From: jongfoster <jongfoster@users.sourceforge.net> Date: Thu, 17 May 2001 22:56:17 +0000 (+0000) Subject: Cosmetic documentation update. X-Git-Tag: v_2_9_9~524 X-Git-Url: http://www.privoxy.org/gitweb/%22https:/@default-cgi@/faq/static/developer-manual/@default-cgi@show-url-info?a=commitdiff_plain;h=addce9f3a4e868380661736e8e95010da786b972;p=privoxy.git Cosmetic documentation update. - Added required image files into CVS, they are no longer loaded from junkbusters.com - Modified HTML files to be fully complient HTML 4.01, using CSS etc. - Most of the links to junkbusters.com have been replaced with ones within the documentation set, or to the SourceForge project. - Added bold "these files are out of date" warning. --- diff --git a/doc/fb.gif b/doc/fb.gif new file mode 100755 index 00000000..43059924 Binary files /dev/null and b/doc/fb.gif differ diff --git a/doc/gpl.html b/doc/gpl.html index 7f0b6107..c980e61f 100644 --- a/doc/gpl.html +++ b/doc/gpl.html @@ -1,567 +1,560 @@ -<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"> +<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> +<!-- $Id$ + + See copyright details at end of file + + After changing this file, please run it through "HTML Tidy" + (from http://www.w3.org/People/Raggett/tidy/) + It should have no warnings or errors. +--> + <html> -<head> -<!-- Copyright 1996-8 Junkbusters Corporation --> -<!-- This work comes with NO WARRANTY --> -<!-- It may be redistributed and modified under the GNU GPL--> -<!-- See the body of http://www.junkbusters.com/ht/en/gpl.html for details--> -<!-- Junkbusters is a registered trade mark of Junkbusters Corporation --> -<!-- Generated 1998/10/31 03:58:25 UTC --> -<meta name="Generator" content="Junkbusters Ebira $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $"> -<!-- Document ID: $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $ --> -<title> -The GNU General Public License -</title> -<base href="http://www.junkbusters.com/ht/en/gpl.html"> -<meta name="description" content="We did not write the GPL: the Free Software Foundation did | The GPL allows copying and changing of copyrighted documents | Version 2, June 1991 | Preamble | GNU General Public License: Terms and Conditions for Copying, Distribution and Modification | Appendix: How to Apply These Terms to Your New Programs"> -<meta name="keywords" content="stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, spamoff, declare, telemarketing, telemarketers, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, conservation, recycling, catalogs, consumer, sending, opt out "> -<link rel="next" href="precre.html"> -<link rel="previous" href="precre.html"> -<link rel="contents" href="toc.html"> -</head> -<body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink="#787878"> -<p align="center"> -<a name="top_of_page" href="legal.html#marks"> -<img border=0 width=160 height=34 src="/images/trans_tn.gif" alt="Junkbusters"></a> -</p> - -<center> -<h1>The GNU General Public License -</h1> -</center> -<!-- Translators: no --> -<center> -<h2><a name="notus"><font face="arial, helvetica"> -We did not write the GPL: the Free Software Foundation did -</font></a> -</h2> -</center> - -<h3><a name="allows" href="/cgi-bin/gp?pg=gpl&pr=allows"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -The GPL allows copying and changing of copyrighted documents -</h3> -<p> -<a name="fsf">The Free Software Foundation</a> -<a href="http://www.fsf.org/fsf/fsf.html">(FSF)</a> -is a non-profit institution -that designed the GNU General Public License (GPL) to promote the -publication of free software. -The GPL is used by thousands of programmers -who want to give others the right to copy and modify -the source code of their programs. Millions of people benefit from this. -<p> -<a name="junkbuster">We use the GPL</a> -to allow everyone to use, copy and modify the -<a href="ijb.html">Internet Junkbuster</a> -as they wish. -<a name="separate">Companies can use it for commercial purposes,</a> -but they are not permitted to use it in products that they claim -as their property -without negotiating a separate agreement with us beforehand. -<p> -<a name="text">The GPL</a> -<a href="http://dsl.org/copyleft/">can also be used</a> -on documents written in human languages. -We give everyone permission to use everything on our web site under the GPL. -This means that you do not have to break copyright laws in order -to print a page or email a screen of the text to someone, for example. -Many sites do not permit you to do these things. -<p> -<a name="best">If you have a home page,</a> -we recommend that you consider using the GPL to -allow others the right to copy and use all the documents you create for it. -If you just mark a page as copyright, they won't even -legally be able to print it. -If you don't state you are its copyright owner, -they could change it slightly and claim it as their own property. -By marking it with both copyright and GPL notices -you allow them to copy it but not to claim -anything derived from it as their own. -<p> -<a name="protect">The GPL protects your</a> -<a href="declare.html">J<small>UNK<i>BUSTERS</i></small> D<small>ECLARATION</small></a>, -<a href="spamoff.html">Spam Offer</a>, -and all documents from us that you publish on your home page -or distribute to direct marketers by any other means. -By making your -D<small>ECLARATION</small> -available to them under the GPL, you are -<a href="precre.html#gpl">permitting them use to it, but never to claim it as their property,</a> -even if they transform it. -<p> -<a name="rest">The</a> -remainder of this page is the text of the GPL. -As legal documents go it's relatively clear, -but unfortunately it's fairly long because it has to cover -a lot of details specific to computer programs -that may not be relevant to -D<small>ECLARATION</small>s. -The hypertext links are ours, and should not be misinterpreted -as an indication of emphasis by the FSF. -</p> -<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p> -<center> -<h2><a name="v2"><font face="arial, helvetica"> -Version 2, June 1991 -</font></a> -</h2> -</center> -<blockquote> -<a name="crn">Copyright 1989, 1991</a> -<br> -<a name="address">Free Software Foundation, Inc.</a> -<br> -675 Mass Ave. -<br> -Cambridge, MA 02139 -<br> -USA -</blockquote> -<a name="changing">Everyone</a> -is permitted to copy and distribute verbatim copies -of this license document, but changing it is not allowed. - -<h3><a name="pream" href="/cgi-bin/gp?pg=gpl&pr=pream"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Preamble -</h3> -<p> -The licenses for most software are designed to take away your -freedom to share and change it. By contrast, the GNU General Public -License is intended to guarantee your freedom to share and change free -software--to make sure the software is free for all its users. This -General Public License applies to most of the Free Software -Foundation's software and to any other program whose authors commit to -using it. (Some other Free Software Foundation software is covered by -the GNU Library General Public License instead.) You can apply it to -your programs, too. -<p> -<a name="freedom">When we speak of free software,</a> -we are referring to freedom, not -price. Our General Public Licenses are designed to make sure that you -have the freedom to distribute copies of free software (and charge for -this service if you wish), that you receive source code or can get it -if you want it, that you can change the software or use pieces of it -in new free programs; and that you know you can do these things. -<p> -<a name="forbid">To protect your rights,</a> -we need to make restrictions that forbid -anyone to deny you these rights or to ask you to surrender the rights. -These restrictions translate to certain responsibilities for you if you -distribute copies of the software, or if you modify it. -<p> -<a name="allrights">For example,</a> -if you distribute copies of such a program, whether -gratis or for a fee, you must give the recipients all the rights that -you have. You must make sure that they, too, receive or can get the -source code. And you must show them these terms so they know their -rights. -<p> -<a name="steps">We protect your rights with two steps:</a> -(1) copyright the software, and -(2) offer you this license which gives you legal permission to copy, -distribute and/or modify the software. -<p> -<a name="protection">Also,</a> -for each author's protection and ours, we want to make certain -that everyone understands that there is no warranty for this free -software. If the software is modified by someone else and passed on, we -want its recipients to know that what they have is not the original, so -that any problems introduced by others will not reflect on the original -authors' reputations. -<p> -<a name="threat">Finally,</a> -any free program is threatened constantly by software -patents. We wish to avoid the danger that redistributors of a free -program will individually obtain patent licenses, in effect making the -program proprietary. To prevent this, we have made it clear that any -patent must be licensed for everyone's free use or not licensed at all. -<p> -<a name="terms">The precise terms and conditions</a> -for copying, distribution and -modification follow. -</p> - -<h3><a name="tnc" href="/cgi-bin/gp?pg=gpl&pr=tnc"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -GNU General Public License: Terms and Conditions for Copying, Distribution and Modification -</h3> -<p> -<a name="applies">O.</a> -This License applies to any program or other work which contains -a notice placed by the copyright holder saying it may be distributed -under the terms of this General Public License. The "Program", below, -refers to any such program or work, and a "work based on the Program" -means either the Program or any derivative work under copyright law: -that is to say, a work containing the Program or a portion of it, -either verbatim or with modifications and/or translated into another -language. (Hereinafter, -<a href="bus-ops.html#trans">translation</a> -is included without limitation in -the term "modification".) Each licensee is addressed as "you". -<p> -<a name="scope">Activities</a> -<a href="faqs.html#copying">other than copying, distribution and modification are not covered by this License;</a> -they are outside its scope. The act of -running the Program is not restricted, and the output from the Program -is covered only if its contents constitute a work based on the -Program (independent of having been made by running the Program). -<p> -<a name="depends">Whether that is true depends on what the Program does.</a> -<br><ol type="1"> -<li> -<a name="verbatim">You may copy</a> -and distribute verbatim copies of the Program's -source code as you receive it, in any medium, provided that you -conspicuously and appropriately publish on each copy an appropriate -copyright notice and disclaimer of warranty; keep intact all the -notices that refer to this License and to the absence of any warranty; -and give any other recipients of the Program a copy of this License -along with the Program. -<p> -<a name="fee">You may charge a fee</a> -for the physical act of transferring a copy, and -you may at your option offer warranty protection in exchange for a fee. -<li> -<a name="modify">You may modify</a> -your copy or copies of the Program or any portion -of it, thus forming a work based on the Program, and copy and -distribute such modifications or work under the terms of Section 1 -above, provided that you also meet all of these conditions: -<br><ol type="a"> -<li> -<a name="notices">You must cause</a> -the modified files to carry prominent notices -stating that you changed the files and the date of any change. -<li> -<a name="nocharge">You must</a> -cause any work that you distribute or publish, that in -whole or in part contains or is derived from the Program or any -part thereof, to be licensed as a whole at no charge to all third -parties under the terms of this License. -<li> -<a name="interactive">If the modified program</a> -normally reads commands interactively -when run, you must cause it, when started running for such -interactive use in the most ordinary way, to print or display an -announcement including an appropriate copyright notice and a -notice that there is no warranty (or else, saying that you provide -a warranty) and that users may redistribute the program under -these conditions, and telling the user how to view a copy of this -License. (Exception: if the Program itself is interactive but -does not normally print such an announcement, your work based on -the Program is not required to print an announcement.) -</ol> -<p> -<a name="sections">These requirements</a> -apply to the modified work as a whole. If -identifiable sections of that work are not derived from the Program, -and can be reasonably considered independent and separate works in -themselves, then this License, and its terms, do not apply to those -sections when you distribute them as separate works. But when you -distribute the same sections as part of a whole which is a work based -on the Program, the distribution of the whole must be on the terms of -this License, whose permissions for other licensees extend to the -entire whole, and thus to each and every part regardless of who wrote it. -<p> -<a name="intent">Thus,</a> -it is not the intent of this section to claim rights or contest -your rights to work written entirely by you; rather, the intent is to -exercise the right to control the distribution of derivative or -collective works based on the Program. -<p> -<a name="aggregation">In addition,</a> -mere aggregation of another work not based on the Program -with the Program (or with a work based on the Program) on a volume of -a storage or distribution medium does not bring the other work under -the scope of this License. -<li> -<a name="exeutable">You may copy</a> -and distribute the Program (or a work based on it, -under Section 2) in object code or executable form under the terms of -Sections 1 and 2 above provided that you also do one of the following: -<br><ol type="a"> -<li> -<a name="medium">Accompany it</a> -with the complete corresponding machine-readable -source code, which must be distributed under the terms of Sections -1 and 2 above on a medium customarily used for software interchange; or, -<li> -<a name="written">Accompany it with a written offer,</a> -valid for at least three -years, to give any third party, for a charge no more than your -cost of physically performing source distribution, a complete -machine-readable copy of the corresponding source code, to be -distributed under the terms of Sections 1 and 2 above on a medium -customarily used for software interchange; or, -<li> -<a name="distrib">Accompany it</a> -with the information you received as to the offer -to distribute corresponding source code. (This alternative is -allowed only for noncommercial distribution and only if you -received the program in object code or executable form with such -an offer, in accord with Subsection b above.) -</ol> -<p> -<a name="preferred">The source code</a> -for a work means the preferred form of the work for -making modifications to it. For an executable work, complete source -code means all the source code for all modules it contains, plus any -associated interface definition files, plus the scripts used to -control compilation and installation of the executable. However, as a -special exception, the source code distributed need not include -anything that is normally distributed (in either source or binary -form) with the major components (compiler, kernel, and so on) of the -operating system on which the executable runs, unless that component -itself accompanies the executable. -<p> -<a name="access">If distribution of executable or object code is made</a> -by offering -access to copy from a designated place, then offering equivalent -access to copy the source code from the same place counts as -distribution of the source code, even though third parties are not -compelled to copy the source along with the object code. -<li> -<a name="otherwise">You may not copy,</a> -modify, sublicense, or distribute the Program -except as expressly provided under this License. Any attempt -otherwise to copy, modify, sublicense or distribute the Program is -void, and will automatically terminate your rights under this License. -However, parties who have received copies, or rights, from you under -this License will not have their licenses terminated so long as such -parties remain in full compliance. -<li> -<a name="voluntary">You are not required</a> -to accept this License, since you have not -signed it. However, nothing else grants you permission to modify or -distribute the Program or its derivative works. These actions are -prohibited by law if you do not accept this License. Therefore, by -modifying or distributing the Program (or any work based on the -Program), you indicate your acceptance of this License to do so, and -all its terms and conditions for copying, distributing or modifying -the Program or works based on it. -<li> -<a name="redistrib">Each time you redistribute</a> -the Program (or any work based on the -Program), the recipient automatically receives a license from the -original licensor to copy, distribute or modify the Program subject to -these terms and conditions. You may not impose any further -restrictions on the recipients' exercise of the rights granted herein. -You are not responsible for enforcing compliance by third parties to -this License. -<li> -<a name="patent">If, as a consequence of a court judgment</a> -or allegation of patent -infringement or for any other reason (not limited to patent issues), -conditions are imposed on you (whether by court order, agreement or -otherwise) that contradict the conditions of this License, they do not -excuse you from the conditions of this License. If you cannot -distribute so as to satisfy simultaneously your obligations under this -License and any other pertinent obligations, then as a consequence you -may not distribute the Program at all. For example, if a patent -license would not permit royalty-free redistribution of the Program by -all those who receive copies directly or indirectly through you, then -the only way you could satisfy both it and this License would be to -refrain entirely from distribution of the Program. -<p> -<a name="invalid">If any portion</a> -of this section is held invalid or unenforceable under -any particular circumstance, the balance of the section is intended to -apply and the section as a whole is intended to apply in other -circumstances. -<p> -<a name="induce">It is not the purpose</a> -of this section to induce you to infringe any -patents or other property right claims or to contest validity of any -such claims; this section has the sole purpose of protecting the -integrity of the free software distribution system, which is -implemented by public license practices. Many people have made -generous contributions to the wide range of software distributed -through that system in reliance on consistent application of that -system; it is up to the author/donor to decide if he or she is willing -to distribute software through any other system and a licensee cannot -impose that choice. -<p> -<a name="clarify">This section</a> -is intended to make thoroughly clear what is believed to -be a consequence of the rest of this License. -<li> -<a name="geog">If the distribution</a> -and/or use of the Program is restricted in -certain countries either by patents or by copyrighted interfaces, the -original copyright holder who places the Program under this License -may add an explicit geographical distribution limitation excluding -those countries, so that distribution is permitted only in or among -countries not thus excluded. In such case, this License incorporates -the limitation as if written in the body of this License. -<li> -<a name="revise">The Free Software Foundation</a> -may publish revised and/or new versions -of the General Public License from time to time. Such new versions will -be similar in spirit to the present version, but may differ in detail to -address new problems or concerns. -Each version is given a distinguishing version number. If the Program -specifies a version number of this License which applies to it and "any -later version", you have the option of following the terms and conditions -either of that version or of any later version published by the Free -Software Foundation. If the Program does not specify a version number of -this License, you may choose any version ever published by the Free Software -Foundation. -<li> -<a name="permission">If you wish to incorporate parts</a> -of the Program into other free -programs whose distribution conditions are different, write to the author -to ask for permission. For software which is copyrighted by the Free -Software Foundation, write to the Free Software Foundation; we sometimes -make exceptions for this. Our decision will be guided by the two goals -of preserving the free status of all derivatives of our free software and -of promoting the sharing and reuse of software generally. -<p> -<a name="nowarr">NO WARRANTY</a> -<li> -<a name="foc">BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,</a> -THERE IS NO WARRANTY -FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN -OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES -PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED -OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS -TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE -PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, -REPAIR OR CORRECTION. -<li> -<a name="liable">IN NO EVENT UNLESS REQUIRED</a> -BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR -REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, -INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING -OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED -TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER -PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE -POSSIBILITY OF SUCH DAMAGES. -</ol> -END OF TERMS AND CONDITIONS -</p> - -<h3><a name="append" href="/cgi-bin/gp?pg=gpl&pr=append"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Appendix: How to Apply These Terms to Your New Programs -</h3> -<p> -If you develop a new program, and you want it to be of the greatest -possible use to the public, the best way to achieve this is to make it -free software which everyone can redistribute and change under these terms. -<p> -<a name="attach">To do so,</a> -attach the following notices to the program. It is safest -to attach them to the start of each source file to most effectively -convey the exclusion of warranty; and each file should have at least -the "copyright" line and a pointer to where the full notice is found. -<blockquote> -<one line -to give the program's name and a brief idea of what it -does.> -Copyright (C) 19yy -<name of -author> -<p> -<a name="free">This program is free software;</a> -you can redistribute it and/or modify -it under the terms of the GNU General Public License as published by -the Free Software Foundation; either version 2 of the License, or -(at your option) any later version. -<p> -<a name="merchant">This program</a> -is distributed in the hope that it will be useful, -but WITHOUT ANY WARRANTY; without even the implied warranty of -MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -GNU General Public License for more details. -<p> -<a name="ifnot">You should</a> -have received a copy of the GNU General Public License -along with this program; if not, write to the Free Software -Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -</blockquote> -<p> -<a name="contact">Also add</a> -information on how to contact you by electronic and paper mail. -<p> -<a name="short">If the program is interactive,</a> -make it output a short notice like this -when it starts in an interactive mode: -<blockquote> -Gnomovision version 69, Copyright (C) 19yy name of author -Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. -This is free software, and you are welcome to redistribute it -under certain conditions; type `show c' for details. -</blockquote> -<p> -<a name="hypo">The hypothetical</a> -commands `show w' and `show c' should show the appropriate -parts of the General Public License. Of course, the commands you use may -be called something other than `show w' and `show c'; they could even be -mouse-clicks or menu items--whatever suits your program. -<p> -<a name="disclaimer">You should also get your employer</a> -(if you work as a programmer) or your -school, if any, to sign a "copyright disclaimer" for the program, if -necessary. Here is a sample; alter the names: -<blockquote> -Yoyodyne, Inc., hereby disclaims all copyright interest in the program -`Gnomovision' (which makes passes at compilers) written by James Hacker. - -<signature -of -Ty Coon>, -1 April 1989 -<br> -Ty Coon, President of Vice -</blockquote> -<p> -<a name="library">This General Public License</a> -does not permit incorporating your program into -proprietary programs. If your program is a subroutine library, you may -consider it more useful to permit linking proprietary applications with the -library. If this is what you want to do, use the GNU Library General -Public License instead of this License. -</p> -<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p> -<font face="arial, helvetica"> -<a rel="begin" href="index.html">Home</a> <font color="#ff0000"> -<b> · </b></font> -<a rel="next" href="precre.html">Next</a> -<font color="#ff0000"> -<b> · </b></font><a href="lopt.html">Site Map</a> -<font color="#ff0000"> -<b> · </b></font><a href="legal.html">Legal</a> -<font color="#ff0000"> -<b> · </b></font><a href="junkdata.html">Privacy</a> -<font color="#ff0000"> -<b> · </b></font><a href="cookies.html">Cookies</a> -<font color="#ff0000"> -<b> · </b></font><a href="ijb.html">Banner Ads</a> -<font color="#ff0000"> -<b> · </b></font><a href="telemarketing.html">Telemarketing</a> -<font color="#ff0000"> -<b> · </b></font><a href="junkmail.html">Mail</a> -<font color="#ff0000"> -<b> · </b></font><a href="junkemail.html">Spam</a> - -</font><form action="/cgi-bin/search" method="GET"> -<input type="text" name="q" size=60 maxlength=120 value=""> -<input type="submit" value="Search"></form> -<small> -<small> -<p> -<a href="legal.html#copy">Copyright</a> © 1996-8 Junkbusters -<a href="legal.html#marks">®</a> Corporation. -Copying and distribution permitted under -the <a href="gpl.html"><small>GNU</small></a> -General Public License. -</small> -<tt> -1998/10/31 -http://www.junkbusters.com/ht/en/gpl.html -</tt> -<address><kbd>webmaster@junkbusters.com</kbd></address> -</small> -</body> + <head> + <title>The GNU General Public License</title> + <meta name="description" content= + "GNU General Public License, as used by Junkbuster"> + <meta name="keywords" content=""> +<style type="text/css"> +<!-- +h2 { text-align: Center; font-family: arial, helvetica, sans-serif } +p.sans { font-family: arial, helvetica, sans-serif } +b.dot { color: #FF0000 } +--> +</style> + </head> + + <body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink= + "#787878"> + <p class="sans"><a href="http://ijbswa.sourceforge.net/"> + Website</a> <b class="dot">·</b> <a href="ijbman.html"> + Manual</a> <b class="dot">·</b> <a href="ijbfaq.html"> + FAQ</a> <b class="dot">·</b> <b>GPL</b></p> + + <h1 align="center"><a name="top_of_page">Internet J<small>UNK<i + style="color: #FF0000">BUSTER</i></small> License</a></h1> + + <h1>This document is out of date</h1> + + <p><b>Development of JunkBuster is ongoing and this document is + no longer current. However, it may provide some assistance. If + you have problems, please use the <a href= + "http://groups.yahoo.com/group/junkbuster-users/">Yahoo Groups + mailing list</a> (which includes an archive of mail), the + SourceForge.net <a href= + "http://sourceforge.net/projects/ijbswa/">project page</a>, or + see the project's <a href="http://ijbswa.sourceforge.net/">home + page</a>. Please also bear in mind that versions 2.9.x of + JunkBuster are development releases, and are not production + quality.</b></p> + + <h3 align="center">The GNU General Public License</h3> + + <p class="sans"><a name="notus"><b>We did not write the GPL: + the <a href="http://www.fsf.org/fsf/fsf.html">Free Software + Foundation</a> did</b></a></p> + + <h3><img border="0" width="14" height="14" src="fb.gif" alt= + "*"> The GPL allows copying and changing of copyrighted + documents</h3> + + <p><a name="fsf">The Free Software Foundation</a> <a href= + "http://www.fsf.org/fsf/fsf.html">(FSF)</a> is a non-profit + institution that designed the GNU General Public License (GPL) + to promote the publication of free software. The GPL is used by + thousands of programmers who want to give others the right to + copy and modify the source code of their programs. Millions of + people benefit from this.</p> + + <p><a name="junkbuster">We use the GPL</a> to allow everyone to + use, copy and modify the Internet Junkbuster as they wish. <a + name="separate">Companies can use it for commercial + purposes,</a> but they are not permitted to use it in products + that they claim as their property.</p> + + <p><a name="text">The GPL</a> can also be used on documents + written in human languages. This documentation for the Internet + Junkbuster is also under the GPL. This means that you do not + have to break copyright laws in order to print a page or email + a screen of the text to someone, for example.</p> + + <p><a name="rest">The</a> remainder of this page is the text of + the GPL. As legal documents go it's relatively clear, but + unfortunately it's fairly long because it has to cover a lot of + details. The HTML formatting is ours, and should not be + misinterpreted as changing the license in any way.</p> + + <p align="center"><a href="#top_of_page"><img border="0" width= + "250" height="15" src="top.gif" alt= + "--- Back to Top of Page ---"></a></p> + + <h2><a name="v2">Version 2, June 1991</a></h2> + + <blockquote> + <a name="crn">Copyright 1989, 1991</a><br> + <a name="address">Free Software Foundation, Inc.</a><br> + 675 Mass Ave.<br> + Cambridge, MA 02139<br> + USA + </blockquote> + <a name="changing">Everyone</a> + + <p>is permitted to copy and distribute verbatim copies of this + license document, but changing it is not allowed.</p> + + <h3><a name="pream"><img border="0" width="14" height="14" src= + "fb.gif" alt="*"></a> Preamble</h3> + + <p>The licenses for most software are designed to take away + your freedom to share and change it. By contrast, the GNU + General Public License is intended to guarantee your freedom to + share and change free software--to make sure the software is + free for all its users. This General Public License applies to + most of the Free Software Foundation's software and to any + other program whose authors commit to using it. (Some other + Free Software Foundation software is covered by the GNU Library + General Public License instead.) You can apply it to your + programs, too.</p> + + <p><a name="freedom">When we speak of free software,</a> we are + referring to freedom, not price. Our General Public Licenses + are designed to make sure that you have the freedom to + distribute copies of free software (and charge for this service + if you wish), that you receive source code or can get it if you + want it, that you can change the software or use pieces of it + in new free programs; and that you know you can do these + things.</p> + + <p><a name="forbid">To protect your rights,</a> we need to make + restrictions that forbid anyone to deny you these rights or to + ask you to surrender the rights. These restrictions translate + to certain responsibilities for you if you distribute copies of + the software, or if you modify it.</p> + + <p><a name="allrights">For example,</a> if you distribute + copies of such a program, whether gratis or for a fee, you must + give the recipients all the rights that you have. You must make + sure that they, too, receive or can get the source code. And + you must show them these terms so they know their rights.</p> + + <p><a name="steps">We protect your rights with two steps:</a> + (1) copyright the software, and (2) offer you this license + which gives you legal permission to copy, distribute and/or + modify the software.</p> + + <p><a name="protection">Also,</a> for each author's protection + and ours, we want to make certain that everyone understands + that there is no warranty for this free software. If the + software is modified by someone else and passed on, we want its + recipients to know that what they have is not the original, so + that any problems introduced by others will not reflect on the + original authors' reputations.</p> + + <p><a name="threat">Finally,</a> any free program is threatened + constantly by software patents. We wish to avoid the danger + that redistributors of a free program will individually obtain + patent licenses, in effect making the program proprietary. To + prevent this, we have made it clear that any patent must be + licensed for everyone's free use or not licensed at all.</p> + + <p><a name="terms">The precise terms and conditions</a> for + copying, distribution and modification follow.</p> + + <h3><a name="tnc"><img border="0" width="14" height="14" src= + "fb.gif" alt="*"></a> GNU General Public License: Terms + and Conditions for Copying, Distribution and Modification</h3> + + <p><a name="applies">O.</a> This License applies to any program + or other work which contains a notice placed by the copyright + holder saying it may be distributed under the terms of this + General Public License. The "Program", below, refers to any + such program or work, and a "work based on the Program" means + either the Program or any derivative work under copyright law: + that is to say, a work containing the Program or a portion of + it, either verbatim or with modifications and/or translated + into another language. (Hereinafter, translation is included + without limitation in the term "modification".) Each licensee + is addressed as "you".</p> + + <p><a name="scope">Activities</a> other than copying, + distribution and modification are not covered by this License; + they are outside its scope. The act of running the Program is + not restricted, and the output from the Program is covered only + if its contents constitute a work based on the Program + (independent of having been made by running the Program).</p> + + <p><a name="depends">Whether that is true depends on what the + Program does.</a><br> + </p> + + <ol type="1"> + <li> + <a name="verbatim">You may copy</a> and distribute verbatim + copies of the Program's source code as you receive it, in + any medium, provided that you conspicuously and + appropriately publish on each copy an appropriate copyright + notice and disclaimer of warranty; keep intact all the + notices that refer to this License and to the absence of + any warranty; and give any other recipients of the Program + a copy of this License along with the Program. + + <p><a name="fee">You may charge a fee</a> for the physical + act of transferring a copy, and you may at your option + offer warranty protection in exchange for a fee.</p> + </li> + + <li> + <a name="modify">You may modify</a> your copy or copies of + the Program or any portion of it, thus forming a work based + on the Program, and copy and distribute such modifications + or work under the terms of Section 1 above, provided that + you also meet all of these conditions:<br> + + + <ol type="a"> + <li><a name="notices">You must cause</a> the modified + files to carry prominent notices stating that you changed + the files and the date of any change.</li> + + <li><a name="nocharge">You must</a> cause any work that + you distribute or publish, that in whole or in part + contains or is derived from the Program or any part + thereof, to be licensed as a whole at no charge to all + third parties under the terms of this License.</li> + + <li><a name="interactive">If the modified program</a> + normally reads commands interactively when run, you must + cause it, when started running for such interactive use + in the most ordinary way, to print or display an + announcement including an appropriate copyright notice + and a notice that there is no warranty (or else, saying + that you provide a warranty) and that users may + redistribute the program under these conditions, and + telling the user how to view a copy of this License. + (Exception: if the Program itself is interactive but does + not normally print such an announcement, your work based + on the Program is not required to print an + announcement.)</li> + </ol> + + <p><a name="sections">These requirements</a> apply to the + modified work as a whole. If identifiable sections of that + work are not derived from the Program, and can be + reasonably considered independent and separate works in + themselves, then this License, and its terms, do not apply + to those sections when you distribute them as separate + works. But when you distribute the same sections as part of + a whole which is a work based on the Program, the + distribution of the whole must be on the terms of this + License, whose permissions for other licensees extend to + the entire whole, and thus to each and every part + regardless of who wrote it.</p> + + <p><a name="intent">Thus,</a> it is not the intent of this + section to claim rights or contest your rights to work + written entirely by you; rather, the intent is to exercise + the right to control the distribution of derivative or + collective works based on the Program.</p> + + <p><a name="aggregation">In addition,</a> mere aggregation + of another work not based on the Program with the Program + (or with a work based on the Program) on a volume of a + storage or distribution medium does not bring the other + work under the scope of this License.</p> + </li> + + <li> + <a name="exeutable">You may copy</a> and distribute the + Program (or a work based on it, under Section 2) in object + code or executable form under the terms of Sections 1 and 2 + above provided that you also do one of the following:<br> + + + <ol type="a"> + <li><a name="medium">Accompany it</a> with the complete + corresponding machine-readable source code, which must be + distributed under the terms of Sections 1 and 2 above on + a medium customarily used for software interchange; + or,</li> + + <li><a name="written">Accompany it with a written + offer,</a> valid for at least three years, to give any + third party, for a charge no more than your cost of + physically performing source distribution, a complete + machine-readable copy of the corresponding source code, + to be distributed under the terms of Sections 1 and 2 + above on a medium customarily used for software + interchange; or,</li> + + <li><a name="distrib">Accompany it</a> with the + information you received as to the offer to distribute + corresponding source code. (This alternative is allowed + only for noncommercial distribution and only if you + received the program in object code or executable form + with such an offer, in accord with Subsection b + above.)