From: hal9 Date: Sat, 14 Oct 2006 20:33:10 +0000 (+0000) Subject: Three new FAQ's re: templates and blocking, and various minor touch-ups/improvements. X-Git-Tag: v_3_0_6~40 X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=commitdiff_plain;h=765008e5d1851f7e9fadf9e077516422a86f0936 Three new FAQ's re: templates and blocking, and various minor touch-ups/improvements. --- diff --git a/doc/source/faq.sgml b/doc/source/faq.sgml index 566b59a8..033780f4 100644 --- a/doc/source/faq.sgml +++ b/doc/source/faq.sgml @@ -26,7 +26,7 @@ This file belongs into ijbswa.sourceforge.net:/home/groups/i/ij/ijbswa/htdocs/ - $Id: faq.sgml,v 2.20 2006/09/26 10:12:37 fabiankeil Exp $ + $Id: faq.sgml,v 2.21 2006/10/03 14:40:51 fabiankeil Exp $ Copyright (C) 2001-2006 Privoxy Developers http://privoxy.org See LICENSE. @@ -77,7 +77,7 @@ -$Id: faq.sgml,v 2.20 2006/09/26 10:12:37 fabiankeil Exp $ +$Id: faq.sgml,v 2.21 2006/10/03 14:40:51 fabiankeil Exp $ Configuration - -Where can I get updated Actions Files? - - Based on your feedback and the continuing development, updates of - default.action will be - made available from time to time on the files section of - our project page. - - - - If you wish to receive an email notification whenever we release updates of - Privoxy or the actions file, subscribe - to our announce mailing list, ijbswa-announce@lists.sourceforge.net. - - - - -Can I use my old config files? - - The syntax and purpose of configuration files has remained the same - throughout the 3.x series. Although each release contains updated, - improved versions and it is recommended to use the newer - configuration files. - fast-redirects - has changed. See the What's New section - of the User Manual for details.]]> - - - But all configuration files have substantially - changed from the Junkbuster days, and early - versions of Privoxy 2.x. The old files, like - blocklist will not work at all. - - - Refer to the What's New - page for information on configuration changes that may occur from one release to another. - ]]> - - What exactly is an <quote>actions</quote> file? + &my-app; utilizes the concept of + actions + that are used to manipulate and control web page data. Actions files - are where various actions + are where these actions that Privoxy could take while processing a certain request, are configured. Typically, you would define a set of default actions - that apply to all URLs, then add exceptions to these defaults where needed. + that apply globally to all URLs, then add exceptions to these defaults where needed. There is a wide array of actions available that give the user a high degree of control and flexibility on how to process each and every web page. @@ -750,8 +714,8 @@ some of these actions. For a comprehensive discussion of the actions concept, please refer to the actions file - chapter in the user - manual. It includes a in the User + Manual. It includes a list of all actions and an actions file tutorial to get you started. @@ -779,12 +743,12 @@ way to do this? There are several different <quote>actions</quote> files. What are the differences? - As of Privoxy v2.9.15, three actions files - are being included, to be used for + Three actions files + are being included by the developers, to be used for different purposes: These are default.action, the main actions file which is actively maintained by the Privoxy - developers, user.action, where users are encouraged + developers and typically sets the default policies, user.action, where users are encouraged to make their private customizations, and standard.action, which is for internal Privoxy use only. Please see the actions chapter @@ -801,6 +765,47 @@ the differences? +Where can I get updated Actions Files? + + Based on your feedback and the continuing development, updates of + default.action will be + made available from time to time on the files section of + our project page. + + + + If you wish to receive an email notification whenever we release updates of + Privoxy or the actions file, subscribe + to our announce mailing list, ijbswa-announce@lists.sourceforge.net. + + + + +Can I use my old config files? + + The syntax and purpose of configuration files has remained the same + throughout the 3.x series. Although each release contains updated, + improved versions and it is recommended to use the newer + configuration files. + fast-redirects + has changed. See the What's New section + of the User Manual for details.]]> + + + But all configuration files have substantially + changed from the Junkbuster days, and early + versions of Privoxy 2.x. The old files, like + blocklist will not work at all. + + + Refer to the What's New + page for information on configuration changes that may occur from one release to another. + ]]> + + How can I make my Yahoo/Hotmail/Gmail account work? The default configuration shouldn't impact the usability of any of these services. @@ -861,7 +866,9 @@ the differences? Where the defaults are likely to break some sites, exceptions for known popular problem sites are included, but in general, the more aggressive your default settings are, the more exceptions - you will have to make later. See the Cautious setting. This is safest and will have the fewest + problems. See the User Manual for a more detailed discussion. @@ -1021,7 +1028,7 @@ with a browser? Does that not raise security issues? If you want to see nothing, then change the set-image-blocker action to blank. This can be done by editing the - default.action file, or trough the user.action file, or through the web-based actions file editor. @@ -1031,12 +1038,13 @@ with a browser? Does that not raise security issues? Why would anybody want to see a checkerboard pattern? Remember that telling which image is an ad and which - isn't, is mostly guesswork. While we hope that the standard configuration - is rather smart, it can and will make errors. The checkerboard image is visually + isn't, is an educated guess. While we hope that the standard configuration + is rather smart, it will make occasional mistakes. The checkerboard image is visually decent, but it shows you that and where images were blocked, which can be very helpful in case some navigation aid or otherwise innocent image was - erroneously blocked. Some people might also enjoy seeing how many banners - they don't have to see.. + erroneously blocked. It is recommended for new users so they can + see what is happening. Some people might also enjoy seeing how + many banners they don't have to see. @@ -1075,7 +1083,7 @@ on Win2K/NT/XP? Windows service functionality. See - the User Manual for details on how to install and configure + the User Manual for details on how to install and configure Privoxy as a service. @@ -1277,7 +1285,8 @@ and thus avoid individual browser configuration? toys.example.com games.example.com - This allows access to only those three sites. + This allows access to only those three sites by first blocking all URLs, and + then subsequently allowing three specific exceptions. A more interesting approach is Privoxy's @@ -1291,7 +1300,96 @@ and thus avoid individual browser configuration? are various other configuration options that should be disabled (described elsewhere here and in the User Manual) so that users can't modify their own configuration and easily circumvent the - whitelist. + whitelist. + + + + +How can I turn off ad-blocking? + + Ad blocking is hard-coded into the default configuration files. It has been + assumed that everyone using &my-app; is interested in this feature. If you want + to do without this, there are several approaches you can take: You can + manually undo the many block rules in default.action. Or + even easier, just create your own default.action file + from scratch without the many ad blocking rules, and corresponding exceptions. + Or lastly, if you are not concerned about the additional blocks that are + done for privacy reasons, you can very easily over-ride + all blocking with the following very simple rule in + user.action: + + + + # Unblock everybody, everywhere + { -block } + / # UN-Block *all* URLs + + + + Or even a more comprehensive reversing of various ad related actions: + + + + # Unblock everybody, everywhere, and turn off appropriate filtering, etc + { -block \ + -filter{banners-by-size} \ + -filter{banners-by-link} \ + allow-popups \ + } + / # UN-Block *all* URLs and allow ads + + + + This last action in this compound statement, + allow-popups, is an alias that disables + various pop-up blocking features. + + + + +How can I have custom template pages, like the +<emphasis>BLOCKED</emphasis> page? + + All the template pages are installed in a sub-directory appropriately named: + templates. These are specialized text files utilized + by &my-app; and can easily be modified using any text editor. Knowing something + about HTML will of course be helpful. You cannot rename any of these files, + or create completely new templates, that is not possible. But you can change + the page content to whatever you like. Be forewarned that these files are + subject to being overwritten during upgrades, so be sure to save any + customizations. + + + + +How can I remove the <quote>Go There Anyway</quote> link from +the <emphasis>BLOCKED</emphasis> page? + + Editing the template page (see above) may dissuade some users, but this + method is easily circumvented. Where you want this level of control, you should + build &my-app; from source, and enable various features that are + available as compile-time options. You should use + configure as follows: + + + + ./configure --disable-toggle --disable-editor --disable-force + + + + This will create an executable with hard-coded security features so that + &my-app; does not allow easy bypassing of blocks or changing the current + configuration. Some of these features can also by toggled on/off via options + in Privoxy's main + config file. But + compiled-in compliance is a much better method of ensuring that a block is + really a block. + + + Default builds of &my-app; are typically built with these features + disabled. @@ -1310,7 +1408,7 @@ has to add extra time to browsing. How much of an impact depends on many things, including the CPU of the host system, how aggressive the configuration is, which specific actions are being triggered, - the size of the page, etc. + the size of the page, the bandwidth of the connection, etc. Overall, it should not slow you down any in real terms, and may actually help @@ -1328,10 +1426,17 @@ has to add extra time to browsing. deanimate-gifs actions will certainly cause a perceived slowdown, since the entire document - needs to be buffered before displaying. And on very large documents, there may be - some impact. How much depends on the page size, the actual definition of the - filter(s), etc. See below. Most other actions have little to no impact on - speed. + needs to be buffered before displaying. And on very large documents, filtering may have + some measurable impact. How much depends on the page size, the actual + definition of the filter(s), etc. See below. Most other actions have little + to no impact on speed. + + + Also, when filtering is enabled, typically there is a disabling of + compression, (see prevent-compression). + This can have an impact on speed as well. Again, the page size, etc. will + determine how much of an impact. @@ -1354,7 +1459,8 @@ delays in page requests compared to the old Junkbuster. What's wrong? more noticeable on slower dialup connections. Extremely large documents may have some impact on the time to load the page where there is filtering being done. But overall, the difference should be very minimal. If there is a - big impact, then probably some other problem is contributing. + big impact, then probably some other situation is contributing (like + anti-virus software). Filtering is automatically disabled for inappropriate MIME types. But note @@ -1422,6 +1528,24 @@ various ways to interact with the developers. +If I do submit missed ads, will +they be included in future updates? + + Whether such submissions are eventually included in the + default.action configuration file depends on how + significant the issue is. We of course want to address any potential + problem with major, high-profile sites such as Google, + Yahoo, etc. Any site with global or regional reach, + has a good chance of being a candidate. But at the other end of the spectrum + are any number of smaller, low-profile sites such as for local clubs or + schools. Since their reach and impact are much less, they are best handled by + inclusion in the user's user.action, and thus would be + unlikely to be included. + + + + + Why doesn't anyone answer my support request? @@ -1437,10 +1561,10 @@ us help you. Your efforts are not wasted, and we do appreciate them. How can I hide my IP address? - If you run both the browser and the proxy locally, you cannot hide your IP + If you run both the browser and &my-app; locally, you cannot hide your IP address with Privoxy or ultimately any other - software. The server needs to know your IP address so that it knows where to - send the responses back. + software alone. The server needs to know your