From: hal9 Date: Fri, 8 Sep 2006 23:05:08 +0000 (+0000) Subject: Fix broken links. Add faq on hosts files. Move most of new windows service X-Git-Tag: v_3_0_5~66 X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=commitdiff_plain;h=3e4ba811334a67a1c6b150620ea7ff68d229ae50 Fix broken links. Add faq on hosts files. Move most of new windows service feature to user manual and reference in faq. Various other small changes. --- diff --git a/doc/source/faq.sgml b/doc/source/faq.sgml index 1f05afdc..456011e2 100644 --- a/doc/source/faq.sgml +++ b/doc/source/faq.sgml @@ -24,7 +24,7 @@ This file belongs into ijbswa.sourceforge.net:/home/groups/i/ij/ijbswa/htdocs/ - $Id: faq.sgml,v 2.13 2006/09/04 19:20:33 fabiankeil Exp $ + $Id: faq.sgml,v 2.14 2006/09/05 13:25:12 david__schmidt Exp $ Copyright (C) 2001-2006 Privoxy Developers See LICENSE. @@ -75,7 +75,7 @@ -$Id: faq.sgml,v 2.13 2006/09/04 19:20:33 fabiankeil Exp $ +$Id: faq.sgml,v 2.14 2006/09/05 13:25:12 david__schmidt Exp $ Preferences --> Advanced --> Cache and then click both Clear Memory Cache and Clear Disk Cache. + And, Firefox users would click + Tools --> Options --> + Privacy --> Cache and + then click Clear Cache Now. + @@ -600,14 +611,16 @@ All the ads are there. What's wrong? Can I use my old config files? - The syntax, number, and purpose of configuration files has substantially - changed from Junkbuster and early versions - of Privoxy. The old files, like blocklist - will not work at all. If you are upgrading from a 2.0.x version, you will - need to port your configuration data to the new format. Note that even the - pattern syntax has changed! Even configuration files from the 2.9.x versions - will need to be adapted, as configuration syntax has been very much in flow - in the 2.9.x series. + The syntax and purpose of configuration files has remained the same + throughout the 3.x series. Although each release contains updated, + improved versions and it is recommended to use the newer + configuration files. + + + But all configuration files have substantially + changed from the Junkbuster days, and early + versions of Privoxy 2.x. The old files, like + blocklist will not work at all. Refer to the What's New @@ -621,9 +634,11 @@ All the ads are there. What's wrong? Actions files are where various actions - that Privoxy might take while processing a certain + that Privoxy could take while processing a certain request, are configured. Typically, you would define a set of default actions that apply to all URLs, then add exceptions to these defaults where needed. + There is a wide array of actions available that give the user a high degree + of control and flexibility on how to process each and every web page. @@ -937,39 +952,12 @@ instead of the checkerboard image. Why and how do I get rid of this? Can <application>Privoxy</application> run as a service -on Win2K/NT? - - - Version 3.0.4 introduces full Windows service functionality. - On Windows only, the Privoxy program has two new command line arguments - to install and uninstall Privoxy as a service. - - - Arguments: - - - --install[:service_name] - - - - - --uninstall[:service_name] - - - - - +on Win2K/NT/XP? - After invoking Privoxy with --install, - you will need to bring up the Windows service console to assign the user you - want Privoxy to run under, and whether or not you want it to run whenever the - system starts. You can start the Windows services console with the following command: - services.msc If you do not take the manual step of modifying - Privoxy's service settings, it will not start. Note too that you will need to - give Privoxy a user account that actually exists, or it will not be permitted to - write its log files. + Yes. Version 3.0.4 introduces full Windows service + functionality. See + the User Manual for details on how to install and configure + Privoxy as a service. Earlier versions could run as a system service using srvany.exe. @@ -977,16 +965,12 @@ New check this hal url="http://sourceforge.net/tracker/?func=detail&atid=361118&aid=485617&group_id=11118">http://sourceforge.net/tracker/?func=detail&atid=361118&aid=485617&group_id=11118, for details, and a sample configuration. - - Version 3.0.1 fixed the problem where the icon and menu where not available - in the taskbar for this usage. - How can I make <application>Privoxy</application> work with other -proxies like <application>Squid</application> or <application>TOR</application>? +proxies like Squid or Tor? This can be done and is often useful to combine the benefits of Privoxy with those of a another proxy. @@ -1013,7 +997,7 @@ and thus avoid individual browser configuration? proxy? No, Privoxy currently does not have this ability, - though it is planned for a future release. Transparent proxies require + though it may be added in a future release. Transparent proxies require special handling of the request headers beyond what Privoxy is now capable of. @@ -1025,7 +1009,7 @@ and thus avoid individual browser configuration? url="../user-manual/config.html#FORWARDING">forwarding chapter in the user manual. As a transparent proxy to be used for chaining we recommend Transproxy - (http://www.transproxy.nlc.net.au/). + (http://transproxy.sourceforge.net/). @@ -1157,7 +1141,8 @@ and thus avoid individual browser configuration? has to add extra time to browsing. How much of an impact depends on many things, including the CPU of the host - system, how agressive the configuration is, which specific actions are being triggered, etc. + system, how agressive the configuration is, which specific actions are being triggered, + the size of the page, etc. Overall, it should not slow you down any in real terms, and may actually help @@ -1173,16 +1158,17 @@ has to add extra time to browsing. url="../user-manual/actions-file.html#FILTER">filter or deanimate-gifs - actions will cause a perceived slowdown, since the entire document needs to be buffered - before displaying. On very large documents, there may be some impact. How - much depends on the page size, the actual definition of the filter(s), etc. See below. - Most other actions have little to no impact on speed. + actions will certainly cause a perceived slowdown, since the entire document + needs to be buffered before displaying. And on very large documents, there may be + some impact. How much depends on the page size, the actual definition of the + filter(s), etc. See below. Most other actions have little to no impact on + speed. -I noticed considerable +<sect2 renderas="sect3" id="loadingtimes"><title>I notice considerable delays in page requests compared to the old Junkbuster. What's wrong? If you use any the feeling is different, because most browsers are able to start rendering incomplete content, giving the user a feeling of "it works". This effect is more noticeable on slower dialup connections. Extremely large documents - may have some impact on the time to load the page. But the overall difference - should be very minimal. If there is a big impact, then probably some other - problem is contributing. + may have some impact on the time to load the page where there is filtering + being done. But overall, the difference should be very minimal. If there is a + big impact, then probably some other problem is contributing. Filtering is automatically disabled for inappropriate MIME types. But note @@ -1296,8 +1282,8 @@ us help you. Your efforts are not wasted, and we do appreciate them. If you run both the browser and the proxy locally, you cannot hide your IP address with Privoxy or ultimately any other - software. The server needs to know your IP address to send the answers back - to you. + software. The server needs to know your IP address so that it knows where to + send the responses back. There are many publicly usable "anonymous" proxies out there, which @@ -1451,7 +1437,7 @@ us help you. Your efforts are not wasted, and we do appreciate them. and that there are no other forward lines, unless you know that you need them. I everything looks good, refer to Tor - Faq 4.2 to learn how to verify that you are really using Tor. + Faq 4.2 to learn how to verify that you are really using Tor. Afterwards, please take the time to at least skim through the rest @@ -1530,27 +1516,6 @@ speed up web browsing? - - I have large empty spaces / a checkerboard pattern now where ads used to be. Why? @@ -1657,7 +1622,7 @@ out of the picture? My logs show <application>Privoxy</application> <quote>crunches</quote> -ads, but also its own CGI pages. What is a <quote>crunch</quote>? +ads, but also its own internal CGI pages. What is a crunch? A crunch simply means Privoxy intercepted something, nothing more. Often this is indeed ads or @@ -1706,7 +1671,7 @@ from a webserver? FTP server? altered by filtering, will be saved too, for these (probably rare) cases. - Note that versions later than 3.0.2 do NOT filter document types of + Note that versions later than 3.0.2 do NOT filter document types reported as text/plain. Prior to this, Privoxy did filter this document type. @@ -1729,7 +1694,7 @@ from a webserver? FTP server? Privoxy does not do FTP at all, only HTTP - protocols, so please don't even try. + protocols, so please don't try. @@ -1741,6 +1706,33 @@ altered it! Yikes, what is wrong! + +Should I continue to use a <quote>HOSTS</quote> file for ad-blocking? + + One time-tested technique to defeat common ads is to trick the local DNS + system by giving a phony IP address for the ad generator in the local + HOSTS file, typically using 127.0.0.1, aka + localhost. This effectively blocks the ad. + + + There is no reason to use this technique in conjunction with + Privoxy. Privoxy + does essentially the same thing, much more elegantly and with much more + flexibility. A large HOSTS file, in fact, not only + duplicates effort, but may get in the way. It is recommended to remove + such entries from your HOSTS file. If you think + your hosts list is neglected by Privoxy's + configuration, consider adding your list to your user.action file: + + + + { +block } + www.ad.example1.com + ad.example2.com + ads.galore.example.com + etc.example.com + + Where can I find more information about <application>Privoxy</application> @@ -1791,7 +1783,7 @@ with every web page? - Early Privoxy versions (and also + Early Privoxy 2.x versions (and also Junkbuster) used port 8000 by default. This has been changed to port 8118 now, due to a conflict with NAS (Network Audio Service), which uses port 8000. If you haven't, @@ -1944,10 +1936,12 @@ every time I start IE. What gives? To complicate matters, some systems may have a generic proxy - setting, which will silently enable both HTTP and FTP - proxying! So it is possible to accidentally enable FTP proxying in these - cases. And of course, if this happens, Privoxy - will indeed cause problems since it does not know FTP. + setting, which will silently various protocols, including + both HTTP and FTP proxying! So it is possible to + accidentally enable FTP proxying in these cases. And of course, if this + happens, Privoxy will indeed cause problems since + it does not know FTP. Newer version will give a sane error message if a FTP + connection is attempted. Will Privoxy ever proxy FTP traffic? Unlikely. @@ -2282,6 +2276,9 @@ Why? Temple Place - Suite 330, Boston, MA 02111-1307, USA. $Log: faq.sgml,v $ +Revision 2.14 2006/09/05 13:25:12 david__schmidt +Add Windows service invocation stuff (duplicated) in FAQ and in user manual under Windows startup. One probably ought to reference the other. + Revision 2.13 2006/09/04 19:20:33 fabiankeil Adjusted anonymity related sections to match reality. Added a section about using Privoxy with Tor. diff --git a/doc/webserver/faq/configuration.html b/doc/webserver/faq/configuration.html index 03cc9b6e..314cacb8 100644 --- a/doc/webserver/faq/configuration.html +++ b/doc/webserver/faq/configuration.html @@ -119,23 +119,28 @@ NAME="NEWCONFIG" >3.2. Can I use my old config files?

