X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fwebserver%2Fuser-manual%2Findex.html;h=8e356bd71af004d89930b2a0e73827d1aacd0f3c;hp=d9afd908fc31b3a6c90172d2554f20cd6fb400fd;hb=594da2fb0547a6325317ff12476f400622bb6cf5;hpb=e0dbf1d74567dc0bec4c358a3bab44ef62af4aa8 diff --git a/doc/webserver/user-manual/index.html b/doc/webserver/user-manual/index.html index d9afd908..8e356bd7 100644 --- a/doc/webserver/user-manual/index.html +++ b/doc/webserver/user-manual/index.html @@ -1,17 +1,22 @@ + Privoxy User ManualPrivoxy 3.0.13 User Manual + +Privoxy User ManualPrivoxy 3.0.13 User Manual

By: Privoxy Developers

$Id: user-manual.sgml,v 1.99 2002/04/28 16:59:05 swa Exp $

Copyright © 2001-2009 by + Privoxy Developers +

$Id: user-manual.sgml,v 2.105 2009/04/17 11:32:57 fabiankeil Exp $

The user manual gives users information on how to install, configure and use - The Privoxy User Manual gives users information on how to + install, configure and use PrivoxyPrivoxy. -

Privoxy is a web proxy with advanced filtering - capabilities for protecting privacy, filtering web page content, managing - cookies, controlling access, and removing ads, banners, pop-ups and other - obnoxious Internet junk. Privoxy has a very - flexible configuration and can be customized to suit individual needs and - tastes. Privoxy has application for both - stand-alone systems and multi-user networks.

Privoxy is a non-caching web proxy with advanced filtering capabilities + for enhancing privacy, modifying web page data and HTTP headers, controlling + access, and removing ads and other obnoxious Internet junk. Privoxy has a + flexible configuration and can be customized to suit individual needs and tastes. + It has application for both stand-alone systems and multi-user networks.

Privoxy is based on Internet - Junkbuster (tm).

Privoxy is Free Software and licensed under the GPL2.

You can find the latest version of the user manual at Privoxy is an associated project of Software in the Public Interest (SPI). + Donations are welcome.

You can find the latest version of the Privoxy User Manual at http://www.privoxy.org/user-manual/. Please see the Contact section on how to contact the developers. -

