From: hal9 Date: Mon, 8 Apr 2002 15:03:53 +0000 (+0000) Subject: Finished verion. X-Git-Tag: v_2_9_14~155 X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=commitdiff_plain;h=7be747be82b4258a11bf14a9297eaffa15f38a27;ds=sidebyside Finished verion. --- diff --git a/doc/webserver/man-page/privoxy-man-page.html b/doc/webserver/man-page/privoxy-man-page.html index 167822ee..3495bb7d 100644 --- a/doc/webserver/man-page/privoxy-man-page.html +++ b/doc/webserver/man-page/privoxy-man-page.html @@ -1,343 +1,384 @@ -Privoxy Man page

NAME

-
-
-       privoxy - Privacy enhancing Proxy
-
-
-
-

SYNOPSIS

-       privoxy [--help] [--version] [--no-daemon] [--pidfile pid­
-       file] [--user user[.group]] [configfile] (Unix)
-
-       privoxy.exe [configfile] (Windows)
-
-
-
-
-

OPTIONS

-       Privoxy may be invoked  with  the  following  command-line
-       options:
-
-       --version (unix only)
-              Print version info and exit.
-
-       --help (unix only)
-              Print a short usage info and exit.
-
-       --no-daemon (unix only)
-              Don't  become  a daemon, i.e. don't fork and become
-              process group leader, don't detach from controlling
-              tty, and do all logging there.
-
-        --pidfile pidfile (unix only)
-              On startup, write the process ID to pidfile. Delete
-              the pidfile on exit. Failiure to create  or  delete
-              the pidfile is non-fatal. If no --pidfile option is
-              given, no PID file will be used.
-
-        --user user[.group] (unix only)
-              After (optionally) writing the PID file, assume the
-              user  ID  of  user and the GID of group, or, if the
-              optional group was not given, the default group  of
-              user.  Exit if the privileges are not sufficient to
-              do so.
-
-
-       If the configfile is not specified on  the  command  line,
-       Privoxy  will  look for a file named config in the current
-       directory (except on Win32 where it will try  config.txt).
-
-
-
-
-
-

DESCRIPTION

-       Privoxy  is  a web proxy with advanced filtering capabili­
-       ties for protecting privacy, filtering web  page  content,
-       managing  cookies,  controlling  access, and removing ads,
-       banners,  pop-ups  and  other  obnoxious  Internet   junk.
-       Privoxy  has a very flexible configuration and can be cus­
-       tomized to suit individual needs and tastes.  Privoxy  has
-       application  for  both  stand-alone systems and multi-user
-       Junkbuster  was originally written by JunkBusters Corpora­
-       tion, and was released as free open-source software  under
-       the  GNU  GPL. Stefan Waldherr made many improvements, and
-       started the SourceForge project to continue development.
-
-
-
-
-

INSTALLATION AND USE

-       Browsers must be individually configured to use Privoxy as
-       a  HTTP  proxy.   The default setting is for localhost, on
-       port 8118 (configurable in the main config file).  To  set
-       the  HTTP proxy in Netscape and Mozilla, go through: Edit;
-       Preferences; Advanced; Proxies;  Manual  Proxy  Configura­
-       tion; View.
-
-       For Internet Explorer, go through: Tools; Internet Proper­
-       ties; Connections; LAN Settings.
-
-       The Secure (SSL) Proxy should also be set to the same val­
-       ues, otherwise https: URLs will not be proxied.
-
-       For other browsers, check the documentation.
-
-
-
-
-

CONFIGURATION

-       Privoxy  can  be configured with the various configuration
-       files.  The  default  configuration  files  are:   config,
-       default.action,  and  default.filter.  These are well com­
-       mented.  On Unix and Unix-like systems, these are  located
-       in /etc/privoxy/ by default. On Windows, OS/2 and AmigaOS,
-       these files are in the same directory as the Privoxy  exe­
-       cutable.
-
-       The  name  and  number  of configuration files has changed
-       from previous versions, and is subject to change as devel­
-       opment  progresses.  In  fact, the configuration itself is
-       changed and much more sophisticated. See  the  user-manual
-       for a brief explanation of all configuration options.
-
-       The  actions  list (ad blocks, etc) can also be configured
-       with your web  browser  at  http://www.privoxy.org/config.
-       Privoxy's  configuration  parameters can also be viewed at
-       the same page. In addition, Privoxy can be toggled on/off.
-       This is an internal page.
-
-
-
-
-

SAMPLE CONFIGURATION

-       A  brief  example  of  what a default.action configuration
-       might look like:
-
-
-       # Define a few useful custom aliases for later use
-       {{alias}}
-       +no-cookies = +no-cookies-set +no-cookies-read
-
-       # Do accept cookies
-       -no-cookies = -no-cookies-set -no-cookies-read
-
-       # Treat these blocked URLs as images.
-       +imageblock = +block +image
-
-       # Define page filters we want to use.
-       myfilters = +filter{html-annoyances} +filter{js-annoyances}\
-                   +filter{no-popups} +filter{webbugs}
-
-       ## Default Policies (actions) ############################
-       { \
-        -block \
-        -downgrade \
-        +fast-redirects \
-        myfilters \
-        +no-compression \
-        +hide-forwarded \
-        +hide-from{block} \
-        +hide-referer{forge} \
-        -hide-user-agent \
-        -image \
-        +image-blocker{blank} \
-        +no-cookies-keep \
-        -no-cookies-read \
-        -no-cookies-set \
-        +no-popups \
-        -vanilla-wafer \
-        -wafer \
-       }
-       /
-
-       # Now set exceptions to the above defined policies #######
-
-       # Sites where we want persistant cookies
-       {-no-cookies -no-cookies-keep}
-        .redhat.com
-        .sun.com
-        .yahoo.com
-        .msdn.microsoft.com
-
-       # This site requires cookies AND 'fast-redirects' on
-       {-no-cookies -no-cookies-keep -fast-redirects}
-        .nytimes.com
-
-       # Add custom headers, and turn off filtering of page source
-       {+add-header{X-Privacy: Yes please} #-add-header{*} \
-        +add-header{X-User-Tracking: No thanks!} -filter}
-        privacy.net
-
-        .adforce.imgis.com
-        .ad.preferences.com/image.*
-        .ads.web.aol.com
-        .ad-adex3.flycast.com
-        .ad.doubleclick.net
-        .ln.doubleclick.net
-        .ad.de.doubleclick.net
-        /.*/count\.cgi\?.*df=
-        194.221.183.22[1-7]
-        a196.g.akamai.net/7/196/2670/000[12]/images.gmx.net/i4/images/.*/
-
-       # Block any URLs that match these patterns
-       {+block}
-        /.*/(.*[-_.])?ads?[0-9]?(/|[-_.].*|\.(gif|jpe?g))
-        /.*/(plain|live|rotate)[-_.]?ads?/
-        /.*/(sponsor)s?[0-9]?/
-        /.*/ad(server|stream|juggler)\.(cgi|pl|dll|exe)
-        /.*/adbanners/
-        /.*/adv((er)?ts?|ertis(ing|ements?))?/
-        /.*/banners?/
-        /.*/popupads/
-        /.*/advert[0-9]+\.jpg
-        /ad_images/
-        /.*/ads/
-        /images/.*/.*_anim\.gif
-        /rotations/
-        /.*(ms)?backoff(ice)?.*\.(gif|jpe?g)
-        195.63.104.*/(inbox|log|meld|folderlu|folderru|log(in|out)[lmr]u|)
-        .images.nytimes.com
-        .images.yahoo.com/adv/
-        /.*cnnstore\.gif
-
-
-
-       See the comments in the configuration files themselves, or
-       the  user-manual for explanations of the above syntax, and
-       other Privoxy configuration options.
-
-
-
-
-

FILES

-       /usr/sbin/privoxy
-       /etc/privoxy/config
-       /etc/privoxy/default.action
-       /etc/privoxy/advanced.action
-       /etc/privoxy/basic.action
-       /etc/privoxy/intermediate.action
-       /etc/privoxy/default.filter
-       /etc/privoxy/trust
-       /etc/privoxy/templates/*
-       /var/log/privoxy/logfile
-
-
-       mentation should be included in  the  local  documentation
-       directory, though is not complete at this time.
-
-
-
-
-

SIGNALS

-       Privoxy terminates on the SIGINT, SIGTERM and SIGABRT sig­
-       nals. Log rotation scripts may cause a re-opening  of  the
-       logfile  by  sending a SIGHUP to Privoxy. Note that unlike
-       other daemons, Privoxy does not need to be made  aware  of
-       config file changes by SIGHUP -- it will detect them auto­
-       matically.
-
-
-
-
-

