From: jongfoster <jongfoster@users.sourceforge.net>
Date: Thu, 17 May 2001 22:56:17 +0000 (+0000)
Subject: Cosmetic documentation update.
X-Git-Tag: v_2_9_9~524
X-Git-Url: http://www.privoxy.org/gitweb/%22https:/@default-cgi@/faq/static/developer-manual/@default-cgi@show-url-info?a=commitdiff_plain;h=addce9f3a4e868380661736e8e95010da786b972;p=privoxy.git

Cosmetic documentation update.
- Added required image files into CVS, they are no longer loaded
  from junkbusters.com
- Modified HTML files to be fully complient HTML 4.01, using CSS etc.
- Most of the links to junkbusters.com have been replaced with ones
  within the documentation set, or to the SourceForge project.
- Added bold "these files are out of date" warning.
---

diff --git a/doc/fb.gif b/doc/fb.gif
new file mode 100755
index 00000000..43059924
Binary files /dev/null and b/doc/fb.gif differ
diff --git a/doc/gpl.html b/doc/gpl.html
index 7f0b6107..c980e61f 100644
--- a/doc/gpl.html
+++ b/doc/gpl.html
@@ -1,567 +1,560 @@
-<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
+<!-- $Id$
+
+     See copyright details at end of file
+
+     After changing this file, please run it through "HTML Tidy"
+     (from http://www.w3.org/People/Raggett/tidy/)
+     It should have no warnings or errors.
+-->
+
 <html>
-<head>
-<!-- Copyright 1996-8 Junkbusters Corporation -->
-<!-- This work comes with NO WARRANTY -->
-<!-- It may be redistributed and modified under the GNU GPL-->
-<!-- See the body of http://www.junkbusters.com/ht/en/gpl.html for details-->
-<!-- Junkbusters is a registered trade mark of Junkbusters Corporation -->
-<!-- Generated 1998/10/31 03:58:25 UTC -->
-<meta name="Generator" content="Junkbusters Ebira $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $">
-<!-- Document  ID: $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $ -->
-<title>
-The GNU General Public License
-</title>
-<base href="http://www.junkbusters.com/ht/en/gpl.html">
-<meta name="description" content="We did not write the GPL: the Free Software Foundation did | The GPL allows copying and changing of copyrighted documents | Version 2, June 1991 | Preamble | GNU General Public License: Terms and Conditions for Copying, Distribution and Modification | Appendix: How to Apply These Terms to Your New Programs">
-<meta name="keywords" content="stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, spamoff, declare, telemarketing, telemarketers, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, conservation, recycling, catalogs, consumer, sending, opt out ">
-<link rel="next" href="precre.html">
-<link rel="previous" href="precre.html">
-<link rel="contents" href="toc.html">
-</head>
-<body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink="#787878">
-<p align="center">
-<a name="top_of_page" href="legal.html#marks">
-<img border=0 width=160 height=34 src="/images/trans_tn.gif" alt="Junkbusters"></a>
-</p>
-
-<center>
-<h1>The GNU General Public License
-</h1>
-</center>
-<!-- Translators: no -->
-<center>
-<h2><a name="notus"><font face="arial, helvetica">
-We did not write the GPL: the Free Software Foundation did
-</font></a>
-</h2>
-</center>
-
-<h3><a name="allows" href="/cgi-bin/gp?pg=gpl&pr=allows"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-The GPL allows copying and changing of copyrighted documents
-</h3>
-<p>
-<a name="fsf">The Free Software Foundation</a>
-<a href="http://www.fsf.org/fsf/fsf.html">(FSF)</a>
-is a non-profit institution
-that designed the GNU General Public License (GPL) to promote the
-publication of free software.
-The GPL is used by thousands of programmers
-who want to give others the right to copy and modify
-the source code of their programs. Millions of people benefit from this.
-<p>
-<a name="junkbuster">We use the GPL</a>
-to allow everyone to use, copy and modify the
-<a href="ijb.html">Internet Junkbuster</a>
-as they wish.
-<a name="separate">Companies can use it for commercial purposes,</a>
-but they are not permitted to use it in products that they claim
-as their property
-without negotiating a separate agreement with us beforehand.
-<p>
-<a name="text">The GPL</a>
-<a href="http://dsl.org/copyleft/">can also be used</a>
-on documents written in human languages.
-We give everyone permission to use everything on our web site under the GPL.
-This means that you do not have to break copyright laws in order
-to print a page or email a screen of the text to someone, for example.
-Many sites do not permit you to do these things.
-<p>
-<a name="best">If you have a home page,</a>
-we recommend that you consider using the GPL to
-allow others the right to copy and use all the documents you create for it.
-If you just mark a page as copyright, they won't even
-legally be able to print it.
-If you don't state you are its copyright owner,
-they could change it slightly and claim it as their own property. 
-By marking it with both copyright and GPL notices
-you allow them to copy it but not to claim
-anything derived from it as their own.
-<p>
-<a name="protect">The GPL protects your</a>
-<a href="declare.html">J<small>UNK<i>BUSTERS</i></small> D<small>ECLARATION</small></a>,
-<a href="spamoff.html">Spam Offer</a>,
-and all documents from us that you publish on your home page
-or distribute to direct marketers by any other means.
-By making your
-D<small>ECLARATION</small>
-available to them under the GPL, you are
-<a href="precre.html#gpl">permitting them use to it, but never to claim it as their property,</a>
-even if they transform it.
-<p>
-<a name="rest">The</a>
-remainder of this page is the text of the GPL.
-As legal documents go it's relatively clear,
-but unfortunately it's fairly long because it has to cover
-a lot of details specific to computer programs
-that may not be relevant to
-D<small>ECLARATION</small>s.
-The hypertext links are ours, and should not be misinterpreted
-as an indication of emphasis by the FSF.
-</p>
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>
-<center>
-<h2><a name="v2"><font face="arial, helvetica">
-Version 2, June 1991
-</font></a>
-</h2>
-</center>
-<blockquote>
-<a name="crn">Copyright 1989, 1991</a>
-<br>
-<a name="address">Free Software Foundation, Inc.</a>
-<br>
-675 Mass Ave.
-<br>
-Cambridge, MA 02139
-<br>
-USA
-</blockquote>
-<a name="changing">Everyone</a>
-is permitted to copy and distribute verbatim copies
-of this license document, but changing it is not allowed.
-
-<h3><a name="pream" href="/cgi-bin/gp?pg=gpl&pr=pream"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Preamble
-</h3>
-<p>
-The licenses for most software are designed to take away your
-freedom to share and change it.  By contrast, the GNU General Public
-License is intended to guarantee your freedom to share and change free
-software--to make sure the software is free for all its users.  This
-General Public License applies to most of the Free Software
-Foundation's software and to any other program whose authors commit to
-using it.  (Some other Free Software Foundation software is covered by
-the GNU Library General Public License instead.)  You can apply it to
-your programs, too.
-<p>
-<a name="freedom">When we speak of free software,</a>
-we are referring to freedom, not
-price.  Our General Public Licenses are designed to make sure that you
-have the freedom to distribute copies of free software (and charge for
-this service if you wish), that you receive source code or can get it
-if you want it, that you can change the software or use pieces of it
-in new free programs; and that you know you can do these things.
-<p>
-<a name="forbid">To protect your rights,</a>
-we need to make restrictions that forbid
-anyone to deny you these rights or to ask you to surrender the rights.
-These restrictions translate to certain responsibilities for you if you
-distribute copies of the software, or if you modify it.
-<p>
-<a name="allrights">For example,</a>
-if you distribute copies of such a program, whether
-gratis or for a fee, you must give the recipients all the rights that
-you have.  You must make sure that they, too, receive or can get the
-source code.  And you must show them these terms so they know their
-rights.
-<p>
-<a name="steps">We protect your rights with two steps:</a>
-(1) copyright the software, and
-(2) offer you this license which gives you legal permission to copy,
-distribute and/or modify the software.
-<p>
-<a name="protection">Also,</a>
-for each author's protection and ours, we want to make certain
-that everyone understands that there is no warranty for this free
-software.  If the software is modified by someone else and passed on, we
-want its recipients to know that what they have is not the original, so
-that any problems introduced by others will not reflect on the original
-authors' reputations.
-<p>
-<a name="threat">Finally,</a>
-any free program is threatened constantly by software
-patents.  We wish to avoid the danger that redistributors of a free
-program will individually obtain patent licenses, in effect making the
-program proprietary.  To prevent this, we have made it clear that any
-patent must be licensed for everyone's free use or not licensed at all.
-<p>
-<a name="terms">The precise terms and conditions</a>
-for copying, distribution and
-modification follow.
-</p>
-
-<h3><a name="tnc" href="/cgi-bin/gp?pg=gpl&pr=tnc"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-GNU General Public License: Terms and Conditions for Copying, Distribution and Modification
-</h3>
-<p>
-<a name="applies">O.</a>
-This License applies to any program or other work which contains
-a notice placed by the copyright holder saying it may be distributed
-under the terms of this General Public License.  The "Program", below,
-refers to any such program or work, and a "work based on the Program"
-means either the Program or any derivative work under copyright law:
-that is to say, a work containing the Program or a portion of it,
-either verbatim or with modifications and/or translated into another
-language.  (Hereinafter,
-<a href="bus-ops.html#trans">translation</a>
-is included without limitation in
-the term "modification".)  Each licensee is addressed as "you".
-<p>
-<a name="scope">Activities</a>
-<a href="faqs.html#copying">other than copying, distribution and modification are not covered by this License;</a>
-they are outside its scope.  The act of
-running the Program is not restricted, and the output from the Program
-is covered only if its contents constitute a work based on the
-Program (independent of having been made by running the Program).
-<p>
-<a name="depends">Whether that is true depends on what the Program does.</a>
-<br><ol  type="1">
-<li>
-<a name="verbatim">You may copy</a>
-and distribute verbatim copies of the Program's
-source code as you receive it, in any medium, provided that you
-conspicuously and appropriately publish on each copy an appropriate
-copyright notice and disclaimer of warranty; keep intact all the
-notices that refer to this License and to the absence of any warranty;
-and give any other recipients of the Program a copy of this License
-along with the Program.
-<p>
-<a name="fee">You may charge a fee</a>
-for the physical act of transferring a copy, and
-you may at your option offer warranty protection in exchange for a fee.
-<li>
-<a name="modify">You may modify</a>
-your copy or copies of the Program or any portion
-of it, thus forming a work based on the Program, and copy and
-distribute such modifications or work under the terms of Section 1
-above, provided that you also meet all of these conditions:
-<br><ol  type="a">
-<li>
-<a name="notices">You must cause</a>
-the modified files to carry prominent notices
-stating that you changed the files and the date of any change.
-<li>
-<a name="nocharge">You must</a>
-cause any work that you distribute or publish, that in
-whole or in part contains or is derived from the Program or any
-part thereof, to be licensed as a whole at no charge to all third
-parties under the terms of this License.
-<li>
-<a name="interactive">If the modified program</a>
-normally reads commands interactively
-when run, you must cause it, when started running for such
-interactive use in the most ordinary way, to print or display an
-announcement including an appropriate copyright notice and a
-notice that there is no warranty (or else, saying that you provide
-a warranty) and that users may redistribute the program under
-these conditions, and telling the user how to view a copy of this
-License.  (Exception: if the Program itself is interactive but
-does not normally print such an announcement, your work based on
-the Program is not required to print an announcement.)
-</ol>
-<p>
-<a name="sections">These requirements</a>
-apply to the modified work as a whole.  If
-identifiable sections of that work are not derived from the Program,
-and can be reasonably considered independent and separate works in
-themselves, then this License, and its terms, do not apply to those
-sections when you distribute them as separate works.  But when you
-distribute the same sections as part of a whole which is a work based
-on the Program, the distribution of the whole must be on the terms of
-this License, whose permissions for other licensees extend to the
-entire whole, and thus to each and every part regardless of who wrote it.
-<p>
-<a name="intent">Thus,</a>
-it is not the intent of this section to claim rights or contest
-your rights to work written entirely by you; rather, the intent is to
-exercise the right to control the distribution of derivative or
-collective works based on the Program.
-<p>
-<a name="aggregation">In addition,</a>
-mere aggregation of another work not based on the Program
-with the Program (or with a work based on the Program) on a volume of
-a storage or distribution medium does not bring the other work under
-the scope of this License.
-<li>
-<a name="exeutable">You may copy</a>
-and distribute the Program (or a work based on it,
-under Section 2) in object code or executable form under the terms of
-Sections 1 and 2 above provided that you also do one of the following:
-<br><ol  type="a">
-<li>
-<a name="medium">Accompany it</a>
-with the complete corresponding machine-readable
-source code, which must be distributed under the terms of Sections
-1 and 2 above on a medium customarily used for software interchange; or,
-<li>
-<a name="written">Accompany it with a written offer,</a>
-valid for at least three
-years, to give any third party, for a charge no more than your
-cost of physically performing source distribution, a complete
-machine-readable copy of the corresponding source code, to be
-distributed under the terms of Sections 1 and 2 above on a medium
-customarily used for software interchange; or,
-<li>
-<a name="distrib">Accompany it</a>
-with the information you received as to the offer
-to distribute corresponding source code.  (This alternative is
-allowed only for noncommercial distribution and only if you
-received the program in object code or executable form with such
-an offer, in accord with Subsection b above.)
-</ol>
-<p>
-<a name="preferred">The source code</a>
-for a work means the preferred form of the work for
-making modifications to it.  For an executable work, complete source
-code means all the source code for all modules it contains, plus any
-associated interface definition files, plus the scripts used to
-control compilation and installation of the executable.  However, as a
-special exception, the source code distributed need not include
-anything that is normally distributed (in either source or binary
-form) with the major components (compiler, kernel, and so on) of the
-operating system on which the executable runs, unless that component
-itself accompanies the executable.
-<p>
-<a name="access">If distribution of executable or object code is made</a>
-by offering
-access to copy from a designated place, then offering equivalent
-access to copy the source code from the same place counts as
-distribution of the source code, even though third parties are not
-compelled to copy the source along with the object code.
-<li>
-<a name="otherwise">You may not copy,</a>
-modify, sublicense, or distribute the Program
-except as expressly provided under this License.  Any attempt
-otherwise to copy, modify, sublicense or distribute the Program is
-void, and will automatically terminate your rights under this License.
-However, parties who have received copies, or rights, from you under
-this License will not have their licenses terminated so long as such
-parties remain in full compliance.
-<li>
-<a name="voluntary">You are not required</a>
-to accept this License, since you have not
-signed it.  However, nothing else grants you permission to modify or
-distribute the Program or its derivative works.  These actions are
-prohibited by law if you do not accept this License.  Therefore, by
-modifying or distributing the Program (or any work based on the
-Program), you indicate your acceptance of this License to do so, and
-all its terms and conditions for copying, distributing or modifying
-the Program or works based on it.
-<li>
-<a name="redistrib">Each time you redistribute</a>
-the Program (or any work based on the
-Program), the recipient automatically receives a license from the
-original licensor to copy, distribute or modify the Program subject to
-these terms and conditions.  You may not impose any further
-restrictions on the recipients' exercise of the rights granted herein.
-You are not responsible for enforcing compliance by third parties to
-this License.
-<li>
-<a name="patent">If, as a consequence of a court judgment</a>
-or allegation of patent
-infringement or for any other reason (not limited to patent issues),
-conditions are imposed on you (whether by court order, agreement or
-otherwise) that contradict the conditions of this License, they do not
-excuse you from the conditions of this License.  If you cannot
-distribute so as to satisfy simultaneously your obligations under this
-License and any other pertinent obligations, then as a consequence you
-may not distribute the Program at all.  For example, if a patent
-license would not permit royalty-free redistribution of the Program by
-all those who receive copies directly or indirectly through you, then
-the only way you could satisfy both it and this License would be to
-refrain entirely from distribution of the Program.
-<p>
-<a name="invalid">If any portion</a>
-of this section is held invalid or unenforceable under
-any particular circumstance, the balance of the section is intended to
-apply and the section as a whole is intended to apply in other
-circumstances.
-<p>
-<a name="induce">It is not the purpose</a>
-of this section to induce you to infringe any
-patents or other property right claims or to contest validity of any
-such claims; this section has the sole purpose of protecting the
-integrity of the free software distribution system, which is
-implemented by public license practices.  Many people have made
-generous contributions to the wide range of software distributed
-through that system in reliance on consistent application of that
-system; it is up to the author/donor to decide if he or she is willing
-to distribute software through any other system and a licensee cannot
-impose that choice.
-<p>
-<a name="clarify">This section</a>
-is intended to make thoroughly clear what is believed to
-be a consequence of the rest of this License.
-<li>
-<a name="geog">If the distribution</a>
-and/or use of the Program is restricted in
-certain countries either by patents or by copyrighted interfaces, the
-original copyright holder who places the Program under this License
-may add an explicit geographical distribution limitation excluding
-those countries, so that distribution is permitted only in or among
-countries not thus excluded.  In such case, this License incorporates
-the limitation as if written in the body of this License.
-<li>
-<a name="revise">The Free Software Foundation</a>
-may publish revised and/or new versions   
-of the General Public License from time to time.  Such new versions will
-be similar in spirit to the present version, but may differ in detail to
-address new problems or concerns.
-Each version is given a distinguishing version number.  If the Program
-specifies a version number of this License which applies to it and "any
-later version", you have the option of following the terms and conditions
-either of that version or of any later version published by the Free
-Software Foundation.  If the Program does not specify a version number of
-this License, you may choose any version ever published by the Free Software
-Foundation.
-<li>
-<a name="permission">If you wish to incorporate parts</a>
-of the Program into other free
-programs whose distribution conditions are different, write to the author
-to ask for permission.  For software which is copyrighted by the Free
-Software Foundation, write to the Free Software Foundation; we sometimes
-make exceptions for this.  Our decision will be guided by the two goals
-of preserving the free status of all derivatives of our free software and
-of promoting the sharing and reuse of software generally.
-<p>
-<a name="nowarr">NO WARRANTY</a>
-<li>
-<a name="foc">BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,</a>
-THERE IS NO WARRANTY
-FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
-OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
-PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
-OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
-MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
-TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
-PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
-REPAIR OR CORRECTION.
-<li>
-<a name="liable">IN NO EVENT UNLESS REQUIRED</a>
-BY APPLICABLE LAW OR AGREED TO IN WRITING
-WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
-REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
-INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
-OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
-TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
-YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
-PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
-POSSIBILITY OF SUCH DAMAGES.
-</ol>
-END OF TERMS AND CONDITIONS
-</p>
-
-<h3><a name="append" href="/cgi-bin/gp?pg=gpl&pr=append"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Appendix: How to Apply These Terms to Your New Programs
-</h3>
-<p>
-If you develop a new program, and you want it to be of the greatest
-possible use to the public, the best way to achieve this is to make it
-free software which everyone can redistribute and change under these terms.
-<p>
-<a name="attach">To do so,</a>
-attach the following notices to the program.  It is safest
-to attach them to the start of each source file to most effectively
-convey the exclusion of warranty; and each file should have at least
-the "copyright" line and a pointer to where the full notice is found.
-<blockquote>
-&lt;one line
-to give the program's name and a brief idea of what it
-does.&gt;
-Copyright (C) 19yy
-&lt;name of
-author&gt;
-<p>
-<a name="free">This program is free software;</a>
-you can redistribute it and/or modify
-it under the terms of the GNU General Public License as published by
-the Free Software Foundation; either version 2 of the License, or
-(at your option) any later version.
-<p>
-<a name="merchant">This program</a>
-is distributed in the hope that it will be useful,
-but WITHOUT ANY WARRANTY; without even the implied warranty of
-MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
-GNU General Public License for more details.
-<p>
-<a name="ifnot">You should</a>
-have received a copy of the GNU General Public License
-along with this program; if not, write to the Free Software
-Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-</blockquote>
-<p>
-<a name="contact">Also add</a>
-information on how to contact you by electronic and paper mail.
-<p>
-<a name="short">If the program is interactive,</a>
-make it output a short notice like this
-when it starts in an interactive mode:
-<blockquote>
-Gnomovision version 69, Copyright (C) 19yy name of author
-Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
-This is free software, and you are welcome to redistribute it
-under certain conditions; type `show c' for details.
-</blockquote>
-<p>
-<a name="hypo">The hypothetical</a>
-commands `show w' and `show c' should show the appropriate
-parts of the General Public License.  Of course, the commands you use may
-be called something other than `show w' and `show c'; they could even be
-mouse-clicks or menu items--whatever suits your program.
-<p>
-<a name="disclaimer">You should also get your employer</a>
-(if you work as a programmer) or your
-school, if any, to sign a "copyright disclaimer" for the program, if
-necessary.  Here is a sample; alter the names:
-<blockquote>
-Yoyodyne, Inc., hereby disclaims all copyright interest in the program
-`Gnomovision' (which makes passes at compilers) written by James Hacker.
-
-&lt;signature
-of
-Ty Coon&gt;,
-1 April 1989
-<br>
-Ty Coon, President of Vice
-</blockquote>
-<p>
-<a name="library">This General Public License</a>
-does not permit incorporating your program into
-proprietary programs.  If your program is a subroutine library, you may
-consider it more useful to permit linking proprietary applications with the
-library.  If this is what you want to do, use the GNU Library General
-Public License instead of this License.
-</p>
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>
-<font face="arial, helvetica">
-<a rel="begin" href="index.html">Home</a> <font color="#ff0000">
-<b> &#183; </b></font>
-<a rel="next" href="precre.html">Next</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="lopt.html">Site Map</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="legal.html">Legal</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="junkdata.html">Privacy</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="cookies.html">Cookies</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="ijb.html">Banner Ads</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="telemarketing.html">Telemarketing</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="junkmail.html">Mail</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="junkemail.html">Spam</a>
-
-</font><form action="/cgi-bin/search" method="GET">
-<input type="text" name="q" size=60 maxlength=120 value="">
-<input type="submit" value="Search"></form>
-<small>
-<small>
-<p>
-<a href="legal.html#copy">Copyright</a> &#169; 1996-8 Junkbusters
-<a href="legal.html#marks">&#174;</a> Corporation.
-Copying and distribution permitted under
-the <a href="gpl.html"><small>GNU</small></a>
-General Public License.
-</small>
-<tt>
-1998/10/31
-http://www.junkbusters.com/ht/en/gpl.html
-</tt>
-<address><kbd>webmaster&#64;junkbusters.com</kbd></address>
-</small>
-</body>
+  <head>
+    <title>The GNU General Public License</title>
+    <meta name="description" content=
+    "GNU General Public License, as used by Junkbuster">
+    <meta name="keywords" content="">
+<style type="text/css">
+<!--
+h2           { text-align: Center; font-family: arial, helvetica, sans-serif }
+p.sans       { font-family: arial, helvetica, sans-serif }
+b.dot        { color: #FF0000 }
+-->
+</style>
+  </head>
+
+  <body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink=
+  "#787878">
+    <p class="sans"><a href="http://ijbswa.sourceforge.net/">
+    Website</a> <b class="dot">&middot;</b> <a href="ijbman.html">
+    Manual</a> <b class="dot">&middot;</b> <a href="ijbfaq.html">
+    FAQ</a> <b class="dot">&middot;</b> <b>GPL</b></p>
+
+    <h1 align="center"><a name="top_of_page">Internet J<small>UNK<i
+    style="color: #FF0000">BUSTER</i></small> License</a></h1>
+
+    <h1>This document is out of date</h1>
+
+    <p><b>Development of JunkBuster is ongoing and this document is
+    no longer current. However, it may provide some assistance. If
+    you have problems, please use the <a href=
+    "http://groups.yahoo.com/group/junkbuster-users/">Yahoo Groups
+    mailing list</a> (which includes an archive of mail), the
+    SourceForge.net <a href=
+    "http://sourceforge.net/projects/ijbswa/">project page</a>, or
+    see the project's <a href="http://ijbswa.sourceforge.net/">home
+    page</a>. Please also bear in mind that versions 2.9.x of
+    JunkBuster are development releases, and are not production
+    quality.</b></p>
+
+    <h3 align="center">The GNU General Public License</h3>
+
+    <p class="sans"><a name="notus"><b>We did not write the GPL:
+    the <a href="http://www.fsf.org/fsf/fsf.html">Free Software
+    Foundation</a> did</b></a></p>
+
+    <h3><img border="0" width="14" height="14" src="fb.gif" alt=
+    "*">&nbsp; The GPL allows copying and changing of copyrighted
+    documents</h3>
+
+    <p><a name="fsf">The Free Software Foundation</a> <a href=
+    "http://www.fsf.org/fsf/fsf.html">(FSF)</a> is a non-profit
+    institution that designed the GNU General Public License (GPL)
+    to promote the publication of free software. The GPL is used by
+    thousands of programmers who want to give others the right to
+    copy and modify the source code of their programs. Millions of
+    people benefit from this.</p>
+
+    <p><a name="junkbuster">We use the GPL</a> to allow everyone to
+    use, copy and modify the Internet Junkbuster as they wish. <a
+    name="separate">Companies can use it for commercial
+    purposes,</a> but they are not permitted to use it in products
+    that they claim as their property.</p>
+
+    <p><a name="text">The GPL</a> can also be used on documents
+    written in human languages. This documentation for the Internet
+    Junkbuster is also under the GPL. This means that you do not
+    have to break copyright laws in order to print a page or email
+    a screen of the text to someone, for example.</p>
+
+    <p><a name="rest">The</a> remainder of this page is the text of
+    the GPL. As legal documents go it's relatively clear, but
+    unfortunately it's fairly long because it has to cover a lot of
+    details. The HTML formatting is ours, and should not be
+    misinterpreted as changing the license in any way.</p>
+
+    <p align="center"><a href="#top_of_page"><img border="0" width=
+    "250" height="15" src="top.gif" alt=
+    "--- Back to Top of Page ---"></a></p>
+
+    <h2><a name="v2">Version 2, June 1991</a></h2>
+
+    <blockquote>
+      <a name="crn">Copyright 1989, 1991</a><br>
+       <a name="address">Free Software Foundation, Inc.</a><br>
+       675 Mass Ave.<br>
+       Cambridge, MA 02139<br>
+       USA
+    </blockquote>
+    <a name="changing">Everyone</a> 
+
+    <p>is permitted to copy and distribute verbatim copies of this
+    license document, but changing it is not allowed.</p>
+
+    <h3><a name="pream"><img border="0" width="14" height="14" src=
+    "fb.gif" alt="*"></a>&nbsp; Preamble</h3>
+
+    <p>The licenses for most software are designed to take away
+    your freedom to share and change it. By contrast, the GNU
+    General Public License is intended to guarantee your freedom to
+    share and change free software--to make sure the software is
+    free for all its users. This General Public License applies to
+    most of the Free Software Foundation's software and to any
+    other program whose authors commit to using it. (Some other
+    Free Software Foundation software is covered by the GNU Library
+    General Public License instead.) You can apply it to your
+    programs, too.</p>
+
+    <p><a name="freedom">When we speak of free software,</a> we are
+    referring to freedom, not price. Our General Public Licenses
+    are designed to make sure that you have the freedom to
+    distribute copies of free software (and charge for this service
+    if you wish), that you receive source code or can get it if you
+    want it, that you can change the software or use pieces of it
+    in new free programs; and that you know you can do these
+    things.</p>
+
+    <p><a name="forbid">To protect your rights,</a> we need to make
+    restrictions that forbid anyone to deny you these rights or to
+    ask you to surrender the rights. These restrictions translate
+    to certain responsibilities for you if you distribute copies of
+    the software, or if you modify it.</p>
+
+    <p><a name="allrights">For example,</a> if you distribute
+    copies of such a program, whether gratis or for a fee, you must
+    give the recipients all the rights that you have. You must make
+    sure that they, too, receive or can get the source code. And
+    you must show them these terms so they know their rights.</p>
+
+    <p><a name="steps">We protect your rights with two steps:</a>
+    (1) copyright the software, and (2) offer you this license
+    which gives you legal permission to copy, distribute and/or
+    modify the software.</p>
+
+    <p><a name="protection">Also,</a> for each author's protection
+    and ours, we want to make certain that everyone understands
+    that there is no warranty for this free software. If the
+    software is modified by someone else and passed on, we want its
+    recipients to know that what they have is not the original, so
+    that any problems introduced by others will not reflect on the
+    original authors' reputations.</p>
+
+    <p><a name="threat">Finally,</a> any free program is threatened
+    constantly by software patents. We wish to avoid the danger
+    that redistributors of a free program will individually obtain
+    patent licenses, in effect making the program proprietary. To
+    prevent this, we have made it clear that any patent must be
+    licensed for everyone's free use or not licensed at all.</p>
+
+    <p><a name="terms">The precise terms and conditions</a> for
+    copying, distribution and modification follow.</p>
+
+    <h3><a name="tnc"><img border="0" width="14" height="14" src=
+    "fb.gif" alt="*"></a>&nbsp; GNU General Public License: Terms
+    and Conditions for Copying, Distribution and Modification</h3>
+
+    <p><a name="applies">O.</a> This License applies to any program
+    or other work which contains a notice placed by the copyright
+    holder saying it may be distributed under the terms of this
+    General Public License. The "Program", below, refers to any
+    such program or work, and a "work based on the Program" means
+    either the Program or any derivative work under copyright law:
+    that is to say, a work containing the Program or a portion of
+    it, either verbatim or with modifications and/or translated
+    into another language. (Hereinafter, translation is included
+    without limitation in the term "modification".) Each licensee
+    is addressed as "you".</p>
+
+    <p><a name="scope">Activities</a> other than copying,
+    distribution and modification are not covered by this License;
+    they are outside its scope. The act of running the Program is
+    not restricted, and the output from the Program is covered only
+    if its contents constitute a work based on the Program
+    (independent of having been made by running the Program).</p>
+
+    <p><a name="depends">Whether that is true depends on what the
+    Program does.</a><br>
+    </p>
+
+    <ol type="1">
+      <li>
+        <a name="verbatim">You may copy</a> and distribute verbatim
+        copies of the Program's source code as you receive it, in
+        any medium, provided that you conspicuously and
+        appropriately publish on each copy an appropriate copyright
+        notice and disclaimer of warranty; keep intact all the
+        notices that refer to this License and to the absence of
+        any warranty; and give any other recipients of the Program
+        a copy of this License along with the Program. 
+
+        <p><a name="fee">You may charge a fee</a> for the physical
+        act of transferring a copy, and you may at your option
+        offer warranty protection in exchange for a fee.</p>
+      </li>
+
+      <li>
+        <a name="modify">You may modify</a> your copy or copies of
+        the Program or any portion of it, thus forming a work based
+        on the Program, and copy and distribute such modifications
+        or work under the terms of Section 1 above, provided that
+        you also meet all of these conditions:<br>
+         
+
+        <ol type="a">
+          <li><a name="notices">You must cause</a> the modified
+          files to carry prominent notices stating that you changed
+          the files and the date of any change.</li>
+
+          <li><a name="nocharge">You must</a> cause any work that
+          you distribute or publish, that in whole or in part
+          contains or is derived from the Program or any part
+          thereof, to be licensed as a whole at no charge to all
+          third parties under the terms of this License.</li>
+
+          <li><a name="interactive">If the modified program</a>
+          normally reads commands interactively when run, you must
+          cause it, when started running for such interactive use
+          in the most ordinary way, to print or display an
+          announcement including an appropriate copyright notice
+          and a notice that there is no warranty (or else, saying
+          that you provide a warranty) and that users may
+          redistribute the program under these conditions, and
+          telling the user how to view a copy of this License.
+          (Exception: if the Program itself is interactive but does
+          not normally print such an announcement, your work based
+          on the Program is not required to print an
+          announcement.)</li>
+        </ol>
+
+        <p><a name="sections">These requirements</a> apply to the
+        modified work as a whole. If identifiable sections of that
+        work are not derived from the Program, and can be
+        reasonably considered independent and separate works in
+        themselves, then this License, and its terms, do not apply
+        to those sections when you distribute them as separate
+        works. But when you distribute the same sections as part of
+        a whole which is a work based on the Program, the
+        distribution of the whole must be on the terms of this
+        License, whose permissions for other licensees extend to
+        the entire whole, and thus to each and every part
+        regardless of who wrote it.</p>
+
+        <p><a name="intent">Thus,</a> it is not the intent of this
+        section to claim rights or contest your rights to work
+        written entirely by you; rather, the intent is to exercise
+        the right to control the distribution of derivative or
+        collective works based on the Program.</p>
+
+        <p><a name="aggregation">In addition,</a> mere aggregation
+        of another work not based on the Program with the Program
+        (or with a work based on the Program) on a volume of a
+        storage or distribution medium does not bring the other
+        work under the scope of this License.</p>
+      </li>
+
+      <li>
+        <a name="exeutable">You may copy</a> and distribute the
+        Program (or a work based on it, under Section 2) in object
+        code or executable form under the terms of Sections 1 and 2
+        above provided that you also do one of the following:<br>
+         
+
+        <ol type="a">
+          <li><a name="medium">Accompany it</a> with the complete
+          corresponding machine-readable source code, which must be
+          distributed under the terms of Sections 1 and 2 above on
+          a medium customarily used for software interchange;
+          or,</li>
+
+          <li><a name="written">Accompany it with a written
+          offer,</a> valid for at least three years, to give any
+          third party, for a charge no more than your cost of
+          physically performing source distribution, a complete
+          machine-readable copy of the corresponding source code,
+          to be distributed under the terms of Sections 1 and 2
+          above on a medium customarily used for software
+          interchange; or,</li>
+
+          <li><a name="distrib">Accompany it</a> with the
+          information you received as to the offer to distribute
+          corresponding source code. (This alternative is allowed
+          only for noncommercial distribution and only if you
+          received the program in object code or executable form
+          with such an offer, in accord with Subsection b
+          above.)</li>
+        </ol>
+
+        <p><a name="preferred">The source code</a> for a work means
+        the preferred form of the work for making modifications to
+        it. For an executable work, complete source code means all
+        the source code for all modules it contains, plus any
+        associated interface definition files, plus the scripts
+        used to control compilation and installation of the
+        executable. However, as a special exception, the source
+        code distributed need not include anything that is normally
+        distributed (in either source or binary form) with the
+        major components (compiler, kernel, and so on) of the
+        operating system on which the executable runs, unless that
+        component itself accompanies the executable.</p>
+
+        <p><a name="access">If distribution of executable or object
+        code is made</a> by offering access to copy from a
+        designated place, then offering equivalent access to copy
+        the source code from the same place counts as distribution
+        of the source code, even though third parties are not
+        compelled to copy the source along with the object
+        code.</p>
+      </li>
+
+      <li><a name="otherwise">You may not copy,</a> modify,
+      sublicense, or distribute the Program except as expressly
+      provided under this License. Any attempt otherwise to copy,
+      modify, sublicense or distribute the Program is void, and
+      will automatically terminate your rights under this License.
+      However, parties who have received copies, or rights, from
+      you under this License will not have their licenses
+      terminated so long as such parties remain in full
+      compliance.</li>
+
+      <li><a name="voluntary">You are not required</a> to accept
+      this License, since you have not signed it. However, nothing
+      else grants you permission to modify or distribute the
+      Program or its derivative works. These actions are prohibited
+      by law if you do not accept this License. Therefore, by
+      modifying or distributing the Program (or any work based on
+      the Program), you indicate your acceptance of this License to
+      do so, and all its terms and conditions for copying,
+      distributing or modifying the Program or works based on
+      it.</li>
+
+      <li><a name="redistrib">Each time you redistribute</a> the
+      Program (or any work based on the Program), the recipient
+      automatically receives a license from the original licensor
+      to copy, distribute or modify the Program subject to these
+      terms and conditions. You may not impose any further
+      restrictions on the recipients' exercise of the rights
+      granted herein. You are not responsible for enforcing
+      compliance by third parties to this License.</li>
+
+      <li>
+        <a name="patent">If, as a consequence of a court
+        judgment</a> or allegation of patent infringement or for
+        any other reason (not limited to patent issues), conditions
+        are imposed on you (whether by court order, agreement or
+        otherwise) that contradict the conditions of this License,
+        they do not excuse you from the conditions of this License.
+        If you cannot distribute so as to satisfy simultaneously
+        your obligations under this License and any other pertinent
+        obligations, then as a consequence you may not distribute
+        the Program at all. For example, if a patent license would
+        not permit royalty-free redistribution of the Program by
+        all those who receive copies directly or indirectly through
+        you, then the only way you could satisfy both it and this
+        License would be to refrain entirely from distribution of
+        the Program. 
+
+        <p><a name="invalid">If any portion</a> of this section is
+        held invalid or unenforceable under any particular
+        circumstance, the balance of the section is intended to
+        apply and the section as a whole is intended to apply in
+        other circumstances.</p>
+
+        <p><a name="induce">It is not the purpose</a> of this
+        section to induce you to infringe any patents or other
+        property right claims or to contest validity of any such
+        claims; this section has the sole purpose of protecting the
+        integrity of the free software distribution system, which
+        is implemented by public license practices. Many people
+        have made generous contributions to the wide range of
+        software distributed through that system in reliance on
+        consistent application of that system; it is up to the
+        author/donor to decide if he or she is willing to
+        distribute software through any other system and a licensee
+        cannot impose that choice.</p>
+
+        <p><a name="clarify">This section</a> is intended to make
+        thoroughly clear what is believed to be a consequence of
+        the rest of this License.</p>
+      </li>
+
+      <li><a name="geog">If the distribution</a> and/or use of the
+      Program is restricted in certain countries either by patents
+      or by copyrighted interfaces, the original copyright holder
+      who places the Program under this License may add an explicit
+      geographical distribution limitation excluding those
+      countries, so that distribution is permitted only in or among
+      countries not thus excluded. In such case, this License
+      incorporates the limitation as if written in the body of this
+      License.</li>
+
+      <li><a name="revise">The Free Software Foundation</a> may
+      publish revised and/or new versions of the General Public
+      License from time to time. Such new versions will be similar
+      in spirit to the present version, but may differ in detail to
+      address new problems or concerns. Each version is given a
+      distinguishing version number. If the Program specifies a
+      version number of this License which applies to it and "any
+      later version", you have the option of following the terms
+      and conditions either of that version or of any later version
+      published by the Free Software Foundation. If the Program
+      does not specify a version number of this License, you may
+      choose any version ever published by the Free Software
+      Foundation.</li>
+
+      <li>
+        <a name="permission">If you wish to incorporate parts</a>
+        of the Program into other free programs whose distribution
+        conditions are different, write to the author to ask for
+        permission. For software which is copyrighted by the Free
+        Software Foundation, write to the Free Software Foundation;
+        we sometimes make exceptions for this. Our decision will be
+        guided by the two goals of preserving the free status of
+        all derivatives of our free software and of promoting the
+        sharing and reuse of software generally. 
