X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;ds=sidebyside;f=doc%2Fwebserver%2Fuser-manual%2Findex.html;h=1dd8cc3723d0e4f6ade9477a54663167740393c8;hb=07cf496b6edcbd3cf315ec7c48f2c94be27357b1;hp=15938d5bbad2cecb28de099c15d3302149986bdd;hpb=7017546f48d1189837d3b8d6a523328195279e57;p=privoxy.git diff --git a/doc/webserver/user-manual/index.html b/doc/webserver/user-manual/index.html index 15938d5b..1dd8cc37 100644 --- a/doc/webserver/user-manual/index.html +++ b/doc/webserver/user-manual/index.html @@ -1,453 +1,621 @@ -Privoxy User Manual

Privoxy User Manual

By: Privoxy Developers

$Id: user-manual.sgml,v 1.73 2002/04/10 18:45:15 swa Exp $

-

The user manual gives users information on how to install, configure and use - Privoxy. -

Privoxy is a web proxy with advanced filtering - capabilities for protecting privacy, filtering web page content, managing - cookies, controlling access, and removing ads, banners, pop-ups and other - obnoxious Internet junk. Privoxy has a very - flexible configuration and can be customized to suit individual needs and - tastes. Privoxy has application for both - stand-alone systems and multi-user networks.

Privoxy is based on the code of the - Internet Junkbuster (tm). - Junkbuster was originally written by Junkbusters - Corporation, and was released as free open-source software under the GNU GPL. - Stefan Waldherr made many improvements, and started the SourceForge project - to continue development.

Privoxy continues the - Junkbuster tradition, but adds many - refinements, enhancements and new features.

You can find the latest version of the user manual at http://www.privoxy.org/user-manual/. - Please see the Contact section on how to - contact the developers. -


Table of Contents
1. Introduction
1.1. New Features
3. Installation
3.1. Source
3.1.1. Red Hat
3.1.2. SuSE
3.1.3. OS/2
3.1.4. Windows
3.1.5. Other
4. Quickstart to Using Privoxy
4.1. Command Line Options
5. Privoxy Configuration
5.1. Controlling Privoxy with Your Web Browser
5.2. Configuration Files Overview
5.3. The Main Configuration File
5.3.1. Defining Other Configuration Files
5.3.2. Other Configuration Options
5.3.3. Access Control List (ACL)
5.3.4. Forwarding
5.3.5. Windows GUI Options
5.4. The Actions File
5.4.1. URL Domain and Path Syntax
5.4.2. Actions
5.4.3. Aliases
5.5. The Filter File
5.6. Templates
6. Contacting the Developers, Bug Reporting and Feature -Requests
6.1. Submitting Ads and "Action" Problems
7. Copyright and History
7.1. Copyright
7.2. History
8. See Also
9. Appendix
9.1. Regular Expressions
9.2. Privoxy's Internal Pages
9.2.1. Bookmarklets
9.3. Anatomy of an Action


  Next
  Introduction
\ No newline at end of file + + + + + + + Privoxy 3.0.18 User Manual + + + + + + + + + +
+
+

Privoxy 3.0.18 User + Manual

+ +

Copyright © + 2001-2011 by Privoxy + Developers

+ +

$Id: user-manual.sgml,v 2.136 2011/10/14 16:53:10 + fabiankeil Exp $

+ +
+ + +

The Privoxy User Manual gives users + information on how to install, configure and use Privoxy.

+ +

Privoxy is a non-caching web proxy with advanced filtering + capabilities for enhancing privacy, modifying web page data and HTTP + headers, controlling access, and removing ads and other obnoxious + Internet junk. Privoxy has a flexible configuration and can be + customized to suit individual needs and tastes. It has application + for both stand-alone systems and multi-user networks.

+ +

Privoxy is Free Software and licensed under the GNU GPLv2.

+ +

Privoxy is an associated project of Software in the Public + Interest (SPI).

+ +

Helping hands and donations are welcome:

+ + + +

You can find the latest version of the Privoxy User Manual at http://www.privoxy.org/user-manual/. Please see the + Contact section on how to contact the + developers.

