-<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">\r
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">\r
+<!-- $Id$\r
+\r
+ See copyright details at end of file\r
+\r
+ After changing this file, please run it through "HTML Tidy"\r
+ (from http://www.w3.org/People/Raggett/tidy/)\r
+ It should have no warnings or errors.\r
+-->\r
+\r
<html>\r
-<head>\r
-<!-- Copyright 1996-8 Junkbusters Corporation -->\r
-<!-- This work comes with NO WARRANTY -->\r
-<!-- It may be redistributed and modified under the GNU GPL-->\r
-<!-- See the body of http://www.junkbusters.com/ht/en/gpl.html for details-->\r
-<!-- Junkbusters is a registered trade mark of Junkbusters Corporation -->\r
-<!-- Generated 1998/10/31 03:58:25 UTC -->\r
-<meta name="Generator" content="Junkbusters Ebira $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $">\r
-<!-- Document ID: $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $ -->\r
-<title>\r
-The GNU General Public License\r
-</title>\r
-<base href="http://www.junkbusters.com/ht/en/gpl.html">\r
-<meta name="description" content="We did not write the GPL: the Free Software Foundation did | The GPL allows copying and changing of copyrighted documents | Version 2, June 1991 | Preamble | GNU General Public License: Terms and Conditions for Copying, Distribution and Modification | Appendix: How to Apply These Terms to Your New Programs">\r
-<meta name="keywords" content="stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, spamoff, declare, telemarketing, telemarketers, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, conservation, recycling, catalogs, consumer, sending, opt out ">\r
-<link rel="next" href="precre.html">\r
-<link rel="previous" href="precre.html">\r
-<link rel="contents" href="toc.html">\r
-</head>\r
-<body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink="#787878">\r
-<p align="center">\r
-<a name="top_of_page" href="legal.html#marks">\r
-<img border=0 width=160 height=34 src="/images/trans_tn.gif" alt="Junkbusters"></a>\r
-</p>\r
-\r
-<center>\r
-<h1>The GNU General Public License\r
-</h1>\r
-</center>\r
-<!-- Translators: no -->\r
-<center>\r
-<h2><a name="notus"><font face="arial, helvetica">\r
-We did not write the GPL: the Free Software Foundation did\r
-</font></a>\r
-</h2>\r
-</center>\r
-\r
-<h3><a name="allows" href="/cgi-bin/gp?pg=gpl&pr=allows"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-The GPL allows copying and changing of copyrighted documents\r
-</h3>\r
-<p>\r
-<a name="fsf">The Free Software Foundation</a>\r
-<a href="http://www.fsf.org/fsf/fsf.html">(FSF)</a>\r
-is a non-profit institution\r
-that designed the GNU General Public License (GPL) to promote the\r
-publication of free software.\r
-The GPL is used by thousands of programmers\r
-who want to give others the right to copy and modify\r
-the source code of their programs. Millions of people benefit from this.\r
-<p>\r
-<a name="junkbuster">We use the GPL</a>\r
-to allow everyone to use, copy and modify the\r
-<a href="ijb.html">Internet Junkbuster</a>\r
-as they wish.\r
-<a name="separate">Companies can use it for commercial purposes,</a>\r
-but they are not permitted to use it in products that they claim\r
-as their property\r
-without negotiating a separate agreement with us beforehand.\r
-<p>\r
-<a name="text">The GPL</a>\r
-<a href="http://dsl.org/copyleft/">can also be used</a>\r
-on documents written in human languages.\r
-We give everyone permission to use everything on our web site under the GPL.\r
-This means that you do not have to break copyright laws in order\r
-to print a page or email a screen of the text to someone, for example.\r
-Many sites do not permit you to do these things.\r
-<p>\r
-<a name="best">If you have a home page,</a>\r
-we recommend that you consider using the GPL to\r
-allow others the right to copy and use all the documents you create for it.\r
-If you just mark a page as copyright, they won't even\r
-legally be able to print it.\r
-If you don't state you are its copyright owner,\r
-they could change it slightly and claim it as their own property. \r
-By marking it with both copyright and GPL notices\r
-you allow them to copy it but not to claim\r
-anything derived from it as their own.\r
-<p>\r
-<a name="protect">The GPL protects your</a>\r
-<a href="declare.html">J<small>UNK<i>BUSTERS</i></small> D<small>ECLARATION</small></a>,\r
-<a href="spamoff.html">Spam Offer</a>,\r
-and all documents from us that you publish on your home page\r
-or distribute to direct marketers by any other means.\r
-By making your\r
-D<small>ECLARATION</small>\r
-available to them under the GPL, you are\r
-<a href="precre.html#gpl">permitting them use to it, but never to claim it as their property,</a>\r
-even if they transform it.\r
-<p>\r
-<a name="rest">The</a>\r
-remainder of this page is the text of the GPL.\r
-As legal documents go it's relatively clear,\r
-but unfortunately it's fairly long because it has to cover\r
-a lot of details specific to computer programs\r
-that may not be relevant to\r
-D<small>ECLARATION</small>s.\r
-The hypertext links are ours, and should not be misinterpreted\r
-as an indication of emphasis by the FSF.\r
-</p>\r
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>\r
-<center>\r
-<h2><a name="v2"><font face="arial, helvetica">\r
-Version 2, June 1991\r
-</font></a>\r
-</h2>\r
-</center>\r
-<blockquote>\r
-<a name="crn">Copyright 1989, 1991</a>\r
-<br>\r
-<a name="address">Free Software Foundation, Inc.</a>\r
-<br>\r
-675 Mass Ave.\r
-<br>\r
-Cambridge, MA 02139\r
-<br>\r
-USA\r
-</blockquote>\r
-<a name="changing">Everyone</a>\r
-is permitted to copy and distribute verbatim copies\r
-of this license document, but changing it is not allowed.\r
-\r
-<h3><a name="pream" href="/cgi-bin/gp?pg=gpl&pr=pream"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Preamble\r
-</h3>\r
-<p>\r
-The licenses for most software are designed to take away your\r
-freedom to share and change it. By contrast, the GNU General Public\r
-License is intended to guarantee your freedom to share and change free\r
-software--to make sure the software is free for all its users. This\r
-General Public License applies to most of the Free Software\r
-Foundation's software and to any other program whose authors commit to\r
-using it. (Some other Free Software Foundation software is covered by\r
-the GNU Library General Public License instead.) You can apply it to\r
-your programs, too.\r
-<p>\r
-<a name="freedom">When we speak of free software,</a>\r
-we are referring to freedom, not\r
-price. Our General Public Licenses are designed to make sure that you\r
-have the freedom to distribute copies of free software (and charge for\r
-this service if you wish), that you receive source code or can get it\r
-if you want it, that you can change the software or use pieces of it\r
-in new free programs; and that you know you can do these things.\r
-<p>\r
-<a name="forbid">To protect your rights,</a>\r
-we need to make restrictions that forbid\r
-anyone to deny you these rights or to ask you to surrender the rights.\r
-These restrictions translate to certain responsibilities for you if you\r
-distribute copies of the software, or if you modify it.\r
-<p>\r
-<a name="allrights">For example,</a>\r
-if you distribute copies of such a program, whether\r
-gratis or for a fee, you must give the recipients all the rights that\r
-you have. You must make sure that they, too, receive or can get the\r
-source code. And you must show them these terms so they know their\r
-rights.\r
-<p>\r
-<a name="steps">We protect your rights with two steps:</a>\r
-(1) copyright the software, and\r
-(2) offer you this license which gives you legal permission to copy,\r
-distribute and/or modify the software.\r
-<p>\r
-<a name="protection">Also,</a>\r
-for each author's protection and ours, we want to make certain\r
-that everyone understands that there is no warranty for this free\r
-software. If the software is modified by someone else and passed on, we\r
-want its recipients to know that what they have is not the original, so\r
-that any problems introduced by others will not reflect on the original\r
-authors' reputations.\r
-<p>\r
-<a name="threat">Finally,</a>\r
-any free program is threatened constantly by software\r
-patents. We wish to avoid the danger that redistributors of a free\r
-program will individually obtain patent licenses, in effect making the\r
-program proprietary. To prevent this, we have made it clear that any\r
-patent must be licensed for everyone's free use or not licensed at all.\r
-<p>\r
-<a name="terms">The precise terms and conditions</a>\r
-for copying, distribution and\r
-modification follow.\r
-</p>\r
-\r
-<h3><a name="tnc" href="/cgi-bin/gp?pg=gpl&pr=tnc"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-GNU General Public License: Terms and Conditions for Copying, Distribution and Modification\r
-</h3>\r
-<p>\r
-<a name="applies">O.</a>\r
-This License applies to any program or other work which contains\r
-a notice placed by the copyright holder saying it may be distributed\r
-under the terms of this General Public License. The "Program", below,\r
-refers to any such program or work, and a "work based on the Program"\r
-means either the Program or any derivative work under copyright law:\r
-that is to say, a work containing the Program or a portion of it,\r
-either verbatim or with modifications and/or translated into another\r
-language. (Hereinafter,\r
-<a href="bus-ops.html#trans">translation</a>\r
-is included without limitation in\r
-the term "modification".) Each licensee is addressed as "you".\r
-<p>\r
-<a name="scope">Activities</a>\r
-<a href="faqs.html#copying">other than copying, distribution and modification are not covered by this License;</a>\r
-they are outside its scope. The act of\r
-running the Program is not restricted, and the output from the Program\r
-is covered only if its contents constitute a work based on the\r
-Program (independent of having been made by running the Program).\r
-<p>\r
-<a name="depends">Whether that is true depends on what the Program does.</a>\r
-<br><ol type="1">\r
-<li>\r
-<a name="verbatim">You may copy</a>\r
-and distribute verbatim copies of the Program's\r
-source code as you receive it, in any medium, provided that you\r
-conspicuously and appropriately publish on each copy an appropriate\r
-copyright notice and disclaimer of warranty; keep intact all the\r
-notices that refer to this License and to the absence of any warranty;\r
-and give any other recipients of the Program a copy of this License\r
-along with the Program.\r
-<p>\r
-<a name="fee">You may charge a fee</a>\r
-for the physical act of transferring a copy, and\r
-you may at your option offer warranty protection in exchange for a fee.\r
-<li>\r
-<a name="modify">You may modify</a>\r
-your copy or copies of the Program or any portion\r
-of it, thus forming a work based on the Program, and copy and\r
-distribute such modifications or work under the terms of Section 1\r
-above, provided that you also meet all of these conditions:\r
-<br><ol type="a">\r
-<li>\r
-<a name="notices">You must cause</a>\r
-the modified files to carry prominent notices\r
-stating that you changed the files and the date of any change.\r
-<li>\r
-<a name="nocharge">You must</a>\r
-cause any work that you distribute or publish, that in\r
-whole or in part contains or is derived from the Program or any\r
-part thereof, to be licensed as a whole at no charge to all third\r
-parties under the terms of this License.\r
-<li>\r
-<a name="interactive">If the modified program</a>\r
-normally reads commands interactively\r
-when run, you must cause it, when started running for such\r
-interactive use in the most ordinary way, to print or display an\r
-announcement including an appropriate copyright notice and a\r
-notice that there is no warranty (or else, saying that you provide\r
-a warranty) and that users may redistribute the program under\r
-these conditions, and telling the user how to view a copy of this\r
-License. (Exception: if the Program itself is interactive but\r
-does not normally print such an announcement, your work based on\r
-the Program is not required to print an announcement.)\r
-</ol>\r
-<p>\r
-<a name="sections">These requirements</a>\r
-apply to the modified work as a whole. If\r
-identifiable sections of that work are not derived from the Program,\r
-and can be reasonably considered independent and separate works in\r
-themselves, then this License, and its terms, do not apply to those\r
-sections when you distribute them as separate works. But when you\r
-distribute the same sections as part of a whole which is a work based\r
-on the Program, the distribution of the whole must be on the terms of\r
-this License, whose permissions for other licensees extend to the\r
-entire whole, and thus to each and every part regardless of who wrote it.\r
-<p>\r
-<a name="intent">Thus,</a>\r
-it is not the intent of this section to claim rights or contest\r
-your rights to work written entirely by you; rather, the intent is to\r
-exercise the right to control the distribution of derivative or\r
-collective works based on the Program.\r
-<p>\r
-<a name="aggregation">In addition,</a>\r
-mere aggregation of another work not based on the Program\r
-with the Program (or with a work based on the Program) on a volume of\r
-a storage or distribution medium does not bring the other work under\r
-the scope of this License.\r
-<li>\r
-<a name="exeutable">You may copy</a>\r
-and distribute the Program (or a work based on it,\r
-under Section 2) in object code or executable form under the terms of\r
-Sections 1 and 2 above provided that you also do one of the following:\r
-<br><ol type="a">\r
-<li>\r
-<a name="medium">Accompany it</a>\r
-with the complete corresponding machine-readable\r
-source code, which must be distributed under the terms of Sections\r
-1 and 2 above on a medium customarily used for software interchange; or,\r
-<li>\r
-<a name="written">Accompany it with a written offer,</a>\r
-valid for at least three\r
-years, to give any third party, for a charge no more than your\r
-cost of physically performing source distribution, a complete\r
-machine-readable copy of the corresponding source code, to be\r
-distributed under the terms of Sections 1 and 2 above on a medium\r
-customarily used for software interchange; or,\r
-<li>\r
-<a name="distrib">Accompany it</a>\r
-with the information you received as to the offer\r
-to distribute corresponding source code. (This alternative is\r
-allowed only for noncommercial distribution and only if you\r
-received the program in object code or executable form with such\r
-an offer, in accord with Subsection b above.)\r
-</ol>\r
-<p>\r
-<a name="preferred">The source code</a>\r
-for a work means the preferred form of the work for\r
-making modifications to it. For an executable work, complete source\r
-code means all the source code for all modules it contains, plus any\r
-associated interface definition files, plus the scripts used to\r
-control compilation and installation of the executable. However, as a\r
-special exception, the source code distributed need not include\r
-anything that is normally distributed (in either source or binary\r
-form) with the major components (compiler, kernel, and so on) of the\r
-operating system on which the executable runs, unless that component\r
-itself accompanies the executable.\r
-<p>\r
-<a name="access">If distribution of executable or object code is made</a>\r
-by offering\r
-access to copy from a designated place, then offering equivalent\r
-access to copy the source code from the same place counts as\r
-distribution of the source code, even though third parties are not\r
-compelled to copy the source along with the object code.\r
-<li>\r
-<a name="otherwise">You may not copy,</a>\r
-modify, sublicense, or distribute the Program\r
-except as expressly provided under this License. Any attempt\r
-otherwise to copy, modify, sublicense or distribute the Program is\r
-void, and will automatically terminate your rights under this License.\r
-However, parties who have received copies, or rights, from you under\r
-this License will not have their licenses terminated so long as such\r
-parties remain in full compliance.\r
-<li>\r
-<a name="voluntary">You are not required</a>\r
-to accept this License, since you have not\r
-signed it. However, nothing else grants you permission to modify or\r
-distribute the Program or its derivative works. These actions are\r
-prohibited by law if you do not accept this License. Therefore, by\r
-modifying or distributing the Program (or any work based on the\r
-Program), you indicate your acceptance of this License to do so, and\r
-all its terms and conditions for copying, distributing or modifying\r
-the Program or works based on it.\r
-<li>\r
-<a name="redistrib">Each time you redistribute</a>\r
-the Program (or any work based on the\r
-Program), the recipient automatically receives a license from the\r
-original licensor to copy, distribute or modify the Program subject to\r
-these terms and conditions. You may not impose any further\r
-restrictions on the recipients' exercise of the rights granted herein.\r
-You are not responsible for enforcing compliance by third parties to\r
-this License.\r
-<li>\r
-<a name="patent">If, as a consequence of a court judgment</a>\r
-or allegation of patent\r
-infringement or for any other reason (not limited to patent issues),\r
-conditions are imposed on you (whether by court order, agreement or\r
-otherwise) that contradict the conditions of this License, they do not\r
-excuse you from the conditions of this License. If you cannot\r
-distribute so as to satisfy simultaneously your obligations under this\r
-License and any other pertinent obligations, then as a consequence you\r
-may not distribute the Program at all. For example, if a patent\r
-license would not permit royalty-free redistribution of the Program by\r
-all those who receive copies directly or indirectly through you, then\r
-the only way you could satisfy both it and this License would be to\r
-refrain entirely from distribution of the Program.\r
-<p>\r
-<a name="invalid">If any portion</a>\r
-of this section is held invalid or unenforceable under\r
-any particular circumstance, the balance of the section is intended to\r
-apply and the section as a whole is intended to apply in other\r
-circumstances.\r
-<p>\r
-<a name="induce">It is not the purpose</a>\r
-of this section to induce you to infringe any\r
-patents or other property right claims or to contest validity of any\r
-such claims; this section has the sole purpose of protecting the\r
-integrity of the free software distribution system, which is\r
-implemented by public license practices. Many people have made\r
-generous contributions to the wide range of software distributed\r
-through that system in reliance on consistent application of that\r
-system; it is up to the author/donor to decide if he or she is willing\r
-to distribute software through any other system and a licensee cannot\r
-impose that choice.\r
-<p>\r
-<a name="clarify">This section</a>\r
-is intended to make thoroughly clear what is believed to\r
-be a consequence of the rest of this License.\r
-<li>\r
-<a name="geog">If the distribution</a>\r
-and/or use of the Program is restricted in\r
-certain countries either by patents or by copyrighted interfaces, the\r
-original copyright holder who places the Program under this License\r
-may add an explicit geographical distribution limitation excluding\r
-those countries, so that distribution is permitted only in or among\r
-countries not thus excluded. In such case, this License incorporates\r
-the limitation as if written in the body of this License.\r
-<li>\r
-<a name="revise">The Free Software Foundation</a>\r
-may publish revised and/or new versions \r
-of the General Public License from time to time. Such new versions will\r
-be similar in spirit to the present version, but may differ in detail to\r
-address new problems or concerns.\r
-Each version is given a distinguishing version number. If the Program\r
-specifies a version number of this License which applies to it and "any\r
-later version", you have the option of following the terms and conditions\r
-either of that version or of any later version published by the Free\r
-Software Foundation. If the Program does not specify a version number of\r
-this License, you may choose any version ever published by the Free Software\r
-Foundation.\r
-<li>\r
-<a name="permission">If you wish to incorporate parts</a>\r
-of the Program into other free\r
-programs whose distribution conditions are different, write to the author\r
-to ask for permission. For software which is copyrighted by the Free\r
-Software Foundation, write to the Free Software Foundation; we sometimes\r
-make exceptions for this. Our decision will be guided by the two goals\r
-of preserving the free status of all derivatives of our free software and\r
-of promoting the sharing and reuse of software generally.\r
-<p>\r
-<a name="nowarr">NO WARRANTY</a>\r
-<li>\r
-<a name="foc">BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,</a>\r
-THERE IS NO WARRANTY\r
-FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN\r
-OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES\r
-PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED\r
-OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF\r
-MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS\r
-TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE\r
-PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,\r
-REPAIR OR CORRECTION.\r
-<li>\r
-<a name="liable">IN NO EVENT UNLESS REQUIRED</a>\r
-BY APPLICABLE LAW OR AGREED TO IN WRITING\r
-WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR\r
-REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,\r
-INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING\r
-OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED\r
-TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY\r
-YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER\r
-PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE\r
-POSSIBILITY OF SUCH DAMAGES.\r
-</ol>\r
-END OF TERMS AND CONDITIONS\r
-</p>\r
-\r
-<h3><a name="append" href="/cgi-bin/gp?pg=gpl&pr=append"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Appendix: How to Apply These Terms to Your New Programs\r
-</h3>\r
-<p>\r
-If you develop a new program, and you want it to be of the greatest\r
-possible use to the public, the best way to achieve this is to make it\r
-free software which everyone can redistribute and change under these terms.\r
-<p>\r
-<a name="attach">To do so,</a>\r
-attach the following notices to the program. It is safest\r
-to attach them to the start of each source file to most effectively\r
-convey the exclusion of warranty; and each file should have at least\r
-the "copyright" line and a pointer to where the full notice is found.\r
-<blockquote>\r
-<one line\r
-to give the program's name and a brief idea of what it\r
-does.>\r
-Copyright (C) 19yy\r
-<name of\r
-author>\r
-<p>\r
-<a name="free">This program is free software;</a>\r
-you can redistribute it and/or modify\r
-it under the terms of the GNU General Public License as published by\r
-the Free Software Foundation; either version 2 of the License, or\r
-(at your option) any later version.\r
-<p>\r
-<a name="merchant">This program</a>\r
-is distributed in the hope that it will be useful,\r
-but WITHOUT ANY WARRANTY; without even the implied warranty of\r
-MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\r
-GNU General Public License for more details.\r
-<p>\r
-<a name="ifnot">You should</a>\r
-have received a copy of the GNU General Public License\r
-along with this program; if not, write to the Free Software\r
-Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.\r
-</blockquote>\r
-<p>\r
-<a name="contact">Also add</a>\r
-information on how to contact you by electronic and paper mail.\r
-<p>\r
-<a name="short">If the program is interactive,</a>\r
-make it output a short notice like this\r
-when it starts in an interactive mode:\r
-<blockquote>\r
-Gnomovision version 69, Copyright (C) 19yy name of author\r
-Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.\r
-This is free software, and you are welcome to redistribute it\r
-under certain conditions; type `show c' for details.\r
-</blockquote>\r
-<p>\r
-<a name="hypo">The hypothetical</a>\r
-commands `show w' and `show c' should show the appropriate\r
-parts of the General Public License. Of course, the commands you use may\r
-be called something other than `show w' and `show c'; they could even be\r
-mouse-clicks or menu items--whatever suits your program.\r
-<p>\r
-<a name="disclaimer">You should also get your employer</a>\r
-(if you work as a programmer) or your\r
-school, if any, to sign a "copyright disclaimer" for the program, if\r
-necessary. Here is a sample; alter the names:\r
-<blockquote>\r
-Yoyodyne, Inc., hereby disclaims all copyright interest in the program\r
-`Gnomovision' (which makes passes at compilers) written by James Hacker.\r
-\r
-<signature\r
-of\r
-Ty Coon>,\r
-1 April 1989\r
-<br>\r
-Ty Coon, President of Vice\r
-</blockquote>\r
-<p>\r
-<a name="library">This General Public License</a>\r
-does not permit incorporating your program into\r
-proprietary programs. If your program is a subroutine library, you may\r
-consider it more useful to permit linking proprietary applications with the\r
-library. If this is what you want to do, use the GNU Library General\r
-Public License instead of this License.\r
-</p>\r
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>\r
-<font face="arial, helvetica">\r
-<a rel="begin" href="index.html">Home</a> <font color="#ff0000">\r
-<b> · </b></font>\r
-<a rel="next" href="precre.html">Next</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="lopt.html">Site Map</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="legal.html">Legal</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="junkdata.html">Privacy</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="cookies.html">Cookies</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="ijb.html">Banner Ads</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="telemarketing.html">Telemarketing</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="junkmail.html">Mail</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="junkemail.html">Spam</a>\r
-\r
-</font><form action="/cgi-bin/search" method="GET">\r
-<input type="text" name="q" size=60 maxlength=120 value="">\r
-<input type="submit" value="Search"></form>\r
-<small>\r
-<small>\r
-<p>\r
-<a href="legal.html#copy">Copyright</a> © 1996-8 Junkbusters\r
-<a href="legal.html#marks">®</a> Corporation.\r
-Copying and distribution permitted under\r
-the <a href="gpl.html"><small>GNU</small></a>\r
-General Public License.\r
-</small>\r
-<tt>\r
-1998/10/31\r
-http://www.junkbusters.com/ht/en/gpl.html\r
-</tt>\r
-<address><kbd>webmaster@junkbusters.com</kbd></address>\r
-</small>\r
-</body>\r
+ <head>\r
+ <title>The GNU General Public License</title>\r
+ <meta name="description" content=\r
+ "GNU General Public License, as used by Junkbuster">\r
+ <meta name="keywords" content="">\r
+<style type="text/css">\r
+<!--\r
+h2 { text-align: Center; font-family: arial, helvetica, sans-serif }\r
+p.sans { font-family: arial, helvetica, sans-serif }\r
+b.dot { color: #FF0000 }\r
+-->\r
+</style>\r
+ </head>\r
+\r
+ <body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink=\r
+ "#787878">\r
+ <p class="sans"><a href="http://ijbswa.sourceforge.net/">\r
+ Website</a> <b class="dot">·</b> <a href="ijbman.html">\r
+ Manual</a> <b class="dot">·</b> <a href="ijbfaq.html">\r
+ FAQ</a> <b class="dot">·</b> <b>GPL</b></p>\r
+\r
+ <h1 align="center"><a name="top_of_page">Internet J<small>UNK<i\r
+ style="color: #FF0000">BUSTER</i></small> License</a></h1>\r
+\r
+ <h1>This document is out of date</h1>\r
+\r
+ <p><b>Development of JunkBuster is ongoing and this document is\r
+ no longer current. However, it may provide some assistance. If\r
+ you have problems, please use the <a href=\r
+ "http://groups.yahoo.com/group/junkbuster-users/">Yahoo Groups\r
+ mailing list</a> (which includes an archive of mail), the\r
+ SourceForge.net <a href=\r
+ "http://sourceforge.net/projects/ijbswa/">project page</a>, or\r
+ see the project's <a href="http://ijbswa.sourceforge.net/">home\r
+ page</a>. Please also bear in mind that versions 2.9.x of\r
+ JunkBuster are development releases, and are not production\r
+ quality.</b></p>\r
+\r
+ <h3 align="center">The GNU General Public License</h3>\r
+\r
+ <p class="sans"><a name="notus"><b>We did not write the GPL:\r
+ the <a href="http://www.fsf.org/fsf/fsf.html">Free Software\r
+ Foundation</a> did</b></a></p>\r
+\r
+ <h3><img border="0" width="14" height="14" src="fb.gif" alt=\r
+ "*"> The GPL allows copying and changing of copyrighted\r
+ documents</h3>\r
+\r
+ <p><a name="fsf">The Free Software Foundation</a> <a href=\r
+ "http://www.fsf.org/fsf/fsf.html">(FSF)</a> is a non-profit\r
+ institution that designed the GNU General Public License (GPL)\r
+ to promote the publication of free software. The GPL is used by\r
+ thousands of programmers who want to give others the right to\r
+ copy and modify the source code of their programs. Millions of\r
+ people benefit from this.</p>\r
+\r
+ <p><a name="junkbuster">We use the GPL</a> to allow everyone to\r
+ use, copy and modify the Internet Junkbuster as they wish. <a\r
+ name="separate">Companies can use it for commercial\r
+ purposes,</a> but they are not permitted to use it in products\r
+ that they claim as their property.</p>\r
+\r
+ <p><a name="text">The GPL</a> can also be used on documents\r
+ written in human languages. This documentation for the Internet\r
+ Junkbuster is also under the GPL. This means that you do not\r
+ have to break copyright laws in order to print a page or email\r
+ a screen of the text to someone, for example.</p>\r
+\r
+ <p><a name="rest">The</a> remainder of this page is the text of\r
+ the GPL. As legal documents go it's relatively clear, but\r
+ unfortunately it's fairly long because it has to cover a lot of\r
+ details. The HTML formatting is ours, and should not be\r
+ misinterpreted as changing the license in any way.</p>\r
+\r
+ <p align="center"><a href="#top_of_page"><img border="0" width=\r
+ "250" height="15" src="top.gif" alt=\r
+ "--- Back to Top of Page ---"></a></p>\r
+\r
+ <h2><a name="v2">Version 2, June 1991</a></h2>\r
+\r
+ <blockquote>\r
+ <a name="crn">Copyright 1989, 1991</a><br>\r
+ <a name="address">Free Software Foundation, Inc.</a><br>\r
+ 675 Mass Ave.<br>\r
+ Cambridge, MA 02139<br>\r
+ USA\r
+ </blockquote>\r
+ <a name="changing">Everyone</a> \r
+\r
+ <p>is permitted to copy and distribute verbatim copies of this\r
+ license document, but changing it is not allowed.</p>\r
+\r
+ <h3><a name="pream"><img border="0" width="14" height="14" src=\r
+ "fb.gif" alt="*"></a> Preamble</h3>\r
+\r
+ <p>The licenses for most software are designed to take away\r
+ your freedom to share and change it. By contrast, the GNU\r
+ General Public License is intended to guarantee your freedom to\r
+ share and change free software--to make sure the software is\r
+ free for all its users. This General Public License applies to\r
+ most of the Free Software Foundation's software and to any\r
+ other program whose authors commit to using it. (Some other\r
+ Free Software Foundation software is covered by the GNU Library\r
+ General Public License instead.) You can apply it to your\r
+ programs, too.</p>\r
+\r
+ <p><a name="freedom">When we speak of free software,</a> we are\r
+ referring to freedom, not price. Our General Public Licenses\r
+ are designed to make sure that you have the freedom to\r
+ distribute copies of free software (and charge for this service\r
+ if you wish), that you receive source code or can get it if you\r
+ want it, that you can change the software or use pieces of it\r
+ in new free programs; and that you know you can do these\r
+ things.</p>\r
+\r
+ <p><a name="forbid">To protect your rights,</a> we need to make\r
+ restrictions that forbid anyone to deny you these rights or to\r
+ ask you to surrender the rights. These restrictions translate\r
+ to certain responsibilities for you if you distribute copies of\r
+ the software, or if you modify it.</p>\r
+\r
+ <p><a name="allrights">For example,</a> if you distribute\r
+ copies of such a program, whether gratis or for a fee, you must\r
+ give the recipients all the rights that you have. You must make\r
+ sure that they, too, receive or can get the source code. And\r
+ you must show them these terms so they know their rights.</p>\r
+\r
+ <p><a name="steps">We protect your rights with two steps:</a>\r
+ (1) copyright the software, and (2) offer you this license\r
+ which gives you legal permission to copy, distribute and/or\r
+ modify the software.</p>\r
+\r
+ <p><a name="protection">Also,</a> for each author's protection\r
+ and ours, we want to make certain that everyone understands\r
+ that there is no warranty for this free software. If the\r
+ software is modified by someone else and passed on, we want its\r
+ recipients to know that what they have is not the original, so\r
+ that any problems introduced by others will not reflect on the\r
+ original authors' reputations.</p>\r
+\r
+ <p><a name="threat">Finally,</a> any free program is threatened\r
+ constantly by software patents. We wish to avoid the danger\r
+ that redistributors of a free program will individually obtain\r
+ patent licenses, in effect making the program proprietary. To\r
+ prevent this, we have made it clear that any patent must be\r
+ licensed for everyone's free use or not licensed at all.</p>\r
+\r
+ <p><a name="terms">The precise terms and conditions</a> for\r
+ copying, distribution and modification follow.</p>\r
+\r
+ <h3><a name="tnc"><img border="0" width="14" height="14" src=\r
+ "fb.gif" alt="*"></a> GNU General Public License: Terms\r
+ and Conditions for Copying, Distribution and Modification</h3>\r
+\r
+ <p><a name="applies">O.</a> This License applies to any program\r
+ or other work which contains a notice placed by the copyright\r
+ holder saying it may be distributed under the terms of this\r
+ General Public License. The "Program", below, refers to any\r
+ such program or work, and a "work based on the Program" means\r
+ either the Program or any derivative work under copyright law:\r
+ that is to say, a work containing the Program or a portion of\r
+ it, either verbatim or with modifications and/or translated\r
+ into another language. (Hereinafter, translation is included\r
+ without limitation in the term "modification".) Each licensee\r
+ is addressed as "you".</p>\r
+\r
+ <p><a name="scope">Activities</a> other than copying,\r
+ distribution and modification are not covered by this License;\r
+ they are outside its scope. The act of running the Program is\r
+ not restricted, and the output from the Program is covered only\r
+ if its contents constitute a work based on the Program\r
+ (independent of having been made by running the Program).</p>\r
+\r
+ <p><a name="depends">Whether that is true depends on what the\r
+ Program does.</a><br>\r
+ </p>\r
+\r
+ <ol type="1">\r
+ <li>\r
+ <a name="verbatim">You may copy</a> and distribute verbatim\r
+ copies of the Program's source code as you receive it, in\r
+ any medium, provided that you conspicuously and\r
+ appropriately publish on each copy an appropriate copyright\r
+ notice and disclaimer of warranty; keep intact all the\r
+ notices that refer to this License and to the absence of\r
+ any warranty; and give any other recipients of the Program\r
+ a copy of this License along with the Program. \r
+\r
+ <p><a name="fee">You may charge a fee</a> for the physical\r
+ act of transferring a copy, and you may at your option\r
+ offer warranty protection in exchange for a fee.</p>\r
+ </li>\r
+\r
+ <li>\r
+ <a name="modify">You may modify</a> your copy or copies of\r
+ the Program or any portion of it, thus forming a work based\r
+ on the Program, and copy and distribute such modifications\r
+ or work under the terms of Section 1 above, provided that\r
+ you also meet all of these conditions:<br>\r
+ \r
+\r
+ <ol type="a">\r
+ <li><a name="notices">You must cause</a> the modified\r
+ files to carry prominent notices stating that you changed\r
+ the files and the date of any change.</li>\r
+\r
+ <li><a name="nocharge">You must</a> cause any work that\r
+ you distribute or publish, that in whole or in part\r
+ contains or is derived from the Program or any part\r
+ thereof, to be licensed as a whole at no charge to all\r
+ third parties under the terms of this License.</li>\r
+\r
+ <li><a name="interactive">If the modified program</a>\r
+ normally reads commands interactively when run, you must\r
+ cause it, when started running for such interactive use\r
+ in the most ordinary way, to print or display an\r
+ announcement including an appropriate copyright notice\r
+ and a notice that there is no warranty (or else, saying\r
+ that you provide a warranty) and that users may\r
+ redistribute the program under these conditions, and\r
+ telling the user how to view a copy of this License.\r
+ (Exception: if the Program itself is interactive but does\r
+ not normally print such an announcement, your work based\r
+ on the Program is not required to print an\r
+ announcement.)</li>\r
+ </ol>\r
+\r
+ <p><a name="sections">These requirements</a> apply to the\r
+ modified work as a whole. If identifiable sections of that\r
+ work are not derived from the Program, and can be\r
+ reasonably considered independent and separate works in\r
+ themselves, then this License, and its terms, do not apply\r
+ to those sections when you distribute them as separate\r
+ works. But when you distribute the same sections as part of\r
+ a whole which is a work based on the Program, the\r
+ distribution of the whole must be on the terms of this\r
+ License, whose permissions for other licensees extend to\r
+ the entire whole, and thus to each and every part\r
+ regardless of who wrote it.</p>\r
+\r
+ <p><a name="intent">Thus,</a> it is not the intent of this\r
+ section to claim rights or contest your rights to work\r
+ written entirely by you; rather, the intent is to exercise\r
+ the right to control the distribution of derivative or\r
+ collective works based on the Program.</p>\r
+\r
+ <p><a name="aggregation">In addition,</a> mere aggregation\r
+ of another work not based on the Program with the Program\r
+ (or with a work based on the Program) on a volume of a\r
+ storage or distribution medium does not bring the other\r
+ work under the scope of this License.</p>\r
+ </li>\r
+\r
+ <li>\r
+ <a name="exeutable">You may copy</a> and distribute the\r
+ Program (or a work based on it, under Section 2) in object\r
+ code or executable form under the terms of Sections 1 and 2\r
+ above provided that you also do one of the following:<br>\r
+ \r
+\r
+ <ol type="a">\r
+ <li><a name="medium">Accompany it</a> with the complete\r
+ corresponding machine-readable source code, which must be\r
+ distributed under the terms of Sections 1 and 2 above on\r
+ a medium customarily used for software interchange;\r
+ or,</li>\r
+\r
+ <li><a name="written">Accompany it with a written\r
+ offer,</a> valid for at least three years, to give any\r
+ third party, for a charge no more than your cost of\r
+ physically performing source distribution, a complete\r
+ machine-readable copy of the corresponding source code,\r
+ to be distributed under the terms of Sections 1 and 2\r
+ above on a medium customarily used for software\r
+ interchange; or,</li>\r
+\r
+ <li><a name="distrib">Accompany it</a> with the\r
+ information you received as to the offer to distribute\r
+ corresponding source code. (This alternative is allowed\r
+ only for noncommercial distribution and only if you\r
+ received the program in object code or executable form\r
+ with such an offer, in accord with Subsection b\r
+ above.)</li>\r
+ </ol>\r
+\r
+ <p><a name="preferred">The source code</a> for a work means\r
+ the preferred form of the work for making modifications to\r
+ it. For an executable work, complete source code means all\r
+ the source code for all modules it contains, plus any\r
+ associated interface definition files, plus the scripts\r
+ used to control compilation and installation of the\r
+ executable. However, as a special exception, the source\r
+ code distributed need not include anything that is normally\r