IP address so that it knows + where to send the responses back. There are many publicly usable "anonymous" proxies out there, which @@ -1487,7 +1611,7 @@ us help you. Your efforts are not wasted, and we do appreciate them. Privoxy can remove various information about you, and allows you more freedom to decide which sites you can trust, and what details you want to reveal. But it neither - hides your ip address, nor can it guarantee that the rest of the system + hides your IP address, nor can it guarantee that the rest of the system behaves correctly. There are several possibilities how a web sites can find out who you are, even if you are using a strict Privoxy configuration and chained it with Tor. @@ -1531,7 +1655,7 @@ us help you. Your efforts are not wasted, and we do appreciate them. Before you configure Privoxy to use Tor (http://tor.eff.org/), - please follow the User Manual chapters + please follow the User Manual chapters 2. Installation and 5. Startup to make sure Privoxy itself is setup correctly. @@ -1623,20 +1747,23 @@ us help you. Your efforts are not wasted, and we do appreciate them. content is being altered? - Definitely. More and more sites use HTTP header content to decide what to - display and how to display it. There is many ways that this can be handled, + Definitely. It is common for sites to use browser type, browser version, + HTTP header content, and various other techniques in order to dynamically + decide what to display and how to display it. What you see, and what I see, + might be very different. There are many, many ways that this can be handled, so having hard and fast rules, is tricky. - User-Agent in particular is often used in this way to identify + User-Agent is often used in this way to identify the browser, and adjust content accordingly. Changing this now (at least not further than removing the OS information) is not recommended, since so many - sites do look for it. You may get undesirable results by changing this. + sites do look for it. You may get undesirable results by changing just this + one aspect. - For instance, different browsers use different encodings of Russian and Czech + Also, different browsers use different encodings of Russian and Czech characters, certain web servers convert pages on-the-fly according to the User Agent header. Giving a User Agent with the wrong operating system or browser manufacturer causes some sites in these languages @@ -1646,7 +1773,12 @@ content is being altered? weather maps of Intellicast have been blocked by their server when no Referer or cookie is provided, is another example. (But you can forge both headers without giving information away). There are - many other ways things can go wrong when trying to fool a web server. + many other ways things that can go wrong when trying to fool a web server. The + results of which could inadvertently cause pages to load incorrectly, + partially, or even not at all. And there may be no obvious clues as to just + what went wrong, or why. Nowhere will there be a message that says + Turn off fast-redirects or else! + @@ -1945,25 +2077,30 @@ and related issues? Troubleshooting -I am getting <quote>connection refused</quote> -with every web page? - - Either Privoxy is not running, or your - browser is configured for a different port than what - Privoxy is using, or, if using a forwarding - rule, you have a configuration problem or a problem with a host in the - forwarding chain. - +I cannot connect to any websites. Or, I am getting +<quote>connection refused</quote> message with every web page. Why? + + Either ... - - You should verify that &my-app; is indeed running and that the correct port is set, - and matches what your browser is set to. See listen-address - option in Privoxy's main configuration file. If using - any forwarding rules, disable those to make sure the problem is not with - a forwarder. + + +Privoxy is not running. Solution: verify + that &my-app; is installed correctly, has not died, and is running. + + Or your browser is configured for a different port than what + Privoxy is using. Solution: verify that &my-app; + and your browser are set to the same port (listen-address). + + Or if using a forwarding rule, you have a configuration problem or a + problem with a host in the forwarding chain. Solution: temporarily alter your + configuration and take the forwarders out of the equation. + + + Or you have a firewall that is interfering and blocking you. Solution: + try disabling or removing the firewall as a test. + + @@ -2110,7 +2247,7 @@ every time I start IE. What gives? To complicate matters, some systems may have a generic proxy - setting, which will silently enable various protocols, including + setting, which will enable various protocols, including both HTTP and FTP proxying! So it is possible to accidentally enable FTP proxying in these cases. And of course, if this happens, Privoxy will indeed cause problems since @@ -2234,7 +2371,8 @@ Why? This can be caused by a problem with the local HOSTS file. If this file has been changed from the original, try reverting it to - see if that helps. + see if that helps. Make sure what ever name(s) are used for the local system, + that they resolve both ways. @@ -2246,11 +2384,11 @@ Why? Port 8118 is Privoxy's default TCP listening port. Typically this message would mean that there is already one instance of Privoxy running, and - you are actually trying to start a second Privoxy - on the same port, which will not work. (You can have multiple instances but - they must be assigned different ports.) How and why this might happen varies - from platform to platform, but you need to check your installation and - start-up procedures. + your system is actually trying to start a second + Privoxy on the same port, which will not work. + (You can have multiple instances but they must be assigned different ports.) + How and why this might happen varies from platform to platform, but you need + to check your installation and start-up procedures. @@ -2469,6 +2607,10 @@ browsing has slowed to a crawl. What gives? 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA $Log: faq.sgml,v $ +Revision 2.21 2006/10/03 14:40:51 fabiankeil +Added links from the Tor faq to the +configuration chapter in the User Manual. + Revision 2.20 2006/09/26 10:12:37 fabiankeil Spelling fix. diff --git a/doc/webserver/faq/configuration.html b/doc/webserver/faq/configuration.html index 3d3da79a..f09c6dfa 100644 --- a/doc/webserver/faq/configuration.html +++ b/doc/webserver/faq/configuration.html @@ -81,112 +81,31 @@ CLASS="SECT2" >

