From: hal9 Date: Sun, 10 Sep 2006 14:53:54 +0000 (+0000) Subject: Results of spell check. User manual has some updates to standard.actions file X-Git-Tag: v_3_0_5~47 X-Git-Url: http://www.privoxy.org/gitweb/index.html?a=commitdiff_plain;h=614fae69575c6fc11b2b887534e465eaf2ecdab3;p=privoxy.git Results of spell check. User manual has some updates to standard.actions file info. --- diff --git a/doc/source/contacting.sgml b/doc/source/contacting.sgml index aa104280..59a89867 100644 --- a/doc/source/contacting.sgml +++ b/doc/source/contacting.sgml @@ -3,7 +3,7 @@ Purpose : Entity included in other project documents. - $Id: contacting.sgml,v 2.4 2006/08/27 15:04:14 hal9 Exp $ + $Id: contacting.sgml,v 2.6 2006/08/27 22:01:55 hal9 Exp $ Copyright (C) 2001 - 2006 Privoxy Developers See LICENSE. @@ -76,7 +76,7 @@ Please send feedback on ads that slipped through, innocent images that were blocked, sites that don't work properly, and other configuration related problem of - default.action file, to the + default.action file, to http://sourceforge.net/tracker/?group_id=11118&atid=460288, the Actions File Tracker. @@ -139,7 +139,7 @@ Please be sure to provide the following information: - The operating system and verions you run + The operating system and versions you run Privoxy on, (e.g. Windows XP). diff --git a/doc/source/p-authors.sgml b/doc/source/p-authors.sgml index 0605e1e0..19ac3203 100644 --- a/doc/source/p-authors.sgml +++ b/doc/source/p-authors.sgml @@ -3,9 +3,9 @@ Purpose : Entity included in other project documents. - $Id: p-authors.sgml,v 2.10 2006/08/26 10:39:26 hal9 Exp $ + $Id: p-authors.sgml,v 2.11 2006/08/30 00:31:50 hal9 Exp $ - Copyright (C) 2001, 2002-2006 Privoxy Developers + Copyright (C) 2001-2006 Privoxy Developers See LICENSE. ====================================================================== @@ -24,7 +24,7 @@ --> -Current Developement Team: +Current Development Team: ]]> diff --git a/doc/source/user-manual.sgml b/doc/source/user-manual.sgml index 30629488..08c5dc9a 100644 --- a/doc/source/user-manual.sgml +++ b/doc/source/user-manual.sgml @@ -24,6 +24,7 @@ +Privoxy"> ]> @@ -188,8 +189,7 @@ How to install the binary packages depends on your operating system: Note that on Red Hat, Privoxy will not be automatically started on system boot. You will need to enable that using chkconfig, - ntsysv, or similar methods. Note that SuSE will -automatically start Privoxy in the boot process. + ntsysv, or similar methods. @@ -429,7 +429,7 @@ automatically start Privoxy in the boot process. - Mulitiple filter files can now be specifed in config. This allows for + Multiple filter files can now be specified in config. This allows for locally defined filters that can be maintained separately from the filters as supplied by the developers. @@ -568,7 +568,7 @@ automatically start Privoxy in the boot process. In addition, there are various bug fixes and significant enhancements, including - error pages should no longer be cached if the problem is fixed, better DNS + error pages should no longer be cached if the problem is fixed, much better DNS error handling, and various logging improvements. @@ -643,7 +643,7 @@ automatically start Privoxy in the boot process. -Quickstart to Using <application>Privoxy</application> +Quickstart to Using Privoxy @@ -725,7 +725,7 @@ automatically start Privoxy in the boot process. - For easy access to Privoxy's most important controls, drag the provided + For easy access to &my-app;'s most important controls, drag the provided Bookmarklets into your browser's personal toolbar. @@ -931,7 +931,7 @@ automatically start Privoxy in the boot process.