The syntax, number, and purpose of configuration files has substantially - changed from The syntax and purpose of configuration files has remained the same + throughout the 3.x series. Although each release contains updated, + "improved" versions and it is recommended to use the newer + configuration files. +

But all configuration files have substantially + changed from the Junkbuster and early versions - of days, and early + versions of Privoxy. The old files, like Privoxy 2.x. The old files, like + blocklist - will not work at all. If you are upgrading from a 2.0.x version, you will - need to port your configuration data to the new format. Note that even the - pattern syntax has changed! Even configuration files from the 2.9.x versions - will need to be adapted, as configuration syntax has been very much in flow - in the 2.9.x series. +> will not work at all.

Refer to the

3.3. What is an Privoxy might take while processing a certain +> could take while processing a certain request, are configured. Typically, you would define a set of default actions - that apply to all URLs, then add exceptions to these defaults where needed.

Actions can be defined on a

3.5. How are actions files configured? What is the easiest way to do this?

3.6. There are several different

3.10. What is the

3.11. How can I set up

3.12. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.

3.13. Why would anybody want to see a checkerboard pattern?

3.14. I see some images being replaced by a text instead of the checkerboard image. Why and how do I get rid of this?

Privoxy
run as a service -on Win2K/NT?

Yes. Version 3.0.4 introduces full Windows service + functionality. See the User Manual for details on how to install and configure + Privoxy as a service.

Earlier versions could run as a system service using http://sourceforge.net/tracker/?func=detail&atid=361118&aid=485617&group_id=11118, for details, and a sample configuration.

Version 3.0.1 fixes the problem where the icon and menu where not available - in the taskbar for this usage.

Version 3.0.4, introduces full Windows service functionality, thus elimating - the srvany.exe requirement.

Squid or TORTor?

This can be done and is often useful to combine the benefits of @@ -960,7 +972,7 @@ CLASS="QUOTE" CLASS="APPLICATION" >Privoxy currently does not have this ability, - though it is planned for a future release. Transparent proxies require + though it may be added in a future release. Transparent proxies require special handling of the request headers beyond what . As a transparent proxy to be used for chaining we recommend Transproxy (http://www.transproxy.nlc.net.au/http://transproxy.sourceforge.net/).

7.1. License

7.2. History

1.10. I would like to help you, what do I do?

1.10.1. Contribute!

We, of course, welcome donations and could use money for domain registering, - buying software to test Privoxy with, and, of course, - for regular world-wide get-togethers (hahaha). If you enjoy the software and feel - like helping us with a donation, just drop us a note.

1.10.2. Software

If you are a vendor of a web-related software like a browser, web server - or proxy, and would like us to ensure that Privoxy - runs smoothly with your product, you might consider supplying us with a - copy or license. We can't, however, guarantee that we will fix all potential - compatibility issues as a result.

1.10. I would like to help you, what can I do?

1.10.3. Would you like to participate?

1.10.1. Would you like to participate?

Well, helping the team is always a good idea. We welcome new developers, - packagers, testers, documentation writers or really anyone with a desire to help in - any way. You - Well, we always need help. There is something for + everybody who wants to help us. We welcome new developers, packagers, + testers, documentation writers or really anyone with a desire to help in + any way. You DO NOT need to be a need to be a + "programmer". There - are many other tasks available. In fact, the programmers often can't spend - as much time programming because of some of the other, more mundane things - that need to be done, like checking the Tracker feedback sections. +>. There are many other tasks available. In fact, + the programmers often can't spend as much time programming because of some + of the other, more mundane things that need to be done, like checking the + Tracker feedback sections.

So first thing, , and together we'll find a suitable task for you.

1.10.2. Contribute!

We, of course, welcome donations and could use money for domain registering, + buying software to test Privoxy with, and, of course, + for regular world-wide get-togethers (hahaha). If you enjoy the software and feel + like helping us with a donation, just drop us a note.

1.10.3. Software

If you are a vendor of a web-related software like a browser, web server + or proxy, and would like us to ensure that Privoxy + runs smoothly with your product, you might consider supplying us with a + copy or license. We can't, however, guarantee that we will fix all potential + compatibility issues as a result.