</li> + </ol> + + <p><a name="preferred">The source code</a> for a work means + the preferred form of the work for making modifications to + it. For an executable work, complete source code means all + the source code for all modules it contains, plus any + associated interface definition files, plus the scripts + used to control compilation and installation of the + executable. However, as a special exception, the source + code distributed need not include anything that is normally + distributed (in either source or binary form) with the + major components (compiler, kernel, and so on) of the + operating system on which the executable runs, unless that + component itself accompanies the executable.</p> + + <p><a name="access">If distribution of executable or object + code is made</a> by offering access to copy from a + designated place, then offering equivalent access to copy + the source code from the same place counts as distribution + of the source code, even though third parties are not + compelled to copy the source along with the object + code.</p> + </li> + + <li><a name="otherwise">You may not copy,</a> modify, + sublicense, or distribute the Program except as expressly + provided under this License. Any attempt otherwise to copy, + modify, sublicense or distribute the Program is void, and + will automatically terminate your rights under this License. + However, parties who have received copies, or rights, from + you under this License will not have their licenses + terminated so long as such parties remain in full + compliance.</li> + + <li><a name="voluntary">You are not required</a> to accept + this License, since you have not signed it. However, nothing + else grants you permission to modify or distribute the + Program or its derivative works. These actions are prohibited + by law if you do not accept this License. Therefore, by + modifying or distributing the Program (or any work based on + the Program), you indicate your acceptance of this License to + do so, and all its terms and conditions for copying, + distributing or modifying the Program or works based on + it.</li> + + <li><a name="redistrib">Each time you redistribute</a> the + Program (or any work based on the Program), the recipient + automatically receives a license from the original licensor + to copy, distribute or modify the Program subject to these + terms and conditions. You may not impose any further + restrictions on the recipients' exercise of the rights + granted herein. You are not responsible for enforcing + compliance by third parties to this License.</li> + + <li> + <a name="patent">If, as a consequence of a court + judgment</a> or allegation of patent infringement or for + any other reason (not limited to patent issues), conditions + are imposed on you (whether by court order, agreement or + otherwise) that contradict the conditions of this License, + they do not excuse you from the conditions of this License. + If you cannot distribute so as to satisfy simultaneously + your obligations under this License and any other pertinent + obligations, then as a consequence you may not distribute + the Program at all. For example, if a patent license would + not permit royalty-free redistribution of the Program by + all those who receive copies directly or indirectly through + you, then the only way you could satisfy both it and this + License would be to refrain entirely from distribution of + the Program. + + <p><a name="invalid">If any portion</a> of this section is + held invalid or unenforceable under any particular + circumstance, the balance of the section is intended to + apply and the section as a whole is intended to apply in + other circumstances.</p> + + <p><a name="induce">It is not the purpose</a> of this + section to induce you to infringe any patents or other + property right claims or to contest validity of any such + claims; this section has the sole purpose of protecting the + integrity of the free software distribution system, which + is implemented by public license practices. Many people + have made generous contributions to the wide range of + software distributed through that system in reliance on + consistent application of that system; it is up to the + author/donor to decide if he or she is willing to + distribute software through any other system and a licensee + cannot impose that choice.</p> + + <p><a name="clarify">This section</a> is intended to make + thoroughly clear what is believed to be a consequence of + the rest of this License.</p> + </li> + + <li><a name="geog">If the distribution</a> and/or use of the + Program is restricted in certain countries either by patents + or by copyrighted interfaces, the original copyright holder + who places the Program under this License may add an explicit + geographical distribution limitation excluding those + countries, so that distribution is permitted only in or among + countries not thus excluded. In such case, this License + incorporates the limitation as if written in the body of this + License.</li> + + <li><a name="revise">The Free Software Foundation</a> may + publish revised and/or new versions of the General Public + License from time to time. Such new versions will be similar + in spirit to the present version, but may differ in detail to + address new problems or concerns. Each version is given a + distinguishing version number. If the Program specifies a + version number of this License which applies to it and "any + later version", you have the option of following the terms + and conditions either of that version or of any later version + published by the Free Software Foundation. If the Program + does not specify a version number of this License, you may + choose any version ever published by the Free Software + Foundation.</li> + + <li> + <a name="permission">If you wish to incorporate parts</a> + of the Program into other free programs whose distribution + conditions are different, write to the author to ask for + permission. For software which is copyrighted by the Free + Software Foundation, write to the Free Software Foundation; + we sometimes make exceptions for this. Our decision will be + guided by the two goals of preserving the free status of + all derivatives of our free software and of promoting the + sharing and reuse of software generally. + + <p><a name="nowarr">NO WARRANTY</a></p> + </li> + + <li><a name="foc">BECAUSE THE PROGRAM IS LICENSED FREE OF + CHARGE,</a> THERE IS NO WARRANTY FOR THE PROGRAM, TO THE + EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE + STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES + PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, + EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, + THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A + PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND + PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM + PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY + SERVICING, REPAIR OR CORRECTION.</li> + + <li><a name="liable">IN NO EVENT UNLESS REQUIRED</a> BY + APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT + HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE + THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, + INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL + DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE + PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA + BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD + PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER + PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN + ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.</li> + </ol> + + <p>END OF TERMS AND CONDITIONS<br> + <br> + </p> + + <h3><a name="append"><img border="0" width="14" height="14" + src="fb.gif" alt="*"></a> Appendix: How to Apply These + Terms to Your New Programs</h3> + + <p>If you develop a new program, and you want it to be of the + greatest possible use to the public, the best way to achieve + this is to make it free software which everyone can + redistribute and change under these terms.</p> + + <p><a name="attach">To do so,</a> attach the following notices + to the program. It is safest to attach them to the start of + each source file to most effectively convey the exclusion of + warranty; and each file should have at least the "copyright" + line and a pointer to where the full notice is found.</p> + + <blockquote> + <one line to give the program's name and a brief idea of + what it does.> Copyright (C) 19yy <name of author> + + <p><a name="free">This program is free software;</a> you can + redistribute it and/or modify it under the terms of the GNU + General Public License as published by the Free Software + Foundation; either version 2 of the License, or (at your + option) any later version.</p> + + <p><a name="merchant">This program</a> is distributed in the + hope that it will be useful, but WITHOUT ANY WARRANTY; + without even the implied warranty of MERCHANTABILITY or + FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public + License for more details.</p> + + <p><a name="ifnot">You should</a> have received a copy of the + GNU General Public License along with this program; if not, + write to the Free Software Foundation, Inc., 675 Mass Ave, + Cambridge, MA 02139, USA.</p> + </blockquote> + + <p><a name="contact">Also add</a> information on how to contact + you by electronic and paper mail.</p> + + <p><a name="short">If the program is interactive,</a> make it + output a short notice like this when it starts in an + interactive mode:</p> + + <blockquote> + Gnomovision version 69, Copyright (C) 19yy name of author + Gnomovision comes with ABSOLUTELY NO WARRANTY; for details + type `show w'. This is free software, and you are welcome to + redistribute it under certain conditions; type `show c' for + details. + </blockquote> + + <p><a name="hypo">The hypothetical</a> commands `show w' and + `show c' should show the appropriate parts of the General + Public License. Of course, the commands you use may be called + something other than `show w' and `show c'; they could even be + mouse-clicks or menu items--whatever suits your program.</p> + + <p><a name="disclaimer">You should also get your employer</a> + (if you work as a programmer) or your school, if any, to sign a + "copyright disclaimer" for the program, if necessary. Here is a + sample; alter the names:</p> + + <blockquote> + Yoyodyne, Inc., hereby disclaims all copyright interest in + the program `Gnomovision' (which makes passes at compilers) + written by James Hacker. <signature of Ty Coon>, 1 + April 1989<br> + Ty Coon, President of Vice + </blockquote> + + <p><a name="library">This General Public License</a> does not + permit incorporating your program into proprietary programs. If + your program is a subroutine library, you may consider it more + useful to permit linking proprietary applications with the + library. If this is what you want to do, use the GNU Library + General Public License instead of this License.</p> + + <p align="center"><a href="#top_of_page"><img border="0" width= + "250" height="15" src="top.gif" alt= + "--- Back to Top of Page ---"></a></p> + + <p class="sans"><a href="http://ijbswa.sourceforge.net/"> + Website</a> <b class="dot">·</b> <a href="ijbman.html"> + Manual</a> <b class="dot">·</b> <a href="ijbfaq.html"> + FAQ</a> <b class="dot">·</b> <b>GPL</b></p> + + <p class="sans"><small><small><a href="gpl.html#text"> + Copyright</a> © 1996-8 <a href= + "http://www.junkbusters.com/">Junkbusters</a> <a href= + "http://www.junkbusters.com/ht/en/legal.html#marks">®</a> + Corporation. <a href="gpl.html#text">Copyright</a> © 2001 + <a href="http://sourceforge.net/projects/ijbswa/">Jon + Foster</a>. Copying and distribution permitted under the <a + href="gpl.html">GNU</a> General Public License. The text of the + GNU GPL itself is copyrighted by the FSF, and may be copied but + not modified.</small></small></p> + + <p><small><code><a href= + "http://sourceforge.net/projects/ijbswa/"> + http://sourceforge.net/projects/ijbswa/</a></code></small></p> + </body> </html> + diff --git a/doc/ijbfaq.html b/doc/ijbfaq.html index ab7e7989..f9168a68 100644 --- a/doc/ijbfaq.html +++ b/doc/ijbfaq.html @@ -1,3186 +1,1999 @@ -<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"> +<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> +<!-- $Id$ + + See copyright details at end of file + + After changing this file, please run it through "HTML Tidy" + (from http://www.w3.org/People/Raggett/tidy/) + It should have no warnings or errors. +--> + <html> -<head> -<!-- Copyright 1996-8 Junkbusters Corporation --> -<!-- This work comes with NO WARRANTY --> -<!-- It may be redistributed and modified under the GNU GPL--> -<!-- See the body of http://www.junkbusters.com/ht/en/gpl.html for details--> -<!-- Junkbusters is a registered trade mark of Junkbusters Corporation --> -<!-- Generated 1998/10/31 03:58:25 UTC --> -<meta name="Generator" content="Junkbusters Ebira $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $"> -<!-- Document ID: $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $ --> -<title> -Internet Junkbuster Frequently Asked Questions -</title> -<base href="http://www.junkbusters.com/ht/en/ijbfaq.html"> -<meta name="description" content="An extensive FAQ on the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser."> -<meta name="keywords" content="stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, spamoff, declare, telemarketing, telemarketers, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, conservation, recycling, catalogs, consumer, sending, opt out , privacy, advertising, direct, marketing, targeting, through, click, trails, http_referer, cookie, cutter, iff, internet fast forward, Cookie Management Tool"> -<link rel="next" href="ijbman.html"> -<link rel="previous" href="ijb.html"> -<link rel="contents" href="toc.html"> -</head> -<body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink="#787878"> -<center> -<h1><a name="top_of_page">Internet J<small>UNK<i><font color=red>BUSTER</font></i></small> Frequently Asked Questions -</a></h1> -</center> -<font face="arial, helvetica"> -<p align="center"> -<a href="#u">Download for UNIX</a> -<font color="#ff0000"> -<b> · </b></font><a href="ijbwin.html#zip">(Download for Windows 95/NT)</a> -<font color="#ff0000"> -<b> · </b></font><a href="ijbdist.html#top_of_page">(Other OS)</a> -<font color="#ff0000"> -<b> · </b></font><a href="#browser">Configuring Browsers</a> -<font color="#ff0000"> -<b> · </b></font><a href="#local">Installation</a> -<font color="#ff0000"> -<b> · </b></font><a href="#companies">For Companies</a> -<font color="#ff0000"> -<b> · </b></font><a href="#blocking">Blocking</a> -<font color="#ff0000"> -<b> · </b></font><a href="#cookies">Cookies</a> -<font color="#ff0000"> -<b> · </b></font><a href="#anonymity">Anonymity</a> -<font color="#ff0000"> -<b> · </b></font><a href="#security">Security</a> -<font color="#ff0000"> -<b> · </b></font><a href="ijbman.html#top_of_page">(Technical Manual)</a> -</p> -</font><br> -<center> -<h2><a name="top"><font face="arial, helvetica"> -The Top Ten Questions -</font></a> -</h2> -</center> -<br>For a list of the questions on this page (without the answers), -see our -<a href="toc.html#ijbfaq">Table of Contents.</a> -It also contains detailed pointers into our pages -on -<a href="cookies.html">cookies</a> -and on busting -<a href="junkemail.html">junk e-mail,</a> -<a href="junkmail.html">junk mail</a> -and -<a href="telemarketing.html">telemarketing calls.</a> - -<h3><a name="what" href="/cgi-bin/gp?pg=ijbfaq&pr=what"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -What is the Internet Junkbuster Proxy and what does it do for me? -</h3> -<p> -The -Internet Junkbuster -Proxy -<a href="legal.html#marks"><small><sup>TM</sup></small></a> -is -<a href="ijbfaq.html#free">free</a> -privacy-enhancing software that can be run on your PC or by your -<small>ISP</small> -or company. -It blocks requests for -<small>URL</small>s -(typically banner ads) -that match its -<a href="ijbfaq.html#blocking">blockfile.</a> -It also deletes unauthorized -<a href="ijbfaq.html#cookies">cookies</a> -and other -unwanted identifying -<a href="ijbfaq.html#anonymity">header information</a> -that is exchanged between web servers and browsers. -These headers are not normally accessible to users -(even though they may contain information that's important to your privacy), -but with the -Internet Junkbuster -you can see almost -<a href="ijbman.html#o_d">anything you want</a> -and control everything you're likely to need. -<b>You</b> -<a href="over.html#you_def">decide what's junk.</a> -<a href="legal.html#marks"><small><sup>SM</sup></small></a> -Many people -<a href="ijbfaq.html#readymade">publish</a> -their blockfiles to help others get started. -</p> - -<h3><a name="free" href="/cgi-bin/gp?pg=ijbfaq&pr=free"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Is there a license fee / warranty / registration form / expiration? -</h3> -<p> -No, none of these. -It's completely free of charge. -Junkbusters -offers you the software to copy, use, modify and distribute -as you wish, forever, at -<a href="over.html#nobucks">no charge</a> -under the -<a href="gpl.html">GNU General Public License.</a> -<p> -<a name="warranty">It comes with</a> -<a href="gpl.html#nowarr">no warranty of any kind.</a> -<p> -<a name="register">You don't have to register,</a> -in fact we don't even provide a way to do so: -the practice of registering software is -usually just an -excuse -to send you solicitations and -<a href="self.html#warranty">sell your name</a> -and information about your behavior. -You are welcome to obtain and use our software as anonymously you wish. -(Your -<small>IP</small> -address will naturally be -<a href="http://www.junkbusters.com/cgi-bin/privacy">disclosed</a> -when you download it, -so if you work for a web ad company -you might want to use a service such as the -<a href="ijbfaq.html#anonymizing">lpwa.com</a> -when you get it. -We -<a href="over.html#nopriv">never</a> -want to be given any information that you consider private or confidential.) -<p> -<a name="why">We are often asked why we give away a product that many</a> -would happily pay for. -The answer is that we are determined to carry out our -<a href="over.html">mission:</a> -to free the world from junk communications. -</p> - -<h3><a name="windows" href="/cgi-bin/gp?pg=ijbfaq&pr=windows"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Does it run on Windows? On a Mac? On the AOL browser? -</h3> -<p> -For the latest information on availability, see the -<a href="ijbdist.html">Distribution Information</a> -page. -We -<a href="ijbdist.html#win3.1">don't</a> -think it will ever run on -Windows 3.1. -But you don't need to have it running on your computer -if you get your -<small>ISP</small> -or Systems Administrator at -<a href="ijbfaq.html#companies">work</a> -to run it. -</p> - -<h3><a name="isp" href="/cgi-bin/gp?pg=ijbfaq&pr=isp"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How can I get my ISP to run the Internet Junkbuster? -</h3> -<p> -Try their sales or support department -(depending on whether you are already a customer). -<a name="unaware">You might send them email including the following</a> -<small>URL</small>: -<br> -   <big><kbd>http://www.junkbusters.com/ht/en/ijbfaq.html#isps</kbd></big> -<br> -<a name="switch">You could mention that many</a> -<a href="ijbfaq.html#does">other</a> -<small>ISP</small>s -provide it, -and that you regard it as an important part of your decision on -where to buy Internet service. -</p> - -<h3><a name="who" href="/cgi-bin/gp?pg=ijbfaq&pr=who"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Who chooses the options that control what is blocked? -</h3> -<p> -Whoever starts the -Internet Junkbuster -chooses the options and the blockfile. -If your -<small>ISP</small> -runs it for you, they have to make these decision -(though -<a href="http://www.lunatech.com/proxy/">some</a> -may give you a choice of proxies, -and a way to suggest new -<small>URL</small>s -to block). -If you run it on your computer, -<b>You</b> -<a href="over.html#you_def">decide what's junk.</a> -<a href="legal.html#marks"><small><sup>SM</sup></small></a> -</p> - -<h3><a name="self" href="/cgi-bin/gp?pg=ijbfaq&pr=self"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How do I download and run the program on my computer? -</h3> -<p> -It depends on your platform. -If you are using Windows 95 or NT, -see our separate page on -<a href="ijbwin.html">installing under Windows.</a> -If you have a C compiler and are using almost any flavor of -<small>UNIX <a href="legal.html#not_our_trademark">®</a></small> -you -<a href="ijbfaq.html#local">download it, compile it, start it running,</a> -and then -<a href="ijbfaq.html#browser">configure your browser.</a> -Several precompiled packages are also available through links in our -<a href="ijbdist.html">distribution page</a>, -which lists all available platforms. -<p> -<a name="port">If you are using a platform for which we have no current</a> -availability, -you are welcome to port the code. -If you do this and you would like us to consider publishing your ported version, -please -<a href="/cgi-bin/gp?pg=ijbfaq&pr=port">tell us.</a> -</p> - -<h3><a name="show" href="/cgi-bin/gp?pg=ijbfaq&pr=show"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How can I tell which blockfile and options are being used? -</h3> -<p> -Just point your browser to -<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a> -or to any -<small>URL</small> -ending in -<big><kbd>show-proxy-args</kbd></big> -(even if it doesn't exist). -It needn't exist because the -Internet Junkbuster 2.0 -intercepts the request, blocks it, -and returns in its place -information about itself. -Using the -<small>URL</small> -above is useful for checking that your browser really is -going through an -Internet Junkbuster, -because the -<big><kbd>junkbuster.com</kbd></big> -server returns a warning if the request actually gets to it. -Some people set the home page of their browser to such a -<small>URL</small> -to be sure that it is configured to use the proxy. -<p> -<a name="headers">If you wish to check the header information</a> -your proxy is actually sending, -a visit to -<a href="http://internet.junkbuster.com/cgi-bin/show-http-headers">http://internet.junkbuster.com/cgi-bin/show-http-headers</a> -will give you the more relevant ones first. -You might also like to turn the proxy -<a href="ijbfaq.html#discontinue">off</a> -and compare the difference. (Don't forget to turn it back on again.) -</p> - -<h3><a name="responding" href="/cgi-bin/gp?pg=ijbfaq&pr=responding"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -My browser started giving me ``server not responding'' messages -</h3> -<p> -Once your browser is told to use a proxy such as the -Internet Junkbuster, -it thinks of it as its server for everything, -so this message means it can't talk to the proxy. -The -Internet Junkbuster -may not be running, -or you may have specified its proxy -<a href="ijbfaq.html#address">address</a> -incorrectly. -Check that the details you entered are correct. -If you have -<big><kbd>telnet</kbd></big> -you can try connecting to the appropriate port to see if the -Internet Junkbuster -is running. -If your -<small>ISP</small> -is running the -Internet Junkbuster, -you may want to check with them. -If you are running it yourself under -<small>UNIX <a href="legal.html#not_our_trademark">®</a></small>, -try looking at a -<big><kbd>ps ax</kbd></big> -to see if it is running. -The -<a href="ijbman.html#o_h">port</a> -specified in its options should be the same one as your -browser has configured. -</p> - -<h3><a name="idea" href="/cgi-bin/gp?pg=ijbfaq&pr=idea"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -I've got this great idea for a new feature. Who do I tell? -</h3> -<p> -We'd be very interested to hear it, but please bear a few things in mind. -<br><ul type="1"> -<li> -<a name="considered">Please check this FAQ to see if we've already considered</a> -the idea, -such as -<a href="ijbfaq.html#size">automatic detection</a> -of banner ads -and -<a href="ijbfaq.html#broken">replacing ads</a> -with something else such as a -transparent -<small>GIF</small>. -<li> -<a name="confidential">Don't tell us anything you want to keep confidential</a> -or retain some right over. -<li> -<a name="wish">We currently have a</a> -long wish list of things that we may or may not do -in the near future, including -a version for your favorite computer and a plug-in version. -<li> -<a name="go4it">If you don't want to wait</a> -you're welcome to improve on our code, publish your version on the Web, -and -<a href="/cgi-bin/gp?pg=ijbfaq&pr=idea">tell us</a> -where to find it. -Projects that are especially welcome -include -a port to the Mac -and extensions for -<small>HTTP</small> -1.1. -</ul> -</p> - -<h3><a name="other" href="/cgi-bin/gp?pg=ijbfaq&pr=other"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -My question isn't listed here. Who do I ask for support? -</h3> -<p> -<a name="harder">If you find using our free product</a> -harder than you're used to for consumer software, -there are many -<a href="links.html#WebWiper">commercial alternatives</a> -that you could consider. -<p> -<a name="RTM">The answer to detailed technical questions may be answered in</a> -<a href="ijbman.html">manual page</a>, -or in the source code. -Also double-check this page for an answer: -using the ``find'' feature on your browser for likely keywords may help. -Our site also has a -<a href="search.html">search</a> -feature. -<p> -<a name="Use">Many people post requests for help and responses on</a> -<a href="http://search.dejanews.com/dnquery.xp?query=junkbuster&site=excite">Usenet.</a> -<p> -<a name="them">If your</a> -<small>ISP</small> -is providing -the -Internet Junkbuster -for you, -and your question is about how to use it, -check their web page before asking them. -<p> -<a name="us">Even though we don't offer the kind of</a> -support you might expect if you paid a lot of money for a software product, -you can still ask us. -But before you do, please consider whether -you could ask someone closer to you. -And please be patient if we're slow to reply: we -<a href="over.html#nobucks">never charge consumers </a> -for our services, -so we have to subsidize consumers with revenue from companies, -and our resources are limited. -<p> -<a name="quote">If your company or organization</a> -would be interested in a maintenance contract -with phone and email support, -hard copy documentation and source code and pre-compiled binaries on tape -or disk, -please -<a href="/cgi-bin/gp?pg=ijbfaq&pr=quote">ask us</a> -for a quote. -</p> -<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p> -<br> -<center> -<h2><a name="browser"><font face="arial, helvetica"> -Configuring your browser to talk to the Internet Junkbuster -</font></a> -</h2> -</center> -<br> -<h3><a name="address" href="/cgi-bin/gp?pg=ijbfaq&pr=address"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -What is the proxy address of the Internet Junkbuster? -</h3> -<p> -<a name="localhost">If you set up</a> -the -Internet Junkbuster -to run on the computer you browse from -(rather than your -<small>ISP</small>'s server -or some networked computer at work), -the proxy will be on -<big><kbd>localhost</kbd></big> -(which is the special name used by every computer on the Internet to -refer to itself) -and -the port will be -<big><kbd>8000</kbd></big> -(unless you have told the -Internet Junkbuster -to -run on a different port with the -<a href="ijbman.html#listen-address">listen-address</a> -option). -So you when -<a href="ijbfaq.html#set">configuring your browser's proxy settings</a> -you typically enter the word -<big><kbd>localhost</kbd></big> -in the two boxes next to -<b><font face="arial, helvetica"> -HTTP</font></b> -and -<b><font face="arial, helvetica"> -Secure</font></b>, -and the number -<big><kbd>8000</kbd></big> -in the two boxes labelled -to the right of those boxes. -<p> -<a name="remote">If your</a> -<small>ISP</small> -or company is running -the -Internet Junkbuster -for you, -they will tell you the address to use. -It will be the name of the computer it's running on -(or possibly its numeric IP address), -plus a port number. -Port 8000 is the default, so assume this number if it is not specified. -Sometimes a colon is used to glue them together, -as in -<big><kbd>junkbuster.fictitous-pro-privacy-isp.net:8000</kbd></big> -but -with most browsers -you do not type the colon, -you enter the address and port number in separate boxes. -</p> - -<h3><a name="set" href="/cgi-bin/gp?pg=ijbfaq&pr=set"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How do I tell the browser where to find the Internet Junkbuster? -</h3> -<p> -All current browsers can be told the address of a proxy to use. -You enter the same information in two fields in your browser's proxy -configuration screen (see list below): one for -<small>HTTP</small>, -and one for the Secure Protocol (assuming your browser supports -<small>SSL</small>). -If you find some information already entered for your proxy, -see the -<a href="ijbfaq.html#already">next question.</a> -Here are the menus you go through to get to the proxy configuration settings. -(We also recommend that you -<a href="links.html#java">disable Java</a>, -which is a separate operation.) -<strong>Make notes on the changes you make so you know how to undo them!</strong> -You will need to know what you did -in case you wish to -<a href="ijbfaq.html#discontinue">discontinue</a> -using the proxy. -<br><ul type="1"> -<li> -<a name="netscape">For</a> -<a href="http://www.netscape.com/comprod/products/navigator/version_3.0/index.html">Netscape</a> -2.01, 2.02 and 3.0 -<a href="/images/pcn30.gif">[Graphic Illustration]:</a> -<b><font face="arial, helvetica"> -Options</font></b>; -<b><font face="arial, helvetica"> -Network Preferences</font></b>; -<b><font face="arial, helvetica"> -Proxies</font></b>; -<b><font face="arial, helvetica"> -Manual Proxy Configuration View ;</font></b> -enter -<a href="ijbfaq.html#address">proxy address details</a> -under -<b><font face="arial, helvetica"> -HTTP</font></b> -and -<b><font face="arial, helvetica"> -Security Proxy</font></b>; -click on -<b><font face="arial, helvetica"> -OK</font></b>; -click on the next -<b><font face="arial, helvetica"> -OK</font></b>. -<br> -With Netscape 2.0, -follow with -<b><font face="arial, helvetica"> -Options</font></b>, -<b><font face="arial, helvetica"> -Save Options</font></b>. -<br> -<a name="Netscape4.02">With Netscape 4.X series, you first have to go through</a> -<b><font face="arial, helvetica"> -Edit/Preferences</font></b>. -<a href="/images/pcn405.gif">[Graphic Illustration]</a> -Then in the frame on the left, -click on triangle pointing to the right towards the word -<b><font face="arial, helvetica"> -Advanced</font></b>; -it will switch to a triangle pointing down; -and the words -<b><font face="arial, helvetica"> -Cache</font></b>, -<b><font face="arial, helvetica"> -Proxies</font></b> -and -<b><font face="arial, helvetica"> -Disk Space</font></b> -appear. -Click on -<b><font face="arial, helvetica"> -Proxies</font></b> -and the frame on the right will -display a banner saying -<b><font face="arial, helvetica"> -Proxies Configure proxies to access the Internet</font></b>. -Click the radio button labeled -<b><font face="arial, helvetica"> -Manual proxy configuration</font></b> -then click the button labeled -<b><font face="arial, helvetica"> -View</font></b>; -enter -<a href="ijbfaq.html#address">proxy address details</a> -under -<b><font face="arial, helvetica"> -HTTP</font></b> -and -<b><font face="arial, helvetica"> -Security Proxy</font></b>; -click on -<b><font face="arial, helvetica"> -OK</font></b>; -click on the next -<b><font face="arial, helvetica"> -OK</font></b>. -<li> -<a name="explorer3">For</a> -<a href="http://www.microsoft.com/ie/support/docs/tech30/">Internet Explorer 3.0:</a> -<b><font face="arial, helvetica"> -View</font></b>; -<b><font face="arial, helvetica"> -Options</font></b>; -<b><font face="arial, helvetica"> -Connections</font></b>; -tick -<b><font face="arial, helvetica"> -Connect through proxy server</font></b> -box; -<b><font face="arial, helvetica"> -Settings</font></b>; -enter -<a href="ijbfaq.html#address">proxy address details</a> -<b><font face="arial, helvetica"> -HTTP</font></b> -Box, with port number in the second box; -same with -<b><font face="arial, helvetica"> -Secure</font></b>; -click on -<b><font face="arial, helvetica"> -OK</font></b>. -<li> -<a name="explorer2">For Internet Explorer 2.0: </a> -<b><font face="arial, helvetica"> -View</font></b>; -<b><font face="arial, helvetica"> -Options</font></b>; -<b><font face="arial, helvetica"> -Proxy</font></b>; -enter -<a href="ijbfaq.html#address">proxy address details</a> -click on -<b><font face="arial, helvetica"> -OK</font></b>. -<li> -<a name="nt">On NT for MS-IE:</a> -<b><font face="arial, helvetica"> -Control Panel</font></b>; -<b><font face="arial, helvetica"> -Internet</font></b>; -<b><font face="arial, helvetica"> -Advanced</font></b>; -<b><font face="arial, helvetica"> -Proxy</font></b>. -<li> -<a name="if">For MS-IE 4.0: seems to be almost the same as for</a> -<a href="ijbfaq.html#explorer3">3.0</a>, -<b><font face="arial, helvetica"> -View</font></b>; -<b><font face="arial, helvetica"> -Internet Options</font></b>; -<b><font face="arial, helvetica"> -Connections</font></b>; -tick -<b><font face="arial, helvetica"> -Connect through proxy server</font></b> -box; -<b><font face="arial, helvetica"> -Settings</font></b>; -enter -<a href="ijbfaq.html#address">proxy address details</a> -<b><font face="arial, helvetica"> -HTTP</font></b> -Box, with port number in the second box; -same with -<b><font face="arial, helvetica"> -Secure</font></b>; -click on -<b><font face="arial, helvetica"> -OK</font></b>. -Note that 4.0 has -<b><font face="arial, helvetica"> -Advanced</font></b> -settings to allow -<small>HTTP</small> -1.1 through proxies; -these must be disabled because the proxy does not currently understand -<small>HTTP</small> -1.1. -Please -<a href="/cgi-bin/gp?pg=ijbfaq&pr=set">tell us</a> -if you see any other differences. -<li> -<a name="mosaic">For NCSA Mosaic for Windows:</a> -<b><font face="arial, helvetica"> -Options</font></b>, -<b><font face="arial, helvetica"> -Preferences</font></b>, -<b><font face="arial, helvetica"> -Proxy</font></b>; -enter -<a href="ijbfaq.html#address">proxy address details</a> -under -<b><font face="arial, helvetica"> -HTTP</font></b>. -<li> -<a name="Opera">For</a> -Opera: -<b><font face="arial, helvetica"> -Preferences</font></b>, -<b><font face="arial, helvetica"> -Proxy servers</font></b>; -check the box next to HTTP; -enter the server and port number in the box on the other side; -click on -<b><font face="arial, helvetica"> -OK</font></b>. -<li> -<a name="lynx">For</a> -<a href="http://www.yahoo.com/Computers_and_Internet/Software/Internet/World_Wide_Web/Browsers/Lynx">Lynx,</a> -<a href="http://www.yahoo.com/Computers_and_Internet/Software/Internet/World_Wide_Web/Browsers/Mosaic/">Mosaic/X,</a> -<a name ="grail" href="http://monty.cnri.reston.va.us/grail-0.3/">Grail,</a> -and -W3O -<a href="http://www.w3.org/pub/WWW/Arena/">Arena,</a> -you can specify the proxy via environment variables -before starting the application. -This will probably be done with something like either -<br> -   <big><kbd>setenv http_proxy http://localhost:8000/</kbd></big> -<br> -or -<br> -   <big><kbd>http_proxy=http://junkbuster.fictitous-pro-privacy-isp.net:8000/ export http_proxy</kbd></big> -<br> -depending on your shell and where the -Internet Junkbuster -lives. -</ul> -If your browser is not listed here, -or if you notice an error, please -<a href="/cgi-bin/gp?pg=ijbfaq&pr=set">tell us</a> -the correct procedure. -</p> - -<h3><a name="already" href="/cgi-bin/gp?pg=ijbfaq&pr=already"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -What should I do if I find another proxy is already configured? -</h3> -<p> -Some -<small>ISP</small>s -and companies require all Web traffic to go through their proxy. -In this case you would find your proxy configuration with values already set, -possibly under -<a name="Automatic">Automatic Proxy Configuration</a> -(in the case of -<a href="http://home.netscape.com/eng/mozilla/2.0/relnotes/demo/proxy-live.html">Netscape</a> -and -<a href="http://ieak.microsoft.com/">MS-IE 3.0</a> -and above). -It's probably a firewall proxy between your company and the outside world, -<a name="cache">or a</a> -<a href="http://vancouver-webpages.com/CacheNow/">caching proxy</a> -if you're using an -<small>ISP</small>. -<p> -<a name="f">What needs to be done in this case is to</a> -use the -<a href="ijbman.html#forwardfile">forwardfile</a> -option -to tell the -Internet Junkbuster -the address of the other proxy. -Specify a different (unused) port number -with the -<a href="ijbman.html#listen-address">listen-address</a> -option, -and configure your browser to -<a href="ijbfaq.html#chain">use that port.