From: hal9 Date: Sun, 4 Nov 2007 18:11:50 +0000 (+0000) Subject: Catching up html with sgml. X-Git-Tag: v_3_0_7~89 X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=commitdiff_plain;h=3239e60560e2c55a06477816cdcc1dd30c0f4e72 Catching up html with sgml. --- diff --git a/doc/webserver/faq/configuration.html b/doc/webserver/faq/configuration.html index 681cefde..f436199d 100644 --- a/doc/webserver/faq/configuration.html +++ b/doc/webserver/faq/configuration.html @@ -1,11 +1,11 @@ + Configuration3. Configuration3. Configuration

3.1. What exactly is an "actions" file?

file?

3.2. The "actions""actions"..

For a comprehensive discussion of the actions concept, please refer to the

3.3. How are actions files configured? What is the easiest -way to do this?

Actions files are just text files in a special syntax and can be edited with a text editor. But probably the easiest way is to access @@ -219,13 +219,13 @@ CLASS="SECT2" >

3.4. There are several different "actions" files. What are -the differences?

Three actions files are being included by the developers, to be used for @@ -282,8 +282,8 @@ CLASS="SECT2" CLASS="SECT2" >3.5. Where can I get updated Actions Files?3.5. Where can I get updated Actions Files?

Based on your feedback and the continuing development, updates of 3.6. Can I use my old config files?3.6. Can I use my old config files?

The syntax and purpose of configuration files has remained the same - throughout the 3.x series. Although each release contains updated, - The syntax and purpose of configuration files has remained roughly the + same throughout the 3.x series, but backwards compatibility is not guaranteed. + Also each release contains updated, "improved" versions and it is recommended to use the newer - configuration files. - - If upgrading from version prior to 3.0.4 the syntax for fast-redirects - has changed. See the What's New section - of the User Manual for details. -

But all configuration files have substantially - changed from the Junkbuster days, and early - versions of Privoxy 2.x. The old files, like - blocklist will not work at all. -

Refer to the What's New - page for information on configuration changes that may occur from one release to another. +> versions and it is + therefore strongly recommended to use the newer configuration files.

3.7. Why is the configuration so complicated?3.7. Why is the configuration so complicated?

3.8. How can I make my Yahoo/Hotmail/Gmail account work?3.8. How can I make my Yahoo/Hotmail/Gmail account work?

The default configuration shouldn't impact the usability of any of these services. It may, however, make all 3.9. What's the difference between the and "Advanced" defaults? defaults?

Configuring 3.10. Why can I change the configuration -with a browser? Does that not raise security issues?

It may seem strange that regular users can edit the config files with their browsers, although the whole "privoxy", - it can update the config files. + it can update its own config files.

If you run Privoxy for multiple untrusted users (e.g. in - a LAN), you will probably want to turn the web-based editor and remote toggle - features off by setting "off" by setting "Privoxy, - so this is not (normally) a security problem. + so this is (normally) not a security problem.

3.11. What is the default.filter file? What is a "filter"?

?

The 3.12. How can I set up Privoxy to act as a proxy for my - LAN?

By default,

3.13. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.

3.13. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.

The replacement for blocked images can be controlled with the

3.14. Why would anybody want to see a checkerboard pattern?

3.14. Why would anybody want to see a checkerboard pattern?

Remember that

3.15. I see some images being replaced by a text -instead of the checkerboard image. Why and how do I get rid of this?

3.15. I see some images being replaced with text +instead of the checkerboard image. Why and how do I get rid of this?

This happens when the banners are not embedded in the HTML code of the page itself, but in separate HTML (sub)documents that are loaded into (i)frames @@ -1000,9 +966,9 @@ CLASS="SECT2" CLASS="SECT2" >3.16. Can Privoxy run as a service -on Win2K/NT/XP?

Yes. Version 3.0.5 introduces full 3.17. How can I make Privoxy work with other -proxies like Squid or Tor?

This can be done and is often useful to combine the benefits of 3.18. Can I just set Privoxy to use port 80 -and thus avoid individual browser configuration?

No, its more complicated than that. This only works with special kinds of proxies known as "transparent""intercepting" proxies (see below).

3.19. Can Privoxy run as a "transparent" proxy? proxy?

The whole idea of Privoxy is to modify client requests + and server responses in all sorts of ways and therefore + it's not a transparent proxy as described in + RFC 2616.

