X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=doc%2Fwebserver%2Ffaq%2Fgeneral.html;h=f0295d86e8969128e2efda8aaadc680b5878be59;hb=4985684a0376e6a84c5f542c7324617259092575;hp=cd569be6152794942e85c14c72a91a9e507eb2d8;hpb=3aa1c67aae42ef3efaecafc88e9eb717d555f368;p=privoxy.git diff --git a/doc/webserver/faq/general.html b/doc/webserver/faq/general.html index cd569be6..f0295d86 100644 --- a/doc/webserver/faq/general.html +++ b/doc/webserver/faq/general.html @@ -39,28 +39,28 @@ installation will benefit the most.

One of Privoxy's strengths is that it is highly configurable giving you the ability to completely personalize your installation. Being familiar with, or at least having an interest in - learning about HTTP and other networking protocols, - HTML, and "Regular + learning about HTTP and other networking + protocols, HTML, and "Regular Expressions" will be a big plus and will help you get the most out of Privoxy. A new installation just includes a very basic configuration. The user should take this as a starting point only, and enhance it as he or she sees fit. In fact, the user is encouraged, and expected to, fine-tune the configuration.

Much of Privoxy's configuration can be done with a Web browser. But there are areas where configuration - is done using a text editor to edit - configuration files. Also note that the web-based action editor doesn't use authentication and should only be - enabled in environments where all clients with access to Privoxy listening port - can be trusted.

+ "https://en.wikipedia.org/wiki/Web_browser" target="_top">Web browser. But there are areas where + configuration is done using a text editor + to edit configuration files. Also note that the web-based action editor doesn't use authentication and should + only be enabled in environments where all clients with access to Privoxy + listening port can be trusted.

1.3. What is a "proxy"? How does Privoxy work?

-

A web proxy is a service, based on a +

A web proxy is a service, based on a software such as Privoxy, that clients (i.e. browsers) can use instead of connecting to web servers directly. The clients then ask the proxy to request objects (web pages, images, movies etc) on their behalf and to forward the data to the clients. It is a "go-between". For - details, see Wikipedia's proxy + details, see Wikipedia's proxy definition.

There are many reasons to use web proxies, such as security (firewalling), efficiency (caching) and others, and there are any number of proxies to accommodate those needs.

@@ -87,7 +87,7 @@ autonomy over their browsing, and for tracking them, keeps evolving. Unfortunately, the Internet Junkbuster did not. Version 2.0.2, published in 1998, was the last official release, available from Junkbusters Corporation. Fortunately, it had been released under the GNU GPL, which allowed further development + "https://www.gnu.org/licenses/old-licenses/gpl-2.0.html" target="_top">GPL, which allowed further development by others.

So Stefan Waldherr started maintaining an improved version of the software, to which eventually a number of people contributed patches. It could already replace banners with a transparent image, and had a first version of @@ -125,7 +125,7 @@

1.7. How does Privoxy differ from the old Junkbuster?

Privoxy picks up where Junkbuster left off. Privoxy still blocks ads and banners, still manages cookies, and still helps protect your privacy. + "https://en.wikipedia.org/wiki/Browser_cookie" target="_top">cookies, and still helps protect your privacy. But, most of these features have been enhanced, and many new ones have been added, all in the same vein.

Privoxy's new features include: