X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=doc%2Fsource%2Ffaq.sgml;h=9d82bfdba0cfd240c7c31c0042ad461f688b7648;hb=d222bd86302c36ac2b2058d6cfcc7bc6ed2a3a5b;hp=fe7091c992973efbfcdb4534263e09a30e40a8bd;hpb=c994f5ed4226f811aac2c279875aac2b017a8d2b;p=privoxy.git
diff --git a/doc/source/faq.sgml b/doc/source/faq.sgml
index fe7091c9..9d82bfdb 100644
--- a/doc/source/faq.sgml
+++ b/doc/source/faq.sgml
@@ -1,5 +1,5 @@
+
@@ -8,10 +8,10 @@
-
-
-
-
+
+
+
+
@@ -21,15 +21,11 @@
Privoxy">
]>
- Copyright &my-copy; 2001-2010 by
- Privoxy Developers
+ Copyright &my-copy; 2001-2018 by
+ Privoxy Developers
-$Id: faq.sgml,v 2.74 2010/11/13 10:07:46 fabiankeil Exp $
-
+-->
@@ -135,14 +129,11 @@ Hal.
Please note that this document is a work in progress. This copy represents
the state at the release of version &p-version;.
You can find the latest version of the document at http://www.privoxy.org/faq/.
+ url="https://www.privoxy.org/faq/">https://www.privoxy.org/faq/.
Please see the Contact section if you want to
- contact the developers.
+ contact the developers.
-
-
-
@@ -152,7 +143,7 @@ Hal.
General InformationWho should give &my-app; a try?
- Anyone who is interested in security, privacy, or in
+ Anyone who is interested in security, privacy, or in
finer-grained control over their web and Internet experience.
@@ -160,7 +151,7 @@ Hal.
Is Privoxy the best choice for
me?
- &my-app; is certainly a good choice, especially for those who want more
+ &my-app; is certainly a good choice, especially for those who want more
control and security. Those with the willingness to read the documentation
and the ability to fine-tune their installation will benefit the most.
@@ -170,19 +161,19 @@ me?
completely personalize your installation. Being familiar with, or at least
having an interest in learning about HTTP and other networking
- protocols, HTML, and
+ protocols, HTML, and
Regular
Expressions
- will be a big plus and will help you get the most out of &my-app;.
- A new installation just includes a very basic configuration. The user
- should take this as a starting point only, and enhance it as he or she
- sees fit. In fact, the user is encouraged, and expected to, fine-tune the
+ will be a big plus and will help you get the most out of &my-app;.
+ A new installation just includes a very basic configuration. The user
+ should take this as a starting point only, and enhance it as he or she
+ sees fit. In fact, the user is encouraged, and expected to, fine-tune the
configuration.
- Much of Privoxy's configuration can be done
+ Much of Privoxy's configuration can be done
with a Web browser.
- But there are areas where configuration is done using a
+ But there are areas where configuration is done using a
text editor
to edit configuration files. Also note that the web-based action editor
doesn't use authentication and should only be enabled in environments
@@ -220,13 +211,13 @@ Privoxy work?
Does Privoxy do anything more than ad blocking?
-
- Yes, ad blocking is but one possible use. There are many, many ways &my-app;
- can be used to sanitize and customize web browsing.
+
+ Yes, ad blocking is but one possible use. There are many, many ways &my-app;
+ can be used to sanitize and customize web browsing.
-What is this new version of
+What is this new version of
Junkbuster?
@@ -236,31 +227,30 @@ Privoxy work?
-
-Why Privoxy? Why change the name from
+
+Why Privoxy? Why change the name from
Junkbuster at all?
- Though outdated, Junkbusters Corporation
- continues to offer their original version of the Internet
- Junkbuster, so publishing our
- Junkbuster-derived software under the same name
- led to confusion.
+ Though outdated, Junkbusters Corporation continued to offer their original
+ version of the Internet Junkbuster for a while,
+ so publishing our Junkbuster-derived software
+ under the same name would have led to confusion.
- There are also potential legal complications from our use of the
- Junkbuster name, which is a registered trademark of
- Junkbusters Corporation.
- There are, however, no objections from Junkbusters Corporation to the
- Privoxy project itself, and they, in fact, still
- share our ideals and goals.
+ There were also potential legal reasons not to use the
+ Junkbuster name, as it was (and maybe still is)
+ a registered trademark of Junkbusters Corporation.
+ There were, however, no objections from Junkbusters Corporation to the
+ Privoxy project itself, and they, in fact,
+ shared our ideals and goals.
- The developers also believed that there are so many improvements over the original
- code, that it was time to make a clean break from the past and make
- a name in their own right.
+ The Privoxy developers also believed that there were so many improvements
+ over the original code, that it was time to make a clean break from the past
+ and make a name in their own right.
- Privoxy is the
+ Privoxy is the
Privacy Enhancing Proxy. Also, its content
modification and junk suppression gives you, the user, more
control, more freedom, and allows you to browse your personal and
@@ -269,11 +259,11 @@ Junkbuster at all?How does Privoxy differ
-from the old Junkbuster?
+from the old Junkbuster?
Privoxy picks up where
Junkbuster left off.
- The new Privoxy still blocks ads and banners,
+ Privoxy still blocks ads and banners,
still manages cookies, and still
helps protect your privacy. But, most of these features have been enhanced,
@@ -283,15 +273,14 @@ from the old Junkbuster?
Privoxy's new features include:
-
+
&newfeatures;
-How does Privoxy know what is
-an ad, and what is not?
+How does Privoxy know what is an ad, and what is not?Privoxy's approach to blocking ads is twofold:
@@ -302,7 +291,7 @@ an ad, and what is not?
and the host (blocking the big banner hosting services like doublecklick.net
already helps a lot). Privoxy takes advantage of this
fact by using URL
- patterns to sort out and block the requests for things that sound
+ patterns to sort out and block the requests for things that sound
like they would be ads or banners.
@@ -319,8 +308,8 @@ an ad, and what is not?
-
-Can Privoxy make mistakes?
+
+Can Privoxy make mistakes?
This does not sound very scientific.
Actually, it's a black art ;-) And yes, it is always possible to have a broad
@@ -339,20 +328,20 @@ This does not sound very scientific.
-
-Will I have to configure Privoxy
+
+Will I have to configure Privoxy
before I can use it?
That depends on your expectations.
The default installation should give you a good starting
point, and block most ads and unwanted content,
but many of the more advanced features are off by default, and require
- you to activate them.
+ you to activate them.
You do have to set up your browser to use
Privoxy (see the Installation section below).
+ linkend="firststep">Installation section below).
And you will certainly run into situations where there are false positives,
@@ -367,7 +356,7 @@ This does not sound very scientific.Can Privoxy run as a server on a network?
-
+
Yes, &my-app; runs as a server already, and can easily be configured to
serve more than one client. See
How can I set up Privoxy to act as a proxy for my LAN below.
@@ -384,8 +373,8 @@ Privoxy. Why should I use Privoxy at all?
your browser just can't.
- In addition, a proxy is good choice if you use multiple browsers, or
- have a LAN with multiple computers since &my-app; can run as a server
+ In addition, a proxy is good choice if you use multiple browsers, or
+ have a LAN with multiple computers since &my-app; can run as a server
application. This way all the configuration is in one place, and you don't
have to maintain a similar configuration for possibly many browsers or
users.
@@ -395,7 +384,7 @@ Privoxy. Why should I use Privoxy at all?
and Privoxy's privacy enhancing features
at the same time. While your browser probably lacks some features
&my-app; offers, it should also be able to do some things more
- reliable, for example restricting and suppressing JavaScript.