However, some people say "transparent proxy" when they + mean "intercepting proxy". If you are one of them, + please read the next entry.

3.20. Can Privoxy run as a "intercepting" proxy?

No, Privoxy currently does not have this ability, - though it may be added in a future release. Transparent proxies require - special handling of the request headers beyond what - can't intercept traffic itself, + but it can handle requests that where intercepted and redirected + with a packet filter (like Privoxy is now capable of.

PF or + iptables), as long as the Host + header is present. +

As the Host header is required by HTTP/1.1 and as most + web sites don't work if it isn't set, this limitation shouldn't be a + problem.

Chaining Please refer to your packet filter's documentation to learn how to + intercept and redirect traffic into Privoxy behind another proxy that has - this ability should work though. - See the forwarding chapter - in the User Manual. As - a transparent proxy to be used for chaining we suggest Transproxy - (. Afterward you just have + to configure Privoxy to + http://transproxy.sourceforge.net/).

accept intercepted requests.

3.20. How can I configure Privoxy for use with Outlook - Express?3.21. How can I configure Privoxy for use with Outlook + Express?

3.21. How can I have separate rules just for HTML mail?3.22. How can I have separate rules just for HTML mail?

The short answer is, you can't. 3.22. I sometimes notice cookies sneaking through. How?3.23. I sometimes notice cookies sneaking through. How?

3.23. Are all cookies bad? Why?3.24. Are all cookies bad? Why?

No, in fact there are many beneficial uses of 3.24. How can I allow permanent cookies for my trusted sites?3.25. How can I allow permanent cookies for my trusted sites?

There are several actions that relate to cookies. The default behavior is to allow only "session cookies", which means the cookies only last for the current browser session. This eliminates most kinds of abuse related - to cookies. But there may be cases where we want cookies to last.

To disable all cookie actions, so that cookies are allowed unrestricted, both in and out, for Place the above in user.action. Note some of these may +>. Note that some of these may be off by default anyway, so this might be redundant, but there is no harm being explicit in what you want to happen. 3.25. Can I have separate configurations for different users?3.26. Can I have separate configurations for different users?

Each instance of 3.26. Can I set-up Privoxy as a whitelist of +>3.27. Can I set-up Privoxy as a whitelist of "good" sites? sites?

Sure. There are a couple of things you can do for simple white-listing. Here's one real easy one:

3.27. How can I turn off ad-blocking?3.28. How can I turn off ad-blocking?

Ad blocking is achieved through a complex application of various 3.28. How can I have custom template pages, like the +>3.29. How can I have custom template pages, like the BLOCKED page? page?

3.29. How can I remove the 3.30. How can I remove the "Go There Anyway" link from @@ -1628,7 +1636,10 @@ CLASS="emphasis" CLASS="EMPHASIS" >BLOCKED page? page?

There is more than one way to do it.

Editing the BLOCKED template page (see above) may dissuade some users, but this method is easily circumvented. Where you need this level of control, you @@ -1661,25 +1672,18 @@ CLASS="SCREEN" CLASS="APPLICATION" >Privoxy does not allow easy bypassing of blocked sites, or changing the - current configuration via any connected user's web browser. Some of these - features can also be toggled on/off via options in + current configuration via any connected user's web browser.

Note that all of these features can also be toggled on/off via options in Privoxy's main - main config file. But - compiled-in compliance is a much better method of ensuring that a block is - really a block.

Default builds of Privoxy are typically built with these features - disabled.

file which + means you don't have to recompile anything.

Contacting the developers, Bug Reporting and Feature Requests6. Contacting the developers, Bug Reporting and Feature Requests6. Contacting the developers, Bug Reporting and Feature Requests

We value your feedback. In fact, we rely on it to improve 6.1. Get Support6.1. Get Support

For casual users, our users mailing list, where the developers also hang around.

Note that the Privoxy mailing lists are moderated. Posts from unsubscribed + addresses have to be accepted manually by a moderator. This may cause a + delay of several days and if you use a subject that doesn't clearly + mention Privoxy or one of its features, your message may be accidentally + discarded as spam.

If you aren't subscribed, you should therefore spend a few seconds + to come up with a proper subject. Additionally you should make it clear + that you want to get CC'd. Otherwise some responses will be directed to + the mailing list only, and you won't see them.

