X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=doc%2Fsource%2Ffaq.sgml;h=147a768b2103000aba49fa5999e3a474c96f3b13;hb=dd4013765fc5c0b8b052365f20a59a31f88797a8;hp=fde124d24bc593d87725475fcfbf9a68132c7269;hpb=5810a5f03c45599ffa56ab2808a9332e45fb2091;p=privoxy.git diff --git a/doc/source/faq.sgml b/doc/source/faq.sgml index fde124d2..147a768b 100644 --- a/doc/source/faq.sgml +++ b/doc/source/faq.sgml @@ -8,10 +8,10 @@ - - - - + + + + @@ -25,7 +25,7 @@ Purpose : FAQ - Copyright (C) 2001-2020 Privoxy Developers https://www.privoxy.org/ + Copyright (C) 2001-2023 Privoxy Developers https://www.privoxy.org/ See LICENSE. Based partially on the Internet Junkbuster FAQ originally written by and @@ -69,7 +69,7 @@ - Copyright &my-copy; 2001-2020 by + Copyright &my-copy; 2001-2023 by Privoxy Developers @@ -554,7 +554,10 @@ warranty? Registration? The logo sizes depend on the sponsor level. Logos are served from our server, no requests are made to the sponsor website unless - the links are being used. + the links are being used. Note that Privoxy comes with a + hide-referrer + action so Privoxy users following links to sponsor websites + may not necessarily send requests with a Referer header set. Link targets are without path (https://www.example.org/ @@ -564,6 +567,10 @@ warranty? Registration? The details may change over time but changes will only affect new sponsors (or existing sponsors that explicitly agreed to the changes). + + Thanks to Software in the Public Interest (SPI) + Privoxy sponsors can get a proper invoice. + If you want to become a sponsor, please contact Fabian Keil @@ -919,11 +926,13 @@ the differences? url="../user-manual/actions-file.html#ALIASES">alias just for such sticky situations: - # Gmail is a _fragile_ site: + +# Gmail is a _fragile_ site: # { fragile } - # Gmail is ... - mail.google.com +# Gmail is ... +mail.google.com + Be sure to flush your browser's caches whenever making these kinds of changes, just to make sure the changes take. @@ -1075,7 +1084,7 @@ with a browser? Does that not raise security issues? - listen-address 192.168.1.1:8118 +listen-address 192.168.1.1:8118 Save the file, and restart Privoxy. Configure @@ -1088,7 +1097,7 @@ with a browser? Does that not raise security issues? - listen-address :8118 +listen-address :8118 And then use Privoxy's @@ -1358,8 +1367,9 @@ and thus avoid individual browser configuration? both in and out, for example.com: - { -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only -filter{content-cookies} } - .example.com +{ -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only -filter{content-cookies} } +.example.com + Place the above in user.action. Note that some of these may be off by default anyway, so this might be redundant, but there is no harm @@ -1395,19 +1405,20 @@ and thus avoid individual browser configuration? Here's one real easy one: - ############################################################ - # Blacklist - ############################################################ - { +block } - / # Block *all* URLs - - ############################################################ - # Whitelist - ############################################################ - { -block } - kids.example.com - toys.example.com - games.example.com +############################################################ +# Blacklist +############################################################ +{ +block } +/ # Block *all* URLs + +############################################################ +# Whitelist +############################################################ +{ -block } +kids.example.com +toys.example.com +games.example.com + This allows access to only those three sites by first blocking all URLs, and then subsequently allowing three specific exceptions. @@ -1451,20 +1462,22 @@ and thus avoid individual browser configuration? following very simple rule in your user.action: - # Unblock everybody, everywhere - { -block } - / # UN-Block *all* URLs +# Unblock everybody, everywhere +{ -block } +/ # UN-Block *all* URLs + Or even a more comprehensive reversing of various ad related actions: - # Unblock everybody, everywhere, and turn off appropriate filtering, etc - { -block \ +# Unblock everybody, everywhere, and turn off appropriate filtering, etc +{ -block \ -filter{banners-by-size} \ -filter{banners-by-link} \ allow-popups \ - } - / # UN-Block *all* URLs and allow ads +} +/ # UN-Block *all* URLs and allow ads + This last action in this compound statement, allow-popups, is an BLOCKED page? available as compile-time options. You should configure the sources as follows: - - ./configure --disable-toggle --disable-editor --disable-force + +./configure --disable-toggle --disable-editor --disable-force + This will create an executable with hard-coded security features so that &my-app; does not allow easy bypassing of blocked sites, or changing the @@ -2197,11 +2211,12 @@ altered it! Yikes, what is wrong! configuration, consider adding your list to your user.action file: - { +block } - www.ad.example1.com - ad.example2.com - ads.galore.example.com - etc.example.com +{ +block } +www.ad.example1.com +ad.example2.com +ads.galore.example.com +etc.example.com +