+++ /dev/null
-<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">\r
-<!-- $Id: ijbfaq.html,v 1.2 2001/05/17 22:56:17 jongfoster Exp $\r
-\r
- See copyright details at end of file\r
-\r
- After changing this file, please run it through "HTML Tidy"\r
- (from http://www.w3.org/People/Raggett/tidy/)\r
- It should have no warnings or errors.\r
--->\r
-\r
-<html>\r
- <head>\r
- <title>Internet Junkbuster Frequently Asked Questions</title>\r
- <meta name="description" content=\r
- "An extensive FAQ on the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser.">\r
- <meta name="keywords" content=\r
- "stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, consumer, sending, opt out, privacy, advertising, direct, marketing, targeting, through, click, trails, http_referer, cookie, cutter, iff, internet fast forward, Cookie Management Tool">\r
-<style type="text/css">\r
-<!--\r
-h2 { text-align: Center; font-family: arial, helvetica, sans-serif }\r
-p.sans { font-family: arial, helvetica, sans-serif }\r
-b.dot { color: #FF0000 }\r
-b.eg { font-family: arial, helvetica, sans-serif }\r
--->\r
-</style>\r
- </head>\r
-\r
- <body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink=\r
- "#787878">\r
- <p class="sans"><a href="http://ijbswa.sourceforge.net">\r
- Website</a> <b class="dot">·</b> <a href="ijbman.html">\r
- Manual</a> <b class="dot">·</b> <b>FAQ</b> <b class=\r
- "dot">·</b> <a href="gpl.html">GPL</a></p>\r
-\r
- <h1 align="center"><a name="top_of_page"></a>Internet\r
- J<small>UNK<i style="color: #FF0000">BUSTER</i></small>\r
- Frequently Asked Questions</h1>\r
-\r
- <p align="center" class="sans"><a href="#browser">Configuring\r
- Browsers</a> <b class="dot">·</b> <a href="#defaulted">\r
- IE 5.0</a> <b class="dot">·</b> <a href="#local">\r
- Installation</a> <b class="dot">·</b> <a href=\r
- "#companies">For Companies</a> <b class="dot">·</b> <a\r
- href="#blocking">Blocking Ads</a> <b class="dot">·</b>\r
- <a href="#cookies">Cookies</a> <b class="dot">·</b> <a\r
- href="#hotmail">Hotmail</a> <b class="dot">·</b> <a\r
- href="#children">Children</a> <b class="dot">·</b> <a\r
- href="#chain">Forwarding/Chaining</a> <b class="dot">\r
- ·</b> <a href="#conceal">IP</a> <b class="dot">\r
- ·</b> <a href="#anonymity">Anonymity</a> <b class="dot">\r
- ·</b> <a href="#security">Security</a></p>\r
-\r
- <h1>This document is out of date</h1>\r
-\r
- <p><b>Development of JunkBuster is ongoing and this document is\r
- no longer current. However, it may provide some assistance. If\r
- you have problems, please use the <a href=\r
- "http://groups.yahoo.com/group/junkbuster-users/">Yahoo Groups\r
- mailing list</a> (which includes an archive of mail), the\r
- SourceForge.net <a href=\r
- "http://sourceforge.net/projects/ijbswa/">project page</a>, or\r
- see the project's <a href="http://ijbswa.sourceforge.net/">home\r
- page</a>. Please also bear in mind that versions 2.9.x of\r
- JunkBuster are development releases, and are not production\r
- quality.</b></p>\r
-\r
- <h2><a name="top"></a>The Top Ten Questions</h2>\r
-\r
- <h3><a name="what"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> What is the Internet Junkbuster\r
- Proxy and what does it do for me?</h3>\r
-\r
- <p>The Internet Junkbuster Proxy <small><sup>TM</sup></small>\r
- is free privacy-enhancing software that can be run on your PC\r
- or by your ISP or company. It blocks requests for URLs\r
- (typically banner ads) that match its blockfile. It also\r
- deletes unauthorized cookies and other unwanted identifying\r
- header information that is exchanged between web servers and\r
- browsers. These headers are not normally accessible to users\r
- (even though they may contain information that's important to\r
- your privacy), but with the Internet Junkbuster you can see\r
- almost <a href="ijbman.html#o_d">anything you want</a> and\r
- control everything you're likely to need. Many people publish\r
- their blockfiles to help others get started.</p>\r
-\r
- <h3><a name="free"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Is there a license fee / warranty\r
- / registration form / expiration?</h3>\r
-\r
- <p>No, none of these. It's completely free of charge.\r
- Junkbusters offers you the software to copy, use, modify and\r
- distribute as you wish, forever, at no charge under the GNU\r
- General Public License.</p>\r
-\r
- <p><a name="warranty"></a>It comes with no warranty of any\r
- kind.</p>\r
-\r
- <p><a name="register"></a>You don't have to register, in fact\r
- we don't even provide a way to do so: the practice of\r
- registering software is usually just an excuse to send you\r
- solicitations and sell your name and information about your\r
- behavior. You are welcome to obtain and use our software as\r
- anonymously you wish. (Your IP address will naturally be\r
- disclosed when you download it; use anonymizing software if you\r
- want to conceal this. We never want to be given any information\r
- that you consider private or confidential.)</p>\r
-\r
- <p><a name="why"></a>We are often asked why we give away a\r
- product that many would happily pay for. The answer is that we\r
- are determined to carry out our mission: to free the world from\r
- junk communications.</p>\r
-\r
- <h3><a name="windows"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Does it run on Windows? On a Mac?\r
- On the AOL browser?</h3>\r
-\r
- <p>For the latest information on availability, see the\r
- Distribution Information page. We don't think it will ever run\r
- on Windows 3.1. But you don't need to have it running on your\r
- computer if you get your ISP or Systems Administrator at work\r
- to run it.</p>\r
-\r
- <h3><a name="isp"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> How can I get my ISP to run the\r
- Internet Junkbuster?</h3>\r
-\r
- <p>Try their sales or support department (depending on whether\r
- you are already a customer). <a name="unaware"></a>You might\r
- send them email including the following URL:<br>\r
- <code>\r
- http://www.junkbusters.com/ht/en/ijbfaq.html#isps</code><br>\r
- <a name="switch"></a>You could mention that many other ISPs\r
- provide it, and that you regard it as an important part of your\r
- decision on where to buy Internet service.</p>\r
-\r
- <h3><a name="who"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Who chooses the options that\r
- control what is blocked?</h3>\r
-\r
- <p>Whoever starts the Internet Junkbuster chooses the options\r
- and the blockfile. If your ISP runs it for you, they have to\r
- make these decision (though some may give you a choice of\r
- proxies, and a way to suggest new URLs to block). If you run it\r
- on your computer, you get to choose.</p>\r
-\r
- <h3><a name="self"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> How do I download and run the\r
- program on my computer?</h3>\r
-\r
- <p>It depends on your platform. If you are using Windows 95 or\r
- NT, see our separate page on installing under Windows. If you\r
- have a C compiler and are using almost any flavor of UNIX ®\r
- you download it, compile it, start it running, and then\r
- configure your browser. Several precompiled packages are also\r
- available through links in our distribution page, which lists\r
- all available platforms.</p>\r
-\r
- <p><a name="port"></a>If you are using a platform for which we\r
- have no current availability, you are welcome to port the code.\r
- If you do this and you would like us to consider publishing\r
- your ported version, please tell us.</p>\r
-\r
- <h3><a name="show"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> How can I tell which blockfile\r
- and options are being used?</h3>\r
-\r
- <p>Just point your browser to\r
- http://internet.junkbuster.com/cgi-bin/show-proxy-args or to\r
- any URL ending in <code>show-proxy-args</code> (even if it\r
- doesn't exist). It needn't exist because the Internet\r
- Junkbuster intercepts the request, blocks it, and returns in\r
- its place information about itself. Using the URL above is\r
- useful for checking that your browser really is going through\r
- an Internet Junkbuster, because the <code>junkbuster.com</code>\r
- server returns a warning if the request actually gets to it.\r
- Some people set the home page of their browser to such a URL to\r
- be sure that it is configured to use the proxy.</p>\r
-\r
- <p><a name="headers"></a>If you wish to check the header\r
- information your proxy is actually sending, a visit to\r
- http://internet.junkbuster.com/cgi-bin/show_http_headers will\r
- give you the more relevant ones first. You might also like to\r
- turn the proxy off and compare the difference. (Don't forget to\r
- turn it back on again.)</p>\r
-\r
- <h3><a name="responding"></a><img border="0" src="fb.gif" alt=\r
- "*" width="14" height="14"> My browser started giving me\r
- ``server not responding'' messages</h3>\r
-\r
- <p>Once your browser is told to use a proxy such as the\r
- Internet Junkbuster, it thinks of it as its server for\r
- everything, so this message means it can't talk to the proxy.\r
- The Internet Junkbuster may not be running, or you may have\r
- specified its proxy address incorrectly. Check that the details\r
- you entered are correct. If you have <code>telnet</code> you\r
- can try connecting to the appropriate port to see if the\r
- Internet Junkbuster is running. If your ISP is running the\r
- Internet Junkbuster, you may want to check with them. If you\r
- are running it yourself under UNIX ®, try looking at a\r
- <code>ps ax</code> to see if it is running. The <a href=\r
- "ijbman.html#o_h">port</a> specified in its options should be\r
- the same one as your browser has configured.</p>\r
-\r
- <h3><a name="idea"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> I've got this great idea for a\r
- new feature. Who do I tell?</h3>\r
-\r
- <p>We'd be very interested to hear it, but please bear a few\r
- things in mind.</p>\r
-\r
- <ol type="1">\r
- <li><a name="considered"></a>Please check this FAQ to see if\r
- we've already considered the idea, such as automatic\r
- detection of banner ads and replacing ads with something else\r
- such as a transparent GIF.</li>\r
-\r
- <li><a name="confidential"></a>Don't tell us anything you\r
- want to keep confidential or retain some right over.</li>\r
-\r
- <li><a name="wish"></a>We currently have a long wish list of\r
- things that we may or may not do in the near future,\r
- including a version for your favorite computer and a plug-in\r
- version.</li>\r
-\r
- <li><a name="go4it"></a>If you don't want to wait you're\r
- welcome to improve on our code, publish your version on the\r
- Web, and tell us where to find it. Projects that are\r
- especially welcome include a port to the Mac and extensions\r
- for HTTP 1.1. (Meanwhile, be sure your browser is configured\r
- not to use HTTP 1.1.)</li>\r
- </ol>\r
-\r
- <h3><a name="other"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> My question isn't listed here.\r
- Who do I ask for support?</h3>\r
-\r
- <p><a name="harder"></a>If you find using our free product\r
- harder than you're used to for consumer software, there are\r
- many commercial alternatives that you could consider.</p>\r
-\r
- <p><a name="RTM"></a>The answer to detailed technical questions\r
- may be answered in <a href="ijbman.html">manual page</a>, or in\r
- the source code. Also double-check this page for an answer:\r
- using the ``find'' feature on your browser for likely keywords\r
- may help. Our site also has a search feature.</p>\r
-\r
- <p><a name="Use"></a>Many people post requests for help and\r
- responses on Usenet.</p>\r
-\r
- <p><a name="them"></a>If your ISP is providing the Internet\r
- Junkbuster for you, and your question is about how to use it,\r
- check their web page before asking them.</p>\r
-\r
- <p><a name="us"></a>Even though we don't offer the kind of\r
- support you might expect if you paid a lot of money for a\r
- software product, you can still ask us. But before you do,\r
- please consider whether you could ask someone closer to you.\r
- And please be patient if we're slow to reply: we never charge\r
- consumers for our services, so we have to subsidize consumers\r
- with revenue from companies, and our resources are limited.</p>\r
-\r
- <p><a name="quote"></a>If your company or organization would be\r
- interested in a maintenance contract with phone and email\r
- support, hard copy documentation and source code and\r
- pre-compiled binaries on tape or disk, please ask us for a\r
- quote.</p>\r
-\r
- <p align="center"><a href="#top_of_page"><img border="0" src=\r
- "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
- "15"></a></p>\r
-\r
- <h2><a name="browser"></a>Configuring your browser to talk to\r
- the Internet Junkbuster</h2>\r
-\r
- <h3><a name="address"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> What is the proxy address of the\r
- Internet Junkbuster?</h3>\r
-\r
- <p><a name="localhost"></a>If you set up the Internet\r
- Junkbuster to run on the computer you browse from (rather than\r
- your ISP's server or some networked computer at work), the\r
- proxy will be on <code>localhost</code> (which is the special\r
- name used by every computer on the Internet to refer to itself)\r
- and the port will be <code>8000</code> (unless you have told\r
- the Internet Junkbuster to run on a different port with the <a\r
- href="ijbman.html#listen-address">listen-address</a> option).\r
- So you when configuring your browser's proxy settings you\r
- typically enter the word <code>localhost</code> in the two\r
- boxes next to <b class="eg">HTTP</b> and <b class="eg">\r
- Secure</b>, and the number <code>8000</code> in the two boxes\r
- labeled to the right of those boxes. <a name="Gopher"></a>The\r
- Internet Junkbuster does not currently handle other protocols\r
- such as Gopher, FTP, or WAIS, so leave those setting unchanged.\r
- Nor does it handle ICQ or Instant Messenger services.</p>\r
-\r
- <p><a name="remote"></a>If your ISP or company is running the\r
- Internet Junkbuster for you, they will tell you the address to\r
- use. It will be the name of the computer it's running on (or\r
- possibly its numeric IP address), plus a port number. Port 8000\r
- is the default, so assume this number if it is not specified.\r
- Sometimes a colon is used to glue them together, as in <code>\r
- junkbuster.fictitious-pro-privacy-isp.net:8000</code> but with\r
- most browsers you do not type the colon, you enter the address\r
- and port number in separate boxes.</p>\r
-\r
- <h3><a name="set"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> How do I tell the browser where\r
- to find the Internet Junkbuster?</h3>\r
-\r
- <p>All current browsers can be told the address of a proxy to\r
- use. You enter the same information in two fields in your\r
- browser's proxy configuration screen (see list below): one for\r
- HTTP, and one for the Secure Protocol (assuming your browser\r
- supports SSL). If you find some information already entered for\r
- your proxy, see the next question. Here are the menus you go\r
- through to get to the proxy configuration settings. (We also\r
- recommend that you disable Java, which is a separate\r
- operation.) <strong>Make notes on the changes you make so you\r
- know how to undo them!</strong> You will need to know what you\r
- did in case you wish to discontinue using the proxy.</p>\r
-\r
- <ol type="1">\r
- <li><a name="netscape"></a>For Netscape 2.01, 2.02 and 3.0\r
- [Graphic Illustration]: <b class="eg">Options</b>; <b class=\r
- "eg">Network Preferences</b>; <b class="eg">Proxies</b>; <b\r
- class="eg">Manual Proxy Configuration View ;</b> enter proxy\r
- address details under <b class="eg">HTTP</b> and <b class=\r