</a> -If you haven't done this kind of thing before, -it's probably best to consult your systems administrator or -<small>ISP</small> -about it; -check their web page first. -</p> - -<h3><a name="discontinue" href="/cgi-bin/gp?pg=ijbfaq&pr=discontinue"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -What if I want to stop using the Internet Junkbuster? -</h3> -<p> -Just go through the same procedure you used to start your -browser using the -Internet Junkbuster, -but remove the details you put in -(or if there was something there before, restore it). -You may need to use -<b><font face="arial, helvetica"> -Save Options</font></b> -to make this change permanent. -On Netscape 3.0 you can go through -<b><font face="arial, helvetica"> -Options</font></b>; -<b><font face="arial, helvetica"> -Network Preferences</font></b>; -<b><font face="arial, helvetica"> -Proxies</font></b> -and click on -<b><font face="arial, helvetica"> -No Proxy</font></b> -to turn it off, and later click on -<b><font face="arial, helvetica"> -Manual Proxy Configuration</font></b> -if you want to start using it again. -(No need to enter the again details under -<b><font face="arial, helvetica"> -View</font></b> -as you did the -<a href="ijbfaq.html#netscape">first time;</a> -they should remain there unchanged.) -<p> -<a name="shut">This stops your browser talking to the proxy;</a> -<a href="ijbfaq.html#shutdown">shutting down the proxy</a> -is a different matter. -</p> - -<h3><a name="dial" href="/cgi-bin/gp?pg=ijbfaq&pr=dial"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Automatic dialing isn't working any more. How do I fix it? -</h3> -<p> -Some browsers (such as MSIE-4) can be configured to dial your -<small>ISP</small> -automatically when you click on a link, -but this feature gets disabled if you specify a proxy running on your -own computer -(with address -<big><kbd>localhost</kbd></big> -or -<big><kbd>127.0.0.1</kbd></big>) -because these addresses don't require dialing. -The -Internet Junkbuster -knows nothing about dialing, so it doesn't work. -To make automatic dialing work, -make up a name such as -<big><kbd>junkbuster.ijb</kbd></big> -and use that name in the proxy settings -instead of -<big><kbd>localhost</kbd></big>, -and then add the line -<big><kbd>127.0.0.1 junkbuster.ijb</kbd></big> -to the file -<big><kbd>c:\windows\hosts</kbd></big> -(if there already is a line beginning with -<big><kbd>127.0.0.1</kbd></big> -just add -<big><kbd>junkbuster.ijb</kbd></big> -at the end of it.) -<p> -<a name="also">This should also work Netscape Communicator 4 on</a> -machines where IE-4 has been installed. -</p> -<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p> -<br> -<center> -<h2><a name="local"><font face="arial, helvetica"> -Setting up the Internet Junkbuster on your local computer -</font></a> -</h2> -</center> -<br>The next two sections assume you wish to compile the code -with your own C compiler. -<a name="install">If you just want to use the</a> -<big><kbd>.exe</kbd></big> -file provided for Windows, -see the -<a href="ijbwin.html">Windows Installation page.</a> - -<h3><a name="u" href="/cgi-bin/gp?pg=ijbfaq&pr=u"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How do I compile the code under Unix? -</h3> -<p> -If you are running Redhat -<a href="aboutus.html#linux">Linux</a> -you may prefer to use the -<a href="ijbdist.html#red">rpm</a> -instead of the following procedure. -<br><ol type="1"> -<li> -<a name="download">First</a> -<a href="ijb20.tar.Z">download the tar file</a> -(~286k) -<a name="tar">and</a> -uncompress and extract the files from it with this command -<br> -   <big><kbd>uncompress -c ijb20.tar.Z | tar xf -</kbd></big> -<p> -<li> -<a name="sun">If your operating system is from</a> -<a href="legal.html#not_our_trademark">Sun</a> -or -<a href="legal.html#not_our_trademark">HP</a> -examine the -<big><kbd>Makefile</kbd></big> -and make any changes indicated inside. -<li> -<a name="make">Run</a> -<br> -<br> -   <big><kbd>make</kbd></big> -<p> -<li> -<a name="defaults">Copy the sample configuration file</a> -(<big><kbd>junkbstr.ini</kbd></big>, -previously called -<big><kbd>sconfig.txt</kbd></big> -and other names in earlier releases) -to some convenient place such as -<big><kbd>/usr/local/lib/junkbuster/configfile</kbd></big> -or whatever you choose. -The sample file has all the options commented out. -You can remove the -<big><kbd>#</kbd></big> -character on any that you want, but it may be better to -leave this until to later. -Run it asynchronously: -<br> -<br> -   <big><kbd>junkbuster configfile &</kbd></big> -<p> -If you are running a version earlier than 2.0 you can start it with -<big><kbd>junkbuster &</kbd></big> -<p> -<li> -<a name="config">Configure your browser (described</a> -<a href="ijbfaq.html#browser">above).</a> -<li> -<a name="test">Verify that the</a> -Internet Junkbuster -is working (described -<a href="ijbfaq.html#show">above).</a> -<li> -<a name="restart">Decide on the options you really want,</a> -<big><kbd>kill</kbd></big> -the -<a href="ijbfaq.html#pid">process</a> -and start it again. The most popular option is -<a href="ijbman.html#blockfile">blockfile</a> -to block ads. -<a name="comprehensive">A sample blockfile is provided as an illustration,</a> -but it doesn't really stop many ads. -More comprehensive ones are available -<a href="ijbfaq.html#readymade">elsewhere</a>. -<li> -<a name="rc">You'll probably want to add an entry to</a> -<big><kbd>/etc/rc.d/rc.local</kbd></big> -or equivalent to start it at boot time. -(Any output you specify should be redirected to a file. -And don't forget the -& -at the end to run it asynchronously or your system will seize -up after the next reboot.) -</ol> -</p> - -<h3><a name="win" href="/cgi-bin/gp?pg=ijbfaq&pr=win"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How do I compile the code under Windows? -</h3> -<p> -A binary is currently being supplied with the source code, -but if you prefer to compile it yourself here is the likely procedure. -Most of these steps are repeated in our checklist for -<a href="ijbwin.html">installation under Windows.</a> -<br><ol type="1"> -<li> -<a name="zip">First</a> -<a href="ijb20.zip">click here to download the zip file</a> -called -<big><kbd>ijb20.zip</kbd></big> -(~208k), -then uncompress and unpack the zip archive using a tool like -<a href="http://www.winzip.com/">WinZip</a>. -<li> -<a name="change">Now the distribution (source and sample files)</a> -will be in a folder -called -<big><kbd>ijb20</kbd></big>. -Go into that folder and then edit the Makefile for -your system, -removing the comment character -(<big><kbd>#</kbd></big>) -in the lines related to Win32. -Then type: -<br> -   <big><kbd>nmake</kbd></big> -<br> -This should create an executable called -<big><kbd>junkbstr.exe</kbd></big>. -<a name="compilers">For information on issues with various compilers, see the</a> -<a href="ijbdist.html#compilers">Distribution Information</a> -page. -<li> -<a name="attempt">Run the executable with the command:</a> -<br> -   <big><kbd>junkbstr</kbd></big> -<br> -The program will produce a message -indicating that it has started and is ready to serve. -<p> -<a name="ini">(Version 2.0.1 and above uses</a> -the file -<big><kbd>junkbstr.ini</kbd></big> -as the config file -if it exists and no argument was given. If you have an earlier -version or if you want it to use a different config file, -simply specify that file as the argument.) -<li> -<a name="configures">Configure your browser (described</a> -<a href="ijbfaq.html#browser">above).</a> -<li> -<a name="work">Check the proxy is working (described</a> -<a href="ijbfaq.html#check">below</a>). -<li> -<a name="shortcut">To have the proxy start itself automatically</a> -when you login to Win95, -drop the ``shortcut'' to the -<big><kbd>junkbstr</kbd></big> -executable into the StartUp folder: -<br> -   <big><kbd>C:\Windows\Start Menu\Programs\StartUp</kbd></big> -<br> -You might want to change the shortcut's -<big><kbd>Properties->Shortcut</kbd></big> -to -<big><kbd>Run: Minimized</kbd></big>. -If you specify the -<a href="ijbman.html#hide-console">hide-console</a> -option then the -<small>DOS</small> -window will vanish after it starts. -<p> -<a name="NT">WinNT users can put it into their own</a> -StartUp folders or the Administrator -can put it into the system's global StartUp folder. -For details on how to make this a service under NT -see our -<a href="ijbwin.html#service">Windows page</a>. -</ol> -</p> - -<h3><a name="check" href="/cgi-bin/gp?pg=ijbfaq&pr=check"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How do I check that the proxy is working? -</h3> -<p> -Pick a page from somewhere (such as your bookmarks, or just one -that your browser was pointing to) -and -<b><font face="arial, helvetica"> -Reload</font></b> -it. -If you get a message along the lines of ``server not responding, -using cached copy instead,'' see the advice -<a href="ijbfaq.html#responding">above.</a> -If the page reloads OK, check that your browser is actually -talking to the proxy by going to -<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a> -or any -<small>URL</small> -ending in -<big><kbd>show-proxy-args</kbd></big> -(as described -<a href="ijbfaq.html#show">below</a>, -the proxy should intercept the request.) -When you see ``Internet Junkbuster Proxy Status,'' -you'll know it's working. -</p> - -<h3><a name="chain" href="/cgi-bin/gp?pg=ijbfaq&pr=chain"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How and why would I have this proxy chained with other proxies? -</h3> -<p> -You may need the -<a href="ijbman.html#forwardfile">forwarding</a> -feature to ``daisy chain'' the -Internet Junkbuster -to another proxy, perhaps an -<a href="ijbfaq.html#anonymizing">anonymizing</a> -proxy to -<a href="ijbfaq.html#conceal">conceal</a> -your -<small>IP</small> -address, -or a -<a href="ijbfaq.html#cache">caching proxy</a> -from your -<small>ISP</small>, -or a -<a href="ijbfaq.html#firewall">firewall</a> -proxy between your company and the outside world. -Version 2.0 -can be even configured to forward -<a href="ijbman.html#forwardfile">selectively</a> -according to the -<small>URL</small> -requested: -for example, connecting directly to trusted hosts, -but going through an anonymizing or firewall proxy for all other hosts. -<p> -<a name="administrator">Network administrators might use it to provide</a> -transparent access to multiple networks without -modifying browser configurations. -<a name="direct">Most browsers also provide a way of</a> -specifying hosts that the browser -connects to directly, bypassing the proxy. Some provide a method for -<a href="ijbfaq.html#Automatic">Automatic Proxy Configuration.</a> -A well written -Internet Junkbuster -configuration can be much more flexible and powerful. -<p> -<a name="example">An</a> -<small>ISP</small>'s -caching proxy -would typically be called something like -<big><kbd>cache.your-isp.net:8080</kbd></big> -(as described on you -<small>ISP</small>'s -web page); -you would put this information in your -<a href="ijbman.html#forwardfile">forwardfile</a> -as described in our manual. -Your browser would be configured to -the -Internet Junkbuster -for -<small>HTTP</small> -and Security Proxies as before, -but you probably want to tell it to use the caching proxy -for -<small>FTP</small> -and other protocols. -<a name="nonlocal">If your</a> -<small>ISP</small> -is running -the -Internet Junkbuster -for you, -they have probably already decided whether to chain with a caching proxy. -</p> - -<h3><a name="socks" href="/cgi-bin/gp?pg=ijbfaq&pr=socks"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How does the Internet Junkbuster work with SOCKS gateways? -</h3> -<p> -There is support for some -<a href="http://www.leverage.com/users/tlod/ssockd/ssockd.html">gateways</a> -in -Version <a href="ijbdist.html#c4">1.4</a> -and above. -The gateway protocol used to be specified on the command line; -it is -now specified -in the same file as -<a href="ijbman.html#forwardfile">forwarding.</a> -Note that the browser's proxy configuration must -<em>not</em> -specify a -<big><kbd>SOCKS</kbd></big> -host; -it should specify the proxy as described -<a href="ijbfaq.html#set">above.</a> -</p> - -<h3><a name="plain" href="/cgi-bin/gp?pg=ijbfaq&pr=plain"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How do I configure it to be just a plain old proxy? -</h3> -<p> -To get the proxy to do as little as possible (which means not deleting any -sensitive headers), place in your -configuration file the following three lines (each ending in a space -then a period) to stop it changing sensitive headers: -<br> -   <big><kbd>referer .</kbd></big> -<br> -   <big><kbd>from .</kbd></big> -<br> -   <big><kbd>user-agent .</kbd></big> -<br> -   <big><kbd>cookiefile mycookiefile</kbd></big> -<br> -The fourth line is also needed to specify a -<a href="ijbman.html#o_c">cookiefile</a> -that might be called -<big><kbd>mycookiefile</kbd></big> -containing a single line with a -<big><kbd>*</kbd></big> -character, to allow all cookies through. -</p> - -<h3><a name="shutdown" href="/cgi-bin/gp?pg=ijbfaq&pr=shutdown"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How do I shut down the proxy (to restart it)? -</h3> -<p> -It depends on your platform. Under Windows, use -<b><font face="arial, helvetica"> -Ctrl-Break</font></b> -in the -<small>DOS</small> -window or -the old three-fingered salute of -<b><font face="arial, helvetica"> -Ctrl-Alt-Delete</font></b> -and select -<b><font face="arial, helvetica"> -End Task</font></b>. -Under -<small>UNIX <a href="legal.html#not_our_trademark">®</a></small> -you'll need to -<big><kbd>kill</kbd></big> -the -<b><kbd>junkbuster</kbd></b> -process. -<a name="pid">If you don't know the process number to give to</a> -<big><kbd>kill</kbd></big>, try this: -<big><kbd>ps ax | grep junkbuster</kbd></big> -<br> -</p> -<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p> -<br> -<center> -<h2><a name="companies"><font face="arial, helvetica"> -Information for companies -</font></a> -</h2> -</center> -<br> -<h3><a name="think" href="/cgi-bin/gp?pg=ijbfaq&pr=think"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -What do advertising companies think of this kind of technology? -</h3> -<p> -We've seen only a few public comments from the advertising industry on this, -other than -<a href="links.html#adverse">SEC filings.</a> -First, the president of the Internet Advertising Bureau told -<a href="new.html#Rich">CNET</a> -that he wasn't worried by banner blockers. -Second, after the Federal Trade Commission's -<a href="ftc.html">workshop</a> -where we gave a live demonstration of our proxy before -many eminent representatives of the industry, -the -<a href="self.html#dma">Direct Marketing Association</a> -made the following -statement in the closing paragraphs -of their -<a href="http://www.ftc.gov/bcp/privacy/wkshp97/comments2/dma027a.htm">summary comments</a> -to the Commission. -<blockquote> -Clever shareware developers have come up with products that -can obliterate cookies and advertisements for those consumers -who have these concerns. -The Internet is a market that is so democratic and flexible -that it is easy for companies and software -developers to respond to a perceived market need. -</blockquote> -Their attitude seems to be that they would prefer that -people use technical solutions -to protect their privacy than have protections -imposed by legislation or government regulations. -So, do you perceive a market need? -Then here are some ways to flex your democratic muscles. -</p> - -<h3><a name="nobrainer" href="/cgi-bin/gp?pg=ijbfaq&pr=nobrainer"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Should we provide the Internet Junkbuster for our employees? -</h3> -<p> -That depends. Try this quick three-point test. -<br><ol type="1"> -<li> -<a name="waste">Do you want to spend your communications budget</a> -on bandwidth that wastes your employees' time by forcing them to wait -for a lot of annoying distractions while they're trying to -do their jobs? -<li> -<a name="surveillance">Do you want current and potential vendors</a> -to know quantitative details about the -<a href="ijbfaq.html#agent">software and hardware platforms</a> -that you have? -<li> -<a name="intelligence">Do you want your competitors to be able to</a> -<a href="cookies.html">track</a> -exactly which of your -employees are checking out their web sites? -</ol> -If the answer to all three questions is yes, -then you probably don't have any need for this kind of product. -</p> - -<h3><a name="commercial" href="/cgi-bin/gp?pg=ijbfaq&pr=commercial"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Can our company get commercial support for the software? -</h3> -<p> -Yes, -<a href="/cgi-bin/gp?pg=ijbfaq&pr=commercial">ask us</a> -for a quote on a maintenance contract with your choice of -phone and email support, -hard copy documentation, -source code and pre-compiled binaries on tape or disk, -and email alerting of upgrades and issues. -We also offer consulting services to help set up ``stealth browsing'' -capabilities to help reduce the footprints left while doing competitive -analysis and other Web work where confidentiality is critical. -</p> - -<h3><a name="isps" href="/cgi-bin/gp?pg=ijbfaq&pr=isps"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -I run an ISP. What issues should I consider before offering it? -</h3> -<p> -Many -<small>ISP</small>s -who offer the proxy to their customers have told us that -most of their customers are -delighted with it -(although one reported that a customer complaint that without banner ads, -surfing was like reading a novel: we recommend making it optional). -Many -<small>ISP</small>s -like it because it reduces bandwidth requirements. -To help get you started, -here's a checklist we've developed from working with a few -<small>ISP</small>s. -You may think of more, -and we'd be interested if you're willing to -<a href="/cgi-bin/gp?pg=ijbfaq&pr=isps">share them</a> -with us. -<br><ol type="1"> -<li> -<a name="pending">If you get more than one request for</a> -the -Internet Junkbuster -you may want to tell your customers on your News page that you -<a href="ijbfaq.html#isp">already</a> -know about it and are assessing it. -<li> -<a name="try">Try the software and</a> -<a href="ijbfaq.html#install">verify</a> -that it performs satisfactorily. -<li> -<a name="value">Determine whether your customers perceive the service as</a> -<a href="ijbfaq.html#switch">valuable</a> -(and therefore worth the time to set up). -We've had reports of many delighted customers. -<li> -<a name="secure">Assess the</a> -level of -<a href="ijbfaq.html#others">security</a> -associated with the software. -If access is to be -<a href="ijbfaq.html#restrict">restricted</a> -(to just dial-in ports, for example) -how is this to be done? -<li> -<a name="costs">Consider</a> -whether to expect any additional load on computing resources required, -and any change in use of bandwidth due to the blocking of large -<small>GIF</small>s. -<li> -<a name="opt">Choose the</a> -<a href="ijbman.html">options</a> -you wish to provide. -<li> -<a name="multiple">Decide whether you want</a> -to offer a choice of configurations, such some of these four. -<br><ol type="A"> -<li> -<a name="banner">Banners</a> -<a href="ijbfaq.html#blocking">Blocked,</a> -Wafer with -<a href="ijbfaq.html#notice">No-Cookie-Copyright</a> -notice -<li> -<a name="low">Cookies</a> -not stopped -(<a href="ijbman.html#cookiefile">cookiefile</a> -with just a -<big><kbd>*</kbd></big> -in it), -<a href="ijbfaq.html#header">User Agent</a> -specified as -<a href="ijbfaq.html#lynx">Lynx</a> -<li> -<a name="oneway">Cookies from browser</a> -<a href="ijbfaq.html#one">allowed</a>, -permitting -<a href="ijbfaq.html#registration">registered services</a> -<li> -<a name="kid">A proxy for</a> -<a href="ijbfaq.html#children">kids.</a> -</ol> -<a name="caching">If you run a</a> -<a href="ijbfaq.html#chain">caching proxy,</a> -decide whether the -Internet Junkbuster -will chain with it by default, -and whether to offer an alternate with no caching. -(Some -<small>ISP</small>s -don't, because they want to give customers an incentive to use caching -and save bandwidth.) -<li> -<a name="naming">Decide on a naming scheme for your</a> -proxies. -If you're running only one -proxy on one machine, -the simplest way is to just use port 8000 on your main machine, -such as -<big><kbd>our-isp.net.</kbd></big> -But it would probably be safer to put an entry in your name server -and call it something like -<big><kbd>junkbuster.our-isp.net.</kbd></big> -If running several proxies, you could either use different ports -on the same machine, or if you have -the opportunity to distribute the load over -a few machines -you could -use different hostname aliases such as -<big><kbd>banner.junkbuster.our-isp.net</kbd></big>, -<big><kbd>lynx.junkbuster.our-isp.net</kbd></big> -and -<big><kbd>oneway.junkbuster.our-isp.net</kbd></big> -(corresponding to the examples in the previous point). -You may want to set up -<a href="ijbfaq.html#Automatic">Automatic Proxy Configuration.</a> -<li> -<a name="document">Prepare a page</a> -explaining the -Internet Junkbuster -to your customers. -<a name="does">Here's are some examples from</a> -<a href="http://www.cia.com.au/us/help/faq-proxy.html">Australia</a>, -<a href="http://www.rhein-ruhr.de/info/junkbuster.html">Germany</a>, -<a href="http://www.packet.net/ijb/">Florida</a>, -<a href="http://www.eclipse.net/adfilter/index.html">New York/New Jersey/Pennsylvania,</a> -<a href="http://a-o.com/proxy/proxy.html">North Carolina</a>, -<a href="http://www.trip.net/junkbuster/">Texas</a>, -and -<a href="http://www.inconnect.com/proxy.html">Utah</a>. -<a name="reuse">You are welcome to copy and modify</a> -material -from -Junkbusters -according to the -<a href="gpl.html">GPL</a>. -You might want to set up a process to check this page periodically -and update it when it changes. -(A few links can probably serve as well as lot of copying however.) -A typical page would probably specify the following. -<br><ul type="1"> -<li> -<a name="abstract">A brief explanation stating what</a> -the -Internet Junkbuster -does, with a link to this page. -<li> -<a name="addresses">The addresses of the proxy or proxies,</a> -with their port number(s). -<li> -<a name="options">The options used,</a> -and how to view the contents of the blockfile (which you can place on -your web pages, -preferably in a file called -<big><kbd>blocklist.html</kbd></big> -or -<big><kbd>blocklist.txt</kbd></big>). -<li> -<a name="additions">An indication</a> -of whether suggestions for the blocklist are considered, -and if so, how to submit them: to a particular email address, -via web-based form, etc. -<li> -<a name="configuration">Instructions</a> -on how to -configure a browser. -You may want to include details for only the two major browsers -and leave the others to a link. -<li> -<a name="service">Procedures on how to report problems, give feedback etc.</a> -</ul> -<li> -<a name="beta">Invite a small number of technologically sophisticated</a> -customers to beta-test the service. -<li> -<a name="announce">Announce general availability on your ``News'' page.</a> -<a href="/cgi-bin/gp?pg=ijbfaq&pr=isps">Tell us</a> -if you would like to be included on a list of -<small>ISP</small>s -offering the -Internet Junkbuster. -</ol> -</p> - -<h3><a name="ps2" href="/cgi-bin/gp?pg=ijbfaq&pr=ps2"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -What's a Proxy Server Server and how can I make money as one? -</h3> -<p> -Other organizations with web presence and some bandwidth to spare -can set up as -<i><dfn>Proxy Server Servers</dfn></i> -<!-- Aside: All this, and... --> -(<small>PS<sup>2</sup></small>s). -The idea here is to allow users to choose their proxy configuration, -and provide it to them on a semi-permanent basis. -Users would fill in a form specifying what options they want in -their proxy, -possibly even at a very high level, such as -``no ads'' -or ``no nudity.'' -This information is sent to a -<small>CGI</small> -script that -configures a proxy, starts it running, and returns its address and port number -(possibly along with configuration instructions for the browser -that the user specified.) -<p> -<a name="revenue">Users</a> -could be charged -a subscription fee, -or the service could be thrown in free in the hope of -improving customer retention for some existing business -(which is what -<small>ISP</small>s -are doing). -It might be possible to make money by -inserting new ads in the holes left where others were blocked, -but the original owners might object. -<small>PS<sup>2</sup></small>s -could differentiate themselves -by providing frequently updated and comprehensive -blocking of ads, or of offensive material based on their own grading system. -Some content providers might do it for the chance to be the -only company that the consumer permits to set cookies. -(Identification could even be done via cookies, -but this might not be popular with the kind of user who wants a proxy.) -<small>PS<sup>2</sup></small>s -might sell specific or aggregate information about their -users' browsing habits, -so the agreement with users on whether they are permitted to do this -would be important to both sides. -<p> -<a name="publicize">If your organization</a> -establishes a -Proxy Server Service -you would like publicized, -please -<a href="/cgi-bin/gp?pg=ijbfaq&pr=publicize">notify us.</a> -</p> -<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p> -<br> -<center> -<h2><a name="blocking"><font face="arial, helvetica"> -Blocking -</font></a> -</h2> -</center> -<br> -<h3><a name="readymade" href="/cgi-bin/gp?pg=ijbfaq&pr=readymade"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Where can I get an example blockfile that stops most ads? -</h3> -<p> -The sample blockfile we provide blocks almost nothing, -and we do not publish blockfiles that stop almost all banner ads. -But others have; you can find them by -<a href="http://www.altavista.com/cgi-bin/query?pg=q&what=web&fmt=.&q=%2Bjunkbuster+%2Burl%3Ablocklist">asking Altavista.</a> -You can add any part of the new file to your old one -(probably called -<big><kbd>sblock.ini</kbd></big> -if you haven't changed the default name in the latest version) -or your just replace it completely. -You -<a href="ijbfaq.html#cover">probably</a> -don't need to restart the proxy. -<p> -<a name="pub">If you develop an interesting blocklist and publish it on the Web,</a> -you might want to include the word ``junkbuster'' in it -and use the word ``blocklist'' in the file name given in the -<small>URL</small> -so that others can find it with the query given in the previous sentence. -</p> - -<h3><a name="zap" href="/cgi-bin/gp?pg=ijbfaq&pr=zap"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -If I see an ad I wish I hadn't, how do I stop it? -</h3> -<p> -If your -<small>ISP</small> -is running the -Internet Junkbuster, -they should have a policy on whether they accept suggestions from -their customers on what to block. Consult their web page. -<p> -<a name="cover">If you are running</a> -the -Internet Junkbuster -yourself, you have complete control over what gets through. -Just add a pattern to cover the offending -<small>URL</small> -to your blockfile. -Version 1.3 and later automatically rereads the blockfile when it changes, -but if you're running an earlier version you'll -have to -<a href="ijbfaq.html#shutdown">stop it</a> -and restart it. -<p> -<a name="target">To choose a pattern you'll first need to find the</a> -<small>URL</small> -of the ad you want cover. -<p> -<a name="pinpoint">Some people use the</a> -<a href="ijbman.html#debug">debug</a> -<big><kbd>1</kbd></big> -option to display each -<small>URL</small> -in a window as the request is sent to the server. -It's then usually an easy task to pick the offending -<small>URL</small> -from the list of recent candidates. -<p> -<a name="source">Alternatively,</a> -you can use -<b><font face="arial, helvetica"> -View Document Info</font></b> -(or -<b><font face="arial, helvetica"> -View Document Source</font></b> -if your browser doesn't have that). -The -<b><font face="arial, helvetica"> -Info</font></b> -feature has the advantage of showing you the full -<small>URL</small> -including the host name, -which may not be specified in the source: -there you might see something like -<big><kbd>SRC="/ads/click_here_or_die.gif"</kbd></big> -indicating only the -<i><dfn>path</dfn></i>. -(The host name is assumed to be the same as the one the page came from.) -<p> -<a name="offsite">But ads often</a> -come from a different site, in which case you -might see something like -<big><kbd>SRC="grabem.n.trackem.com/Ad/Infinitum/SpaceID=1666"</kbd></big> -or longer. -<a name="warehouse">If the company looks like a pure ad warehouse</a> -(as in the last case), -you may want to place just its domain name in the blockfile, -which blocks all -<small>URL</small>s -from that site. -<p> -<a name="wanted">If the ad comes from a server</a> -that you really want some content from, -you can include enough of the path -to avoid zapping stuff you might want. -In the first example above, -<big><kbd>/ads/</kbd></big> -would seem to be enough. -If you don't include the domain name, -the pattern applies to all sites, -so you don't want such patterns -to be too general: -for example -<big><kbd>/ad</kbd></big> -would block -<big><kbd>/admin/salaries/</kbd></big> -on your company's internal site. -<p> -<a name="image">To speed the blocking of images, some</a> -<small>UNIX <a href="legal.html#not_our_trademark">®</a></small> -users create a -shell script called -<big><kbd>Image:</kbd></big> -containing a line such as -<big><kbd>echo $1 | sed s/http:..// >> $HOME/lib/blockfile</kbd></big> -that adds its argument to the user's blockfile. -Once an offending image has been be found using -<b><font face="arial, helvetica"> -View Document Info</font></b> -it's easy to cut-and-paste the line (or part of it) into a shell window. -The same script can be linked to a file called -<big><kbd>Frame:</kbd></big> -to dealing with framed documents, -and -<big><kbd>junkbuster:</kbd></big> -to accept the output of the -<a href="ijbman.html#debug">debug</a> -option. -<p> -<a name="partial">When compiled without the</a> -<i><dfn>regular expressions</dfn></i> -option, the -Internet Junkbuster -uses only very simple (and fast) matching methods. -The pattern -<big><kbd>/banners</kbd></big> -will not stop -<big><kbd>/images/banners/huge.gif</kbd></big> -getting through: you would have to include the pattern -<big><kbd>/images/banners</kbd></big> -or something that matches in full from the left. -<a name="regex">So you can get what you want here,</a> -the matcher understands -<small>POSIX</small> -regular expressions: -you can use -<big><kbd>/*.*/banners</kbd></big> -to block -and any -<small>URL</small> -containing -<big><kbd>/banners</kbd></big> -(even in the middle of the path). -<a name="posix">(In Versions 1.1 through 1.4</a> -they were an option at compile time; -from Version 2.0 they have become the default.) -Regular expressions give you -<a href="http://theory.uwinnipeg.ca/localfiles/infofiles/gcc/rx_toc.html">many more features</a> -than this, -but if you're not already familiar with them you probably won't -need to know anything beyond the -<big><kbd>/*.*/</kbd></big> -idiom. -If you do, a -<big><kbd>man egrep</kbd></big> -is probably a good starting point). -<p> -<a name="slash">Don't forget the</a> -<big><kbd>/</kbd></big> -(slash) -at the beginning of the path. -If you leave it out the line will be interpreted as a domain name, -so -<big><kbd>ad</kbd></big> -would block all sites from Andorra -(since -<big><kbd>.ad</kbd></big> -is the two-letter -<a href="reference.html#country">country code</a> -for that principality). -<p> -<a name="detail">For a detailed technical description</a> -of how pattern matching is done, -see the -<a href="ijbman.html#o_b">manual.</a> -</p> - -<h3><a name="despite" href="/cgi-bin/gp?pg=ijbfaq&pr=despite"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How come this ad is still getting through anyway? -</h3> -<p> -If the ad had been displayed before you included its -<small>URL</small> -in the blockfile, -it will probably be held in cache for some time, -so it will be displayed without the need for any request to the server. -Using the -<a href="ijbman.html#debug">debug</a> -<big><kbd>1</kbd></big> -option to show each -<small>URL</small> -as it is fetched is a good way to see exactly what is happening. -<p> -<a name="otherwise">If new items seem to be getting through,</a> -check that you are -<a href="ijbfaq.html#show">really running</a> -the proxy with the right blockfile in the options. -Check the blockfile for -<a href="ijbfaq.html#exceptions">exceptions.</a> -<p> -<a name="java">Some sites may have different ways of inserting ads,</a> -such as via -<a href="cookies.html#java">Java.</a> -If you have ideas on how to block new kinds -of junk not currently covered, please -<a href="/cgi-bin/gp?pg=ijbfaq&pr=java">tell us.</a> -</p> - -<h3><a name="exceptions" href="/cgi-bin/gp?pg=ijbfaq&pr=exceptions"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How do I stop it blocking a URL that I actually want? -</h3> -<p> -You can change the patterns so they don't cover it, -or use a simple feature in Version 1.1 and later: a line beginning with a -<big><kbd>~</kbd></big> -character means that a -<small>URL</small> -blocked by previous patterns that matches the rest of -the line is let through. -For example, -the pattern -<big><kbd>/ad</kbd></big> -would block -<big><kbd>/addasite.html</kbd></big> -but not if followed by -<big><kbd>~/addasite</kbd></big> -in the blockfile. -Or suppose you want to see everything that comes from -a site you like, even if it looks like an ad: simply put -<big><kbd>~aSiteYouLike.com</kbd></big> -at the -<em>end</em> -of the blockfile. -(Order is important, because the last matching line wins.) -<p> -<a name="agreed">As well as unblocking</a> -pages that were unintentionally blocked, -this feature is useful for unblocking ads from a specific source. -This might be because you are interested in those particular ones, -or if you have an explicit agreement to accept certain ads, -such as those from a free web-based email provider. -</p> - -<h3><a name="children" href="/cgi-bin/gp?pg=ijbfaq&pr=children"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Can I block sites I don't want my children to see? -</h3> -<p> -Yes, but remember that -<a name="savvy">children who are technically sophisticated enough</a> -to use the browsers' proxy configuration options -could of course bypass any proxy. -This kind of technology can be used as a gentle barrier to remind -or guide the child, -but nobody should expect it to replace the parent's role -in setting and enforcing standards of online behavior for their children. -<p> -<a name="recommend">Some</a> -<small>ISP</small>s -are starting to provide specialized proxies to protect children. -There are two basic approaches: the ``black list'' and the ``white list'' -approach. -<a name="negative">The black list approach allows the child</a> -to go anywhere not explicitly prohibited; the white list permits visits -only to sites explicitly designated as acceptable. -<p> -<a name="positive">It's very easy for</a> -anyone to -compile a white list from a page of ``recommended -kids sites'' and to configure an -Internet Junkbuster -to allow access to those sites only. -If you compile with the -<a href="ijbfaq.html#regex">regex</a> -option, -you can place a -<big><kbd>*</kbd></big> -(asterisk) as the first line of the blockfile (which blocks everything), -and then list -<a href="ijbfaq.html#exceptions">exceptions</a> -after that. -Be careful to make the exception sufficiently broad: -for example, using -<big><kbd>~www.uexpress.com/ups/comics/ch/</kbd></big> -as the exception for -<a href="http://www.uexpress.com/ups/comics/ch/"><cite>Calvin and Hobbes</cite></a> -would block some of the graphic elements on the page; -you would probably want a wider exception such as -<big><kbd>~www.uexpress.com/ups/</kbd></big> -to permit them. -<p> -<a name="trust">Version 2.0 has an experimental feature</a> -to permit only sites mentioned in a nominated -<a href="ijbman.html#trustfile">trusted site.