Privoxy 3.0.10 User Manual

Copyright © 2001 - 2008 by Privoxy Developers

$Id: user-manual.sgml,v 2.86 2008/08/16 10:12:23 fabiankeil Exp $

The Privoxy User Manual gives users information on how to install, configure and use Privoxy.

Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data, managing HTTP cookies, controlling access, and removing ads, banners, pop-ups and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. Privoxy has application for both stand-alone systems and multi-user networks.

Privoxy is based on Internet Junkbuster (tm).

You can find the latest version of the Privoxy User Manual at http://www.privoxy.org/user-manual/. Please see the Contact section on how to contact the developers.


Table of Contents
1. Introduction
1.1. Features
2. Installation
2.1. Binary Packages
2.1.1. Red Hat and Fedora RPMs
2.1.2. Debian and Ubuntu
2.1.3. Windows
2.1.4. Solaris
2.1.5. OS/2
2.1.6. Mac OS X
2.1.7. AmigaOS
2.1.8. FreeBSD
2.1.9. Gentoo
2.2. Building from Source
2.3. Keeping your Installation Up-to-Date
3. What's New in this Release
3.1. Note to Upgraders
4. Quickstart to Using Privoxy
4.1. Quickstart to Ad Blocking
5. Starting Privoxy
5.1. Red Hat and Fedora
5.2. Debian
5.3. Windows
5.4. Solaris, NetBSD, FreeBSD, HP-UX and others
5.5. OS/2
5.6. Mac OS X
5.7. AmigaOS
5.8. Gentoo
5.9. Command Line Options
6. Privoxy Configuration
6.1. Controlling Privoxy with Your Web Browser
6.2. Configuration Files Overview
7. The Main Configuration File
7.1. Local Set-up Documentation
7.1.1. user-manual
7.1.2. trust-info-url
7.1.3. admin-address
7.1.4. proxy-info-url
7.2. Configuration and Log File Locations
7.2.1. confdir
7.2.2. templdir
7.2.3. logdir
7.2.4. actionsfile
7.2.5. filterfile
7.2.6. logfile
7.2.7. jarfile
7.2.8. trustfile
7.3. Debugging
7.3.1. debug
7.3.2. single-threaded
7.3.3. hostname
7.4. Access Control and Security
7.4.1. listen-address
7.4.2. toggle
7.4.3. enable-remote-toggle
7.4.4. enable-remote-http-toggle
7.4.5. enable-edit-actions
7.4.6. enforce-blocks
7.4.7. ACLs: permit-access and deny-access
7.4.8. buffer-limit
7.5. Forwarding
7.5.1. forward
7.5.2. forward-socks4, forward-socks4a and forward-socks5
7.5.3. Advanced Forwarding Examples
7.5.4. forwarded-connect-retries
7.5.5. accept-intercepted-requests
7.5.6. allow-cgi-request-crunching
7.5.7. split-large-forms
7.6. Windows GUI Options
8. Actions Files
8.1. Finding the Right Mix
8.2. How to Edit
8.3. How Actions are Applied to Requests
8.4. Patterns
8.4.1. The Domain Pattern
8.4.2. The Path Pattern
8.4.3. The Tag Pattern
8.5. Actions
8.5.1. add-header
8.5.2. block
8.5.3. client-header-filter
8.5.4. client-header-tagger
8.5.5. content-type-overwrite
8.5.6. crunch-client-header
8.5.7. crunch-if-none-match
8.5.8. crunch-incoming-cookies
8.5.9. crunch-server-header
8.5.10. crunch-outgoing-cookies
8.5.11. deanimate-gifs
8.5.12. downgrade-http-version
8.5.13. fast-redirects
8.5.14. filter
8.5.15. force-text-mode
8.5.16. forward-override
8.5.17. handle-as-empty-document
8.5.18. handle-as-image
8.5.19. hide-accept-language
8.5.20. hide-content-disposition
8.5.21. hide-if-modified-since
8.5.22. hide-forwarded-for-headers
8.5.23. hide-from-header
8.5.24. hide-referrer
8.5.25. hide-user-agent
8.5.26. limit-connect
8.5.27. prevent-compression
8.5.28. overwrite-last-modified
8.5.29. redirect
8.5.30. server-header-filter
8.5.31. server-header-tagger
8.5.32. session-cookies-only
8.5.33. set-image-blocker
8.5.34. Summary
8.6. Aliases
8.7. Actions Files Tutorial
8.7.1. default.action
8.7.2. user.action
9. Filter Files
9.1. Filter File Tutorial
9.2. The Pre-defined Filters
10. Privoxy's Template Files
11. Contacting the Developers, Bug Reporting and Feature Requests
11.1. Get Support
11.2. Reporting Problems
11.2.1. Reporting Ads or Other Configuration Problems
11.2.2. Reporting Bugs
11.3. Request New Features
11.4. Other
12. Privoxy Copyright, License and History
12.1. License
12.2. History
12.3. Authors
13. See Also
14. Appendix
14.1. Regular Expressions
14.2. Privoxy's Internal Pages
14.2.1. Bookmarklets
14.3. Chain of Events
14.4. Troubleshooting: Anatomy of an Action