- "eg">Security Proxy</b>; click on <b class="eg">OK</b>; click\r
- on the next <b class="eg">OK</b>. [Return to Windows\r
- Installation Procedure]<br>\r
- With Netscape 2.0, follow with <b class="eg">Options</b>, <b\r
- class="eg">Save Options</b>.<br>\r
- <a name="Netscape4.02"></a>With Netscape 4.X series, you\r
- first have to go through <b class="eg">Edit/Preferences</b>.\r
- [Graphic Illustration] Then in the frame on the left, click\r
- on triangle pointing to the right towards the word <b class=\r
- "eg">Advanced</b>; it will switch to a triangle pointing\r
- down; and the words <b class="eg">Cache</b>, <b class="eg">\r
- Proxies</b> and <b class="eg">Disk Space</b> appear. Click on\r
- <b class="eg">Proxies</b> and the frame on the right will\r
- display a banner saying <b class="eg">Proxies Configure\r
- proxies to access the Internet</b>. Click the radio button\r
- labeled <b class="eg">Manual proxy configuration</b> then\r
- click the button labeled <b class="eg">View</b>; enter proxy\r
- address details under <b class="eg">HTTP</b> and <b class=\r
- "eg">Security Proxy</b>; click on <b class="eg">OK</b>; click\r
- on the next <b class="eg">OK</b>. [Return to Windows\r
- Installation Procedure]</li>\r
-\r
- <li><a name="explorer3"></a>For Internet Explorer 3.0\r
- [Graphic Illustration]: <b class="eg">View</b>; <b class=\r
- "eg">Options</b>; <b class="eg">Connections</b>; tick <b\r
- class="eg">Connect through proxy server</b> box; <b class=\r
- "eg">Settings</b>; enter proxy address details <b class="eg">\r
- HTTP</b> Box, with port number in the second box; same with\r
- <b class="eg">Secure</b>; click on <b class="eg">OK</b>.\r
- [Return to Windows Installation Procedure]</li>\r
-\r
- <li><a name="explorer2"></a>For Internet Explorer 2.0: <b\r
- class="eg">View</b>; <b class="eg">Options</b>; <b class=\r
- "eg">Proxy</b>; enter proxy address details click on <b\r
- class="eg">OK</b>. [Return to Windows Installation\r
- Procedure]</li>\r
-\r
- <li><a name="nt"></a>On NT for MS-IE: <b class="eg">Control\r
- Panel</b>; <b class="eg">Internet</b>; <b class="eg">\r
- Advanced</b>; <b class="eg">Proxy</b>.</li>\r
-\r
- <li><a name="if"></a>For MS-IE 4.0: similar to 3.0: <b class=\r
- "eg">View</b>; <b class="eg">Internet Options</b>; <b class=\r
- "eg">Connection</b>; tick <b class="eg">Access Internet using\r
- a proxy server</b> box; from there we have had reports of\r
- different versions, either click on <b class="eg">\r
- Advanced</b> or <b class="eg">Settings</b>; enter proxy\r
- address details <b class="eg">HTTP</b> Box, with port number\r
- in the second box; same with <b class="eg">Secure</b>; click\r
- on <b class="eg">OK</b>. Note that 4.0 has <b class="eg">\r
- Advanced</b> settings to allow HTTP 1.1 through proxies;\r
- these must be disabled because the proxy does not currently\r
- understand HTTP 1.1. Please tell us if you see any other\r
- differences. [Return to Windows Installation Procedure]</li>\r
-\r
- <li><a name="IE5"></a>For MS-IE 5.0: similar to 4.0: <b\r
- class="eg">Tools|Internet Options</b> from the menu bar; <b\r
- class="eg">Connections</b>. Select either dial-up connection\r
- or LAN (depending on how you connect to the Internet); press\r
- <b class="eg">Settings</b>; and check the <b class="eg">Use\r
- Proxy Server</b> box; enter proxy address details in the <b\r
- class="eg">HTTP</b> Box, with port number in the second box;\r
- same with <b class="eg">Secure</b>; click on <b class="eg">\r
- OK</b> buttons to get out. <em>Note:</em> <a name=\r
- "defaulted"></a>You must also uncheck the HTTP 1.1 checkboxes\r
- at the end of the <b class="eg">Advanced</b> options. This\r
- seems to have been made the default in IE 5.0. [Return to\r
- Windows Installation Procedure]</li>\r
-\r
- <li><a name="level5"></a>For Netscape's level 5 browser, we\r
- have no information. If you do, please tell us.</li>\r
-\r
- <li><a name="mosaic"></a>For NCSA Mosaic for Windows: <b\r
- class="eg">Options</b>, <b class="eg">Preferences</b>, <b\r
- class="eg">Proxy</b>; enter proxy address details under <b\r
- class="eg">HTTP</b>.</li>\r
-\r
- <li><a name="Opera"></a>For Opera: <b class="eg">\r
- Preferences</b>, <b class="eg">Proxy servers</b>; check the\r
- box next to HTTP; enter the server and port number in the box\r
- on the other side; click on <b class="eg">OK</b>.</li>\r
-\r
- <li><a name="lynx"></a>For Lynx, Mosaic/X, <a href=\r
- "http://monty.cnri.reston.va.us/grail-0.3/">Grail,</a> and\r
- W3O Arena, you can specify the proxy via environment\r
- variables before starting the application. This will probably\r
- be done with something like either<br>\r
- <code>setenv http_proxy\r
- http://localhost:8000/</code><br>\r
- or<br>\r
- <code>\r
- http_proxy=http://junkbuster.fictitious-pro-privacy-isp.net:8000/\r
- export http_proxy</code><br>\r
- depending on your shell and where the Internet Junkbuster\r
- lives.</li>\r
- </ol>\r
-\r
- <p>If your browser is not listed here, or if you notice an\r
- error, please tell us the correct procedure.</p>\r
-\r
- <h3><a name="already"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> What should I do if I find\r
- another proxy is already configured?</h3>\r
-\r
- <p>Some ISPs and companies require all Web traffic to go\r
- through their proxy. In this case you would find your proxy\r
- configuration with values already set, possibly under <a name=\r
- "Automatic"></a>Automatic Proxy Configuration (in the case of\r
- Netscape and MS-IE 3.0 and above). It's probably a firewall\r
- proxy between your company and the outside world, <a name=\r
- "cache"></a>or a caching proxy if you're using an ISP.</p>\r
-\r
- <p><a name="f"></a>What needs to be done in this case is to use\r
- the <a href="ijbman.html#forwardfile">forwardfile</a> option to\r
- tell the Internet Junkbuster the address of the other proxy.\r
- Specify a different (unused) port number with the <a href=\r
- "ijbman.html#listen-address">listen-address</a> option, and\r
- configure your browser to use that port. If you haven't done\r
- this kind of thing before, it's probably best to consult your\r
- systems administrator or ISP about it; check their web page\r
- first.</p>\r
-\r
- <h3><a name="discontinue"></a><img border="0" src="fb.gif" alt=\r
- "*" width="14" height="14"> What if I want to stop using\r
- the Internet Junkbuster?</h3>\r
-\r
- <p>Just go through the same procedure you used to start your\r
- browser using the Internet Junkbuster, but remove the details\r
- you put in (or if there was something there before, restore\r
- it). You may need to use <b class="eg">Save Options</b> to make\r
- this change permanent. On Netscape 3.0 you can go through <b\r
- class="eg">Options</b>; <b class="eg">Network Preferences</b>;\r
- <b class="eg">Proxies</b> and click on <b class="eg">No\r
- Proxy</b> to turn it off, and later click on <b class="eg">\r
- Manual Proxy Configuration</b> if you want to start using it\r
- again. (No need to enter the again details under <b class="eg">\r
- View</b> as you did the first time; they should remain there\r
- unchanged.)</p>\r
-\r
- <p><a name="shut"></a>This stops your browser talking to the\r
- proxy; shutting down the proxy is a different matter.</p>\r
-\r
- <h3><a name="dial"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Automatic dialing isn't working\r
- any more. How do I fix it?</h3>\r
-\r
- <p>Some browsers (such as MSIE-4) can be configured to dial\r
- your ISP automatically when you click on a link, but this\r
- feature (called "automatically connect" or "autoconnect") gets\r
- disabled if you specify a proxy running on your own computer\r
- (with address <code>localhost</code> or <code>127.0.0.1</code>)\r
- because these addresses don't require dialing. The Internet\r
- Junkbuster knows nothing about dialing, so it doesn't work. To\r
- make automatic dialing work, make up a name such as <code>\r
- junkbuster.ijb</code> and use that name in the proxy settings\r
- instead of <code>localhost</code>, and then add the line <code>\r
- 127.0.0.1 junkbuster.ijb</code> to the file <code>\r
- c:\windows\hosts</code> (if there already is a line beginning\r
- with <code>127.0.0.1</code> just add <code>\r
- junkbuster.ijb</code> at the end of it.)</p>\r
-\r
- <p><a name="also"></a>This should also work Netscape\r
- Communicator 4 on machines where IE-4 has been installed.</p>\r
-\r
- <p align="center"><a href="#top_of_page"><img border="0" src=\r
- "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
- "15"></a></p>\r
-\r
- <h2><a name="local"></a>Setting up the Internet Junkbuster on\r
- your local computer</h2>\r
-\r
- <p>The next two sections assume you wish to compile the code\r
- with your own C compiler. <a name="install"></a>If you just\r
- want to use the <code>.exe</code> file provided for Windows,\r
- see the Windows Installation page.</p>\r
-\r
- <h3><a name="u"></a><img border="0" src="fb.gif" alt="*" width=\r
- "14" height="14"> How do I compile the code under\r
- Unix?</h3>\r
-\r
- <p>If you are running Redhat Linux you may prefer to use the\r
- rpm instead of the following procedure.</p>\r
-\r
- <ol type="1">\r
- <li><a name="download"></a>First download the tar file\r
- (~286k) <a name="tar"></a>and uncompress and extract the\r
- files from it with this command<br>\r
- <code>uncompress -c ijb20.tar.Z | tar xf\r
- -</code></li>\r
-\r
- <li><a name="sun"></a>If your operating system is from Sun or\r
- HP examine the <code>Makefile</code> and make any changes\r
- indicated inside.</li>\r
-\r
- <li><a name="make"></a>Run<br>\r
- <br>\r
- <code>make</code></li>\r
-\r
- <li>\r
- <a name="defaults"></a>Copy the sample configuration file\r
- (<code>junkbstr.ini</code>, previously called <code>\r
- sconfig.txt</code> and other names in earlier releases) to\r
- some convenient place such as <code>\r
- /usr/local/lib/junkbuster/configfile</code> or whatever you\r
- choose. The sample file has all the options commented out.\r
- You can remove the <code>#</code> character on any that you\r
- want, but it may be better to leave this until to later.\r
- Run it asynchronously:<br>\r
- <br>\r
- <code>junkbuster configfile &</code>\r
- \r
-\r
- <p>If you are running a version earlier than 2.0 you can\r
- start it with <code>junkbuster &</code></p>\r
- </li>\r
-\r
- <li><a name="config"></a>Configure your browser (described\r
- above).</li>\r
-\r
- <li><a name="test"></a>Verify that the Internet Junkbuster is\r
- working (described above).</li>\r
-\r
- <li><a name="restart"></a>Decide on the options you really\r
- want, <code>kill</code> the process and start it again. The\r
- most popular option is <a href="ijbman.html#blockfile">\r
- blockfile</a> to block ads. <a name="comprehensive"></a>A\r
- sample blockfile is provided as an illustration, but it\r
- doesn't really stop many ads. More comprehensive ones are\r
- available elsewhere.</li>\r
-\r
- <li><a name="rc"></a>You'll probably want to add an entry to\r
- <code>/etc/rc.d/rc.local</code> or equivalent to start it at\r
- boot time. (Any output you specify should be redirected to a\r
- file. And don't forget the & at the end to run it\r
- asynchronously or your system will seize up after the next\r
- reboot.)</li>\r
- </ol>\r
-\r
- <h3><a name="win"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> How do I compile the code under\r
- Windows?</h3>\r
-\r
- <p>A <code>.exe</code> file (binary) is supplied with the\r
- source code, but if you prefer to compile it yourself here is\r
- the likely procedure. Most of these steps are repeated in our\r
- checklist for installation under Windows.</p>\r
-\r
- <ol type="1">\r
- <li><a name="zip"></a>First click here to download the zip\r
- file called <code>ijb20.zip</code> (~208k), then uncompress\r
- and unpack the zip archive using a tool like WinZip.</li>\r
-\r
- <li><a name="change"></a>Now the distribution (source and\r
- sample files) will be in a folder called <code>ijb20</code>.\r
- Go into that folder and then edit the Makefile for your\r
- system, removing the comment character (<code>#</code>) in\r
- the lines related to Win32. Then type:<br>\r
- <code>nmake</code><br>\r
- This should create an executable called <code>\r
- junkbstr.exe</code>. <a name="compilers"></a>For information\r
- on issues with various compilers, see the Distribution\r
- Information page.</li>\r
-\r
- <li>\r
- <a name="attempt"></a>Run the executable with the\r
- command:<br>\r
- <code>junkbstr</code><br>\r
- <a name="terminal"></a>(Click on the icon with that name\r
- that looks like a terminal, not like a notepad.) The\r
- program will produce a message indicating that it has\r
- started and is ready to serve. \r
-\r
- <p><a name="ini"></a>(Version 2.0.1 and above uses the file\r
- <code>junkbstr.ini</code> as the config file if it exists\r
- and no argument was given. If you have an earlier version\r
- or if you want it to use a different config file, simply\r
- specify that file as the argument.)</p>\r
- </li>\r
-\r
- <li><a name="configures"></a>Configure your browser\r
- (described above).</li>\r
-\r
- <li><a name="work"></a>Check the proxy is working (described\r
- below).</li>\r
-\r
- <li>\r
- <a name="shortcut"></a>To have the proxy start itself\r
- automatically when you login to Win95, drop the\r
- ``shortcut'' to the <code>junkbstr</code> executable into\r
- the StartUp folder:<br>\r
- <code>C:\Windows\Start\r
- Menu\Programs\StartUp</code><br>\r
- You might want to change the shortcut's <code>\r
- Properties->Shortcut</code> to <code>Run:\r
- Minimized</code>. If you specify the <a href=\r
- "ijbman.html#hide-console">hide-console</a> option then the\r
- DOS window will vanish after it starts. \r
-\r
- <p><a name="NT"></a>WinNT users can put it into their own\r
- StartUp folders or the Administrator can put it into the\r
- system's global StartUp folder. For details on how to make\r
- this a service under NT see our Windows page.</p>\r
- </li>\r
- </ol>\r
-\r
- <h3><a name="check"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> How do I check that the proxy is\r
- working?</h3>\r
-\r
- <p>Pick a page from somewhere (such as your bookmarks, or just\r
- one that your browser was pointing to) and <b class="eg">\r
- Reload</b> it. If you get a message along the lines of ``server\r
- not responding, using cached copy instead,'' see the advice\r
- above. If the page reloads OK, check that your browser is\r
- actually talking to the proxy by going to\r
- http://internet.junkbuster.com/cgi-bin/show-proxy-args or any\r
- URL ending in <code>show-proxy-args</code> (as described below,\r
- the proxy should intercept the request.) When you see\r
- ``Internet Junkbuster Proxy Status,'' you'll know it's\r
- working.</p>\r
-\r
- <h3><a name="chain"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> How and why would I have this\r
- proxy chained with other proxies?</h3>\r
-\r
- <p>You may need the <a href="ijbman.html#forwardfile">\r
- forwarding</a> feature to ``daisy chain'' the Internet\r
- Junkbuster to another proxy, perhaps an anonymizing proxy to\r
- conceal your IP address, or a caching proxy from your ISP, or a\r
- firewall proxy between your company and the outside world.\r
- Version 2.0 and above can be even configured to forward <a\r
- href="ijbman.html#forwardfile">selectively</a> according to the\r
- URL requested: for example, connecting directly to trusted\r
- hosts, but going through an anonymizing or firewall proxy for\r
- all other hosts.</p>\r
-\r
- <p><a name="administrator"></a>Network administrators might use\r
- it to provide transparent access to multiple networks without\r
- modifying browser configurations. <a name="direct"></a>Most\r
- browsers also provide a way of specifying hosts that the\r
- browser connects to directly, bypassing the proxy. Some provide\r
- a method for Automatic Proxy Configuration. A well written\r
- Internet Junkbuster configuration can be much more flexible and\r
- powerful.</p>\r
-\r
- <p><a name="example"></a>An ISP's caching proxy would typically\r
- be called something like <code>cache.your-isp.net:8080</code>\r
- (as described on you ISP's web page); you would put this\r
- information in your <a href="ijbman.html#forwardfile">\r
- forwardfile</a> as described in our manual. Your browser would\r
- be configured to the Internet Junkbuster for HTTP and Security\r
- Proxies as before, but you probably want to tell it to use the\r
- caching proxy for FTP and other protocols. <a name="nonlocal">\r
- </a>If your ISP is running the Internet Junkbuster for you,\r
- they have probably already decided whether to chain with a\r
- caching proxy.</p>\r
-\r
- <h3><a name="socks"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> How does the Internet Junkbuster\r
- work with SOCKS gateways?</h3>\r
-\r
- <p>There is support for some gateways in Version 1.4 and above.\r
- The gateway protocol used to be specified on the command line;\r
- it is now specified in the same file as <a href=\r
- "ijbman.html#forwardfile">forwarding.</a> Note that the\r
- browser's proxy configuration must <em>not</em> specify a\r
- <code>SOCKS</code> host; it should specify the proxy as\r
- described above.</p>\r
-\r
- <h3><a name="plain"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> How do I configure it to be just\r
- a plain old proxy?</h3>\r
-\r
- <p>To get the proxy to do as little as possible (which means\r
- not deleting any sensitive headers), place in your\r
- configuration file the following three lines (each ending in a\r
- space then a period) to stop it changing sensitive headers:<br>\r
- <code>referer .</code><br>\r
- <code>from .</code><br>\r
- <code>user-agent .</code><br>\r
- <code>cookiefile mycookiefile</code><br>\r
- The fourth line is also needed to specify a <a href=\r
- "ijbman.html#o_c">cookiefile</a> that might be called <code>\r
- mycookiefile</code> containing a single line with a <code>\r
- *</code> character, to allow all cookies through.</p>\r
-\r
- <h3><a name="shutdown"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> How do I shut down the proxy (to\r
- restart it)?</h3>\r
-\r
- <p>It depends on your platform.</p>\r
-\r
- <ol type="1">\r
- <li><a name="X"></a>Under Windows, you can click on the "X"\r
- button at the top right of the DOS window (and answer <b\r
- class="eg">Yes</b> when Windows warns you it cannot shut down\r
- the program automatically), or use <b class="eg">\r
- Ctrl-Break</b> or the old three-fingered salute of <b class=\r
- "eg">Ctrl-Alt-Delete</b> and select <b class="eg">End\r
- Task</b>.</li>\r
-\r
- <li><a name="ps"></a>Under UNIX ® you'll need to <code>\r
- kill</code> the <b><code>junkbuster</code></b> process. <a\r
- name="pid"></a>If you don't know the process number to give\r
- to <code>kill</code>, try this:<br>\r
- <code>ps ax | grep junkbuster</code></li>\r
- </ol>\r
-\r
- <p align="center"><a href="#top_of_page"><img border="0" src=\r
- "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
- "15"></a></p>\r
-\r
- <h2><a name="companies"></a> Information for companies</h2>\r
-\r
- <h3><a name="think"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> What do advertising companies\r
- think of this kind of technology?</h3>\r
-\r
- <p>We've seen only a few public comments from the advertising\r
- industry on this, other than SEC filings. First, the president\r
- of the Internet Advertising Bureau told CNET that he wasn't\r
- worried by banner blockers. Second, after the Federal Trade\r
- Commission's workshop where we gave a live demonstration of our\r
- proxy before many eminent representatives of the industry, the\r
- Direct Marketing Association made the following statement in\r
- the closing paragraphs of their summary comments to the\r
- Commission.</p>\r
-\r
- <blockquote>\r
- Clever shareware developers have come up with products that\r
- can obliterate cookies and advertisements for those consumers\r
- who have these concerns. The Internet is a market that is so\r
- democratic and flexible that it is easy for companies and\r
- software developers to respond to a perceived market need.\r
- </blockquote>\r
-\r
- <p>Their attitude seems to be that they would prefer that\r
- people use technical solutions to protect their privacy than\r
- have protections imposed by legislation or government\r
- regulations. So, do you perceive a market need? Then here are\r
- some ways to flex your democratic muscles.</p>\r
-\r
- <h3><a name="nobrainer"></a><img border="0" src="fb.gif" alt=\r
- "*" width="14" height="14"> Should we provide the\r
- Internet Junkbuster for our employees?</h3>\r
-\r
- <p>That depends. Try this quick three-point test.</p>\r
-\r
- <ol type="1">\r
- <li><a name="waste"></a>Do you want to spend your\r
- communications budget on bandwidth that wastes your\r
- employees' time by forcing them to wait for a lot of annoying\r
- distractions while they're trying to do their jobs?</li>\r
-\r
- <li><a name="surveillance"></a>Do you want current and\r
- potential vendors to know quantitative details about the\r
- software and hardware platforms that you have?</li>\r
-\r
- <li><a name="intelligence"></a>Do you want your competitors\r
- to be able to track exactly which of your employees are\r
- checking out their web sites?</li>\r
- </ol>\r
-\r
- <p>If the answer to all three questions is yes, then you\r
- probably don't have any need for this kind of product.</p>\r
-\r
- <h3><a name="commercial"></a><img border="0" src="fb.gif" alt=\r
- "*" width="14" height="14"> Can our company get\r
- commercial support for the software?</h3>\r
-\r
- <p>Yes, ask us for a quote on a maintenance contract with your\r
- choice of phone and email support, hard copy documentation,\r
- source code and pre-compiled binaries on tape or disk, and\r
- email alerting of upgrades and issues. We also offer consulting\r
- services to help set up ``stealth browsing'' capabilities to\r
- help reduce the footprints left while doing competitive\r
- analysis and other Web work where confidentiality is\r
- critical.</p>\r
-\r
- <h3><a name="isps"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> I run an ISP. What issues should\r
- I consider before offering it?</h3>\r
-\r
- <p>Many ISPs who offer the proxy to their customers have told\r
- us that most of their customers are delighted with it (although\r
- one reported that a customer complaint that without banner ads,\r
- surfing was like reading a novel: we recommend making it\r
- optional). Many ISPs like it because it reduces bandwidth\r
- requirements. To help get you started, here's a checklist we've\r
- developed from working with a few ISPs. You may think of more,\r
- and we'd be interested if you're willing to share them with\r
- us.</p>\r
-\r
- <ol type="1">\r
- <li><a name="pending"></a>If you get more than one request\r
- for the Internet Junkbuster you may want to tell your\r
- customers on your News page that you already know about it\r
- and are assessing it.</li>\r
-\r
- <li><a name="try"></a>Try the software and verify that it\r
- performs satisfactorily.</li>\r
-\r
- <li><a name="value"></a>Determine whether your customers\r
- perceive the service as valuable (and therefore worth the\r
- time to set up). We've had reports of many delighted\r
- customers.</li>\r
-\r
- <li><a name="secure"></a>Assess the level of security\r
- associated with the software. If access is to be restricted\r
- (to just dial-in ports, for example) how is this to be\r
- done?</li>\r
-\r
- <li><a name="costs"></a>Consider whether to expect any\r
- additional load on computing resources required, and any\r
- change in use of bandwidth due to the blocking of large\r
- GIFs.</li>\r
-\r
- <li><a name="opt"></a>Choose the <a href="ijbman.html">\r
- options</a> you wish to provide.</li>\r
-\r
- <li>\r
- <a name="multiple"></a>Decide whether you want to offer a\r
- choice of configurations, such some of these four. \r
-\r
- <ol type="A">\r
- <li><a name="banner"></a>Banners Blocked, Wafer with\r
- No-Cookie-Copyright notice</li>\r
-\r
- <li><a name="low"></a>Cookies not stopped (<a href=\r
- "ijbman.html#cookiefile">cookiefile</a> with just a\r
- <code>*</code> in it), User Agent specified as Lynx</li>\r
-\r
- <li><a name="oneway"></a>Cookies from browser allowed,\r
- permitting registered services</li>\r
-\r
- <li><a name="kid"></a>A proxy for kids.</li>\r
- </ol>\r
- <a name="caching"></a>If you run a caching proxy, decide\r
- whether the Internet Junkbuster will chain with it by\r
- default, and whether to offer an alternate with no caching.\r
- (Some ISPs don't, because they want to give customers an\r
- incentive to use caching and save bandwidth.)\r
- </li>\r
-\r
- <li><a name="naming"></a>Decide on a naming scheme for your\r
- proxies. If you're running only one proxy on one machine, the\r
- simplest way is to just use port 8000 on your main machine,\r
- such as <code>our-isp.net.</code> But it would probably be\r
- safer to put an entry in your name server and call it\r
- something like <code>junkbuster.our-isp.net.</code> If\r
- running several proxies, you could either use different ports\r
- on the same machine, or if you have the opportunity to\r
- distribute the load over a few machines you could use\r
- different hostname aliases such as <code>\r
- banner.junkbuster.our-isp.net</code>, <code>\r
- lynx.junkbuster.our-isp.net</code> and <code>\r
- oneway.junkbuster.our-isp.net</code> (corresponding to the\r
- examples in the previous point). You may want to set up\r
- Automatic Proxy Configuration.</li>\r
-\r
- <li>\r
- <a name="document"></a>Prepare a page explaining the\r
- Internet Junkbuster to your customers. <a name="does"></a>\r
- Here's are some examples from Australia, Germany, Florida,\r
- New York/New Jersey/Pennsylvania, North Carolina, Texas,\r
- and Utah. <a name="reuse"></a>You are welcome to copy and\r
- modify material from Junkbusters according to the GPL. You\r
- might want to set up a process to check this page\r
- periodically and update it when it changes. (A few links\r
- can probably serve as well as lot of copying however.) A\r
- typical page would probably specify the following. \r
-\r
- <ol type="1">\r
- <li><a name="abstract"></a>A brief explanation stating\r
- what the Internet Junkbuster does, with a link to this\r
- page.</li>\r
-\r
- <li><a name="addresses"></a>The addresses of the proxy or\r
- proxies, with their port number(s).</li>\r
-\r
- <li><a name="options"></a>The options used, and how to\r
- view the contents of the blockfile (which you can place\r
- on your web pages, preferably in a file called <code>\r
- blocklist.html</code> or <code>\r
- blocklist.txt</code>).</li>\r
-\r
- <li><a name="additions"></a>An indication of whether\r
- suggestions for the blocklist are considered, and if so,\r
- how to submit them: to a particular email address, via\r
- web-based form, etc.</li>\r
-\r
- <li><a name="configuration"></a>Instructions on how to\r
- configure a browser. You may want to include details for\r
- only the two major browsers and leave the others to a\r
- link.</li>\r
-\r
- <li><a name="service"></a>Procedures on how to report\r
- problems, give feedback etc.</li>\r
- </ol>\r
- </li>\r
-\r
- <li><a name="beta"></a>Invite a small number of\r
- technologically sophisticated customers to beta-test the\r
- service.</li>\r
-\r
- <li><a name="announce"></a>Announce general availability on\r
- your ``News'' page. Tell us if you would like to be included\r
- on a list of ISPs offering the Internet Junkbuster.</li>\r
- </ol>\r
-\r
- <p align="center"><a href="#top_of_page"><img border="0" src=\r
- "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
- "15"></a></p>\r
-\r
- <h2><a name="blocking"></a> Blocking</h2>\r
-\r
- <h3><a name="readymade"></a><img border="0" src="fb.gif" alt=\r
- "*" width="14" height="14"> Where can I get an example\r
- blockfile that stops most ads?</h3>\r
-\r
- <p>The sample blockfile we provide blocks almost nothing, and\r
- we do not publish blockfiles that stop almost all banner ads.\r
- But others have; you can find them by asking Google. You can\r
- add any part of the new file to your old one (probably called\r
- <code>sblock.ini</code> if you haven't changed the default name\r
- in the latest version) or your just replace it completely. You\r
- probably don't need to restart the proxy.</p>\r
-\r
- <p><a name="pub"></a>If you develop an interesting blocklist\r
- and publish it on the Web, you might want to include the word\r
- ``junkbuster'' in it and use the word ``blocklist'' in the file\r
- name given in the URL so that others can find it with the query\r
- given in the previous sentence.</p>\r
-\r
- <h3><a name="zap"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> If I see an ad I wish I hadn't,\r
- how do I stop it?</h3>\r
-\r
- <p>If your ISP is running the Internet Junkbuster, they should\r
- have a policy on whether they accept suggestions from their\r
- customers on what to block. Consult their web page.</p>\r
-\r
- <p><a name="cover"></a>If you are running the Internet\r
- Junkbuster yourself, you have complete control over what gets\r
- through. Just add a pattern to cover the offending URL to your\r
- blockfile. Version 1.3 and later automatically rereads the\r
- blockfile when it changes, but if you're running an earlier\r
- version you'll have to stop it and restart it.</p>\r
-\r
- <p><a name="target"></a>To choose a pattern you'll first need\r
- to find the URL of the ad you want cover.</p>\r
-\r
- <p><a name="pinpoint"></a>Some people use the <a href=\r
- "ijbman.html#debug">debug</a> <code>1</code> option to display\r
- each URL in a window as the request is sent to the server. It's\r
- then usually an easy task to pick the offending URL from the\r
- list of recent candidates.</p>\r
-\r
- <p><a name="source"></a>Alternatively, you can use <b class=\r
- "eg">View Document Info</b> (or <b class="eg">View Document\r
- Source</b> if your browser doesn't have that). The <b class=\r
- "eg">Info</b> feature has the advantage of showing you the full\r
- URL including the host name, which may not be specified in the\r
- source: there you might see something like <code>\r
- SRC="/ads/click_here_or_die.gif"</code> indicating only the <i>\r
- <dfn>path</dfn></i>. (The host name is assumed to be the same\r
- as the one the page came from.)</p>\r
-\r
- <p><a name="offsite"></a>But ads often come from a different\r
- site, in which case you might see something like <code>\r
- SRC="grabem.n.trackem.com/Ad/Infinitum/SpaceID=1666"</code> or\r
- longer. <a name="warehouse"></a>If the company looks like a\r
- pure ad warehouse (as in the last case), you may want to place\r
- just its domain name in the blockfile, which blocks all URLs\r
- from that site.</p>\r
-\r
- <p><a name="wanted"></a>If the ad comes from a server that you\r
- really want some content from, you can include enough of the\r
- path to avoid zapping stuff you might want. In the first\r
- example above, <code>/ads/</code> would seem to be enough. If\r
- you don't include the domain name, the pattern applies to all\r
- sites, so you don't want such patterns to be too general: for\r
- example <code>/ad</code> would block <code>\r
- /admin/salaries/</code> on your company's internal site.</p>\r
-\r
- <p><a name="image"></a>To speed the blocking of images, some\r
- UNIX ® users create a shell script called <code>\r
- Image:</code> containing a line such as <code>echo $1 | sed\r
- s/http:..// >> $HOME/lib/blockfile</code> that adds its\r
- argument to the user's blockfile. Once an offending image has\r