</a> -This allows organizations to build lists of sites for kids to browse, -and the software automatically restricts access to those on the list. -<p> -<a name="scan">Many filtering</a> -<a href="links.html#blocking">products</a> -actually scan for keywords in -the text of pages they retrieve -before presenting it, -but -the -Internet Junkbuster -does not do this. -Building a perfectly reliable black list system is hard, -because it's very difficult to state -in advance -exactly -what is obscene or unsuitable. -For more info see our -<a href="links.html#parents">links</a> -page. -</p> - -<h3><a name="message" href="/cgi-bin/gp?pg=ijbfaq&pr=message"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -What do I see when a page or graphic is blocked by the proxy? -</h3> -<p> -You usually see a broken image icon, -but it depends on several factors beyond the proxy's control. -If asked for a -<small>URL</small> -matching its blockfile, the proxy returns an -<small>HTML</small> -page containing a message identifying itself -(currently the two words ``Internet Junkbuster'') -with a status 202 (Accepted) instead of the usual 200 (OK). -(Versions 1.X returned an error 404: Forbidden, which caused -strange behavior in some cases.) -Status 202 is described in the -<small>HTTP</small> -<a href="http://www.ics.uci.edu/pub/ietf/http/rfc1945.html#Code202">RFC</a> -as indicating that the request has been accepted but not completed, -and that it might complete successfully in the future -(in our case, if the blockfile were changed). -<p> -<a name="depends">The broken image icon is most common</a> -because the browser is usually expecting a graphic. -But if it was expecting text, or if the page happens to be using certain -<small>HTML</small> -extensions -such as -<big><kbd>layer</kbd></big> -and your browser is a late model from Microsoft, -you may see the words ``Internet Junkbuster'' displayed as a hot link. -<p> -<a name="click">Clicking on the link takes you to an explanation of</a> -the pattern in the blockfile that caused the block, -so that you can edit the blockfile and go back and reload if you really -want to see what was blocked. The explanatory link is generated by -the proxy and is automatically intercepted based on its ending in -<big><kbd>ij-blocked-url</kbd></big>; -even though the site is specified as -<big><kbd>http://internet.junkbuster.com</kbd></big> -no request should actually made to that site. -If one is, it means that the proxy was been removed after it -generated the link. -<p> -<a name="layer">To summarize:</a> -the identifying link to the blocking explanation -is usually turned into a broken image icon, -but it may be displayed on a page alone, -or they may may be restricted to the particular frame, layer or graphic area -specified in the page containing them. -The proxy has no way of knowing the context in which a -<small>URL</small> -will be used and cannot control how the blocking message will be rendered. -</p> - -<h3><a name="broken" href="/cgi-bin/gp?pg=ijbfaq&pr=broken"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Why not replace blocked banners with something invisible? -</h3> -<p> -<a name="infringe">Many users have suggested to us</a> -that blocked banners should be replaced by a something like a -1x1 transparent -<small>GIF</small> -to make the page would look as if there was nothing ever there. -Apart from making it harder to catch unintended blocking, -this might also displease the owners of the page, -who could argue that such a change constitutes a copyright infringement. -We think that merely failing to allow an included graphic to be accessed -would probably not be considered an infringement: -after all this is what happens when a browser -is configured not to load images automatically. -However, we are -<a href="over.html#notlaw">not</a> -lawyers, -so anyone in doubt should take appropriate advice. -<p> -<a name="done">In a context where the copyright issue is resolved</a> -satisfactorily, -a proxy could simply return a status 301 or 302 and -specify a replacement -<small>URL</small> -in a -<big><kbd>Location</kbd></big> -and/or -<big><kbd>URI</kbd></big> -header. -An alternative would be to use inline code to return a -1 x 1 clear -<small>GIF</small>. -We do not publish sample code for this, -and we have no way of stopping -<a href="ijbdist.html#others">others</a> -who have. -</p> - -<h3><a name="size" href="/cgi-bin/gp?pg=ijbfaq&pr=size"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Why not block banners based on the dimensions of the image? -</h3> -<p> -Many users have pointed out that most banner ads come in standard sizes, -so why not block all -<small>GIF</small>s -of those sizes? -This would theoretically be without fetching the object -because the dimensions are usually given in the -<big><kbd>IMG</kbd></big> -tag, -but it would require substantial changes in the code, -and we doubt whether it would be much more effective than a good block list. -</p> - -<h3><a name="embedded" href="/cgi-bin/gp?pg=ijbfaq&pr=embedded"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -What about non-graphic advertising within the pages I want? -</h3> -<p> -The -Internet Junkbuster -deliberately -does not provide a way of automatically editing the contents of a page, -to remove textual advertising or -to repair the holes left by blocked banners. -Other packages such as -<a href="links.html#webfilter">WebFilter</a> -do. -<p> -<a name="base">For the same reason,</a> -it has no way of stopping a new browser -window being created, because this is done through the -<big><kbd>target</kbd></big> -attribute in the -<big><kbd><a></kbd></big> -and -<big><kbd><base></kbd></big> -elements, -not through headers. -Nor do we plan to add a feature to -<a href="http://simmons.starkville.ms.us/tips/081097/">paralyze animated</a> -<small>GIF</small>s. -</p> - -<h3><a name="push" href="/cgi-bin/gp?pg=ijbfaq&pr=push"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Does it block ads on the broadcasting ``push'' systems? How about pop-up ads? -</h3> -<p> -We haven't tried it but we expect it would probably -work on image ads on push channels. -See also -<a href="links.html#adchoice">adchoice</a>. -<p> -<a name="pop">Disabling</a> -<a href="cookies.html#java">Javascript</a> -stops some pop-up ads. -One problem is that some advertisers throw open a new -browser window to frame the ad. The ad is easily blocked, -but the empty window remains. You can kill it easily, but this is a chore. -We don't see how to stop them other than editing the -<small>HTML</small> -from the parent window, which we -<a href="ijbfaq.html#broken">don't</a> -like to do. -<p> -<a name="TBTD">The</a> -<a href="http://www.tbtf.com/archive/10-06-97.html">TBTF</a> -newsletter warned subscribers to push information that -<a name="LOGTARGET">in IE4,</a> -<a href="http://www.microsoft.com/standards/cdf.htm#Logging">LOGTARGET</a> -allows -servers to determine the -<small>URL</small>s -viewed at their site even if accessed from cache or through a proxy. -If you use this browser see our instructions on -<a href="cookies.html#counting">how to disable</a> -this. -<p> -<a name="pushy">If you find you have experience using the proxy with push,</a> -or have any other advice about it, please -<a href="/cgi-bin/gp?pg=ijbfaq&pr=pushy">tell us.</a> -</p> -<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p> -<br> -<center> -<h2><a name="cookies"><font face="arial, helvetica"> -Cookies -</font></a> -</h2> -</center> -<br>For background information on cookies see our -<a href="cookies.html">page describing their dangers.</a> - -<h3><a name="breakthrough" href="/cgi-bin/gp?pg=ijbfaq&pr=breakthrough"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Might some cookies still get through? How can I stop them? -</h3> -<p> -Yes, you should expect the occasional cookie to make it through to your browser. -We know of at least three ways this can happen; -please -<a href="/cgi-bin/gp?pg=ijbfaq&pr=breakthrough">tell us</a> -if you find any others. -One way is in secure documents, which are explained -<a href="ijbfaq.html#secure">below.</a> -<p> -<a name="EQUIV">A</a> -<a href="links.html#JavaScript">few</a> -sites set cookies using a line such as -<big><kbd><META HTTP-EQUIV="Set-Cookie" CONTENT="flavor=chocolate"></kbd></big> -in the -<big><kbd>HEAD</kbd></big> -section of an -<small>HTML</small> -document. -<a name="javascript">Cookies can also be</a> -<!-- IEM: http://cgi.netscape.com/eng/mozilla/Gold/handbook/javascript/ref_a-c.html#cookie_property --> -set and read -in -JavaScript. -To see if this is happening in a document, -view its source, look in the -<big><kbd>head</kbd></big> -for a section tagged -<big><kbd>script language="JavaScript"</kbd></big>. -If it contains a reference to -<big><kbd>document.cookie</kbd></big>, -the page can manipulate your cookie file without sending any cookie headers. -The -Internet Junkbuster -does not tamper with these methods. -Fortunately they are rarely used at the moment. -If a cookie gets set, it should be stopped -by the proxy on its way back to the server when a page is requested, -but it can still be read in Javascript. -bu -<p> -<a name="alert">To prevent cookies breaking through,</a> -<strong>always</strong> -keep -<a href="cookies.html#disable">cookie alerts</a> -turned on in your browser, -and -<a href="cookies.html#java">disable</a> -Java and Javascript. -Making the files -<a href="cookies.html#only">hard to write</a> -may also help. -</p> - -<h3><a name="method" href="/cgi-bin/gp?pg=ijbfaq&pr=method"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Exactly how do cookies get created and stored anyway? -</h3> -<p> -When a web site's server sends you a page it also sends -certain ``header information'' which your browser records but does not display. -One of these is a -<big><kbd>Set-Cookie</kbd></big> -header, which specifies the cookie information that the server wants your browser to record. -Similarly, when your browser requests a page it also sends headers, specifying -information such as the graphics formats it understands. -If a cookie has previously been set by a site that matches the -<small>URL</small> -it is about to request, -your browser adds a -<big><kbd>Cookie</kbd></big> -header quoting the previous information. -<p> -<a name="privacy">For more background information on how cookies</a> -can damage your privacy, see our -<a href="cookies.html">page on cookies.</a> -For highly detailed technical information see the -<a href="links.html#kristol">RFC.</a> -The -Internet Junkbuster -will show you all headers you use the -<a href="ijbman.html#debug">debug</a> -<big><kbd>8</kbd></big> -option, -or you can get a sample from our -<a href="ijbfaq.html#headers">demonstration page.</a> -</p> - -<h3><a name="break" href="/cgi-bin/gp?pg=ijbfaq&pr=break"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -If cookies can't get through, will some things stop working for me? -</h3> -<p> -Possibly. -Some personalized services including certain -<!-- IEM: http://my.yahoo.com --> -chat -rooms -require cookies. -<a name="registration">Newspapers that require</a> -<!-- IEM: http://www.nytimes.com/subscribe/sub-bin/new_sub.cgi#agree --> -registration -or -<!-- IEM: http://interactive5.wsj.com/regUser.html --> -subscription -will not automatically recognize you if you don't send them the cookie they -assigned you. And there are a very small number of sites that do -strange things with cookies; they don't work for anyone that blocks -cookies by any means. -Some sites such as -<a href="links.html#withhold">Microsoft</a> -explain that their content is so wonderfully compelling that -they will withhold it from you unless you submit to their -inserting cookies. -<p> -<a name="want">If you want such sites to be given your cookies,</a> -you can use the -<a href="ijbman.html#cookiefile">cookiefile</a> -option provided you are running -<a href="ijbfaq.html#crumble">Version 1.2 or later</a> -yourself. -Simply include the domain name of those sites in the -<i>cookiefile</i> -specified by this option. -If it still doesn't work, -the problem may be in -<a href="ijbfaq.html#breakage">other headers.</a> -<p> -<a name="one">It's possible to let cookies out but not in,</a> -which is enough to keep some sites happy, but not all of them: -one newspaper site seems to go into an endless frenzy -if deprived of fresh cookies. -A cookiefile containing -a single line consisting of the two characters -<big><kbd>>*</kbd></big> -(greater-than and star) permits server-bound cookies only. -The -<big><kbd>*</kbd></big> -is a -<a href="ijbman.html#wildcard">wildcard</a> -that matches all domains. -<p> -<a name="else">If someone else is running the</a> -Internet Junkbuster -for you and has a version -that -<!-- IAM: ijbfaq.html#registration --> -passes server-bound cookies through, -you can try editing your browser's cookie -file to contain just the ones you want, -and restart your browser. -<a name="window">To subscribe to a new service like this</a> -after you have started using the -Internet Junkbuster, -you can try the following: -tell your browser to -<a href="ijbfaq.html#discontinue">stop using</a> -the -Internet Junkbuster, -fill out and submit your subscription details -(allowing that web site to set a cookie), -then -reconfigure your browser to use the -Internet Junkbuster -again -(and stop more cookies being sent). -This also requires the -<a href="ijbman.html#cookiefile">cookiefile</a> -option, -and its success depends on the Web site -not wanting to change your cookies at every session. -For this reason it does not work at some major newspaper sites, for example. -<a name="buyers">But you may prefer to</a> -look at whether other sites provide the same -or better services without demanding the opportunity -to track your behavior. -The web is a buyer's market where most prices are zero: -very few people pay -for content with money, so why should you pay with your privacy? -</p> - -<h3><a name="crumble" href="/cgi-bin/gp?pg=ijbfaq&pr=crumble"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Can I control cookies on a per-site basis? -</h3> -<p> -<a name="discard">Yes, since version 1.2 the</a> -Internet Junkbuster -has included advanced cookie management facilities. -Unless you specify otherwise, -cookies are discarded (``crumbled'') by the -Internet Junkbuster -whether they came from the server or the browser. -In Version 1.2 and later you can -use the -<a href="ijbman.html#cookiefile">cookiefile</a> -option -to specify when cookies are to be passed through intact. -It uses the same syntax and -<a href="ijbman.html#o_b">matching</a> -algorithm as the blockfile. -<p> -<a name="cook">If the</a> -<small>URL</small> -matches a pattern in the -<i><dfn>cookiefile</dfn></i> -then cookies are let through in both the browser's request for the -<small>URL</small> -and in the server's response. -<a name="directional">One-way permissions can be</a> -specified by starting the line with the -<big><kbd>></kbd></big> -or -<big><kbd><</kbd></big> -character. -For example, a cookiefile consisting of the four lines -<br> -   <big><kbd>org</kbd></big> -<br> -   <big><kbd>>send-user-cookies.org</kbd></big> -<br> -   <big><kbd><accept-server-cookies.org</kbd></big> -<br> -   <big><kbd>~block-all-cookies.org</kbd></big> -<br> -allows cookies to and from -<big><kbd>.org</kbd></big> -domains only, with the following exceptions: -<br><ol type="1"> -<li> -<a name="fed">Cookies sent from servers in the domain</a> -<big><kbd>send-user-cookies.org</kbd></big> -are blocked on their way to the client, -but cookies sent by the browser to that domain are still be fed to them. -<li> -<a name="take">The cookies of</a> -<big><kbd>accept-server-cookies.org</kbd></big> -check in to the proxy and are passed through to the browser, -but when they come back to the proxy they never check out. -<li> -<a name="deny">All cookies to and from</a> -<big><kbd>block-all-cookies.org</kbd></big> -are blocked. -</ol> -<p> -<a name="paths">If</a> -the -<b><kbd>junkbuster</kbd></b> -was compiled with the regular expressions option -they may be used in paths. -Any logging to a -<a href="ijbfaq.html#jar">``cookie jar''</a> -is separate and not affected. -<p> -<a name="breadth">It's important to give hosts you want to be able</a> -to set cookies sufficient breadth. For example, -instead of -<big><kbd>www.yahoo.com</kbd></big> -use -<big><kbd>yahoo.com</kbd></big> -because the company uses many different hosts ending in that domain. -</p> - -<h3><a name="wafers" href="/cgi-bin/gp?pg=ijbfaq&pr=wafers"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Can I make up my own fake cookies (wafers) to feed to servers? -</h3> -<p> -Yes, -using the -<a href="ijbman.html#wafer">wafer</a> -option. -We coined the term -<i><dfn>wafer</dfn></i> -to describe cookies chosen by a user, -not the Web server. -Servers may not find wafers as tasty as the cookies -they make themselves. -But users may enjoy controlling servers' diets for various reasons, -such as the following. -<br><ul type="1"> -<li> -<a name="retaliate">Users who consider cookies to</a> -be an unwelcome intrusion and a waste -of their disk space can respond in kind. -By writing ``signature wafers'' they can -express their feelings about cookies, -in a place that the people -in charge of them are most likely to notice. -<li> -<a name="notice">Sites running a proxy</a> -that logs cookies to a file -(such as the -Internet Junkbuster -does with the -<a href="ijbman.html#jarfile">jarfile</a> -option on) -may want to notify -servers that their cookies are being intercepted, -deleted or copied. -One possible reason for doing this is the uncertain copyright status -of cookie strings. -<a href="over.html#notlaw">Nothing</a> -here should be taken as legal advice: we are simply raising a question -for any interested parties to consider, -and make no representation that such measures are necessary or sufficient. -Concerned proxy sites might decide to send a wafer -(named ``NOTICE'' for example) -containing text along the lines of the following. -<blockquote> -<p> -<a name="licenses_on_cookies_refused">TO WHOM IT MAY CONCERN</a> -<i> -<br> -<br> -Do not send me any copyrighted information other than the -document that I am requesting or any of its necessary components. -<br> -<br> -In particular do not send me any cookies that -are subject to a claim of copyright by anybody. -Take notice that I refuse to be bound by any license condition -(copyright or otherwise) applying to any cookie. -</i> -</blockquote> -Any company that tries to argue in court that the proxy site -was breaching their copyright in the cookies would -be met with the defense that the proxy site gave that company -the opportunity to protect its copyright by simply -not sending cookies after receiving the notice. -<p> -<a name="pointer">Cookies can be as long as four thousand characters,</a> -so there's plenty of space for lawyerly verbosity, -but white space, commas, and semi-colons are -<a href="ijbman.html#o_w">prohibited.</a> -Spaces can be turned into underscores. -Alternatively, -a -<small>URL</small> -could be sent as the cookie value, -pointing to a document containing a notice, -perhaps with a suggestive value such as -<br> -<big><kbd>http://www.junkbusters.com/ht/en/ijbfaq.html#licenses_on_cookies_refused</kbd></big> -<br> -But including the notice directly would probably be preferable -because the addressee does not have to look it up. -<p> -<a name="vanilla">The</a> -Internet Junkbuster 2.0 -currently sends a full notice as a -``vanilla wafer'' -if cookies are being logged to a cookie jar -and no other wafers have been specified. -It can be suppressed with the -<a href="ijbman.html#suppress-vanilla-wafer">suppress-vanilla-wafer</a> -option, -which might be used in situations where there is an established understanding -between the proxy and all who serve it. -</ul> -<p> -<a name="gimme">Junkbusters provides a</a> -<small>CGI</small> -script that lets you -<a href="ijbfaq.html#headers">see</a> -your wafers as they appear to servers. -<p> -<a name="malfunction">Wafers confuse a few fragile servers.</a> -If this troubles you, don't use this option. -<p> -<a name="regardless">Any wafers specified are sent to</a> -all sites regardless of the cookiefile. -<a name="compliant">They are appended after any genuine cookies,</a> -to maintain compliance with -<a href="links.html#kristol">RFC 2109</a> -in the event that a path was specified for a cookie. -The -<small>RFC</small>'s provisions regarding the -<big><kbd>$</kbd></big> -character -(such as the -<big><kbd>Version</kbd></big> -attribute) -are transparent -to the proxy; it simply quotes what was recited by the browser. -<p> -<a name="personalize">If you want to send wafers only to specific sites,</a> -you could try putting them your browser's cookie file in a format -conforming to the Netscape -<a href="links.html#netscape">specification</a>, -and then specify in the proxy's cookiefile that cookies are to be -<a href="ijbfaq.html#directional">sent to</a> -but not accepted from those sites, so they can't overwrite the file. -This may work with Netscape but not all other browsers. -</p> - -<h3><a name="jar" href="/cgi-bin/gp?pg=ijbfaq&pr=jar"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Why would anyone want to save their cookies in a ``cookie jar?'' -</h3> -<p> -We provided this capability just in case anyone wants it. -There are a few possible reasons. -<br><ul type="1"> -<li> -<a name="pay">It's conceivable that</a> -marketing companies might one day -<a href="new.html#hagel">buy</a> -history files and cookie jars from consumers -in the same way that they currently pay them to fill out survey forms. -With this information they could -gather psychographic information, -see which competitors' sites the consumer has visited, -and discover what advertising is being targeted at them. -<li> -<a name="choose">Some consumers might</a> -employ semi-automated means of sorting through -their cookie jars, selecting which ones to place in their cookies -file for use by their browsers. -Their decisions could be based on payments offered, -privacy rating systems such as -<a href="links.html#truste">TRUSTe</a> -proposes, -or their own opinion of the company. -It could be done manually or with software. -<li> -<a name="share">Users may even start ``sharing'' cookies among themselves,</a> -sending back cookies that servers generated for other visitors. -Servers that aren't expecting this possibility -will be misled about their visitors' identities. -Cookies could be shared among users on a single machine, -or across continents via -<small>FTP</small> -and anonymous remailers. -<a name="disinformation">Privacy activists may promote</a> -cookie disinformation campaigns -as a way to defend the public against abuse. -If a significant percentage of people send disinformative cookies, -user tracking via cookies may become less reliable and less used. -</ul> -</p> -<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p> -<br> -<center> -<h2><a name="anonymity"><font face="arial, helvetica"> -Anonymity -</font></a> -</h2> -</center> -<br>For details -on how your identity can be revealed while you surf, -see our page on -<a href="http://www.junkbusters.com/cgi-bin/privacy">privacy.</a> -Once you start using -the -Internet Junkbuster -you should find that much of the information -previously indicated on that page will no longer be provided. -If the -<big><kbd>REMOTE HOST</kbd></big> -indicating your IP address is too close for comfort, -see our suggestions -<a href="ijbfaq.html#conceal">below</a> -on how to -conceal -your IP address. -We also recommend that you -<a href="cookies.html">disable JavaScript</a> -and -<a href="links.html#java">Java.</a> - -<h3><a name="disclose" href="/cgi-bin/gp?pg=ijbfaq&pr=disclose"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -If I use the Internet Junkbuster, will my anonymity be guaranteed? -</h3> -<p> -No. Your chances of remaining anonymous are improved, -but unless you are an expert on Internet security -it would be safest to assume that everything you do on the Web -can be attributed to you personally. -<p> -<a name="happen">The</a> -Internet Junkbuster -removes various information about you, -but it's still possible that web sites can find out who you are. -Here's one way this can happen. -<p> -<a name="ftp">A few browsers</a> -<a href="http://www.junkbusters.com/cgi-bin/privacy">disclose the user's email address</a> -in certain situations, such as when transferring a file by -<small>FTP</small>. -The -Internet Junkbuster 2.0 -does not filter the -<small>FTP</small> -stream. -If you need this feature, or are concerned about the mail handler -of your browser disclosing your email address, -you might consider -products such as -<a href="links.html#nsclean">NSClean</a>. -<p> -<a name="binaries">Browsers downloaded as binaries</a> -could use non-standard headers to give out any information -they can have access to: see the manufacturer's license agreement. -It's impossible to anticipate and prevent every breach of privacy that -might occur. -The professionally paranoid prefer browsers available as source code, -because anticipating their behavior is easier. -</p> - -<h3><a name="should" href="/cgi-bin/gp?pg=ijbfaq&pr=should"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Why should I trust my ISP or Junkbusters with my browsing data? -</h3> -<p> -You shouldn't have to trust us, and you certainly don't have to. -We do not run the proxy as a service, -where we could observe your online behavior. -We provide source code so that everyone can see that the proxy isn't -doing anything sneaky. -<p> -<a name="awful">You are already trusting your</a> -<small>ISP</small> -not to look at an awful lot of information on what you do. -They probably post a -<a href="links.html#policy">privacy policy</a> -on their site to reassure you. -If they run a proxy for you, using it could actually -make it slightly easier for them to monitor you, -but we doubt that any sane -<small>ISP</small> -would try this, -because if it were discovered customers would desert them. -</p> - -<h3><a name="header" href="/cgi-bin/gp?pg=ijbfaq&pr=header"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -What private information from server-bound headers is removed? -</h3> -<p> -The -Internet Junkbuster -pounces on the following -<small>HTTP</small> -headers in requests to servers, -unless instructed otherwise in the options. -<br><ul type="1"> -<li> -<a name="from">The</a> -<big><kbd>FROM</kbd></big> -header, -which a few browsers use to tell your email address to servers, -is dropped -unless the -<a href="ijbman.html#from">from</a> -option is set. -<li> -<a name="agent">The</a> -<big><kbd>USER_AGENT</kbd></big> -<a name="infer">header</a> -is changed to indicate that the browser is -currently Mozilla (Netscape) 3.01 Gold -with an unremarkable Macintosh configuration. -Misidentification helps resist certain -<a href="ijbfaq.html#misidentify">attacks.</a> -If your browser and hardware happen to be accurately identified, -you might want to change the default. -(Earlier versions of the -Internet Junkbuster -indicated different details; -by altering them periodically we aim to hinder anyone trying to -<a href="ijbfaq.html#detect">infer</a> -whether our proxy is present.) -<a name="lying">If you don't like the idea</a> -of incorrectly identifying your computer as a Mac, -set it accordingly. -<!-- Aside: or read Kundera's Unbearable Lightness of Being, 5:5, ``It is a tragicomic fact..'' (p187?) --> -<li> -<a name="referer">The</a> -<big><kbd>REFERER</kbd></big> -header -(which indicates where the -<small>URL</small> -currently being requested was found) -is dropped. -A single static referer to replace all -real referers may be specified using the -<a href="ijbman.html#referer">referer</a> -option. -Where no referer is provided by the browser, none is added; -the -<a href="ijbman.html#add-header">add-header</a> -option with arguments such as -<big><kbd>-x 'Referer: http://me.me.me'</kbd></big> -can be used to send a bogus referer with every request. -</ul> -In -Version <a href="ijbdist.html#c4">1.4</a> -and later you can use the -<a href="ijbman.html#o_r">-r @</a> -option to selectively disclose -<big><kbd>REFERER</kbd></big> -and -<big><kbd>USER_AGENT</kbd></big> -to only those sites you nominate. -<p> -<a name="UA">Some browsers</a> -send Referer and User-Agent information under different non-standard headers. -The -Internet Junkbuster 2.0 -stops -<big><kbd>UA</kbd></big> -headers, -but others may get through. -This information is also available via JavaScript, -so -<a href="cookies.html">disable disable</a> -it. -<a name="indexers">Some search engines</a> -<a href="cookies.html#queries">encode the query you typed</a> -in the -<small>URL</small> -that goes to advertisers to target a banner ad at you, -so you will need to block the ad as well as the referer header, -unless you want them (and anyone they might -<a href="cookies.html#set">buy data</a> -from) -to know -<a href="links.html#search">everything you ever search for.</a> -<p> -<a name="JavaScript">If you have JavaScript enabled (the default on</a> -most browsers) servers can use it to obtain Referer and User Agent, -as well as your plug-ins. -We recommend -<a href="cookies.html#java">disabling</a> -JavaScript and Java. -<p> -<a name="response">Currently no</a> -<small>HTTP</small> -response headers (browser bound) -are removed, -not even the -<big><kbd>Forwarded:</kbd></big> -or -<big><kbd>X-Forwarded-For:</kbd></big> -headers. -Nor are any added, -<a href="ijbman.html#o_y">unless requested.</a> -We are considering a more flexible header management system for -a future version. -</p> - -<h3><a name="breakage" href="/cgi-bin/gp?pg=ijbfaq&pr=breakage"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Might some things break because header information is changed? -</h3> -<p> -Possibly. If used with a browser less advanced than Netscape 3.0 or IE-3, -indicating an advanced browser -may encourage pages containing extensions that confuse your browser. -If this becomes a problem -upgrade your browser or -use the -<a href="ijbman.html#user-agent">user-agent</a> -option to indicate an -<a href="ijbfaq.html#low">older browser.</a> -In -Version <a href="ijbdist.html#c4">1.4</a> -and later you can selectively reveal your real browser -to only those sites you nominate. -<p> -<a name="Russian">Because different browsers</a> -use different encodings of Russian characters, -certain web servers convert pages on-the-fly according to the User Agent -header. Giving a User Agent with the wrong operating system or -browser manufacturer causes some Russian sites to be garbled; -Russian surfers should -<a href="ijbman.html#o_r">change it</a> -to something closer. -<p> -<a name="counters">Some</a> -<a href="http://www.yahoo.com/Computers_and_Internet/Internet/World_Wide_Web/Programming/Access_Counts/">page access counters</a> -work by looking at the referer; -they may fail or break when deprived. -<p> -<a name="wired">Some sites depend on getting a referer header,</a> -such as -<big><kbd>uclick.com</kbd></big>, -which serves comic strips -for many newspaper sites, -including -<a href="http://www.uclick.com/?feature=db"><cite>Doonsbury</cite></a> -for the -<a href="http://www.washingtonpost.com/wp-srv/style/longterm/comics/comics.htm"><cite>Washington Post.</cite></a> -(If you click on that last link, you can then get to a page containing -the strip via the -same -<small>URL</small> -we've linked to under -<cite>Doonsbury</cite>, -but if you click on the -<cite>Doonsbury</cite> -link directly, it gives you an error message suggesting that you -use a browser that supports referers.) -In -Version <a href="ijbdist.html#c4">1.4</a> -and later you can use the -<a href="ijbman.html#o_r">-r @</a> -option -and place a line like -<big><kbd>>uclick.com</kbd></big> -in your cookiefile. -<a href="http://www.wired.com/news/">Wired News</a> -used to use referer to decide whether to add a navigation column to -the page, but they have changed that. -<p> -<a name="Intellicast">The weather maps of</a> -<a href="links.html#Intellicast">Intellicast</a> -have been blocked by their server when no referer or cookie is provided. -You can use the same countermeasure with a line such as -<big><kbd>>208.194.150.32</kbd></big> -(or simply get your weather information -<a href="ijbfaq.html#buyers">elsewhere</a>). -<p> -<a name="decide">Some software vendors, including</a> -<a href="http://www.intuit.com/quicken_store/">Intuit</a> -use -<big><kbd>USER_AGENT</kbd></big> -to decide which versions of their products to display to you. -With the -<a href="ijbfaq.html#agent">default</a> -you get Mac versions. -<p> -<a name="resort">As a last resort if a site you need doesn't seem to be working,</a> -the -<a href="ijbfaq.html#set">proxy configuration</a> -of many browsers allow you to specify -<b><font face="arial, helvetica"> -No Proxy For</font></b> -any hostname you want. -<p> -<a name="What">We had reports that on some versions of Netscape the</a> -<a href="http://home.netscape.com/home/whats-new.html">What's New</a> -feature did not work with the proxy, -but we think we fixed this in Version 2.0.1. -</p> - -<h3><a name="misidentify" href="/cgi-bin/gp?pg=ijbfaq&pr=misidentify"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How is misidentifying my browser good for security and privacy? -</h3> -<p> -Almost -<a href="new.html#Browser">every</a> -major release of both leading browsers has contained -bugs that allow malicious servers to compromise your privacy and security. -Known bugs are quickly fixed, but millions of copies of the affected -software remain out there, and yours is probably one of them. -The -<a href="ijbfaq.html#agent">header</a> -that normally identifies your browser tells such servers exactly which attacks -to use against you. -By misidentifying your browser you reduce the likelihood that they -will be able to mount a successful attack. -</p> - -<h3><a name="conceal" href="/cgi-bin/gp?pg=ijbfaq&pr=conceal"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Does the Internet Junkbuster conceal my IP address? -</h3> -<p> -Web sites get the IP address of any proxy or browser they serve pages to. -If you run the proxy on your own computer the IP address disclosed -is the same as your browser would, unless you use the -<a href="ijbman.html#forwardfile">forwardfile</a> -option is used to chain to another proxy, -in which case servers only get the last IP address in the chain. -Chaining slightly slows browsing of course, but it improves anonymity. -<p> -<a name="anonymizing">One public proxy that you can</a> -forward to is -<a href="new.html#LPWA">lpwa.com</a> -port 8000. -Read about its privacy-enhancing -features and the authentication procedures first, -and note that it blocks -<a href="ijbfaq.html#wired">referer</a> -in almost all cases, -as well as some -<a href="http://lpwa.com:8000/system.html#principles:header">other headers.</a> -</p> - -<h3><a name="authorize" href="/cgi-bin/gp?pg=ijbfaq&pr=authorize"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -How can I set the proxy to remember my LPWA password? -</h3> -<p> -After you log in to -<a href="http://lpwa.com">LPWA</a> -it tells your browser to send a -<big><kbd>Proxy-authorization</kbd></big> -header with each request. -Whenever you shut down the browser and start again with a new browser, -you need to log in again. -If you are the only person using the -Internet Junkbuster -proxy, you can avoid repeated logins to -<a href="http://lpwa.com">LPWA</a> -by telling the -Internet Junkbuster -to send the information by placing a line such as -<br> -   <big><kbd>add-header Proxy-authorization: Basic ZHVtbXk=.</kbd></big> -<br> -in the configuration file. -The exact example above -<em>does not work</em> -because the code -<big><kbd>ZHVtbXk=.</kbd></big> -is a bogus one that -<a href="http://lpwa.com">LPWA</a> -would never generate; -follow the procedure below to generate a valid one. -<br><ol type="1"> -<li> -<a name="eight">Restart your</a> -Internet Junkbuster -with -<big><kbd>debug 8</kbd></big> -so you can see the -<a href="ijbman.html#o_d">headers.</a> -<li> -<a name="login">Log in to</a> -<a href="http://lpwa.com">LPWA</a> -and go to any other site. -<li> -<a name="observe">Find the</a> -<big><kbd>Proxy-authorization</kbd></big> -header from the debug output and paste it -after the word -<a href="ijbman.html#add-header">add-header</a> -into the config file. -Also change the debug value back again. -<li> -<a name="return">Shut down your browser, start it up again, and</a> -restart the proxy. Test that it works. -</ol> -This trick is convenient for sole users, but is not suitable when -more than one person uses the proxy, because they will all get the -same -<a href="http://lpwa.com">LPWA</a> -identity. -</p> - -<h3><a name="ident" href="/cgi-bin/gp?pg=ijbfaq&pr=ident"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Does the Internet Junkbuster thwart identification by identd? -</h3> -<p> -We think so, -provided you are not the user running the -proxy. -If your computer (or your -<small>ISP</small>'s) -is running the -<a href="links.html#identd"><kbd>identd</kbd></a> -demon, -servers can ask it for the identity of the -user making the request at time you request a page from them. -But if you're going through a proxy, -they will identify the user name associated with the proxy, not you. -A visit to -<a href="http://ident.junkbusters.com">http://ident.junkbusters.com</a> -lets you see what's happening. -This test is (quite rightly) blocked by many -<a href="ijbfaq.html#firewall">firewalls;</a> -just interrupt the transfer if you get an abnormal wait after clicking. -Running other applications -may also expose you via -<a href="links.html#identd"><kbd>identd</kbd></a>; -the proxy of course doesn't help then. -</p> - -<h3><a name="detect" href="/cgi-bin/gp?pg=ijbfaq&pr=detect"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Can web sites tell that I'm using the Internet Junkbuster? -</h3> -<p> -With the default options the proxy doesn't announce itself. -Obvious indications such as -<a href="links.html#alive">Keep-Alive</a> -headers are -<a href="ijbman.html#o_x">deleted,</a> -but sites might notice that you can cancel cookies faster than -any human could possibly click on a mouse. -(If you want to provide a -plausible explanation for this, -change the User Agent header to a -<a href="ijbfaq.html#lynx">cookie-free</a> -or -<a href="cookies.html#communicator">cookie-crunching</a> -browser). -<p> -<a name="figure">But when certain options</a> -are used they could figure out something's going on, -even if they're not pushing cookies. -If you use blocking -they can tell from their logs that the graphics in their pages -are not being requested selectively. -The -<a href="ijbman.html#add-forwarded-header">add-forwarded-header</a> -option explicitly announces to the server that a proxy is present, -and -sending them -<a href="ijbfaq.html#wafers">wafers</a> -is of course a dead giveaway. -</p> -<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p> -<br> -<center> -<h2><a name="security"><font face="arial, helvetica"> -Security -</font></a> -</h2> -</center> -<br> -<h3><a name="encrypt" href="/cgi-bin/gp?pg=ijbfaq&pr=encrypt"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -What happens with Secure Documents (SSL, https:)? -</h3> -<p> -If you enter a -``Secure Document Area,'' -cookies and other header information -such as User Agent and Referer -are sent encrypted, -so they cannot be filtered. -We recommend getting your browser to alert you when this happens. -(On Netscape: -<b><font face="arial, helvetica"> -Options</font></b>; -<b><font face="arial, helvetica"> -Security</font></b>; -<b><font face="arial, helvetica"> -General</font></b>; -<b><font face="arial, helvetica"> -Show an alert before entering a secure document space</font></b>.) -We also recommend adding the line -<big><kbd>:443</kbd></big> -to the blockfile to stop all but sites specified in an exception -after that line from using SSL. -<p> -<a name="passage">It may be possible to filter encrypted cookies</a> -by combining the blocking proxy with a cryptographic proxy along -the lines of -<a href="http://stronghold.ukweb.com/safepassage/">SafePassage</a>, -but we have not tried this. -</p> - -<h3><a name="ssl" href="/cgi-bin/gp?pg=ijbfaq&pr=ssl"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Will using this as my Security Proxy compromise security? -</h3> -<p> -We're not security experts, but we don't think so. -The whole point of -<small>SSL</small> -is that the -contents of messages are -<!-- IEM: http://addy.com/dc/html/what_is_ssl_.html --> -encrypted -by the time -they leave the browser and the server. -Eavesdroppers (including proxies) can see where your messages are going -whether you are running a proxy or not, -but they only get to see the contents after they have been encrypted. -</p> - -<h3><a name="restrict" href="/cgi-bin/gp?pg=ijbfaq&pr=restrict"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Can I restrict use of the proxy to a set of nominated IP addresses? -</h3> -<p> -Yes, we added an -<a href="ijbman.html#aclfile">access control</a> -file in Version 2.0. -But before you use it please consider why you want to do it. -If the reason is security, -it probably means you need a firewall. -<p> -<a name="selective">The</a> -<a href="ijbman.html#listen-address">listen-address</a> -option provides a way of binding the proxy to a single IP address/port. -The right way to do this is to choose a port inside your firewall, and -deny access to it to those outside the firewall. -The -Internet Junkbuster -is not a firewall proxy; -it should not be expected to solve security problems. -<p> -<a name="firewall">For background information on firewalls,</a> -see -<a href="http://www.yahoo.com/Computers_and_Internet/Security_and_Encryption/Firewalls/">Yahoo</a> -or a -<a href="http://www.netscapeworld.com/ned-02-1998/ned-02-firewall.html">magazine article</a> -or these well-known books: -<a href="http://www.amazon.com/exec/obidos/ISBN=0201633574/junkbusterscomA/"><cite>Firewalls and Internet Security: Repelling the Wily Hacker</cite></a> -by -<person>William R. Cheswick</person> -and -<person>Steven M. Bellovin</person> -or -<a href="http://www.amazon.com/exec/obidos/ISBN=1565921240/junkbusterscomA/"><cite>Building Internet Firewalls</cite></a> -by -<person>D. Brent Chapman</person> -and -<person>Elizabeth D. Zwicky</person>. -There's -<!