https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO
https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/IsolatingProxy
quote:
In short, do not torify any applications yourself unless you know exactly
what you are doing... If you don't fall into one of these two categories then
for your own security, stick with the Tor(IceCat) or
https://www.torproject.org/docs/debian.html.en
Do not use automatic software updates over Tor that do not verify downloads.
That being said, operating system updates are generally secure. If you use
GNU/Linux and only your package management software suite, then you can
consider your self safe
http://pkgs.org/debian-wheezy/debian-main-i386/anon-proxy_00.05.38+20081230-2.1_i386.deb.html
https://en.wikipedia.org/wiki/Squid_%28software%29
http://www.blackhatworld.com/blackhat-seo/proxies/222258-create-your-private-secure-high-anonymous-proxy-step-step-guide.html