X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=doc%2Fsource%2Ffaq.sgml;h=30a7a5dcb499a1bed93fa92684a84ee13efacace;hb=caacb81062e2e3152231c09c9da62a31e4efc170;hp=a5b3fbcce91a0b67c060270fff36baff4ee5d0ff;hpb=d718332b42f884d9c3c2fd0cfa9b83f4973c6971;p=privoxy.git
diff --git a/doc/source/faq.sgml b/doc/source/faq.sgml
index a5b3fbcc..30a7a5dc 100644
--- a/doc/source/faq.sgml
+++ b/doc/source/faq.sgml
@@ -8,7 +8,7 @@
-
+
@@ -25,7 +25,7 @@
Purpose : FAQ
- Copyright (C) 2001-2020 Privoxy Developers https://www.privoxy.org/
+ Copyright (C) 2001-2021 Privoxy Developers https://www.privoxy.org/
See LICENSE.
Based partially on the Internet Junkbuster FAQ originally written by and
@@ -69,7 +69,7 @@
- Copyright &my-copy; 2001-2020 by
+ Copyright &my-copy; 2001-2021 by
Privoxy Developers
@@ -554,7 +554,10 @@ warranty? Registration?
The logo sizes depend on the sponsor level. Logos are served from
our server, no requests are made to the sponsor website unless
- the links are being used.
+ the links are being used. Note that Privoxy comes with a
+ hide-referrer
+ action so Privoxy users following links to sponsor websites
+ may not necessarily send requests with a Referer header set.
Link targets are without path (https://www.example.org/
@@ -564,11 +567,17 @@ warranty? Registration?
The details may change over time but changes will only affect new sponsors
(or existing sponsors that explicitly agreed to the changes).
+
+ Thanks to Software in the Public Interest (SPI)
+ Privoxy sponsors can get a proper invoice.
+
If you want to become a sponsor, please contact
Fabian Keil
and include the link target in the mail.
- New sponsors are only accepted if no developer objects.
+ New sponsors are only accepted if no
+ Privoxy team
+ member objects.
@@ -917,11 +926,13 @@ the differences?
url="../user-manual/actions-file.html#ALIASES">alias just for such
sticky situations:
- # Gmail is a _fragile_ site:
+
+# Gmail is a _fragile_ site:
#
{ fragile }
- # Gmail is ...
- mail.google.com
+# Gmail is ...
+mail.google.com
+
Be sure to flush your browser's caches whenever making these kinds of
changes, just to make sure the changes take.
@@ -1073,7 +1084,7 @@ with a browser? Does that not raise security issues?
- listen-address 192.168.1.1:8118
+listen-address 192.168.1.1:8118
Save the file, and restart Privoxy. Configure
@@ -1086,7 +1097,7 @@ with a browser? Does that not raise security issues?
- listen-address :8118
+listen-address :8118
And then use Privoxy's
@@ -1356,8 +1367,9 @@ and thus avoid individual browser configuration?
both in and out, for example.com:
- { -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only -filter{content-cookies} }
- .example.com
+{ -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only -filter{content-cookies} }
+.example.com
+
Place the above in user.action. Note that some of these may
be off by default anyway, so this might be redundant, but there is no harm
@@ -1393,19 +1405,20 @@ and thus avoid individual browser configuration?
Here's one real easy one:
- ############################################################
- # Blacklist
- ############################################################
- { +block }
- / # Block *all* URLs
-
- ############################################################
- # Whitelist
- ############################################################
- { -block }
- kids.example.com
- toys.example.com
- games.example.com
+############################################################
+# Blacklist
+############################################################
+{ +block }
+/ # Block *all* URLs
+
+############################################################
+# Whitelist
+############################################################
+{ -block }
+kids.example.com
+toys.example.com
+games.example.com
+
This allows access to only those three sites by first blocking all URLs, and
then subsequently allowing three specific exceptions.
@@ -1449,20 +1462,22 @@ and thus avoid individual browser configuration?
following very simple rule in your user.action:
- # Unblock everybody, everywhere
- { -block }
- / # UN-Block *all* URLs
+# Unblock everybody, everywhere
+{ -block }
+/ # UN-Block *all* URLs
+
Or even a more comprehensive reversing of various ad related actions:
- # Unblock everybody, everywhere, and turn off appropriate filtering, etc
- { -block \
+# Unblock everybody, everywhere, and turn off appropriate filtering, etc
+{ -block \
-filter{banners-by-size} \
-filter{banners-by-link} \
allow-popups \
- }
- / # UN-Block *all* URLs and allow ads
+}
+/ # UN-Block *all* URLs and allow ads
+
This last action in this compound statement,
allow-popups, is an BLOCKED page?
available as compile-time options. You should
configure the sources as follows:
-
- ./configure --disable-toggle --disable-editor --disable-force
+
+./configure --disable-toggle --disable-editor --disable-force
+
This will create an executable with hard-coded security features so that
&my-app; does not allow easy bypassing of blocked sites, or changing the
@@ -2195,11 +2211,12 @@ altered it! Yikes, what is wrong!
configuration, consider adding your list to your user.action file:
- { +block }
- www.ad.example1.com
- ad.example2.com
- ads.galore.example.com
- etc.example.com
+{ +block }
+www.ad.example1.com
+ad.example2.com
+ads.galore.example.com
+etc.example.com
+