NOTES

-       This is a BETA version of Privoxy. Not  all  features  are
-       well tested.
-
-       Please see the user-maual on how to contact the developers
-       for feature requests, reporting problems, and other  ques­
-       tions.
-
-
-
-
-

BUGS

-       Probably.  Please see the user-manual for how and where to
-       report bugs.
-
 
+Manpage of PRIVOXY
+
+

PRIVOXY

+Section: (1)
Updated: 08 April 2002
Index +
+ +  +

NAME

+ +privoxy - Privacy Enhancing Proxy +  +

SYNOPSIS

+ +

+privoxy [--help] [--version] [--no-daemon] [--pidfile pidfile] [--user user[.group]] [configfile] (UNIX) +

+

+privoxy.exe [configfile] (Windows) +

+  +

OPTIONS

+ +

+ +Privoxy may be invoked with the following command line +options: +

+
--help
+Print brief usage info and exit. +
--version
+Print version info and exit. +
--no-daemon
+Don't become a daemon, i.e. don't fork and become process group +leader, don't detach from controlling tty, and do all logging there. +
--pidfile pidfile
+After (optionally) writing the PID file, assume the user ID of user +and the GID of group, or, if the optional group was not given, the +default group of user. Exit if the privileges are not sufficient to +do so. +
--user user[.group]
+After (optionally) writing the PID file, assume the user ID of +user and the GID of +group, or, if the optional +group was not given, the default group of +user. Exit if the privileges are not +sufficient to do so. +
+

+ +If the configfile is not specified on the command line, +Privoxy will look for a file named +config in the current directory (except on Win32 where +it will try config.txt). If no +configfile is found, Privoxy will +fail to start. +  +

DESCRIPTION

+ +

+ +Privoxy is a web proxy with advanced filtering +capabilities for protecting privacy, filtering web page content, managing +cookies, controlling access, and removing ads, banners, pop-ups and other +obnoxious Internet junk. Privoxy has a very +flexible configuration and can be customized to suit individual needs and +tastes. Privoxy has application for both +stand-alone systems and multi-user networks. +

+ +Privoxy is based on the code of the +Internet Junkbuster (tm). +Junkbuster was originally written by JunkBusters +Corporation, and was released as free open-source software under the GNU GPL. +Stefan Waldherr made many improvements, and started the SourceForge project +to continue development. +

+ +Privoxy continues the +Junkbuster tradition, but adds many +refinements, enhancements and new features. +  +

INSTALLATION AND USAGE

+ +

+ +Browsers must be individually configured to use Privoxy as +a HTTP proxy. The default setting is for localhost, on port 8118 +(configurable in the main config file). To set the HTTP proxy in Netscape +and Mozilla, go through: Edit; +Preferences; Advanced; +Proxies; Manual Proxy Configuration; +View. +

+ +For Internet Explorer, go through: Tools; +Internet Properties; Connections; +LAN Settings. +

+ +The Secure (SSL) Proxy should also be set to the same values, otherwise +https: URLs will not be proxied. +

+ +For other browsers, check the documentation. +  +

CONFIGURATION

+ +

+ +Privoxy can be configured with the various configuration +files. The default configuration files are: config, +default.action, and +default.filter. These are well commented. On Unix and +Unix-like systems, these are located in /etc/privoxy/ by +default. On Windows, OS/2 and AmigaOS, these files are in the same directory +as the Privoxy executable. +

+ +The name and number of configuration files has changed from previous +versions, and is subject to change as development progresses. In fact, the +configuration itself is changed and much more sophisticated. See the +user-manual for a +brief explanation of all configuration options. +

+ +The actions list (ad blocks, etc) can also be configured with your +web browser at http://ijbswa.sourceforge.net/config. +Privoxy's configuration parameters can also be viewed at +the same page. In addition, Privoxy can be toggled on/off. +This is an internal page. +  +

