From: Fabian Keil Date: Mon, 22 Oct 2007 19:47:05 +0000 (+0000) Subject: - Bump version and copyright. X-Git-Tag: v_3_0_7~117 X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=commitdiff_plain;h=43f6e87f5d98bd4f1e0b74a96cf53dc3e5e6e397 - Bump version and copyright. - Adjust Tor section to make it clear that forward exceptions aren't required and may not even be desired. - A bunch of other minor rewordings. - Fix markup problems Roland noticed (hopefully without adding new ones). --- diff --git a/doc/source/faq.sgml b/doc/source/faq.sgml index 41c82046..883e7547 100644 --- a/doc/source/faq.sgml +++ b/doc/source/faq.sgml @@ -8,7 +8,7 @@ - + @@ -26,7 +26,7 @@ This file belongs into ijbswa.sourceforge.net:/home/groups/i/ij/ijbswa/htdocs/ - $Id: faq.sgml,v 2.25 2007/07/18 11:00:34 hal9 Exp $ + $Id: faq.sgml,v 2.26 2007/08/05 15:37:55 fabiankeil Exp $ Copyright (C) 2001-2007 Privoxy Developers http://privoxy.org See LICENSE. @@ -72,12 +72,12 @@ - Copyright &my-copy; 2001-2006 by - Privoxy Developers + Copyright &my-copy; 2001-2007 by + Privoxy Developers -$Id: faq.sgml,v 2.25 2007/07/18 11:00:34 hal9 Exp $ +$Id: faq.sgml,v 2.26 2007/08/05 15:37:55 fabiankeil Exp $ @@ -1675,7 +1664,7 @@ us help you. Your efforts are not wasted, and we do appreciate them. configuration and chained it with Tor. - Most of Privoxy's protection can be easily subverted + Most of Privoxy's privacy-enhancing features can be easily subverted by an insecure browser configuration, therefore you should use a browser that can be configured to only execute code from trusted sites, and be careful which sites you trust. For example there is no point in having Privoxy @@ -1738,8 +1727,7 @@ us help you. Your efforts are not wasted, and we do appreciate them. are working, it is time to connect them. As far as Privoxy is concerned, Tor is just another proxy that can be reached by socks4 or socks4a. Most likely you are interested in Tor - to increase your anonymity level, therefore you should use socks4a, - to make sure DNS requests are + to increase your anonymity level, therefore you should use socks4a, to make sure DNS requests are done through Tor and thus invisible to your local network. @@ -1759,7 +1747,7 @@ us help you. Your efforts are not wasted, and we do appreciate them. - This is enough to reach the Internet, but additionally you should + This is enough to reach the Internet, but additionally you might want to uncomment the following forward rules, to make sure your local network is still reachable through Privoxy: @@ -1773,10 +1761,15 @@ us help you. Your efforts are not wasted, and we do appreciate them. Unencrypted connections to systems in these address ranges will be as (un)secure as the local network is, but the alternative is - that you can't reach the network at all. - If you also want to be able to reach servers in your local - network by using their names, you will need additional - exceptions that look like this: + that your browser can't reach the network at all. Then again, + that may actually be desired and if you don't know for sure + that your browser has to be able to reach the local network, + there's no reason to allow it. + + + If you want your browser to be able to reach servers in your local + network by using their names, you will need additional exceptions + that look like this: @@ -1868,9 +1861,9 @@ speed up web browsing? What about as a firewall? Can Privoxy protect me? - Not in the way you mean, or in the way a true firewall can. - Privoxy can help protect your privacy, but not - protect you from intrusion attempts. It is, of course, perfectly possible + Not in the way you mean, or in the way some firewall vendors claim they can. + Privoxy can help protect your privacy, but can't + protect your system from intrusion attempts. It is, of course, perfectly possible to use both. @@ -1940,14 +1933,14 @@ ads used to be. Why? Privoxy runs as a <quote>server</quote>. How secure is it? Do I need to take any special precautions? - There are no known exploits that might affect - Privoxy. On Unix-like systems, - Privoxy can run as a non-privileged - user, which is how we recommend it be run. Also, by default - Privoxy only listens to requests - from localhost only. The server aspect of - Privoxy is not itself directly exposed to the - Internet in this configuration. If you want to have + On Unix-like systems, Privoxy can run as a non-privileged + user, which is how we recommend it be run. Also, by default + Privoxy listens to requests from localhost + only. + + + The server aspect of Privoxy is not itself directly + exposed to the Internet in this configuration. If you want to have Privoxy serve as a LAN proxy, this will have to be opened up to allow for LAN requests. In this case, we'd recommend you specify only the LAN gateway address, e.g. 192.168.1.1, in the main @@ -1978,7 +1971,7 @@ secure is it? Do I need to take any special precautions? When <quote>disabled</quote> is Privoxy totally out of the picture? - No, this just means all filtering and actions are disabled. + No, this just means all optional filtering and actions are disabled. Privoxy is still acting as a proxy, but just not doing any of the things that Privoxy would normally be expected to do. It is still a middle-man in @@ -2011,6 +2004,10 @@ ads, but also its own internal CGI pages. What is a crunch?crunch. + + Since version 3.0.7, Privoxy will also log the crunch reason. + If you are using an older version you might want to upgrade. + @@ -2036,7 +2033,7 @@ from a webserver? FTP server? Privoxy knows the differences in files according - to the Document Type as reported by the webserver. If this is + to the Content Type as reported by the webserver. If this is reported accurately (e.g. application/zip for a zip archive), then Privoxy knows to ignore these where appropriate. Privoxy potentially can filter HTML @@ -2053,11 +2050,11 @@ from a webserver? FTP server? did filter this document type. - In short, filtering is ON if a) the Document Type as reported + In short, filtering is ON if a) the content type as reported by the webserver is appropriate and b) the configuration allows it (or at least does not disallow it). That's it. There is no magic cookie anywhere to say this is good and this is - bad. It's the configuration that let's it all happen or not. + bad. It's the configuration that lets it all happen or not. If you download text files, you probably do not want these to be filtered, @@ -2096,8 +2093,8 @@ altered it! Yikes, what is wrong! Privoxy. Privoxy does essentially the same thing, much more elegantly and with much more flexibility. A large HOSTS file, in fact, not only - duplicates effort, but may get in the way. It is recommended to remove - such entries from your HOSTS file. If you think + duplicates effort, but may get in the way and seriously slow down your system. + It is recommended to remove such entries from your HOSTS file. If you think your hosts list is neglected by Privoxy's configuration, consider adding your list to your user.action file: @@ -2570,7 +2567,7 @@ Why? This may also be caused by the demoronizer filter, - in conjunction with a web server that is misreporting a file type. Binary + in conjunction with a web server that is misreporting the content type. Binary files are exempted from Privoxy's filtering (unless the web server by mistake says the file is something else). Either upgrade Privoxy, or go to the most recent @@ -2777,6 +2774,16 @@ browsing has slowed to a crawl. What gives? 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA $Log: faq.sgml,v $ +Revision 2.26 2007/08/05 15:37:55 fabiankeil +- Don't claim that thousands of people read our code. +- Specify the GPL version and link to GPLv2 instead of v3. +- Note that configuration syntax may change between releases. +- Mention zlib support. +- Answer the "transparent proxy" question properly. +- Add "intercepting proxy" entry. +- Mention Polipo. +- Rephrase some other sentences for various reasons. + Revision 2.25 2007/07/18 11:00:34 hal9 Add misc note about valid mark-up in Privoxy.