X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fwebserver%2Fman-page%2Fprivoxy-man-page.html;h=e9e78852cf54f6fae420803dfd6885d9a6aba526;hp=01a19d4ff10f62da62ebcc0008dff0ab2751f522;hb=07cf496b6edcbd3cf315ec7c48f2c94be27357b1;hpb=65252bdb46f1295b2691e13ed574d98f9d6dd2ed diff --git a/doc/webserver/man-page/privoxy-man-page.html b/doc/webserver/man-page/privoxy-man-page.html index 01a19d4f..e9e78852 100644 --- a/doc/webserver/man-page/privoxy-man-page.html +++ b/doc/webserver/man-page/privoxy-man-page.html @@ -1,182 +1,215 @@ -Privoxy Man page

NAME

-
+
+
+
+
+  
+
+  Privoxy Man page
+  
+
+
+
+  

NAME

+
 
 
-
-

SYNOPSIS

-       privoxy	[--help	 ]  [--version	]  [--no-daemon	] [--pidfile pidfile ]
-       [--user user[.group] ] [--chroot	]  [--pre-chroot-nslookup  hostname  ]
-       [configfile ]
+
+ +

SYNOPSIS

+
+       privoxy   [--help   ]  [--version   ]  [--no-daemon  ] [--pidfile pidfile ]
+       [--user user[.group] ] [--chroot    ]  [--pre-chroot-nslookup  hostname  ]
+       [configfile ]
 
 
 
-
-

OPTIONS

-       Privoxy may be invoked with the following command line options:
+
- --help Print brief usage info and exit. +

OPTIONS

+
+       Privoxy may be invoked with the following command line options:
 
-       --version
-	      Print version info and exit.
+       --help Print brief usage  info and exit.
 
-       --no-daemon
-	      Don't   become   a  daemon,  i.e.	 don't fork and	become process
-	      group leader, don't detach from controlling tty, and do all log-
-	      ging there.
+       --version
+          Print version info and exit.
 
-       --pidfile pidfile
-	      On startup, write	the process ID to pidfile.  Delete the pidfile
-	      on exit.	Failure	to create or delete the	pidfile	is  non-fatal.
-	      If no --pidfile option is	given, no PID file will	be used.
+       --no-daemon
+          Don't   become   a  daemon,  i.e.  don't fork and become process
+          group leader, don't detach from controlling tty, and do all log-
+          ging there.
 
-       --user user[.group]
-	      After  (optionally)  writing the PID file, assume	the user ID of
-	      user and the GID of group, or, if	the  optional  group  was  not
-	      given, the default group of user.	Exit if	the privileges are not
-	      sufficient to do so.
+       --pidfile pidfile
+          On startup, write the process ID to pidfile.  Delete the pidfile
+          on exit.  Failure to create or delete the pidfile  is  non-fatal.
+          If no --pidfile option is  given, no PID file will be used.
 
-       --chroot
-	      Before changing to the user  ID  given  in  the  --user  option,
-	      chroot  to that user's home directory, i.e. make the kernel pre-
-	      tend to the Privoxy  process  that  the  directory  tree	starts
-	      there.  If set up	carefully, this	can limit the impact of	possi-
-	      ble vulnerabilities in Privoxy to	the files  contained  in  that
-	      hierarchy.
+       --user user[.group]
+          After  (optionally)  writing the PID file, assume the user ID of
+          user and the GID of group, or, if   the  optional  group  was  not
+          given, the default group of user.  Exit if the privileges are not
+          sufficient to do so.
 
-       --pre-chroot-nslookup hostname
-	      Initialize   the	 resolver   library   using   hostname	before
-	      chroot'ing. On some systems this reduces	the  number  of	 files
-	      that must	be copied into the chroot tree.
+       --chroot
+          Before changing to the user  ID  given  in  the  --user  option,
+          chroot  to that user's home directory, i.e. make the kernel pre-
+          tend to the Privoxy  process  that  the  directory  tree   starts
+          there.  If set up carefully, this can limit the impact of possi-
+          ble vulnerabilities in Privoxy to  the files  contained  in  that
+          hierarchy.
 
-       If  the	configfile  is	not  specified on  the	command	 line, Privoxy
-       will  look for a	file named config in the current directory. If no con-
-       figfile is found, Privoxy will fail to start.
+       --pre-chroot-nslookup hostname
+          Initialize   the   resolver   library   using   hostname   before
+          chroot'ing. On some systems this reduces  the  number  of  files
+          that must be copied into the chroot tree.
 