-- IEM: http://www.wmd.de/wmd/staff/pauck/misc/fwtk_on_linux.html --> -free Linux software -available, -and a large number of -<a href="http://www.yahoo.com/Business_and_Economy/Companies/Computers/Software/System_Utilities/Security/Firewalls/">commercial</a> -products and services. -For an excellent security overview, primer, and compendium reference, see -<a href="http://www.amazon.com/exec/obidos/ISBN=1565921488/junkbusterscomA/"><cite>Practical Unix and Internet Security</cite></a> -by -<person>Simson Garfinkel</person> -and -<person>Gene Spafford</person>. -</p> - -<h3><a name="others" href="/cgi-bin/gp?pg=ijbfaq&pr=others"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Are there any security risks for ISPs or others who offer the proxy? -</h3> -<p> -Yes. -As with any service offered over the Internet, -hackers can try to misuse it. -A well-run -<small>ISP</small> -will have professionals who are experienced at assessing and containing -these risks. -<p> -<a name="outside">It's possible to set up your machine so</a> -that other people can have access to your proxy, -but if you lack expertise in computer security -you probably shouldn't have your computer configured to offer -this or any other service to the outside world. -<p> -<a name="attack">Hackers can attempt to gain access</a> -to the machine by various attacks, -which we have tried to guard against but don't guarantee to thwart. -They can also use the ``anonymizing'' quality of proxies -to try to cover their tracks while hacking other computers. -For this reason we recommend preventing it being used -as an anonymous -<big><kbd>telnet</kbd></big> -by putting the pattern -<big><kbd>:23</kbd></big> -in the blockfile (it's included as standard equipment). -(Actually the current implementation incidentally blocks telnet due to the -way headers are handled, but it's best not to rely on this.) -If you wish to block all ports except the default -<small>HTTP</small> -port 80, -you can put the lines -<br> -   <big><kbd>:</kbd></big> -<br> -   <big><kbd>~:80</kbd></big> -<br> -at the beginning of the blockfile, but be aware that some servers -run on non-default ports (e.g. 8080). You might also want to add the line -<big><kbd>~:443</kbd></big> -to allow -<small>SSL</small>. -<p> -<a name="root">On</a> -<small>UNIX <a href="legal.html#not_our_trademark">®</a></small> -systems it is neither necessary nor desirable for the proxy to run as root. -<p> -<a name="patched">Versions 2.0.1 and below may be vulnerable to remote</a> -exploitation of a memory buffer bug; for security reasons all users -are encouraged to -<a href="ijbdist.html#upgrade">upgrade.</a> -<p> -<a name="holes">If you find any security holes in the code</a> -please -<a href="/cgi-bin/gp?pg=ijbfaq&pr=holes">tell us,</a> -along with any suggestions you may have for fixing it. -However, we do not claim that we will be able to do so. -<p> -<a name="useful">We distribute this code in the hope that people</a> -will find it useful, but we provide -<a href="ijbfaq.html#free">no warranty</a> -for it, -and we are not responsible for anyone's use or misuse of it. -<p> -<a name="updates">You may also want to check back periodically for updated versions of the code.</a> -We do not -maintain a mailing list. -To get quick updates, bookmark our -<a href="ijbdist.html#versions">Distribution Information</a> -page. -</p> -<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p> -<font face="arial, helvetica"> -<a rel="begin" href="index.html">Home</a> <font color="#ff0000"> -<b> · </b></font> -<a rel="next" href="ijbman.html">Next</a> -<font color="#ff0000"> -<b> · </b></font><a href="lopt.html">Site Map</a> -<font color="#ff0000"> -<b> · </b></font><a href="legal.html">Legal</a> -<font color="#ff0000"> -<b> · </b></font><a href="junkdata.html">Privacy</a> -<font color="#ff0000"> -<b> · </b></font><a href="cookies.html">Cookies</a> -<font color="#ff0000"> -<b> · </b></font><a href="ijb.html">Banner Ads</a> -<font color="#ff0000"> -<b> · </b></font><a href="telemarketing.html">Telemarketing</a> -<font color="#ff0000"> -<b> · </b></font><a href="junkmail.html">Mail</a> -<font color="#ff0000"> -<b> · </b></font><a href="junkemail.html">Spam</a> - -</font><form action="/cgi-bin/search" method="GET"> -<input type="text" name="q" size=60 maxlength=120 value=""> -<input type="submit" value="Search"></form> -<small> -<small> -<p> -<a href="legal.html#copy">Copyright</a> © 1996-8 Junkbusters -<a href="legal.html#marks">®</a> Corporation. -Copying and distribution permitted under -the <a href="gpl.html"><small>GNU</small></a> -General Public License. -</small> -<tt> -1998/10/31 -http://www.junkbusters.com/ht/en/ijbfaq.html -</tt> -<address><kbd>webmaster@junkbusters.com</kbd></address> -</small> -</body> + <head> + <title>Internet Junkbuster Frequently Asked Questions</title> + <meta name="description" content= + "An extensive FAQ on the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser."> + <meta name="keywords" content= + "stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, consumer, sending, opt out, privacy, advertising, direct, marketing, targeting, through, click, trails, http_referer, cookie, cutter, iff, internet fast forward, Cookie Management Tool"> +<style type="text/css"> +<!-- +h2 { text-align: Center; font-family: arial, helvetica, sans-serif } +p.sans { font-family: arial, helvetica, sans-serif } +b.dot { color: #FF0000 } +b.eg { font-family: arial, helvetica, sans-serif } +--> +</style> + </head> + + <body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink= + "#787878"> + <p class="sans"><a href="http://ijbswa.sourceforge.net"> + Website</a> <b class="dot">·</b> <a href="ijbman.html"> + Manual</a> <b class="dot">·</b> <b>FAQ</b> <b class= + "dot">·</b> <a href="gpl.html">GPL</a></p> + + <h1 align="center"><a name="top_of_page"></a>Internet + J<small>UNK<i style="color: #FF0000">BUSTER</i></small> + Frequently Asked Questions</h1> + + <p align="center" class="sans"><a href="#browser">Configuring + Browsers</a> <b class="dot">·</b> <a href="#defaulted"> + IE 5.0</a> <b class="dot">·</b> <a href="#local"> + Installation</a> <b class="dot">·</b> <a href= + "#companies">For Companies</a> <b class="dot">·</b> <a + href="#blocking">Blocking Ads</a> <b class="dot">·</b> + <a href="#cookies">Cookies</a> <b class="dot">·</b> <a + href="#hotmail">Hotmail</a> <b class="dot">·</b> <a + href="#children">Children</a> <b class="dot">·</b> <a + href="#chain">Forwarding/Chaining</a> <b class="dot"> + ·</b> <a href="#conceal">IP</a> <b class="dot"> + ·</b> <a href="#anonymity">Anonymity</a> <b class="dot"> + ·</b> <a href="#security">Security</a></p> + + <h1>This document is out of date</h1> + + <p><b>Development of JunkBuster is ongoing and this document is + no longer current. However, it may provide some assistance. If + you have problems, please use the <a href= + "http://groups.yahoo.com/group/junkbuster-users/">Yahoo Groups + mailing list</a> (which includes an archive of mail), the + SourceForge.net <a href= + "http://sourceforge.net/projects/ijbswa/">project page</a>, or + see the project's <a href="http://ijbswa.sourceforge.net/">home + page</a>. Please also bear in mind that versions 2.9.x of + JunkBuster are development releases, and are not production + quality.</b></p> + + <h2><a name="top"></a>The Top Ten Questions</h2> + + <h3><a name="what"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> What is the Internet Junkbuster + Proxy and what does it do for me?</h3> + + <p>The Internet Junkbuster Proxy <small><sup>TM</sup></small> + is free privacy-enhancing software that can be run on your PC + or by your ISP or company. It blocks requests for URLs + (typically banner ads) that match its blockfile. It also + deletes unauthorized cookies and other unwanted identifying + header information that is exchanged between web servers and + browsers. These headers are not normally accessible to users + (even though they may contain information that's important to + your privacy), but with the Internet Junkbuster you can see + almost <a href="ijbman.html#o_d">anything you want</a> and + control everything you're likely to need. Many people publish + their blockfiles to help others get started.</p> + + <h3><a name="free"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Is there a license fee / warranty + / registration form / expiration?</h3> + + <p>No, none of these. It's completely free of charge. + Junkbusters offers you the software to copy, use, modify and + distribute as you wish, forever, at no charge under the GNU + General Public License.</p> + + <p><a name="warranty"></a>It comes with no warranty of any + kind.</p> + + <p><a name="register"></a>You don't have to register, in fact + we don't even provide a way to do so: the practice of + registering software is usually just an excuse to send you + solicitations and sell your name and information about your + behavior. You are welcome to obtain and use our software as + anonymously you wish. (Your IP address will naturally be + disclosed when you download it; use anonymizing software if you + want to conceal this. We never want to be given any information + that you consider private or confidential.)</p> + + <p><a name="why"></a>We are often asked why we give away a + product that many would happily pay for. The answer is that we + are determined to carry out our mission: to free the world from + junk communications.</p> + + <h3><a name="windows"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Does it run on Windows? On a Mac? + On the AOL browser?</h3> + + <p>For the latest information on availability, see the + Distribution Information page. We don't think it will ever run + on Windows 3.1. But you don't need to have it running on your + computer if you get your ISP or Systems Administrator at work + to run it.</p> + + <h3><a name="isp"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> How can I get my ISP to run the + Internet Junkbuster?</h3> + + <p>Try their sales or support department (depending on whether + you are already a customer). <a name="unaware"></a>You might + send them email including the following URL:<br> + <code> + http://www.junkbusters.com/ht/en/ijbfaq.html#isps</code><br> + <a name="switch"></a>You could mention that many other ISPs + provide it, and that you regard it as an important part of your + decision on where to buy Internet service.</p> + + <h3><a name="who"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Who chooses the options that + control what is blocked?</h3> + + <p>Whoever starts the Internet Junkbuster chooses the options + and the blockfile. If your ISP runs it for you, they have to + make these decision (though some may give you a choice of + proxies, and a way to suggest new URLs to block). If you run it + on your computer, you get to choose.</p> + + <h3><a name="self"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> How do I download and run the + program on my computer?</h3> + + <p>It depends on your platform. If you are using Windows 95 or + NT, see our separate page on installing under Windows. If you + have a C compiler and are using almost any flavor of UNIX ® + you download it, compile it, start it running, and then + configure your browser. Several precompiled packages are also + available through links in our distribution page, which lists + all available platforms.</p> + + <p><a name="port"></a>If you are using a platform for which we + have no current availability, you are welcome to port the code. + If you do this and you would like us to consider publishing + your ported version, please tell us.</p> + + <h3><a name="show"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> How can I tell which blockfile + and options are being used?</h3> + + <p>Just point your browser to + http://internet.junkbuster.com/cgi-bin/show-proxy-args or to + any URL ending in <code>show-proxy-args</code> (even if it + doesn't exist). It needn't exist because the Internet + Junkbuster intercepts the request, blocks it, and returns in + its place information about itself. Using the URL above is + useful for checking that your browser really is going through + an Internet Junkbuster, because the <code>junkbuster.com</code> + server returns a warning if the request actually gets to it. + Some people set the home page of their browser to such a URL to + be sure that it is configured to use the proxy.</p> + + <p><a name="headers"></a>If you wish to check the header + information your proxy is actually sending, a visit to + http://internet.junkbuster.com/cgi-bin/show_http_headers will + give you the more relevant ones first. You might also like to + turn the proxy off and compare the difference. (Don't forget to + turn it back on again.)</p> + + <h3><a name="responding"></a><img border="0" src="fb.gif" alt= + "*" width="14" height="14"> My browser started giving me + ``server not responding'' messages</h3> + + <p>Once your browser is told to use a proxy such as the + Internet Junkbuster, it thinks of it as its server for + everything, so this message means it can't talk to the proxy. + The Internet Junkbuster may not be running, or you may have + specified its proxy address incorrectly. Check that the details + you entered are correct. If you have <code>telnet</code> you + can try connecting to the appropriate port to see if the + Internet Junkbuster is running. If your ISP is running the + Internet Junkbuster, you may want to check with them. If you + are running it yourself under UNIX ®, try looking at a + <code>ps ax</code> to see if it is running. The <a href= + "ijbman.html#o_h">port</a> specified in its options should be + the same one as your browser has configured.</p> + + <h3><a name="idea"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> I've got this great idea for a + new feature. Who do I tell?</h3> + + <p>We'd be very interested to hear it, but please bear a few + things in mind.</p> + + <ol type="1"> + <li><a name="considered"></a>Please check this FAQ to see if + we've already considered the idea, such as automatic + detection of banner ads and replacing ads with something else + such as a transparent GIF.</li> + + <li><a name="confidential"></a>Don't tell us anything you + want to keep confidential or retain some right over.</li> + + <li><a name="wish"></a>We currently have a long wish list of + things that we may or may not do in the near future, + including a version for your favorite computer and a plug-in + version.</li> + + <li><a name="go4it"></a>If you don't want to wait you're + welcome to improve on our code, publish your version on the + Web, and tell us where to find it. Projects that are + especially welcome include a port to the Mac and extensions + for HTTP 1.1. (Meanwhile, be sure your browser is configured + not to use HTTP 1.1.)</li> + </ol> + + <h3><a name="other"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> My question isn't listed here. + Who do I ask for support?</h3> + + <p><a name="harder"></a>If you find using our free product + harder than you're used to for consumer software, there are + many commercial alternatives that you could consider.</p> + + <p><a name="RTM"></a>The answer to detailed technical questions + may be answered in <a href="ijbman.html">manual page</a>, or in + the source code. Also double-check this page for an answer: + using the ``find'' feature on your browser for likely keywords + may help. Our site also has a search feature.</p> + + <p><a name="Use"></a>Many people post requests for help and + responses on Usenet.</p> + + <p><a name="them"></a>If your ISP is providing the Internet + Junkbuster for you, and your question is about how to use it, + check their web page before asking them.</p> + + <p><a name="us"></a>Even though we don't offer the kind of + support you might expect if you paid a lot of money for a + software product, you can still ask us. But before you do, + please consider whether you could ask someone closer to you. + And please be patient if we're slow to reply: we never charge + consumers for our services, so we have to subsidize consumers + with revenue from companies, and our resources are limited.</p> + + <p><a name="quote"></a>If your company or organization would be + interested in a maintenance contract with phone and email + support, hard copy documentation and source code and + pre-compiled binaries on tape or disk, please ask us for a + quote.</p> + + <p align="center"><a href="#top_of_page"><img border="0" src= + "top.gif" alt="--- Back to Top of Page ---" width="250" height= + "15"></a></p> + + <h2><a name="browser"></a>Configuring your browser to talk to + the Internet Junkbuster</h2> + + <h3><a name="address"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> What is the proxy address of the + Internet Junkbuster?</h3> + + <p><a name="localhost"></a>If you set up the Internet + Junkbuster to run on the computer you browse from (rather than + your ISP's server or some networked computer at work), the + proxy will be on <code>localhost</code> (which is the special + name used by every computer on the Internet to refer to itself) + and the port will be <code>8000</code> (unless you have told + the Internet Junkbuster to run on a different port with the <a + href="ijbman.html#listen-address">listen-address</a> option). + So you when configuring your browser's proxy settings you + typically enter the word <code>localhost</code> in the two + boxes next to <b class="eg">HTTP</b> and <b class="eg"> + Secure</b>, and the number <code>8000</code> in the two boxes + labeled to the right of those boxes. <a name="Gopher"></a>The + Internet Junkbuster does not currently handle other protocols + such as Gopher, FTP, or WAIS, so leave those setting unchanged. + Nor does it handle ICQ or Instant Messenger services.</p> + + <p><a name="remote"></a>If your ISP or company is running the + Internet Junkbuster for you, they will tell you the address to + use. It will be the name of the computer it's running on (or + possibly its numeric IP address), plus a port number. Port 8000 + is the default, so assume this number if it is not specified. + Sometimes a colon is used to glue them together, as in <code> + junkbuster.fictitious-pro-privacy-isp.net:8000</code> but with + most browsers you do not type the colon, you enter the address + and port number in separate boxes.</p> + + <h3><a name="set"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> How do I tell the browser where + to find the Internet Junkbuster?</h3> + + <p>All current browsers can be told the address of a proxy to + use. You enter the same information in two fields in your + browser's proxy configuration screen (see list below): one for + HTTP, and one for the Secure Protocol (assuming your browser + supports SSL). If you find some information already entered for + your proxy, see the next question. Here are the menus you go + through to get to the proxy configuration settings. (We also + recommend that you disable Java, which is a separate + operation.) <strong>Make notes on the changes you make so you + know how to undo them!</strong> You will need to know what you + did in case you wish to discontinue using the proxy.</p> + + <ol type="1"> + <li><a name="netscape"></a>For Netscape 2.01, 2.02 and 3.0 + [Graphic Illustration]: <b class="eg">Options</b>; <b class= + "eg">Network Preferences</b>; <b class="eg">Proxies</b>; <b + class="eg">Manual Proxy Configuration View ;</b> enter proxy + address details under <b class="eg">HTTP</b> and <b class= + "eg">Security Proxy</b>; click on <b class="eg">OK</b>; click + on the next <b class="eg">OK</b>. [Return to Windows + Installation Procedure]<br> + With Netscape 2.0, follow with <b class="eg">Options</b>, <b + class="eg">Save Options</b>.<br> + <a name="Netscape4.02"></a>With Netscape 4.X series, you + first have to go through <b class="eg">Edit/Preferences</b>. + [Graphic Illustration] Then in the frame on the left, click + on triangle pointing to the right towards the word <b class= + "eg">Advanced</b>; it will switch to a triangle pointing + down; and the words <b class="eg">Cache</b>, <b class="eg"> + Proxies</b> and <b class="eg">Disk Space</b> appear. Click on + <b class="eg">Proxies</b> and the frame on the right will + display a banner saying <b class="eg">Proxies Configure + proxies to access the Internet</b>. Click the radio button + labeled <b class="eg">Manual proxy configuration</b> then + click the button labeled <b class="eg">View</b>; enter proxy + address details under <b class="eg">HTTP</b> and <b class= + "eg">Security Proxy</b>; click on <b class="eg">OK</b>; click + on the next <b class="eg">OK</b>. [Return to Windows + Installation Procedure]</li> + + <li><a name="explorer3"></a>For Internet Explorer 3.0 + [Graphic Illustration]: <b class="eg">View</b>; <b class= + "eg">Options</b>; <b class="eg">Connections</b>; tick <b + class="eg">Connect through proxy server</b> box; <b class= + "eg">Settings</b>; enter proxy address details <b class="eg"> + HTTP</b> Box, with port number in the second box; same with + <b class="eg">Secure</b>; click on <b class="eg">OK</b>. + [Return to Windows Installation Procedure]</li> + + <li><a name="explorer2"></a>For Internet Explorer 2.0: <b + class="eg">View</b>; <b class="eg">Options</b>; <b class= + "eg">Proxy</b>; enter proxy address details click on <b + class="eg">OK</b>. [Return to Windows Installation + Procedure]</li> + + <li><a name="nt"></a>On NT for MS-IE: <b class="eg">Control + Panel</b>; <b class="eg">Internet</b>; <b class="eg"> + Advanced</b>; <b class="eg">Proxy</b>.</li> + + <li><a name="if"></a>For MS-IE 4.0: similar to 3.0: <b class= + "eg">View</b>; <b class="eg">Internet Options</b>; <b class= + "eg">Connection</b>; tick <b class="eg">Access Internet using + a proxy server</b> box; from there we have had reports of + different versions, either click on <b class="eg"> + Advanced</b> or <b class="eg">Settings</b>; enter proxy + address details <b class="eg">HTTP</b> Box, with port number + in the second box; same with <b class="eg">Secure</b>; click + on <b class="eg">OK</b>. Note that 4.0 has <b class="eg"> + Advanced</b> settings to allow HTTP 1.1 through proxies; + these must be disabled because the proxy does not currently + understand HTTP 1.1. Please tell us if you see any other + differences. [Return to Windows Installation Procedure]</li> + + <li><a name="IE5"></a>For MS-IE 5.0: similar to 4.0: <b + class="eg">Tools|Internet Options</b> from the menu bar; <b + class="eg">Connections</b>. Select either dial-up connection + or LAN (depending on how you connect to the Internet); press + <b class="eg">Settings</b>; and check the <b class="eg">Use + Proxy Server</b> box; enter proxy address details in the <b + class="eg">HTTP</b> Box, with port number in the second box; + same with <b class="eg">Secure</b>; click on <b class="eg"> + OK</b> buttons to get out. <em>Note:</em> <a name= + "defaulted"></a>You must also uncheck the HTTP 1.1 checkboxes + at the end of the <b class="eg">Advanced</b> options. This + seems to have been made the default in IE 5.0. [Return to + Windows Installation Procedure]</li> + + <li><a name="level5"></a>For Netscape's level 5 browser, we + have no information. If you do, please tell us.</li> + + <li><a name="mosaic"></a>For NCSA Mosaic for Windows: <b + class="eg">Options</b>, <b class="eg">Preferences</b>, <b + class="eg">Proxy</b>; enter proxy address details under <b + class="eg">HTTP</b>.</li> + + <li><a name="Opera"></a>For Opera: <b class="eg"> + Preferences</b>, <b class="eg">Proxy servers</b>; check the + box next to HTTP; enter the server and port number in the box + on the other side; click on <b class="eg">OK</b>.</li> + + <li><a name="lynx"></a>For Lynx, Mosaic/X, <a href= + "http://monty.cnri.reston.va.us/grail-0.3/">Grail,</a> and + W3O Arena, you can specify the proxy via environment + variables before starting the application. This will probably + be done with something like either<br> + <code>setenv http_proxy + http://localhost:8000/</code><br> + or<br> + <code> + http_proxy=http://junkbuster.fictitious-pro-privacy-isp.net:8000/ + export http_proxy</code><br> + depending on your shell and where the Internet Junkbuster + lives.</li> + </ol> + + <p>If your browser is not listed here, or if you notice an + error, please tell us the correct procedure.</p> + + <h3><a name="already"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> What should I do if I find + another proxy is already configured?</h3> + + <p>Some ISPs and companies require all Web traffic to go + through their proxy. In this case you would find your proxy + configuration with values already set, possibly under <a name= + "Automatic"></a>Automatic Proxy Configuration (in the case of + Netscape and MS-IE 3.0 and above). It's probably a firewall + proxy between your company and the outside world, <a name= + "cache"></a>or a caching proxy if you're using an ISP.</p> + + <p><a name="f"></a>What needs to be done in this case is to use + the <a href="ijbman.html#forwardfile">forwardfile</a> option to + tell the Internet Junkbuster the address of the other proxy. + Specify a different (unused) port number with the <a href= + "ijbman.html#listen-address">listen-address</a> option, and + configure your browser to use that port. If you haven't done + this kind of thing before, it's probably best to consult your + systems administrator or ISP about it; check their web page + first.</p> + + <h3><a name="discontinue"></a><img border="0" src="fb.gif" alt= + "*" width="14" height="14"> What if I want to stop using + the Internet Junkbuster?</h3> + + <p>Just go through the same procedure you used to start your + browser using the Internet Junkbuster, but remove the details + you put in (or if there was something there before, restore + it). You may need to use <b class="eg">Save Options</b> to make + this change permanent. On Netscape 3.0 you can go through <b + class="eg">Options</b>; <b class="eg">Network Preferences</b>; + <b class="eg">Proxies</b> and click on <b class="eg">No + Proxy</b> to turn it off, and later click on <b class="eg"> + Manual Proxy Configuration</b> if you want to start using it + again. (No need to enter the again details under <b class="eg"> + View</b> as you did the first time; they should remain there + unchanged.)</p> + + <p><a name="shut"></a>This stops your browser talking to the + proxy; shutting down the proxy is a different matter.</p> + + <h3><a name="dial"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Automatic dialing isn't working + any more. How do I fix it?</h3> + + <p>Some browsers (such as MSIE-4) can be configured to dial + your ISP automatically when you click on a link, but this + feature (called "automatically connect" or "autoconnect") gets + disabled if you specify a proxy running on your own computer + (with address <code>localhost</code> or <code>127.0.0.1</code>) + because these addresses don't require dialing. The Internet + Junkbuster knows nothing about dialing, so it doesn't work. To + make automatic dialing work, make up a name such as <code> + junkbuster.ijb</code> and use that name in the proxy settings + instead of <code>localhost</code>, and then add the line <code> + 127.0.0.1 junkbuster.ijb</code> to the file <code> + c:\windows\hosts</code> (if there already is a line beginning + with <code>127.0.0.1</code> just add <code> + junkbuster.ijb</code> at the end of it.)</p> + + <p><a name="also"></a>This should also work Netscape + Communicator 4 on machines where IE-4 has been installed.</p> + + <p align="center"><a href="#top_of_page"><img border="0" src= + "top.gif" alt="--- Back to Top of Page ---" width="250" height= + "15"></a></p> + + <h2><a name="local"></a>Setting up the Internet Junkbuster on + your local computer</h2> + + <p>The next two sections assume you wish to compile the code + with your own C compiler. <a name="install"></a>If you just + want to use the <code>.exe</code> file provided for Windows, + see the Windows Installation page.</p> + + <h3><a name="u"></a><img border="0" src="fb.gif" alt="*" width= + "14" height="14"> How do I compile the code under + Unix?</h3> + + <p>If you are running Redhat Linux you may prefer to use the + rpm instead of the following procedure.</p> + + <ol type="1"> + <li><a name="download"></a>First download the tar file + (~286k) <a name="tar"></a>and uncompress and extract the + files from it with this command<br> + <code>uncompress -c ijb20.tar.Z | tar xf + -</code></li> + + <li><a name="sun"></a>If your operating system is from Sun or + HP examine the <code>Makefile</code> and make any changes + indicated inside.</li> + + <li><a name="make"></a>Run<br> + <br> + <code>make</code></li> + + <li> + <a name="defaults"></a>Copy the sample configuration file + (<code>junkbstr.ini</code>, previously called <code> + sconfig.txt</code> and other names in earlier releases) to + some convenient place such as <code> + /usr/local/lib/junkbuster/configfile</code> or whatever you + choose. The sample file has all the options commented out. + You can remove the <code>#</code> character on any that you + want, but it may be better to leave this until to later. + Run it asynchronously:<br> + <br> + <code>junkbuster configfile &</code> + + + <p>If you are running a version earlier than 2.0 you can + start it with <code>junkbuster &</code></p> + </li> + + <li><a name="config"></a>Configure your browser (described + above).</li> + + <li><a name="test"></a>Verify that the Internet Junkbuster is + working (described above).</li> + + <li><a name="restart"></a>Decide on the options you really + want, <code>kill</code> the process and start it again. The + most popular option is <a href="ijbman.html#blockfile"> + blockfile</a> to block ads. <a name="comprehensive"></a>A + sample blockfile is provided as an illustration, but it + doesn't really stop many ads. More comprehensive ones are + available elsewhere.</li> + + <li><a name="rc"></a>You'll probably want to add an entry to + <code>/etc/rc.d/rc.local</code> or equivalent to start it at + boot time. (Any output you specify should be redirected to a + file. And don't forget the & at the end to run it + asynchronously or your system will seize up after the next + reboot.)</li> + </ol> + + <h3><a name="win"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> How do I compile the code under + Windows?</h3> + + <p>A <code>.exe</code> file (binary) is supplied with the + source code, but if you prefer to compile it yourself here is + the likely procedure. Most of these steps are repeated in our + checklist for installation under Windows.</p> + + <ol type="1"> + <li><a name="zip"></a>First click here to download the zip + file called <code>ijb20.zip</code> (~208k), then uncompress + and unpack the zip archive using a tool like WinZip.</li> + + <li><a name="change"></a>Now the distribution (source and + sample files) will be in a folder called <code>ijb20</code>. + Go into that folder and then edit the Makefile for your + system, removing the comment character (<code>#</code>) in + the lines related to Win32. Then type:<br> + <code>nmake</code><br> + This should create an executable called <code> + junkbstr.exe</code>. <a name="compilers"></a>For information + on issues with various compilers, see the Distribution + Information page.</li> + + <li> + <a name="attempt"></a>Run the executable with the + command:<br> + <code>junkbstr</code><br> + <a name="terminal"></a>(Click on the icon with that name + that looks like a terminal, not like a notepad.) The + program will produce a message indicating that it has + started and is ready to serve. + + <p><a name="ini"></a>(Version 2.0.1 and above uses the file + <code>junkbstr.ini</code> as the config file if it exists + and no argument was given. If you have an earlier version + or if you want it to use a different config file, simply + specify that file as the argument.)</p> + </li> + + <li><a name="configures"></a>Configure your browser + (described above).</li> + + <li><a name="work"></a>Check the proxy is working (described + below).</li> + + <li> + <a name="shortcut"></a>To have the proxy start itself + automatically when you login to Win95, drop the + ``shortcut'' to the <code>junkbstr</code> executable into + the StartUp folder:<br> + <code>C:\Windows\Start + Menu\Programs\StartUp</code><br> + You might want to change the shortcut's <code> + Properties->Shortcut</code> to <code>Run: + Minimized</code>. If you specify the <a href= + "ijbman.html#hide-console">hide-console</a> option then the + DOS window will vanish after it starts. + + <p><a name="NT"></a>WinNT users can put it into their own + StartUp folders or the Administrator can put it into the + system's global StartUp folder. For details on how to make + this a service under NT see our Windows page.</p> + </li> + </ol> + + <h3><a name="check"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> How do I check that the proxy is + working?</h3> + + <p>Pick a page from somewhere (such as your bookmarks, or just + one that your browser was pointing to) and <b class="eg"> + Reload</b> it. If you get a message along the lines of ``server + not responding, using cached copy instead,'' see the advice + above. If the page reloads OK, check that your browser is + actually talking to the proxy by going to + http://internet.junkbuster.com/cgi-bin/show-proxy-args or any + URL ending in <code>show-proxy-args</code> (as described below, + the proxy should intercept the request.) When you see + ``Internet Junkbuster Proxy Status,'' you'll know it's + working.</p> + + <h3><a name="chain"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> How and why would I have this + proxy chained with other proxies?</h3> + + <p>You may need the <a href="ijbman.html#forwardfile"> + forwarding</a> feature to ``daisy chain'' the Internet + Junkbuster to another proxy, perhaps an anonymizing proxy to + conceal your IP address, or a caching proxy from your ISP, or a + firewall proxy between your company and the outside world. + Version 2.0 and above can be even configured to forward <a + href="ijbman.html#forwardfile">selectively</a> according to the + URL requested: for example, connecting directly to trusted + hosts, but going through an anonymizing or firewall proxy for + all other hosts.</p> + + <p><a name="administrator"></a>Network administrators might use + it to provide transparent access to multiple networks without + modifying browser configurations. <a name="direct"></a>Most + browsers also provide a way of specifying hosts that the + browser connects to directly, bypassing the proxy. Some provide + a method for Automatic Proxy Configuration. A well written + Internet Junkbuster configuration can be much more flexible and + powerful.</p> + + <p><a name="example"></a>An ISP's caching proxy would typically + be called something like <code>cache.your-isp.net:8080</code> + (as described on you ISP's web page); you would put this + information in your <a href="ijbman.html#forwardfile"> + forwardfile</a> as described in our manual. Your browser would + be configured to the Internet Junkbuster for HTTP and Security + Proxies as before, but you probably want to tell it to use the + caching proxy for FTP and other protocols. <a name="nonlocal"> + </a>If your ISP is running the Internet Junkbuster for you, + they have probably already decided whether to chain with a + caching proxy.</p> + + <h3><a name="socks"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> How does the Internet Junkbuster + work with SOCKS gateways?</h3> + + <p>There is support for some gateways in Version 1.4 and above. + The gateway protocol used to be specified on the command line; + it is now specified in the same file as <a href= + "ijbman.html#forwardfile">forwarding.</a> Note that the + browser's proxy configuration must <em>not</em> specify a + <code>SOCKS</code> host; it should specify the proxy as + described above.</p> + + <h3><a name="plain"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> How do I configure it to be just + a plain old proxy?</h3> + + <p>To get the proxy to do as little as possible (which means + not deleting any sensitive headers), place in your + configuration file the following three lines (each ending in a + space then a period) to stop it changing sensitive headers:<br> + <code>referer .</code><br> + <code>from .</code><br> + <code>user-agent .</code><br> + <code>cookiefile mycookiefile</code><br> + The fourth line is also needed to specify a <a href= + "ijbman.html#o_c">cookiefile</a> that might be called <code> + mycookiefile</code> containing a single line with a <code> + *</code> character, to allow all cookies through.</p> + + <h3><a name="shutdown"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> How do I shut down the proxy (to + restart it)?</h3> + + <p>It depends on your platform.</p> + + <ol type="1"> + <li><a name="X"></a>Under Windows, you can click on the "X" + button at the top right of the DOS window (and answer <b + class="eg">Yes</b> when Windows warns you it cannot shut down + the program automatically), or use <b class="eg"> + Ctrl-Break</b> or the old three-fingered salute of <b class= + "eg">Ctrl-Alt-Delete</b> and select <b class="eg">End + Task</b>.</li> + + <li><a name="ps"></a>Under UNIX ® you'll need to <code> + kill</code> the <b><code>junkbuster</code></b> process. <a + name="pid"></a>If you don't know the process number to give + to <code>kill</code>, try this:<br> + <code>ps ax | grep junkbuster</code></li> + </ol> + + <p align="center"><a href="#top_of_page"><img border="0" src= + "top.gif" alt="--- Back to Top of Page ---" width="250" height= + "15"></a></p> + + <h2><a name="companies"></a> Information for companies</h2> + + <h3><a name="think"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> What do advertising companies + think of this kind of technology?</h3> + + <p>We've seen only a few public comments from the advertising + industry on this, other than SEC filings. First, the president + of the Internet Advertising Bureau told CNET that he wasn't + worried by banner blockers. Second, after the Federal Trade + Commission's workshop where we gave a live demonstration of our + proxy before many eminent representatives of the industry, the + Direct Marketing Association made the following statement in + the closing paragraphs of their summary comments to the + Commission.