3.1. Where can I get updated Actions Files?

Based on your feedback and the continuing development, updates of - default.action will be - made available from time to time on the files section of - our project page. -

3.1. What exactly is an "actions" file?

If you wish to receive an email notification whenever we release updates of - Privoxy or the actions file, subscribe - to our announce mailing list, ijbswa-announce@lists.sourceforge.net. -

3.2. Can I use my old config files?

The syntax and purpose of configuration files has remained the same - throughout the 3.x series. Although each release contains updated, - utilizes the concept of "improved" versions and it is recommended to use the newer - configuration files. - - If upgrading from version prior to 3.0.4 the syntax for fast-redirects - has changed. See the What's New section - of the User Manual for details. -

But all configuration files have substantially - changed from the Junkbuster days, and early - versions of Privoxy 2.x. The old files, like - blocklist will not work at all. -

Refer to the " What's Newactions" - page for information on configuration changes that may occur from one release to another. -

3.3. What exactly is an "actions" file?

Actions files - are where various actionsPrivoxy could take while processing a certain request, are configured. Typically, you would define a set of default actions - that apply to all URLs, then add exceptions to these defaults where needed. + that apply globally to all URLs, then add exceptions to these defaults where needed. There is a wide array of actions available that give the user a high degree of control and flexibility on how to process each and every web page.

3.4. The 3.2. The "actions" concept confuses me. Please list @@ -245,8 +164,8 @@ TARGET="_top" > in the user - manualUser + Manual. It includes a

3.5. How are actions files configured? What is the easiest +>3.3. How are actions files configured? What is the easiest way to do this?

Actions files are just text files in a special syntax and can be edited @@ -300,19 +219,16 @@ CLASS="SECT2" >

3.6. There are several different 3.4. There are several different "actions" files. What are the differences?

As of Privoxy v2.9.15, three actions files - are being included, to be used for +> Three actions files + are being included by the developers, to be used for different purposes: These are Privoxy - developers, user.action, where users are encouraged @@ -365,6 +281,99 @@ CLASS="SECT2" >

3.5. Where can I get updated Actions Files?

Based on your feedback and the continuing development, updates of + default.action will be + made available from time to time on the files section of + our project page. +

If you wish to receive an email notification whenever we release updates of + Privoxy or the actions file, subscribe + to our announce mailing list, ijbswa-announce@lists.sourceforge.net. +

3.6. Can I use my old config files?

The syntax and purpose of configuration files has remained the same + throughout the 3.x series. Although each release contains updated, + "improved" versions and it is recommended to use the newer + configuration files. + + If upgrading from version prior to 3.0.4 the syntax for fast-redirects + has changed. See the What's New section + of the User Manual for details. +

But all configuration files have substantially + changed from the Junkbuster days, and early + versions of Privoxy 2.x. The old files, like + blocklist will not work at all. +

Refer to the What's New + page for information on configuration changes that may occur from one release to another. +

3.7. How can I make my Yahoo/Hotmail/Gmail account work?

"problem" sites are included, but in general, the more aggressive your default settings are, the more exceptions - you will have to make later. See the "Cautious" setting. This is safest and will have the fewest + problems. See the

3.10. What is the

3.11. How can I set up Privoxy to act as a proxy for my LAN?

3.12. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.

. This can be done by editing the default.action file, or trough the user.action file, or through the web-based actions file editor

3.13. Why would anybody want to see a checkerboard pattern?

telling which image is an ad and which isn't, is mostly guesswork. While we hope that the standard configuration - is rather smart, it can and will make errors. The checkerboard image is visually +>, is an educated guess. While we hope that the standard configuration + is rather smart, it will make occasional mistakes. The checkerboard image is visually decent, but it shows you that and where images were blocked, which can be very helpful in case some navigation aid or otherwise innocent image was - erroneously blocked. Some people might also enjoy seeing how many banners - they "see" what is happening. Some people might also enjoy seeing how + many banners they don't have to see..

have to see.

3.14. I see some images being replaced by a text instead of the checkerboard image. Why and how do I get rid of this?

the User Manual the User Manual for details on how to install and configure

This allows access to only those three sites.

This allows access to only those three sites by first blocking all URLs, and + then subsequently allowing three specific exceptions.

A more interesting approach is the User Manual) so that users can't modify their own configuration and easily circumvent the - whitelist.

3.26. How can I turn off ad-blocking?

Ad blocking is hard-coded into the default configuration files. It has been + assumed that everyone using Privoxy is interested in this feature. If you want + to do without this, there are several approaches you can take: You can + manually undo the many block rules in default.action. Or + even easier, just create your own default.action file + from scratch without the many ad blocking rules, and corresponding exceptions. + Or lastly, if you are not concerned about the additional blocks that are + done for privacy reasons, you can very easily over-ride + all blocking with the following very simple rule in + user.action: +

 # Unblock everybody, everywhere
+ { -block }
+ / # UN-Block *all* URLs
+ 

+ Or even a more comprehensive reversing of various ad related actions:

 # Unblock everybody, everywhere, and turn off appropriate filtering, etc
+ { -block \
+  -filter{banners-by-size} \
+  -filter{banners-by-link} \
+  allow-popups \
+ }
+ / # UN-Block *all* URLs and allow ads
+ 

This last "action" in this compound statement, + allow-popups, is an alias that disables + various pop-up blocking features.

