2 Privoxy Frequently Asked Questions
6 $Id: faq.sgml,v 1.22 2002/03/24 11:51:00 swa Exp $
8 The FAQ document gives users and developers alike answers to
9 frequently asked questions about Privoxy. Privoxy is a web proxy with
10 advanced filtering capabilities for protecting privacy, filtering web
11 page content, managing cookies, controlling access, and removing ads,
12 banners, pop-ups and other obnoxious Internet Junk. Privoxy has a very
13 flexible configuration and can be customized to suit individual needs
14 and tastes. Privoxy has application for both stand-alone systems and
17 You can find the latest version of the document at
18 [1]http://ijbswa.sourceforge.net/faq/. Please see the Contact section
19 in the [2]user-manual if you want to contact the developers.
20 _________________________________________________________________
23 1. [3]Frequently Asked Questions
25 1.1. [4]General Information
27 1.1.1. [5]What is this new version of Privoxy?
28 1.1.2. [6]How does it differ from the old Junkbuster?
29 1.1.3. [7]What are some of the new features?
30 1.1.4. [8]What is a "proxy"? How does Privoxy work?
31 1.1.5. [9]My browser does the same things as Privoxy. Why
32 should I use Privoxy at all?
34 1.1.6. [10]Is there is a license or fee? What about a
35 warranty? Registration?
37 1.1.7. [11]I would like to help you, what do I do?
41 1.2.1. [13]Can I install the new Privoxy over the old one?
42 1.2.2. [14]I just installed Privoxy. Is there anything
43 special I have to do now?
45 1.2.3. [15]What is the proxy address of Privoxy?
46 1.2.4. [16]I just installed Privoxy, and nothing is
47 happening. All the ads are there. What's wrong?
49 1.3. [17]Configuration
51 1.3.1. [18]Can I use my old config files?
52 1.3.2. [19]What is an "actions" file?
53 1.3.3. [20]The "actions"concept confuses me. Please list
54 some of these "actions".
56 1.3.4. [21]How are actions files configured? What is the
57 easiest way to do this?
59 1.3.5. [22]What are the differences between
60 intermediate.action, basic.action, etc.?
62 1.3.6. [23]Why can I change the configuration with a
63 browser? Does that not raise security issues?
65 1.3.7. [24]How can I set up Privoxy to act as a proxy for
68 1.3.8. [25]Instead of ads, now I get a Privoxy logo [or
69 checkerboard]. I don't want to see anything.
71 1.3.9. [26]Why would anybody want to see the logo or
74 1.3.10. [27]I see large red banners on some pages that say
75 "Blocked". How do I get rid of this?
79 1.4.1. [29]How much does Privoxy slow my browsing down?
80 This has to add extra time to browsing.
82 1.4.2. [30]I noticed considerable delays in page requests
83 compared to the old Junkbuster. What's wrong?
85 1.4.3. [31]What is the "http://i.j.b/"?
86 1.4.4. [32]Do you still maintain the blocklists?
87 1.4.5. [33]How can I submit new ads?
88 1.4.6. [34]How can I hide my IP address?
89 1.4.7. [35]Can Privoxy guarantee I am anonymous?
90 1.4.8. [36]Might some things break because header
91 information is being altered?
93 1.4.9. [37]Can Privoxy act as a "caching" proxy to speed up
96 1.4.10. [38]What about as a firewall? Can Privoxy protect
99 1.4.11. [39]The Privoxy logo that replaces ads is very
100 blocky and ugly looking. Can't a better font be
103 1.4.12. [40]I have large empty spaces now where ads used to
104 be. Why does Privoxy leave these large gaps?
106 1.4.13. [41]How can Privoxy filter Secure (HTTPS) URLs?
107 1.4.14. [42]Privoxy runs as a "server". How secure is it?
108 Do I need to take any special precautions?
110 1.4.15. [43]What is a "default.filter"?
112 1.5. [44]Troubleshooting
114 1.5.1. [45]I just upgraded and am getting "connection
115 refused" with every web page?
117 1.5.2. [46]I just added a new rule, but the steenkin ad is
118 still getting through. How?
120 1.5.3. [47]One of my favorite sites does not work with
121 Privoxy. What can I do?
123 1.5.4. [48]What time is it?
125 2. [49]Contact the developers
126 3. [50]Copyright and History
129 1. Frequently Asked Questions
131 1.1. General Information
133 1.1.1. What is this new version of Privoxy?
135 The original Internet Junkbuster (tm) is a coyrighted product of
136 [52]Junkbusters Corporation. Development of this effort stopped some
137 time ago as of version 2.0.2. Stefan Waldherr started the ijbswa
138 project on [53]Sourceforge to rekindle development. Other developers
139 subsequently joined with Stefan, and have since added many new
140 features, refinements and enhancements.
142 The new Privoxy started with the same code base, but has changed
143 significantly at this point.
144 _________________________________________________________________
146 1.1.2. How does it differ from the old Junkbuster?
148 All the old features remain. The new Privoxy still blocks ads and
149 banners, still manages cookies, and still helps protect your privacy.
150 But, these are all enhanced, and many new features have been added,
151 all in the same vein.
153 The configuration has changed significantly as well. This is something
154 that users will notice right off the bat. The "blocklist" file does
155 not exist any more. This is replaced by "actions" files, such as
156 default.actions. This is where most of the per site configuration is
158 _________________________________________________________________
160 1.1.3. What are some of the new features?
162 * Integrated browser based configuration and control utility
163 ([54]http://i.j.b). Browser-based tracing of rule and filter
165 * Blocking of annoying pop-up browser windows.
166 * HTTP/1.1 compliant (most, but not all 1.1 features are supported).
167 * Support for Perl Compatible Regular Expressions in the
168 configuration files, and generally a more sophisticated and
169 flexible configuration syntax over previous versions.
171 * Web page content filtering (removes banners based on size,
172 invisible "web-bugs", JavaScript, pop-ups, status bar abuse, etc.)
173 * Bypass many click-tracking scripts (avoids script redirection).
174 * Multi-threaded (POSIX and native threads).
175 * Auto-detection and re-reading of config file changes.
176 * User-customizable HTML templates (e.g. 404 error page).
177 * Improved cookie management features (e.g. session based cookies).
178 * Builds from source on most UNIX-like systems. Packages available
179 for: Linux (RedHat, SuSE, or Debian), Windows, Sun Solaris, Mac
180 OSX, OS/2, HP-UX 11 and AmigaOS.
181 * In addition, the configuration is much more powerful and versatile
183 _________________________________________________________________
185 1.1.4. What is a "proxy"? How does Privoxy work?
187 When you connect to a web site with Privoxy, you are really connecting
188 to your locally running version of Privoxy. Privoxy intercepts your
189 requests for the web page, and relays that to the "real" web site. The
190 web site sends the HTTP data stream back to Privoxy, where Privoxy can
191 work its magic before it relays this data back to your web browser.
193 Since Privoxy sits between you and the WWW, it is in a position to
194 intercept and completely manage all web traffic and HTTP content
195 before it gets to your browser. Privoxy uses various programming
196 methods to do this, all of which is under your control via the various
197 configuration files and options.
199 There are many kinds of proxies. Privoxy best fits the "filtering
201 _________________________________________________________________
203 1.1.5. My browser does the same things as Privoxy. Why should I use Privoxy
206 Modern browsers do indeed have some of the same functionality as
207 Privoxy. Maybe this is adequate for you. But Privoxy is much more
208 verstatile and powerful, and can do a number of things that browsers
211 In addition, a proxy is good choice if you use multiple browsers, or
212 have a LAN with multiple computers. This way all the configuration is
213 in one place, and you don't have to maintain a similar configuration
214 for possibly many browsers.
215 _________________________________________________________________
217 1.1.6. Is there is a license or fee? What about a warranty? Registration?
219 Privoxy is licensed under the GNU General Public License (GPL). It is
220 free to use, copy, modify or distribute as you wish under the terms of
221 this license. See [55]http://www.gnu.org/copyleft/gpl.html for
224 There is no warranty of any kind, expressed, implied or otherwise.
225 That is something that would cost real money ;-) There is no
226 registration either. Privoxy really is free in every respect!
227 _________________________________________________________________
229 1.1.7. I would like to help you, what do I do?
231 1.1.7.1. Money Money Money
233 We, of course, welcome donations and use the money for domain
234 registering, regular world-wide get-togethers (hahaha). Anyway, we'll
235 soon describe the process how to donate money to the team.
236 _________________________________________________________________
238 1.1.7.2. You want to work with us?
240 Well, helping the team is always a good idea. We welcome new
241 developers, RPM gurus or documentation makers. Simply get an account
242 on sourceforge.net and mail your id to the developer mailing list.
243 Then read the section Quickstart in the developers manual.
245 Once we have added you to the team, you'll have write access to the
246 CVS repository, and together we'll find a suitable task for you.
247 _________________________________________________________________
251 1.2.1. Can I install the new Privoxy over the old one?
253 We recommend you uninstall the old Junkbuster first to minimize
254 conflicts and confusion. You may want to save your old configuration
255 files for future reference. The configuration is substantially
258 See the [56]user-manual for platform specific installation
259 instructions. [FIXME: This is meant for after the name change for
261 _________________________________________________________________
263 1.2.2. I just installed Privoxy. Is there anything special I have to do now?
265 All browsers must be told to use Privoxy as a proxy by specifying the
266 correct proxy address and port number in the appropriate configuration
267 area for the browser. See below.
268 _________________________________________________________________
270 1.2.3. What is the proxy address of Privoxy?
272 If you set up the Privoxy to run on the computer you browse from
273 (rather than your ISP's server or some networked computer on a LAN),
274 the proxy will be on "localhost" (which is the special name used by
275 every computer on the Internet to refer to itself) and the port will
276 be 8118 (unless you have Privoxy to run on a different port with the
277 listen-address config option).
279 When configuring your browser's proxy settings you typically enter the
280 word "localhost" in the boxes next to "HTTP" and "Secure" (HTTPS) and
281 then the number "8118" for "port". This tells your browser to send all
282 web requests to Privoxy instead of directly to the Interenet.
284 Privoxy can also be used to proxy for a Local Area Network. In this
285 case, your would enter either the IP address of the LAN host where
286 Privoxy is running, or the equivalent hostname. Port assignment would
289 Privoxy does not currently handle protocols such as FTP, SMTP, IM,
290 IRC, ICQ, or other Internet protocols.
291 _________________________________________________________________
293 1.2.4. I just installed Privoxy, and nothing is happening. All the ads are
296 Did you configure your browser to use Privoxy as a proxy? It does not
297 sound like it. See above. You might also try flushing the browser's
298 caches to force a full re-reading of pages. You can verify that
299 Privoxy is running, and your browser is correctly configured by
300 entering the special URL: [57]http://i.j.b/. This should give you a
301 banner that says "This is Privoxy" and access to Privoxy's internal
302 configuration. If you see this, then you are good to go. If not, the
303 browser or Privoxy are not set up correctly.
304 _________________________________________________________________
308 1.3.1. Can I use my old config files?
310 There are major changes to Junkbuster configuration from version 2.0.x
311 to 2.9.x and later. The older files will not work at all. If this is
312 the case, you will need to re-enter your old data into the new
313 configuration structure. This is probably also a good recommendation
314 even if upgrading from 2.9.x to 3.x since there were many minor
315 changes along the way.
316 _________________________________________________________________
318 1.3.2. What is an "actions" file?
320 "actions" files are where various actions that Privoxy might take, are
321 configured. Typically, you would define a set of default actions that
322 apply to all URLs, then add exceptions to these defaults.
324 Actions can be defined on a per site basis, or for groups of sites.
325 Actions can also be grouped together and then applied to one or more
326 sites. There are many possible actions that might apply to any given
327 site. As an example, if we are blocking cookies as one of our default
328 actions, but need to accept cookies from a given site, we would define
329 this in our "actions" file.
331 Privoxy comes with several default actions files, with varying degrees
332 of filtering and blocking, as starting points for your own
333 configuration (see below).
334 _________________________________________________________________
336 1.3.3. The "actions"concept confuses me. Please list some of these
339 These are all explained in the [58]user-manual. Please refer to that.
340 _________________________________________________________________
342 1.3.4. How are actions files configured? What is the easiest way to do this?
344 The easiest way to do this, is to access Privoxy with your web browser
345 at [59]http://i.j.b/, and then select "[60]Edit the actions list" from
346 the selection list. You can also do this by editing the appropriate
347 file with a text editor.
349 Please see the [61]user-manual for a detailed explanation of these and
350 other configuration files, and their various options and syntax.
351 _________________________________________________________________
353 1.3.5. What are the differences between intermediate.action, basic.action,
356 Configuring Privoxy is not easy. To help you get started, we provide
357 you with three different default configurations. The following table
358 shows you, which features are enabled in each configuration.
360 Table 1. Default Configurations
361 Feature default.action basic.action intermediate.action
365 de-animate GIFs ? x x x
366 referer forging ? x x x
367 jon's +no-cookies-keep (i.e. session cookies only) ? x x x
368 no-popup windows ? x x
372 content-modification ? x
376 _________________________________________________________________
378 1.3.6. Why can I change the configuration with a browser? Does that not
379 raise security issues?
381 What I don't understand, is how I can browser edit the config file as
382 a regular user, while the whole /etc/privoxy hierarchy belongs to the
383 user "privoxy", with only 644 perms.
385 When you use the browser-based editor, Privoxy itself is writing to
386 the config files. Because Privoxy is running as the user "privoxy", it
387 can update the config files.
389 If you don't like this, setting "enable-edit-actions 0" in the config
390 file will disable the browser-based editor. If you're that paranoid,
391 you should also consider setting "enable-remote-toggle 0" to prevent
392 browser-based enabling/disabling of Privoxy.
394 Note that normally only local users can connect to Privoxy, so this is
395 not (normally) a security problem.
396 _________________________________________________________________
398 1.3.7. How can I set up Privoxy to act as a proxy for my LAN?
400 By default, Privoxy only responds to requests from localhost. To have
401 it act as a server for a network, this needs to be changed in the main
402 config file where the Privoxy configuration is located. In that file
403 is a "listen-address" option. It may be commented out with a "#"
404 symbol. Make sure it is uncommented, and assign it the address of the
405 LAN gateway interface, and port number to use:
407 listen-address 192.168.1.1:8118
409 Save the file, and restart Privoxy. Configure all browsers on the
410 network then to use this address and port number.
411 _________________________________________________________________
413 1.3.8. Instead of ads, now I get a Privoxy logo [or checkerboard]. I don't
414 want to see anything.
416 This is a configuration option for images that Privoxy is stopping.
417 You have the choice of the Privoxy logo, a checkerboard pattern (this
418 scales better), a transparent 1x1 GIF image, or a custom URL or your
421 If you want to see nothing, then change the "+image-blocker" action to
422 "+image-blocker{blank}". This can be done from the "Edit Actions List"
423 selection at [62]http://i.j.b/. Or by hand editing the appropriate
424 actions file. This will only effect what is defined as "images"
426 _________________________________________________________________
428 1.3.9. Why would anybody want to see the logo or checkerboard?
430 This can be helpful for troubleshooting problems. It might also be
431 good for anyone new to Privoxy so that they can see if their favorite
432 pages are displaying correctly, and Privoxy is not inadvertantly
433 removing something important.
434 _________________________________________________________________
436 1.3.10. I see large red banners on some pages that say "Blocked". How do I
439 These are URLs that match something in one of Privoxy's block actions
440 (+block). It is meant to be a warning so that you know something has
441 been blocked and an easy way for you to see why. These are handled
442 differently than what has been defined as "images" (e.g. ad banners).
443 If you want them to be treated as if they were images, so that they
444 can be invisible, then move the offending URL from the "+block"
445 section to the "+imageblock" section of your actions file.
446 Alternately, you could modify the "block" HTML template that is used
447 by Privoxy to display this, and make it something more to your liking.
448 _________________________________________________________________
452 1.4.1. How much does Privoxy slow my browsing down? This has to add extra
455 It should not slow you down any in real terms, and may actually help
456 speed things up since ads, banners and other junk are not being
457 displayed. The actual processing time required by Privoxy itself for
458 each page, is relatively small in the overall scheme of things, and
459 happens very quickly. This is typically more than offset by time saved
460 not downloading and rendering ad images.
462 "Filtering" via the filterfile mechanism may cause a perceived
463 slowdown, since the entire page is buffered before displaying. See
465 _________________________________________________________________
467 1.4.2. I noticed considerable delays in page requests compared to the old
468 Junkbuster. What's wrong?
470 Using the default filtering configuration, I noticed considerable
471 delays in page requests compared to the old Junkbuster. Loading pages
472 with large contents seemed to take forever, then suddenly delivering
473 all the content at once.
475 The whole content must be loaded in order to filter, and nothing is is
476 sent to the browser during this time. The loading time does not really
477 change in real numbers, but the feeling is different, because most
478 browsers are able to start rendering incomplete content, giving the
479 user a feeling of "it works".
481 To modify the content of a page (i.e. make frames resizeable again,
482 etc.) and not just replace ads, Privoxy needs to download the entire
483 page first, do its content magic and then send the page to the
485 _________________________________________________________________
487 1.4.3. What is the "http://i.j.b/"?
489 Since Privoxy sits between your web browser and the Internet, it can
490 be programmed to handle certain pages specially.
492 With recent versions of Privoxy (version 2.9.x), you can get some
493 information about Privoxy and change some settings by going to
494 http://i.j.b/ or, equivalently, http://ijbswa.sourceforge.net/config/
495 (Note that i.j.b is far easier to type but may not work in some
498 These pages are *not* forwarded to a server on the internet - instead
499 they are handled by a special web server which is built in to Privoxy.
501 If you are not running Privoxy, then http://i.j.b/ will fail, and
502 http://ijbswa.sourceforge.net/config/ will return a web page telling
503 you you're not running Privoxy.
505 If you have version 2.0.2, then the equivalent is
506 http://example.com/show-proxy-args (but you get far less information,
507 and you should really consider upgrading to 2.9.x).
508 _________________________________________________________________
510 1.4.4. Do you still maintain the blocklists?
512 No. The format of the blocklists has changed significantly in the
513 versions 2.9.x. Once we have released the new version, there will
514 again be blocklists that you can update automatically.
515 _________________________________________________________________
517 1.4.5. How can I submit new ads?
519 As of now, please discontinue to submit new ad blocking infos. Once we
520 have released the new version, there will again be a form on the
521 website, which you can use to contribute new ads.
522 _________________________________________________________________
524 1.4.6. How can I hide my IP address?
526 You cannot hide your IP address with Privoxy or any other software,
527 since the server needs to know your IP address to send the answer to
530 Fortunately there are many publicly usable anonymous proxies out
531 there, which solve the problem by providing a further level of
532 indirection between you and the web server, shared by many people and
533 thus letting your requests "drown" in white noise of unrelated
534 requests as far as user tracking is concerned.
536 Most of them will, however, log your IP address and make it available
537 to the authorities in case you abuse that anonymity for criminal
538 purposes. In fact you can't even rule out that some of them only exist
539 to *collect* information on (those suspicious) people with a more than
540 average preference for privacy.
542 You can find a list of anonymous public proxies at [63]multiproxy.org
543 and many more through Google.
544 _________________________________________________________________
546 1.4.7. Can Privoxy guarantee I am anonymous?
548 No. Your chances of remaining anonymous are greatly improved, but
549 unless you are an expert on Internet security it would be safest to
550 assume that everything you do on the Web can be traced back to you.
552 Privoxy can remove various information about you, and allows you more
553 freedom to decide which sites you can trust. But it's still possible
554 that web sites can find out who you are. Here's one way this can
557 A few browsers disclose the user's email address in certain
558 situations, such as when transferring a file by FTP. Privoxy does not
559 filter FTP. If you need this feature, or are concerned about the mail
560 handler of your browser disclosing your email address, you might
561 consider products such as NSClean.
563 Browsers available only as binaries could use non-standard headers to
564 give out any information they can have access to: see the
565 manufacturer's license agreement. It's impossible to anticipate and
566 prevent every breach of privacy that might occur. The professionally
567 paranoid prefer browsers available as source code, because
568 anticipating their behavior is easier. Trust the source, Luke!
569 _________________________________________________________________
571 1.4.8. Might some things break because header information is being altered?
573 Definitely. More and more sites use HTTP header content to decide what
574 to display and how to display it. There is many ways that this can be
575 handled, so having hard and fast rules, is tricky.
577 "USER AGENT" in particular is often used in this way to identify the
578 browser, and adjust content accordingly. Changing this now is not
579 recommended, since so many sites do look for this. You may get
580 undesirable results by changing this.