</p> + + <blockquote> + Clever shareware developers have come up with products that + can obliterate cookies and advertisements for those consumers + who have these concerns. The Internet is a market that is so + democratic and flexible that it is easy for companies and + software developers to respond to a perceived market need. + </blockquote> + + <p>Their attitude seems to be that they would prefer that + people use technical solutions to protect their privacy than + have protections imposed by legislation or government + regulations. So, do you perceive a market need? Then here are + some ways to flex your democratic muscles.</p> + + <h3><a name="nobrainer"></a><img border="0" src="fb.gif" alt= + "*" width="14" height="14"> Should we provide the + Internet Junkbuster for our employees?</h3> + + <p>That depends. Try this quick three-point test.</p> + + <ol type="1"> + <li><a name="waste"></a>Do you want to spend your + communications budget on bandwidth that wastes your + employees' time by forcing them to wait for a lot of annoying + distractions while they're trying to do their jobs?</li> + + <li><a name="surveillance"></a>Do you want current and + potential vendors to know quantitative details about the + software and hardware platforms that you have?</li> + + <li><a name="intelligence"></a>Do you want your competitors + to be able to track exactly which of your employees are + checking out their web sites?</li> + </ol> + + <p>If the answer to all three questions is yes, then you + probably don't have any need for this kind of product.</p> + + <h3><a name="commercial"></a><img border="0" src="fb.gif" alt= + "*" width="14" height="14"> Can our company get + commercial support for the software?</h3> + + <p>Yes, ask us for a quote on a maintenance contract with your + choice of phone and email support, hard copy documentation, + source code and pre-compiled binaries on tape or disk, and + email alerting of upgrades and issues. We also offer consulting + services to help set up ``stealth browsing'' capabilities to + help reduce the footprints left while doing competitive + analysis and other Web work where confidentiality is + critical.</p> + + <h3><a name="isps"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> I run an ISP. What issues should + I consider before offering it?</h3> + + <p>Many ISPs who offer the proxy to their customers have told + us that most of their customers are delighted with it (although + one reported that a customer complaint that without banner ads, + surfing was like reading a novel: we recommend making it + optional). Many ISPs like it because it reduces bandwidth + requirements. To help get you started, here's a checklist we've + developed from working with a few ISPs. You may think of more, + and we'd be interested if you're willing to share them with + us.</p> + + <ol type="1"> + <li><a name="pending"></a>If you get more than one request + for the Internet Junkbuster you may want to tell your + customers on your News page that you already know about it + and are assessing it.</li> + + <li><a name="try"></a>Try the software and verify that it + performs satisfactorily.</li> + + <li><a name="value"></a>Determine whether your customers + perceive the service as valuable (and therefore worth the + time to set up). We've had reports of many delighted + customers.</li> + + <li><a name="secure"></a>Assess the level of security + associated with the software. If access is to be restricted + (to just dial-in ports, for example) how is this to be + done?</li> + + <li><a name="costs"></a>Consider whether to expect any + additional load on computing resources required, and any + change in use of bandwidth due to the blocking of large + GIFs.</li> + + <li><a name="opt"></a>Choose the <a href="ijbman.html"> + options</a> you wish to provide.</li> + + <li> + <a name="multiple"></a>Decide whether you want to offer a + choice of configurations, such some of these four. + + <ol type="A"> + <li><a name="banner"></a>Banners Blocked, Wafer with + No-Cookie-Copyright notice</li> + + <li><a name="low"></a>Cookies not stopped (<a href= + "ijbman.html#cookiefile">cookiefile</a> with just a + <code>*</code> in it), User Agent specified as Lynx</li> + + <li><a name="oneway"></a>Cookies from browser allowed, + permitting registered services</li> + + <li><a name="kid"></a>A proxy for kids.</li> + </ol> + <a name="caching"></a>If you run a caching proxy, decide + whether the Internet Junkbuster will chain with it by + default, and whether to offer an alternate with no caching. + (Some ISPs don't, because they want to give customers an + incentive to use caching and save bandwidth.) + </li> + + <li><a name="naming"></a>Decide on a naming scheme for your + proxies. If you're running only one proxy on one machine, the + simplest way is to just use port 8000 on your main machine, + such as <code>our-isp.net.</code> But it would probably be + safer to put an entry in your name server and call it + something like <code>junkbuster.our-isp.net.</code> If + running several proxies, you could either use different ports + on the same machine, or if you have the opportunity to + distribute the load over a few machines you could use + different hostname aliases such as <code> + banner.junkbuster.our-isp.net</code>, <code> + lynx.junkbuster.our-isp.net</code> and <code> + oneway.junkbuster.our-isp.net</code> (corresponding to the + examples in the previous point). You may want to set up + Automatic Proxy Configuration.</li> + + <li> + <a name="document"></a>Prepare a page explaining the + Internet Junkbuster to your customers. <a name="does"></a> + Here's are some examples from Australia, Germany, Florida, + New York/New Jersey/Pennsylvania, North Carolina, Texas, + and Utah. <a name="reuse"></a>You are welcome to copy and + modify material from Junkbusters according to the GPL. You + might want to set up a process to check this page + periodically and update it when it changes. (A few links + can probably serve as well as lot of copying however.) A + typical page would probably specify the following. + + <ol type="1"> + <li><a name="abstract"></a>A brief explanation stating + what the Internet Junkbuster does, with a link to this + page.</li> + + <li><a name="addresses"></a>The addresses of the proxy or + proxies, with their port number(s).</li> + + <li><a name="options"></a>The options used, and how to + view the contents of the blockfile (which you can place + on your web pages, preferably in a file called <code> + blocklist.html</code> or <code> + blocklist.txt</code>).</li> + + <li><a name="additions"></a>An indication of whether + suggestions for the blocklist are considered, and if so, + how to submit them: to a particular email address, via + web-based form, etc.</li> + + <li><a name="configuration"></a>Instructions on how to + configure a browser. You may want to include details for + only the two major browsers and leave the others to a + link.</li> + + <li><a name="service"></a>Procedures on how to report + problems, give feedback etc.</li> + </ol> + </li> + + <li><a name="beta"></a>Invite a small number of + technologically sophisticated customers to beta-test the + service.</li> + + <li><a name="announce"></a>Announce general availability on + your ``News'' page. Tell us if you would like to be included + on a list of ISPs offering the Internet Junkbuster.</li> + </ol> + + <p align="center"><a href="#top_of_page"><img border="0" src= + "top.gif" alt="--- Back to Top of Page ---" width="250" height= + "15"></a></p> + + <h2><a name="blocking"></a> Blocking</h2> + + <h3><a name="readymade"></a><img border="0" src="fb.gif" alt= + "*" width="14" height="14"> Where can I get an example + blockfile that stops most ads?</h3> + + <p>The sample blockfile we provide blocks almost nothing, and + we do not publish blockfiles that stop almost all banner ads. + But others have; you can find them by asking Google. You can + add any part of the new file to your old one (probably called + <code>sblock.ini</code> if you haven't changed the default name + in the latest version) or your just replace it completely. You + probably don't need to restart the proxy.</p> + + <p><a name="pub"></a>If you develop an interesting blocklist + and publish it on the Web, you might want to include the word + ``junkbuster'' in it and use the word ``blocklist'' in the file + name given in the URL so that others can find it with the query + given in the previous sentence.</p> + + <h3><a name="zap"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> If I see an ad I wish I hadn't, + how do I stop it?</h3> + + <p>If your ISP is running the Internet Junkbuster, they should + have a policy on whether they accept suggestions from their + customers on what to block. Consult their web page.</p> + + <p><a name="cover"></a>If you are running the Internet + Junkbuster yourself, you have complete control over what gets + through. Just add a pattern to cover the offending URL to your + blockfile. Version 1.3 and later automatically rereads the + blockfile when it changes, but if you're running an earlier + version you'll have to stop it and restart it.</p> + + <p><a name="target"></a>To choose a pattern you'll first need + to find the URL of the ad you want cover.</p> + + <p><a name="pinpoint"></a>Some people use the <a href= + "ijbman.html#debug">debug</a> <code>1</code> option to display + each URL in a window as the request is sent to the server. It's + then usually an easy task to pick the offending URL from the + list of recent candidates.</p> + + <p><a name="source"></a>Alternatively, you can use <b class= + "eg">View Document Info</b> (or <b class="eg">View Document + Source</b> if your browser doesn't have that). The <b class= + "eg">Info</b> feature has the advantage of showing you the full + URL including the host name, which may not be specified in the + source: there you might see something like <code> + SRC="/ads/click_here_or_die.gif"</code> indicating only the <i> + <dfn>path</dfn></i>. (The host name is assumed to be the same + as the one the page came from.)</p> + + <p><a name="offsite"></a>But ads often come from a different + site, in which case you might see something like <code> + SRC="grabem.n.trackem.com/Ad/Infinitum/SpaceID=1666"</code> or + longer. <a name="warehouse"></a>If the company looks like a + pure ad warehouse (as in the last case), you may want to place + just its domain name in the blockfile, which blocks all URLs + from that site.</p> + + <p><a name="wanted"></a>If the ad comes from a server that you + really want some content from, you can include enough of the + path to avoid zapping stuff you might want. In the first + example above, <code>/ads/</code> would seem to be enough. If + you don't include the domain name, the pattern applies to all + sites, so you don't want such patterns to be too general: for + example <code>/ad</code> would block <code> + /admin/salaries/</code> on your company's internal site.</p> + + <p><a name="image"></a>To speed the blocking of images, some + UNIX ® users create a shell script called <code> + Image:</code> containing a line such as <code>echo $1 | sed + s/http:..// >> $HOME/lib/blockfile</code> that adds its + argument to the user's blockfile. Once an offending image has + been be found using <b class="eg">View Document Info</b> it's + easy to cut-and-paste the line (or part of it) into a shell + window. The same script can be linked to a file called <code> + Frame:</code> to dealing with framed documents, and <code> + junkbuster:</code> to accept the output of the <a href= + "ijbman.html#debug">debug</a> option.</p> + + <p><a name="partial"></a>When compiled without the <i><dfn> + regular expressions</dfn></i> option, the Internet Junkbuster + uses only very simple (and fast) matching methods. The pattern + <code>/banners</code> will not stop <code> + /images/banners/huge.gif</code> getting through: you would have + to include the pattern <code>/images/banners</code> or + something that matches in full from the left. <a name="regex"> + </a>So you can get what you want here, the matcher understands + POSIX regular expressions: you can use <code> + /*.*/banners</code> to block and any URL containing <code> + /banners</code> (even in the middle of the path). <a name= + "posix"></a>(In Versions 1.1 through 1.4 they were an option at + compile time; from Version 2.0 they have become the default.) + Regular expressions give you many more features than this, but + if you're not already familiar with them you probably won't + need to know anything beyond the <code>/*.*/</code> idiom. If + you do, a <code>man egrep</code> is probably a good starting + point).</p> + + <p><a name="slash"></a>Don't forget the <code>/</code> (slash) + at the beginning of the path. If you leave it out the line will + be interpreted as a domain name, so <code>ad</code> would block + all sites from Andorra (since <code>.ad</code> is the + two-letter country code for that principality).</p> + + <p><a name="detail"></a>For a detailed technical description of + how pattern matching is done, see the <a href= + "ijbman.html#o_b">manual.</a></p> + + <h3><a name="despite"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> How come this ad is still getting + through anyway?</h3> + + <p>If the ad had been displayed before you included its URL in + the blockfile, it will probably be held in cache for some time, + so it will be displayed without the need for any request to the + server. Using the <a href="ijbman.html#debug">debug</a> <code> + 1</code> option to show each URL as it is fetched is a good way + to see exactly what is happening.</p> + + <p><a name="otherwise"></a>If new items seem to be getting + through, check that you are really running the proxy with the + right blockfile in the options. Check the blockfile for + exceptions.</p> + + <p><a name="java"></a>Some sites may have different ways of + inserting ads, such as via Java. If you have ideas on how to + block new kinds of junk not currently covered, please tell + us.</p> + + <h3><a name="exceptions"></a><img border="0" src="fb.gif" alt= + "*" width="14" height="14"> How do I stop it blocking a + URL that I actually want?</h3> + + <p>You can change the patterns so they don't cover it, or use a + simple feature in Version 1.1 and later: a line beginning with + a <code>~</code> character means that a URL blocked by previous + patterns that matches the rest of the line is let through. For + example, the pattern <code>/ad</code> would block <code> + /addasite.html</code> but not if followed by <code> + ~/addasite</code> in the blockfile. Or suppose you want to see + everything that comes from a site you like, even if it looks + like an ad: simply put <code>~aSiteYouLike.com</code> at the + <em>end</em> of the blockfile. (Order is important, because the + last matching line wins.)</p> + + <p><a name="agreed"></a>As well as unblocking pages that were + unintentionally blocked, this feature is useful for unblocking + ads from a specific source. This might be because you are + interested in those particular ones, or if you have an explicit + agreement to accept certain ads, such as those from a free + web-based email provider.</p> + + <p><a name="blocked"></a>If you want to find out exactly which + pattern in the blockfile a given URL matched, just click on the + words ``Internet Junkbuster'' which are displayed alone on a + page when your browser requests a blocked URL. The proxy + displays a message that pinpoints the pattern for you.</p> + + <h3><a name="children"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Can I block sites I don't want my + children to see?</h3> + + <p>Yes, but remember that <a name="savvy"></a>children who are + technically sophisticated enough to use the browsers' proxy + configuration options could of course bypass any proxy. This + kind of technology can be used as a gentle barrier to remind or + guide the child, but nobody should expect it to replace the + parent's role in setting and enforcing standards of online + behavior for their children.</p> + + <p><a name="recommend"></a>Some ISPs are starting to provide + specialized proxies to protect children. There are two basic + approaches: the ``black list'' and the ``white list'' approach. + <a name="negative"></a>The black list approach allows the child + to go anywhere not explicitly prohibited; the white list + permits visits only to sites explicitly designated as + acceptable.</p> + + <p><a name="positive"></a>It's very easy for anyone to compile + a white list from a page of ``recommended kids sites'' and to + configure an Internet Junkbuster to allow access to those sites + only. (If you publish such a list on the web, please tell us + its URL). Assuming your version isn't an old one without regex, + you can place a <code>*</code> (asterisk) as the first line of + the blockfile (which blocks everything), and then list + exceptions after that. Be careful to make the exception + sufficiently broad: for example, using <code> + ~www.uexpress.com/ups/comics/ch/</code> as the exception for + <cite>Calvin and Hobbes</cite> would block some of the graphic + elements on the page; you would probably want a wider exception + such as <code>~www.uexpress.com/ups/</code> to permit them.</p> + + <p><a name="trust"></a>Version 2.0 has an experimental feature + to permit only sites mentioned in a nominated <a href= + "ijbman.html#trustfile">trusted site.</a> This allows + organizations to build lists of sites for kids to browse, and + the software automatically restricts access to those on the + list.</p> + + <p><a name="scan"></a>Many filtering products actually scan for + keywords in the text of pages they retrieve before presenting + it, but the Internet Junkbuster does not do this. Building a + perfectly reliable black list system is hard, because it's very + difficult to state in advance exactly what is obscene or + unsuitable. For more info see our links page.</p> + + <h3><a name="message"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> What do I see when a page or + graphic is blocked by the proxy?</h3> + + <p>You usually see a broken image icon, but it depends on + several factors beyond the proxy's control. If asked for a URL + matching its blockfile, the proxy returns an HTML page + containing a message identifying itself (currently the two + words ``Internet Junkbuster'') with a status 202 (Accepted) + instead of the usual 200 (OK). (Versions 1.X returned an error + 404: Forbidden, which caused strange behavior in some cases.) + Status 202 is described in the HTTP RFC as indicating that the + request has been accepted but not completed, and that it might + complete successfully in the future (in our case, if the + blockfile were changed).</p> + + <p><a name="depends"></a>The broken image icon is most common + because the browser is usually expecting a graphic. But if it + was expecting text, or if the page happens to be using certain + HTML extensions such as <code>layer</code> and your browser is + a late model from Microsoft, you may see the words ``Internet + Junkbuster'' displayed as a hot link.</p> + + <p><a name="click"></a>Clicking on the link takes you to an + explanation of the pattern in the blockfile that caused the + block, so that you can edit the blockfile and go back and + reload if you really want to see what was blocked. The + explanatory link is generated by the proxy and is automatically + intercepted based on its ending in <code>ij-blocked-url</code>; + even though the site is specified as <code> + http://internet.junkbuster.com</code> no request should + actually made to that site. If one is, it means that the proxy + was been removed after it generated the link.</p> + + <p><a name="layer"></a>To summarize: the identifying link to + the blocking explanation is usually turned into a broken image + icon, but it may be displayed on a page alone, or they may may + be restricted to the particular frame, layer or graphic area + specified in the page containing them. The proxy has no way of + knowing the context in which a URL will be used and cannot + control how the blocking message will be rendered.</p> + + <h3><a name="broken"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Why not replace blocked banners + with something invisible?</h3> + + <p><a name="infringe"></a>Many users have suggested to us that + blocked banners should be replaced by a something like a 1x1 + transparent GIF to make the page would look as if there was + nothing ever there. Apart from making it harder to catch + unintended blocking, this might also displease the owners of + the page, who could argue that such a change constitutes a + copyright infringement. We think that merely failing to allow + an included graphic to be accessed would probably not be + considered an infringement: after all this is what happens when + a browser is configured not to load images automatically. + However, we are not lawyers, so anyone in doubt should take + appropriate advice.</p> + + <p><a name="done"></a>In a context where the copyright issue is + resolved satisfactorily, a proxy could simply return a status + 301 or 302 and specify a replacement URL in a <code> + Location</code> and/or <code>URI</code> header. An alternative + would be to use inline code to return a 1 x 1 clear GIF. We do + not publish sample code for this, and we have no way of + stopping others who have.</p> + + <h3><a name="size"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Why not block banners based on + the dimensions of the image?</h3> + + <p>Many users have pointed out that most banner ads come in + standard sizes, so why not block all GIFs of those sizes? This + would theoretically be without fetching the object because the + dimensions are usually given in the <code>IMG</code> tag, but + it would require substantial changes in the code, and we doubt + whether it would be much more effective than a good block + list.</p> + + <h3><a name="embedded"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> What about non-graphic + advertising within the pages I want?</h3> + + <p>The Internet Junkbuster deliberately does not provide a way + of automatically editing the contents of a page, to remove + textual advertising or to repair the holes left by blocked + banners. Other packages such as WebFilter do.</p> + + <p><a name="base"></a>For the same reason, it has no way of + stopping a new browser window being created, because this is + done through the <code>target</code> attribute in the <code> + <a></code> and <code><base></code> elements, not + through headers. Nor do we plan to add a feature to paralyze + animated GIFs.</p> + + <h3><a name="push"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Does it block ads on the + broadcasting ``push'' systems? How about pop-up ads?</h3> + + <p>We haven't tried it but we expect it would probably work on + image ads on push channels. See also adchoice.</p> + + <p><a name="pop"></a>Disabling Javascript stops some pop-up + ads. One problem is that some advertisers throw open a new + browser window to frame the ad. The ad is easily blocked, but + the empty window remains. You can kill it easily, but this is a + chore. We don't see how to stop them other than editing the + HTML from the parent window, which we don't like to do.</p> + + <p><a name="TBTD"></a>The TBTF newsletter warned subscribers to + push information that <a name="LOGTARGET"></a>in IE4, LOGTARGET + allows servers to determine the URLs viewed at their site even + if accessed from cache or through a proxy. If you use this + browser see our instructions on how to disable this.</p> + + <p><a name="pushy"></a>If you find you have experience using + the proxy with push, or have any other advice about it, please + tell us.</p> + + <p align="center"><a href="#top_of_page"><img border="0" src= + "top.gif" alt="--- Back to Top of Page ---" width="250" height= + "15"></a></p> + + <h2><a name="cookies"></a> Cookies</h2> + + <p>For background information on cookies see our page + describing their dangers.</p> + + <h3><a name="breakthrough"></a><img border="0" src="fb.gif" + alt="*" width="14" height="14"> Might some cookies still + get through? How can I stop them?</h3> + + <p>Yes, you should expect the occasional cookie to make it + through to your browser. We know of at least three ways this + can happen; please tell us if you find any others. One way is + in secure documents, which are explained below.</p> + + <p><a name="EQUIV"></a>A few sites set cookies using a line + such as <code><META HTTP-EQUIV="Set-Cookie" + CONTENT="flavor=chocolate"></code> in the <code>HEAD</code> + section of an HTML document. <a name="javascript"></a>Cookies + can also be + <!-- IEM: http://cgi.netscape.com/eng/mozilla/Gold/handbook/javascript/ref_a-c.html#cookie_property --> + set and read in JavaScript. To see if this is happening in a + document, view its source, look in the <code>head</code> for a + section tagged <code>script language="JavaScript"</code>. If it + contains a reference to <code>document.cookie</code>, the page + can manipulate your cookie file without sending any cookie + headers. The Internet Junkbuster does not tamper with these + methods. Fortunately they are rarely used at the moment. If a + cookie gets set, it should be stopped by the proxy on its way + back to the server when a page is requested, but it can still + be read in Javascript.</p> + + <p><a name="alert"></a>To prevent cookies breaking through, + <strong>always</strong> keep cookie alerts turned on in your + browser, and disable Java and Javascript. Making the files hard + to write may also help.</p> + + <h3><a name="method"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Exactly how do cookies get + created and stored anyway?</h3> + + <p>When a web site's server sends you a page it also sends + certain ``header information'' which your browser records but + does not display. One of these is a <code>Set-Cookie</code> + header, which specifies the cookie information that the server + wants your browser to record. Similarly, when your browser + requests a page it also sends headers, specifying information + such as the graphics formats it understands. If a cookie has + previously been set by a site that matches the URL it is about + to request, your browser adds a <code>Cookie</code> header + quoting the previous information.</p> + + <p><a name="privacy"></a>For more background information on how + cookies can damage your privacy, see our page on cookies. For + highly detailed technical information see the RFC. The Internet + Junkbuster will show you all headers you use the <a href= + "ijbman.html#debug">debug</a> <code>8</code> option, or you can + get a sample from our demonstration page.</p> + + <h3><a name="break"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> If cookies can't get through, + will some things stop working for me?</h3> + + <p>Possibly. Some personalized services including certain + <!-- IEM: http://my.yahoo.com --> chat rooms require cookies. + <a name="registration"></a>Newspapers that require + <!-- IEM: http://www.nytimes.com/subscribe/sub-bin/new_sub.cgi#agree --> + registration or + <!-- IEM: http://interactive5.wsj.com/regUser.html --> + subscription will not automatically recognize you if you don't + send them the cookie they assigned you. And there are a very + small number of sites that do strange things with cookies; they + don't work for anyone that blocks cookies by any means. Some + sites such as Microsoft explain that their content is so + wonderfully compelling that they will withhold it from you + unless you submit to their inserting cookies.</p> + + <p><a name="hotmail"></a>Many free Web-based email services + require cookies. Hotmail also seems to require allowing both + <code>msn.com</code> and <code>passport.com</code> to set + cookies.</p> + + <p><a name="want"></a>If you want such sites to be given your + cookies, you can use the <a href="ijbman.html#cookiefile"> + cookiefile</a> option provided you are running Version 1.2 or + later yourself. Simply include the domain name of those sites + in the <i>cookiefile</i> specified by this option. If it still + doesn't work, the problem may be in other headers.</p> + + <p><a name="one"></a>It's possible to let cookies out but not + in, which is enough to keep some sites happy, but not all of + them: one newspaper site seems to go into an endless frenzy if + deprived of fresh cookies. A cookiefile containing a single + line consisting of the two characters <code>>*</code> + (greater-than and star) permits server-bound cookies only. The + <code>*</code> is a <a href="ijbman.html#wildcard">wildcard</a> + that matches all domains.</p> + + <p><a name="else"></a>If someone else is running the Internet + Junkbuster for you and has a version that + <!-- IAM: ijbfaq.html#registration --> passes server-bound + cookies through, you can try editing your browser's cookie file + to contain just the ones you want, and restart your browser. <a + name="window"></a>To subscribe to a new service like this after + you have started using the Internet Junkbuster, you can try the + following: tell your browser to stop using the Internet + Junkbuster, fill out and submit your subscription details + (allowing that web site to set a cookie), then reconfigure your + browser to use the Internet Junkbuster again (and stop more + cookies being sent). This also requires the <a href= + "ijbman.html#cookiefile">cookiefile</a> option, and its success + depends on the Web site not wanting to change your cookies at + every session. For this reason it does not work at some major + newspaper sites, for example. <a name="buyers"></a>But you may + prefer to look at whether other sites provide the same or + better services without demanding the opportunity to track your + behavior. The web is a buyer's market where most prices are + zero: very few people pay for content with money, so why should + you pay with your privacy?</p> + + <h3><a name="crumble"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Can I control cookies on a + per-site basis?</h3> + + <p><a name="discard"></a>Yes, since version 1.2 the Internet + Junkbuster has included advanced cookie management facilities. + Unless you specify otherwise, cookies are discarded + (``crumbled'') by the Internet Junkbuster whether they came + from the server or the browser. In Version 1.2 and later you + can use the <a href="ijbman.html#cookiefile">cookiefile</a> + option to specify when cookies are to be passed through intact. + It uses the same syntax and <a href="ijbman.html#o_b"> + matching</a> algorithm as the blockfile.</p> + + <p><a name="cook"></a>If the URL matches a pattern in the <i> + <dfn>cookiefile</dfn></i> then cookies are let through in both + the browser's request for the URL and in the server's response. + <a name="directional"></a>One-way permissions can be specified + by starting the line with the <code>></code> or <code> + <</code> character. For example, a cookiefile consisting of + the four lines<br> + <code>org</code><br> + <code>>send-user-cookies.org</code><br> + <code> + <accept-server-cookies.org</code><br> + <code>~block-all-cookies.org</code><br> + allows cookies to and from <code>.org</code> domains only, + with the following exceptions:<br> + </p> + + <ol type="1"> + <li><a name="fed"></a>Cookies sent from servers in the domain + <code>send-user-cookies.org</code> are blocked on their way + to the client, but cookies sent by the browser to that domain + are still be fed to them.</li> + + <li><a name="take"></a>The cookies of <code> + accept-server-cookies.org</code> check in to the proxy and + are passed through to the browser, but when they come back to + the proxy they never check out.</li> + + <li><a name="deny"></a>All cookies to and from <code> + block-all-cookies.org</code> are blocked.</li> + </ol> + + <p><a name="paths"></a>If the <b><code>junkbuster</code></b> + was compiled with the regular expressions option they may be + used in paths. Any logging to a ``cookie jar'' is separate and + not affected.</p> + + <p><a name="breadth"></a>It's important to give hosts you want + to be able to set cookies sufficient breadth. For example, + instead of <code>www.yahoo.com</code> use <code> + yahoo.com</code> because the company uses many different hosts + ending in that domain.</p> + + <h3><a name="wafers"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Can I make up my own fake cookies + (wafers) to feed to servers?</h3> + + <p>Yes, using the <a href="ijbman.html#wafer">wafer</a> option. + We coined the term <i><dfn>wafer</dfn></i> to describe cookies + chosen by a user, not the Web server. Servers may not find + wafers as tasty as the cookies they make themselves. But users + may enjoy controlling servers' diets for various reasons, such + as the following.</p> + + <ol type="1"> + <li><a name="retaliate"></a>Users who consider cookies to be + an unwelcome intrusion and a waste of their disk space can + respond in kind. By writing ``signature wafers'' they can + express their feelings about cookies, in a place that the + people in charge of them are most likely to notice.</li> + + <li> + <a name="notice"></a>Sites running a proxy that logs + cookies to a file (such as the Internet Junkbuster does + with the <a href="ijbman.html#jarfile">jarfile</a> option + on) may want to notify servers that their cookies are being + intercepted, deleted or copied. One possible reason for + doing this is the uncertain copyright status of cookie + strings. Nothing here should be taken as legal advice: we + are simply raising a question for any interested parties to + consider, and make no representation that such measures are + necessary or sufficient. Concerned proxy sites might decide + to send a wafer (named ``NOTICE'' for example) containing + text along the lines of the following. + + <blockquote> + <p><a name="licenses_on_cookies_refused"></a>TO WHOM IT + MAY CONCERN<i><br> + <br> + Do not send me any copyrighted information other than + the document that I am requesting or any of its necessary + components.<br> + <br> + In particular do not send me any cookies that are + subject to a claim of copyright by anybody. Take notice + that I refuse to be bound by any license condition + (copyright or otherwise) applying to any cookie.</i></p> + </blockquote> + Any company that tries to argue in court that the proxy + site was breaching their copyright in the cookies would be + met with the defense that the proxy site gave that company + the opportunity to protect its copyright by simply not + sending cookies after receiving the notice. + + <p><a name="pointer"></a>Cookies can be as long as four + thousand characters, so there's plenty of space for + lawyerly verbosity, but white space, commas, and + semi-colons are <a href="ijbman.html#o_w">prohibited.</a> + Spaces can be turned into underscores. Alternatively, a URL + could be sent as the cookie value, pointing to a document + containing a notice, perhaps with a suggestive value such + as<br> + <code> + http://www.junkbusters.com/ht/en/ijbfaq.html#licenses_on_cookies_refused</code><br> + + But including the notice directly would probably be + preferable because the addressee does not have to look it + up.</p> + + <p><a name="vanilla"></a>The Internet Junkbuster 2.0.2 + currently sends a full notice as a ``vanilla wafer'' if + cookies are being logged to a cookie jar and no other + wafers have been specified. It can be suppressed with the + <a href="ijbman.html#suppress-vanilla-wafer"> + suppress-vanilla-wafer</a> option, which might be used in + situations where there is an established understanding + between the proxy and all who serve it.</p> + </li> + </ol> + + <p><a name="gimme"></a>Junkbusters provides a CGI script that + lets you see your wafers as they appear to servers.</p> + + <p><a name="malfunction"></a>Wafers confuse a few fragile + servers. Hotmail appears to be one of them. If this troubles + you, don't use this option.</p> + + <p><a name="regardless"></a>Any wafers specified are sent to + all sites regardless of the cookiefile. <a name="compliant"> + </a> They are appended after any genuine cookies, to maintain + compliance with RFC 2109 in the event that a path was specified + for a cookie. The RFC's provisions regarding the <code>$</code> + character (such as the <code>Version</code> attribute) are + transparent to the proxy; it simply quotes what was recited by + the browser.</p> + + <p><a name="personalize"></a>If you want to send wafers only to + specific sites, you could try putting them your browser's + cookie file in a format conforming to the Netscape + specification, and then specify in the proxy's cookiefile that + cookies are to be sent to but not accepted from those sites, so + they can't overwrite the file. This may work with Netscape but + not all other browsers.</p> + + <h3><a name="jar"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Why would anyone want to save + their cookies in a ``cookie jar?''</h3> + + <p>We provided this capability just in case anyone wants it. + There are a few possible reasons.</p> + + <ol type="1"> + <li><a name="pay"></a>It's conceivable that marketing + companies might one day buy history files and cookie jars + from consumers in the same way that they currently pay them + to fill out survey forms. With this information they could + gather psychographic information, see which competitors' + sites the consumer has visited, and discover what advertising + is being targeted at them.</li> + + <li><a name="choose"></a>Some consumers might employ + semi-automated means of sorting through their cookie jars, + selecting which ones to place in their cookies file for use + by their browsers. Their decisions could be based on payments + offered, privacy rating systems such as TRUSTe proposes, or + their own opinion of the company. It could be done manually + or with software. There's an Internet Draft on trust + certification of cookies.</li> + + <li><a name="share"></a>Users may even start ``sharing'' + cookies among themselves, sending back cookies that servers + generated for other visitors. Servers that aren't expecting + this possibility will be misled about their visitors' + identities. Cookies could be shared among users on a single + machine, or across continents via FTP and anonymous + remailers. <a name="disinformation"></a>Privacy activists may + promote cookie disinformation campaigns as a way to defend + the public against abuse. If a significant percentage of + people send disinformative cookies, user tracking via cookies + may become less reliable and less used.</li> + </ol> + + <p align="center"><a href="#top_of_page"><img border="0" src= + "top.gif" alt="--- Back to Top of Page ---" width="250" height= + "15"></a></p> + + <h2><a name="anonymity"></a> Anonymity</h2> + + <p>For details on how your identity can be revealed while you + surf, see our page on privacy. Once you start using the + Internet Junkbuster you should find that much of the + information previously indicated on that page will no longer be + provided. If the <code>REMOTE HOST</code> indicating your IP + address is too close for comfort, see our suggestions below on + how to conceal your IP address. We also recommend that you + disable JavaScript and Java.