+       If  the  configfile  is   not  specified on  the  command  line, Privoxy
+       will  look for a file named config in the current directory. If no con-
+       figfile is found, Privoxy will fail to start.
 
-
-

DESCRIPTION

-       Privoxy is a non-caching	web proxy with advanced	filtering capabilities
-       for enhancing privacy, modifying	web page data and HTTP	headers,  con-
-       trolling	 access,  and  removing	ads and	other obnoxious	Internet junk.
-       Privoxy has a flexible configuration and	 can  be  customized  to  suit
 
+
-
-

INSTALLATION AND USAGE

-       Browsers	can either be individually configured to use Privoxy as	a HTTP
-       proxy (recommended), or Privoxy can be combined with a packet filter to
-       build  an intercepting proxy (see config).  The default setting is  for
+  

DESCRIPTION

+
+       Privoxy is a non-caching web proxy with advanced filtering capabilities
+       for enhancing privacy, modifying web page data and HTTP  headers,  con-
+       trolling  access,  and  removing ads and other obnoxious Internet junk.
+       Privoxy has a flexible configuration and  can  be  customized  to  suit
+
+
+
+ +

INSTALLATION AND USAGE

+
+       Browsers can either be individually configured to use Privoxy as  a HTTP
+       proxy (recommended), or Privoxy can be combined with a packet filter to
+       build  an intercepting proxy (see config).  The default setting is  for
        localhost,  on port  8118 (configurable in the main config  file).   To
-       set  the	 HTTP  proxy  in Firefox, go through: Tools; Options; General;
-       Connection Settings; Manual Proxy Configuration.
+       set  the  HTTP  proxy  in Firefox, go through: Tools; Options; General;
+       Connection Settings; Manual Proxy Configuration.
 
-       For Internet Explorer, go through: Tools; Internet Properties;  Connec-
-       tions; LAN Settings.
+       For Internet Explorer, go through: Tools; Internet Properties;  Connec-
+       tions; LAN Settings.
 
-       The Secure (SSL)	Proxy should also be set to the	same values, otherwise
-       https: URLs will	not be proxied.	Note: Privoxy can only proxy HTTP  and
-       HTTPS  traffic.	Do  not	 try  it  with	FTP or other protocols.	 HTTPS
-       presents	some limitations, and not all features will  work  with	 HTTPS
+       The Secure (SSL) Proxy should also be set to the same values, otherwise
+       https: URLs will not be proxied. Note: Privoxy can only proxy HTTP  and
+       HTTPS  traffic.  Do  not  try  it  with  FTP or other protocols.  HTTPS
+       presents some limitations, and not all features will  work  with  HTTPS
        connections.
 
        For other browsers, check the documentation.
 
 
-
-

CONFIGURATION

-       Privoxy	can  be	 configured  with the various configuration files. The
-       default configuration files are:	config,	default.filter,	default.action
-       and  default.action.  user.action  should  be  used for locally defined
-       exceptions to the default rules in match-all.action and default.action,
-       and  user.filter	for locally defined filters. These are well commented.
-       On Unix and Unix-like systems, these are	located	 in  /etc/privoxy/  by
+
+ +

CONFIGURATION

+
+       Privoxy   can  be  configured  with the various configuration files. The
+       default configuration files are: config,  default.filter,  default.action
+       and  default.action.  user.action  should  be  used for locally defined
+       exceptions to the default rules in match-all.action and default.action,
+       and  user.filter  for locally defined filters. These are well commented.
+       On Unix and Unix-like systems, these are located  in  /etc/privoxy/  by
        default.
 
-       Privoxy	uses  the  concept  of actions in order	to manipulate the data
+       Privoxy   uses  the  concept  of actions in order  to manipulate the data
        stream between the browser and remote sites.  There are various actions
-       available  with	specific  functions  for  such	things as blocking web
-       sites, managing cookies,	etc. These actions can be invoked individually
-       or  combined,  and used against individual URLs,	or groups of URLs that
+       available  with  specific  functions  for  such  things as blocking web
+       sites, managing cookies, etc. These actions can be invoked individually
+       or  combined,  and used against individual URLs, or groups of URLs that
        can be defined using wildcards and regular expressions. The  result  is
-       that the	user has greatly enhanced control and freedom.
+       that the user has greatly enhanced control and freedom.
 
