X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=templates%2Fedit-actions-for-url;h=aa3524576d6602c3f9a9a54f21599fb9ba275865;hb=aa53f4319b658e0b8478e307088bcab0008038c7;hp=4351e461cbc8554f2b25457121e1193a9aa2c8c8;hpb=fab20214ea31d085f15603d081d26dfb844a597a;p=privoxy.git diff --git a/templates/edit-actions-for-url b/templates/edit-actions-for-url index 4351e461..aa352457 100644 --- a/templates/edit-actions-for-url +++ b/templates/edit-actions-for-url @@ -32,6 +32,50 @@ # # Revisions : # $Log: edit-actions-for-url,v $ +# Revision 1.36 2006/08/14 08:29:17 fabiankeil +# Split filter-headers{} into filter-client-headers{} +# and filter-server-headers{}. +# +# Revision 1.35 2006/08/03 02:46:42 david__schmidt +# Incorporate Fabian Keil's patch work: http://www.fabiankeil.de/sourcecode/privoxy/ +# +# Revision 1.34 2006/07/18 14:49:13 david__schmidt +# Reorganizing the repository: swapping out what was HEAD (the old 3.1 branch) +# with what was really the latest development (the v_3_0_branch branch) +# +# Revision 1.29.2.5 2004/10/05 03:17:26 david__schmidt +# Typo: inspect_jpegs, not inspect-jpegs in form +# +# Revision 1.29.2.4 2004/10/03 12:53:46 david__schmidt +# Add the ability to check jpeg images for invalid +# lengths of comment blocks. Defensive strategy +# against the exploit: +# Microsoft Security Bulletin MS04-028 +# Buffer Overrun in JPEG Processing (GDI+) Could +# Allow Code Execution (833987) +# Enabled with +inspect-jpegs in actions files. +# +# Revision 1.29.2.3 2002/08/23 02:22:53 hal9 +# Fix a perl brain fart with
- | add-header | +add-header | Adds HTTP headers. | |||
- | block | +block | Block the request | |||
+ | + | + | content-type-overwrite | +Replace Content-Type header. By default it only applies to + text documents, but if you know what you're doing you + can enable force-text-mode to modify binary content types as well. | +||
+ | + | + | + | New Content-Type: + |
+ ||
+ | + | + | crunch-client-header | +Remove header(s) matching the supplied pattern. | +||
+ | + | + | + | Header string to suppress: + |
+ ||
+ | + | + | crunch-if-none-match | +Remove If-None-Match header. Useful for filter testing + and to make sure the header can't be used to track your visits. | +||
+ | + | + | crunch-incoming-cookies | +Prevent the website from setting cookies on your system. | +||
+ | + | + | crunch-outgoing-cookies | +Prevent the website from reading cookies from your system. | +||
+ | + | + | crunch-server-header | +Remove server header(s) matching the supplied pattern. | +||
+ | + | + | + | Header string to suppress: + |
+ ||
- | deanimate-gifs | +deanimate-gifs | Replace animated GIFs with their (first/last) frame. | |||
- | downgrade-http-version | +downgrade-http-version | Change HTTP/1.1 requests to HTTP/1.0. Only change if you know what you're doing! | - | fast-redirects | +fast-redirects | Bypass some click-tracking URLs. | - +
+ | + | + | + |
+
+ + |
+ ||
- | filter * | +filter * | Filter the website through regular expression filters. You can use the radio buttons on this line to disable all filters applied by previous rules, and/or you can enable or disable the filters individually below. | |||
+ | + | + | filter-client-headers | +Apply filters to the client headers as well. Only enable this if you know what you're doing. | +||
+ | + | + | filter-server-headers | +Apply filters to the server headers as well. Only enable this if you know what you're doing. | +||
+ | + | + | force-text-mode | ++ Enable filtering on documents whose Content-Type wasn't recognized as text. + Do think twice, nothing is alright. + | +||
+ | + | + | handle-as-empty-document | +
+ Block with an empty document instead of an Image or HTML message.