+ distributed (in either source or binary form) with the\r
+ major components (compiler, kernel, and so on) of the\r
+ operating system on which the executable runs, unless that\r
+ component itself accompanies the executable.</p>\r
+\r
+ <p><a name="access">If distribution of executable or object\r
+ code is made</a> by offering access to copy from a\r
+ designated place, then offering equivalent access to copy\r
+ the source code from the same place counts as distribution\r
+ of the source code, even though third parties are not\r
+ compelled to copy the source along with the object\r
+ code.</p>\r
+ </li>\r
+\r
+ <li><a name="otherwise">You may not copy,</a> modify,\r
+ sublicense, or distribute the Program except as expressly\r
+ provided under this License. Any attempt otherwise to copy,\r
+ modify, sublicense or distribute the Program is void, and\r
+ will automatically terminate your rights under this License.\r
+ However, parties who have received copies, or rights, from\r
+ you under this License will not have their licenses\r
+ terminated so long as such parties remain in full\r
+ compliance.</li>\r
+\r
+ <li><a name="voluntary">You are not required</a> to accept\r
+ this License, since you have not signed it. However, nothing\r
+ else grants you permission to modify or distribute the\r
+ Program or its derivative works. These actions are prohibited\r
+ by law if you do not accept this License. Therefore, by\r
+ modifying or distributing the Program (or any work based on\r
+ the Program), you indicate your acceptance of this License to\r
+ do so, and all its terms and conditions for copying,\r
+ distributing or modifying the Program or works based on\r
+ it.</li>\r
+\r
+ <li><a name="redistrib">Each time you redistribute</a> the\r
+ Program (or any work based on the Program), the recipient\r
+ automatically receives a license from the original licensor\r
+ to copy, distribute or modify the Program subject to these\r
+ terms and conditions. You may not impose any further\r
+ restrictions on the recipients' exercise of the rights\r
+ granted herein. You are not responsible for enforcing\r
+ compliance by third parties to this License.</li>\r
+\r
+ <li>\r
+ <a name="patent">If, as a consequence of a court\r
+ judgment</a> or allegation of patent infringement or for\r
+ any other reason (not limited to patent issues), conditions\r
+ are imposed on you (whether by court order, agreement or\r
+ otherwise) that contradict the conditions of this License,\r
+ they do not excuse you from the conditions of this License.\r
+ If you cannot distribute so as to satisfy simultaneously\r
+ your obligations under this License and any other pertinent\r
+ obligations, then as a consequence you may not distribute\r
+ the Program at all. For example, if a patent license would\r
+ not permit royalty-free redistribution of the Program by\r
+ all those who receive copies directly or indirectly through\r
+ you, then the only way you could satisfy both it and this\r
+ License would be to refrain entirely from distribution of\r
+ the Program. \r
+\r
+ <p><a name="invalid">If any portion</a> of this section is\r
+ held invalid or unenforceable under any particular\r
+ circumstance, the balance of the section is intended to\r
+ apply and the section as a whole is intended to apply in\r
+ other circumstances.</p>\r
+\r
+ <p><a name="induce">It is not the purpose</a> of this\r
+ section to induce you to infringe any patents or other\r
+ property right claims or to contest validity of any such\r
+ claims; this section has the sole purpose of protecting the\r
+ integrity of the free software distribution system, which\r
+ is implemented by public license practices. Many people\r
+ have made generous contributions to the wide range of\r
+ software distributed through that system in reliance on\r
+ consistent application of that system; it is up to the\r
+ author/donor to decide if he or she is willing to\r
+ distribute software through any other system and a licensee\r
+ cannot impose that choice.</p>\r
+\r
+ <p><a name="clarify">This section</a> is intended to make\r
+ thoroughly clear what is believed to be a consequence of\r
+ the rest of this License.</p>\r
+ </li>\r
+\r
+ <li><a name="geog">If the distribution</a> and/or use of the\r
+ Program is restricted in certain countries either by patents\r
+ or by copyrighted interfaces, the original copyright holder\r
+ who places the Program under this License may add an explicit\r
+ geographical distribution limitation excluding those\r
+ countries, so that distribution is permitted only in or among\r
+ countries not thus excluded. In such case, this License\r
+ incorporates the limitation as if written in the body of this\r
+ License.</li>\r
+\r
+ <li><a name="revise">The Free Software Foundation</a> may\r
+ publish revised and/or new versions of the General Public\r
+ License from time to time. Such new versions will be similar\r
+ in spirit to the present version, but may differ in detail to\r
+ address new problems or concerns. Each version is given a\r
+ distinguishing version number. If the Program specifies a\r
+ version number of this License which applies to it and "any\r
+ later version", you have the option of following the terms\r
+ and conditions either of that version or of any later version\r
+ published by the Free Software Foundation. If the Program\r
+ does not specify a version number of this License, you may\r
+ choose any version ever published by the Free Software\r
+ Foundation.</li>\r
+\r
+ <li>\r
+ <a name="permission">If you wish to incorporate parts</a>\r
+ of the Program into other free programs whose distribution\r
+ conditions are different, write to the author to ask for\r
+ permission. For software which is copyrighted by the Free\r
+ Software Foundation, write to the Free Software Foundation;\r
+ we sometimes make exceptions for this. Our decision will be\r
+ guided by the two goals of preserving the free status of\r
+ all derivatives of our free software and of promoting the\r
+ sharing and reuse of software generally. \r
+\r
+ <p><a name="nowarr">NO WARRANTY</a></p>\r
+ </li>\r
+\r
+ <li><a name="foc">BECAUSE THE PROGRAM IS LICENSED FREE OF\r
+ CHARGE,</a> THERE IS NO WARRANTY FOR THE PROGRAM, TO THE\r
+ EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE\r
+ STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES\r
+ PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND,\r
+ EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,\r
+ THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A\r
+ PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND\r
+ PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM\r
+ PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY\r
+ SERVICING, REPAIR OR CORRECTION.</li>\r
+\r
+ <li><a name="liable">IN NO EVENT UNLESS REQUIRED</a> BY\r
+ APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT\r
+ HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE\r
+ THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,\r
+ INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL\r
+ DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE\r
+ PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA\r
+ BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD\r
+ PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER\r
+ PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN\r
+ ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.</li>\r
+ </ol>\r
+\r
+ <p>END OF TERMS AND CONDITIONS<br>\r
+ <br>\r
+ </p>\r
+\r
+ <h3><a name="append"><img border="0" width="14" height="14"\r
+ src="fb.gif" alt="*"></a> Appendix: How to Apply These\r
+ Terms to Your New Programs</h3>\r
+\r
+ <p>If you develop a new program, and you want it to be of the\r
+ greatest possible use to the public, the best way to achieve\r
+ this is to make it free software which everyone can\r
+ redistribute and change under these terms.</p>\r
+\r
+ <p><a name="attach">To do so,</a> attach the following notices\r
+ to the program. It is safest to attach them to the start of\r
+ each source file to most effectively convey the exclusion of\r
+ warranty; and each file should have at least the "copyright"\r
+ line and a pointer to where the full notice is found.</p>\r
+\r
+ <blockquote>\r
+ <one line to give the program's name and a brief idea of\r
+ what it does.> Copyright (C) 19yy <name of author> \r
+\r
+ <p><a name="free">This program is free software;</a> you can\r
+ redistribute it and/or modify it under the terms of the GNU\r
+ General Public License as published by the Free Software\r
+ Foundation; either version 2 of the License, or (at your\r
+ option) any later version.</p>\r
+\r
+ <p><a name="merchant">This program</a> is distributed in the\r
+ hope that it will be useful, but WITHOUT ANY WARRANTY;\r
+ without even the implied warranty of MERCHANTABILITY or\r
+ FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public\r
+ License for more details.</p>\r
+\r
+ <p><a name="ifnot">You should</a> have received a copy of the\r
+ GNU General Public License along with this program; if not,\r
+ write to the Free Software Foundation, Inc., 675 Mass Ave,\r
+ Cambridge, MA 02139, USA.</p>\r
+ </blockquote>\r
+\r
+ <p><a name="contact">Also add</a> information on how to contact\r
+ you by electronic and paper mail.</p>\r
+\r
+ <p><a name="short">If the program is interactive,</a> make it\r
+ output a short notice like this when it starts in an\r
+ interactive mode:</p>\r
+\r
+ <blockquote>\r
+ Gnomovision version 69, Copyright (C) 19yy name of author\r
+ Gnomovision comes with ABSOLUTELY NO WARRANTY; for details\r
+ type `show w'. This is free software, and you are welcome to\r
+ redistribute it under certain conditions; type `show c' for\r
+ details.\r
+ </blockquote>\r
+\r
+ <p><a name="hypo">The hypothetical</a> commands `show w' and\r
+ `show c' should show the appropriate parts of the General\r
+ Public License. Of course, the commands you use may be called\r
+ something other than `show w' and `show c'; they could even be\r
+ mouse-clicks or menu items--whatever suits your program.</p>\r
+\r
+ <p><a name="disclaimer">You should also get your employer</a>\r
+ (if you work as a programmer) or your school, if any, to sign a\r
+ "copyright disclaimer" for the program, if necessary. Here is a\r
+ sample; alter the names:</p>\r
+\r
+ <blockquote>\r
+ Yoyodyne, Inc., hereby disclaims all copyright interest in\r
+ the program `Gnomovision' (which makes passes at compilers)\r
+ written by James Hacker. <signature of Ty Coon>, 1\r
+ April 1989<br>\r
+ Ty Coon, President of Vice\r
+ </blockquote>\r
+\r
+ <p><a name="library">This General Public License</a> does not\r
+ permit incorporating your program into proprietary programs. If\r
+ your program is a subroutine library, you may consider it more\r
+ useful to permit linking proprietary applications with the\r
+ library. If this is what you want to do, use the GNU Library\r
+ General Public License instead of this License.</p>\r
+\r
+ <p align="center"><a href="#top_of_page"><img border="0" width=\r
+ "250" height="15" src="top.gif" alt=\r
+ "--- Back to Top of Page ---"></a></p>\r
+\r
+ <p class="sans"><a href="http://ijbswa.sourceforge.net/">\r
+ Website</a> <b class="dot">·</b> <a href="ijbman.html">\r
+ Manual</a> <b class="dot">·</b> <a href="ijbfaq.html">\r
+ FAQ</a> <b class="dot">·</b> <b>GPL</b></p>\r
+\r
+ <p class="sans"><small><small><a href="gpl.html#text">\r
+ Copyright</a> © 1996-8 <a href=\r
+ "http://www.junkbusters.com/">Junkbusters</a> <a href=\r
+ "http://www.junkbusters.com/ht/en/legal.html#marks">®</a>\r
+ Corporation. <a href="gpl.html#text">Copyright</a> © 2001\r
+ <a href="http://sourceforge.net/projects/ijbswa/">Jon\r
+ Foster</a>. Copying and distribution permitted under the <a\r
+ href="gpl.html">GNU</a> General Public License. The text of the\r
+ GNU GPL itself is copyrighted by the FSF, and may be copied but\r
+ not modified.</small></small></p>\r
+\r
+ <p><small><code><a href=\r
+ "http://sourceforge.net/projects/ijbswa/">\r
+ http://sourceforge.net/projects/ijbswa/</a></code></small></p>\r
+ </body>\r
</html>\r
+\r
-<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">\r
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">\r
+<!-- $Id$\r
+\r
+ See copyright details at end of file\r
+\r
+ After changing this file, please run it through "HTML Tidy"\r
+ (from http://www.w3.org/People/Raggett/tidy/)\r
+ It should have no warnings or errors.\r
+-->\r
+\r
<html>\r
-<head>\r
-<!-- Copyright 1996-8 Junkbusters Corporation -->\r
-<!-- This work comes with NO WARRANTY -->\r
-<!-- It may be redistributed and modified under the GNU GPL-->\r
-<!-- See the body of http://www.junkbusters.com/ht/en/gpl.html for details-->\r
-<!-- Junkbusters is a registered trade mark of Junkbusters Corporation -->\r
-<!-- Generated 1998/10/31 03:58:25 UTC -->\r
-<meta name="Generator" content="Junkbusters Ebira $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $">\r
-<!-- Document ID: $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $ -->\r
-<title>\r
-Internet Junkbuster Frequently Asked Questions\r
-</title>\r
-<base href="http://www.junkbusters.com/ht/en/ijbfaq.html">\r
-<meta name="description" content="An extensive FAQ on the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser.">\r
-<meta name="keywords" content="stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, spamoff, declare, telemarketing, telemarketers, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, conservation, recycling, catalogs, consumer, sending, opt out , privacy, advertising, direct, marketing, targeting, through, click, trails, http_referer, cookie, cutter, iff, internet fast forward, Cookie Management Tool">\r
-<link rel="next" href="ijbman.html">\r
-<link rel="previous" href="ijb.html">\r
-<link rel="contents" href="toc.html">\r
-</head>\r
-<body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink="#787878">\r
-<center>\r
-<h1><a name="top_of_page">Internet J<small>UNK<i><font color=red>BUSTER</font></i></small> Frequently Asked Questions\r
-</a></h1>\r
-</center>\r
-<font face="arial, helvetica">\r
-<p align="center">\r
-<a href="#u">Download for UNIX</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="ijbwin.html#zip">(Download for Windows 95/NT)</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="ijbdist.html#top_of_page">(Other OS)</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="#browser">Configuring Browsers</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="#local">Installation</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="#companies">For Companies</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="#blocking">Blocking</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="#cookies">Cookies</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="#anonymity">Anonymity</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="#security">Security</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="ijbman.html#top_of_page">(Technical Manual)</a>\r
-</p>\r
-</font><br>\r
-<center>\r
-<h2><a name="top"><font face="arial, helvetica">\r
-The Top Ten Questions\r
-</font></a>\r
-</h2>\r
-</center>\r
-<br>For a list of the questions on this page (without the answers),\r
-see our\r
-<a href="toc.html#ijbfaq">Table of Contents.</a>\r
-It also contains detailed pointers into our pages\r
-on\r
-<a href="cookies.html">cookies</a>\r
-and on busting \r
-<a href="junkemail.html">junk e-mail,</a>\r
-<a href="junkmail.html">junk mail</a>\r
-and\r
-<a href="telemarketing.html">telemarketing calls.</a>\r
-\r
-<h3><a name="what" href="/cgi-bin/gp?pg=ijbfaq&pr=what"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-What is the Internet Junkbuster Proxy and what does it do for me?\r
-</h3>\r
-<p>\r
-The\r
-Internet Junkbuster\r
-Proxy\r
-<a href="legal.html#marks"><small><sup>TM</sup></small></a>\r
-is\r
-<a href="ijbfaq.html#free">free</a>\r
-privacy-enhancing software that can be run on your PC or by your\r
-<small>ISP</small>\r
-or company.\r
-It blocks requests for\r
-<small>URL</small>s\r
-(typically banner ads)\r
-that match its\r
-<a href="ijbfaq.html#blocking">blockfile.</a>\r
-It also deletes unauthorized\r
-<a href="ijbfaq.html#cookies">cookies</a>\r
-and other\r
-unwanted identifying\r
-<a href="ijbfaq.html#anonymity">header information</a>\r
-that is exchanged between web servers and browsers.\r
-These headers are not normally accessible to users\r
-(even though they may contain information that's important to your privacy),\r
-but with the\r
-Internet Junkbuster\r
-you can see almost\r
-<a href="ijbman.html#o_d">anything you want</a>\r
-and control everything you're likely to need.\r
-<b>You</b>\r
-<a href="over.html#you_def">decide what's junk.</a>\r
-<a href="legal.html#marks"><small><sup>SM</sup></small></a>\r
-Many people\r
-<a href="ijbfaq.html#readymade">publish</a>\r
-their blockfiles to help others get started.\r
-</p>\r
-\r
-<h3><a name="free" href="/cgi-bin/gp?pg=ijbfaq&pr=free"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Is there a license fee / warranty / registration form / expiration?\r
-</h3>\r
-<p>\r
-No, none of these.\r
-It's completely free of charge.\r
-Junkbusters\r
-offers you the software to copy, use, modify and distribute\r
-as you wish, forever, at\r
-<a href="over.html#nobucks">no charge</a>\r
-under the\r
-<a href="gpl.html">GNU General Public License.</a>\r
-<p>\r
-<a name="warranty">It comes with</a>\r
-<a href="gpl.html#nowarr">no warranty of any kind.</a>\r
-<p>\r
-<a name="register">You don't have to register,</a>\r
-in fact we don't even provide a way to do so:\r
-the practice of registering software is\r
-usually just an\r
-excuse\r
-to send you solicitations and\r
-<a href="self.html#warranty">sell your name</a>\r
-and information about your behavior.\r
-You are welcome to obtain and use our software as anonymously you wish.\r
-(Your\r
-<small>IP</small>\r
-address will naturally be\r
-<a href="http://www.junkbusters.com/cgi-bin/privacy">disclosed</a>\r
-when you download it,\r
-so if you work for a web ad company\r
-you might want to use a service such as the\r
-<a href="ijbfaq.html#anonymizing">lpwa.com</a>\r
-when you get it.\r
-We\r
-<a href="over.html#nopriv">never</a>\r
-want to be given any information that you consider private or confidential.)\r
-<p>\r
-<a name="why">We are often asked why we give away a product that many</a>\r
-would happily pay for.\r
-The answer is that we are determined to carry out our\r
-<a href="over.html">mission:</a>\r
-to free the world from junk communications.\r
-</p>\r
-\r
-<h3><a name="windows" href="/cgi-bin/gp?pg=ijbfaq&pr=windows"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Does it run on Windows? On a Mac? On the AOL browser?\r
-</h3>\r
-<p>\r
-For the latest information on availability, see the\r
-<a href="ijbdist.html">Distribution Information</a>\r
-page.\r
-We\r
-<a href="ijbdist.html#win3.1">don't</a>\r
-think it will ever run on\r
-Windows 3.1.\r
-But you don't need to have it running on your computer\r
-if you get your\r
-<small>ISP</small>\r
-or Systems Administrator at\r
-<a href="ijbfaq.html#companies">work</a>\r
-to run it.\r
-</p>\r
-\r
-<h3><a name="isp" href="/cgi-bin/gp?pg=ijbfaq&pr=isp"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How can I get my ISP to run the Internet Junkbuster?\r
-</h3>\r
-<p>\r
-Try their sales or support department\r
-(depending on whether you are already a customer).\r
-<a name="unaware">You might send them email including the following</a>\r
-<small>URL</small>:\r
-<br>\r
-   <big><kbd>http://www.junkbusters.com/ht/en/ijbfaq.html#isps</kbd></big>\r
-<br>\r
-<a name="switch">You could mention that many</a>\r
-<a href="ijbfaq.html#does">other</a>\r
-<small>ISP</small>s\r
-provide it,\r
-and that you regard it as an important part of your decision on\r
-where to buy Internet service.\r
-</p>\r
-\r
-<h3><a name="who" href="/cgi-bin/gp?pg=ijbfaq&pr=who"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Who chooses the options that control what is blocked?\r
-</h3>\r
-<p>\r
-Whoever starts the\r
-Internet Junkbuster\r
-chooses the options and the blockfile.\r
-If your \r
-<small>ISP</small>\r
-runs it for you, they have to make these decision\r
-(though\r
-<a href="http://www.lunatech.com/proxy/">some</a>\r
-may give you a choice of proxies,\r
-and a way to suggest new\r
-<small>URL</small>s\r
-to block).\r
-If you run it on your computer,\r
-<b>You</b>\r
-<a href="over.html#you_def">decide what's junk.</a>\r
-<a href="legal.html#marks"><small><sup>SM</sup></small></a>\r
-</p>\r
-\r
-<h3><a name="self" href="/cgi-bin/gp?pg=ijbfaq&pr=self"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How do I download and run the program on my computer?\r
-</h3>\r
-<p>\r
-It depends on your platform.\r
-If you are using Windows 95 or NT,\r
-see our separate page on\r
-<a href="ijbwin.html">installing under Windows.</a>\r
-If you have a C compiler and are using almost any flavor of\r
-<small>UNIX <a href="legal.html#not_our_trademark">®</a></small>\r
-you\r
-<a href="ijbfaq.html#local">download it, compile it, start it running,</a>\r
-and then\r
-<a href="ijbfaq.html#browser">configure your browser.</a>\r
-Several precompiled packages are also available through links in our\r
-<a href="ijbdist.html">distribution page</a>,\r
-which lists all available platforms.\r
-<p>\r
-<a name="port">If you are using a platform for which we have no current</a>\r
-availability,\r
-you are welcome to port the code.\r
-If you do this and you would like us to consider publishing your ported version,\r
-please\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=port">tell us.</a>\r
-</p>\r
-\r
-<h3><a name="show" href="/cgi-bin/gp?pg=ijbfaq&pr=show"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How can I tell which blockfile and options are being used?\r
-</h3>\r
-<p>\r
-Just point your browser to\r
-<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a>\r
-or to any\r
-<small>URL</small>\r
-ending in\r
-<big><kbd>show-proxy-args</kbd></big>\r
-(even if it doesn't exist).\r
-It needn't exist because the\r
-Internet Junkbuster 2.0\r
-intercepts the request, blocks it,\r
-and returns in its place\r
-information about itself.\r
-Using the\r
-<small>URL</small>\r
-above is useful for checking that your browser really is\r
-going through an\r
-Internet Junkbuster,\r
-because the\r
-<big><kbd>junkbuster.com</kbd></big>\r
-server returns a warning if the request actually gets to it.\r
-Some people set the home page of their browser to such a\r
-<small>URL</small>\r
-to be sure that it is configured to use the proxy.\r
-<p>\r
-<a name="headers">If you wish to check the header information</a>\r
-your proxy is actually sending,\r
-a visit to\r
-<a href="http://internet.junkbuster.com/cgi-bin/show-http-headers">http://internet.junkbuster.com/cgi-bin/show-http-headers</a>\r
-will give you the more relevant ones first.\r
-You might also like to turn the proxy\r
-<a href="ijbfaq.html#discontinue">off</a>\r
-and compare the difference. (Don't forget to turn it back on again.)\r
-</p>\r
-\r
-<h3><a name="responding" href="/cgi-bin/gp?pg=ijbfaq&pr=responding"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-My browser started giving me ``server not responding'' messages\r
-</h3>\r
-<p>\r
-Once your browser is told to use a proxy such as the\r
-Internet Junkbuster,\r
-it thinks of it as its server for everything,\r
-so this message means it can't talk to the proxy.\r
-The\r
-Internet Junkbuster\r
-may not be running,\r
-or you may have specified its proxy\r
-<a href="ijbfaq.html#address">address</a>\r
-incorrectly.\r
-Check that the details you entered are correct.\r
-If you have\r
-<big><kbd>telnet</kbd></big>\r
-you can try connecting to the appropriate port to see if the\r
-Internet Junkbuster\r
-is running.\r
-If your\r
-<small>ISP</small>\r
-is running the\r
-Internet Junkbuster,\r
-you may want to check with them.\r
-If you are running it yourself under\r
-<small>UNIX <a href="legal.html#not_our_trademark">®</a></small>,\r
-try looking at a\r
-<big><kbd>ps ax</kbd></big>\r
-to see if it is running.\r
-The\r
-<a href="ijbman.html#o_h">port</a>\r
-specified in its options should be the same one as your\r
-browser has configured.\r
-</p>\r
-\r
-<h3><a name="idea" href="/cgi-bin/gp?pg=ijbfaq&pr=idea"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-I've got this great idea for a new feature. Who do I tell?\r
-</h3>\r
-<p>\r
-We'd be very interested to hear it, but please bear a few things in mind.\r
-<br><ul type="1">\r
-<li>\r
-<a name="considered">Please check this FAQ to see if we've already considered</a>\r
-the idea,\r
-such as\r
-<a href="ijbfaq.html#size">automatic detection</a>\r
-of banner ads\r
-and\r
-<a href="ijbfaq.html#broken">replacing ads</a>\r
-with something else such as a\r
-transparent\r
-<small>GIF</small>.\r
-<li>\r
-<a name="confidential">Don't tell us anything you want to keep confidential</a>\r
-or retain some right over.\r
-<li>\r
-<a name="wish">We currently have a</a>\r
-long wish list of things that we may or may not do\r
-in the near future, including\r
-a version for your favorite computer and a plug-in version.\r
-<li>\r
-<a name="go4it">If you don't want to wait</a>\r
-you're welcome to improve on our code, publish your version on the Web,\r
-and\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=idea">tell us</a>\r
-where to find it.\r
-Projects that are especially welcome\r
-include\r
-a port to the Mac\r
-and extensions for\r
-<small>HTTP</small>\r
-1.1.\r
-</ul>\r
-</p>\r
-\r
-<h3><a name="other" href="/cgi-bin/gp?pg=ijbfaq&pr=other"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-My question isn't listed here. Who do I ask for support?\r
-</h3>\r
-<p>\r
-<a name="harder">If you find using our free product</a>\r
-harder than you're used to for consumer software,\r
-there are many\r
-<a href="links.html#WebWiper">commercial alternatives</a>\r
-that you could consider.\r
-<p>\r
-<a name="RTM">The answer to detailed technical questions may be answered in</a>\r
-<a href="ijbman.html">manual page</a>,\r
-or in the source code.\r
-Also double-check this page for an answer:\r
-using the ``find'' feature on your browser for likely keywords may help.\r
-Our site also has a\r
-<a href="search.html">search</a>\r
-feature.\r
-<p>\r
-<a name="Use">Many people post requests for help and responses on</a>\r
-<a href="http://search.dejanews.com/dnquery.xp?query=junkbuster&site=excite">Usenet.</a>\r
-<p>\r
-<a name="them">If your</a>\r
-<small>ISP</small>\r
-is providing\r
-the\r
-Internet Junkbuster\r
-for you,\r
-and your question is about how to use it,\r
-check their web page before asking them.\r
-<p>\r
-<a name="us">Even though we don't offer the kind of</a>\r
-support you might expect if you paid a lot of money for a software product,\r
-you can still ask us.\r
-But before you do, please consider whether\r
-you could ask someone closer to you.\r
-And please be patient if we're slow to reply: we\r
-<a href="over.html#nobucks">never charge consumers </a>\r
-for our services,\r
-so we have to subsidize consumers with revenue from companies,\r
-and our resources are limited.\r
-<p>\r
-<a name="quote">If your company or organization</a>\r
-would be interested in a maintenance contract\r
-with phone and email support,\r
-hard copy documentation and source code and pre-compiled binaries on tape\r
-or disk,\r
-please\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=quote">ask us</a>\r
-for a quote.\r
-</p>\r
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>\r
-<br>\r
-<center>\r
-<h2><a name="browser"><font face="arial, helvetica">\r
-Configuring your browser to talk to the Internet Junkbuster\r
-</font></a>\r
-</h2>\r
-</center>\r
-<br>\r
-<h3><a name="address" href="/cgi-bin/gp?pg=ijbfaq&pr=address"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-What is the proxy address of the Internet Junkbuster?\r
-</h3>\r
-<p>\r
-<a name="localhost">If you set up</a>\r
-the\r
-Internet Junkbuster\r
-to run on the computer you browse from\r
-(rather than your\r
-<small>ISP</small>'s server\r
-or some networked computer at work),\r
-the proxy will be on\r
-<big><kbd>localhost</kbd></big>\r
-(which is the special name used by every computer on the Internet to\r
-refer to itself)\r
-and\r
-the port will be\r
-<big><kbd>8000</kbd></big>\r
-(unless you have told the\r
-Internet Junkbuster\r
-to\r
-run on a different port with the\r
-<a href="ijbman.html#listen-address">listen-address</a>\r
-option).\r
-So you when\r
-<a href="ijbfaq.html#set">configuring your browser's proxy settings</a>\r
-you typically enter the word\r
-<big><kbd>localhost</kbd></big>\r
-in the two boxes next to\r
-<b><font face="arial, helvetica">\r
-HTTP</font></b>\r
-and\r
-<b><font face="arial, helvetica">\r
-Secure</font></b>,\r
-and the number\r
-<big><kbd>8000</kbd></big>\r
-in the two boxes labelled\r
-to the right of those boxes.\r
-<p>\r
-<a name="remote">If your</a>\r
-<small>ISP</small>\r
-or company is running \r
-the\r
-Internet Junkbuster\r
-for you,\r
-they will tell you the address to use.\r
-It will be the name of the computer it's running on\r
-(or possibly its numeric IP address),\r
-plus a port number.\r
-Port 8000 is the default, so assume this number if it is not specified.\r
-Sometimes a colon is used to glue them together,\r
-as in\r
-<big><kbd>junkbuster.fictitous-pro-privacy-isp.net:8000</kbd></big>\r
-but\r
-with most browsers\r
-you do not type the colon,\r
-you enter the address and port number in separate boxes.\r
-</p>\r
-\r
-<h3><a name="set" href="/cgi-bin/gp?pg=ijbfaq&pr=set"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How do I tell the browser where to find the Internet Junkbuster?\r
-</h3>\r
-<p>\r
-All current browsers can be told the address of a proxy to use.\r
-You enter the same information in two fields in your browser's proxy\r
-configuration screen (see list below): one for\r
-<small>HTTP</small>,\r
-and one for the Secure Protocol (assuming your browser supports\r
-<small>SSL</small>).\r
-If you find some information already entered for your proxy,\r
-see the\r
-<a href="ijbfaq.html#already">next question.</a>\r
-Here are the menus you go through to get to the proxy configuration settings.\r
-(We also recommend that you\r
-<a href="links.html#java">disable Java</a>,\r
-which is a separate operation.)\r
-<strong>Make notes on the changes you make so you know how to undo them!</strong>\r
-You will need to know what you did\r
-in case you wish to\r
-<a href="ijbfaq.html#discontinue">discontinue</a>\r
-using the proxy.\r
-<br><ul type="1">\r
-<li>\r
-<a name="netscape">For</a>\r
-<a href="http://www.netscape.com/comprod/products/navigator/version_3.0/index.html">Netscape</a>\r
-2.01, 2.02 and 3.0\r
-<a href="/images/pcn30.gif">[Graphic Illustration]:</a>\r
-<b><font face="arial, helvetica">\r
-Options</font></b>;\r
-<b><font face="arial, helvetica">\r
-Network Preferences</font></b>;\r
-<b><font face="arial, helvetica">\r
-Proxies</font></b>;\r
-<b><font face="arial, helvetica">\r
-Manual Proxy Configuration View ;</font></b>\r
-enter\r
-<a href="ijbfaq.html#address">proxy address details</a>\r
-under\r
-<b><font face="arial, helvetica">\r
-HTTP</font></b>\r
-and\r
-<b><font face="arial, helvetica">\r
-Security Proxy</font></b>;\r
-click on\r
-<b><font face="arial, helvetica">\r
-OK</font></b>;\r
-click on the next\r
-<b><font face="arial, helvetica">\r
-OK</font></b>.\r
-<br>\r
-With Netscape 2.0,\r
-follow with\r
-<b><font face="arial, helvetica">\r
-Options</font></b>,\r
-<b><font face="arial, helvetica">\r
-Save Options</font></b>.\r
-<br>\r
-<a name="Netscape4.02">With Netscape 4.X series, you first have to go through</a>\r
-<b><font face="arial, helvetica">\r
-Edit/Preferences</font></b>.\r
-<a href="/images/pcn405.gif">[Graphic Illustration]</a>\r
-Then in the frame on the left,\r
-click on triangle pointing to the right towards the word\r
-<b><font face="arial, helvetica">\r
-Advanced</font></b>;\r
-it will switch to a triangle pointing down;\r
-and the words\r
-<b><font face="arial, helvetica">\r
-Cache</font></b>,\r
-<b><font face="arial, helvetica">\r
-Proxies</font></b>\r
-and\r
-<b><font face="arial, helvetica">\r
-Disk Space</font></b>\r
-appear.\r
-Click on\r
-<b><font face="arial, helvetica">\r
-Proxies</font></b>\r
-and the frame on the right will\r
-display a banner saying\r
-<b><font face="arial, helvetica">\r
-Proxies Configure proxies to access the Internet</font></b>.\r
-Click the radio button labeled\r
-<b><font face="arial, helvetica">\r
-Manual proxy configuration</font></b>\r
-then click the button labeled\r
-<b><font face="arial, helvetica">\r
-View</font></b>;\r
-enter\r
-<a href="ijbfaq.html#address">proxy address details</a>\r
-under\r
-<b><font face="arial, helvetica">\r
-HTTP</font></b>\r
-and\r
-<b><font face="arial, helvetica">\r
-Security Proxy</font></b>;\r
-click on\r
-<b><font face="arial, helvetica">\r
-OK</font></b>;\r
-click on the next\r
-<b><font face="arial, helvetica">\r
-OK</font></b>.\r
-<li>\r
-<a name="explorer3">For</a>\r
-<a href="http://www.microsoft.com/ie/support/docs/tech30/">Internet Explorer 3.0:</a>\r
-<b><font face="arial, helvetica">\r
-View</font></b>;\r
-<b><font face="arial, helvetica">\r
-Options</font></b>;\r
-<b><font face="arial, helvetica">\r
-Connections</font></b>;\r
-tick\r
-<b><font face="arial, helvetica">\r
-Connect through proxy server</font></b>\r
-box;\r
-<b><font face="arial, helvetica">\r
-Settings</font></b>;\r
-enter\r
-<a href="ijbfaq.html#address">proxy address details</a>\r
-<b><font face="arial, helvetica">\r
-HTTP</font></b>\r
-Box, with port number in the second box;\r
-same with\r
-<b><font face="arial, helvetica">\r
-Secure</font></b>;\r
-click on\r
-<b><font face="arial, helvetica">\r
-OK</font></b>.\r
-<li>\r
-<a name="explorer2">For Internet Explorer 2.0: </a>\r
-<b><font face="arial, helvetica">\r
-View</font></b>;\r
-<b><font face="arial, helvetica">\r
-Options</font></b>;\r
-<b><font face="arial, helvetica">\r
-Proxy</font></b>;\r
-enter\r
-<a href="ijbfaq.html#address">proxy address details</a>\r
-click on\r
-<b><font face="arial, helvetica">\r
-OK</font></b>.\r
-<li>\r
-<a name="nt">On NT for MS-IE:</a>\r
-<b><font face="arial, helvetica">\r
-Control Panel</font></b>;\r
-<b><font face="arial, helvetica">\r
-Internet</font></b>;\r
-<b><font face="arial, helvetica">\r
-Advanced</font></b>;\r
-<b><font face="arial, helvetica">\r
-Proxy</font></b>.\r
-<li>\r
-<a name="if">For MS-IE 4.0: seems to be almost the same as for</a>\r
-<a href="ijbfaq.html#explorer3">3.0</a>,\r
-<b><font face="arial, helvetica">\r
-View</font></b>;\r
-<b><font face="arial, helvetica">\r
-Internet Options</font></b>;\r
-<b><font face="arial, helvetica">\r
-Connections</font></b>;\r
-tick\r
-<b><font face="arial, helvetica">\r
-Connect through proxy server</font></b>\r
-box;\r
-<b><font face="arial, helvetica">\r
-Settings</font></b>;\r
-enter\r
-<a href="ijbfaq.html#address">proxy address details</a>\r
-<b><font face="arial, helvetica">\r
-HTTP</font></b>\r
-Box, with port number in the second box;\r
-same with\r
-<b><font face="arial, helvetica">\r
-Secure</font></b>;\r
-click on\r
-<b><font face="arial, helvetica">\r
-OK</font></b>.\r
-Note that 4.0 has\r
-<b><font face="arial, helvetica">\r
-Advanced</font></b>\r
-settings to allow\r
-<small>HTTP</small>\r
-1.1 through proxies;\r
-these must be disabled because the proxy does not currently understand\r
-<small>HTTP</small>\r
-1.1.\r
-Please\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=set">tell us</a>\r
-if you see any other differences.\r
-<li>\r
-<a name="mosaic">For NCSA Mosaic for Windows:</a>\r
-<b><font face="arial, helvetica">\r
-Options</font></b>,\r
-<b><font face="arial, helvetica">\r
-Preferences</font></b>,\r
-<b><font face="arial, helvetica">\r
-Proxy</font></b>;\r
-enter\r
-<a href="ijbfaq.html#address">proxy address details</a>\r
-under\r
-<b><font face="arial, helvetica">\r
-HTTP</font></b>.\r
-<li>\r
-<a name="Opera">For</a>\r
-Opera:\r
-<b><font face="arial, helvetica">\r
-Preferences</font></b>,\r
-<b><font face="arial, helvetica">\r
-Proxy servers</font></b>;\r
-check the box next to HTTP;\r
-enter the server and port number in the box on the other side;\r
-click on\r
-<b><font face="arial, helvetica">\r
-OK</font></b>.\r
-<li>\r
-<a name="lynx">For</a>\r
-<a href="http://www.yahoo.com/Computers_and_Internet/Software/Internet/World_Wide_Web/Browsers/Lynx">Lynx,</a>\r
-<a href="http://www.yahoo.com/Computers_and_Internet/Software/Internet/World_Wide_Web/Browsers/Mosaic/">Mosaic/X,</a>\r
-<a name ="grail" href="http://monty.cnri.reston.va.us/grail-0.3/">Grail,</a>\r
-and\r
-W3O\r
-<a href="http://www.w3.org/pub/WWW/Arena/">Arena,</a>\r
-you can specify the proxy via environment variables\r
-before starting the application.\r
-This will probably be done with something like either\r
-<br>\r
-   <big><kbd>setenv http_proxy http://localhost:8000/</kbd></big>\r
-<br>\r
-or\r
-<br>\r
-   <big><kbd>http_proxy=http://junkbuster.fictitous-pro-privacy-isp.net:8000/ export http_proxy</kbd></big>\r
-<br>\r
-depending on your shell and where the\r
-Internet Junkbuster\r
-lives.\r
-</ul>\r
-If your browser is not listed here,\r
-or if you notice an error, please\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=set">tell us</a>\r
-the correct procedure.\r
-</p>\r
-\r
-<h3><a name="already" href="/cgi-bin/gp?pg=ijbfaq&pr=already"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-What should I do if I find another proxy is already configured?\r
-</h3>\r
-<p>\r
-Some\r
-<small>ISP</small>s\r
-and companies require all Web traffic to go through their proxy.\r
-In this case you would find your proxy configuration with values already set,\r
-possibly under\r
-<a name="Automatic">Automatic Proxy Configuration</a>\r
-(in the case of \r
-<a href="http://home.netscape.com/eng/mozilla/2.0/relnotes/demo/proxy-live.html">Netscape</a>\r
-and\r
-<a href="http://ieak.microsoft.com/">MS-IE 3.0</a>\r
-and above).\r
-It's probably a firewall proxy between your company and the outside world,\r
-<a name="cache">or a</a>\r
-<a href="http://vancouver-webpages.com/CacheNow/">caching proxy</a>\r
-if you're using an \r
-<small>ISP</small>.\r
-<p>\r
-<a name="f">What needs to be done in this case is to</a>\r
-use the\r
-<a href="ijbman.html#forwardfile">forwardfile</a>\r
-option\r
-to tell the\r
-Internet Junkbuster\r
-the address of the other proxy.\r
-Specify a different (unused) port number\r
-with the\r
-<a href="ijbman.html#listen-address">listen-address</a>\r
-option,\r
-and configure your browser to\r
-<a href="ijbfaq.html#chain">use that port.</a>\r
-If you haven't done this kind of thing before,\r
-it's probably best to consult your systems administrator or \r
-<small>ISP</small>\r
-about it;\r
-check their web page first.\r
-</p>\r
-\r
-<h3><a name="discontinue" href="/cgi-bin/gp?pg=ijbfaq&pr=discontinue"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-What if I want to stop using the Internet Junkbuster?\r
-</h3>\r
-<p>\r
-Just go through the same procedure you used to start your\r
-browser using the\r
-Internet Junkbuster,\r
-but remove the details you put in\r
-(or if there was something there before, restore it).\r
-You may need to use\r
-<b><font face="arial, helvetica">\r
-Save Options</font></b>\r
-to make this change permanent.\r
-On Netscape 3.0 you can go through\r
-<b><font face="arial, helvetica">\r
-Options</font></b>;\r
-<b><font face="arial, helvetica">\r
-Network Preferences</font></b>;\r
-<b><font face="arial, helvetica">\r
-Proxies</font></b>\r
-and click on\r
-<b><font face="arial, helvetica">\r
-No Proxy</font></b>\r
-to turn it off, and later click on\r
-<b><font face="arial, helvetica">\r
-Manual Proxy Configuration</font></b>\r
-if you want to start using it again.\r
-(No need to enter the again details under\r
-<b><font face="arial, helvetica">\r
-View</font></b>\r
-as you did the\r
-<a href="ijbfaq.html#netscape">first time;</a>\r
-they should remain there unchanged.)\r
-<p>\r
-<a name="shut">This stops your browser talking to the proxy;</a>\r
-<a href="ijbfaq.html#shutdown">shutting down the proxy</a>\r
-is a different matter.\r
-</p>\r
-\r
-<h3><a name="dial" href="/cgi-bin/gp?pg=ijbfaq&pr=dial"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Automatic dialing isn't working any more. How do I fix it?\r
-</h3>\r
-<p>\r
-Some browsers (such as MSIE-4) can be configured to dial your\r
-<small>ISP</small>\r
-automatically when you click on a link,\r
-but this feature gets disabled if you specify a proxy running on your\r
-own computer\r
-(with address\r
-<big><kbd>localhost</kbd></big>\r
-or\r
-<big><kbd>127.0.0.1</kbd></big>)\r