        The  actions list (ad blocks, etc) can also be configured with your web
-       browser	at  http://config.privoxy.org/	(assuming  the	 configuration
-       allows it).  Privoxy's configuration parameters	can also  be viewed at
-       the same	page. In addition, Privoxy can be toggled on/off.  This	is  an
-       internal	page, and does not require Internet access.
-
-       See the User Manual for a detailed explanation of installation, general
-       usage, all configuration	options, new features and notes	on  upgrading.
-
-
-
-

FILES

-	/usr/sbin/privoxy
-	/etc/privoxy/config
-	/etc/privoxy/match-all.action
-	/etc/privoxy/default.action
-	/etc/privoxy/user.action
-	/etc/privoxy/default.filter
+       browser  at  http://config.privoxy.org/  (assuming  the   configuration
+       allows it).  Privoxy's configuration parameters   can also  be viewed at
+       the same page. In addition, Privoxy can be toggled on/off.  This  is  an
+       internal page, and does not require Internet access.
+
+       See the User Manual for a detailed explanation of installation, general
+       usage, all configuration options, new features and notes on  upgrading.
+
+
+
+ +

FILES

+
+    /usr/sbin/privoxy
+    /etc/privoxy/config
+    /etc/privoxy/match-all.action
+    /etc/privoxy/default.action
+    /etc/privoxy/user.action
+    /etc/privoxy/default.filter
        detect them automatically.
 
 
-
-

NOTES

-       This  is	 a  UNRELEASED	version	 of Privoxy. Not all features are well
+
+ +

NOTES

+
+       This  is  a  UNRELEASED  version  of Privoxy. Not all features are well
        tested.
 
-       Please see the User Manual on how to contact the	developers,  for  fea-
-       ture requests, reporting	problems, and other questions.
+       Please see the User Manual on how to contact the   developers,  for  fea-
+       ture requests, reporting problems, and other questions.
+
 
+
-
-

SEE ALSO

-       Other references	and sites of interest to Privoxy users:
+  

SEE ALSO

+
+       Other references and sites of interest to Privoxy users:
 
 
-       http://www.privoxy.org/,	the Privoxy Home page.
+       http://www.privoxy.org/, the Privoxy Home page.
 
-       http://www.privoxy.org/faq/, the	Privoxy	FAQ.
+       http://www.privoxy.org/faq/, the Privoxy  FAQ.
 
-       http://www.privoxy.org/developer-manual/, the Privoxy developer manual.
+       http://www.privoxy.org/developer-manual/, the Privoxy developer manual.
 
-       https://sourceforge.net/projects/ijbswa/, the Project Page for  Privoxy
+       https://sourceforge.net/projects/ijbswa/, the Project Page for  Privoxy
        on SourceForge.
 
-       http://config.privoxy.org/,  the	web-based user interface. Privoxy must
+       http://config.privoxy.org/,  the web-based user interface. Privoxy must
        be running for this to work. Shortcut: http://p.p/
 
-       https://sourceforge.net/tracker/?group_id=11118&atid=460288, to	submit
+       https://sourceforge.net/tracker/?group_id=11118&atid=460288, to  submit
        ``misses''  and other configuration related suggestions to the develop-
        ers.
 
 
-
-

DEVELOPMENT TEAM

-	Fabian Keil, lead developer
-	David Schmidt, developer
+
+ +

DEVELOPMENT TEAM

+
+    Fabian Keil, lead developer
+    David Schmidt, developer
+
+    Hal Burgiss
+    Mark Miller
+    Gerry Murphy
+    Lee Rian
+    Roland Rosenfeld
 
-	Hal Burgiss
-	Mark Miller
-	Gerry Murphy
-	Lee Rian
-	Roland Rosenfeld
 
+
-
-

COPYRIGHT AND LICENSE

-   COPYRIGHT
-       Copyright  (C)  2001-2011  by   Privoxy	 Developers   <ijbswa-develop-
+  

COPYRIGHT AND LICENSE

+
+   COPYRIGHT
+       Copyright  (C)  2001-2011  by   Privoxy   Developers   <ijbswa-develop-
        ers@lists.sourceforge.net>
 
        Some  source  code  is  based  on  code Copyright (C) 1997 by Anonymous
-       Coders and Junkbusters, Inc. and	licensed under the GNU General	Public
-       License.
+       Coders and Junkbusters, Inc. and licensed under the GNU General    Public
+       License.
 
-   LICENSE
-       Privoxy	is  free  software;  you  can redistribute it and/or modify it
-       under the terms of the GNU General Public License, version 2,  as  pub-
+   LICENSE
+       Privoxy   is  free  software;  you  can redistribute it and/or modify it
+       under the terms of the GNU General Public License, version 2,  as  pub-
        lished by the Free Software Foundation.
-
- +
+ +