- been be found using <b class="eg">View Document Info</b> it's\r
- easy to cut-and-paste the line (or part of it) into a shell\r
- window. The same script can be linked to a file called <code>\r
- Frame:</code> to dealing with framed documents, and <code>\r
- junkbuster:</code> to accept the output of the <a href=\r
- "ijbman.html#debug">debug</a> option.</p>\r
-\r
- <p><a name="partial"></a>When compiled without the <i><dfn>\r
- regular expressions</dfn></i> option, the Internet Junkbuster\r
- uses only very simple (and fast) matching methods. The pattern\r
- <code>/banners</code> will not stop <code>\r
- /images/banners/huge.gif</code> getting through: you would have\r
- to include the pattern <code>/images/banners</code> or\r
- something that matches in full from the left. <a name="regex">\r
- </a>So you can get what you want here, the matcher understands\r
- POSIX regular expressions: you can use <code>\r
- /*.*/banners</code> to block and any URL containing <code>\r
- /banners</code> (even in the middle of the path). <a name=\r
- "posix"></a>(In Versions 1.1 through 1.4 they were an option at\r
- compile time; from Version 2.0 they have become the default.)\r
- Regular expressions give you many more features than this, but\r
- if you're not already familiar with them you probably won't\r
- need to know anything beyond the <code>/*.*/</code> idiom. If\r
- you do, a <code>man egrep</code> is probably a good starting\r
- point).</p>\r
-\r
- <p><a name="slash"></a>Don't forget the <code>/</code> (slash)\r
- at the beginning of the path. If you leave it out the line will\r
- be interpreted as a domain name, so <code>ad</code> would block\r
- all sites from Andorra (since <code>.ad</code> is the\r
- two-letter country code for that principality).</p>\r
-\r
- <p><a name="detail"></a>For a detailed technical description of\r
- how pattern matching is done, see the <a href=\r
- "ijbman.html#o_b">manual.</a></p>\r
-\r
- <h3><a name="despite"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> How come this ad is still getting\r
- through anyway?</h3>\r
-\r
- <p>If the ad had been displayed before you included its URL in\r
- the blockfile, it will probably be held in cache for some time,\r
- so it will be displayed without the need for any request to the\r
- server. Using the <a href="ijbman.html#debug">debug</a> <code>\r
- 1</code> option to show each URL as it is fetched is a good way\r
- to see exactly what is happening.</p>\r
-\r
- <p><a name="otherwise"></a>If new items seem to be getting\r
- through, check that you are really running the proxy with the\r
- right blockfile in the options. Check the blockfile for\r
- exceptions.</p>\r
-\r
- <p><a name="java"></a>Some sites may have different ways of\r
- inserting ads, such as via Java. If you have ideas on how to\r
- block new kinds of junk not currently covered, please tell\r
- us.</p>\r
-\r
- <h3><a name="exceptions"></a><img border="0" src="fb.gif" alt=\r
- "*" width="14" height="14"> How do I stop it blocking a\r
- URL that I actually want?</h3>\r
-\r
- <p>You can change the patterns so they don't cover it, or use a\r
- simple feature in Version 1.1 and later: a line beginning with\r
- a <code>~</code> character means that a URL blocked by previous\r
- patterns that matches the rest of the line is let through. For\r
- example, the pattern <code>/ad</code> would block <code>\r
- /addasite.html</code> but not if followed by <code>\r
- ~/addasite</code> in the blockfile. Or suppose you want to see\r
- everything that comes from a site you like, even if it looks\r
- like an ad: simply put <code>~aSiteYouLike.com</code> at the\r
- <em>end</em> of the blockfile. (Order is important, because the\r
- last matching line wins.)</p>\r
-\r
- <p><a name="agreed"></a>As well as unblocking pages that were\r
- unintentionally blocked, this feature is useful for unblocking\r
- ads from a specific source. This might be because you are\r
- interested in those particular ones, or if you have an explicit\r
- agreement to accept certain ads, such as those from a free\r
- web-based email provider.</p>\r
-\r
- <p><a name="blocked"></a>If you want to find out exactly which\r
- pattern in the blockfile a given URL matched, just click on the\r
- words ``Internet Junkbuster'' which are displayed alone on a\r
- page when your browser requests a blocked URL. The proxy\r
- displays a message that pinpoints the pattern for you.</p>\r
-\r
- <h3><a name="children"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Can I block sites I don't want my\r
- children to see?</h3>\r
-\r
- <p>Yes, but remember that <a name="savvy"></a>children who are\r
- technically sophisticated enough to use the browsers' proxy\r
- configuration options could of course bypass any proxy. This\r
- kind of technology can be used as a gentle barrier to remind or\r
- guide the child, but nobody should expect it to replace the\r
- parent's role in setting and enforcing standards of online\r
- behavior for their children.</p>\r
-\r
- <p><a name="recommend"></a>Some ISPs are starting to provide\r
- specialized proxies to protect children. There are two basic\r
- approaches: the ``black list'' and the ``white list'' approach.\r
- <a name="negative"></a>The black list approach allows the child\r
- to go anywhere not explicitly prohibited; the white list\r
- permits visits only to sites explicitly designated as\r
- acceptable.</p>\r
-\r
- <p><a name="positive"></a>It's very easy for anyone to compile\r
- a white list from a page of ``recommended kids sites'' and to\r
- configure an Internet Junkbuster to allow access to those sites\r
- only. (If you publish such a list on the web, please tell us\r
- its URL). Assuming your version isn't an old one without regex,\r
- you can place a <code>*</code> (asterisk) as the first line of\r
- the blockfile (which blocks everything), and then list\r
- exceptions after that. Be careful to make the exception\r
- sufficiently broad: for example, using <code>\r
- ~www.uexpress.com/ups/comics/ch/</code> as the exception for\r
- <cite>Calvin and Hobbes</cite> would block some of the graphic\r
- elements on the page; you would probably want a wider exception\r
- such as <code>~www.uexpress.com/ups/</code> to permit them.</p>\r
-\r
- <p><a name="trust"></a>Version 2.0 has an experimental feature\r
- to permit only sites mentioned in a nominated <a href=\r
- "ijbman.html#trustfile">trusted site.</a> This allows\r
- organizations to build lists of sites for kids to browse, and\r
- the software automatically restricts access to those on the\r
- list.</p>\r
-\r
- <p><a name="scan"></a>Many filtering products actually scan for\r
- keywords in the text of pages they retrieve before presenting\r
- it, but the Internet Junkbuster does not do this. Building a\r
- perfectly reliable black list system is hard, because it's very\r
- difficult to state in advance exactly what is obscene or\r
- unsuitable. For more info see our links page.</p>\r
-\r
- <h3><a name="message"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> What do I see when a page or\r
- graphic is blocked by the proxy?</h3>\r
-\r
- <p>You usually see a broken image icon, but it depends on\r
- several factors beyond the proxy's control. If asked for a URL\r
- matching its blockfile, the proxy returns an HTML page\r
- containing a message identifying itself (currently the two\r
- words ``Internet Junkbuster'') with a status 202 (Accepted)\r
- instead of the usual 200 (OK). (Versions 1.X returned an error\r
- 404: Forbidden, which caused strange behavior in some cases.)\r
- Status 202 is described in the HTTP RFC as indicating that the\r
- request has been accepted but not completed, and that it might\r
- complete successfully in the future (in our case, if the\r
- blockfile were changed).</p>\r
-\r
- <p><a name="depends"></a>The broken image icon is most common\r
- because the browser is usually expecting a graphic. But if it\r
- was expecting text, or if the page happens to be using certain\r
- HTML extensions such as <code>layer</code> and your browser is\r
- a late model from Microsoft, you may see the words ``Internet\r
- Junkbuster'' displayed as a hot link.</p>\r
-\r
- <p><a name="click"></a>Clicking on the link takes you to an\r
- explanation of the pattern in the blockfile that caused the\r
- block, so that you can edit the blockfile and go back and\r
- reload if you really want to see what was blocked. The\r
- explanatory link is generated by the proxy and is automatically\r
- intercepted based on its ending in <code>ij-blocked-url</code>;\r
- even though the site is specified as <code>\r
- http://internet.junkbuster.com</code> no request should\r
- actually made to that site. If one is, it means that the proxy\r
- was been removed after it generated the link.</p>\r
-\r
- <p><a name="layer"></a>To summarize: the identifying link to\r
- the blocking explanation is usually turned into a broken image\r
- icon, but it may be displayed on a page alone, or they may may\r
- be restricted to the particular frame, layer or graphic area\r
- specified in the page containing them. The proxy has no way of\r
- knowing the context in which a URL will be used and cannot\r
- control how the blocking message will be rendered.</p>\r
-\r
- <h3><a name="broken"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Why not replace blocked banners\r
- with something invisible?</h3>\r
-\r
- <p><a name="infringe"></a>Many users have suggested to us that\r
- blocked banners should be replaced by a something like a 1x1\r
- transparent GIF to make the page would look as if there was\r
- nothing ever there. Apart from making it harder to catch\r
- unintended blocking, this might also displease the owners of\r
- the page, who could argue that such a change constitutes a\r
- copyright infringement. We think that merely failing to allow\r
- an included graphic to be accessed would probably not be\r
- considered an infringement: after all this is what happens when\r
- a browser is configured not to load images automatically.\r
- However, we are not lawyers, so anyone in doubt should take\r
- appropriate advice.</p>\r
-\r
- <p><a name="done"></a>In a context where the copyright issue is\r
- resolved satisfactorily, a proxy could simply return a status\r
- 301 or 302 and specify a replacement URL in a <code>\r
- Location</code> and/or <code>URI</code> header. An alternative\r
- would be to use inline code to return a 1 x 1 clear GIF. We do\r
- not publish sample code for this, and we have no way of\r
- stopping others who have.</p>\r
-\r
- <h3><a name="size"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Why not block banners based on\r
- the dimensions of the image?</h3>\r
-\r
- <p>Many users have pointed out that most banner ads come in\r
- standard sizes, so why not block all GIFs of those sizes? This\r
- would theoretically be without fetching the object because the\r
- dimensions are usually given in the <code>IMG</code> tag, but\r
- it would require substantial changes in the code, and we doubt\r
- whether it would be much more effective than a good block\r
- list.</p>\r
-\r
- <h3><a name="embedded"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> What about non-graphic\r
- advertising within the pages I want?</h3>\r
-\r
- <p>The Internet Junkbuster deliberately does not provide a way\r
- of automatically editing the contents of a page, to remove\r
- textual advertising or to repair the holes left by blocked\r
- banners. Other packages such as WebFilter do.</p>\r
-\r
- <p><a name="base"></a>For the same reason, it has no way of\r
- stopping a new browser window being created, because this is\r
- done through the <code>target</code> attribute in the <code>\r
- <a></code> and <code><base></code> elements, not\r
- through headers. Nor do we plan to add a feature to paralyze\r
- animated GIFs.</p>\r
-\r
- <h3><a name="push"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Does it block ads on the\r
- broadcasting ``push'' systems? How about pop-up ads?</h3>\r
-\r
- <p>We haven't tried it but we expect it would probably work on\r
- image ads on push channels. See also adchoice.</p>\r
-\r
- <p><a name="pop"></a>Disabling Javascript stops some pop-up\r
- ads. One problem is that some advertisers throw open a new\r
- browser window to frame the ad. The ad is easily blocked, but\r
- the empty window remains. You can kill it easily, but this is a\r
- chore. We don't see how to stop them other than editing the\r
- HTML from the parent window, which we don't like to do.</p>\r
-\r
- <p><a name="TBTD"></a>The TBTF newsletter warned subscribers to\r
- push information that <a name="LOGTARGET"></a>in IE4, LOGTARGET\r
- allows servers to determine the URLs viewed at their site even\r
- if accessed from cache or through a proxy. If you use this\r
- browser see our instructions on how to disable this.</p>\r
-\r
- <p><a name="pushy"></a>If you find you have experience using\r
- the proxy with push, or have any other advice about it, please\r
- tell us.</p>\r
-\r
- <p align="center"><a href="#top_of_page"><img border="0" src=\r
- "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
- "15"></a></p>\r
-\r
- <h2><a name="cookies"></a> Cookies</h2>\r
-\r
- <p>For background information on cookies see our page\r
- describing their dangers.</p>\r
-\r
- <h3><a name="breakthrough"></a><img border="0" src="fb.gif"\r
- alt="*" width="14" height="14"> Might some cookies still\r
- get through? How can I stop them?</h3>\r
-\r
- <p>Yes, you should expect the occasional cookie to make it\r
- through to your browser. We know of at least three ways this\r
- can happen; please tell us if you find any others. One way is\r
- in secure documents, which are explained below.</p>\r
-\r
- <p><a name="EQUIV"></a>A few sites set cookies using a line\r
- such as <code><META HTTP-EQUIV="Set-Cookie"\r
- CONTENT="flavor=chocolate"></code> in the <code>HEAD</code>\r
- section of an HTML document. <a name="javascript"></a>Cookies\r
- can also be \r
- <!-- IEM: http://cgi.netscape.com/eng/mozilla/Gold/handbook/javascript/ref_a-c.html#cookie_property -->\r
- set and read in JavaScript. To see if this is happening in a\r
- document, view its source, look in the <code>head</code> for a\r
- section tagged <code>script language="JavaScript"</code>. If it\r
- contains a reference to <code>document.cookie</code>, the page\r
- can manipulate your cookie file without sending any cookie\r
- headers. The Internet Junkbuster does not tamper with these\r
- methods. Fortunately they are rarely used at the moment. If a\r
- cookie gets set, it should be stopped by the proxy on its way\r
- back to the server when a page is requested, but it can still\r
- be read in Javascript.</p>\r
-\r
- <p><a name="alert"></a>To prevent cookies breaking through,\r
- <strong>always</strong> keep cookie alerts turned on in your\r
- browser, and disable Java and Javascript. Making the files hard\r
- to write may also help.</p>\r
-\r
- <h3><a name="method"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Exactly how do cookies get\r
- created and stored anyway?</h3>\r
-\r
- <p>When a web site's server sends you a page it also sends\r
- certain ``header information'' which your browser records but\r
- does not display. One of these is a <code>Set-Cookie</code>\r
- header, which specifies the cookie information that the server\r
- wants your browser to record. Similarly, when your browser\r
- requests a page it also sends headers, specifying information\r
- such as the graphics formats it understands. If a cookie has\r
- previously been set by a site that matches the URL it is about\r
- to request, your browser adds a <code>Cookie</code> header\r
- quoting the previous information.</p>\r
-\r
- <p><a name="privacy"></a>For more background information on how\r
- cookies can damage your privacy, see our page on cookies. For\r
- highly detailed technical information see the RFC. The Internet\r
- Junkbuster will show you all headers you use the <a href=\r
- "ijbman.html#debug">debug</a> <code>8</code> option, or you can\r
- get a sample from our demonstration page.</p>\r
-\r
- <h3><a name="break"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> If cookies can't get through,\r
- will some things stop working for me?</h3>\r
-\r
- <p>Possibly. Some personalized services including certain \r
- <!-- IEM: http://my.yahoo.com --> chat rooms require cookies.\r
- <a name="registration"></a>Newspapers that require \r
- <!-- IEM: http://www.nytimes.com/subscribe/sub-bin/new_sub.cgi#agree -->\r
- registration or \r
- <!-- IEM: http://interactive5.wsj.com/regUser.html -->\r
- subscription will not automatically recognize you if you don't\r
- send them the cookie they assigned you. And there are a very\r
- small number of sites that do strange things with cookies; they\r
- don't work for anyone that blocks cookies by any means. Some\r
- sites such as Microsoft explain that their content is so\r
- wonderfully compelling that they will withhold it from you\r
- unless you submit to their inserting cookies.</p>\r
-\r
- <p><a name="hotmail"></a>Many free Web-based email services\r
- require cookies. Hotmail also seems to require allowing both\r
- <code>msn.com</code> and <code>passport.com</code> to set\r
- cookies.</p>\r
-\r
- <p><a name="want"></a>If you want such sites to be given your\r
- cookies, you can use the <a href="ijbman.html#cookiefile">\r
- cookiefile</a> option provided you are running Version 1.2 or\r
- later yourself. Simply include the domain name of those sites\r
- in the <i>cookiefile</i> specified by this option. If it still\r
- doesn't work, the problem may be in other headers.</p>\r
-\r
- <p><a name="one"></a>It's possible to let cookies out but not\r
- in, which is enough to keep some sites happy, but not all of\r
- them: one newspaper site seems to go into an endless frenzy if\r
- deprived of fresh cookies. A cookiefile containing a single\r
- line consisting of the two characters <code>>*</code>\r
- (greater-than and star) permits server-bound cookies only. The\r
- <code>*</code> is a <a href="ijbman.html#wildcard">wildcard</a>\r
- that matches all domains.</p>\r
-\r
- <p><a name="else"></a>If someone else is running the Internet\r
- Junkbuster for you and has a version that \r
- <!-- IAM: ijbfaq.html#registration --> passes server-bound\r
- cookies through, you can try editing your browser's cookie file\r
- to contain just the ones you want, and restart your browser. <a\r
- name="window"></a>To subscribe to a new service like this after\r
- you have started using the Internet Junkbuster, you can try the\r
- following: tell your browser to stop using the Internet\r
- Junkbuster, fill out and submit your subscription details\r
- (allowing that web site to set a cookie), then reconfigure your\r
- browser to use the Internet Junkbuster again (and stop more\r
- cookies being sent). This also requires the <a href=\r
- "ijbman.html#cookiefile">cookiefile</a> option, and its success\r
- depends on the Web site not wanting to change your cookies at\r
- every session. For this reason it does not work at some major\r
- newspaper sites, for example. <a name="buyers"></a>But you may\r
- prefer to look at whether other sites provide the same or\r
- better services without demanding the opportunity to track your\r
- behavior. The web is a buyer's market where most prices are\r
- zero: very few people pay for content with money, so why should\r
- you pay with your privacy?</p>\r
-\r
- <h3><a name="crumble"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Can I control cookies on a\r
- per-site basis?</h3>\r
-\r
- <p><a name="discard"></a>Yes, since version 1.2 the Internet\r
- Junkbuster has included advanced cookie management facilities.\r
- Unless you specify otherwise, cookies are discarded\r
- (``crumbled'') by the Internet Junkbuster whether they came\r
- from the server or the browser. In Version 1.2 and later you\r
- can use the <a href="ijbman.html#cookiefile">cookiefile</a>\r
- option to specify when cookies are to be passed through intact.\r
- It uses the same syntax and <a href="ijbman.html#o_b">\r
- matching</a> algorithm as the blockfile.</p>\r
-\r
- <p><a name="cook"></a>If the URL matches a pattern in the <i>\r
- <dfn>cookiefile</dfn></i> then cookies are let through in both\r
- the browser's request for the URL and in the server's response.\r
- <a name="directional"></a>One-way permissions can be specified\r
- by starting the line with the <code>></code> or <code>\r
- <</code> character. For example, a cookiefile consisting of\r
- the four lines<br>\r
- <code>org</code><br>\r
- <code>>send-user-cookies.org</code><br>\r
- <code>\r
- <accept-server-cookies.org</code><br>\r
- <code>~block-all-cookies.org</code><br>\r
- allows cookies to and from <code>.org</code> domains only,\r
- with the following exceptions:<br>\r
- </p>\r
-\r
- <ol type="1">\r
- <li><a name="fed"></a>Cookies sent from servers in the domain\r
- <code>send-user-cookies.org</code> are blocked on their way\r
- to the client, but cookies sent by the browser to that domain\r
- are still be fed to them.</li>\r
-\r
- <li><a name="take"></a>The cookies of <code>\r
- accept-server-cookies.org</code> check in to the proxy and\r
- are passed through to the browser, but when they come back to\r
- the proxy they never check out.</li>\r
-\r
- <li><a name="deny"></a>All cookies to and from <code>\r
- block-all-cookies.org</code> are blocked.</li>\r
- </ol>\r
-\r
- <p><a name="paths"></a>If the <b><code>junkbuster</code></b>\r
- was compiled with the regular expressions option they may be\r
- used in paths. Any logging to a ``cookie jar'' is separate and\r
- not affected.</p>\r
-\r
- <p><a name="breadth"></a>It's important to give hosts you want\r
- to be able to set cookies sufficient breadth. For example,\r
- instead of <code>www.yahoo.com</code> use <code>\r
- yahoo.com</code> because the company uses many different hosts\r
- ending in that domain.</p>\r
-\r
- <h3><a name="wafers"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Can I make up my own fake cookies\r
- (wafers) to feed to servers?</h3>\r
-\r
- <p>Yes, using the <a href="ijbman.html#wafer">wafer</a> option.\r
- We coined the term <i><dfn>wafer</dfn></i> to describe cookies\r
- chosen by a user, not the Web server. Servers may not find\r
- wafers as tasty as the cookies they make themselves. But users\r
- may enjoy controlling servers' diets for various reasons, such\r
- as the following.</p>\r
-\r
- <ol type="1">\r
- <li><a name="retaliate"></a>Users who consider cookies to be\r
- an unwelcome intrusion and a waste of their disk space can\r
- respond in kind. By writing ``signature wafers'' they can\r
- express their feelings about cookies, in a place that the\r
- people in charge of them are most likely to notice.</li>\r
-\r
- <li>\r
- <a name="notice"></a>Sites running a proxy that logs\r
- cookies to a file (such as the Internet Junkbuster does\r
- with the <a href="ijbman.html#jarfile">jarfile</a> option\r
- on) may want to notify servers that their cookies are being\r
- intercepted, deleted or copied. One possible reason for\r
- doing this is the uncertain copyright status of cookie\r
- strings. Nothing here should be taken as legal advice: we\r
- are simply raising a question for any interested parties to\r
- consider, and make no representation that such measures are\r
- necessary or sufficient. Concerned proxy sites might decide\r
- to send a wafer (named ``NOTICE'' for example) containing\r
- text along the lines of the following. \r
-\r
- <blockquote>\r
- <p><a name="licenses_on_cookies_refused"></a>TO WHOM IT\r
- MAY CONCERN<i><br>\r
- <br>\r
- Do not send me any copyrighted information other than\r
- the document that I am requesting or any of its necessary\r
- components.<br>\r
- <br>\r
- In particular do not send me any cookies that are\r
- subject to a claim of copyright by anybody. Take notice\r
- that I refuse to be bound by any license condition\r
- (copyright or otherwise) applying to any cookie.</i></p>\r
- </blockquote>\r
- Any company that tries to argue in court that the proxy\r
- site was breaching their copyright in the cookies would be\r
- met with the defense that the proxy site gave that company\r
- the opportunity to protect its copyright by simply not\r
- sending cookies after receiving the notice. \r
-\r
- <p><a name="pointer"></a>Cookies can be as long as four\r
- thousand characters, so there's plenty of space for\r
- lawyerly verbosity, but white space, commas, and\r
- semi-colons are <a href="ijbman.html#o_w">prohibited.</a>\r
- Spaces can be turned into underscores. Alternatively, a URL\r
- could be sent as the cookie value, pointing to a document\r
- containing a notice, perhaps with a suggestive value such\r
- as<br>\r
- <code>\r
- http://www.junkbusters.com/ht/en/ijbfaq.html#licenses_on_cookies_refused</code><br>\r
-\r
- But including the notice directly would probably be\r
- preferable because the addressee does not have to look it\r
- up.</p>\r
-\r
- <p><a name="vanilla"></a>The Internet Junkbuster 2.0.2\r
- currently sends a full notice as a ``vanilla wafer'' if\r
- cookies are being logged to a cookie jar and no other\r
- wafers have been specified. It can be suppressed with the\r
- <a href="ijbman.html#suppress-vanilla-wafer">\r
- suppress-vanilla-wafer</a> option, which might be used in\r
- situations where there is an established understanding\r
- between the proxy and all who serve it.</p>\r
- </li>\r
- </ol>\r
-\r
- <p><a name="gimme"></a>Junkbusters provides a CGI script that\r
- lets you see your wafers as they appear to servers.</p>\r
-\r
- <p><a name="malfunction"></a>Wafers confuse a few fragile\r
- servers. Hotmail appears to be one of them. If this troubles\r
- you, don't use this option.</p>\r
-\r
- <p><a name="regardless"></a>Any wafers specified are sent to\r
- all sites regardless of the cookiefile. <a name="compliant">\r
- </a> They are appended after any genuine cookies, to maintain\r
- compliance with RFC 2109 in the event that a path was specified\r
- for a cookie. The RFC's provisions regarding the <code>$</code>\r
- character (such as the <code>Version</code> attribute) are\r
- transparent to the proxy; it simply quotes what was recited by\r
- the browser.</p>\r
-\r
- <p><a name="personalize"></a>If you want to send wafers only to\r
- specific sites, you could try putting them your browser's\r
- cookie file in a format conforming to the Netscape\r
- specification, and then specify in the proxy's cookiefile that\r
- cookies are to be sent to but not accepted from those sites, so\r
- they can't overwrite the file. This may work with Netscape but\r
- not all other browsers.</p>\r
-\r
- <h3><a name="jar"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Why would anyone want to save\r
- their cookies in a ``cookie jar?''</h3>\r
-\r
- <p>We provided this capability just in case anyone wants it.\r
- There are a few possible reasons.</p>\r
-\r
- <ol type="1">\r
- <li><a name="pay"></a>It's conceivable that marketing\r
- companies might one day buy history files and cookie jars\r
- from consumers in the same way that they currently pay them\r
- to fill out survey forms. With this information they could\r
- gather psychographic information, see which competitors'\r
- sites the consumer has visited, and discover what advertising\r
- is being targeted at them.</li>\r
-\r
- <li><a name="choose"></a>Some consumers might employ\r
- semi-automated means of sorting through their cookie jars,\r
- selecting which ones to place in their cookies file for use\r
- by their browsers. Their decisions could be based on payments\r
- offered, privacy rating systems such as TRUSTe proposes, or\r
- their own opinion of the company. It could be done manually\r
- or with software. There's an Internet Draft on trust\r
- certification of cookies.</li>\r
-\r
- <li><a name="share"></a>Users may even start ``sharing''\r
- cookies among themselves, sending back cookies that servers\r
- generated for other visitors. Servers that aren't expecting\r
- this possibility will be misled about their visitors'\r
- identities. Cookies could be shared among users on a single\r
- machine, or across continents via FTP and anonymous\r
- remailers. <a name="disinformation"></a>Privacy activists may\r
- promote cookie disinformation campaigns as a way to defend\r
- the public against abuse. If a significant percentage of\r
- people send disinformative cookies, user tracking via cookies\r
- may become less reliable and less used.</li>\r
- </ol>\r
-\r
- <p align="center"><a href="#top_of_page"><img border="0" src=\r
- "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
- "15"></a></p>\r
-\r
- <h2><a name="anonymity"></a> Anonymity</h2>\r
-\r
- <p>For details on how your identity can be revealed while you\r
- surf, see our page on privacy. Once you start using the\r
- Internet Junkbuster you should find that much of the\r
- information previously indicated on that page will no longer be\r
- provided. If the <code>REMOTE HOST</code> indicating your IP\r
- address is too close for comfort, see our suggestions below on\r
- how to conceal your IP address. We also recommend that you\r
- disable JavaScript and Java.</p>\r
-\r
- <h3><a name="disclose"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> If I use the Internet Junkbuster,\r
- will my anonymity be guaranteed?</h3>\r
-\r
- <p>No. Your chances of remaining anonymous are improved, but\r
- unless you are an expert on Internet security it would be\r
- safest to assume that everything you do on the Web can be\r
- attributed to you personally.</p>\r
-\r
- <p><a name="happen"></a>The Internet Junkbuster removes various\r
- information about you, but it's still possible that web sites\r
- can find out who you are. Here's one way this can happen.</p>\r
-\r
- <p><a name="ftp"></a>A few browsers disclose the user's email\r
- address in certain situations, such as when transferring a file\r
- by FTP. The Internet Junkbuster 2.0.2 does not filter the FTP\r
- stream. If you need this feature, or are concerned about the\r
- mail handler of your browser disclosing your email address, you\r
- might consider products such as NSClean.</p>\r
-\r
- <p><a name="binaries"></a>Browsers downloaded as binaries could\r
- use non-standard headers to give out any information they can\r
- have access to: see the manufacturer's license agreement. It's\r
- impossible to anticipate and prevent every breach of privacy\r
- that might occur. The professionally paranoid prefer browsers\r
- available as source code, because anticipating their behavior\r
- is easier.</p>\r
-\r
- <h3><a name="should"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Why should I trust my ISP or\r
- Junkbusters with my browsing data?</h3>\r
-\r
- <p>You shouldn't have to trust us, and you certainly don't have\r
- to. We do not run the proxy as a service, where we could\r
- observe your online behavior. We provide source code so that\r
- everyone can see that the proxy isn't doing anything\r
- sneaky.</p>\r
-\r
- <p><a name="awful"></a>You are already trusting your ISP not to\r
- look at an awful lot of information on what you do. They\r
- probably post a privacy policy on their site to reassure you.\r
- If they run a proxy for you, using it could actually make it\r
- slightly easier for them to monitor you, but we doubt that any\r
- sane ISP would try this, because if it were discovered\r
- customers would desert them.</p>\r
-\r