+
+        <p><a name="nowarr">NO WARRANTY</a></p>
+      </li>
+
+      <li><a name="foc">BECAUSE THE PROGRAM IS LICENSED FREE OF
+      CHARGE,</a> THERE IS NO WARRANTY FOR THE PROGRAM, TO THE
+      EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
+      STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
+      PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND,
+      EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
+      THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
+      PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
+      PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM
+      PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
+      SERVICING, REPAIR OR CORRECTION.</li>
+
+      <li><a name="liable">IN NO EVENT UNLESS REQUIRED</a> BY
+      APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT
+      HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE
+      THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
+      INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
+      DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
+      PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
+      BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
+      PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
+      PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
+      ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.</li>
+    </ol>
+
+    <p>END OF TERMS AND CONDITIONS<br>
+    <br>
+    </p>
+
+    <h3><a name="append"><img border="0" width="14" height="14"
+    src="fb.gif" alt="*"></a>&nbsp; Appendix: How to Apply These
+    Terms to Your New Programs</h3>
+
+    <p>If you develop a new program, and you want it to be of the
+    greatest possible use to the public, the best way to achieve
+    this is to make it free software which everyone can
+    redistribute and change under these terms.</p>
+
+    <p><a name="attach">To do so,</a> attach the following notices
+    to the program. It is safest to attach them to the start of
+    each source file to most effectively convey the exclusion of
+    warranty; and each file should have at least the "copyright"
+    line and a pointer to where the full notice is found.</p>
+
+    <blockquote>
+      &lt;one line to give the program's name and a brief idea of
+      what it does.&gt; Copyright (C) 19yy &lt;name of author&gt; 
+
+      <p><a name="free">This program is free software;</a> you can
+      redistribute it and/or modify it under the terms of the GNU
+      General Public License as published by the Free Software
+      Foundation; either version 2 of the License, or (at your
+      option) any later version.</p>
+
+      <p><a name="merchant">This program</a> is distributed in the
+      hope that it will be useful, but WITHOUT ANY WARRANTY;
+      without even the implied warranty of MERCHANTABILITY or
+      FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public
+      License for more details.</p>
+
+      <p><a name="ifnot">You should</a> have received a copy of the
+      GNU General Public License along with this program; if not,
+      write to the Free Software Foundation, Inc., 675 Mass Ave,
+      Cambridge, MA 02139, USA.</p>
+    </blockquote>
+
+    <p><a name="contact">Also add</a> information on how to contact
+    you by electronic and paper mail.</p>
+
+    <p><a name="short">If the program is interactive,</a> make it
+    output a short notice like this when it starts in an
+    interactive mode:</p>
+
+    <blockquote>
+      Gnomovision version 69, Copyright (C) 19yy name of author
+      Gnomovision comes with ABSOLUTELY NO WARRANTY; for details
+      type `show w'. This is free software, and you are welcome to
+      redistribute it under certain conditions; type `show c' for
+      details.
+    </blockquote>
+
+    <p><a name="hypo">The hypothetical</a> commands `show w' and
+    `show c' should show the appropriate parts of the General
+    Public License. Of course, the commands you use may be called
+    something other than `show w' and `show c'; they could even be
+    mouse-clicks or menu items--whatever suits your program.</p>
+
+    <p><a name="disclaimer">You should also get your employer</a>
+    (if you work as a programmer) or your school, if any, to sign a
+    "copyright disclaimer" for the program, if necessary. Here is a
+    sample; alter the names:</p>
+
+    <blockquote>
+      Yoyodyne, Inc., hereby disclaims all copyright interest in
+      the program `Gnomovision' (which makes passes at compilers)
+      written by James Hacker. &lt;signature of Ty Coon&gt;, 1
+      April 1989<br>
+       Ty Coon, President of Vice
+    </blockquote>
+
+    <p><a name="library">This General Public License</a> does not
+    permit incorporating your program into proprietary programs. If
+    your program is a subroutine library, you may consider it more
+    useful to permit linking proprietary applications with the
+    library. If this is what you want to do, use the GNU Library
+    General Public License instead of this License.</p>
+
+    <p align="center"><a href="#top_of_page"><img border="0" width=
+    "250" height="15" src="top.gif" alt=
+    "--- Back to Top of Page ---"></a></p>
+
+    <p class="sans"><a href="http://ijbswa.sourceforge.net/">
+    Website</a> <b class="dot">&middot;</b> <a href="ijbman.html">
+    Manual</a> <b class="dot">&middot;</b> <a href="ijbfaq.html">
+    FAQ</a> <b class="dot">&middot;</b> <b>GPL</b></p>
+
+    <p class="sans"><small><small><a href="gpl.html#text">
+    Copyright</a> &copy; 1996-8 <a href=
+    "http://www.junkbusters.com/">Junkbusters</a> <a href=
+    "http://www.junkbusters.com/ht/en/legal.html#marks">&reg;</a>
+    Corporation. <a href="gpl.html#text">Copyright</a> &copy; 2001
+    <a href="http://sourceforge.net/projects/ijbswa/">Jon
+    Foster</a>. Copying and distribution permitted under the <a
+    href="gpl.html">GNU</a> General Public License. The text of the
+    GNU GPL itself is copyrighted by the FSF, and may be copied but
+    not modified.</small></small></p>
+
+    <p><small><code><a href=
+    "http://sourceforge.net/projects/ijbswa/">
+    http://sourceforge.net/projects/ijbswa/</a></code></small></p>
+  </body>
 </html>
+
diff --git a/doc/ijbfaq.html b/doc/ijbfaq.html
index ab7e7989..f9168a68 100644
--- a/doc/ijbfaq.html
+++ b/doc/ijbfaq.html
@@ -1,3186 +1,1999 @@
-<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
+<!-- $Id$
+
+     See copyright details at end of file
+
+     After changing this file, please run it through "HTML Tidy"
+     (from http://www.w3.org/People/Raggett/tidy/)
+     It should have no warnings or errors.
+-->
+
 <html>
-<head>
-<!-- Copyright 1996-8 Junkbusters Corporation -->
-<!-- This work comes with NO WARRANTY -->
-<!-- It may be redistributed and modified under the GNU GPL-->
-<!-- See the body of http://www.junkbusters.com/ht/en/gpl.html for details-->
-<!-- Junkbusters is a registered trade mark of Junkbusters Corporation -->
-<!-- Generated 1998/10/31 03:58:25 UTC -->
-<meta name="Generator" content="Junkbusters Ebira $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $">
-<!-- Document  ID: $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $ -->
-<title>
-Internet Junkbuster Frequently Asked Questions
-</title>
-<base href="http://www.junkbusters.com/ht/en/ijbfaq.html">
-<meta name="description" content="An extensive FAQ on the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser.">
-<meta name="keywords" content="stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, spamoff, declare, telemarketing, telemarketers, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, conservation, recycling, catalogs, consumer, sending, opt out , privacy, advertising, direct, marketing, targeting, through, click, trails, http_referer, cookie, cutter, iff, internet fast forward, Cookie Management Tool">
-<link rel="next" href="ijbman.html">
-<link rel="previous" href="ijb.html">
-<link rel="contents" href="toc.html">
-</head>
-<body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink="#787878">
-<center>
-<h1><a name="top_of_page">Internet J<small>UNK<i><font color=red>BUSTER</font></i></small> Frequently Asked Questions
-</a></h1>
-</center>
-<font face="arial, helvetica">
-<p align="center">
-<a href="#u">Download for UNIX</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="ijbwin.html#zip">(Download for Windows 95/NT)</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="ijbdist.html#top_of_page">(Other OS)</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="#browser">Configuring Browsers</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="#local">Installation</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="#companies">For Companies</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="#blocking">Blocking</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="#cookies">Cookies</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="#anonymity">Anonymity</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="#security">Security</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="ijbman.html#top_of_page">(Technical Manual)</a>
-</p>
-</font><br>
-<center>
-<h2><a name="top"><font face="arial, helvetica">
-The Top Ten Questions
-</font></a>
-</h2>
-</center>
-<br>For a list of the questions on this page (without the answers),
-see our
-<a href="toc.html#ijbfaq">Table of Contents.</a>
-It also contains detailed pointers into our pages
-on
-<a href="cookies.html">cookies</a>
-and on busting 
-<a href="junkemail.html">junk e-mail,</a>
-<a href="junkmail.html">junk mail</a>
-and
-<a href="telemarketing.html">telemarketing calls.</a>
-
-<h3><a name="what" href="/cgi-bin/gp?pg=ijbfaq&pr=what"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-What is the Internet Junkbuster Proxy and what does it do for me?
-</h3>
-<p>
-The
-Internet Junkbuster
-Proxy
-<a href="legal.html#marks"><small><sup>TM</sup></small></a>
-is
-<a href="ijbfaq.html#free">free</a>
-privacy-enhancing software that can be run on your PC or by your
-<small>ISP</small>
-or company.
-It blocks requests for
-<small>URL</small>s
-(typically banner ads)
-that match its
-<a href="ijbfaq.html#blocking">blockfile.</a>
-It also deletes unauthorized
-<a href="ijbfaq.html#cookies">cookies</a>
-and other
-unwanted identifying
-<a href="ijbfaq.html#anonymity">header information</a>
-that is exchanged between web servers and browsers.
-These headers are not normally accessible to users
-(even though they may contain information that's important to your privacy),
-but with the
-Internet Junkbuster
-you can see almost
-<a href="ijbman.html#o_d">anything you want</a>
-and control everything you're likely to need.
-<b>You</b>
-<a href="over.html#you_def">decide what's junk.</a>
-<a href="legal.html#marks"><small><sup>SM</sup></small></a>
-Many people
-<a href="ijbfaq.html#readymade">publish</a>
-their blockfiles to help others get started.
-</p>
-
-<h3><a name="free" href="/cgi-bin/gp?pg=ijbfaq&pr=free"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Is there a license fee / warranty / registration form / expiration?
-</h3>
-<p>
-No, none of these.
-It's completely free of charge.
-Junkbusters
-offers you the software to copy, use, modify and distribute
-as you wish, forever, at
-<a href="over.html#nobucks">no charge</a>
-under the
-<a href="gpl.html">GNU General Public License.</a>
-<p>
-<a name="warranty">It comes with</a>
-<a href="gpl.html#nowarr">no warranty of any kind.</a>
-<p>
-<a name="register">You don't have to register,</a>
-in fact we don't even provide a way to do so:
-the practice of registering software is
-usually just an
-excuse
-to send you solicitations and
-<a href="self.html#warranty">sell your name</a>
-and information about your behavior.
-You are welcome to obtain and use our software as anonymously you wish.
-(Your
-<small>IP</small>
-address will naturally be
-<a href="http://www.junkbusters.com/cgi-bin/privacy">disclosed</a>
-when you download it,
-so if you work for a web ad company
-you might want to use a service such as the
-<a href="ijbfaq.html#anonymizing">lpwa.com</a>
-when you get it.
-We
-<a href="over.html#nopriv">never</a>
-want to be given any information that you consider private or confidential.)
-<p>
-<a name="why">We are often asked why we give away a product that many</a>
-would happily pay for.
-The answer is that we are determined to carry out our
-<a href="over.html">mission:</a>
-to free the world from junk communications.
-</p>
-
-<h3><a name="windows" href="/cgi-bin/gp?pg=ijbfaq&pr=windows"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Does it run on Windows? On a Mac? On the AOL browser?
-</h3>
-<p>
-For the latest information on availability, see the
-<a href="ijbdist.html">Distribution Information</a>
-page.
-We
-<a href="ijbdist.html#win3.1">don't</a>
-think it will ever run on
-Windows 3.1.
-But you don't need to have it running on your computer
-if you get your
-<small>ISP</small>
-or Systems Administrator at
-<a href="ijbfaq.html#companies">work</a>
-to run it.
-</p>
-
-<h3><a name="isp" href="/cgi-bin/gp?pg=ijbfaq&pr=isp"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How can I get my ISP to run the Internet Junkbuster?
-</h3>
-<p>
-Try their sales or support department
-(depending on whether you are already a customer).
-<a name="unaware">You might send them email including the following</a>
-<small>URL</small>:
-<br>
-&#160;&#160;&#160;<big><kbd>http://www.junkbusters.com/ht/en/ijbfaq.html#isps</kbd></big>
-<br>
-<a name="switch">You could mention that many</a>
-<a href="ijbfaq.html#does">other</a>
-<small>ISP</small>s
-provide it,
-and that you regard it as an important part of your decision on
-where to buy Internet service.
-</p>
-
-<h3><a name="who" href="/cgi-bin/gp?pg=ijbfaq&pr=who"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Who chooses the options that control what is blocked?
-</h3>
-<p>
-Whoever starts the
-Internet Junkbuster
-chooses the options and the blockfile.
-If your 
-<small>ISP</small>
-runs it for you, they have to make these decision
-(though
-<a href="http://www.lunatech.com/proxy/">some</a>
-may give you a choice of proxies,
-and a way to suggest new
-<small>URL</small>s
-to block).
-If you run it on your computer,
-<b>You</b>
-<a href="over.html#you_def">decide what's junk.</a>
-<a href="legal.html#marks"><small><sup>SM</sup></small></a>
-</p>
-
-<h3><a name="self" href="/cgi-bin/gp?pg=ijbfaq&pr=self"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How do I download and run the program on my computer?
-</h3>
-<p>
-It depends on your platform.
-If you are using Windows 95 or NT,
-see our separate page on
-<a href="ijbwin.html">installing under Windows.</a>
-If you have a C compiler and are using almost any flavor of
-<small>UNIX <a href="legal.html#not_our_trademark">&#174;</a></small>
-you
-<a href="ijbfaq.html#local">download it, compile it, start it running,</a>
-and then
-<a href="ijbfaq.html#browser">configure your browser.</a>
-Several precompiled packages are also available through links in our
-<a href="ijbdist.html">distribution page</a>,
-which lists all available platforms.
-<p>
-<a name="port">If you are using a platform for which we have no current</a>
-availability,
-you are welcome to port the code.
-If you do this and you would like us to consider publishing your ported version,
-please
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=port">tell us.</a>
-</p>
-
-<h3><a name="show" href="/cgi-bin/gp?pg=ijbfaq&pr=show"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How can I tell which blockfile and options are being used?
-</h3>
-<p>
-Just point your browser to
-<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a>
-or to any
-<small>URL</small>
-ending in
-<big><kbd>show-proxy-args</kbd></big>
-(even if it doesn't exist).
-It needn't exist because the
-Internet Junkbuster 2.0
-intercepts the request, blocks it,
-and returns in its place
-information about itself.
-Using the
-<small>URL</small>
-above is useful for checking that your browser really is
-going through an
-Internet Junkbuster,
-because the
-<big><kbd>junkbuster.com</kbd></big>
-server returns a warning if the request actually gets to it.
-Some people set the home page of their browser to such a
-<small>URL</small>
-to be sure that it is configured to use the proxy.
-<p>
-<a name="headers">If you wish to check the header information</a>
-your proxy is actually sending,
-a visit to
-<a href="http://internet.junkbuster.com/cgi-bin/show-http-headers">http://internet.junkbuster.com/cgi-bin/show-http-headers</a>
-will give you the more relevant ones first.
-You might also like to turn the proxy
-<a href="ijbfaq.html#discontinue">off</a>
-and compare the difference. (Don't forget to turn it back on again.)
-</p>
-
-<h3><a name="responding" href="/cgi-bin/gp?pg=ijbfaq&pr=responding"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-My browser started giving me ``server not responding'' messages
-</h3>
-<p>
-Once your browser is told to use a proxy such as the
-Internet Junkbuster,
-it thinks of it as its server for everything,
-so this message means it can't talk to the proxy.
-The
-Internet Junkbuster
-may not be running,
-or you may have specified its proxy
-<a href="ijbfaq.html#address">address</a>
-incorrectly.
-Check that the details you entered are correct.
-If you have
-<big><kbd>telnet</kbd></big>
-you can try connecting to the appropriate port to see if the
-Internet Junkbuster
-is running.
-If your
-<small>ISP</small>
-is running the
-Internet Junkbuster,
-you may want to check with them.
-If you are running it yourself under
-<small>UNIX <a href="legal.html#not_our_trademark">&#174;</a></small>,
-try looking at a
-<big><kbd>ps ax</kbd></big>
-to see if it is running.
-The
-<a href="ijbman.html#o_h">port</a>
-specified in its options should be the same one as your
-browser has configured.
-</p>
-
-<h3><a name="idea" href="/cgi-bin/gp?pg=ijbfaq&pr=idea"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-I've got this great idea for a new feature. Who do I tell?
-</h3>
-<p>
-We'd be very interested to hear it, but please bear a few things in mind.
-<br><ul  type="1">
-<li>
-<a name="considered">Please check this FAQ to see if we've already considered</a>
-the idea,
-such as
-<a href="ijbfaq.html#size">automatic detection</a>
-of banner ads
-and
-<a href="ijbfaq.html#broken">replacing ads</a>
-with something else such as a
-transparent
-<small>GIF</small>.
-<li>
-<a name="confidential">Don't tell us anything you want to keep confidential</a>
-or retain some right over.
-<li>
-<a name="wish">We currently have a</a>
-long wish list of things that we may or may not do
-in the near future, including
-a version for your favorite computer and a plug-in version.
-<li>
-<a name="go4it">If you don't want to wait</a>
-you're welcome to improve on our code, publish your version on the Web,
-and
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=idea">tell us</a>
-where to find it.
-Projects that are especially welcome
-include
-a port to the Mac
-and extensions for
-<small>HTTP</small>
-1.1.
-</ul>
-</p>
-
-<h3><a name="other" href="/cgi-bin/gp?pg=ijbfaq&pr=other"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-My question isn't listed here. Who do I ask for support?
-</h3>
-<p>
-<a name="harder">If you find using our free product</a>
-harder than you're used to for consumer software,
-there are many
-<a href="links.html#WebWiper">commercial alternatives</a>
-that you could consider.
-<p>
-<a name="RTM">The answer to detailed technical questions may be answered in</a>
-<a href="ijbman.html">manual page</a>,
-or in the source code.
-Also double-check this page for an answer:
-using the ``find'' feature on your browser for likely keywords may help.
-Our site also has a
-<a href="search.html">search</a>
-feature.
-<p>
-<a name="Use">Many people post requests for help and responses on</a>
-<a href="http://search.dejanews.com/dnquery.xp?query=junkbuster&site=excite">Usenet.</a>
-<p>
-<a name="them">If your</a>
-<small>ISP</small>
-is providing
-the
-Internet Junkbuster
-for you,
-and your question is about how to use it,
-check their web page before asking them.
-<p>
-<a name="us">Even though we don't offer the kind of</a>
-support you might expect if you paid a lot of money for a software product,
-you can still ask us.
-But before you do, please consider whether
-you could ask someone closer to you.
-And please be patient if we're slow to reply: we
-<a href="over.html#nobucks">never charge consumers </a>
-for our services,
-so we have to subsidize consumers with revenue from companies,
-and our resources are limited.
-<p>
-<a name="quote">If your company or organization</a>
-would be interested in a maintenance contract
-with phone and email support,
-hard copy documentation and source code and pre-compiled binaries on tape
-or disk,
-please
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=quote">ask us</a>
-for a quote.
-</p>
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>
-<br>
-<center>
-<h2><a name="browser"><font face="arial, helvetica">
-Configuring your browser to talk to the Internet Junkbuster
-</font></a>
-</h2>
-</center>
-<br>
-<h3><a name="address" href="/cgi-bin/gp?pg=ijbfaq&pr=address"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-What is the proxy address of the Internet Junkbuster?
-</h3>
-<p>
-<a name="localhost">If you set up</a>
-the
-Internet Junkbuster
-to run on the computer you browse from
-(rather than your
-<small>ISP</small>'s server
-or some networked computer at work),
-the proxy will be on
-<big><kbd>localhost</kbd></big>
-(which is the special name used by every computer on the Internet to
-refer to itself)
-and
-the port will be
-<big><kbd>8000</kbd></big>
-(unless you have told the
-Internet Junkbuster
-to
-run on a different port with the
-<a href="ijbman.html#listen-address">listen-address</a>
-option).
-So you when
-<a href="ijbfaq.html#set">configuring your browser's proxy settings</a>
-you typically enter the word
-<big><kbd>localhost</kbd></big>
-in the two boxes next to
-<b><font face="arial, helvetica">
-HTTP</font></b>
-and
-<b><font face="arial, helvetica">
-Secure</font></b>,
-and the number
-<big><kbd>8000</kbd></big>
-in the two boxes labelled
-to the right of those boxes.
-<p>
-<a name="remote">If your</a>
-<small>ISP</small>
-or company is running 
-the
-Internet Junkbuster
-for you,
-they will tell you the address to use.
-It will be the name of the computer it's running on
-(or possibly its numeric IP address),
-plus a port number.
-Port 8000 is the default, so assume this number if it is not specified.
-Sometimes a colon is used to glue them together,
-as in
-<big><kbd>junkbuster.fictitous-pro-privacy-isp.net:8000</kbd></big>
-but
-with most browsers
-you do not type the colon,
-you enter the address and port number in separate boxes.
-</p>
-
-<h3><a name="set" href="/cgi-bin/gp?pg=ijbfaq&pr=set"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How do I tell the browser where to find the Internet Junkbuster?
-</h3>
-<p>
-All current browsers can be told the address of a proxy to use.
-You enter the same information in two fields in your browser's proxy
-configuration screen (see list below): one for
-<small>HTTP</small>,
-and one for the Secure Protocol (assuming your browser supports
-<small>SSL</small>).
-If you find some information already entered for your proxy,
-see the
-<a href="ijbfaq.html#already">next question.</a>
-Here are the menus you go through to get to the proxy configuration settings.
-(We also recommend that you
-<a href="links.html#java">disable Java</a>,
-which is a separate operation.)
-<strong>Make notes on the changes you make so you know how to undo them!</strong>
-You will need to know what you did
-in case you wish to
-<a href="ijbfaq.html#discontinue">discontinue</a>
-using the proxy.
-<br><ul  type="1">
-<li>
-<a name="netscape">For</a>
-<a href="http://www.netscape.com/comprod/products/navigator/version_3.0/index.html">Netscape</a>
-2.01, 2.02 and 3.0
-<a href="/images/pcn30.gif">[Graphic Illustration]:</a>
-<b><font face="arial, helvetica">
-Options</font></b>;
-<b><font face="arial, helvetica">
-Network Preferences</font></b>;
-<b><font face="arial, helvetica">
-Proxies</font></b>;
-<b><font face="arial, helvetica">
-Manual Proxy Configuration View ;</font></b>
-enter
-<a href="ijbfaq.html#address">proxy address details</a>
-under
-<b><font face="arial, helvetica">
-HTTP</font></b>
-and
-<b><font face="arial, helvetica">
-Security Proxy</font></b>;
-click on
-<b><font face="arial, helvetica">
-OK</font></b>;
-click on the next
-<b><font face="arial, helvetica">
-OK</font></b>.
-<br>
-With Netscape 2.0,
-follow with
-<b><font face="arial, helvetica">
-Options</font></b>,
-<b><font face="arial, helvetica">
-Save Options</font></b>.
-<br>
-<a name="Netscape4.02">With Netscape 4.X series, you first have to go through</a>
-<b><font face="arial, helvetica">
-Edit/Preferences</font></b>.
-<a href="/images/pcn405.gif">[Graphic Illustration]</a>
-Then in the frame on the left,
-click on triangle pointing to the right towards the word
-<b><font face="arial, helvetica">
-Advanced</font></b>;
-it will switch to a triangle pointing down;
-and the words
-<b><font face="arial, helvetica">
-Cache</font></b>,
-<b><font face="arial, helvetica">
-Proxies</font></b>
-and
-<b><font face="arial, helvetica">
-Disk Space</font></b>
-appear.
-Click on
-<b><font face="arial, helvetica">
-Proxies</font></b>
-and the frame on the right will
-display a banner saying
-<b><font face="arial, helvetica">
-Proxies Configure proxies to access the Internet</font></b>.
-Click the radio button labeled
-<b><font face="arial, helvetica">
-Manual proxy configuration</font></b>
-then click the button labeled
-<b><font face="arial, helvetica">
-View</font></b>;
-enter
-<a href="ijbfaq.html#address">proxy address details</a>
-under
-<b><font face="arial, helvetica">
-HTTP</font></b>
-and
-<b><font face="arial, helvetica">
-Security Proxy</font></b>;
-click on
-<b><font face="arial, helvetica">
-OK</font></b>;
-click on the next
-<b><font face="arial, helvetica">
-OK</font></b>.
-<li>
-<a name="explorer3">For</a>
-<a href="http://www.microsoft.com/ie/support/docs/tech30/">Internet Explorer 3.0:</a>
-<b><font face="arial, helvetica">
-View</font></b>;
-<b><font face="arial, helvetica">
-Options</font></b>;
-<b><font face="arial, helvetica">
-Connections</font></b>;
-tick
-<b><font face="arial, helvetica">
-Connect through proxy server</font></b>
-box;
-<b><font face="arial, helvetica">
-Settings</font></b>;
-enter
-<a href="ijbfaq.html#address">proxy address details</a>
-<b><font face="arial, helvetica">
-HTTP</font></b>
-Box, with port number in the second box;
-same with
-<b><font face="arial, helvetica">
-Secure</font></b>;
-click on
-<b><font face="arial, helvetica">
-OK</font></b>.
-<li>
-<a name="explorer2">For Internet Explorer 2.0: </a>
-<b><font face="arial, helvetica">
-View</font></b>;
-<b><font face="arial, helvetica">
-Options</font></b>;
-<b><font face="arial, helvetica">
-Proxy</font></b>;
-enter
-<a href="ijbfaq.html#address">proxy address details</a>
-click on
-<b><font face="arial, helvetica">
-OK</font></b>.
-<li>
-<a name="nt">On NT for MS-IE:</a>
-<b><font face="arial, helvetica">
-Control Panel</font></b>;
-<b><font face="arial, helvetica">
-Internet</font></b>;
-<b><font face="arial, helvetica">
-Advanced</font></b>;
-<b><font face="arial, helvetica">
-Proxy</font></b>.
-<li>
-<a name="if">For MS-IE 4.0: seems to be almost the same as for</a>
-<a href="ijbfaq.html#explorer3">3.0</a>,
-<b><font face="arial, helvetica">
-View</font></b>;
-<b><font face="arial, helvetica">
-Internet Options</font></b>;
-<b><font face="arial, helvetica">
-Connections</font></b>;
-tick
-<b><font face="arial, helvetica">
-Connect through proxy server</font></b>
-box;
-<b><font face="arial, helvetica">
-Settings</font></b>;
-enter
-<a href="ijbfaq.html#address">proxy address details</a>
-<b><font face="arial, helvetica">
-HTTP</font></b>
-Box, with port number in the second box;
-same with
-<b><font face="arial, helvetica">
-Secure</font></b>;
-click on
-<b><font face="arial, helvetica">
-OK</font></b>.
-Note that 4.0 has
-<b><font face="arial, helvetica">
-Advanced</font></b>
-settings to allow
-<small>HTTP</small>
-1.1 through proxies;
-these must be disabled because the proxy does not currently understand
-<small>HTTP</small>
-1.1.
-Please
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=set">tell us</a>
-if you see any other differences.
-<li>
-<a name="mosaic">For NCSA Mosaic for Windows:</a>
-<b><font face="arial, helvetica">
-Options</font></b>,
-<b><font face="arial, helvetica">
-Preferences</font></b>,
-<b><font face="arial, helvetica">
-Proxy</font></b>;
-enter
-<a href="ijbfaq.html#address">proxy address details</a>
-under
-<b><font face="arial, helvetica">
-HTTP</font></b>.
-<li>
-<a name="Opera">For</a>
-Opera:
-<b><font face="arial, helvetica">
-Preferences</font></b>,
-<b><font face="arial, helvetica">
-Proxy servers</font></b>;
-check the box next to HTTP;
-enter the server and port number in the box on the other side;
-click on
-<b><font face="arial, helvetica">
-OK</font></b>.
-<li>
-<a name="lynx">For</a>
-<a href="http://www.yahoo.com/Computers_and_Internet/Software/Internet/World_Wide_Web/Browsers/Lynx">Lynx,</a>
-<a href="http://www.yahoo.com/Computers_and_Internet/Software/Internet/World_Wide_Web/Browsers/Mosaic/">Mosaic/X,</a>
-<a name ="grail" href="http://monty.cnri.reston.va.us/grail-0.3/">Grail,</a>
-and
-W3O
-<a href="http://www.w3.org/pub/WWW/Arena/">Arena,</a>
-you can specify the proxy via environment variables
-before starting the application.
-This will probably be done with something like either
-<br>
-&#160;&#160;&#160;<big><kbd>setenv http_proxy http://localhost:8000/</kbd></big>
-<br>
-or
-<br>
-&#160;&#160;&#160;<big><kbd>http_proxy=http://junkbuster.fictitous-pro-privacy-isp.net:8000/ export http_proxy</kbd></big>
-<br>
-depending on your shell and where the
-Internet Junkbuster
-lives.
-</ul>
-If your browser is not listed here,
-or if you notice an error, please
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=set">tell us</a>
-the correct procedure.
-</p>
-
-<h3><a name="already" href="/cgi-bin/gp?pg=ijbfaq&pr=already"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-What should I do if I find another proxy is already configured?
-</h3>
-<p>
-Some
-<small>ISP</small>s
-and companies require all Web traffic to go through their proxy.
-In this case you would find your proxy configuration with values already set,
-possibly under
-<a name="Automatic">Automatic Proxy Configuration</a>
-(in the case of 
-<a href="http://home.netscape.com/eng/mozilla/2.0/relnotes/demo/proxy-live.html">Netscape</a>
-and
-<a href="http://ieak.microsoft.com/">MS-IE 3.0</a>
-and above).
-It's probably a firewall proxy between your company and the outside world,
-<a name="cache">or a</a>
-<a href="http://vancouver-webpages.com/CacheNow/">caching proxy</a>
-if you're using an 
-<small>ISP</small>.
-<p>
-<a name="f">What needs to be done in this case is to</a>
-use the
-<a href="ijbman.html#forwardfile">forwardfile</a>
-option
-to tell the
-Internet Junkbuster
-the address of the other proxy.
-Specify a different (unused) port number
-with the
-<a href="ijbman.html#listen-address">listen-address</a>
-option,
-and configure your browser to
-<a href="ijbfaq.html#chain">use that port.</a>
-If you haven't done this kind of thing before,
-it's probably best to consult your systems administrator or 
-<small>ISP</small>
-about it;
-check their web page first.
-</p>
-
-<h3><a name="discontinue" href="/cgi-bin/gp?pg=ijbfaq&pr=discontinue"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-What if I want to stop using the Internet Junkbuster?
-</h3>
-<p>
-Just go through the same procedure you used to start your
-browser using the
-Internet Junkbuster,
-but remove the details you put in
-(or if there was something there before, restore it).
-You may need to use
-<b><font face="arial, helvetica">
-Save Options</font></b>
-to make this change permanent.
-On Netscape 3.0 you can go through
-<b><font face="arial, helvetica">
-Options</font></b>;
-<b><font face="arial, helvetica">
-Network Preferences</font></b>;
-<b><font face="arial, helvetica">
-Proxies</font></b>
-and click on
-<b><font face="arial, helvetica">
-No Proxy</font></b>
-to turn it off, and later click on
-<b><font face="arial, helvetica">
-Manual Proxy Configuration</font></b>
-if you want to start using it again.
-(No need to enter the again details under
-<b><font face="arial, helvetica">
-View</font></b>
-as you did the
-<a href="ijbfaq.html#netscape">first time;</a>
-they should remain there unchanged.)
-<p>
-<a name="shut">This stops your browser talking to the proxy;</a>
-<a href="ijbfaq.html#shutdown">shutting down the proxy</a>
-is a different matter.
-</p>
-
-<h3><a name="dial" href="/cgi-bin/gp?pg=ijbfaq&pr=dial"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Automatic dialing isn't working any more. How do I fix it?
-</h3>
-<p>
-Some browsers (such as MSIE-4) can be configured to dial your
-<small>ISP</small>
-automatically when you click on a link,
-but this feature gets disabled if you specify a proxy running on your
-own computer
-(with address
-<big><kbd>localhost</kbd></big>
-or
-<big><kbd>127.0.0.1</kbd></big>)
-because these addresses don't require dialing.
-The
-Internet Junkbuster
-knows nothing about dialing, so it doesn't work.
-To make automatic dialing work,
-make up a name such as
-<big><kbd>junkbuster.ijb</kbd></big>
-and use that name in the proxy settings
-instead of
-<big><kbd>localhost</kbd></big>,
-and then add the line
-<big><kbd>127.0.0.1 junkbuster.ijb</kbd></big>
-to the file
-<big><kbd>c:\windows\hosts</kbd></big>
-(if there already is a line beginning with
-<big><kbd>127.0.0.1</kbd></big>
-just add
-<big><kbd>junkbuster.ijb</kbd></big>
-at the end of it.)
-<p>
-<a name="also">This should also work Netscape Communicator 4 on</a>
-machines where IE-4 has been installed.
-</p>
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>
-<br>
-<center>
-<h2><a name="local"><font face="arial, helvetica">
-Setting up the Internet Junkbuster on your local computer
-</font></a>
-</h2>
-</center>
-<br>The next two sections assume you wish to compile the code
-with your own C compiler.
-<a name="install">If you just want to use the</a>
-<big><kbd>.exe</kbd></big>
-file provided for Windows,
-see the
-<a href="ijbwin.html">Windows Installation page.</a>
-
-<h3><a name="u" href="/cgi-bin/gp?pg=ijbfaq&pr=u"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How do I compile the code under Unix?
-</h3>
-<p>
-If you are running Redhat
-<a href="aboutus.html#linux">Linux</a>
-you may prefer to use the
-<a href="ijbdist.html#red">rpm</a>
-instead of the following procedure.
-<br><ol  type="1">
-<li>
-<a name="download">First</a>
-<a href="ijb20.tar.Z">download the tar file</a>
-(~286k)
-<a name="tar">and</a>
-uncompress and extract the files from it with this command
-<br>
-&#160;&#160;&#160;<big><kbd>uncompress -c ijb20.tar.Z | tar xf -</kbd></big>
-<p>
-<li>
-<a name="sun">If your operating system is from</a>
-<a href="legal.html#not_our_trademark">Sun</a>
-or
-<a href="legal.html#not_our_trademark">HP</a>
-examine the
-<big><kbd>Makefile</kbd></big>
-and make any changes indicated inside.
-<li>
-<a name="make">Run</a>
-<br>
-<br>
-&#160;&#160;&#160;<big><kbd>make</kbd></big>
-<p>
-<li>
-<a name="defaults">Copy the sample configuration file</a>
-(<big><kbd>junkbstr.ini</kbd></big>,
-previously called
-<big><kbd>sconfig.txt</kbd></big>
-and other names in earlier releases)
-to some convenient place such as
-<big><kbd>/usr/local/lib/junkbuster/configfile</kbd></big>
-or whatever you choose.
-The sample file has all the options commented out.
-You can remove the
-<big><kbd>#</kbd></big>
-character on any that you want, but it may be better to
-leave this until to later.
-Run it asynchronously:
-<br>
-<br>
-&#160;&#160;&#160;<big><kbd>junkbuster configfile &</kbd></big>
-<p>
-If you are running a version earlier than 2.0 you can start it with
-<big><kbd>junkbuster &</kbd></big>
-<p>
-<li>
-<a name="config">Configure your browser (described</a>
-<a href="ijbfaq.html#browser">above).</a>
-<li>
-<a name="test">Verify that the</a>
-Internet Junkbuster
-is working (described
-<a href="ijbfaq.html#show">above).</a>
-<li>
-<a name="restart">Decide on the options you really want,</a>
-<big><kbd>kill</kbd></big>
-the
-<a href="ijbfaq.html#pid">process</a>
-and start it again. The most popular option is
-<a href="ijbman.html#blockfile">blockfile</a>
-to block ads.
-<a name="comprehensive">A sample blockfile is provided as an illustration,</a>
-but it doesn't really stop many ads.
-More comprehensive ones are available
-<a href="ijbfaq.html#readymade">elsewhere</a>.
-<li>
-<a name="rc">You'll probably want to add an entry to</a>
-<big><kbd>/etc/rc.d/rc.local</kbd></big>
-or equivalent to start it at boot time.
-(Any output you specify should be redirected to a file.
-And don't forget the
-&amp;
-at the end to run it asynchronously or your system will seize
-up after the next reboot.)
-</ol>
-</p>
-
-<h3><a name="win" href="/cgi-bin/gp?pg=ijbfaq&pr=win"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How do I compile the code under Windows?
-</h3>
-<p>
-A binary is currently being supplied with the source code,
-but if you prefer to compile it yourself here is the likely procedure.
-Most of these steps are repeated in our checklist for
-<a href="ijbwin.html">installation under Windows.</a>
-<br><ol  type="1">
-<li>
-<a name="zip">First</a>
-<a href="ijb20.zip">click here to download the zip file</a>
-called
-<big><kbd>ijb20.zip</kbd></big>
-(~208k),
-then uncompress and unpack the zip archive using a tool like
-<a href="http://www.winzip.com/">WinZip</a>.
-<li>
-<a name="change">Now the distribution (source and sample files)</a>
-will be in a folder
-called
-<big><kbd>ijb20</kbd></big>.