+ reliably, for example restricting and suppressing JavaScript.
@@ -404,8 +393,8 @@ Privoxy. Why should I use Privoxy at all?
The most important reason is because you have access to
everything, and you can control everything. You can
check every line of every configuration file yourself. You can check every
- last bit of source code should you desire. And even if you can't read code,
- there should be some comfort in knowing that other people can,
+ last bit of source code should you desire. And even if you can't read code,
+ there should be some comfort in knowing that other people can,
and do read it. You can build the software from scratch, if you want,
so that you know the executable is clean, and that it is
yours. In fact, we encourage this level of scrutiny. It
@@ -413,14 +402,14 @@ Privoxy. Why should I use Privoxy at all?
-Is there is a license or fee? What about a
+Is there is a license or fee? What about a
warranty? Registration?Privoxy is free software and licensed under the GNU General Public License (GPL) version 2.
It is free to use, copy, modify or distribute as you wish under the terms of this
license. Please see the Copyright section for more
- information on the license and copyright. Or the LICENSE file
+ information on the license and copyright. Or the LICENSE file
that should be included.
@@ -464,9 +453,9 @@ warranty? Registration?
-I would like to help you, what can I do?
+I would like to help you, what can I do?
-Would you like to participate?
+Would you like to participate?
Well, we always need help. There is something for
everybody who wants to help us. We welcome new developers, packagers,
@@ -480,14 +469,14 @@ warranty? Registration?
So first thing, subscribe to the Privoxy Users
- or the Privoxy
+ url="https://lists.privoxy.org/mailman/listinfo/privoxy-users">Privoxy Users
+ or the Privoxy
Developers mailing list, join the discussion, help out other users, provide general
feedback or report problems you noticed.
If you intend to help out with the trackers, you also might want to get an account on SourceForge.net
+ url="https://sourceforge.net/user/registration">get an account on SourceForge.net
so we don't confuse you with the other name-less users.
@@ -496,7 +485,7 @@ warranty? Registration?
While it is partly out of date, it's still worth reading.
- Our TODO list
+ Our TODO list
may be of interest to you as well.
Please let us know if you want to work on one of the items listed.
@@ -504,41 +493,108 @@ warranty? Registration?
Would you like to donate?
- Privoxy is developed by unpaid volunteers
- and thus our current running costs are pretty low. Nevertheless, we
- have plans that will cost money in the future. We would like to get
- this money through donations made by our users.
+ Donations are welcome. Our
+ TODO list
+ is rather long and being able to pay one (or more) developers to work on Privoxy
+ would make a huge difference, even if it was only for a couple of weeks. Donations may
+ also be used for Privoxy-related travel expenses (for example to attend conferences),
+ for hardware used for Privoxy development and for hosting expenses etc.
- Privoxy has therefore become an associated
- project of Software
- in the Public Interest (SPI), which allows us to receive tax-deductible
- donations in most western countries.
+ Privoxy is an associated
+ project of Software
+ in the Public Interest (SPI), which allows us to receive
+ tax-deductible donations in the United States.
+ You can donate via Paypal
+ and Click & Pledge.
+ For details, please have a look at
+ SPI's general donation page.
- We intend to use the donations to pay for our domain after transfering
- it to SPI. Our goal is to make sure there's no single point of failure
- and the bill gets paid and the site keeps running even if a some of
- the currently active developers were to suddenly disappear for a while.
+ You can also donate to Privoxy using a bank account or a "Paypal" address:
+
+
+ Name on account: Zwiebelfreunde e.V.
+ IBAN: DE95430609671126825604
+ BIC: GENODEM1GLS
+ Bank: GLS Bank
+
+
+ "Paypal" address: privoxy@zwiebelfreunde.de
+
+
+ Donations made through Zwiebelfreunde e.V. are tax-deductible in Germany
+ and other countries that recognize German charitable clubs. Feel free to
+ use the Subject field to provide a name to be credited and a list of TODO
+ list items you are interested in the most. For example: Max Mustermann: #16, #1, #14.
- We would also like to spend some money on more reliable hosting,
- on hardware to help make sure Privoxy
- keeps running on platforms the developers currently can't test on,
- and on technical books to educate our developers about said platforms
- or to improve their knowledge in general.
+ Note that donations made through Zwiebelfreunde e.V. currently can't be checked
+ automatically so you may not get credited right away. The credits currently
+ reflect donations received before 2016-01-14.
- If you enjoy our software and feel like helping out with a donation,
- please have a look at
- SPI's donation page
- to see what the options are.
+ If you have any questions regarding donations please mail to either the
+ public user mailing list or, if it's a private matter, to
+ Fabian Keil (Privoxy's SPI liaison)
+ directly.
+
+How can I become a sponsor and get my logo or link on privoxy.org?
+
+ We are currently offering the following sponsor levels as an experiment:
+
+
+
+ Gold (10000 EUR/year)
+
+
+ Logo shown at the bottom of the
+ Privoxy homepage.
+ Logo, link and self description on the
+ sponsor page.
+
+
+
+
+ Silver (1000 EUR/year)
+
+
+ Logo shown randomly at the bottom of the
+ Privoxy homepage.
+ Logo, link and self description on the
+ sponsor page.
+
+
+
+
+ Bronze (500 EUR/year)
+
+
+ Logo and link on the sponsor page.
+
+
+
+
+
+ The logo sizes depend on the sponsor level. Logos are served from
+ our server, no requests are made to the sponsor website unless
+ the links are being used.
+
+
+ The details may change over time but changes will only affect new sponsors
+ (or existing sponsors that explicitly agreed to the changes).
+
+
+ If you want to become a sponsor, please contact
+ Fabian Keil.
+ New sponsors are only accepted if no developer objects.
+
@@ -552,10 +608,10 @@ warranty? Registration?
Which browsers are supported by Privoxy?
- Any browser that can be configured to use a proxy, which
+ Any browser that can be configured to use a proxy, which
should be virtually all browsers, including
Firefox, Internet
- Explorer, Opera, and
+ Explorer, Opera, and
Safari among others.
Direct browser support is not an absolute requirement since
Privoxy runs as a separate application and talks
@@ -581,7 +637,7 @@ Include supported.sgml here:
dealing with some of the common abuses of HTML in email. See How can I configure Privoxy
with Outlook? below for more on
- this.
+ this.
Be aware that HTML email presents a number of unique security and privacy
@@ -592,11 +648,11 @@ Include supported.sgml here:
-I just installed Privoxy. Is there anything
+I just installed Privoxy. Is there anything
special I have to do now?
- All browsers should be told to use Privoxy
- as a proxy by specifying the correct proxy address and port number
+ All browsers should be told to use Privoxy
+ as a proxy by specifying the correct proxy address and port number
in the appropriate configuration area for the browser. It's possible
to combine &my-app; with a packet filter to intercept HTTP requests
even if the client isn't explicitly configured to use &my-app;,
- but where possible, configuring the client is recommended. See
+ but where possible, configuring the client is recommended. See
the User Manual for more
details. You should also flush your browser's memory and disk
- cache to get rid of any cached junk items, and remove any stored
+ cache to get rid of any cached junk items, and remove any stored
cookies.
-
@@ -636,7 +691,7 @@ special I have to do now?
If you set up the Privoxy to run on
the computer you browse from (rather than your ISP's server or some
- networked computer on a LAN), the proxy will be on 127.0.0.1
+ networked computer on a LAN), the proxy will be on 127.0.0.1
(sometimes referred to as localhost,
which is the special name used by every computer on the Internet to refer
to itself) and the port will be 8118 (unless you used the
When configuring your browser's proxy settings you typically enter
the word localhost or the IP address 127.0.0.1
in the boxes next to HTTP and Secure (HTTPS) and
- then the number 8118 for port.