SAMPLE CONFIGURATION

+ +

+ +A brief example of what a default.action configuration +might look like: +

+

 
+ # Define a few useful custom aliases for later use
+ {{alias}}
+
+ # Don't accept cookies
+ +no-cookies = +no-cookies-set +no-cookies-read
+
+ # Do accept cookies
+ -no-cookies = -no-cookies-set -no-cookies-read
+
+ # Treat these blocked URLs as images.
+ +imageblock = +block +image
+
+ # Define page filters we want to use.
+ myfilters = +filter{html-annoyances} +filter{js-annoyances}\
+             +filter{no-popups} +filter{webbugs}
+
+ ## Default Policies (actions) ############################
+ { \
+  -block \
+  -downgrade \
+  +fast-redirects \
+  myfilters \
+  +no-compression \
+  +hide-forwarded \
+  +hide-from{block} \
+  +hide-referer{forge} \
+  -hide-user-agent \
+  -image \
+  +image-blocker{blank} \
+  +no-cookies-keep \
+  -no-cookies-read \
+  -no-cookies-set \
+  +no-popups \
+  -vanilla-wafer \
+  -wafer \
+ }
+ /
+
+ # Now set exceptions to the above defined policies #######
+
+ # Sites where we want persistant cookies
+ {-no-cookies -no-cookies-keep}
+  .redhat.com
+  .sun.com
+  .yahoo.com
+  .msdn.microsoft.com
+
+ # This site requires cookies AND 'fast-redirects' on
+ {-no-cookies -no-cookies-keep -fast-redirects}
+  .nytimes.com
+
+ # Add custom headers, and turn off filtering of page source
+ {+add-header{X-Privacy: Yes please} #-add-header{*} \
+  +add-header{X-User-Tracking: No thanks!} -filter}
+  privacy.net
+
+ # Block, and treat these URLs as 'images'.
+ {+imageblock}
+  .adforce.imgis.com
+  .ad.preferences.com/image.*
+  .ads.web.aol.com
+  .ad-adex3.flycast.com
+  .ad.doubleclick.net
+  .ln.doubleclick.net
+  .ad.de.doubleclick.net
+  /.*/count\.cgi\?.*df=
+  194.221.183.22[1-7]
+  a196.g.akamai.net/7/196/2670/000[12]/images.gmx.net/i4/images/.*/
+
+ # Block any URLs that match these patterns
+ {+block}
+  /.*/(.*[-_.])?ads?[0-9]?(/|[-_.].*|\.(gif|jpe?g))
+  /.*/(plain|live|rotate)[-_.]?ads?/
+  /.*/(sponsor)s?[0-9]?/
+  /.*/ad(server|stream|juggler)\.(cgi|pl|dll|exe)
+  /.*/adbanners/
+  /.*/adv((er)?ts?|ertis(ing|ements?))?/
+  /.*/banners?/
+  /.*/popupads/
+  /.*/advert[0-9]+\.jpg
+  /ad_images/
+  /.*/ads/
+  /images/.*/.*_anim\.gif
+  /rotations/ 
+  /.*(ms)?backoff(ice)?.*\.(gif|jpe?g)
+  195.63.104.*/(inbox|log|meld|folderlu|folderru|log(in|out)[lmr]u|)
+  .images.nytimes.com
+  .images.yahoo.com/adv/
+  /.*cnnstore\.gif
 
-

SEE ALSO

-       http://www.privoxy.org/
-       http://config.privoxy.org/
-       http://www.privoxy.org/faq/
-       http://www.privoxy.org/user-manual/
-       http://www.privoxy.org/developer-manual/
-       http://sourceforge.net/projects/ijbswa  (Privoxy   Project
-       Page)
-       http://www.waldherr.org/junkbuster/
-       http://www.junkbusters.com/ht/en/cookies.html
-       http://privacy.net/analyze/
-       http://www.squid-cache.org/
-       http://linuxalpha.ch/steudten/software/
 
+

+See the comments in the configuration files themselves, or the +user-manual +for explanations of the above syntax, and other Privoxy +configuration options. +  +

FILES

+

+

+ 
+ /usr/sbin/privoxy
+ /etc/privoxy/config
+ /etc/privoxy/default.action
+ /etc/privoxy/advanced.action
+ /etc/privoxy/basic.action
+ /etc/privoxy/intermediate.action
+ /etc/privoxy/default.filter
+ /etc/privoxy/trust
+ /etc/privoxy/templates/*
+ /var/log/privoxy/logfile
 