-because these addresses don't require dialing.\r
-The\r
-Internet Junkbuster\r
-knows nothing about dialing, so it doesn't work.\r
-To make automatic dialing work,\r
-make up a name such as\r
-<big><kbd>junkbuster.ijb</kbd></big>\r
-and use that name in the proxy settings\r
-instead of\r
-<big><kbd>localhost</kbd></big>,\r
-and then add the line\r
-<big><kbd>127.0.0.1 junkbuster.ijb</kbd></big>\r
-to the file\r
-<big><kbd>c:\windows\hosts</kbd></big>\r
-(if there already is a line beginning with\r
-<big><kbd>127.0.0.1</kbd></big>\r
-just add\r
-<big><kbd>junkbuster.ijb</kbd></big>\r
-at the end of it.)\r
-<p>\r
-<a name="also">This should also work Netscape Communicator 4 on</a>\r
-machines where IE-4 has been installed.\r
-</p>\r
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>\r
-<br>\r
-<center>\r
-<h2><a name="local"><font face="arial, helvetica">\r
-Setting up the Internet Junkbuster on your local computer\r
-</font></a>\r
-</h2>\r
-</center>\r
-<br>The next two sections assume you wish to compile the code\r
-with your own C compiler.\r
-<a name="install">If you just want to use the</a>\r
-<big><kbd>.exe</kbd></big>\r
-file provided for Windows,\r
-see the\r
-<a href="ijbwin.html">Windows Installation page.</a>\r
-\r
-<h3><a name="u" href="/cgi-bin/gp?pg=ijbfaq&pr=u"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How do I compile the code under Unix?\r
-</h3>\r
-<p>\r
-If you are running Redhat\r
-<a href="aboutus.html#linux">Linux</a>\r
-you may prefer to use the\r
-<a href="ijbdist.html#red">rpm</a>\r
-instead of the following procedure.\r
-<br><ol type="1">\r
-<li>\r
-<a name="download">First</a>\r
-<a href="ijb20.tar.Z">download the tar file</a>\r
-(~286k)\r
-<a name="tar">and</a>\r
-uncompress and extract the files from it with this command\r
-<br>\r
-   <big><kbd>uncompress -c ijb20.tar.Z | tar xf -</kbd></big>\r
-<p>\r
-<li>\r
-<a name="sun">If your operating system is from</a>\r
-<a href="legal.html#not_our_trademark">Sun</a>\r
-or\r
-<a href="legal.html#not_our_trademark">HP</a>\r
-examine the\r
-<big><kbd>Makefile</kbd></big>\r
-and make any changes indicated inside.\r
-<li>\r
-<a name="make">Run</a>\r
-<br>\r
-<br>\r
-   <big><kbd>make</kbd></big>\r
-<p>\r
-<li>\r
-<a name="defaults">Copy the sample configuration file</a>\r
-(<big><kbd>junkbstr.ini</kbd></big>,\r
-previously called\r
-<big><kbd>sconfig.txt</kbd></big>\r
-and other names in earlier releases)\r
-to some convenient place such as\r
-<big><kbd>/usr/local/lib/junkbuster/configfile</kbd></big>\r
-or whatever you choose.\r
-The sample file has all the options commented out.\r
-You can remove the\r
-<big><kbd>#</kbd></big>\r
-character on any that you want, but it may be better to\r
-leave this until to later.\r
-Run it asynchronously:\r
-<br>\r
-<br>\r
-   <big><kbd>junkbuster configfile &</kbd></big>\r
-<p>\r
-If you are running a version earlier than 2.0 you can start it with\r
-<big><kbd>junkbuster &</kbd></big>\r
-<p>\r
-<li>\r
-<a name="config">Configure your browser (described</a>\r
-<a href="ijbfaq.html#browser">above).</a>\r
-<li>\r
-<a name="test">Verify that the</a>\r
-Internet Junkbuster\r
-is working (described\r
-<a href="ijbfaq.html#show">above).</a>\r
-<li>\r
-<a name="restart">Decide on the options you really want,</a>\r
-<big><kbd>kill</kbd></big>\r
-the\r
-<a href="ijbfaq.html#pid">process</a>\r
-and start it again. The most popular option is\r
-<a href="ijbman.html#blockfile">blockfile</a>\r
-to block ads.\r
-<a name="comprehensive">A sample blockfile is provided as an illustration,</a>\r
-but it doesn't really stop many ads.\r
-More comprehensive ones are available\r
-<a href="ijbfaq.html#readymade">elsewhere</a>.\r
-<li>\r
-<a name="rc">You'll probably want to add an entry to</a>\r
-<big><kbd>/etc/rc.d/rc.local</kbd></big>\r
-or equivalent to start it at boot time.\r
-(Any output you specify should be redirected to a file.\r
-And don't forget the\r
-&\r
-at the end to run it asynchronously or your system will seize\r
-up after the next reboot.)\r
-</ol>\r
-</p>\r
-\r
-<h3><a name="win" href="/cgi-bin/gp?pg=ijbfaq&pr=win"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How do I compile the code under Windows?\r
-</h3>\r
-<p>\r
-A binary is currently being supplied with the source code,\r
-but if you prefer to compile it yourself here is the likely procedure.\r
-Most of these steps are repeated in our checklist for\r
-<a href="ijbwin.html">installation under Windows.</a>\r
-<br><ol type="1">\r
-<li>\r
-<a name="zip">First</a>\r
-<a href="ijb20.zip">click here to download the zip file</a>\r
-called\r
-<big><kbd>ijb20.zip</kbd></big>\r
-(~208k),\r
-then uncompress and unpack the zip archive using a tool like\r
-<a href="http://www.winzip.com/">WinZip</a>.\r
-<li>\r
-<a name="change">Now the distribution (source and sample files)</a>\r
-will be in a folder\r
-called\r
-<big><kbd>ijb20</kbd></big>.\r
-Go into that folder and then edit the Makefile for\r
-your system,\r
-removing the comment character\r
-(<big><kbd>#</kbd></big>)\r
-in the lines related to Win32.\r
-Then type:\r
-<br>\r
-   <big><kbd>nmake</kbd></big>\r
-<br>\r
-This should create an executable called\r
-<big><kbd>junkbstr.exe</kbd></big>.\r
-<a name="compilers">For information on issues with various compilers, see the</a>\r
-<a href="ijbdist.html#compilers">Distribution Information</a>\r
-page.\r
-<li>\r
-<a name="attempt">Run the executable with the command:</a>\r
-<br>\r
-   <big><kbd>junkbstr</kbd></big>\r
-<br>\r
-The program will produce a message\r
-indicating that it has started and is ready to serve.\r
-<p>\r
-<a name="ini">(Version 2.0.1 and above uses</a>\r
-the file\r
-<big><kbd>junkbstr.ini</kbd></big>\r
-as the config file\r
-if it exists and no argument was given. If you have an earlier\r
-version or if you want it to use a different config file,\r
-simply specify that file as the argument.)\r
-<li>\r
-<a name="configures">Configure your browser (described</a>\r
-<a href="ijbfaq.html#browser">above).</a>\r
-<li>\r
-<a name="work">Check the proxy is working (described</a>\r
-<a href="ijbfaq.html#check">below</a>).\r
-<li>\r
-<a name="shortcut">To have the proxy start itself automatically</a>\r
-when you login to Win95,\r
-drop the ``shortcut'' to the\r
-<big><kbd>junkbstr</kbd></big>\r
-executable into the StartUp folder:\r
-<br>\r
-   <big><kbd>C:\Windows\Start Menu\Programs\StartUp</kbd></big>\r
-<br>\r
-You might want to change the shortcut's\r
-<big><kbd>Properties->Shortcut</kbd></big>\r
-to\r
-<big><kbd>Run: Minimized</kbd></big>.\r
-If you specify the\r
-<a href="ijbman.html#hide-console">hide-console</a>\r
-option then the\r
-<small>DOS</small>\r
-window will vanish after it starts.\r
-<p>\r
-<a name="NT">WinNT users can put it into their own</a>\r
-StartUp folders or the Administrator\r
-can put it into the system's global StartUp folder.\r
-For details on how to make this a service under NT\r
-see our\r
-<a href="ijbwin.html#service">Windows page</a>.\r
-</ol>\r
-</p>\r
-\r
-<h3><a name="check" href="/cgi-bin/gp?pg=ijbfaq&pr=check"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How do I check that the proxy is working?\r
-</h3>\r
-<p>\r
-Pick a page from somewhere (such as your bookmarks, or just one\r
-that your browser was pointing to)\r
-and\r
-<b><font face="arial, helvetica">\r
-Reload</font></b>\r
-it.\r
-If you get a message along the lines of ``server not responding,\r
-using cached copy instead,'' see the advice\r
-<a href="ijbfaq.html#responding">above.</a>\r
-If the page reloads OK, check that your browser is actually\r
-talking to the proxy by going to\r
-<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a>\r
-or any\r
-<small>URL</small>\r
-ending in\r
-<big><kbd>show-proxy-args</kbd></big>\r
-(as described\r
-<a href="ijbfaq.html#show">below</a>,\r
-the proxy should intercept the request.)\r
-When you see ``Internet Junkbuster Proxy Status,''\r
-you'll know it's working.\r
-</p>\r
-\r
-<h3><a name="chain" href="/cgi-bin/gp?pg=ijbfaq&pr=chain"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How and why would I have this proxy chained with other proxies?\r
-</h3>\r
-<p>\r
-You may need the \r
-<a href="ijbman.html#forwardfile">forwarding</a>\r
-feature to ``daisy chain'' the\r
-Internet Junkbuster\r
-to another proxy, perhaps an\r
-<a href="ijbfaq.html#anonymizing">anonymizing</a>\r
-proxy to\r
-<a href="ijbfaq.html#conceal">conceal</a>\r
-your\r
-<small>IP</small>\r
-address,\r
-or a\r
-<a href="ijbfaq.html#cache">caching proxy</a>\r
-from your\r
-<small>ISP</small>,\r
-or a\r
-<a href="ijbfaq.html#firewall">firewall</a>\r
-proxy between your company and the outside world.\r
-Version 2.0\r
-can be even configured to forward\r
-<a href="ijbman.html#forwardfile">selectively</a>\r
-according to the\r
-<small>URL</small>\r
-requested:\r
-for example, connecting directly to trusted hosts,\r
-but going through an anonymizing or firewall proxy for all other hosts.\r
-<p>\r
-<a name="administrator">Network administrators might use it to provide</a>\r
-transparent access to multiple networks without\r
-modifying browser configurations.\r
-<a name="direct">Most browsers also provide a way of</a>\r
-specifying hosts that the browser\r
-connects to directly, bypassing the proxy. Some provide a method for\r
-<a href="ijbfaq.html#Automatic">Automatic Proxy Configuration.</a>\r
-A well written\r
-Internet Junkbuster\r
-configuration can be much more flexible and powerful.\r
-<p>\r
-<a name="example">An</a>\r
-<small>ISP</small>'s\r
-caching proxy\r
-would typically be called something like\r
-<big><kbd>cache.your-isp.net:8080</kbd></big>\r
-(as described on you\r
-<small>ISP</small>'s\r
-web page);\r
-you would put this information in your\r
-<a href="ijbman.html#forwardfile">forwardfile</a>\r
-as described in our manual.\r
-Your browser would be configured to\r
-the\r
-Internet Junkbuster\r
-for\r
-<small>HTTP</small>\r
-and Security Proxies as before,\r
-but you probably want to tell it to use the caching proxy\r
-for\r
-<small>FTP</small>\r
-and other protocols.\r
-<a name="nonlocal">If your</a>\r
-<small>ISP</small>\r
-is running\r
-the\r
-Internet Junkbuster\r
-for you,\r
-they have probably already decided whether to chain with a caching proxy.\r
-</p>\r
-\r
-<h3><a name="socks" href="/cgi-bin/gp?pg=ijbfaq&pr=socks"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How does the Internet Junkbuster work with SOCKS gateways?\r
-</h3>\r
-<p>\r
-There is support for some\r
-<a href="http://www.leverage.com/users/tlod/ssockd/ssockd.html">gateways</a>\r
-in\r
-Version <a href="ijbdist.html#c4">1.4</a>\r
-and above.\r
-The gateway protocol used to be specified on the command line;\r
-it is\r
-now specified\r
-in the same file as\r
-<a href="ijbman.html#forwardfile">forwarding.</a>\r
-Note that the browser's proxy configuration must\r
-<em>not</em>\r
-specify a\r
-<big><kbd>SOCKS</kbd></big>\r
-host;\r
-it should specify the proxy as described\r
-<a href="ijbfaq.html#set">above.</a>\r
-</p>\r
-\r
-<h3><a name="plain" href="/cgi-bin/gp?pg=ijbfaq&pr=plain"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How do I configure it to be just a plain old proxy?\r
-</h3>\r
-<p>\r
-To get the proxy to do as little as possible (which means not deleting any\r
-sensitive headers), place in your\r
-configuration file the following three lines (each ending in a space\r
-then a period) to stop it changing sensitive headers:\r
-<br>\r
-   <big><kbd>referer .</kbd></big>\r
-<br>\r
-   <big><kbd>from .</kbd></big>\r
-<br>\r
-   <big><kbd>user-agent .</kbd></big>\r
-<br>\r
-   <big><kbd>cookiefile mycookiefile</kbd></big>\r
-<br>\r
-The fourth line is also needed to specify a\r
-<a href="ijbman.html#o_c">cookiefile</a>\r
-that might be called\r
-<big><kbd>mycookiefile</kbd></big>\r
-containing a single line with a\r
-<big><kbd>*</kbd></big>\r
-character, to allow all cookies through.\r
-</p>\r
-\r
-<h3><a name="shutdown" href="/cgi-bin/gp?pg=ijbfaq&pr=shutdown"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How do I shut down the proxy (to restart it)?\r
-</h3>\r
-<p>\r
-It depends on your platform. Under Windows, use\r
-<b><font face="arial, helvetica">\r
-Ctrl-Break</font></b>\r
-in the \r
-<small>DOS</small>\r
-window or\r
-the old three-fingered salute of\r
-<b><font face="arial, helvetica">\r
-Ctrl-Alt-Delete</font></b>\r
-and select\r
-<b><font face="arial, helvetica">\r
-End Task</font></b>.\r
-Under\r
-<small>UNIX <a href="legal.html#not_our_trademark">®</a></small>\r
-you'll need to\r
-<big><kbd>kill</kbd></big>\r
-the\r
-<b><kbd>junkbuster</kbd></b>\r
-process.\r
-<a name="pid">If you don't know the process number to give to</a>\r
-<big><kbd>kill</kbd></big>, try this:\r
-<big><kbd>ps ax | grep junkbuster</kbd></big>\r
-<br>\r
-</p>\r
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>\r
-<br>\r
-<center>\r
-<h2><a name="companies"><font face="arial, helvetica">\r
-Information for companies\r
-</font></a>\r
-</h2>\r
-</center>\r
-<br>\r
-<h3><a name="think" href="/cgi-bin/gp?pg=ijbfaq&pr=think"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-What do advertising companies think of this kind of technology?\r
-</h3>\r
-<p>\r
-We've seen only a few public comments from the advertising industry on this,\r
-other than\r
-<a href="links.html#adverse">SEC filings.</a>\r
-First, the president of the Internet Advertising Bureau told\r
-<a href="new.html#Rich">CNET</a>\r
-that he wasn't worried by banner blockers.\r
-Second, after the Federal Trade Commission's\r
-<a href="ftc.html">workshop</a>\r
-where we gave a live demonstration of our proxy before\r
-many eminent representatives of the industry,\r
-the\r
-<a href="self.html#dma">Direct Marketing Association</a>\r
-made the following\r
-statement in the closing paragraphs\r
-of their\r
-<a href="http://www.ftc.gov/bcp/privacy/wkshp97/comments2/dma027a.htm">summary comments</a>\r
-to the Commission.\r
-<blockquote>\r
-Clever shareware developers have come up with products that\r
-can obliterate cookies and advertisements for those consumers\r
-who have these concerns.\r
-The Internet is a market that is so democratic and flexible\r
-that it is easy for companies and software\r
-developers to respond to a perceived market need. \r
-</blockquote>\r
-Their attitude seems to be that they would prefer that\r
-people use technical solutions\r
-to protect their privacy than have protections\r
-imposed by legislation or government regulations.\r
-So, do you perceive a market need?\r
-Then here are some ways to flex your democratic muscles.\r
-</p>\r
-\r
-<h3><a name="nobrainer" href="/cgi-bin/gp?pg=ijbfaq&pr=nobrainer"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Should we provide the Internet Junkbuster for our employees?\r
-</h3>\r
-<p>\r
-That depends. Try this quick three-point test.\r
-<br><ol type="1">\r
-<li>\r
-<a name="waste">Do you want to spend your communications budget</a>\r
-on bandwidth that wastes your employees' time by forcing them to wait\r
-for a lot of annoying distractions while they're trying to\r
-do their jobs?\r
-<li>\r
-<a name="surveillance">Do you want current and potential vendors</a>\r
-to know quantitative details about the\r
-<a href="ijbfaq.html#agent">software and hardware platforms</a>\r
-that you have?\r
-<li>\r
-<a name="intelligence">Do you want your competitors to be able to</a>\r
-<a href="cookies.html">track</a>\r
-exactly which of your\r
-employees are checking out their web sites?\r
-</ol>\r
-If the answer to all three questions is yes,\r
-then you probably don't have any need for this kind of product.\r
-</p>\r
-\r
-<h3><a name="commercial" href="/cgi-bin/gp?pg=ijbfaq&pr=commercial"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Can our company get commercial support for the software?\r
-</h3>\r
-<p>\r
-Yes,\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=commercial">ask us</a>\r
-for a quote on a maintenance contract with your choice of\r
-phone and email support,\r
-hard copy documentation,\r
-source code and pre-compiled binaries on tape or disk,\r
-and email alerting of upgrades and issues.\r
-We also offer consulting services to help set up ``stealth browsing''\r
-capabilities to help reduce the footprints left while doing competitive\r
-analysis and other Web work where confidentiality is critical.\r
-</p>\r
-\r
-<h3><a name="isps" href="/cgi-bin/gp?pg=ijbfaq&pr=isps"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-I run an ISP. What issues should I consider before offering it?\r
-</h3>\r
-<p>\r
-Many\r
-<small>ISP</small>s\r
-who offer the proxy to their customers have told us that\r
-most of their customers are \r
-delighted with it\r
-(although one reported that a customer complaint that without banner ads,\r
-surfing was like reading a novel: we recommend making it optional).\r
-Many\r
-<small>ISP</small>s\r
-like it because it reduces bandwidth requirements.\r
-To help get you started,\r
-here's a checklist we've developed from working with a few\r
-<small>ISP</small>s.\r
-You may think of more,\r
-and we'd be interested if you're willing to\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=isps">share them</a>\r
-with us.\r
-<br><ol type="1">\r
-<li>\r
-<a name="pending">If you get more than one request for</a>\r
-the\r
-Internet Junkbuster\r
-you may want to tell your customers on your News page that you\r
-<a href="ijbfaq.html#isp">already</a>\r
-know about it and are assessing it.\r
-<li>\r
-<a name="try">Try the software and</a>\r
-<a href="ijbfaq.html#install">verify</a>\r
-that it performs satisfactorily.\r
-<li>\r
-<a name="value">Determine whether your customers perceive the service as</a>\r
-<a href="ijbfaq.html#switch">valuable</a>\r
-(and therefore worth the time to set up).\r
-We've had reports of many delighted customers.\r
-<li>\r
-<a name="secure">Assess the</a>\r
-level of\r
-<a href="ijbfaq.html#others">security</a>\r
-associated with the software.\r
-If access is to be\r
-<a href="ijbfaq.html#restrict">restricted</a>\r
-(to just dial-in ports, for example)\r
-how is this to be done?\r
-<li>\r
-<a name="costs">Consider</a>\r
-whether to expect any additional load on computing resources required,\r
-and any change in use of bandwidth due to the blocking of large\r
-<small>GIF</small>s.\r
-<li>\r
-<a name="opt">Choose the</a>\r
-<a href="ijbman.html">options</a>\r
-you wish to provide.\r
-<li>\r
-<a name="multiple">Decide whether you want</a>\r
-to offer a choice of configurations, such some of these four.\r
-<br><ol type="A">\r
-<li>\r
-<a name="banner">Banners</a>\r
-<a href="ijbfaq.html#blocking">Blocked,</a>\r
-Wafer with\r
-<a href="ijbfaq.html#notice">No-Cookie-Copyright</a>\r
-notice\r
-<li>\r
-<a name="low">Cookies</a>\r
-not stopped\r
-(<a href="ijbman.html#cookiefile">cookiefile</a>\r
-with just a\r
-<big><kbd>*</kbd></big>\r
-in it),\r
-<a href="ijbfaq.html#header">User Agent</a>\r
-specified as\r
-<a href="ijbfaq.html#lynx">Lynx</a>\r
-<li>\r
-<a name="oneway">Cookies from browser</a>\r
-<a href="ijbfaq.html#one">allowed</a>,\r
-permitting\r
-<a href="ijbfaq.html#registration">registered services</a>\r
-<li>\r
-<a name="kid">A proxy for</a>\r
-<a href="ijbfaq.html#children">kids.</a>\r
-</ol>\r
-<a name="caching">If you run a</a>\r
-<a href="ijbfaq.html#chain">caching proxy,</a>\r
-decide whether the \r
-Internet Junkbuster\r
-will chain with it by default,\r
-and whether to offer an alternate with no caching.\r
-(Some\r
-<small>ISP</small>s\r
-don't, because they want to give customers an incentive to use caching\r
-and save bandwidth.)\r
-<li>\r
-<a name="naming">Decide on a naming scheme for your</a>\r
-proxies.\r
-If you're running only one\r
-proxy on one machine,\r
-the simplest way is to just use port 8000 on your main machine,\r
-such as\r
-<big><kbd>our-isp.net.</kbd></big>\r
-But it would probably be safer to put an entry in your name server\r
-and call it something like\r
-<big><kbd>junkbuster.our-isp.net.</kbd></big>\r
-If running several proxies, you could either use different ports\r
-on the same machine, or if you have\r
-the opportunity to distribute the load over\r
-a few machines \r
-you could\r
-use different hostname aliases such as\r
-<big><kbd>banner.junkbuster.our-isp.net</kbd></big>,\r
-<big><kbd>lynx.junkbuster.our-isp.net</kbd></big>\r
-and\r
-<big><kbd>oneway.junkbuster.our-isp.net</kbd></big>\r
-(corresponding to the examples in the previous point).\r
-You may want to set up\r
-<a href="ijbfaq.html#Automatic">Automatic Proxy Configuration.</a>\r
-<li>\r
-<a name="document">Prepare a page</a>\r
-explaining the\r
-Internet Junkbuster\r
-to your customers.\r
-<a name="does">Here's are some examples from</a>\r
-<a href="http://www.cia.com.au/us/help/faq-proxy.html">Australia</a>,\r
-<a href="http://www.rhein-ruhr.de/info/junkbuster.html">Germany</a>,\r
-<a href="http://www.packet.net/ijb/">Florida</a>,\r
-<a href="http://www.eclipse.net/adfilter/index.html">New York/New Jersey/Pennsylvania,</a>\r
-<a href="http://a-o.com/proxy/proxy.html">North Carolina</a>,\r
-<a href="http://www.trip.net/junkbuster/">Texas</a>,\r
-and\r
-<a href="http://www.inconnect.com/proxy.html">Utah</a>.\r
-<a name="reuse">You are welcome to copy and modify</a>\r
-material\r
-from\r
-Junkbusters\r
-according to the\r
-<a href="gpl.html">GPL</a>.\r
-You might want to set up a process to check this page periodically\r
-and update it when it changes.\r
-(A few links can probably serve as well as lot of copying however.)\r
-A typical page would probably specify the following.\r
-<br><ul type="1">\r
-<li>\r
-<a name="abstract">A brief explanation stating what</a>\r
-the\r
-Internet Junkbuster\r
-does, with a link to this page.\r
-<li>\r
-<a name="addresses">The addresses of the proxy or proxies,</a>\r
-with their port number(s).\r
-<li>\r
-<a name="options">The options used,</a>\r
-and how to view the contents of the blockfile (which you can place on\r
-your web pages,\r
-preferably in a file called\r
-<big><kbd>blocklist.html</kbd></big>\r
-or\r
-<big><kbd>blocklist.txt</kbd></big>).\r
-<li>\r
-<a name="additions">An indication</a>\r
-of whether suggestions for the blocklist are considered,\r
-and if so, how to submit them: to a particular email address,\r
-via web-based form, etc.\r
-<li>\r
-<a name="configuration">Instructions</a>\r
-on how to\r
-configure a browser.\r
-You may want to include details for only the two major browsers\r
-and leave the others to a link.\r
-<li>\r
-<a name="service">Procedures on how to report problems, give feedback etc.</a>\r
-</ul>\r
-<li>\r
-<a name="beta">Invite a small number of technologically sophisticated</a>\r
-customers to beta-test the service.\r
-<li>\r
-<a name="announce">Announce general availability on your ``News'' page.</a>\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=isps">Tell us</a>\r
-if you would like to be included on a list of\r
-<small>ISP</small>s\r
-offering the\r
-Internet Junkbuster.\r
-</ol>\r
-</p>\r
-\r
-<h3><a name="ps2" href="/cgi-bin/gp?pg=ijbfaq&pr=ps2"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-What's a Proxy Server Server and how can I make money as one?\r
-</h3>\r
-<p>\r
-Other organizations with web presence and some bandwidth to spare\r
-can set up as\r
-<i><dfn>Proxy Server Servers</dfn></i>\r
-<!-- Aside: All this, and... -->\r
-(<small>PS<sup>2</sup></small>s).\r
-The idea here is to allow users to choose their proxy configuration,\r
-and provide it to them on a semi-permanent basis.\r
-Users would fill in a form specifying what options they want in\r
-their proxy,\r
-possibly even at a very high level, such as\r
-``no ads''\r
-or ``no nudity.''\r
-This information is sent to a\r
-<small>CGI</small>\r
-script that\r
-configures a proxy, starts it running, and returns its address and port number\r
-(possibly along with configuration instructions for the browser\r
-that the user specified.)\r
-<p>\r
-<a name="revenue">Users</a>\r
-could be charged\r
-a subscription fee,\r
-or the service could be thrown in free in the hope of\r
-improving customer retention for some existing business\r
-(which is what\r
-<small>ISP</small>s\r
-are doing).\r
-It might be possible to make money by\r
-inserting new ads in the holes left where others were blocked,\r
-but the original owners might object.\r
-<small>PS<sup>2</sup></small>s\r
-could differentiate themselves\r
-by providing frequently updated and comprehensive\r
-blocking of ads, or of offensive material based on their own grading system.\r
-Some content providers might do it for the chance to be the\r
-only company that the consumer permits to set cookies.\r
-(Identification could even be done via cookies,\r
-but this might not be popular with the kind of user who wants a proxy.)\r
-<small>PS<sup>2</sup></small>s\r
-might sell specific or aggregate information about their\r
-users' browsing habits,\r
-so the agreement with users on whether they are permitted to do this\r
-would be important to both sides.\r
-<p>\r
-<a name="publicize">If your organization</a>\r
-establishes a \r
-Proxy Server Service\r
-you would like publicized,\r
-please\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=publicize">notify us.</a>\r
-</p>\r
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>\r
-<br>\r
-<center>\r
-<h2><a name="blocking"><font face="arial, helvetica">\r
-Blocking\r
-</font></a>\r
-</h2>\r
-</center>\r
-<br>\r
-<h3><a name="readymade" href="/cgi-bin/gp?pg=ijbfaq&pr=readymade"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Where can I get an example blockfile that stops most ads?\r
-</h3>\r
-<p>\r
-The sample blockfile we provide blocks almost nothing,\r
-and we do not publish blockfiles that stop almost all banner ads.\r
-But others have; you can find them by\r
-<a href="http://www.altavista.com/cgi-bin/query?pg=q&what=web&fmt=.&q=%2Bjunkbuster+%2Burl%3Ablocklist">asking Altavista.</a>\r
-You can add any part of the new file to your old one\r
-(probably called\r
-<big><kbd>sblock.ini</kbd></big>\r
-if you haven't changed the default name in the latest version)\r
-or your just replace it completely.\r
-You\r
-<a href="ijbfaq.html#cover">probably</a>\r
-don't need to restart the proxy.\r
-<p>\r
-<a name="pub">If you develop an interesting blocklist and publish it on the Web,</a>\r
-you might want to include the word ``junkbuster'' in it\r
-and use the word ``blocklist'' in the file name given in the\r
-<small>URL</small>\r
-so that others can find it with the query given in the previous sentence.\r
-</p>\r
-\r
-<h3><a name="zap" href="/cgi-bin/gp?pg=ijbfaq&pr=zap"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-If I see an ad I wish I hadn't, how do I stop it?\r
-</h3>\r
-<p>\r
-If your\r
-<small>ISP</small>\r
-is running the\r
-Internet Junkbuster,\r
-they should have a policy on whether they accept suggestions from\r
-their customers on what to block. Consult their web page.\r
-<p>\r
-<a name="cover">If you are running</a>\r
-the\r
-Internet Junkbuster\r
-yourself, you have complete control over what gets through.\r
-Just add a pattern to cover the offending \r
-<small>URL</small>\r
-to your blockfile.\r
-Version 1.3 and later automatically rereads the blockfile when it changes,\r
-but if you're running an earlier version you'll\r
-have to\r
-<a href="ijbfaq.html#shutdown">stop it</a>\r
-and restart it.\r
-<p>\r
-<a name="target">To choose a pattern you'll first need to find the</a>\r
-<small>URL</small>\r
-of the ad you want cover.\r
-<p>\r
-<a name="pinpoint">Some people use the</a>\r
-<a href="ijbman.html#debug">debug</a>\r
-<big><kbd>1</kbd></big>\r
-option to display each \r
-<small>URL</small>\r
-in a window as the request is sent to the server.\r
-It's then usually an easy task to pick the offending \r
-<small>URL</small>\r
-from the list of recent candidates.\r
-<p>\r
-<a name="source">Alternatively,</a>\r
-you can use\r
-<b><font face="arial, helvetica">\r
-View Document Info</font></b>\r
-(or\r
-<b><font face="arial, helvetica">\r
-View Document Source</font></b>\r
-if your browser doesn't have that).\r
-The\r
-<b><font face="arial, helvetica">\r
-Info</font></b>\r
-feature has the advantage of showing you the full\r
-<small>URL</small>\r
-including the host name,\r
-which may not be specified in the source:\r
-there you might see something like\r
-<big><kbd>SRC="/ads/click_here_or_die.gif"</kbd></big>\r
-indicating only the\r
-<i><dfn>path</dfn></i>.\r
-(The host name is assumed to be the same as the one the page came from.)\r
-<p>\r
-<a name="offsite">But ads often</a>\r
-come from a different site, in which case you\r
-might see something like\r
-<big><kbd>SRC="grabem.n.trackem.com/Ad/Infinitum/SpaceID=1666"</kbd></big>\r
-or longer.\r
-<a name="warehouse">If the company looks like a pure ad warehouse</a>\r
-(as in the last case),\r
-you may want to place just its domain name in the blockfile,\r
-which blocks all \r
-<small>URL</small>s\r
-from that site.\r
-<p>\r
-<a name="wanted">If the ad comes from a server</a>\r
-that you really want some content from,\r
-you can include enough of the path\r
-to avoid zapping stuff you might want.\r
-In the first example above,\r
-<big><kbd>/ads/</kbd></big>\r
-would seem to be enough.\r
-If you don't include the domain name,\r
-the pattern applies to all sites,\r
-so you don't want such patterns\r
-to be too general:\r
-for example\r
-<big><kbd>/ad</kbd></big>\r
-would block\r
-<big><kbd>/admin/salaries/</kbd></big>\r
-on your company's internal site.\r
-<p>\r
-<a name="image">To speed the blocking of images, some</a>\r
-<small>UNIX <a href="legal.html#not_our_trademark">®</a></small>\r
-users create a\r
-shell script called\r
-<big><kbd>Image:</kbd></big>\r
-containing a line such as\r
-<big><kbd>echo $1 | sed s/http:..// >> $HOME/lib/blockfile</kbd></big>\r
-that adds its argument to the user's blockfile.\r
-Once an offending image has been be found using\r
-<b><font face="arial, helvetica">\r
-View Document Info</font></b>\r
-it's easy to cut-and-paste the line (or part of it) into a shell window.\r
-The same script can be linked to a file called\r
-<big><kbd>Frame:</kbd></big>\r
-to dealing with framed documents,\r
-and\r
-<big><kbd>junkbuster:</kbd></big>\r
-to accept the output of the\r
-<a href="ijbman.html#debug">debug</a>\r
-option.\r
-<p>\r
-<a name="partial">When compiled without the</a>\r
-<i><dfn>regular expressions</dfn></i>\r
-option, the\r
-Internet Junkbuster\r
-uses only very simple (and fast) matching methods.\r
-The pattern\r
-<big><kbd>/banners</kbd></big>\r
-will not stop\r
-<big><kbd>/images/banners/huge.gif</kbd></big>\r
-getting through: you would have to include the pattern\r
-<big><kbd>/images/banners</kbd></big>\r
-or something that matches in full from the left.\r
-<a name="regex">So you can get what you want here,</a>\r
-the matcher understands\r
-<small>POSIX</small>\r
-regular expressions:\r
-you can use\r
-<big><kbd>/*.*/banners</kbd></big>\r
-to block\r
-and any\r
-<small>URL</small>\r
-containing\r
-<big><kbd>/banners</kbd></big>\r
-(even in the middle of the path).\r
-<a name="posix">(In Versions 1.1 through 1.4</a>\r
-they were an option at compile time;\r
-from Version 2.0 they have become the default.)\r
-Regular expressions give you\r
-<a href="http://theory.uwinnipeg.ca/localfiles/infofiles/gcc/rx_toc.html">many more features</a>\r
-than this,\r
-but if you're not already familiar with them you probably won't \r
-need to know anything beyond the\r
-<big><kbd>/*.*/</kbd></big>\r
-idiom.\r
-If you do, a\r
-<big><kbd>man egrep</kbd></big>\r
-is probably a good starting point).\r
-<p>\r
-<a name="slash">Don't forget the</a>\r
-<big><kbd>/</kbd></big>\r
-(slash)\r
-at the beginning of the path.\r
-If you leave it out the line will be interpreted as a domain name,\r
-so\r
-<big><kbd>ad</kbd></big>\r
-would block all sites from Andorra\r
-(since\r
-<big><kbd>.ad</kbd></big>\r
-is the two-letter\r
-<a href="reference.html#country">country code</a>\r
-for that principality).\r
-<p>\r
-<a name="detail">For a detailed technical description</a>\r
-of how pattern matching is done,\r
-see the\r
-<a href="ijbman.html#o_b">manual.</a>\r
-</p>\r
-\r
-<h3><a name="despite" href="/cgi-bin/gp?pg=ijbfaq&pr=despite"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How come this ad is still getting through anyway?\r
-</h3>\r
-<p>\r
-If the ad had been displayed before you included its\r
-<small>URL</small>\r
-in the blockfile,\r
-it will probably be held in cache for some time,\r
-so it will be displayed without the need for any request to the server.\r
-Using the\r
-<a href="ijbman.html#debug">debug</a>\r
-<big><kbd>1</kbd></big>\r
-option to show each\r
-<small>URL</small>\r
-as it is fetched is a good way to see exactly what is happening.\r
-<p>\r
-<a name="otherwise">If new items seem to be getting through,</a>\r
-check that you are\r
-<a href="ijbfaq.html#show">really running</a>\r
-the proxy with the right blockfile in the options.\r
-Check the blockfile for\r
-<a href="ijbfaq.html#exceptions">exceptions.</a>\r
-<p>\r
-<a name="java">Some sites may have different ways of inserting ads,</a>\r
-such as via\r
-<a href="cookies.html#java">Java.</a>\r
-If you have ideas on how to block new kinds\r
-of junk not currently covered, please\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=java">tell us.</a>\r
-</p>\r
-\r
-<h3><a name="exceptions" href="/cgi-bin/gp?pg=ijbfaq&pr=exceptions"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How do I stop it blocking a URL that I actually want?\r
-</h3>\r
-<p>\r
-You can change the patterns so they don't cover it,\r
-or use a simple feature in Version 1.1 and later: a line beginning with a\r
-<big><kbd>~</kbd></big>\r
-character means that a\r
-<small>URL</small>\r
-blocked by previous patterns that matches the rest of\r
-the line is let through.\r
-For example,\r
-the pattern\r
-<big><kbd>/ad</kbd></big>\r
-would block\r
-<big><kbd>/addasite.html</kbd></big>\r
-but not if followed by\r
-<big><kbd>~/addasite</kbd></big>\r
-in the blockfile.\r
-Or suppose you want to see everything that comes from\r
-a site you like, even if it looks like an ad: simply put\r
-<big><kbd>~aSiteYouLike.com</kbd></big>\r
-at the\r
-<em>end</em>\r
-of the blockfile.\r
-(Order is important, because the last matching line wins.)\r
-<p>\r
-<a name="agreed">As well as unblocking</a>\r
-pages that were unintentionally blocked,\r
-this feature is useful for unblocking ads from a specific source.\r
-This might be because you are interested in those particular ones,\r
-or if you have an explicit agreement to accept certain ads,\r
-such as those from a free web-based email provider.\r
-</p>\r
-\r
-<h3><a name="children" href="/cgi-bin/gp?pg=ijbfaq&pr=children"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Can I block sites I don't want my children to see?\r
-</h3>\r
-<p>\r
-Yes, but remember that\r
-<a name="savvy">children who are technically sophisticated enough</a>\r
-to use the browsers' proxy configuration options\r
-could of course bypass any proxy.\r
-This kind of technology can be used as a gentle barrier to remind\r
-or guide the child,\r
-but nobody should expect it to replace the parent's role\r
-in setting and enforcing standards of online behavior for their children.\r
-<p>\r
-<a name="recommend">Some</a>\r
-<small>ISP</small>s\r
-are starting to provide specialized proxies to protect children.\r
-There are two basic approaches: the ``black list'' and the ``white list''\r
-approach.\r
-<a name="negative">The black list approach allows the child</a>\r
-to go anywhere not explicitly prohibited; the white list permits visits\r
-only to sites explicitly designated as acceptable.\r
-<p>\r
-<a name="positive">It's very easy for</a>\r
-anyone to\r
-compile a white list from a page of ``recommended\r
-kids sites'' and to configure an\r
-Internet Junkbuster\r
-to allow access to those sites only.\r
-If you compile with the\r
-<a href="ijbfaq.html#regex">regex</a>\r
-option,\r
-you can place a\r
-<big><kbd>*</kbd></big>\r
-(asterisk) as the first line of the blockfile (which blocks everything),\r
-and then list\r
-<a href="ijbfaq.html#exceptions">exceptions</a>\r
-after that.\r
-Be careful to make the exception sufficiently broad:\r
-for example, using\r
-<big><kbd>~www.uexpress.com/ups/comics/ch/</kbd></big>\r
-as the exception for\r
-<a href="http://www.uexpress.com/ups/comics/ch/"><cite>Calvin and Hobbes</cite></a>\r
-would block some of the graphic elements on the page;\r
-you would probably want a wider exception such as\r
-<big><kbd>~www.uexpress.com/ups/</kbd></big>\r
-to permit them.\r
-<p>\r
-<a name="trust">Version 2.0 has an experimental feature</a>\r
-to permit only sites mentioned in a nominated\r
-<a href="ijbman.html#trustfile">trusted site.</a>\r
-This allows organizations to build lists of sites for kids to browse,\r
-and the software automatically restricts access to those on the list.\r
-<p>\r
-<a name="scan">Many filtering</a>\r
-<a href="links.html#blocking">products</a>\r
-actually scan for keywords in\r
-the text of pages they retrieve\r
-before presenting it,\r
-but\r
-the\r
-Internet Junkbuster\r
-does not do this.\r
-Building a perfectly reliable black list system is hard,\r
-because it's very difficult to state\r
-in advance\r
-exactly\r
-what is obscene or unsuitable.\r
-For more info see our\r
-<a href="links.html#parents">links</a>\r
-page.\r
-</p>\r
-\r
-<h3><a name="message" href="/cgi-bin/gp?pg=ijbfaq&pr=message"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-What do I see when a page or graphic is blocked by the proxy?\r
-</h3>\r
-<p>\r
-You usually see a broken image icon,\r
-but it depends on several factors beyond the proxy's control.\r
-If asked for a\r
-<small>URL</small>\r
-matching its blockfile, the proxy returns an\r
-<small>HTML</small>\r
-page containing a message identifying itself\r
-(currently the two words ``Internet Junkbuster'')\r
-with a status 202 (Accepted) instead of the usual 200 (OK).\r
-(Versions 1.X returned an error 404: Forbidden, which caused\r
-strange behavior in some cases.)\r
-Status 202 is described in the\r
-<small>HTTP</small>\r
-<a href="http://www.ics.uci.edu/pub/ietf/http/rfc1945.html#Code202">RFC</a>\r
-as indicating that the request has been accepted but not completed,\r
-and that it might complete successfully in the future\r
-(in our case, if the blockfile were changed).\r
-<p>\r
-<a name="depends">The broken image icon is most common</a>\r
-because the browser is usually expecting a graphic.\r
-But if it was expecting text, or if the page happens to be using certain\r
-<small>HTML</small>\r
-extensions\r
-such as\r
-<big><kbd>layer</kbd></big>\r
-and your browser is a late model from Microsoft,\r
-you may see the words ``Internet Junkbuster'' displayed as a hot link.\r
-<p>\r
-<a name="click">Clicking on the link takes you to an explanation of</a>\r
-the pattern in the blockfile that caused the block,\r
-so that you can edit the blockfile and go back and reload if you really\r
-want to see what was blocked. The explanatory link is generated by\r
-the proxy and is automatically intercepted based on its ending in\r
-<big><kbd>ij-blocked-url</kbd></big>;\r
-even though the site is specified as\r
-<big><kbd>http://internet.junkbuster.com</kbd></big>\r
-no request should actually made to that site.\r
-If one is, it means that the proxy was been removed after it\r
-generated the link.\r
-<p>\r
-<a name="layer">To summarize:</a>\r
-the identifying link to the blocking explanation\r
-is usually turned into a broken image icon,\r
-but it may be displayed on a page alone,\r
-or they may may be restricted to the particular frame, layer or graphic area\r
-specified in the page containing them.\r
-The proxy has no way of knowing the context in which a\r
-<small>URL</small>\r
-will be used and cannot control how the blocking message will be rendered.\r
-</p>\r
-\r
-<h3><a name="broken" href="/cgi-bin/gp?pg=ijbfaq&pr=broken"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Why not replace blocked banners with something invisible?\r
-</h3>\r
-<p>\r
-<a name="infringe">Many users have suggested to us</a>\r
-that blocked banners should be replaced by a something like a\r
-1x1 transparent\r
-<small>GIF</small>\r
-to make the page would look as if there was nothing ever there.\r
-Apart from making it harder to catch unintended blocking,\r
-this might also displease the owners of the page,\r
-who could argue that such a change constitutes a copyright infringement.\r
-We think that merely failing to allow an included graphic to be accessed\r
-would probably not be considered an infringement:\r
-after all this is what happens when a browser\r
-is configured not to load images automatically.\r
-However, we are\r
-<a href="over.html#notlaw">not</a>\r
-lawyers,\r
-so anyone in doubt should take appropriate advice.\r
