From: hal9 Date: Mon, 19 Nov 2007 02:38:11 +0000 (+0000) Subject: Minor revisions and rebuild X-Git-Tag: v_3_0_7~39 X-Git-Url: http://www.privoxy.org/gitweb/contact.html?a=commitdiff_plain;h=98d0c48b4c00026b5f23e0aa7ef6598fefe89cb3;p=privoxy.git Minor revisions and rebuild --- diff --git a/doc/pdf/privoxy-faq.pdf b/doc/pdf/privoxy-faq.pdf index a79c0ec7..236072de 100644 Binary files a/doc/pdf/privoxy-faq.pdf and b/doc/pdf/privoxy-faq.pdf differ diff --git a/doc/source/faq.sgml b/doc/source/faq.sgml index 6ba502fa..eb54e65b 100644 --- a/doc/source/faq.sgml +++ b/doc/source/faq.sgml @@ -26,7 +26,7 @@ This file belongs into ijbswa.sourceforge.net:/home/groups/i/ij/ijbswa/htdocs/ - $Id: faq.sgml,v 2.32 2007/11/13 03:03:42 hal9 Exp $ + $Id: faq.sgml,v 2.33 2007/11/15 03:30:20 hal9 Exp $ Copyright (C) 2001-2007 Privoxy Developers http://privoxy.org See LICENSE. @@ -77,7 +77,7 @@ -$Id: faq.sgml,v 2.32 2007/11/13 03:03:42 hal9 Exp $ +$Id: faq.sgml,v 2.33 2007/11/15 03:30:20 hal9 Exp $ other people can, + and do read it. You can build the software from scratch, if you want, so that you know the executable is clean, and that it is yours. In fact, we encourage this level of scrutiny. It is one reason we use &my-app; ourselves. @@ -434,7 +425,7 @@ warranty? Registration? Can Privoxy remove spyware? Adware? Viruses? - No, at least not reliable enough to trust it. &my-app; is not designed to be + No, at least not reliably enough to trust it. &my-app; is not designed to be a malware removal tool and the default configuration doesn't even try to filter out any malware. @@ -2240,31 +2231,31 @@ Request: img.example.com/sr.js Request: example.betamarker.com/example.html Request: www.lik-sang.com/Banners/bestsellers/skyscraper.php?likref=BSellers Request: img.example.com/pb.png -Request: www.google-analytics.com/urchin.js crunch! -Request: www.advertising-department.com/ats/switch.ps.php?26856 crunch! +Request: www.google-analytics.com/urchin.js crunch! (Blocked) +Request: www.advertising-department.com/ats/switch.ps.php?26856 crunch! (Blocked) Request: img.example.com/p.gif -Request: www.popuptraffic.com/assign.php?l=example&mode=behind crunch! -Request: www.popuptraffic.com/scripts/popup.php?hid=5c3cf&tmpl=PBa.tmpl crunch! -Request: www.popuptraffic.com/assign.php?l=example crunch! +Request: www.popuptraffic.com/assign.php?l=example&mode=behind crunch! (Blocked) +Request: www.popuptraffic.com/scripts/popup.php?hid=5c3cf&tmpl=PBa.tmpl crunch! (Blocked) +Request: www.popuptraffic.com/assign.php?l=example crunch! (Blocked) Request: www.lik-sang.com/Banners/best_sellers/best_sellers.css -Request: www.adtrak.net/adx.js crunch! +Request: www.adtrak.net/adx.js crunch! (Blocked) Request: img.example.com/hbg.gif Request: img.example.com/example.jpg Request: img.example.com/mt.png Request: img.example.com/mm.png Request: img.example.com/mb.png -Request: www.popuptraffic.com/scripts/popup.php?hid=a71b91fa5&tmpl=Ua.tmp crunch! +Request: www.popuptraffic.com/scripts/popup.php?hid=a71b91fa5&tmpl=Ua.tmp crunch! (Blocked) Request: www.example.com/tracker.js Request: www.lik-sang.com/Banners/best_sellers/lsi_head.gif -Request: www.adtrak.net/adjs.php?n=020548130&what=zone:61 crunch! -Request: www.adtrak.net/adjs.php?n=463594413&what=zone:58&source=Ua crunch! +Request: www.adtrak.net/adjs.php?n=020548130&what=zone:61 crunch! (Blocked) +Request: www.adtrak.net/adjs.php?n=463594413&what=zone:58&source=Ua crunch! (Blocked) Request: www.lik-sang.com/Banners/best_sellers/bottomani.swf -Request: mmm.elitemediagroup.net/install.php?allowpop=no&popupmincook=0&allowsp2=1 crunch! +Request: mmm.elitemediagroup.net/install.php?allowpop=no&popupmincook=0&allowsp2=1 crunch! (Blocked) Request: www.example.com/tracker.js?screen=1400x1050&win=962x693 -Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=61 crunch! +Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=61 crunch! (Blocked) Request: 66.70.21.80/scripts/click.php?hid=5c3cf599a9efd0320d26&si Request: 66.70.21.80/img/pixel.gif -Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=58&source=Ua&block=86400 crunch! +Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=58&source=Ua&block=86400 crunch! (Blocked) Request: 66.70.21.80/scripts/click.php?hid=a71b9f6504b0c5681fa5&si=Ua ]]> @@ -2770,6 +2761,9 @@ browsing has slowed to a crawl. What gives? 