X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fwebserver%2Fman-page%2Fprivoxy-man-page.html;h=1da43def363f0543e6f8240fb2fad644f6ecf774;hp=8a2afd0cd6fed7ffad3722503e3aa24c2ece6e5b;hb=7f1b39ebd830622229fe8680da0f030d9a0ee4f4;hpb=a5b1999794b4b0faa68812c0b8b2861316ae8341 diff --git a/doc/webserver/man-page/privoxy-man-page.html b/doc/webserver/man-page/privoxy-man-page.html index 8a2afd0c..1da43def 100644 --- a/doc/webserver/man-page/privoxy-man-page.html +++ b/doc/webserver/man-page/privoxy-man-page.html @@ -1,414 +1,314 @@ + -
-privoxy [--help ] [--version ] [--no-daemon ] [--pidfile pidfile ] [--user user[.group] ] [configfile ] (UNIX) -
-
-privoxy.exe [configfile ] (Windows) -
- -Privoxy may be invoked with the following command line -options: -
- -If the configfile is not specified on the command line, -Privoxy will look for a file named -config in the current directory (except on Win32 where -it will try config.txt). If no -configfile is found, Privoxy will -fail to start. - -
- -Privoxy is a web proxy with advanced filtering -capabilities for protecting privacy, filtering web page content, managing -cookies, controlling access, and removing ads, banners, pop-ups and other -obnoxious Internet junk. Privoxy has a very -flexible configuration and can be customized to suit individual needs and -tastes. Privoxy has application for both -stand-alone systems and multi-user networks. -
- -Privoxy is based on Internet -Junkbuster (tm). - -
- -Browsers must be individually configured to use Privoxy as -a HTTP proxy. The default setting is for localhost, on port 8118 -(configurable in the main config file). To set the HTTP proxy in Netscape -and Mozilla, go through: Edit; -Preferences; Advanced; -Proxies; Manual Proxy Configuration; -View. -
- -For Internet Explorer, go through: Tools; -Internet Properties; Connections; -LAN Settings. -
- -The Secure (SSL) Proxy should also be set to the same values, otherwise -https: URLs will not be proxied. Note: Privoxy can only -proxy HTTP and HTTPS traffic. Do not try it with FTP or other protocols. -
- -For other browsers, check the documentation. - -
- -Privoxy can be configured with the various configuration -files. The default configuration files are: config, -default.filter, and -default.action. user.action should -be used for locally defined exceptions to the default rules of -default.action These are all well commented. On Unix -and Unix-like systems, these are located in -/etc/privoxy/ by default. On Windows, OS/2 and AmigaOS, -these files are in the same directory as the Privoxy -executable. -
- -The name and number of configuration files has changed from previous -versions, and is subject to change as development -progresses. In fact, the configuration itself is changed and much more -sophisticated. See the user-manual for a complete -explanation of all configuration options and general usage, and notes for -upgrading from Junkbuster and earlier Privoxy -versions. -
- -The actions list (ad blocks, etc) can also be configured with your -web browser at http://config.privoxy.org/. -Privoxy's configuration parameters can also be viewed at -the same page. In addition, Privoxy can be toggled on/off. -This is an internal page, and does not require Internet access. - -
- -A brief example of what a simple default.action -configuration might look like: -
-
- # Define a few useful custom aliases for later use - {{alias}} - - # Useful aliases - +crunch-cookies = +crunch-incoming-cookies +crunch-outgoing-cookies - -crunch-cookies = -crunch-incoming-cookies -crunch-outgoing-cookies - +imageblock = +block +handle-as-image - - # Fragile sites should have the minimum changes - fragile = -block -deanimate-gifs -fast-redirects -filter \ - -hide-referer -prevent-cookies -kill-popups - - ## Turn some actions on ################################ - { \ - -add-header \ - -block \ - +deanimate-gifs{last} \ - -downgrade-http-version \ - -fast-redirects \ - +filter{html-annoyances} \ - +filter{js-annoyances} \ - +filter{content-cookies} \ - +filter{webbugs} \ - +filter{banners-by-size} \ - +hide-forwarded-for-headers \ - +hide-from-header{block} \ - +hide-referrer{forge} \ - -hide-user-agent \ - -handle-as-image \ - +set-image-blocker{pattern} \ - -limit-connect \ - +prevent-compression \ - +session-cookies-only \ - -crunch-cookies \ - -kill-popups \ - } - / # '/' Matches *all* URL patterns - - # Block, and treat these URL patterns as if they were 'images'. - # We would expect these to be ads. - {+imageblock} - .ad.doubleclick.net - .a[0-9].yimg.com/(?:(?!/i/).)*$ - ad.*.doubleclick.net - - # Block any URLs that match these patterns - {+block} - ad*. - .*ads. - banner?. - /.*count(er)?\.(pl|cgi|exe|dll|asp|php[34]?) - .hitbox.com - - # Make exceptions for these harmless ones that would be - # caught by our +block patterns just above. - {-block} - adsl. - advice. - .*downloads. -- -