3.27. How can I have custom template pages, like the +BLOCKED page?

All the template pages are installed in a sub-directory appropriately named: + templates. These are specialized text files utilized + by Privoxy and can easily be modified using any text editor. Knowing something + about HTML will of course be helpful. You cannot rename any of these files, + or create completely new templates, that is not possible. But you can change + the page content to whatever you like. Be forewarned that these files are + subject to being overwritten during upgrades, so be sure to save any + customizations.

3.28. How can I remove the "Go There Anyway" link from +the BLOCKED page?

Editing the template page (see above) may dissuade some users, but this + method is easily circumvented. Where you want this level of control, you should + build Privoxy from source, and enable various features that are + available as compile-time options. You should use + configure as follows:

 ./configure --disable-toggle --disable-editor --disable-force
+ 

This will create an executable with hard-coded security features so that + Privoxy does not allow easy bypassing of blocks or changing the current + configuration. Some of these features can also by toggled on/off via options + in Privoxy's main + config file. But + compiled-in compliance is a much better method of ensuring that a block is + really a block.

Default builds of Privoxy are typically built with these features + disabled.

7.1. License

7.2. History

Along time ago, there was the +> A long time ago, there was the - will be a big plus and will help you get the most out - of Privoxy. +>. + A new installation just includes a very basic configuration. The user + should take this as a starting point only, and enhance it as he or she + sees fit. In fact, the user is encouraged, and expected to, fine-tune the + configuration.

Much of "Junkbuster"?

Along time ago, there was the +> A long time ago, there was the

$Id: faq.sgml,v 2.18 2006/09/22 01:27:55 hal9 Exp $

$Id: faq.sgml,v 2.21 2006/10/03 14:40:51 fabiankeil Exp $

3.1. Where can I get updated Actions Files?
3.2. Can I use my old config files?
3.3. What exactly is an "actions" file?
3.4. 3.2. The .
3.5. 3.3. How are actions files configured? What is the easiest way to do this?
3.6. 3.4. There are several different "actions"
3.5. Where can I get updated Actions Files?
3.6. Can I use my old config files?
3.7. How can I make my Yahoo/Hotmail/Gmail account work?
3.10. What is the default.filter
3.11. How can I set up Privoxy to act as a proxy for my LAN?
3.12. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.
3.13. Why would anybody want to see a checkerboard pattern?
3.14. I see some images being replaced by a text instead of the checkerboard image. Why and how do I get rid of this?
"good" sites?
3.26. How can I turn off ad-blocking?
3.27. How can I have custom template pages, like the +BLOCKED page?
3.28. How can I remove the "Go There Anyway" link from +the BLOCKED page?
4.1. How much does Privoxy slow my browsing down? This has to add extra time to browsing.
4.5. If I do submit missed ads, will +they be included in future updates?
4.6. Why doesn't anyone answer my support request?
4.6. 4.7. How can I hide my IP address?
4.7. 4.8. Can Privoxy guarantee I am anonymous?
4.8. 4.9. A test site says I am not using a Proxy.
4.9. 4.10. How do I use Privoxy together with Tor?
4.10. 4.11. Might some things break because header information or content is being altered?
4.11. 4.12. Can Privoxy act as a "caching"
4.12. 4.13. What about as a firewall? Can Privoxy protect me?
4.13. 4.14. I have large empty spaces / a checkerboard pattern now where ads used to be. Why?
4.14. 4.15. How can Privoxy filter Secure (HTTPS) URLs?
4.15. 4.16. Privoxy runs as a "server"
4.16. 4.17. How can I temporarily disable Privoxy?
4.17. 4.18. When
4.18. 4.19. My logs show Privoxy ?
4.19. 4.20. Can Privoxy effect files that I download from a webserver? FTP server?
4.20. 4.21. I just downloaded a Perl script, and Privoxy altered it! Yikes, what is wrong!
4.21. 4.22. Should I continue to use a file for ad-blocking?
4.22. 4.23. Where can I find more information about Privoxy and related issues?
4.23. 4.24. I've noticed that Privoxy changes
5.1. I am getting I cannot connect to any websites. Or, I am getting +"connection refused" -with every web page? message with every web page. Why?
5.2. I just added a new rule, but the steenkin ad is still getting through. How?
7.1. License
7.2. History

4.1. How much does Privoxy slow my browsing down? This has to add extra time to browsing.

How much of an impact depends on many things, including the CPU of the host system, how aggressive the configuration is, which specific actions are being triggered, - the size of the page, etc.