$Id: faq.sgml,v 2.11 2006/07/18 14:48:50 david__schmidt Exp $

$Id: faq.sgml,v 2.14 2006/09/05 13:25:12 david__schmidt Exp $

1.10. I would like to help you, what do I do?I would like to help you, what can I do?
1.10.1. Contribute!Would you like to participate?
1.10.2. SoftwareContribute!
1.10.3. Would you like to participate?Software
2.5. I just installed Privoxy
3.3. What is an "actions"
3.5. How are actions files configured? What is the easiest way to do this?
3.6. There are several different "actions"
3.10. What is the default.filter
3.11. How can I set up Privoxy
3.12. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.
3.13. Why would anybody want to see a checkerboard pattern?
3.14. I see some images being replaced by a text instead of the checkerboard image. Why and how do I get rid of this?
Privoxy run as a service -on Win2K/NT?
3.16. Squid or TORTor?
4.1. How much does Privoxy
4.2. I noticed considerable +>I notice considerable delays in page requests compared to the old Junkbuster. What's wrong?
4.8. Can Privoxy
4.9. How do I use Privoxy + together with Tor?
4.10. Might some things break because header information or content is being altered?
4.10. 4.11. Can Privoxy
4.11. 4.12. What about as a firewall? Can Privoxy protect me?
4.12. 4.13. I have large empty spaces / a checkerboard pattern now where ads used to be. Why?
4.13. 4.14. How can Privoxy filter Secure (HTTPS) URLs?
4.14. 4.15. Privoxy
4.15. 4.16. How can I temporarily disable ?
4.16. 4.17. When
4.17. 4.18. My logs show "crunches" -ads, but also its own CGI pages. What is a "crunch"?
4.18. 4.19. Can
4.19. 4.20. I just downloaded a Perl script, and
4.20. 4.21. Should I continue to use a "HOSTS" file for ad-blocking?
4.22. Where can I find more information about
4.21. 4.23. I've noticed that Privoxy changes
5.1. I am getting "connection refused"
5.2. I just added a new rule, but the steenkin ad is still getting through. How?
7.1. License
7.2. History
?

Any browser that can be configured to use a proxy, which - should be virtually all browsers. Direct browser support is not necessary - since Firefox, Internet + Explorer, and Opera among others. + Direct browser support is not an absolute requirement since + Privoxy runs as a separate application and - talks to the browser in the standardized HTTP protocol, just like a web server +> runs as a separate application and talks + to the browser in the standardized HTTP protocol, just like a web server does.

2.5. I just installed Privoxy does not currently handle - any other protocols such as FTP, SMTP, IM, IRC, ICQ, etc. + any other protocols such as FTP, SMTP, IM, IRC, ICQ, etc. Be sure that + proxying any of these other protocols is not activated.

The procedure for clearing the cache varies from browser to browser. As an +> The procedure for clearing the cache varies from browser to browser. For example, MozillaMozilla/Netscape users would click Clear Disk Cache".

. + And, Firefox users would click + Tools --> Options --> + Privacy --> Cache and + then click "Clear Cache Now".

4.1. How much does

How much of an impact depends on many things, including the CPU of the host - system, how agressive the configuration is, which specific actions are being triggered, etc.

Overall, it should not slow you down any in real terms, and may actually help speed things up since ads, banners and other junk are not typically being displayed. @@ -121,10 +122,11 @@ TARGET="_top" >deanimate-gifs - actions will cause a perceived slowdown, since the entire document needs to be buffered - before displaying. On very large documents, there may be some impact. How - much depends on the page size, the actual definition of the filter(s), etc. See below. - Most other actions have little to no impact on speed.

4.2. I noticed considerable +>4.2. I notice considerable delays in page requests compared to the old Junkbuster. What's wrong?

If you use any

Filtering is automatically disabled for inappropriate MIME types. But note @@ -323,41 +325,52 @@ NAME="IP" CLASS="APPLICATION" >Privoxy or ultimately any other - software. The server needs to know your IP address to send the answers back - to you.

Fortunately there are many publicly usable anonymous proxies out there, which - solve the problem by providing a further level of indirection between you and - the web server, shared by many people, and thus letting your requests "drown" - in white noise of unrelated requests as far as user tracking is concerned.

There are many publicly usable "anonymous" proxies out there, which + provide a further level of indirection between you and the web server.

Most of them will, however, log your IP address and make it available to the - authorities in case you abuse that anonymity for criminal purposes. In fact +> However, these proxies are called "anonymous" because you don't need + a password, not because they would offer any real anonymity. + Most of them will log your IP address and make it available to the + authorities in case you violate the law of the country they run in. In fact you can't even rule out that some of them only exist to *collect* information on (those suspicious) people with a more than average preference for privacy.