6.2. Reporting Problems6.2. Reporting Problems

6.2.1. Reporting Ads or Other Configuration Problems6.2.1. Reporting Ads or Other Configuration Problems

Please send feedback on ads that slipped through, innocent images that were blocked, sites that don't work properly, and other configuration related problem of @@ -206,17 +217,10 @@ CLASS="SECT3" CLASS="SECT3" >6.2.2. Reporting Bugs6.2.2. Reporting Bugs

Please report all bugs only through our - bug tracker: +> Please report all bugs through our bug tracker: . If already submitted, please feel free to add any info to the original report that might help to solve the issue.

- Please try to verify that it is a Please try to verify that it is a Privoxy bug, - and not a browser or site bug first. If unsure, + and not a browser or site bug or documented behaviour that just happens + to be different than what you expected. If unsure, try Privoxy, and see if the problem persists. - If you are using your own custom configuration, please try - the stock configs to see if the problem is configuration related.

, and see if the problem persists.

If you are using your own custom configuration, please try + the stock configs to see if the problem is configuration related. + If you're having problems with a feature that is disabled by default, + please ask around on the mailing list if others can reproduce the problem.

If not using the latest version, the bug may have been found +> If you aren't using the latest Privoxy version, the bug may have been found and fixed in the meantime. We would appreciate if you could take the time to upgrade to the latest version (or even the latest CVS snapshot) and verify - your bug.

Please be sure to provide the following information:

The exact Privoxy version of the proxy software +> version you are using (if you got the source from CVS, please also provide the source code revisions as shown in "uname -a" should do. +> should do, + in case of GNU/Linux, please also name the distribution.

  • Privoxy is one supplied - by the developers of Privoxy via SourceForge, - or somewhere else. +> developers via SourceForge, + or if you got your copy somewhere else.

  • Tor. If so, please try - disabling the other proxy. +>. If so, please + temporary disable the other proxy to see if the symptoms change.

  • Please provide your SF login, or email address, in case we - need to contact you. -

  • You don't have to tell us your actual name when filing a problem + report, but please use a nickname so we can differentiate between + your messages and the ones entered by other "anonymous" users that + may respond to your request if they have the same problem or already + found a solution.

    Please also check the status of your request a few days after submitting + it, as we may request additional information. If you use a SF id, + you should automatically get a mail when someone responds to your request.

    The 6.3. Request New Features6.3. Request New Features

    You are welcome to submit ideas on new features or other proposals for improvement through our feature request tracker at @@ -418,8 +424,8 @@ CLASS="SECT2" CLASS="SECT2" >6.4. Other6.4. Other

    For any other issues, feel free to use the mailing lists. Technically interested users and people who wish to contribute to the project are also welcome on the developers list! diff --git a/doc/webserver/faq/copyright.html b/doc/webserver/faq/copyright.html index fdd570d5..ff2341f9 100644 --- a/doc/webserver/faq/copyright.html +++ b/doc/webserver/faq/copyright.html @@ -1,11 +1,11 @@ + Privoxy Copyright, License and History7. Privoxy Copyright, License and History7. Privoxy Copyright, License and History

    Copyright © 2001 - 2006 by Privoxy Developers Copyright © 2001 - 2007 by Privoxy Developers

    Some source code is based on code Copyright © 1997 by Anonymous Coders @@ -103,9 +103,9 @@ CLASS="SECT2" >

    7.1. License

    7.1. License

    7.2. History

    7.2. History

    A long time ago, there was the General Information1. General Information1. General Information

    1.1. Who should use Privoxy?

    1.1. Who should use Privoxy?

    Anyone that is interested in security, privacy, or in finer-grained control over their web and Internet experience. @@ -99,9 +99,9 @@ CLASS="SECT2" CLASS="SECT2" >1.2. Is Privoxy the best choice for -me?

    1.3. What is a "proxy"? How does -Privoxy work?

    A 1.4. Does Privoxy do anything more than ad blocking?1.4. Does Privoxy do anything more than ad blocking?

    Yes, ad blocking is but one possible use. There are many, many ways 1.5. What is this new version of "Junkbuster"??

    A long time ago, there was the 1.6. Why "Privoxy"? Why change the name from -Junkbuster at all?

    Though outdated, 1.7. How does Privoxy differ -from the old Junkbuster?

  • HTTP/1.1 compliant (but not all optional 1.1 features are supported). -

  • Support for Perl Compatible Regular Expressions in the configuration files, and generally a more sophisticated and flexible configuration syntax over previous versions. @@ -578,9 +573,9 @@ CLASS="SECT2" CLASS="SECT2" >1.8. How does Privoxy know what is -an ad, and what is not?

