X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fwebserver%2Fuser-manual%2Findex.html;h=462d618564bb5bdfbda8625e362f66a56b0dbcee;hp=64ad4085d7af410aa27bc980f926e405ec36ebd6;hb=473cfd051580edfa1e2a3f6beeb9a0d09a8253fd;hpb=312d3da5afcfc229ad6759dce073518a723a1aa4 diff --git a/doc/webserver/user-manual/index.html b/doc/webserver/user-manual/index.html index 64ad4085..462d6185 100644 --- a/doc/webserver/user-manual/index.html +++ b/doc/webserver/user-manual/index.html @@ -1,17 +1,22 @@ + Privoxy User ManualPrivoxy 3.0.9 User Manual + +Privoxy User ManualPrivoxy 3.0.9 User Manual

By: Privoxy Developers

$Id: user-manual.sgml,v 1.71 2002/04/08 22:59:26 hal9 Exp $

Copyright © 2001 - 2008 by + Privoxy Developers +

$Id: user-manual.sgml,v 2.79 2008/06/27 18:00:53 markm68k Exp $

-

The user manual gives users information on how to install, configure and use - Privoxy The Privoxy User Manual gives users information on how to + install, configure and use Privoxy. -

Privoxy is a web proxy with advanced filtering - capabilities for protecting privacy, filtering web page content, managing - cookies, controlling access, and removing ads, banners, pop-ups and other - obnoxious Internet junk. Privoxy has a very - flexible configuration and can be customized to suit individual needs and - tastes. Privoxy has application for both - stand-alone systems and multi-user networks.

Privoxy is based on the code of the - Internet Junkbuster (tm). - Junkbuster was originally written by Junkbusters - Corporation, and was released as free open-source software under the GNU GPL. - Stefan Waldherr made many improvements, and started the SourceForge project - to continue development.

Privoxy is a non-caching + web proxy + with advanced filtering capabilities for enhancing privacy, + modifying web page data, managing HTTP + cookies, + controlling access, and removing ads, banners, pop-ups and other obnoxious + Internet junk. Privoxy has a flexible configuration and can be + customized to suit individual needs and tastes. Privoxy has application for + both stand-alone systems and multi-user networks.

Privoxy continues the - Junkbuster tradition, but adds many - refinements, enhancements and new features.

Privoxy is based on Internet Junkbuster (tm).

You can find the latest version of the user manual at You can find the latest version of the Privoxy User Manual at http://www.privoxy.org/user-manual/. Please see the Contact section on how to contact the developers. -

