X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=doc%2Fsource%2Ffaq.sgml;h=30a7a5dcb499a1bed93fa92684a84ee13efacace;hb=caacb81062e2e3152231c09c9da62a31e4efc170;hp=a5b3fbcce91a0b67c060270fff36baff4ee5d0ff;hpb=d718332b42f884d9c3c2fd0cfa9b83f4973c6971;p=privoxy.git diff --git a/doc/source/faq.sgml b/doc/source/faq.sgml index a5b3fbcc..30a7a5dc 100644 --- a/doc/source/faq.sgml +++ b/doc/source/faq.sgml @@ -8,7 +8,7 @@ - + @@ -25,7 +25,7 @@ Purpose : FAQ - Copyright (C) 2001-2020 Privoxy Developers https://www.privoxy.org/ + Copyright (C) 2001-2021 Privoxy Developers https://www.privoxy.org/ See LICENSE. Based partially on the Internet Junkbuster FAQ originally written by and @@ -69,7 +69,7 @@ - Copyright &my-copy; 2001-2020 by + Copyright &my-copy; 2001-2021 by Privoxy Developers @@ -554,7 +554,10 @@ warranty? Registration? The logo sizes depend on the sponsor level. Logos are served from our server, no requests are made to the sponsor website unless - the links are being used. + the links are being used. Note that Privoxy comes with a + hide-referrer + action so Privoxy users following links to sponsor websites + may not necessarily send requests with a Referer header set. Link targets are without path (https://www.example.org/ @@ -564,11 +567,17 @@ warranty? Registration? The details may change over time but changes will only affect new sponsors (or existing sponsors that explicitly agreed to the changes). + + Thanks to Software in the Public Interest (SPI) + Privoxy sponsors can get a proper invoice. + If you want to become a sponsor, please contact Fabian Keil and include the link target in the mail. - New sponsors are only accepted if no developer objects. + New sponsors are only accepted if no + Privoxy team + member objects. @@ -917,11 +926,13 @@ the differences? url="../user-manual/actions-file.html#ALIASES">alias just for such sticky situations: - # Gmail is a _fragile_ site: + +# Gmail is a _fragile_ site: # { fragile } - # Gmail is ... - mail.google.com +# Gmail is ... +mail.google.com + Be sure to flush your browser's caches whenever making these kinds of changes, just to make sure the changes take. @@ -1073,7 +1084,7 @@ with a browser? Does that not raise security issues? - listen-address 192.168.1.1:8118 +listen-address 192.168.1.1:8118 Save the file, and restart Privoxy. Configure @@ -1086,7 +1097,7 @@ with a browser? Does that not raise security issues? - listen-address :8118 +listen-address :8118 And then use Privoxy's @@ -1356,8 +1367,9 @@ and thus avoid individual browser configuration? both in and out, for example.com: - { -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only -filter{content-cookies} } - .example.com +{ -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only -filter{content-cookies} } +.example.com + Place the above in user.action. Note that some of these may be off by default anyway, so this might be redundant, but there is no harm @@ -1393,19 +1405,20 @@ and thus avoid individual browser configuration? Here's one real easy one: - ############################################################ - # Blacklist - ############################################################ - { +block } - / # Block *all* URLs - - ############################################################ - # Whitelist - ############################################################ - { -block } - kids.example.com - toys.example.com - games.example.com +############################################################ +# Blacklist +############################################################ +{ +block } +/ # Block *all* URLs + +############################################################ +# Whitelist +############################################################ +{ -block } +kids.example.com +toys.example.com +games.example.com + This allows access to only those three sites by first blocking all URLs, and then subsequently allowing three specific exceptions. @@ -1449,20 +1462,22 @@ and thus avoid individual browser configuration? following very simple rule in your user.action: - # Unblock everybody, everywhere - { -block } - / # UN-Block *all* URLs +# Unblock everybody, everywhere +{ -block } +/ # UN-Block *all* URLs + Or even a more comprehensive reversing of various ad related actions: - # Unblock everybody, everywhere, and turn off appropriate filtering, etc - { -block \ +# Unblock everybody, everywhere, and turn off appropriate filtering, etc +{ -block \ -filter{banners-by-size} \ -filter{banners-by-link} \ allow-popups \ - } - / # UN-Block *all* URLs and allow ads +} +/ # UN-Block *all* URLs and allow ads + This last action in this compound statement, allow-popups, is an BLOCKED page? available as compile-time options. You should configure the sources as follows: - - ./configure --disable-toggle --disable-editor --disable-force + +./configure --disable-toggle --disable-editor --disable-force + This will create an executable with hard-coded security features so that &my-app; does not allow easy bypassing of blocked sites, or changing the @@ -2195,11 +2211,12 @@ altered it! Yikes, what is wrong! configuration, consider adding your list to your user.action file: - { +block } - www.ad.example1.com - ad.example2.com - ads.galore.example.com - etc.example.com +{ +block } +www.ad.example1.com +ad.example2.com +ads.galore.example.com +etc.example.com +