diff --git a/content/post/proxy-clearnet-2-onion.md b/content/post/proxy-clearnet-2-onion.md
index 9a4104f..1f09504 100644
--- a/content/post/proxy-clearnet-2-onion.md
+++ b/content/post/proxy-clearnet-2-onion.md
@@ -40,31 +40,31 @@ and extend the tor config ...
 echo 'DNSPort 53
 AutomapHostsOnResolve 1' >> /etc/torrc
 ```
-change the dns servert to localhost:
+change the dns server to localhost:
 ```
 echo 'nameserver 127.0.0.1' > /etc/resolv.conf
 ```
 
 
-Then create a script caled ```/opt/http2socks.sh```:
+Then create a script called ```/opt/http2socks.sh```:
 ```
 #!/bin/bash
 onion="a1b2c3d4e5f6.onion:80"
 proxy_http_2_socks5.sh:socat tcp4-LISTEN:8283,reuseaddr,fork,keepalive,bind=127.0.0.1 SOCKS4A:127.0.0.1:"$onion",socksport=9050 &
 ```
-add this script to the startup by add an line with ```crontab -e```:
+add this script to the startup by add a line with ```crontab -e```:
 ```
 @reboot /opt/http2socks.sh
 ```
 
-now start it all:
+now start everything:
 ```
 systemctl restart tor
 /opt/http2socks.sh
 systemctl restart nginx
 ```
 
-now you shoud have the hidden service on your 80 port visible for everyone.
+now you should have the hidden service on your 80 port visible for everyone.
 of course you can extend the nginx config to ask for a login before:
 
 add
@@ -75,11 +75,11 @@ auth_basic_user_file /etc/nginx/.htpasswd;
 to the ```location / {...}``` block
 
 ```
-and enerate the password file:
+and generate the password file:
 echo -n 'user:' >> /etc/nginx/.htpasswd
 openssl passwd -apr1 >> /etc/nginx/.htpasswd
 
-systemctl restart ngin
+systemctl restart nginx
 ```
 
 These are just ideas why I'm not responsible if someone has questionable content now available on the net. :D