X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=templates%2Fedit-actions-for-url;h=d1153320e2daeb1d149146ed8fc1be439fcc4496;hb=c166fd73313403b9a72030722d4837f56f8e29db;hp=bd73c487b16305bba223e8de49db7ff1014f27ae;hpb=cc0bfc84d97c68d42c30b99aa45cdd2667a4e283;p=privoxy.git diff --git a/templates/edit-actions-for-url b/templates/edit-actions-for-url index bd73c487..d1153320 100644 --- a/templates/edit-actions-for-url +++ b/templates/edit-actions-for-url @@ -32,6 +32,54 @@ # # Revisions : # $Log: edit-actions-for-url,v $ +# Revision 1.35 2006/08/03 02:46:42 david__schmidt +# Incorporate Fabian Keil's patch work: http://www.fabiankeil.de/sourcecode/privoxy/ +# +# Revision 1.34 2006/07/18 14:49:13 david__schmidt +# Reorganizing the repository: swapping out what was HEAD (the old 3.1 branch) +# with what was really the latest development (the v_3_0_branch branch) +# +# Revision 1.29.2.5 2004/10/05 03:17:26 david__schmidt +# Typo: inspect_jpegs, not inspect-jpegs in form +# +# Revision 1.29.2.4 2004/10/03 12:53:46 david__schmidt +# Add the ability to check jpeg images for invalid +# lengths of comment blocks. Defensive strategy +# against the exploit: +# Microsoft Security Bulletin MS04-028 +# Buffer Overrun in JPEG Processing (GDI+) Could +# Allow Code Execution (833987) +# Enabled with +inspect-jpegs in actions files. +# +# Revision 1.29.2.3 2002/08/23 02:22:53 hal9 +# Fix a perl brain fart with
- | add-header | +add-header | Adds HTTP headers. | |||||
+ | - | - | - | block | +block | Block the request | ||
+ | + | + | crunch-incoming-cookies | +Prevent the website from setting cookies on your system. | +||||
+ | + | + | crunch-outgoing-cookies | +Prevent the website from reading cookies from your system. | +||||
- | deanimate-gifs | +deanimate-gifs | Replace animated GIFs with their (first/last) frame. | |||||
+ | + | + | inspect-jpegs | +Checks jpeg images for malicious content. | +||||
@@ -454,39 +543,49 @@ function show_send_wafer_opts(tf) name="downgrade_http_version" value="N" @downgrade-http-version-n@> | - | downgrade-http-version | +downgrade-http-version | Change HTTP/1.1 requests to HTTP/1.0. Only change if you know what you're doing! | ||||
+ | - | - | - | fast-redirects | +fast-redirects | Bypass some click-tracking URLs. | ||
- | - | - | filter | -Filter the website through regular expression filters. - You can enable or disable the filters individually. | +||||
+ | + | + | + |
+
+ + |
||||
- | + | + | - | - | All filters applied by previous rules | +filter * | +Filter the website through regular expression + filters. You can use the radio buttons on this line to disable + all filters applied by previous rules, and/or you can enable or + disable the filters individually below. | |
- | handle-as-image | -Request is for an image (only useful in conjunction with the block - and set-image-blocker actions). | +handle-as-image | +Request is for an image (only useful in conjunction with the block + and set-image-blocker actions). | ||||
- | hide-forwarded-for-headers | +hide-forwarded-for-headers | Block any existing X-Forwarded-for header, and do not add a new one. | |||||
+ | + | + | + | hide-if-modified-since | +Remove or randomize If-Modified-Since header. | +|||
+ | + | + | + |
+ Useful for filter testing. + + hour(s). + To appreciate this option a small amount of paranoia is required, + but at least in theory the If-Modified-Since header could be used + to keep track of your visits. + |
+ ||||
+ | + | + | overwrite-last-modified | +Remove or randomize If-Modified-Since header. | +||||
+ | + | + | + |
+ Useless. + + + + + + |
+ ||||
+ | + | + | crunch-if-none-match | +Remove If-None-Match header to circumvent browser cache. Useful for filter testing, + but hurts performance. | +||||
+ | + | + | content-type-overwrite | +Replace Content-Type header. Useful to let the browser render broken + XHTML as broken + HTML. By default it only applies to + text documents, if you know what you're doing you + can enable force-text-mode to modify binary content types as well. | +||||
+ | + | + | + | New Content-Type: + |
+ ||||
+ | + | + | force-text-mode | ++ Enable filtering on documents whose Content-Type wasn't recognized as text. + Do think twice, nothing is alright. + | +||||
+ | + | + | handle-as-empty-document | +
+ Block with an empty document instead of an Image or HTML message.
