The User ManualPrivoxy User Manual gives users information on how to
install, configure and use PrivoxyPrivoxy.
Privoxy is a web proxy with advanced filtering
- capabilities for protecting privacy, modifying web page data, managing
- cookies, controlling access, and removing ads, banners, pop-ups and other
- obnoxious Internet junk. Privoxy has a very
- flexible configuration and can be customized to suit individual needs and
- tastes. Privoxy has application for both
- stand-alone systems and multi-user networks.
Privoxy is a non-caching
+
web proxy
+ with advanced filtering capabilities for enhancing privacy,
+ modifying web page data, managing HTTP
+
cookies,
+ controlling access, and removing ads, banners, pop-ups and other obnoxious
+ Internet junk. Privoxy has a flexible configuration and can be
+ customized to suit individual needs and tastes. Privoxy has application for
+ both stand-alone systems and multi-user networks.
Privoxy is based on Internet
- Junkbuster (tm).
Privoxy is based on Internet Junkbuster (tm).
You can find the latest version of the User ManualPrivoxy User Manual at 2.1.1. Red Hat, SuSE and Conectiva RPMsRed Hat and Fedora RPMs
2.1.2. DebianDebian and Ubuntu2.1.3. 2.1.4. Solaris, NetBSD, FreeBSD, HP-UXSolaris2.1.5. 2.1.6. Mac OSXMac OS X2.1.7. 2.1.8. FreeBSD2.1.9. Gentoo4. Quickstart to Using PrivoxyQuickstart to Using Privoxy- 5. Starting PrivoxyStarting Privoxy
- 5.1. Red Hat and ConectivaRed Hat and Fedora
- 5.2.
- 5.3. SuSE
- 5.4. Windows
- 5.5. 5.4. Solaris, NetBSD, FreeBSD, HP-UX and others
- 5.6. 5.5. OS/2
- 5.7. 5.6. Mac OSXMac OS X
- 5.8. 5.7. AmigaOS
- 5.9. 5.8. Gentoo
- 5.10. 5.9. Command Line Options
- 6. Privoxy ConfigurationPrivoxy Configuration
- 6.1. Controlling Privoxy with Your Web BrowserControlling Privoxy with Your Web Browser
- 6.2.
- 7.1. Configuration and Log File LocationsLocal Set-up Documentation
- 7.1.1. confdiruser-manual
- 7.1.2. logdirtrust-info-url
- 7.1.3. actionsfileadmin-address
- 7.1.4. filterfile
- 7.1.5. logfile
- 7.1.6. jarfile
- 7.1.7. trustfileproxy-info-url
- 7.2. Local Set-up DocumentationConfiguration and Log File Locations
- 7.2.1. user-manualconfdir
- 7.2.2. trust-info-urltempldir
- 7.2.3. admin-addresslogdir
- 7.2.4. proxy-info-urlactionsfile
- 7.2.5. filterfile
- 7.2.6. logfile
- 7.2.7. jarfile
- 7.2.8. trustfile
single-threaded- 7.3.3. hostname
- 7.4.4. enable-remote-http-toggle
- 7.4.5. enable-edit-actions
- 7.4.5. 7.4.6. enforce-blocks
- 7.4.7. ACLs: permit-access and deny-access
- 7.4.6. 7.4.8. buffer-limit
- 7.5.2. forward-socks4 and forward-socks4aforward-socks4, forward-socks4a and forward-socks5
- 7.5.3. Advanced Forwarding Examples
- 7.5.4. forwarded-connect-retries
- 7.5.5. accept-intercepted-requests
- 7.5.6. allow-cgi-request-crunching
- 7.5.7. split-large-forms
- 8.1. Finding the Right Mix
- 8.2. How to Edit
- 8.3. How Actions are Applied to URLsHow Actions are Applied to Requests
- 8.4.
- 8.4.1. The Domain Pattern
- 8.4.2. The Path Pattern
- 8.4.3. The Tag Pattern
8.5.3. client-header-filter8.5.4. client-header-tagger8.5.5. content-type-overwrite8.5.4. 8.5.6. crunch-client-header8.5.5. 8.5.7. crunch-if-none-match8.5.6. 8.5.8. crunch-incoming-cookies8.5.7. 8.5.9. crunch-server-header8.5.8. 8.5.10. crunch-outgoing-cookies8.5.9. 8.5.11. deanimate-gifs8.5.10. 8.5.12. downgrade-http-version8.5.11. 8.5.13. fast-redirects8.5.12. 8.5.14. filter8.5.13. filter-client-headers8.5.14. filter-server-headers8.5.15. force-text-mode8.5.16. forward-override8.5.17. handle-as-empty-document8.5.17. 8.5.18. handle-as-image8.5.18. 8.5.19. hide-accept-language8.5.19. 8.5.20. hide-content-disposition8.5.20. 8.5.21. hide-if-modified-since8.5.21. 8.5.22. hide-forwarded-for-headers8.5.22. 8.5.23. hide-from-header8.5.23. 8.5.24. hide-referrer8.5.24. 8.5.25. hide-user-agent8.5.25. inspect-jpegs8.5.26. kill-popups8.5.27. limit-connect8.5.28. 8.5.27. prevent-compression8.5.29. 8.5.28. overwrite-last-modified8.5.30. 8.5.29. redirect8.5.31. send-vanilla-wafer8.5.30. server-header-filter8.5.32. send-wafer8.5.31. server-header-tagger8.5.33. 8.5.32. session-cookies-only8.5.34. 8.5.33. set-image-blocker8.5.35. treat-forbidden-connects-like-blocks8.5.36. 8.5.34. Summary- 8.7.1. default.action
- 8.7.2. user.action
- 9.1. Filter File Tutorial
- 10. TemplatesPrivoxy's Template Files
- 11.
- 12. Privoxy Copyright, License and HistoryPrivoxy Copyright, License and History
- 12.1. License
- 14.2. Privoxy's Internal PagesPrivoxy's Internal Pages
- 14.4. Anatomy of an ActionTroubleshooting: Anatomy of an Action