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA $Log: faq.sgml,v $ +Revision 2.33 2007/11/15 03:30:20 hal9 +Results of spell check. + Revision 2.32 2007/11/13 03:03:42 hal9 Various changes to reflect new features and revised configuration for the upcoming release. diff --git a/doc/text/faq.txt b/doc/text/faq.txt index c99aafe0..7f5c4f59 100644 --- a/doc/text/faq.txt +++ b/doc/text/faq.txt @@ -305,14 +305,8 @@ you to browse your personal and "private edition" of the web. Privoxy picks up where Junkbuster left off. All the old features remain. The new Privoxy still blocks ads and banners, still manages cookies, and still -helps protect your privacy. But, these are all greatly enhanced, and many, many -new features have been added, all in the same vein. - -The configuration has changed significantly as well. This is something that -users will notice right off the bat if upgrading from Junkbuster 2.0.x. The -"blocklist" "cookielist", "imagelist" and much more has been combined into the -"actions" files, with a completely different syntax. See the What's New page -for the latest updates. +helps protect your privacy. But, these have all been greatly enhanced, and +many, many new features have been added, all in the same vein. Privoxy's new features include: @@ -436,11 +430,10 @@ configuration for possibly many browsers or users. The most important reason is because you have access to everything, and you can control everything. You can check every line of every configuration file yourself. You can check every last bit of source code should you desire. And -even if you can't read code, there should be some comfort in knowing that -thousands of other people can, and some of them do read it. You can build the -software from scratch, if you want, so that you know the executable is clean, -and that it is yours. In fact, we encourage this level of scrutiny. It is one -reason we use Privoxy ourselves. +even if you can't read code, there should be some comfort in knowing that other +people can, and do read it. You can build the software from scratch, if you +want, so that you know the executable is clean, and that it is yours. In fact, +we encourage this level of scrutiny. It is one reason we use Privoxy ourselves. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ @@ -459,7 +452,7 @@ Privoxy really is free in every respect! 1.15. Can Privoxy remove spyware? Adware? Viruses? -No, at least not reliable enough to trust it. Privoxy is not designed to be a +No, at least not reliably enough to trust it. Privoxy is not designed to be a malware removal tool and the default configuration doesn't even try to filter out any malware. @@ -1758,31 +1751,31 @@ Request: img.example.com/sr.js Request: example.betamarker.com/example.html Request: www.lik-sang.com/Banners/bestsellers/skyscraper.php?likref=BSellers Request: img.example.com/pb.png -Request: www.google-analytics.com/urchin.js crunch! -Request: www.advertising-department.com/ats/switch.ps.php?26856 crunch! +Request: www.google-analytics.com/urchin.js crunch! (Blocked) +Request: www.advertising-department.com/ats/switch.ps.php?26856 crunch! (Blocked) Request: img.example.com/p.gif -Request: www.popuptraffic.com/assign.php?l=example&mode=behind crunch! -Request: www.popuptraffic.com/scripts/popup.php?hid=5c3cf&tmpl=PBa.tmpl crunch! -Request: www.popuptraffic.com/assign.php?l=example crunch! +Request: www.popuptraffic.com/assign.php?l=example&mode=behind crunch! (Blocked) +Request: www.popuptraffic.com/scripts/popup.php?hid=5c3cf&tmpl=PBa.tmpl crunch! (Blocked) +Request: www.popuptraffic.com/assign.php?l=example crunch! (Blocked) Request: www.lik-sang.com/Banners/best_sellers/best_sellers.css -Request: www.adtrak.net/adx.js crunch! +Request: www.adtrak.net/adx.js crunch! (Blocked) Request: img.example.com/hbg.gif Request: img.example.com/example.jpg Request: img.example.com/mt.png Request: img.example.com/mm.png Request: img.example.com/mb.png -Request: www.popuptraffic.com/scripts/popup.php?hid=a71b91fa5&tmpl=Ua.tmp crunch! +Request: www.popuptraffic.com/scripts/popup.php?hid=a71b91fa5&tmpl=Ua.tmp crunch! (Blocked) Request: www.example.com/tracker.js Request: www.lik-sang.com/Banners/best_sellers/lsi_head.gif -Request: www.adtrak.net/adjs.php?n=020548130&what=zone:61 crunch! -Request: www.adtrak.net/adjs.php?n=463594413&what=zone:58&source=Ua crunch! +Request: www.adtrak.net/adjs.php?n=020548130&what=zone:61 crunch! (Blocked) +Request: www.adtrak.net/adjs.php?n=463594413&what=zone:58&source=Ua crunch! (Blocked) Request: www.lik-sang.com/Banners/best_sellers/bottomani.swf -Request: mmm.elitemediagroup.net/install.php?allowpop=no&popupmincook=0&allowsp2=1 crunch! +Request: mmm.elitemediagroup.net/install.php?allowpop=no&popupmincook=0&allowsp2=1 crunch! (Blocked) Request: www.example.com/tracker.js?screen=1400x1050&win=962x693 -Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=61 crunch! +Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=61 crunch! (Blocked) Request: 66.70.21.80/scripts/click.php?hid=5c3cf599a9efd0320d26&si Request: 66.70.21.80/img/pixel.gif -Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=58&source=Ua&block=86400 crunch! +Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=58&source=Ua&block=86400 crunch! (Blocked) Request: 66.70.21.80/scripts/click.php?hid=a71b9f6504b0c5681fa5&si=Ua diff --git a/doc/webserver/faq/configuration.html b/doc/webserver/faq/configuration.html index 9899282d..a8de99ca 100644 --- a/doc/webserver/faq/configuration.html +++ b/doc/webserver/faq/configuration.html @@ -81,7 +81,7 @@ CLASS="SECT2" >