Actions Files in Use - + [ Screenshot of Actions Files in Use ] @@ -998,13 +998,14 @@ automatically start Privoxy in the boot process. -Starting <application>Privoxy</application> +Starting Privoxy Before launching Privoxy for the first time, you will want to configure your browser(s) to use - Privoxy as a HTTP and HTTPS proxy. The default is + Privoxy as a HTTP and HTTPS (SSL) proxy. The default is 127.0.0.1 (or localhost) for the proxy address, and port 8118 (earlier versions - used port 8000). This is the one configuration step that must be done! + used port 8000). This is the one configuration step that must be done +! Please note that Privoxy can only proxy HTTP and @@ -1013,10 +1014,11 @@ automatically start Privoxy in the boot process. -
Proxy Configuration (Mozilla) +
Proxy Configuration Showing + Mozilla/Netscape HTTP and HTTPS (SSL) Settings - + [ Screenshot of Mozilla Proxy Configuration ] @@ -1031,17 +1033,8 @@ automatically start Privoxy in the boot process. - - - Tools - |_ - Options - |_ - General - |_ - Connection Settings - |_ - Manual Proxy Configuration + Tools -> Options -> General -> Connection Settings -> Manual Proxy Configuration + @@ -1054,42 +1047,46 @@ automatically start Privoxy in the boot process. - Edit - |_ - Preferences - |_ - Advanced - |_ - Proxies - |_ - HTTP Proxy + Edit -> Preferences -> Advanced -> Proxies -> HTTP Proxy + - For Internet Explorer: + For Internet Explorer v.5-6: - - - Tools - |_ - Internet Properties - |_ - Connections - |_ - LAN Settings + Tools -> Internet Options -> Connections -> LAN Settings Then, check Use Proxy and fill in the appropriate info (Address: 127.0.0.1, Port: 8118). Include HTTPS (SSL), if you want HTTPS - proxy support too. + proxy support too (sometimes labeled Secure. Make sure any + checkboxes like Use the same proxy server for all protocols is + UNCHECKED. You want only HTTP and HTTPS (SSL)! + + +
Proxy Configuration Showing + Internet Explorer HTTP and HTTPS (Secure) Settings + + + + + + [ Screenshot of IE Proxy Configuration ] + + +
+
+ + After doing this, flush your browser's disk and memory caches to force a - re-reading of all pages and to get rid of any ads that may be cached. You + re-reading of all pages and to get rid of any ads that may be cached. Remove + any cookies, if you want Privoxy to manage that. You are now ready to start enjoying the benefits of using Privoxy! @@ -1103,23 +1100,31 @@ automatically start Privoxy in the boot process. -Red Hat and Conectiva +Red Hat, Fedora and Conectiva - We use a script. Note that Red Hat does not start Privoxy upon booting per - default. It will use the file /etc/privoxy/config as - its main configuration file. + A default Red Hat installation may not start &my-app; upon boot. It will use + the file /etc/privoxy/config as its main configuration + file. # /etc/rc.d/init.d/privoxy start + + Or ... + + + + # service privoxy start + + Debian - We use a script. Note that Debian starts Privoxy upon booting per + We use a script. Note that Debian typically starts &my-app; upon booting per default. It will use the file /etc/privoxy/config as its main configuration file. @@ -1148,16 +1153,16 @@ your PC. Windows -Click on the Privoxy Icon to start Privoxy. If no configuration file is +Click on the &my-app; Icon to start Privoxy. If no configuration file is specified on the command line, Privoxy will look for a file named config.txt. Note that Windows will - automatically start Privoxy when the system starts if you chose that option + automatically start &my-app; when the system starts if you chose that option when installing. Privoxy can run with full Windows service functionality. - On Windows only, the Privoxy program has two new command line arguments - to install and uninstall Privoxy as a service. See the + On Windows only, the &my-app; program has two new command line arguments + to install and uninstall &my-app; as a service. See the Windows Installation instructions for details. @@ -1189,7 +1194,7 @@ Example Unix startup command: Mac OSX During installation, Privoxy is configured to - start automatically when the system restarts. To start Privoxy by hand, + start automatically when the system restarts. To start &my-app; manually, double-click on the StartPrivoxy.command icon in the /Library/Privoxy folder. Or, type this command in the Terminal: @@ -1407,9 +1412,9 @@ must find a better place for this paragraph Before changing to the user ID given in the --user option, - chroot to that user's home directory, i.e. make the kernel pretend to the Privoxy + chroot to that user's home directory, i.e. make the kernel pretend to the &my-app; process that the directory tree starts there. If set up carefully, this