-<p>\r
-<a name="done">In a context where the copyright issue is resolved</a>\r
-satisfactorily,\r
-a proxy could simply return a status 301 or 302 and\r
-specify a replacement\r
-<small>URL</small>\r
-in a\r
-<big><kbd>Location</kbd></big>\r
-and/or\r
-<big><kbd>URI</kbd></big>\r
-header.\r
-An alternative would be to use inline code to return a\r
-1 x 1 clear\r
-<small>GIF</small>.\r
-We do not publish sample code for this,\r
-and we have no way of stopping\r
-<a href="ijbdist.html#others">others</a>\r
-who have.\r
-</p>\r
-\r
-<h3><a name="size" href="/cgi-bin/gp?pg=ijbfaq&pr=size"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Why not block banners based on the dimensions of the image?\r
-</h3>\r
-<p>\r
-Many users have pointed out that most banner ads come in standard sizes,\r
-so why not block all\r
-<small>GIF</small>s\r
-of those sizes?\r
-This would theoretically be without fetching the object \r
-because the dimensions are usually given in the\r
-<big><kbd>IMG</kbd></big>\r
-tag,\r
-but it would require substantial changes in the code,\r
-and we doubt whether it would be much more effective than a good block list.\r
-</p>\r
-\r
-<h3><a name="embedded" href="/cgi-bin/gp?pg=ijbfaq&pr=embedded"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-What about non-graphic advertising within the pages I want?\r
-</h3>\r
-<p>\r
-The\r
-Internet Junkbuster\r
-deliberately\r
-does not provide a way of automatically editing the contents of a page,\r
-to remove textual advertising or\r
-to repair the holes left by blocked banners.\r
-Other packages such as\r
-<a href="links.html#webfilter">WebFilter</a>\r
-do.\r
-<p>\r
-<a name="base">For the same reason,</a>\r
-it has no way of stopping a new browser\r
-window being created, because this is done through the\r
-<big><kbd>target</kbd></big>\r
-attribute in the\r
-<big><kbd><a></kbd></big>\r
-and\r
-<big><kbd><base></kbd></big>\r
-elements,\r
-not through headers.\r
-Nor do we plan to add a feature to\r
-<a href="http://simmons.starkville.ms.us/tips/081097/">paralyze animated</a>\r
-<small>GIF</small>s.\r
-</p>\r
-\r
-<h3><a name="push" href="/cgi-bin/gp?pg=ijbfaq&pr=push"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Does it block ads on the broadcasting ``push'' systems? How about pop-up ads?\r
-</h3>\r
-<p>\r
-We haven't tried it but we expect it would probably\r
-work on image ads on push channels.\r
-See also\r
-<a href="links.html#adchoice">adchoice</a>.\r
-<p>\r
-<a name="pop">Disabling</a>\r
-<a href="cookies.html#java">Javascript</a>\r
-stops some pop-up ads.\r
-One problem is that some advertisers throw open a new\r
-browser window to frame the ad. The ad is easily blocked,\r
-but the empty window remains. You can kill it easily, but this is a chore.\r
-We don't see how to stop them other than editing the\r
-<small>HTML</small>\r
-from the parent window, which we\r
-<a href="ijbfaq.html#broken">don't</a>\r
-like to do.\r
-<p>\r
-<a name="TBTD">The</a>\r
-<a href="http://www.tbtf.com/archive/10-06-97.html">TBTF</a>\r
-newsletter warned subscribers to push information that\r
-<a name="LOGTARGET">in IE4,</a>\r
-<a href="http://www.microsoft.com/standards/cdf.htm#Logging">LOGTARGET</a>\r
-allows\r
-servers to determine the\r
-<small>URL</small>s\r
-viewed at their site even if accessed from cache or through a proxy.\r
-If you use this browser see our instructions on\r
-<a href="cookies.html#counting">how to disable</a>\r
-this.\r
-<p>\r
-<a name="pushy">If you find you have experience using the proxy with push,</a>\r
-or have any other advice about it, please\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=pushy">tell us.</a>\r
-</p>\r
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>\r
-<br>\r
-<center>\r
-<h2><a name="cookies"><font face="arial, helvetica">\r
-Cookies\r
-</font></a>\r
-</h2>\r
-</center>\r
-<br>For background information on cookies see our\r
-<a href="cookies.html">page describing their dangers.</a>\r
-\r
-<h3><a name="breakthrough" href="/cgi-bin/gp?pg=ijbfaq&pr=breakthrough"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Might some cookies still get through? How can I stop them?\r
-</h3>\r
-<p>\r
-Yes, you should expect the occasional cookie to make it through to your browser.\r
-We know of at least three ways this can happen;\r
-please\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=breakthrough">tell us</a>\r
-if you find any others.\r
-One way is in secure documents, which are explained\r
-<a href="ijbfaq.html#secure">below.</a>\r
-<p>\r
-<a name="EQUIV">A</a>\r
-<a href="links.html#JavaScript">few</a>\r
-sites set cookies using a line such as\r
-<big><kbd><META HTTP-EQUIV="Set-Cookie" CONTENT="flavor=chocolate"></kbd></big>\r
-in the\r
-<big><kbd>HEAD</kbd></big>\r
-section of an\r
-<small>HTML</small>\r
-document.\r
-<a name="javascript">Cookies can also be</a>\r
-<!-- IEM: http://cgi.netscape.com/eng/mozilla/Gold/handbook/javascript/ref_a-c.html#cookie_property -->\r
-set and read\r
-in\r
-JavaScript.\r
-To see if this is happening in a document,\r
-view its source, look in the\r
-<big><kbd>head</kbd></big>\r
-for a section tagged\r
-<big><kbd>script language="JavaScript"</kbd></big>.\r
-If it contains a reference to\r
-<big><kbd>document.cookie</kbd></big>,\r
-the page can manipulate your cookie file without sending any cookie headers.\r
-The\r
-Internet Junkbuster\r
-does not tamper with these methods.\r
-Fortunately they are rarely used at the moment.\r
-If a cookie gets set, it should be stopped\r
-by the proxy on its way back to the server when a page is requested,\r
-but it can still be read in Javascript.\r
-bu\r
-<p>\r
-<a name="alert">To prevent cookies breaking through,</a>\r
-<strong>always</strong>\r
-keep\r
-<a href="cookies.html#disable">cookie alerts</a>\r
-turned on in your browser,\r
-and\r
-<a href="cookies.html#java">disable</a>\r
-Java and Javascript.\r
-Making the files\r
-<a href="cookies.html#only">hard to write</a>\r
-may also help.\r
-</p>\r
-\r
-<h3><a name="method" href="/cgi-bin/gp?pg=ijbfaq&pr=method"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Exactly how do cookies get created and stored anyway?\r
-</h3>\r
-<p>\r
-When a web site's server sends you a page it also sends\r
-certain ``header information'' which your browser records but does not display.\r
-One of these is a\r
-<big><kbd>Set-Cookie</kbd></big>\r
-header, which specifies the cookie information that the server wants your browser to record.\r
-Similarly, when your browser requests a page it also sends headers, specifying\r
-information such as the graphics formats it understands.\r
-If a cookie has previously been set by a site that matches the\r
-<small>URL</small>\r
-it is about to request,\r
-your browser adds a\r
-<big><kbd>Cookie</kbd></big>\r
-header quoting the previous information.\r
-<p>\r
-<a name="privacy">For more background information on how cookies</a>\r
-can damage your privacy, see our\r
-<a href="cookies.html">page on cookies.</a>\r
-For highly detailed technical information see the\r
-<a href="links.html#kristol">RFC.</a>\r
-The\r
-Internet Junkbuster\r
-will show you all headers you use the\r
-<a href="ijbman.html#debug">debug</a>\r
-<big><kbd>8</kbd></big>\r
-option,\r
-or you can get a sample from our\r
-<a href="ijbfaq.html#headers">demonstration page.</a>\r
-</p>\r
-\r
-<h3><a name="break" href="/cgi-bin/gp?pg=ijbfaq&pr=break"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-If cookies can't get through, will some things stop working for me?\r
-</h3>\r
-<p>\r
-Possibly.\r
-Some personalized services including certain\r
-<!-- IEM: http://my.yahoo.com -->\r
-chat\r
-rooms\r
-require cookies.\r
-<a name="registration">Newspapers that require</a>\r
-<!-- IEM: http://www.nytimes.com/subscribe/sub-bin/new_sub.cgi#agree -->\r
-registration\r
-or\r
-<!-- IEM: http://interactive5.wsj.com/regUser.html -->\r
-subscription\r
-will not automatically recognize you if you don't send them the cookie they\r
-assigned you. And there are a very small number of sites that do\r
-strange things with cookies; they don't work for anyone that blocks\r
-cookies by any means.\r
-Some sites such as\r
-<a href="links.html#withhold">Microsoft</a>\r
-explain that their content is so wonderfully compelling that\r
-they will withhold it from you unless you submit to their\r
-inserting cookies.\r
-<p>\r
-<a name="want">If you want such sites to be given your cookies,</a>\r
-you can use the\r
-<a href="ijbman.html#cookiefile">cookiefile</a>\r
-option provided you are running\r
-<a href="ijbfaq.html#crumble">Version 1.2 or later</a>\r
-yourself.\r
-Simply include the domain name of those sites in the\r
-<i>cookiefile</i>\r
-specified by this option.\r
-If it still doesn't work,\r
-the problem may be in\r
-<a href="ijbfaq.html#breakage">other headers.</a>\r
-<p>\r
-<a name="one">It's possible to let cookies out but not in,</a>\r
-which is enough to keep some sites happy, but not all of them:\r
-one newspaper site seems to go into an endless frenzy\r
-if deprived of fresh cookies.\r
-A cookiefile containing\r
-a single line consisting of the two characters\r
-<big><kbd>>*</kbd></big>\r
-(greater-than and star) permits server-bound cookies only.\r
-The\r
-<big><kbd>*</kbd></big>\r
-is a\r
-<a href="ijbman.html#wildcard">wildcard</a>\r
-that matches all domains.\r
-<p>\r
-<a name="else">If someone else is running the</a>\r
-Internet Junkbuster\r
-for you and has a version\r
-that\r
-<!-- IAM: ijbfaq.html#registration -->\r
-passes server-bound cookies through,\r
-you can try editing your browser's cookie\r
-file to contain just the ones you want,\r
-and restart your browser.\r
-<a name="window">To subscribe to a new service like this</a>\r
-after you have started using the\r
-Internet Junkbuster,\r
-you can try the following:\r
-tell your browser to\r
-<a href="ijbfaq.html#discontinue">stop using</a>\r
-the\r
-Internet Junkbuster,\r
-fill out and submit your subscription details\r
-(allowing that web site to set a cookie),\r
-then\r
-reconfigure your browser to use the\r
-Internet Junkbuster\r
-again\r
-(and stop more cookies being sent).\r
-This also requires the\r
-<a href="ijbman.html#cookiefile">cookiefile</a>\r
-option,\r
-and its success depends on the Web site\r
-not wanting to change your cookies at every session.\r
-For this reason it does not work at some major newspaper sites, for example.\r
-<a name="buyers">But you may prefer to</a>\r
-look at whether other sites provide the same\r
-or better services without demanding the opportunity\r
-to track your behavior.\r
-The web is a buyer's market where most prices are zero:\r
-very few people pay\r
-for content with money, so why should you pay with your privacy?\r
-</p>\r
-\r
-<h3><a name="crumble" href="/cgi-bin/gp?pg=ijbfaq&pr=crumble"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Can I control cookies on a per-site basis?\r
-</h3>\r
-<p>\r
-<a name="discard">Yes, since version 1.2 the</a>\r
-Internet Junkbuster\r
-has included advanced cookie management facilities.\r
-Unless you specify otherwise,\r
-cookies are discarded (``crumbled'') by the\r
-Internet Junkbuster\r
-whether they came from the server or the browser.\r
-In Version 1.2 and later you can\r
-use the\r
-<a href="ijbman.html#cookiefile">cookiefile</a>\r
-option\r
-to specify when cookies are to be passed through intact.\r
-It uses the same syntax and\r
-<a href="ijbman.html#o_b">matching</a>\r
-algorithm as the blockfile.\r
-<p>\r
-<a name="cook">If the</a>\r
-<small>URL</small>\r
-matches a pattern in the\r
-<i><dfn>cookiefile</dfn></i>\r
-then cookies are let through in both the browser's request for the\r
-<small>URL</small>\r
-and in the server's response.\r
-<a name="directional">One-way permissions can be</a>\r
-specified by starting the line with the\r
-<big><kbd>></kbd></big>\r
-or\r
-<big><kbd><</kbd></big>\r
-character.\r
-For example, a cookiefile consisting of the four lines\r
-<br>\r
-   <big><kbd>org</kbd></big>\r
-<br>\r
-   <big><kbd>>send-user-cookies.org</kbd></big>\r
-<br>\r
-   <big><kbd><accept-server-cookies.org</kbd></big>\r
-<br>\r
-   <big><kbd>~block-all-cookies.org</kbd></big>\r
-<br>\r
-allows cookies to and from\r
-<big><kbd>.org</kbd></big>\r
-domains only, with the following exceptions:\r
-<br><ol type="1">\r
-<li>\r
-<a name="fed">Cookies sent from servers in the domain</a>\r
-<big><kbd>send-user-cookies.org</kbd></big>\r
-are blocked on their way to the client,\r
-but cookies sent by the browser to that domain are still be fed to them.\r
-<li>\r
-<a name="take">The cookies of</a>\r
-<big><kbd>accept-server-cookies.org</kbd></big>\r
-check in to the proxy and are passed through to the browser,\r
-but when they come back to the proxy they never check out.\r
-<li>\r
-<a name="deny">All cookies to and from</a>\r
-<big><kbd>block-all-cookies.org</kbd></big>\r
-are blocked.\r
-</ol>\r
-<p>\r
-<a name="paths">If</a>\r
-the\r
-<b><kbd>junkbuster</kbd></b>\r
-was compiled with the regular expressions option\r
-they may be used in paths.\r
-Any logging to a\r
-<a href="ijbfaq.html#jar">``cookie jar''</a>\r
-is separate and not affected.\r
-<p>\r
-<a name="breadth">It's important to give hosts you want to be able</a>\r
-to set cookies sufficient breadth. For example,\r
-instead of\r
-<big><kbd>www.yahoo.com</kbd></big>\r
-use\r
-<big><kbd>yahoo.com</kbd></big>\r
-because the company uses many different hosts ending in that domain.\r
-</p>\r
-\r
-<h3><a name="wafers" href="/cgi-bin/gp?pg=ijbfaq&pr=wafers"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Can I make up my own fake cookies (wafers) to feed to servers?\r
-</h3>\r
-<p>\r
-Yes,\r
-using the\r
-<a href="ijbman.html#wafer">wafer</a>\r
-option.\r
-We coined the term\r
-<i><dfn>wafer</dfn></i>\r
-to describe cookies chosen by a user,\r
-not the Web server.\r
-Servers may not find wafers as tasty as the cookies\r
-they make themselves.\r
-But users may enjoy controlling servers' diets for various reasons,\r
-such as the following.\r
-<br><ul type="1">\r
-<li>\r
-<a name="retaliate">Users who consider cookies to</a>\r
-be an unwelcome intrusion and a waste\r
-of their disk space can respond in kind.\r
-By writing ``signature wafers'' they can\r
-express their feelings about cookies,\r
-in a place that the people\r
-in charge of them are most likely to notice.\r
-<li>\r
-<a name="notice">Sites running a proxy</a>\r
-that logs cookies to a file\r
-(such as the\r
-Internet Junkbuster\r
-does with the\r
-<a href="ijbman.html#jarfile">jarfile</a>\r
-option on)\r
-may want to notify\r
-servers that their cookies are being intercepted,\r
-deleted or copied.\r
-One possible reason for doing this is the uncertain copyright status\r
-of cookie strings.\r
-<a href="over.html#notlaw">Nothing</a>\r
-here should be taken as legal advice: we are simply raising a question\r
-for any interested parties to consider,\r
-and make no representation that such measures are necessary or sufficient.\r
-Concerned proxy sites might decide to send a wafer\r
-(named ``NOTICE'' for example)\r
-containing text along the lines of the following.\r
-<blockquote>\r
-<p>\r
-<a name="licenses_on_cookies_refused">TO WHOM IT MAY CONCERN</a>\r
-<i>\r
-<br>\r
-<br>\r
-Do not send me any copyrighted information other than the\r
-document that I am requesting or any of its necessary components.\r
-<br>\r
-<br>\r
-In particular do not send me any cookies that\r
-are subject to a claim of copyright by anybody.\r
-Take notice that I refuse to be bound by any license condition\r
-(copyright or otherwise) applying to any cookie.\r
-</i>\r
-</blockquote>\r
-Any company that tries to argue in court that the proxy site\r
-was breaching their copyright in the cookies would\r
-be met with the defense that the proxy site gave that company\r
-the opportunity to protect its copyright by simply\r
-not sending cookies after receiving the notice. \r
-<p>\r
-<a name="pointer">Cookies can be as long as four thousand characters,</a>\r
-so there's plenty of space for lawyerly verbosity,\r
-but white space, commas, and semi-colons are\r
-<a href="ijbman.html#o_w">prohibited.</a>\r
-Spaces can be turned into underscores.\r
-Alternatively,\r
-a\r
-<small>URL</small>\r
-could be sent as the cookie value,\r
-pointing to a document containing a notice,\r
-perhaps with a suggestive value such as\r
-<br>\r
-<big><kbd>http://www.junkbusters.com/ht/en/ijbfaq.html#licenses_on_cookies_refused</kbd></big>\r
-<br>\r
-But including the notice directly would probably be preferable\r
-because the addressee does not have to look it up.\r
-<p>\r
-<a name="vanilla">The</a>\r
-Internet Junkbuster 2.0\r
-currently sends a full notice as a\r
-``vanilla wafer''\r
-if cookies are being logged to a cookie jar\r
-and no other wafers have been specified.\r
-It can be suppressed with the\r
-<a href="ijbman.html#suppress-vanilla-wafer">suppress-vanilla-wafer</a>\r
-option,\r
-which might be used in situations where there is an established understanding\r
-between the proxy and all who serve it.\r
-</ul>\r
-<p>\r
-<a name="gimme">Junkbusters provides a</a>\r
-<small>CGI</small>\r
-script that lets you\r
-<a href="ijbfaq.html#headers">see</a>\r
-your wafers as they appear to servers.\r
-<p>\r
-<a name="malfunction">Wafers confuse a few fragile servers.</a>\r
-If this troubles you, don't use this option.\r
-<p>\r
-<a name="regardless">Any wafers specified are sent to</a>\r
-all sites regardless of the cookiefile.\r
-<a name="compliant">They are appended after any genuine cookies,</a>\r
-to maintain compliance with\r
-<a href="links.html#kristol">RFC 2109</a>\r
-in the event that a path was specified for a cookie.\r
-The\r
-<small>RFC</small>'s provisions regarding the\r
-<big><kbd>$</kbd></big>\r
-character\r
-(such as the\r
-<big><kbd>Version</kbd></big>\r
-attribute)\r
-are transparent\r
-to the proxy; it simply quotes what was recited by the browser.\r
-<p>\r
-<a name="personalize">If you want to send wafers only to specific sites,</a>\r
-you could try putting them your browser's cookie file in a format\r
-conforming to the Netscape\r
-<a href="links.html#netscape">specification</a>,\r
-and then specify in the proxy's cookiefile that cookies are to be\r
-<a href="ijbfaq.html#directional">sent to</a>\r
-but not accepted from those sites, so they can't overwrite the file.\r
-This may work with Netscape but not all other browsers.\r
-</p>\r
-\r
-<h3><a name="jar" href="/cgi-bin/gp?pg=ijbfaq&pr=jar"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Why would anyone want to save their cookies in a ``cookie jar?''\r
-</h3>\r
-<p>\r
-We provided this capability just in case anyone wants it.\r
-There are a few possible reasons.\r
-<br><ul type="1">\r
-<li>\r
-<a name="pay">It's conceivable that</a>\r
-marketing companies might one day\r
-<a href="new.html#hagel">buy</a>\r
-history files and cookie jars from consumers\r
-in the same way that they currently pay them to fill out survey forms.\r
-With this information they could\r
-gather psychographic information,\r
-see which competitors' sites the consumer has visited,\r
-and discover what advertising is being targeted at them.\r
-<li>\r
-<a name="choose">Some consumers might</a>\r
-employ semi-automated means of sorting through\r
-their cookie jars, selecting which ones to place in their cookies\r
-file for use by their browsers.\r
-Their decisions could be based on payments offered,\r
-privacy rating systems such as\r
-<a href="links.html#truste">TRUSTe</a>\r
-proposes,\r
-or their own opinion of the company.\r
-It could be done manually or with software.\r
-<li>\r
-<a name="share">Users may even start ``sharing'' cookies among themselves,</a>\r
-sending back cookies that servers generated for other visitors.\r
-Servers that aren't expecting this possibility\r
-will be misled about their visitors' identities.\r
-Cookies could be shared among users on a single machine,\r
-or across continents via\r
-<small>FTP</small>\r
-and anonymous remailers.\r
-<a name="disinformation">Privacy activists may promote</a>\r
-cookie disinformation campaigns\r
-as a way to defend the public against abuse.\r
-If a significant percentage of people send disinformative cookies,\r
-user tracking via cookies may become less reliable and less used.\r
-</ul>\r
-</p>\r
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>\r
-<br>\r
-<center>\r
-<h2><a name="anonymity"><font face="arial, helvetica">\r
-Anonymity\r
-</font></a>\r
-</h2>\r
-</center>\r
-<br>For details\r
-on how your identity can be revealed while you surf,\r
-see our page on\r
-<a href="http://www.junkbusters.com/cgi-bin/privacy">privacy.</a>\r
-Once you start using\r
-the\r
-Internet Junkbuster\r
-you should find that much of the information\r
-previously indicated on that page will no longer be provided.\r
-If the\r
-<big><kbd>REMOTE HOST</kbd></big>\r
-indicating your IP address is too close for comfort,\r
-see our suggestions\r
-<a href="ijbfaq.html#conceal">below</a>\r
-on how to\r
-conceal\r
-your IP address.\r
-We also recommend that you\r
-<a href="cookies.html">disable JavaScript</a>\r
-and\r
-<a href="links.html#java">Java.</a>\r
-\r
-<h3><a name="disclose" href="/cgi-bin/gp?pg=ijbfaq&pr=disclose"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-If I use the Internet Junkbuster, will my anonymity be guaranteed?\r
-</h3>\r
-<p>\r
-No. Your chances of remaining anonymous are improved,\r
-but unless you are an expert on Internet security\r
-it would be safest to assume that everything you do on the Web\r
-can be attributed to you personally.\r
-<p>\r
-<a name="happen">The</a>\r
-Internet Junkbuster\r
-removes various information about you,\r
-but it's still possible that web sites can find out who you are.\r
-Here's one way this can happen.\r
-<p>\r
-<a name="ftp">A few browsers</a>\r
-<a href="http://www.junkbusters.com/cgi-bin/privacy">disclose the user's email address</a>\r
-in certain situations, such as when transferring a file by\r
-<small>FTP</small>.\r
-The\r
-Internet Junkbuster 2.0\r
-does not filter the\r
-<small>FTP</small>\r
-stream.\r
-If you need this feature, or are concerned about the mail handler\r
-of your browser disclosing your email address,\r
-you might consider\r
-products such as\r
-<a href="links.html#nsclean">NSClean</a>.\r
-<p>\r
-<a name="binaries">Browsers downloaded as binaries</a>\r
-could use non-standard headers to give out any information\r
-they can have access to: see the manufacturer's license agreement.\r
-It's impossible to anticipate and prevent every breach of privacy that\r
-might occur.\r
-The professionally paranoid prefer browsers available as source code,\r
-because anticipating their behavior is easier.\r
-</p>\r
-\r
-<h3><a name="should" href="/cgi-bin/gp?pg=ijbfaq&pr=should"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Why should I trust my ISP or Junkbusters with my browsing data?\r
-</h3>\r
-<p>\r
-You shouldn't have to trust us, and you certainly don't have to.\r
-We do not run the proxy as a service,\r
-where we could observe your online behavior.\r
-We provide source code so that everyone can see that the proxy isn't\r
-doing anything sneaky.\r
-<p>\r
-<a name="awful">You are already trusting your</a>\r
-<small>ISP</small>\r
-not to look at an awful lot of information on what you do.\r
-They probably post a\r
-<a href="links.html#policy">privacy policy</a>\r
-on their site to reassure you.\r
-If they run a proxy for you, using it could actually\r
-make it slightly easier for them to monitor you,\r
-but we doubt that any sane\r
-<small>ISP</small>\r
-would try this,\r
-because if it were discovered customers would desert them.\r
-</p>\r
-\r
-<h3><a name="header" href="/cgi-bin/gp?pg=ijbfaq&pr=header"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-What private information from server-bound headers is removed?\r
-</h3>\r
-<p>\r
-The\r
-Internet Junkbuster\r
-pounces on the following\r
-<small>HTTP</small>\r
-headers in requests to servers,\r
-unless instructed otherwise in the options.\r
-<br><ul type="1">\r
-<li>\r
-<a name="from">The</a>\r
-<big><kbd>FROM</kbd></big>\r
-header,\r
-which a few browsers use to tell your email address to servers,\r
-is dropped\r
-unless the\r
-<a href="ijbman.html#from">from</a>\r
-option is set.\r
-<li>\r
-<a name="agent">The</a>\r
-<big><kbd>USER_AGENT</kbd></big>\r
-<a name="infer">header</a>\r
-is changed to indicate that the browser is\r
-currently Mozilla (Netscape) 3.01 Gold\r
-with an unremarkable Macintosh configuration.\r
-Misidentification helps resist certain\r
-<a href="ijbfaq.html#misidentify">attacks.</a>\r
-If your browser and hardware happen to be accurately identified,\r
-you might want to change the default.\r
-(Earlier versions of the\r
-Internet Junkbuster\r
-indicated different details;\r
-by altering them periodically we aim to hinder anyone trying to\r
-<a href="ijbfaq.html#detect">infer</a>\r
-whether our proxy is present.)\r
-<a name="lying">If you don't like the idea</a>\r
-of incorrectly identifying your computer as a Mac,\r
-set it accordingly.\r
-<!-- Aside: or read Kundera's Unbearable Lightness of Being, 5:5, ``It is a tragicomic fact..'' (p187?) -->\r
-<li>\r
-<a name="referer">The</a>\r
-<big><kbd>REFERER</kbd></big>\r
-header\r
-(which indicates where the\r
-<small>URL</small>\r
-currently being requested was found)\r
-is dropped.\r
-A single static referer to replace all\r
-real referers may be specified using the \r
-<a href="ijbman.html#referer">referer</a>\r
-option.\r
-Where no referer is provided by the browser, none is added;\r
-the\r
-<a href="ijbman.html#add-header">add-header</a>\r
-option with arguments such as\r
-<big><kbd>-x 'Referer: http://me.me.me'</kbd></big>\r
-can be used to send a bogus referer with every request.\r
-</ul>\r
-In \r
-Version <a href="ijbdist.html#c4">1.4</a>\r
-and later you can use the\r
-<a href="ijbman.html#o_r">-r @</a>\r
-option to selectively disclose\r
-<big><kbd>REFERER</kbd></big>\r
-and\r
-<big><kbd>USER_AGENT</kbd></big>\r
-to only those sites you nominate.\r
-<p>\r
-<a name="UA">Some browsers</a>\r
-send Referer and User-Agent information under different non-standard headers.\r
-The\r
-Internet Junkbuster 2.0\r
-stops\r
-<big><kbd>UA</kbd></big>\r
-headers,\r
-but others may get through.\r
-This information is also available via JavaScript,\r
-so\r
-<a href="cookies.html">disable disable</a>\r
-it.\r
-<a name="indexers">Some search engines</a>\r
-<a href="cookies.html#queries">encode the query you typed</a>\r
-in the\r
-<small>URL</small>\r
-that goes to advertisers to target a banner ad at you,\r
-so you will need to block the ad as well as the referer header,\r
-unless you want them (and anyone they might\r
-<a href="cookies.html#set">buy data</a>\r
-from)\r
-to know\r
-<a href="links.html#search">everything you ever search for.</a>\r
-<p>\r
-<a name="JavaScript">If you have JavaScript enabled (the default on</a>\r
-most browsers) servers can use it to obtain Referer and User Agent,\r
-as well as your plug-ins.\r
-We recommend\r
-<a href="cookies.html#java">disabling</a>\r
-JavaScript and Java.\r
-<p>\r
-<a name="response">Currently no</a>\r
-<small>HTTP</small>\r
-response headers (browser bound)\r
-are removed,\r
-not even the\r
-<big><kbd>Forwarded:</kbd></big>\r
-or\r
-<big><kbd>X-Forwarded-For:</kbd></big>\r
-headers.\r
-Nor are any added,\r
-<a href="ijbman.html#o_y">unless requested.</a>\r
-We are considering a more flexible header management system for\r
-a future version.\r
-</p>\r
-\r
-<h3><a name="breakage" href="/cgi-bin/gp?pg=ijbfaq&pr=breakage"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Might some things break because header information is changed?\r
-</h3>\r
-<p>\r
-Possibly. If used with a browser less advanced than Netscape 3.0 or IE-3,\r
-indicating an advanced browser\r
-may encourage pages containing extensions that confuse your browser.\r
-If this becomes a problem\r
-upgrade your browser or\r
-use the\r
-<a href="ijbman.html#user-agent">user-agent</a>\r
-option to indicate an\r
-<a href="ijbfaq.html#low">older browser.</a>\r
-In \r
-Version <a href="ijbdist.html#c4">1.4</a>\r
-and later you can selectively reveal your real browser\r
-to only those sites you nominate.\r
-<p>\r
-<a name="Russian">Because different browsers</a>\r
-use different encodings of Russian characters,\r
-certain web servers convert pages on-the-fly according to the User Agent\r
-header. Giving a User Agent with the wrong operating system or\r
-browser manufacturer causes some Russian sites to be garbled;\r
-Russian surfers should\r
-<a href="ijbman.html#o_r">change it</a>\r
-to something closer.\r
-<p>\r
-<a name="counters">Some</a>\r
-<a href="http://www.yahoo.com/Computers_and_Internet/Internet/World_Wide_Web/Programming/Access_Counts/">page access counters</a>\r
-work by looking at the referer;\r
-they may fail or break when deprived.\r
-<p>\r
-<a name="wired">Some sites depend on getting a referer header,</a>\r
-such as\r
-<big><kbd>uclick.com</kbd></big>,\r
-which serves comic strips\r
-for many newspaper sites,\r
-including\r
-<a href="http://www.uclick.com/?feature=db"><cite>Doonsbury</cite></a>\r
-for the\r
-<a href="http://www.washingtonpost.com/wp-srv/style/longterm/comics/comics.htm"><cite>Washington Post.</cite></a>\r
-(If you click on that last link, you can then get to a page containing\r
-the strip via the\r
-same\r
-<small>URL</small>\r
-we've linked to under\r
-<cite>Doonsbury</cite>,\r
-but if you click on the\r
-<cite>Doonsbury</cite>\r
-link directly, it gives you an error message suggesting that you\r
-use a browser that supports referers.)\r
-In \r
-Version <a href="ijbdist.html#c4">1.4</a>\r
-and later you can use the\r
-<a href="ijbman.html#o_r">-r @</a>\r
-option\r
-and place a line like\r
-<big><kbd>>uclick.com</kbd></big>\r
-in your cookiefile.\r
-<a href="http://www.wired.com/news/">Wired News</a>\r
-used to use referer to decide whether to add a navigation column to\r
-the page, but they have changed that.\r
-<p>\r
-<a name="Intellicast">The weather maps of</a>\r
-<a href="links.html#Intellicast">Intellicast</a>\r
-have been blocked by their server when no referer or cookie is provided.\r
-You can use the same countermeasure with a line such as\r
-<big><kbd>>208.194.150.32</kbd></big>\r
-(or simply get your weather information\r
-<a href="ijbfaq.html#buyers">elsewhere</a>).\r
-<p>\r
-<a name="decide">Some software vendors, including</a>\r
-<a href="http://www.intuit.com/quicken_store/">Intuit</a>\r
-use\r
-<big><kbd>USER_AGENT</kbd></big>\r
-to decide which versions of their products to display to you.\r
-With the\r
-<a href="ijbfaq.html#agent">default</a>\r
-you get Mac versions.\r
-<p>\r
-<a name="resort">As a last resort if a site you need doesn't seem to be working,</a>\r
-the\r
-<a href="ijbfaq.html#set">proxy configuration</a>\r
-of many browsers allow you to specify\r
-<b><font face="arial, helvetica">\r
-No Proxy For</font></b>\r
-any hostname you want.\r
-<p>\r
-<a name="What">We had reports that on some versions of Netscape the</a>\r
-<a href="http://home.netscape.com/home/whats-new.html">What's New</a>\r
-feature did not work with the proxy,\r
-but we think we fixed this in Version 2.0.1.\r
-</p>\r
-\r
-<h3><a name="misidentify" href="/cgi-bin/gp?pg=ijbfaq&pr=misidentify"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How is misidentifying my browser good for security and privacy?\r
-</h3>\r
-<p>\r
-Almost\r
-<a href="new.html#Browser">every</a>\r
-major release of both leading browsers has contained\r
-bugs that allow malicious servers to compromise your privacy and security.\r
-Known bugs are quickly fixed, but millions of copies of the affected\r
-software remain out there, and yours is probably one of them.\r
-The\r
-<a href="ijbfaq.html#agent">header</a>\r
-that normally identifies your browser tells such servers exactly which attacks\r
-to use against you.\r
-By misidentifying your browser you reduce the likelihood that they\r
-will be able to mount a successful attack.\r
-</p>\r
-\r
-<h3><a name="conceal" href="/cgi-bin/gp?pg=ijbfaq&pr=conceal"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Does the Internet Junkbuster conceal my IP address?\r
-</h3>\r
-<p>\r
-Web sites get the IP address of any proxy or browser they serve pages to.\r
-If you run the proxy on your own computer the IP address disclosed\r
-is the same as your browser would, unless you use the\r
-<a href="ijbman.html#forwardfile">forwardfile</a>\r
-option is used to chain to another proxy,\r
-in which case servers only get the last IP address in the chain.\r
-Chaining slightly slows browsing of course, but it improves anonymity.\r
-<p>\r
-<a name="anonymizing">One public proxy that you can</a>\r
-forward to is\r
-<a href="new.html#LPWA">lpwa.com</a>\r
-port 8000.\r
-Read about its privacy-enhancing\r
-features and the authentication procedures first,\r
-and note that it blocks\r
-<a href="ijbfaq.html#wired">referer</a>\r
-in almost all cases,\r
-as well as some\r
-<a href="http://lpwa.com:8000/system.html#principles:header">other headers.</a>\r
-</p>\r
-\r
-<h3><a name="authorize" href="/cgi-bin/gp?pg=ijbfaq&pr=authorize"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-How can I set the proxy to remember my LPWA password?\r
-</h3>\r
-<p>\r
-After you log in to\r
-<a href="http://lpwa.com">LPWA</a>\r
-it tells your browser to send a\r
-<big><kbd>Proxy-authorization</kbd></big>\r
-header with each request.\r
-Whenever you shut down the browser and start again with a new browser,\r
-you need to log in again.\r
-If you are the only person using the\r
-Internet Junkbuster\r
-proxy, you can avoid repeated logins to\r
-<a href="http://lpwa.com">LPWA</a>\r
-by telling the\r
-Internet Junkbuster\r
-to send the information by placing a line such as\r
-<br>\r
-   <big><kbd>add-header Proxy-authorization: Basic ZHVtbXk=.</kbd></big>\r
-<br>\r
-in the configuration file.\r
-The exact example above\r
-<em>does not work</em>\r
-because the code\r
-<big><kbd>ZHVtbXk=.</kbd></big>\r
-is a bogus one that\r
-<a href="http://lpwa.com">LPWA</a>\r
-would never generate;\r
-follow the procedure below to generate a valid one.\r
-<br><ol type="1">\r
-<li>\r
-<a name="eight">Restart your</a>\r
-Internet Junkbuster\r
-with\r
-<big><kbd>debug 8</kbd></big>\r
-so you can see the\r
-<a href="ijbman.html#o_d">headers.</a>\r
-<li>\r
-<a name="login">Log in to</a>\r
-<a href="http://lpwa.com">LPWA</a>\r
-and go to any other site.\r
-<li>\r
-<a name="observe">Find the</a>\r
-<big><kbd>Proxy-authorization</kbd></big>\r
-header from the debug output and paste it\r
-after the word\r
-<a href="ijbman.html#add-header">add-header</a>\r
-into the config file.\r
-Also change the debug value back again.\r
-<li>\r
-<a name="return">Shut down your browser, start it up again, and</a>\r
-restart the proxy. Test that it works.\r
-</ol>\r
-This trick is convenient for sole users, but is not suitable when\r
-more than one person uses the proxy, because they will all get the\r
-same\r
-<a href="http://lpwa.com">LPWA</a>\r
-identity.\r
-</p>\r
-\r
-<h3><a name="ident" href="/cgi-bin/gp?pg=ijbfaq&pr=ident"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Does the Internet Junkbuster thwart identification by identd?\r
-</h3>\r
-<p>\r
-We think so,\r
-provided you are not the user running the\r
-proxy.\r
-If your computer (or your\r
-<small>ISP</small>'s)\r
-is running the\r
-<a href="links.html#identd"><kbd>identd</kbd></a>\r
-demon,\r
-servers can ask it for the identity of the\r
-user making the request at time you request a page from them.\r
-But if you're going through a proxy,\r
-they will identify the user name associated with the proxy, not you.\r
-A visit to\r
-<a href="http://ident.junkbusters.com">http://ident.junkbusters.com</a>\r
-lets you see what's happening.\r
-This test is (quite rightly) blocked by many\r
-<a href="ijbfaq.html#firewall">firewalls;</a>\r
-just interrupt the transfer if you get an abnormal wait after clicking.\r
-Running other applications\r
-may also expose you via\r
-<a href="links.html#identd"><kbd>identd</kbd></a>;\r
-the proxy of course doesn't help then.\r
-</p>\r
-\r
-<h3><a name="detect" href="/cgi-bin/gp?pg=ijbfaq&pr=detect"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Can web sites tell that I'm using the Internet Junkbuster?\r
-</h3>\r
-<p>\r
-With the default options the proxy doesn't announce itself.\r
-Obvious indications such as\r
-<a href="links.html#alive">Keep-Alive</a>\r
-headers are\r
-<a href="ijbman.html#o_x">deleted,</a>\r
-but sites might notice that you can cancel cookies faster than\r
-any human could possibly click on a mouse.\r
-(If you want to provide a\r
-plausible explanation for this,\r
-change the User Agent header to a\r
-<a href="ijbfaq.html#lynx">cookie-free</a>\r
-or\r
-<a href="cookies.html#communicator">cookie-crunching</a>\r
-browser).\r
-<p>\r
-<a name="figure">But when certain options</a>\r
-are used they could figure out something's going on,\r
-even if they're not pushing cookies.\r
-If you use blocking\r
-they can tell from their logs that the graphics in their pages\r
-are not being requested selectively.\r
-The\r
-<a href="ijbman.html#add-forwarded-header">add-forwarded-header</a>\r
-option explicitly announces to the server that a proxy is present,\r
-and\r
-sending them\r
-<a href="ijbfaq.html#wafers">wafers</a>\r
-is of course a dead giveaway.\r
-</p>\r
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>\r
-<br>\r
-<center>\r
-<h2><a name="security"><font face="arial, helvetica">\r
-Security\r
-</font></a>\r
-</h2>\r
-</center>\r
-<br>\r
-<h3><a name="encrypt" href="/cgi-bin/gp?pg=ijbfaq&pr=encrypt"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-What happens with Secure Documents (SSL, https:)?\r
-</h3>\r
-<p>\r
-If you enter a\r
-``Secure Document Area,''\r
-cookies and other header information\r
-such as User Agent and Referer\r
-are sent encrypted,\r
-so they cannot be filtered.\r
-We recommend getting your browser to alert you when this happens.\r
-(On Netscape:\r
-<b><font face="arial, helvetica">\r
-Options</font></b>;\r
-<b><font face="arial, helvetica">\r
-Security</font></b>;\r
-<b><font face="arial, helvetica">\r
-General</font></b>;\r
-<b><font face="arial, helvetica">\r
-Show an alert before entering a secure document space</font></b>.) \r
-We also recommend adding the line\r
-<big><kbd>:443</kbd></big>\r
-to the blockfile to stop all but sites specified in an exception\r
-after that line from using SSL.\r
-<p>\r
-<a name="passage">It may be possible to filter encrypted cookies</a>\r
-by combining the blocking proxy with a cryptographic proxy along\r
-the lines of\r
-<a href="http://stronghold.ukweb.com/safepassage/">SafePassage</a>,\r
-but we have not tried this.\r
-</p>\r
-\r
-<h3><a name="ssl" href="/cgi-bin/gp?pg=ijbfaq&pr=ssl"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Will using this as my Security Proxy compromise security?\r
-</h3>\r
-<p>\r
-We're not security experts, but we don't think so.\r
-The whole point of\r
-<small>SSL</small>\r
-is that the\r
-contents of messages are\r
-<!-- IEM: http://addy.com/dc/html/what_is_ssl_.html -->\r
-encrypted\r
-by the time\r
-they leave the browser and the server.\r
-Eavesdroppers (including proxies) can see where your messages are going\r
-whether you are running a proxy or not,\r
-but they only get to see the contents after they have been encrypted.\r
-</p>\r
-\r
-<h3><a name="restrict" href="/cgi-bin/gp?pg=ijbfaq&pr=restrict"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Can I restrict use of the proxy to a set of nominated IP addresses?\r
-</h3>\r
-<p>\r
-Yes, we added an\r
-<a href="ijbman.html#aclfile">access control</a>\r
-file in Version 2.0.\r
-But before you use it please consider why you want to do it.\r
-If the reason is security,\r
-it probably means you need a firewall.\r
-<p>\r
-<a name="selective">The</a>\r
-<a href="ijbman.html#listen-address">listen-address</a>\r
-option provides a way of binding the proxy to a single IP address/port.\r
-The right way to do this is to choose a port inside your firewall, and\r
-deny access to it to those outside the firewall.\r
-The\r
-Internet Junkbuster\r
-is not a firewall proxy;\r
-it should not be expected to solve security problems.\r
-<p>\r
-<a name="firewall">For background information on firewalls,</a>\r
-see\r
-<a href="http://www.yahoo.com/Computers_and_Internet/Security_and_Encryption/Firewalls/">Yahoo</a>\r
-or a\r
-<a href="http://www.netscapeworld.com/ned-02-1998/ned-02-firewall.html">magazine article</a>\r
-or these well-known books:\r
-<a href="http://www.amazon.com/exec/obidos/ISBN=0201633574/junkbusterscomA/"><cite>Firewalls and Internet Security: Repelling the Wily Hacker</cite></a>\r
-by\r
-<person>William R. Cheswick</person>\r
-and\r