    1.9. Can Privoxy make mistakes? -This does not sound very scientific.

    Actually, it's a black art ;-) And yes, it is always possible to have a broad rule accidentally block or change something by mistake. You will almost surely @@ -663,10 +658,10 @@ CLASS="SECT2" >

    1.10. Will I have to configure Privoxy - before I can use it?

    No, not really. The default installation should give you a good starting point, and block 1.11. Can Privoxy run as a server on a network?1.11. Can Privoxy run as a server on a network?

    Yes, 1.12. My browser does the same things as -Privoxy. Why should I use Privoxy at all?

    Modern browsers do indeed have 1.13. Why should I trust Privoxy?1.13. Why should I trust Privoxy?

    The most important reason is because you have access to 1.14. Is there is a license or fee? What about a -warranty? Registration?

    Privoxy is licensed under the GNU General Public License (GPL)GNU General Public License (GPL) version 2. It is free to use, copy, modify or distribute as you wish under the terms of this license. Please see the 1.15. Can Privoxy remove spyware? Adware? Viruses?1.15. Can Privoxy remove spyware? Adware? Viruses?

    No. No, at least not reliable enough to trust it. Privoxy cannot remove anything. It is not a removal tool. It is a - preventative. is not designed to be + a malware removal tool and the default configuration doesn't even try to + filter out any malware.

    Privoxy can help prevent contact from sites that use such +> could help prevent contact from (known) sites that use such tactics with appropriate configuration rules, and thus could conceivably prevent contamination from such sites.

  • 1.16. Can I use Privoxy with other ad-blocking software?1.16. Can I use Privoxy with other ad-blocking software?

    1.17. I would like to help you, what can I do?1.17. I would like to help you, what can I do?

    1.17.1. Would you like to participate?

    1.17.1. Would you like to participate?

    Well, we 1.17.2. Contribute!1.17.2. Contribute!

    We, of course, welcome donations and could use money for domain registering, buying software to test 1.17.3. Software1.17.3. Software

    If you are a vendor of a web-related software like a browser, web server or proxy, and would like us to ensure that Privoxy Frequently Asked QuestionsPrivoxy Frequently Asked QuestionsPrivoxy Frequently Asked Questions

    Copyright © 2001-2006 by +> © 2001-2007 by Privoxy Developers @@ -45,16 +45,16 @@ TARGET="_top" >

    $Id: faq.sgml,v 2.23 2006/10/21 22:19:52 hal9 Exp $

    $Id: faq.sgml,v 2.28 2007/10/27 15:14:16 fabiankeil Exp $

    This FAQ gives quick answers to frequently asked questions about Privoxy is based on Internet Junkbuster (tm).

    Please note that this document is a work in progress. This copy represents - the state at the release of version 3.0.6. + the state at the release of version 3.0.7. You can find the latest version of the document at

    1.1. Who should use Privoxy?
    1.9. Can Privoxy make mistakes? This does not sound very scientific.
    1.10. Will I have to configure Privoxy before I can use it?
    2.4. Can I install - Privoxy over Junkbuster?
    2.5. I just installed Privoxy. Is there anything special I have to do now?
    2.6. 2.5. What is the proxy address of Privoxy?
    2.7. 2.6. I just installed Privoxy, and nothing is happening. All the ads are there. What's wrong?
    2.8. 2.7. I get a
    3.1. What exactly is an "actions"
    3.3. How are actions files configured? What is the easiest way to do this?
    3.4. There are several different "actions"
    3.11. What is the default.filter
    3.13. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.
    3.14. Why would anybody want to see a checkerboard pattern?
    3.15. I see some images being replaced by a text +HREF="configuration.html#AEN537" +>I see some images being replaced with text instead of the checkerboard image. Why and how do I get rid of this?
    3.20. Can Privoxy run as a "intercepting" proxy?
    3.21. How can I configure Privoxy for use with Outlook Express?
    3.21. 3.22. How can I have separate rules just for HTML mail?
    3.22. 3.23. I sometimes notice cookies sneaking through. How?
    3.23. 3.24. Are all cookies bad? Why?
    3.24. 3.25. How can I allow permanent cookies for my trusted sites?
    3.25. 3.26. Can I have separate configurations for different users?
    3.26. 3.27. Can I set-up Privoxy as a whitelist of sites?
    3.27. 3.28. How can I turn off ad-blocking?
    3.28. 3.29. How can I have custom template pages, like the page?
    3.29. 3.30. How can I remove the
    4.1. How much does Privoxy slow my browsing down? This has to add extra time to browsing.
    4.2. I notice considerable -delays in page requests compared to the old Junkbuster. What's wrong?
    4.3.
    4.8. Can Privoxy guarantee I am anonymous?
    4.9. A test site says I am not using a Proxy.
    4.11. Might some things break because header information or content is being altered?
    4.12. Can Privoxy act as a "caching"
    4.13. What about as a firewall? Can Privoxy protect me?
    4.14. I have large empty spaces / a checkerboard pattern now where ads used to be. Why?
    4.15. How can Privoxy filter Secure (HTTPS) URLs?
    4.16. Privoxy runs as a "server""MicroSuck"! Why are you manipulating my browsing?
    4.26. Does Privoxy produce "valid" HTML (or XHTML)?
    5.1. I cannot connect to any websites. Or, I am getting
    5.3. I just added a new rule, but the steenkin ad is still getting through. How?
    7.1. License
    7.2. History
    Installation2. Installation2. Installation