-Go into that folder and then edit the Makefile for
-your system,
-removing the comment character
-(<big><kbd>#</kbd></big>)
-in the lines related to Win32.
-Then type:
-<br>
-&#160;&#160;&#160;<big><kbd>nmake</kbd></big>
-<br>
-This should create an executable called
-<big><kbd>junkbstr.exe</kbd></big>.
-<a name="compilers">For information on issues with various compilers, see the</a>
-<a href="ijbdist.html#compilers">Distribution Information</a>
-page.
-<li>
-<a name="attempt">Run the executable with the command:</a>
-<br>
-&#160;&#160;&#160;<big><kbd>junkbstr</kbd></big>
-<br>
-The program will produce a message
-indicating that it has started and is ready to serve.
-<p>
-<a name="ini">(Version 2.0.1 and above uses</a>
-the file
-<big><kbd>junkbstr.ini</kbd></big>
-as the config file
-if it exists and no argument was given. If you have an earlier
-version or if you want it to use a different config file,
-simply specify that file as the argument.)
-<li>
-<a name="configures">Configure your browser (described</a>
-<a href="ijbfaq.html#browser">above).</a>
-<li>
-<a name="work">Check the proxy is working (described</a>
-<a href="ijbfaq.html#check">below</a>).
-<li>
-<a name="shortcut">To have the proxy start itself automatically</a>
-when you login to Win95,
-drop the ``shortcut'' to the
-<big><kbd>junkbstr</kbd></big>
-executable into the StartUp folder:
-<br>
-&#160;&#160;&#160;<big><kbd>C:\Windows\Start Menu\Programs\StartUp</kbd></big>
-<br>
-You might want to change the shortcut's
-<big><kbd>Properties-&gt;Shortcut</kbd></big>
-to
-<big><kbd>Run: Minimized</kbd></big>.
-If you specify the
-<a href="ijbman.html#hide-console">hide-console</a>
-option then the
-<small>DOS</small>
-window will vanish after it starts.
-<p>
-<a name="NT">WinNT users can put it into their own</a>
-StartUp folders or the Administrator
-can put it into the system's global StartUp folder.
-For details on how to make this a service under NT
-see our
-<a href="ijbwin.html#service">Windows page</a>.
-</ol>
-</p>
-
-<h3><a name="check" href="/cgi-bin/gp?pg=ijbfaq&pr=check"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How do I check that the proxy is working?
-</h3>
-<p>
-Pick a page from somewhere (such as your bookmarks, or just one
-that your browser was pointing to)
-and
-<b><font face="arial, helvetica">
-Reload</font></b>
-it.
-If you get a message along the lines of ``server not responding,
-using cached copy instead,'' see the advice
-<a href="ijbfaq.html#responding">above.</a>
-If the page reloads OK, check that your browser is actually
-talking to the proxy by going to
-<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a>
-or any
-<small>URL</small>
-ending in
-<big><kbd>show-proxy-args</kbd></big>
-(as described
-<a href="ijbfaq.html#show">below</a>,
-the proxy should intercept the request.)
-When you see ``Internet Junkbuster Proxy Status,''
-you'll know it's working.
-</p>
-
-<h3><a name="chain" href="/cgi-bin/gp?pg=ijbfaq&pr=chain"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How and why would I have this proxy chained with other proxies?
-</h3>
-<p>
-You may need the 
-<a href="ijbman.html#forwardfile">forwarding</a>
-feature to ``daisy chain'' the
-Internet Junkbuster
-to another proxy, perhaps an
-<a href="ijbfaq.html#anonymizing">anonymizing</a>
-proxy to
-<a href="ijbfaq.html#conceal">conceal</a>
-your
-<small>IP</small>
-address,
-or a
-<a href="ijbfaq.html#cache">caching proxy</a>
-from your
-<small>ISP</small>,
-or a
-<a href="ijbfaq.html#firewall">firewall</a>
-proxy between your company and the outside world.
-Version 2.0
-can be even configured to forward
-<a href="ijbman.html#forwardfile">selectively</a>
-according to the
-<small>URL</small>
-requested:
-for example, connecting directly to trusted hosts,
-but going through an anonymizing or firewall proxy for all other hosts.
-<p>
-<a name="administrator">Network administrators might use it to provide</a>
-transparent access to multiple networks without
-modifying browser configurations.
-<a name="direct">Most browsers also provide a way of</a>
-specifying hosts that the browser
-connects to directly, bypassing the proxy. Some provide a method for
-<a href="ijbfaq.html#Automatic">Automatic Proxy Configuration.</a>
-A well written
-Internet Junkbuster
-configuration can be much more flexible and powerful.
-<p>
-<a name="example">An</a>
-<small>ISP</small>'s
-caching proxy
-would typically be called something like
-<big><kbd>cache.your-isp.net:8080</kbd></big>
-(as described on you
-<small>ISP</small>'s
-web page);
-you would put this information in your
-<a href="ijbman.html#forwardfile">forwardfile</a>
-as described in our manual.
-Your browser would be configured to
-the
-Internet Junkbuster
-for
-<small>HTTP</small>
-and Security Proxies as before,
-but you probably want to tell it to use the caching proxy
-for
-<small>FTP</small>
-and other protocols.
-<a name="nonlocal">If your</a>
-<small>ISP</small>
-is running
-the
-Internet Junkbuster
-for you,
-they have probably already decided whether to chain with a caching proxy.
-</p>
-
-<h3><a name="socks" href="/cgi-bin/gp?pg=ijbfaq&pr=socks"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How does the Internet Junkbuster work with SOCKS gateways?
-</h3>
-<p>
-There is support for some
-<a href="http://www.leverage.com/users/tlod/ssockd/ssockd.html">gateways</a>
-in
-Version <a href="ijbdist.html#c4">1.4</a>
-and above.
-The gateway protocol used to be specified on the command line;
-it is
-now specified
-in the same file as
-<a href="ijbman.html#forwardfile">forwarding.</a>
-Note that the browser's proxy configuration must
-<em>not</em>
-specify a
-<big><kbd>SOCKS</kbd></big>
-host;
-it should specify the proxy as described
-<a href="ijbfaq.html#set">above.</a>
-</p>
-
-<h3><a name="plain" href="/cgi-bin/gp?pg=ijbfaq&pr=plain"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How do I configure it to be just a plain old proxy?
-</h3>
-<p>
-To get the proxy to do as little as possible (which means not deleting any
-sensitive headers), place in your
-configuration file the following three lines (each ending in a space
-then a period) to stop it changing sensitive headers:
-<br>
-&#160;&#160;&#160;<big><kbd>referer .</kbd></big>
-<br>
-&#160;&#160;&#160;<big><kbd>from .</kbd></big>
-<br>
-&#160;&#160;&#160;<big><kbd>user-agent .</kbd></big>
-<br>
-&#160;&#160;&#160;<big><kbd>cookiefile mycookiefile</kbd></big>
-<br>
-The fourth line is also needed to specify a
-<a href="ijbman.html#o_c">cookiefile</a>
-that might be called
-<big><kbd>mycookiefile</kbd></big>
-containing a single line with a
-<big><kbd>*</kbd></big>
-character, to allow all cookies through.
-</p>
-
-<h3><a name="shutdown" href="/cgi-bin/gp?pg=ijbfaq&pr=shutdown"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How do I shut down the proxy (to restart it)?
-</h3>
-<p>
-It depends on your platform. Under Windows, use
-<b><font face="arial, helvetica">
-Ctrl-Break</font></b>
-in the 
-<small>DOS</small>
-window or
-the old three-fingered salute of
-<b><font face="arial, helvetica">
-Ctrl-Alt-Delete</font></b>
-and select
-<b><font face="arial, helvetica">
-End Task</font></b>.
-Under
-<small>UNIX <a href="legal.html#not_our_trademark">&#174;</a></small>
-you'll need to
-<big><kbd>kill</kbd></big>
-the
-<b><kbd>junkbuster</kbd></b>
-process.
-<a name="pid">If you don't know the process number to give to</a>
-<big><kbd>kill</kbd></big>, try this:
-<big><kbd>ps ax | grep junkbuster</kbd></big>
-<br>
-</p>
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>
-<br>
-<center>
-<h2><a name="companies"><font face="arial, helvetica">
-Information for companies
-</font></a>
-</h2>
-</center>
-<br>
-<h3><a name="think" href="/cgi-bin/gp?pg=ijbfaq&pr=think"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-What do advertising companies think of this kind of technology?
-</h3>
-<p>
-We've seen only a few public comments from the advertising industry on this,
-other than
-<a href="links.html#adverse">SEC filings.</a>
-First, the president of the Internet Advertising Bureau told
-<a href="new.html#Rich">CNET</a>
-that he wasn't worried by banner blockers.
-Second, after the Federal Trade Commission's
-<a href="ftc.html">workshop</a>
-where we gave a live demonstration of our proxy before
-many eminent representatives of the industry,
-the
-<a href="self.html#dma">Direct Marketing Association</a>
-made the following
-statement in the closing paragraphs
-of their
-<a href="http://www.ftc.gov/bcp/privacy/wkshp97/comments2/dma027a.htm">summary comments</a>
-to the Commission.
-<blockquote>
-Clever shareware developers have come up with products that
-can obliterate cookies and advertisements for those consumers
-who have these concerns.
-The Internet is a market that is so democratic and flexible
-that it is easy for companies and software
-developers to respond to a perceived market need. 
-</blockquote>
-Their attitude seems to be that they would prefer that
-people use technical solutions
-to protect their privacy than have protections
-imposed by legislation or government regulations.
-So, do you perceive a market need?
-Then here are some ways to flex your democratic muscles.
-</p>
-
-<h3><a name="nobrainer" href="/cgi-bin/gp?pg=ijbfaq&pr=nobrainer"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Should we provide the Internet Junkbuster for our employees?
-</h3>
-<p>
-That depends. Try this quick three-point test.
-<br><ol  type="1">
-<li>
-<a name="waste">Do you want to spend your communications budget</a>
-on bandwidth that wastes your employees' time by forcing them to wait
-for a lot of annoying distractions while they're trying to
-do their jobs?
-<li>
-<a name="surveillance">Do you want current and potential vendors</a>
-to know quantitative details about the
-<a href="ijbfaq.html#agent">software and hardware platforms</a>
-that you have?
-<li>
-<a name="intelligence">Do you want your competitors to be able to</a>
-<a href="cookies.html">track</a>
-exactly which of your
-employees are checking out their web sites?
-</ol>
-If the answer to all three questions is yes,
-then you probably don't have any need for this kind of product.
-</p>
-
-<h3><a name="commercial" href="/cgi-bin/gp?pg=ijbfaq&pr=commercial"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Can our company get commercial support for the software?
-</h3>
-<p>
-Yes,
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=commercial">ask us</a>
-for a quote on a maintenance contract with your choice of
-phone and email support,
-hard copy documentation,
-source code and pre-compiled binaries on tape or disk,
-and email alerting of upgrades and issues.
-We also offer consulting services to help set up ``stealth browsing''
-capabilities to help reduce the footprints left while doing competitive
-analysis and other Web work where confidentiality is critical.
-</p>
-
-<h3><a name="isps" href="/cgi-bin/gp?pg=ijbfaq&pr=isps"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-I run an ISP. What issues should I consider before offering it?
-</h3>
-<p>
-Many
-<small>ISP</small>s
-who offer the proxy to their customers have told us that
-most of their customers are 
-delighted with it
-(although one reported that a customer complaint that without banner ads,
-surfing was like reading a novel: we recommend making it optional).
-Many
-<small>ISP</small>s
-like it because it reduces bandwidth requirements.
-To help get you started,
-here's a checklist we've developed from working with a few
-<small>ISP</small>s.
-You may think of more,
-and we'd be interested if you're willing to
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=isps">share them</a>
-with us.
-<br><ol  type="1">
-<li>
-<a name="pending">If you get more than one request for</a>
-the
-Internet Junkbuster
-you may want to tell your customers on your News page that you
-<a href="ijbfaq.html#isp">already</a>
-know about it and are assessing it.
-<li>
-<a name="try">Try the software and</a>
-<a href="ijbfaq.html#install">verify</a>
-that it performs satisfactorily.
-<li>
-<a name="value">Determine whether your customers perceive the service as</a>
-<a href="ijbfaq.html#switch">valuable</a>
-(and therefore worth the time to set up).
-We've had reports of many delighted customers.
-<li>
-<a name="secure">Assess the</a>
-level of
-<a href="ijbfaq.html#others">security</a>
-associated with the software.
-If access is to be
-<a href="ijbfaq.html#restrict">restricted</a>
-(to just dial-in ports, for example)
-how is this to be done?
-<li>
-<a name="costs">Consider</a>
-whether to expect any additional load on computing resources required,
-and any change in use of bandwidth due to the blocking of large
-<small>GIF</small>s.
-<li>
-<a name="opt">Choose the</a>
-<a href="ijbman.html">options</a>
-you wish to provide.
-<li>
-<a name="multiple">Decide whether you want</a>
-to offer a choice of configurations, such some of these four.
-<br><ol  type="A">
-<li>
-<a name="banner">Banners</a>
-<a href="ijbfaq.html#blocking">Blocked,</a>
-Wafer with
-<a href="ijbfaq.html#notice">No-Cookie-Copyright</a>
-notice
-<li>
-<a name="low">Cookies</a>
-not stopped
-(<a href="ijbman.html#cookiefile">cookiefile</a>
-with just a
-<big><kbd>*</kbd></big>
-in it),
-<a href="ijbfaq.html#header">User Agent</a>
-specified as
-<a href="ijbfaq.html#lynx">Lynx</a>
-<li>
-<a name="oneway">Cookies from browser</a>
-<a href="ijbfaq.html#one">allowed</a>,
-permitting
-<a href="ijbfaq.html#registration">registered services</a>
-<li>
-<a name="kid">A proxy for</a>
-<a href="ijbfaq.html#children">kids.</a>
-</ol>
-<a name="caching">If you run a</a>
-<a href="ijbfaq.html#chain">caching proxy,</a>
-decide whether the 
-Internet Junkbuster
-will chain with it by default,
-and whether to offer an alternate with no caching.
-(Some
-<small>ISP</small>s
-don't, because they want to give customers an incentive to use caching
-and save bandwidth.)
-<li>
-<a name="naming">Decide on a naming scheme for your</a>
-proxies.
-If you're running only one
-proxy on one machine,
-the simplest way is to just use port 8000 on your main machine,
-such as
-<big><kbd>our-isp.net.</kbd></big>
-But it would probably be safer to put an entry in your name server
-and call it something like
-<big><kbd>junkbuster.our-isp.net.</kbd></big>
-If running several proxies, you could either use different ports
-on the same machine, or if you have
-the opportunity to distribute the load over
-a few machines 
-you could
-use different hostname aliases such as
-<big><kbd>banner.junkbuster.our-isp.net</kbd></big>,
-<big><kbd>lynx.junkbuster.our-isp.net</kbd></big>
-and
-<big><kbd>oneway.junkbuster.our-isp.net</kbd></big>
-(corresponding to the examples in the previous point).
-You may want to set up
-<a href="ijbfaq.html#Automatic">Automatic Proxy Configuration.</a>
-<li>
-<a name="document">Prepare a page</a>
-explaining the
-Internet Junkbuster
-to your customers.
-<a name="does">Here's are some examples from</a>
-<a href="http://www.cia.com.au/us/help/faq-proxy.html">Australia</a>,
-<a href="http://www.rhein-ruhr.de/info/junkbuster.html">Germany</a>,
-<a href="http://www.packet.net/ijb/">Florida</a>,
-<a href="http://www.eclipse.net/adfilter/index.html">New York/New Jersey/Pennsylvania,</a>
-<a href="http://a-o.com/proxy/proxy.html">North Carolina</a>,
-<a href="http://www.trip.net/junkbuster/">Texas</a>,
-and
-<a href="http://www.inconnect.com/proxy.html">Utah</a>.
-<a name="reuse">You are welcome to copy and modify</a>
-material
-from
-Junkbusters
-according to the
-<a href="gpl.html">GPL</a>.
-You might want to set up a process to check this page periodically
-and update it when it changes.
-(A few links can probably serve as well as lot of copying however.)
-A typical page would probably specify the following.
-<br><ul  type="1">
-<li>
-<a name="abstract">A brief explanation stating what</a>
-the
-Internet Junkbuster
-does, with a link to this page.
-<li>
-<a name="addresses">The addresses of the proxy or proxies,</a>
-with their port number(s).
-<li>
-<a name="options">The options used,</a>
-and how to view the contents of the blockfile (which you can place on
-your web pages,
-preferably in a file called
-<big><kbd>blocklist.html</kbd></big>
-or
-<big><kbd>blocklist.txt</kbd></big>).
-<li>
-<a name="additions">An indication</a>
-of whether suggestions for the blocklist are considered,
-and if so, how to submit them: to a particular email address,
-via web-based form, etc.
-<li>
-<a name="configuration">Instructions</a>
-on how to
-configure a browser.
-You may want to include details for only the two major browsers
-and leave the others to a link.
-<li>
-<a name="service">Procedures on how to report problems, give feedback etc.</a>
-</ul>
-<li>
-<a name="beta">Invite a small number of technologically sophisticated</a>
-customers to beta-test the service.
-<li>
-<a name="announce">Announce general availability on your ``News'' page.</a>
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=isps">Tell us</a>
-if you would like to be included on a list of
-<small>ISP</small>s
-offering the
-Internet Junkbuster.
-</ol>
-</p>
-
-<h3><a name="ps2" href="/cgi-bin/gp?pg=ijbfaq&pr=ps2"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-What's a Proxy Server Server and how can I make money as one?
-</h3>
-<p>
-Other organizations with web presence and some bandwidth to spare
-can set up as
-<i><dfn>Proxy Server Servers</dfn></i>
-<!-- Aside: All this, and... -->
-(<small>PS<sup>2</sup></small>s).
-The idea here is to allow users to choose their proxy configuration,
-and provide it to them on a semi-permanent basis.
-Users would fill in a form specifying what options they want in
-their proxy,
-possibly even at a very high level, such as
-``no ads''
-or ``no nudity.''
-This information is sent to a
-<small>CGI</small>
-script that
-configures a proxy, starts it running, and returns its address and port number
-(possibly along with configuration instructions for the browser
-that the user specified.)
-<p>
-<a name="revenue">Users</a>
-could be charged
-a subscription fee,
-or the service could be thrown in free in the hope of
-improving customer retention for some existing business
-(which is what
-<small>ISP</small>s
-are doing).
-It might be possible to make money by
-inserting new ads in the holes left where others were blocked,
-but the original owners might object.
-<small>PS<sup>2</sup></small>s
-could differentiate themselves
-by providing frequently updated and comprehensive
-blocking of ads, or of offensive material based on their own grading system.
-Some content providers might do it for the chance to be the
-only company that the consumer permits to set cookies.
-(Identification could even be done via cookies,
-but this might not be popular with the kind of user who wants a proxy.)
-<small>PS<sup>2</sup></small>s
-might sell specific or aggregate information about their
-users' browsing habits,
-so the agreement with users on whether they are permitted to do this
-would be important to both sides.
-<p>
-<a name="publicize">If your organization</a>
-establishes a 
-Proxy Server Service
-you would like publicized,
-please
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=publicize">notify us.</a>
-</p>
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>
-<br>
-<center>
-<h2><a name="blocking"><font face="arial, helvetica">
-Blocking
-</font></a>
-</h2>
-</center>
-<br>
-<h3><a name="readymade" href="/cgi-bin/gp?pg=ijbfaq&pr=readymade"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Where can I get an example blockfile that stops most ads?
-</h3>
-<p>
-The sample blockfile we provide blocks almost nothing,
-and we do not publish blockfiles that stop almost all banner ads.
-But others have; you can find them by
-<a href="http://www.altavista.com/cgi-bin/query?pg=q&what=web&fmt=.&q=%2Bjunkbuster+%2Burl%3Ablocklist">asking Altavista.</a>
-You can add any part of the new file to your old one
-(probably called
-<big><kbd>sblock.ini</kbd></big>
-if you haven't changed the default name in the latest version)
-or your just replace it completely.
-You
-<a href="ijbfaq.html#cover">probably</a>
-don't need to restart the proxy.
-<p>
-<a name="pub">If you develop an interesting blocklist and publish it on the Web,</a>
-you might want to include the word ``junkbuster'' in it
-and use the word ``blocklist'' in the file name given in the
-<small>URL</small>
-so that others can find it with the query given in the previous sentence.
-</p>
-
-<h3><a name="zap" href="/cgi-bin/gp?pg=ijbfaq&pr=zap"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-If I see an ad I wish I hadn't, how do I stop it?
-</h3>
-<p>
-If your
-<small>ISP</small>
-is running the
-Internet Junkbuster,
-they should have a policy on whether they accept suggestions from
-their customers on what to block. Consult their web page.
-<p>
-<a name="cover">If you are running</a>
-the
-Internet Junkbuster
-yourself, you have complete control over what gets through.
-Just add a pattern to cover the offending 
-<small>URL</small>
-to your blockfile.
-Version 1.3 and later automatically rereads the blockfile when it changes,
-but if you're running an earlier version you'll
-have to
-<a href="ijbfaq.html#shutdown">stop it</a>
-and restart it.
-<p>
-<a name="target">To choose a pattern you'll first need to find the</a>
-<small>URL</small>
-of the ad you want cover.
-<p>
-<a name="pinpoint">Some people use the</a>
-<a href="ijbman.html#debug">debug</a>
-<big><kbd>1</kbd></big>
-option to display each 
-<small>URL</small>
-in a window as the request is sent to the server.
-It's then usually an easy task to pick the offending 
-<small>URL</small>
-from the list of recent candidates.
-<p>
-<a name="source">Alternatively,</a>
-you can use
-<b><font face="arial, helvetica">
-View Document Info</font></b>
-(or
-<b><font face="arial, helvetica">
-View Document Source</font></b>
-if your browser doesn't have that).
-The
-<b><font face="arial, helvetica">
-Info</font></b>
-feature has the advantage of showing you the full
-<small>URL</small>
-including the host name,
-which may not be specified in the source:
-there you might see something like
-<big><kbd>SRC="/ads/click_here_or_die.gif"</kbd></big>
-indicating only the
-<i><dfn>path</dfn></i>.
-(The host name is assumed to be the same as the one the page came from.)
-<p>
-<a name="offsite">But ads often</a>
-come from a different site, in which case you
-might see something like
-<big><kbd>SRC="grabem.n.trackem.com/Ad/Infinitum/SpaceID=1666"</kbd></big>
-or longer.
-<a name="warehouse">If the company looks like a pure ad warehouse</a>
-(as in the last case),
-you may want to place just its domain name in the blockfile,
-which blocks all 
-<small>URL</small>s
-from that site.
-<p>
-<a name="wanted">If the ad comes from a server</a>
-that you really want some content from,
-you can include enough of the path
-to avoid zapping stuff you might want.
-In the first example above,
-<big><kbd>/ads/</kbd></big>
-would seem to be enough.
-If you don't include the domain name,
-the pattern applies to all sites,
-so you don't want such patterns
-to be too general:
-for example
-<big><kbd>/ad</kbd></big>
-would block
-<big><kbd>/admin/salaries/</kbd></big>
-on your company's internal site.
-<p>
-<a name="image">To speed the blocking of images, some</a>
-<small>UNIX <a href="legal.html#not_our_trademark">&#174;</a></small>
-users create a
-shell script called
-<big><kbd>Image:</kbd></big>
-containing a line such as
-<big><kbd>echo $1 | sed s/http:..// &gt;&gt; $HOME/lib/blockfile</kbd></big>
-that adds its argument to the user's blockfile.
-Once an offending image has been be found using
-<b><font face="arial, helvetica">
-View Document Info</font></b>
-it's easy to cut-and-paste the line (or part of it) into a shell window.
-The same script can be linked to a file called
-<big><kbd>Frame:</kbd></big>
-to dealing with framed documents,
-and
-<big><kbd>junkbuster:</kbd></big>
-to accept the output of the
-<a href="ijbman.html#debug">debug</a>
-option.
-<p>
-<a name="partial">When compiled without the</a>
-<i><dfn>regular expressions</dfn></i>
-option, the
-Internet Junkbuster
-uses only very simple (and fast) matching methods.
-The pattern
-<big><kbd>/banners</kbd></big>
-will not stop
-<big><kbd>/images/banners/huge.gif</kbd></big>
-getting through: you would have to include the pattern
-<big><kbd>/images/banners</kbd></big>
-or something that matches in full from the left.
-<a name="regex">So you can get what you want here,</a>
-the matcher understands
-<small>POSIX</small>
-regular expressions:
-you can use
-<big><kbd>/*.*/banners</kbd></big>
-to block
-and any
-<small>URL</small>
-containing
-<big><kbd>/banners</kbd></big>
-(even in the middle of the path).
-<a name="posix">(In Versions 1.1 through 1.4</a>
-they were an option at compile time;
-from Version 2.0 they have become the default.)
-Regular expressions give you
-<a href="http://theory.uwinnipeg.ca/localfiles/infofiles/gcc/rx_toc.html">many more features</a>
-than this,
-but if you're not already familiar with them you probably won't 
-need to know anything beyond the
-<big><kbd>/*.*/</kbd></big>
-idiom.
-If you do, a
-<big><kbd>man egrep</kbd></big>
-is probably a good starting point).
-<p>
-<a name="slash">Don't forget the</a>
-<big><kbd>/</kbd></big>
-(slash)
-at the beginning of the path.
-If you leave it out the line will be interpreted as a domain name,
-so
-<big><kbd>ad</kbd></big>
-would block all sites from Andorra
-(since
-<big><kbd>.ad</kbd></big>
-is the two-letter
-<a href="reference.html#country">country code</a>
-for that principality).
-<p>
-<a name="detail">For a detailed technical description</a>
-of how pattern matching is done,
-see the
-<a href="ijbman.html#o_b">manual.</a>
-</p>
-
-<h3><a name="despite" href="/cgi-bin/gp?pg=ijbfaq&pr=despite"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How come this ad is still getting through anyway?
-</h3>
-<p>
-If the ad had been displayed before you included its
-<small>URL</small>
-in the blockfile,
-it will probably be held in cache for some time,
-so it will be displayed without the need for any request to the server.
-Using the
-<a href="ijbman.html#debug">debug</a>
-<big><kbd>1</kbd></big>
-option to show each
-<small>URL</small>
-as it is fetched is a good way to see exactly what is happening.
-<p>
-<a name="otherwise">If new items seem to be getting through,</a>
-check that you are
-<a href="ijbfaq.html#show">really running</a>
-the proxy with the right blockfile in the options.
-Check the blockfile for
-<a href="ijbfaq.html#exceptions">exceptions.</a>
-<p>
-<a name="java">Some sites may have different ways of inserting ads,</a>
-such as via
-<a href="cookies.html#java">Java.</a>
-If you have ideas on how to block new kinds
-of junk not currently covered, please
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=java">tell us.</a>
-</p>
-
-<h3><a name="exceptions" href="/cgi-bin/gp?pg=ijbfaq&pr=exceptions"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How do I stop it blocking a URL that I actually want?
-</h3>
-<p>
-You can change the patterns so they don't cover it,
-or use a simple feature in Version 1.1 and later: a line beginning with a
-<big><kbd>~</kbd></big>
-character means that a
-<small>URL</small>
-blocked by previous patterns that matches the rest of
-the line is let through.
-For example,
-the pattern
-<big><kbd>/ad</kbd></big>
-would block
-<big><kbd>/addasite.html</kbd></big>
-but not if followed by
-<big><kbd>~/addasite</kbd></big>
-in the blockfile.
-Or suppose you want to see everything that comes from
-a site you like, even if it looks like an ad: simply put
-<big><kbd>~aSiteYouLike.com</kbd></big>
-at the
-<em>end</em>
-of the blockfile.
-(Order is important, because the last matching line wins.)
-<p>
-<a name="agreed">As well as unblocking</a>
-pages that were unintentionally blocked,
-this feature is useful for unblocking ads from a specific source.
-This might be because you are interested in those particular ones,
-or if you have an explicit agreement to accept certain ads,
-such as those from a free web-based email provider.
-</p>
-
-<h3><a name="children" href="/cgi-bin/gp?pg=ijbfaq&pr=children"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Can I block sites I don't want my children to see?
-</h3>
-<p>
-Yes, but remember that
-<a name="savvy">children who are technically sophisticated enough</a>
-to use the browsers' proxy configuration options
-could of course bypass any proxy.
-This kind of technology can be used as a gentle barrier to remind
-or guide the child,
-but nobody should expect it to replace the parent's role
-in setting and enforcing standards of online behavior for their children.
-<p>
-<a name="recommend">Some</a>
-<small>ISP</small>s
-are starting to provide specialized proxies to protect children.
-There are two basic approaches: the ``black list'' and the ``white list''
-approach.
-<a name="negative">The black list approach allows the child</a>
-to go anywhere not explicitly prohibited; the white list permits visits
-only to sites explicitly designated as acceptable.
-<p>
-<a name="positive">It's very easy for</a>
-anyone to
-compile a white list from a page of ``recommended
-kids sites'' and to configure an
-Internet Junkbuster
-to allow access to those sites only.
-If you compile with the
-<a href="ijbfaq.html#regex">regex</a>
-option,
-you can place a
-<big><kbd>*</kbd></big>
-(asterisk) as the first line of the blockfile (which blocks everything),
-and then list
-<a href="ijbfaq.html#exceptions">exceptions</a>
-after that.
-Be careful to make the exception sufficiently broad:
-for example, using
-<big><kbd>~www.uexpress.com/ups/comics/ch/</kbd></big>
-as the exception for
-<a href="http://www.uexpress.com/ups/comics/ch/"><cite>Calvin and Hobbes</cite></a>
-would block some of the graphic elements on the page;
-you would probably want a wider exception such as
-<big><kbd>~www.uexpress.com/ups/</kbd></big>
-to permit them.
-<p>
-<a name="trust">Version 2.0 has an experimental feature</a>
-to permit only sites mentioned in a nominated
-<a href="ijbman.html#trustfile">trusted site.</a>
-This allows organizations to build lists of sites for kids to browse,
-and the software automatically restricts access to those on the list.
-<p>
-<a name="scan">Many filtering</a>
-<a href="links.html#blocking">products</a>
-actually scan for keywords in
-the text of pages they retrieve
-before presenting it,
-but
-the
-Internet Junkbuster
-does not do this.
-Building a perfectly reliable black list system is hard,
-because it's very difficult to state
-in advance
-exactly
-what is obscene or unsuitable.
-For more info see our
-<a href="links.html#parents">links</a>
-page.
-</p>
-
-<h3><a name="message" href="/cgi-bin/gp?pg=ijbfaq&pr=message"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-What do I see when a page or graphic is blocked by the proxy?
-</h3>
-<p>
-You usually see a broken image icon,
-but it depends on several factors beyond the proxy's control.
-If asked for a
-<small>URL</small>
-matching its blockfile, the proxy returns an
-<small>HTML</small>
-page containing a message identifying itself
-(currently the two words ``Internet Junkbuster'')
-with a status 202 (Accepted) instead of the usual 200 (OK).
-(Versions 1.X returned an error 404: Forbidden, which caused
-strange behavior in some cases.)
-Status 202 is described in the
-<small>HTTP</small>
-<a href="http://www.ics.uci.edu/pub/ietf/http/rfc1945.html#Code202">RFC</a>
-as indicating that the request has been accepted but not completed,
-and that it might complete successfully in the future
-(in our case, if the blockfile were changed).
-<p>
-<a name="depends">The broken image icon is most common</a>
-because the browser is usually expecting a graphic.
-But if it was expecting text, or if the page happens to be using certain
-<small>HTML</small>
-extensions
-such as
-<big><kbd>layer</kbd></big>
-and your browser is a late model from Microsoft,
-you may see the words ``Internet Junkbuster'' displayed as a hot link.
-<p>
-<a name="click">Clicking on the link takes you to an explanation of</a>
-the pattern in the blockfile that caused the block,
-so that you can edit the blockfile and go back and reload if you really
-want to see what was blocked. The explanatory link is generated by
-the proxy and is automatically intercepted based on its ending in
-<big><kbd>ij-blocked-url</kbd></big>;
-even though the site is specified as
-<big><kbd>http://internet.junkbuster.com</kbd></big>
-no request should actually made to that site.
-If one is, it means that the proxy was been removed after it
-generated the link.
-<p>
-<a name="layer">To summarize:</a>
-the identifying link to the blocking explanation
-is usually turned into a broken image icon,
-but it may be displayed on a page alone,
-or they may may be restricted to the particular frame, layer or graphic area
-specified in the page containing them.
-The proxy has no way of knowing the context in which a
-<small>URL</small>
-will be used and cannot control how the blocking message will be rendered.
-</p>
-
-<h3><a name="broken" href="/cgi-bin/gp?pg=ijbfaq&pr=broken"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Why not replace blocked banners with something invisible?
-</h3>
-<p>
-<a name="infringe">Many users have suggested to us</a>
-that blocked banners should be replaced by a something like a
-1x1 transparent
-<small>GIF</small>
-to make the page would look as if there was nothing ever there.
-Apart from making it harder to catch unintended blocking,
-this might also displease the owners of the page,
-who could argue that such a change constitutes a copyright infringement.
-We think that merely failing to allow an included graphic to be accessed
-would probably not be considered an infringement:
-after all this is what happens when a browser
-is configured not to load images automatically.
-However, we are
-<a href="over.html#notlaw">not</a>
-lawyers,
-so anyone in doubt should take appropriate advice.
-<p>
-<a name="done">In a context where the copyright issue is resolved</a>
-satisfactorily,
-a proxy could simply return a status 301 or 302 and
-specify a replacement
-<small>URL</small>
-in a
-<big><kbd>Location</kbd></big>
-and/or
-<big><kbd>URI</kbd></big>
-header.
-An alternative would be to use inline code to return a
-1 x 1 clear
-<small>GIF</small>.
-We do not publish sample code for this,
-and we have no way of stopping
-<a href="ijbdist.html#others">others</a>
-who have.
-</p>
-
-<h3><a name="size" href="/cgi-bin/gp?pg=ijbfaq&pr=size"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Why not block banners based on the dimensions of the image?
-</h3>
-<p>
-Many users have pointed out that most banner ads come in standard sizes,
-so why not block all
-<small>GIF</small>s
-of those sizes?
-This would theoretically be without fetching the object 
-because the dimensions are usually given in the
-<big><kbd>IMG</kbd></big>
-tag,
-but it would require substantial changes in the code,
-and we doubt whether it would be much more effective than a good block list.
-</p>
-
-<h3><a name="embedded" href="/cgi-bin/gp?pg=ijbfaq&pr=embedded"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-What about non-graphic advertising within the pages I want?
-</h3>
-<p>
-The
-Internet Junkbuster
-deliberately
-does not provide a way of automatically editing the contents of a page,
-to remove textual advertising or
-to repair the holes left by blocked banners.
-Other packages such as
-<a href="links.html#webfilter">WebFilter</a>
-do.
-<p>
-<a name="base">For the same reason,</a>
-it has no way of stopping a new browser
-window being created, because this is done through the
-<big><kbd>target</kbd></big>
-attribute in the
-<big><kbd>&lt;a&gt;</kbd></big>
-and
-<big><kbd>&lt;base&gt;</kbd></big>
-elements,
-not through headers.
-Nor do we plan to add a feature to
-<a href="http://simmons.starkville.ms.us/tips/081097/">paralyze animated</a>
-<small>GIF</small>s.
-</p>
-
-<h3><a name="push" href="/cgi-bin/gp?pg=ijbfaq&pr=push"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Does it block ads on the broadcasting ``push'' systems? How about pop-up ads?
-</h3>
-<p>
-We haven't tried it but we expect it would probably
-work on image ads on push channels.
-See also
-<a href="links.html#adchoice">adchoice</a>.
-<p>
-<a name="pop">Disabling</a>
-<a href="cookies.html#java">Javascript</a>
-stops some pop-up ads.
-One problem is that some advertisers throw open a new
-browser window to frame the ad. The ad is easily blocked,
-but the empty window remains. You can kill it easily, but this is a chore.
-We don't see how to stop them other than editing the
-<small>HTML</small>
-from the parent window, which we
-<a href="ijbfaq.html#broken">don't</a>
-like to do.
-<p>
-<a name="TBTD">The</a>
-<a href="http://www.tbtf.com/archive/10-06-97.html">TBTF</a>
-newsletter warned subscribers to push information that
-<a name="LOGTARGET">in IE4,</a>
-<a href="http://www.microsoft.com/standards/cdf.htm#Logging">LOGTARGET</a>
-allows
-servers to determine the
-<small>URL</small>s
-viewed at their site even if accessed from cache or through a proxy.
-If you use this browser see our instructions on
-<a href="cookies.html#counting">how to disable</a>
-this.
-<p>
-<a name="pushy">If you find you have experience using the proxy with push,</a>
-or have any other advice about it, please
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=pushy">tell us.</a>
-</p>
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>
-<br>
-<center>
-<h2><a name="cookies"><font face="arial, helvetica">
-Cookies
-</font></a>
-</h2>
-</center>
-<br>For background information on cookies see our
-<a href="cookies.html">page describing their dangers.</a>
-
-<h3><a name="breakthrough" href="/cgi-bin/gp?pg=ijbfaq&pr=breakthrough"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Might some cookies still get through? How can I stop them?
-</h3>
-<p>
-Yes, you should expect the occasional cookie to make it through to your browser.
-We know of at least three ways this can happen;
-please
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=breakthrough">tell us</a>
-if you find any others.
-One way is in secure documents, which are explained
-<a href="ijbfaq.html#secure">below.</a>
-<p>
-<a name="EQUIV">A</a>
-<a href="links.html#JavaScript">few</a>
-sites set cookies using a line such as
-<big><kbd>&lt;META HTTP-EQUIV="Set-Cookie" CONTENT="flavor=chocolate"&gt;</kbd></big>
-in the
-<big><kbd>HEAD</kbd></big>
-section of an
-<small>HTML</small>
-document.
-<a name="javascript">Cookies can also be</a>
-<!-- IEM: http://cgi.netscape.com/eng/mozilla/Gold/handbook/javascript/ref_a-c.html#cookie_property -->
-set and read
-in
-JavaScript.
