X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fwebserver%2Fuser-manual%2Fquickstart.html;h=70d9d45d78bf5ae51efc2a6e20df723244551197;hp=ed0a5010ce9838440414af84435eec3e22963fd6;hb=6231ae15da15f2db745a7dd1bccc672b2394f7cb;hpb=56d03106907472899fa6e8933e81058744ce0fed diff --git a/doc/webserver/user-manual/quickstart.html b/doc/webserver/user-manual/quickstart.html index ed0a5010..70d9d45d 100644 --- a/doc/webserver/user-manual/quickstart.html +++ b/doc/webserver/user-manual/quickstart.html @@ -1,685 +1,279 @@ -Quickstart to Using Privoxy
Privoxy User Manual
PrevNext

4. Quickstart to Using Privoxy

4.1. Note to Upgraders

There are very significant changes from older versions of - Junkbuster to the current - Privoxy. Configuration is substantially - changed. Junkbuster 2.0.x and earlier - configuration files will not migrate. The functionality of the old - blockfile, cookiefile and - imagelist, are now combined into the - "actions file" (default.action - for most installations).

A "filter file" (typically default.filter) - is new as of Privoxy 2.9.x, and provides some - of the new sophistication (explained below). config is - much the same as before.

If upgrading from a 2.0.x version, you will have to use the new config - files, and possibly adapt any personal rules from your older files. - When porting personal rules over from the old blockfile - to the new actions file, please note that even the pattern syntax has - changed. If upgrading from 2.9.x development versions, it is still - recommended to use the new configuration files.

A quick list of things to be aware of before upgrading:

4.2. Starting Privoxy

Before launching Privoxy for the first time, you - will want to configure your browser(s) to use Privoxy - as a HTTP and HTTPS proxy. The default is localhost for the proxy address, - and port 8118 (earlier versions used port 8000). This is the one - configuration step that must be done!

- With Netscape (and - Mozilla), this can be set under Edit - -> Preferences -> Advanced -> Proxies -> HTTP Proxy. - For Internet Explorer: Tools -> - Internet Properties -> Connections -> LAN Setting. Then, - check "Use Proxy" and fill in the appropriate info (Address: - localhost, Port: 8118). Include if HTTPS proxy support too.

After doing this, flush your browser's disk and memory caches to force a - re-reading of all pages and to get rid of any ads that may be cached. You - are now ready to start enjoying the benefits of using - Privoxy!

Privoxy is typically started by specifying the - main configuration file to be used on the command line. Example Unix startup - command:

 
- # /usr/sbin/privoxy /etc/privoxy/config
- 
- 

See below for other command line options.

An init script is provided for SuSE and Red Hat.

For for SuSE: rcprivoxy start

For Red Hat and Debian: /etc/rc.d/init.d/privoxy start

If no configuration file is specified on the command line, - Privoxy will look for a file named - config in the current directory. Except on Win32 where - it will try config.txt. If no file is specified on the - command line and no default configuration file can be found, - Privoxy will fail to start.

The included default configuration files should give a reasonable starting - point. Most of the per site configuration is done in the - "actions" files. These are where various cookie actions are - defined, ad and banner blocking, and other aspects of - Privoxy configuration. There are several such - files included, with varying levels of aggressiveness.

You will probably want to keep an eye out for sites that require persistent - cookies, and add these to default.action as needed. By - default, most of these will be accepted only during the current browser - session (aka "session cookies"), until you add them to the - configuration. If you want the browser to handle this instead, you will need - to edit default.action and disable this feature. If you - use more than one browser, it would make more sense to let - Privoxy handle this. In which case, the - browser(s) should be set to accept all cookies.

Another feature where you will probably want to define exceptions for trusted - sites is the popup-killing (through the +popup and - +filter{popups} actions), because your favorite shopping, - banking, or leisure site may need popups.

Privoxy is HTTP/1.1 compliant, but not all of - the optional 1.1 features are as yet supported. In the unlikely event that - you experience inexplicable problems with browsers that use HTTP/1.1 per default - (like Mozilla or recent versions of I.E.), you might - try to force HTTP/1.0 compatibility. For Mozilla, look under Edit -> - Preferences -> Debug -> Networking. - Alternatively, set the "+downgrade" config option in - default.action which will downgrade your browser's HTTP - requests from HTTP/1.1 to HTTP/1.0 before processing them.

After running Privoxy for a while, you can - start to fine tune the configuration to suit your personal, or site, - preferences and requirements. There are many, many aspects that can - be customized. "Actions" (as specified in default.action) - can be adjusted by pointing your browser to - http://config.privoxy.org/ - (shortcut: http://p.p/), - and then follow the link to "edit the actions list". - (This is an internal page and does not require Internet access.)

