$>
you're reading...
IT-Hard/Software, Tutorial, Unix-Linux

Installing Tor on Linux


Welcome all!

Tutorial : How to install Tor on Linux !

Ok lets get started.

1) The latest release of Tor can be found at http://bit.ly/bUkZ6n. Packages for Debian, Red Hat, Gentoo, *BSD, are available for download there too. Also you can ‚sudo apt-get install tor tor-geoipdb

2) Now we need to get Polipo for Internet Browsing. You can get Polipo by using apt-get in terminal. And make sure you get 1.0.4 or higher! Now we need to set it up. Get the Polipo config file for Tor at http://bit.ly/fPIVp7 And put it in place of your first Polipo config file (e.g. /etc/polipo/config or ~/.polipo) We will need to restart polipo for changes to take affect so use ‚/etc/init.d/polipo restart‚.

3) Now we need to configure apps to work with Tor and Polipo. The first step is to set up web browsing. You should use Tor with Firefox and Torbutton, for best safety. Simply install the Torbutton plugin here http://bit.ly/eC6DxH , restart your Firefox, and you’re all set. To Torify other applications that support HTTP proxies, just point them at Polipo (that is, localhost port 8118). To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you can point your application directly at Tor (localhost port 9050).

Next, you should try using your browser with Tor and make sure that your IP address is being anonymized. Click on the link http://bit.ly/E8XJg to see whether it thinks you’re using Tor or not.

4) The Tor network relies on volunteers to donate bandwidth. The more people who run relays, the faster the Tor network will be. If you have at least 20 kilobytes/s each way, please help out Tor by configuring your Tor to be a relay too. We have many features that make Tor relays easy and convenient, including rate limiting for bandwidth, exit policies so you can limit your exposure to abuse complaints, and support for dynamic IP addresses.

Having relays in many different places on the Internet is what makes Tor users secure. You may also get stronger anonymity yourself, since remote sites can’t know whether connections originated at your computer or were relayed from others.

Thanks to

Diskussionen

Es gibt noch keine Kommentare.

Schreibe einen Kommentar

Trage deine Daten unten ein oder klicke ein Icon um dich einzuloggen:

WordPress.com-Logo

Du kommentierst mit Deinem WordPress.com-Konto. Abmelden / Ändern )

Twitter-Bild

Du kommentierst mit Deinem Twitter-Konto. Abmelden / Ändern )

Facebook-Foto

Du kommentierst mit Deinem Facebook-Konto. Abmelden / Ändern )

Google+ Foto

Du kommentierst mit Deinem Google+-Konto. Abmelden / Ändern )

Verbinde mit %s

Member of The Internet Defense League

Kalender

Juli 2011
M D M D F S S
« Jun   Aug »
 123
45678910
11121314151617
18192021222324
25262728293031

Kategorien

Archiv

Legal Guide For Bloggers

Bloggers' Rights at EFF

Interessantes

Link Anonymizer

Independent Tests of Antiv-Virus Software

BSD Aktuell

Hacker News

Blog Stats

  • 260,102 hits

Haftungsausschluss

disclaimer

%d Bloggern gefällt das: