><UL
><LI
><P
+> Can keep outgoing connections alive and reuse them later on.
+ </P
+></LI
+><LI
+><P
+> Supports tagging which allows to change the behaviour
+ based on client and server headers.
+ </P
+></LI
+><LI
+><P
> Can be run as an "intercepting" proxy, which obviates the need to
configure browsers individually.
</P
></LI
><LI
><P
-> User-customizable HTML templates for all proxy-generated pages (e.g. "blocked" page).
+> User-customizable HTML templates for most proxy-generated pages (e.g. "blocked" page).
</P
></LI
><LI
><H3
CLASS="SECT2"
><A
-NAME="AEN157"
+NAME="AEN161"
>1.9. Can Privoxy make mistakes?
This does not sound very scientific.</A
></H3
><H3
CLASS="SECT2"
><A
-NAME="AEN163"
+NAME="AEN167"
>1.10. Will I have to configure Privoxy
before I can use it?</A
></H3