X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=doc%2Fsource%2Ffaq.sgml;h=147a768b2103000aba49fa5999e3a474c96f3b13;hb=dd4013765fc5c0b8b052365f20a59a31f88797a8;hp=fde124d24bc593d87725475fcfbf9a68132c7269;hpb=5810a5f03c45599ffa56ab2808a9332e45fb2091;p=privoxy.git
diff --git a/doc/source/faq.sgml b/doc/source/faq.sgml
index fde124d2..147a768b 100644
--- a/doc/source/faq.sgml
+++ b/doc/source/faq.sgml
@@ -8,10 +8,10 @@
-
-
-
-
+
+
+
+
@@ -25,7 +25,7 @@
Purpose : FAQ
- Copyright (C) 2001-2020 Privoxy Developers https://www.privoxy.org/
+ Copyright (C) 2001-2023 Privoxy Developers https://www.privoxy.org/
See LICENSE.
Based partially on the Internet Junkbuster FAQ originally written by and
@@ -69,7 +69,7 @@
- Copyright &my-copy; 2001-2020 by
+ Copyright &my-copy; 2001-2023 by
Privoxy Developers
@@ -554,7 +554,10 @@ warranty? Registration?
The logo sizes depend on the sponsor level. Logos are served from
our server, no requests are made to the sponsor website unless
- the links are being used.
+ the links are being used. Note that Privoxy comes with a
+ hide-referrer
+ action so Privoxy users following links to sponsor websites
+ may not necessarily send requests with a Referer header set.
Link targets are without path (https://www.example.org/
@@ -564,6 +567,10 @@ warranty? Registration?
The details may change over time but changes will only affect new sponsors
(or existing sponsors that explicitly agreed to the changes).
+
+ Thanks to Software in the Public Interest (SPI)
+ Privoxy sponsors can get a proper invoice.
+
If you want to become a sponsor, please contact
Fabian Keil
@@ -919,11 +926,13 @@ the differences?
url="../user-manual/actions-file.html#ALIASES">alias just for such
sticky situations:
- # Gmail is a _fragile_ site:
+
+# Gmail is a _fragile_ site:
#
{ fragile }
- # Gmail is ...
- mail.google.com
+# Gmail is ...
+mail.google.com
+
Be sure to flush your browser's caches whenever making these kinds of
changes, just to make sure the changes take.
@@ -1075,7 +1084,7 @@ with a browser? Does that not raise security issues?
- listen-address 192.168.1.1:8118
+listen-address 192.168.1.1:8118
Save the file, and restart Privoxy. Configure
@@ -1088,7 +1097,7 @@ with a browser? Does that not raise security issues?
- listen-address :8118
+listen-address :8118
And then use Privoxy's
@@ -1358,8 +1367,9 @@ and thus avoid individual browser configuration?
both in and out, for example.com:
- { -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only -filter{content-cookies} }
- .example.com
+{ -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only -filter{content-cookies} }
+.example.com
+
Place the above in user.action. Note that some of these may
be off by default anyway, so this might be redundant, but there is no harm
@@ -1395,19 +1405,20 @@ and thus avoid individual browser configuration?
Here's one real easy one:
- ############################################################
- # Blacklist
- ############################################################
- { +block }
- / # Block *all* URLs
-
- ############################################################
- # Whitelist
- ############################################################
- { -block }
- kids.example.com
- toys.example.com
- games.example.com
+############################################################
+# Blacklist
+############################################################
+{ +block }
+/ # Block *all* URLs
+
+############################################################
+# Whitelist
+############################################################
+{ -block }
+kids.example.com
+toys.example.com
+games.example.com
+
This allows access to only those three sites by first blocking all URLs, and
then subsequently allowing three specific exceptions.
@@ -1451,20 +1462,22 @@ and thus avoid individual browser configuration?
following very simple rule in your user.action:
- # Unblock everybody, everywhere
- { -block }
- / # UN-Block *all* URLs
+# Unblock everybody, everywhere
+{ -block }
+/ # UN-Block *all* URLs
+
Or even a more comprehensive reversing of various ad related actions:
- # Unblock everybody, everywhere, and turn off appropriate filtering, etc
- { -block \
+# Unblock everybody, everywhere, and turn off appropriate filtering, etc
+{ -block \
-filter{banners-by-size} \
-filter{banners-by-link} \
allow-popups \
- }
- / # UN-Block *all* URLs and allow ads
+}
+/ # UN-Block *all* URLs and allow ads
+
This last action in this compound statement,
allow-popups, is an BLOCKED page?
available as compile-time options. You should
configure the sources as follows:
-
- ./configure --disable-toggle --disable-editor --disable-force
+
+./configure --disable-toggle --disable-editor --disable-force
+
This will create an executable with hard-coded security features so that
&my-app; does not allow easy bypassing of blocked sites, or changing the
@@ -2197,11 +2211,12 @@ altered it! Yikes, what is wrong!
configuration, consider adding your list to your user.action file:
- { +block }
- www.ad.example1.com
- ad.example2.com
- ads.galore.example.com
- etc.example.com
+{ +block }
+www.ad.example1.com
+ad.example2.com
+ads.galore.example.com
+etc.example.com
+