</p> + + <h3><a name="disclose"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> If I use the Internet Junkbuster, + will my anonymity be guaranteed?</h3> + + <p>No. Your chances of remaining anonymous are improved, but + unless you are an expert on Internet security it would be + safest to assume that everything you do on the Web can be + attributed to you personally.</p> + + <p><a name="happen"></a>The Internet Junkbuster removes various + information about you, but it's still possible that web sites + can find out who you are. Here's one way this can happen.</p> + + <p><a name="ftp"></a>A few browsers disclose the user's email + address in certain situations, such as when transferring a file + by FTP. The Internet Junkbuster 2.0.2 does not filter the FTP + stream. If you need this feature, or are concerned about the + mail handler of your browser disclosing your email address, you + might consider products such as NSClean.</p> + + <p><a name="binaries"></a>Browsers downloaded as binaries could + use non-standard headers to give out any information they can + have access to: see the manufacturer's license agreement. It's + impossible to anticipate and prevent every breach of privacy + that might occur. The professionally paranoid prefer browsers + available as source code, because anticipating their behavior + is easier.</p> + + <h3><a name="should"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Why should I trust my ISP or + Junkbusters with my browsing data?</h3> + + <p>You shouldn't have to trust us, and you certainly don't have + to. We do not run the proxy as a service, where we could + observe your online behavior. We provide source code so that + everyone can see that the proxy isn't doing anything + sneaky.</p> + + <p><a name="awful"></a>You are already trusting your ISP not to + look at an awful lot of information on what you do. They + probably post a privacy policy on their site to reassure you. + If they run a proxy for you, using it could actually make it + slightly easier for them to monitor you, but we doubt that any + sane ISP would try this, because if it were discovered + customers would desert them.</p> + + <h3><a name="logging"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Can the proxy be used for logging + who looks at what?</h3> + + <p>We don't want institutions to use this software as an + instrument of surveillance. We have deliberately not provided + options to add timestamps or records of which IP addresses + accessed which URLs. However, because we publish source code + anyone can modify it to do such things, and there is no way a + remote user can find out if this is happening. Again, you need + to be able to trust the entity providing your proxy service, + but you were probably in that position even before using a + proxy.</p> + + <h3><a name="header"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> What private information from + server-bound headers is removed?</h3> + + <p>The Internet Junkbuster pounces on the following HTTP + headers in requests to servers, unless instructed otherwise in + the options.</p> + + <ol type="1"> + <li><a name="from"></a>The <code>FROM</code> header, which a + few browsers use to tell your email address to servers, is + dropped unless the <a href="ijbman.html#from">from</a> option + is set.</li> + + <li><a name="agent"></a>The <code>USER_AGENT</code> <a name= + "infer"></a>header is changed to indicate that the browser is + currently Mozilla (Netscape) 3.01 Gold with an unremarkable + Macintosh configuration. Misidentification helps resist + certain attacks. If your browser and hardware happen to be + accurately identified, you might want to change the default. + (Earlier versions of the Internet Junkbuster indicated + different details; by altering them periodically we aim to + hinder anyone trying to infer whether our proxy is present.) + <a name="lying"></a>If you don't like the idea of incorrectly + identifying your computer as a Mac, set it accordingly. + <!-- Aside: or read Kundera's Unbearable Lightness of Being, 5:5, ``It is a tragicomic fact..'' (p187?) --></li> + + <li><a name="referer"></a>The <code>REFERER</code> header + (which indicates where the URL currently being requested was + found) is dropped. A single static referer to replace all + real referers may be specified using the <a href= + "ijbman.html#referer">referer</a> option. Where no referer is + provided by the browser, none is added; the <a href= + "ijbman.html#add-header">add-header</a> option with arguments + such as <code>-x 'Referer: http://me.me.me'</code> can be + used to send a bogus referer with every request.</li> + </ol> + + <p>In Version 1.4 and later you can use the <a href= + "ijbman.html#o_r">-r @</a> option to selectively disclose + <code>REFERER</code> and <code>USER_AGENT</code> to only those + sites you nominate.</p> + + <p><a name="UA"></a>Some browsers send Referer and User-Agent + information under different non-standard headers. The Internet + Junkbuster 2.0.2 stops <code>UA</code> headers, but others may + get through. This information is also available via JavaScript, + so disable it. <a name="indexers"></a>Some search engines + encode the query you typed in the URL that goes to advertisers + to target a banner ad at you, so you will need to block the ad + as well as the referer header, unless you want them (and anyone + they might buy data from) to know everything you ever search + for.</p> + + <p><a name="JavaScript"></a>If you have JavaScript enabled (the + default on most browsers) servers can use it to obtain Referer + and User Agent, as well as your plug-ins. We recommend + disabling JavaScript and Java.</p> + + <p><a name="response"></a>Currently no HTTP response headers + (browser bound) are removed, not even the <code> + Forwarded:</code> or <code>X-Forwarded-For:</code> headers. Nor + are any added, <a href="ijbman.html#o_y">unless requested.</a> + We are considering a more flexible header management system for + a future version.</p> + + <h3><a name="breakage"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Might some things break because + header information is changed?</h3> + + <p>Possibly. If used with a browser less advanced than Netscape + 3.0 or IE-3, indicating an advanced browser may encourage pages + containing extensions that confuse your browser. If this + becomes a problem upgrade your browser or use the <a href= + "ijbman.html#user-agent">user-agent</a> option to indicate an + older browser. In Version 1.4 and later you can selectively + reveal your real browser to only those sites you nominate.</p> + + <p><a name="Russian"></a>Because different browsers use + different encodings of Russian and Czech characters, certain + web servers convert pages on-the-fly according to the User + Agent header. Giving a User Agent with the wrong operating + system or browser manufacturer causes some sites in these + languages to be garbled; Surfers to Eastern European sites + should <a href="ijbman.html#o_r">change it</a> to something + closer.</p> + + <p><a name="counters"></a>Some page access counters work by + looking at the referer; they may fail or break when + deprived.</p> + + <p><a name="wired"></a>Some sites depend on getting a referer + header, such as <code>uclick.com</code>, which serves comic + strips for many newspaper sites, including <cite> + Doonsbury</cite> for the <cite>Washington Post.</cite> (If you + click on that last link, you can then get to a page containing + the strip via the same URL we've linked to under <cite> + Doonsbury</cite>, but if you click on the <cite> + Doonsbury</cite> link directly, it gives you an error message + suggesting that you use a browser that supports referers.) In + Version 1.4 and later you can use the <a href= + "ijbman.html#o_r">-r @</a> option and place a line like <code> + >uclick.com</code> in your cookiefile. Wired News used to + use referer to decide whether to add a navigation column to the + page, but they have changed that.</p> + + <p><a name="Intellicast"></a>The weather maps of Intellicast + have been blocked by their server when no referer or cookie is + provided. You can use the same countermeasure with a line such + as <code>>208.194.150.32</code> (or simply get your weather + information elsewhere).</p> + + <p><a name="decide"></a>Some software vendors, including + Download.com and Intuit use <code>USER_AGENT</code> to decide + which versions of their products to display to you. With the + default you get Mac versions.</p> + + <p><a name="resort"></a>As a last resort if a site you need + doesn't seem to be working, the proxy configuration of many + browsers allow you to specify <b class="eg">No Proxy For</b> + any hostname you want.</p> + + <p><a name="What"></a>We had reports that on some versions of + Netscape the What's New feature did not work with the proxy, + but we think we fixed this in Version 2.0.1.</p> + + <h3><a name="misidentify"></a><img border="0" src="fb.gif" alt= + "*" width="14" height="14"> How is misidentifying my + browser good for security and privacy?</h3> + + <p>Almost every major release of both leading browsers has + contained bugs that allow malicious servers to compromise your + privacy and security. Known bugs are quickly fixed, but + millions of copies of the affected software remain out there, + and yours is probably one of them. The header that normally + identifies your browser tells such servers exactly which + attacks to use against you. By misidentifying your browser you + reduce the likelihood that they will be able to mount a + successful attack.</p> + + <h3><a name="conceal"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Does the Internet Junkbuster + conceal my IP address?</h3> + + <p>Web sites get the IP address of any proxy or browser they + serve pages to. If you run the proxy on your own computer the + IP address disclosed is the same as your browser would, unless + you use the <a href="ijbman.html#forwardfile">forwardfile</a> + option is used to chain to another proxy, in which case servers + only get the last IP address in the chain. Chaining slightly + slows browsing of course, but it improves anonymity.</p> + + <h3><a name="ident"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Does the Internet Junkbuster + thwart identification by identd?</h3> + + <p>We think so, provided you are not the user running the + proxy. If your computer (or your ISP's) is running the <code> + identd</code> demon, servers can ask it for the identity of the + user making the request at time you request a page from them. + But if you're going through a proxy, they will identify the + user name associated with the proxy, not you. A visit to + http://ident.junkbusters.com lets you see what's happening. + This test is (quite rightly) blocked by many firewalls; just + interrupt the transfer if you get an abnormal wait after + clicking. Running other applications may also expose you via + <code>identd</code>; the proxy of course doesn't help then.</p> + + <h3><a name="detect"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Can web sites tell that I'm using + the Internet Junkbuster?</h3> + + <p>With the default options the proxy doesn't announce itself. + Obvious indications such as Keep-Alive headers are <a href= + "ijbman.html#o_x">deleted,</a> but sites might notice that you + can cancel cookies faster than any human could possibly click + on a mouse. (If you want to provide a plausible explanation for + this, change the User Agent header to a cookie-free or + cookie-crunching browser).</p> + + <p><a name="figure"></a>But when certain options are used they + could figure out something's going on, even if they're not + pushing cookies. If you use blocking they can tell from their + logs that the graphics in their pages are not being requested + selectively. The <a href="ijbman.html#add-forwarded-header"> + add-forwarded-header</a> option explicitly announces to the + server that a proxy is present, and sending them wafers is of + course a dead giveaway.</p> + + <p align="center"><a href="#top_of_page"><img border="0" src= + "top.gif" alt="--- Back to Top of Page ---" width="250" height= + "15"></a></p> + + <h2><a name="security"></a> Security</h2> + + <h3><a name="encrypt"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> What happens with Secure + Documents (SSL, https:)?</h3> + + <p>If you enter a ``Secure Document Area,'' cookies and other + header information such as User Agent and Referer are sent + encrypted, so they cannot be filtered. We recommend getting + your browser to alert you when this happens. (On Netscape: <b + class="eg">Options</b>; <b class="eg">Security</b>; <b class= + "eg">General</b>; <b class="eg">Show an alert before entering a + secure document space</b>.) We also recommend adding the line + <code>:443</code> to the blockfile to stop all but sites + specified in an exception after that line from using SSL.</p> + + <p><a name="passage"></a>It may be possible to filter encrypted + cookies by combining the blocking proxy with a cryptographic + proxy along the lines of SafePassage, but we have not tried + this.</p> + + <h3><a name="ssl"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Will using this as my Security + Proxy compromise security?</h3> + + <p>We're not security experts, but we don't think so. The whole + point of SSL is that the contents of messages are + <!-- IEM: http://addy.com/dc/html/what_is_ssl_.html --> + encrypted by the time they leave the browser and the server. + Eavesdroppers (including proxies) can see where your messages + are going whether you are running a proxy or not, but they only + get to see the contents after they have been encrypted.</p> + + <h3><a name="restrict"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Can I restrict use of the proxy + to a set of nominated IP addresses?</h3> + + <p>Yes, we added an <a href="ijbman.html#aclfile">access + control</a> file in Version 2.0. But before you use it please + consider why you want to do it. If the reason is security, it + probably means you need a firewall.</p> + + <p><a name="selective"></a>The <a href= + "ijbman.html#listen-address">listen-address</a> option provides + a way of binding the proxy to a single IP address/port. The + right way to do this is to choose a port inside your firewall, + and deny access to it to those outside the firewall. The + Internet Junkbuster is not a firewall proxy; it should not be + expected to solve security problems.</p> + + <p><a name="firewall"></a>For background information on + firewalls, see Yahoo or a magazine article or these well-known + books: <cite>Firewalls and Internet Security: Repelling the + Wily Hacker</cite> by William R. Cheswick and Steven M. + Bellovin or <cite>Building Internet Firewalls</cite> by D. + Brent Chapman and Elizabeth D. Zwicky. There's + <!-- IEM: http://www.wmd.de/wmd/staff/pauck/misc/fwtk_on_linux.html --> + free Linux software available, and a large number of commercial + products and services. For an excellent security overview, + primer, and compendium reference, see <cite>Practical Unix and + Internet Security</cite> by Simson Garfinkel and Gene + Spafford.</p> + + <h3><a name="others"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Are there any security risks for + ISPs or others who offer the proxy?</h3> + + <p>Yes. As with any service offered over the Internet, hackers + can try to misuse it. A well-run ISP will have professionals + who are experienced at assessing and containing these + risks.</p> + + <p><a name="outside"></a>It's possible to set up your machine + so that other people can have access to your proxy, but if you + lack expertise in computer security you probably shouldn't have + your computer configured to offer this or any other service to + the outside world.</p> + + <p><a name="attack"></a>Hackers can attempt to gain access to + the machine by various attacks, which we have tried to guard + against but don't guarantee to thwart. They can also use the + ``anonymizing'' quality of proxies to try to cover their tracks + while hacking other computers. For this reason we recommend + preventing it being used as an anonymous <code>telnet</code> by + putting the pattern <code>:23</code> in the blockfile (it's + included as standard equipment). (Actually the current + implementation incidentally blocks telnet due to the way + headers are handled, but it's best not to rely on this.) If you + wish to block all ports except the default HTTP port 80, you + can put the lines<br> + <code>:</code><br> + <code>~:80</code><br> + at the beginning of the blockfile, but be aware that some + servers run on non-default ports (e.g. 8080). You might also + want to add the line <code>~:443</code> to allow SSL.</p> + + <p><a name="root"></a>On UNIX ® systems it is neither + necessary nor desirable for the proxy to run as root.</p> + + <p><a name="patched"></a>Versions 2.0.1 and below may be + vulnerable to remote exploitation of a memory buffer bug; for + security reasons all users are encouraged to upgrade.</p> + + <p><a name="holes"></a>If you find any security holes in the + code please tell us, along with any suggestions you may have + for fixing it. However, we do not claim that we will be able to + do so.</p> + + <p><a name="useful"></a>We distribute this code in the hope + that people will find it useful, but we provide no warranty for + it, and we are not responsible for anyone's use or misuse of + it.</p> + + <p><a name="updates"></a>You may also want to check back + periodically for updated versions of the code. We do not + currently maintain a mailing list. To get quick updates, + bookmark our Distribution Information page.</p> + + <p align="center"><a href="#top_of_page"><img border="0" src= + "top.gif" alt="--- Back to Top of Page ---" width="250" height= + "15"></a></p> + + <p class="sans"><a href="http://ijbswa.sourceforge.net/"> + Website</a> <b class="dot">·</b> <a href="ijbman.html"> + Manual</a> <b class="dot">·</b> <b>FAQ</b> <b class= + "dot">·</b> <a href="gpl.html">GPL</a></p> + + <p class="sans"><small><small><a href="gpl.html#text"> + Copyright</a> © 1996-8 <a href= + "http://www.junkbusters.com/">Junkbusters</a> <a href= + "http://www.junkbusters.com/ht/en/legal.html#marks">®</a> + Corporation. <a href="gpl.html#text">Copyright</a> © 2001 + <a href="http://sourceforge.net/projects/ijbswa/">Jon + Foster</a>. Copying and distribution permitted under the <a + href="gpl.html">GNU</a> General Public + License.</small></small></p> + + <p><small><code><a href= + "http://sourceforge.net/projects/ijbswa/"> + http://sourceforge.net/projects/ijbswa/</a></code></small></p> + </body> </html> + diff --git a/doc/ijbman.html b/doc/ijbman.html index 710cddb0..d810c680 100644 --- a/doc/ijbman.html +++ b/doc/ijbman.html @@ -1,920 +1,708 @@ -<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"> +<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> +<!-- $Id$ + + See copyright details at end of file + + After changing this file, please run it through "HTML Tidy" + (from http://www.w3.org/People/Raggett/tidy/) + It should have no warnings or errors. +--> + <html> -<head> -<!-- Copyright 1996-8 Junkbusters Corporation --> -<!-- This work comes with NO WARRANTY --> -<!-- It may be redistributed and modified under the GNU GPL--> -<!-- See the body of http://www.junkbusters.com/ht/en/gpl.html for details--> -<!-- Junkbusters is a registered trade mark of Junkbusters Corporation --> -<!-- Generated 1998/10/31 03:58:25 UTC --> -<meta name="Generator" content="Junkbusters Ebira $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $"> -<!-- Document ID: $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $ --> -<title> -Internet Junkbuster Technical Information -</title> -<base href="http://www.junkbusters.com/ht/en/ijbman.html"> -<meta name="description" content="The manual page for the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser."> -<meta name="keywords" content="stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, spamoff, declare, telemarketing, telemarketers, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, conservation, recycling, catalogs, consumer, sending, opt out "> -<link rel="next" href="cookies.html"> -<link rel="previous" href="ijbfaq.html"> -<link rel="contents" href="toc.html"> -</head> -<body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink="#787878"> -<center> -<h1><a name="top_of_page">Internet J<small>UNK<i><font color=red>BUSTER</font></i></small> Technical Information -</a></h1> -</center> -<font face="arial, helvetica"> -<p align="center"> -<a href="#description">Options</a> -<font color="#ff0000"> -<b> · </b></font><a href="#show">Checking Options</a> -<font color="#ff0000"> -<b> · </b></font><a href="#install">Installation</a> -<font color="#ff0000"> -<b> · </b></font><a href="#copyright">Copyright</a> -<font color="#ff0000"> -<b> · </b></font><a href="ijbfaq.html#top_of_page">(FAQ)</a> -</p> -</font><br> -<center> -<h2><a name="man"><font face="arial, helvetica"> -Manual Page -</font></a> -</h2> -</center> -<br>A copy of this page -in standard -<big><kbd>man</kbd></big> -macro format -is included in the -<a href="ijbfaq.html#tar">tar archive</a>. - -<h3><a name="name" href="/cgi-bin/gp?pg=ijbman&pr=name"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Name -</h3> -<p> -<b><kbd>junkbuster</kbd></b> -- The -Internet Junkbuster -Proxy -<a href="legal.html#marks"><small><sup>TM</sup></small></a> -</p> - -<h3><a name="synopsis" href="/cgi-bin/gp?pg=ijbman&pr=synopsis"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Synopsis -</h3> -<p> -<b><kbd>junkbuster</kbd></b> -<i>configfile</i> -(Version 2.0 onwards) -<br> -<b><kbd>junkbstr.exe</kbd></b> -<i>configfile</i> -(Windows) -<br> -<b><kbd>junkbuster</kbd></b> -<a href="#o_a">[-a]</a> -<a href="#o_y">[-y]</a> -<a href="#o_s">[-s]</a> -<a href="#o_c">[-c]</a> -<a href="#o_v">[-v]</a> -<br> -<a href="#o_u">[-u user_agent]</a> -<a href="#o_r">[-r referer]</a> -<a href="#o_t">[-t from]</a> -<br> -<a href="#o_b">[-b blockfile]</a> -<a href="#o_j">[-j jarfile]</a> -<a href="#o_l">[-l logfile]</a> -<br> -<a href="#o_w">[-w NAME=VALUE]</a> -<a href="#o_x">[-x Header_text]</a> -<br> -<a href="#o_h">[-h [bind_host_address][:bind_port]]</a> -<br> -<a href="#o_f">[-f forward_host[:port]]</a> -<a href="#o_d">[-d N]</a> -<br> -<a href="#o_g">[-g gw_protocol[:[gw_host][:gw_port]]]</a> -<br> -(Version 1.4 and earlier) -</p> - -<h3><a name="description" href="/cgi-bin/gp?pg=ijbman&pr=description"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Description -</h3> -<p> -<b><kbd>junkbuster</kbd></b> -is an instrumentable proxy that filters the -<small>HTTP</small> -stream between -web servers and browsers. -Its main purpose is to enhance privacy. -<p> -<a name="dual">Versions before 2.0 used command-line options;</a> -Versions from 2.0 onward use a configuration file. -The following descriptions of the options first give the older -command-line usage, then the new configfile line. -<p> -<a name="won">In Versions 2.0.1 upwards on Windows,</a> -a start-up message is printed and the configuration is read from the file -<big><kbd>junkbstr.ini</kbd></big> -if it exists and no argument was given. -<p> -<a name="reread">All files except the configfile</a> -are checked for changes before each page is fetched, -so they may edited without restarting the proxy. -<h4>Options -</h4> -<dl><p><dt><i><a name="o_b">-b blockfile</a></i><br><a name="blockfile"><tt>blockfile</tt>  <i>blockfile</i></a><dd> -<a href="ijbfaq.html#blocking">Block</a> -requests to -<small>URL</small>s -matching any pattern given in the lines of the -<i>blockfile</i>. -The -<b><kbd>junkbuster</kbd></b> -instead returns status 202, indicating that the request has been accepted -(though not completed), -and a -<a href="ijbfaq.html#show">message identifying itself</a> -(though the browser may -display only a broken image icon). -(Versions before 2.0 returned an error 403 (Forbidden).) -The syntax of a pattern is -<big><kbd>[domain][:port][/path]</kbd></big> -(the -<big><kbd>http://</kbd></big> -or -<big><kbd>https://</kbd></big> -protocol part is omitted). -To decide if a pattern matches a target, the domains are compared first, -then the paths. -<p> -<a name="compare">To compare the domains,</a> -the pattern domain and the target -domain specified in the -<small>URL</small> -are each broken into their components. -(Components are separated by the -<big><kbd>.</kbd></big> -(period) character.) -Next each of the target components -is compared with the corresponding pattern component: last with last, -next-to-last with next-to-last, and so on. -(This is called -<i><dfn>right-anchored</dfn></i> -matching.) -If all of the pattern components find their match in the target, -then the domains are considered a match. -Case is irrelevant when comparing domain components. -<p> -<a name="substring">A successfully</a> -matching pattern can be an anchored substring of a target, but -not vice versa. -Thus if a pattern doesn't specify a domain, -it matches all domains. -<a name="wildcard">Furthermore, when comparing two components,</a> -the components must either match in their entirety or up to a wildcard -<big><kbd>* </kbd></big> -(star character) in the pattern. The wildcard feature -implements only a "prefix" match capability ("abc*" vs. "abcdefg"), -not suffix matching ("*efg" vs. "abcdefg") or -infix matching ("abc*efg" vs. "abcdefg"). -The feature is restricted to the domain component; -it is unrelated to the optional -regular expression -feature in the path -<a href="ijbman.html#regex">(described below).</a> -<p> -<a name="numeric">If a numeric port</a> -is specified in the pattern domain, then the target port must -match as well. The default port in a target is port 80. -<p> -<a name="onward">If the domain and port match,</a> -then the target -<small>URL</small> -path is checked for -a match against the path in the pattern. -Paths are compared with a simple case-sensitive -left-anchored substring comparison. -Once again, the pattern can be an -anchored substring of the target, but not vice versa. -A path of -<big><kbd>/</kbd></big> -(slash) would match all paths. Wildcards are not considered in -path comparisons. -<p> -<a name="example">For example, the target</a> -<small>URL</small> -<br> -   <big><kbd>the.yellow-brick-road.com/TinMan/has_no_brain</kbd></big> -<br> -would be matched (and blocked) by the following patterns -<br> -   <big><kbd>yellow-brick-road.com</kbd></big> -<br> -and -<br> -   <big><kbd>Yellow*.COM</kbd></big> -<br> -and -<br> -   <big><kbd>/TinM</kbd></big> -<br> -but not -<br> -   <big><kbd>follow.the.yellow-brick-road.com</kbd></big> -<br> -or -<br> -   <big><kbd>/tinman</kbd></big> -<br> -<p> -<a name="comments">Comments in a blockfile start with a</a> -<big><kbd>#</kbd></big> -(hash) character and end at a new line. -Blank lines are also ignored. -<p> -<a name="except">Lines beginning with a</a> -<big><kbd>~</kbd></big> -(tilde) character are taken to be -<a href="ijbfaq.html#exceptions">exceptions:</a> -a -<small>URL</small> -blocked by previous patterns that matches the rest of -the line is let through. (The last match wins.) -<p> -<a name="regex">Patterns</a> -may contain -<small>POSIX</small> -<a href="ijbfaq.html#regex">regular expressions</a> -provided the -<b><kbd>junkbuster</kbd></b> -was compiled with this option -(the default in Version 2.0 on). -The idiom -<big><kbd>/*.*/ad</kbd></big> -can then be used -to match any -<small>URL</small> -containing -<big><kbd>/ad</kbd></big> -(such as -<big><kbd>http://nomatterwhere.com/images/advert/g3487.gif</kbd></big> -for example). -These expressions -<a href="ijbman.html#substring">don't work</a> -in the domain part. -<p> -<a name="rereads">In version 1.3 and later</a> -the blockfile and cookiefile are checked for changes before each request. -<p><dt><i><a name="o_w">-w NAME=VALUE</a></i><br><a name="wafer"><tt>wafer</tt>  <i>NAME=VALUE</i></a><dd> -Specifies a pair to be sent as a cookie with every request -<a href="ijbfaq.html#wafers">to the server.</a> -(Such boring cookies are called -<i>wafers</i>.) -This option may be called more than once to generate multiple wafers. -The original -Netscape specification -prohibited -semi-colons, commas and white space; -these characters will be -<small>URL</small>-encoded -if used in wafers. -<!-- Aside: genuine cookies are not encoded --> -<!-- Aside: we could use quoted string as specified in the new RFC --> -The Path and Domain attributes are not currently supported. -<p><dt><i><a name="o_c">-c cookiefile</a></i><br><a name="cookiefile"><tt>cookiefile</tt>  <i>cookiefile</i></a><dd> -Enforce the cookie management policy specified in the -<i>cookiefile.</i> -<a name="java">If this option is not used all cookies are silently crunched,</a> -so that users who never want cookies aren't bothered by browsers -asking whether each cookie should be accepted. -However, cookies can -<a href="ijbfaq.html#breakthrough">still get through</a> -via -<a href="links.html#javascript">JavaScript</a> -and -<small>SSL</small>, -so alerts should be left on. -<p> -<a name="dropping">In Version 1.2 and later</a> -this option must be followed by a -<a href="ijbfaq.html#crumble">filename</a> -containing instructions on which sites are allowed to -receive and set cookies. -<a name="drop">By default cookies are dropped in both the browser's request</a> -and the server's response, unless the -<small>URL</small> -requested matches an entry in the -<i>cookiefile</i>. -The matching algorithm is the same as for the blockfile. -A leading -<big><kbd>></kbd></big> -character allows -<a href="ijbfaq.html#directional">server-bound</a> -cookies only; -a -<big><kbd><</kbd></big> -allows only browser-bound cookies; -a -<big><kbd>~</kbd></big> -character stops cookies in -<a href="ijbfaq.html#crumble">both directions.</a> -Thus a cookiefile containing a single line with the two characters -<big><kbd>>*</kbd></big> -will pass on all cookies to servers but not give any new ones to the browser. -<p><dt><i><a name="o_j">-j jarfile</a></i><br><a name="jarfile"><tt>jarfile</tt>  <i>jarfile</i></a><dd> -All Set-cookie attempts by the server are -<a href="ijbfaq.html#jar">logged</a> -to -<i>jarfile</i>. -If no wafer is specified, -one containing a -<a href="ijbfaq.html#notice">canned notice</a> -(the -<i>vanilla wafer</i>) -is added as an alert to the server -unless the -<a href="ijbman.html#suppress-vanilla-wafer">suppress-vanilla-wafer</a> -<!-- Aside: (no vanilla~wafer) --> -option is invoked. -<p><dt><i><a name="o_v">-v</a></i><br><a name="suppress-vanilla-wafer"><tt>suppress-vanilla-wafer</tt></a><dd> -Suppress the vanilla wafer. -<p><dt><i><a name="o_t">-t from</a></i><br><a name="from"><tt>from</tt>  <i>from</i></a><dd> -If the browser -<a href="ijbfaq.html#from">discloses an email address</a> -in the -<big><kbd>FROM</kbd></big> -header (most don't), -replace it with -<i>from.</i> -If -<i>from</i> -is set to -<b>.</b> -(the period character) -the -<big><kbd>FROM</kbd></big> -is passed to the server unchanged. -The default is to delete the -<big><kbd>FROM</kbd></big> -header. -<p><dt><i><a name="o_r">-r referer</a></i><br><a name="referer"><tt>referer</tt>  <i>referer</i></a><dd> -Whenever the browser discloses the -<small>URL</small> -that -<a href="ijbfaq.html#referer">led to</a> -the current request, -replace it with -<i>referer.</i> -If -<i>referer</i> -is set to -<b>.</b> -(period) -the -<small>URL</small> -is passed to the server unchanged. -In -Version <a href="ijbdist.html#c4">1.4</a> -and later, if referer is set to -<b>@</b> -(at) the -<small>URL</small> -is sent in cases where the cookiefile -specifies that a cookie would be sent. -(No way to send bogus referers selectively is provided.) -The default is to delete Referer. -<p> -<a name="referrer">Version 2.0 also accepts the spelling</a> -<big><kbd>referrer</kbd></big>, -which most dictionaries consider correct. -<p><dt><i><a name="o_u">-u user-agent</a></i><br><a name="user-agent"><tt>user-agent</tt>  <i>user-agent</i></a><dd> -Information disclosed by the browser -<a href="ijbfaq.html#agent">about itself</a> -is replaced with the value -<i>user-agent.</i> -If -<i>user-agent</i> -is set to -<b>.</b> -(period) -the -<big><kbd>User-Agent</kbd></big> -header is passed to the server unchanged, -along with any -<big><kbd>UA</kbd></big> -headers produced by -<small>MS-IE</small> -(which would otherwise be deleted). -In -Version <a href="ijbdist.html#c4">1.4</a> -and later, if -<i>user-agent</i> -is set to -<b>@</b> -(at) these headers are sent unchanged in cases where the cookiefile -specifies that a cookie would be sent, -otherwise only default -<big><kbd>User-Agent</kbd></big> -header is sent. -That default -is Mozilla/3.0 (Netscape) -with an unremarkable -<a href="ijbfaq.html#infer">Macintosh</a> -configuration. -If used with a browser less advanced than Mozilla/3.0 or IE-3, the default -may encourage pages containing extensions that confuse the browser. -<!-- Aside: Some servers use extensions to everyone anyway. But in that case it's probably ignoring cookies anyway. Some servers attempt to send cookies only to browsers identifying themselves as Mozilla. --> -<p><dt><i><a name="o_h">-h [host][:port]</a></i><br><a name="listen-address"><tt>listen-address</tt>  <i>[host][:port]</i></a><dd> -If -<i>host</i> -is specified, -bind the -<b><kbd>junkbuster</kbd></b> -to that -<small>IP</small> -address. -If a -<i>port</i> -is specified, use it. -The default -port -is 8000; -the default host is -<big><kbd>localhost</kbd></big>. -Before Version 2.0.2, -the default was to bind to all -<small>IP</small> -addresses -(<big><kbd>INADDR_ANY</kbd></big>); -but this has been restricted to -<big><kbd>localhost</kbd></big> -to avoid unintended security breaches. -(To open the proxy to all, use the line -<br> -   <big><kbd>listen-address :8000</kbd></big> -<br> -in the configuration file.) -<p><dt><i><a name="o_f">-f forward_host[:port]</a></i><br><a name="forwardfile"><tt>forwardfile</tt>  <i>forwardfile</i></a><dd> -Version 1.X required all -<small>HTTP</small> -requests from the client to be forwarded to the same destination. -Version 2.0 takes its routing specification from a -<i>forwardfile</i>, -allowing selection of the proxy (a.k.a. forwarding host) and gateway -according to the -<small>URL</small>. -Here is a typical line. -<br> + <head> + <title>Internet Junkbuster Technical Information</title> + <meta name="description" content= + "The manual page for the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser."> + <meta name="keywords" content= + "stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, consumer, sending, opt out "> +<style type="text/css"> +<!-- +h2 { text-align: Center; font-family: arial, helvetica, sans-serif } +p.sans { font-family: arial, helvetica, sans-serif } +b.dot { color: #FF0000 } +b.eg { font-family: arial, helvetica, sans-serif } +--> +</style> + </head> + + <body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink= + "#787878"> + <p class="sans"><a href="http://ijbswa.sourceforge.net/"> + Website</a> <b class="dot">·</b> <b>Manual</b> <b class= + "dot">·</b> <a href="ijbfaq.html">FAQ</a> <b class= + "dot">·</b> <a href="gpl.html">GPL</a></p> + + <h1 align="center"><a name="top_of_page"></a>Internet + J<small>UNK<i style="color: #FF0000">BUSTER</i></small> + Technical Information</h1> + + <p align="center" class="sans"><a href="#description"> + Options</a> <b class="dot">·</b> <a href="#show"> + Checking Options</a> <b class="dot">·</b> <a href= + "#install">Installation</a> <b class="dot">·</b> <a + href="#copyright">Copyright</a> <b class="dot">·</b> <a + href="ijbfaq.html#top_of_page">(FAQ)</a></p> + + <h1>This document is out of date</h1> + + <p><b>Development of JunkBuster is ongoing and this document is + no longer current. However, it may provide some assistance. If + you have problems, please use the <a href= + "http://groups.yahoo.com/group/junkbuster-users/">Yahoo Groups + mailing list</a> (which includes an archive of mail), the + SourceForge.net <a href= + "http://sourceforge.net/projects/ijbswa/">project page</a>, or + see the project's <a href="http://ijbswa.sourceforge.net/">home + page</a>. Please also bear in mind that versions 2.9.x of + JunkBuster are development releases, and are not production + quality.</b></p> + + <h2><a name="man"></a>Manual Page</h2> + + <p>A copy of this page in standard <code>man</code> macro + format is included in the <a href="ijbfaq.html#tar">tar + archive</a>.</p> + + <h3><a name="name"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Name</h3> + + <p><b><code>junkbuster</code></b> - The Internet Junkbuster + Proxy <a href= + "http://www.junkbusters.com/ht/en/legal.html#marks"><small> + <sup>TM</sup></small></a></p> + + <h3><a name="synopsis"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Synopsis</h3> + + <p><code><b>junkbuster</b></code> <i>configfile</i> (Unix)<br> + <b><code>junkbstr.exe</code></b> [<i>configfile</i>] + (Windows)</p> + + <h3><a name="description"></a><img border="0" src="fb.gif" alt= + "*" width="14" height="14"> Description</h3> + + <p><b><code>junkbuster</code></b> is an instrumentable proxy + that filters the HTTP stream between web servers and browsers. + Its main purposes are to block adverts and enhance privacy.</p> + + <p><a name="dual"></a>It is configured using a configuration + file and several files listing URL patterns. The + configuration file must be specified on the command line. + The Windows version will default to using the configuration + file <code>junkbstr.ini</code> if it exists and no argument was + given.</p> + + <p><a name="reread"></a>All files except the main configuration + file are checked for changes before each page is fetched, so + they may edited without restarting the proxy.</p> + + <h4>Options</h4> + + <dl> + <dt><i><a name="o_b"></a></i><a name= + "blockfile"></a><code>blockfile</code> <i> + blockfile</i></dt> + + <dd> + <p><a href="ijbfaq.html#blocking">Block</a> requests to + URLs matching any pattern given in the lines of the <i> + blockfile</i>. The <b><code>junkbuster</code></b> instead + returns status 202, indicating that the request has been + accepted (though not completed), and a <a href= + "ijbfaq.html#show">message identifying itself</a> (though + the browser may display only a broken image icon). + The syntax of a pattern is <code> + [domain][:port][/path]</code> (the <code>http://</code> or + <code>https://</code> protocol part is omitted). To decide + if a pattern matches a target, the domains are compared + first, then the paths.