You can find a list of anonymous public proxies at Your best bet is to chain Privoxy + with multiproxy.org and many - more through Google. A particularly interesting project is the JAP service - offered by the Technical University of Dresden (Tor, + an http://anon.inf.tu-dresden.de/index_en.html).

There is, however, even in the single-machine case the possibility to make the - server believe that your machine is in fact a shared proxy serving a large - LAN, and we are looking into that.

EFF supported onion routing system. + The configuration details can be found in + How do I use Privoxy together with Tor?.

4.8. Can guarantee I am anonymous?

No. Your chances of remaining anonymous are greatly improved, but unless you - are an expert on Internet security it would be safest to assume that - everything you do on the Web can be traced back to you.

chain Privoxy with Tor + or a similar system and know what you're doing when it comes to configuring + the rest of your system, it would be safest to assume that everything you do + on the Web can be traced back to you.

you more freedom to decide which sites - you can trust, and what details you want to reveal. But it's still possible - that web sites can find out who you are. Here's one way this can happen.

Privoxy + configuration and chained it with Tor.

Most of Privoxy's protection can be easily subverted + by an insecure browser configuration, therefore you should use a browser that can + be configured to only execute code from trusted sites, and be careful which sites you trust. + For example there is no point in having Privoxy + modify the User-Agent header, if websites can get all the information they want + through JavaScript, ActiveX, Flash, Java etc.

A few browsers disclose the user's email address in certain situations, such as when transferring a file by FTP.

4.9. How do I use Privoxy + together with Tor?

Before you configure Privoxy to use Tor + (http://tor.eff.org/), + please follow the User Manual chapters + 2. Installation and + 5. Startup to make sure + Privoxy itself is setup correctly.

+ If it is, refer to Tor's + extensive documentation to learn how to install Tor, + and make sure Tor's logfile says that + "Tor has successfully opened a circuit" and it + "[l]ooks like client functionality is working".

If either Tor or Privoxy + isn't working, their combination most likely will neither. Testing them on their + own will also help you to direct problem reports to the right audience. + If Privoxy isn't working, don't bother the + Tor developers. If Tor + isn't working, don't send bug reports to the Privoxy Team.

If you verified that Privoxy and Tor + are working, it is time to connect them. As far as Privoxy + is concerned, Tor is just another proxy that can be reached + by socks4 or socks4a. Most likely you are interested in Tor + to increase your anonymity level, therefore you should use socks4a, + to make sure Privoxy's DNS requests are + done through Tor and thus invisible to your local network.

Since Privoxy 3.0.4, its configuration (section 5.2) + is already prepared for Tor, if you are using a + default Tor configuration and run it on the same + system as Privoxy, you just have to uncomment the line:

#        forward-socks4a             /     127.0.0.1:9050 .
+ 

This is enough to reach the internet, but additionally you should + uncomment the following forward rules, to make sure your local network is still + reachable through Privoxy:

#        forward         192.168.*.*/     .
+#        forward            10.*.*.*/     .
+#        forward           127.*.*.*/     .
+ 

Unencrypted connections to systems in these address ranges will + be as (un)secure as the local network is, but the alternative is + that you can't reach the network at all. + If you also want to be able to reach servers in your local + network by using their names, you will need additional + exceptions that look like this:

#        forward           localhost/     .
+ 

Save the modified configuration file and open + http://config.privoxy.org/show-status/ + in your browser, confirm that Privoxy has reloaded its configuration + and that there are no other forward lines, unless you know that you need them. I everything looks good, + refer to + Tor + Faq 4.2 to learn how to verify that you are really using Tor.

Afterwards, please take the time to at least skim through the rest + of Tor's documentation. Make sure you understand + what Tor does, why it is no replacement for + application level security, and why you shouldn't use it for unencrypted logins.

4.9. Might some things break because header information or +>4.10. Might some things break because header information or content is being altered?