-To see if this is happening in a document,
-view its source, look in the
-<big><kbd>head</kbd></big>
-for a section tagged
-<big><kbd>script language="JavaScript"</kbd></big>.
-If it contains a reference to
-<big><kbd>document.cookie</kbd></big>,
-the page can manipulate your cookie file without sending any cookie headers.
-The
-Internet Junkbuster
-does not tamper with these methods.
-Fortunately they are rarely used at the moment.
-If a cookie gets set, it should be stopped
-by the proxy on its way back to the server when a page is requested,
-but it can still be read in Javascript.
-bu
-<p>
-<a name="alert">To prevent cookies breaking through,</a>
-<strong>always</strong>
-keep
-<a href="cookies.html#disable">cookie alerts</a>
-turned on in your browser,
-and
-<a href="cookies.html#java">disable</a>
-Java and Javascript.
-Making the files
-<a href="cookies.html#only">hard to write</a>
-may also help.
-</p>
-
-<h3><a name="method" href="/cgi-bin/gp?pg=ijbfaq&pr=method"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Exactly how do cookies get created and stored anyway?
-</h3>
-<p>
-When a web site's server sends you a page it also sends
-certain ``header information'' which your browser records but does not display.
-One of these is a
-<big><kbd>Set-Cookie</kbd></big>
-header, which specifies the cookie information that the server wants your browser to record.
-Similarly, when your browser requests a page it also sends headers, specifying
-information such as the graphics formats it understands.
-If a cookie has previously been set by a site that matches the
-<small>URL</small>
-it is about to request,
-your browser adds a
-<big><kbd>Cookie</kbd></big>
-header quoting the previous information.
-<p>
-<a name="privacy">For more background information on how cookies</a>
-can damage your privacy, see our
-<a href="cookies.html">page on cookies.</a>
-For highly detailed technical information see the
-<a href="links.html#kristol">RFC.</a>
-The
-Internet Junkbuster
-will show you all headers you use the
-<a href="ijbman.html#debug">debug</a>
-<big><kbd>8</kbd></big>
-option,
-or you can get a sample from our
-<a href="ijbfaq.html#headers">demonstration page.</a>
-</p>
-
-<h3><a name="break" href="/cgi-bin/gp?pg=ijbfaq&pr=break"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-If cookies can't get through, will some things stop working for me?
-</h3>
-<p>
-Possibly.
-Some personalized services including certain
-<!-- IEM: http://my.yahoo.com -->
-chat
-rooms
-require cookies.
-<a name="registration">Newspapers that require</a>
-<!-- IEM: http://www.nytimes.com/subscribe/sub-bin/new_sub.cgi#agree -->
-registration
-or
-<!-- IEM: http://interactive5.wsj.com/regUser.html -->
-subscription
-will not automatically recognize you if you don't send them the cookie they
-assigned you. And there are a very small number of sites that do
-strange things with cookies; they don't work for anyone that blocks
-cookies by any means.
-Some sites such as
-<a href="links.html#withhold">Microsoft</a>
-explain that their content is so wonderfully compelling that
-they will withhold it from you unless you submit to their
-inserting cookies.
-<p>
-<a name="want">If you want such sites to be given your cookies,</a>
-you can use the
-<a href="ijbman.html#cookiefile">cookiefile</a>
-option provided you are running
-<a href="ijbfaq.html#crumble">Version 1.2 or later</a>
-yourself.
-Simply include the domain name of those sites in the
-<i>cookiefile</i>
-specified by this option.
-If it still doesn't work,
-the problem may be in
-<a href="ijbfaq.html#breakage">other headers.</a>
-<p>
-<a name="one">It's possible to let cookies out but not in,</a>
-which is enough to keep some sites happy, but not all of them:
-one newspaper site seems to go into an endless frenzy
-if deprived of fresh cookies.
-A cookiefile containing
-a single line consisting of the two characters
-<big><kbd>&gt;*</kbd></big>
-(greater-than and star) permits server-bound cookies only.
-The
-<big><kbd>*</kbd></big>
-is a
-<a href="ijbman.html#wildcard">wildcard</a>
-that matches all domains.
-<p>
-<a name="else">If someone else is running the</a>
-Internet Junkbuster
-for you and has a version
-that
-<!-- IAM: ijbfaq.html#registration -->
-passes server-bound cookies through,
-you can try editing your browser's cookie
-file to contain just the ones you want,
-and restart your browser.
-<a name="window">To subscribe to a new service like this</a>
-after you have started using the
-Internet Junkbuster,
-you can try the following:
-tell your browser to
-<a href="ijbfaq.html#discontinue">stop using</a>
-the
-Internet Junkbuster,
-fill out and submit your subscription details
-(allowing that web site to set a cookie),
-then
-reconfigure your browser to use the
-Internet Junkbuster
-again
-(and stop more cookies being sent).
-This also requires the
-<a href="ijbman.html#cookiefile">cookiefile</a>
-option,
-and its success depends on the Web site
-not wanting to change your cookies at every session.
-For this reason it does not work at some major newspaper sites, for example.
-<a name="buyers">But you may prefer to</a>
-look at whether other sites provide the same
-or better services without demanding the opportunity
-to track your behavior.
-The web is a buyer's market where most prices are zero:
-very few people pay
-for content with money, so why should you pay with your privacy?
-</p>
-
-<h3><a name="crumble" href="/cgi-bin/gp?pg=ijbfaq&pr=crumble"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Can I control cookies on a per-site basis?
-</h3>
-<p>
-<a name="discard">Yes, since version 1.2 the</a>
-Internet Junkbuster
-has included advanced cookie management facilities.
-Unless you specify otherwise,
-cookies are discarded (``crumbled'') by the
-Internet Junkbuster
-whether they came from the server or the browser.
-In Version 1.2 and later you can
-use the
-<a href="ijbman.html#cookiefile">cookiefile</a>
-option
-to specify when cookies are to be passed through intact.
-It uses the same syntax and
-<a href="ijbman.html#o_b">matching</a>
-algorithm as the blockfile.
-<p>
-<a name="cook">If the</a>
-<small>URL</small>
-matches a pattern in the
-<i><dfn>cookiefile</dfn></i>
-then cookies are let through in both the browser's request for the
-<small>URL</small>
-and in the server's response.
-<a name="directional">One-way permissions can be</a>
-specified by starting the line with the
-<big><kbd>&gt;</kbd></big>
-or
-<big><kbd>&lt;</kbd></big>
-character.
-For example, a cookiefile consisting of the four lines
-<br>
-&#160;&#160;&#160;<big><kbd>org</kbd></big>
-<br>
-&#160;&#160;&#160;<big><kbd>&gt;send-user-cookies.org</kbd></big>
-<br>
-&#160;&#160;&#160;<big><kbd>&lt;accept-server-cookies.org</kbd></big>
-<br>
-&#160;&#160;&#160;<big><kbd>~block-all-cookies.org</kbd></big>
-<br>
-allows cookies to and from
-<big><kbd>.org</kbd></big>
-domains only, with the following exceptions:
-<br><ol  type="1">
-<li>
-<a name="fed">Cookies sent from servers in the domain</a>
-<big><kbd>send-user-cookies.org</kbd></big>
-are blocked on their way to the client,
-but cookies sent by the browser to that domain are still be fed to them.
-<li>
-<a name="take">The cookies of</a>
-<big><kbd>accept-server-cookies.org</kbd></big>
-check in to the proxy and are passed through to the browser,
-but when they come back to the proxy they never check out.
-<li>
-<a name="deny">All cookies to and from</a>
-<big><kbd>block-all-cookies.org</kbd></big>
-are blocked.
-</ol>
-<p>
-<a name="paths">If</a>
-the
-<b><kbd>junkbuster</kbd></b>
-was compiled with the regular expressions option
-they may be used in paths.
-Any logging to a
-<a href="ijbfaq.html#jar">``cookie jar''</a>
-is separate and not affected.
-<p>
-<a name="breadth">It's important to give hosts you want to be able</a>
-to set cookies sufficient breadth. For example,
-instead of
-<big><kbd>www.yahoo.com</kbd></big>
-use
-<big><kbd>yahoo.com</kbd></big>
-because the company uses many different hosts ending in that domain.
-</p>
-
-<h3><a name="wafers" href="/cgi-bin/gp?pg=ijbfaq&pr=wafers"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Can I make up my own fake cookies (wafers) to feed to servers?
-</h3>
-<p>
-Yes,
-using the
-<a href="ijbman.html#wafer">wafer</a>
-option.
-We coined the term
-<i><dfn>wafer</dfn></i>
-to describe cookies chosen by a user,
-not the Web server.
-Servers may not find wafers as tasty as the cookies
-they make themselves.
-But users may enjoy controlling servers' diets for various reasons,
-such as the following.
-<br><ul  type="1">
-<li>
-<a name="retaliate">Users who consider cookies to</a>
-be an unwelcome intrusion and a waste
-of their disk space can respond in kind.
-By writing ``signature wafers'' they can
-express their feelings about cookies,
-in a place that the people
-in charge of them are most likely to notice.
-<li>
-<a name="notice">Sites running a proxy</a>
-that logs cookies to a file
-(such as the
-Internet Junkbuster
-does with the
-<a href="ijbman.html#jarfile">jarfile</a>
-option on)
-may want to notify
-servers that their cookies are being intercepted,
-deleted or copied.
-One possible reason for doing this is the uncertain copyright status
-of cookie strings.
-<a href="over.html#notlaw">Nothing</a>
-here should be taken as legal advice: we are simply raising a question
-for any interested parties to consider,
-and make no representation that such measures are necessary or sufficient.
-Concerned proxy sites might decide to send a wafer
-(named ``NOTICE'' for example)
-containing text along the lines of the following.
-<blockquote>
-<p>
-<a name="licenses_on_cookies_refused">TO WHOM IT MAY CONCERN</a>
-<i>
-<br>
-<br>
-Do not send me any copyrighted information other than the
-document that I am requesting or any of its necessary components.
-<br>
-<br>
-In particular do not send me any cookies that
-are subject to a claim of copyright by anybody.
-Take notice that I refuse to be bound by any license condition
-(copyright or otherwise) applying to any cookie.
-</i>
-</blockquote>
-Any company that tries to argue in court that the proxy site
-was breaching their copyright in the cookies would
-be met with the defense that the proxy site gave that company
-the opportunity to protect its copyright by simply
-not sending cookies after receiving the notice. 
-<p>
-<a name="pointer">Cookies can be as long as four thousand characters,</a>
-so there's plenty of space for lawyerly verbosity,
-but white space, commas, and semi-colons are
-<a href="ijbman.html#o_w">prohibited.</a>
-Spaces can be turned into underscores.
-Alternatively,
-a
-<small>URL</small>
-could be sent as the cookie value,
-pointing to a document containing a notice,
-perhaps with a suggestive value such as
-<br>
-<big><kbd>http://www.junkbusters.com/ht/en/ijbfaq.html#licenses_on_cookies_refused</kbd></big>
-<br>
-But including the notice directly would probably be preferable
-because the addressee does not have to look it up.
-<p>
-<a name="vanilla">The</a>
-Internet Junkbuster 2.0
-currently sends a full notice as a
-``vanilla wafer''
-if cookies are being logged to a cookie jar
-and no other wafers have been specified.
-It can be suppressed with the
-<a href="ijbman.html#suppress-vanilla-wafer">suppress-vanilla-wafer</a>
-option,
-which might be used in situations where there is an established understanding
-between the proxy and all who serve it.
-</ul>
-<p>
-<a name="gimme">Junkbusters provides a</a>
-<small>CGI</small>
-script that lets you
-<a href="ijbfaq.html#headers">see</a>
-your wafers as they appear to servers.
-<p>
-<a name="malfunction">Wafers confuse a few fragile servers.</a>
-If this troubles you, don't use this option.
-<p>
-<a name="regardless">Any wafers specified are sent to</a>
-all sites regardless of the cookiefile.
-<a name="compliant">They are appended after any genuine cookies,</a>
-to maintain compliance with
-<a href="links.html#kristol">RFC 2109</a>
-in the event that a path was specified for a cookie.
-The
-<small>RFC</small>'s provisions regarding the
-<big><kbd>$</kbd></big>
-character
-(such as the
-<big><kbd>Version</kbd></big>
-attribute)
-are transparent
-to the proxy; it simply quotes what was recited by the browser.
-<p>
-<a name="personalize">If you want to send wafers only to specific sites,</a>
-you could try putting them your browser's cookie file in a format
-conforming to the Netscape
-<a href="links.html#netscape">specification</a>,
-and then specify in the proxy's cookiefile that cookies are to be
-<a href="ijbfaq.html#directional">sent to</a>
-but not accepted from those sites, so they can't overwrite the file.
-This may work with Netscape but not all other browsers.
-</p>
-
-<h3><a name="jar" href="/cgi-bin/gp?pg=ijbfaq&pr=jar"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Why would anyone want to save their cookies in a ``cookie jar?''
-</h3>
-<p>
-We provided this capability just in case anyone wants it.
-There are a few possible reasons.
-<br><ul  type="1">
-<li>
-<a name="pay">It's conceivable that</a>
-marketing companies might one day
-<a href="new.html#hagel">buy</a>
-history files and cookie jars from consumers
-in the same way that they currently pay them to fill out survey forms.
-With this information they could
-gather psychographic information,
-see which competitors' sites the consumer has visited,
-and discover what advertising is being targeted at them.
-<li>
-<a name="choose">Some consumers might</a>
-employ semi-automated means of sorting through
-their cookie jars, selecting which ones to place in their cookies
-file for use by their browsers.
-Their decisions could be based on payments offered,
-privacy rating systems such as
-<a href="links.html#truste">TRUSTe</a>
-proposes,
-or their own opinion of the company.
-It could be done manually or with software.
-<li>
-<a name="share">Users may even start ``sharing'' cookies among themselves,</a>
-sending back cookies that servers generated for other visitors.
-Servers that aren't expecting this possibility
-will be misled about their visitors' identities.
-Cookies could be shared among users on a single machine,
-or across continents via
-<small>FTP</small>
-and anonymous remailers.
-<a name="disinformation">Privacy activists may promote</a>
-cookie disinformation campaigns
-as a way to defend the public against abuse.
-If a significant percentage of people send disinformative cookies,
-user tracking via cookies may become less reliable and less used.
-</ul>
-</p>
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>
-<br>
-<center>
-<h2><a name="anonymity"><font face="arial, helvetica">
-Anonymity
-</font></a>
-</h2>
-</center>
-<br>For details
-on how your identity can be revealed while you surf,
-see our page on
-<a href="http://www.junkbusters.com/cgi-bin/privacy">privacy.</a>
-Once you start using
-the
-Internet Junkbuster
-you should find that much of the information
-previously indicated on that page will no longer be provided.
-If the
-<big><kbd>REMOTE HOST</kbd></big>
-indicating your IP address is too close for comfort,
-see our suggestions
-<a href="ijbfaq.html#conceal">below</a>
-on how to
-conceal
-your IP address.
-We also recommend that you
-<a href="cookies.html">disable JavaScript</a>
-and
-<a href="links.html#java">Java.</a>
-
-<h3><a name="disclose" href="/cgi-bin/gp?pg=ijbfaq&pr=disclose"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-If I use the Internet Junkbuster, will my anonymity be guaranteed?
-</h3>
-<p>
-No. Your chances of remaining anonymous are improved,
-but unless you are an expert on Internet security
-it would be safest to assume that everything you do on the Web
-can be attributed to you personally.
-<p>
-<a name="happen">The</a>
-Internet Junkbuster
-removes various information about you,
-but it's still possible that web sites can find out who you are.
-Here's one way this can happen.
-<p>
-<a name="ftp">A few browsers</a>
-<a href="http://www.junkbusters.com/cgi-bin/privacy">disclose the user's email address</a>
-in certain situations, such as when transferring a file by
-<small>FTP</small>.
-The
-Internet Junkbuster 2.0
-does not filter the
-<small>FTP</small>
-stream.
-If you need this feature, or are concerned about the mail handler
-of your browser disclosing your email address,
-you might consider
-products such as
-<a href="links.html#nsclean">NSClean</a>.
-<p>
-<a name="binaries">Browsers downloaded as binaries</a>
-could use non-standard headers to give out any information
-they can have access to: see the manufacturer's license agreement.
-It's impossible to anticipate and prevent every breach of privacy that
-might occur.
-The professionally paranoid prefer browsers available as source code,
-because anticipating their behavior is easier.
-</p>
-
-<h3><a name="should" href="/cgi-bin/gp?pg=ijbfaq&pr=should"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Why should I trust my ISP or Junkbusters with my browsing data?
-</h3>
-<p>
-You shouldn't have to trust us, and you certainly don't have to.
-We do not run the proxy as a service,
-where we could observe your online behavior.
-We provide source code so that everyone can see that the proxy isn't
-doing anything sneaky.
-<p>
-<a name="awful">You are already trusting your</a>
-<small>ISP</small>
-not to look at an awful lot of information on what you do.
-They probably post a
-<a href="links.html#policy">privacy policy</a>
-on their site to reassure you.
-If they run a proxy for you, using it could actually
-make it slightly easier for them to monitor you,
-but we doubt that any sane
-<small>ISP</small>
-would try this,
-because if it were discovered customers would desert them.
-</p>
-
-<h3><a name="header" href="/cgi-bin/gp?pg=ijbfaq&pr=header"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-What private information from server-bound headers is removed?
-</h3>
-<p>
-The
-Internet Junkbuster
-pounces on the following
-<small>HTTP</small>
-headers in requests to servers,
-unless instructed otherwise in the options.
-<br><ul  type="1">
-<li>
-<a name="from">The</a>
-<big><kbd>FROM</kbd></big>
-header,
-which a few browsers use to tell your email address to servers,
-is dropped
-unless the
-<a href="ijbman.html#from">from</a>
-option is set.
-<li>
-<a name="agent">The</a>
-<big><kbd>USER_AGENT</kbd></big>
-<a name="infer">header</a>
-is changed to indicate that the browser is
-currently Mozilla (Netscape) 3.01 Gold
-with an unremarkable Macintosh configuration.
-Misidentification helps resist certain
-<a href="ijbfaq.html#misidentify">attacks.</a>
-If your browser and hardware happen to be accurately identified,
-you might want to change the default.
-(Earlier versions of the
-Internet Junkbuster
-indicated different details;
-by altering them periodically we aim to hinder anyone trying to
-<a href="ijbfaq.html#detect">infer</a>
-whether our proxy is present.)
-<a name="lying">If you don't like the idea</a>
-of incorrectly identifying your computer as a Mac,
-set it accordingly.
-<!-- Aside: or read Kundera's Unbearable Lightness of Being, 5:5, ``It is a tragicomic fact..'' (p187?) -->
-<li>
-<a name="referer">The</a>
-<big><kbd>REFERER</kbd></big>
-header
-(which indicates where the
-<small>URL</small>
-currently being requested was found)
-is dropped.
-A single static referer to replace all
-real referers may be specified using the 
-<a href="ijbman.html#referer">referer</a>
-option.
-Where no referer is provided by the browser, none is added;
-the
-<a href="ijbman.html#add-header">add-header</a>
-option with arguments such as
-<big><kbd>-x 'Referer: http://me.me.me'</kbd></big>
-can be used to send a bogus referer with every request.
-</ul>
-In 
-Version <a href="ijbdist.html#c4">1.4</a>
-and later you can use the
-<a href="ijbman.html#o_r">-r @</a>
-option to selectively disclose
-<big><kbd>REFERER</kbd></big>
-and
-<big><kbd>USER_AGENT</kbd></big>
-to only those sites you nominate.
-<p>
-<a name="UA">Some browsers</a>
-send Referer and User-Agent information under different non-standard headers.
-The
-Internet Junkbuster 2.0
-stops
-<big><kbd>UA</kbd></big>
-headers,
-but others may get through.
-This information is also available via JavaScript,
-so
-<a href="cookies.html">disable disable</a>
-it.
-<a name="indexers">Some search engines</a>
-<a href="cookies.html#queries">encode the query you typed</a>
-in the
-<small>URL</small>
-that goes to advertisers to target a banner ad at you,
-so you will need to block the ad as well as the referer header,
-unless you want them (and anyone they might
-<a href="cookies.html#set">buy data</a>
-from)
-to know
-<a href="links.html#search">everything you ever search for.</a>
-<p>
-<a name="JavaScript">If you have JavaScript enabled (the default on</a>
-most browsers) servers can use it to obtain Referer and User Agent,
-as well as your plug-ins.
-We recommend
-<a href="cookies.html#java">disabling</a>
-JavaScript and Java.
-<p>
-<a name="response">Currently no</a>
-<small>HTTP</small>
-response headers (browser bound)
-are removed,
-not even the
-<big><kbd>Forwarded:</kbd></big>
-or
-<big><kbd>X-Forwarded-For:</kbd></big>
-headers.
-Nor are any added,
-<a href="ijbman.html#o_y">unless requested.</a>
-We are considering a more flexible header management system for
-a future version.
-</p>
-
-<h3><a name="breakage" href="/cgi-bin/gp?pg=ijbfaq&pr=breakage"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Might some things break because header information is changed?
-</h3>
-<p>
-Possibly.  If used with a browser less advanced than Netscape 3.0 or IE-3,
-indicating an advanced browser
-may encourage pages containing extensions that confuse your browser.
-If this becomes a problem
-upgrade your browser or
-use the
-<a href="ijbman.html#user-agent">user-agent</a>
-option to indicate an
-<a href="ijbfaq.html#low">older browser.</a>
-In 
-Version <a href="ijbdist.html#c4">1.4</a>
-and later you can selectively reveal your real browser
-to only those sites you nominate.
-<p>
-<a name="Russian">Because different browsers</a>
-use different encodings of Russian characters,
-certain web servers convert pages on-the-fly according to the User Agent
-header. Giving a User Agent with the wrong operating system or
-browser manufacturer causes some Russian sites to be garbled;
-Russian surfers should
-<a href="ijbman.html#o_r">change it</a>
-to something closer.
-<p>
-<a name="counters">Some</a>
-<a href="http://www.yahoo.com/Computers_and_Internet/Internet/World_Wide_Web/Programming/Access_Counts/">page access counters</a>
-work by looking at the referer;
-they may fail or break when deprived.
-<p>
-<a name="wired">Some sites depend on getting a referer header,</a>
-such as
-<big><kbd>uclick.com</kbd></big>,
-which serves comic strips
-for many newspaper sites,
-including
-<a href="http://www.uclick.com/?feature=db"><cite>Doonsbury</cite></a>
-for the
-<a href="http://www.washingtonpost.com/wp-srv/style/longterm/comics/comics.htm"><cite>Washington Post.</cite></a>
-(If you click on that last link, you can then get to a page containing
-the strip via the
-same
-<small>URL</small>
-we've linked to under
-<cite>Doonsbury</cite>,
-but if you click on the
-<cite>Doonsbury</cite>
-link directly, it gives you an error message suggesting that you
-use a browser that supports referers.)
-In 
-Version <a href="ijbdist.html#c4">1.4</a>
-and later you can use the
-<a href="ijbman.html#o_r">-r @</a>
-option
-and place a line like
-<big><kbd>&gt;uclick.com</kbd></big>
-in your cookiefile.
-<a href="http://www.wired.com/news/">Wired News</a>
-used to use referer to decide whether to add a navigation column to
-the page, but they have changed that.
-<p>
-<a name="Intellicast">The weather maps of</a>
-<a href="links.html#Intellicast">Intellicast</a>
-have been blocked by their server when no referer or cookie is provided.
-You can use the same countermeasure with a line such as
-<big><kbd>&gt;208.194.150.32</kbd></big>
-(or simply get your weather information
-<a href="ijbfaq.html#buyers">elsewhere</a>).
-<p>
-<a name="decide">Some software vendors, including</a>
-<a href="http://www.intuit.com/quicken_store/">Intuit</a>
-use
-<big><kbd>USER_AGENT</kbd></big>
-to decide which versions of their products to display to you.
-With the
-<a href="ijbfaq.html#agent">default</a>
-you get Mac versions.
-<p>
-<a name="resort">As a last resort if a site you need doesn't seem to be working,</a>
-the
-<a href="ijbfaq.html#set">proxy configuration</a>
-of many browsers allow you to specify
-<b><font face="arial, helvetica">
-No Proxy For</font></b>
-any hostname you want.
-<p>
-<a name="What">We had reports that on some versions of Netscape the</a>
-<a href="http://home.netscape.com/home/whats-new.html">What's New</a>
-feature did not work with the proxy,
-but we think we fixed this in Version 2.0.1.
-</p>
-
-<h3><a name="misidentify" href="/cgi-bin/gp?pg=ijbfaq&pr=misidentify"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How is misidentifying my browser good for security and privacy?
-</h3>
-<p>
-Almost
-<a href="new.html#Browser">every</a>
-major release of both leading browsers has contained
-bugs that allow malicious servers to compromise your privacy and security.
-Known bugs are quickly fixed, but millions of copies of the affected
-software remain out there, and yours is probably one of them.
-The
-<a href="ijbfaq.html#agent">header</a>
-that normally identifies your browser tells such servers exactly which attacks
-to use against you.
-By misidentifying your browser you reduce the likelihood that they
-will be able to mount a successful attack.
-</p>
-
-<h3><a name="conceal" href="/cgi-bin/gp?pg=ijbfaq&pr=conceal"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Does the Internet Junkbuster conceal my IP address?
-</h3>
-<p>
-Web sites get the IP address of any proxy or browser they serve pages to.
-If you run the proxy on your own computer the IP address disclosed
-is the same as your browser would, unless you use the
-<a href="ijbman.html#forwardfile">forwardfile</a>
-option is used to chain to another proxy,
-in which case servers only get the last IP address in the chain.
-Chaining slightly slows browsing of course, but it improves anonymity.
-<p>
-<a name="anonymizing">One public proxy that you can</a>
-forward to is
-<a href="new.html#LPWA">lpwa.com</a>
-port 8000.
-Read about its privacy-enhancing
-features and the authentication procedures first,
-and note that it blocks
-<a href="ijbfaq.html#wired">referer</a>
-in almost all cases,
-as well as some
-<a href="http://lpwa.com:8000/system.html#principles:header">other headers.</a>
-</p>
-
-<h3><a name="authorize" href="/cgi-bin/gp?pg=ijbfaq&pr=authorize"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-How can I set the proxy to remember my LPWA password?
-</h3>
-<p>
-After you log in to
-<a href="http://lpwa.com">LPWA</a>
-it tells your browser to send a
-<big><kbd>Proxy-authorization</kbd></big>
-header with each request.
-Whenever you shut down the browser and start again with a new browser,
-you need to log in again.
-If you are the only person using the
-Internet Junkbuster
-proxy, you can avoid repeated logins to
-<a href="http://lpwa.com">LPWA</a>
-by telling the
-Internet Junkbuster
-to send the information by placing a line such as
-<br>
-&#160;&#160;&#160;<big><kbd>add-header Proxy-authorization: Basic ZHVtbXk=.</kbd></big>
-<br>
-in the configuration file.
-The exact example above
-<em>does not work</em>
-because the code
-<big><kbd>ZHVtbXk=.</kbd></big>
-is a bogus one that
-<a href="http://lpwa.com">LPWA</a>
-would never generate;
-follow the procedure below to generate a valid one.
-<br><ol  type="1">
-<li>
-<a name="eight">Restart your</a>
-Internet Junkbuster
-with
-<big><kbd>debug 8</kbd></big>
-so you can see the
-<a href="ijbman.html#o_d">headers.</a>
-<li>
-<a name="login">Log in to</a>
-<a href="http://lpwa.com">LPWA</a>
-and go to any other site.
-<li>
-<a name="observe">Find the</a>
-<big><kbd>Proxy-authorization</kbd></big>
-header from the debug output and paste it
-after the word
-<a href="ijbman.html#add-header">add-header</a>
-into the config file.
-Also change the debug value back again.
-<li>
-<a name="return">Shut down your browser, start it up again, and</a>
-restart the proxy. Test that it works.
-</ol>
-This trick is convenient for sole users, but is not suitable when
-more than one person uses the proxy, because they will all get the
-same
-<a href="http://lpwa.com">LPWA</a>
-identity.
-</p>
-
-<h3><a name="ident" href="/cgi-bin/gp?pg=ijbfaq&pr=ident"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Does the Internet Junkbuster thwart identification by identd?
-</h3>
-<p>
-We think so,
-provided you are not the user running the
-proxy.
-If your computer (or your
-<small>ISP</small>'s)
-is running the
-<a href="links.html#identd"><kbd>identd</kbd></a>
-demon,
-servers can ask it for the identity of the
-user making the request at time you request a page from them.
-But if you're going through a proxy,
-they will identify the user name associated with the proxy, not you.
-A visit to
-<a href="http://ident.junkbusters.com">http://ident.junkbusters.com</a>
-lets you see what's happening.
-This test is (quite rightly) blocked by many
-<a href="ijbfaq.html#firewall">firewalls;</a>
-just interrupt the transfer if you get an abnormal wait after clicking.
-Running other applications
-may also expose you via
-<a href="links.html#identd"><kbd>identd</kbd></a>;
-the proxy of course doesn't help then.
-</p>
-
-<h3><a name="detect" href="/cgi-bin/gp?pg=ijbfaq&pr=detect"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Can web sites tell that I'm using the Internet Junkbuster?
-</h3>
-<p>
-With the default options the proxy doesn't announce itself.
-Obvious indications such as
-<a href="links.html#alive">Keep-Alive</a>
-headers are
-<a href="ijbman.html#o_x">deleted,</a>
-but sites might notice that you can cancel cookies faster than
-any human could possibly click on a mouse.
-(If you want to provide a
-plausible explanation for this,
-change the User Agent header to a
-<a href="ijbfaq.html#lynx">cookie-free</a>
-or
-<a href="cookies.html#communicator">cookie-crunching</a>
-browser).
-<p>
-<a name="figure">But when certain options</a>
-are used they could figure out something's going on,
-even if they're not pushing cookies.
-If you use blocking
-they can tell from their logs that the graphics in their pages
-are not being requested selectively.
-The
-<a href="ijbman.html#add-forwarded-header">add-forwarded-header</a>
-option explicitly announces to the server that a proxy is present,
-and
-sending them
-<a href="ijbfaq.html#wafers">wafers</a>
-is of course a dead giveaway.
-</p>
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>
-<br>
-<center>
-<h2><a name="security"><font face="arial, helvetica">
-Security
-</font></a>
-</h2>
-</center>
-<br>
-<h3><a name="encrypt" href="/cgi-bin/gp?pg=ijbfaq&pr=encrypt"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-What happens with Secure Documents (SSL, https:)?
-</h3>
-<p>
-If you enter a
-``Secure Document Area,''
-cookies and other header information
-such as User Agent and Referer
-are sent encrypted,
-so they cannot be filtered.
-We recommend getting your browser to alert you when this happens.
-(On Netscape:
-<b><font face="arial, helvetica">
-Options</font></b>;
-<b><font face="arial, helvetica">
-Security</font></b>;
-<b><font face="arial, helvetica">
-General</font></b>;
-<b><font face="arial, helvetica">
-Show an alert before entering a secure document space</font></b>.) 
-We also recommend adding the line
-<big><kbd>:443</kbd></big>
-to the blockfile to stop all but sites specified in an exception
-after that line from using SSL.
-<p>
-<a name="passage">It may be possible to filter encrypted cookies</a>
-by combining the blocking proxy with a cryptographic proxy along
-the lines of
-<a href="http://stronghold.ukweb.com/safepassage/">SafePassage</a>,
-but we have not tried this.
-</p>
-
-<h3><a name="ssl" href="/cgi-bin/gp?pg=ijbfaq&pr=ssl"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Will using this as my Security Proxy compromise security?
-</h3>
-<p>
-We're not security experts, but we don't think so.
-The whole point of
-<small>SSL</small>
-is that the
-contents of messages are
-<!-- IEM: http://addy.com/dc/html/what_is_ssl_.html -->
-encrypted
-by the time
-they leave the browser and the server.
-Eavesdroppers (including proxies) can see where your messages are going
-whether you are running a proxy or not,
-but they only get to see the contents after they have been encrypted.
-</p>
-
-<h3><a name="restrict" href="/cgi-bin/gp?pg=ijbfaq&pr=restrict"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Can I restrict use of the proxy to a set of nominated IP addresses?
-</h3>
-<p>
-Yes, we added an
-<a href="ijbman.html#aclfile">access control</a>
-file in Version 2.0.
-But before you use it please consider why you want to do it.
-If the reason is security,
-it probably means you need a firewall.
-<p>
-<a name="selective">The</a>
-<a href="ijbman.html#listen-address">listen-address</a>
-option provides a way of binding the proxy to a single IP address/port.
-The right way to do this is to choose a port inside your firewall, and
-deny access to it to those outside the firewall.
-The
-Internet Junkbuster
-is not a firewall proxy;
-it should not be expected to solve security problems.
-<p>
-<a name="firewall">For background information on firewalls,</a>
-see
-<a href="http://www.yahoo.com/Computers_and_Internet/Security_and_Encryption/Firewalls/">Yahoo</a>
-or a
-<a href="http://www.netscapeworld.com/ned-02-1998/ned-02-firewall.html">magazine article</a>
-or these well-known books:
-<a href="http://www.amazon.com/exec/obidos/ISBN=0201633574/junkbusterscomA/"><cite>Firewalls and Internet Security: Repelling the Wily Hacker</cite></a>
-by
-<person>William R. Cheswick</person>
-and
-<person>Steven M. Bellovin</person>
-or
-<a href="http://www.amazon.com/exec/obidos/ISBN=1565921240/junkbusterscomA/"><cite>Building Internet Firewalls</cite></a>
-by
-<person>D. Brent Chapman</person>
-and
-<person>Elizabeth D. Zwicky</person>.
-There's
-<!-- IEM: http://www.wmd.de/wmd/staff/pauck/misc/fwtk_on_linux.html -->
-free Linux software
-available,
-and a large number of
-<a href="http://www.yahoo.com/Business_and_Economy/Companies/Computers/Software/System_Utilities/Security/Firewalls/">commercial</a>
-products and services.
-For an excellent security overview, primer, and compendium reference, see
-<a href="http://www.amazon.com/exec/obidos/ISBN=1565921488/junkbusterscomA/"><cite>Practical Unix and Internet Security</cite></a>
-by
-<person>Simson Garfinkel</person>
-and
-<person>Gene Spafford</person>.
-</p>
-
-<h3><a name="others" href="/cgi-bin/gp?pg=ijbfaq&pr=others"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Are there any security risks for ISPs or others who offer the proxy?
-</h3>
-<p>
-Yes.
-As with any service offered over the Internet,
-hackers can try to misuse it.
-A well-run
-<small>ISP</small>
-will have professionals who are experienced at assessing and containing
-these risks.
-<p>
-<a name="outside">It's possible to set up your machine so</a>
-that other people can have access to your proxy,
-but if you lack expertise in computer security
-you probably shouldn't have your computer configured to offer
-this or any other service to the outside world.
-<p>
-<a name="attack">Hackers can attempt to gain access</a>
-to the machine by various attacks,
-which we have tried to guard against but don't guarantee to thwart.
-They can also use the ``anonymizing'' quality of proxies
-to try to cover their tracks while hacking other computers.
-For this reason we recommend preventing it being used
-as an anonymous
-<big><kbd>telnet</kbd></big>
-by putting the pattern
-<big><kbd>:23</kbd></big>
-in the blockfile (it's included as standard equipment).
-(Actually the current implementation incidentally blocks telnet due to the
-way headers are handled, but it's best not to rely on this.)
-If you wish to block all ports except the default
-<small>HTTP</small>
-port 80,
-you can put the lines
-<br>
-&#160;&#160;&#160;<big><kbd>:</kbd></big>
-<br>
-&#160;&#160;&#160;<big><kbd>~:80</kbd></big>
-<br>
-at the beginning of the blockfile, but be aware that some servers
-run on non-default ports (e.g. 8080). You might also want to add the line
-<big><kbd>~:443</kbd></big>
-to allow
-<small>SSL</small>.
-<p>
-<a name="root">On</a>
-<small>UNIX <a href="legal.html#not_our_trademark">&#174;</a></small>
-systems it is neither necessary nor desirable for the proxy to run as root.
-<p>
-<a name="patched">Versions 2.0.1 and below may be vulnerable to remote</a>
-exploitation of a memory buffer bug; for security reasons all users
-are encouraged to
-<a href="ijbdist.html#upgrade">upgrade.</a>
-<p>
-<a name="holes">If you find any security holes in the code</a>
-please
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=holes">tell us,</a>
-along with any suggestions you may have for fixing it.
-However, we do not claim that we will be able to do so.
-<p>
-<a name="useful">We distribute this code in the hope that people</a>
-will find it useful, but we provide
-<a href="ijbfaq.html#free">no warranty</a>
-for it,
-and we are not responsible for anyone's use or misuse of it.
-<p>
-<a name="updates">You may also want to check back periodically for updated versions of the code.</a>
-We do not
-maintain a mailing list.
-To get quick updates, bookmark our
-<a href="ijbdist.html#versions">Distribution Information</a>
-page.
-</p>
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>
-<font face="arial, helvetica">
-<a rel="begin" href="index.html">Home</a> <font color="#ff0000">
-<b> &#183; </b></font>
-<a rel="next" href="ijbman.html">Next</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="lopt.html">Site Map</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="legal.html">Legal</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="junkdata.html">Privacy</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="cookies.html">Cookies</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="ijb.html">Banner Ads</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="telemarketing.html">Telemarketing</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="junkmail.html">Mail</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="junkemail.html">Spam</a>
-
-</font><form action="/cgi-bin/search" method="GET">
-<input type="text" name="q" size=60 maxlength=120 value="">
-<input type="submit" value="Search"></form>
-<small>
-<small>
-<p>
-<a href="legal.html#copy">Copyright</a> &#169; 1996-8 Junkbusters
-<a href="legal.html#marks">&#174;</a> Corporation.
-Copying and distribution permitted under
-the <a href="gpl.html"><small>GNU</small></a>
-General Public License.
