For those who aren't in the know, the Tor network disguises your identity by bouncing your traffic across different Tor servers, but as clearly stated in the Tor how-to, it protects only those applications that are properly configured to send their Internet traffic through it.