Overall, it should not slow you down any in real terms, and may actually help speed things up since ads, banners and other junk are not typically being @@ -121,10 +121,20 @@ TARGET="_top" > actions will certainly cause a perceived slowdown, since the entire document - needs to be buffered before displaying. And on very large documents, there may be - some impact. How much depends on the page size, the actual definition of the - filter(s), etc. See below. Most other actions have little to no impact on - speed.

+ Also, when filtering is enabled, typically there is a disabling of + compression, (see prevent-compression). + This can have an impact on speed as well. Again, the page size, etc. will + determine how much of an impact.

Filtering is automatically disabled for inappropriate MIME types. But note @@ -279,9 +290,42 @@ CLASS="SECT2" >

4.5. If I do submit missed ads, will +they be included in future updates?

Whether such submissions are eventually included in the + default.action configuration file depends on how + significant the issue is. We of course want to address any potential + problem with major, high-profile sites such as Google, + Yahoo, etc. Any site with global or regional reach, + has a good chance of being a candidate. But at the other end of the spectrum + are any number of smaller, low-profile sites such as for local clubs or + schools. Since their reach and impact are much less, they are best handled by + inclusion in the user's user.action, and thus would be + unlikely to be included.

4.5. Why doesn't anyone answer my support +>4.6. Why doesn't anyone answer my support request?

Rest assured that it has been read and considered. Why it is not answered, @@ -297,15 +341,18 @@ CLASS="SECT2" >4.6. How can I hide my IP address?4.7. How can I hide my IP address?

If you run both the browser and the proxy locally, you cannot hide your IP +> If you run both the browser and Privoxy locally, you cannot hide your IP address with Privoxy or ultimately any other - software. The server needs to know your IP address so that it knows where to - send the responses back.

There are many publicly usable "anonymous" proxies out there, which provide a further level of indirection between you and the web server.

4.7. Can Privoxy guarantee I am anonymous?

4.8. Can Privoxy guarantee I am anonymous?

No. Your chances of remaining anonymous are greatly improved, but unless you more freedom to decide which sites you can trust, and what details you want to reveal. But it neither - hides your ip address, nor can it guarantee that the rest of the system + hides your IP address, nor can it guarantee that the rest of the system behaves correctly. There are several possibilities how a web sites can find out who you are, even if you are using a strict

4.8. A test site says I am not using a Proxy.

4.9. A test site says I am not using a Proxy.

Good! Actually, they are probably testing for some other kinds of proxies. Hiding yourself completely would require additional steps.

4.9. How do I use Privoxy +>4.10. How do I use Privoxy together with Tor?

Before you configure http://tor.eff.org/), - please follow the User Manual chapters + please follow the User Manual chapters Since Privoxy 3.0.5, its configuration (section 5.2) +> 3.0.5, its + main configuration file is already prepared for TorPrivoxy, you just have to uncomment the line:

, you just have to edit the + forwarding section + and uncomment the line:

Privoxy has reloaded its configuration - and that there are no other forward lines, unless you know that you need them. I everything looks good, + and that there are no other forward lines, unless you know that you need them. If everything looks good, refer to Tor.

Afterward, please take the time to at least skim through the rest +> Afterwards, please take the time to at least skim through the rest of Tor's

4.10. Might some things break because header information or +>4.11. Might some things break because header information or content is being altered?

Definitely. More and more sites use HTTP header content to decide what to - display and how to display it. There is many ways that this can be handled, +> Definitely. It is common for sites to use browser type, browser version, + HTTP header content, and various other techniques in order to dynamically + decide what to display and how to display it. What you see, and what I see, + might be very different. There are many, many ways that this can be handled, so having hard and fast rules, is tricky.

"User-Agent" in particular is often used in this way to identify +> is often used in this way to identify the browser, and adjust content accordingly. Changing this now (at least not further than removing the OS information) is not recommended, since so many - sites do look for it. You may get undesirable results by changing this.

For instance, different browsers use different encodings of Russian and Czech +> Also, different browsers use different encodings of Russian and Czech characters, certain web servers convert pages on-the-fly according to the User Agent header. Giving a "Referer" or cookie is provided, is another example. (But you can forge both headers without giving information away). There are - many other ways things can go wrong when trying to fool a web server.