-</small>
-<tt>
-1998/10/31
-http://www.junkbusters.com/ht/en/ijbfaq.html
-</tt>
-<address><kbd>webmaster&#64;junkbusters.com</kbd></address>
-</small>
-</body>
+  <head>
+    <title>Internet Junkbuster Frequently Asked Questions</title>
+    <meta name="description" content=
+    "An extensive FAQ on the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser.">
+    <meta name="keywords" content=
+    "stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, consumer, sending, opt out, privacy, advertising, direct, marketing, targeting, through, click, trails, http_referer, cookie, cutter, iff, internet fast forward, Cookie Management Tool">
+<style type="text/css">
+<!--
+h2           { text-align: Center; font-family: arial, helvetica, sans-serif }
+p.sans       { font-family: arial, helvetica, sans-serif }
+b.dot        { color: #FF0000 }
+b.eg         { font-family: arial, helvetica, sans-serif }
+-->
+</style>
+  </head>
+
+  <body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink=
+  "#787878">
+    <p class="sans"><a href="http://ijbswa.sourceforge.net">
+    Website</a> <b class="dot">&middot;</b> <a href="ijbman.html">
+    Manual</a> <b class="dot">&middot;</b> <b>FAQ</b> <b class=
+    "dot">&middot;</b> <a href="gpl.html">GPL</a></p>
+
+    <h1 align="center"><a name="top_of_page"></a>Internet
+    J<small>UNK<i style="color: #FF0000">BUSTER</i></small>
+    Frequently Asked Questions</h1>
+
+    <p align="center" class="sans"><a href="#browser">Configuring
+    Browsers</a> <b class="dot">&middot;</b> <a href="#defaulted">
+    IE 5.0</a> <b class="dot">&middot;</b> <a href="#local">
+    Installation</a> <b class="dot">&middot;</b> <a href=
+    "#companies">For Companies</a> <b class="dot">&middot;</b> <a
+    href="#blocking">Blocking Ads</a> <b class="dot">&middot;</b>
+    <a href="#cookies">Cookies</a> <b class="dot">&middot;</b> <a
+    href="#hotmail">Hotmail</a> <b class="dot">&middot;</b> <a
+    href="#children">Children</a> <b class="dot">&middot;</b> <a
+    href="#chain">Forwarding/Chaining</a> <b class="dot">
+    &middot;</b> <a href="#conceal">IP</a> <b class="dot">
+    &middot;</b> <a href="#anonymity">Anonymity</a> <b class="dot">
+    &middot;</b> <a href="#security">Security</a></p>
+
+    <h1>This document is out of date</h1>
+
+    <p><b>Development of JunkBuster is ongoing and this document is
+    no longer current. However, it may provide some assistance. If
+    you have problems, please use the <a href=
+    "http://groups.yahoo.com/group/junkbuster-users/">Yahoo Groups
+    mailing list</a> (which includes an archive of mail), the
+    SourceForge.net <a href=
+    "http://sourceforge.net/projects/ijbswa/">project page</a>, or
+    see the project's <a href="http://ijbswa.sourceforge.net/">home
+    page</a>. Please also bear in mind that versions 2.9.x of
+    JunkBuster are development releases, and are not production
+    quality.</b></p>
+
+    <h2><a name="top"></a>The Top Ten Questions</h2>
+
+    <h3><a name="what"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; What is the Internet Junkbuster
+    Proxy and what does it do for me?</h3>
+
+    <p>The Internet Junkbuster Proxy <small><sup>TM</sup></small>
+    is free privacy-enhancing software that can be run on your PC
+    or by your ISP or company. It blocks requests for URLs
+    (typically banner ads) that match its blockfile. It also
+    deletes unauthorized cookies and other unwanted identifying
+    header information that is exchanged between web servers and
+    browsers. These headers are not normally accessible to users
+    (even though they may contain information that's important to
+    your privacy), but with the Internet Junkbuster you can see
+    almost <a href="ijbman.html#o_d">anything you want</a> and
+    control everything you're likely to need. Many people publish
+    their blockfiles to help others get started.</p>
+
+    <h3><a name="free"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Is there a license fee / warranty
+    / registration form / expiration?</h3>
+
+    <p>No, none of these. It's completely free of charge.
+    Junkbusters offers you the software to copy, use, modify and
+    distribute as you wish, forever, at no charge under the GNU
+    General Public License.</p>
+
+    <p><a name="warranty"></a>It comes with no warranty of any
+    kind.</p>
+
+    <p><a name="register"></a>You don't have to register, in fact
+    we don't even provide a way to do so: the practice of
+    registering software is usually just an excuse to send you
+    solicitations and sell your name and information about your
+    behavior. You are welcome to obtain and use our software as
+    anonymously you wish. (Your IP address will naturally be
+    disclosed when you download it; use anonymizing software if you
+    want to conceal this. We never want to be given any information
+    that you consider private or confidential.)</p>
+
+    <p><a name="why"></a>We are often asked why we give away a
+    product that many would happily pay for. The answer is that we
+    are determined to carry out our mission: to free the world from
+    junk communications.</p>
+
+    <h3><a name="windows"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Does it run on Windows? On a Mac?
+    On the AOL browser?</h3>
+
+    <p>For the latest information on availability, see the
+    Distribution Information page. We don't think it will ever run
+    on Windows 3.1. But you don't need to have it running on your
+    computer if you get your ISP or Systems Administrator at work
+    to run it.</p>
+
+    <h3><a name="isp"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; How can I get my ISP to run the
+    Internet Junkbuster?</h3>
+
+    <p>Try their sales or support department (depending on whether
+    you are already a customer). <a name="unaware"></a>You might
+    send them email including the following URL:<br>
+     &nbsp;&nbsp;&nbsp; <code>
+    http://www.junkbusters.com/ht/en/ijbfaq.html#isps</code><br>
+     <a name="switch"></a>You could mention that many other ISPs
+    provide it, and that you regard it as an important part of your
+    decision on where to buy Internet service.</p>
+
+    <h3><a name="who"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Who chooses the options that
+    control what is blocked?</h3>
+
+    <p>Whoever starts the Internet Junkbuster chooses the options
+    and the blockfile. If your ISP runs it for you, they have to
+    make these decision (though some may give you a choice of
+    proxies, and a way to suggest new URLs to block). If you run it
+    on your computer, you get to choose.</p>
+
+    <h3><a name="self"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; How do I download and run the
+    program on my computer?</h3>
+
+    <p>It depends on your platform. If you are using Windows 95 or
+    NT, see our separate page on installing under Windows. If you
+    have a C compiler and are using almost any flavor of UNIX &reg;
+    you download it, compile it, start it running, and then
+    configure your browser. Several precompiled packages are also
+    available through links in our distribution page, which lists
+    all available platforms.</p>
+
+    <p><a name="port"></a>If you are using a platform for which we
+    have no current availability, you are welcome to port the code.
+    If you do this and you would like us to consider publishing
+    your ported version, please tell us.</p>
+
+    <h3><a name="show"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; How can I tell which blockfile
+    and options are being used?</h3>
+
+    <p>Just point your browser to
+    http://internet.junkbuster.com/cgi-bin/show-proxy-args or to
+    any URL ending in <code>show-proxy-args</code> (even if it
+    doesn't exist). It needn't exist because the Internet
+    Junkbuster intercepts the request, blocks it, and returns in
+    its place information about itself. Using the URL above is
+    useful for checking that your browser really is going through
+    an Internet Junkbuster, because the <code>junkbuster.com</code>
+    server returns a warning if the request actually gets to it.
+    Some people set the home page of their browser to such a URL to
+    be sure that it is configured to use the proxy.</p>
+
+    <p><a name="headers"></a>If you wish to check the header
+    information your proxy is actually sending, a visit to
+    http://internet.junkbuster.com/cgi-bin/show_http_headers will
+    give you the more relevant ones first. You might also like to
+    turn the proxy off and compare the difference. (Don't forget to
+    turn it back on again.)</p>
+
+    <h3><a name="responding"></a><img border="0" src="fb.gif" alt=
+    "*" width="14" height="14">&nbsp; My browser started giving me
+    ``server not responding'' messages</h3>
+
+    <p>Once your browser is told to use a proxy such as the
+    Internet Junkbuster, it thinks of it as its server for
+    everything, so this message means it can't talk to the proxy.
+    The Internet Junkbuster may not be running, or you may have
+    specified its proxy address incorrectly. Check that the details
+    you entered are correct. If you have <code>telnet</code> you
+    can try connecting to the appropriate port to see if the
+    Internet Junkbuster is running. If your ISP is running the
+    Internet Junkbuster, you may want to check with them. If you
+    are running it yourself under UNIX &reg;, try looking at a
+    <code>ps ax</code> to see if it is running. The <a href=
+    "ijbman.html#o_h">port</a> specified in its options should be
+    the same one as your browser has configured.</p>
+
+    <h3><a name="idea"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; I've got this great idea for a
+    new feature. Who do I tell?</h3>
+
+    <p>We'd be very interested to hear it, but please bear a few
+    things in mind.</p>
+
+    <ol type="1">
+      <li><a name="considered"></a>Please check this FAQ to see if
+      we've already considered the idea, such as automatic
+      detection of banner ads and replacing ads with something else
+      such as a transparent GIF.</li>
+
+      <li><a name="confidential"></a>Don't tell us anything you
+      want to keep confidential or retain some right over.</li>
+
+      <li><a name="wish"></a>We currently have a long wish list of
+      things that we may or may not do in the near future,
+      including a version for your favorite computer and a plug-in
+      version.</li>
+
+      <li><a name="go4it"></a>If you don't want to wait you're
+      welcome to improve on our code, publish your version on the
+      Web, and tell us where to find it. Projects that are
+      especially welcome include a port to the Mac and extensions
+      for HTTP 1.1. (Meanwhile, be sure your browser is configured
+      not to use HTTP 1.1.)</li>
+    </ol>
+
+    <h3><a name="other"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; My question isn't listed here.
+    Who do I ask for support?</h3>
+
+    <p><a name="harder"></a>If you find using our free product
+    harder than you're used to for consumer software, there are
+    many commercial alternatives that you could consider.</p>
+
+    <p><a name="RTM"></a>The answer to detailed technical questions
+    may be answered in <a href="ijbman.html">manual page</a>, or in
+    the source code. Also double-check this page for an answer:
+    using the ``find'' feature on your browser for likely keywords
+    may help. Our site also has a search feature.</p>
+
+    <p><a name="Use"></a>Many people post requests for help and
+    responses on Usenet.</p>
+
+    <p><a name="them"></a>If your ISP is providing the Internet
+    Junkbuster for you, and your question is about how to use it,
+    check their web page before asking them.</p>
+
+    <p><a name="us"></a>Even though we don't offer the kind of
+    support you might expect if you paid a lot of money for a
+    software product, you can still ask us. But before you do,
+    please consider whether you could ask someone closer to you.
+    And please be patient if we're slow to reply: we never charge
+    consumers for our services, so we have to subsidize consumers
+    with revenue from companies, and our resources are limited.</p>
+
+    <p><a name="quote"></a>If your company or organization would be
+    interested in a maintenance contract with phone and email
+    support, hard copy documentation and source code and
+    pre-compiled binaries on tape or disk, please ask us for a
+    quote.</p>
+
+    <p align="center"><a href="#top_of_page"><img border="0" src=
+    "top.gif" alt="--- Back to Top of Page ---" width="250" height=
+    "15"></a></p>
+
+    <h2><a name="browser"></a>Configuring your browser to talk to
+    the Internet Junkbuster</h2>
+
+    <h3><a name="address"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; What is the proxy address of the
+    Internet Junkbuster?</h3>
+
+    <p><a name="localhost"></a>If you set up the Internet
+    Junkbuster to run on the computer you browse from (rather than
+    your ISP's server or some networked computer at work), the
+    proxy will be on <code>localhost</code> (which is the special
+    name used by every computer on the Internet to refer to itself)
+    and the port will be <code>8000</code> (unless you have told
+    the Internet Junkbuster to run on a different port with the <a
+    href="ijbman.html#listen-address">listen-address</a> option).
+    So you when configuring your browser's proxy settings you
+    typically enter the word <code>localhost</code> in the two
+    boxes next to <b class="eg">HTTP</b> and <b class="eg">
+    Secure</b>, and the number <code>8000</code> in the two boxes
+    labeled to the right of those boxes. <a name="Gopher"></a>The
+    Internet Junkbuster does not currently handle other protocols
+    such as Gopher, FTP, or WAIS, so leave those setting unchanged.
+    Nor does it handle ICQ or Instant Messenger services.</p>
+
+    <p><a name="remote"></a>If your ISP or company is running the
+    Internet Junkbuster for you, they will tell you the address to
+    use. It will be the name of the computer it's running on (or
+    possibly its numeric IP address), plus a port number. Port 8000
+    is the default, so assume this number if it is not specified.
+    Sometimes a colon is used to glue them together, as in <code>
+    junkbuster.fictitious-pro-privacy-isp.net:8000</code> but with
+    most browsers you do not type the colon, you enter the address
+    and port number in separate boxes.</p>
+
+    <h3><a name="set"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; How do I tell the browser where
+    to find the Internet Junkbuster?</h3>
+
+    <p>All current browsers can be told the address of a proxy to
+    use. You enter the same information in two fields in your
+    browser's proxy configuration screen (see list below): one for
+    HTTP, and one for the Secure Protocol (assuming your browser
+    supports SSL). If you find some information already entered for
+    your proxy, see the next question. Here are the menus you go
+    through to get to the proxy configuration settings. (We also
+    recommend that you disable Java, which is a separate
+    operation.) <strong>Make notes on the changes you make so you
+    know how to undo them!</strong> You will need to know what you
+    did in case you wish to discontinue using the proxy.</p>
+
+    <ol type="1">
+      <li><a name="netscape"></a>For Netscape 2.01, 2.02 and 3.0
+      [Graphic Illustration]: <b class="eg">Options</b>; <b class=
+      "eg">Network Preferences</b>; <b class="eg">Proxies</b>; <b
+      class="eg">Manual Proxy Configuration View ;</b> enter proxy
+      address details under <b class="eg">HTTP</b> and <b class=
+      "eg">Security Proxy</b>; click on <b class="eg">OK</b>; click
+      on the next <b class="eg">OK</b>. [Return to Windows
+      Installation Procedure]<br>
+       With Netscape 2.0, follow with <b class="eg">Options</b>, <b
+      class="eg">Save Options</b>.<br>
+       <a name="Netscape4.02"></a>With Netscape 4.X series, you
+      first have to go through <b class="eg">Edit/Preferences</b>.
+      [Graphic Illustration] Then in the frame on the left, click
+      on triangle pointing to the right towards the word <b class=
+      "eg">Advanced</b>; it will switch to a triangle pointing
+      down; and the words <b class="eg">Cache</b>, <b class="eg">
+      Proxies</b> and <b class="eg">Disk Space</b> appear. Click on
+      <b class="eg">Proxies</b> and the frame on the right will
+      display a banner saying <b class="eg">Proxies Configure
+      proxies to access the Internet</b>. Click the radio button
+      labeled <b class="eg">Manual proxy configuration</b> then
+      click the button labeled <b class="eg">View</b>; enter proxy
+      address details under <b class="eg">HTTP</b> and <b class=
+      "eg">Security Proxy</b>; click on <b class="eg">OK</b>; click
+      on the next <b class="eg">OK</b>. [Return to Windows
+      Installation Procedure]</li>
+
+      <li><a name="explorer3"></a>For Internet Explorer 3.0
+      [Graphic Illustration]: <b class="eg">View</b>; <b class=
+      "eg">Options</b>; <b class="eg">Connections</b>; tick <b
+      class="eg">Connect through proxy server</b> box; <b class=
+      "eg">Settings</b>; enter proxy address details <b class="eg">
+      HTTP</b> Box, with port number in the second box; same with
+      <b class="eg">Secure</b>; click on <b class="eg">OK</b>.
+      [Return to Windows Installation Procedure]</li>
+
+      <li><a name="explorer2"></a>For Internet Explorer 2.0: <b
+      class="eg">View</b>; <b class="eg">Options</b>; <b class=
+      "eg">Proxy</b>; enter proxy address details click on <b
+      class="eg">OK</b>. [Return to Windows Installation
+      Procedure]</li>
+
+      <li><a name="nt"></a>On NT for MS-IE: <b class="eg">Control
+      Panel</b>; <b class="eg">Internet</b>; <b class="eg">
+      Advanced</b>; <b class="eg">Proxy</b>.</li>
+
+      <li><a name="if"></a>For MS-IE 4.0: similar to 3.0: <b class=
+      "eg">View</b>; <b class="eg">Internet Options</b>; <b class=
+      "eg">Connection</b>; tick <b class="eg">Access Internet using
+      a proxy server</b> box; from there we have had reports of
+      different versions, either click on <b class="eg">
+      Advanced</b> or <b class="eg">Settings</b>; enter proxy
+      address details <b class="eg">HTTP</b> Box, with port number
+      in the second box; same with <b class="eg">Secure</b>; click
+      on <b class="eg">OK</b>. Note that 4.0 has <b class="eg">
+      Advanced</b> settings to allow HTTP 1.1 through proxies;
+      these must be disabled because the proxy does not currently
+      understand HTTP 1.1. Please tell us if you see any other
+      differences. [Return to Windows Installation Procedure]</li>
+
+      <li><a name="IE5"></a>For MS-IE 5.0: similar to 4.0: <b
+      class="eg">Tools|Internet Options</b> from the menu bar; <b
+      class="eg">Connections</b>. Select either dial-up connection
+      or LAN (depending on how you connect to the Internet); press
+      <b class="eg">Settings</b>; and check the <b class="eg">Use
+      Proxy Server</b> box; enter proxy address details in the <b
+      class="eg">HTTP</b> Box, with port number in the second box;
+      same with <b class="eg">Secure</b>; click on <b class="eg">
+      OK</b> buttons to get out. <em>Note:</em> <a name=
+      "defaulted"></a>You must also uncheck the HTTP 1.1 checkboxes
+      at the end of the <b class="eg">Advanced</b> options. This
+      seems to have been made the default in IE 5.0. [Return to
+      Windows Installation Procedure]</li>
+
+      <li><a name="level5"></a>For Netscape's level 5 browser, we
+      have no information. If you do, please tell us.</li>
+
+      <li><a name="mosaic"></a>For NCSA Mosaic for Windows: <b
+      class="eg">Options</b>, <b class="eg">Preferences</b>, <b
+      class="eg">Proxy</b>; enter proxy address details under <b
+      class="eg">HTTP</b>.</li>
+
+      <li><a name="Opera"></a>For Opera: <b class="eg">
+      Preferences</b>, <b class="eg">Proxy servers</b>; check the
+      box next to HTTP; enter the server and port number in the box
+      on the other side; click on <b class="eg">OK</b>.</li>
+
+      <li><a name="lynx"></a>For Lynx, Mosaic/X, <a href=
+      "http://monty.cnri.reston.va.us/grail-0.3/">Grail,</a> and
+      W3O Arena, you can specify the proxy via environment
+      variables before starting the application. This will probably
+      be done with something like either<br>
+       &nbsp;&nbsp;&nbsp;<code>setenv http_proxy
+      http://localhost:8000/</code><br>
+       or<br>
+       &nbsp;&nbsp;&nbsp; <code>
+      http_proxy=http://junkbuster.fictitious-pro-privacy-isp.net:8000/
+      export http_proxy</code><br>
+       depending on your shell and where the Internet Junkbuster
+      lives.</li>
+    </ol>
+
+    <p>If your browser is not listed here, or if you notice an
+    error, please tell us the correct procedure.</p>
+
+    <h3><a name="already"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; What should I do if I find
+    another proxy is already configured?</h3>
+
+    <p>Some ISPs and companies require all Web traffic to go
+    through their proxy. In this case you would find your proxy
+    configuration with values already set, possibly under <a name=
+    "Automatic"></a>Automatic Proxy Configuration (in the case of
+    Netscape and MS-IE 3.0 and above). It's probably a firewall
+    proxy between your company and the outside world, <a name=
+    "cache"></a>or a caching proxy if you're using an ISP.</p>
+
+    <p><a name="f"></a>What needs to be done in this case is to use
+    the <a href="ijbman.html#forwardfile">forwardfile</a> option to
+    tell the Internet Junkbuster the address of the other proxy.
+    Specify a different (unused) port number with the <a href=
+    "ijbman.html#listen-address">listen-address</a> option, and
+    configure your browser to use that port. If you haven't done
+    this kind of thing before, it's probably best to consult your
+    systems administrator or ISP about it; check their web page
+    first.</p>
+
+    <h3><a name="discontinue"></a><img border="0" src="fb.gif" alt=
+    "*" width="14" height="14">&nbsp; What if I want to stop using
+    the Internet Junkbuster?</h3>
+
+    <p>Just go through the same procedure you used to start your
+    browser using the Internet Junkbuster, but remove the details
+    you put in (or if there was something there before, restore
+    it). You may need to use <b class="eg">Save Options</b> to make
+    this change permanent. On Netscape 3.0 you can go through <b
+    class="eg">Options</b>; <b class="eg">Network Preferences</b>;
+    <b class="eg">Proxies</b> and click on <b class="eg">No
+    Proxy</b> to turn it off, and later click on <b class="eg">
+    Manual Proxy Configuration</b> if you want to start using it
+    again. (No need to enter the again details under <b class="eg">
+    View</b> as you did the first time; they should remain there
+    unchanged.)</p>
+
+    <p><a name="shut"></a>This stops your browser talking to the
+    proxy; shutting down the proxy is a different matter.</p>
+
+    <h3><a name="dial"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Automatic dialing isn't working
+    any more. How do I fix it?</h3>
+
+    <p>Some browsers (such as MSIE-4) can be configured to dial
+    your ISP automatically when you click on a link, but this
+    feature (called "automatically connect" or "autoconnect") gets
+    disabled if you specify a proxy running on your own computer
+    (with address <code>localhost</code> or <code>127.0.0.1</code>)
+    because these addresses don't require dialing. The Internet
+    Junkbuster knows nothing about dialing, so it doesn't work. To
+    make automatic dialing work, make up a name such as <code>
+    junkbuster.ijb</code> and use that name in the proxy settings
+    instead of <code>localhost</code>, and then add the line <code>
+    127.0.0.1 junkbuster.ijb</code> to the file <code>
+    c:\windows\hosts</code> (if there already is a line beginning
+    with <code>127.0.0.1</code> just add <code>
+    junkbuster.ijb</code> at the end of it.)</p>
+
+    <p><a name="also"></a>This should also work Netscape
+    Communicator 4 on machines where IE-4 has been installed.</p>
+
+    <p align="center"><a href="#top_of_page"><img border="0" src=
+    "top.gif" alt="--- Back to Top of Page ---" width="250" height=
+    "15"></a></p>
+
+    <h2><a name="local"></a>Setting up the Internet Junkbuster on
+    your local computer</h2>
+
+    <p>The next two sections assume you wish to compile the code
+    with your own C compiler. <a name="install"></a>If you just
+    want to use the <code>.exe</code> file provided for Windows,
+    see the Windows Installation page.</p>
+
+    <h3><a name="u"></a><img border="0" src="fb.gif" alt="*" width=
+    "14" height="14">&nbsp; How do I compile the code under
+    Unix?</h3>
+
+    <p>If you are running Redhat Linux you may prefer to use the
+    rpm instead of the following procedure.</p>
+
+    <ol type="1">
+      <li><a name="download"></a>First download the tar file
+      (~286k) <a name="tar"></a>and uncompress and extract the
+      files from it with this command<br>
+       &nbsp;&nbsp;&nbsp;<code>uncompress -c ijb20.tar.Z | tar xf
+      -</code></li>
+
+      <li><a name="sun"></a>If your operating system is from Sun or
+      HP examine the <code>Makefile</code> and make any changes
+      indicated inside.</li>
+
+      <li><a name="make"></a>Run<br>
+      <br>
+       &nbsp;&nbsp;&nbsp;<code>make</code></li>
+
+      <li>
+        <a name="defaults"></a>Copy the sample configuration file
+        (<code>junkbstr.ini</code>, previously called <code>
+        sconfig.txt</code> and other names in earlier releases) to
+        some convenient place such as <code>
+        /usr/local/lib/junkbuster/configfile</code> or whatever you
+        choose. The sample file has all the options commented out.
+        You can remove the <code>#</code> character on any that you
+        want, but it may be better to leave this until to later.
+        Run it asynchronously:<br>
+        <br>
+         &nbsp;&nbsp;&nbsp;<code>junkbuster configfile &amp;</code>
+        
+
+        <p>If you are running a version earlier than 2.0 you can
+        start it with <code>junkbuster &amp;</code></p>
+      </li>
+
+      <li><a name="config"></a>Configure your browser (described
+      above).</li>
+
+      <li><a name="test"></a>Verify that the Internet Junkbuster is
+      working (described above).</li>
+
+      <li><a name="restart"></a>Decide on the options you really
+      want, <code>kill</code> the process and start it again. The
+      most popular option is <a href="ijbman.html#blockfile">
+      blockfile</a> to block ads. <a name="comprehensive"></a>A
+      sample blockfile is provided as an illustration, but it
+      doesn't really stop many ads. More comprehensive ones are
+      available elsewhere.</li>
+
+      <li><a name="rc"></a>You'll probably want to add an entry to
+      <code>/etc/rc.d/rc.local</code> or equivalent to start it at
+      boot time. (Any output you specify should be redirected to a
+      file. And don't forget the &amp; at the end to run it
+      asynchronously or your system will seize up after the next
+      reboot.)</li>
+    </ol>
+
+    <h3><a name="win"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; How do I compile the code under
+    Windows?</h3>
+
+    <p>A <code>.exe</code> file (binary) is supplied with the
+    source code, but if you prefer to compile it yourself here is
+    the likely procedure. Most of these steps are repeated in our
+    checklist for installation under Windows.</p>
+
+    <ol type="1">
+      <li><a name="zip"></a>First click here to download the zip
+      file called <code>ijb20.zip</code> (~208k), then uncompress
+      and unpack the zip archive using a tool like WinZip.</li>
+
+      <li><a name="change"></a>Now the distribution (source and
+      sample files) will be in a folder called <code>ijb20</code>.
+      Go into that folder and then edit the Makefile for your
+      system, removing the comment character (<code>#</code>) in
+      the lines related to Win32. Then type:<br>
+       &nbsp;&nbsp;&nbsp;<code>nmake</code><br>
+       This should create an executable called <code>
+      junkbstr.exe</code>. <a name="compilers"></a>For information
+      on issues with various compilers, see the Distribution
+      Information page.</li>
+
+      <li>
+        <a name="attempt"></a>Run the executable with the
+        command:<br>
+         &nbsp;&nbsp;&nbsp;<code>junkbstr</code><br>
+         <a name="terminal"></a>(Click on the icon with that name
+        that looks like a terminal, not like a notepad.) The
+        program will produce a message indicating that it has
+        started and is ready to serve. 
+
+        <p><a name="ini"></a>(Version 2.0.1 and above uses the file
+        <code>junkbstr.ini</code> as the config file if it exists
+        and no argument was given. If you have an earlier version
+        or if you want it to use a different config file, simply
+        specify that file as the argument.)</p>
+      </li>
+
+      <li><a name="configures"></a>Configure your browser
+      (described above).</li>
+
+      <li><a name="work"></a>Check the proxy is working (described
+      below).</li>
+
+      <li>
+        <a name="shortcut"></a>To have the proxy start itself
+        automatically when you login to Win95, drop the
+        ``shortcut'' to the <code>junkbstr</code> executable into
+        the StartUp folder:<br>
+         &nbsp;&nbsp;&nbsp;<code>C:\Windows\Start
+        Menu\Programs\StartUp</code><br>
+         You might want to change the shortcut's <code>
+        Properties-&gt;Shortcut</code> to <code>Run:
+        Minimized</code>. If you specify the <a href=
+        "ijbman.html#hide-console">hide-console</a> option then the
+        DOS window will vanish after it starts. 
+
+        <p><a name="NT"></a>WinNT users can put it into their own
+        StartUp folders or the Administrator can put it into the
+        system's global StartUp folder. For details on how to make
+        this a service under NT see our Windows page.</p>
+      </li>
+    </ol>
+
+    <h3><a name="check"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; How do I check that the proxy is
+    working?</h3>
+
+    <p>Pick a page from somewhere (such as your bookmarks, or just
+    one that your browser was pointing to) and <b class="eg">
+    Reload</b> it. If you get a message along the lines of ``server
+    not responding, using cached copy instead,'' see the advice
+    above. If the page reloads OK, check that your browser is
+    actually talking to the proxy by going to
+    http://internet.junkbuster.com/cgi-bin/show-proxy-args or any
+    URL ending in <code>show-proxy-args</code> (as described below,
+    the proxy should intercept the request.) When you see
+    ``Internet Junkbuster Proxy Status,'' you'll know it's
+    working.</p>
+
+    <h3><a name="chain"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; How and why would I have this
+    proxy chained with other proxies?</h3>
+
+    <p>You may need the <a href="ijbman.html#forwardfile">
+    forwarding</a> feature to ``daisy chain'' the Internet
+    Junkbuster to another proxy, perhaps an anonymizing proxy to
+    conceal your IP address, or a caching proxy from your ISP, or a
+    firewall proxy between your company and the outside world.
+    Version 2.0 and above can be even configured to forward <a
+    href="ijbman.html#forwardfile">selectively</a> according to the
+    URL requested: for example, connecting directly to trusted
+    hosts, but going through an anonymizing or firewall proxy for
+    all other hosts.</p>
+
+    <p><a name="administrator"></a>Network administrators might use
+    it to provide transparent access to multiple networks without
+    modifying browser configurations. <a name="direct"></a>Most
+    browsers also provide a way of specifying hosts that the
+    browser connects to directly, bypassing the proxy. Some provide
+    a method for Automatic Proxy Configuration. A well written
+    Internet Junkbuster configuration can be much more flexible and
+    powerful.</p>
+
+    <p><a name="example"></a>An ISP's caching proxy would typically
+    be called something like <code>cache.your-isp.net:8080</code>
+    (as described on you ISP's web page); you would put this
+    information in your <a href="ijbman.html#forwardfile">
+    forwardfile</a> as described in our manual. Your browser would
+    be configured to the Internet Junkbuster for HTTP and Security
+    Proxies as before, but you probably want to tell it to use the
+    caching proxy for FTP and other protocols. <a name="nonlocal">
+    </a>If your ISP is running the Internet Junkbuster for you,
+    they have probably already decided whether to chain with a
+    caching proxy.</p>
+
+    <h3><a name="socks"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; How does the Internet Junkbuster
+    work with SOCKS gateways?</h3>
+
+    <p>There is support for some gateways in Version 1.4 and above.
+    The gateway protocol used to be specified on the command line;
+    it is now specified in the same file as <a href=
+    "ijbman.html#forwardfile">forwarding.</a> Note that the
+    browser's proxy configuration must <em>not</em> specify a
+    <code>SOCKS</code> host; it should specify the proxy as
+    described above.</p>
+
+    <h3><a name="plain"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; How do I configure it to be just
+    a plain old proxy?</h3>
+
+    <p>To get the proxy to do as little as possible (which means
+    not deleting any sensitive headers), place in your
+    configuration file the following three lines (each ending in a
+    space then a period) to stop it changing sensitive headers:<br>
+     &nbsp;&nbsp;&nbsp;<code>referer .</code><br>
+     &nbsp;&nbsp;&nbsp;<code>from .</code><br>
+     &nbsp;&nbsp;&nbsp;<code>user-agent .</code><br>
+     &nbsp;&nbsp;&nbsp;<code>cookiefile mycookiefile</code><br>
+     The fourth line is also needed to specify a <a href=
+    "ijbman.html#o_c">cookiefile</a> that might be called <code>
+    mycookiefile</code> containing a single line with a <code>
+    *</code> character, to allow all cookies through.</p>
+
+    <h3><a name="shutdown"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; How do I shut down the proxy (to
+    restart it)?</h3>
+
+    <p>It depends on your platform.</p>
+
+    <ol type="1">
+      <li><a name="X"></a>Under Windows, you can click on the "X"
+      button at the top right of the DOS window (and answer <b
+      class="eg">Yes</b> when Windows warns you it cannot shut down
+      the program automatically), or use <b class="eg">
+      Ctrl-Break</b> or the old three-fingered salute of <b class=
+      "eg">Ctrl-Alt-Delete</b> and select <b class="eg">End
+      Task</b>.</li>
+
+      <li><a name="ps"></a>Under UNIX &reg; you'll need to <code>
+      kill</code> the <b><code>junkbuster</code></b> process. <a
+      name="pid"></a>If you don't know the process number to give
+      to <code>kill</code>, try this:<br>
+       &nbsp;&nbsp;&nbsp;<code>ps ax | grep junkbuster</code></li>
+    </ol>
+
+    <p align="center"><a href="#top_of_page"><img border="0" src=
+    "top.gif" alt="--- Back to Top of Page ---" width="250" height=
+    "15"></a></p>
+
+    <h2><a name="companies"></a> Information for companies</h2>
+
+    <h3><a name="think"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; What do advertising companies
+    think of this kind of technology?</h3>
+
+    <p>We've seen only a few public comments from the advertising
+    industry on this, other than SEC filings. First, the president
+    of the Internet Advertising Bureau told CNET that he wasn't
+    worried by banner blockers. Second, after the Federal Trade
+    Commission's workshop where we gave a live demonstration of our
+    proxy before many eminent representatives of the industry, the
+    Direct Marketing Association made the following statement in
+    the closing paragraphs of their summary comments to the
+    Commission.</p>
+
+    <blockquote>
+      Clever shareware developers have come up with products that
+      can obliterate cookies and advertisements for those consumers
+      who have these concerns. The Internet is a market that is so
+      democratic and flexible that it is easy for companies and
+      software developers to respond to a perceived market need.
+    </blockquote>
+
+    <p>Their attitude seems to be that they would prefer that
+    people use technical solutions to protect their privacy than
+    have protections imposed by legislation or government
+    regulations. So, do you perceive a market need? Then here are
+    some ways to flex your democratic muscles.</p>
+
+    <h3><a name="nobrainer"></a><img border="0" src="fb.gif" alt=
+    "*" width="14" height="14">&nbsp; Should we provide the
+    Internet Junkbuster for our employees?</h3>
+
+    <p>That depends. Try this quick three-point test.</p>
+
+    <ol type="1">
+      <li><a name="waste"></a>Do you want to spend your
+      communications budget on bandwidth that wastes your
+      employees' time by forcing them to wait for a lot of annoying
+      distractions while they're trying to do their jobs?</li>
+
+      <li><a name="surveillance"></a>Do you want current and
+      potential vendors to know quantitative details about the
+      software and hardware platforms that you have?</li>
+
+      <li><a name="intelligence"></a>Do you want your competitors
+      to be able to track exactly which of your employees are
+      checking out their web sites?</li>
+    </ol>
+
+    <p>If the answer to all three questions is yes, then you
+    probably don't have any need for this kind of product.</p>
+
+    <h3><a name="commercial"></a><img border="0" src="fb.gif" alt=
+    "*" width="14" height="14">&nbsp; Can our company get
+    commercial support for the software?</h3>
+
+    <p>Yes, ask us for a quote on a maintenance contract with your
+    choice of phone and email support, hard copy documentation,
+    source code and pre-compiled binaries on tape or disk, and
+    email alerting of upgrades and issues. We also offer consulting
+    services to help set up ``stealth browsing'' capabilities to
+    help reduce the footprints left while doing competitive
+    analysis and other Web work where confidentiality is
+    critical.</p>
+
+    <h3><a name="isps"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; I run an ISP. What issues should
+    I consider before offering it?</h3>
+
+    <p>Many ISPs who offer the proxy to their customers have told
+    us that most of their customers are delighted with it (although
+    one reported that a customer complaint that without banner ads,
+    surfing was like reading a novel: we recommend making it
+    optional). Many ISPs like it because it reduces bandwidth
+    requirements. To help get you started, here's a checklist we've
+    developed from working with a few ISPs. You may think of more,
+    and we'd be interested if you're willing to share them with
+    us.</p>
+
+    <ol type="1">
+      <li><a name="pending"></a>If you get more than one request
+      for the Internet Junkbuster you may want to tell your
+      customers on your News page that you already know about it
+      and are assessing it.</li>
+
+      <li><a name="try"></a>Try the software and verify that it
+      performs satisfactorily.</li>
+
+      <li><a name="value"></a>Determine whether your customers
+      perceive the service as valuable (and therefore worth the
+      time to set up). We've had reports of many delighted
+      customers.</li>
+
+      <li><a name="secure"></a>Assess the level of security
+      associated with the software. If access is to be restricted
+      (to just dial-in ports, for example) how is this to be
+      done?</li>
+
+      <li><a name="costs"></a>Consider whether to expect any
+      additional load on computing resources required, and any
+      change in use of bandwidth due to the blocking of large
+      GIFs.</li>
+
+      <li><a name="opt"></a>Choose the <a href="ijbman.html">
+      options</a> you wish to provide.</li>
+
+      <li>
+        <a name="multiple"></a>Decide whether you want to offer a
+        choice of configurations, such some of these four. 
+
+        <ol type="A">
+          <li><a name="banner"></a>Banners Blocked, Wafer with
+          No-Cookie-Copyright notice</li>
+
+          <li><a name="low"></a>Cookies not stopped (<a href=
+          "ijbman.html#cookiefile">cookiefile</a> with just a
+          <code>*</code> in it), User Agent specified as Lynx</li>
+
+          <li><a name="oneway"></a>Cookies from browser allowed,
+          permitting registered services</li>
+
+          <li><a name="kid"></a>A proxy for kids.</li>
+        </ol>
+        <a name="caching"></a>If you run a caching proxy, decide
+        whether the Internet Junkbuster will chain with it by
+        default, and whether to offer an alternate with no caching.
+        (Some ISPs don't, because they want to give customers an
+        incentive to use caching and save bandwidth.)