-

DEVELOPMENT TEAM

-        Stefan Waldherr
-        Andreas Oesterhelt
-        Jon Foster
-        Markus Breitenbach
-        Thomas Steudten
-        David Schmidt
-        Haroon Rafique
-        Joerg Strohmayer
-        Shamim Mohamed
-        John Venvertloh
-        Hal Burgiss
-        Rodrigo Barbosa
-        Gábor Lipták
-
-
 
+

+ +Various other files should be included, but may vary depending on platform +and build configuration. More documentation should be included in the local +documentation directory, though is not complete at this time. +  +

SIGNALS

+ +

+ +Privoxy terminates on the SIGINT, +SIGTERM and SIGABRT signals. Log +rotation scripts may cause a re-opening of the logfile by sending a +SIGHUP to Privoxy. Note that unlike +other daemons, Privoxy does not need to be made aware of +config file changes by SIGHUP -- it will detect them +automatically. +  +

NOTES

+ +

+ +This is a beta version of Privoxy. Not +all features are well tested. +

+ +Please see the user-manual on how to contact the +developers for feature requests, reporting problems, and other questions. +  +

SEE ALSO

+ +

+ +Other references and sites of interest to Privoxy +users: +

+ +

+http://www.privoxy.org/, +The Privoxy Home page. +

+http://sourceforge.net/projects/ijbswa, +the Project Page for Privoxy on +Sourceforge. +

+http://p.p/, access +Privoxy from your browser. Alternately, +http://config.privoxy.org +may work in some situations where the first does not. +

+http://www.junkbusters.com/ht/en/cookies.html +

+http://www.waldherr.org/junkbuster/ +

+http://privacy.net/analyze/ +

+http://www.squid-cache.org/ +  +

DEVELOPMENT TEAM

+ +

+

+ Stefan Waldherr
+ Andreas Oesterhelt
+ Jon Foster
+ Markus Breitenbach
+ Thomas Steudten
+ David Schmidt (OS/2, Mac OSX ports)
+ Gabriel L. Somlo
+ Hal Burgiss (docs)
+ Haroon Rafique
+ John Venvertloh
+ Joerg Strohmayer
+ Rodney Stromlund
+ Rodrigo Barbosa (RPM specfiles)
+ Sarantis Paskalis
+ Shamim Mohamed
+ Gábor Lipták
+ Alexander Lazic
 
-

COPYRIGHT AND LICENSE

-       This  program  is  free  software; you can redistribute it
-       and/or modify it under the terms of the GNU General Public
-       License  as  published  by  the  Free Software Foundation;
-       either version 2 of the License, or (at your  option)  any
-       later version.
-
-       This  program  is  distributed in the hope that it will be
-       useful, but WITHOUT ANY WARRANTY; without even the implied
-       warranty  of  MERCHANTABILITY  or FITNESS FOR A PARTICULAR
-       PURPOSE.  See the GNU  General  Public  License  for  more
-       details.
-
-       You  should have received a copy of the GNU General Public
-       License along with this program; if not, write to the Free
-       Software  Foundation,  Inc.,  59  Temple Place, Suite 330,
-       Boston, MA  02111-1307  USA
-
-       Internet Junkbuster Proxy is a  trademark  of  Junkbusters
-       Corporation.
-
-
-
 
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- +  +

COPYRIGHT AND LICENSE

+ +

+ +Privoxy is free software; you can +redistribute it and/or modify it under the terms of the GNU General Public +License as published by the Free Software Foundation; either version 2 of the +License, or (at your option) any later version. +

+ +This program is distributed in the hope that it will be useful, but WITHOUT +ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or +FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for +more details, which is available from the Free Software Foundation, Inc, 59 +Temple Place - Suite 330, Boston, MA 02111-1307, USA. +

+ +You should have received a copy of the GNU General Public License +along with this program; if not, write to the Free Software Foundation, Inc., +59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. +

+ +


+ 

Index

+
+
NAME
+
SYNOPSIS
+
OPTIONS
+
DESCRIPTION
+
INSTALLATION AND USAGE
+
CONFIGURATION
+
SAMPLE CONFIGURATION
+
FILES
+
SIGNALS
+
NOTES
+
SEE ALSO
+
DEVELOPMENT TEAM
+
COPYRIGHT AND LICENSE
+
+
+This document was created by +man2html, +using the manual pages.
+Time: 14:58:36 GMT, April 08, 2002 + +