+ then the number 8118 for port.
This tells your browser to send all web requests to Privoxy
instead of directly to the Internet.
- Privoxy can also be used to proxy for
- a Local Area Network. In this case, your would enter either the IP
- address of the LAN host where Privoxy
+ Privoxy can also be used to proxy for
+ a Local Area Network. In this case, your would enter either the IP
+ address of the LAN host where Privoxy
is running, or the equivalent hostname, e.g. 192.168.1.1.
Port assignment would be same as above. Note that
Privoxy doesn't listen on any LAN interfaces by
@@ -672,17 +727,17 @@ special I have to do now?
All the ads are there. What's wrong?
- Did you configure your browser to use Privoxy
+ Did you configure your browser to use Privoxy
as a proxy? It does not sound like it. See above. You might also try flushing
- the browser's caches to force a full re-reading of pages. You can verify
- that Privoxy is running, and your browser
- is correctly configured by entering the special URL:
- http://p.p/.
+ the browser's caches to force a full re-reading of pages. You can verify
+ that Privoxy is running, and your browser
+ is correctly configured by entering the special URL:
+ http://p.p/.
This should take you to a page titled This is Privoxy.. with
access to Privoxy's internal configuration.
- If you see this, then you are good to go. If you receive a page saying
+ If you see this, then you are good to go. If you receive a page saying
Privoxy is not running, then the browser is not set up to use
your Privoxy installation.
If you receive anything else (probably nothing at all), it could either
@@ -690,9 +745,9 @@ All the ads are there. What's wrong?
Privoxy is not running at all. Check the log file. For instructions
on starting Privoxy and browser configuration,
- see the chapter
+ see the chapter
on starting Privoxy in the
- User Manual.
+ User Manual.
@@ -705,9 +760,9 @@ Privoxy is running and being used.
First, make sure that Privoxy is really running and
being used by visiting http://p.p/. You
should see the Privoxy main page. If not, see
- the chapter
+ the chapter
on starting Privoxy in the
- User Manual.
+ User Manual.
@@ -721,7 +776,7 @@ Privoxy is running and being used.
The procedure for clearing the cache varies from browser to browser. For
- example, Mozilla/Netscape users would click
+ example, Mozilla/Netscape users would click
Edit --> Preferences -->
Advanced --> Cache and
then click both Clear Memory Cache
@@ -740,12 +795,12 @@ Privoxy is running and being used.
Configuration
-
-What exactly is an actions file?
+
+What exactly is an actions file?
&my-app; utilizes the concept of
- actions
+ actions
that are used to manipulate and control web page data.
Actions files
are where these actions
@@ -755,7 +810,7 @@ Privoxy is running and being used.
There is a wide array of actions available that give the user a high degree
of control and flexibility on how to process each and every web page.
-
+
Actions can be defined on a URL pattern basis, i.e.
@@ -771,7 +826,7 @@ Privoxy is running and being used.
-The actions concept confuses me. Please list
+The actions concept confuses me. Please list
some of these actions.
For a comprehensive discussion of the actions concept, please refer
@@ -785,9 +840,9 @@ some of these actions.
-
-How are actions files configured? What is the easiest
-way to do this?
+
+How are actions files configured? What is the easiest
+way to do this?
Actions files are just text files in a special syntax and can be edited
@@ -796,8 +851,8 @@ way to do this?
at http://config.privoxy.org/
(Shortcut: http://p.p/) and then select
View &
- change the current configuration from the menu. Note
- that this feature must be explicitly enabled in the main config file
+ change the current configuration from the menu. Note
+ that this feature must be explicitly enabled in the main config file
(see enable-edit-actions).
@@ -816,18 +871,18 @@ the differences?
Where can I get updated Actions Files?
- Based on your feedback and the continuing development, updates of
+ Based on your feedback and the continuing development, updates of
default.action will be
made available from time to time on the files section of
- our project page.
+ url="https://sourceforge.net/project/showfiles.php?group_id=11118">files section of
+ our project page.
If you wish to receive an email notification whenever we release updates of
Privoxy or the actions file, subscribe
- to our announce mailing list, ijbswa-announce@lists.sourceforge.net.
+ url="https://lists.privoxy.org/mailman/listinfo/privoxy-announce">subscribe
+ to our announce mailing list, privoxy-announce@lists.privoxy.org.
@@ -845,56 +900,62 @@ the differences?
Why is the configuration so complicated?
- Complicated is in the eye of the beholder. Those that are
- familiar with some of the underlying concepts, such as regular expression
- syntax, take to it like a fish takes to water. Also, software that tries
- hard to be user friendly, often lacks sophistication and
- flexibility. There is always that trade-off there between power vs.
- easy-of-use. Furthermore, anyone is welcome to contribute ideas and
- implementations to enhance &my-app;.
+ Complicated is in the eye of the beholder.
+
+
+ Privoxy is currently mainly written by and for people who are already
+ familiar with the underlying concepts like regular expressions, HTTP and HTML,
+ or are willing to become familiar with them to be able to get the most
+ out of a powerful and flexible tool such as Privoxy.
+
+
+ While everybody is expected to be able to get a Privoxy default installation
+ up and running, fine-tuning requires a certain amount of background
+ information and Privoxy's documentation mainly concentrates on the
+ Privoxy-specific parts while only providing references to the rest.
+
+
+ If you or anyone you know has the skills, time and energy to
+ reduce the barrier of entry, please get involved.
How can I make my Yahoo/Hotmail/Gmail account work?
The default configuration shouldn't impact the usability of any of these services.
- It may, however, make all cookies
+ It may, however, make all cookies
temporary, so that your browser will forget your
login credentials in between browser sessions. If you would like not to have to log
in manually each time you access those websites, simply turn off all cookie handling
for them in the user.action file. An example for yahoo might
look like:
- # Allow all cookies for Yahoo login:
#
{ -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only }
.login.yahoo.com
-
- These kinds of sites are often quite complex and heavy with
- Javascript and
- thus fragile. So if still a problem,
+ These kinds of sites are often quite complex and heavy with
+ Javascript and
+ thus fragile. So if still a problem,
we have an alias just for such
sticky situations:
- # Gmail is a _fragile_ site:
#
{ fragile }
# Gmail is ...
mail.google.com
-
Be sure to flush your browser's caches whenever making these kinds of
changes, just to make sure the changes take.
Make sure the domain, host and path are appropriate as well. Your browser can
- tell you where you are specifically and you should use that information for
- your configuration settings. Note that above it is not referenced as
+ tell you where you are specifically and you should use that information for
+ your configuration settings. Note that above it is not referenced as
gmail.com, which is a valid domain name.
@@ -908,7 +969,7 @@ the differences?
profiles in the web based actions file editor at http://config.privoxy.org/show-status.
See the User
- Manual for a list of actions, and how the default
+ Manual for a list of actions, and how the default
profiles are set.
@@ -916,23 +977,23 @@ the differences?
Where the defaults are likely to break some sites, exceptions for
known popular problem sites are included, but in
general, the more aggressive your default settings are, the more exceptions
- you will have to make later. New users are best to start off in
- Cautious setting. This is safest and will have the fewest
+ you will have to make later. New users are best to start off in
+ Cautious setting. This is safest and will have the fewest
problems. See the User Manual
for a more detailed discussion.
- It should be noted that the Advanced profile (formerly known
+ It should be noted that the Advanced profile (formerly known
as the Adventuresome profile) is more
- aggressive, and will make use of some of
+ aggressive, and will make use of some of
Privoxy's advanced features. Use at your own risk!