+      </li>
+
+      <li><a name="naming"></a>Decide on a naming scheme for your
+      proxies. If you're running only one proxy on one machine, the
+      simplest way is to just use port 8000 on your main machine,
+      such as <code>our-isp.net.</code> But it would probably be
+      safer to put an entry in your name server and call it
+      something like <code>junkbuster.our-isp.net.</code> If
+      running several proxies, you could either use different ports
+      on the same machine, or if you have the opportunity to
+      distribute the load over a few machines you could use
+      different hostname aliases such as <code>
+      banner.junkbuster.our-isp.net</code>, <code>
+      lynx.junkbuster.our-isp.net</code> and <code>
+      oneway.junkbuster.our-isp.net</code> (corresponding to the
+      examples in the previous point). You may want to set up
+      Automatic Proxy Configuration.</li>
+
+      <li>
+        <a name="document"></a>Prepare a page explaining the
+        Internet Junkbuster to your customers. <a name="does"></a>
+        Here's are some examples from Australia, Germany, Florida,
+        New York/New Jersey/Pennsylvania, North Carolina, Texas,
+        and Utah. <a name="reuse"></a>You are welcome to copy and
+        modify material from Junkbusters according to the GPL. You
+        might want to set up a process to check this page
+        periodically and update it when it changes. (A few links
+        can probably serve as well as lot of copying however.) A
+        typical page would probably specify the following. 
+
+        <ol type="1">
+          <li><a name="abstract"></a>A brief explanation stating
+          what the Internet Junkbuster does, with a link to this
+          page.</li>
+
+          <li><a name="addresses"></a>The addresses of the proxy or
+          proxies, with their port number(s).</li>
+
+          <li><a name="options"></a>The options used, and how to
+          view the contents of the blockfile (which you can place
+          on your web pages, preferably in a file called <code>
+          blocklist.html</code> or <code>
+          blocklist.txt</code>).</li>
+
+          <li><a name="additions"></a>An indication of whether
+          suggestions for the blocklist are considered, and if so,
+          how to submit them: to a particular email address, via
+          web-based form, etc.</li>
+
+          <li><a name="configuration"></a>Instructions on how to
+          configure a browser. You may want to include details for
+          only the two major browsers and leave the others to a
+          link.</li>
+
+          <li><a name="service"></a>Procedures on how to report
+          problems, give feedback etc.</li>
+        </ol>
+      </li>
+
+      <li><a name="beta"></a>Invite a small number of
+      technologically sophisticated customers to beta-test the
+      service.</li>
+
+      <li><a name="announce"></a>Announce general availability on
+      your ``News'' page. Tell us if you would like to be included
+      on a list of ISPs offering the Internet Junkbuster.</li>
+    </ol>
+
+    <p align="center"><a href="#top_of_page"><img border="0" src=
+    "top.gif" alt="--- Back to Top of Page ---" width="250" height=
+    "15"></a></p>
+
+    <h2><a name="blocking"></a> Blocking</h2>
+
+    <h3><a name="readymade"></a><img border="0" src="fb.gif" alt=
+    "*" width="14" height="14">&nbsp; Where can I get an example
+    blockfile that stops most ads?</h3>
+
+    <p>The sample blockfile we provide blocks almost nothing, and
+    we do not publish blockfiles that stop almost all banner ads.
+    But others have; you can find them by asking Google. You can
+    add any part of the new file to your old one (probably called
+    <code>sblock.ini</code> if you haven't changed the default name
+    in the latest version) or your just replace it completely. You
+    probably don't need to restart the proxy.</p>
+
+    <p><a name="pub"></a>If you develop an interesting blocklist
+    and publish it on the Web, you might want to include the word
+    ``junkbuster'' in it and use the word ``blocklist'' in the file
+    name given in the URL so that others can find it with the query
+    given in the previous sentence.</p>
+
+    <h3><a name="zap"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; If I see an ad I wish I hadn't,
+    how do I stop it?</h3>
+
+    <p>If your ISP is running the Internet Junkbuster, they should
+    have a policy on whether they accept suggestions from their
+    customers on what to block. Consult their web page.</p>
+
+    <p><a name="cover"></a>If you are running the Internet
+    Junkbuster yourself, you have complete control over what gets
+    through. Just add a pattern to cover the offending URL to your
+    blockfile. Version 1.3 and later automatically rereads the
+    blockfile when it changes, but if you're running an earlier
+    version you'll have to stop it and restart it.</p>
+
+    <p><a name="target"></a>To choose a pattern you'll first need
+    to find the URL of the ad you want cover.</p>
+
+    <p><a name="pinpoint"></a>Some people use the <a href=
+    "ijbman.html#debug">debug</a> <code>1</code> option to display
+    each URL in a window as the request is sent to the server. It's
+    then usually an easy task to pick the offending URL from the
+    list of recent candidates.</p>
+
+    <p><a name="source"></a>Alternatively, you can use <b class=
+    "eg">View Document Info</b> (or <b class="eg">View Document
+    Source</b> if your browser doesn't have that). The <b class=
+    "eg">Info</b> feature has the advantage of showing you the full
+    URL including the host name, which may not be specified in the
+    source: there you might see something like <code>
+    SRC="/ads/click_here_or_die.gif"</code> indicating only the <i>
+    <dfn>path</dfn></i>. (The host name is assumed to be the same
+    as the one the page came from.)</p>
+
+    <p><a name="offsite"></a>But ads often come from a different
+    site, in which case you might see something like <code>
+    SRC="grabem.n.trackem.com/Ad/Infinitum/SpaceID=1666"</code> or
+    longer. <a name="warehouse"></a>If the company looks like a
+    pure ad warehouse (as in the last case), you may want to place
+    just its domain name in the blockfile, which blocks all URLs
+    from that site.</p>
+
+    <p><a name="wanted"></a>If the ad comes from a server that you
+    really want some content from, you can include enough of the
+    path to avoid zapping stuff you might want. In the first
+    example above, <code>/ads/</code> would seem to be enough. If
+    you don't include the domain name, the pattern applies to all
+    sites, so you don't want such patterns to be too general: for
+    example <code>/ad</code> would block <code>
+    /admin/salaries/</code> on your company's internal site.</p>
+
+    <p><a name="image"></a>To speed the blocking of images, some
+    UNIX &reg; users create a shell script called <code>
+    Image:</code> containing a line such as <code>echo $1 | sed
+    s/http:..// &gt;&gt; $HOME/lib/blockfile</code> that adds its
+    argument to the user's blockfile. Once an offending image has
+    been be found using <b class="eg">View Document Info</b> it's
+    easy to cut-and-paste the line (or part of it) into a shell
+    window. The same script can be linked to a file called <code>
+    Frame:</code> to dealing with framed documents, and <code>
+    junkbuster:</code> to accept the output of the <a href=
+    "ijbman.html#debug">debug</a> option.</p>
+
+    <p><a name="partial"></a>When compiled without the <i><dfn>
+    regular expressions</dfn></i> option, the Internet Junkbuster
+    uses only very simple (and fast) matching methods. The pattern
+    <code>/banners</code> will not stop <code>
+    /images/banners/huge.gif</code> getting through: you would have
+    to include the pattern <code>/images/banners</code> or
+    something that matches in full from the left. <a name="regex">
+    </a>So you can get what you want here, the matcher understands
+    POSIX regular expressions: you can use <code>
+    /*.*/banners</code> to block and any URL containing <code>
+    /banners</code> (even in the middle of the path). <a name=
+    "posix"></a>(In Versions 1.1 through 1.4 they were an option at
+    compile time; from Version 2.0 they have become the default.)
+    Regular expressions give you many more features than this, but
+    if you're not already familiar with them you probably won't
+    need to know anything beyond the <code>/*.*/</code> idiom. If
+    you do, a <code>man egrep</code> is probably a good starting
+    point).</p>
+
+    <p><a name="slash"></a>Don't forget the <code>/</code> (slash)
+    at the beginning of the path. If you leave it out the line will
+    be interpreted as a domain name, so <code>ad</code> would block
+    all sites from Andorra (since <code>.ad</code> is the
+    two-letter country code for that principality).</p>
+
+    <p><a name="detail"></a>For a detailed technical description of
+    how pattern matching is done, see the <a href=
+    "ijbman.html#o_b">manual.</a></p>
+
+    <h3><a name="despite"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; How come this ad is still getting
+    through anyway?</h3>
+
+    <p>If the ad had been displayed before you included its URL in
+    the blockfile, it will probably be held in cache for some time,
+    so it will be displayed without the need for any request to the
+    server. Using the <a href="ijbman.html#debug">debug</a> <code>
+    1</code> option to show each URL as it is fetched is a good way
+    to see exactly what is happening.</p>
+
+    <p><a name="otherwise"></a>If new items seem to be getting
+    through, check that you are really running the proxy with the
+    right blockfile in the options. Check the blockfile for
+    exceptions.</p>
+
+    <p><a name="java"></a>Some sites may have different ways of
+    inserting ads, such as via Java. If you have ideas on how to
+    block new kinds of junk not currently covered, please tell
+    us.</p>
+
+    <h3><a name="exceptions"></a><img border="0" src="fb.gif" alt=
+    "*" width="14" height="14">&nbsp; How do I stop it blocking a
+    URL that I actually want?</h3>
+
+    <p>You can change the patterns so they don't cover it, or use a
+    simple feature in Version 1.1 and later: a line beginning with
+    a <code>~</code> character means that a URL blocked by previous
+    patterns that matches the rest of the line is let through. For
+    example, the pattern <code>/ad</code> would block <code>
+    /addasite.html</code> but not if followed by <code>
+    ~/addasite</code> in the blockfile. Or suppose you want to see
+    everything that comes from a site you like, even if it looks
+    like an ad: simply put <code>~aSiteYouLike.com</code> at the
+    <em>end</em> of the blockfile. (Order is important, because the
+    last matching line wins.)</p>
+
+    <p><a name="agreed"></a>As well as unblocking pages that were
+    unintentionally blocked, this feature is useful for unblocking
+    ads from a specific source. This might be because you are
+    interested in those particular ones, or if you have an explicit
+    agreement to accept certain ads, such as those from a free
+    web-based email provider.</p>
+
+    <p><a name="blocked"></a>If you want to find out exactly which
+    pattern in the blockfile a given URL matched, just click on the
+    words ``Internet Junkbuster'' which are displayed alone on a
+    page when your browser requests a blocked URL. The proxy
+    displays a message that pinpoints the pattern for you.</p>
+
+    <h3><a name="children"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Can I block sites I don't want my
+    children to see?</h3>
+
+    <p>Yes, but remember that <a name="savvy"></a>children who are
+    technically sophisticated enough to use the browsers' proxy
+    configuration options could of course bypass any proxy. This
+    kind of technology can be used as a gentle barrier to remind or
+    guide the child, but nobody should expect it to replace the
+    parent's role in setting and enforcing standards of online
+    behavior for their children.</p>
+
+    <p><a name="recommend"></a>Some ISPs are starting to provide
+    specialized proxies to protect children. There are two basic
+    approaches: the ``black list'' and the ``white list'' approach.
+    <a name="negative"></a>The black list approach allows the child
+    to go anywhere not explicitly prohibited; the white list
+    permits visits only to sites explicitly designated as
+    acceptable.</p>
+
+    <p><a name="positive"></a>It's very easy for anyone to compile
+    a white list from a page of ``recommended kids sites'' and to
+    configure an Internet Junkbuster to allow access to those sites
+    only. (If you publish such a list on the web, please tell us
+    its URL). Assuming your version isn't an old one without regex,
+    you can place a <code>*</code> (asterisk) as the first line of
+    the blockfile (which blocks everything), and then list
+    exceptions after that. Be careful to make the exception
+    sufficiently broad: for example, using <code>
+    ~www.uexpress.com/ups/comics/ch/</code> as the exception for
+    <cite>Calvin and Hobbes</cite> would block some of the graphic
+    elements on the page; you would probably want a wider exception
+    such as <code>~www.uexpress.com/ups/</code> to permit them.</p>
+
+    <p><a name="trust"></a>Version 2.0 has an experimental feature
+    to permit only sites mentioned in a nominated <a href=
+    "ijbman.html#trustfile">trusted site.</a> This allows
+    organizations to build lists of sites for kids to browse, and
+    the software automatically restricts access to those on the
+    list.</p>
+
+    <p><a name="scan"></a>Many filtering products actually scan for
+    keywords in the text of pages they retrieve before presenting
+    it, but the Internet Junkbuster does not do this. Building a
+    perfectly reliable black list system is hard, because it's very
+    difficult to state in advance exactly what is obscene or
+    unsuitable. For more info see our links page.</p>
+
+    <h3><a name="message"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; What do I see when a page or
+    graphic is blocked by the proxy?</h3>
+
+    <p>You usually see a broken image icon, but it depends on
+    several factors beyond the proxy's control. If asked for a URL
+    matching its blockfile, the proxy returns an HTML page
+    containing a message identifying itself (currently the two
+    words ``Internet Junkbuster'') with a status 202 (Accepted)
+    instead of the usual 200 (OK). (Versions 1.X returned an error
+    404: Forbidden, which caused strange behavior in some cases.)
+    Status 202 is described in the HTTP RFC as indicating that the
+    request has been accepted but not completed, and that it might
+    complete successfully in the future (in our case, if the
+    blockfile were changed).</p>
+
+    <p><a name="depends"></a>The broken image icon is most common
+    because the browser is usually expecting a graphic. But if it
+    was expecting text, or if the page happens to be using certain
+    HTML extensions such as <code>layer</code> and your browser is
+    a late model from Microsoft, you may see the words ``Internet
+    Junkbuster'' displayed as a hot link.</p>
+
+    <p><a name="click"></a>Clicking on the link takes you to an
+    explanation of the pattern in the blockfile that caused the
+    block, so that you can edit the blockfile and go back and
+    reload if you really want to see what was blocked. The
+    explanatory link is generated by the proxy and is automatically
+    intercepted based on its ending in <code>ij-blocked-url</code>;
+    even though the site is specified as <code>
+    http://internet.junkbuster.com</code> no request should
+    actually made to that site. If one is, it means that the proxy
+    was been removed after it generated the link.</p>
+
+    <p><a name="layer"></a>To summarize: the identifying link to
+    the blocking explanation is usually turned into a broken image
+    icon, but it may be displayed on a page alone, or they may may
+    be restricted to the particular frame, layer or graphic area
+    specified in the page containing them. The proxy has no way of
+    knowing the context in which a URL will be used and cannot
+    control how the blocking message will be rendered.</p>
+
+    <h3><a name="broken"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Why not replace blocked banners
+    with something invisible?</h3>
+
+    <p><a name="infringe"></a>Many users have suggested to us that
+    blocked banners should be replaced by a something like a 1x1
+    transparent GIF to make the page would look as if there was
+    nothing ever there. Apart from making it harder to catch
+    unintended blocking, this might also displease the owners of
+    the page, who could argue that such a change constitutes a
+    copyright infringement. We think that merely failing to allow
+    an included graphic to be accessed would probably not be
+    considered an infringement: after all this is what happens when
+    a browser is configured not to load images automatically.
+    However, we are not lawyers, so anyone in doubt should take
+    appropriate advice.</p>
+
+    <p><a name="done"></a>In a context where the copyright issue is
+    resolved satisfactorily, a proxy could simply return a status
+    301 or 302 and specify a replacement URL in a <code>
+    Location</code> and/or <code>URI</code> header. An alternative
+    would be to use inline code to return a 1 x 1 clear GIF. We do
+    not publish sample code for this, and we have no way of
+    stopping others who have.</p>
+
+    <h3><a name="size"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Why not block banners based on
+    the dimensions of the image?</h3>
+
+    <p>Many users have pointed out that most banner ads come in
+    standard sizes, so why not block all GIFs of those sizes? This
+    would theoretically be without fetching the object because the
+    dimensions are usually given in the <code>IMG</code> tag, but
+    it would require substantial changes in the code, and we doubt
+    whether it would be much more effective than a good block
+    list.</p>
+
+    <h3><a name="embedded"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; What about non-graphic
+    advertising within the pages I want?</h3>
+
+    <p>The Internet Junkbuster deliberately does not provide a way
+    of automatically editing the contents of a page, to remove
+    textual advertising or to repair the holes left by blocked
+    banners. Other packages such as WebFilter do.</p>
+
+    <p><a name="base"></a>For the same reason, it has no way of
+    stopping a new browser window being created, because this is
+    done through the <code>target</code> attribute in the <code>
+    &lt;a&gt;</code> and <code>&lt;base&gt;</code> elements, not
+    through headers. Nor do we plan to add a feature to paralyze
+    animated GIFs.</p>
+
+    <h3><a name="push"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Does it block ads on the
+    broadcasting ``push'' systems? How about pop-up ads?</h3>
+
+    <p>We haven't tried it but we expect it would probably work on
+    image ads on push channels. See also adchoice.</p>
+
+    <p><a name="pop"></a>Disabling Javascript stops some pop-up
+    ads. One problem is that some advertisers throw open a new
+    browser window to frame the ad. The ad is easily blocked, but
+    the empty window remains. You can kill it easily, but this is a
+    chore. We don't see how to stop them other than editing the
+    HTML from the parent window, which we don't like to do.</p>
+
+    <p><a name="TBTD"></a>The TBTF newsletter warned subscribers to
+    push information that <a name="LOGTARGET"></a>in IE4, LOGTARGET
+    allows servers to determine the URLs viewed at their site even
+    if accessed from cache or through a proxy. If you use this
+    browser see our instructions on how to disable this.</p>
+
+    <p><a name="pushy"></a>If you find you have experience using
+    the proxy with push, or have any other advice about it, please
+    tell us.</p>
+
+    <p align="center"><a href="#top_of_page"><img border="0" src=
+    "top.gif" alt="--- Back to Top of Page ---" width="250" height=
+    "15"></a></p>
+
+    <h2><a name="cookies"></a> Cookies</h2>
+
+    <p>For background information on cookies see our page
+    describing their dangers.</p>
+
+    <h3><a name="breakthrough"></a><img border="0" src="fb.gif"
+    alt="*" width="14" height="14">&nbsp; Might some cookies still
+    get through? How can I stop them?</h3>
+
+    <p>Yes, you should expect the occasional cookie to make it
+    through to your browser. We know of at least three ways this
+    can happen; please tell us if you find any others. One way is
+    in secure documents, which are explained below.</p>
+
+    <p><a name="EQUIV"></a>A few sites set cookies using a line
+    such as <code>&lt;META HTTP-EQUIV="Set-Cookie"
+    CONTENT="flavor=chocolate"&gt;</code> in the <code>HEAD</code>
+    section of an HTML document. <a name="javascript"></a>Cookies
+    can also be 
+    <!-- IEM: http://cgi.netscape.com/eng/mozilla/Gold/handbook/javascript/ref_a-c.html#cookie_property -->
+    set and read in JavaScript. To see if this is happening in a
+    document, view its source, look in the <code>head</code> for a
+    section tagged <code>script language="JavaScript"</code>. If it
+    contains a reference to <code>document.cookie</code>, the page
+    can manipulate your cookie file without sending any cookie
+    headers. The Internet Junkbuster does not tamper with these
+    methods. Fortunately they are rarely used at the moment. If a
+    cookie gets set, it should be stopped by the proxy on its way
+    back to the server when a page is requested, but it can still
+    be read in Javascript.</p>
+
+    <p><a name="alert"></a>To prevent cookies breaking through,
+    <strong>always</strong> keep cookie alerts turned on in your
+    browser, and disable Java and Javascript. Making the files hard
+    to write may also help.</p>
+
+    <h3><a name="method"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Exactly how do cookies get
+    created and stored anyway?</h3>
+
+    <p>When a web site's server sends you a page it also sends
+    certain ``header information'' which your browser records but
+    does not display. One of these is a <code>Set-Cookie</code>
+    header, which specifies the cookie information that the server
+    wants your browser to record. Similarly, when your browser
+    requests a page it also sends headers, specifying information
+    such as the graphics formats it understands. If a cookie has
+    previously been set by a site that matches the URL it is about
+    to request, your browser adds a <code>Cookie</code> header
+    quoting the previous information.</p>
+
+    <p><a name="privacy"></a>For more background information on how
+    cookies can damage your privacy, see our page on cookies. For
+    highly detailed technical information see the RFC. The Internet
+    Junkbuster will show you all headers you use the <a href=
+    "ijbman.html#debug">debug</a> <code>8</code> option, or you can
+    get a sample from our demonstration page.</p>
+
+    <h3><a name="break"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; If cookies can't get through,
+    will some things stop working for me?</h3>
+
+    <p>Possibly. Some personalized services including certain 
+    <!-- IEM: http://my.yahoo.com --> chat rooms require cookies.
+    <a name="registration"></a>Newspapers that require 
+    <!-- IEM: http://www.nytimes.com/subscribe/sub-bin/new_sub.cgi#agree -->
+    registration or 
+    <!-- IEM: http://interactive5.wsj.com/regUser.html -->
+    subscription will not automatically recognize you if you don't
+    send them the cookie they assigned you. And there are a very
+    small number of sites that do strange things with cookies; they
+    don't work for anyone that blocks cookies by any means. Some
+    sites such as Microsoft explain that their content is so
+    wonderfully compelling that they will withhold it from you
+    unless you submit to their inserting cookies.</p>
+
+    <p><a name="hotmail"></a>Many free Web-based email services
+    require cookies. Hotmail also seems to require allowing both
+    <code>msn.com</code> and <code>passport.com</code> to set
+    cookies.</p>
+
+    <p><a name="want"></a>If you want such sites to be given your
+    cookies, you can use the <a href="ijbman.html#cookiefile">
+    cookiefile</a> option provided you are running Version 1.2 or
+    later yourself. Simply include the domain name of those sites
+    in the <i>cookiefile</i> specified by this option. If it still
+    doesn't work, the problem may be in other headers.</p>
+
+    <p><a name="one"></a>It's possible to let cookies out but not
+    in, which is enough to keep some sites happy, but not all of
+    them: one newspaper site seems to go into an endless frenzy if
+    deprived of fresh cookies. A cookiefile containing a single
+    line consisting of the two characters <code>&gt;*</code>
+    (greater-than and star) permits server-bound cookies only. The
+    <code>*</code> is a <a href="ijbman.html#wildcard">wildcard</a>
+    that matches all domains.</p>
+
+    <p><a name="else"></a>If someone else is running the Internet
+    Junkbuster for you and has a version that 
+    <!-- IAM: ijbfaq.html#registration --> passes server-bound
+    cookies through, you can try editing your browser's cookie file
+    to contain just the ones you want, and restart your browser. <a
+    name="window"></a>To subscribe to a new service like this after
+    you have started using the Internet Junkbuster, you can try the
+    following: tell your browser to stop using the Internet
+    Junkbuster, fill out and submit your subscription details
+    (allowing that web site to set a cookie), then reconfigure your
+    browser to use the Internet Junkbuster again (and stop more
+    cookies being sent). This also requires the <a href=
+    "ijbman.html#cookiefile">cookiefile</a> option, and its success
+    depends on the Web site not wanting to change your cookies at
+    every session. For this reason it does not work at some major
+    newspaper sites, for example. <a name="buyers"></a>But you may
+    prefer to look at whether other sites provide the same or
+    better services without demanding the opportunity to track your
+    behavior. The web is a buyer's market where most prices are
+    zero: very few people pay for content with money, so why should
+    you pay with your privacy?</p>
+
+    <h3><a name="crumble"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Can I control cookies on a
+    per-site basis?</h3>
+
+    <p><a name="discard"></a>Yes, since version 1.2 the Internet
+    Junkbuster has included advanced cookie management facilities.
+    Unless you specify otherwise, cookies are discarded
+    (``crumbled'') by the Internet Junkbuster whether they came
+    from the server or the browser. In Version 1.2 and later you
+    can use the <a href="ijbman.html#cookiefile">cookiefile</a>
+    option to specify when cookies are to be passed through intact.
+    It uses the same syntax and <a href="ijbman.html#o_b">
+    matching</a> algorithm as the blockfile.</p>
+
+    <p><a name="cook"></a>If the URL matches a pattern in the <i>
+    <dfn>cookiefile</dfn></i> then cookies are let through in both
+    the browser's request for the URL and in the server's response.
+    <a name="directional"></a>One-way permissions can be specified
+    by starting the line with the <code>&gt;</code> or <code>
+    &lt;</code> character. For example, a cookiefile consisting of
+    the four lines<br>
+     &nbsp;&nbsp;&nbsp;<code>org</code><br>
+     &nbsp;&nbsp;&nbsp; <code>&gt;send-user-cookies.org</code><br>
+     &nbsp;&nbsp;&nbsp; <code>
+    &lt;accept-server-cookies.org</code><br>
+     &nbsp;&nbsp;&nbsp; <code>~block-all-cookies.org</code><br>
+     allows cookies to and from <code>.org</code> domains only,
+    with the following exceptions:<br>
+    </p>
+
+    <ol type="1">
+      <li><a name="fed"></a>Cookies sent from servers in the domain
+      <code>send-user-cookies.org</code> are blocked on their way
+      to the client, but cookies sent by the browser to that domain
+      are still be fed to them.</li>
+
+      <li><a name="take"></a>The cookies of <code>
+      accept-server-cookies.org</code> check in to the proxy and
+      are passed through to the browser, but when they come back to
+      the proxy they never check out.</li>
+
+      <li><a name="deny"></a>All cookies to and from <code>
+      block-all-cookies.org</code> are blocked.</li>
+    </ol>
+
+    <p><a name="paths"></a>If the <b><code>junkbuster</code></b>
+    was compiled with the regular expressions option they may be
+    used in paths. Any logging to a ``cookie jar'' is separate and
+    not affected.</p>
+
+    <p><a name="breadth"></a>It's important to give hosts you want
+    to be able to set cookies sufficient breadth. For example,
+    instead of <code>www.yahoo.com</code> use <code>
+    yahoo.com</code> because the company uses many different hosts
+    ending in that domain.</p>
+
+    <h3><a name="wafers"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Can I make up my own fake cookies
+    (wafers) to feed to servers?</h3>
+
+    <p>Yes, using the <a href="ijbman.html#wafer">wafer</a> option.
+    We coined the term <i><dfn>wafer</dfn></i> to describe cookies
+    chosen by a user, not the Web server. Servers may not find
+    wafers as tasty as the cookies they make themselves. But users
+    may enjoy controlling servers' diets for various reasons, such
+    as the following.</p>
+
+    <ol type="1">
+      <li><a name="retaliate"></a>Users who consider cookies to be
+      an unwelcome intrusion and a waste of their disk space can
+      respond in kind. By writing ``signature wafers'' they can
+      express their feelings about cookies, in a place that the
+      people in charge of them are most likely to notice.</li>
+
+      <li>
+        <a name="notice"></a>Sites running a proxy that logs
+        cookies to a file (such as the Internet Junkbuster does
+        with the <a href="ijbman.html#jarfile">jarfile</a> option
+        on) may want to notify servers that their cookies are being
+        intercepted, deleted or copied. One possible reason for
+        doing this is the uncertain copyright status of cookie
+        strings. Nothing here should be taken as legal advice: we
+        are simply raising a question for any interested parties to
+        consider, and make no representation that such measures are
+        necessary or sufficient. Concerned proxy sites might decide
+        to send a wafer (named ``NOTICE'' for example) containing
+        text along the lines of the following. 
+
+        <blockquote>
+          <p><a name="licenses_on_cookies_refused"></a>TO WHOM IT
+          MAY CONCERN<i><br>
+          <br>
+           Do not send me any copyrighted information other than
+          the document that I am requesting or any of its necessary
+          components.<br>
+          <br>
+           In particular do not send me any cookies that are
+          subject to a claim of copyright by anybody. Take notice
+          that I refuse to be bound by any license condition
+          (copyright or otherwise) applying to any cookie.</i></p>
+        </blockquote>
+        Any company that tries to argue in court that the proxy
+        site was breaching their copyright in the cookies would be
+        met with the defense that the proxy site gave that company
+        the opportunity to protect its copyright by simply not
+        sending cookies after receiving the notice. 
+
+        <p><a name="pointer"></a>Cookies can be as long as four
+        thousand characters, so there's plenty of space for
+        lawyerly verbosity, but white space, commas, and
+        semi-colons are <a href="ijbman.html#o_w">prohibited.</a>
+        Spaces can be turned into underscores. Alternatively, a URL
+        could be sent as the cookie value, pointing to a document
+        containing a notice, perhaps with a suggestive value such
+        as<br>
+         <code>
+        http://www.junkbusters.com/ht/en/ijbfaq.html#licenses_on_cookies_refused</code><br>
+
+         But including the notice directly would probably be
+        preferable because the addressee does not have to look it
+        up.</p>
+
+        <p><a name="vanilla"></a>The Internet Junkbuster 2.0.2
+        currently sends a full notice as a ``vanilla wafer'' if
+        cookies are being logged to a cookie jar and no other
+        wafers have been specified. It can be suppressed with the
+        <a href="ijbman.html#suppress-vanilla-wafer">
+        suppress-vanilla-wafer</a> option, which might be used in
+        situations where there is an established understanding
+        between the proxy and all who serve it.</p>
+      </li>
+    </ol>
+
+    <p><a name="gimme"></a>Junkbusters provides a CGI script that
+    lets you see your wafers as they appear to servers.</p>
+
+    <p><a name="malfunction"></a>Wafers confuse a few fragile
+    servers. Hotmail appears to be one of them. If this troubles
+    you, don't use this option.</p>
+
+    <p><a name="regardless"></a>Any wafers specified are sent to
+    all sites regardless of the cookiefile. <a name="compliant">
+    </a> They are appended after any genuine cookies, to maintain
+    compliance with RFC 2109 in the event that a path was specified
+    for a cookie. The RFC's provisions regarding the <code>$</code>
+    character (such as the <code>Version</code> attribute) are
+    transparent to the proxy; it simply quotes what was recited by
+    the browser.</p>
+
+    <p><a name="personalize"></a>If you want to send wafers only to
+    specific sites, you could try putting them your browser's
+    cookie file in a format conforming to the Netscape
+    specification, and then specify in the proxy's cookiefile that
+    cookies are to be sent to but not accepted from those sites, so
+    they can't overwrite the file. This may work with Netscape but
+    not all other browsers.</p>
+
+    <h3><a name="jar"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Why would anyone want to save
+    their cookies in a ``cookie jar?''</h3>
+
+    <p>We provided this capability just in case anyone wants it.
+    There are a few possible reasons.</p>
+
+    <ol type="1">
+      <li><a name="pay"></a>It's conceivable that marketing
+      companies might one day buy history files and cookie jars
+      from consumers in the same way that they currently pay them
+      to fill out survey forms. With this information they could
+      gather psychographic information, see which competitors'
+      sites the consumer has visited, and discover what advertising
+      is being targeted at them.</li>
+
+      <li><a name="choose"></a>Some consumers might employ
+      semi-automated means of sorting through their cookie jars,
+      selecting which ones to place in their cookies file for use
+      by their browsers. Their decisions could be based on payments
+      offered, privacy rating systems such as TRUSTe proposes, or
+      their own opinion of the company. It could be done manually
+      or with software. There's an Internet Draft on trust
+      certification of cookies.</li>
+
+      <li><a name="share"></a>Users may even start ``sharing''
+      cookies among themselves, sending back cookies that servers
+      generated for other visitors. Servers that aren't expecting
+      this possibility will be misled about their visitors'
+      identities. Cookies could be shared among users on a single
+      machine, or across continents via FTP and anonymous
+      remailers. <a name="disinformation"></a>Privacy activists may
+      promote cookie disinformation campaigns as a way to defend
+      the public against abuse. If a significant percentage of
+      people send disinformative cookies, user tracking via cookies
+      may become less reliable and less used.</li>
+    </ol>
+
+    <p align="center"><a href="#top_of_page"><img border="0" src=
+    "top.gif" alt="--- Back to Top of Page ---" width="250" height=
+    "15"></a></p>
+
+    <h2><a name="anonymity"></a> Anonymity</h2>
+
+    <p>For details on how your identity can be revealed while you
+    surf, see our page on privacy. Once you start using the
+    Internet Junkbuster you should find that much of the
+    information previously indicated on that page will no longer be
+    provided. If the <code>REMOTE HOST</code> indicating your IP
+    address is too close for comfort, see our suggestions below on
+    how to conceal your IP address. We also recommend that you
+    disable JavaScript and Java.</p>
+
+    <h3><a name="disclose"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; If I use the Internet Junkbuster,
+    will my anonymity be guaranteed?</h3>
+
+    <p>No. Your chances of remaining anonymous are improved, but
+    unless you are an expert on Internet security it would be
+    safest to assume that everything you do on the Web can be
+    attributed to you personally.</p>
+
+    <p><a name="happen"></a>The Internet Junkbuster removes various
+    information about you, but it's still possible that web sites
+    can find out who you are. Here's one way this can happen.</p>
+
+    <p><a name="ftp"></a>A few browsers disclose the user's email
+    address in certain situations, such as when transferring a file
+    by FTP. The Internet Junkbuster 2.0.2 does not filter the FTP
+    stream. If you need this feature, or are concerned about the
+    mail handler of your browser disclosing your email address, you
+    might consider products such as NSClean.</p>
+
+    <p><a name="binaries"></a>Browsers downloaded as binaries could
+    use non-standard headers to give out any information they can
+    have access to: see the manufacturer's license agreement. It's
+    impossible to anticipate and prevent every breach of privacy
+    that might occur. The professionally paranoid prefer browsers
+    available as source code, because anticipating their behavior
+    is easier.</p>
+
+    <h3><a name="should"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Why should I trust my ISP or
+    Junkbusters with my browsing data?</h3>
+
+    <p>You shouldn't have to trust us, and you certainly don't have
+    to. We do not run the proxy as a service, where we could
+    observe your online behavior. We provide source code so that
+    everyone can see that the proxy isn't doing anything
+    sneaky.</p>
+
+    <p><a name="awful"></a>You are already trusting your ISP not to
+    look at an awful lot of information on what you do. They
+    probably post a privacy policy on their site to reassure you.
+    If they run a proxy for you, using it could actually make it
+    slightly easier for them to monitor you, but we doubt that any
+    sane ISP would try this, because if it were discovered
+    customers would desert them.</p>
+
+    <h3><a name="logging"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Can the proxy be used for logging
+    who looks at what?</h3>
+
+    <p>We don't want institutions to use this software as an
+    instrument of surveillance. We have deliberately not provided
+    options to add timestamps or records of which IP addresses
+    accessed which URLs. However, because we publish source code
+    anyone can modify it to do such things, and there is no way a
+    remote user can find out if this is happening. Again, you need
+    to be able to trust the entity providing your proxy service,
+    but you were probably in that position even before using a
+    proxy.</p>
+
+    <h3><a name="header"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; What private information from
+    server-bound headers is removed?</h3>
+
+    <p>The Internet Junkbuster pounces on the following HTTP
+    headers in requests to servers, unless instructed otherwise in
+    the options.</p>
+
+    <ol type="1">
+      <li><a name="from"></a>The <code>FROM</code> header, which a
+      few browsers use to tell your email address to servers, is
+      dropped unless the <a href="ijbman.html#from">from</a> option
+      is set.</li>
+
+      <li><a name="agent"></a>The <code>USER_AGENT</code> <a name=
+      "infer"></a>header is changed to indicate that the browser is
+      currently Mozilla (Netscape) 3.01 Gold with an unremarkable
+      Macintosh configuration. Misidentification helps resist
+      certain attacks. If your browser and hardware happen to be
+      accurately identified, you might want to change the default.
+      (Earlier versions of the Internet Junkbuster indicated
+      different details; by altering them periodically we aim to
+      hinder anyone trying to infer whether our proxy is present.)
+      <a name="lying"></a>If you don't like the idea of incorrectly
+      identifying your computer as a Mac, set it accordingly. 