</p> + + <p><a name="compare"></a>To compare the domains, the + pattern domain and the target domain specified in the URL + are each broken into their components. (Components are + separated by the <code>.</code> (period) character.) Next + each of the target components is compared with the + corresponding pattern component: last with last, + next-to-last with next-to-last, and so on. (This is called + <i><dfn>right-anchored</dfn></i> matching.) If all of the + pattern components find their match in the target, then the + domains are considered a match. Case is irrelevant when + comparing domain components.</p> + + <p><a name="substring"></a>A successfully matching pattern + can be an anchored substring of a target, but not vice + versa. Thus if a pattern doesn't specify a domain, it + matches all domains. <a name="wildcard"></a>Furthermore, + when comparing two components, the components must either + match in their entirety or up to a wildcard <code>*</code> + (star character) in the pattern. The wildcard feature + implements only a "prefix" match capability ("abc*" vs. + "abcdefg"), not suffix matching ("*efg" vs. "abcdefg") or + infix matching ("abc*efg" vs. "abcdefg"). The feature is + restricted to the domain component; it is unrelated to the + optional regular expression feature in the path <a href= + "#regex">(described below).</a></p> + + <p><a name="numeric"></a>If a numeric port is specified in + the pattern domain, then the target port must match as + well. The default port in a target is port 80.</p> + + <p><a name="onward"></a>If the domain and port match, then + the target URL path is checked for a match against the path + in the pattern. Paths are compared with a simple + case-sensitive left-anchored substring comparison. Once + again, the pattern can be an anchored substring of the + target, but not vice versa. A path of <code>/</code> + (slash) would match all paths. Wildcards are not considered + in path comparisons.</p> + + <p><a name="example"></a>For example, the target URL<br> + <code> + the.yellow-brick-road.com/TinMan/has_no_brain</code><br> + would be matched (and blocked) by the following + patterns<br> + <code>yellow-brick-road.com</code><br> + and<br> + <code>Yellow*.COM</code><br> + and<br> + <code>/TinM</code><br> + but not<br> + <code> + follow.the.yellow-brick-road.com</code><br> + or<br> + <code>/tinman</code><br> + </p> + + <p><a name="comments"></a>Comments in a blockfile start + with a <code>#</code> (hash) character and end at a new + line. Blank lines are also ignored.</p> + + <p><a name="except"></a>Lines beginning with a <code> + ~</code> (tilde) character are taken to be <a href= + "ijbfaq.html#exceptions">exceptions:</a> a URL blocked by + previous patterns that matches the rest of the line is let + through. (The last match wins.)</p> + + <p><a name="regex"></a>Patterns may contain POSIX <a href= + "ijbfaq.html#regex">regular expressions</a> provided the + <b><code>junkbuster</code></b> was compiled with this + option (the default in Version 2.0 on). The idiom <code> + /*.*/ad</code> can then be used to match any URL containing + <code>/ad</code> (such as <code> + http://nomatterwhere.com/images/advert/g3487.gif</code> for + example). These expressions <a href="#substring">don't + work</a> in the domain part.</p> + + <p><a name="rereads"></a>In version 1.3 and later the + blockfile and cookiefile are checked for changes before + each request.</p> + </dd> + + <dt><i><a name="o_w"></a></i><a name= + "wafer"></a><code>wafer</code> <i> + NAME=VALUE</i></dt> + + <dd> + <p>Specifies a pair to be sent as a cookie with every + request <a href="ijbfaq.html#wafers">to the server.</a> + (Such boring cookies are called <i>wafers</i>.) This option + may be called more than once to generate multiple wafers. + The original Netscape specification prohibited semi-colons, + commas and white space; these characters will be + URL-encoded if used in wafers. + <!-- Aside: genuine cookies are not encoded --> + <!-- Aside: we could use quoted string as specified in the new RFC --> + The Path and Domain attributes are not currently + supported.</p> + </dd> + + <dt><i><a name="o_c"></a></i><a name= + "cookiefile"></a><code>cookiefile</code> <i> + cookiefile</i></dt> + + <dd> + <p>Enforce the cookie management policy specified in the + <i>cookiefile.</i> <a name="java"></a>If this option is not + used all cookies are silently crunched, so that users who + never want cookies aren't bothered by browsers asking + whether each cookie should be accepted. However, cookies + can <a href="ijbfaq.html#breakthrough">still get + through</a> via <a href= + "http://www.junkbusters.com/ht/en/links.html#javascript"> + JavaScript</a> and SSL, so alerts should be left on.</p> + + <p><a name="dropping"></a>In Version 1.2 and later this + option must be followed by a <a href="ijbfaq.html#crumble"> + filename</a> containing instructions on which sites are + allowed to receive and set cookies. <a name="drop"></a>By + default cookies are dropped in both the browser's request + and the server's response, unless the URL requested matches + an entry in the <i>cookiefile</i>. The matching algorithm + is the same as for the blockfile. A leading <code> + ></code> character allows <a href= + "ijbfaq.html#directional">server-bound</a> cookies only; a + <code><</code> allows only browser-bound cookies; a + <code>~</code> character stops cookies in <a href= + "ijbfaq.html#crumble">both directions.</a> Thus a + cookiefile containing a single line with the two characters + <code>>*</code> will pass on all cookies to servers but + not give any new ones to the browser.</p> + </dd> + + <dt><i><a name="o_j"></a></i><a name= + "jarfile"></a><code>jarfile</code> <i> + jarfile</i></dt> + + <dd> + <p>All Set-cookie attempts by the server are <a href= + "ijbfaq.html#jar">logged</a> to <i>jarfile</i>. If no wafer + is specified, one containing a <a href= + "ijbfaq.html#notice">canned notice</a> (the <i>vanilla + wafer</i>) is added as an alert to the server unless the <a + href="#suppress-vanilla-wafer">suppress-vanilla-wafer</a> + option is invoked.</p> + </dd> + + <dt><i><a name="o_v"></a></i><a name= + "suppress-vanilla-wafer"></a><code>suppress-vanilla-wafer</code></dt> + + <dd> + <p>Suppress the vanilla wafer.</p> + </dd> + + <dt><i><a name="o_t"></a></i><a name= + "from"></a><code>from</code> <i>from</i></dt> + + <dd> + <p>If the browser <a href="ijbfaq.html#from">discloses an + email address</a> in the <code>FROM</code> header (most + don't), replace it with <i>from.</i> If <i>from</i> is set + to <b>.</b> (the period character) the <code>FROM</code> is + passed to the server unchanged. The default is to delete + the <code>FROM</code> header.</p> + </dd> + + <dt><i><a name="o_r"></a></i><a name= + "referer"></a><code>referer</code> <i> + referer</i></dt> + + <dd> + <p>Whenever the browser discloses the URL that <a href= + "ijbfaq.html#referer">led to</a> the current request, + replace it with <i>referer.</i> If <i>referer</i> is set to + <b>.</b> (period) the URL is passed to the server + unchanged. If referer is set to <b>@</b> (at) the URL is + sent in cases where the cookiefile specifies that a cookie + would be sent. (No way to send bogus referers selectively + is provided.) The default is to delete Referer.</p> + + <p><a name="referrer"></a>Junkbuster also accepts the + spelling <code>referrer</code>, which most dictionaries + consider correct.</p> + </dd> + + <dt><i><a name="o_u"></a></i><a name= + "user-agent"></a><code>user-agent</code> <i> + user-agent</i></dt> + + <dd> + <p>Information disclosed by the browser <a href= + "ijbfaq.html#agent">about itself</a> is replaced with the + value <i>user-agent.</i> If <i>user-agent</i> is set to <b> + .</b> (period) the <code>User-Agent</code> header is passed + to the server unchanged, along with any <code>UA</code> + headers produced by MS-IE (which would otherwise be + deleted). If <i>user-agent</i> is set to <b>@</b> (at) + these headers are sent unchanged in cases where the + cookiefile specifies that a cookie would be sent, otherwise + only default <code>User-Agent</code> header is sent. That + default is Mozilla/3.0 (Netscape) with an unremarkable <a + href="ijbfaq.html#infer">Macintosh</a> configuration. If + used with a browser less advanced than Mozilla/3.0 or IE-3, + the default may encourage pages containing extensions that + confuse the browser.</p> + </dd> + + <dt><a name="o_h"></a><a name= + "listen-address"></a><code>listen-address</code> + <i>[host][:port]</i></dt> + + <dd> + <p>If <i>host</i> is specified, bind the <b><code> + junkbuster</code></b> to that IP address. If a <i>port</i> + is specified, use it. The default port is 8000; the default + host is <code>localhost</code>.</p> + + <p>This default host setting means that you can only + connect to the proxy from ther local computer. This is a + security measure - if you allow anyone to use the proxy, + then hackers or fraudsters could use it to help hide their + identity. It also provides a lot of protection against any + undiscovered security flaws in JunkBuster - if they can't + connect to it, then they can't attack it.</p> + + <p>If you change this value, we recommend you <i>either</i> + set the host to <code>localhost</code>:<br> + <code>listen-address + localhost:8080</code><br> + <i>or</i>, if you want to share a single internet + connection over your internal network, then set it to the + address of your internal ethernet card:<br> + <code>listen-address + 10.1.1.1:8080</code><br> + (replace 10.1.1.1 with your internal IP address), <i> + or</i> set up an <i><a href="#aclfile">aclfile</a></i>. To + make the proxy accessible from everywhere (e.g. if you're + using an access control list or if you just don't care + about security), specify just the port number - e.g:<br> + <code>listen-address :8000</code><br> + (This binds the proxy to <b>all</b> IP addresses + (<code>INADDR_ANY</code>)).</p> + </dd> + + <dt><i><a name="o_f"></a></i><a name= + "forwardfile"></a><code>forwardfile</code> <i> + forwardfile</i></dt> + + <dd> + <p>Junkbuster has a flexible syntax for forwarding HTTP + requests. This is used e.g. if you are behind a firewall + and need to connect through it, or if you want to use a + cacheing proxy to speed up your web browsing.</p> + + <p>Every line in the forwardfile consists of four + components, seperated by whitespace. These are:<br> + <br> + <code><i>target forward_to via_gateway_type + gateway</i></code></p> + + <p><i>target</i> is a pattern used to select which line of + the forwardfile is used. "<code>*</code>" is the most + commonly used value, and matches every URL. As usual, the + last matching <i>target</i> wins. (If no pattern matches, a + direct connection will be used)</p> + + <p><i>forward_to</i> specifies the HTTP proxy server to + use, or "<code>.</code>" for none. This is used to connect + to a cacheing proxy such as Squid, and for most types of + firewall. The port number defaults to 8000 if it is not + specified.</p> + + <p>Here is a typical line.</p> <pre> * lpwa.com:8000 . . </pre> -<p> -<a name="lines">Each line contains four fields:</a> -<big><kbd>target</kbd></big>, -<big><kbd>forward_to</kbd></big>, -<big><kbd>via_gateway_type</kbd></big> -and -<big><kbd>gateway</kbd></big>. -As usual, the -<a href="ijbman.html#compare">last</a> -<big><kbd>target</kbd></big> -domain that matches the requested -<small>URL</small> -wins, -and the -<big><kbd>*</kbd></big> -character alone matches any domain. -The target domain need not be a fully qualified -hostname; it can be a general domain such as -<big><kbd>com</kbd></big> -or -<big><kbd>co.uk</kbd></big> -or even just a port number. -<a name="nose">For example, because</a> -<a href="http://lpwa.com">LPWA</a> -does not handle -<a href="ijbfaq.html#encrypt">SSL</a>, -the line above will typically be followed by a line such as -<br> + + <p>The target domain need not be a fully qualified + hostname; it can be a general domain such as <code> + com</code> or <code>co.uk</code> or even just a port + number. <a name="nose"></a>For example, because <a href= + "http://lpwa.com">LPWA</a> does not handle <a href= + "ijbfaq.html#encrypt">SSL</a>, the line above will + typically be followed by a line such as</p> <pre> -:443 . . . +:443 . . . </pre> -to allow SSL transactions to proceed directly. -The cautious would also -add an entry in their blockfile to stop transactions -to port 443 for all but specified trusted sites. -<p> -<a name="forward">If the winning</a> -<big><kbd>forward_to</kbd></big> -field is -<big><kbd>.</kbd></big> -(the dot character) the proxy connects -directly to the server given in the -<small>URL</small>, -otherwise it forwards to the host and port number specified. -The default port is 8000. -The -<big><kbd>via_gateway_type</kbd></big> -and -<big><kbd>gateway</kbd></big> -fields also use a dot to indicate no gateway protocol. -The gateway protocols are explained -<a href="ijbman.html#o_g">below</a>. -<p> -<a name="old">The example line above in a forwardfile alone</a> -would send everything through port 8000 at -<big><kbd>lpwa.com</kbd></big> -with no gateway protocol, -and is equivalent to the old -<big><kbd>-f lpwa.com:8000</kbd></big> -with no -<big><kbd>-g</kbd></big> -option. -For more information see the example file provided with the distribution. -<p> -<a name="loop">Configure with care: no loop detection is performed.</a> -When setting up chains of proxies that might loop back, try adding -<a href="ijbman.html#squid">Squid.</a> -<p><dt><i><a name="o_g">-g gw_protocol[:[gw_host][:gw_port]]</a></i><dd> -Use -<i>gw_protocol</i> -as the gateway protocol. -This option was introduced in Version 1.4, -but was folded into the -<a href="ijbman.html#forwardfile">forwardfile</a> -option in Version 2.0. -The default is to use no gateway protocol; -this may be explicitly specified as -<big><kbd>direct</kbd></big> -on the command line -or the dot character in the forwardfile. -The -<big><kbd>SOCKS4</kbd></big> -protocol may be specified as -<big><kbd>socks</kbd></big> -or -<big><kbd>socks4</kbd></big>. -The -<big><kbd>SOCKS4A</kbd></big> -protocol is specified as -<big><kbd>socks4a</kbd></big>. -The -<big><kbd>SOCKS5</kbd></big> -protocol is not currently supported. -The default -<small>SOCKS</small> -<i>gw_port</i> -is 1080. -<p> -<a name="configure">The user's browser should</a> -<em>not</em> -be -<a href="ijbfaq.html#socks">configured</a> -to use -<big><kbd>SOCKS</kbd></big>; -the proxy conducts the negotiations, not the browser. -<p> -<a name="identify">The user identification capabilities of</a> -<big><kbd>SOCKS4</kbd></big> -are deliberately not used; -the user is always identified to the -<big><kbd>SOCKS</kbd></big> -server as -<big><kbd>userid=anonymous</kbd></big>. -If the server's policy is to reject requests from -<big><kbd>anonymous</kbd></big>, -the proxy will not work. -Use a -<a href="ijbman.html#o_d">debug</a> -value of 3 -to see the status returned by the server. -<p><dt><i><a name="o_d">-d N</a></i><br><a name="debug"><tt>debug</tt>  <i>N</i></a><dd> -Set debug mode. -The most common value is 1, -to -<a href="ijbfaq.html#pinpoint">pinpoint</a> -offensive -<small>URL</small>s, -so they can be added to the blockfile. -The value of -<b>N</b> -is a bitwise -logical-<small>OR</small> -of the following values: -<br> -1 = URLs (show each URL requested by the browser);<br> -2 = Connections (show each connection to or from the proxy);<br> -4 = I/O (log I/O errors);<br> -8 = Headers (as each header is scanned, show the header and what is done to it);<br> -16 = Log everything (including debugging traces and the contents of the pages).<br> -<a name="or">Multiple</a> -<big><kbd>debug</kbd></big> -lines are permitted; they are logical OR-ed together. -<p> -<a name="single">Because most browsers send several requests in parallel</a> -the debugging output may appear intermingled, so the -<a href="ijbman.html#single-threaded">single-threaded</a> -option is recommended when using -<a href="ijbman.html#debug">debug</a> -with -<b>N</b> -greater than 1. -<!-- Aside: Yes, it's clumsy, but it's easy to parse. --> -<p><dt><i><a name="o_y">-y</a></i><br><a name="add-forwarded-header"><tt>add-forwarded-header</tt></a><dd> -Add -<big><kbd>X-Forwarded-For</kbd></big> -headers to the server-bound -<small>HTTP</small> -stream -indicating the client -<small>IP</small> -address -<a href="ijbfaq.html#detect">to the server,</a> -in the new style of -<a href="ijbman.html#squid">Squid 1.1.4.</a> -If you want the traditional -<big><kbd>HTTP_FORWARDED</kbd></big> -response header, add it manually with the -<a href="ijbman.html#o_x">-x</a> -option. -<!-- Aside: Not a default, since the end-client usually doesn't wish to be identified, but may be helpful in debugging chains. --> -<p><dt><i><a name="o_x">-x HeaderText</a></i><br><a name="add-header"><tt>add-header</tt>  <i>HeaderText</i></a><dd> -Add the -<i>HeaderText</i> -verbatim to requests to the server. -Typical uses include -adding old-style forwarding notices such as -<big><kbd>Forwarded: by http://pro-privacy-isp.net</kbd></big> -and reinstating the -<big><kbd>Proxy-Connection: Keep-Alive</kbd></big> -header -(which the -<b><kbd>junkbuster</kbd></b> -deletes so as -<a href="ijbfaq.html#detect">not</a> -to reveal its existence). -No checking is done for correctness or plausibility, -so it can be used to throw any old trash into the server-bound -<small>HTTP</small> -stream. -Please don't litter. -<!-- Aside: this represents "more than enough rope" --> -<p><dt><i><a name="o_s">-s</a></i><br><a name="single-threaded"><tt>single-threaded</tt></a><dd> -Doesn't -<big><kbd>fork()</kbd></big> -a separate process -(or create a separate thread) -to handle each connection. -Useful when debugging to keep the process single threaded. -<p><dt><i><a name="o_l">-l logfile</a></i><br><a name="logfile"><tt>logfile</tt>  <i>logfile</i></a><dd> -Write all debugging data into -<i>logfile.</i> -The default -<i>logfile</i> -is the standard output. -<p><dt><br><a name="aclfile"><tt>aclfile</tt>  <i>aclfile</i></a><dd> -Unless this option is used, the proxy talks to anyone who can connect to it, -and everyone who can has equal permissions on where they can go. -An access file allows restrictions to be placed on these two policies, -by distinguishing some -<i><dfn>source</dfn></i> -<small>IP</small> -addresses and/or -some -<i><dfn>destination</dfn></i> -addresses. -(If a -<a href="ijbman.html#forwardfile">forwarder or a gateway</a> -is being used, its address is considered the destination address, -not the ultimate -<small>IP</small> -address of the -<small>URL</small> -requested.) -<p> -<a name="permit">Each line of the access file begins with</a> -either the word -<big><kbd>permit</kbd></big> -or -<big><kbd>deny</kbd></big> -followed by source and (optionally) destination addresses -to be matched against those of the -<small>HTTP</small> -request. -The last matching line specifies the result: if it was a -<big><kbd>deny</kbd></big> -line or if no line matched, -the request will be refused. -<p> -<a name="various">A source or destination</a> -can be specified as a single numeric -<small>IP</small> -address, -or with a hostname, provided that the host's name -can be resolved to a numeric address: this cannot be used to block all -<big><kbd>.mil </kbd></big> -domains for example, -because there is no single address associated with that domain name. -Either form may be followed by a slash and an integer -<big><kbd>N</kbd></big>, -specifying a subnet mask of -<big><kbd>N</kbd></big> -bits. -For example, -<big><kbd>permit 207.153.200.72/24</kbd></big> -matches the entire Class-C subnet from -207.153.200.0 -through 207.153.200.255. -(A netmask of 255.255.255.0 corresponds to 24 bits of -ones in the netmask, as with -<big><kbd>*_MASKLEN=24</kbd></big>.) -A value of 16 would be used for a Class-B subnet. -A value of zero for -<big><kbd>N</kbd></big> -in the subnet mask length will cause any address to match; -this can be used to express a default rule. -For more information see the example file provided with the distribution. -<p> -<a name="false">If you like these access controls</a> -you should probably have -<a href="ijbfaq.html#firewall">firewall</a>; -they are not intended to replace one. -<p><dt><br><a name="trustfile"><tt>trustfile</tt>  <i>trustfile</i></a><dd> -This feature is experimental, has not been fully documented and is -very subject to change. -The goal is for parents to be able to choose a page or site whose -links they regard suitable for their -<a href="ijbfaq.html#children">young children</a> -and for the proxy to allow access only to sites mentioned there. -To do this the proxy examines the -<a href="ijbman.html#o_r">referer</a> -variable on each page request to check they resulted from -a click on the ``trusted referer'' site: if so the referred site -is added to a list of trusted sites, so that the child can -then move around that site. -There are several uncertainties in this scheme that experience may be -able to iron out; check back in the months ahead. -<p><dt><br><a name="trust_info_url"><tt>trust_info_url</tt>  <i>trust_info_url</i></a><dd> -When access is denied due to lack of a trusted referer, this -<small>URL</small> -is displayed with a message pointing the user to it for further information. -<p><dt><br><a name="hide-console"><tt>hide-console</tt></a><dd> -In the Windows version only, instructs the program -to disconnect from and hide the command console after starting. -<p><dt><i><a name="o_a">-a</a></i><dd> -(Obsolete) Accept the server's -<big><kbd>Set-cookie</kbd></big> -headers, passing them through to the browser. -<a name="obsolete">This option was removed in Version 1.2</a> -and replaced by an improvement to the -<a href="ijbman.html#o_c">-c</a> -option. -</dl> -</p> - -<h3><a name="install" href="/cgi-bin/gp?pg=ijbman&pr=install"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Installation and Use -</h3> -<p> -Browsers must be told where to find the -<b><kbd>junkbuster</kbd></b> -(e.g. -<big><kbd>localhost</kbd></big> -port 8000). -To set the -<small>HTTP</small> -proxy in Netscape 3.0, -go through: -<b><font face="arial, helvetica"> -Options</font></b>; -<b><font face="arial, helvetica"> -Network Preferences</font></b>; -<b><font face="arial, helvetica"> -Proxies</font></b>; -<b><font face="arial, helvetica"> -Manual Proxy Configuration</font></b>; -<b><font face="arial, helvetica"> -View</font></b>. -See the -<a href="ijbfaq.html"><small>FAQ</small></a> -for other browsers. -The -<a href="ijbfaq.html#security">Security Proxy</a> -should also be set to the same values, -otherwise -<big><kbd>shttp:</kbd></big> -<small>URL</small>s -won't work. -<p> -<a name="limitations">Note the limitations</a> -explained in the -<a href="ijbfaq.html"><small>FAQ</small></a>. -</p> - -<h3><a name="show" href="/cgi-bin/gp?pg=ijbman&pr=show"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Checking Options -</h3> -<p> -To allow users to -<a href="ijbfaq.html#show">check</a> -that a -<b><kbd>junkbuster</kbd></b> -is running and how it is configured, -it intercepts requests for any -<small>URL</small> -ending in -<big><kbd>/show-proxy-args</kbd></big> -and blocks it, -returning instead returns information on its -version number and -current configuration -including the contents of its blockfile. -To get an explicit warning that no -<b><kbd>junkbuster</kbd></b> -intervened if the proxy was not configured, -it's best to point it to a -<small>URL</small> -that does this, such as -<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a> -on Junkbusters's website. -</p> - -<h3><a name="also" href="/cgi-bin/gp?pg=ijbman&pr=also"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -See Also -</h3> -<p> -<a href="ijbfaq.html">http://www.junkbusters.com/ht/en/ijbfaq.html</a> -<br> -<a href="cookies.html">http://www.junkbusters.com/ht/en/cookies.html</a> -<br> -<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a> -<br> -<a name ="kristol" href="http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html">http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html</a> -<br> -<a name ="squid" href="http://squid.nlanr.net/Squid/">http://squid.nlanr.net/Squid/</a> -<br> -<a href="http://www-math.uni-paderborn.de/~axel/">http://www-math.uni-paderborn.de/~axel/</a> -</p> - -<h3><a name="copyright" href="/cgi-bin/gp?pg=ijbman&pr=copyright"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a>  -Copyright and GPL -</h3> -<p> -Written and copyright by the Anonymous Coders and Junkbusters Corporation -and made available under the -<a href="gpl.html">GNU General Public License (GPL).</a> -This software comes with -<a href="gpl.html#nowarr">NO WARRANTY.</a> -Internet Junkbuster -Proxy -is a -<a href="legal.html#marks">trademark</a> -of Junkbusters Corporation. -</p> -<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p> -<font face="arial, helvetica"> -<a rel="begin" href="index.html">Home</a> <font color="#ff0000"> -<b> · </b></font> -<a rel="next" href="cookies.html">Next</a> -<font color="#ff0000"> -<b> · </b></font><a href="lopt.html">Site Map</a> -<font color="#ff0000"> -<b> · </b></font><a href="legal.html">Legal</a> -<font color="#ff0000"> -<b> · </b></font><a href="junkdata.html">Privacy</a> -<font color="#ff0000"> -<b> · </b></font><a href="cookies.html">Cookies</a> -<font color="#ff0000"> -<b> · </b></font><a href="ijb.html">Banner Ads</a> -<font color="#ff0000"> -<b> · </b></font><a href="telemarketing.html">Telemarketing</a> -<font color="#ff0000"> -<b> · </b></font><a href="junkmail.html">Mail</a> -<font color="#ff0000"> -<b> · </b></font><a href="junkemail.html">Spam</a> - -</font><form action="/cgi-bin/search" method="GET"> -<input type="text" name="q" size=60 maxlength=120 value=""> -<input type="submit" value="Search"></form> -<small> -<small> -<p> -<a href="legal.html#copy">Copyright</a> © 1996-8 Junkbusters -<a href="legal.html#marks">®</a> Corporation. -Copying and distribution permitted under -the <a href="gpl.html"><small>GNU</small></a> -General Public License. -</small> -<tt> -1998/10/31 -http://www.junkbusters.com/ht/en/ijbman.html -</tt> -<address><kbd>webmaster@junkbusters.com</kbd></address> -</small> -</body> + + <p>to allow SSL transactions to proceed directly. The + cautious would also add an entry in their blockfile to stop + transactions to port 443 for all but specified trusted + sites.</p> + + <p><a name="loop"></a>Configure with care: no loop + detection is performed. When setting up chains of proxies + that might loop back, try adding <a href="#squid"> + Squid.</a></p> + + <p><i>via_gateway_type</i> and <i>gateway</i> are used to + support SOCKS proxies. Some firewalls provide this type of + proxy. If you do not not want to use a SOCKS proxy, specify + both of these fields as "<code>.</code>".</p> + + <p><a name="configure"></a><a name="identify"></a>Note that + JunkBuster is a SOCKS <b>client</b>, <b>not</b> a SOCKS <b> + server</b>. The user's browser should <b>not</b> be <a + href="ijbfaq.html#socks">configured</a> to use <code> + SOCKS</code>; the proxy conducts the negotiations, not the + browser.</p> + + <p>The <code>SOCKS4</code> protocol may be specified by + setting <i>via_gateway_type</i> to <code>socks</code> or + <code>socks4</code>. The <code>SOCKS4A</code> protocol is + specified as <code>socks4a</code>. The <code>SOCKS5</code> + protocol is not currently supported.</p> + + <p><i>gateway</i> should be the host and port of the SOCKS + server. If you just specify a hostname, then the port + number defaults to 1080.</p> + + <p>The user identification capabilities of <code> + SOCKS4</code> are deliberately not used; the user is always + identified to the <code>SOCKS</code> server as <code> + userid=anonymous</code>. If the server's policy is to + reject requests from <code>anonymous</code>, the proxy will + not work. Use a <a href="#o_d">debug</a> value of 3 to see + the status returned by the server.</p> + + <p>If you specify both a HTTP proxy (with <i> + forward_to</i>) and a SOCKS proxy (with <i>gateway</i>) + then the SOCKS proxy is used to connect to the HTTP proxy. + If you just specify a SOCKS proxy, it is used to connect + directly to the websites.</p> + </dd> + + <dt><i><a name="o_d"></a></i><a name= + "debug"></a><code>debug</code> <i>N</i></dt> + + <dd> + <p>Set debug mode. The most common value is 1, to <a href= + "ijbfaq.html#pinpoint">pinpoint</a> offensive URLs, so they + can be added to the blockfile. The value of <b>N</b> is a + bitwise logical-OR of the following values:<br> + 1 = URLs (show each URL requested by the browser);<br> + 2 = Connections (show each connection to or from the + proxy);<br> + 4 = I/O (log I/O errors);<br> + 8 = Headers (as each header is scanned, show the header + and what is done to it);<br> + 16 = Log everything (including debugging traces and the + contents of the pages).<br> + 32 = Record accesses in Common Log Format, as used by most + web and proxy servers.</p> + + <p><a name="or"></a>Multiple <code>debug</code> lines are + permitted; they are logical OR-ed together.</p> + + <p><a name="single"></a>Because most browsers send several + requests in parallel the debugging output may appear + intermingled, so the <a href="#single-threaded"> + single-threaded</a> option is recommended when using <a + href="#debug">debug</a> with <b>N</b> greater than 1. + <!-- Aside: Yes, it's clumsy, but it's easy to parse. --></p> + </dd> + + <dt><i><a name="o_y"></a></i><a name= + "add-forwarded-header"></a><code>add-forwarded-header</code></dt> + + <dd> + <p>Add <code>X-Forwarded-For</code> headers to the + server-bound HTTP stream indicating the client IP address + <a href="ijbfaq.html#detect">to the server,</a> in the new + style of <a href="#squid">Squid 1.1.4.</a> If you want the + traditional <code>HTTP_FORWARDED</code> response header, + add it manually with the <a href="#o_x">-x</a> option. This + also allows other <code>X-Forwarded-For</code> headers to + be transmitted - usually they are discarded.</p> + </dd> + + <dt><i><a name="o_x"></a></i><a name= + "add-header"></a><code>add-header</code> <i> + HeaderText</i></dt> + + <dd> + <p>Add the <i>HeaderText</i> verbatim to requests to the + server. Typical uses include adding old-style forwarding + notices such as <code>Forwarded: by + http://pro-privacy-isp.net</code> and reinstating the + <code>Proxy-Connection: Keep-Alive</code> header (which the + <b><code>junkbuster</code></b> deletes so as <a href= + "ijbfaq.html#detect">not</a> to reveal its existence). No + checking is done for correctness or plausibility, so it can + be used to throw any old trash into the server-bound HTTP + stream. Please don't litter. + <!-- Aside: this represents "more than enough rope" --></p> + </dd> + + <dt><i><a name="o_s"></a></i><a name= + "single-threaded"></a><code>single-threaded</code></dt> + + <dd> + <p>Doesn't <code>fork()</code> a separate process (or + create a separate thread) to handle each connection. Useful + when debugging to keep the process single threaded.</p> + </dd> + + <dt><i><a name="o_l"></a></i><a name= + "logfile"></a><code>logfile</code> <i> + logfile</i></dt> + + <dd> + <p>Write all debugging data into <i>logfile.</i> The + default <i>logfile</i> is the standard output.</p> + </dd> + + <dt><br> + <a name="aclfile"></a><code>aclfile</code> <i> + aclfile</i></dt> + + <dd> + <p>Unless this option is used, the proxy talks to anyone + who can connect to it, and everyone who can has equal + permissions on where they can go. An access file allows + restrictions to be placed on these two policies, by + distinguishing some <i><dfn>source</dfn></i> IP addresses + and/or some <i><dfn>destination</dfn></i> addresses. (If a + <a href="#forwardfile">forwarder or a gateway</a> is being + used, its address is considered the destination address, + not the ultimate IP address of the URL requested.)</p> + + <p><a name="permit"></a>Each line of the access file begins + with either the word <code>permit</code> or <code> + deny</code> followed by source and (optionally) destination + addresses to be matched against those of the HTTP request. + The last matching line specifies the result: if it was a + <code>deny</code> line or if no line matched, the request + will be refused.</p> + + <p><a name="various"></a>A source or destination can be + specified as a single numeric IP address, or with a + hostname, provided that the host's name can be resolved to + a numeric address: this cannot be used to block all <code> + .mil</code> domains for example, because there is no single + address associated with that domain name. Either form may + be followed by a slash and an integer <code>N</code>, + specifying a subnet mask of <code>N</code> bits. For + example, <code>permit 207.153.200.72/24</code> matches the + entire Class-C subnet from 207.153.200.0 through + 207.153.200.255. (A netmask of 255.255.255.0 corresponds to + 24 bits of ones in the netmask, as with <code> + *_MASKLEN=24</code>.) A value of 16 would be used for a + Class-B subnet. A value of zero for <code>N</code> in the + subnet mask length will cause any address to match; this + can be used to express a default rule. For more information + see the example file provided with the distribution.</p> + + <p><a name="false"></a>If you like these access controls + you should probably have <a href="ijbfaq.html#firewall"> + firewall</a>; they are not intended to replace one.</p> + </dd> + + <dt><br> + <a name="trustfile"></a><code>trustfile</code> + <i>trustfile</i></dt> + + <dd> + <p>This feature is experimental, has not been fully + documented and is very subject to change. The goal is for + parents to be able to choose a page or site whose links + they regard suitable for their <a href= + "ijbfaq.html#children">young children</a> and for the proxy + to allow access only to sites mentioned there. To do this + the proxy examines the <a href="#o_r">referer</a> variable + on each page request to check they resulted from a click on + the ``trusted referer'' site: if so the referred site is + added to a list of trusted sites, so that the child can + then move around that site. There are several uncertainties + in this scheme that experience may be able to iron out; + check back in the months ahead.</p> + </dd> + + <dt><br> + <a name="trust_info_url"> + </a><code>trust_info_url</code> <i> + trust_info_url</i></dt> + + <dd> + <p>When access is denied due to lack of a trusted referer, + this URL is displayed with a message pointing the user to + it for further information.</p> + </dd> + + <dt><br> + <a name="hide-console"></a><code>hide-console</code></dt> + + <dd> + <p>In the Windows command-line version only, instructs the + program to disconnect from and hide the command console + after starting.</p> + </dd> + </dl> + + <h3><a name="install"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Installation and Use</h3> + + <p>Browsers must be told where to find the <b><code> + junkbuster</code></b> (e.g. <code>localhost</code> port 8000). + To set the HTTP proxy in Netscape 3.0, go through: <b class= + "eg">Options</b>; <b class="eg">Network Preferences</b>; <b + class="eg">Proxies</b>; <b class="eg">Manual Proxy + Configuration</b>; <b class="eg">View</b>. See the <a href= + "ijbfaq.html">FAQ</a> for other browsers. The <a href= + "ijbfaq.html#security">Security Proxy</a> should also be set to + the same values, otherwise <code>shttp:</code> URLs won't + work.</p> + + <p><a name="limitations"></a>Note the limitations explained in + the <a href="ijbfaq.html">FAQ</a>.</p> + + <h3><a name="show"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> Checking Options</h3> + + <p>To allow users to <a href="ijbfaq.html#show">check</a> that + a <b><code>junkbuster</code></b> is running and how it is + configured, it intercepts requests for any URL ending in <code> + /show-proxy-args</code> and blocks it, returning instead + returns information on its version number and current + configuration including the contents of its blockfile. To get + an explicit warning that no <b><code>junkbuster</code></b> + intervened if the proxy was not configured, it's best to point + it to a URL that does this, such as <a href= + "http://internet.junkbuster.com/cgi-bin/show-proxy-args"> + http://internet.junkbuster.com/cgi-bin/show-proxy-args</a> on + Junkbusters's website.</p> + + <h3><a name="also"></a><img border="0" src="fb.gif" alt="*" + width="14" height="14"> See Also</h3> + + <p><a href="ijbfaq.html"> + http://www.junkbusters.com/ht/en/ijbfaq.html</a><br> + <a href="http://www.junkbusters.com/ht/en/cookies.html"> + http://www.junkbusters.com/ht/en/cookies.html</a><br> + <a href= + "http://internet.junkbuster.com/cgi-bin/show-proxy-args"> + http://internet.junkbuster.com/cgi-bin/show-proxy-args</a><br> + <a name="kristol"></a><a href= + "http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html">http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html</a><br> + + <a name="squid"></a><a href= + "http://squid.nlanr.net/Squid/">http://squid.nlanr.net/Squid/</a><br> + + <a href="http://www-math.uni-paderborn.de/~axel/"> + http://www-math.uni-paderborn.de/~axel/</a></p> + + <h3><a name="copyright"></a><img border="0" src="fb.gif" alt= + "*" width="14" height="14"> Copyright and GPL</h3> + + <p>Written and copyright by the Anonymous Coders and + Junkbusters Corporation and made available under the <a href= + "gpl.html">GNU General Public License (GPL).</a> This software + comes with <a href="gpl.html#nowarr">NO WARRANTY.</a> Internet + Junkbuster Proxy is a <a href= + "http://www.junkbusters.com/ht/en/legal.html#marks"> + trademark</a> of Junkbusters Corporation.</p> + + <p align="center"><a href="#top_of_page"><img border="0" src= + "top.gif" alt="--- Back to Top of Page ---" width="250" height= + "15"></a></p> + + <p class="sans"><a href="http://ijbswa.sourceforge.net/"> + Website</a> <b class="dot">·</b> <b>Manual</b> <b class= + "dot">·</b> <a href="ijbfaq.html">FAQ</a> <b class= + "dot">·</b> <a href="gpl.html">GPL</a></p> + + <p class="sans"><small><small><a href="gpl.html#text"> + Copyright</a> © 1996-8 <a href= + "http://www.junkbusters.com/">Junkbusters</a> <a href= + "http://www.junkbusters.com/ht/en/legal.html#marks">®</a> + Corporation. <a href="gpl.html#text">Copyright</a> © 2001 + <a href="http://sourceforge.net/projects/ijbswa/">Jon + Foster</a>. Copying and distribution permitted under the <a + href="gpl.html">GNU</a> General Public + License.</small></small></p> + + <p><small><code><a href= + "http://sourceforge.net/projects/ijbswa/"> + http://sourceforge.net/projects/ijbswa/</a></code></small></p> + </body> </html> + diff --git a/doc/top.gif b/doc/top.gif new file mode 100755 index 00000000..8380083d Binary files /dev/null and b/doc/top.gif differ