-<person>Steven M. Bellovin</person>\r
-or\r
-<a href="http://www.amazon.com/exec/obidos/ISBN=1565921240/junkbusterscomA/"><cite>Building Internet Firewalls</cite></a>\r
-by\r
-<person>D. Brent Chapman</person>\r
-and\r
-<person>Elizabeth D. Zwicky</person>.\r
-There's\r
-<!-- IEM: http://www.wmd.de/wmd/staff/pauck/misc/fwtk_on_linux.html -->\r
-free Linux software\r
-available,\r
-and a large number of\r
-<a href="http://www.yahoo.com/Business_and_Economy/Companies/Computers/Software/System_Utilities/Security/Firewalls/">commercial</a>\r
-products and services.\r
-For an excellent security overview, primer, and compendium reference, see\r
-<a href="http://www.amazon.com/exec/obidos/ISBN=1565921488/junkbusterscomA/"><cite>Practical Unix and Internet Security</cite></a>\r
-by\r
-<person>Simson Garfinkel</person>\r
-and\r
-<person>Gene Spafford</person>.\r
-</p>\r
-\r
-<h3><a name="others" href="/cgi-bin/gp?pg=ijbfaq&pr=others"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Are there any security risks for ISPs or others who offer the proxy?\r
-</h3>\r
-<p>\r
-Yes.\r
-As with any service offered over the Internet,\r
-hackers can try to misuse it.\r
-A well-run\r
-<small>ISP</small>\r
-will have professionals who are experienced at assessing and containing\r
-these risks.\r
-<p>\r
-<a name="outside">It's possible to set up your machine so</a>\r
-that other people can have access to your proxy,\r
-but if you lack expertise in computer security\r
-you probably shouldn't have your computer configured to offer\r
-this or any other service to the outside world.\r
-<p>\r
-<a name="attack">Hackers can attempt to gain access</a>\r
-to the machine by various attacks,\r
-which we have tried to guard against but don't guarantee to thwart.\r
-They can also use the ``anonymizing'' quality of proxies\r
-to try to cover their tracks while hacking other computers.\r
-For this reason we recommend preventing it being used\r
-as an anonymous\r
-<big><kbd>telnet</kbd></big>\r
-by putting the pattern\r
-<big><kbd>:23</kbd></big>\r
-in the blockfile (it's included as standard equipment).\r
-(Actually the current implementation incidentally blocks telnet due to the\r
-way headers are handled, but it's best not to rely on this.)\r
-If you wish to block all ports except the default\r
-<small>HTTP</small>\r
-port 80,\r
-you can put the lines\r
-<br>\r
-   <big><kbd>:</kbd></big>\r
-<br>\r
-   <big><kbd>~:80</kbd></big>\r
-<br>\r
-at the beginning of the blockfile, but be aware that some servers\r
-run on non-default ports (e.g. 8080). You might also want to add the line\r
-<big><kbd>~:443</kbd></big>\r
-to allow\r
-<small>SSL</small>.\r
-<p>\r
-<a name="root">On</a>\r
-<small>UNIX <a href="legal.html#not_our_trademark">®</a></small>\r
-systems it is neither necessary nor desirable for the proxy to run as root.\r
-<p>\r
-<a name="patched">Versions 2.0.1 and below may be vulnerable to remote</a>\r
-exploitation of a memory buffer bug; for security reasons all users\r
-are encouraged to\r
-<a href="ijbdist.html#upgrade">upgrade.</a>\r
-<p>\r
-<a name="holes">If you find any security holes in the code</a>\r
-please\r
-<a href="/cgi-bin/gp?pg=ijbfaq&pr=holes">tell us,</a>\r
-along with any suggestions you may have for fixing it.\r
-However, we do not claim that we will be able to do so.\r
-<p>\r
-<a name="useful">We distribute this code in the hope that people</a>\r
-will find it useful, but we provide\r
-<a href="ijbfaq.html#free">no warranty</a>\r
-for it,\r
-and we are not responsible for anyone's use or misuse of it.\r
-<p>\r
-<a name="updates">You may also want to check back periodically for updated versions of the code.</a>\r
-We do not\r
-maintain a mailing list.\r
-To get quick updates, bookmark our\r
-<a href="ijbdist.html#versions">Distribution Information</a>\r
-page.\r
-</p>\r
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>\r
-<font face="arial, helvetica">\r
-<a rel="begin" href="index.html">Home</a> <font color="#ff0000">\r
-<b> · </b></font>\r
-<a rel="next" href="ijbman.html">Next</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="lopt.html">Site Map</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="legal.html">Legal</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="junkdata.html">Privacy</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="cookies.html">Cookies</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="ijb.html">Banner Ads</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="telemarketing.html">Telemarketing</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="junkmail.html">Mail</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="junkemail.html">Spam</a>\r
-\r
-</font><form action="/cgi-bin/search" method="GET">\r
-<input type="text" name="q" size=60 maxlength=120 value="">\r
-<input type="submit" value="Search"></form>\r
-<small>\r
-<small>\r
-<p>\r
-<a href="legal.html#copy">Copyright</a> © 1996-8 Junkbusters\r
-<a href="legal.html#marks">®</a> Corporation.\r
-Copying and distribution permitted under\r
-the <a href="gpl.html"><small>GNU</small></a>\r
-General Public License.\r
-</small>\r
-<tt>\r
-1998/10/31\r
-http://www.junkbusters.com/ht/en/ijbfaq.html\r
-</tt>\r
-<address><kbd>webmaster@junkbusters.com</kbd></address>\r
-</small>\r
-</body>\r
+ <head>\r
+ <title>Internet Junkbuster Frequently Asked Questions</title>\r
+ <meta name="description" content=\r
+ "An extensive FAQ on the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser.">\r
+ <meta name="keywords" content=\r
+ "stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, consumer, sending, opt out, privacy, advertising, direct, marketing, targeting, through, click, trails, http_referer, cookie, cutter, iff, internet fast forward, Cookie Management Tool">\r
+<style type="text/css">\r
+<!--\r
+h2 { text-align: Center; font-family: arial, helvetica, sans-serif }\r
+p.sans { font-family: arial, helvetica, sans-serif }\r
+b.dot { color: #FF0000 }\r
+b.eg { font-family: arial, helvetica, sans-serif }\r
+-->\r
+</style>\r
+ </head>\r
+\r
+ <body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink=\r
+ "#787878">\r
+ <p class="sans"><a href="http://ijbswa.sourceforge.net">\r
+ Website</a> <b class="dot">·</b> <a href="ijbman.html">\r
+ Manual</a> <b class="dot">·</b> <b>FAQ</b> <b class=\r
+ "dot">·</b> <a href="gpl.html">GPL</a></p>\r
+\r
+ <h1 align="center"><a name="top_of_page"></a>Internet\r
+ J<small>UNK<i style="color: #FF0000">BUSTER</i></small>\r
+ Frequently Asked Questions</h1>\r
+\r
+ <p align="center" class="sans"><a href="#browser">Configuring\r
+ Browsers</a> <b class="dot">·</b> <a href="#defaulted">\r
+ IE 5.0</a> <b class="dot">·</b> <a href="#local">\r
+ Installation</a> <b class="dot">·</b> <a href=\r
+ "#companies">For Companies</a> <b class="dot">·</b> <a\r
+ href="#blocking">Blocking Ads</a> <b class="dot">·</b>\r
+ <a href="#cookies">Cookies</a> <b class="dot">·</b> <a\r
+ href="#hotmail">Hotmail</a> <b class="dot">·</b> <a\r
+ href="#children">Children</a> <b class="dot">·</b> <a\r
+ href="#chain">Forwarding/Chaining</a> <b class="dot">\r
+ ·</b> <a href="#conceal">IP</a> <b class="dot">\r
+ ·</b> <a href="#anonymity">Anonymity</a> <b class="dot">\r
+ ·</b> <a href="#security">Security</a></p>\r
+\r
+ <h1>This document is out of date</h1>\r
+\r
+ <p><b>Development of JunkBuster is ongoing and this document is\r
+ no longer current. However, it may provide some assistance. If\r
+ you have problems, please use the <a href=\r
+ "http://groups.yahoo.com/group/junkbuster-users/">Yahoo Groups\r
+ mailing list</a> (which includes an archive of mail), the\r
+ SourceForge.net <a href=\r
+ "http://sourceforge.net/projects/ijbswa/">project page</a>, or\r
+ see the project's <a href="http://ijbswa.sourceforge.net/">home\r
+ page</a>. Please also bear in mind that versions 2.9.x of\r
+ JunkBuster are development releases, and are not production\r
+ quality.</b></p>\r
+\r
+ <h2><a name="top"></a>The Top Ten Questions</h2>\r
+\r
+ <h3><a name="what"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> What is the Internet Junkbuster\r
+ Proxy and what does it do for me?</h3>\r
+\r
+ <p>The Internet Junkbuster Proxy <small><sup>TM</sup></small>\r
+ is free privacy-enhancing software that can be run on your PC\r
+ or by your ISP or company. It blocks requests for URLs\r
+ (typically banner ads) that match its blockfile. It also\r
+ deletes unauthorized cookies and other unwanted identifying\r
+ header information that is exchanged between web servers and\r
+ browsers. These headers are not normally accessible to users\r
+ (even though they may contain information that's important to\r
+ your privacy), but with the Internet Junkbuster you can see\r
+ almost <a href="ijbman.html#o_d">anything you want</a> and\r
+ control everything you're likely to need. Many people publish\r
+ their blockfiles to help others get started.</p>\r
+\r
+ <h3><a name="free"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Is there a license fee / warranty\r
+ / registration form / expiration?</h3>\r
+\r
+ <p>No, none of these. It's completely free of charge.\r
+ Junkbusters offers you the software to copy, use, modify and\r
+ distribute as you wish, forever, at no charge under the GNU\r
+ General Public License.</p>\r
+\r
+ <p><a name="warranty"></a>It comes with no warranty of any\r
+ kind.</p>\r
+\r
+ <p><a name="register"></a>You don't have to register, in fact\r
+ we don't even provide a way to do so: the practice of\r
+ registering software is usually just an excuse to send you\r
+ solicitations and sell your name and information about your\r
+ behavior. You are welcome to obtain and use our software as\r
+ anonymously you wish. (Your IP address will naturally be\r
+ disclosed when you download it; use anonymizing software if you\r
+ want to conceal this. We never want to be given any information\r
+ that you consider private or confidential.)</p>\r
+\r
+ <p><a name="why"></a>We are often asked why we give away a\r
+ product that many would happily pay for. The answer is that we\r
+ are determined to carry out our mission: to free the world from\r
+ junk communications.</p>\r
+\r
+ <h3><a name="windows"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Does it run on Windows? On a Mac?\r
+ On the AOL browser?</h3>\r
+\r
+ <p>For the latest information on availability, see the\r
+ Distribution Information page. We don't think it will ever run\r
+ on Windows 3.1. But you don't need to have it running on your\r
+ computer if you get your ISP or Systems Administrator at work\r
+ to run it.</p>\r
+\r
+ <h3><a name="isp"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> How can I get my ISP to run the\r
+ Internet Junkbuster?</h3>\r
+\r
+ <p>Try their sales or support department (depending on whether\r
+ you are already a customer). <a name="unaware"></a>You might\r
+ send them email including the following URL:<br>\r
+ <code>\r
+ http://www.junkbusters.com/ht/en/ijbfaq.html#isps</code><br>\r
+ <a name="switch"></a>You could mention that many other ISPs\r
+ provide it, and that you regard it as an important part of your\r
+ decision on where to buy Internet service.</p>\r
+\r
+ <h3><a name="who"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Who chooses the options that\r
+ control what is blocked?</h3>\r
+\r
+ <p>Whoever starts the Internet Junkbuster chooses the options\r
+ and the blockfile. If your ISP runs it for you, they have to\r
+ make these decision (though some may give you a choice of\r
+ proxies, and a way to suggest new URLs to block). If you run it\r
+ on your computer, you get to choose.</p>\r
+\r
+ <h3><a name="self"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> How do I download and run the\r
+ program on my computer?</h3>\r
+\r
+ <p>It depends on your platform. If you are using Windows 95 or\r
+ NT, see our separate page on installing under Windows. If you\r
+ have a C compiler and are using almost any flavor of UNIX ®\r
+ you download it, compile it, start it running, and then\r
+ configure your browser. Several precompiled packages are also\r
+ available through links in our distribution page, which lists\r
+ all available platforms.</p>\r
+\r
+ <p><a name="port"></a>If you are using a platform for which we\r
+ have no current availability, you are welcome to port the code.\r
+ If you do this and you would like us to consider publishing\r
+ your ported version, please tell us.</p>\r
+\r
+ <h3><a name="show"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> How can I tell which blockfile\r
+ and options are being used?</h3>\r
+\r
+ <p>Just point your browser to\r
+ http://internet.junkbuster.com/cgi-bin/show-proxy-args or to\r
+ any URL ending in <code>show-proxy-args</code> (even if it\r
+ doesn't exist). It needn't exist because the Internet\r
+ Junkbuster intercepts the request, blocks it, and returns in\r
+ its place information about itself. Using the URL above is\r
+ useful for checking that your browser really is going through\r
+ an Internet Junkbuster, because the <code>junkbuster.com</code>\r
+ server returns a warning if the request actually gets to it.\r
+ Some people set the home page of their browser to such a URL to\r
+ be sure that it is configured to use the proxy.</p>\r
+\r
+ <p><a name="headers"></a>If you wish to check the header\r
+ information your proxy is actually sending, a visit to\r
+ http://internet.junkbuster.com/cgi-bin/show_http_headers will\r
+ give you the more relevant ones first. You might also like to\r
+ turn the proxy off and compare the difference. (Don't forget to\r
+ turn it back on again.)</p>\r
+\r
+ <h3><a name="responding"></a><img border="0" src="fb.gif" alt=\r
+ "*" width="14" height="14"> My browser started giving me\r
+ ``server not responding'' messages</h3>\r
+\r
+ <p>Once your browser is told to use a proxy such as the\r
+ Internet Junkbuster, it thinks of it as its server for\r
+ everything, so this message means it can't talk to the proxy.\r
+ The Internet Junkbuster may not be running, or you may have\r
+ specified its proxy address incorrectly. Check that the details\r
+ you entered are correct. If you have <code>telnet</code> you\r
+ can try connecting to the appropriate port to see if the\r
+ Internet Junkbuster is running. If your ISP is running the\r
+ Internet Junkbuster, you may want to check with them. If you\r
+ are running it yourself under UNIX ®, try looking at a\r
+ <code>ps ax</code> to see if it is running. The <a href=\r
+ "ijbman.html#o_h">port</a> specified in its options should be\r
+ the same one as your browser has configured.</p>\r
+\r
+ <h3><a name="idea"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> I've got this great idea for a\r
+ new feature. Who do I tell?</h3>\r
+\r
+ <p>We'd be very interested to hear it, but please bear a few\r
+ things in mind.</p>\r
+\r
+ <ol type="1">\r
+ <li><a name="considered"></a>Please check this FAQ to see if\r
+ we've already considered the idea, such as automatic\r
+ detection of banner ads and replacing ads with something else\r
+ such as a transparent GIF.</li>\r
+\r
+ <li><a name="confidential"></a>Don't tell us anything you\r
+ want to keep confidential or retain some right over.</li>\r
+\r
+ <li><a name="wish"></a>We currently have a long wish list of\r
+ things that we may or may not do in the near future,\r
+ including a version for your favorite computer and a plug-in\r
+ version.</li>\r
+\r
+ <li><a name="go4it"></a>If you don't want to wait you're\r
+ welcome to improve on our code, publish your version on the\r
+ Web, and tell us where to find it. Projects that are\r
+ especially welcome include a port to the Mac and extensions\r
+ for HTTP 1.1. (Meanwhile, be sure your browser is configured\r
+ not to use HTTP 1.1.)</li>\r
+ </ol>\r
+\r
+ <h3><a name="other"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> My question isn't listed here.\r
+ Who do I ask for support?</h3>\r
+\r
+ <p><a name="harder"></a>If you find using our free product\r
+ harder than you're used to for consumer software, there are\r
+ many commercial alternatives that you could consider.</p>\r
+\r
+ <p><a name="RTM"></a>The answer to detailed technical questions\r
+ may be answered in <a href="ijbman.html">manual page</a>, or in\r
+ the source code. Also double-check this page for an answer:\r
+ using the ``find'' feature on your browser for likely keywords\r
+ may help. Our site also has a search feature.</p>\r
+\r
+ <p><a name="Use"></a>Many people post requests for help and\r
+ responses on Usenet.</p>\r
+\r
+ <p><a name="them"></a>If your ISP is providing the Internet\r
+ Junkbuster for you, and your question is about how to use it,\r
+ check their web page before asking them.</p>\r
+\r
+ <p><a name="us"></a>Even though we don't offer the kind of\r
+ support you might expect if you paid a lot of money for a\r
+ software product, you can still ask us. But before you do,\r
+ please consider whether you could ask someone closer to you.\r
+ And please be patient if we're slow to reply: we never charge\r
+ consumers for our services, so we have to subsidize consumers\r
+ with revenue from companies, and our resources are limited.</p>\r
+\r
+ <p><a name="quote"></a>If your company or organization would be\r
+ interested in a maintenance contract with phone and email\r
+ support, hard copy documentation and source code and\r
+ pre-compiled binaries on tape or disk, please ask us for a\r
+ quote.</p>\r
+\r
+ <p align="center"><a href="#top_of_page"><img border="0" src=\r
+ "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
+ "15"></a></p>\r
+\r
+ <h2><a name="browser"></a>Configuring your browser to talk to\r
+ the Internet Junkbuster</h2>\r
+\r
+ <h3><a name="address"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> What is the proxy address of the\r
+ Internet Junkbuster?</h3>\r
+\r
+ <p><a name="localhost"></a>If you set up the Internet\r
+ Junkbuster to run on the computer you browse from (rather than\r
+ your ISP's server or some networked computer at work), the\r
+ proxy will be on <code>localhost</code> (which is the special\r
+ name used by every computer on the Internet to refer to itself)\r
+ and the port will be <code>8000</code> (unless you have told\r
+ the Internet Junkbuster to run on a different port with the <a\r
+ href="ijbman.html#listen-address">listen-address</a> option).\r
+ So you when configuring your browser's proxy settings you\r
+ typically enter the word <code>localhost</code> in the two\r
+ boxes next to <b class="eg">HTTP</b> and <b class="eg">\r
+ Secure</b>, and the number <code>8000</code> in the two boxes\r
+ labeled to the right of those boxes. <a name="Gopher"></a>The\r
+ Internet Junkbuster does not currently handle other protocols\r
+ such as Gopher, FTP, or WAIS, so leave those setting unchanged.\r
+ Nor does it handle ICQ or Instant Messenger services.</p>\r
+\r
+ <p><a name="remote"></a>If your ISP or company is running the\r
+ Internet Junkbuster for you, they will tell you the address to\r
+ use. It will be the name of the computer it's running on (or\r
+ possibly its numeric IP address), plus a port number. Port 8000\r
+ is the default, so assume this number if it is not specified.\r
+ Sometimes a colon is used to glue them together, as in <code>\r
+ junkbuster.fictitious-pro-privacy-isp.net:8000</code> but with\r
+ most browsers you do not type the colon, you enter the address\r
+ and port number in separate boxes.</p>\r
+\r
+ <h3><a name="set"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> How do I tell the browser where\r
+ to find the Internet Junkbuster?</h3>\r
+\r
+ <p>All current browsers can be told the address of a proxy to\r
+ use. You enter the same information in two fields in your\r
+ browser's proxy configuration screen (see list below): one for\r
+ HTTP, and one for the Secure Protocol (assuming your browser\r
+ supports SSL). If you find some information already entered for\r
+ your proxy, see the next question. Here are the menus you go\r
+ through to get to the proxy configuration settings. (We also\r
+ recommend that you disable Java, which is a separate\r
+ operation.) <strong>Make notes on the changes you make so you\r
+ know how to undo them!</strong> You will need to know what you\r
+ did in case you wish to discontinue using the proxy.</p>\r
+\r
+ <ol type="1">\r
+ <li><a name="netscape"></a>For Netscape 2.01, 2.02 and 3.0\r
+ [Graphic Illustration]: <b class="eg">Options</b>; <b class=\r
+ "eg">Network Preferences</b>; <b class="eg">Proxies</b>; <b\r
+ class="eg">Manual Proxy Configuration View ;</b> enter proxy\r
+ address details under <b class="eg">HTTP</b> and <b class=\r
+ "eg">Security Proxy</b>; click on <b class="eg">OK</b>; click\r
+ on the next <b class="eg">OK</b>. [Return to Windows\r
+ Installation Procedure]<br>\r
+ With Netscape 2.0, follow with <b class="eg">Options</b>, <b\r
+ class="eg">Save Options</b>.<br>\r
+ <a name="Netscape4.02"></a>With Netscape 4.X series, you\r
+ first have to go through <b class="eg">Edit/Preferences</b>.\r
+ [Graphic Illustration] Then in the frame on the left, click\r
+ on triangle pointing to the right towards the word <b class=\r
+ "eg">Advanced</b>; it will switch to a triangle pointing\r
+ down; and the words <b class="eg">Cache</b>, <b class="eg">\r
+ Proxies</b> and <b class="eg">Disk Space</b> appear. Click on\r
+ <b class="eg">Proxies</b> and the frame on the right will\r
+ display a banner saying <b class="eg">Proxies Configure\r
+ proxies to access the Internet</b>. Click the radio button\r
+ labeled <b class="eg">Manual proxy configuration</b> then\r
+ click the button labeled <b class="eg">View</b>; enter proxy\r
+ address details under <b class="eg">HTTP</b> and <b class=\r
+ "eg">Security Proxy</b>; click on <b class="eg">OK</b>; click\r
+ on the next <b class="eg">OK</b>. [Return to Windows\r
+ Installation Procedure]</li>\r
+\r
+ <li><a name="explorer3"></a>For Internet Explorer 3.0\r
+ [Graphic Illustration]: <b class="eg">View</b>; <b class=\r
+ "eg">Options</b>; <b class="eg">Connections</b>; tick <b\r
+ class="eg">Connect through proxy server</b> box; <b class=\r
+ "eg">Settings</b>; enter proxy address details <b class="eg">\r
+ HTTP</b> Box, with port number in the second box; same with\r
+ <b class="eg">Secure</b>; click on <b class="eg">OK</b>.\r
+ [Return to Windows Installation Procedure]</li>\r
+\r
+ <li><a name="explorer2"></a>For Internet Explorer 2.0: <b\r
+ class="eg">View</b>; <b class="eg">Options</b>; <b class=\r
+ "eg">Proxy</b>; enter proxy address details click on <b\r
+ class="eg">OK</b>. [Return to Windows Installation\r
+ Procedure]</li>\r
+\r
+ <li><a name="nt"></a>On NT for MS-IE: <b class="eg">Control\r
+ Panel</b>; <b class="eg">Internet</b>; <b class="eg">\r
+ Advanced</b>; <b class="eg">Proxy</b>.</li>\r
+\r
+ <li><a name="if"></a>For MS-IE 4.0: similar to 3.0: <b class=\r
+ "eg">View</b>; <b class="eg">Internet Options</b>; <b class=\r
+ "eg">Connection</b>; tick <b class="eg">Access Internet using\r
+ a proxy server</b> box; from there we have had reports of\r
+ different versions, either click on <b class="eg">\r
+ Advanced</b> or <b class="eg">Settings</b>; enter proxy\r
+ address details <b class="eg">HTTP</b> Box, with port number\r
+ in the second box; same with <b class="eg">Secure</b>; click\r
+ on <b class="eg">OK</b>. Note that 4.0 has <b class="eg">\r
+ Advanced</b> settings to allow HTTP 1.1 through proxies;\r
+ these must be disabled because the proxy does not currently\r
+ understand HTTP 1.1. Please tell us if you see any other\r
+ differences. [Return to Windows Installation Procedure]</li>\r
+\r
+ <li><a name="IE5"></a>For MS-IE 5.0: similar to 4.0: <b\r
+ class="eg">Tools|Internet Options</b> from the menu bar; <b\r
+ class="eg">Connections</b>. Select either dial-up connection\r
+ or LAN (depending on how you connect to the Internet); press\r
+ <b class="eg">Settings</b>; and check the <b class="eg">Use\r
+ Proxy Server</b> box; enter proxy address details in the <b\r
+ class="eg">HTTP</b> Box, with port number in the second box;\r
+ same with <b class="eg">Secure</b>; click on <b class="eg">\r
+ OK</b> buttons to get out. <em>Note:</em> <a name=\r
+ "defaulted"></a>You must also uncheck the HTTP 1.1 checkboxes\r
+ at the end of the <b class="eg">Advanced</b> options. This\r
+ seems to have been made the default in IE 5.0. [Return to\r
+ Windows Installation Procedure]</li>\r
+\r
+ <li><a name="level5"></a>For Netscape's level 5 browser, we\r
+ have no information. If you do, please tell us.</li>\r
+\r
+ <li><a name="mosaic"></a>For NCSA Mosaic for Windows: <b\r
+ class="eg">Options</b>, <b class="eg">Preferences</b>, <b\r
+ class="eg">Proxy</b>; enter proxy address details under <b\r
+ class="eg">HTTP</b>.</li>\r
+\r
+ <li><a name="Opera"></a>For Opera: <b class="eg">\r
+ Preferences</b>, <b class="eg">Proxy servers</b>; check the\r
+ box next to HTTP; enter the server and port number in the box\r
+ on the other side; click on <b class="eg">OK</b>.</li>\r
+\r
+ <li><a name="lynx"></a>For Lynx, Mosaic/X, <a href=\r
+ "http://monty.cnri.reston.va.us/grail-0.3/">Grail,</a> and\r
+ W3O Arena, you can specify the proxy via environment\r
+ variables before starting the application. This will probably\r
+ be done with something like either<br>\r
+ <code>setenv http_proxy\r
+ http://localhost:8000/</code><br>\r
+ or<br>\r
+ <code>\r
+ http_proxy=http://junkbuster.fictitious-pro-privacy-isp.net:8000/\r
+ export http_proxy</code><br>\r
+ depending on your shell and where the Internet Junkbuster\r
+ lives.</li>\r
+ </ol>\r
+\r
+ <p>If your browser is not listed here, or if you notice an\r
+ error, please tell us the correct procedure.</p>\r
+\r
+ <h3><a name="already"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> What should I do if I find\r
+ another proxy is already configured?</h3>\r
+\r
+ <p>Some ISPs and companies require all Web traffic to go\r
+ through their proxy. In this case you would find your proxy\r
+ configuration with values already set, possibly under <a name=\r
+ "Automatic"></a>Automatic Proxy Configuration (in the case of\r
+ Netscape and MS-IE 3.0 and above). It's probably a firewall\r
+ proxy between your company and the outside world, <a name=\r
+ "cache"></a>or a caching proxy if you're using an ISP.</p>\r
+\r
+ <p><a name="f"></a>What needs to be done in this case is to use\r
+ the <a href="ijbman.html#forwardfile">forwardfile</a> option to\r
+ tell the Internet Junkbuster the address of the other proxy.\r
+ Specify a different (unused) port number with the <a href=\r
+ "ijbman.html#listen-address">listen-address</a> option, and\r
+ configure your browser to use that port. If you haven't done\r
+ this kind of thing before, it's probably best to consult your\r
+ systems administrator or ISP about it; check their web page\r
+ first.</p>\r
+\r
+ <h3><a name="discontinue"></a><img border="0" src="fb.gif" alt=\r
+ "*" width="14" height="14"> What if I want to stop using\r
+ the Internet Junkbuster?</h3>\r
+\r
+ <p>Just go through the same procedure you used to start your\r
+ browser using the Internet Junkbuster, but remove the details\r
+ you put in (or if there was something there before, restore\r
+ it). You may need to use <b class="eg">Save Options</b> to make\r
+ this change permanent. On Netscape 3.0 you can go through <b\r
+ class="eg">Options</b>; <b class="eg">Network Preferences</b>;\r
+ <b class="eg">Proxies</b> and click on <b class="eg">No\r
+ Proxy</b> to turn it off, and later click on <b class="eg">\r
+ Manual Proxy Configuration</b> if you want to start using it\r
+ again. (No need to enter the again details under <b class="eg">\r
+ View</b> as you did the first time; they should remain there\r
+ unchanged.)</p>\r
+\r
+ <p><a name="shut"></a>This stops your browser talking to the\r
+ proxy; shutting down the proxy is a different matter.</p>\r
+\r
+ <h3><a name="dial"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Automatic dialing isn't working\r
+ any more. How do I fix it?</h3>\r
+\r
+ <p>Some browsers (such as MSIE-4) can be configured to dial\r
+ your ISP automatically when you click on a link, but this\r
+ feature (called "automatically connect" or "autoconnect") gets\r
+ disabled if you specify a proxy running on your own computer\r
+ (with address <code>localhost</code> or <code>127.0.0.1</code>)\r
+ because these addresses don't require dialing. The Internet\r
+ Junkbuster knows nothing about dialing, so it doesn't work. To\r
+ make automatic dialing work, make up a name such as <code>\r
+ junkbuster.ijb</code> and use that name in the proxy settings\r
+ instead of <code>localhost</code>, and then add the line <code>\r
+ 127.0.0.1 junkbuster.ijb</code> to the file <code>\r
+ c:\windows\hosts</code> (if there already is a line beginning\r
+ with <code>127.0.0.1</code> just add <code>\r
+ junkbuster.ijb</code> at the end of it.)</p>\r
+\r
+ <p><a name="also"></a>This should also work Netscape\r
+ Communicator 4 on machines where IE-4 has been installed.</p>\r
+\r
+ <p align="center"><a href="#top_of_page"><img border="0" src=\r
+ "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
+ "15"></a></p>\r
+\r
+ <h2><a name="local"></a>Setting up the Internet Junkbuster on\r
+ your local computer</h2>\r
+\r
+ <p>The next two sections assume you wish to compile the code\r
+ with your own C compiler. <a name="install"></a>If you just\r
+ want to use the <code>.exe</code> file provided for Windows,\r
+ see the Windows Installation page.</p>\r
+\r
+ <h3><a name="u"></a><img border="0" src="fb.gif" alt="*" width=\r
+ "14" height="14"> How do I compile the code under\r
+ Unix?</h3>\r
+\r
+ <p>If you are running Redhat Linux you may prefer to use the\r
+ rpm instead of the following procedure.</p>\r
+\r
+ <ol type="1">\r
+ <li><a name="download"></a>First download the tar file\r
+ (~286k) <a name="tar"></a>and uncompress and extract the\r
+ files from it with this command<br>\r
+ <code>uncompress -c ijb20.tar.Z | tar xf\r
+ -</code></li>\r
+\r
+ <li><a name="sun"></a>If your operating system is from Sun or\r
+ HP examine the <code>Makefile</code> and make any changes\r
+ indicated inside.</li>\r
+\r
+ <li><a name="make"></a>Run<br>\r
+ <br>\r
+ <code>make</code></li>\r
+\r
+ <li>\r
+ <a name="defaults"></a>Copy the sample configuration file\r
+ (<code>junkbstr.ini</code>, previously called <code>\r
+ sconfig.txt</code> and other names in earlier releases) to\r
+ some convenient place such as <code>\r
+ /usr/local/lib/junkbuster/configfile</code> or whatever you\r
+ choose. The sample file has all the options commented out.\r
+ You can remove the <code>#</code> character on any that you\r
+ want, but it may be better to leave this until to later.\r
+ Run it asynchronously:<br>\r
+ <br>\r
+ <code>junkbuster configfile &</code>\r
+ \r
+\r
+ <p>If you are running a version earlier than 2.0 you can\r
+ start it with <code>junkbuster &</code></p>\r
+ </li>\r
+\r
+ <li><a name="config"></a>Configure your browser (described\r
+ above).</li>\r
+\r
+ <li><a name="test"></a>Verify that the Internet Junkbuster is\r
+ working (described above).</li>\r
+\r
+ <li><a name="restart"></a>Decide on the options you really\r
+ want, <code>kill</code> the process and start it again. The\r
+ most popular option is <a href="ijbman.html#blockfile">\r
+ blockfile</a> to block ads. <a name="comprehensive"></a>A\r
+ sample blockfile is provided as an illustration, but it\r
+ doesn't really stop many ads. More comprehensive ones are\r
+ available elsewhere.</li>\r
+\r
+ <li><a name="rc"></a>You'll probably want to add an entry to\r
+ <code>/etc/rc.d/rc.local</code> or equivalent to start it at\r
+ boot time. (Any output you specify should be redirected to a\r
+ file. And don't forget the & at the end to run it\r
+ asynchronously or your system will seize up after the next\r
+ reboot.)</li>\r
+ </ol>\r
+\r
+ <h3><a name="win"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> How do I compile the code under\r
+ Windows?</h3>\r
+\r
+ <p>A <code>.exe</code> file (binary) is supplied with the\r
+ source code, but if you prefer to compile it yourself here is\r
+ the likely procedure. Most of these steps are repeated in our\r
+ checklist for installation under Windows.</p>\r
+\r
+ <ol type="1">\r
+ <li><a name="zip"></a>First click here to download the zip\r
+ file called <code>ijb20.zip</code> (~208k), then uncompress\r
+ and unpack the zip archive using a tool like WinZip.</li>\r
+\r
+ <li><a name="change"></a>Now the distribution (source and\r
+ sample files) will be in a folder called <code>ijb20</code>.\r
+ Go into that folder and then edit the Makefile for your\r
+ system, removing the comment character (<code>#</code>) in\r
+ the lines related to Win32. Then type:<br>\r
+ <code>nmake</code><br>\r
+ This should create an executable called <code>\r
+ junkbstr.exe</code>. <a name="compilers"></a>For information\r
+ on issues with various compilers, see the Distribution\r
+ Information page.</li>\r
+\r
+ <li>\r
+ <a name="attempt"></a>Run the executable with the\r
+ command:<br>\r
+ <code>junkbstr</code><br>\r
+ <a name="terminal"></a>(Click on the icon with that name\r
+ that looks like a terminal, not like a notepad.) The\r
+ program will produce a message indicating that it has\r
+ started and is ready to serve. \r
+\r
+ <p><a name="ini"></a>(Version 2.0.1 and above uses the file\r
+ <code>junkbstr.ini</code> as the config file if it exists\r
+ and no argument was given. If you have an earlier version\r
+ or if you want it to use a different config file, simply\r
+ specify that file as the argument.)</p>\r
+ </li>\r
+\r
+ <li><a name="configures"></a>Configure your browser\r
+ (described above).</li>\r
+\r
+ <li><a name="work"></a>Check the proxy is working (described\r
+ below).</li>\r
+\r
+ <li>\r
+ <a name="shortcut"></a>To have the proxy start itself\r
+ automatically when you login to Win95, drop the\r
+ ``shortcut'' to the <code>junkbstr</code> executable into\r
+ the StartUp folder:<br>\r
+ <code>C:\Windows\Start\r
+ Menu\Programs\StartUp</code><br>\r
+ You might want to change the shortcut's <code>\r
+ Properties->Shortcut</code> to <code>Run:\r
+ Minimized</code>. If you specify the <a href=\r
+ "ijbman.html#hide-console">hide-console</a> option then the\r
+ DOS window will vanish after it starts. \r
+\r
+ <p><a name="NT"></a>WinNT users can put it into their own\r
+ StartUp folders or the Administrator can put it into the\r
+ system's global StartUp folder. For details on how to make\r
+ this a service under NT see our Windows page.</p>\r
+ </li>\r
+ </ol>\r
+\r
+ <h3><a name="check"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> How do I check that the proxy is\r
+ working?</h3>\r
+\r
+ <p>Pick a page from somewhere (such as your bookmarks, or just\r
+ one that your browser was pointing to) and <b class="eg">\r
+ Reload</b> it. If you get a message along the lines of ``server\r
+ not responding, using cached copy instead,'' see the advice\r
+ above. If the page reloads OK, check that your browser is\r
+ actually talking to the proxy by going to\r
+ http://internet.junkbuster.com/cgi-bin/show-proxy-args or any\r
+ URL ending in <code>show-proxy-args</code> (as described below,\r
+ the proxy should intercept the request.) When you see\r
+ ``Internet Junkbuster Proxy Status,'' you'll know it's\r
+ working.</p>\r
+\r
+ <h3><a name="chain"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> How and why would I have this\r
+ proxy chained with other proxies?</h3>\r
+\r
+ <p>You may need the <a href="ijbman.html#forwardfile">\r
+ forwarding</a> feature to ``daisy chain'' the Internet\r
+ Junkbuster to another proxy, perhaps an anonymizing proxy to\r
+ conceal your IP address, or a caching proxy from your ISP, or a\r
+ firewall proxy between your company and the outside world.\r
+ Version 2.0 and above can be even configured to forward <a\r
+ href="ijbman.html#forwardfile">selectively</a> according to the\r
+ URL requested: for example, connecting directly to trusted\r
+ hosts, but going through an anonymizing or firewall proxy for\r
+ all other hosts.</p>\r
+\r
+ <p><a name="administrator"></a>Network administrators might use\r
+ it to provide transparent access to multiple networks without\r
+ modifying browser configurations. <a name="direct"></a>Most\r
+ browsers also provide a way of specifying hosts that the\r
+ browser connects to directly, bypassing the proxy. Some provide\r
+ a method for Automatic Proxy Configuration. A well written\r
+ Internet Junkbuster configuration can be much more flexible and\r
+ powerful.</p>\r
+\r
+ <p><a name="example"></a>An ISP's caching proxy would typically\r
+ be called something like <code>cache.your-isp.net:8080</code>\r
+ (as described on you ISP's web page); you would put this\r
+ information in your <a href="ijbman.html#forwardfile">\r
+ forwardfile</a> as described in our manual. Your browser would\r
+ be configured to the Internet Junkbuster for HTTP and Security\r
+ Proxies as before, but you probably want to tell it to use the\r
+ caching proxy for FTP and other protocols. <a name="nonlocal">\r
+ </a>If your ISP is running the Internet Junkbuster for you,\r
+ they have probably already decided whether to chain with a\r
+ caching proxy.</p>\r
+\r
+ <h3><a name="socks"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> How does the Internet Junkbuster\r
+ work with SOCKS gateways?</h3>\r
+\r
+ <p>There is support for some gateways in Version 1.4 and above.\r
+ The gateway protocol used to be specified on the command line;\r
+ it is now specified in the same file as <a href=\r
+ "ijbman.html#forwardfile">forwarding.</a> Note that the\r
+ browser's proxy configuration must <em>not</em> specify a\r
+ <code>SOCKS</code> host; it should specify the proxy as\r
+ described above.</p>\r
+\r
+ <h3><a name="plain"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> How do I configure it to be just\r
+ a plain old proxy?</h3>\r
+\r
+ <p>To get the proxy to do as little as possible (which means\r
+ not deleting any sensitive headers), place in your\r
+ configuration file the following three lines (each ending in a\r
+ space then a period) to stop it changing sensitive headers:<br>\r
+ <code>referer .</code><br>\r
+ <code>from .</code><br>\r
+ <code>user-agent .</code><br>\r
+ <code>cookiefile mycookiefile</code><br>\r
+ The fourth line is also needed to specify a <a href=\r
+ "ijbman.html#o_c">cookiefile</a> that might be called <code>\r
+ mycookiefile</code> containing a single line with a <code>\r
+ *</code> character, to allow all cookies through.</p>\r
+\r
+ <h3><a name="shutdown"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> How do I shut down the proxy (to\r
+ restart it)?</h3>\r
+\r
+ <p>It depends on your platform.</p>\r
+\r
+ <ol type="1">\r
+ <li><a name="X"></a>Under Windows, you can click on the "X"\r
+ button at the top right of the DOS window (and answer <b\r
+ class="eg">Yes</b> when Windows warns you it cannot shut down\r
+ the program automatically), or use <b class="eg">\r
+ Ctrl-Break</b> or the old three-fingered salute of <b class=\r
+ "eg">Ctrl-Alt-Delete</b> and select <b class="eg">End\r
+ Task</b>.</li>\r
+\r
+ <li><a name="ps"></a>Under UNIX ® you'll need to <code>\r
+ kill</code> the <b><code>junkbuster</code></b> process. <a\r
+ name="pid"></a>If you don't know the process number to give\r
+ to <code>kill</code>, try this:<br>\r
+ <code>ps ax | grep junkbuster</code></li>\r
+ </ol>\r
+\r
+ <p align="center"><a href="#top_of_page"><img border="0" src=\r
+ "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
+ "15"></a></p>\r
+\r
+ <h2><a name="companies"></a> Information for companies</h2>\r
+\r
+ <h3><a name="think"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> What do advertising companies\r
+ think of this kind of technology?</h3>\r
+\r
+ <p>We've seen only a few public comments from the advertising\r
+ industry on this, other than SEC filings. First, the president\r
+ of the Internet Advertising Bureau told CNET that he wasn't\r
+ worried by banner blockers. Second, after the Federal Trade\r
+ Commission's workshop where we gave a live demonstration of our\r
+ proxy before many eminent representatives of the industry, the\r
+ Direct Marketing Association made the following statement in\r
+ the closing paragraphs of their summary comments to the\r
+ Commission.</p>\r
+\r
+ <blockquote>\r
+ Clever shareware developers have come up with products that\r
+ can obliterate cookies and advertisements for those consumers\r
+ who have these concerns. The Internet is a market that is so\r
+ democratic and flexible that it is easy for companies and\r
+ software developers to respond to a perceived market need.\r
+ </blockquote>\r
+\r
