Privoxy User Manual gives users information on how to
install, configure and use
Privoxy.
Privoxy is a non-caching
- Privoxy is a non-caching web proxy with advanced filtering capabilities
+ for enhancing privacy, modifying web page data and HTTP headers, controlling
+ access, and removing ads and other obnoxious Internet junk. Privoxy has a
+ flexible configuration and can be customized to suit individual needs and tastes.
+ It has application for both stand-alone systems and multi-user networks.
Privoxy is Free Software and licensed under the GNU GPLv2.
Privoxy is an associated project of Software in the Public Interest (SPI).
Helping hands and donations are welcome:
+
web proxyhttps://www.privoxy.org/faq/general.html#PARTICIPATE
- with advanced filtering capabilities for enhancing privacy,
- modifying web page data, managing HTTP
- cookies,
- controlling access, and removing ads, banners, pop-ups and other obnoxious
- Internet junk. Privoxy has a flexible configuration and can be
- customized to suit individual needs and tastes. Privoxy has application for
- both stand-alone systems and multi-user networks.
Privoxy is based on Internet Junkbuster (tm).
https://www.privoxy.org/faq/general.html#DONATE
+
You can find the latest version of the Privoxy User Manual at http://www.privoxy.org/user-manual/https://www.privoxy.org/user-manual/.
Please see the - 2.1.1. Red Hat and Fedora RPMs
- 2.1.2. Debian and Ubuntu
- 2.1.3. 2.1.2. Windows
- 2.1.4. Solaris
- 2.1.5. 2.1.3. OS/2
- 2.1.6. 2.1.4. Mac OSXMac OS X
2.1.7. AmigaOS2.1.5. Installation from ready-built package2.1.8. FreeBSD2.1.6. Installation from source2.1.9. Gentoo2.1.7. FreeBSD- 5.1. Red Hat and FedoraDebian
- 5.2. DebianFreeBSD and ElectroBSD
- 5.3.
- 5.4. Solaris, NetBSD, FreeBSD, HP-UX and othersGeneric instructions for Unix derivates (Solaris, NetBSD, HP-UX etc.)
- 5.5.
- 5.6. Mac OSXMac OS X
- 5.7. AmigaOS
- 5.8. Gentoo
- 5.9. Command Line Options
- 6.1. Controlling Privoxy with Your Web Browser
- 7.2.3. temporary-directory
- 7.2.4. logdir
- 7.2.4. 7.2.5. actionsfile
- 7.2.5. 7.2.6. filterfile
- 7.2.6. 7.2.7. logfile
- 7.2.7. jarfile
- 7.2.8. trustfilesingle-threaded
- 7.3.3. hostname
- buffer-limit
- 7.4.9. enable-proxy-authentication-forwarding
- 7.4.10. trusted-cgi-referer
7.5.2. forward-socks4 and forward-socks4aforward-socks4, forward-socks4a, forward-socks5 and forward-socks5t7.5.3. forwarded-connect-retries7.6. Miscellaneous- 7.5.5. 7.6.1. accept-intercepted-requests
- 7.5.6. 7.6.2. allow-cgi-request-crunching
- 7.5.7. 7.6.3. split-large-forms
- 7.6.4. keep-alive-timeout
- 7.6.5. tolerate-pipelining
- 7.6.6. default-server-timeout
- 7.6.7. connection-sharing
- 7.6.8. socket-timeout
- 7.6.9. max-client-connections
- 7.6.10. listen-backlog
- 7.6.11. enable-accept-filter
- 7.6.12. handle-as-empty-doc-returns-ok
- 7.6.13. enable-compression
- 7.6.14. compression-level
- 7.6.15. client-header-order
- 7.6.16. client-specific-tag
- 7.6.17. client-tag-lifetime
- 7.6.18. trust-x-forwarded-for
- 7.6.19. receive-buffer-size
7.6. 7.7. Windows GUI Options- 8.1. Finding the Right Mix
- 8.2. How to Edit
- 8.4.1. The Domain PatternThe Host Pattern
- 8.4.2. The Path Pattern
- 8.4.3. The Tag PatternThe Request Tag Pattern
- 8.4.4. The Negative Request Tag Patterns
- 8.4.5. The Client Tag Pattern
- 8.5.3. change-x-forwarded-for
- 8.5.4. client-header-filter
- 8.5.4. 8.5.5. client-header-tagger
- 8.5.5. 8.5.6. content-type-overwrite
- 8.5.6. 8.5.7. crunch-client-header
- 8.5.7. 8.5.8. crunch-if-none-match
- 8.5.8. 8.5.9. crunch-incoming-cookies
- 8.5.9. 8.5.10. crunch-server-header
- 8.5.10. 8.5.11. crunch-outgoing-cookies
- 8.5.11. 8.5.12. deanimate-gifs
- 8.5.12. 8.5.13. downgrade-http-version
- 8.5.13. 8.5.14. external-filter
- 8.5.15. fast-redirects
- 8.5.14. 8.5.16. filter
- 8.5.15. 8.5.17. force-text-mode
- 8.5.16. 8.5.18. forward-override
- 8.5.17. 8.5.19. handle-as-empty-document
- 8.5.18. 8.5.20. handle-as-image
- 8.5.19. 8.5.21. hide-accept-language
- 8.5.20. 8.5.22. hide-content-disposition
- 8.5.21. 8.5.23. hide-if-modified-since
- 8.5.22. hide-forwarded-for-headers
- 8.5.23. 8.5.24. hide-from-header
- 8.5.24. 8.5.25. hide-referrer
- 8.5.25. 8.5.26. hide-user-agent
- 8.5.26. inspect-jpegs
- 8.5.27. kill-popupslimit-connect
- 8.5.28. limit-connectlimit-cookie-lifetime
- 8.5.29.
- 8.5.32. send-vanilla-wafer
- 8.5.33. send-wafer
- 8.5.34. server-header-filter
- 8.5.35. 8.5.33. server-header-tagger
- 8.5.36. 8.5.34. session-cookies-only
- 8.5.37. 8.5.35. set-image-blocker
- 8.5.38. treat-forbidden-connects-like-blocks
- 8.5.39. 8.5.36. Summary
- 8.7.1. default.actionmatch-all.action
- 8.7.2. default.action
- 8.7.3. user.action
- 9.1. Filter File Tutorial
- The Pre-defined Filters
- 9.3. External filter syntax
- 11.1. Please provide sufficient information
- 11.2. Get Support
- 11.2. 11.3. Reporting Problems
- 11.2.1. 11.3.1. Reporting Ads or Other Configuration Problems
- 11.2.2. 11.3.2. Reporting Bugs
- 11.3. Request New Features11.4. Reporting security problems
- 11.4. Other11.5. Mailing Lists
- 11.6. SourceForge support trackers
- 12.1. License
- 14.2. Privoxy's Internal Pages
- 14.2.1. Bookmarklets
- 14.3.