    2.1. Which browsers are supported by Privoxy?

    2.1. Which browsers are supported by Privoxy?

    Any browser that can be configured to use a proxy, which should be virtually all browsers, including @@ -94,9 +94,13 @@ CLASS="APPLICATION" CLASS="APPLICATION" >Internet Explorer, and , Opera, and + Safari among others. Direct browser support is not an absolute requirement since 2.2. Which operating systems are supported?2.2. Which operating systems are supported?

    At present, Privoxy is known to run on - Windows(95, 98, ME, 2000, XP), Linux (RedHat, SuSE, Debian, Fedora, Gentoo, - Slackware and others), Mac OSX, OS/2, AmigaOS, FreeBSD, NetBSD, OpenBSD, - Solaris, and various other flavors of Unix.

    But any operating system that runs TCP/IP, can conceivably take advantage of 2.3. Can I use Privoxy with my email client?2.3. Can I use Privoxy with my email client?

    As long as there is some way to set a HTTP proxy for the client, then yes, any application can be used, whether it is strictly speaking a @@ -179,52 +183,10 @@ CLASS="SECT2" >

    2.4. Can I install - Privoxy over Junkbuster?

    We recommend you un-install Junkbuster - first to minimize conflicts and confusion. You may want to - save your old configuration files for future reference. The configuration - files and syntax have substantially changed, so you will need to manually - port your old patterns. See the note - to upgraders and installation - chapter in the User Manual - for details. -

    Note: Some installers may automatically un-install - Junkbuster, if present! -

    2.5. I just installed Privoxy. Is there anything -special I have to do now?

    2.4. I just installed Privoxy. Is there anything +special I have to do now?

    All browsers must be told to use 2.6. What is the proxy address of Privoxy?2.5. What is the proxy address of Privoxy?

    If you set up the 2.7. I just installed Privoxy, and nothing is happening. -All the ads are there. What's wrong?2.6. I just installed Privoxy, and nothing is happening. +All the ads are there. What's wrong?

    Did you configure your browser to use 2.8. I get a 2.7. I get a "Privoxy is not being used" dummy page although -Privoxy is running and being used.

    First, make sure that Privoxy is Miscellaneous4. Miscellaneous4. Miscellaneous

    4.1. How much does Privoxy slow my browsing down? This -has to add extra time to browsing.

    How much of an impact depends on many things, including the CPU of the host system, how aggressive the configuration is, which specific actions are being triggered, @@ -120,15 +120,14 @@ TARGET="_top" >deanimate-gifs - actions will certainly cause a perceived slowdown, since the entire document + actions may cause a perceived slowdown, since the entire document needs to be buffered before displaying. And on very large documents, filtering may have some measurable impact. How much depends on the page size, the actual definition of the filter(s), etc. See below. Most other actions have little to no impact on speed.

    - Also, when filtering is enabled, typically there is a disabling of - compression, (see Also, when filtering is enabled but zlib support isn't available, compression + is often disabled (see prevent-compression4.2. I notice considerable -delays in page requests compared to the old Junkbuster. What's wrong?

    If you use any only knows how to differentiate filterable content because of the MIME type as reported by the server, or because of some configuration setting that enables/disables - filtering.