-Why can I change the configuration
+Why can I change the configuration
with a browser? Does that not raise security issues?
It may seem strange that regular users can edit the config files with their
@@ -948,7 +1009,7 @@ with a browser? Does that not raise security issues?
If you run Privoxy for multiple untrusted users (e.g. in
a LAN) or aren't entirely in control of your own browser, you will probably want
- to make sure that the the web-based editor and remote toggle features are
+ to make sure that the web-based editor and remote toggle features are
off by setting enable-edit-actions
0 and
-
-What is the default.filter file? What is a filter?
+
+What is the default.filter file? What is a filter?
The default.filter
file is where filters as supplied by the developers are defined.
@@ -990,21 +1051,21 @@ with a browser? Does that not raise security issues?
- If you are familiar with regular expressions, and HTML, you can look at
+ If you are familiar with regular expressions, and HTML, you can look at
the provided default.filter with a text editor and define
your own filters. This is potentially a very powerful feature, but
- requires some expertise in both regular expressions and HTML/HTTP.
- user.filter, so they won't
- be overwritten during upgrades.
- The ability to define multiple filter files
+ requires some expertise in both regular expressions and HTML/HTTP.
+ user.filter, so they won't
+ be overwritten during upgrades.
+ The ability to define multiple filter files
in config is a new feature as of v. 3.0.5.]]>
- There is no GUI editor option for this part of the configuration,
- but you can disable/enable the various pre-defined filters of the included
+ There is no GUI editor option for this part of the configuration,
+ but you can disable/enable the various pre-defined filters of the included
default.filter file with the web-based actions file editor.
Note that the custom actions editor must be explicitly enabled in
@@ -1015,16 +1076,16 @@ with a browser? Does that not raise security issues?
If you intend to develop your own filters, you might want to have a look at
Privoxy-Filter-Test.
+ url="https://www.fabiankeil.de/sourcecode/pft/">Privoxy-Filter-Test.
-How can I set up Privoxy to act as a proxy for my
+How can I set up Privoxy to act as a proxy for my
LAN?
- By default, Privoxy only responds to requests
+ By default, Privoxy only responds to requests
from 127.0.0.1 (localhost). To have it act as a server for
a network, this needs to be changed in the main configuration file. Look for
@@ -1037,31 +1098,27 @@ with a browser? Does that not raise security issues?
should look like:
-
listen-address 192.168.1.1:8118
-
- Save the file, and restart Privoxy. Configure
+ Save the file, and restart Privoxy. Configure
all browsers on the network then to use this address and port number.
- Alternately, you can have Privoxy listen on
+ Alternately, you can have Privoxy listen on
all available interfaces:
-
listen-address :8118
-
- And then use Privoxy's
+ And then use Privoxy'spermit-access
- feature to limit connections. A firewall in this situation is recommended
+ url="../user-manual/config.html#PERMIT-ACCESS">permit-access
+ feature to limit connections. A firewall in this situation is recommended
as well.
@@ -1080,8 +1137,8 @@ with a browser? Does that not raise security issues?
-
-Instead of ads, now I get a checkerboard pattern. I don't want to see anything.
+
+Instead of ads, now I get a checkerboard pattern. I don't want to see anything.
The replacement for blocked images can be controlled with the set-image-blocker
@@ -1096,30 +1153,30 @@ with a browser? Does that not raise security issues?
If you want to see nothing, then change the set-image-blocker
- action to blank. This can be done by editing the
+ action to blank. This can be done by editing the
user.action file, or through the web-based actions file editor.
-
-Why would anybody want to see a checkerboard pattern?
+
+Why would anybody want to see a checkerboard pattern?
Remember that telling which image is an ad and which
isn't, is an educated guess. While we hope that the standard configuration
is rather smart, it will make occasional mistakes. The checkerboard image is visually
decent, and it shows you where images have been blocked, which can be very
helpful in case some navigation aid or otherwise innocent image was
- erroneously blocked. It is recommended for new users so they can
+ erroneously blocked. It is recommended for new users so they can
see what is happening. Some people might also enjoy seeing how
many banners they don't have to see.
-
-I see some images being replaced with text
+
+I see some images being replaced with text
instead of the checkerboard image. Why and how do I get rid of this?
This happens when the banners are not embedded in the HTML code of the
@@ -1127,7 +1184,7 @@ instead of the checkerboard image. Why and how do I get rid of this?
or (i)layers, and these external HTML documents are blocked. Being non-images
they get replaced by a substitute HTML page rather than a substitute image,
which wouldn't work out technically, since the browser expects and accepts
- only HTML when it has requested an HTML document.
+ only HTML when it has requested an HTML document.
The substitute page adapts to the available space and shows itself as a
@@ -1146,19 +1203,19 @@ instead of the checkerboard image. Why and how do I get rid of this?
-Can Privoxy run as a service
+Can Privoxy run as a service
on Win2K/NT/XP?
Windows service
- functionality. See
- the User Manual for details on how to install and configure
+ functionality. See
+ the User Manual for details on how to install and configure
Privoxy as a service.
-
+
Earlier ]]>3.x versions could run as a system service using srvany.exe.
See the discussion at http://sourceforge.net/tracker/?func=detail&atid=361118&aid=485617&group_id=11118,
+ url="https://sourceforge.net/tracker/?func=detail&atid=361118&aid=485617&group_id=11118">https://sourceforge.net/tracker/?func=detail&atid=361118&aid=485617&group_id=11118,
for details, and a sample configuration.
@@ -1184,7 +1241,7 @@ on Win2K/NT/XP?
and thus avoid individual browser configuration?
- No, its more complicated than that. This only works with special kinds
+ No, its more complicated than that. This only works with special kinds
of proxies known as intercepting proxies
(see below).
@@ -1215,7 +1272,7 @@ and thus avoid individual browser configuration?
but it can handle requests that where intercepted and redirected
with a packet filter (like PF or
iptables), as long as the Host
- header is present.
+ header is present.
As the Host header is required by HTTP/1.1 and as most
@@ -1256,15 +1313,15 @@ and thus avoid individual browser configuration?
of knowing which particular application makes a request, so there is no way to
distinguish between web pages and HTML mail.
Privoxy just blindly proxies all requests. In the
- case of Outlook Express (see above), OE uses
- IE anyway, and there is no way for Privoxy to ever
+ case of Outlook Express (see above), OE uses
+ IE anyway, and there is no way for Privoxy to ever
be able to distinguish between them (nor could any other proxy type application for
that matter).
- For a good discussion of some of the issues involved (including privacy and
- security issues), see
- http://sourceforge.net/tracker/?func=detail&atid=211118&aid=629518&group_id=11118.
+ For a good discussion of some of the issues involved (including privacy and
+ security issues), see
+ https://sourceforge.net/tracker/?func=detail&atid=211118&aid=629518&group_id=11118.
@@ -1272,12 +1329,12 @@ and thus avoid individual browser configuration?
I sometimes notice cookies sneaking through. How?Cookies can be
- set in several ways. The classic method is via the
+ url="http://en.wikipedia.org/wiki/Browser_cookie">Cookies can be
+ set in several ways. The classic method is via the
Set-Cookie HTTP header. This is straightforward, and an
- easy one to manipulate, such as the &my-app; concept of
+ easy one to manipulate, such as the &my-app; concept of
session-cookies-only.
- There is also the possibility of using
+ There is also the possibility of using
Javascript to
set cookies (&my-app; calls these content-cookies). This
is trickier because the syntax can vary widely, and thus requires a certain
@@ -1296,20 +1353,20 @@ and thus avoid individual browser configuration?
