X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fwebserver%2Fuser-manual%2Findex.html;h=462d618564bb5bdfbda8625e362f66a56b0dbcee;hp=4ead0e2d41307f73733ec6f8302151ffb432c8b8;hb=473cfd051580edfa1e2a3f6beeb9a0d09a8253fd;hpb=56d03106907472899fa6e8933e81058744ce0fed diff --git a/doc/webserver/user-manual/index.html b/doc/webserver/user-manual/index.html index 4ead0e2d..462d6185 100644 --- a/doc/webserver/user-manual/index.html +++ b/doc/webserver/user-manual/index.html @@ -1,17 +1,22 @@ + Privoxy User ManualPrivoxy 3.0.9 User Manual + +Privoxy User ManualPrivoxy 3.0.9 User Manual

By: Privoxy Developers

$Id: user-manual.sgml,v 1.91 2002/04/24 02:39:31 hal9 Exp $

Copyright © 2001 - 2008 by + Privoxy Developers +

$Id: user-manual.sgml,v 2.79 2008/06/27 18:00:53 markm68k Exp $

-

The user manual gives users information on how to install, configure and use - The Privoxy User Manual gives users information on how to + install, configure and use PrivoxyPrivoxy. -

Privoxy is a web proxy with advanced filtering - capabilities for protecting privacy, filtering web page content, managing - cookies, controlling access, and removing ads, banners, pop-ups and other - obnoxious Internet junk. Privoxy has a very - flexible configuration and can be customized to suit individual needs and - tastes. Privoxy has application for both - stand-alone systems and multi-user networks.

Privoxy is a non-caching + web proxy + with advanced filtering capabilities for enhancing privacy, + modifying web page data, managing HTTP + cookies, + controlling access, and removing ads, banners, pop-ups and other obnoxious + Internet junk. Privoxy has a flexible configuration and can be + customized to suit individual needs and tastes. Privoxy has application for + both stand-alone systems and multi-user networks.

Privoxy is based on Internet - Junkbuster (tm).

Privoxy is based on Internet Junkbuster (tm).

You can find the latest version of the user manual at You can find the latest version of the Privoxy User Manual at http://www.privoxy.org/user-manual/. Please see the Contact section on how to contact the developers. -