582 For instance, different browsers use different encodings of Russian
583 and Czech characters, certain web servers convert pages on-the-fly
584 according to the User Agent header. Giving a "User Agent" with the
585 wrong operating system or browser manufacturer causes some sites in
586 these languages to be garbled; Surfers to Eastern European sites
587 should change it to something closer. And then some page access
588 counters work by looking at the "REFERER" header; they may fail or
589 break if unavailable. The weather maps of Intellicast have been
590 blocked by their server when no "REFERER" or cookie is provided, is
591 another example. There are many, many other ways things can go wrong
592 when trying to fool a web server.
594 If you have problems with a site, you will have to adjust your
595 configuration accordingly. Cookies are probably the most likely
596 adjustment that may be required, but by no means the only one.
597 _________________________________________________________________
599 1.4.9. Can Privoxy act as a "caching" proxy to speed up web browsing?
601 No, it does not have this ability at all. You want something like
602 [64]Squid for this. And, yes, before you ask, Privoxy can co-exist
603 with other kinds of proxies like "Squid".
604 _________________________________________________________________
606 1.4.10. What about as a firewall? Can Privoxy protect me?
608 Not in the way you mean, or in the way a true firewall can, or a proxy
609 that has this specific capability. Privoxy can help protect your
610 privacy, but not really protect you from intrusion attempts.
611 _________________________________________________________________
613 1.4.11. The Privoxy logo that replaces ads is very blocky and ugly looking.
614 Can't a better font be used?
616 This is not a font problem. The logo is an image that is created by
617 Privoxy on the fly. So as to not waste memory, the image is rather
618 small. The blockiness comes when the image is scaled to fill a largish
619 area. There is not much to be done about this, other than to use one
620 of the other "imageblock" directives: pattern, blank, or a URL of your
622 _________________________________________________________________
624 1.4.12. I have large empty spaces now where ads used to be. Why does Privoxy
625 leave these large gaps?
627 It would be easy enough to just eliminate this space altogether,
628 rather than fill it with blank space. But, this would create problems
629 with many pages that use the overall size of the ad to help organize
630 the page layout and position the various components of the page where
631 they were intended to be. It is best left this way.
632 _________________________________________________________________
634 1.4.13. How can Privoxy filter Secure (HTTPS) URLs?
636 This is a limitation since HTTPS transactions are encrypted SSL
637 sessions between your browser and the secure site, and are meant to be
638 reliably secure and private. This means that all cookies and HTTP
639 header information are also encrypted from the time they leave your
640 browser, to the site, and vice versa. Privoxy does not try to
641 unencrypt this information, so it just passes through as is. Privoxy
642 can still catch images and ads that are embedded in the SSL stream
644 _________________________________________________________________
646 1.4.14. Privoxy runs as a "server". How secure is it? Do I need to take any
649 There are no known exploits that might effect Privoxy. On Unix-like
650 systems, Privoxy can run as a non-privileged user, which is how we
651 recommend it be run. Also, by default Privoxy only listens to requests
652 from "localhost". It is not itself directly exposed to the Internet in
653 this configuration. If you want to have Privoxy serve as a LAN proxy,
654 this will have to be opened up to allow for LAN requests. In this
655 case, we'd recommend you specify only the LAN gateway address, e.g.
656 192.168.1.1 in the main Privoxy config file. All LAN hosts can then
657 use this as their proxy address in the browser proxy configuration. In
658 this way, Privoxy will not listen on any external ports. Of course, a
659 firewall is always good too. Better safe than sorry.
660 _________________________________________________________________
662 1.4.15. What is a "default.filter"?
664 The "default.filter" is used to "filter" any page content. By
665 "filtering" we mean it can modify, remove, or change anything on the
666 page, including HTML tags, and JavaScript. Regular expressions are
667 used to accomplish this. This is potentially a very powerful feature,
668 but requires some expertise.
670 If you are familiar with regular expressions, and HTML, you can look
671 at the provided default.filter with a text editor and see some of
672 things it can be used for.
674 Presently, there is no GUI editor option for this part of the
676 _________________________________________________________________
680 1.5.1. I just upgraded and am getting "connection refused" with every web
683 Either Privoxy is not running, or your browser is configured for a
684 different port than what Privoxy is using.
686 The old Privoxy used port 8000 by default. This has been changed to
687 port 8118 now, due to a conflict with NAS (Network Audio Service),
688 which uses port 8000. If you haven't, you need to change your browser
689 to the new port number, or alternately change Privoxy's
690 "listen-address" setting in the config file used to start Privoxy.