+      <!-- Aside: or read Kundera's Unbearable Lightness of Being, 5:5, ``It is a tragicomic fact..'' (p187?) --></li>
+
+      <li><a name="referer"></a>The <code>REFERER</code> header
+      (which indicates where the URL currently being requested was
+      found) is dropped. A single static referer to replace all
+      real referers may be specified using the <a href=
+      "ijbman.html#referer">referer</a> option. Where no referer is
+      provided by the browser, none is added; the <a href=
+      "ijbman.html#add-header">add-header</a> option with arguments
+      such as <code>-x 'Referer: http://me.me.me'</code> can be
+      used to send a bogus referer with every request.</li>
+    </ol>
+
+    <p>In Version 1.4 and later you can use the <a href=
+    "ijbman.html#o_r">-r @</a> option to selectively disclose
+    <code>REFERER</code> and <code>USER_AGENT</code> to only those
+    sites you nominate.</p>
+
+    <p><a name="UA"></a>Some browsers send Referer and User-Agent
+    information under different non-standard headers. The Internet
+    Junkbuster 2.0.2 stops <code>UA</code> headers, but others may
+    get through. This information is also available via JavaScript,
+    so disable it. <a name="indexers"></a>Some search engines
+    encode the query you typed in the URL that goes to advertisers
+    to target a banner ad at you, so you will need to block the ad
+    as well as the referer header, unless you want them (and anyone
+    they might buy data from) to know everything you ever search
+    for.</p>
+
+    <p><a name="JavaScript"></a>If you have JavaScript enabled (the
+    default on most browsers) servers can use it to obtain Referer
+    and User Agent, as well as your plug-ins. We recommend
+    disabling JavaScript and Java.</p>
+
+    <p><a name="response"></a>Currently no HTTP response headers
+    (browser bound) are removed, not even the <code>
+    Forwarded:</code> or <code>X-Forwarded-For:</code> headers. Nor
+    are any added, <a href="ijbman.html#o_y">unless requested.</a>
+    We are considering a more flexible header management system for
+    a future version.</p>
+
+    <h3><a name="breakage"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Might some things break because
+    header information is changed?</h3>
+
+    <p>Possibly. If used with a browser less advanced than Netscape
+    3.0 or IE-3, indicating an advanced browser may encourage pages
+    containing extensions that confuse your browser. If this
+    becomes a problem upgrade your browser or use the <a href=
+    "ijbman.html#user-agent">user-agent</a> option to indicate an
+    older browser. In Version 1.4 and later you can selectively
+    reveal your real browser to only those sites you nominate.</p>
+
+    <p><a name="Russian"></a>Because different browsers use
+    different encodings of Russian and Czech characters, certain
+    web servers convert pages on-the-fly according to the User
+    Agent header. Giving a User Agent with the wrong operating
+    system or browser manufacturer causes some sites in these
+    languages to be garbled; Surfers to Eastern European sites
+    should <a href="ijbman.html#o_r">change it</a> to something
+    closer.</p>
+
+    <p><a name="counters"></a>Some page access counters work by
+    looking at the referer; they may fail or break when
+    deprived.</p>
+
+    <p><a name="wired"></a>Some sites depend on getting a referer
+    header, such as <code>uclick.com</code>, which serves comic
+    strips for many newspaper sites, including <cite>
+    Doonsbury</cite> for the <cite>Washington Post.</cite> (If you
+    click on that last link, you can then get to a page containing
+    the strip via the same URL we've linked to under <cite>
+    Doonsbury</cite>, but if you click on the <cite>
+    Doonsbury</cite> link directly, it gives you an error message
+    suggesting that you use a browser that supports referers.) In
+    Version 1.4 and later you can use the <a href=
+    "ijbman.html#o_r">-r @</a> option and place a line like <code>
+    &gt;uclick.com</code> in your cookiefile. Wired News used to
+    use referer to decide whether to add a navigation column to the
+    page, but they have changed that.</p>
+
+    <p><a name="Intellicast"></a>The weather maps of Intellicast
+    have been blocked by their server when no referer or cookie is
+    provided. You can use the same countermeasure with a line such
+    as <code>&gt;208.194.150.32</code> (or simply get your weather
+    information elsewhere).</p>
+
+    <p><a name="decide"></a>Some software vendors, including
+    Download.com and Intuit use <code>USER_AGENT</code> to decide
+    which versions of their products to display to you. With the
+    default you get Mac versions.</p>
+
+    <p><a name="resort"></a>As a last resort if a site you need
+    doesn't seem to be working, the proxy configuration of many
+    browsers allow you to specify <b class="eg">No Proxy For</b>
+    any hostname you want.</p>
+
+    <p><a name="What"></a>We had reports that on some versions of
+    Netscape the What's New feature did not work with the proxy,
+    but we think we fixed this in Version 2.0.1.</p>
+
+    <h3><a name="misidentify"></a><img border="0" src="fb.gif" alt=
+    "*" width="14" height="14">&nbsp; How is misidentifying my
+    browser good for security and privacy?</h3>
+
+    <p>Almost every major release of both leading browsers has
+    contained bugs that allow malicious servers to compromise your
+    privacy and security. Known bugs are quickly fixed, but
+    millions of copies of the affected software remain out there,
+    and yours is probably one of them. The header that normally
+    identifies your browser tells such servers exactly which
+    attacks to use against you. By misidentifying your browser you
+    reduce the likelihood that they will be able to mount a
+    successful attack.</p>
+
+    <h3><a name="conceal"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Does the Internet Junkbuster
+    conceal my IP address?</h3>
+
+    <p>Web sites get the IP address of any proxy or browser they
+    serve pages to. If you run the proxy on your own computer the
+    IP address disclosed is the same as your browser would, unless
+    you use the <a href="ijbman.html#forwardfile">forwardfile</a>
+    option is used to chain to another proxy, in which case servers
+    only get the last IP address in the chain. Chaining slightly
+    slows browsing of course, but it improves anonymity.</p>
+
+    <h3><a name="ident"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Does the Internet Junkbuster
+    thwart identification by identd?</h3>
+
+    <p>We think so, provided you are not the user running the
+    proxy. If your computer (or your ISP's) is running the <code>
+    identd</code> demon, servers can ask it for the identity of the
+    user making the request at time you request a page from them.
+    But if you're going through a proxy, they will identify the
+    user name associated with the proxy, not you. A visit to
+    http://ident.junkbusters.com lets you see what's happening.
+    This test is (quite rightly) blocked by many firewalls; just
+    interrupt the transfer if you get an abnormal wait after
+    clicking. Running other applications may also expose you via
+    <code>identd</code>; the proxy of course doesn't help then.</p>
+
+    <h3><a name="detect"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Can web sites tell that I'm using
+    the Internet Junkbuster?</h3>
+
+    <p>With the default options the proxy doesn't announce itself.
+    Obvious indications such as Keep-Alive headers are <a href=
+    "ijbman.html#o_x">deleted,</a> but sites might notice that you
+    can cancel cookies faster than any human could possibly click
+    on a mouse. (If you want to provide a plausible explanation for
+    this, change the User Agent header to a cookie-free or
+    cookie-crunching browser).</p>
+
+    <p><a name="figure"></a>But when certain options are used they
+    could figure out something's going on, even if they're not
+    pushing cookies. If you use blocking they can tell from their
+    logs that the graphics in their pages are not being requested
+    selectively. The <a href="ijbman.html#add-forwarded-header">
+    add-forwarded-header</a> option explicitly announces to the
+    server that a proxy is present, and sending them wafers is of
+    course a dead giveaway.</p>
+
+    <p align="center"><a href="#top_of_page"><img border="0" src=
+    "top.gif" alt="--- Back to Top of Page ---" width="250" height=
+    "15"></a></p>
+
+    <h2><a name="security"></a> Security</h2>
+
+    <h3><a name="encrypt"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; What happens with Secure
+    Documents (SSL, https:)?</h3>
+
+    <p>If you enter a ``Secure Document Area,'' cookies and other
+    header information such as User Agent and Referer are sent
+    encrypted, so they cannot be filtered. We recommend getting
+    your browser to alert you when this happens. (On Netscape: <b
+    class="eg">Options</b>; <b class="eg">Security</b>; <b class=
+    "eg">General</b>; <b class="eg">Show an alert before entering a
+    secure document space</b>.) We also recommend adding the line
+    <code>:443</code> to the blockfile to stop all but sites
+    specified in an exception after that line from using SSL.</p>
+
+    <p><a name="passage"></a>It may be possible to filter encrypted
+    cookies by combining the blocking proxy with a cryptographic
+    proxy along the lines of SafePassage, but we have not tried
+    this.</p>
+
+    <h3><a name="ssl"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Will using this as my Security
+    Proxy compromise security?</h3>
+
+    <p>We're not security experts, but we don't think so. The whole
+    point of SSL is that the contents of messages are 
+    <!-- IEM: http://addy.com/dc/html/what_is_ssl_.html -->
+    encrypted by the time they leave the browser and the server.
+    Eavesdroppers (including proxies) can see where your messages
+    are going whether you are running a proxy or not, but they only
+    get to see the contents after they have been encrypted.</p>
+
+    <h3><a name="restrict"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Can I restrict use of the proxy
+    to a set of nominated IP addresses?</h3>
+
+    <p>Yes, we added an <a href="ijbman.html#aclfile">access
+    control</a> file in Version 2.0. But before you use it please
+    consider why you want to do it. If the reason is security, it
+    probably means you need a firewall.</p>
+
+    <p><a name="selective"></a>The <a href=
+    "ijbman.html#listen-address">listen-address</a> option provides
+    a way of binding the proxy to a single IP address/port. The
+    right way to do this is to choose a port inside your firewall,
+    and deny access to it to those outside the firewall. The
+    Internet Junkbuster is not a firewall proxy; it should not be
+    expected to solve security problems.</p>
+
+    <p><a name="firewall"></a>For background information on
+    firewalls, see Yahoo or a magazine article or these well-known
+    books: <cite>Firewalls and Internet Security: Repelling the
+    Wily Hacker</cite> by William R. Cheswick and Steven M.
+    Bellovin or <cite>Building Internet Firewalls</cite> by D.
+    Brent Chapman and Elizabeth D. Zwicky. There's 
+    <!-- IEM: http://www.wmd.de/wmd/staff/pauck/misc/fwtk_on_linux.html -->
+    free Linux software available, and a large number of commercial
+    products and services. For an excellent security overview,
+    primer, and compendium reference, see <cite>Practical Unix and
+    Internet Security</cite> by Simson Garfinkel and Gene
+    Spafford.</p>
+
+    <h3><a name="others"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Are there any security risks for
+    ISPs or others who offer the proxy?</h3>
+
+    <p>Yes. As with any service offered over the Internet, hackers
+    can try to misuse it. A well-run ISP will have professionals
+    who are experienced at assessing and containing these
+    risks.</p>
+
+    <p><a name="outside"></a>It's possible to set up your machine
+    so that other people can have access to your proxy, but if you
+    lack expertise in computer security you probably shouldn't have
+    your computer configured to offer this or any other service to
+    the outside world.</p>
+
+    <p><a name="attack"></a>Hackers can attempt to gain access to
+    the machine by various attacks, which we have tried to guard
+    against but don't guarantee to thwart. They can also use the
+    ``anonymizing'' quality of proxies to try to cover their tracks
+    while hacking other computers. For this reason we recommend
+    preventing it being used as an anonymous <code>telnet</code> by
+    putting the pattern <code>:23</code> in the blockfile (it's
+    included as standard equipment). (Actually the current
+    implementation incidentally blocks telnet due to the way
+    headers are handled, but it's best not to rely on this.) If you
+    wish to block all ports except the default HTTP port 80, you
+    can put the lines<br>
+     &nbsp;&nbsp;&nbsp;<code>:</code><br>
+     &nbsp;&nbsp;&nbsp;<code>~:80</code><br>
+     at the beginning of the blockfile, but be aware that some
+    servers run on non-default ports (e.g. 8080). You might also
+    want to add the line <code>~:443</code> to allow SSL.</p>
+
+    <p><a name="root"></a>On UNIX &reg; systems it is neither
+    necessary nor desirable for the proxy to run as root.</p>
+
+    <p><a name="patched"></a>Versions 2.0.1 and below may be
+    vulnerable to remote exploitation of a memory buffer bug; for
+    security reasons all users are encouraged to upgrade.</p>
+
+    <p><a name="holes"></a>If you find any security holes in the
+    code please tell us, along with any suggestions you may have
+    for fixing it. However, we do not claim that we will be able to
+    do so.</p>
+
+    <p><a name="useful"></a>We distribute this code in the hope
+    that people will find it useful, but we provide no warranty for
+    it, and we are not responsible for anyone's use or misuse of
+    it.</p>
+
+    <p><a name="updates"></a>You may also want to check back
+    periodically for updated versions of the code. We do not
+    currently maintain a mailing list. To get quick updates,
+    bookmark our Distribution Information page.</p>
+
+    <p align="center"><a href="#top_of_page"><img border="0" src=
+    "top.gif" alt="--- Back to Top of Page ---" width="250" height=
+    "15"></a></p>
+
+    <p class="sans"><a href="http://ijbswa.sourceforge.net/">
+    Website</a> <b class="dot">&middot;</b> <a href="ijbman.html">
+    Manual</a> <b class="dot">&middot;</b> <b>FAQ</b> <b class=
+    "dot">&middot;</b> <a href="gpl.html">GPL</a></p>
+
+    <p class="sans"><small><small><a href="gpl.html#text">
+    Copyright</a> &copy; 1996-8 <a href=
+    "http://www.junkbusters.com/">Junkbusters</a> <a href=
+    "http://www.junkbusters.com/ht/en/legal.html#marks">&reg;</a>
+    Corporation. <a href="gpl.html#text">Copyright</a> &copy; 2001
+    <a href="http://sourceforge.net/projects/ijbswa/">Jon
+    Foster</a>. Copying and distribution permitted under the <a
+    href="gpl.html">GNU</a> General Public
+    License.</small></small></p>
+
+    <p><small><code><a href=
+    "http://sourceforge.net/projects/ijbswa/">
+    http://sourceforge.net/projects/ijbswa/</a></code></small></p>
+  </body>
 </html>
+
diff --git a/doc/ijbman.html b/doc/ijbman.html
index 710cddb0..d810c680 100644
--- a/doc/ijbman.html
+++ b/doc/ijbman.html
@@ -1,920 +1,708 @@
-<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
+<!-- $Id$
+
+     See copyright details at end of file
+
+     After changing this file, please run it through "HTML Tidy"
+     (from http://www.w3.org/People/Raggett/tidy/)
+     It should have no warnings or errors.
+-->
+
 <html>
-<head>
-<!-- Copyright 1996-8 Junkbusters Corporation -->
-<!-- This work comes with NO WARRANTY -->
-<!-- It may be redistributed and modified under the GNU GPL-->
-<!-- See the body of http://www.junkbusters.com/ht/en/gpl.html for details-->
-<!-- Junkbusters is a registered trade mark of Junkbusters Corporation -->
-<!-- Generated 1998/10/31 03:58:25 UTC -->
-<meta name="Generator" content="Junkbusters Ebira $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $">
-<!-- Document  ID: $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $ -->
-<title>
-Internet Junkbuster Technical Information
-</title>
-<base href="http://www.junkbusters.com/ht/en/ijbman.html">
-<meta name="description" content="The manual page for the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser.">
-<meta name="keywords" content="stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, spamoff, declare, telemarketing, telemarketers, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, conservation, recycling, catalogs, consumer, sending, opt out ">
-<link rel="next" href="cookies.html">
-<link rel="previous" href="ijbfaq.html">
-<link rel="contents" href="toc.html">
-</head>
-<body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink="#787878">
-<center>
-<h1><a name="top_of_page">Internet J<small>UNK<i><font color=red>BUSTER</font></i></small> Technical Information
-</a></h1>
-</center>
-<font face="arial, helvetica">
-<p align="center">
-<a href="#description">Options</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="#show">Checking Options</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="#install">Installation</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="#copyright">Copyright</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="ijbfaq.html#top_of_page">(FAQ)</a>
-</p>
-</font><br>
-<center>
-<h2><a name="man"><font face="arial, helvetica">
-Manual Page
-</font></a>
-</h2>
-</center>
-<br>A copy of this page
-in standard
-<big><kbd>man</kbd></big>
-macro format
-is included in the
-<a href="ijbfaq.html#tar">tar archive</a>.
-
-<h3><a name="name" href="/cgi-bin/gp?pg=ijbman&pr=name"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Name
-</h3>
-<p>
-<b><kbd>junkbuster</kbd></b>
-- The
-Internet Junkbuster
-Proxy
-<a href="legal.html#marks"><small><sup>TM</sup></small></a>
-</p>
-
-<h3><a name="synopsis" href="/cgi-bin/gp?pg=ijbman&pr=synopsis"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Synopsis
-</h3>
-<p>
-<b><kbd>junkbuster</kbd></b>
-<i>configfile</i>
-(Version 2.0 onwards)
-<br>
-<b><kbd>junkbstr.exe</kbd></b>
-<i>configfile</i>
-(Windows)
-<br>
-<b><kbd>junkbuster</kbd></b>
-<a href="#o_a">[-a]</a>
-<a href="#o_y">[-y]</a>
-<a href="#o_s">[-s]</a>
-<a href="#o_c">[-c]</a>
-<a href="#o_v">[-v]</a>
-<br>
-<a href="#o_u">[-u user_agent]</a>
-<a href="#o_r">[-r referer]</a>
-<a href="#o_t">[-t from]</a>
-<br>
-<a href="#o_b">[-b blockfile]</a>
-<a href="#o_j">[-j jarfile]</a>
-<a href="#o_l">[-l logfile]</a>
-<br>
-<a href="#o_w">[-w NAME=VALUE]</a>
-<a href="#o_x">[-x Header_text]</a>
-<br>
-<a href="#o_h">[-h [bind_host_address][:bind_port]]</a>
-<br>
-<a href="#o_f">[-f forward_host[:port]]</a>
-<a href="#o_d">[-d N]</a>
-<br>
-<a href="#o_g">[-g gw_protocol[:[gw_host][:gw_port]]]</a>
-<br>
-(Version 1.4 and earlier)
-</p>
-
-<h3><a name="description" href="/cgi-bin/gp?pg=ijbman&pr=description"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Description
-</h3>
-<p>
-<b><kbd>junkbuster</kbd></b>
-is an instrumentable proxy that filters the 
-<small>HTTP</small>
-stream between
-web servers and browsers.
-Its main purpose is to enhance privacy.
-<p>
-<a name="dual">Versions before 2.0 used command-line options;</a>
-Versions from 2.0 onward use a configuration file.
-The following descriptions of the options first give the older
-command-line usage, then the new configfile line.
-<p>
-<a name="won">In Versions 2.0.1 upwards on Windows,</a>
-a start-up message is printed and the configuration is read from the file
-<big><kbd>junkbstr.ini</kbd></big>
-if it exists and no argument was given.
-<p>
-<a name="reread">All files except the configfile</a>
-are checked for changes before each page is fetched,
-so they may edited without restarting the proxy.
-<h4>Options
-</h4>
-<dl><p><dt><i><a name="o_b">-b blockfile</a></i><br><a name="blockfile"><tt>blockfile</tt>&#160;&#160;<i>blockfile</i></a><dd>
-<a href="ijbfaq.html#blocking">Block</a>
-requests to
-<small>URL</small>s
-matching any pattern given in the lines of the
-<i>blockfile</i>.
-The
-<b><kbd>junkbuster</kbd></b>
-instead returns status 202, indicating that the request has been accepted
-(though not completed),
-and a
-<a href="ijbfaq.html#show">message identifying itself</a>
-(though the browser may
-display only a broken image icon).
-(Versions before 2.0 returned an error 403 (Forbidden).)
-The syntax of a pattern is
-<big><kbd>[domain][:port][/path]</kbd></big>
-(the
-<big><kbd>http://</kbd></big>
-or
-<big><kbd>https://</kbd></big>
-protocol part is omitted).
-To decide if a pattern matches a target, the domains are compared first,
-then the paths. 
-<p>
-<a name="compare">To compare the domains,</a>
-the pattern domain and the target
-domain specified in the
-<small>URL</small>
-are each broken into their components.
-(Components are separated by the
-<big><kbd>.</kbd></big>
-(period) character.)
-Next each of the target components
-is compared with the corresponding pattern component: last with last,
-next-to-last with next-to-last, and so on.
-(This is called
-<i><dfn>right-anchored</dfn></i>
-matching.)
-If all of the pattern components find their match in the target,
-then the domains are considered a match.
-Case is irrelevant when comparing domain components.
-<p>
-<a name="substring">A successfully</a>
-matching pattern can be an anchored substring of a target, but
-not vice versa.
-Thus if a pattern doesn't specify a domain,
-it matches all domains.
-<a name="wildcard">Furthermore, when comparing two components,</a>
-the components must either match in their entirety or up to a wildcard
-<big><kbd>* </kbd></big>
-(star character) in the pattern.  The wildcard feature
-implements only a "prefix" match capability ("abc*" vs. "abcdefg"),
-not suffix matching ("*efg" vs. "abcdefg") or
-infix matching ("abc*efg" vs. "abcdefg").
-The feature is restricted to the domain component;
-it is unrelated to the optional
-regular expression
-feature in the path
-<a href="ijbman.html#regex">(described below).</a>
-<p>
-<a name="numeric">If a numeric port</a>
-is specified in the pattern domain, then the target port must
-match as well.  The default port in a target is port 80.
-<p>
-<a name="onward">If the domain and port match,</a>
-then the target
-<small>URL</small>
-path is checked for
-a match against the path in the pattern.
-Paths are compared with a simple case-sensitive
-left-anchored substring comparison.
-Once again, the pattern can be an
-anchored substring of the target, but not vice versa.
-A path of
-<big><kbd>/</kbd></big>
-(slash) would match all paths.  Wildcards are not considered in
-path comparisons.
-<p>
-<a name="example">For example, the target</a>
-<small>URL</small>
-<br>
-&#160;&#160;&#160;<big><kbd>the.yellow-brick-road.com/TinMan/has_no_brain</kbd></big>
-<br>
-would be matched (and blocked) by the following patterns
-<br>
-&#160;&#160;&#160;<big><kbd>yellow-brick-road.com</kbd></big>
-<br>
-and
-<br>
-&#160;&#160;&#160;<big><kbd>Yellow*.COM</kbd></big>
-<br>
-and
-<br>
-&#160;&#160;&#160;<big><kbd>/TinM</kbd></big>
-<br>
-but not
-<br>
-&#160;&#160;&#160;<big><kbd>follow.the.yellow-brick-road.com</kbd></big>
-<br>
-or
-<br>
-&#160;&#160;&#160;<big><kbd>/tinman</kbd></big>
-<br>
-<p>
-<a name="comments">Comments in a blockfile start with a</a>
-<big><kbd>#</kbd></big>
-(hash) character and end at a new line.
-Blank lines are also ignored.
-<p>
-<a name="except">Lines beginning with a</a>
-<big><kbd>~</kbd></big>
-(tilde) character are taken to be
-<a href="ijbfaq.html#exceptions">exceptions:</a>
-a
-<small>URL</small>
-blocked by previous patterns that matches the rest of
-the line is let through. (The last match wins.)
-<p>
-<a name="regex">Patterns</a>
-may contain
-<small>POSIX</small>
-<a href="ijbfaq.html#regex">regular expressions</a>
-provided the
-<b><kbd>junkbuster</kbd></b>
-was compiled with this option
-(the default in Version 2.0 on).
-The idiom
-<big><kbd>/*.*/ad</kbd></big>
-can then be used
-to match any
-<small>URL</small>
-containing
-<big><kbd>/ad</kbd></big>
-(such as
-<big><kbd>http://nomatterwhere.com/images/advert/g3487.gif</kbd></big>
-for example).
-These expressions
-<a href="ijbman.html#substring">don't work</a>
-in the domain part.
-<p>
-<a name="rereads">In version 1.3 and later</a>
-the blockfile and cookiefile are checked for changes before each request.
-<p><dt><i><a name="o_w">-w NAME=VALUE</a></i><br><a name="wafer"><tt>wafer</tt>&#160;&#160;<i>NAME=VALUE</i></a><dd>
-Specifies a pair to be sent as a cookie with every request
-<a href="ijbfaq.html#wafers">to the server.</a>
-(Such boring cookies are called
-<i>wafers</i>.)
-This option may be called more than once to generate multiple wafers.
-The original
-Netscape specification
-prohibited
-semi-colons, commas and white space;
-these characters will be
-<small>URL</small>-encoded
-if used in wafers.
-<!-- Aside: genuine cookies are not encoded -->
-<!-- Aside: we could use quoted string as specified in the new RFC -->
-The Path and Domain attributes are not currently supported.
-<p><dt><i><a name="o_c">-c cookiefile</a></i><br><a name="cookiefile"><tt>cookiefile</tt>&#160;&#160;<i>cookiefile</i></a><dd>
-Enforce the cookie management policy specified in the
-<i>cookiefile.</i>
-<a name="java">If this option is not used all cookies are silently crunched,</a>
-so that users who never want cookies aren't bothered by browsers
-asking whether each cookie should be accepted.
-However, cookies can
-<a href="ijbfaq.html#breakthrough">still get through</a>
-via
-<a href="links.html#javascript">JavaScript</a>
-and
-<small>SSL</small>,
-so alerts should be left on.
-<p>
-<a name="dropping">In Version 1.2 and later</a>
-this option must be followed by a
-<a href="ijbfaq.html#crumble">filename</a>
-containing instructions on which sites are allowed to
-receive and set cookies.
-<a name="drop">By default cookies are dropped in both the browser's request</a>
-and the server's response, unless the
-<small>URL</small>
-requested matches an entry in the
-<i>cookiefile</i>.
-The matching algorithm is the same as for the blockfile.
-A leading
-<big><kbd>&gt;</kbd></big>
-character allows
-<a href="ijbfaq.html#directional">server-bound</a>
-cookies only;
-a
-<big><kbd>&lt;</kbd></big>
-allows only browser-bound cookies;
-a
-<big><kbd>~</kbd></big>
-character stops cookies in
-<a href="ijbfaq.html#crumble">both directions.</a>
-Thus a cookiefile containing a single line with the two characters
-<big><kbd>&gt;*</kbd></big>
-will pass on all cookies to servers but not give any new ones to the browser.
-<p><dt><i><a name="o_j">-j jarfile</a></i><br><a name="jarfile"><tt>jarfile</tt>&#160;&#160;<i>jarfile</i></a><dd>
-All Set-cookie attempts by the server are
-<a href="ijbfaq.html#jar">logged</a>
-to
-<i>jarfile</i>.
-If no wafer is specified,
-one containing a
-<a href="ijbfaq.html#notice">canned notice</a>
-(the 
-<i>vanilla wafer</i>)
-is added as an alert to the server
-unless the
-<a href="ijbman.html#suppress-vanilla-wafer">suppress-vanilla-wafer</a>
-<!-- Aside: (no vanilla~wafer) -->
-option is invoked.
-<p><dt><i><a name="o_v">-v</a></i><br><a name="suppress-vanilla-wafer"><tt>suppress-vanilla-wafer</tt></a><dd>
-Suppress the vanilla wafer.
-<p><dt><i><a name="o_t">-t from</a></i><br><a name="from"><tt>from</tt>&#160;&#160;<i>from</i></a><dd>
-If the browser
-<a href="ijbfaq.html#from">discloses an email address</a>
-in the
-<big><kbd>FROM</kbd></big>
-header (most don't),
-replace it with
-<i>from.</i>
-If
-<i>from</i>
-is set to
-<b>.</b>
-(the period character)
-the
-<big><kbd>FROM</kbd></big>
-is passed to the server unchanged.
-The default is to delete the
-<big><kbd>FROM</kbd></big>
-header.
-<p><dt><i><a name="o_r">-r referer</a></i><br><a name="referer"><tt>referer</tt>&#160;&#160;<i>referer</i></a><dd>
-Whenever the browser discloses the
-<small>URL</small>
-that
-<a href="ijbfaq.html#referer">led to</a>
-the current request,
-replace it with
-<i>referer.</i>
-If
-<i>referer</i>
-is set to
-<b>.</b>
-(period)
-the 
-<small>URL</small>
-is passed to the server unchanged.
-In 
-Version <a href="ijbdist.html#c4">1.4</a>
-and later, if referer is set to 
-<b>@</b>
-(at) the
-<small>URL</small>
-is sent in cases where the cookiefile
-specifies that a cookie would be sent.
-(No way to send bogus referers selectively is provided.)
-The default is to delete Referer.
-<p>
-<a name="referrer">Version 2.0 also accepts the spelling</a>
-<big><kbd>referrer</kbd></big>,
-which most dictionaries consider correct.
-<p><dt><i><a name="o_u">-u user-agent</a></i><br><a name="user-agent"><tt>user-agent</tt>&#160;&#160;<i>user-agent</i></a><dd>
-Information disclosed by the browser
-<a href="ijbfaq.html#agent">about itself</a>
-is replaced with the value
-<i>user-agent.</i>
-If
-<i>user-agent</i>
-is set to
-<b>.</b>
-(period)
-the
-<big><kbd>User-Agent</kbd></big>
-header is passed to the server unchanged,
-along with any
-<big><kbd>UA</kbd></big>
-headers produced by
-<small>MS-IE</small>
-(which would otherwise be deleted).
-In 
-Version <a href="ijbdist.html#c4">1.4</a>
-and later, if
-<i>user-agent</i>
-is set to
-<b>@</b>
-(at) these headers are sent unchanged in cases where the cookiefile
-specifies that a cookie would be sent,
-otherwise only default
-<big><kbd>User-Agent</kbd></big>
-header is sent.
-That default
-is Mozilla/3.0 (Netscape)
-with an unremarkable
-<a href="ijbfaq.html#infer">Macintosh</a>
-configuration.
-If used with a browser less advanced than Mozilla/3.0 or IE-3, the default
-may encourage pages containing extensions that confuse the browser.
-<!-- Aside: Some servers use extensions to everyone anyway.  But in that case it's probably ignoring cookies anyway.  Some servers attempt to send cookies only to browsers identifying themselves as Mozilla. -->
-<p><dt><i><a name="o_h">-h [host][:port]</a></i><br><a name="listen-address"><tt>listen-address</tt>&#160;&#160;<i>[host][:port]</i></a><dd>
-If
-<i>host</i>
-is specified,
-bind the
-<b><kbd>junkbuster</kbd></b>
-to that
-<small>IP</small>
-address.
-If a
-<i>port</i>
-is specified, use it.
-The default
-port
-is 8000;
-the default host is
-<big><kbd>localhost</kbd></big>.
-Before Version 2.0.2,
-the default was to bind to all 
-<small>IP</small>
-addresses
-(<big><kbd>INADDR_ANY</kbd></big>);
-but this has been restricted to
-<big><kbd>localhost</kbd></big>
-to avoid unintended security breaches.
-(To open the proxy to all, use the line
-<br>
-&#160;&#160;&#160;<big><kbd>listen-address :8000</kbd></big>
-<br>
-in the configuration file.)
-<p><dt><i><a name="o_f">-f forward_host[:port]</a></i><br><a name="forwardfile"><tt>forwardfile</tt>&#160;&#160;<i>forwardfile</i></a><dd>
-Version 1.X required all
-<small>HTTP</small>
-requests from the client to be forwarded to the same destination.
-Version 2.0 takes its routing specification from a
-<i>forwardfile</i>,
-allowing selection of the proxy (a.k.a. forwarding host) and gateway
-according to the
-<small>URL</small>.
-Here is a typical line.
-<br>
+  <head>
+    <title>Internet Junkbuster Technical Information</title>
+    <meta name="description" content=
+    "The manual page for the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser.">
+    <meta name="keywords" content=
+    "stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, consumer, sending, opt out ">
+<style type="text/css">
+<!--
+h2           { text-align: Center; font-family: arial, helvetica, sans-serif }
+p.sans       { font-family: arial, helvetica, sans-serif }
+b.dot        { color: #FF0000 }
+b.eg         { font-family: arial, helvetica, sans-serif }
+-->
+</style>
+  </head>
+
+  <body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink=
+  "#787878">
+    <p class="sans"><a href="http://ijbswa.sourceforge.net/">
+    Website</a> <b class="dot">&middot;</b> <b>Manual</b> <b class=
+    "dot">&middot;</b> <a href="ijbfaq.html">FAQ</a> <b class=
+    "dot">&middot;</b> <a href="gpl.html">GPL</a></p>
+
+    <h1 align="center"><a name="top_of_page"></a>Internet
+    J<small>UNK<i style="color: #FF0000">BUSTER</i></small>
+    Technical Information</h1>
+
+    <p align="center" class="sans"><a href="#description">
+    Options</a> <b class="dot">&middot;</b> <a href="#show">
+    Checking Options</a> <b class="dot">&middot;</b> <a href=
+    "#install">Installation</a> <b class="dot">&middot;</b> <a
+    href="#copyright">Copyright</a> <b class="dot">&middot;</b> <a
+    href="ijbfaq.html#top_of_page">(FAQ)</a></p>
+
+    <h1>This document is out of date</h1>
+
+    <p><b>Development of JunkBuster is ongoing and this document is
+    no longer current. However, it may provide some assistance. If
+    you have problems, please use the <a href=
+    "http://groups.yahoo.com/group/junkbuster-users/">Yahoo Groups
+    mailing list</a> (which includes an archive of mail), the
+    SourceForge.net <a href=
+    "http://sourceforge.net/projects/ijbswa/">project page</a>, or
+    see the project's <a href="http://ijbswa.sourceforge.net/">home
+    page</a>. Please also bear in mind that versions 2.9.x of
+    JunkBuster are development releases, and are not production
+    quality.</b></p>
+
+    <h2><a name="man"></a>Manual Page</h2>
+
+    <p>A copy of this page in standard <code>man</code> macro
+    format is included in the <a href="ijbfaq.html#tar">tar
+    archive</a>.</p>
+
+    <h3><a name="name"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Name</h3>
+
+    <p><b><code>junkbuster</code></b> - The Internet Junkbuster
+    Proxy <a href=
+    "http://www.junkbusters.com/ht/en/legal.html#marks"><small>
+    <sup>TM</sup></small></a></p>
+
+    <h3><a name="synopsis"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Synopsis</h3>
+
+    <p><code><b>junkbuster</b></code> <i>configfile</i> (Unix)<br>
+     <b><code>junkbstr.exe</code></b> [<i>configfile</i>]
+    (Windows)</p>
+
+    <h3><a name="description"></a><img border="0" src="fb.gif" alt=
+    "*" width="14" height="14">&nbsp; Description</h3>
+
+    <p><b><code>junkbuster</code></b> is an instrumentable proxy
+    that filters the HTTP stream between web servers and browsers.
+    Its main purposes are to block adverts and enhance privacy.</p>
+
+    <p><a name="dual"></a>It is configured using a configuration
+    file and several files listing URL patterns.&nbsp; The
+    configuration file must be specified on the command line.&nbsp;
+    The Windows version will default to using the configuration
+    file <code>junkbstr.ini</code> if it exists and no argument was
+    given.</p>
+
+    <p><a name="reread"></a>All files except the main configuration
+    file are checked for changes before each page is fetched, so
+    they may edited without restarting the proxy.</p>
+
+    <h4>Options</h4>
+
+    <dl>
+      <dt><i><a name="o_b"></a></i><a name=
+      "blockfile"></a><code>blockfile</code>&nbsp;&nbsp; <i>
+      blockfile</i></dt>
+
+      <dd>
+        <p><a href="ijbfaq.html#blocking">Block</a> requests to
+        URLs matching any pattern given in the lines of the <i>
+        blockfile</i>. The <b><code>junkbuster</code></b> instead
+        returns status 202, indicating that the request has been
+        accepted (though not completed), and a <a href=
+        "ijbfaq.html#show">message identifying itself</a> (though
+        the browser may display only a broken image icon).&nbsp;
+        The syntax of a pattern is <code>
+        [domain][:port][/path]</code> (the <code>http://</code> or
+        <code>https://</code> protocol part is omitted). To decide
+        if a pattern matches a target, the domains are compared
+        first, then the paths.</p>
+
+        <p><a name="compare"></a>To compare the domains, the
+        pattern domain and the target domain specified in the URL
+        are each broken into their components. (Components are
+        separated by the <code>.</code> (period) character.) Next
+        each of the target components is compared with the
+        corresponding pattern component: last with last,
+        next-to-last with next-to-last, and so on. (This is called
+        <i><dfn>right-anchored</dfn></i> matching.) If all of the
+        pattern components find their match in the target, then the
+        domains are considered a match. Case is irrelevant when
+        comparing domain components.</p>
+
+        <p><a name="substring"></a>A successfully matching pattern
+        can be an anchored substring of a target, but not vice
+        versa. Thus if a pattern doesn't specify a domain, it
+        matches all domains. <a name="wildcard"></a>Furthermore,
+        when comparing two components, the components must either
+        match in their entirety or up to a wildcard <code>*</code>
+        (star character) in the pattern. The wildcard feature
+        implements only a "prefix" match capability ("abc*" vs.
+        "abcdefg"), not suffix matching ("*efg" vs. "abcdefg") or
+        infix matching ("abc*efg" vs. "abcdefg"). The feature is
+        restricted to the domain component; it is unrelated to the
+        optional regular expression feature in the path <a href=
+        "#regex">(described below).</a></p>
+
+        <p><a name="numeric"></a>If a numeric port is specified in
+        the pattern domain, then the target port must match as
+        well. The default port in a target is port 80.</p>
+
+        <p><a name="onward"></a>If the domain and port match, then
+        the target URL path is checked for a match against the path
+        in the pattern. Paths are compared with a simple
+        case-sensitive left-anchored substring comparison. Once
+        again, the pattern can be an anchored substring of the
+        target, but not vice versa. A path of <code>/</code>
+        (slash) would match all paths. Wildcards are not considered
+        in path comparisons.</p>
+
+        <p><a name="example"></a>For example, the target URL<br>
+         &nbsp;&nbsp;&nbsp; <code>
+        the.yellow-brick-road.com/TinMan/has_no_brain</code><br>
+         would be matched (and blocked) by the following
+        patterns<br>
+         &nbsp;&nbsp;&nbsp; <code>yellow-brick-road.com</code><br>
+         and<br>
+         &nbsp;&nbsp;&nbsp;<code>Yellow*.COM</code><br>
+         and<br>
+         &nbsp;&nbsp;&nbsp;<code>/TinM</code><br>
+         but not<br>
+         &nbsp;&nbsp;&nbsp; <code>
+        follow.the.yellow-brick-road.com</code><br>
+         or<br>
+         &nbsp;&nbsp;&nbsp;<code>/tinman</code><br>
+        </p>
+
+        <p><a name="comments"></a>Comments in a blockfile start
+        with a <code>#</code> (hash) character and end at a new
+        line. Blank lines are also ignored.</p>
+
+        <p><a name="except"></a>Lines beginning with a <code>
+        ~</code> (tilde) character are taken to be <a href=
+        "ijbfaq.html#exceptions">exceptions:</a> a URL blocked by
+        previous patterns that matches the rest of the line is let
+        through. (The last match wins.)</p>
+
+        <p><a name="regex"></a>Patterns may contain POSIX <a href=
+        "ijbfaq.html#regex">regular expressions</a> provided the
+        <b><code>junkbuster</code></b> was compiled with this
+        option (the default in Version 2.0 on). The idiom <code>
+        /*.*/ad</code> can then be used to match any URL containing
+        <code>/ad</code> (such as <code>
+        http://nomatterwhere.com/images/advert/g3487.gif</code> for
+        example). These expressions <a href="#substring">don't
+        work</a> in the domain part.</p>
+
+        <p><a name="rereads"></a>In version 1.3 and later the
+        blockfile and cookiefile are checked for changes before
+        each request.</p>
+      </dd>
+
+      <dt><i><a name="o_w"></a></i><a name=
+      "wafer"></a><code>wafer</code>&nbsp;&nbsp; <i>
+      NAME=VALUE</i></dt>
+
+      <dd>
+        <p>Specifies a pair to be sent as a cookie with every
+        request <a href="ijbfaq.html#wafers">to the server.</a>
+        (Such boring cookies are called <i>wafers</i>.) This option
+        may be called more than once to generate multiple wafers.
+        The original Netscape specification prohibited semi-colons,
+        commas and white space; these characters will be
+        URL-encoded if used in wafers. 