can limit - the impact of possible vulnerabilities in Privoxy to the files contained in that hierarchy. + the impact of possible vulnerabilities in &my-app; to the files contained in that hierarchy. Unix only. @@ -1446,7 +1451,7 @@ for details. -<application>Privoxy</application> Configuration +Privoxy Configuration All Privoxy configuration is stored in text files. These files can be edited with a text editor. @@ -1458,7 +1463,7 @@ for details. -Controlling <application>Privoxy</application> with Your Web Browser +Controlling Privoxy with Your Web Browser Privoxy's user interface can be reached through the special URL http://config.privoxy.org/ @@ -1694,6 +1699,10 @@ for details. a set of broad rules that should work reasonably well for users everywhere. This is the file that the developers are keeping updated, and making available to users. + It is also the file that keeps track of the user's preferences + as set in standard.action, e.g. either + cautious, medium, or + adventuresome. @@ -1706,12 +1715,36 @@ for details. - standard.action - is used by the web based editor, + standard.action - is used by the web based editor + at + http://config.privoxy.org/edit-actions-list?f=default, to set various pre-defined sets of rules for the default actions section - in default.action. These have increasing levels of - aggressiveness and have no influence on your browsing unless - you select them explicitly in the editor. It is not recommend - to edit this file. + in default.action. + + + Edit Set to Cautious Set to Medium Set to Adventuresome + + + These have increasing levels of aggressiveness and have no + influence on your browsing unless you select them explicitly in the + editor. + + + The Edit button allows you to turn each + action on/off individually for fine-tuning. The Cautious + button changes the actions list to low/safe settings which will activate + a minimal set of &my-app;'s features, and subsequently there will be + less of a chance for accidental problems. The Medium + button sets the list to a medium level of ad blocking and a low level set of + privacy features. The Adventuresome button + sets the list to a high level of ad blocking and medium level of + privacy. See the chart below. The latter three buttons over-ride + any changes via with the Edit button. More + fine-tuning can be done in the lower sections of this internal page. + + + It is not recommend to edit the standard.action file + itself. The default profiles, and their associated actions, as pre-defined in @@ -1743,31 +1776,37 @@ for details. - Ad-blocking by URL - yes - yes - yes + Ad-blocking Aggressiveness + low + medium + high Ad-filtering by size - yes + no yes yes - GIF de-animation + Ad-filtering by link + no no - yes yes - - Referer forging + Pop-up killing no - yes - yes + unsolicited + all + + + + Privacy Features + none + low + medium @@ -1778,69 +1817,56 @@ for details. - Pop-up killing - unsolicited - unsolicited - all - - - - Fast redirects - no + Referer forging no yes - - - - HTML taming - yes - yes yes + - JavaScript taming - yes + GIF de-animation + no yes yes + - Web-bug killing - yes - yes + Fast redirects + no + no yes - Fun text replacements - no + HTML taming no yes + yes - Image tag reordering - no + JavaScript taming no yes + yes - Ad-filtering by link - no + Web-bug killing no yes + yes - Demoronizer + Image tag reordering no no yes - @@ -1895,7 +1921,7 @@ for details. actions file) are, the more exceptions for trusted sites you will have to make later. If, for example, you want to crunch all cookies per default, you'll have to make exceptions from that rule for sites that you - regularly use and that require cookies for actually useful puposes, like maybe + regularly use and that require cookies for actually useful purposes, like maybe your bank, favorite shop, or newspaper. @@ -2364,7 +2390,7 @@ for details. Typical use: - Block ads or other obnoxious content + Block ads or other unwanted content @@ -2511,7 +2537,7 @@ new action If you see a web site that proudly uses XHTML buttons, but sets - Content-Type: text/html, you can use Privoxy + Content-Type: text/html, you can use &my-app; to overwrite it with application/xml and validate the web master's claim inside your XHTML-supporting browser. If the syntax is incorrect, the browser will complain loudly. @@ -3382,7 +3408,7 @@ problem-host.example.com - +filter{frameset-borders} # Give frames a border and make them resizable + +filter{frameset-borders} # Give frames a border and make them resizeable @@ -3394,7 +3420,7 @@ problem-host.example.com - +filter{quicktime-kioskmode} # Make Quicktime movies saveable + +filter{quicktime-kioskmode} # Make Quicktime movies savable @@ -3762,7 +3788,7 @@ example.org/.