<body>
-<h1><a href="http://freehaven.net/tor/">Tor</a> documentation</h1>
+<h1><a href="http://tor.freehaven.net/">Tor</a> documentation</h1>
<p>The simple version: Tor provides a distributed network of servers
("onion routers"). Users bounce their TCP streams (web traffic, FTP, SSH,
<h2>Installing Tor</h2>
<p>You can get the latest releases <a
-href="http://freehaven.net/tor/dist/">here</a>.</p>
+href="http://tor.freehaven.net/dist/">here</a>.</p>
<p>If you got Tor from a tarball, unpack it: <tt>tar xzf
tor-0.0.9.tar.gz; cd tor-0.0.9</tt>. Run <tt>./configure</tt>, then
libeay32.dll.) You might also want to run Tor in a dos window,
so you can see its logs, and see its error messages if it
crashes. If you don't want the default configuration, fetch the <a
-href="http://freehaven.net/tor/cvs/tor/src/config/torrc.sample.in">torrc</a>, edit it,
+href="http://tor.freehaven.net/cvs/tor/src/config/torrc.sample.in">torrc</a>, edit it,
and use <tt>tor.exe -f torrc</tt>.</p>
<p>Otherwise, if you got it prepackaged (e.g. in the <a
top). Then change your mozilla to http proxy at localhost port 8118
(and no socks proxy). You should also set your SSL proxy to the same
thing, to hide your https traffic. Using privoxy is necessary because
-<a href="http://freehaven.net/tor/cvs/doc/CLIENTS">Mozilla leaks your
+<a href="http://tor.freehaven.net/cvs/tor/doc/CLIENTS">Mozilla leaks your
DNS requests when it uses a socks proxy directly</a>. Privoxy also gives
you good html scrubbing.</p>