"Turn off fast-redirects or else! + "

Similar thoughts apply to modifying JavaScript, and, to a lesser degree, HTML elements.

4.11. Can Privoxy act as a 4.12. Can Privoxy act as a "caching" proxy to @@ -754,9 +835,9 @@ CLASS="SECT2" >

4.12. What about as a firewall? Can Privoxy protect me?

4.13. What about as a firewall? Can Privoxy protect me?

Not in the way you mean, or in the way a true firewall can.

4.13. I have large empty spaces / a checkerboard pattern now where +>4.14. I have large empty spaces / a checkerboard pattern now where ads used to be. Why?

It would be technically possible eliminate the banners in a way that frees @@ -802,9 +883,9 @@ CLASS="SECT2" >

4.14. How can Privoxy filter Secure (HTTPS) URLs?

4.15. How can Privoxy filter Secure (HTTPS) URLs?

Since secure HTTP connections are encrypted SSL sessions between your browser and the secure site, and are meant to be reliably

4.15. Privoxy runs as a 4.16. Privoxy runs as a "server". How @@ -921,7 +1002,7 @@ CLASS="SECT2" >4.16. How can I temporarily disable Privoxy?

4.17. How can I temporarily disable Privoxy?

The easiest way is to access 4.17. When 4.18. When "disabled" is Privoxy totally @@ -978,7 +1059,7 @@ CLASS="SECT2" >4.18. My logs show Privoxy 4.19. My logs show Privoxy "crunches" @@ -1028,7 +1109,7 @@ CLASS="SECT2" >4.19. Can Privoxy effect files that I download +>4.20. Can Privoxy effect files that I download from a webserver? FTP server?

From the webserver's perspective, there is no difference between @@ -1167,7 +1248,7 @@ CLASS="SECT2" >4.20. I just downloaded a Perl script, and Privoxy +>4.21. I just downloaded a Perl script, and Privoxy altered it! Yikes, what is wrong!

Please read above.

4.21. Should I continue to use a 4.22. Should I continue to use a "HOSTS" file for ad-blocking?4.22. Where can I find more information about Privoxy +>4.23. Where can I find more information about Privoxy and related issues?

Other references and sites of interest to 4.23. I've noticed that Privoxy changes 4.24. I've noticed that Privoxy changes "Microsoft" to diff --git a/doc/webserver/faq/trouble.html b/doc/webserver/faq/trouble.html index f8c0357d..54324730 100644 --- a/doc/webserver/faq/trouble.html +++ b/doc/webserver/faq/trouble.html @@ -81,56 +81,66 @@ CLASS="SECT2" >

5.1. I am getting 5.1. I cannot connect to any websites. Or, I am getting +"connection refused" -with every web page?

message with every web page. Why?

Either ...

Either

  • Privoxy is not running, or your - browser is configured for a different port than what - is not running. Solution: verify + that Privoxy is using, or, if using a forwarding - rule, you have a configuration problem or a problem with a host in the - forwarding chain. -

    is installed correctly, has not died, and is running.

  • You should verify that Or your browser is configured for a different port than what + Privoxy is indeed running and that the correct port is set, - and matches what your browser is set to. See is using. Solution: verify that Privoxy + and your browser are set to the same port (listen-address - option in Privoxy's main configuration file. If using - any forwarding rules, disable those to make sure the problem is not with - a forwarder.

    ).

  • Or if using a forwarding rule, you have a configuration problem or a + problem with a host in the forwarding chain. Solution: temporarily alter your + configuration and take the forwarders out of the equation.

  • Or you have a firewall that is interfering and blocking you. Solution: + try disabling or removing the firewall as a test. +

5.2. I just added a new rule, but the steenkin ad is still getting through. How?

"proxy" - setting, which will silently enable various protocols, including + setting, which will enable various protocols, including HOSTS file. If this file has been changed from the original, try reverting it to - see if that helps.

Privoxy running, and - you are actually trying to start a second Privoxy - on the same port, which will not work. (You can have multiple instances but - they must be assigned different ports.) How and why this might happen varies - from platform to platform, but you need to check your installation and - start-up procedures.

on the same port, which will not work. + (You can have multiple instances but they must be assigned different ports.) + How and why this might happen varies from platform to platform, but you need + to check your installation and start-up procedures.