*\.js$ Typical use: - Mark URLs as belonging to images (so they'll be replaced by imagee if they get blocked) + Mark URLs as belonging to images (so they'll be replaced by images if they do get blocked, rather than HTML pages) @@ -4066,7 +4092,7 @@ new action Instead of removing the header, hide-if-modified-since can - also add or substract a random amount of time to/from the header's value. + also add or subtract a random amount of time to/from the header's value. You specify a range of minutes where the random factor should be chosen from and Privoxy does the rest. A negative value means subtracting, a positive value adding. @@ -4651,7 +4677,7 @@ new action Privoxy relays HTTPS traffic without seeing - the decoded content. Websites can leverage this limitation to circumvent Privoxy's + the decoded content. Websites can leverage this limitation to circumvent &my-app;'s filters. By specifying an invalid port range you can disable HTTPS entirely. If you plan to disable SSL by default, consider enabling treat-forbidden-connects-like-blocks @@ -4671,7 +4697,7 @@ new action +limit-connect{80,443} # Ports 80 and 443 are OK. +limit-connect{-3, 7, 20-100, 500-} # Ports less than 3, 7, 20 to 100 and above 500 are OK. +limit-connect{-} # All ports are OK -+limit-connect{,} # No HTTPS traffic is allowed ++limit-connect{,} # No HTTPS/SSL traffic is allowed @@ -5351,7 +5377,7 @@ new action If you previously configured Privoxy to do the request through a SSL tunnel, everything will work. Most likely you haven't and the server will respond with an error message because it is expecting - HTTPS. + HTTPS (SSL). @@ -6182,7 +6208,7 @@ ar.atwola.com/ On-the-fly text substitutions that can be invoked through the filter action need to be defined in a filter file. Once defined, they - can then be invoked as an action. Mulitple filter files can be + can then be invoked as an action. Multiple filter files can be defined through the filterfile config directive. The filters as supplied by the developers will be found in @@ -6411,9 +6437,9 @@ s/window\.status\s*=\s*(['"]).*?\1/dUmMy=1/ig makes this matching of arbitrary text ungreedy. (Note that the U option is not set). The ['"] construct means: a single or a double quote. Finally, \1 is - a backreference to the first parenthesis just like $1 above, + a back-reference to the first parenthesis just like $1 above, with the difference that in the pattern, a backslash indicates - a backreference, whereas in the substitute, it's the dollar. + a back-reference, whereas in the substitute, it's the dollar. @@ -6538,7 +6564,7 @@ pre-defined filters for your convenience: removes code that causes new windows to be opened with undesired properties, such as being - full-screen, non-resizable, without location, status or menu bar etc. + full-screen, non-resizeable, without location, status or menu bar etc. @@ -6571,7 +6597,7 @@ pre-defined filters for your convenience: The BLINK and MARQUEE tags are neutralized (yeah baby!), and browser windows will be created as - resizable (as of course they should be!), and will have location, + resizeable (as of course they should be!), and will have location, scroll and menu bars -- even if specified otherwise. @@ -6581,7 +6607,7 @@ pre-defined filters for your convenience: content-cookies - Most cookies are set in the HTTP dialogue, where they can be intercepted + Most cookies are set in the HTTP dialog, where they can be intercepted by the crunch-incoming-cookies and crunch-outgoing-cookies @@ -6619,7 +6645,7 @@ pre-defined filters for your convenience: Technical note: The filter works by redefining the window.open JavaScript function to a dummy function during the loading and rendering phase of each - HTML page access, and restoring the function afterwards. + HTML page access, and restoring the function afterward. @@ -6746,7 +6772,7 @@ pre-defined filters for your convenience: This filter translates the MS-only characters into Latin-1 equivalents. It is not necessary when using MS products, and will cause corruption of all documents that use 8-bit character sets other than Latin-1. It's mostly - worthwhile for Europeans on non-MS platforms, if wierd garbage characters + worthwhile for Europeans on non-MS platforms, if weird garbage characters sometimes appear on some pages, or user agents that don't correct for this on the fly. -<application>Privoxy</application> Copyright, License and History +Privoxy Copyright, License and History ©right; @@ -7231,7 +7257,7 @@ Requests -<application>Privoxy</application>'s Internal Pages +Privoxy's Internal Pages Since Privoxy proxies each requested @@ -8006,10 +8032,15 @@ In file: user.action [ View ] [ Edit ]