+        <!-- Aside: genuine cookies are not encoded --> 
+        <!-- Aside: we could use quoted string as specified in the new RFC -->
+        The Path and Domain attributes are not currently
+        supported.</p>
+      </dd>
+
+      <dt><i><a name="o_c"></a></i><a name=
+      "cookiefile"></a><code>cookiefile</code>&nbsp;&nbsp; <i>
+      cookiefile</i></dt>
+
+      <dd>
+        <p>Enforce the cookie management policy specified in the
+        <i>cookiefile.</i> <a name="java"></a>If this option is not
+        used all cookies are silently crunched, so that users who
+        never want cookies aren't bothered by browsers asking
+        whether each cookie should be accepted. However, cookies
+        can <a href="ijbfaq.html#breakthrough">still get
+        through</a> via <a href=
+        "http://www.junkbusters.com/ht/en/links.html#javascript">
+        JavaScript</a> and SSL, so alerts should be left on.</p>
+
+        <p><a name="dropping"></a>In Version 1.2 and later this
+        option must be followed by a <a href="ijbfaq.html#crumble">
+        filename</a> containing instructions on which sites are
+        allowed to receive and set cookies. <a name="drop"></a>By
+        default cookies are dropped in both the browser's request
+        and the server's response, unless the URL requested matches
+        an entry in the <i>cookiefile</i>. The matching algorithm
+        is the same as for the blockfile. A leading <code>
+        &gt;</code> character allows <a href=
+        "ijbfaq.html#directional">server-bound</a> cookies only; a
+        <code>&lt;</code> allows only browser-bound cookies; a
+        <code>~</code> character stops cookies in <a href=
+        "ijbfaq.html#crumble">both directions.</a> Thus a
+        cookiefile containing a single line with the two characters
+        <code>&gt;*</code> will pass on all cookies to servers but
+        not give any new ones to the browser.</p>
+      </dd>
+
+      <dt><i><a name="o_j"></a></i><a name=
+      "jarfile"></a><code>jarfile</code>&nbsp;&nbsp; <i>
+      jarfile</i></dt>
+
+      <dd>
+        <p>All Set-cookie attempts by the server are <a href=
+        "ijbfaq.html#jar">logged</a> to <i>jarfile</i>. If no wafer
+        is specified, one containing a <a href=
+        "ijbfaq.html#notice">canned notice</a> (the <i>vanilla
+        wafer</i>) is added as an alert to the server unless the <a
+        href="#suppress-vanilla-wafer">suppress-vanilla-wafer</a>
+        option is invoked.</p>
+      </dd>
+
+      <dt><i><a name="o_v"></a></i><a name=
+      "suppress-vanilla-wafer"></a><code>suppress-vanilla-wafer</code></dt>
+
+      <dd>
+        <p>Suppress the vanilla wafer.</p>
+      </dd>
+
+      <dt><i><a name="o_t"></a></i><a name=
+      "from"></a><code>from</code>&nbsp;&nbsp;<i>from</i></dt>
+
+      <dd>
+        <p>If the browser <a href="ijbfaq.html#from">discloses an
+        email address</a> in the <code>FROM</code> header (most
+        don't), replace it with <i>from.</i> If <i>from</i> is set
+        to <b>.</b> (the period character) the <code>FROM</code> is
+        passed to the server unchanged. The default is to delete
+        the <code>FROM</code> header.</p>
+      </dd>
+
+      <dt><i><a name="o_r"></a></i><a name=
+      "referer"></a><code>referer</code>&nbsp;&nbsp; <i>
+      referer</i></dt>
+
+      <dd>
+        <p>Whenever the browser discloses the URL that <a href=
+        "ijbfaq.html#referer">led to</a> the current request,
+        replace it with <i>referer.</i> If <i>referer</i> is set to
+        <b>.</b> (period) the URL is passed to the server
+        unchanged. If referer is set to <b>@</b> (at) the URL is
+        sent in cases where the cookiefile specifies that a cookie
+        would be sent. (No way to send bogus referers selectively
+        is provided.) The default is to delete Referer.</p>
+
+        <p><a name="referrer"></a>Junkbuster also accepts the
+        spelling <code>referrer</code>, which most dictionaries
+        consider correct.</p>
+      </dd>
+
+      <dt><i><a name="o_u"></a></i><a name=
+      "user-agent"></a><code>user-agent</code>&nbsp;&nbsp; <i>
+      user-agent</i></dt>
+
+      <dd>
+        <p>Information disclosed by the browser <a href=
+        "ijbfaq.html#agent">about itself</a> is replaced with the
+        value <i>user-agent.</i> If <i>user-agent</i> is set to <b>
+        .</b> (period) the <code>User-Agent</code> header is passed
+        to the server unchanged, along with any <code>UA</code>
+        headers produced by MS-IE (which would otherwise be
+        deleted). If <i>user-agent</i> is set to <b>@</b> (at)
+        these headers are sent unchanged in cases where the
+        cookiefile specifies that a cookie would be sent, otherwise
+        only default <code>User-Agent</code> header is sent. That
+        default is Mozilla/3.0 (Netscape) with an unremarkable <a
+        href="ijbfaq.html#infer">Macintosh</a> configuration. If
+        used with a browser less advanced than Mozilla/3.0 or IE-3,
+        the default may encourage pages containing extensions that
+        confuse the browser.</p>
+      </dd>
+
+      <dt><a name="o_h"></a><a name=
+      "listen-address"></a><code>listen-address</code>&nbsp;&nbsp;
+      <i>[host][:port]</i></dt>
+
+      <dd>
+        <p>If <i>host</i> is specified, bind the <b><code>
+        junkbuster</code></b> to that IP address. If a <i>port</i>
+        is specified, use it. The default port is 8000; the default
+        host is <code>localhost</code>.</p>
+
+        <p>This default host setting means that you can only
+        connect to the proxy from ther local computer. This is a
+        security measure - if you allow anyone to use the proxy,
+        then hackers or fraudsters could use it to help hide their
+        identity. It also provides a lot of protection against any
+        undiscovered security flaws in JunkBuster - if they can't
+        connect to it, then they can't attack it.</p>
+
+        <p>If you change this value, we recommend you <i>either</i>
+        set the host to <code>localhost</code>:<br>
+         &nbsp;&nbsp;&nbsp;<code>listen-address
+        localhost:8080</code><br>
+         <i>or</i>, if you want to share a single internet
+        connection over your internal network, then set it to the
+        address of your internal ethernet card:<br>
+         &nbsp;&nbsp;&nbsp;<code>listen-address
+        10.1.1.1:8080</code><br>
+         (replace 10.1.1.1 with your internal IP address), <i>
+        or</i> set up an <i><a href="#aclfile">aclfile</a></i>. To
+        make the proxy accessible from everywhere (e.g. if you're
+        using an access control list or if you just don't care
+        about security), specify just the port number - e.g:<br>
+         &nbsp;&nbsp;&nbsp;<code>listen-address :8000</code><br>
+         (This binds the proxy to <b>all</b> IP addresses
+        (<code>INADDR_ANY</code>)).</p>
+      </dd>
+
+      <dt><i><a name="o_f"></a></i><a name=
+      "forwardfile"></a><code>forwardfile</code>&nbsp;&nbsp; <i>
+      forwardfile</i></dt>
+
+      <dd>
+        <p>Junkbuster has a flexible syntax for forwarding HTTP
+        requests. This is used e.g. if you are behind a firewall
+        and need to connect through it, or if you want to use a
+        cacheing proxy to speed up your web browsing.</p>
+
+        <p>Every line in the forwardfile consists of four
+        components, seperated by whitespace. These are:<br>
+        <br>
+         <code><i>target &nbsp; forward_to &nbsp; via_gateway_type
+        &nbsp; gateway</i></code></p>
+
+        <p><i>target</i> is a pattern used to select which line of
+        the forwardfile is used. "<code>*</code>" is the most
+        commonly used value, and matches every URL. As usual, the
+        last matching <i>target</i> wins. (If no pattern matches, a
+        direct connection will be used)</p>
+
+        <p><i>forward_to</i> specifies the HTTP proxy server to
+        use, or "<code>.</code>" for none. This is used to connect
+        to a cacheing proxy such as Squid, and for most types of
+        firewall. The port number defaults to 8000 if it is not
+        specified.</p>
+
+        <p>Here is a typical line.</p>
 <pre>
 *         lpwa.com:8000      .      .
 </pre>
-<p>
-<a name="lines">Each line contains four fields:</a>
-<big><kbd>target</kbd></big>,
-<big><kbd>forward_to</kbd></big>,
-<big><kbd>via_gateway_type</kbd></big>
-and
-<big><kbd>gateway</kbd></big>.
-As usual, the
-<a href="ijbman.html#compare">last</a>
-<big><kbd>target</kbd></big>
-domain that matches the requested
-<small>URL</small>
-wins,
-and the
-<big><kbd>*</kbd></big>
-character alone matches any domain.
-The target domain need not be a fully qualified
-hostname; it can be a general domain such as
-<big><kbd>com</kbd></big>
-or
-<big><kbd>co.uk</kbd></big>
-or even just a port number.
-<a name="nose">For example, because</a>
-<a href="http://lpwa.com">LPWA</a>
-does not handle
-<a href="ijbfaq.html#encrypt">SSL</a>,
-the line above will typically be followed by a line such as
-<br>
+
+        <p>The target domain need not be a fully qualified
+        hostname; it can be a general domain such as <code>
+        com</code> or <code>co.uk</code> or even just a port
+        number. <a name="nose"></a>For example, because <a href=
+        "http://lpwa.com">LPWA</a> does not handle <a href=
+        "ijbfaq.html#encrypt">SSL</a>, the line above will
+        typically be followed by a line such as</p>
 <pre>
-:443  .      .      .
+:443    .      .      .
 </pre>
-to allow SSL transactions to proceed directly.
-The cautious would also
-add an entry in their blockfile to stop transactions
-to port 443 for all but specified trusted sites.
-<p>
-<a name="forward">If the winning</a>
-<big><kbd>forward_to</kbd></big>
-field is
-<big><kbd>.</kbd></big>
-(the dot character) the proxy connects 
-directly to the server given in the
-<small>URL</small>,
-otherwise it forwards to the host and port number specified.
-The default port is 8000.
-The
-<big><kbd>via_gateway_type</kbd></big>
-and
-<big><kbd>gateway</kbd></big>
-fields also use a dot to indicate no gateway protocol.
-The gateway protocols are explained
-<a href="ijbman.html#o_g">below</a>.
-<p>
-<a name="old">The example line above in a forwardfile alone</a>
-would send everything through port 8000 at
-<big><kbd>lpwa.com</kbd></big>
-with no gateway protocol,
-and is equivalent to the old
-<big><kbd>-f lpwa.com:8000</kbd></big>
-with no
-<big><kbd>-g</kbd></big>
-option.
-For more information see the example file provided with the distribution.
-<p>
-<a name="loop">Configure with care: no loop detection is performed.</a>
-When setting up chains of proxies that might loop back, try adding
-<a href="ijbman.html#squid">Squid.</a>
-<p><dt><i><a name="o_g">-g gw_protocol[:[gw_host][:gw_port]]</a></i><dd>
-Use
-<i>gw_protocol</i>
-as the gateway protocol.
-This option was introduced in Version 1.4,
-but was folded into the
-<a href="ijbman.html#forwardfile">forwardfile</a>
-option in Version 2.0.
-The default is to use no gateway protocol;
-this may be explicitly specified as
-<big><kbd>direct</kbd></big>
-on the command line
-or the dot character in the forwardfile.
-The
-<big><kbd>SOCKS4</kbd></big>
-protocol may be specified as
-<big><kbd>socks</kbd></big>
-or
-<big><kbd>socks4</kbd></big>.
-The
-<big><kbd>SOCKS4A</kbd></big>
-protocol is specified as
-<big><kbd>socks4a</kbd></big>.
-The
-<big><kbd>SOCKS5</kbd></big>
-protocol is not currently supported.
-The default
-<small>SOCKS</small>
-<i>gw_port</i>
-is 1080.
-<p>
-<a name="configure">The user's browser should</a>
-<em>not</em>
-be
-<a href="ijbfaq.html#socks">configured</a>
-to use
-<big><kbd>SOCKS</kbd></big>;
-the proxy conducts the negotiations, not the browser.
-<p>
-<a name="identify">The user identification capabilities of</a>
-<big><kbd>SOCKS4</kbd></big>
-are deliberately not used;
-the user is always identified to the
-<big><kbd>SOCKS</kbd></big>
-server as
-<big><kbd>userid=anonymous</kbd></big>.
-If the server's policy is to reject requests from
-<big><kbd>anonymous</kbd></big>,
-the proxy will not work.
-Use a
-<a href="ijbman.html#o_d">debug</a>
-value of 3
-to see the status returned by the server.
-<p><dt><i><a name="o_d">-d N</a></i><br><a name="debug"><tt>debug</tt>&#160;&#160;<i>N</i></a><dd>
-Set debug mode.
-The most common value is 1,
-to
-<a href="ijbfaq.html#pinpoint">pinpoint</a>
-offensive
-<small>URL</small>s,
-so they can be added to the blockfile.
-The value of
-<b>N</b>
-is a bitwise
-logical-<small>OR</small>
-of the following values:
-<br>
-1 =  URLs (show each URL requested by the browser);<br>
-2 =  Connections (show each connection to or from the proxy);<br>
-4 =  I/O (log I/O errors);<br>
-8 =  Headers (as each header is scanned, show the header and what is done to it);<br>
-16 =  Log everything (including debugging traces and the contents of the pages).<br>
-<a name="or">Multiple</a>
-<big><kbd>debug</kbd></big>
-lines are permitted; they are logical OR-ed together.
-<p>
-<a name="single">Because most browsers send several requests in parallel</a>
-the debugging output may appear intermingled, so the
-<a href="ijbman.html#single-threaded">single-threaded</a>
-option is recommended when using
-<a href="ijbman.html#debug">debug</a>
-with
-<b>N</b>
-greater than 1.
-<!-- Aside: Yes, it's clumsy, but it's easy to parse. -->
-<p><dt><i><a name="o_y">-y</a></i><br><a name="add-forwarded-header"><tt>add-forwarded-header</tt></a><dd>
-Add 
-<big><kbd>X-Forwarded-For</kbd></big>
-headers to the server-bound 
-<small>HTTP</small>
-stream
-indicating the client 
-<small>IP</small>
-address
-<a href="ijbfaq.html#detect">to the server,</a>
-in the new style of
-<a href="ijbman.html#squid">Squid 1.1.4.</a>
-If you want the traditional
-<big><kbd>HTTP_FORWARDED</kbd></big>
-response header, add it manually with the
-<a href="ijbman.html#o_x">-x</a>
-option.
-<!-- Aside: Not a default, since the end-client usually doesn't wish to be identified, but may be helpful in debugging chains. -->
-<p><dt><i><a name="o_x">-x HeaderText</a></i><br><a name="add-header"><tt>add-header</tt>&#160;&#160;<i>HeaderText</i></a><dd>
-Add the
-<i>HeaderText</i>
-verbatim to requests to the server.
-Typical uses include
-adding old-style forwarding notices such as
-<big><kbd>Forwarded: by http://pro-privacy-isp.net</kbd></big>
-and reinstating the
-<big><kbd>Proxy-Connection: Keep-Alive</kbd></big>
-header
-(which the
-<b><kbd>junkbuster</kbd></b>
-deletes so as
-<a href="ijbfaq.html#detect">not</a>
-to reveal its existence).
-No checking is done for correctness or plausibility,
-so it can be used to throw any old trash into the server-bound 
-<small>HTTP</small>
-stream.
-Please don't litter.
-<!-- Aside: this represents "more than enough rope" -->
-<p><dt><i><a name="o_s">-s</a></i><br><a name="single-threaded"><tt>single-threaded</tt></a><dd>
-Doesn't
-<big><kbd>fork()</kbd></big>
-a separate process
-(or create a separate thread)
-to handle each connection.
-Useful when debugging to keep the process single threaded.
-<p><dt><i><a name="o_l">-l logfile</a></i><br><a name="logfile"><tt>logfile</tt>&#160;&#160;<i>logfile</i></a><dd>
-Write all debugging data into
-<i>logfile.</i>
-The default
-<i>logfile</i>
-is the standard output.
-<p><dt><br><a name="aclfile"><tt>aclfile</tt>&#160;&#160;<i>aclfile</i></a><dd>
-Unless this option is used, the proxy talks to anyone who can connect to it,
-and everyone who can has equal permissions on where they can go.
-An access file allows restrictions to be placed on these two policies,
-by distinguishing some
-<i><dfn>source</dfn></i>
-<small>IP</small>
-addresses and/or
-some
-<i><dfn>destination</dfn></i>
-addresses.
-(If a
-<a href="ijbman.html#forwardfile">forwarder or a gateway</a>
-is being used, its address is considered the destination address,
-not the ultimate
-<small>IP</small>
-address of the
-<small>URL</small>
-requested.)
-<p>
-<a name="permit">Each line of the access file begins with</a>
-either the word
-<big><kbd>permit</kbd></big>
-or
-<big><kbd>deny</kbd></big>
-followed by source and (optionally) destination addresses 
-to be matched against those of the
-<small>HTTP</small>
-request.
-The last matching line specifies the result: if it was a
-<big><kbd>deny</kbd></big>
-line or if no line matched,
-the request will be refused.
-<p>
-<a name="various">A source or destination</a>
-can be specified as a single numeric
-<small>IP</small>
-address,
-or with a hostname, provided that the host's name
-can be resolved to a numeric address: this cannot be used to block all
-<big><kbd>.mil </kbd></big>
-domains for example,
-because there is no single address associated with that domain name.
-Either form may be followed by a slash and an integer
-<big><kbd>N</kbd></big>,
-specifying a subnet mask of
-<big><kbd>N</kbd></big>
-bits.
-For example,
-<big><kbd>permit 207.153.200.72/24</kbd></big>
-matches the entire Class-C subnet from
-207.153.200.0
-through 207.153.200.255.
-(A netmask of 255.255.255.0 corresponds to 24 bits of
-ones in the netmask, as with
-<big><kbd>*_MASKLEN=24</kbd></big>.)
-A value of 16 would be used for a Class-B subnet.
-A value of zero for
-<big><kbd>N</kbd></big>
-in the subnet mask length will cause any address to match;
-this can be used to express a default rule.
-For more information see the example file provided with the distribution.
-<p>
-<a name="false">If you like these access controls</a>
-you should probably have
-<a href="ijbfaq.html#firewall">firewall</a>;
-they are not intended to replace one.
-<p><dt><br><a name="trustfile"><tt>trustfile</tt>&#160;&#160;<i>trustfile</i></a><dd>
-This feature is experimental, has not been fully documented and is
-very subject to change.
-The goal is for parents to be able to choose a page or site whose
-links they regard suitable for their
-<a href="ijbfaq.html#children">young children</a>
-and for the proxy to allow access only to sites mentioned there.
-To do this the proxy examines the
-<a href="ijbman.html#o_r">referer</a>
-variable on each page request to check they resulted from
-a click on the ``trusted referer'' site: if so the referred site
-is added to a list of trusted sites, so that the child can
-then move around that site.
-There are several uncertainties in this scheme that experience may be
-able to iron out; check back in the months ahead.
-<p><dt><br><a name="trust_info_url"><tt>trust_info_url</tt>&#160;&#160;<i>trust_info_url</i></a><dd>
-When access is denied due to lack of a trusted referer, this
-<small>URL</small>
-is displayed with a message pointing the user to it for further information.
-<p><dt><br><a name="hide-console"><tt>hide-console</tt></a><dd>
-In the Windows version only, instructs the program
-to disconnect from and hide the command console after starting.
-<p><dt><i><a name="o_a">-a</a></i><dd>
-(Obsolete) Accept the server's
-<big><kbd>Set-cookie</kbd></big>
-headers, passing them through to the browser.
-<a name="obsolete">This option was removed in Version 1.2</a>
-and replaced by an improvement to the
-<a href="ijbman.html#o_c">-c</a>
-option.
-</dl>
-</p>
-
-<h3><a name="install" href="/cgi-bin/gp?pg=ijbman&pr=install"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Installation and Use
-</h3>
-<p>
-Browsers must be told where to find the
-<b><kbd>junkbuster</kbd></b>
-(e.g.
-<big><kbd>localhost</kbd></big>
-port 8000).
-To set the 
-<small>HTTP</small>
-proxy in Netscape 3.0,
-go through:
-<b><font face="arial, helvetica">
-Options</font></b>;
-<b><font face="arial, helvetica">
-Network Preferences</font></b>;
-<b><font face="arial, helvetica">
-Proxies</font></b>;
-<b><font face="arial, helvetica">
-Manual Proxy Configuration</font></b>;
-<b><font face="arial, helvetica">
-View</font></b>.
-See the
-<a href="ijbfaq.html"><small>FAQ</small></a>
-for other browsers.
-The
-<a href="ijbfaq.html#security">Security Proxy</a>
-should also be set to the same values,
-otherwise
-<big><kbd>shttp:</kbd></big>
-<small>URL</small>s
-won't work.
-<p>
-<a name="limitations">Note the limitations</a>
-explained in the
-<a href="ijbfaq.html"><small>FAQ</small></a>.
-</p>
-
-<h3><a name="show" href="/cgi-bin/gp?pg=ijbman&pr=show"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Checking Options
-</h3>
-<p>
-To allow users to
-<a href="ijbfaq.html#show">check</a>
-that a
-<b><kbd>junkbuster</kbd></b>
-is running and how it is configured,
-it intercepts requests for any
-<small>URL</small>
-ending in
-<big><kbd>/show-proxy-args</kbd></big>
-and blocks it,
-returning instead returns information on its
-version number and
-current configuration
-including the contents of its blockfile.
-To get an explicit warning that no
-<b><kbd>junkbuster</kbd></b>
-intervened if the proxy was not configured,
-it's best to point it to a
-<small>URL</small>
-that does this, such as
-<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a>
-on Junkbusters's website.
-</p>
-
-<h3><a name="also" href="/cgi-bin/gp?pg=ijbman&pr=also"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-See Also
-</h3>
-<p>
-<a href="ijbfaq.html">http://www.junkbusters.com/ht/en/ijbfaq.html</a>
-<br>
-<a href="cookies.html">http://www.junkbusters.com/ht/en/cookies.html</a>
-<br>
-<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a>
-<br>
-<a name ="kristol" href="http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html">http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html</a>
-<br>
-<a name ="squid" href="http://squid.nlanr.net/Squid/">http://squid.nlanr.net/Squid/</a>
-<br>
-<a href="http://www-math.uni-paderborn.de/~axel/">http://www-math.uni-paderborn.de/~axel/</a>
-</p>
-
-<h3><a name="copyright" href="/cgi-bin/gp?pg=ijbman&pr=copyright"><img border=0 width=14 height=14 src="/images/fb.gif" alt="&lt;Feedback&gt"></a>&#160;
-Copyright and GPL
-</h3>
-<p>
-Written and copyright by the Anonymous Coders and Junkbusters Corporation
-and made available under the
-<a href="gpl.html">GNU General Public License (GPL).</a>
-This software comes with
-<a href="gpl.html#nowarr">NO WARRANTY.</a>
-Internet Junkbuster
-Proxy
-is a
-<a href="legal.html#marks">trademark</a>
-of Junkbusters Corporation.
-</p>
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>
-<font face="arial, helvetica">
-<a rel="begin" href="index.html">Home</a> <font color="#ff0000">
-<b> &#183; </b></font>
-<a rel="next" href="cookies.html">Next</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="lopt.html">Site Map</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="legal.html">Legal</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="junkdata.html">Privacy</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="cookies.html">Cookies</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="ijb.html">Banner Ads</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="telemarketing.html">Telemarketing</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="junkmail.html">Mail</a>
-<font color="#ff0000">
-<b> &#183; </b></font><a href="junkemail.html">Spam</a>
-
-</font><form action="/cgi-bin/search" method="GET">
-<input type="text" name="q" size=60 maxlength=120 value="">
-<input type="submit" value="Search"></form>
-<small>
-<small>
-<p>
-<a href="legal.html#copy">Copyright</a> &#169; 1996-8 Junkbusters
-<a href="legal.html#marks">&#174;</a> Corporation.
-Copying and distribution permitted under
-the <a href="gpl.html"><small>GNU</small></a>
-General Public License.
-</small>
-<tt>
-1998/10/31
-http://www.junkbusters.com/ht/en/ijbman.html
-</tt>
-<address><kbd>webmaster&#64;junkbusters.com</kbd></address>
-</small>
-</body>
+
+        <p>to allow SSL transactions to proceed directly. The
+        cautious would also add an entry in their blockfile to stop
+        transactions to port 443 for all but specified trusted
+        sites.</p>
+
+        <p><a name="loop"></a>Configure with care: no loop
+        detection is performed. When setting up chains of proxies
+        that might loop back, try adding <a href="#squid">
+        Squid.</a></p>
+
+        <p><i>via_gateway_type</i> and <i>gateway</i> are used to
+        support SOCKS proxies. Some firewalls provide this type of
+        proxy. If you do not not want to use a SOCKS proxy, specify
+        both of these fields as "<code>.</code>".</p>
+
+        <p><a name="configure"></a><a name="identify"></a>Note that
+        JunkBuster is a SOCKS <b>client</b>, <b>not</b> a SOCKS <b>
+        server</b>. The user's browser should <b>not</b> be <a
+        href="ijbfaq.html#socks">configured</a> to use <code>
+        SOCKS</code>; the proxy conducts the negotiations, not the
+        browser.</p>
+
+        <p>The <code>SOCKS4</code> protocol may be specified by
+        setting <i>via_gateway_type</i> to <code>socks</code> or
+        <code>socks4</code>. The <code>SOCKS4A</code> protocol is
+        specified as <code>socks4a</code>. The <code>SOCKS5</code>
+        protocol is not currently supported.</p>
+
+        <p><i>gateway</i> should be the host and port of the SOCKS
+        server. If you just specify a hostname, then the port
+        number defaults to 1080.</p>
+
+        <p>The user identification capabilities of <code>
+        SOCKS4</code> are deliberately not used; the user is always
+        identified to the <code>SOCKS</code> server as <code>
+        userid=anonymous</code>. If the server's policy is to
+        reject requests from <code>anonymous</code>, the proxy will
+        not work. Use a <a href="#o_d">debug</a> value of 3 to see
+        the status returned by the server.</p>
+
+        <p>If you specify both a HTTP proxy (with <i>
+        forward_to</i>) and a SOCKS proxy (with <i>gateway</i>)
+        then the SOCKS proxy is used to connect to the HTTP proxy.
+        If you just specify a SOCKS proxy, it is used to connect
+        directly to the websites.</p>
+      </dd>
+
+      <dt><i><a name="o_d"></a></i><a name=
+      "debug"></a><code>debug</code>&nbsp;&nbsp;<i>N</i></dt>
+
+      <dd>
+        <p>Set debug mode. The most common value is 1, to <a href=
+        "ijbfaq.html#pinpoint">pinpoint</a> offensive URLs, so they
+        can be added to the blockfile. The value of <b>N</b> is a
+        bitwise logical-OR of the following values:<br>
+         1 = URLs (show each URL requested by the browser);<br>
+         2 = Connections (show each connection to or from the
+        proxy);<br>
+         4 = I/O (log I/O errors);<br>
+         8 = Headers (as each header is scanned, show the header
+        and what is done to it);<br>
+         16 = Log everything (including debugging traces and the
+        contents of the pages).<br>
+         32 = Record accesses in Common Log Format, as used by most
+        web and proxy servers.</p>
+
+        <p><a name="or"></a>Multiple <code>debug</code> lines are
+        permitted; they are logical OR-ed together.</p>
+
+        <p><a name="single"></a>Because most browsers send several
+        requests in parallel the debugging output may appear
+        intermingled, so the <a href="#single-threaded">
+        single-threaded</a> option is recommended when using <a
+        href="#debug">debug</a> with <b>N</b> greater than 1. 
+        <!-- Aside: Yes, it's clumsy, but it's easy to parse. --></p>
+      </dd>
+
+      <dt><i><a name="o_y"></a></i><a name=
+      "add-forwarded-header"></a><code>add-forwarded-header</code></dt>
+
+      <dd>
+        <p>Add <code>X-Forwarded-For</code> headers to the
+        server-bound HTTP stream indicating the client IP address
+        <a href="ijbfaq.html#detect">to the server,</a> in the new
+        style of <a href="#squid">Squid 1.1.4.</a> If you want the
+        traditional <code>HTTP_FORWARDED</code> response header,
+        add it manually with the <a href="#o_x">-x</a> option. This
+        also allows other <code>X-Forwarded-For</code> headers to
+        be transmitted - usually they are discarded.</p>
+      </dd>
+
+      <dt><i><a name="o_x"></a></i><a name=
+      "add-header"></a><code>add-header</code>&nbsp;&nbsp; <i>
+      HeaderText</i></dt>
+
+      <dd>
+        <p>Add the <i>HeaderText</i> verbatim to requests to the
+        server. Typical uses include adding old-style forwarding
+        notices such as <code>Forwarded: by
+        http://pro-privacy-isp.net</code> and reinstating the
+        <code>Proxy-Connection: Keep-Alive</code> header (which the
+        <b><code>junkbuster</code></b> deletes so as <a href=
+        "ijbfaq.html#detect">not</a> to reveal its existence). No
+        checking is done for correctness or plausibility, so it can
+        be used to throw any old trash into the server-bound HTTP
+        stream. Please don't litter. 
+        <!-- Aside: this represents "more than enough rope" --></p>
+      </dd>
+
+      <dt><i><a name="o_s"></a></i><a name=
+      "single-threaded"></a><code>single-threaded</code></dt>
+
+      <dd>
+        <p>Doesn't <code>fork()</code> a separate process (or
+        create a separate thread) to handle each connection. Useful
+        when debugging to keep the process single threaded.</p>
+      </dd>
+
+      <dt><i><a name="o_l"></a></i><a name=
+      "logfile"></a><code>logfile</code>&nbsp;&nbsp; <i>
+      logfile</i></dt>
+
+      <dd>
+        <p>Write all debugging data into <i>logfile.</i> The
+        default <i>logfile</i> is the standard output.</p>
+      </dd>
+
+      <dt><br>
+       <a name="aclfile"></a><code>aclfile</code>&nbsp;&nbsp; <i>
+      aclfile</i></dt>
+
+      <dd>
+        <p>Unless this option is used, the proxy talks to anyone
+        who can connect to it, and everyone who can has equal
+        permissions on where they can go. An access file allows
+        restrictions to be placed on these two policies, by
+        distinguishing some <i><dfn>source</dfn></i> IP addresses
+        and/or some <i><dfn>destination</dfn></i> addresses. (If a
+        <a href="#forwardfile">forwarder or a gateway</a> is being
+        used, its address is considered the destination address,
+        not the ultimate IP address of the URL requested.)</p>
+
+        <p><a name="permit"></a>Each line of the access file begins
+        with either the word <code>permit</code> or <code>
+        deny</code> followed by source and (optionally) destination
+        addresses to be matched against those of the HTTP request.
+        The last matching line specifies the result: if it was a
+        <code>deny</code> line or if no line matched, the request
+        will be refused.</p>
+
+        <p><a name="various"></a>A source or destination can be
+        specified as a single numeric IP address, or with a
+        hostname, provided that the host's name can be resolved to
+        a numeric address: this cannot be used to block all <code>
+        .mil</code> domains for example, because there is no single
+        address associated with that domain name. Either form may
+        be followed by a slash and an integer <code>N</code>,
+        specifying a subnet mask of <code>N</code> bits. For
+        example, <code>permit 207.153.200.72/24</code> matches the
+        entire Class-C subnet from 207.153.200.0 through
+        207.153.200.255. (A netmask of 255.255.255.0 corresponds to
+        24 bits of ones in the netmask, as with <code>
+        *_MASKLEN=24</code>.) A value of 16 would be used for a
+        Class-B subnet. A value of zero for <code>N</code> in the
+        subnet mask length will cause any address to match; this
+        can be used to express a default rule. For more information
+        see the example file provided with the distribution.</p>
+
+        <p><a name="false"></a>If you like these access controls
+        you should probably have <a href="ijbfaq.html#firewall">
+        firewall</a>; they are not intended to replace one.</p>
+      </dd>
+
+      <dt><br>
+       <a name="trustfile"></a><code>trustfile</code>&nbsp;&nbsp;
+      <i>trustfile</i></dt>
+
+      <dd>
+        <p>This feature is experimental, has not been fully
+        documented and is very subject to change. The goal is for
+        parents to be able to choose a page or site whose links
+        they regard suitable for their <a href=
+        "ijbfaq.html#children">young children</a> and for the proxy
+        to allow access only to sites mentioned there. To do this
+        the proxy examines the <a href="#o_r">referer</a> variable
+        on each page request to check they resulted from a click on
+        the ``trusted referer'' site: if so the referred site is
+        added to a list of trusted sites, so that the child can
+        then move around that site. There are several uncertainties
+        in this scheme that experience may be able to iron out;
+        check back in the months ahead.</p>
+      </dd>
+
+      <dt><br>
+       <a name="trust_info_url">
+      </a><code>trust_info_url</code>&nbsp;&nbsp; <i>
+      trust_info_url</i></dt>
+
+      <dd>
+        <p>When access is denied due to lack of a trusted referer,
+        this URL is displayed with a message pointing the user to
+        it for further information.</p>
+      </dd>
+
+      <dt><br>
+       <a name="hide-console"></a><code>hide-console</code></dt>
+
+      <dd>
+        <p>In the Windows command-line version only, instructs the
+        program to disconnect from and hide the command console
+        after starting.</p>
+      </dd>
+    </dl>
+
+    <h3><a name="install"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Installation and Use</h3>
+
+    <p>Browsers must be told where to find the <b><code>
+    junkbuster</code></b> (e.g. <code>localhost</code> port 8000).
+    To set the HTTP proxy in Netscape 3.0, go through: <b class=
+    "eg">Options</b>; <b class="eg">Network Preferences</b>; <b
+    class="eg">Proxies</b>; <b class="eg">Manual Proxy
+    Configuration</b>; <b class="eg">View</b>. See the <a href=
+    "ijbfaq.html">FAQ</a> for other browsers. The <a href=
+    "ijbfaq.html#security">Security Proxy</a> should also be set to
+    the same values, otherwise <code>shttp:</code> URLs won't
+    work.</p>
+
+    <p><a name="limitations"></a>Note the limitations explained in
+    the <a href="ijbfaq.html">FAQ</a>.</p>
+
+    <h3><a name="show"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; Checking Options</h3>
+
+    <p>To allow users to <a href="ijbfaq.html#show">check</a> that
+    a <b><code>junkbuster</code></b> is running and how it is
+    configured, it intercepts requests for any URL ending in <code>
+    /show-proxy-args</code> and blocks it, returning instead
+    returns information on its version number and current
+    configuration including the contents of its blockfile. To get
+    an explicit warning that no <b><code>junkbuster</code></b>
+    intervened if the proxy was not configured, it's best to point
+    it to a URL that does this, such as <a href=
+    "http://internet.junkbuster.com/cgi-bin/show-proxy-args">
+    http://internet.junkbuster.com/cgi-bin/show-proxy-args</a> on
+    Junkbusters's website.</p>
+
+    <h3><a name="also"></a><img border="0" src="fb.gif" alt="*"
+    width="14" height="14">&nbsp; See Also</h3>
+
+    <p><a href="ijbfaq.html">
+    http://www.junkbusters.com/ht/en/ijbfaq.html</a><br>
+     <a href="http://www.junkbusters.com/ht/en/cookies.html">
+    http://www.junkbusters.com/ht/en/cookies.html</a><br>
+     <a href=
+    "http://internet.junkbuster.com/cgi-bin/show-proxy-args">
+    http://internet.junkbuster.com/cgi-bin/show-proxy-args</a><br>
+     <a name="kristol"></a><a href=
+    "http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html">http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html</a><br>
+
+     <a name="squid"></a><a href=
+    "http://squid.nlanr.net/Squid/">http://squid.nlanr.net/Squid/</a><br>
+
+     <a href="http://www-math.uni-paderborn.de/~axel/">
+    http://www-math.uni-paderborn.de/~axel/</a></p>
+
+    <h3><a name="copyright"></a><img border="0" src="fb.gif" alt=
+    "*" width="14" height="14">&nbsp; Copyright and GPL</h3>
+
+    <p>Written and copyright by the Anonymous Coders and
+    Junkbusters Corporation and made available under the <a href=
+    "gpl.html">GNU General Public License (GPL).</a> This software
+    comes with <a href="gpl.html#nowarr">NO WARRANTY.</a> Internet
+    Junkbuster Proxy is a <a href=
+    "http://www.junkbusters.com/ht/en/legal.html#marks">
+    trademark</a> of Junkbusters Corporation.</p>
+
+    <p align="center"><a href="#top_of_page"><img border="0" src=
+    "top.gif" alt="--- Back to Top of Page ---" width="250" height=
+    "15"></a></p>
+
+    <p class="sans"><a href="http://ijbswa.sourceforge.net/">
+    Website</a> <b class="dot">&middot;</b> <b>Manual</b> <b class=
+    "dot">&middot;</b> <a href="ijbfaq.html">FAQ</a> <b class=
+    "dot">&middot;</b> <a href="gpl.html">GPL</a></p>
+
+    <p class="sans"><small><small><a href="gpl.html#text">
+    Copyright</a> &copy; 1996-8 <a href=
+    "http://www.junkbusters.com/">Junkbusters</a> <a href=
+    "http://www.junkbusters.com/ht/en/legal.html#marks">&reg;</a>
+    Corporation. <a href="gpl.html#text">Copyright</a> &copy; 2001
+    <a href="http://sourceforge.net/projects/ijbswa/">Jon
+    Foster</a>. Copying and distribution permitted under the <a
+    href="gpl.html">GNU</a> General Public
+    License.</small></small></p>
+
+    <p><small><code><a href=
+    "http://sourceforge.net/projects/ijbswa/">
+    http://sourceforge.net/projects/ijbswa/</a></code></small></p>
+  </body>
 </html>
+
diff --git a/doc/top.gif b/doc/top.gif
new file mode 100755
index 00000000..8380083d
Binary files /dev/null and b/doc/top.gif differ