Table of Contents
1. Introduction
1.1. New FeaturesFeatures
3. 2. Installation
3.1. Source2.1. Binary Packages
3.1.1. Red Hat2.1.1. Red Hat and Fedora RPMs
2.1.2. Debian and Ubuntu
2.1.3. Windows
3.1.2. SuSE2.1.4. Solaris
3.1.3. 2.1.5. OS/2
3.1.4. Windows2.1.6. Mac OS X
3.1.5. Other2.1.7. AmigaOS
2.1.8. FreeBSD
2.1.9. Gentoo
2.2. Building from Source
2.3. Keeping your Installation Up-to-Date
3. What's New in this Release
3.1. Note to Upgraders
4. Quickstart to Using PrivoxyQuickstart to Using Privoxy
4.1. Command Line OptionsQuickstart to Ad Blocking
5. Privoxy ConfigurationStarting Privoxy
5.1. Controlling Privoxy with Your Web BrowserRed Hat and Fedora
5.2. Configuration Files OverviewDebian
5.3. Windows
5.4. Solaris, NetBSD, FreeBSD, HP-UX and others
5.5. OS/2
5.6. Mac OS X
5.7. AmigaOS
5.8. Gentoo
5.9. Command Line Options
6. Privoxy Configuration
6.1. Controlling Privoxy with Your Web Browser
6.2. Configuration Files Overview
7. The Main Configuration File
5.3.1. Defining Other Configuration Files7.1. Local Set-up Documentation
7.1.1. user-manual
7.1.2. trust-info-url
7.1.3. admin-address
7.1.4. proxy-info-url
7.2. Configuration and Log File Locations
7.2.1. confdir
7.2.2. templdir
7.2.3. logdir
7.2.4. actionsfile
7.2.5. filterfile
7.2.6. logfile
7.2.7. jarfile
7.2.8. trustfile
7.3. Debugging
7.3.1. debug
7.3.2. single-threaded
7.3.3. hostname
7.4. Access Control and Security
7.4.1. listen-address
5.3.2. Other Configuration Options7.4.2. toggle
5.3.3. Access Control List (ACL)7.4.3. enable-remote-toggle
5.3.4. 7.4.4. enable-remote-http-toggle
7.4.5. enable-edit-actions
7.4.6. enforce-blocks
7.4.7. ACLs: permit-access and deny-access
7.4.8. buffer-limit
7.5. Forwarding
5.3.5. 7.5.1. forward
7.5.2. forward-socks4, forward-socks4a and forward-socks5
7.5.3. Advanced Forwarding Examples
7.5.4. forwarded-connect-retries
7.5.5. accept-intercepted-requests
7.5.6. allow-cgi-request-crunching
7.5.7. split-large-forms
7.6. Windows GUI Options
5.4. The Actions File8. Actions Files
8.1. Finding the Right Mix
8.2. How to Edit
8.3. How Actions are Applied to Requests
8.4. Patterns
5.4.1. URL Domain and Path Syntax8.4.1. The Domain Pattern
5.4.2. 8.4.2. The Path Pattern
8.4.3. The Tag Pattern
8.5. Actions
8.5.1. add-header
8.5.2. block
8.5.3. client-header-filter
8.5.4. client-header-tagger
8.5.5. content-type-overwrite
8.5.6. crunch-client-header
8.5.7. crunch-if-none-match
8.5.8. crunch-incoming-cookies
8.5.9. crunch-server-header
8.5.10. crunch-outgoing-cookies
8.5.11. deanimate-gifs
8.5.12. downgrade-http-version
8.5.13. fast-redirects
8.5.14. filter
5.4.3. 8.5.15. force-text-mode
8.5.16. forward-override
8.5.17. handle-as-empty-document
8.5.18. handle-as-image
8.5.19. hide-accept-language
8.5.20. hide-content-disposition
8.5.21. hide-if-modified-since
8.5.22. hide-forwarded-for-headers
8.5.23. hide-from-header
8.5.24. hide-referrer
8.5.25. hide-user-agent
8.5.26. limit-connect
8.5.27. prevent-compression
8.5.28. overwrite-last-modified
8.5.29. redirect
8.5.30. server-header-filter
8.5.31. server-header-tagger
8.5.32. session-cookies-only
8.5.33. set-image-blocker
8.5.34. Summary
8.6. Aliases
8.7. Actions Files Tutorial
8.7.1. default.action
8.7.2. user.action
5.5. The Filter File9. Filter Files
5.6. Templates9.1. Filter File Tutorial
9.2. The Pre-defined Filters
6. 10. Privoxy's Template Files
11. Contacting the Developers, Bug Reporting and Feature Requests
11.1. Get Support
7. 11.2. Reporting Problems
11.2.1. Reporting Ads or Other Configuration Problems
11.2.2. Reporting Bugs
11.3. Request New Features
11.4. Other
12. Copyright and HistoryPrivoxy Copyright, License and History
7.1. Copyright12.1. License
7.2. 12.2. History
12.3. Authors
8. 13. See Also
9. 14. Appendix
9.1. 14.1. Regular Expressions
9.2. Privoxy's Internal Pages14.2. Privoxy's Internal Pages
9.2.1. 14.2.1. Bookmarklets
9.3. 14.3. Chain of Events
14.4. Anatomy of an ActionTroubleshooting: Anatomy of an Action