X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fwebserver%2Fuser-manual%2Findex.html;h=ea08e987bbbe40ee13d38593e07390b02897ac84;hp=879f9edf9412a4590d1f74eabb000563934c9baf;hb=47ebc96cd29a0e2de4c752e7b42006c27d365064;hpb=9d75c45feecceb6d1cabf06bb1e97accc4b091e2 diff --git a/doc/webserver/user-manual/index.html b/doc/webserver/user-manual/index.html index 879f9edf..ea08e987 100644 --- a/doc/webserver/user-manual/index.html +++ b/doc/webserver/user-manual/index.html @@ -29,27 +29,23 @@ CLASS="TITLE" NAME="AEN2" >Privoxy User Manual

By: Privoxy Developers

$Id: user-manual.sgml,v 1.70 2002/04/08 20:53:56 swa Exp $

Copyright © 2001, 2002 by + Privoxy Developers +

$Id: user-manual.sgml,v 1.105 2002/05/05 20:26:02 hal9 Exp $

-

The user manual gives users information on how to install, configure and use - Privoxy. -

Privoxy is based on the code of the - Internet Junkbuster (tm). - is based on Junkbuster was originally written by Junkbusters - Corporation, and was released as free open-source software under the GNU GPL. - Stefan Waldherr made many improvements, and started the SourceForge project - to continue development.

Privoxy continues the - Junkbuster tradition, but adds many - refinements, enhancements and new features.

Internet + Junkbuster (tm).

You can find the latest version of the user manual at http://www.privoxy.org/user-manual/. Please see the Contact section on how to contact the developers. -

. + Please see the Contact section on how to + contact the developers. +

Table of Contents
1. Introduction
1.1. New FeaturesFeatures
3. 2. Installation
3.1. Source2.1. Binary Packages
3.1.1. Red Hat2.1.1. Red Hat and SuSE RPMs
3.1.2. SuSE2.1.2. Debian
3.1.3. 2.1.3. Windows
2.1.4. Solaris, NetBSD, FreeBSD, HP-UX
2.1.5. OS/2
3.1.4. Windows2.1.6. Max OSX
3.1.5. Other2.1.7. AmigaOS
2.2. Building from Source
3. Note to Upgraders
4. Quickstart to Using Privoxy
5. Starting Privoxy
4.1. 5.1. RedHat and Debian
5.2. SuSE
5.3. Windows
5.4. Solaris, NetBSD, FreeBSD, HP-UX and others
5.5. OS/2
5.6. MAX OSX
5.7. AmigaOS
5.8. Command Line Options
5. 6.
5.1. 6.1. Controlling Privoxy with Your Web Browser
5.2. 6.2. Configuration Files Overview
5.3. 7. The Main Configuration File
5.3.1. Defining Other Configuration Files7.1. Configuration and Log File Locations
7.1.1. confdir
7.1.2. logdir
7.1.3. actionsfile
7.1.4. filterfile
7.1.5. logfile
5.3.2. Other Configuration Options7.1.6. jarfile
5.3.3. Access Control List (ACL)7.1.7. trustfile
5.3.4. 7.2. Local Set-up Documentation
7.2.1. user-manual
7.2.2. trust-info-url
7.2.3. admin-address
7.2.4. proxy-info-url
7.3. Debugging
7.3.1. debug
7.3.2. single-threaded
7.4. Access Control and Security
7.4.1. listen-address
7.4.2. toggle
7.4.3. enable-remote-toggle
7.4.4. enable-edit-actions
7.4.5. ACLs: permit-access and deny-access
7.4.6. buffer-limit
7.5. Forwarding
7.5.1. forward
7.5.2. forward-socks4 and forward-socks4a
7.5.3. Advanced Forwarding Examples
5.3.5. 7.6. Windows GUI Options
5.4. The Actions File8. Actions Files
8.1. Finding the Right Mix
8.2. How to Edit
8.3. How Actions are Applied to URLs
8.4. Patterns
5.4.1. URL Domain and Path Syntax8.4.1. The Domain Pattern
8.4.2. The Path Pattern
5.4.2. 8.5. Actions
8.5.1. +add-header
8.5.2. +block
8.5.3. +deanimate-gifs
8.5.4. +downgrade-http-version
8.5.5. +fast-redirects
8.5.6. +filter
8.5.7. +hide-forwarded-for-headers
8.5.8. +hide-from-header
8.5.9. +hide-referer
8.5.10. +hide-user-agent
8.5.11. +handle-as-image
8.5.12. +set-image-blocker
8.5.13. +limit-connect
8.5.14. +prevent-compression
8.5.15. +session-cookies-only
8.5.16. +prevent-reading-cookies
8.5.17. +prevent-setting-cookies
8.5.18. +kill-popups
8.5.19. +send-vanilla-wafer
8.5.20. +send-wafer
5.4.3. 8.5.21. Summary
8.5.22. Sample Actions Files
8.6. Aliases
5.5. 9. The Filter File
5.6. Templates9.1. The +filter Action
6. 10. Templates
11. Contacting the Developers, Bug Reporting and Feature Requests
7. 11.1. Get Support
11.2. Report bugs
11.3. Request new features
11.4. Report ads or other filter problems
11.5. Other
12. Copyright and HistoryPrivoxy Copyright, License and History
7.1. Copyright12.1. License
7.2. 12.2. History
8. 13. See Also
9. 14. Appendix
9.1. 14.1. Regular Expressions
9.2. 14.2. Privoxy
9.2.1. 14.2.1. Bookmarklets
9.3. 14.3. Chain of Events
14.4. Anatomy of an Action