In fact, various aspects of Privoxy - configuration can be viewed from this page, including - current configuration parameters, source code version numbers, - the browser's request headers, and "actions" that apply - to a given URL. In addition to the default.action file - editor mentioned above, Privoxy can also - be turned "on" and "off" (toggled) from this page.

If you encounter problems, try loading the page without - Privoxy. If that helps, enter the URL where - you have the problems into the browser - based rule tracing utility. See which rules apply and why, and - then try turning them off for that site one after the other, until the problem - is gone. When you have found the culprit, you might want to turn the rest on - again.

If the above paragraph sounds gibberish to you, you might want to read more about the actions concept - or even dive deep into the Appendix - on actions.

If you can't get rid of the problem at all, think you've found a bug in - Privoxy, want to propose a new feature or smarter rules, please see the - chapter "Contacting the Developers, .." below.

4.3. Command Line Options

Privoxy may be invoked with the following - command-line options:


PrevHomeNext
Installation Privoxy Configuration
\ No newline at end of file + + + + Quickstart to Using Privoxy + + + + + + + + + + +
+

4. Quickstart to Using Privoxy

+ +
+

4.1. Quickstart to Ad + Blocking

+

Ad blocking is but one of Privoxy's array of features. Many of these features + are for the technically minded advanced user. But, ad and banner blocking is surely common ground for + everybody.

+

This section will provide a quick summary of ad blocking so you can get up to speed quickly without having to + read the more extensive information provided below, though this is highly recommended.

+

First a bit of a warning ... blocking ads is much like blocking SPAM: the more aggressive you are about it, + the more likely you are to block things that were not intended. And the more likely that some things may not work + as intended. So there is a trade off here. If you want extreme ad free browsing, be prepared to deal with more + "problem" sites, and to spend more time adjusting the configuration to solve these + unintended consequences. In short, there is not an easy way to eliminate all ads. Either take the easy way and settle for most ads blocked with the default configuration, or jump in and tweak it for your personal + surfing habits and preferences.

+

Secondly, a brief explanation of Privoxy's "actions". "Actions" in this context, are the directives we use to tell + Privoxy to perform some task relating to HTTP transactions (i.e. web browsing). + We tell Privoxy to take some "action". Each action + has a unique name and function. While there are many potential actions in + Privoxy's arsenal, only a few are used for ad blocking. Actions, and action configuration files, are + explained in depth below.

+

Actions are specified in Privoxy's configuration, followed by one or more + URLs to which the action should apply. URLs can actually be URL type patterns that use wildcards so they can apply potentially to a range of + similar URLs. The actions, together with the URL patterns are called a section.

+

When you connect to a website, the full URL will either match one or more of the sections as defined in + Privoxy's configuration, or not. If so, then Privoxy will perform the respective actions. If not, then nothing special happens. + Furthermore, web pages may contain embedded, secondary URLs that your web browser will use to load additional + components of the page, as it parses the original page's HTML content. An ad image for instance, is just an URL + embedded in the page somewhere. The image itself may be on the same server, or a server somewhere else on the + Internet. Complex web pages will have many such embedded URLs. Privoxy can deal + with each URL individually, so, for instance, the main page text is not touched, but images from such-and-such + server are blocked.

+

The most important actions for basic ad blocking are: block, handle-as-image, handle-as-empty-document,and set-image-blocker:

+ +

Advanced users will eventually want to explore Privoxy filters as well. Filters are very different from blocks. A "block" blocks a site, + page, or unwanted contented. Filters are a way of filtering or modifying what is actually on the page. An example + filter usage: a text replacement of "no-no" for "nasty-word". That is a very simple example. This process can be used for ad blocking, but it is + more in the realm of advanced usage and has some pitfalls to be wary off.

+

The quickest way to adjust any of these settings is with your browser through the special Privoxy editor at http://config.privoxy.org/show-status (shortcut: http://p.p/show-status). This is an internal page, and does not require Internet access.

+

Note that as of Privoxy 3.0.7 beta the action editor is disabled by default. + Check the enable-edit-actions section in the + configuration file to learn why and in which cases it's safe to enable again.

+

If you decided to enable the action editor, select the appropriate "actions" file, + and click "Edit". It is best to put personal or local + preferences in user.action since this is not meant to be overwritten during upgrades, + and will over-ride the settings in other files. Here you can insert new "actions", and + URLs for ad blocking or other purposes, and make other adjustments to the configuration. Privoxy will detect these changes automatically.

+

A quick and simple step by step example:

+ +

This is a very crude and simple example. There might be good reasons to use a wildcard pattern match to + include potentially similar images from the same site. For a more extensive explanation of "patterns", and the entire actions concept, see the Actions + section.

+

For advanced users who want to hand edit their config files, you might want to now go to the Actions Files Tutorial. The ideas explained therein also apply to the + web-based editor.

+

There are also various filters that can be used for ad blocking + (filters are a special subset of actions). These fall into the "advanced" usage + category, and are explained in depth in later sections.

+
+
+ + +