Table of Contents
1. Introduction
3. 2. Installation
3.1. 2.1. Binary Packages
2.1.1. Red Hat and SuSE RPMsRed Hat and Fedora RPMs
3.2. 2.1.2. DebianDebian and Ubuntu
3.3. 2.1.3. Windows
3.4. 2.1.4. Solaris, NetBSD, FreeBSD, HP-UXSolaris
3.5. 2.1.5. OS/2
3.6. 2.1.6. Max OSXMac OS X
3.7. 2.1.7. AmigaOS
2.1.8. FreeBSD
2.1.9. Gentoo
4. 2.2. Building from Source
2.3. Keeping your Installation Up-to-Date
3. What's New in this Release
3.1. Note to Upgraders
5. 4. Quickstart to Using PrivoxyQuickstart to Using Privoxy
6. 4.1. Quickstart to Ad Blocking
5. Starting PrivoxyStarting Privoxy
6.1. RedHat and Debian5.1. Red Hat and Fedora
6.2. SuSE5.2. Debian
6.3. 5.3. Windows
6.4. 5.4. Solaris, NetBSD, FreeBSD, HP-UX and others
6.5. 5.5. OS/2
6.6. 5.6. MAX OSXMac OS X
6.7. 5.7. AmigaOS
6.8. 5.8. Gentoo
5.9. Command Line Options
7. 6. Privoxy ConfigurationPrivoxy Configuration
7.1. Controlling Privoxy with Your Web Browser6.1. Controlling Privoxy with Your Web Browser
7.2. 6.2. Configuration Files Overview
8. 7. The Main Configuration File
8.1. 7.1. Local Set-up Documentation
7.1.1. user-manual
7.1.2. trust-info-url
7.1.3. admin-address
7.1.4. proxy-info-url
7.2. Configuration and Log File Locations
8.1.1. 7.2.1. confdir
8.1.2. 7.2.2. templdir
7.2.3. logdir
8.1.3. 7.2.4. actionsfile
8.1.4. 7.2.5. filterfile
8.1.5. 7.2.6. logfile
8.1.6. jarfile
8.1.7. 7.2.7. trustfile
8.1.8. user-manual
8.2. Local Set-up Documentation
8.2.1. trust-info-url
8.2.2. admin-address
8.2.3. proxy-info-url
8.3. 7.3. Debugging
8.3.1. 7.3.1. debug
8.3.2. 7.3.2. single-threaded
7.3.3. hostname
8.4. 7.4. Access Control and Security
8.4.1. 7.4.1. listen-address
8.4.2. 7.4.2. toggle
8.4.3. 7.4.3. enable-remote-toggle
8.4.4. 7.4.4. enable-remote-http-toggle
7.4.5. enable-edit-actions
8.4.5. 7.4.6. enforce-blocks
7.4.7. ACLs: permit-access and deny-access
8.4.6. 7.4.8. buffer-limit
8.5. 7.5. Forwarding
8.5.1. 7.5.1. forward
8.5.2. 7.5.2. forward-socks4 and forward-socks4aforward-socks4, forward-socks4a and forward-socks5
8.5.3. 7.5.3. Advanced Forwarding Examples
7.5.4. forwarded-connect-retries
8.6. 7.6. Miscellaneous
7.6.1. accept-intercepted-requests
7.6.2. allow-cgi-request-crunching
7.6.3. split-large-forms
7.6.4. keep-alive-timeout
7.6.5. connection-sharing
7.6.6. socket-timeout
7.6.7. max-client-connections
7.7. Windows GUI Options
9. 8. Actions Files
9.1. 8.1. Finding the Right Mix
9.2. 8.2. How to Edit
9.3. How Actions are Applied to URLs8.3. How Actions are Applied to Requests
9.4. 8.4. Patterns
9.4.1. 8.4.1. The Domain Pattern
9.4.2. 8.4.2. The Path Pattern
8.4.3. The Tag Pattern
9.5. 8.5. Actions
9.5.1. 8.5.1. +add-headeradd-header
9.5.2. 8.5.2. +blockblock
8.5.3. change-x-forwarded-for
8.5.4. client-header-filter
8.5.5. client-header-tagger
9.5.3. 8.5.6. content-type-overwrite
8.5.7. crunch-client-header
8.5.8. crunch-if-none-match
8.5.9. crunch-incoming-cookies
8.5.10. crunch-server-header
8.5.11. crunch-outgoing-cookies
8.5.12. +deanimate-gifsdeanimate-gifs
9.5.4. 8.5.13. +downgrade-http-versiondowngrade-http-version
9.5.5. 8.5.14. +fast-redirectsfast-redirects
9.5.6. 8.5.15. +filterfilter
9.5.7. +hide-forwarded-for-headers8.5.16. force-text-mode
9.5.8. +hide-from-header8.5.17. forward-override
9.5.9. +hide-referer8.5.18. handle-as-empty-document
9.5.10. +hide-user-agent8.5.19. handle-as-image
9.5.11. +handle-as-image8.5.20. hide-accept-language
9.5.12. +set-image-blocker8.5.21. hide-content-disposition
8.5.22. hide-if-modified-since
8.5.23. hide-from-header
8.5.24. hide-referrer
9.5.13. 8.5.25. hide-user-agent
8.5.26. +limit-connectlimit-connect
9.5.14. 8.5.27. +prevent-compressionprevent-compression
9.5.15. +session-cookies-only8.5.28. overwrite-last-modified
9.5.16. +prevent-reading-cookies8.5.29. redirect
9.5.17. +prevent-setting-cookies8.5.30. server-header-filter
9.5.18. +kill-popups8.5.31. server-header-tagger
9.5.19. +send-vanilla-wafer8.5.32. session-cookies-only
9.5.20. +send-wafer8.5.33. set-image-blocker
9.5.21. 8.5.34. Summary
9.5.22. Sample Actions Files
9.6. 8.6. Aliases
8.7. Actions Files Tutorial
8.7.1. match-all.action
8.7.2. default.action
8.7.3. user.action
10. 9. The Filter FileFilter Files
10.1. The +filter Action9.1. Filter File Tutorial
9.2. The Pre-defined Filters
11. 10. TemplatesPrivoxy's Template Files
12. 11. Contacting the Developers, Bug Reporting and Feature Requests
12.1. 11.1. Get Support
12.2. Report bugs11.2. Reporting Problems
12.3. Request new features11.2.1. Reporting Ads or Other Configuration Problems
12.4. Report ads or other filter problems11.2.2. Reporting Bugs
11.3. Request New Features
12.5. 11.4. Other
13. 12. Copyright and HistoryPrivoxy Copyright, License and History
13.1. Copyright12.1. License
13.2. 12.2. History
12.3. Authors
14. 13. See Also
15. 14. Appendix
15.1. 14.1. Regular Expressions
15.2. Privoxy's Internal Pages14.2. Privoxy's Internal Pages
15.2.1. 14.2.1. Bookmarklets
15.3. 14.3. Chain of Events
15.4. 14.4. Anatomy of an ActionTroubleshooting: Anatomy of an Action