Table of Contents
1. Introduction
1.1. New FeaturesFeatures
3. 2. Installation
3.1. 2.1. Binary Packages
3.1.1. 2.1.1. Red Hat and SuSE RPMsRed Hat and Fedora RPMs
3.1.2. 2.1.2. DebianDebian and Ubuntu
3.1.3. 2.1.3. Windows
3.1.4. 2.1.4. Solaris, NetBSD, FreeBSD, HP-UXSolaris
3.1.5. 2.1.5. OS/2
3.1.6. 2.1.6. Max OSXMac OS X
3.1.7. 2.1.7. AmigaOS
2.1.8. FreeBSD
2.1.9. Gentoo
3.2. 2.2. Building from Source
2.3. Keeping your Installation Up-to-Date
3. What's New in this Release
3.1. Note to Upgraders
4. Quickstart to Using PrivoxyQuickstart to Using Privoxy
4.1. Note to UpgradersQuickstart to Ad Blocking
4.2. Starting Privoxy5. Starting Privoxy
5.1. Red Hat and Fedora
5.2. Debian
5.3. Windows
5.4. Solaris, NetBSD, FreeBSD, HP-UX and others
5.5. OS/2
5.6. Mac OS X
4.3. 5.7. AmigaOS
5.8. Gentoo
5.9. Command Line Options
5. 6. Privoxy ConfigurationPrivoxy Configuration
5.1. Controlling Privoxy with Your Web Browser6.1. Controlling Privoxy with Your Web Browser
5.2. 6.2. Configuration Files Overview
5.3. 7. The Main Configuration File
5.3.1. 7.1. Local Set-up Documentation
7.1.1. user-manual
7.1.2. trust-info-url
7.1.3. admin-address
7.1.4. proxy-info-url
7.2. Configuration and Log File Locations
5.3.2. Local Set-up Documentation7.2.1. confdir
7.2.2. templdir
7.2.3. logdir
7.2.4. actionsfile
5.3.3. 7.2.5. filterfile
7.2.6. logfile
7.2.7. jarfile
7.2.8. trustfile
7.3. Debugging
7.3.1. debug
7.3.2. single-threaded
7.3.3. hostname
5.3.4. 7.4. Access Control and Security
7.4.1. listen-address
7.4.2. toggle
7.4.3. enable-remote-toggle
7.4.4. enable-remote-http-toggle
5.3.5. 7.4.5. enable-edit-actions
7.4.6. enforce-blocks
7.4.7. ACLs: permit-access and deny-access
7.4.8. buffer-limit
7.5. Forwarding
7.5.1. forward
7.5.2. forward-socks4, forward-socks4a and forward-socks5
7.5.3. Advanced Forwarding Examples
7.5.4. forwarded-connect-retries
7.5.5. accept-intercepted-requests
7.5.6. allow-cgi-request-crunching
5.3.6. 7.5.7. split-large-forms
7.6. Windows GUI Options
5.4. The Actions File8. Actions Files
5.4.1. 8.1. Finding the Right Mix
5.4.2. 8.2. How to Edit
5.4.3. How Actions are Applied to URLs8.3. How Actions are Applied to Requests
5.4.4. 8.4. Patterns
8.4.1. The Domain Pattern
8.4.2. The Path Pattern
8.4.3. The Tag Pattern
5.4.5. 8.5. Actions
8.5.1. add-header
8.5.2. block
8.5.3. client-header-filter
8.5.4. client-header-tagger
8.5.5. content-type-overwrite
8.5.6. crunch-client-header
8.5.7. crunch-if-none-match
8.5.8. crunch-incoming-cookies
8.5.9. crunch-server-header
8.5.10. crunch-outgoing-cookies
8.5.11. deanimate-gifs
8.5.12. downgrade-http-version
8.5.13. fast-redirects
8.5.14. filter
8.5.15. force-text-mode
8.5.16. forward-override
8.5.17. handle-as-empty-document
8.5.18. handle-as-image
8.5.19. hide-accept-language
8.5.20. hide-content-disposition
8.5.21. hide-if-modified-since
8.5.22. hide-forwarded-for-headers
8.5.23. hide-from-header
5.4.6. 8.5.24. hide-referrer
8.5.25. hide-user-agent
8.5.26. limit-connect
8.5.27. prevent-compression
8.5.28. overwrite-last-modified
8.5.29. redirect
8.5.30. server-header-filter
8.5.31. server-header-tagger
8.5.32. session-cookies-only
8.5.33. set-image-blocker
8.5.34. Summary
8.6. Aliases
8.7. Actions Files Tutorial
8.7.1. default.action
8.7.2. user.action
5.5. The Filter File9. Filter Files
5.6. Templates9.1. Filter File Tutorial
9.2. The Pre-defined Filters
6. 10. Privoxy's Template Files
11. Contacting the Developers, Bug Reporting and Feature Requests
6.1. Submitting Ads and "Action" Problems11.1. Get Support
11.2. Reporting Problems
11.2.1. Reporting Ads or Other Configuration Problems
11.2.2. Reporting Bugs
7. 11.3. Request New Features
11.4. Other
12. Copyright and HistoryPrivoxy Copyright, License and History
7.1. Copyright12.1. License
7.2. 12.2. History
12.3. Authors
8. 13. See Also
9. 14. Appendix
9.1. 14.1. Regular Expressions
9.2. Privoxy's Internal Pages14.2. Privoxy's Internal Pages
9.2.1. 14.2.1. Bookmarklets
9.3. 14.3. Chain of Events
9.4. 14.4. Anatomy of an ActionTroubleshooting: Anatomy of an Action