Are all cookies bad? Why?
- No, in fact there are many beneficial uses of
+ No, in fact there are many beneficial uses of
cookies. Cookies are just a
method that browsers can use to store data between pages, or between browser
sessions. Sometimes there is a good reason for this, and the user's life is a
bit easier as a result. But there is a long history of some websites taking
- advantage of this layer of trust, and using the data they glean from you and
+ advantage of this layer of trust, and using the data they glean from you and
your browsing habits for their own purposes, and maybe to your potential
detriment. Such sites are using you and storing their data on your system.
That is why the privacy conscious watch from whom those cookies come, and why
they really need to be there.
- See the
+ See the
Wikipedia cookie
definition for more.
@@ -1319,20 +1376,18 @@ and thus avoid individual browser configuration?
How can I allow permanent cookies for my trusted sites?
- There are several actions that relate to cookies. The default behavior is to
+ There are several actions that relate to cookies. The default behavior is to
allow only session cookies, which means the cookies only last
- for the current browser session. This eliminates most kinds of abuse related
+ for the current browser session. This eliminates most kinds of abuse related
to cookies. But there may be cases where you want cookies to last.
To disable all cookie actions, so that cookies are allowed unrestricted,
- both in and out, for example.com:
+ both in and out, for example.com:
-
{ -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only -filter{content-cookies} }
.example.com
-
Place the above in user.action. Note that some of these may
be off by default anyway, so this might be redundant, but there is no harm
@@ -1347,14 +1402,14 @@ and thus avoid individual browser configuration?
Each instance of Privoxy has its own
configuration, including such attributes as the TCP port that it listens on.
- What you can do is run multiple instances of Privoxy, each with
- a unique
+ What you can do is run multiple instances of Privoxy, each with
+ a unique
listen-address
configuration setting, and configuration path, and then
each of these can have their own configurations. Think of it as per-port
configuration.
-
+
Simple enough for a few users, but for large installations, consider having
groups of users that might share like configurations.
@@ -1373,7 +1428,7 @@ and thus avoid individual browser configuration?
############################################################
{ +block }
/ # Block *all* URLs
-
+
############################################################
# Whitelist
############################################################
@@ -1382,12 +1437,12 @@ and thus avoid individual browser configuration?
toys.example.com
games.example.com
- This allows access to only those three sites by first blocking all URLs, and
+ This allows access to only those three sites by first blocking all URLs, and
then subsequently allowing three specific exceptions.
- Another approach is Privoxy's
- trustfile concept, which incorporates the notion of
+ Another approach is Privoxy's
+ trustfile concept, which incorporates the notion of
trusted referrers. See the Trust documentation
for details.
@@ -1404,14 +1459,14 @@ and thus avoid individual browser configuration?
How can I turn off ad-blocking?
- Ad blocking is achieved through a complex application of various &my-app;
- actions. These
- actions are deployed against simple images, banners, flash animations,
+ Ad blocking is achieved through a complex application of various &my-app;
+ actions. These
+ actions are deployed against simple images, banners, flash animations,
text pages, JavaScript, pop-ups and pop-unders, etc., so its not as simple as
just turning one or two actions off. The various actions that make up
&my-app; ad blocking are hard-coded into the default configuration files. It
has been assumed that everyone using &my-app; is interested in this
- particular feature.
+ particular feature.
If you want to do without this, there are several approaches you can take:
@@ -1421,18 +1476,15 @@ and thus avoid individual browser configuration?
blocking rules, and corresponding exceptions. Or lastly, if you are not
concerned about the additional blocks that are done for privacy reasons, you
can very easily over-ride all blocking with the
- following very simple rule in your user.action:
+ following very simple rule in your user.action:
-
# Unblock everybody, everywhere
{ -block }
/ # UN-Block *all* URLs
-
-
+
Or even a more comprehensive reversing of various ad related actions:
-
# Unblock everybody, everywhere, and turn off appropriate filtering, etc
{ -block \
@@ -1441,7 +1493,6 @@ and thus avoid individual browser configuration?
allow-popups \
}
/ # UN-Block *all* URLs and allow ads
-
This last action in this compound statement,
allow-popups, is an
-How can I have custom template pages, like the
+How can I have custom template pages, like the
BLOCKED page?
&my-app; templates are specialized text files utilized by
@@ -1465,12 +1516,12 @@ and thus avoid individual browser configuration?
during upgrades. You can, however, create completely new templates,
place them in another directory and specify the alternate path in the main
config. For details, have a look at the templdir option.
+ url="../user-manual/config.html#TEMPLDIR">templdir option.
-How can I remove the Go There Anyway link from
+How can I remove the Go There Anyway link from
the BLOCKED page?
There is more than one way to do it (although Perl is not involved).
@@ -1479,13 +1530,11 @@ the BLOCKED page?
Editing the BLOCKED template page (see above) may dissuade some users, but
this method is easily circumvented. Where you need this level of control, you
might want to build &my-app; from source, and disable various features that are
- available as compile-time options. You should
+ available as compile-time options. You should
configure the sources as follows:
-
./configure --disable-toggle --disable-editor --disable-force
-
This will create an executable with hard-coded security features so that
&my-app; does not allow easy bypassing of blocked sites, or changing the
@@ -1508,16 +1557,16 @@ the BLOCKED page?
Miscellaneous
-
-How much does Privoxy slow my browsing down? This
+
+How much does Privoxy slow my browsing down? This
has to add extra time to browsing.
How much of an impact depends on many things, including the CPU of the host
- system, how aggressive the configuration is, which specific actions are being triggered,
+ system, how aggressive the configuration is, which specific actions are being triggered,
the size of the page, the bandwidth of the connection, etc.
- Overall, it should not slow you down any in real terms, and may actually help
+ Overall, it should not slow you down any in real terms, and may actually help
speed things up since ads, banners and other junk are not typically being
retrieved and displayed. The actual processing time required by
Privoxy itself for each page, is relatively small
@@ -1555,7 +1604,7 @@ delays in page requests. What's wrong?
url="../user-manual/actions-file.html#FILTER">filter action,
such as filtering banners by size, web-bugs etc, or the deanimate-gifs
- action, the entire document must be loaded into memory in order for the filtering
+ action, the entire document must be loaded into memory in order for the filtering
mechanism to work, and nothing is sent to the browser during this time.
@@ -1569,7 +1618,7 @@ delays in page requests. What's wrong?
anti-virus software).
- Filtering is automatically disabled for inappropriate MIME types. But note
+ Filtering is automatically disabled for inappropriate MIME types. But note
that if the web server mis-reports the MIME type, then content that should
not be filtered, could be. Privoxy only knows how
to differentiate filterable content because of the MIME type as reported by
@@ -1582,11 +1631,11 @@ delays in page requests. What's wrong?
"http://p.p/"?
http://config.privoxy.org/ is the
- address of Privoxy's built-in user interface, and
+ address of Privoxy's built-in user interface, and
http://p.p/ is a shortcut for it.
- Since Privoxy sits between your web browser and the Internet,
+ Since Privoxy sits between your web browser and the Internet,
it can simply intercept requests for these addresses and answer them with its built-in
web server.
@@ -1599,6 +1648,13 @@ delays in page requests. What's wrong?
hence it could not be intercepted, and you have accessed the real
web site at config.privoxy.org.
+
+ Note that config.privoxy.org resolves to a public IP address.
+ If you use config.privoxy.org as ping or traceroute target you will
+ reach the system on the Internet (Privoxy can't intercept ICMP requests).
+ If you want to ping the system Privoxy runs on,
+ you should use its IP address or local DNS name (if it has got one).