- <h3><a name="logging"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Can the proxy be used for logging\r
- who looks at what?</h3>\r
-\r
- <p>We don't want institutions to use this software as an\r
- instrument of surveillance. We have deliberately not provided\r
- options to add timestamps or records of which IP addresses\r
- accessed which URLs. However, because we publish source code\r
- anyone can modify it to do such things, and there is no way a\r
- remote user can find out if this is happening. Again, you need\r
- to be able to trust the entity providing your proxy service,\r
- but you were probably in that position even before using a\r
- proxy.</p>\r
-\r
- <h3><a name="header"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> What private information from\r
- server-bound headers is removed?</h3>\r
-\r
- <p>The Internet Junkbuster pounces on the following HTTP\r
- headers in requests to servers, unless instructed otherwise in\r
- the options.</p>\r
-\r
- <ol type="1">\r
- <li><a name="from"></a>The <code>FROM</code> header, which a\r
- few browsers use to tell your email address to servers, is\r
- dropped unless the <a href="ijbman.html#from">from</a> option\r
- is set.</li>\r
-\r
- <li><a name="agent"></a>The <code>USER_AGENT</code> <a name=\r
- "infer"></a>header is changed to indicate that the browser is\r
- currently Mozilla (Netscape) 3.01 Gold with an unremarkable\r
- Macintosh configuration. Misidentification helps resist\r
- certain attacks. If your browser and hardware happen to be\r
- accurately identified, you might want to change the default.\r
- (Earlier versions of the Internet Junkbuster indicated\r
- different details; by altering them periodically we aim to\r
- hinder anyone trying to infer whether our proxy is present.)\r
- <a name="lying"></a>If you don't like the idea of incorrectly\r
- identifying your computer as a Mac, set it accordingly. \r
- <!-- Aside: or read Kundera's Unbearable Lightness of Being, 5:5, ``It is a tragicomic fact..'' (p187?) --></li>\r
-\r
- <li><a name="referer"></a>The <code>REFERER</code> header\r
- (which indicates where the URL currently being requested was\r
- found) is dropped. A single static referer to replace all\r
- real referers may be specified using the <a href=\r
- "ijbman.html#referer">referer</a> option. Where no referer is\r
- provided by the browser, none is added; the <a href=\r
- "ijbman.html#add-header">add-header</a> option with arguments\r
- such as <code>-x 'Referer: http://me.me.me'</code> can be\r
- used to send a bogus referer with every request.</li>\r
- </ol>\r
-\r
- <p>In Version 1.4 and later you can use the <a href=\r
- "ijbman.html#o_r">-r @</a> option to selectively disclose\r
- <code>REFERER</code> and <code>USER_AGENT</code> to only those\r
- sites you nominate.</p>\r
-\r
- <p><a name="UA"></a>Some browsers send Referer and User-Agent\r
- information under different non-standard headers. The Internet\r
- Junkbuster 2.0.2 stops <code>UA</code> headers, but others may\r
- get through. This information is also available via JavaScript,\r
- so disable it. <a name="indexers"></a>Some search engines\r
- encode the query you typed in the URL that goes to advertisers\r
- to target a banner ad at you, so you will need to block the ad\r
- as well as the referer header, unless you want them (and anyone\r
- they might buy data from) to know everything you ever search\r
- for.</p>\r
-\r
- <p><a name="JavaScript"></a>If you have JavaScript enabled (the\r
- default on most browsers) servers can use it to obtain Referer\r
- and User Agent, as well as your plug-ins. We recommend\r
- disabling JavaScript and Java.</p>\r
-\r
- <p><a name="response"></a>Currently no HTTP response headers\r
- (browser bound) are removed, not even the <code>\r
- Forwarded:</code> or <code>X-Forwarded-For:</code> headers. Nor\r
- are any added, <a href="ijbman.html#o_y">unless requested.</a>\r
- We are considering a more flexible header management system for\r
- a future version.</p>\r
-\r
- <h3><a name="breakage"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Might some things break because\r
- header information is changed?</h3>\r
-\r
- <p>Possibly. If used with a browser less advanced than Netscape\r
- 3.0 or IE-3, indicating an advanced browser may encourage pages\r
- containing extensions that confuse your browser. If this\r
- becomes a problem upgrade your browser or use the <a href=\r
- "ijbman.html#user-agent">user-agent</a> option to indicate an\r
- older browser. In Version 1.4 and later you can selectively\r
- reveal your real browser to only those sites you nominate.</p>\r
-\r
- <p><a name="Russian"></a>Because different browsers use\r
- different encodings of Russian and Czech characters, certain\r
- web servers convert pages on-the-fly according to the User\r
- Agent header. Giving a User Agent with the wrong operating\r
- system or browser manufacturer causes some sites in these\r
- languages to be garbled; Surfers to Eastern European sites\r
- should <a href="ijbman.html#o_r">change it</a> to something\r
- closer.</p>\r
-\r
- <p><a name="counters"></a>Some page access counters work by\r
- looking at the referer; they may fail or break when\r
- deprived.</p>\r
-\r
- <p><a name="wired"></a>Some sites depend on getting a referer\r
- header, such as <code>uclick.com</code>, which serves comic\r
- strips for many newspaper sites, including <cite>\r
- Doonsbury</cite> for the <cite>Washington Post.</cite> (If you\r
- click on that last link, you can then get to a page containing\r
- the strip via the same URL we've linked to under <cite>\r
- Doonsbury</cite>, but if you click on the <cite>\r
- Doonsbury</cite> link directly, it gives you an error message\r
- suggesting that you use a browser that supports referers.) In\r
- Version 1.4 and later you can use the <a href=\r
- "ijbman.html#o_r">-r @</a> option and place a line like <code>\r
- >uclick.com</code> in your cookiefile. Wired News used to\r
- use referer to decide whether to add a navigation column to the\r
- page, but they have changed that.</p>\r
-\r
- <p><a name="Intellicast"></a>The weather maps of Intellicast\r
- have been blocked by their server when no referer or cookie is\r
- provided. You can use the same countermeasure with a line such\r
- as <code>>208.194.150.32</code> (or simply get your weather\r
- information elsewhere).</p>\r
-\r
- <p><a name="decide"></a>Some software vendors, including\r
- Download.com and Intuit use <code>USER_AGENT</code> to decide\r
- which versions of their products to display to you. With the\r
- default you get Mac versions.</p>\r
-\r
- <p><a name="resort"></a>As a last resort if a site you need\r
- doesn't seem to be working, the proxy configuration of many\r
- browsers allow you to specify <b class="eg">No Proxy For</b>\r
- any hostname you want.</p>\r
-\r
- <p><a name="What"></a>We had reports that on some versions of\r
- Netscape the What's New feature did not work with the proxy,\r
- but we think we fixed this in Version 2.0.1.</p>\r
-\r
- <h3><a name="misidentify"></a><img border="0" src="fb.gif" alt=\r
- "*" width="14" height="14"> How is misidentifying my\r
- browser good for security and privacy?</h3>\r
-\r
- <p>Almost every major release of both leading browsers has\r
- contained bugs that allow malicious servers to compromise your\r
- privacy and security. Known bugs are quickly fixed, but\r
- millions of copies of the affected software remain out there,\r
- and yours is probably one of them. The header that normally\r
- identifies your browser tells such servers exactly which\r
- attacks to use against you. By misidentifying your browser you\r
- reduce the likelihood that they will be able to mount a\r
- successful attack.</p>\r
-\r
- <h3><a name="conceal"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Does the Internet Junkbuster\r
- conceal my IP address?</h3>\r
-\r
- <p>Web sites get the IP address of any proxy or browser they\r
- serve pages to. If you run the proxy on your own computer the\r
- IP address disclosed is the same as your browser would, unless\r
- you use the <a href="ijbman.html#forwardfile">forwardfile</a>\r
- option is used to chain to another proxy, in which case servers\r
- only get the last IP address in the chain. Chaining slightly\r
- slows browsing of course, but it improves anonymity.</p>\r
-\r
- <h3><a name="ident"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Does the Internet Junkbuster\r
- thwart identification by identd?</h3>\r
-\r
- <p>We think so, provided you are not the user running the\r
- proxy. If your computer (or your ISP's) is running the <code>\r
- identd</code> demon, servers can ask it for the identity of the\r
- user making the request at time you request a page from them.\r
- But if you're going through a proxy, they will identify the\r
- user name associated with the proxy, not you. A visit to\r
- http://ident.junkbusters.com lets you see what's happening.\r
- This test is (quite rightly) blocked by many firewalls; just\r
- interrupt the transfer if you get an abnormal wait after\r
- clicking. Running other applications may also expose you via\r
- <code>identd</code>; the proxy of course doesn't help then.</p>\r
-\r
- <h3><a name="detect"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Can web sites tell that I'm using\r
- the Internet Junkbuster?</h3>\r
-\r
- <p>With the default options the proxy doesn't announce itself.\r
- Obvious indications such as Keep-Alive headers are <a href=\r
- "ijbman.html#o_x">deleted,</a> but sites might notice that you\r
- can cancel cookies faster than any human could possibly click\r
- on a mouse. (If you want to provide a plausible explanation for\r
- this, change the User Agent header to a cookie-free or\r
- cookie-crunching browser).</p>\r
-\r
- <p><a name="figure"></a>But when certain options are used they\r
- could figure out something's going on, even if they're not\r
- pushing cookies. If you use blocking they can tell from their\r
- logs that the graphics in their pages are not being requested\r
- selectively. The <a href="ijbman.html#add-forwarded-header">\r
- add-forwarded-header</a> option explicitly announces to the\r
- server that a proxy is present, and sending them wafers is of\r
- course a dead giveaway.</p>\r
-\r
- <p align="center"><a href="#top_of_page"><img border="0" src=\r
- "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
- "15"></a></p>\r
-\r
- <h2><a name="security"></a> Security</h2>\r
-\r
- <h3><a name="encrypt"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> What happens with Secure\r
- Documents (SSL, https:)?</h3>\r
-\r
- <p>If you enter a ``Secure Document Area,'' cookies and other\r
- header information such as User Agent and Referer are sent\r
- encrypted, so they cannot be filtered. We recommend getting\r
- your browser to alert you when this happens. (On Netscape: <b\r
- class="eg">Options</b>; <b class="eg">Security</b>; <b class=\r
- "eg">General</b>; <b class="eg">Show an alert before entering a\r
- secure document space</b>.) We also recommend adding the line\r
- <code>:443</code> to the blockfile to stop all but sites\r
- specified in an exception after that line from using SSL.</p>\r
-\r
- <p><a name="passage"></a>It may be possible to filter encrypted\r
- cookies by combining the blocking proxy with a cryptographic\r
- proxy along the lines of SafePassage, but we have not tried\r
- this.</p>\r
-\r
- <h3><a name="ssl"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Will using this as my Security\r
- Proxy compromise security?</h3>\r
-\r
- <p>We're not security experts, but we don't think so. The whole\r
- point of SSL is that the contents of messages are \r
- <!-- IEM: http://addy.com/dc/html/what_is_ssl_.html -->\r
- encrypted by the time they leave the browser and the server.\r
- Eavesdroppers (including proxies) can see where your messages\r
- are going whether you are running a proxy or not, but they only\r
- get to see the contents after they have been encrypted.</p>\r
-\r
- <h3><a name="restrict"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Can I restrict use of the proxy\r
- to a set of nominated IP addresses?</h3>\r
-\r
- <p>Yes, we added an <a href="ijbman.html#aclfile">access\r
- control</a> file in Version 2.0. But before you use it please\r
- consider why you want to do it. If the reason is security, it\r
- probably means you need a firewall.</p>\r
-\r
- <p><a name="selective"></a>The <a href=\r
- "ijbman.html#listen-address">listen-address</a> option provides\r
- a way of binding the proxy to a single IP address/port. The\r
- right way to do this is to choose a port inside your firewall,\r
- and deny access to it to those outside the firewall. The\r
- Internet Junkbuster is not a firewall proxy; it should not be\r
- expected to solve security problems.</p>\r
-\r
- <p><a name="firewall"></a>For background information on\r
- firewalls, see Yahoo or a magazine article or these well-known\r
- books: <cite>Firewalls and Internet Security: Repelling the\r
- Wily Hacker</cite> by William R. Cheswick and Steven M.\r
- Bellovin or <cite>Building Internet Firewalls</cite> by D.\r
- Brent Chapman and Elizabeth D. Zwicky. There's \r
- <!-- IEM: http://www.wmd.de/wmd/staff/pauck/misc/fwtk_on_linux.html -->\r
- free Linux software available, and a large number of commercial\r
- products and services. For an excellent security overview,\r
- primer, and compendium reference, see <cite>Practical Unix and\r
- Internet Security</cite> by Simson Garfinkel and Gene\r
- Spafford.</p>\r
-\r
- <h3><a name="others"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Are there any security risks for\r
- ISPs or others who offer the proxy?</h3>\r
-\r
- <p>Yes. As with any service offered over the Internet, hackers\r
- can try to misuse it. A well-run ISP will have professionals\r
- who are experienced at assessing and containing these\r
- risks.</p>\r
-\r
- <p><a name="outside"></a>It's possible to set up your machine\r
- so that other people can have access to your proxy, but if you\r
- lack expertise in computer security you probably shouldn't have\r
- your computer configured to offer this or any other service to\r
- the outside world.</p>\r
-\r
- <p><a name="attack"></a>Hackers can attempt to gain access to\r
- the machine by various attacks, which we have tried to guard\r
- against but don't guarantee to thwart. They can also use the\r
- ``anonymizing'' quality of proxies to try to cover their tracks\r
- while hacking other computers. For this reason we recommend\r
- preventing it being used as an anonymous <code>telnet</code> by\r
- putting the pattern <code>:23</code> in the blockfile (it's\r
- included as standard equipment). (Actually the current\r
- implementation incidentally blocks telnet due to the way\r
- headers are handled, but it's best not to rely on this.) If you\r
- wish to block all ports except the default HTTP port 80, you\r
- can put the lines<br>\r
- <code>:</code><br>\r
- <code>~:80</code><br>\r
- at the beginning of the blockfile, but be aware that some\r
- servers run on non-default ports (e.g. 8080). You might also\r
- want to add the line <code>~:443</code> to allow SSL.</p>\r
-\r
- <p><a name="root"></a>On UNIX ® systems it is neither\r
- necessary nor desirable for the proxy to run as root.</p>\r
-\r
- <p><a name="patched"></a>Versions 2.0.1 and below may be\r
- vulnerable to remote exploitation of a memory buffer bug; for\r
- security reasons all users are encouraged to upgrade.</p>\r
-\r
- <p><a name="holes"></a>If you find any security holes in the\r
- code please tell us, along with any suggestions you may have\r
- for fixing it. However, we do not claim that we will be able to\r
- do so.</p>\r
-\r
- <p><a name="useful"></a>We distribute this code in the hope\r