- -Then for a user.action, we would put local, -narrowly defined exceptions: -
-
- # Re-define aliases as needed here - {{alias}} - - # Useful aliases - -crunch-cookies = -crunch-incoming-cookies -crunch-outgoing-cookies - - # Set personal exceptions to the policies in default.action ####### - - # Sites where we want persistant cookies, so allow *all* cookies - {-crunch-cookies -session-cookies-only} - .redhat.com - .sun.com - .msdn.microsoft.com - - # This site breaks easily. - {-block -fast-redirects} - .forbes.com -- -
- -See the comments in the configuration files themselves, or the -user-manual -for explanations of the above syntax, and other Privoxy -configuration options. - -
-
- - /usr/sbin/privoxy - /etc/privoxy/config - /etc/privoxy/default.action - /etc/privoxy/standard.action - /etc/privoxy/user.action - /etc/privoxy/default.filter - /etc/privoxy/trust - /etc/privoxy/templates/* - /var/log/privoxy/logfile -- -
- -Various other files should be included, but may vary depending on platform -and build configuration. More documentation should be included in the local -documentation directory. - -
- -Privoxy terminates on the SIGINT, -SIGTERM and SIGABRT signals. Log -rotation scripts may cause a re-opening of the logfile by sending a -SIGHUP to Privoxy. Note that unlike -other daemons, Privoxy does not need to be made aware of -config file changes by SIGHUP -- it will detect them -automatically. - -
- -This is a alpha version of Privoxy. Not -all features are well tested. -
- -Please see the User Manual on how to contact the -developers for feature requests, reporting problems, and other questions. - -
- -Other references and sites of interest to Privoxy -users: -
- -
-http://www.privoxy.org/, -the Privoxy Home page. -
-http://www.privoxy.org/faq/, -the Privoxy FAQ. -
-http://sourceforge.net/projects/ijbswa/, -the Project Page for Privoxy on -SourceForge. -
-http://config.privoxy.org/, -the web-based user interface. Privoxy must be -running for this to work. Shortcut: http://p.p/ -
-http://www.privoxy.org/actions/, to submit ``misses'' to the developers. -
-http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/ijbswa/contrib/, cool -and fun ideas from Privoxy users. -
-http://www.junkbusters.com/ht/en/cookies.html, -an explanation how cookies are used to track web users. -
-http://www.junkbusters.com/ijb.html, -the original Internet Junkbuster. -
-http://www.waldherr.org/junkbuster/, -Stefan Waldherr's version of Junkbuster, from which Privoxy was -derived. -
-http://privacy.net/analyze/, a useful site -to check what information about you is leaked while you browse the web. -
-http://www.squid-cache.org/, a very popular -caching proxy, which is often used together with Privoxy. -
-http://www.privoxy.org/developer-manual/, -the Privoxy developer manual. - -
-
- Jon Foster - Andreas Oesterhelt - Stefan Waldherr - Thomas Steudten - Rodney Stromlund - Rodrigo Barbosa (RPM specfiles) - Moritz Barsnick - Hal Burgiss (docs) - Karsten Hopp (Red Hat) - Alexander Lazic - Gábor Lipták - Guy - Haroon Rafique - Roland Rosenfeld (Debian) - Georg Sauthoff (Gentoo) - David Schmidt (OS/2, Mac OSX ports) - Joerg Strohmayer (Amiga) - Sarantis Paskalis -- - -
- -Copyright (C) 2001, 2002 by Privoxy Developers <developers@privoxy.org> -
- -Some source code is based on code Copyright (C) 1997 by Anonymous Coders -and Junkbusters, Inc. and licensed under the GNU General Public -License. - -
- -Privoxy is free software; you can -redistribute it and/or modify it under the terms of the -GNU General Public -License, version 2, as published by the Free Software Foundation. -
- -This program is distributed in the hope that it will be useful, but WITHOUT -ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or -FITNESS FOR A PARTICULAR PURPOSE. See the -GNU General Public License for -more details, which is available from the Free Software Foundation, Inc, 59 -Temple Place - Suite 330, Boston, MA 02111-1307, USA. -
- -You should have received a copy of the GNU General Public License -along with this program; if not, write to the Free Software -Foundation, Inc. 59 Temple Place - Suite 330 -Boston, MA 02111-1307 -USA -
- -
privoxy [--chroot ] [--config-test ] [--help + ] [--no-daemon ] [--pidfile pidfile ] + [--pre-chroot-nslookup hostname ] [--user + user[.group] ] [--version ] [configfile ]
+ + + +Privoxy may be invoked with the following command line + options:
+ +If the exit code is 1, at least one of the configuration files is + invalid, if it is 0, all the configuration files have been successfully + loaded (but may still contain errors that can currently only be + detected at run time).