+
@@ -1607,7 +1663,7 @@ delays in page requests. What's wrong?
Do you still maintain the blocklists?
No. The patterns for blocking now reside (among other things) in the actions files, which are
+ url="../user-manual/actions-file.html">actions files, which are
actively maintained instead. See next question ...
@@ -1621,25 +1677,25 @@ various ways to interact with the developers.
-If I do submit missed ads, will
+If I do submit missed ads, will
they be included in future updates?
Whether such submissions are eventually included in the
- default.action configuration file depends on how
- significant the issue is. We of course want to address any potential
- problem with major, high-profile sites such as Google,
- Yahoo, etc. Any site with global or regional reach,
+ default.action configuration file depends on how
+ significant the issue is. We of course want to address any potential
+ problem with major, high-profile sites such as Google,
+ Yahoo, etc. Any site with global or regional reach,
has a good chance of being a candidate. But at the other end of the spectrum
are any number of smaller, low-profile sites such as for local clubs or
schools. Since their reach and impact are much less, they are best handled by
inclusion in the user's user.action, and thus would be
- unlikely to be included.
+ unlikely to be included.
-Why doesn't anyone answer my support
+Why doesn't anyone answer my support
request?
Rest assured that it has been read and considered. Why it is not answered,
@@ -1657,7 +1713,7 @@ us help you. Your efforts are not wasted, and we do appreciate them.
If you run both the browser and &my-app; locally, you cannot hide your IP
address with Privoxy or ultimately any other
software alone. The server needs to know your IP address so that it knows
- where to send the responses back.
+ where to send the responses back.
There are many publicly usable "anonymous" proxies out there, which
@@ -1682,8 +1738,8 @@ us help you. Your efforts are not wasted, and we do appreciate them.
-
-Can Privoxy guarantee I am anonymous?
+
+Can Privoxy guarantee I am anonymous?
No. Your chances of remaining anonymous are improved, but unless you
chain Privoxy with Tor
@@ -1693,8 +1749,8 @@ us help you. Your efforts are not wasted, and we do appreciate them.
Privoxy can remove various information about you,
- and allows you more freedom to decide which sites
- you can trust, and what details you want to reveal. But it neither
+ and allows you more freedom to decide which sites
+ you can trust, and what details you want to reveal. But it neither
hides your IP address, nor can it guarantee that the rest of the system
behaves correctly. There are several possibilities how a web sites can find
out who you are, even if you are using a strict Privoxy
@@ -1726,8 +1782,8 @@ us help you. Your efforts are not wasted, and we do appreciate them.
-
-A test site says I am not using a Proxy.
+
+A test site says I am not using a Proxy.
Good! Actually, they are probably testing for some other kinds of proxies.
Hiding yourself completely would require additional steps.
@@ -1744,7 +1800,7 @@ us help you. Your efforts are not wasted, and we do appreciate them.
5. Startup to make sure
Privoxy itself is setup correctly.
-
+
If it is, refer to Tor's
extensive documentation to learn how to install Tor,
and make sure Tor's logfile says that
@@ -1763,16 +1819,15 @@ us help you. Your efforts are not wasted, and we do appreciate them.
If you verified that Privoxy and Tor
are working, it is time to connect them. As far as Privoxy
is concerned, Tor is just another proxy that can be reached
- by socks4 or socks4a. Most likely you are interested in Tor
+ by socks4, socks4a and socks5. Most likely you are interested in Tor
to increase your anonymity level, therefore you should use socks5, to make sure DNS
requests are done through Tor and thus invisible to your
local network. Using socks4a would work too, but with socks5 you get more precise error
messages.
-
- Since Privoxy 3.0.5, its
+ Privoxy'smain configuration file
is already prepared for Tor, if you are using a
default Tor configuration and run it on the same
@@ -1780,23 +1835,26 @@ us help you. Your efforts are not wasted, and we do appreciate them.
forwarding section
and uncomment the line:
-
-# forward-socks5 / 127.0.0.1:9050 .
-
+# forward-socks5t / 127.0.0.1:9050 .
+
+
+ Note that if you got Tor through one of the bundles, you may
+ have to change the port from 9050 to 9150 (or even another one).
+ For details, please check the documentation on the
+ Tor website.
+
This is enough to reach the Internet, but additionally you might want to
uncomment the following forward rules, to make sure your local network is still
reachable through Privoxy:
-
# forward 192.168.*.*/ .
# forward 10.*.*.*/ .
# forward 127.*.*.*/ .
-
-
+
Unencrypted connections to systems in these address ranges will
be as (un)secure as the local network is, but the alternative is
@@ -1810,14 +1868,12 @@ us help you. Your efforts are not wasted, and we do appreciate them.
network by using their names, you will need additional exceptions
that look like this:
-
# forward localhost/ .
-
-
+
Save the modified configuration file and open
- http://config.privoxy.org/show-status/
+ http://config.privoxy.org/show-status
in your browser, confirm that Privoxy has reloaded its configuration
and that there are no other forward lines, unless you know that you need them. If everything looks good,
refer to
@@ -1830,15 +1886,15 @@ us help you. Your efforts are not wasted, and we do appreciate them.
what Tor does, why it is no replacement for
application level security, and why you probably don't want to
use it for unencrypted logins.
- ]]>
+
-
-Might some things break because header information or
+
+Might some things break because header information or
content is being altered?
- Definitely. It is common for sites to use browser type, browser version,
+ Definitely. It is common for sites to use browser type, browser version,
HTTP header content, and various other techniques in order to dynamically
decide what to display and how to display it. What you see, and what I see,
might be very different. There are many, many ways that this can be handled,
@@ -1864,8 +1920,8 @@ content is being altered?
many other ways things can go wrong when trying to fool a web server. The
results of which could inadvertently cause pages to load incorrectly,
partially, or even not at all. And there may be no obvious clues as to just
- what went wrong, or why. Nowhere will there be a message that says
- Turn off fast-redirects or else!
+ what went wrong, or why. Nowhere will there be a message that says
+ Turn off fast-redirects or else!
@@ -1875,22 +1931,22 @@ content is being altered?
- If you have problems with a site, you will have to adjust your configuration
- accordingly. Cookies are probably the most likely adjustment that may
+ If you have problems with a site, you will have to adjust your configuration
+ accordingly. Cookies are probably the most likely adjustment that may
be required, but by no means the only one.
-
-Can Privoxy act as a caching proxy to
+
+Can Privoxy act as a caching proxy to
speed up web browsing?
- No, it does not have this ability at all. You want something like
+ No, it does not have this ability at all. You want something like
Squid or
Polipo for this.
- And, yes, before you ask, Privoxy can co-exist
+ And, yes, before you ask, Privoxy can co-exist
with other kinds of proxies like Squid.
See the forwarding
chapter in the user
@@ -1898,25 +1954,25 @@ speed up web browsing?
-
-What about as a firewall? Can Privoxy protect me?
+
+What about as a firewall? Can Privoxy protect me?
- Not in the way you mean, or in the way some firewall vendors claim they can.
+ Not in the way you mean, or in the way some firewall vendors claim they can.
Privoxy can help protect your privacy, but can't
protect your system from intrusion attempts. It is, of course, perfectly possible
to use both.
-
-I have large empty spaces / a checkerboard pattern now where
+
+I have large empty spaces / a checkerboard pattern now where
ads used to be. Why?
It is technically possible to eliminate banners and ads in a way that frees
- their allocated page space. This could easily be done by blocking with
+ their allocated page space. This could easily be done by blocking with
Privoxy's filters,
and eliminating the entire image references from the
- HTML page source.
+ HTML page source.