Definitely. More and more sites use HTTP header content to decide what to @@ -456,9 +729,9 @@ CLASS="SECT2" >

4.10. Can 4.11. Can Privoxy act as a

4.11. What about as a firewall? Can 4.12. What about as a firewall? Can Privoxy protect me?

4.12. I have large empty spaces / a checkerboard pattern now where +>4.13. I have large empty spaces / a checkerboard pattern now where ads used to be. Why?

It would be technically possible eliminate the banners in a way that frees @@ -549,9 +822,9 @@ CLASS="SECT2" >

4.13. How can 4.14. How can Privoxy filter Secure (HTTPS) URLs?

4.14. 4.15. Privoxy runs as a 4.15. How can I temporarily disable 4.16. How can I temporarily disable Privoxy?

4.16. When 4.17. When "disabled" is 4.17. My logs show 4.18. My logs show Privoxy "crunches" -ads, but also its own CGI pages. What is a "crunch"?

4.18. Can 4.19. Can Privoxy effect files that I download @@ -870,7 +1143,7 @@ CLASS="QUOTE" that is intended to be saved to disk, then any content that might have been altered by filtering, will be saved too, for these (probably rare) cases.

Note that versions later than 3.0.2 do NOT filter document types of +> Note that versions later than 3.0.2 do NOT filter document types reported as "text/plain"Privoxy does not do FTP at all, only HTTP - protocols, so please don't even try.

4.19. I just downloaded a Perl script, and 4.20. I just downloaded a Perl script, and Privoxy @@ -945,9 +1218,80 @@ CLASS="SECT2" >

4.21. Should I continue to use a "HOSTS" file for ad-blocking?

One time-tested technique to defeat common ads is to trick the local DNS + system by giving a phony IP address for the ad generator in the local + HOSTS file, typically using 127.0.0.1, aka + localhost. This effectively blocks the ad.

There is no reason to use this technique in conjunction with + Privoxy. Privoxy + does essentially the same thing, much more elegantly and with much more + flexibility. A large HOSTS file, in fact, not only + duplicates effort, but may get in the way. It is recommended to remove + such entries from your HOSTS file. If you think + your hosts list is neglected by Privoxy's + configuration, consider adding your list to your user.action file:

  { +block }
+   www.ad.example1.com
+   ad.example2.com
+   ads.galore.example.com
+   etc.example.com

4.20. Where can I find more information about 4.22. Where can I find more information about Privoxy @@ -1069,13 +1413,14 @@ BORDER="0" > http://www.privoxy.org/actions/http://sourceforge.net/tracker/?group_id=11118&atid=460288, to submit "misses" to the developers. +> and other + configuration related suggestions to the developers. http://privacy.net/analyze/http://privacy.net/, a useful site to check what information about you is leaked while you browse the web. http://tor.eff.org/, + TOR can help anonymize web browsing, + web publishing, instant messaging, IRC, SSH, and other applications. +

+

http://www.privoxy.org/developer-manual/4.21. I've noticed that Privoxy changes 4.23. I've noticed that Privoxy changes "Microsoft" to @@ -1221,15 +1590,12 @@ CLASS="LITERAL" CLASS="QUOTE" >"Text replacements for subversive browsing fun!" or you have implicitly activated it by choosing the - or you are using an older Privoxy version and have implicitly + activated it by choosing the "Adventuresome" profile in the web-based editor (formerly known - as the Advanced profile).

profile in the + web-based editor.

5.1. I am getting Early Privoxy versions (and also +> 2.x versions (and also Junkbuster

5.2. I just added a new rule, but the steenkin ad is still getting through. How?

"proxy"
- setting, which will silently enable both HTTP and FTP - proxying! So it is possible to accidentally enable FTP proxying in these - cases. And of course, if this happens, HTTP and FTP proxying! So it is possible to + accidentally enable FTP proxying in these cases. And of course, if this + happens, Privoxy - will indeed cause problems since it does not know FTP. +> will indeed cause problems since + it does not know FTP. Newer version will give a sane error message if a FTP + connection is attempted.

Will