    4.3. What are "http://config.privoxy.org/" and -"http://p.p/"?

    web site at config.privoxy.org.

    With recent versions of Privoxy (version 2.9.x and - later), the user interface features information on the run time status, the - configuration, and even a built-in editor for the actions files.

    Note that the built-in URLs from earlier versions of Junkbuster - / Privoxy, http://example.com/show-proxy-args and http://i.j.b/, - are no longer supported. If you still use such an old version, you should really consider - upgrading to 3.0.6.

    4.4. How can I submit new ads, or report -problems?

    Please see the 4.5. If I do submit missed ads, will -they be included in future updates?

    Whether such submissions are eventually included in the 4.6. Why doesn't anyone answer my support -request?

    Rest assured that it has been read and considered. Why it is not answered, could be for various reasons, including no one has a good answer for it, no @@ -340,8 +317,8 @@ CLASS="SECT2" CLASS="SECT2" >4.7. How can I hide my IP address?4.7. How can I hide my IP address?

    If you run both the browser and

    However, these proxies are called "anonymous" because you don't need - a password, not because they would offer any real anonymity. + to authenticate, not because they would offer any real anonymity. Most of them will log your IP address and make it available to the authorities in case you violate the law of the country they run in. In fact you can't even rule out that some of them only exist to *collect* information @@ -385,7 +362,8 @@ TARGET="_top" >How do I use Privoxy together with together + with Tor section

    4.8. Can Privoxy guarantee I am anonymous?

    4.8. Can Privoxy guarantee I am anonymous?

    No. Your chances of remaining anonymous are greatly improved, but unless you Most of Privoxy's protection can be easily subverted +> privacy-enhancing features can be easily subverted by an insecure browser configuration, therefore you should use a browser that can be configured to only execute code from trusted sites, and be careful which sites you trust. For example there is no point in having

    4.9. A test site says I am not using a Proxy.

    4.9. A test site says I am not using a Proxy.

    Good! Actually, they are probably testing for some other kinds of proxies. Hiding yourself completely would require additional steps.

    4.10. How do I use Privoxy - together with Tor?

    Before you configure Privoxy to use Tor - ( to use + http://tor.eff.org/), +>Tor, please follow the User Manual

    If it is, refer to Tor's extensive documentationTor - to increase your anonymity level, therefore you should use socks4a, - to make sure Privoxy's DNS requests are + to increase your anonymity level, therefore you should use socks4a, to make sure DNS requests are done through Tor

    This is enough to reach the Internet, but additionally you should +> This is enough to reach the Internet, but additionally you might want to uncomment the following forward rules, to make sure your local network is still reachable through Privoxy:

    Unencrypted connections to systems in these address ranges will be as (un)secure as the local network is, but the alternative is - that you can't reach the network at all. - If you also want to be able to reach servers in your local - network by using their names, you will need additional - exceptions that look like this:

    If you want your browser to be able to reach servers in your local + network by using their names, you will need additional exceptions + that look like this:

    Tor Faq 4.2

    4.11. Might some things break because header information or -content is being altered?

    Definitely. It is common for sites to use browser type, browser version, HTTP header content, and various other techniques in order to dynamically @@ -737,14 +712,11 @@ content is being altered?

    The "User-Agent" is often used in this way to identify - the browser, and adjust content accordingly. Changing this now (at least not - further than removing the OS information) is not recommended, since so many - sites do look for it. You may get undesirable results by changing just this - one aspect.

    is sometimes used in this way to identify + the browser, and adjust content accordingly.

    Also, different browsers use different encodings of Russian and Czech characters, certain web servers convert pages on-the-fly according to the @@ -796,21 +768,26 @@ CLASS="SECT2" >

    4.12. Can Privoxy act as a "caching" proxy to -speed up web browsing?

    No, it does not have this ability at all. You want something like Squid for this. And, yes, - before you ask, or + Polipo for this. + And, yes, before you ask, Privoxy can co-exist @@ -835,17 +812,17 @@ CLASS="SECT2" >

    4.13. What about as a firewall? Can Privoxy protect me?

    4.13. What about as a firewall? Can Privoxy protect me?

    Not in the way you mean, or in the way a true firewall can. +> Not in the way you mean, or in the way some firewall vendors claim they can. Privoxy can help protect your privacy, but not - protect you from intrusion attempts. It is, of course, perfectly possible - and recommended to use can help protect your privacy, but can't + protect your system from intrusion attempts. It is, of course, perfectly possible + to use