3.1. What exactly is an "actions"

3.3. How are actions files configured? What is the easiest way to do this?

3.4. There are several different "actions"

3.11. What is the default.filter

3.13. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.

3.14. Why would anybody want to see a checkerboard pattern?

3.15. I see some images being replaced with text instead of the checkerboard image. Why and how do I get rid of this?

7.1. License

7.2. History

cookies, and still - helps protect your privacy. But, these are all greatly enhanced, and many, + helps protect your privacy. But, these have all been greatly enhanced, and many, many new features have been added, all in the same vein.

The configuration has changed significantly as well. This is something that - users will notice right off the bat if upgrading from - Junkbuster 2.0.x. The "blocklist" - "cookielist", "imagelist" and much more has been - combined into the "actions" files, with a completely different - syntax. See the What's New - page for the latest updates.

Privoxy

1.9. Can Privoxy make mistakes? This does not sound very scientific.

1.10. Will I have to configure Privoxy before I can use it?

, and you can control everything. You can check every line of every configuration file yourself. You can check every last bit of source code should you desire. And even if you can't read code, - there should be some comfort in knowing that thousands of other people can, - and some of them do read it. You can build the software from scratch, if you want, + there should be some comfort in knowing that other people can, + and do read it. You can build the software from scratch, if you want, so that you know the executable is clean, and that it is 1.15. Can Privoxy remove spyware? Adware? Viruses?

No, at least not reliable enough to trust it. No, at least not reliably enough to trust it. Privoxy is not designed to be diff --git a/doc/webserver/faq/index.html b/doc/webserver/faq/index.html index 3a15aeac..25d996c6 100644 --- a/doc/webserver/faq/index.html +++ b/doc/webserver/faq/index.html @@ -184,13 +184,13 @@ an ad, and what is not?

1.9. Can Privoxy make mistakes? This does not sound very scientific.
1.10. Will I have to configure Privoxy before I can use it?
3.1. What exactly is an "actions"
3.3. How are actions files configured? What is the easiest way to do this?
3.4. There are several different "actions"
3.11. What is the default.filter
3.13. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.
3.14. Why would anybody want to see a checkerboard pattern?
3.15. I see some images being replaced with text instead of the checkerboard image. Why and how do I get rid of this?
4.1. How much does Privoxy slow my browsing down? This has to add extra time to browsing.
4.8. Can Privoxy guarantee I am anonymous?
4.9. A test site says I am not using a Proxy.
4.11. Might some things break because header information or content is being altered?
4.12. Can Privoxy act as a "caching"
4.13. What about as a firewall? Can Privoxy protect me?
4.14. I have large empty spaces / a checkerboard pattern now where ads used to be. Why?
4.15. How can Privoxy filter Secure (HTTPS) URLs?
4.16. Privoxy runs as a "server"
5.1. I cannot connect to any websites. Or, I am getting
5.3. I just added a new rule, but the steenkin ad is still getting through. How?
7.1. License
7.2. History

4.1. How much does Privoxy slow my browsing down? This has to add extra time to browsing.

4.8. Can Privoxy guarantee I am anonymous?

4.9. A test site says I am not using a Proxy.

4.11. Might some things break because header information or content is being altered?

4.12. Can Privoxy act as a "caching"

4.13. What about as a firewall? Can Privoxy protect me?

4.14. I have large empty spaces / a checkerboard pattern now where ads used to be. Why?

4.15. How can Privoxy filter Secure (HTTPS) URLs?

4.16. Privoxy runs as a "server"

-

5.1. I cannot connect to any websites. Or, I am getting

5.3. I just added a new rule, but the steenkin ad is still getting through. How?