Talk:Polipo
This is the talk page for discussing improvements to the Polipo article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||
|
This article links to one or more target anchors that no longer exist.
Please help fix the broken anchors. You can remove this template after fixing the problems. | Reporting errors |
English
[edit]In "The polipo software is hosted at Free Haven - as with also the Tor "onion routing" software", what does "as with also" mean?
Is this trying to say "The polipo software is hosted at Free Haven - as is the Tor "onion routing" software"? -- SGBailey (talk) 15:13, 21 April 2011 (UTC)
Just to note that polipo cannot be used as reverse proxy (it's right that its a forwarding proxy but that would not help apache, squid on the other hand can serve as a reverse proxy) as this section suggests: "The LAMP (software bundle) with polipo as lightweight forwarding and caching web proxy server. A high performance and high-availability solution for a hostile environment" — Preceding unsigned comment added by 78.145.233.200 (talk) 17:20, 15 November 2015 (UTC)
- Start-Class Computing articles
- Low-importance Computing articles
- Start-Class Computer networking articles
- Mid-importance Computer networking articles
- Start-Class Computer networking articles of Mid-importance
- All Computer networking articles
- Start-Class software articles
- Low-importance software articles
- Start-Class software articles of Low-importance
- All Software articles
- All Computing articles
- Start-Class Internet articles
- Mid-importance Internet articles
- WikiProject Internet articles
- Start-Class Computer Security articles
- Mid-importance Computer Security articles
- Start-Class Computer Security articles of Mid-importance
- Mid-importance Computing articles
- All Computer Security articles