- that people will find it useful, but we provide no warranty for\r
- it, and we are not responsible for anyone's use or misuse of\r
- it.</p>\r
-\r
- <p><a name="updates"></a>You may also want to check back\r
- periodically for updated versions of the code. We do not\r
- currently maintain a mailing list. To get quick updates,\r
- bookmark our Distribution Information page.</p>\r
-\r
- <p align="center"><a href="#top_of_page"><img border="0" src=\r
- "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
- "15"></a></p>\r
-\r
- <p class="sans"><a href="http://ijbswa.sourceforge.net/">\r
- Website</a> <b class="dot">·</b> <a href="ijbman.html">\r
- Manual</a> <b class="dot">·</b> <b>FAQ</b> <b class=\r
- "dot">·</b> <a href="gpl.html">GPL</a></p>\r
-\r
- <p class="sans"><small><small><a href="gpl.html#text">\r
- Copyright</a> © 1996-8 <a href=\r
- "http://www.junkbusters.com/">Junkbusters</a> <a href=\r
- "http://www.junkbusters.com/ht/en/legal.html#marks">®</a>\r
- Corporation. <a href="gpl.html#text">Copyright</a> © 2001\r
- <a href="http://sourceforge.net/projects/ijbswa/">Jon\r
- Foster</a>. Copying and distribution permitted under the <a\r
- href="gpl.html">GNU</a> General Public\r
- License.</small></small></p>\r
-\r
- <p><small><code><a href=\r
- "http://sourceforge.net/projects/ijbswa/">\r
- http://sourceforge.net/projects/ijbswa/</a></code></small></p>\r
- </body>\r
-</html>\r
-\r
+++ /dev/null
-<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">\r
-<!-- $Id: ijbman.html,v 1.2 2001/05/17 22:56:17 jongfoster Exp $\r
-\r
- See copyright details at end of file\r
-\r
- After changing this file, please run it through "HTML Tidy"\r
- (from http://www.w3.org/People/Raggett/tidy/)\r
- It should have no warnings or errors.\r
--->\r
-\r
-<html>\r
- <head>\r
- <title>Internet Junkbuster Technical Information</title>\r
- <meta name="description" content=\r
- "The manual page for the Internet Junkbuster, free software to removes banner ads, cookies, and other stuff you don't want from your web browser.">\r
- <meta name="keywords" content=\r
- "stop, junk, busters, junkbusters, junkbuster, mail, email, e-mail, direct, spam, privacy, sharing, names, renting, direct, marketing, database, databases, junk mail, lists, environment, consumer, sending, opt out ">\r
-<style type="text/css">\r
-<!--\r
-h2 { text-align: Center; font-family: arial, helvetica, sans-serif }\r
-p.sans { font-family: arial, helvetica, sans-serif }\r
-b.dot { color: #FF0000 }\r
-b.eg { font-family: arial, helvetica, sans-serif }\r
--->\r
-</style>\r
- </head>\r
-\r
- <body bgcolor="#f8f8f0" link="#000078" alink="#ff0022" vlink=\r
- "#787878">\r
- <p class="sans"><a href="http://ijbswa.sourceforge.net/">\r
- Website</a> <b class="dot">·</b> <b>Manual</b> <b class=\r
- "dot">·</b> <a href="ijbfaq.html">FAQ</a> <b class=\r
- "dot">·</b> <a href="gpl.html">GPL</a></p>\r
-\r
- <h1 align="center"><a name="top_of_page"></a>Internet\r
- J<small>UNK<i style="color: #FF0000">BUSTER</i></small>\r
- Technical Information</h1>\r
-\r
- <p align="center" class="sans"><a href="#description">\r
- Options</a> <b class="dot">·</b> <a href="#show">\r
- Checking Options</a> <b class="dot">·</b> <a href=\r
- "#install">Installation</a> <b class="dot">·</b> <a\r
- href="#copyright">Copyright</a> <b class="dot">·</b> <a\r
- href="ijbfaq.html#top_of_page">(FAQ)</a></p>\r
-\r
- <h1>This document is out of date</h1>\r
-\r
- <p><b>Development of JunkBuster is ongoing and this document is\r
- no longer current. However, it may provide some assistance. If\r
- you have problems, please use the <a href=\r
- "http://groups.yahoo.com/group/junkbuster-users/">Yahoo Groups\r
- mailing list</a> (which includes an archive of mail), the\r
- SourceForge.net <a href=\r
- "http://sourceforge.net/projects/ijbswa/">project page</a>, or\r
- see the project's <a href="http://ijbswa.sourceforge.net/">home\r
- page</a>. Please also bear in mind that versions 2.9.x of\r
- JunkBuster are development releases, and are not production\r
- quality.</b></p>\r
-\r
- <h2><a name="man"></a>Manual Page</h2>\r
-\r
- <p>A copy of this page in standard <code>man</code> macro\r
- format is included in the <a href="ijbfaq.html#tar">tar\r
- archive</a>.</p>\r
-\r
- <h3><a name="name"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Name</h3>\r
-\r
- <p><b><code>junkbuster</code></b> - The Internet Junkbuster\r
- Proxy <a href=\r
- "http://www.junkbusters.com/ht/en/legal.html#marks"><small>\r
- <sup>TM</sup></small></a></p>\r
-\r
- <h3><a name="synopsis"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Synopsis</h3>\r
-\r
- <p><code><b>junkbuster</b></code> <i>configfile</i> (Unix)<br>\r
- <b><code>junkbstr.exe</code></b> [<i>configfile</i>]\r
- (Windows)</p>\r
-\r
- <h3><a name="description"></a><img border="0" src="fb.gif" alt=\r
- "*" width="14" height="14"> Description</h3>\r
-\r
- <p><b><code>junkbuster</code></b> is an instrumentable proxy\r
- that filters the HTTP stream between web servers and browsers.\r
- Its main purposes are to block adverts and enhance privacy.</p>\r
-\r
- <p><a name="dual"></a>It is configured using a configuration\r
- file and several files listing URL patterns. The\r
- configuration file must be specified on the command line. \r
- The Windows version will default to using the configuration\r
- file <code>junkbstr.ini</code> if it exists and no argument was\r
- given.</p>\r
-\r
- <p><a name="reread"></a>All files except the main configuration\r
- file are checked for changes before each page is fetched, so\r
- they may edited without restarting the proxy.</p>\r
-\r
- <h4>Options</h4>\r
-\r
- <dl>\r
- <dt><i><a name="o_b"></a></i><a name=\r
- "blockfile"></a><code>blockfile</code> <i>\r
- blockfile</i></dt>\r
-\r
- <dd>\r
- <p><a href="ijbfaq.html#blocking">Block</a> requests to\r
- URLs matching any pattern given in the lines of the <i>\r
- blockfile</i>. The <b><code>junkbuster</code></b> instead\r
- returns status 202, indicating that the request has been\r
- accepted (though not completed), and a <a href=\r
- "ijbfaq.html#show">message identifying itself</a> (though\r
- the browser may display only a broken image icon). \r
- The syntax of a pattern is <code>\r
- [domain][:port][/path]</code> (the <code>http://</code> or\r
- <code>https://</code> protocol part is omitted). To decide\r
- if a pattern matches a target, the domains are compared\r
- first, then the paths.</p>\r
-\r
- <p><a name="compare"></a>To compare the domains, the\r
- pattern domain and the target domain specified in the URL\r
- are each broken into their components. (Components are\r
- separated by the <code>.</code> (period) character.) Next\r
- each of the target components is compared with the\r
- corresponding pattern component: last with last,\r
- next-to-last with next-to-last, and so on. (This is called\r
- <i><dfn>right-anchored</dfn></i> matching.) If all of the\r
- pattern components find their match in the target, then the\r
- domains are considered a match. Case is irrelevant when\r
- comparing domain components.</p>\r
-\r
- <p><a name="substring"></a>A successfully matching pattern\r
- can be an anchored substring of a target, but not vice\r
- versa. Thus if a pattern doesn't specify a domain, it\r
- matches all domains. <a name="wildcard"></a>Furthermore,\r
- when comparing two components, the components must either\r
- match in their entirety or up to a wildcard <code>*</code>\r
- (star character) in the pattern. The wildcard feature\r
- implements only a "prefix" match capability ("abc*" vs.\r
- "abcdefg"), not suffix matching ("*efg" vs. "abcdefg") or\r
- infix matching ("abc*efg" vs. "abcdefg"). The feature is\r
- restricted to the domain component; it is unrelated to the\r
- optional regular expression feature in the path <a href=\r
- "#regex">(described below).</a></p>\r
-\r
- <p><a name="numeric"></a>If a numeric port is specified in\r
- the pattern domain, then the target port must match as\r
- well. The default port in a target is port 80.</p>\r
-\r
- <p><a name="onward"></a>If the domain and port match, then\r
- the target URL path is checked for a match against the path\r
- in the pattern. Paths are compared with a simple\r
- case-sensitive left-anchored substring comparison. Once\r
- again, the pattern can be an anchored substring of the\r
- target, but not vice versa. A path of <code>/</code>\r
- (slash) would match all paths. Wildcards are not considered\r
- in path comparisons.</p>\r
-\r
- <p><a name="example"></a>For example, the target URL<br>\r
- <code>\r
- the.yellow-brick-road.com/TinMan/has_no_brain</code><br>\r
- would be matched (and blocked) by the following\r
- patterns<br>\r
- <code>yellow-brick-road.com</code><br>\r
- and<br>\r
- <code>Yellow*.COM</code><br>\r
- and<br>\r
- <code>/TinM</code><br>\r
- but not<br>\r
- <code>\r
- follow.the.yellow-brick-road.com</code><br>\r
- or<br>\r
- <code>/tinman</code><br>\r
- </p>\r
-\r
- <p><a name="comments"></a>Comments in a blockfile start\r
- with a <code>#</code> (hash) character and end at a new\r
- line. Blank lines are also ignored.</p>\r
-\r
- <p><a name="except"></a>Lines beginning with a <code>\r
- ~</code> (tilde) character are taken to be <a href=\r
- "ijbfaq.html#exceptions">exceptions:</a> a URL blocked by\r
- previous patterns that matches the rest of the line is let\r
- through. (The last match wins.)</p>\r
-\r
- <p><a name="regex"></a>Patterns may contain POSIX <a href=\r
- "ijbfaq.html#regex">regular expressions</a> provided the\r
- <b><code>junkbuster</code></b> was compiled with this\r
- option (the default in Version 2.0 on). The idiom <code>\r
- /*.*/ad</code> can then be used to match any URL containing\r
- <code>/ad</code> (such as <code>\r
- http://nomatterwhere.com/images/advert/g3487.gif</code> for\r
- example). These expressions <a href="#substring">don't\r
- work</a> in the domain part.</p>\r
-\r
- <p><a name="rereads"></a>In version 1.3 and later the\r
- blockfile and cookiefile are checked for changes before\r
- each request.</p>\r
- </dd>\r
-\r
- <dt><i><a name="o_w"></a></i><a name=\r
- "wafer"></a><code>wafer</code> <i>\r
- NAME=VALUE</i></dt>\r
-\r
- <dd>\r
- <p>Specifies a pair to be sent as a cookie with every\r
- request <a href="ijbfaq.html#wafers">to the server.</a>\r
- (Such boring cookies are called <i>wafers</i>.) This option\r
- may be called more than once to generate multiple wafers.\r
- The original Netscape specification prohibited semi-colons,\r
- commas and white space; these characters will be\r
- URL-encoded if used in wafers. \r
- <!-- Aside: genuine cookies are not encoded --> \r
- <!-- Aside: we could use quoted string as specified in the new RFC -->\r
- The Path and Domain attributes are not currently\r
- supported.</p>\r
- </dd>\r
-\r
- <dt><i><a name="o_c"></a></i><a name=\r
- "cookiefile"></a><code>cookiefile</code> <i>\r
- cookiefile</i></dt>\r
-\r
- <dd>\r
- <p>Enforce the cookie management policy specified in the\r
- <i>cookiefile.</i> <a name="java"></a>If this option is not\r
- used all cookies are silently crunched, so that users who\r
- never want cookies aren't bothered by browsers asking\r
- whether each cookie should be accepted. However, cookies\r
- can <a href="ijbfaq.html#breakthrough">still get\r
- through</a> via <a href=\r
- "http://www.junkbusters.com/ht/en/links.html#javascript">\r
- JavaScript</a> and SSL, so alerts should be left on.</p>\r
-\r
- <p><a name="dropping"></a>In Version 1.2 and later this\r
- option must be followed by a <a href="ijbfaq.html#crumble">\r
- filename</a> containing instructions on which sites are\r
- allowed to receive and set cookies. <a name="drop"></a>By\r
- default cookies are dropped in both the browser's request\r
- and the server's response, unless the URL requested matches\r
- an entry in the <i>cookiefile</i>. The matching algorithm\r
- is the same as for the blockfile. A leading <code>\r
- ></code> character allows <a href=\r
- "ijbfaq.html#directional">server-bound</a> cookies only; a\r
- <code><</code> allows only browser-bound cookies; a\r
- <code>~</code> character stops cookies in <a href=\r
- "ijbfaq.html#crumble">both directions.</a> Thus a\r
- cookiefile containing a single line with the two characters\r
- <code>>*</code> will pass on all cookies to servers but\r
- not give any new ones to the browser.</p>\r
- </dd>\r
-\r
- <dt><i><a name="o_j"></a></i><a name=\r
- "jarfile"></a><code>jarfile</code> <i>\r
- jarfile</i></dt>\r
-\r
- <dd>\r
- <p>All Set-cookie attempts by the server are <a href=\r
- "ijbfaq.html#jar">logged</a> to <i>jarfile</i>. If no wafer\r
- is specified, one containing a <a href=\r
- "ijbfaq.html#notice">canned notice</a> (the <i>vanilla\r
- wafer</i>) is added as an alert to the server unless the <a\r
- href="#suppress-vanilla-wafer">suppress-vanilla-wafer</a>\r
- option is invoked.</p>\r
- </dd>\r
-\r
- <dt><i><a name="o_v"></a></i><a name=\r
- "suppress-vanilla-wafer"></a><code>suppress-vanilla-wafer</code></dt>\r
-\r
- <dd>\r
- <p>Suppress the vanilla wafer.</p>\r
- </dd>\r
-\r
- <dt><i><a name="o_t"></a></i><a name=\r
- "from"></a><code>from</code> <i>from</i></dt>\r
-\r
- <dd>\r
- <p>If the browser <a href="ijbfaq.html#from">discloses an\r
- email address</a> in the <code>FROM</code> header (most\r
- don't), replace it with <i>from.</i> If <i>from</i> is set\r
- to <b>.</b> (the period character) the <code>FROM</code> is\r
- passed to the server unchanged. The default is to delete\r
- the <code>FROM</code> header.</p>\r
- </dd>\r
-\r
- <dt><i><a name="o_r"></a></i><a name=\r
- "referer"></a><code>referer</code> <i>\r
- referer</i></dt>\r
-\r
- <dd>\r
- <p>Whenever the browser discloses the URL that <a href=\r
- "ijbfaq.html#referer">led to</a> the current request,\r
- replace it with <i>referer.</i> If <i>referer</i> is set to\r
- <b>.</b> (period) the URL is passed to the server\r
- unchanged. If referer is set to <b>@</b> (at) the URL is\r
- sent in cases where the cookiefile specifies that a cookie\r
- would be sent. (No way to send bogus referers selectively\r
- is provided.) The default is to delete Referer.</p>\r
-\r
- <p><a name="referrer"></a>Junkbuster also accepts the\r
- spelling <code>referrer</code>, which most dictionaries\r
- consider correct.</p>\r
- </dd>\r
-\r
- <dt><i><a name="o_u"></a></i><a name=\r
- "user-agent"></a><code>user-agent</code> <i>\r
- user-agent</i></dt>\r
-\r
- <dd>\r
- <p>Information disclosed by the browser <a href=\r
- "ijbfaq.html#agent">about itself</a> is replaced with the\r
- value <i>user-agent.</i> If <i>user-agent</i> is set to <b>\r
- .</b> (period) the <code>User-Agent</code> header is passed\r
- to the server unchanged, along with any <code>UA</code>\r
- headers produced by MS-IE (which would otherwise be\r
- deleted). If <i>user-agent</i> is set to <b>@</b> (at)\r
- these headers are sent unchanged in cases where the\r
- cookiefile specifies that a cookie would be sent, otherwise\r
- only default <code>User-Agent</code> header is sent. That\r
- default is Mozilla/3.0 (Netscape) with an unremarkable <a\r
- href="ijbfaq.html#infer">Macintosh</a> configuration. If\r
- used with a browser less advanced than Mozilla/3.0 or IE-3,\r
- the default may encourage pages containing extensions that\r
- confuse the browser.</p>\r
- </dd>\r
-\r
- <dt><a name="o_h"></a><a name=\r
- "listen-address"></a><code>listen-address</code> \r
- <i>[host][:port]</i></dt>\r
-\r
- <dd>\r
- <p>If <i>host</i> is specified, bind the <b><code>\r
- junkbuster</code></b> to that IP address. If a <i>port</i>\r
- is specified, use it. The default port is 8000; the default\r
- host is <code>localhost</code>.</p>\r
-\r
- <p>This default host setting means that you can only\r
- connect to the proxy from ther local computer. This is a\r
- security measure - if you allow anyone to use the proxy,\r
