The User ManualPrivoxy User Manual gives users information on how to
install, configure and use PrivoxyPrivoxy.
Privoxy is a web proxy with advanced filtering
- capabilities for protecting privacy, modifying web page data, managing
- cookies, controlling access, and removing ads, banners, pop-ups and other
- obnoxious Internet junk. Privoxy has a very
- flexible configuration and can be customized to suit individual needs and
- tastes. Privoxy has application for both
- stand-alone systems and multi-user networks.
Privoxy is a non-caching web proxy with advanced filtering capabilities
+ for enhancing privacy, modifying web page data and HTTP headers, controlling
+ access, and removing ads and other obnoxious Internet junk. Privoxy has a
+ flexible configuration and can be customized to suit individual needs and tastes.
+ It has application for both stand-alone systems and multi-user networks.
Privoxy is Free Software and licensed under the GPL2.
Privoxy is based on Internet
- Junkbuster (tm).
Privoxy is an associated project of Software in the Public Interest (SPI).
+
Donations are welcome.
You can find the latest version of the User ManualPrivoxy User Manual at 2.1.1. Red Hat, SuSE and Conectiva RPMsRed Hat and Fedora RPMs
2.1.2. DebianDebian and Ubuntu2.1.3. 2.1.4. Solaris, NetBSD, FreeBSD, HP-UXSolaris2.1.5. 2.1.6. Mac OSXMac OS X2.1.7. 2.1.8. FreeBSD2.1.9. Gentoo4. Quickstart to Using PrivoxyQuickstart to Using Privoxy- 5. Starting PrivoxyStarting Privoxy
- 5.1. Red Hat and ConectivaRed Hat and Fedora
- 5.2.
- 5.3. SuSE
- 5.4. Windows
- 5.5. 5.4. Solaris, NetBSD, FreeBSD, HP-UX and others
- 5.6. 5.5. OS/2
- 5.7. 5.6. Mac OSXMac OS X
- 5.8. 5.7. AmigaOS
- 5.9. 5.8. Gentoo
- 5.10. 5.9. Command Line Options
- 6. Privoxy ConfigurationPrivoxy Configuration
- 6.1. Controlling Privoxy with Your Web BrowserControlling Privoxy with Your Web Browser
- 6.2.
- 7.1. Configuration and Log File LocationsLocal Set-up Documentation
- 7.1.1. confdiruser-manual
- 7.1.2. logdirtrust-info-url
- 7.1.3. actionsfileadmin-address
- 7.1.4. filterfile
- 7.1.5. logfile
- 7.1.6. jarfile
- 7.1.7. trustfileproxy-info-url
- 7.2. Local Set-up DocumentationConfiguration and Log File Locations
- 7.2.1. user-manualconfdir
- 7.2.2. trust-info-urltempldir
- 7.2.3. admin-addresslogdir
- 7.2.4. proxy-info-urlactionsfile
- 7.2.5. filterfile
- 7.2.6. logfile
- 7.2.7. trustfile
single-threaded- 7.3.3. hostname
- 7.4.4. enable-remote-http-toggle
- 7.4.5. enable-edit-actions
- 7.4.5. 7.4.6. enforce-blocks
- 7.4.7. ACLs: permit-access and deny-access
- 7.4.6. 7.4.8. buffer-limit
- 7.5.2. forward-socks4 and forward-socks4aforward-socks4, forward-socks4a and forward-socks5
- 7.5.3. Advanced Forwarding Examples
- 7.5.4. forwarded-connect-retries
- 7.6. Miscellaneous
- 7.6.1. accept-intercepted-requests
- 7.6.2. allow-cgi-request-crunching
- 7.6.3. split-large-forms
- 7.6.4. keep-alive-timeout
- 7.6.5. connection-sharing
- 7.6.6. socket-timeout
- 7.6.7. max-client-connections
- 7.7. Windows GUI Options
- 8.1. Finding the Right Mix
- 8.2. How to Edit
- 8.3. How Actions are Applied to URLsHow Actions are Applied to Requests
- 8.4.
- 8.4.1. The Domain Pattern
- 8.4.2. The Path Pattern
- 8.4.3. The Tag Pattern
8.5.3. change-x-forwarded-for8.5.4. client-header-filter8.5.5. client-header-tagger8.5.6. content-type-overwrite8.5.4. 8.5.7. crunch-client-header8.5.5. 8.5.8. crunch-if-none-match8.5.6. 8.5.9. crunch-incoming-cookies8.5.7. 8.5.10. crunch-server-header8.5.8. 8.5.11. crunch-outgoing-cookies8.5.9. 8.5.12. deanimate-gifs8.5.10. 8.5.13. downgrade-http-version8.5.11. 8.5.14. fast-redirects8.5.12. 8.5.15. filter8.5.13. filter-client-headers8.5.14. filter-server-headers8.5.15. 8.5.16. force-text-mode8.5.16. 8.5.17. forward-override8.5.18. handle-as-empty-document8.5.17. 8.5.19. handle-as-image8.5.18. 8.5.20. hide-accept-language8.5.19. 8.5.21. hide-content-disposition8.5.20. 8.5.22. hide-if-modified-since8.5.21. hide-forwarded-for-headers8.5.22. 8.5.23. hide-from-header8.5.23. 8.5.24. hide-referrer8.5.24. 8.5.25. hide-user-agent8.5.25. inspect-jpegs8.5.26. kill-popups8.5.27. limit-connect8.5.28. 8.5.27. prevent-compression8.5.29. 8.5.28. overwrite-last-modified8.5.30. 8.5.29. redirect8.5.31. send-vanilla-wafer8.5.30. server-header-filter8.5.32. send-wafer8.5.31. server-header-tagger8.5.33. 8.5.32. session-cookies-only8.5.34. 8.5.33. set-image-blocker8.5.35. treat-forbidden-connects-like-blocks8.5.36. 8.5.34. Summary- 8.7.1. default.actionmatch-all.action
- 8.7.2. default.action
- 8.7.3. user.action
- 9.1. Filter File Tutorial
- 10. TemplatesPrivoxy's Template Files
- 11.
- 12. Privoxy Copyright, License and HistoryPrivoxy Copyright, License and History
- 12.1. License
- 14.2. Privoxy's Internal PagesPrivoxy's Internal Pages
- 14.4. Anatomy of an ActionTroubleshooting: Anatomy of an Action