+
+
+
+ +
+
+
Table of Contents
+ +
1. Introduction
+ +
+
+
1.1. Features
+
+
+ +
2. Installation
+ +
+
+
2.1. Binary + Packages
+ +
+
+
2.1.1. Red Hat and Fedora + RPMs
+ +
2.1.2. Debian and + Ubuntu
+ +
2.1.3. Windows
+ +
2.1.4. Solaris
+ +
2.1.5. OS/2
+ +
2.1.6. Mac + OS X
+ +
2.1.7. AmigaOS
+ +
2.1.8. FreeBSD
+ +
2.1.9. Gentoo
+
+
+ +
2.2. Building + from Source
+ +
2.3. Keeping your + Installation Up-to-Date
+
+
+ +
3. What's New in this Release
+ +
+
+
3.1. Note to + Upgraders
+
+
+ +
4. Quickstart to Using Privoxy
+ +
+
+
4.1. Quickstart to Ad + Blocking
+
+
+ +
5. Starting Privoxy
+ +
+
+
5.1. Red Hat and + Fedora
+ +
5.2. Debian
+ +
5.3. Windows
+ +
5.4. Solaris, NetBSD, + FreeBSD, HP-UX and others
+ +
5.5. OS/2
+ +
5.6. Mac OS X
+ +
5.7. AmigaOS
+ +
5.8. Gentoo
+ +
5.9. Command Line + Options
+
+
+ +
6. Privoxy Configuration
+ +
+
+
6.1. Controlling Privoxy + with Your Web Browser
+ +
6.2. Configuration + Files Overview
+
+
+ +
7. The Main Configuration File
+ +
+
+
7.1. Local Set-up + Documentation
+ +
+
+
7.1.1. user-manual
+ +
7.1.2. trust-info-url
+ +
7.1.3. admin-address
+ +
7.1.4. proxy-info-url
+
+
+ +
7.2. Configuration and Log + File Locations
+ +
+
+
7.2.1. confdir
+ +
7.2.2. templdir
+ +
7.2.3. logdir
+ +
7.2.4. actionsfile
+ +
7.2.5. filterfile
+ +
7.2.6. logfile
+ +
7.2.7. trustfile
+
+
+ +
7.3. Debugging
+ +
+
+
7.3.1. debug
+ +
7.3.2. single-threaded
+ +
7.3.3. hostname
+
+
+ +
7.4. Access Control and + Security
+ +
+
+
7.4.1. listen-address
+ +
7.4.2. toggle
+ +
7.4.3. enable-remote-toggle
+ +
7.4.4. enable-remote-http-toggle
+ +
7.4.5. enable-edit-actions
+ +
7.4.6. enforce-blocks
+ +
7.4.7. ACLs: permit-access and + deny-access
+ +
7.4.8. buffer-limit
+
+
+ +
7.5. Forwarding
+ +
+
+
7.5.1. forward
+ +
7.5.2. forward-socks4, + forward-socks4a and forward-socks5
+ +
7.5.3. Advanced + Forwarding Examples
+ +
7.5.4. forwarded-connect-retries
+
+
+ +
7.6. Miscellaneous
+ +
+
+
7.6.1. accept-intercepted-requests
+ +
7.6.2. allow-cgi-request-crunching
+ +
7.6.3. split-large-forms
+ +
7.6.4. keep-alive-timeout
+ +
7.6.5. default-server-timeout
+ +
7.6.6. connection-sharing
+ +
7.6.7. socket-timeout
+ +
7.6.8. max-client-connections
+ +
7.6.9. handle-as-empty-doc-returns-ok
+ +
7.6.10. enable-compression
+ +
7.6.11. compression-level
+
+
+ +
7.7. Windows GUI + Options
+
+
+ +
8. Actions Files
+ +
+
+
8.1. Finding the Right + Mix
+ +
8.2. How to Edit
+ +
8.3. How Actions + are Applied to Requests
+ +
8.4. Patterns
+ +
+
+
8.4.1. The Domain + Pattern
+ +
8.4.2. The Path + Pattern
+ +
8.4.3. The Tag + Pattern
+
+
+ +
8.5. Actions
+ +
+
+
8.5.1. add-header
+ +
8.5.2. block
+ +
8.5.3. change-x-forwarded-for
+ +
8.5.4. client-header-filter
+ +
8.5.5. client-header-tagger
+ +
8.5.6. content-type-overwrite
+ +
8.5.7. crunch-client-header
+ +
8.5.8. crunch-if-none-match
+ +
8.5.9. crunch-incoming-cookies
+ +
8.5.10. crunch-server-header
+ +
8.5.11. crunch-outgoing-cookies
+ +
8.5.12. deanimate-gifs
+ +
8.5.13. downgrade-http-version
+ +
8.5.14. fast-redirects
+ +
8.5.15. filter
+ +
8.5.16. force-text-mode
+ +
8.5.17. forward-override
+ +
8.5.18. handle-as-empty-document
+ +
8.5.19. handle-as-image
+ +
8.5.20. hide-accept-language
+ +
8.5.21. hide-content-disposition
+ +
8.5.22. hide-if-modified-since
+ +
8.5.23. hide-from-header
+ +
8.5.24. hide-referrer
+ +
8.5.25. hide-user-agent
+ +
8.5.26. limit-connect
+ +
8.5.27. prevent-compression
+ +
8.5.28. overwrite-last-modified
+ +
8.5.29. redirect
+ +
8.5.30. server-header-filter
+ +
8.5.31. server-header-tagger
+ +
8.5.32. session-cookies-only
+ +
8.5.33. set-image-blocker
+ +
8.5.34. Summary
+
+
+ +
8.6. Aliases
+ +
8.7. Actions Files + Tutorial
+ +
+
+
8.7.1. match-all.action
+ +
8.7.2. default.action
+ +
8.7.3. user.action
+
+
+
+
+ +
9. Filter Files
+ +
+
+
9.1. Filter File + Tutorial
+ +
9.2. The + Pre-defined Filters
+
+
+ +
10. Privoxy's Template Files
+ +
11. Contacting the Developers, Bug + Reporting and Feature Requests
+ +
+
+
11.1. Get + Support
+ +
11.2. Reporting + Problems
+ +
+
+
11.2.1. Reporting Ads + or Other Configuration Problems
+ +
11.2.2. Reporting + Bugs
+
+
+ +
11.3. Request New + Features
+ +
11.4. Mailing + Lists
+
+
+ +
12. Privoxy Copyright, License and + History
+ +
+
+
12.1. License
+ +
12.2. History
+ +
12.3. Authors
+
+
+ +
13. See Also
+ +
14. Appendix
+ +
+
+
14.1. Regular + Expressions
+ +
14.2. Privoxy's Internal + Pages
+ +
+
+
14.2.1. Bookmarklets
+
+
+ +
14.3. Chain of Events
+ +
14.4. Troubleshooting: + Anatomy of an Action
+
+
+
+
+
+ + + +