- then hackers or fraudsters could use it to help hide their\r
- identity. It also provides a lot of protection against any\r
- undiscovered security flaws in JunkBuster - if they can't\r
- connect to it, then they can't attack it.</p>\r
-\r
- <p>If you change this value, we recommend you <i>either</i>\r
- set the host to <code>localhost</code>:<br>\r
- <code>listen-address\r
- localhost:8080</code><br>\r
- <i>or</i>, if you want to share a single internet\r
- connection over your internal network, then set it to the\r
- address of your internal ethernet card:<br>\r
- <code>listen-address\r
- 10.1.1.1:8080</code><br>\r
- (replace 10.1.1.1 with your internal IP address), <i>\r
- or</i> set up an <i><a href="#aclfile">aclfile</a></i>. To\r
- make the proxy accessible from everywhere (e.g. if you're\r
- using an access control list or if you just don't care\r
- about security), specify just the port number - e.g:<br>\r
- <code>listen-address :8000</code><br>\r
- (This binds the proxy to <b>all</b> IP addresses\r
- (<code>INADDR_ANY</code>)).</p>\r
- </dd>\r
-\r
- <dt><i><a name="o_f"></a></i><a name=\r
- "forwardfile"></a><code>forwardfile</code> <i>\r
- forwardfile</i></dt>\r
-\r
- <dd>\r
- <p>Junkbuster has a flexible syntax for forwarding HTTP\r
- requests. This is used e.g. if you are behind a firewall\r
- and need to connect through it, or if you want to use a\r
- cacheing proxy to speed up your web browsing.</p>\r
-\r
- <p>Every line in the forwardfile consists of four\r
- components, seperated by whitespace. These are:<br>\r
- <br>\r
- <code><i>target forward_to via_gateway_type\r
- gateway</i></code></p>\r
-\r
- <p><i>target</i> is a pattern used to select which line of\r
- the forwardfile is used. "<code>*</code>" is the most\r
- commonly used value, and matches every URL. As usual, the\r
- last matching <i>target</i> wins. (If no pattern matches, a\r
- direct connection will be used)</p>\r
-\r
- <p><i>forward_to</i> specifies the HTTP proxy server to\r
- use, or "<code>.</code>" for none. This is used to connect\r
- to a cacheing proxy such as Squid, and for most types of\r
- firewall. The port number defaults to 8000 if it is not\r
- specified.</p>\r
-\r
- <p>Here is a typical line.</p>\r
-<pre>\r
-* lpwa.com:8000 . .\r
-</pre>\r
-\r
- <p>The target domain need not be a fully qualified\r
- hostname; it can be a general domain such as <code>\r
- com</code> or <code>co.uk</code> or even just a port\r
- number. <a name="nose"></a>For example, because <a href=\r
- "http://lpwa.com">LPWA</a> does not handle <a href=\r
- "ijbfaq.html#encrypt">SSL</a>, the line above will\r
- typically be followed by a line such as</p>\r
-<pre>\r
-:443 . . .\r
-</pre>\r
-\r
- <p>to allow SSL transactions to proceed directly. The\r
- cautious would also add an entry in their blockfile to stop\r
- transactions to port 443 for all but specified trusted\r
- sites.</p>\r
-\r
- <p><a name="loop"></a>Configure with care: no loop\r
- detection is performed. When setting up chains of proxies\r
- that might loop back, try adding <a href="#squid">\r
- Squid.</a></p>\r
-\r
- <p><i>via_gateway_type</i> and <i>gateway</i> are used to\r
- support SOCKS proxies. Some firewalls provide this type of\r
- proxy. If you do not not want to use a SOCKS proxy, specify\r
- both of these fields as "<code>.</code>".</p>\r
-\r
- <p><a name="configure"></a><a name="identify"></a>Note that\r
- JunkBuster is a SOCKS <b>client</b>, <b>not</b> a SOCKS <b>\r
- server</b>. The user's browser should <b>not</b> be <a\r
- href="ijbfaq.html#socks">configured</a> to use <code>\r
- SOCKS</code>; the proxy conducts the negotiations, not the\r
- browser.</p>\r
-\r
- <p>The <code>SOCKS4</code> protocol may be specified by\r
- setting <i>via_gateway_type</i> to <code>socks</code> or\r
- <code>socks4</code>. The <code>SOCKS4A</code> protocol is\r
- specified as <code>socks4a</code>. The <code>SOCKS5</code>\r
- protocol is not currently supported.</p>\r
-\r
- <p><i>gateway</i> should be the host and port of the SOCKS\r
- server. If you just specify a hostname, then the port\r
- number defaults to 1080.</p>\r
-\r
- <p>The user identification capabilities of <code>\r
- SOCKS4</code> are deliberately not used; the user is always\r
- identified to the <code>SOCKS</code> server as <code>\r
- userid=anonymous</code>. If the server's policy is to\r
- reject requests from <code>anonymous</code>, the proxy will\r
- not work. Use a <a href="#o_d">debug</a> value of 3 to see\r
- the status returned by the server.</p>\r
-\r
- <p>If you specify both a HTTP proxy (with <i>\r
- forward_to</i>) and a SOCKS proxy (with <i>gateway</i>)\r
- then the SOCKS proxy is used to connect to the HTTP proxy.\r
- If you just specify a SOCKS proxy, it is used to connect\r
- directly to the websites.</p>\r
- </dd>\r
-\r
- <dt><i><a name="o_d"></a></i><a name=\r
- "debug"></a><code>debug</code> <i>N</i></dt>\r
-\r
- <dd>\r
- <p>Set debug mode. The most common value is 1, to <a href=\r
- "ijbfaq.html#pinpoint">pinpoint</a> offensive URLs, so they\r
- can be added to the blockfile. The value of <b>N</b> is a\r
- bitwise logical-OR of the following values:<br>\r
- 1 = URLs (show each URL requested by the browser);<br>\r
- 2 = Connections (show each connection to or from the\r
- proxy);<br>\r
- 4 = I/O (log I/O errors);<br>\r
- 8 = Headers (as each header is scanned, show the header\r
- and what is done to it);<br>\r
- 16 = Log everything (including debugging traces and the\r
- contents of the pages).<br>\r
- 32 = Record accesses in Common Log Format, as used by most\r
- web and proxy servers.</p>\r
-\r
- <p><a name="or"></a>Multiple <code>debug</code> lines are\r
- permitted; they are logical OR-ed together.</p>\r
-\r
- <p><a name="single"></a>Because most browsers send several\r
- requests in parallel the debugging output may appear\r
- intermingled, so the <a href="#single-threaded">\r
- single-threaded</a> option is recommended when using <a\r
- href="#debug">debug</a> with <b>N</b> greater than 1. \r
- <!-- Aside: Yes, it's clumsy, but it's easy to parse. --></p>\r
- </dd>\r
-\r
- <dt><i><a name="o_y"></a></i><a name=\r
- "add-forwarded-header"></a><code>add-forwarded-header</code></dt>\r
-\r
- <dd>\r
- <p>Add <code>X-Forwarded-For</code> headers to the\r
- server-bound HTTP stream indicating the client IP address\r
- <a href="ijbfaq.html#detect">to the server,</a> in the new\r
- style of <a href="#squid">Squid 1.1.4.</a> If you want the\r
- traditional <code>HTTP_FORWARDED</code> response header,\r
- add it manually with the <a href="#o_x">-x</a> option. This\r
- also allows other <code>X-Forwarded-For</code> headers to\r
- be transmitted - usually they are discarded.</p>\r
- </dd>\r
-\r
- <dt><i><a name="o_x"></a></i><a name=\r
- "add-header"></a><code>add-header</code> <i>\r
- HeaderText</i></dt>\r
-\r
- <dd>\r
- <p>Add the <i>HeaderText</i> verbatim to requests to the\r
- server. Typical uses include adding old-style forwarding\r
- notices such as <code>Forwarded: by\r
- http://pro-privacy-isp.net</code> and reinstating the\r
- <code>Proxy-Connection: Keep-Alive</code> header (which the\r
- <b><code>junkbuster</code></b> deletes so as <a href=\r
- "ijbfaq.html#detect">not</a> to reveal its existence). No\r
- checking is done for correctness or plausibility, so it can\r
- be used to throw any old trash into the server-bound HTTP\r
- stream. Please don't litter. \r
- <!-- Aside: this represents "more than enough rope" --></p>\r
- </dd>\r
-\r
- <dt><i><a name="o_s"></a></i><a name=\r
- "single-threaded"></a><code>single-threaded</code></dt>\r
-\r
- <dd>\r
- <p>Doesn't <code>fork()</code> a separate process (or\r
- create a separate thread) to handle each connection. Useful\r
- when debugging to keep the process single threaded.</p>\r
- </dd>\r
-\r
- <dt><i><a name="o_l"></a></i><a name=\r
- "logfile"></a><code>logfile</code> <i>\r
- logfile</i></dt>\r
-\r
- <dd>\r
- <p>Write all debugging data into <i>logfile.</i> The\r
- default <i>logfile</i> is the standard output.</p>\r
- </dd>\r
-\r
- <dt><br>\r
- <a name="aclfile"></a><code>aclfile</code> <i>\r
- aclfile</i></dt>\r
-\r
- <dd>\r
- <p>Unless this option is used, the proxy talks to anyone\r
- who can connect to it, and everyone who can has equal\r
- permissions on where they can go. An access file allows\r
- restrictions to be placed on these two policies, by\r
- distinguishing some <i><dfn>source</dfn></i> IP addresses\r
- and/or some <i><dfn>destination</dfn></i> addresses. (If a\r
- <a href="#forwardfile">forwarder or a gateway</a> is being\r
- used, its address is considered the destination address,\r
- not the ultimate IP address of the URL requested.)</p>\r
-\r
- <p><a name="permit"></a>Each line of the access file begins\r
- with either the word <code>permit</code> or <code>\r
- deny</code> followed by source and (optionally) destination\r
- addresses to be matched against those of the HTTP request.\r
- The last matching line specifies the result: if it was a\r
- <code>deny</code> line or if no line matched, the request\r
- will be refused.</p>\r
-\r
- <p><a name="various"></a>A source or destination can be\r
- specified as a single numeric IP address, or with a\r
- hostname, provided that the host's name can be resolved to\r
- a numeric address: this cannot be used to block all <code>\r
- .mil</code> domains for example, because there is no single\r
- address associated with that domain name. Either form may\r
- be followed by a slash and an integer <code>N</code>,\r
- specifying a subnet mask of <code>N</code> bits. For\r
- example, <code>permit 207.153.200.72/24</code> matches the\r
- entire Class-C subnet from 207.153.200.0 through\r
- 207.153.200.255. (A netmask of 255.255.255.0 corresponds to\r
- 24 bits of ones in the netmask, as with <code>\r
- *_MASKLEN=24</code>.) A value of 16 would be used for a\r
- Class-B subnet. A value of zero for <code>N</code> in the\r
- subnet mask length will cause any address to match; this\r
- can be used to express a default rule. For more information\r
- see the example file provided with the distribution.</p>\r
-\r
- <p><a name="false"></a>If you like these access controls\r
- you should probably have <a href="ijbfaq.html#firewall">\r
- firewall</a>; they are not intended to replace one.</p>\r
- </dd>\r
-\r
- <dt><br>\r
- <a name="trustfile"></a><code>trustfile</code> \r
- <i>trustfile</i></dt>\r
-\r
- <dd>\r
- <p>This feature is experimental, has not been fully\r
- documented and is very subject to change. The goal is for\r
- parents to be able to choose a page or site whose links\r
- they regard suitable for their <a href=\r
- "ijbfaq.html#children">young children</a> and for the proxy\r
- to allow access only to sites mentioned there. To do this\r
- the proxy examines the <a href="#o_r">referer</a> variable\r
- on each page request to check they resulted from a click on\r
- the ``trusted referer'' site: if so the referred site is\r
- added to a list of trusted sites, so that the child can\r
- then move around that site. There are several uncertainties\r
- in this scheme that experience may be able to iron out;\r
- check back in the months ahead.</p>\r
- </dd>\r
-\r
- <dt><br>\r
- <a name="trust_info_url">\r
- </a><code>trust_info_url</code> <i>\r
- trust_info_url</i></dt>\r
-\r
- <dd>\r
- <p>When access is denied due to lack of a trusted referer,\r
- this URL is displayed with a message pointing the user to\r
- it for further information.</p>\r
- </dd>\r
-\r
- <dt><br>\r
- <a name="hide-console"></a><code>hide-console</code></dt>\r
-\r
- <dd>\r
- <p>In the Windows command-line version only, instructs the\r
- program to disconnect from and hide the command console\r
- after starting.</p>\r
- </dd>\r
- </dl>\r
-\r
- <h3><a name="install"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Installation and Use</h3>\r
-\r
- <p>Browsers must be told where to find the <b><code>\r
- junkbuster</code></b> (e.g. <code>localhost</code> port 8000).\r
- To set the HTTP proxy in Netscape 3.0, go through: <b class=\r
- "eg">Options</b>; <b class="eg">Network Preferences</b>; <b\r
- class="eg">Proxies</b>; <b class="eg">Manual Proxy\r
- Configuration</b>; <b class="eg">View</b>. See the <a href=\r
- "ijbfaq.html">FAQ</a> for other browsers. The <a href=\r
- "ijbfaq.html#security">Security Proxy</a> should also be set to\r
- the same values, otherwise <code>shttp:</code> URLs won't\r
- work.</p>\r
-\r
- <p><a name="limitations"></a>Note the limitations explained in\r
- the <a href="ijbfaq.html">FAQ</a>.</p>\r
-\r
- <h3><a name="show"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> Checking Options</h3>\r
-\r
- <p>To allow users to <a href="ijbfaq.html#show">check</a> that\r
- a <b><code>junkbuster</code></b> is running and how it is\r
- configured, it intercepts requests for any URL ending in <code>\r
- /show-proxy-args</code> and blocks it, returning instead\r
- returns information on its version number and current\r
- configuration including the contents of its blockfile. To get\r
- an explicit warning that no <b><code>junkbuster</code></b>\r
- intervened if the proxy was not configured, it's best to point\r
- it to a URL that does this, such as <a href=\r
- "http://internet.junkbuster.com/cgi-bin/show-proxy-args">\r
- http://internet.junkbuster.com/cgi-bin/show-proxy-args</a> on\r
- Junkbusters's website.</p>\r
-\r
- <h3><a name="also"></a><img border="0" src="fb.gif" alt="*"\r
- width="14" height="14"> See Also</h3>\r
-\r
- <p><a href="ijbfaq.html">\r
- http://www.junkbusters.com/ht/en/ijbfaq.html</a><br>\r
- <a href="http://www.junkbusters.com/ht/en/cookies.html">\r
- http://www.junkbusters.com/ht/en/cookies.html</a><br>\r
- <a href=\r
- "http://internet.junkbuster.com/cgi-bin/show-proxy-args">\r
- http://internet.junkbuster.com/cgi-bin/show-proxy-args</a><br>\r
- <a name="kristol"></a><a href=\r
- "http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html">http://www.cis.ohio-state.edu/htbin/rfc/rfc2109.html</a><br>\r
-\r
- <a name="squid"></a><a href=\r
- "http://squid.nlanr.net/Squid/">http://squid.nlanr.net/Squid/</a><br>\r
-\r
- <a href="http://www-math.uni-paderborn.de/~axel/">\r
- http://www-math.uni-paderborn.de/~axel/</a></p>\r
-\r
- <h3><a name="copyright"></a><img border="0" src="fb.gif" alt=\r
- "*" width="14" height="14"> Copyright and GPL</h3>\r
-\r
- <p>Written and copyright by the Anonymous Coders and\r
- Junkbusters Corporation and made available under the <a href=\r
- "gpl.html">GNU General Public License (GPL).</a> This software\r
- comes with <a href="gpl.html#nowarr">NO WARRANTY.</a> Internet\r
- Junkbuster Proxy is a <a href=\r
- "http://www.junkbusters.com/ht/en/legal.html#marks">\r
- trademark</a> of Junkbusters Corporation.</p>\r
-\r
- <p align="center"><a href="#top_of_page"><img border="0" src=\r
- "top.gif" alt="--- Back to Top of Page ---" width="250" height=\r
- "15"></a></p>\r
-\r
- <p class="sans"><a href="http://ijbswa.sourceforge.net/">\r
- Website</a> <b class="dot">·</b> <b>Manual</b> <b class=\r
- "dot">·</b> <a href="ijbfaq.html">FAQ</a> <b class=\r
- "dot">·</b> <a href="gpl.html">GPL</a></p>\r
-\r
- <p class="sans"><small><small><a href="gpl.html#text">\r
- Copyright</a> © 1996-8 <a href=\r
- "http://www.junkbusters.com/">Junkbusters</a> <a href=\r
- "http://www.junkbusters.com/ht/en/legal.html#marks">®</a>\r
- Corporation. <a href="gpl.html#text">Copyright</a> © 2001\r
- <a href="http://sourceforge.net/projects/ijbswa/">Jon\r
- Foster</a>. Copying and distribution permitted under the <a\r
- href="gpl.html">GNU</a> General Public\r
- License.</small></small></p>\r
-\r
- <p><small><code><a href=\r
- "http://sourceforge.net/projects/ijbswa/">\r
- http://sourceforge.net/projects/ijbswa/</a></code></small></p>\r
- </body>\r
-</html>\r
-\r