+ The empty document contains only a space and can safely be parsed
+ as JavaScript or Style Sheet. Use content-type-overwrite to specify the
+ Content-Type, default is text/html. + |
+ ||
- | handle-as-image | -Request is for an image (only useful in conjunction with the block - and set-image-blocker actions). | +handle-as-image | +Request is for an image (only useful in conjunction with the block + and set-image-blocker actions). | +||
+ | + | + | hide-accept-language | +Pretend to have different language settings. (Makes a fake User-Agent more believable, + but can lead to foreign content.) | +||
+ | + | + | + |
+ + + + |
||
+ | + | + | hide-content-disposition | +Block or overwrite the content-disposition header. Useful to view a document inside the browser, + even if you were supposed to save it first, or to change the suggested file name. | +||
+ | + | + | + |
+ + + + |
+ ||
- | hide-forwarded-for-headers | +hide-forwarded-for-headers | Block any existing X-Forwarded-for header, and do not add a new one. | |||
- | hide-from-header | +hide-from-header | Stop old web browsers from sending the user's e-mail address with every request. | |||
+ | + | + | hide-if-modified-since | +Remove or randomize If-Modified-Since header. | +||
+ | + | + | + |
+ Useful for filter testing. + + hour(s). + To appreciate this option a small amount of paranoia is required, + but at least in theory the If-Modified-Since header could be used + to keep track of your visits. + |
+ ||
+ name="hide_referrer" id="hide_referrer_y" value="Y" @hide-referrer-y@ + onclick="show_hide_referrer_opts(true)"> | + name="hide_referrer" id="hide_referrer_n" value="N" @hide-referrer-n@ + onclick="show_hide_referrer_opts(false)"> | - | hide-referrer | +hide-referrer | Helps prevent tracking by not sending the URL of the previous web page. | |
- | (breaks images + | (breaks images
on some free web hosts). - |
+ ||||
- | hide-user-agent | +hide-user-agent | Pretend to be using a different web browser. (Breaks many web sites). | |||
+ | + | + | inspect-jpegs | +Checks jpeg images for malicious content. | +||
- | kill-popups | +kill-popups | Filter the website through a built-in filter to disable many JavaScript pop-up windows. | - | limit-connect | +limit-connect | Specify which ports are allowed for SSL (HTTP CONNECT) access. Note that this allows arbitrary tunnelling, so opening all ports would be a security hole. | @@ -647,47 +1007,82 @@ function show_send_wafer_opts(tf)
- | prevent-compression | -Disables compression. Compressed web pages are faster to - download, but cannot be filtered with filter - or kill-popups. - This setting only affects the few web sites which support - compression. | +overwrite-last-modified | +Remove or randomize If-Modified-Since header. | ||
+ | + | + | + | + + |
+ ||
- | prevent-reading-cookies | -Prevent the website from reading cookies. | +prevent-compression | +Disables compression. Compressed web pages are faster to + download, but cannot be filtered with filter + or kill-popups. + This setting only affects the few web sites which support + compression. | ||
- | prevent-setting-cookies | -Prevent the website from setting cookies. | +redirect | +Redirect to another address. + | ||
+ | + | + | + | Address to redirect to: + |
||
- | send-vanilla-wafer | +send-vanilla-wafer | Adds a special wafer (standard cookie) to all your requests. | |||
- | send-wafer | +send-wafer | Adds user-specified cookies. | |||
- | session-cookies-only | +session-cookies-only | Any cookies set by the website are changed to temporary ("per-session") ones, which only last until you close your web browser. This will allow you to use sites that require cookies, but sites will not be able to track you across sessions. For this to be useful, you should disable - prevent-reading-cookies and - prevent-setting-cookies. | + crunch-outgoing-cookies and + crunch-incoming-cookies.|||
- | set-image-blocker | +set-image-blocker | Specifies how to block images. | |||
+ | + | + | treat-forbidden-connects-like-blocks | +
+ Answer forbidden Connect requests with the usual block message.
+ Makes unblocking easier, but the go there anywaylink will not work + as expected. + |
+