299,0:18:55.930
 and uh,
@@ -1217,10 +1208,10 @@
 so they can decrypt it later
 
 0:20:42.910,0:20:47.860
-and uh, yeah, it's not...
+and uh, yeah, it's not really great
 
 0:20:47.860,0:20:50.010
-and it's actually last week was the first case
+and actually last week was the first case
 
 0:20:50.010,0:20:52.890
 when this was actually used in
@@ -1229,13 +1220,13 @@
 Great Britain
 
 0:20:56.600,0:21:00.720
-uh, there can be special laws like in Germany
+Uh, there can be special laws like in Germany
 
 0:21:00.720,0:21:03.480
 sort of like a hacker paragraph
 
 0:21:03.480,0:21:06.990
-just a nickname, it has some cryptic legal name
+It's just a nickname, it has some cryptic legal name
 
 0:21:06.990,0:21:07.940
 uh, in reality
@@ -1274,7 +1265,7 @@
 restrict anything.  From a map to a
 
 0:21:36.669,0:21:39.210
-to God know what? Network tools.
+to God know what Network tools.
 
 0:21:39.210,0:21:40.880
 and uh
@@ -1303,7 +1294,7 @@
 and uh, the biggest Tor
 
 0:22:00.990,0:22:02.250
-problems
+problem is
 
 0:22:02.250,0:22:07.480
 that, uh
@@ -1375,13 +1366,13 @@
 that's random stuff that can happen
 
 0:22:55.530,0:22:56.540
-though, uh,
+So uh,
 
 0:22:56.540,0:22:59.559
 as an exit nodes provider you can get
 
 0:22:59.559,0:23:03.690
-letters from Law Enforcement entities, and uh
+letters from Law Enforcement agencies, and uh
 
 0:23:03.690,0:23:05.649
 What are you doing there?
@@ -1393,7 +1384,7 @@
 And you have to explain to them that you are
 
 0:23:10.040,0:23:12.260
-providing Tor server
+providing Tor server and
 
 0:23:12.260,0:23:13.980
 it wasn't you
@@ -1429,7 +1420,7 @@
 depends on what kind of guy you're actually talking to
 
 0:23:41.440,0:23:47.120
-So what's... what kind of role plays FreeBSD here?
+So what's... What kind of role plays FreeBSD here?
 
 0:23:47.120,0:23:51.880
 uh, FreeBSD is really well suited as a Tor node, uh
@@ -1445,7 +1436,7 @@
 and it shouldn't matter
 
 0:23:59.150,0:24:00.830
-There's one of the, uh
+This is one of the, uh
 
 0:24:00.830,0:24:03.130
 like I said earlier one of the design
@@ -1463,7 +1454,7 @@
 as actually uh,
 
 0:24:14.290,0:24:17.320
-the security of other depends on your node
+the security of others depends on your node
 
 0:24:17.320,0:24:20.690
 and uh,
@@ -1493,7 +1484,7 @@
 there's also audit
 
 0:24:39.390,0:24:40.740
-and the mac framework
+and the MAC framework
 
 0:24:40.740,0:24:43.780
 when you want to run your installation
@@ -1520,16 +1511,16 @@
 Well maintained Tor-related ports.
 
 0:25:04.060,0:25:07.390
-There is the main port, security Tor
+There is the main port, security/Tor
 
 0:25:07.390,0:25:11.370
-Which is a client and server  if you want to run
+Which is a client and server if you want to run
 
 0:25:11.370,0:25:13.610
 a network node, or just a client.
 
 0:25:13.610,0:25:15.210
-There's Tor level
+There's tor-devel
 
 0:25:15.210,0:25:16.450
 and these are really up to date, uhm
@@ -1538,7 +1529,7 @@
 Tor development happens really fast
 
 0:25:22.830,0:25:23.710
-and ports get updated
+and the ports get updated
 
 0:25:23.710,0:25:30.710
 pretty soon after a release is made.
@@ -1549,7 +1540,7 @@
 
 0:25:41.320,0:25:44.310
 And there's net management Vidalia which is a
-graphical content
+graphical frontend
 
 0:25:44.310,0:25:47.200
 also for Windows
@@ -1558,7 +1549,7 @@
 and, uhm
 
 0:25:48.260,0:25:53.929
-there's trans-proxy Tor
+there's trans-proxy-tor
 
 0:25:53.929,0:25:58.650
 which enables you to actually
@@ -1576,10 +1567,10 @@
 that makes it hard for Tor to
 
 0:26:07.510,0:26:08.860
-run with them
+anonymize them
 
 0:26:08.860,0:26:10.810
-and you can use trans-proxy Tor
+and you can use trans-proxy-tor
 
 0:26:10.810,0:26:15.510
 to tunnel such connections through the Tor network.
@@ -1601,7 +1592,7 @@
 bypass the configured proxy
 
 0:26:30.500,0:26:34.500
-for example FireFox versions below version 1.5,
+for example Firefox versions below version 1.5,
 
 0:26:34.500,0:26:35.700
 which send every data,
@@ -1703,7 +1694,7 @@
 And it's really surprising how many people uh, do this.
 
 0:28:13.450,0:28:16.700
-So, lesson learned: use secure protocol.
+So, lesson learned: use secure protocols.
 
 0:28:16.700,0:28:18.220
 There are also other services that require
@@ -1742,13 +1733,14 @@
 Privoxy on this system
 
 0:29:24.810,0:29:27.180
-the config files are on the usual places.
+Config files are on the usual places.
 
 0:29:27.180,0:29:34.180
-And if you read this, this little.. small.. Is this alright?
+And if you read this, this little... small... 
+Is this alright?
 
 0:29:46.950,0:29:50.600
-So there is this Tor I see sample file
+So there is this torrc sample file
 
 0:29:50.600,0:29:57.600
 which we can use
@@ -1772,7 +1764,7 @@
 SOCKS port and SOCKS listen address information
 
 0:30:24.220,0:30:31.220
-that's the
+that just
 
 0:30:32.770,0:30:34.659
 tells you where to connect your uh,
@@ -1818,7 +1810,7 @@
 Privoxy uh,
 
 0:31:33.809,0:31:40.809
-where to send connections requests.
+where to send connection requests.
 
 0:31:51.740,0:31:53.659
 Ok, I've actually entered this earlier
@@ -1839,19 +1831,19 @@
 So we just start
 
 0:32:34.120,0:32:38.870
-Ok, so we all set
+Ok, so we are all set
 
 0:32:38.870,0:32:40.480
 Now we can just do
 
 0:32:40.480,0:32:47.480
-everything with our brother
+everything with our browser
 
 0:32:50.790,0:32:52.029
-we all started times
+Startup time sucks a bit
 

>>> TRUNCATED FOR MAIL (1000 lines) <<<


More information about the p4-projects mailing list