summaryrefslogtreecommitdiff
path: root/doc/tor-doc.html
diff options
context:
space:
mode:
Diffstat (limited to 'doc/tor-doc.html')
-rw-r--r--doc/tor-doc.html16
1 files changed, 14 insertions, 2 deletions
diff --git a/doc/tor-doc.html b/doc/tor-doc.html
index aafeef5f45..0f40e876cd 100644
--- a/doc/tor-doc.html
+++ b/doc/tor-doc.html
@@ -201,12 +201,24 @@ thing, to hide your SSL traffic. Using privoxy is <b>necessary</b> because
DNS requests when it uses a SOCKS proxy directly</a>. Privoxy also gives
you good html scrubbing.</p>
-<p>To test if it's working, go to
+
+<p>To test if it's working, you need to know your normal IP address so you can
+verify that the address really changes when running Tor.
+If you are using Linux or OSX your local IP address is shown by the <tt>ifconfig</tt>
+command. Under Windows go to the Start menu, click Run and enter <tt>cmd</tt>.
+At the command prompt, enter <tt>ipconfig</tt>. If you are behind a NAT/Firewall
+ you can use one of the sites listed below to check which IP you are using.
+When that is done, start Tor and Privoxy and visit any of the sites again.
+If everything works, your IP address should have changed.
+</p>
+
+<p>
<!--<a href="http://peertech.org/privacy-knoppix/">peertech</a>, -->
<a href="http://www.junkbusters.com/cgi-bin/privacy">junkbusters</a>,
<a href="http://www.network-tools.com">network-tools</a> or
<a href="http://ipid.shat.net">ipid</a>
-and see what IP it says you're coming from.
+are sites that basically shows your present IP so you can see
+what address you're coming from.
</p>
<p>