+ <p>Their attitude seems to be that they would prefer that\r
+ people use technical solutions to protect their privacy than\r
+ have protections imposed by legislation or government\r
+ regulations. So, do you perceive a market need? Then here are\r
+ some ways to flex your democratic muscles.</p>\r
+\r
+ <h3><a name="nobrainer"></a><img border="0" src="fb.gif" alt=\r
+ "*" width="14" height="14"> Should we provide the\r
+ Internet Junkbuster for our employees?</h3>\r
+\r
+ <p>That depends. Try this quick three-point test.</p>\r
+\r
+ <ol type="1">\r
+ <li><a name="waste"></a>Do you want to spend your\r
+ communications budget on bandwidth that wastes your\r
+ employees' time by forcing them to wait for a lot of annoying\r
+ distractions while they're trying to do their jobs?</li>\r
+\r
+ <li><a name="surveillance"></a>Do you want current and\r
+ potential vendors to know quantitative details about the\r
+ software and hardware platforms that you have?</li>\r
+\r
+ <li><a name="intelligence"></a>Do you want your competitors\r
+ to be able to track exactly which of your employees are\r
+ checking out their web sites?</li>\r
+ </ol>\r
+\r
+ <p>If the answer to all three questions is yes, then you\r
+ probably don't have any need for this kind of product.</p>\r
+\r
+ <h3><a name="commercial"></a><img border="0" src="fb.gif" alt=\r
+ "*" width="14" height="14"> Can our company get\r
+ commercial support for the software?</h3>\r
+\r
+ <p>Yes, ask us for a quote on a maintenance contract with your\r
+ choice of phone and email support, hard copy documentation,\r
+ source code and pre-compiled binaries on tape or disk, and\r
+ email alerting of upgrades and issues. We also offer consulting\r
+ services to help set up ``stealth browsing'' capabilities to\r
+ help reduce the footprints left while doing competitive\r
+ analysis and other Web work where confidentiality is\r
+ critical.</p>\r
+\r
+ <h3><a name="isps"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> I run an ISP. What issues should\r
+ I consider before offering it?</h3>\r
+\r
+ <p>Many ISPs who offer the proxy to their customers have told\r
+ us that most of their customers are delighted with it (although\r
+ one reported that a customer complaint that without banner ads,\r
+ surfing was like reading a novel: we recommend making it\r
+ optional). Many ISPs like it because it reduces bandwidth\r
+ requirements. To help get you started, here's a checklist we've\r
+ developed from working with a few ISPs. You may think of more,\r
+ and we'd be interested if you're willing to share them with\r
+ us.</p>\r
+\r
+ <ol type="1">\r
+ <li><a name="pending"></a>If you get more than one request\r
+ for the Internet Junkbuster you may want to tell your\r
+ customers on your News page that you already know about it\r
+ and are assessing it.</li>\r
+\r
+ <li><a name="try"></a>Try the software and verify that it\r
+ performs satisfactorily.</li>\r
+\r
+ <li><a name="value"></a>Determine whether your customers\r
+ perceive the service as valuable (and therefore worth the\r
+ time to set up). We've had reports of many delighted\r
+ customers.</li>\r
+\r
+ <li><a name="secure"></a>Assess the level of security\r
+ associated with the software. If access is to be restricted\r
+ (to just dial-in ports, for example) how is this to be\r
+ done?</li>\r
+\r
+ <li><a name="costs"></a>Consider whether to expect any\r
+ additional load on computing resources required, and any\r
+ change in use of bandwidth due to the blocking of large\r
+ GIFs.</li>\r
+\r
+ <li><a name="opt"></a>Choose the <a href="ijbman.html">\r
+ options</a> you wish to provide.</li>\r
+\r
+ <li>\r
+ <a name="multiple"></a>Decide whether you want to offer a\r
+ choice of configurations, such some of these four. \r
+\r
+ <ol type="A">\r
+ <li><a name="banner"></a>Banners Blocked, Wafer with\r
+ No-Cookie-Copyright notice</li>\r
+\r
+ <li><a name="low"></a>Cookies not stopped (<a href=\r
+ "ijbman.html#cookiefile">cookiefile</a> with just a\r
+ <code>*</code> in it), User Agent specified as Lynx</li>\r
+\r
+ <li><a name="oneway"></a>Cookies from browser allowed,\r
+ permitting registered services</li>\r
+\r
+ <li><a name="kid"></a>A proxy for kids.</li>\r
+ </ol>\r
+ <a name="caching"></a>If you run a caching proxy, decide\r
+ whether the Internet Junkbuster will chain with it by\r
+ default, and whether to offer an alternate with no caching.\r
+ (Some ISPs don't, because they want to give customers an\r
+ incentive to use caching and save bandwidth.)\r
+ </li>\r
+\r
+ <li><a name="naming"></a>Decide on a naming scheme for your\r
+ proxies. If you're running only one proxy on one machine, the\r
+ simplest way is to just use port 8000 on your main machine,\r
+ such as <code>our-isp.net.</code> But it would probably be\r
+ safer to put an entry in your name server and call it\r
+ something like <code>junkbuster.our-isp.net.</code> If\r
+ running several proxies, you could either use different ports\r
+ on the same machine, or if you have the opportunity to\r
+ distribute the load over a few machines you could use\r
+ different hostname aliases such as <code>\r
+ banner.junkbuster.our-isp.net</code>, <code>\r
+ lynx.junkbuster.our-isp.net</code> and <code>\r
+ oneway.junkbuster.our-isp.net</code> (corresponding to the\r
+ examples in the previous point). You may want to set up\r
+ Automatic Proxy Configuration.</li>\r
+\r
+ <li>\r
+ <a name="document"></a>Prepare a page explaining the\r
+ Internet Junkbuster to your customers. <a name="does"></a>\r
+ Here's are some examples from Australia, Germany, Florida,\r
+ New York/New Jersey/Pennsylvania, North Carolina, Texas,\r
+ and Utah. <a name="reuse"></a>You are welcome to copy and\r
+ modify material from Junkbusters according to the GPL. You\r
+ might want to set up a process to check this page\r
+ periodically and update it when it changes. (A few links\r
+ can probably serve as well as lot of copying however.) A\r
+ typical page would probably specify the following. \r
+\r
+ <ol type="1">\r
+ <li><a name="abstract"></a>A brief explanation stating\r
+ what the Internet Junkbuster does, with a link to this\r
+ page.</li>\r
+\r
+ <li><a name="addresses"></a>The addresses of the proxy or\r
+ proxies, with their port number(s).</li>\r
+\r
+ <li><a name="options"></a>The options used, and how to\r
+ view the contents of the blockfile (which you can place\r
+ on your web pages, preferably in a file called <code>\r
+ blocklist.html</code> or <code>\r
+ blocklist.txt</code>).</li>\r
+\r
+ <li><a name="additions"></a>An indication of whether\r
+ suggestions for the blocklist are considered, and if so,\r
+ how to submit them: to a particular email address, via\r
+ web-based form, etc.</li>\r
+\r
+ <li><a name="configuration"></a>Instructions on how to\r
+ configure a browser. You may want to include details for\r
+ only the two major browsers and leave the others to a\r
+ link.</li>\r
+\r
+ <li><a name="service"></a>Procedures on how to report\r
+ problems, give feedback etc.</li>\r
+ </ol>\r
+ </li>\r
+\r
+ <li><a name="beta"></a>Invite a small number of\r
+ technologically sophisticated customers to beta-test the\r
+ service.</li>\r
+\r
+ <li><a name="announce"></a>Announce general availability on\r
+ your ``News'' page. Tell us if you would like to be included\r
+ on a list of ISPs offering the Internet Junkbuster.</li>\r
+ </ol>\r
+\r
+ <p align="center"><a href="#top_of_page"><img border="0" src=\r
+ "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
+ "15"></a></p>\r
+\r
+ <h2><a name="blocking"></a> Blocking</h2>\r
+\r
+ <h3><a name="readymade"></a><img border="0" src="fb.gif" alt=\r
+ "*" width="14" height="14"> Where can I get an example\r
+ blockfile that stops most ads?</h3>\r
+\r
+ <p>The sample blockfile we provide blocks almost nothing, and\r
+ we do not publish blockfiles that stop almost all banner ads.\r
+ But others have; you can find them by asking Google. You can\r
+ add any part of the new file to your old one (probably called\r
+ <code>sblock.ini</code> if you haven't changed the default name\r
+ in the latest version) or your just replace it completely. You\r
+ probably don't need to restart the proxy.</p>\r
+\r
+ <p><a name="pub"></a>If you develop an interesting blocklist\r
+ and publish it on the Web, you might want to include the word\r
+ ``junkbuster'' in it and use the word ``blocklist'' in the file\r
+ name given in the URL so that others can find it with the query\r
+ given in the previous sentence.</p>\r
+\r
+ <h3><a name="zap"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> If I see an ad I wish I hadn't,\r
+ how do I stop it?</h3>\r
+\r
+ <p>If your ISP is running the Internet Junkbuster, they should\r
+ have a policy on whether they accept suggestions from their\r
+ customers on what to block. Consult their web page.</p>\r
+\r
+ <p><a name="cover"></a>If you are running the Internet\r
+ Junkbuster yourself, you have complete control over what gets\r
+ through. Just add a pattern to cover the offending URL to your\r
+ blockfile. Version 1.3 and later automatically rereads the\r
+ blockfile when it changes, but if you're running an earlier\r
+ version you'll have to stop it and restart it.</p>\r
+\r
+ <p><a name="target"></a>To choose a pattern you'll first need\r
+ to find the URL of the ad you want cover.</p>\r
+\r
+ <p><a name="pinpoint"></a>Some people use the <a href=\r
+ "ijbman.html#debug">debug</a> <code>1</code> option to display\r
+ each URL in a window as the request is sent to the server. It's\r
+ then usually an easy task to pick the offending URL from the\r
+ list of recent candidates.</p>\r
+\r
+ <p><a name="source"></a>Alternatively, you can use <b class=\r
+ "eg">View Document Info</b> (or <b class="eg">View Document\r
+ Source</b> if your browser doesn't have that). The <b class=\r
+ "eg">Info</b> feature has the advantage of showing you the full\r
+ URL including the host name, which may not be specified in the\r
+ source: there you might see something like <code>\r
+ SRC="/ads/click_here_or_die.gif"</code> indicating only the <i>\r
+ <dfn>path</dfn></i>. (The host name is assumed to be the same\r
+ as the one the page came from.)</p>\r
+\r
+ <p><a name="offsite"></a>But ads often come from a different\r
+ site, in which case you might see something like <code>\r
+ SRC="grabem.n.trackem.com/Ad/Infinitum/SpaceID=1666"</code> or\r
+ longer. <a name="warehouse"></a>If the company looks like a\r
+ pure ad warehouse (as in the last case), you may want to place\r
+ just its domain name in the blockfile, which blocks all URLs\r
+ from that site.</p>\r
+\r
+ <p><a name="wanted"></a>If the ad comes from a server that you\r
+ really want some content from, you can include enough of the\r
+ path to avoid zapping stuff you might want. In the first\r
+ example above, <code>/ads/</code> would seem to be enough. If\r
+ you don't include the domain name, the pattern applies to all\r
+ sites, so you don't want such patterns to be too general: for\r
+ example <code>/ad</code> would block <code>\r
+ /admin/salaries/</code> on your company's internal site.</p>\r
+\r
+ <p><a name="image"></a>To speed the blocking of images, some\r
+ UNIX ® users create a shell script called <code>\r
+ Image:</code> containing a line such as <code>echo $1 | sed\r
+ s/http:..// >> $HOME/lib/blockfile</code> that adds its\r
+ argument to the user's blockfile. Once an offending image has\r
+ been be found using <b class="eg">View Document Info</b> it's\r
+ easy to cut-and-paste the line (or part of it) into a shell\r
+ window. The same script can be linked to a file called <code>\r
+ Frame:</code> to dealing with framed documents, and <code>\r
+ junkbuster:</code> to accept the output of the <a href=\r
+ "ijbman.html#debug">debug</a> option.</p>\r
+\r
+ <p><a name="partial"></a>When compiled without the <i><dfn>\r
+ regular expressions</dfn></i> option, the Internet Junkbuster\r
+ uses only very simple (and fast) matching methods. The pattern\r
+ <code>/banners</code> will not stop <code>\r
+ /images/banners/huge.gif</code> getting through: you would have\r
+ to include the pattern <code>/images/banners</code> or\r
+ something that matches in full from the left. <a name="regex">\r
+ </a>So you can get what you want here, the matcher understands\r
+ POSIX regular expressions: you can use <code>\r
+ /*.*/banners</code> to block and any URL containing <code>\r
+ /banners</code> (even in the middle of the path). <a name=\r
+ "posix"></a>(In Versions 1.1 through 1.4 they were an option at\r
+ compile time; from Version 2.0 they have become the default.)\r
+ Regular expressions give you many more features than this, but\r
+ if you're not already familiar with them you probably won't\r
+ need to know anything beyond the <code>/*.*/</code> idiom. If\r
+ you do, a <code>man egrep</code> is probably a good starting\r
+ point).</p>\r
+\r
+ <p><a name="slash"></a>Don't forget the <code>/</code> (slash)\r
+ at the beginning of the path. If you leave it out the line will\r
+ be interpreted as a domain name, so <code>ad</code> would block\r
+ all sites from Andorra (since <code>.ad</code> is the\r
+ two-letter country code for that principality).</p>\r
+\r
+ <p><a name="detail"></a>For a detailed technical description of\r
+ how pattern matching is done, see the <a href=\r
+ "ijbman.html#o_b">manual.</a></p>\r
+\r
+ <h3><a name="despite"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> How come this ad is still getting\r
+ through anyway?</h3>\r
+\r
+ <p>If the ad had been displayed before you included its URL in\r
+ the blockfile, it will probably be held in cache for some time,\r
+ so it will be displayed without the need for any request to the\r
+ server. Using the <a href="ijbman.html#debug">debug</a> <code>\r
+ 1</code> option to show each URL as it is fetched is a good way\r
+ to see exactly what is happening.</p>\r
+\r
+ <p><a name="otherwise"></a>If new items seem to be getting\r
+ through, check that you are really running the proxy with the\r
+ right blockfile in the options. Check the blockfile for\r
+ exceptions.</p>\r
+\r
+ <p><a name="java"></a>Some sites may have different ways of\r
+ inserting ads, such as via Java. If you have ideas on how to\r
+ block new kinds of junk not currently covered, please tell\r
+ us.</p>\r
+\r
+ <h3><a name="exceptions"></a><img border="0" src="fb.gif" alt=\r
+ "*" width="14" height="14"> How do I stop it blocking a\r
+ URL that I actually want?</h3>\r
+\r
+ <p>You can change the patterns so they don't cover it, or use a\r
+ simple feature in Version 1.1 and later: a line beginning with\r
+ a <code>~</code> character means that a URL blocked by previous\r
+ patterns that matches the rest of the line is let through. For\r
+ example, the pattern <code>/ad</code> would block <code>\r
+ /addasite.html</code> but not if followed by <code>\r
+ ~/addasite</code> in the blockfile. Or suppose you want to see\r
+ everything that comes from a site you like, even if it looks\r
+ like an ad: simply put <code>~aSiteYouLike.com</code> at the\r
+ <em>end</em> of the blockfile. (Order is important, because the\r
+ last matching line wins.)</p>\r
+\r
+ <p><a name="agreed"></a>As well as unblocking pages that were\r
+ unintentionally blocked, this feature is useful for unblocking\r
+ ads from a specific source. This might be because you are\r
+ interested in those particular ones, or if you have an explicit\r
+ agreement to accept certain ads, such as those from a free\r
+ web-based email provider.</p>\r
+\r
+ <p><a name="blocked"></a>If you want to find out exactly which\r
+ pattern in the blockfile a given URL matched, just click on the\r
+ words ``Internet Junkbuster'' which are displayed alone on a\r
+ page when your browser requests a blocked URL. The proxy\r
+ displays a message that pinpoints the pattern for you.</p>\r
+\r
+ <h3><a name="children"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Can I block sites I don't want my\r
+ children to see?</h3>\r
+\r
+ <p>Yes, but remember that <a name="savvy"></a>children who are\r
+ technically sophisticated enough to use the browsers' proxy\r
+ configuration options could of course bypass any proxy. This\r
+ kind of technology can be used as a gentle barrier to remind or\r
+ guide the child, but nobody should expect it to replace the\r
+ parent's role in setting and enforcing standards of online\r
+ behavior for their children.</p>\r
+\r
+ <p><a name="recommend"></a>Some ISPs are starting to provide\r
+ specialized proxies to protect children. There are two basic\r
+ approaches: the ``black list'' and the ``white list'' approach.\r
+ <a name="negative"></a>The black list approach allows the child\r
+ to go anywhere not explicitly prohibited; the white list\r
+ permits visits only to sites explicitly designated as\r
+ acceptable.</p>\r
+\r
+ <p><a name="positive"></a>It's very easy for anyone to compile\r
+ a white list from a page of ``recommended kids sites'' and to\r
+ configure an Internet Junkbuster to allow access to those sites\r
+ only. (If you publish such a list on the web, please tell us\r
+ its URL). Assuming your version isn't an old one without regex,\r
+ you can place a <code>*</code> (asterisk) as the first line of\r
+ the blockfile (which blocks everything), and then list\r
+ exceptions after that. Be careful to make the exception\r
+ sufficiently broad: for example, using <code>\r
+ ~www.uexpress.com/ups/comics/ch/</code> as the exception for\r
+ <cite>Calvin and Hobbes</cite> would block some of the graphic\r
+ elements on the page; you would probably want a wider exception\r
+ such as <code>~www.uexpress.com/ups/</code> to permit them.</p>\r
+\r
+ <p><a name="trust"></a>Version 2.0 has an experimental feature\r
+ to permit only sites mentioned in a nominated <a href=\r
+ "ijbman.html#trustfile">trusted site.</a> This allows\r
+ organizations to build lists of sites for kids to browse, and\r
+ the software automatically restricts access to those on the\r
+ list.</p>\r
+\r
+ <p><a name="scan"></a>Many filtering products actually scan for\r
+ keywords in the text of pages they retrieve before presenting\r
+ it, but the Internet Junkbuster does not do this. Building a\r
+ perfectly reliable black list system is hard, because it's very\r
+ difficult to state in advance exactly what is obscene or\r
+ unsuitable. For more info see our links page.</p>\r
+\r
+ <h3><a name="message"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> What do I see when a page or\r
+ graphic is blocked by the proxy?</h3>\r
+\r
+ <p>You usually see a broken image icon, but it depends on\r
+ several factors beyond the proxy's control. If asked for a URL\r
+ matching its blockfile, the proxy returns an HTML page\r
+ containing a message identifying itself (currently the two\r
+ words ``Internet Junkbuster'') with a status 202 (Accepted)\r
+ instead of the usual 200 (OK). (Versions 1.X returned an error\r
+ 404: Forbidden, which caused strange behavior in some cases.)\r
+ Status 202 is described in the HTTP RFC as indicating that the\r
+ request has been accepted but not completed, and that it might\r
+ complete successfully in the future (in our case, if the\r
+ blockfile were changed).</p>\r
+\r
+ <p><a name="depends"></a>The broken image icon is most common\r
+ because the browser is usually expecting a graphic. But if it\r
+ was expecting text, or if the page happens to be using certain\r
+ HTML extensions such as <code>layer</code> and your browser is\r
+ a late model from Microsoft, you may see the words ``Internet\r
+ Junkbuster'' displayed as a hot link.</p>\r
+\r
+ <p><a name="click"></a>Clicking on the link takes you to an\r
+ explanation of the pattern in the blockfile that caused the\r
+ block, so that you can edit the blockfile and go back and\r
+ reload if you really want to see what was blocked. The\r
+ explanatory link is generated by the proxy and is automatically\r
+ intercepted based on its ending in <code>ij-blocked-url</code>;\r
+ even though the site is specified as <code>\r
+ http://internet.junkbuster.com</code> no request should\r
+ actually made to that site. If one is, it means that the proxy\r
+ was been removed after it generated the link.</p>\r
+\r
+ <p><a name="layer"></a>To summarize: the identifying link to\r
+ the blocking explanation is usually turned into a broken image\r
+ icon, but it may be displayed on a page alone, or they may may\r
+ be restricted to the particular frame, layer or graphic area\r
+ specified in the page containing them. The proxy has no way of\r
+ knowing the context in which a URL will be used and cannot\r
+ control how the blocking message will be rendered.</p>\r
+\r
+ <h3><a name="broken"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Why not replace blocked banners\r
+ with something invisible?</h3>\r
+\r
+ <p><a name="infringe"></a>Many users have suggested to us that\r
+ blocked banners should be replaced by a something like a 1x1\r
+ transparent GIF to make the page would look as if there was\r
+ nothing ever there. Apart from making it harder to catch\r
+ unintended blocking, this might also displease the owners of\r
+ the page, who could argue that such a change constitutes a\r
+ copyright infringement. We think that merely failing to allow\r
+ an included graphic to be accessed would probably not be\r
+ considered an infringement: after all this is what happens when\r
+ a browser is configured not to load images automatically.\r
+ However, we are not lawyers, so anyone in doubt should take\r
+ appropriate advice.</p>\r
+\r
+ <p><a name="done"></a>In a context where the copyright issue is\r
+ resolved satisfactorily, a proxy could simply return a status\r
+ 301 or 302 and specify a replacement URL in a <code>\r
+ Location</code> and/or <code>URI</code> header. An alternative\r
+ would be to use inline code to return a 1 x 1 clear GIF. We do\r
+ not publish sample code for this, and we have no way of\r
+ stopping others who have.</p>\r
+\r
+ <h3><a name="size"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Why not block banners based on\r
+ the dimensions of the image?</h3>\r
+\r
+ <p>Many users have pointed out that most banner ads come in\r
+ standard sizes, so why not block all GIFs of those sizes? This\r
+ would theoretically be without fetching the object because the\r
+ dimensions are usually given in the <code>IMG</code> tag, but\r
+ it would require substantial changes in the code, and we doubt\r
+ whether it would be much more effective than a good block\r
+ list.</p>\r
+\r
+ <h3><a name="embedded"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> What about non-graphic\r
+ advertising within the pages I want?</h3>\r
+\r
+ <p>The Internet Junkbuster deliberately does not provide a way\r
+ of automatically editing the contents of a page, to remove\r
+ textual advertising or to repair the holes left by blocked\r
+ banners. Other packages such as WebFilter do.</p>\r
+\r
+ <p><a name="base"></a>For the same reason, it has no way of\r
+ stopping a new browser window being created, because this is\r
+ done through the <code>target</code> attribute in the <code>\r
+ <a></code> and <code><base></code> elements, not\r
+ through headers. Nor do we plan to add a feature to paralyze\r
+ animated GIFs.</p>\r
+\r
+ <h3><a name="push"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Does it block ads on the\r
+ broadcasting ``push'' systems? How about pop-up ads?</h3>\r
+\r
+ <p>We haven't tried it but we expect it would probably work on\r
+ image ads on push channels. See also adchoice.</p>\r
+\r
+ <p><a name="pop"></a>Disabling Javascript stops some pop-up\r
+ ads. One problem is that some advertisers throw open a new\r
+ browser window to frame the ad. The ad is easily blocked, but\r
+ the empty window remains. You can kill it easily, but this is a\r
+ chore. We don't see how to stop them other than editing the\r
+ HTML from the parent window, which we don't like to do.</p>\r
+\r
+ <p><a name="TBTD"></a>The TBTF newsletter warned subscribers to\r
+ push information that <a name="LOGTARGET"></a>in IE4, LOGTARGET\r
+ allows servers to determine the URLs viewed at their site even\r
+ if accessed from cache or through a proxy. If you use this\r
+ browser see our instructions on how to disable this.</p>\r
+\r
+ <p><a name="pushy"></a>If you find you have experience using\r
+ the proxy with push, or have any other advice about it, please\r
+ tell us.</p>\r
+\r
+ <p align="center"><a href="#top_of_page"><img border="0" src=\r
+ "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
+ "15"></a></p>\r
+\r
+ <h2><a name="cookies"></a> Cookies</h2>\r
+\r
+ <p>For background information on cookies see our page\r
+ describing their dangers.</p>\r
+\r
+ <h3><a name="breakthrough"></a><img border="0" src="fb.gif"\r
+ alt="*" width="14" height="14"> Might some cookies still\r
+ get through? How can I stop them?</h3>\r
+\r
+ <p>Yes, you should expect the occasional cookie to make it\r
+ through to your browser. We know of at least three ways this\r
+ can happen; please tell us if you find any others. One way is\r
+ in secure documents, which are explained below.</p>\r
+\r
+ <p><a name="EQUIV"></a>A few sites set cookies using a line\r
+ such as <code><META HTTP-EQUIV="Set-Cookie"\r
+ CONTENT="flavor=chocolate"></code> in the <code>HEAD</code>\r
+ section of an HTML document. <a name="javascript"></a>Cookies\r
+ can also be \r
+ <!-- IEM: http://cgi.netscape.com/eng/mozilla/Gold/handbook/javascript/ref_a-c.html#cookie_property -->\r
+ set and read in JavaScript. To see if this is happening in a\r
+ document, view its source, look in the <code>head</code> for a\r
+ section tagged <code>script language="JavaScript"</code>. If it\r
+ contains a reference to <code>document.cookie</code>, the page\r
+ can manipulate your cookie file without sending any cookie\r
+ headers. The Internet Junkbuster does not tamper with these\r
+ methods. Fortunately they are rarely used at the moment. If a\r
+ cookie gets set, it should be stopped by the proxy on its way\r
+ back to the server when a page is requested, but it can still\r
+ be read in Javascript.</p>\r
+\r
+ <p><a name="alert"></a>To prevent cookies breaking through,\r
+ <strong>always</strong> keep cookie alerts turned on in your\r
+ browser, and disable Java and Javascript. Making the files hard\r
+ to write may also help.</p>\r
+\r
+ <h3><a name="method"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Exactly how do cookies get\r
+ created and stored anyway?</h3>\r
+\r
+ <p>When a web site's server sends you a page it also sends\r
+ certain ``header information'' which your browser records but\r
+ does not display. One of these is a <code>Set-Cookie</code>\r
+ header, which specifies the cookie information that the server\r
+ wants your browser to record. Similarly, when your browser\r
+ requests a page it also sends headers, specifying information\r
+ such as the graphics formats it understands. If a cookie has\r
+ previously been set by a site that matches the URL it is about\r
+ to request, your browser adds a <code>Cookie</code> header\r
+ quoting the previous information.</p>\r
+\r
+ <p><a name="privacy"></a>For more background information on how\r
+ cookies can damage your privacy, see our page on cookies. For\r
+ highly detailed technical information see the RFC. The Internet\r
+ Junkbuster will show you all headers you use the <a href=\r
+ "ijbman.html#debug">debug</a> <code>8</code> option, or you can\r
+ get a sample from our demonstration page.</p>\r
+\r
+ <h3><a name="break"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> If cookies can't get through,\r
+ will some things stop working for me?</h3>\r
+\r
+ <p>Possibly. Some personalized services including certain \r
+ <!-- IEM: http://my.yahoo.com --> chat rooms require cookies.\r
+ <a name="registration"></a>Newspapers that require \r
+ <!-- IEM: http://www.nytimes.com/subscribe/sub-bin/new_sub.cgi#agree -->\r
+ registration or \r
+ <!-- IEM: http://interactive5.wsj.com/regUser.html -->\r
+ subscription will not automatically recognize you if you don't\r
+ send them the cookie they assigned you. And there are a very\r
+ small number of sites that do strange things with cookies; they\r
+ don't work for anyone that blocks cookies by any means. Some\r
+ sites such as Microsoft explain that their content is so\r
+ wonderfully compelling that they will withhold it from you\r
+ unless you submit to their inserting cookies.</p>\r
+\r
+ <p><a name="hotmail"></a>Many free Web-based email services\r
+ require cookies. Hotmail also seems to require allowing both\r
+ <code>msn.com</code> and <code>passport.com</code> to set\r
+ cookies.</p>\r
+\r
+ <p><a name="want"></a>If you want such sites to be given your\r
+ cookies, you can use the <a href="ijbman.html#cookiefile">\r
+ cookiefile</a> option provided you are running Version 1.2 or\r
+ later yourself. Simply include the domain name of those sites\r
+ in the <i>cookiefile</i> specified by this option. If it still\r
+ doesn't work, the problem may be in other headers.</p>\r
+\r
+ <p><a name="one"></a>It's possible to let cookies out but not\r
+ in, which is enough to keep some sites happy, but not all of\r
+ them: one newspaper site seems to go into an endless frenzy if\r
+ deprived of fresh cookies. A cookiefile containing a single\r
+ line consisting of the two characters <code>>*</code>\r
+ (greater-than and star) permits server-bound cookies only. The\r
+ <code>*</code> is a <a href="ijbman.html#wildcard">wildcard</a>\r
+ that matches all domains.</p>\r
+\r
+ <p><a name="else"></a>If someone else is running the Internet\r
+ Junkbuster for you and has a version that \r
+ <!-- IAM: ijbfaq.html#registration --> passes server-bound\r
+ cookies through, you can try editing your browser's cookie file\r
+ to contain just the ones you want, and restart your browser. <a\r
+ name="window"></a>To subscribe to a new service like this after\r
+ you have started using the Internet Junkbuster, you can try the\r
+ following: tell your browser to stop using the Internet\r
+ Junkbuster, fill out and submit your subscription details\r
+ (allowing that web site to set a cookie), then reconfigure your\r
+ browser to use the Internet Junkbuster again (and stop more\r
+ cookies being sent). This also requires the <a href=\r
+ "ijbman.html#cookiefile">cookiefile</a> option, and its success\r
+ depends on the Web site not wanting to change your cookies at\r
+ every session. For this reason it does not work at some major\r
+ newspaper sites, for example. <a name="buyers"></a>But you may\r
+ prefer to look at whether other sites provide the same or\r
+ better services without demanding the opportunity to track your\r
+ behavior. The web is a buyer's market where most prices are\r
+ zero: very few people pay for content with money, so why should\r
+ you pay with your privacy?</p>\r
+\r
+ <h3><a name="crumble"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Can I control cookies on a\r
+ per-site basis?</h3>\r
+\r
+ <p><a name="discard"></a>Yes, since version 1.2 the Internet\r
+ Junkbuster has included advanced cookie management facilities.\r
+ Unless you specify otherwise, cookies are discarded\r
+ (``crumbled'') by the Internet Junkbuster whether they came\r
+ from the server or the browser. In Version 1.2 and later you\r
+ can use the <a href="ijbman.html#cookiefile">cookiefile</a>\r
+ option to specify when cookies are to be passed through intact.\r
+ It uses the same syntax and <a href="ijbman.html#o_b">\r
+ matching</a> algorithm as the blockfile.</p>\r
+\r
+ <p><a name="cook"></a>If the URL matches a pattern in the <i>\r
+ <dfn>cookiefile</dfn></i> then cookies are let through in both\r
+ the browser's request for the URL and in the server's response.\r
+ <a name="directional"></a>One-way permissions can be specified\r
+ by starting the line with the <code>></code> or <code>\r
+ <</code> character. For example, a cookiefile consisting of\r
+ the four lines<br>\r
+ <code>org</code><br>\r
+ <code>>send-user-cookies.org</code><br>\r
+ <code>\r
+ <accept-server-cookies.org</code><br>\r
+ <code>~block-all-cookies.org</code><br>\r
+ allows cookies to and from <code>.org</code> domains only,\r
+ with the following exceptions:<br>\r
+ </p>\r
+\r
+ <ol type="1">\r
+ <li><a name="fed"></a>Cookies sent from servers in the domain\r
+ <code>send-user-cookies.org</code> are blocked on their way\r
+ to the client, but cookies sent by the browser to that domain\r
+ are still be fed to them.</li>\r
+\r
+ <li><a name="take"></a>The cookies of <code>\r
+ accept-server-cookies.org</code> check in to the proxy and\r
+ are passed through to the browser, but when they come back to\r
+ the proxy they never check out.</li>\r
+\r
+ <li><a name="deny"></a>All cookies to and from <code>\r
+ block-all-cookies.org</code> are blocked.</li>\r
+ </ol>\r
+\r
+ <p><a name="paths"></a>If the <b><code>junkbuster</code></b>\r
+ was compiled with the regular expressions option they may be\r
+ used in paths. Any logging to a ``cookie jar'' is separate and\r
+ not affected.</p>\r
+\r
+ <p><a name="breadth"></a>It's important to give hosts you want\r
+ to be able to set cookies sufficient breadth. For example,\r
+ instead of <code>www.yahoo.com</code> use <code>\r
+ yahoo.com</code> because the company uses many different hosts\r
+ ending in that domain.</p>\r
+\r
+ <h3><a name="wafers"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Can I make up my own fake cookies\r
+ (wafers) to feed to servers?</h3>\r
+\r
+ <p>Yes, using the <a href="ijbman.html#wafer">wafer</a> option.\r
+ We coined the term <i><dfn>wafer</dfn></i> to describe cookies\r
+ chosen by a user, not the Web server. Servers may not find\r
+ wafers as tasty as the cookies they make themselves. But users\r
+ may enjoy controlling servers' diets for various reasons, such\r
+ as the following.</p>\r
+\r
+ <ol type="1">\r
+ <li><a name="retaliate"></a>Users who consider cookies to be\r
+ an unwelcome intrusion and a waste of their disk space can\r
+ respond in kind. By writing ``signature wafers'' they can\r
+ express their feelings about cookies, in a place that the\r
+ people in charge of them are most likely to notice.</li>\r
+\r
+ <li>\r
+ <a name="notice"></a>Sites running a proxy that logs\r
+ cookies to a file (such as the Internet Junkbuster does\r
+ with the <a href="ijbman.html#jarfile">jarfile</a> option\r
+ on) may want to notify servers that their cookies are being\r
+ intercepted, deleted or copied. One possible reason for\r
+ doing this is the uncertain copyright status of cookie\r
+ strings. Nothing here should be taken as legal advice: we\r
+ are simply raising a question for any interested parties to\r
+ consider, and make no representation that such measures are\r
+ necessary or sufficient. Concerned proxy sites might decide\r
+ to send a wafer (named ``NOTICE'' for example) containing\r
+ text along the lines of the following. \r
+\r
+ <blockquote>\r
+ <p><a name="licenses_on_cookies_refused"></a>TO WHOM IT\r
+ MAY CONCERN<i><br>\r
+ <br>\r
+ Do not send me any copyrighted information other than\r
+ the document that I am requesting or any of its necessary\r
+ components.<br>\r
+ <br>\r
+ In particular do not send me any cookies that are\r
+ subject to a claim of copyright by anybody. Take notice\r
+ that I refuse to be bound by any license condition\r
+ (copyright or otherwise) applying to any cookie.</i></p>\r
+ </blockquote>\r
+ Any company that tries to argue in court that the proxy\r
+ site was breaching their copyright in the cookies would be\r
+ met with the defense that the proxy site gave that company\r
+ the opportunity to protect its copyright by simply not\r
+ sending cookies after receiving the notice. \r
+\r
+ <p><a name="pointer"></a>Cookies can be as long as four\r
+ thousand characters, so there's plenty of space for\r
+ lawyerly verbosity, but white space, commas, and\r
+ semi-colons are <a href="ijbman.html#o_w">prohibited.</a>\r
+ Spaces can be turned into underscores. Alternatively, a URL\r
+ could be sent as the cookie value, pointing to a document\r
+ containing a notice, perhaps with a suggestive value such\r
+ as<br>\r
+ <code>\r
+ http://www.junkbusters.com/ht/en/ijbfaq.html#licenses_on_cookies_refused</code><br>\r
+\r
+ But including the notice directly would probably be\r
+ preferable because the addressee does not have to look it\r
+ up.</p>\r
+\r
+ <p><a name="vanilla"></a>The Internet Junkbuster 2.0.2\r
+ currently sends a full notice as a ``vanilla wafer'' if\r
+ cookies are being logged to a cookie jar and no other\r
+ wafers have been specified. It can be suppressed with the\r
+ <a href="ijbman.html#suppress-vanilla-wafer">\r
+ suppress-vanilla-wafer</a> option, which might be used in\r
+ situations where there is an established understanding\r
+ between the proxy and all who serve it.</p>\r
+ </li>\r
+ </ol>\r
+\r
+ <p><a name="gimme"></a>Junkbusters provides a CGI script that\r
+ lets you see your wafers as they appear to servers.</p>\r
+\r
+ <p><a name="malfunction"></a>Wafers confuse a few fragile\r
+ servers. Hotmail appears to be one of them. If this troubles\r
+ you, don't use this option.</p>\r
+\r
+ <p><a name="regardless"></a>Any wafers specified are sent to\r
+ all sites regardless of the cookiefile. <a name="compliant">\r
+ </a> They are appended after any genuine cookies, to maintain\r
+ compliance with RFC 2109 in the event that a path was specified\r
+ for a cookie. The RFC's provisions regarding the <code>$</code>\r
+ character (such as the <code>Version</code> attribute) are\r
+ transparent to the proxy; it simply quotes what was recited by\r
+ the browser.</p>\r
+\r
+ <p><a name="personalize"></a>If you want to send wafers only to\r
+ specific sites, you could try putting them your browser's\r
+ cookie file in a format conforming to the Netscape\r
+ specification, and then specify in the proxy's cookiefile that\r
+ cookies are to be sent to but not accepted from those sites, so\r
+ they can't overwrite the file. This may work with Netscape but\r
+ not all other browsers.</p>\r
+\r
+ <h3><a name="jar"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Why would anyone want to save\r
+ their cookies in a ``cookie jar?''</h3>\r
+\r
+ <p>We provided this capability just in case anyone wants it.\r
+ There are a few possible reasons.</p>\r
+\r
+ <ol type="1">\r
+ <li><a name="pay"></a>It's conceivable that marketing\r
+ companies might one day buy history files and cookie jars\r
+ from consumers in the same way that they currently pay them\r
+ to fill out survey forms. With this information they could\r
+ gather psychographic information, see which competitors'\r
+ sites the consumer has visited, and discover what advertising\r
+ is being targeted at them.</li>\r
+\r
+ <li><a name="choose"></a>Some consumers might employ\r
+ semi-automated means of sorting through their cookie jars,\r
+ selecting which ones to place in their cookies file for use\r
+ by their browsers. Their decisions could be based on payments\r
+ offered, privacy rating systems such as TRUSTe proposes, or\r
+ their own opinion of the company. It could be done manually\r
+ or with software. There's an Internet Draft on trust\r
+ certification of cookies.</li>\r
+\r
+ <li><a name="share"></a>Users may even start ``sharing''\r
+ cookies among themselves, sending back cookies that servers\r
+ generated for other visitors. Servers that aren't expecting\r
+ this possibility will be misled about their visitors'\r
+ identities. Cookies could be shared among users on a single\r
+ machine, or across continents via FTP and anonymous\r
+ remailers. <a name="disinformation"></a>Privacy activists may\r
+ promote cookie disinformation campaigns as a way to defend\r
+ the public against abuse. If a significant percentage of\r
+ people send disinformative cookies, user tracking via cookies\r
+ may become less reliable and less used.</li>\r
+ </ol>\r
+\r
+ <p align="center"><a href="#top_of_page"><img border="0" src=\r
+ "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
+ "15"></a></p>\r
+\r
+ <h2><a name="anonymity"></a> Anonymity</h2>\r
+\r
+ <p>For details on how your identity can be revealed while you\r
+ surf, see our page on privacy. Once you start using the\r
+ Internet Junkbuster you should find that much of the\r
+ information previously indicated on that page will no longer be\r
+ provided. If the <code>REMOTE HOST</code> indicating your IP\r
+ address is too close for comfort, see our suggestions below on\r
+ how to conceal your IP address. We also recommend that you\r
+ disable JavaScript and Java.</p>\r
+\r
+ <h3><a name="disclose"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> If I use the Internet Junkbuster,\r