+ The empty document contains only a space and can safely be parsed
+ as JavaScript or Style Sheet. Use content-type-overwrite to specify the
+ Content-Type, default is test/html. + |
+ ||||
+ | + | + | treat-forbidden-connects-like-blocks | ++ Answer forbidden Connect requests with the usual block message. + May be a protocol violation, but makes unblocking easier. + | +||||
+ | + | + | crunch-client-header | +Remove header(s) matching the supplied pattern. Together with add-header you can + build a custom header replacement action. | +||||
+ | + | + | + | Header string to suppress: + |
+ ||||
+ | + | + | crunch-server-header | +Remove server header(s) matching the supplied pattern. | +||||
+ | + | + | + | Header string to suppress: + |
+ ||||
+ | + | + | hide-accept-language | +Pretend to have different language settings. (Makes a fake User-Agent more believable, + but can lead to foreign content.) | +||||
+ | + | + | + |
+ This isn't the option you're looking for. + + + |
+ ||||
+ | + | + | hide-content-disposition | +Block or overwrite the content-disposition header. Useful to view a document inside the browser, + even if you were supposed to save it first, or to change the suggested file name. | +||||
+ | + | + | + |
+ + + + |
+ ||||
+ | + | + | redirect | +Redirect to another address. + | ||||
+ | + | + | + | Address to redirect to: + |
+ ||||
+ | + | + | filter-client-headers | +Apply filters to the client headers as well. Only enable this if you know what you're doing. | +||||
+ | + | + | filter-server-headers | +Apply filters to the server headers as well. Only enable this if you know what you're doing. | +||||
- | - | - | hide-from-header | +hide-from-header | Stop old web browsers from sending the user's e-mail address with every request. | |||
- | - | + | ||||||
+ | + | |||||||
+ name="hide_referrer" id="hide_referrer_y" value="Y" @hide-referrer-y@ + onclick="show_hide_referrer_opts(true)"> | + name="hide_referrer" id="hide_referrer_n" value="N" @hide-referrer-n@ + onclick="show_hide_referrer_opts(false)"> | - | hide-referrer | +hide-referrer | Helps prevent tracking by not sending the URL of the previous web page. | |||
- | (breaks images + | (breaks images
on some free web hosts). - |
- ||||||
+ + |
+ ||||||||
- | - | - | hide-user-agent | +hide-user-agent | Pretend to be using a different web browser. (Breaks many web sites). | |||
- | - | + | ||||||
+ | + | User Agent string to send: |
||||||
+ | - | - | - | kill-popups | +kill-popups | Filter the website through a built-in filter to disable many JavaScript pop-up windows. | - | limit-connect | +limit-connect | Specify which ports are allowed for SSL (HTTP CONNECT) access. Note that this allows arbitrary tunnelling, so opening all ports would be a security hole. | @@ -645,49 +1088,23 @@ function show_send_wafer_opts(tf) -
+ | - | - | - | prevent-compression | +prevent-compression | Disables compression. Compressed web pages are faster to - download, but cannot be filtered with filter - or kill-popups. + download, but cannot be filtered with filter + or kill-popups. This setting only affects the few web sites which support compression. | ||
- | - | - | prevent-reading-cookies | -Prevent the website from reading cookies. | -||||
- | - | - | prevent-setting-cookies | -Prevent the website from setting cookies. | -||||
- | send-vanilla-wafer | +send-vanilla-wafer | Adds a special wafer (standard cookie) to all your requests. | |||||
+ | - | - | - | send-wafer | +send-wafer | Adds user-specified cookies. | ||
- | - | + | ||||||
+ | + | Editing the settings for this option, or turning it on if it was off, is not yet supported using this web-based @@ -733,32 +1150,32 @@ function show_send_wafer_opts(tf) | - | session-cookies-only | +session-cookies-only | Any cookies set by the website are changed to temporary ("per-session") ones, which only last until you close your web browser. This will allow you to use sites that require cookies, but sites will not be able to track you across sessions. For this to be useful, you should disable - prevent-reading-cookies and - prevent-setting-cookies. | + crunch-outgoing-cookies and + crunch-incoming-cookies.||
+ | - | - | - | set-image-blocker | +set-image-blocker | Specifies how to block images. | ||
- | - | + | ||||||
+ | + |
More Privoxy:-
|