+ +This option doesn't affect the log setting, combination with + "--no-daemon" is recommended if a configured log file shouldn't be + used.
+If the configfile is not specified on the command line, + Privoxy will look for a file named config in the current + directory. If no configfile is found, Privoxy will fail to + start.
+ +Privoxy is a non-caching web proxy with advanced filtering capabilities + for enhancing privacy, modifying web page data and HTTP headers, + controlling access, and removing ads and other obnoxious Internet junk. + Privoxy has a flexible configuration and can be customized to suit + individual needs and tastes. It has application for both stand-alone + systems and multi-user networks.
+ +Privoxy is Free Software and licensed under the GNU GPLv2.
+ +Privoxy is an associated project of Software in the Public Interest + (SPI).
+ +Helping hands and donations are welcome:
+ +Browsers can either be individually configured to use Privoxy as + a HTTP proxy (recommended), or Privoxy can be combined with a packet + filter to build an intercepting proxy (see config). The default + setting is for localhost, on port 8118 (configurable in the main config + file). To set the HTTP proxy in Firefox, go through: Tools; + Options; General; Connection Settings; Manual Proxy + Configuration.
+ +For Internet Explorer, go through: Tools; Internet + Properties; Connections; LAN Settings.
+ +The Secure (SSL) Proxy should also be set to the same values, otherwise + https: URLs will not be proxied. Note: Privoxy can only proxy HTTP + and HTTPS traffic. Do not try it with FTP or other protocols. HTTPS + presents some limitations, and not all features will work with HTTPS + connections.
+ +For other browsers, check the documentation.
+ +Privoxy can be configured with the various configuration files. + The default configuration files are: config, default.filter, + default.action and default.action. user.action should + be used for locally defined exceptions to the default rules in + match-all.action and default.action, and user.filter + for locally defined filters. These are well commented. On Unix and + Unix-like systems, these are located in /etc/privoxy/ by + default.
+ +Privoxy uses the concept of actions in order to manipulate + the data stream between the browser and remote sites. There are various + actions available with specific functions for such things as blocking web + sites, managing cookies, etc. These actions can be invoked individually or + combined, and used against individual URLs, or groups of URLs that can be + defined using wildcards and regular expressions. The result is that the + user has greatly enhanced control and freedom.
+ +The actions list (ad blocks, etc) can also be configured with your web + browser at http://config.privoxy.org/ (assuming the + configuration allows it). Privoxy's configuration parameters can + also be viewed at the same page. In addition, Privoxy can be toggled + on/off. This is an internal page, and does not require Internet access.
+ +See the User Manual for a detailed explanation of installation, + general usage, all configuration options, new features and notes on + upgrading.
+ ++ /usr/sbin/privoxy + /etc/privoxy/config + /etc/privoxy/match-all.action + /etc/privoxy/default.action + /etc/privoxy/user.action + /etc/privoxy/default.filter + /etc/privoxy/user.filter + /etc/privoxy/trust + /etc/privoxy/templates/* + /var/log/privoxy/logfile ++ +
Various other files should be included, but may vary depending on + platform and build configuration. Additional documentation should be + included in the local documentation directory.
+ +Privoxy terminates on the SIGINT and SIGTERM + signals. Log rotation scripts may cause a re-opening of the logfile by + sending a SIGHUP to Privoxy. Note that unlike other daemons, + Privoxy does not need to be made aware of config file changes by + SIGHUP -- it will detect them automatically. Signals other than the + ones listed above aren't explicitly handled and result in the default + action defined by the operating system.
+ +Please see the User Manual on how to contact the developers, for + feature requests, reporting problems, and other questions.
+ +Other references and sites of interest to Privoxy users:
+ +http://www.privoxy.org/, the + Privoxy Home page.
+ +http://www.privoxy.org/faq/, + the Privoxy FAQ.
+ +http://www.privoxy.org/developer-manual/, + the Privoxy developer manual.
+ +https://sourceforge.net/projects/ijbswa/, + the Project Page for Privoxy on SourceForge.
+ +http://config.privoxy.org/, the + web-based user interface. Privoxy must be running for this to work. + Shortcut: http://p.p/
+ +https://sourceforge.net/tracker/?group_id=11118&atid=460288, + to submit ``misses'' and other configuration related suggestions to the + developers.
+ ++ Fabian Keil, lead developer + David Schmidt + Hal Burgiss + Lee Rian + Roland Rosenfeld + Ian Silvester ++ +
Copyright (C) 2001-2016 by Privoxy Developers <ijbswa-developers@lists.sourceforge.net>
+ +Some source code is based on code Copyright (C) 1997 by Anonymous Coders + and Junkbusters, Inc. and licensed under the GNU General Public + License.
+ +Privoxy is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License, version 2, as + published by the Free Software Foundation.
+ +Privoxy is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY + or FITNESS FOR A PARTICULAR PURPOSE. See the license for + details.
+