+ will my anonymity be guaranteed?</h3>\r
+\r
+ <p>No. Your chances of remaining anonymous are improved, but\r
+ unless you are an expert on Internet security it would be\r
+ safest to assume that everything you do on the Web can be\r
+ attributed to you personally.</p>\r
+\r
+ <p><a name="happen"></a>The Internet Junkbuster removes various\r
+ information about you, but it's still possible that web sites\r
+ can find out who you are. Here's one way this can happen.</p>\r
+\r
+ <p><a name="ftp"></a>A few browsers disclose the user's email\r
+ address in certain situations, such as when transferring a file\r
+ by FTP. The Internet Junkbuster 2.0.2 does not filter the FTP\r
+ stream. If you need this feature, or are concerned about the\r
+ mail handler of your browser disclosing your email address, you\r
+ might consider products such as NSClean.</p>\r
+\r
+ <p><a name="binaries"></a>Browsers downloaded as binaries could\r
+ use non-standard headers to give out any information they can\r
+ have access to: see the manufacturer's license agreement. It's\r
+ impossible to anticipate and prevent every breach of privacy\r
+ that might occur. The professionally paranoid prefer browsers\r
+ available as source code, because anticipating their behavior\r
+ is easier.</p>\r
+\r
+ <h3><a name="should"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Why should I trust my ISP or\r
+ Junkbusters with my browsing data?</h3>\r
+\r
+ <p>You shouldn't have to trust us, and you certainly don't have\r
+ to. We do not run the proxy as a service, where we could\r
+ observe your online behavior. We provide source code so that\r
+ everyone can see that the proxy isn't doing anything\r
+ sneaky.</p>\r
+\r
+ <p><a name="awful"></a>You are already trusting your ISP not to\r
+ look at an awful lot of information on what you do. They\r
+ probably post a privacy policy on their site to reassure you.\r
+ If they run a proxy for you, using it could actually make it\r
+ slightly easier for them to monitor you, but we doubt that any\r
+ sane ISP would try this, because if it were discovered\r
+ customers would desert them.</p>\r
+\r
+ <h3><a name="logging"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Can the proxy be used for logging\r
+ who looks at what?</h3>\r
+\r
+ <p>We don't want institutions to use this software as an\r
+ instrument of surveillance. We have deliberately not provided\r
+ options to add timestamps or records of which IP addresses\r
+ accessed which URLs. However, because we publish source code\r
+ anyone can modify it to do such things, and there is no way a\r
+ remote user can find out if this is happening. Again, you need\r
+ to be able to trust the entity providing your proxy service,\r
+ but you were probably in that position even before using a\r
+ proxy.</p>\r
+\r
+ <h3><a name="header"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> What private information from\r
+ server-bound headers is removed?</h3>\r
+\r
+ <p>The Internet Junkbuster pounces on the following HTTP\r
+ headers in requests to servers, unless instructed otherwise in\r
+ the options.</p>\r
+\r
+ <ol type="1">\r
+ <li><a name="from"></a>The <code>FROM</code> header, which a\r
+ few browsers use to tell your email address to servers, is\r
+ dropped unless the <a href="ijbman.html#from">from</a> option\r
+ is set.</li>\r
+\r
+ <li><a name="agent"></a>The <code>USER_AGENT</code> <a name=\r
+ "infer"></a>header is changed to indicate that the browser is\r
+ currently Mozilla (Netscape) 3.01 Gold with an unremarkable\r
+ Macintosh configuration. Misidentification helps resist\r
+ certain attacks. If your browser and hardware happen to be\r
+ accurately identified, you might want to change the default.\r
+ (Earlier versions of the Internet Junkbuster indicated\r
+ different details; by altering them periodically we aim to\r
+ hinder anyone trying to infer whether our proxy is present.)\r
+ <a name="lying"></a>If you don't like the idea of incorrectly\r
+ identifying your computer as a Mac, set it accordingly. \r
+ <!-- Aside: or read Kundera's Unbearable Lightness of Being, 5:5, ``It is a tragicomic fact..'' (p187?) --></li>\r
+\r
+ <li><a name="referer"></a>The <code>REFERER</code> header\r
+ (which indicates where the URL currently being requested was\r
+ found) is dropped. A single static referer to replace all\r
+ real referers may be specified using the <a href=\r
+ "ijbman.html#referer">referer</a> option. Where no referer is\r
+ provided by the browser, none is added; the <a href=\r
+ "ijbman.html#add-header">add-header</a> option with arguments\r
+ such as <code>-x 'Referer: http://me.me.me'</code> can be\r
+ used to send a bogus referer with every request.</li>\r
+ </ol>\r
+\r
+ <p>In Version 1.4 and later you can use the <a href=\r
+ "ijbman.html#o_r">-r @</a> option to selectively disclose\r
+ <code>REFERER</code> and <code>USER_AGENT</code> to only those\r
+ sites you nominate.</p>\r
+\r
+ <p><a name="UA"></a>Some browsers send Referer and User-Agent\r
+ information under different non-standard headers. The Internet\r
+ Junkbuster 2.0.2 stops <code>UA</code> headers, but others may\r
+ get through. This information is also available via JavaScript,\r
+ so disable it. <a name="indexers"></a>Some search engines\r
+ encode the query you typed in the URL that goes to advertisers\r
+ to target a banner ad at you, so you will need to block the ad\r
+ as well as the referer header, unless you want them (and anyone\r
+ they might buy data from) to know everything you ever search\r
+ for.</p>\r
+\r
+ <p><a name="JavaScript"></a>If you have JavaScript enabled (the\r
+ default on most browsers) servers can use it to obtain Referer\r
+ and User Agent, as well as your plug-ins. We recommend\r
+ disabling JavaScript and Java.</p>\r
+\r
+ <p><a name="response"></a>Currently no HTTP response headers\r
+ (browser bound) are removed, not even the <code>\r
+ Forwarded:</code> or <code>X-Forwarded-For:</code> headers. Nor\r
+ are any added, <a href="ijbman.html#o_y">unless requested.</a>\r
+ We are considering a more flexible header management system for\r
+ a future version.</p>\r
+\r
+ <h3><a name="breakage"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Might some things break because\r
+ header information is changed?</h3>\r
+\r
+ <p>Possibly. If used with a browser less advanced than Netscape\r
+ 3.0 or IE-3, indicating an advanced browser may encourage pages\r
+ containing extensions that confuse your browser. If this\r
+ becomes a problem upgrade your browser or use the <a href=\r
+ "ijbman.html#user-agent">user-agent</a> option to indicate an\r
+ older browser. In Version 1.4 and later you can selectively\r
+ reveal your real browser to only those sites you nominate.</p>\r
+\r
+ <p><a name="Russian"></a>Because different browsers use\r
+ different encodings of Russian and Czech characters, certain\r
+ web servers convert pages on-the-fly according to the User\r
+ Agent header. Giving a User Agent with the wrong operating\r
+ system or browser manufacturer causes some sites in these\r
+ languages to be garbled; Surfers to Eastern European sites\r
+ should <a href="ijbman.html#o_r">change it</a> to something\r
+ closer.</p>\r
+\r
+ <p><a name="counters"></a>Some page access counters work by\r
+ looking at the referer; they may fail or break when\r
+ deprived.</p>\r
+\r
+ <p><a name="wired"></a>Some sites depend on getting a referer\r
+ header, such as <code>uclick.com</code>, which serves comic\r
+ strips for many newspaper sites, including <cite>\r
+ Doonsbury</cite> for the <cite>Washington Post.</cite> (If you\r
+ click on that last link, you can then get to a page containing\r
+ the strip via the same URL we've linked to under <cite>\r
+ Doonsbury</cite>, but if you click on the <cite>\r
+ Doonsbury</cite> link directly, it gives you an error message\r
+ suggesting that you use a browser that supports referers.) In\r
+ Version 1.4 and later you can use the <a href=\r
+ "ijbman.html#o_r">-r @</a> option and place a line like <code>\r
+ >uclick.com</code> in your cookiefile. Wired News used to\r
+ use referer to decide whether to add a navigation column to the\r
+ page, but they have changed that.</p>\r
+\r
+ <p><a name="Intellicast"></a>The weather maps of Intellicast\r
+ have been blocked by their server when no referer or cookie is\r
+ provided. You can use the same countermeasure with a line such\r
+ as <code>>208.194.150.32</code> (or simply get your weather\r
+ information elsewhere).</p>\r
+\r
+ <p><a name="decide"></a>Some software vendors, including\r
+ Download.com and Intuit use <code>USER_AGENT</code> to decide\r
+ which versions of their products to display to you. With the\r
+ default you get Mac versions.</p>\r
+\r
+ <p><a name="resort"></a>As a last resort if a site you need\r
+ doesn't seem to be working, the proxy configuration of many\r
+ browsers allow you to specify <b class="eg">No Proxy For</b>\r
+ any hostname you want.</p>\r
+\r
+ <p><a name="What"></a>We had reports that on some versions of\r
+ Netscape the What's New feature did not work with the proxy,\r
+ but we think we fixed this in Version 2.0.1.</p>\r
+\r
+ <h3><a name="misidentify"></a><img border="0" src="fb.gif" alt=\r
+ "*" width="14" height="14"> How is misidentifying my\r
+ browser good for security and privacy?</h3>\r
+\r
+ <p>Almost every major release of both leading browsers has\r
+ contained bugs that allow malicious servers to compromise your\r
+ privacy and security. Known bugs are quickly fixed, but\r
+ millions of copies of the affected software remain out there,\r
+ and yours is probably one of them. The header that normally\r
+ identifies your browser tells such servers exactly which\r
+ attacks to use against you. By misidentifying your browser you\r
+ reduce the likelihood that they will be able to mount a\r
+ successful attack.</p>\r
+\r
+ <h3><a name="conceal"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Does the Internet Junkbuster\r
+ conceal my IP address?</h3>\r
+\r
+ <p>Web sites get the IP address of any proxy or browser they\r
+ serve pages to. If you run the proxy on your own computer the\r
+ IP address disclosed is the same as your browser would, unless\r
+ you use the <a href="ijbman.html#forwardfile">forwardfile</a>\r
+ option is used to chain to another proxy, in which case servers\r
+ only get the last IP address in the chain. Chaining slightly\r
+ slows browsing of course, but it improves anonymity.</p>\r
+\r
+ <h3><a name="ident"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Does the Internet Junkbuster\r
+ thwart identification by identd?</h3>\r
+\r
+ <p>We think so, provided you are not the user running the\r
+ proxy. If your computer (or your ISP's) is running the <code>\r
+ identd</code> demon, servers can ask it for the identity of the\r
+ user making the request at time you request a page from them.\r
+ But if you're going through a proxy, they will identify the\r
+ user name associated with the proxy, not you. A visit to\r
+ http://ident.junkbusters.com lets you see what's happening.\r
+ This test is (quite rightly) blocked by many firewalls; just\r
+ interrupt the transfer if you get an abnormal wait after\r
+ clicking. Running other applications may also expose you via\r
+ <code>identd</code>; the proxy of course doesn't help then.</p>\r
+\r
+ <h3><a name="detect"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Can web sites tell that I'm using\r
+ the Internet Junkbuster?</h3>\r
+\r
+ <p>With the default options the proxy doesn't announce itself.\r
+ Obvious indications such as Keep-Alive headers are <a href=\r
+ "ijbman.html#o_x">deleted,</a> but sites might notice that you\r
+ can cancel cookies faster than any human could possibly click\r
+ on a mouse. (If you want to provide a plausible explanation for\r
+ this, change the User Agent header to a cookie-free or\r
+ cookie-crunching browser).</p>\r
+\r
+ <p><a name="figure"></a>But when certain options are used they\r
+ could figure out something's going on, even if they're not\r
+ pushing cookies. If you use blocking they can tell from their\r
+ logs that the graphics in their pages are not being requested\r
+ selectively. The <a href="ijbman.html#add-forwarded-header">\r
+ add-forwarded-header</a> option explicitly announces to the\r
+ server that a proxy is present, and sending them wafers is of\r
+ course a dead giveaway.</p>\r
+\r
+ <p align="center"><a href="#top_of_page"><img border="0" src=\r
+ "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
+ "15"></a></p>\r
+\r
+ <h2><a name="security"></a> Security</h2>\r
+\r
+ <h3><a name="encrypt"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> What happens with Secure\r
+ Documents (SSL, https:)?</h3>\r
+\r
+ <p>If you enter a ``Secure Document Area,'' cookies and other\r
+ header information such as User Agent and Referer are sent\r
+ encrypted, so they cannot be filtered. We recommend getting\r
+ your browser to alert you when this happens. (On Netscape: <b\r
+ class="eg">Options</b>; <b class="eg">Security</b>; <b class=\r
+ "eg">General</b>; <b class="eg">Show an alert before entering a\r
+ secure document space</b>.) We also recommend adding the line\r
+ <code>:443</code> to the blockfile to stop all but sites\r
+ specified in an exception after that line from using SSL.</p>\r
+\r
+ <p><a name="passage"></a>It may be possible to filter encrypted\r
+ cookies by combining the blocking proxy with a cryptographic\r
+ proxy along the lines of SafePassage, but we have not tried\r
+ this.</p>\r
+\r
+ <h3><a name="ssl"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Will using this as my Security\r
+ Proxy compromise security?</h3>\r
+\r
+ <p>We're not security experts, but we don't think so. The whole\r
+ point of SSL is that the contents of messages are \r
+ <!-- IEM: http://addy.com/dc/html/what_is_ssl_.html -->\r
+ encrypted by the time they leave the browser and the server.\r
+ Eavesdroppers (including proxies) can see where your messages\r
+ are going whether you are running a proxy or not, but they only\r
+ get to see the contents after they have been encrypted.</p>\r
+\r
+ <h3><a name="restrict"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Can I restrict use of the proxy\r
+ to a set of nominated IP addresses?</h3>\r
+\r
+ <p>Yes, we added an <a href="ijbman.html#aclfile">access\r
+ control</a> file in Version 2.0. But before you use it please\r
+ consider why you want to do it. If the reason is security, it\r
+ probably means you need a firewall.</p>\r
+\r
+ <p><a name="selective"></a>The <a href=\r
+ "ijbman.html#listen-address">listen-address</a> option provides\r
+ a way of binding the proxy to a single IP address/port. The\r
+ right way to do this is to choose a port inside your firewall,\r
+ and deny access to it to those outside the firewall. The\r
+ Internet Junkbuster is not a firewall proxy; it should not be\r
+ expected to solve security problems.</p>\r
+\r
+ <p><a name="firewall"></a>For background information on\r
+ firewalls, see Yahoo or a magazine article or these well-known\r
+ books: <cite>Firewalls and Internet Security: Repelling the\r
+ Wily Hacker</cite> by William R. Cheswick and Steven M.\r
+ Bellovin or <cite>Building Internet Firewalls</cite> by D.\r
+ Brent Chapman and Elizabeth D. Zwicky. There's \r
+ <!-- IEM: http://www.wmd.de/wmd/staff/pauck/misc/fwtk_on_linux.html -->\r
+ free Linux software available, and a large number of commercial\r
+ products and services. For an excellent security overview,\r
+ primer, and compendium reference, see <cite>Practical Unix and\r
+ Internet Security</cite> by Simson Garfinkel and Gene\r
+ Spafford.</p>\r
+\r
+ <h3><a name="others"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Are there any security risks for\r
+ ISPs or others who offer the proxy?</h3>\r
+\r
+ <p>Yes. As with any service offered over the Internet, hackers\r
+ can try to misuse it. A well-run ISP will have professionals\r
+ who are experienced at assessing and containing these\r
+ risks.</p>\r
+\r
+ <p><a name="outside"></a>It's possible to set up your machine\r
+ so that other people can have access to your proxy, but if you\r
+ lack expertise in computer security you probably shouldn't have\r
+ your computer configured to offer this or any other service to\r
+ the outside world.</p>\r
+\r
+ <p><a name="attack"></a>Hackers can attempt to gain access to\r
+ the machine by various attacks, which we have tried to guard\r
+ against but don't guarantee to thwart. They can also use the\r
+ ``anonymizing'' quality of proxies to try to cover their tracks\r
+ while hacking other computers. For this reason we recommend\r
+ preventing it being used as an anonymous <code>telnet</code> by\r
+ putting the pattern <code>:23</code> in the blockfile (it's\r
+ included as standard equipment). (Actually the current\r
+ implementation incidentally blocks telnet due to the way\r
+ headers are handled, but it's best not to rely on this.) If you\r
+ wish to block all ports except the default HTTP port 80, you\r
+ can put the lines<br>\r
+ <code>:</code><br>\r
+ <code>~:80</code><br>\r
+ at the beginning of the blockfile, but be aware that some\r
+ servers run on non-default ports (e.g. 8080). You might also\r
+ want to add the line <code>~:443</code> to allow SSL.</p>\r
+\r
+ <p><a name="root"></a>On UNIX ® systems it is neither\r
+ necessary nor desirable for the proxy to run as root.</p>\r
+\r
+ <p><a name="patched"></a>Versions 2.0.1 and below may be\r
+ vulnerable to remote exploitation of a memory buffer bug; for\r
+ security reasons all users are encouraged to upgrade.</p>\r
+\r
+ <p><a name="holes"></a>If you find any security holes in the\r
+ code please tell us, along with any suggestions you may have\r
+ for fixing it. However, we do not claim that we will be able to\r
+ do so.</p>\r
+\r
+ <p><a name="useful"></a>We distribute this code in the hope\r
+ that people will find it useful, but we provide no warranty for\r
+ it, and we are not responsible for anyone's use or misuse of\r
+ it.</p>\r
+\r
+ <p><a name="updates"></a>You may also want to check back\r
+ periodically for updated versions of the code. We do not\r
+ currently maintain a mailing list. To get quick updates,\r
+ bookmark our Distribution Information page.</p>\r
+\r
+ <p align="center"><a href="#top_of_page"><img border="0" src=\r
+ "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
+ "15"></a></p>\r
+\r
+ <p class="sans"><a href="http://ijbswa.sourceforge.net/">\r
+ Website</a> <b class="dot">·</b> <a href="ijbman.html">\r
+ Manual</a> <b class="dot">·</b> <b>FAQ</b> <b class=\r
+ "dot">·</b> <a href="gpl.html">GPL</a></p>\r
+\r
+ <p class="sans"><small><small><a href="gpl.html#text">\r
+ Copyright</a> © 1996-8 <a href=\r
+ "http://www.junkbusters.com/">Junkbusters</a> <a href=\r
+ "http://www.junkbusters.com/ht/en/legal.html#marks">®</a>\r
+ Corporation. <a href="gpl.html#text">Copyright</a> © 2001\r
+ <a href="http://sourceforge.net/projects/ijbswa/">Jon\r
+ Foster</a>. Copying and distribution permitted under the <a\r
+ href="gpl.html">GNU</a> General Public\r
+ License.</small></small></p>\r
+\r
+ <p><small><code><a href=\r
+ "http://sourceforge.net/projects/ijbswa/">\r
+ http://sourceforge.net/projects/ijbswa/</a></code></small></p>\r
+ </body>\r
</html>\r
+\r
-<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">\r
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">\r
+<!-- $Id$\r
+\r
+ See copyright details at end of file\r
+\r
+ After changing this file, please run it through "HTML Tidy"\r
+ (from http://www.w3.org/People/Raggett/tidy/)\r
+ It should have no warnings or errors.\r
+-->\r
+\r
<html>\r
-<head>\r
-<!-- Copyright 1996-8 Junkbusters Corporation -->\r
-<!-- This work comes with NO WARRANTY -->\r
-<!-- It may be redistributed and modified under the GNU GPL-->\r
-<!-- See the body of http://www.junkbusters.com/ht/en/gpl.html for details-->\r
-<!-- Junkbusters is a registered trade mark of Junkbusters Corporation -->\r
-<!-- Generated 1998/10/31 03:58:25 UTC -->\r
-<meta name="Generator" content="Junkbusters Ebira $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $">\r
-<!-- Document ID: $Revision: 1.1 $ $Date: 2001/04/16 21:10:38 $ -->\r
-<title>\r
-Internet Junkbuster Technical Information\r
-</title>\r
-<base href="http://www.junkbusters.com/ht/en/ijbman.html">\r
-<meta name="description" content="The manual page for the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser.">\r
-<meta name="keywords" content="stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, spamoff, declare, telemarketing, telemarketers, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, conservation, recycling, catalogs, consumer, sending, opt out ">\r
-<link rel="next" href="cookies.html">\r
-<link rel="previous" href="ijbfaq.html">\r
-<link rel="contents" href="toc.html">\r
-</head>\r
-<body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink="#787878">\r
-<center>\r
-<h1><a name="top_of_page">Internet J<small>UNK<i><font color=red>BUSTER</font></i></small> Technical Information\r
-</a></h1>\r
-</center>\r
-<font face="arial, helvetica">\r
-<p align="center">\r
-<a href="#description">Options</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="#show">Checking Options</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="#install">Installation</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="#copyright">Copyright</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="ijbfaq.html#top_of_page">(FAQ)</a>\r
-</p>\r
-</font><br>\r
-<center>\r
-<h2><a name="man"><font face="arial, helvetica">\r
-Manual Page\r
-</font></a>\r
-</h2>\r
-</center>\r
-<br>A copy of this page\r
-in standard\r
-<big><kbd>man</kbd></big>\r
-macro format\r
-is included in the\r
-<a href="ijbfaq.html#tar">tar archive</a>.\r
-\r
-<h3><a name="name" href="/cgi-bin/gp?pg=ijbman&pr=name"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Name\r
-</h3>\r
-<p>\r
-<b><kbd>junkbuster</kbd></b>\r
-- The\r
-Internet Junkbuster\r
-Proxy\r
-<a href="legal.html#marks"><small><sup>TM</sup></small></a>\r
-</p>\r
-\r
-<h3><a name="synopsis" href="/cgi-bin/gp?pg=ijbman&pr=synopsis"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Synopsis\r
-</h3>\r
-<p>\r
-<b><kbd>junkbuster</kbd></b>\r
-<i>configfile</i>\r
-(Version 2.0 onwards)\r
-<br>\r
-<b><kbd>junkbstr.exe</kbd></b>\r
-<i>configfile</i>\r
-(Windows)\r
-<br>\r
-<b><kbd>junkbuster</kbd></b>\r
-<a href="#o_a">[-a]</a>\r
-<a href="#o_y">[-y]</a>\r
-<a href="#o_s">[-s]</a>\r
-<a href="#o_c">[-c]</a>\r
-<a href="#o_v">[-v]</a>\r
-<br>\r
-<a href="#o_u">[-u user_agent]</a>\r
-<a href="#o_r">[-r referer]</a>\r
-<a href="#o_t">[-t from]</a>\r
-<br>\r
-<a href="#o_b">[-b blockfile]</a>\r
-<a href="#o_j">[-j jarfile]</a>\r
-<a href="#o_l">[-l logfile]</a>\r
-<br>\r
-<a href="#o_w">[-w NAME=VALUE]</a>\r
-<a href="#o_x">[-x Header_text]</a>\r
-<br>\r
-<a href="#o_h">[-h [bind_host_address][:bind_port]]</a>\r
-<br>\r
-<a href="#o_f">[-f forward_host[:port]]</a>\r
-<a href="#o_d">[-d N]</a>\r
-<br>\r
-<a href="#o_g">[-g gw_protocol[:[gw_host][:gw_port]]]</a>\r
-<br>\r
-(Version 1.4 and earlier)\r
-</p>\r
-\r
-<h3><a name="description" href="/cgi-bin/gp?pg=ijbman&pr=description"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Description\r
-</h3>\r
-<p>\r
-<b><kbd>junkbuster</kbd></b>\r
-is an instrumentable proxy that filters the \r
-<small>HTTP</small>\r
-stream between\r
-web servers and browsers.\r
-Its main purpose is to enhance privacy.\r
-<p>\r
-<a name="dual">Versions before 2.0 used command-line options;</a>\r
-Versions from 2.0 onward use a configuration file.\r
-The following descriptions of the options first give the older\r
-command-line usage, then the new configfile line.\r
-<p>\r
-<a name="won">In Versions 2.0.1 upwards on Windows,</a>\r
-a start-up message is printed and the configuration is read from the file\r
-<big><kbd>junkbstr.ini</kbd></big>\r
-if it exists and no argument was given.\r
-<p>\r
-<a name="reread">All files except the configfile</a>\r
-are checked for changes before each page is fetched,\r
-so they may edited without restarting the proxy.\r
-<h4>Options\r
-</h4>\r
-<dl><p><dt><i><a name="o_b">-b blockfile</a></i><br><a name="blockfile"><tt>blockfile</tt>  <i>blockfile</i></a><dd>\r
-<a href="ijbfaq.html#blocking">Block</a>\r
-requests to\r
-<small>URL</small>s\r
-matching any pattern given in the lines of the\r
-<i>blockfile</i>.\r
-The\r
-<b><kbd>junkbuster</kbd></b>\r
-instead returns status 202, indicating that the request has been accepted\r
-(though not completed),\r
-and a\r
-<a href="ijbfaq.html#show">message identifying itself</a>\r
-(though the browser may\r
-display only a broken image icon).\r
-(Versions before 2.0 returned an error 403 (Forbidden).)\r
-The syntax of a pattern is\r
-<big><kbd>[domain][:port][/path]</kbd></big>\r
-(the\r
-<big><kbd>http://</kbd></big>\r
-or\r
-<big><kbd>https://</kbd></big>\r
-protocol part is omitted).\r
-To decide if a pattern matches a target, the domains are compared first,\r
-then the paths. \r
-<p>\r
-<a name="compare">To compare the domains,</a>\r
-the pattern domain and the target\r
-domain specified in the\r
-<small>URL</small>\r
-are each broken into their components.\r
-(Components are separated by the\r
-<big><kbd>.</kbd></big>\r
-(period) character.)\r
-Next each of the target components\r
-is compared with the corresponding pattern component: last with last,\r
-next-to-last with next-to-last, and so on.\r
-(This is called\r
-<i><dfn>right-anchored</dfn></i>\r
-matching.)\r
-If all of the pattern components find their match in the target,\r
-then the domains are considered a match.\r
-Case is irrelevant when comparing domain components.\r
-<p>\r
-<a name="substring">A successfully</a>\r
-matching pattern can be an anchored substring of a target, but\r
-not vice versa.\r
-Thus if a pattern doesn't specify a domain,\r
-it matches all domains.\r
-<a name="wildcard">Furthermore, when comparing two components,</a>\r
-the components must either match in their entirety or up to a wildcard\r
-<big><kbd>* </kbd></big>\r
-(star character) in the pattern. The wildcard feature\r
-implements only a "prefix" match capability ("abc*" vs. "abcdefg"),\r
-not suffix matching ("*efg" vs. "abcdefg") or\r
-infix matching ("abc*efg" vs. "abcdefg").\r
-The feature is restricted to the domain component;\r
-it is unrelated to the optional\r
-regular expression\r
-feature in the path\r
-<a href="ijbman.html#regex">(described below).</a>\r
-<p>\r
-<a name="numeric">If a numeric port</a>\r
-is specified in the pattern domain, then the target port must\r
-match as well. The default port in a target is port 80.\r
-<p>\r
-<a name="onward">If the domain and port match,</a>\r
-then the target\r
-<small>URL</small>\r
-path is checked for\r
-a match against the path in the pattern.\r
-Paths are compared with a simple case-sensitive\r
-left-anchored substring comparison.\r
-Once again, the pattern can be an\r
-anchored substring of the target, but not vice versa.\r
-A path of\r
-<big><kbd>/</kbd></big>\r
-(slash) would match all paths. Wildcards are not considered in\r
-path comparisons.\r
-<p>\r
-<a name="example">For example, the target</a>\r
-<small>URL</small>\r
-<br>\r
-   <big><kbd>the.yellow-brick-road.com/TinMan/has_no_brain</kbd></big>\r
-<br>\r
-would be matched (and blocked) by the following patterns\r
-<br>\r
-   <big><kbd>yellow-brick-road.com</kbd></big>\r
-<br>\r
-and\r
-<br>\r
-   <big><kbd>Yellow*.COM</kbd></big>\r
-<br>\r
-and\r
-<br>\r
-   <big><kbd>/TinM</kbd></big>\r
-<br>\r
-but not\r
-<br>\r
-   <big><kbd>follow.the.yellow-brick-road.com</kbd></big>\r
-<br>\r
-or\r
-<br>\r
-   <big><kbd>/tinman</kbd></big>\r
-<br>\r
-<p>\r
-<a name="comments">Comments in a blockfile start with a</a>\r
-<big><kbd>#</kbd></big>\r
-(hash) character and end at a new line.\r
-Blank lines are also ignored.\r
-<p>\r
-<a name="except">Lines beginning with a</a>\r
-<big><kbd>~</kbd></big>\r
-(tilde) character are taken to be\r
-<a href="ijbfaq.html#exceptions">exceptions:</a>\r
-a\r
-<small>URL</small>\r
-blocked by previous patterns that matches the rest of\r
-the line is let through. (The last match wins.)\r
-<p>\r
-<a name="regex">Patterns</a>\r
-may contain\r
-<small>POSIX</small>\r
-<a href="ijbfaq.html#regex">regular expressions</a>\r
-provided the\r
-<b><kbd>junkbuster</kbd></b>\r
-was compiled with this option\r
-(the default in Version 2.0 on).\r
-The idiom\r
-<big><kbd>/*.*/ad</kbd></big>\r
-can then be used\r
-to match any\r
-<small>URL</small>\r
-containing\r
-<big><kbd>/ad</kbd></big>\r
-(such as\r
-<big><kbd>http://nomatterwhere.com/images/advert/g3487.gif</kbd></big>\r
-for example).\r
-These expressions\r
-<a href="ijbman.html#substring">don't work</a>\r
-in the domain part.\r
-<p>\r
-<a name="rereads">In version 1.3 and later</a>\r
-the blockfile and cookiefile are checked for changes before each request.\r
-<p><dt><i><a name="o_w">-w NAME=VALUE</a></i><br><a name="wafer"><tt>wafer</tt>  <i>NAME=VALUE</i></a><dd>\r
-Specifies a pair to be sent as a cookie with every request\r
-<a href="ijbfaq.html#wafers">to the server.</a>\r
-(Such boring cookies are called\r
-<i>wafers</i>.)\r
-This option may be called more than once to generate multiple wafers.\r
-The original\r
-Netscape specification\r
-prohibited\r
-semi-colons, commas and white space;\r
-these characters will be\r
-<small>URL</small>-encoded\r
-if used in wafers.\r
-<!-- Aside: genuine cookies are not encoded -->\r
-<!-- Aside: we could use quoted string as specified in the new RFC -->\r
-The Path and Domain attributes are not currently supported.\r
-<p><dt><i><a name="o_c">-c cookiefile</a></i><br><a name="cookiefile"><tt>cookiefile</tt>  <i>cookiefile</i></a><dd>\r
-Enforce the cookie management policy specified in the\r
-<i>cookiefile.</i>\r
-<a name="java">If this option is not used all cookies are silently crunched,</a>\r
-so that users who never want cookies aren't bothered by browsers\r
-asking whether each cookie should be accepted.\r
-However, cookies can\r
-<a href="ijbfaq.html#breakthrough">still get through</a>\r
-via\r
-<a href="links.html#javascript">JavaScript</a>\r
-and\r
-<small>SSL</small>,\r
-so alerts should be left on.\r
-<p>\r
-<a name="dropping">In Version 1.2 and later</a>\r
-this option must be followed by a\r
-<a href="ijbfaq.html#crumble">filename</a>\r
-containing instructions on which sites are allowed to\r
-receive and set cookies.\r
-<a name="drop">By default cookies are dropped in both the browser's request</a>\r
-and the server's response, unless the\r
-<small>URL</small>\r
-requested matches an entry in the\r
-<i>cookiefile</i>.\r
-The matching algorithm is the same as for the blockfile.\r
-A leading\r
-<big><kbd>></kbd></big>\r
-character allows\r
-<a href="ijbfaq.html#directional">server-bound</a>\r
-cookies only;\r
-a\r
-<big><kbd><</kbd></big>\r
-allows only browser-bound cookies;\r
-a\r
-<big><kbd>~</kbd></big>\r
-character stops cookies in\r
-<a href="ijbfaq.html#crumble">both directions.</a>\r
-Thus a cookiefile containing a single line with the two characters\r
-<big><kbd>>*</kbd></big>\r
-will pass on all cookies to servers but not give any new ones to the browser.\r
-<p><dt><i><a name="o_j">-j jarfile</a></i><br><a name="jarfile"><tt>jarfile</tt>  <i>jarfile</i></a><dd>\r
-All Set-cookie attempts by the server are\r
-<a href="ijbfaq.html#jar">logged</a>\r
-to\r
-<i>jarfile</i>.\r
-If no wafer is specified,\r
-one containing a\r
-<a href="ijbfaq.html#notice">canned notice</a>\r
-(the \r
-<i>vanilla wafer</i>)\r
-is added as an alert to the server\r
-unless the\r
-<a href="ijbman.html#suppress-vanilla-wafer">suppress-vanilla-wafer</a>\r
-<!-- Aside: (no vanilla~wafer) -->\r
-option is invoked.\r
-<p><dt><i><a name="o_v">-v</a></i><br><a name="suppress-vanilla-wafer"><tt>suppress-vanilla-wafer</tt></a><dd>\r
-Suppress the vanilla wafer.\r
-<p><dt><i><a name="o_t">-t from</a></i><br><a name="from"><tt>from</tt>  <i>from</i></a><dd>\r
-If the browser\r
-<a href="ijbfaq.html#from">discloses an email address</a>\r
-in the\r
-<big><kbd>FROM</kbd></big>\r
-header (most don't),\r
-replace it with\r
-<i>from.</i>\r
-If\r
-<i>from</i>\r
-is set to\r
-<b>.</b>\r
-(the period character)\r
-the\r
-<big><kbd>FROM</kbd></big>\r
-is passed to the server unchanged.\r
-The default is to delete the\r
-<big><kbd>FROM</kbd></big>\r
-header.\r
-<p><dt><i><a name="o_r">-r referer</a></i><br><a name="referer"><tt>referer</tt>  <i>referer</i></a><dd>\r
-Whenever the browser discloses the\r
-<small>URL</small>\r
-that\r
-<a href="ijbfaq.html#referer">led to</a>\r
-the current request,\r
-replace it with\r
-<i>referer.</i>\r
-If\r
-<i>referer</i>\r
-is set to\r
-<b>.</b>\r
-(period)\r
-the \r
-<small>URL</small>\r
-is passed to the server unchanged.\r
-In \r
-Version <a href="ijbdist.html#c4">1.4</a>\r
-and later, if referer is set to \r
-<b>@</b>\r
-(at) the\r
-<small>URL</small>\r
-is sent in cases where the cookiefile\r
-specifies that a cookie would be sent.\r
-(No way to send bogus referers selectively is provided.)\r
-The default is to delete Referer.\r
-<p>\r
-<a name="referrer">Version 2.0 also accepts the spelling</a>\r
-<big><kbd>referrer</kbd></big>,\r
-which most dictionaries consider correct.\r
-<p><dt><i><a name="o_u">-u user-agent</a></i><br><a name="user-agent"><tt>user-agent</tt>  <i>user-agent</i></a><dd>\r
-Information disclosed by the browser\r
-<a href="ijbfaq.html#agent">about itself</a>\r
-is replaced with the value\r
-<i>user-agent.</i>\r
-If\r
-<i>user-agent</i>\r
-is set to\r
-<b>.</b>\r
-(period)\r
-the\r
-<big><kbd>User-Agent</kbd></big>\r
-header is passed to the server unchanged,\r
-along with any\r
-<big><kbd>UA</kbd></big>\r
-headers produced by\r
-<small>MS-IE</small>\r
-(which would otherwise be deleted).\r
-In \r
-Version <a href="ijbdist.html#c4">1.4</a>\r
-and later, if\r
-<i>user-agent</i>\r
-is set to\r
-<b>@</b>\r
-(at) these headers are sent unchanged in cases where the cookiefile\r
-specifies that a cookie would be sent,\r
-otherwise only default\r
-<big><kbd>User-Agent</kbd></big>\r
-header is sent.\r
-That default\r
-is Mozilla/3.0 (Netscape)\r
-with an unremarkable\r
-<a href="ijbfaq.html#infer">Macintosh</a>\r
-configuration.\r
-If used with a browser less advanced than Mozilla/3.0 or IE-3, the default\r
-may encourage pages containing extensions that confuse the browser.\r
-<!-- Aside: Some servers use extensions to everyone anyway. But in that case it's probably ignoring cookies anyway. Some servers attempt to send cookies only to browsers identifying themselves as Mozilla. -->\r
-<p><dt><i><a name="o_h">-h [host][:port]</a></i><br><a name="listen-address"><tt>listen-address</tt>  <i>[host][:port]</i></a><dd>\r
-If\r
-<i>host</i>\r
-is specified,\r
-bind the\r
-<b><kbd>junkbuster</kbd></b>\r
-to that\r
-<small>IP</small>\r
-address.\r
-If a\r
-<i>port</i>\r
-is specified, use it.\r
-The default\r
-port\r
-is 8000;\r
-the default host is\r
-<big><kbd>localhost</kbd></big>.\r
-Before Version 2.0.2,\r
-the default was to bind to all \r
-<small>IP</small>\r
-addresses\r
-(<big><kbd>INADDR_ANY</kbd></big>);\r
-but this has been restricted to\r
-<big><kbd>localhost</kbd></big>\r
-to avoid unintended security breaches.\r
-(To open the proxy to all, use the line\r
-<br>\r
-   <big><kbd>listen-address :8000</kbd></big>\r
-<br>\r
-in the configuration file.)\r
-<p><dt><i><a name="o_f">-f forward_host[:port]</a></i><br><a name="forwardfile"><tt>forwardfile</tt>  <i>forwardfile</i></a><dd>\r
-Version 1.X required all\r
-<small>HTTP</small>\r
-requests from the client to be forwarded to the same destination.\r
-Version 2.0 takes its routing specification from a\r
-<i>forwardfile</i>,\r
-allowing selection of the proxy (a.k.a. forwarding host) and gateway\r
-according to the\r
-<small>URL</small>.\r
-Here is a typical line.\r
-<br>\r
+ <head>\r
+ <title>Internet Junkbuster Technical Information</title>\r
+ <meta name="description" content=\r
+ "The manual page for the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser.">\r
+ <meta name="keywords" content=\r
+ "stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, consumer, sending, opt out ">\r
+<style type="text/css">\r
+<!--\r
+h2 { text-align: Center; font-family: arial, helvetica, sans-serif }\r
+p.sans { font-family: arial, helvetica, sans-serif }\r
+b.dot { color: #FF0000 }\r
+b.eg { font-family: arial, helvetica, sans-serif }\r
+-->\r
+</style>\r
+ </head>\r
+\r
+ <body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink=\r
+ "#787878">\r
+ <p class="sans"><a href="http://ijbswa.sourceforge.net/">\r
+ Website</a> <b class="dot">·</b> <b>Manual</b> <b class=\r
+ "dot">·</b> <a href="ijbfaq.html">FAQ</a> <b class=\r
+ "dot">·</b> <a href="gpl.html">GPL</a></p>\r
+\r
+ <h1 align="center"><a name="top_of_page"></a>Internet\r
+ J<small>UNK<i style="color: #FF0000">BUSTER</i></small>\r
+ Technical Information</h1>\r
+\r
+ <p align="center" class="sans"><a href="#description">\r
+ Options</a> <b class="dot">·</b> <a href="#show">\r
+ Checking Options</a> <b class="dot">·</b> <a href=\r
+ "#install">Installation</a> <b class="dot">·</b> <a\r
+ href="#copyright">Copyright</a> <b class="dot">·</b> <a\r
+ href="ijbfaq.html#top_of_page">(FAQ)</a></p>\r
+\r
+ <h1>This document is out of date</h1>\r
+\r
+ <p><b>Development of JunkBuster is ongoing and this document is\r
+ no longer current. However, it may provide some assistance. If\r
+ you have problems, please use the <a href=\r
+ "http://groups.yahoo.com/group/junkbuster-users/">Yahoo Groups\r
+ mailing list</a> (which includes an archive of mail), the\r
+ SourceForge.net <a href=\r
+ "http://sourceforge.net/projects/ijbswa/">project page</a>, or\r
+ see the project's <a href="http://ijbswa.sourceforge.net/">home\r
+ page</a>. Please also bear in mind that versions 2.9.x of\r
+ JunkBuster are development releases, and are not production\r
+ quality.</b></p>\r
+\r
+ <h2><a name="man"></a>Manual Page</h2>\r
+\r
+ <p>A copy of this page in standard <code>man</code> macro\r
+ format is included in the <a href="ijbfaq.html#tar">tar\r
+ archive</a>.</p>\r
+\r
+ <h3><a name="name"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Name</h3>\r
+\r
+ <p><b><code>junkbuster</code></b> - The Internet Junkbuster\r
+ Proxy <a href=\r
+ "http://www.junkbusters.com/ht/en/legal.html#marks"><small>\r
+ <sup>TM</sup></small></a></p>\r
+\r
+ <h3><a name="synopsis"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Synopsis</h3>\r
+\r
+ <p><code><b>junkbuster</b></code> <i>configfile</i> (Unix)<br>\r
+ <b><code>junkbstr.exe</code></b> [<i>configfile</i>]\r
+ (Windows)</p>\r
+\r
+ <h3><a name="description"></a><img border="0" src="fb.gif" alt=\r
+ "*" width="14" height="14"> Description</h3>\r
+\r
+ <p><b><code>junkbuster</code></b> is an instrumentable proxy\r
+ that filters the HTTP stream between web servers and browsers.\r
+ Its main purposes are to block adverts and enhance privacy.</p>\r
+\r
+ <p><a name="dual"></a>It is configured using a configuration\r
+ file and several files listing URL patterns. The\r
+ configuration file must be specified on the command line. \r
+ The Windows version will default to using the configuration\r
+ file <code>junkbstr.ini</code> if it exists and no argument was\r
+ given.</p>\r
+\r
+ <p><a name="reread"></a>All files except the main configuration\r
+ file are checked for changes before each page is fetched, so\r
+ they may edited without restarting the proxy.</p>\r
+\r
+ <h4>Options</h4>\r
+\r
+ <dl>\r
+ <dt><i><a name="o_b"></a></i><a name=\r
+ "blockfile"></a><code>blockfile</code> <i>\r
+ blockfile</i></dt>\r
+\r
+ <dd>\r
+ <p><a href="ijbfaq.html#blocking">Block</a> requests to\r
+ URLs matching any pattern given in the lines of the <i>\r
+ blockfile</i>. The <b><code>junkbuster</code></b> instead\r
+ returns status 202, indicating that the request has been\r
+ accepted (though not completed), and a <a href=\r
+ "ijbfaq.html#show">message identifying itself</a> (though\r
+ the browser may display only a broken image icon). \r
+ The syntax of a pattern is <code>\r
+ [domain][:port][/path]</code> (the <code>http://</code> or\r
+ <code>https://</code> protocol part is omitted). To decide\r
+ if a pattern matches a target, the domains are compared\r
+ first, then the paths.</p>\r
+\r
+ <p><a name="compare"></a>To compare the domains, the\r
+ pattern domain and the target domain specified in the URL\r
+ are each broken into their components. (Components are\r
+ separated by the <code>.</code> (period) character.) Next\r
+ each of the target components is compared with the\r
+ corresponding pattern component: last with last,\r