But, this would consume considerably more CPU resources (IOW, slow things
@@ -1937,8 +1993,8 @@ ads used to be. Why?
-
-How can Privoxy filter Secure (HTTPS) URLs?
+
+How can Privoxy filter Secure (HTTPS) URLs?
Since secure HTTP connections are encrypted SSL sessions between your browser
and the secure site, and are meant to be reliably secure,
@@ -1955,35 +2011,49 @@ ads used to be. Why?
As far as ad blocking is concerned, this is less of a restriction than it may
seem, since ad sources are often identifiable by the host name, and often
the banners to be placed in an encrypted page come unencrypted nonetheless
- for efficiency reasons, which exposes them to the full power of
+ for efficiency reasons, which exposes them to the full power of
Privoxy's ad blocking.
Content cookies (those that are embedded in the actual HTML or
JS page content, see filter{content-cookies}),
- in an SSL transaction will be impossible to block under these conditions.
- Fortunately, this does not seem to be a very common scenario since most
+ url="../user-manual/actions-file.html#FILTER-CONTENT-COOKIES">filter{content-cookies}),
+ in an SSL transaction will be impossible to block under these conditions.
+ Fortunately, this does not seem to be a very common scenario since most
cookies come by traditional means.
-
-Privoxy runs as a server. How
+
+Does Privoxy support HTTP/2?
+
+ Privoxy currently doesn't parse HTTP/2 but applications
+ can tunnel HTTP/2 through Privoxy if Privoxy is configured
+ to allow CONNECT requests (default) which are also used
+ for HTTPS.
+
+
+ Adding HTTP/2 support is on the TODO list but currently
+ nobody is known to work on it.
+
+
+
+
+Privoxy runs as a server. How
secure is it? Do I need to take any special precautions?
- On Unix-like systems, Privoxy can run as a non-privileged
+ On Unix-like systems, Privoxy can run as a non-privileged
user, which is how we recommend it be run. Also, by default
Privoxy listens to requests from localhost
only.
- The server aspect of Privoxy is not itself directly
+ The server aspect of Privoxy is not itself directly
exposed to the Internet in this configuration. If you want to have
Privoxy serve as a LAN proxy, this will have to
be opened up to allow for LAN requests. In this case, we'd recommend
- you specify only the LAN gateway address, e.g. 192.168.1.1, in the main
+ you specify only the LAN gateway address, e.g. 192.168.1.1, in the main
Privoxy configuration file and check all access control and security
options. All LAN hosts can then use this as their proxy address
@@ -2006,23 +2076,23 @@ secure is it? Do I need to take any special precautions?
url="http://config.privoxy.org/toggle">http://config.privoxy.org/toggle.
- See the Bookmarklets section
- of the User Manual for an easy way to access this
- feature. Note that this is a feature that may need to be enabled in the main
+ See the Bookmarklets section
+ of the User Manual for an easy way to access this
+ feature. Note that this is a feature that may need to be enabled in the main
config file.
-When disabled is Privoxy totally
+When disabled is Privoxy totally
out of the picture?
No, this just means all optional filtering and actions are disabled.
- Privoxy is still acting as a proxy, but just
+ Privoxy is still acting as a proxy, but just
doing less of the things that Privoxy would
- normally be expected to do. It is still a middle-man in
- the interaction between your browser and web sites. See below to bypass
+ normally be expected to do. It is still a middle-man in
+ the interaction between your browser and web sites. See below to bypass
the proxy.
@@ -2038,10 +2108,10 @@ out of the picture?
-My logs show Privoxy crunches
+My logs show Privoxy crunches
ads, but also its own internal CGI pages. What is a crunch?
- A crunch simply means Privoxy intercepted
+ A crunch means Privoxy intercepted
something, nothing more. Often this is indeed ads or
banners, but Privoxy uses the same mechanism for
trapping requests for its own internal pages. For instance, a request for
@@ -2058,14 +2128,14 @@ ads, but also its own internal CGI pages. What is a crunch?
-Can Privoxy effect files that I download
+Can Privoxy affect files that I download
from a webserver? FTP server?
From the webserver's perspective, there is no difference between
viewing a document (i.e. a page), and downloading a file. The same is true of
Privoxy. If there is a match for a block pattern,
- it will still be blocked, and of course this is obvious.
+ it will still be blocked, and of course this is obvious.
Filtering is potentially more of a concern since the results are not always
@@ -2092,7 +2162,7 @@ from a webserver? FTP server?
altered by filtering, will be saved too, for these (probably rare) cases.
- Note that versions later than 3.0.2 do NOT filter document types reported as
+ Note that versions later than 3.0.2 do NOT filter document types reported as
text/plain. Prior to this, Privoxy
did filter this document type.
@@ -2114,7 +2184,7 @@ from a webserver? FTP server?
all to the content is to be avoided.
- Privoxy does not do FTP at all, only HTTP
+ Privoxy does not do FTP at all, only HTTP
and HTTPS (SSL) protocols.
@@ -2131,28 +2201,26 @@ altered it! Yikes, what is wrong!
Should I continue to use a HOSTS file for ad-blocking?
One time-tested technique to defeat common ads is to trick the local DNS
- system by giving a phony IP address for the ad generator in the local
- HOSTS file, typically using 127.0.0.1, aka
+ system by giving a phony IP address for the ad generator in the local
+ HOSTS file, typically using 127.0.0.1, aka
localhost. This effectively blocks the ad.
- There is no reason to use this technique in conjunction with
+ There is no reason to use this technique in conjunction with
Privoxy. Privoxy
- does essentially the same thing, much more elegantly and with much more
+ does essentially the same thing, much more elegantly and with much more
flexibility. A large HOSTS file, in fact, not only
duplicates effort, but may get in the way and seriously slow down your system.
- It is recommended to remove such entries from your HOSTS file. If you think
- your hosts list is neglected by Privoxy's
+ It is recommended to remove such entries from your HOSTS file. If you think
+ your hosts list is neglected by Privoxy's
configuration, consider adding your list to your user.action file:
-
{ +block }
www.ad.example1.com
ad.example2.com
ads.galore.example.com
etc.example.com
-
@@ -2164,15 +2232,15 @@ and related issues?
-I've noticed that Privoxy changes Microsoft to
+I've noticed that Privoxy changes Microsoft to
MicroSuck! Why are you manipulating my browsing?
@@ -2193,7 +2261,7 @@ and related issues?
Privoxy generates HTML in both its own templates, and possibly
whenever there are text substitutions via a &my-app; filter. While this
should always conform to the HTML 4.01 specifications, it has not been
- validated against this or any other standard.
+ validated against this or any other standard.
@@ -2211,11 +2279,11 @@ and related issues?
Lately there have been reports of problems with some kind of
- Privoxy versions that come preinstalled on some Netbooks.
- Some of the problems described are inconsistent with the behaviour
- of official Privoxy versions, which suggests that the preinstalled
- software may contain vendor modifications that we don't know about
- and thus can't debug.
+ "parental control" software based on Privoxy that came preinstalled on
+ certain ASUS Netbooks.
+ The problems described are inconsistent with the behaviour of official
+ Privoxy versions, which suggests that the preinstalled software may
+ contain vendor modifications that we don't know about and thus can't debug.
Privoxy's license allows vendor
@@ -2242,16 +2310,15 @@ and related issues?
Troubleshooting
-
-I cannot connect to any websites. Or, I am getting
+
+I cannot connect to any websites. Or, I am getting
connection refused message with every web page. Why?
There are several possibilities:
-
-Privoxy is not running. Solution: verify
+Privoxy is not running. Solution: verify
that &my-app; is installed correctly, has not crashed, and is indeed running.