    4.14. I have large empty spaces / a checkerboard pattern now where -ads used to be. Why?

    It is technically possible to eliminate banners and ads in a way that frees their allocated page space. This could easily be done by blocking with @@ -897,9 +874,9 @@ CLASS="SECT2" >

    4.15. How can Privoxy filter Secure (HTTPS) URLs?

    4.15. How can Privoxy filter Secure (HTTPS) URLs?

    Since secure HTTP connections are encrypted SSL sessions between your browser and the secure site, and are meant to be reliably

    4.16. Privoxy runs as a "server". How -secure is it? Do I need to take any special precautions?

    There are no known exploits that might affect - Privoxy. On Unix-like systems, - On Unix-like systems, Privoxy can run as a non-privileged - user, which is how we recommend it be run. Also, by default + user, which is how we recommend it be run. Also, by default Privoxy only listens to requests - from listens to requests from "localhost" only. The server aspect of - + only.

    The server aspect of Privoxy is not itself directly exposed to the - Internet in this configuration. If you want to have +> is not itself directly + exposed to the Internet in this configuration. If you want to have Privoxy4.17. How can I temporarily disable Privoxy?4.17. How can I temporarily disable Privoxy?

    The easiest way is to access 4.18. When "disabled" is Privoxy totally -out of the picture?

    No, this just means all filtering and actions are disabled. +> No, this just means all optional filtering and actions are disabled. Privoxy4.19. How can I tell Privoxy to totally ignore certain sites?4.19. How can I tell Privoxy to totally ignore certain sites?

    Bypassing a proxy, or proxying based on arbitrary criteria, is purely a browser configuration issue, not a 4.20. My logs show Privoxy "crunches""crunch"??

    A "crunch".

    Since version 3.0.7, Privoxy will also log the crunch reason. + If you are using an older version you might want to upgrade.

    4.21. Can Privoxy effect files that I download -from a webserver? FTP server?

    From the webserver's perspective, there is no difference between viewing a document (i.e. a page), and downloading a file. The same is true of @@ -1193,7 +1169,7 @@ CLASS="APPLICATION" > knows the differences in files according to the "Document Type""Content Type" as reported by the webserver. If this is reported accurately (e.g. In short, filtering is "ON" if a) the Document Type as reported +> if a) the content type as reported by the webserver is appropriate "bad". It's the configuration that let's it all happen or not.

    . It's the configuration that lets it all happen or not.

    If you download text files, you probably do not want these to be filtered, particularly if the content is source code, or other critical content. Source @@ -1278,9 +1254,9 @@ CLASS="SECT2" CLASS="SECT2" >4.22. I just downloaded a Perl script, and Privoxy -altered it! Yikes, what is wrong!

    Please read above.

    4.23. Should I continue to use a "HOSTS" file for ad-blocking? file for ad-blocking?

    One time-tested technique to defeat common ads is to trick the local DNS system by giving a phony IP address for the ad generator in the local @@ -1323,8 +1299,8 @@ CLASS="APPLICATION" CLASS="FILENAME" >HOSTS file, in fact, not only - duplicates effort, but may get in the way. It is recommended to remove - such entries from your HOSTS file. If you think @@ -1361,9 +1337,9 @@ CLASS="SECT2" CLASS="SECT2" >4.24. Where can I find more information about Privoxy -and related issues?

    Other references and sites of interest to http://www.squid-cache.org/, a very popular +>, a popular caching proxy, which is often used together with Privoxy

    http://www.pps.jussieu.fr/~jch/software/polipo/, + Polipo is a caching proxy with advanced features + like pipelining, multiplexing and caching of partial instances. In many setups + it can be used as Squid replacement. +

    +

    http://tor.eff.org/4.25. I've noticed that Privoxy changes "Microsoft""MicroSuck"! Why are you manipulating my browsing?! Why are you manipulating my browsing?

    We're not. The text substitutions that you are seeing are disabled in the default configuration as shipped. You have either manually @@ -1665,6 +1669,29 @@ CLASS="QUOTE" > profile in the web-based editor. Please upgrade!

    4.26. Does Privoxy produce "valid" HTML (or XHTML)?

    Privoxy generates HTML in both its own "templates", and possibly + whenever there are text substitutions via a Privoxy filter. While this + should always conform to the HTML 4.01 specifications, it has not been + validated against this or any other standard.