691 _________________________________________________________________
693 1.5.2. I just added a new rule, but the steenkin ad is still getting
696 If the ad had been displayed before you added its URL, it will
697 probably be held in the browser's cache for some time, so it will be
698 displayed without the need for any request to the server, and Privoxy
699 will not be in the picture. The best thing to do is try flusing the
700 browser's caches. And then try again.
702 If this doesn't help, you probably have an error in the rule you
703 applied. Try pasting the full URL of the offending ad into
704 [65]http://ijbswa.sourceforge.net/config/show-url-info and see if any
705 actions match your new rule.
706 _________________________________________________________________
708 1.5.3. One of my favorite sites does not work with Privoxy. What can I do?
710 First verify that it is indeed a Privoxy problem, by disabling Privoxy
711 filtering and blocking. Go to [66]http://i.j.b/ and click on "Toggle
712 Privoxy On or Off", then disable it. Now try that page again.
714 If still a problem, go to "Show which actions apply to a URL and why"
715 from [67]http://i.j.b/ and paste the full URL of the page in question
716 into the prompt. See which actions are being applied to the URL. Now,
717 armed with this information, go to "Edit the actions list". Here you
718 should see various sections that have various Privoxy features
719 disabled for specific sites. Disabled "actions" will have a "-" (minus
720 sign) in front of them. Add your problem page URL to one of these
721 sections that looks like it is disabling the feature that is causing
722 the problem. Re-try the page. There might be some trial and error
723 involved. This is discussed in a little more detail in the
724 [68]user-manual appendix.
726 Alternately, if you are comfortable with a text editor, you can
727 accomplish the same thing by editing the appropriate "actions" file.
728 _________________________________________________________________
730 1.5.4. What time is it?
733 _________________________________________________________________
735 2. Contact the developers
737 Please see the user manual for information on how to contact the
739 _________________________________________________________________
741 3. Copyright and History
743 Please see the user manual for information on Copyright and History.
744 _________________________________________________________________
748 Please see the user manual for information on references.
752 1. http://ijbswa.sourceforge.net/faq/
753 2. http://ijbswa.sourceforge.net/user-manual/contact.html
754 3. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#QUESTIONS
755 4. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#GENERAL
756 5. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#NEWJB
757 6. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#DIFFERS
758 7. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#FEATURES
759 8. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#PROXYMORON
760 9. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#BROWSERS2
761 10. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#LICENSE
762 11. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#JOINTEAM
763 12. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#INSTALLATION
764 13. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#NEWINSTALL
765 14. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN124
766 15. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#LOCALHOST
767 16. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN149
768 17. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONFIGURATION
769 18. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#NEWCONFIG
770 19. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN165
771 20. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#ACTIONSS
772 21. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN183
773 22. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONFIGFILES
774 23. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#BROWSECONFIG
775 24. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN300
776 25. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN312
777 26. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN323
778 27. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN328
779 28. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#MISC
780 29. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN341
781 30. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#LOADINGTIMES
782 31. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONFIGURL
783 32. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#BLOCKLIST
784 33. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#NEWADS
785 34. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#IP
786 35. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN382
787 36. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN393
788 37. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN403
789 38. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN411
790 39. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN416
791 40. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN424
792 41. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN428
793 42. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN435
794 43. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN447
795 44. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN458
796 45. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN460
797 46. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN472
798 47. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN478
799 48. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN496
800 49. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONTACT
801 50. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#COPYRIGHT
802 51. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#SEEALSO
803 52. http://www.junkbusters.com/
804 53. http://ijbswa.sourceforge.net/
806 55. http://www.gnu.org/copyleft/gpl.html
807 56. http://ijbswa.sourceforge.net/user-manual/
809 58. http://ijbswa.sourceforge.net/user-manual/configuration.html#ACTIONSFILE
811 60. http://ijbswa.sourceforge.net/config/edit-actions
812 61. http://ijbswa.sourceforge.net/user-manual/configuration.html#ACTIONSFILE
814 63. http://www.multiproxy.org/anon_list.htm
815 64. http://www.squid-cache.org/
816 65. http://ijbswa.sourceforge.net/config/show-url-info
819 68. http://ijbswa.sourceforge.net/user-manual/appenix.html#ACTIONSANAT