+ next-to-last with next-to-last, and so on. (This is called\r
+ <i><dfn>right-anchored</dfn></i> matching.) If all of the\r
+ pattern components find their match in the target, then the\r
+ domains are considered a match. Case is irrelevant when\r
+ comparing domain components.</p>\r
+\r
+ <p><a name="substring"></a>A successfully matching pattern\r
+ can be an anchored substring of a target, but not vice\r
+ versa. Thus if a pattern doesn't specify a domain, it\r
+ matches all domains. <a name="wildcard"></a>Furthermore,\r
+ when comparing two components, the components must either\r
+ match in their entirety or up to a wildcard <code>*</code>\r
+ (star character) in the pattern. The wildcard feature\r
+ implements only a "prefix" match capability ("abc*" vs.\r
+ "abcdefg"), not suffix matching ("*efg" vs. "abcdefg") or\r
+ infix matching ("abc*efg" vs. "abcdefg"). The feature is\r
+ restricted to the domain component; it is unrelated to the\r
+ optional regular expression feature in the path <a href=\r
+ "#regex">(described below).</a></p>\r
+\r
+ <p><a name="numeric"></a>If a numeric port is specified in\r
+ the pattern domain, then the target port must match as\r
+ well. The default port in a target is port 80.</p>\r
+\r
+ <p><a name="onward"></a>If the domain and port match, then\r
+ the target URL path is checked for a match against the path\r
+ in the pattern. Paths are compared with a simple\r
+ case-sensitive left-anchored substring comparison. Once\r
+ again, the pattern can be an anchored substring of the\r
+ target, but not vice versa. A path of <code>/</code>\r
+ (slash) would match all paths. Wildcards are not considered\r
+ in path comparisons.</p>\r
+\r
+ <p><a name="example"></a>For example, the target URL<br>\r
+ <code>\r
+ the.yellow-brick-road.com/TinMan/has_no_brain</code><br>\r
+ would be matched (and blocked) by the following\r
+ patterns<br>\r
+ <code>yellow-brick-road.com</code><br>\r
+ and<br>\r
+ <code>Yellow*.COM</code><br>\r
+ and<br>\r
+ <code>/TinM</code><br>\r
+ but not<br>\r
+ <code>\r
+ follow.the.yellow-brick-road.com</code><br>\r
+ or<br>\r
+ <code>/tinman</code><br>\r
+ </p>\r
+\r
+ <p><a name="comments"></a>Comments in a blockfile start\r
+ with a <code>#</code> (hash) character and end at a new\r
+ line. Blank lines are also ignored.</p>\r
+\r
+ <p><a name="except"></a>Lines beginning with a <code>\r
+ ~</code> (tilde) character are taken to be <a href=\r
+ "ijbfaq.html#exceptions">exceptions:</a> a URL blocked by\r
+ previous patterns that matches the rest of the line is let\r
+ through. (The last match wins.)</p>\r
+\r
+ <p><a name="regex"></a>Patterns may contain POSIX <a href=\r
+ "ijbfaq.html#regex">regular expressions</a> provided the\r
+ <b><code>junkbuster</code></b> was compiled with this\r
+ option (the default in Version 2.0 on). The idiom <code>\r
+ /*.*/ad</code> can then be used to match any URL containing\r
+ <code>/ad</code> (such as <code>\r
+ http://nomatterwhere.com/images/advert/g3487.gif</code> for\r
+ example). These expressions <a href="#substring">don't\r
+ work</a> in the domain part.</p>\r
+\r
+ <p><a name="rereads"></a>In version 1.3 and later the\r
+ blockfile and cookiefile are checked for changes before\r
+ each request.</p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_w"></a></i><a name=\r
+ "wafer"></a><code>wafer</code> <i>\r
+ NAME=VALUE</i></dt>\r
+\r
+ <dd>\r
+ <p>Specifies a pair to be sent as a cookie with every\r
+ request <a href="ijbfaq.html#wafers">to the server.</a>\r
+ (Such boring cookies are called <i>wafers</i>.) This option\r
+ may be called more than once to generate multiple wafers.\r
+ The original Netscape specification prohibited semi-colons,\r
+ commas and white space; these characters will be\r
+ URL-encoded if used in wafers. \r
+ <!-- Aside: genuine cookies are not encoded --> \r
+ <!-- Aside: we could use quoted string as specified in the new RFC -->\r
+ The Path and Domain attributes are not currently\r
+ supported.</p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_c"></a></i><a name=\r
+ "cookiefile"></a><code>cookiefile</code> <i>\r
+ cookiefile</i></dt>\r
+\r
+ <dd>\r
+ <p>Enforce the cookie management policy specified in the\r
+ <i>cookiefile.</i> <a name="java"></a>If this option is not\r
+ used all cookies are silently crunched, so that users who\r
+ never want cookies aren't bothered by browsers asking\r
+ whether each cookie should be accepted. However, cookies\r
+ can <a href="ijbfaq.html#breakthrough">still get\r
+ through</a> via <a href=\r
+ "http://www.junkbusters.com/ht/en/links.html#javascript">\r
+ JavaScript</a> and SSL, so alerts should be left on.</p>\r
+\r
+ <p><a name="dropping"></a>In Version 1.2 and later this\r
+ option must be followed by a <a href="ijbfaq.html#crumble">\r
+ filename</a> containing instructions on which sites are\r
+ allowed to receive and set cookies. <a name="drop"></a>By\r
+ default cookies are dropped in both the browser's request\r
+ and the server's response, unless the URL requested matches\r
+ an entry in the <i>cookiefile</i>. The matching algorithm\r
+ is the same as for the blockfile. A leading <code>\r
+ ></code> character allows <a href=\r
+ "ijbfaq.html#directional">server-bound</a> cookies only; a\r
+ <code><</code> allows only browser-bound cookies; a\r
+ <code>~</code> character stops cookies in <a href=\r
+ "ijbfaq.html#crumble">both directions.</a> Thus a\r
+ cookiefile containing a single line with the two characters\r
+ <code>>*</code> will pass on all cookies to servers but\r
+ not give any new ones to the browser.</p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_j"></a></i><a name=\r
+ "jarfile"></a><code>jarfile</code> <i>\r
+ jarfile</i></dt>\r
+\r
+ <dd>\r
+ <p>All Set-cookie attempts by the server are <a href=\r
+ "ijbfaq.html#jar">logged</a> to <i>jarfile</i>. If no wafer\r
+ is specified, one containing a <a href=\r
+ "ijbfaq.html#notice">canned notice</a> (the <i>vanilla\r
+ wafer</i>) is added as an alert to the server unless the <a\r
+ href="#suppress-vanilla-wafer">suppress-vanilla-wafer</a>\r
+ option is invoked.</p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_v"></a></i><a name=\r
+ "suppress-vanilla-wafer"></a><code>suppress-vanilla-wafer</code></dt>\r
+\r
+ <dd>\r
+ <p>Suppress the vanilla wafer.</p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_t"></a></i><a name=\r
+ "from"></a><code>from</code> <i>from</i></dt>\r
+\r
+ <dd>\r
+ <p>If the browser <a href="ijbfaq.html#from">discloses an\r
+ email address</a> in the <code>FROM</code> header (most\r
+ don't), replace it with <i>from.</i> If <i>from</i> is set\r
+ to <b>.</b> (the period character) the <code>FROM</code> is\r
+ passed to the server unchanged. The default is to delete\r
+ the <code>FROM</code> header.</p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_r"></a></i><a name=\r
+ "referer"></a><code>referer</code> <i>\r
+ referer</i></dt>\r
+\r
+ <dd>\r
+ <p>Whenever the browser discloses the URL that <a href=\r
+ "ijbfaq.html#referer">led to</a> the current request,\r
+ replace it with <i>referer.</i> If <i>referer</i> is set to\r
+ <b>.</b> (period) the URL is passed to the server\r
+ unchanged. If referer is set to <b>@</b> (at) the URL is\r
+ sent in cases where the cookiefile specifies that a cookie\r
+ would be sent. (No way to send bogus referers selectively\r
+ is provided.) The default is to delete Referer.</p>\r
+\r
+ <p><a name="referrer"></a>Junkbuster also accepts the\r
+ spelling <code>referrer</code>, which most dictionaries\r
+ consider correct.</p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_u"></a></i><a name=\r
+ "user-agent"></a><code>user-agent</code> <i>\r
+ user-agent</i></dt>\r
+\r
+ <dd>\r
+ <p>Information disclosed by the browser <a href=\r
+ "ijbfaq.html#agent">about itself</a> is replaced with the\r
+ value <i>user-agent.</i> If <i>user-agent</i> is set to <b>\r
+ .</b> (period) the <code>User-Agent</code> header is passed\r
+ to the server unchanged, along with any <code>UA</code>\r
+ headers produced by MS-IE (which would otherwise be\r
+ deleted). If <i>user-agent</i> is set to <b>@</b> (at)\r
+ these headers are sent unchanged in cases where the\r
+ cookiefile specifies that a cookie would be sent, otherwise\r
+ only default <code>User-Agent</code> header is sent. That\r
+ default is Mozilla/3.0 (Netscape) with an unremarkable <a\r
+ href="ijbfaq.html#infer">Macintosh</a> configuration. If\r
+ used with a browser less advanced than Mozilla/3.0 or IE-3,\r
+ the default may encourage pages containing extensions that\r
+ confuse the browser.</p>\r
+ </dd>\r
+\r
+ <dt><a name="o_h"></a><a name=\r
+ "listen-address"></a><code>listen-address</code> \r
+ <i>[host][:port]</i></dt>\r
+\r
+ <dd>\r
+ <p>If <i>host</i> is specified, bind the <b><code>\r
+ junkbuster</code></b> to that IP address. If a <i>port</i>\r
+ is specified, use it. The default port is 8000; the default\r
+ host is <code>localhost</code>.</p>\r
+\r
+ <p>This default host setting means that you can only\r
+ connect to the proxy from ther local computer. This is a\r
+ security measure - if you allow anyone to use the proxy,\r
+ then hackers or fraudsters could use it to help hide their\r
+ identity. It also provides a lot of protection against any\r
+ undiscovered security flaws in JunkBuster - if they can't\r
+ connect to it, then they can't attack it.</p>\r
+\r
+ <p>If you change this value, we recommend you <i>either</i>\r
+ set the host to <code>localhost</code>:<br>\r
+ <code>listen-address\r
+ localhost:8080</code><br>\r
+ <i>or</i>, if you want to share a single internet\r
+ connection over your internal network, then set it to the\r
+ address of your internal ethernet card:<br>\r
+ <code>listen-address\r
+ 10.1.1.1:8080</code><br>\r
+ (replace 10.1.1.1 with your internal IP address), <i>\r
+ or</i> set up an <i><a href="#aclfile">aclfile</a></i>. To\r
+ make the proxy accessible from everywhere (e.g. if you're\r
+ using an access control list or if you just don't care\r
+ about security), specify just the port number - e.g:<br>\r
+ <code>listen-address :8000</code><br>\r
+ (This binds the proxy to <b>all</b> IP addresses\r
+ (<code>INADDR_ANY</code>)).</p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_f"></a></i><a name=\r
+ "forwardfile"></a><code>forwardfile</code> <i>\r
+ forwardfile</i></dt>\r
+\r
+ <dd>\r
+ <p>Junkbuster has a flexible syntax for forwarding HTTP\r
+ requests. This is used e.g. if you are behind a firewall\r
+ and need to connect through it, or if you want to use a\r
+ cacheing proxy to speed up your web browsing.</p>\r
+\r
+ <p>Every line in the forwardfile consists of four\r
+ components, seperated by whitespace. These are:<br>\r
+ <br>\r
+ <code><i>target forward_to via_gateway_type\r
+ gateway</i></code></p>\r
+\r
+ <p><i>target</i> is a pattern used to select which line of\r
+ the forwardfile is used. "<code>*</code>" is the most\r
+ commonly used value, and matches every URL. As usual, the\r
+ last matching <i>target</i> wins. (If no pattern matches, a\r
+ direct connection will be used)</p>\r
+\r
+ <p><i>forward_to</i> specifies the HTTP proxy server to\r
+ use, or "<code>.</code>" for none. This is used to connect\r
+ to a cacheing proxy such as Squid, and for most types of\r
+ firewall. The port number defaults to 8000 if it is not\r
+ specified.</p>\r
+\r
+ <p>Here is a typical line.</p>\r
<pre>\r
* lpwa.com:8000 . .\r
</pre>\r
-<p>\r
-<a name="lines">Each line contains four fields:</a>\r
-<big><kbd>target</kbd></big>,\r
-<big><kbd>forward_to</kbd></big>,\r
-<big><kbd>via_gateway_type</kbd></big>\r
-and\r
-<big><kbd>gateway</kbd></big>.\r
-As usual, the\r
-<a href="ijbman.html#compare">last</a>\r
-<big><kbd>target</kbd></big>\r
-domain that matches the requested\r
-<small>URL</small>\r
-wins,\r
-and the\r
-<big><kbd>*</kbd></big>\r
-character alone matches any domain.\r
-The target domain need not be a fully qualified\r
-hostname; it can be a general domain such as\r
-<big><kbd>com</kbd></big>\r
-or\r
-<big><kbd>co.uk</kbd></big>\r
-or even just a port number.\r
-<a name="nose">For example, because</a>\r
-<a href="http://lpwa.com">LPWA</a>\r
-does not handle\r
-<a href="ijbfaq.html#encrypt">SSL</a>,\r
-the line above will typically be followed by a line such as\r
-<br>\r
+\r
+ <p>The target domain need not be a fully qualified\r
+ hostname; it can be a general domain such as <code>\r
+ com</code> or <code>co.uk</code> or even just a port\r
+ number. <a name="nose"></a>For example, because <a href=\r
+ "http://lpwa.com">LPWA</a> does not handle <a href=\r
+ "ijbfaq.html#encrypt">SSL</a>, the line above will\r
+ typically be followed by a line such as</p>\r
<pre>\r
-:443 . . .\r
+:443 . . .\r
</pre>\r
-to allow SSL transactions to proceed directly.\r
-The cautious would also\r
-add an entry in their blockfile to stop transactions\r
-to port 443 for all but specified trusted sites.\r
-<p>\r
-<a name="forward">If the winning</a>\r
-<big><kbd>forward_to</kbd></big>\r
-field is\r
-<big><kbd>.</kbd></big>\r
-(the dot character) the proxy connects \r
-directly to the server given in the\r
-<small>URL</small>,\r
-otherwise it forwards to the host and port number specified.\r
-The default port is 8000.\r
-The\r
-<big><kbd>via_gateway_type</kbd></big>\r
-and\r
-<big><kbd>gateway</kbd></big>\r
-fields also use a dot to indicate no gateway protocol.\r
-The gateway protocols are explained\r
-<a href="ijbman.html#o_g">below</a>.\r
-<p>\r
-<a name="old">The example line above in a forwardfile alone</a>\r
-would send everything through port 8000 at\r
-<big><kbd>lpwa.com</kbd></big>\r
-with no gateway protocol,\r
-and is equivalent to the old\r
-<big><kbd>-f lpwa.com:8000</kbd></big>\r
-with no\r
-<big><kbd>-g</kbd></big>\r
-option.\r
-For more information see the example file provided with the distribution.\r
-<p>\r
-<a name="loop">Configure with care: no loop detection is performed.</a>\r
-When setting up chains of proxies that might loop back, try adding\r
-<a href="ijbman.html#squid">Squid.</a>\r
-<p><dt><i><a name="o_g">-g gw_protocol[:[gw_host][:gw_port]]</a></i><dd>\r
-Use\r
-<i>gw_protocol</i>\r
-as the gateway protocol.\r
-This option was introduced in Version 1.4,\r
-but was folded into the\r
-<a href="ijbman.html#forwardfile">forwardfile</a>\r
-option in Version 2.0.\r
-The default is to use no gateway protocol;\r
-this may be explicitly specified as\r
-<big><kbd>direct</kbd></big>\r
-on the command line\r
-or the dot character in the forwardfile.\r
-The\r
-<big><kbd>SOCKS4</kbd></big>\r
-protocol may be specified as\r
-<big><kbd>socks</kbd></big>\r
-or\r
-<big><kbd>socks4</kbd></big>.\r
-The\r
-<big><kbd>SOCKS4A</kbd></big>\r
-protocol is specified as\r
-<big><kbd>socks4a</kbd></big>.\r
-The\r
-<big><kbd>SOCKS5</kbd></big>\r
-protocol is not currently supported.\r
-The default\r
-<small>SOCKS</small>\r
-<i>gw_port</i>\r
-is 1080.\r
-<p>\r
-<a name="configure">The user's browser should</a>\r
-<em>not</em>\r
-be\r
-<a href="ijbfaq.html#socks">configured</a>\r
-to use\r
-<big><kbd>SOCKS</kbd></big>;\r
-the proxy conducts the negotiations, not the browser.\r
-<p>\r
-<a name="identify">The user identification capabilities of</a>\r
-<big><kbd>SOCKS4</kbd></big>\r
-are deliberately not used;\r
-the user is always identified to the\r
-<big><kbd>SOCKS</kbd></big>\r
-server as\r
-<big><kbd>userid=anonymous</kbd></big>.\r
-If the server's policy is to reject requests from\r
-<big><kbd>anonymous</kbd></big>,\r
-the proxy will not work.\r
-Use a\r
-<a href="ijbman.html#o_d">debug</a>\r
-value of 3\r
-to see the status returned by the server.\r
-<p><dt><i><a name="o_d">-d N</a></i><br><a name="debug"><tt>debug</tt>  <i>N</i></a><dd>\r
-Set debug mode.\r
-The most common value is 1,\r
-to\r
-<a href="ijbfaq.html#pinpoint">pinpoint</a>\r
-offensive\r
-<small>URL</small>s,\r
-so they can be added to the blockfile.\r
-The value of\r
-<b>N</b>\r
-is a bitwise\r
-logical-<small>OR</small>\r
-of the following values:\r
-<br>\r
-1 = URLs (show each URL requested by the browser);<br>\r
-2 = Connections (show each connection to or from the proxy);<br>\r
-4 = I/O (log I/O errors);<br>\r
-8 = Headers (as each header is scanned, show the header and what is done to it);<br>\r
-16 = Log everything (including debugging traces and the contents of the pages).<br>\r
-<a name="or">Multiple</a>\r
-<big><kbd>debug</kbd></big>\r
-lines are permitted; they are logical OR-ed together.\r
-<p>\r
-<a name="single">Because most browsers send several requests in parallel</a>\r
-the debugging output may appear intermingled, so the\r
-<a href="ijbman.html#single-threaded">single-threaded</a>\r
-option is recommended when using\r
-<a href="ijbman.html#debug">debug</a>\r
-with\r
-<b>N</b>\r
-greater than 1.\r
-<!-- Aside: Yes, it's clumsy, but it's easy to parse. -->\r
-<p><dt><i><a name="o_y">-y</a></i><br><a name="add-forwarded-header"><tt>add-forwarded-header</tt></a><dd>\r
-Add \r
-<big><kbd>X-Forwarded-For</kbd></big>\r
-headers to the server-bound \r
-<small>HTTP</small>\r
-stream\r
-indicating the client \r
-<small>IP</small>\r
-address\r
-<a href="ijbfaq.html#detect">to the server,</a>\r
-in the new style of\r
-<a href="ijbman.html#squid">Squid 1.1.4.</a>\r
-If you want the traditional\r
-<big><kbd>HTTP_FORWARDED</kbd></big>\r
-response header, add it manually with the\r
-<a href="ijbman.html#o_x">-x</a>\r
-option.\r
-<!-- Aside: Not a default, since the end-client usually doesn't wish to be identified, but may be helpful in debugging chains. -->\r
-<p><dt><i><a name="o_x">-x HeaderText</a></i><br><a name="add-header"><tt>add-header</tt>  <i>HeaderText</i></a><dd>\r
-Add the\r
-<i>HeaderText</i>\r
-verbatim to requests to the server.\r
-Typical uses include\r
-adding old-style forwarding notices such as\r
-<big><kbd>Forwarded: by http://pro-privacy-isp.net</kbd></big>\r
-and reinstating the\r
-<big><kbd>Proxy-Connection: Keep-Alive</kbd></big>\r
-header\r
-(which the\r
-<b><kbd>junkbuster</kbd></b>\r
-deletes so as\r
-<a href="ijbfaq.html#detect">not</a>\r
-to reveal its existence).\r
-No checking is done for correctness or plausibility,\r
-so it can be used to throw any old trash into the server-bound \r
-<small>HTTP</small>\r
-stream.\r
-Please don't litter.\r
-<!-- Aside: this represents "more than enough rope" -->\r
-<p><dt><i><a name="o_s">-s</a></i><br><a name="single-threaded"><tt>single-threaded</tt></a><dd>\r
-Doesn't\r
-<big><kbd>fork()</kbd></big>\r
-a separate process\r
-(or create a separate thread)\r
-to handle each connection.\r
-Useful when debugging to keep the process single threaded.\r
-<p><dt><i><a name="o_l">-l logfile</a></i><br><a name="logfile"><tt>logfile</tt>  <i>logfile</i></a><dd>\r
-Write all debugging data into\r
-<i>logfile.</i>\r
-The default\r
-<i>logfile</i>\r
-is the standard output.\r
-<p><dt><br><a name="aclfile"><tt>aclfile</tt>  <i>aclfile</i></a><dd>\r
-Unless this option is used, the proxy talks to anyone who can connect to it,\r
-and everyone who can has equal permissions on where they can go.\r
-An access file allows restrictions to be placed on these two policies,\r
-by distinguishing some\r
-<i><dfn>source</dfn></i>\r
-<small>IP</small>\r
-addresses and/or\r
-some\r
-<i><dfn>destination</dfn></i>\r
-addresses.\r
-(If a\r
-<a href="ijbman.html#forwardfile">forwarder or a gateway</a>\r
-is being used, its address is considered the destination address,\r
-not the ultimate\r
-<small>IP</small>\r
-address of the\r
-<small>URL</small>\r
-requested.)\r
-<p>\r
-<a name="permit">Each line of the access file begins with</a>\r
-either the word\r
-<big><kbd>permit</kbd></big>\r
-or\r
-<big><kbd>deny</kbd></big>\r
-followed by source and (optionally) destination addresses \r
-to be matched against those of the\r
-<small>HTTP</small>\r
-request.\r
-The last matching line specifies the result: if it was a\r
-<big><kbd>deny</kbd></big>\r
-line or if no line matched,\r
-the request will be refused.\r
-<p>\r
-<a name="various">A source or destination</a>\r
-can be specified as a single numeric\r
-<small>IP</small>\r
-address,\r
-or with a hostname, provided that the host's name\r
-can be resolved to a numeric address: this cannot be used to block all\r
-<big><kbd>.mil </kbd></big>\r
-domains for example,\r
-because there is no single address associated with that domain name.\r
-Either form may be followed by a slash and an integer\r
-<big><kbd>N</kbd></big>,\r
-specifying a subnet mask of\r
-<big><kbd>N</kbd></big>\r
-bits.\r
-For example,\r
-<big><kbd>permit 207.153.200.72/24</kbd></big>\r
-matches the entire Class-C subnet from\r
-207.153.200.0\r
-through 207.153.200.255.\r
-(A netmask of 255.255.255.0 corresponds to 24 bits of\r
-ones in the netmask, as with\r
-<big><kbd>*_MASKLEN=24</kbd></big>.)\r
-A value of 16 would be used for a Class-B subnet.\r
-A value of zero for\r
-<big><kbd>N</kbd></big>\r
-in the subnet mask length will cause any address to match;\r
-this can be used to express a default rule.\r
-For more information see the example file provided with the distribution.\r
-<p>\r
-<a name="false">If you like these access controls</a>\r
-you should probably have\r
-<a href="ijbfaq.html#firewall">firewall</a>;\r
-they are not intended to replace one.\r
-<p><dt><br><a name="trustfile"><tt>trustfile</tt>  <i>trustfile</i></a><dd>\r
-This feature is experimental, has not been fully documented and is\r
-very subject to change.\r
-The goal is for parents to be able to choose a page or site whose\r
-links they regard suitable for their\r
-<a href="ijbfaq.html#children">young children</a>\r
-and for the proxy to allow access only to sites mentioned there.\r
-To do this the proxy examines the\r
-<a href="ijbman.html#o_r">referer</a>\r
-variable on each page request to check they resulted from\r
-a click on the ``trusted referer'' site: if so the referred site\r
-is added to a list of trusted sites, so that the child can\r
-then move around that site.\r
-There are several uncertainties in this scheme that experience may be\r
-able to iron out; check back in the months ahead.\r
-<p><dt><br><a name="trust_info_url"><tt>trust_info_url</tt>  <i>trust_info_url</i></a><dd>\r
-When access is denied due to lack of a trusted referer, this\r
-<small>URL</small>\r
-is displayed with a message pointing the user to it for further information.\r
-<p><dt><br><a name="hide-console"><tt>hide-console</tt></a><dd>\r
-In the Windows version only, instructs the program\r
-to disconnect from and hide the command console after starting.\r
-<p><dt><i><a name="o_a">-a</a></i><dd>\r
-(Obsolete) Accept the server's\r
-<big><kbd>Set-cookie</kbd></big>\r
-headers, passing them through to the browser.\r
-<a name="obsolete">This option was removed in Version 1.2</a>\r
-and replaced by an improvement to the\r
-<a href="ijbman.html#o_c">-c</a>\r
-option.\r
-</dl>\r
-</p>\r
-\r
-<h3><a name="install" href="/cgi-bin/gp?pg=ijbman&pr=install"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Installation and Use\r
-</h3>\r
-<p>\r
-Browsers must be told where to find the\r
-<b><kbd>junkbuster</kbd></b>\r
-(e.g.\r
-<big><kbd>localhost</kbd></big>\r
-port 8000).\r
-To set the \r
-<small>HTTP</small>\r
-proxy in Netscape 3.0,\r
-go through:\r
-<b><font face="arial, helvetica">\r
-Options</font></b>;\r
-<b><font face="arial, helvetica">\r
-Network Preferences</font></b>;\r
-<b><font face="arial, helvetica">\r
-Proxies</font></b>;\r
-<b><font face="arial, helvetica">\r
-Manual Proxy Configuration</font></b>;\r
-<b><font face="arial, helvetica">\r
-View</font></b>.\r
-See the\r
-<a href="ijbfaq.html"><small>FAQ</small></a>\r
-for other browsers.\r
-The\r
-<a href="ijbfaq.html#security">Security Proxy</a>\r
-should also be set to the same values,\r
-otherwise\r
-<big><kbd>shttp:</kbd></big>\r
-<small>URL</small>s\r
-won't work.\r
-<p>\r
-<a name="limitations">Note the limitations</a>\r
-explained in the\r
-<a href="ijbfaq.html"><small>FAQ</small></a>.\r
-</p>\r
-\r
-<h3><a name="show" href="/cgi-bin/gp?pg=ijbman&pr=show"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Checking Options\r
-</h3>\r
-<p>\r
-To allow users to\r
-<a href="ijbfaq.html#show">check</a>\r
-that a\r
-<b><kbd>junkbuster</kbd></b>\r
-is running and how it is configured,\r
-it intercepts requests for any\r
-<small>URL</small>\r
-ending in\r
-<big><kbd>/show-proxy-args</kbd></big>\r
-and blocks it,\r
-returning instead returns information on its\r
-version number and\r
-current configuration\r
-including the contents of its blockfile.\r
-To get an explicit warning that no\r
-<b><kbd>junkbuster</kbd></b>\r
-intervened if the proxy was not configured,\r
-it's best to point it to a\r
-<small>URL</small>\r
-that does this, such as\r
-<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a>\r
-on Junkbusters's website.\r
-</p>\r
-\r
-<h3><a name="also" href="/cgi-bin/gp?pg=ijbman&pr=also"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-See Also\r
-</h3>\r
-<p>\r
-<a href="ijbfaq.html">http://www.junkbusters.com/ht/en/ijbfaq.html</a>\r
-<br>\r
-<a href="cookies.html">http://www.junkbusters.com/ht/en/cookies.html</a>\r
-<br>\r
-<a href="http://internet.junkbuster.com/cgi-bin/show-proxy-args">http://internet.junkbuster.com/cgi-bin/show-proxy-args</a>\r
-<br>\r
-<a name ="kristol" href="http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html">http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html</a>\r
-<br>\r
-<a name ="squid" href="http://squid.nlanr.net/Squid/">http://squid.nlanr.net/Squid/</a>\r
-<br>\r
-<a href="http://www-math.uni-paderborn.de/~axel/">http://www-math.uni-paderborn.de/~axel/</a>\r
-</p>\r
-\r
-<h3><a name="copyright" href="/cgi-bin/gp?pg=ijbman&pr=copyright"><img border=0 width=14 height=14 src="/images/fb.gif" alt="<Feedback>"></a> \r
-Copyright and GPL\r
-</h3>\r
-<p>\r
-Written and copyright by the Anonymous Coders and Junkbusters Corporation\r
-and made available under the\r
-<a href="gpl.html">GNU General Public License (GPL).</a>\r
-This software comes with\r
-<a href="gpl.html#nowarr">NO WARRANTY.</a>\r
-Internet Junkbuster\r
-Proxy\r
-is a\r
-<a href="legal.html#marks">trademark</a>\r
-of Junkbusters Corporation.\r
-</p>\r
-<p align="center"><a href="#top_of_page"><img border=0 width=250 height=15 src="/images/top.gif" alt="--- Back to Top of Page ---"></a></p>\r
-<font face="arial, helvetica">\r
-<a rel="begin" href="index.html">Home</a> <font color="#ff0000">\r
-<b> · </b></font>\r
-<a rel="next" href="cookies.html">Next</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="lopt.html">Site Map</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="legal.html">Legal</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="junkdata.html">Privacy</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="cookies.html">Cookies</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="ijb.html">Banner Ads</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="telemarketing.html">Telemarketing</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="junkmail.html">Mail</a>\r
-<font color="#ff0000">\r
-<b> · </b></font><a href="junkemail.html">Spam</a>\r
-\r
-</font><form action="/cgi-bin/search" method="GET">\r
-<input type="text" name="q" size=60 maxlength=120 value="">\r
-<input type="submit" value="Search"></form>\r
-<small>\r
-<small>\r
-<p>\r
-<a href="legal.html#copy">Copyright</a> © 1996-8 Junkbusters\r
-<a href="legal.html#marks">®</a> Corporation.\r
-Copying and distribution permitted under\r
-the <a href="gpl.html"><small>GNU</small></a>\r
-General Public License.\r
-</small>\r
-<tt>\r
-1998/10/31\r
-http://www.junkbusters.com/ht/en/ijbman.html\r
-</tt>\r
-<address><kbd>webmaster@junkbusters.com</kbd></address>\r
-</small>\r
-</body>\r
+\r
+ <p>to allow SSL transactions to proceed directly. The\r
+ cautious would also add an entry in their blockfile to stop\r
+ transactions to port 443 for all but specified trusted\r
+ sites.</p>\r
+\r
+ <p><a name="loop"></a>Configure with care: no loop\r
+ detection is performed. When setting up chains of proxies\r
+ that might loop back, try adding <a href="#squid">\r
+ Squid.</a></p>\r
+\r
+ <p><i>via_gateway_type</i> and <i>gateway</i> are used to\r
+ support SOCKS proxies. Some firewalls provide this type of\r
+ proxy. If you do not not want to use a SOCKS proxy, specify\r
+ both of these fields as "<code>.</code>".</p>\r
+\r
+ <p><a name="configure"></a><a name="identify"></a>Note that\r
+ JunkBuster is a SOCKS <b>client</b>, <b>not</b> a SOCKS <b>\r
+ server</b>. The user's browser should <b>not</b> be <a\r
+ href="ijbfaq.html#socks">configured</a> to use <code>\r
+ SOCKS</code>; the proxy conducts the negotiations, not the\r
+ browser.</p>\r
+\r
+ <p>The <code>SOCKS4</code> protocol may be specified by\r
+ setting <i>via_gateway_type</i> to <code>socks</code> or\r
+ <code>socks4</code>. The <code>SOCKS4A</code> protocol is\r
+ specified as <code>socks4a</code>. The <code>SOCKS5</code>\r
+ protocol is not currently supported.</p>\r
+\r
+ <p><i>gateway</i> should be the host and port of the SOCKS\r
+ server. If you just specify a hostname, then the port\r
+ number defaults to 1080.</p>\r
+\r
+ <p>The user identification capabilities of <code>\r
+ SOCKS4</code> are deliberately not used; the user is always\r
+ identified to the <code>SOCKS</code> server as <code>\r
+ userid=anonymous</code>. If the server's policy is to\r
+ reject requests from <code>anonymous</code>, the proxy will\r
+ not work. Use a <a href="#o_d">debug</a> value of 3 to see\r
+ the status returned by the server.</p>\r
+\r
+ <p>If you specify both a HTTP proxy (with <i>\r
+ forward_to</i>) and a SOCKS proxy (with <i>gateway</i>)\r
+ then the SOCKS proxy is used to connect to the HTTP proxy.\r
+ If you just specify a SOCKS proxy, it is used to connect\r
+ directly to the websites.</p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_d"></a></i><a name=\r
+ "debug"></a><code>debug</code> <i>N</i></dt>\r
+\r
+ <dd>\r
+ <p>Set debug mode. The most common value is 1, to <a href=\r
+ "ijbfaq.html#pinpoint">pinpoint</a> offensive URLs, so they\r
+ can be added to the blockfile. The value of <b>N</b> is a\r
+ bitwise logical-OR of the following values:<br>\r
+ 1 = URLs (show each URL requested by the browser);<br>\r
+ 2 = Connections (show each connection to or from the\r
+ proxy);<br>\r
+ 4 = I/O (log I/O errors);<br>\r
+ 8 = Headers (as each header is scanned, show the header\r
+ and what is done to it);<br>\r
+ 16 = Log everything (including debugging traces and the\r
+ contents of the pages).<br>\r
+ 32 = Record accesses in Common Log Format, as used by most\r
+ web and proxy servers.</p>\r
+\r
+ <p><a name="or"></a>Multiple <code>debug</code> lines are\r
+ permitted; they are logical OR-ed together.</p>\r
+\r
+ <p><a name="single"></a>Because most browsers send several\r
+ requests in parallel the debugging output may appear\r
+ intermingled, so the <a href="#single-threaded">\r
+ single-threaded</a> option is recommended when using <a\r
+ href="#debug">debug</a> with <b>N</b> greater than 1. \r
+ <!-- Aside: Yes, it's clumsy, but it's easy to parse. --></p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_y"></a></i><a name=\r
+ "add-forwarded-header"></a><code>add-forwarded-header</code></dt>\r
+\r
+ <dd>\r
+ <p>Add <code>X-Forwarded-For</code> headers to the\r
+ server-bound HTTP stream indicating the client IP address\r
+ <a href="ijbfaq.html#detect">to the server,</a> in the new\r
+ style of <a href="#squid">Squid 1.1.4.</a> If you want the\r
+ traditional <code>HTTP_FORWARDED</code> response header,\r
+ add it manually with the <a href="#o_x">-x</a> option. This\r
+ also allows other <code>X-Forwarded-For</code> headers to\r
+ be transmitted - usually they are discarded.</p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_x"></a></i><a name=\r
+ "add-header"></a><code>add-header</code> <i>\r
+ HeaderText</i></dt>\r
+\r
+ <dd>\r
+ <p>Add the <i>HeaderText</i> verbatim to requests to the\r
+ server. Typical uses include adding old-style forwarding\r
+ notices such as <code>Forwarded: by\r
+ http://pro-privacy-isp.net</code> and reinstating the\r
+ <code>Proxy-Connection: Keep-Alive</code> header (which the\r
+ <b><code>junkbuster</code></b> deletes so as <a href=\r
+ "ijbfaq.html#detect">not</a> to reveal its existence). No\r
+ checking is done for correctness or plausibility, so it can\r
+ be used to throw any old trash into the server-bound HTTP\r
+ stream. Please don't litter. \r
+ <!-- Aside: this represents "more than enough rope" --></p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_s"></a></i><a name=\r
+ "single-threaded"></a><code>single-threaded</code></dt>\r
+\r
+ <dd>\r
+ <p>Doesn't <code>fork()</code> a separate process (or\r
+ create a separate thread) to handle each connection. Useful\r
+ when debugging to keep the process single threaded.</p>\r
+ </dd>\r
+\r
+ <dt><i><a name="o_l"></a></i><a name=\r
+ "logfile"></a><code>logfile</code> <i>\r
+ logfile</i></dt>\r
+\r
+ <dd>\r
+ <p>Write all debugging data into <i>logfile.</i> The\r
+ default <i>logfile</i> is the standard output.</p>\r
+ </dd>\r
+\r
+ <dt><br>\r
+ <a name="aclfile"></a><code>aclfile</code> <i>\r
+ aclfile</i></dt>\r
+\r
+ <dd>\r
+ <p>Unless this option is used, the proxy talks to anyone\r
+ who can connect to it, and everyone who can has equal\r
+ permissions on where they can go. An access file allows\r
+ restrictions to be placed on these two policies, by\r
+ distinguishing some <i><dfn>source</dfn></i> IP addresses\r
+ and/or some <i><dfn>destination</dfn></i> addresses. (If a\r
+ <a href="#forwardfile">forwarder or a gateway</a> is being\r
+ used, its address is considered the destination address,\r
+ not the ultimate IP address of the URL requested.)</p>\r
+\r
+ <p><a name="permit"></a>Each line of the access file begins\r
+ with either the word <code>permit</code> or <code>\r
+ deny</code> followed by source and (optionally) destination\r
+ addresses to be matched against those of the HTTP request.\r
+ The last matching line specifies the result: if it was a\r
+ <code>deny</code> line or if no line matched, the request\r
+ will be refused.</p>\r
+\r
+ <p><a name="various"></a>A source or destination can be\r
+ specified as a single numeric IP address, or with a\r
+ hostname, provided that the host's name can be resolved to\r
+ a numeric address: this cannot be used to block all <code>\r
+ .mil</code> domains for example, because there is no single\r
+ address associated with that domain name. Either form may\r
+ be followed by a slash and an integer <code>N</code>,\r
+ specifying a subnet mask of <code>N</code> bits. For\r
+ example, <code>permit 207.153.200.72/24</code> matches the\r
+ entire Class-C subnet from 207.153.200.0 through\r
+ 207.153.200.255. (A netmask of 255.255.255.0 corresponds to\r
+ 24 bits of ones in the netmask, as with <code>\r
+ *_MASKLEN=24</code>.) A value of 16 would be used for a\r
+ Class-B subnet. A value of zero for <code>N</code> in the\r
+ subnet mask length will cause any address to match; this\r
+ can be used to express a default rule. For more information\r
+ see the example file provided with the distribution.</p>\r
+\r
+ <p><a name="false"></a>If you like these access controls\r
+ you should probably have <a href="ijbfaq.html#firewall">\r
+ firewall</a>; they are not intended to replace one.</p>\r
+ </dd>\r
+\r
+ <dt><br>\r
+ <a name="trustfile"></a><code>trustfile</code> \r
+ <i>trustfile</i></dt>\r
+\r
+ <dd>\r
+ <p>This feature is experimental, has not been fully\r
+ documented and is very subject to change. The goal is for\r
+ parents to be able to choose a page or site whose links\r
+ they regard suitable for their <a href=\r
+ "ijbfaq.html#children">young children</a> and for the proxy\r
+ to allow access only to sites mentioned there. To do this\r
+ the proxy examines the <a href="#o_r">referer</a> variable\r
+ on each page request to check they resulted from a click on\r
+ the ``trusted referer'' site: if so the referred site is\r
+ added to a list of trusted sites, so that the child can\r
+ then move around that site. There are several uncertainties\r
+ in this scheme that experience may be able to iron out;\r
+ check back in the months ahead.</p>\r
+ </dd>\r
+\r
+ <dt><br>\r
+ <a name="trust_info_url">\r
+ </a><code>trust_info_url</code> <i>\r
+ trust_info_url</i></dt>\r
+\r
+ <dd>\r
+ <p>When access is denied due to lack of a trusted referer,\r
+ this URL is displayed with a message pointing the user to\r
+ it for further information.</p>\r
+ </dd>\r
+\r
+ <dt><br>\r
+ <a name="hide-console"></a><code>hide-console</code></dt>\r
+\r
+ <dd>\r
+ <p>In the Windows command-line version only, instructs the\r
+ program to disconnect from and hide the command console\r
+ after starting.</p>\r
+ </dd>\r
+ </dl>\r
+\r
+ <h3><a name="install"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Installation and Use</h3>\r
+\r
+ <p>Browsers must be told where to find the <b><code>\r
+ junkbuster</code></b> (e.g. <code>localhost</code> port 8000).\r
+ To set the HTTP proxy in Netscape 3.0, go through: <b class=\r
+ "eg">Options</b>; <b class="eg">Network Preferences</b>; <b\r
+ class="eg">Proxies</b>; <b class="eg">Manual Proxy\r
+ Configuration</b>; <b class="eg">View</b>. See the <a href=\r
+ "ijbfaq.html">FAQ</a> for other browsers. The <a href=\r
+ "ijbfaq.html#security">Security Proxy</a> should also be set to\r
+ the same values, otherwise <code>shttp:</code> URLs won't\r
+ work.</p>\r
+\r
+ <p><a name="limitations"></a>Note the limitations explained in\r
+ the <a href="ijbfaq.html">FAQ</a>.</p>\r
+\r
+ <h3><a name="show"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> Checking Options</h3>\r
+\r
+ <p>To allow users to <a href="ijbfaq.html#show">check</a> that\r
+ a <b><code>junkbuster</code></b> is running and how it is\r
+ configured, it intercepts requests for any URL ending in <code>\r
+ /show-proxy-args</code> and blocks it, returning instead\r
+ returns information on its version number and current\r
+ configuration including the contents of its blockfile. To get\r
+ an explicit warning that no <b><code>junkbuster</code></b>\r
+ intervened if the proxy was not configured, it's best to point\r
+ it to a URL that does this, such as <a href=\r
+ "http://internet.junkbuster.com/cgi-bin/show-proxy-args">\r
+ http://internet.junkbuster.com/cgi-bin/show-proxy-args</a> on\r
+ Junkbusters's website.</p>\r
+\r
+ <h3><a name="also"></a><img border="0" src="fb.gif" alt="*"\r
+ width="14" height="14"> See Also</h3>\r
+\r
+ <p><a href="ijbfaq.html">\r
+ http://www.junkbusters.com/ht/en/ijbfaq.html</a><br>\r
+ <a href="http://www.junkbusters.com/ht/en/cookies.html">\r
+ http://www.junkbusters.com/ht/en/cookies.html</a><br>\r
+ <a href=\r
+ "http://internet.junkbuster.com/cgi-bin/show-proxy-args">\r
+ http://internet.junkbuster.com/cgi-bin/show-proxy-args</a><br>\r
+ <a name="kristol"></a><a href=\r
+ "http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html">http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html</a><br>\r
+\r
+ <a name="squid"></a><a href=\r
+ "http://squid.nlanr.net/Squid/">http://squid.nlanr.net/Squid/</a><br>\r
+\r
+ <a href="http://www-math.uni-paderborn.de/~axel/">\r
+ http://www-math.uni-paderborn.de/~axel/</a></p>\r
+\r
+ <h3><a name="copyright"></a><img border="0" src="fb.gif" alt=\r
+ "*" width="14" height="14"> Copyright and GPL</h3>\r
+\r
+ <p>Written and copyright by the Anonymous Coders and\r
+ Junkbusters Corporation and made available under the <a href=\r
+ "gpl.html">GNU General Public License (GPL).</a> This software\r
+ comes with <a href="gpl.html#nowarr">NO WARRANTY.</a> Internet\r
+ Junkbuster Proxy is a <a href=\r
+ "http://www.junkbusters.com/ht/en/legal.html#marks">\r
+ trademark</a> of Junkbusters Corporation.</p>\r
+\r
+ <p align="center"><a href="#top_of_page"><img border="0" src=\r
+ "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
+ "15"></a></p>\r
+\r
+ <p class="sans"><a href="http://ijbswa.sourceforge.net/">\r
+ Website</a> <b class="dot">·</b> <b>Manual</b> <b class=\r
+ "dot">·</b> <a href="ijbfaq.html">FAQ</a> <b class=\r
+ "dot">·</b> <a href="gpl.html">GPL</a></p>\r
+\r
+ <p class="sans"><small><small><a href="gpl.html#text">\r
+ Copyright</a> © 1996-8 <a href=\r
+ "http://www.junkbusters.com/">Junkbusters</a> <a href=\r
+ "http://www.junkbusters.com/ht/en/legal.html#marks">®</a>\r
+ Corporation. <a href="gpl.html#text">Copyright</a> © 2001\r
+ <a href="http://sourceforge.net/projects/ijbswa/">Jon\r
+ Foster</a>. Copying and distribution permitted under the <a\r
+ href="gpl.html">GNU</a> General Public\r
+ License.</small></small></p>\r
+\r
+ <p><small><code><a href=\r
+ "http://sourceforge.net/projects/ijbswa/">\r
+ http://sourceforge.net/projects/ijbswa/</a></code></small></p>\r
+ </body>\r
</html>\r
+\r