Turn on Privoxy's logging, and look at the logs to see what they say.
@@ -2264,11 +2331,10 @@ and related issues?
configuration and take the forwarders out of the equation.
- Or you have a firewall that is interfering and blocking you. Solution:
+ Or you have a firewall that is interfering and blocking you. Solution:
try disabling or removing the firewall as a simple test.
-
@@ -2284,8 +2350,8 @@ and related issues?
-
-I just added a new rule, but the steenkin ad is
+
+I just added a new rule, but the steenkin ad is
still getting through. How?
If the ad had been displayed before you added its URL, it will probably be
@@ -2299,16 +2365,16 @@ still getting through. How?
applied. Try pasting the full URL of the offending ad into http://config.privoxy.org/show-url-info
and see if it really matches your new rule. Blocking ads is like blocking
- spam: a lot of tinkering is required to stay ahead of the game. And
- remember you need to block the URL of the ad in question, which may be
+ spam: a lot of tinkering is required to stay ahead of the game. And
+ remember you need to block the URL of the ad in question, which may be
entirely different from the site URL itself. Most ads are hosted on different
servers than the main site itself. If you right-click on the ad, you should
- be able to get all the relevant information you need. Alternately, you can
+ be able to get all the relevant information you need. Alternately, you can
find the correct URL by looking at Privoxy's logs
(you may need to enable logging in the main config file if its disabled).
- Below is a slightly modified real-life log snippet that originates with one
+ Below is a slightly modified real-life log snippet that originates with one
requested URL: www.example.com (name of site was changed
for this example, the number of requests is real). You can see in this the
complexity of what goes into making up this one page. There
@@ -2318,10 +2384,9 @@ still getting through. How?
content is obviously good or bad, but not all.
Many of the more questionable looking requests, are going to outside domains
that seem to be identifying themselves with suspicious looking names, making
- our job a little easier. &my-app; has crunched (meaning caught
- and BLOCKED) quite a few items in this example, but perhaps missed a few as well.
+ our job a little easier. &my-app; has crunched (meaning caught
+ and BLOCKED) quite a few items in this example, but perhaps missed a few as well.
-
-
Despite 12 out of 32 requests being blocked, the page looked, and seemed to
behave perfectly normal (minus some ads, of course).
@@ -2367,12 +2431,12 @@ Request: 66.70.21.80/scripts/click.php?hid=a71b9f6504b0c5681fa5&si=Ua
-
-One of my favorite sites does not work with Privoxy.
+
+One of my favorite sites does not work with Privoxy.
What can I do?
- First verify that it is indeed a Privoxy problem,
+ First verify that it is indeed a Privoxy problem,
by toggling off Privoxy through http://config.privoxy.org/toggle
(the toggle feature may need to be enabled in the main
@@ -2408,13 +2472,13 @@ What can I do?
on again. Remember to flush your browser's caches in between any such changes!
- Alternately, if you are comfortable with a text editor, you can accomplish
- the same thing by editing the appropriate actions file. Probably the easiest
+ Alternately, if you are comfortable with a text editor, you can accomplish
+ the same thing by editing the appropriate actions file. Probably the easiest
way to deal with such problems when editing by hand is to add your
site to a { fragile } section in user.action,
which is an alias that turns off most dangerous
actions, but is also likely to turn off more actions then needed, and thus lower
- your privacy and protection more than necessary,
+ your privacy and protection more than necessary,
Troubleshooting actions is discussed in more detail in the
with general configuration information and examples.
- As a last resort, you can always see if your browser has a setting that will
+ As a last resort, you can always see if your browser has a setting that will
bypass the proxy setting for selective sites. Modern browsers can do this.
@@ -2438,7 +2502,7 @@ What can I do?
every time I start IE. What gives?
- This is a quirk that effects the installation of
+ This is a quirk that affects the installation of
Privoxy, in conjunction with Internet Explorer and
Internet Connection Sharing on Windows 2000 and Windows XP. The symptoms may
appear to be corrupted or invalid DUN settings, or passwords.
@@ -2472,7 +2536,7 @@ every time I start IE. What gives?
set-up DUN connection and each LAN connection in IE store the settings for
each user individually. As such this enforces individual configurations
rather than common ones. Hence the first time you use a DUN connection after
- re-booting your system it may not perform as you expect, and prompt you for
+ re-booting your system it may not perform as you expect, and prompt you for
the password. Just set and save the password again and all should be OK.
@@ -2487,16 +2551,16 @@ every time I start IE. What gives?
I cannot connect to any FTP sites. Privoxy
is blocking me.
- Privoxy cannot act as a proxy for FTP traffic,
+ Privoxy cannot act as a proxy for FTP traffic,
so do not configure your browser to use Privoxy
as an FTP proxy. The same is true for any protocol other than HTTP
- or HTTPS (SSL).
+ or HTTPS (SSL).
Most browsers understand FTP as well as HTTP. If you connect to a site, with
a URL like ftp://ftp.example.com, your browser is making
- an FTP connection, and not a HTTP connection. So while your browser may
- speak FTP, Privoxy does not, and cannot proxy
+ an FTP connection, and not a HTTP connection. So while your browser may
+ speak FTP, Privoxy does not, and cannot proxy
such traffic.
@@ -2506,7 +2570,7 @@ every time I start IE. What gives?
accidentally enable FTP proxying in these cases. And of course, if this
happens, Privoxy will indeed cause problems since
it does not know FTP. Just disable the FTP setting
+ message if a FTP connection is attempted.]]> Just disable the FTP setting
and all will be well again.
@@ -2518,14 +2582,14 @@ every time I start IE. What gives?
-In Mac OS X, I can't configure Microsoft Internet Explorer to use
+In Mac OS X, I can't configure Microsoft Internet Explorer to use
Privoxy as the HTTP proxy.
Microsoft Internet Explorer (in versions like 5.1) respects system-wide
network settings. In order to change the HTTP proxy, open System
Preferences, and click on the Network icon. In the settings pane that
- comes up, click on the Proxies tab. Ensure the "Web Proxy (HTTP)" checkbox
- is checked and enter 127.0.0.1 in the entry field.
+ comes up, click on the Proxies tab. Ensure the "Web Proxy (HTTP)" checkbox
+ is checked and enter 127.0.0.1 in the entry field.
Enter 8118 in the Port field. The next time you start
IE, it should reflect these values.
@@ -2533,12 +2597,12 @@ every time I start IE. What gives?
-In Mac OS X, I dragged the Privoxy folder to the trash in order to
+In Mac OS X, I dragged the Privoxy folder to the trash in order to
uninstall it. Now the finder tells me I don't have sufficient privileges to
empty the trash.
Note: This ONLY applies to privoxy 3.0.6 and earlier.
-
+
Just dragging the Privoxy folder to the trash is
not enough to delete it. Privoxy supplies an
@@ -2546,14 +2610,13 @@ every time I start IE. What gives?
these details. Open the trash, drag the uninstall.command
file out of the trash and double-click on it. You will be prompted for
confirmation and the administration password.
-
+
- The trash may still appear full after this command; emptying the trash
+ The trash may still appear full after this command; emptying the trash
from the desktop should make it appear empty again.
-
In Mac OS X Panther (10.3), images often fail to load and/or I
@@ -2561,40 +2624,27 @@ every time I start IE. What gives?localhost as my browser's proxy setting.
We believe this is due to an IPv6-related bug in Mac OS X, but don't fully
- understand the issue yet. In any case, changing the proxy setting to
+ understand the issue yet. In any case, changing the proxy setting to
127.0.0.1 instead of localhost
works around the problem.
-
-
-I get a completely blank page at one site. View Source
- shows only: