From 51dd3416173631d3cdbd51bd35d8cf6a349e13c2 Mon Sep 17 00:00:00 2001
From: hal9 Along time ago, there was the
+> A long time ago, there was the
You might also find "Writing Documentation
Using DocBook - A Crash Course
version string, e.g. "3.0.5""3.0.6".
const char FILENAME_rcs[] = "$Id: developer-manual.sgml,v 2.9 2006/09/14 02:30:07 hal9 Exp $";
+>const char FILENAME_rcs[] = "$Id: developer-manual.sgml,v 2.11 2006/09/26 02:36:29 hal9 Exp $";
/*********************************************************************
*
* File : $Source$
@@ -2422,7 +2422,7 @@ WIDTH="100%"
CLASS="PROGRAMLISTING"
>#ifndef _FILENAME_H
#define _FILENAME_H
-#define FILENAME_H_VERSION "$Id: developer-manual.sgml,v 2.9 2006/09/14 02:30:07 hal9 Exp $"
+#define FILENAME_H_VERSION "$Id: developer-manual.sgml,v 2.11 2006/09/26 02:36:29 hal9 Exp $"
/*********************************************************************
*
* File : $Source$
diff --git a/doc/webserver/developer-manual/contact.html b/doc/webserver/developer-manual/contact.html
index 144c9ca4..4270b281 100644
--- a/doc/webserver/developer-manual/contact.html
+++ b/doc/webserver/developer-manual/contact.html
@@ -295,7 +295,7 @@ CLASS="APPLICATION"
CLASS="APPLICATION"
>Windows
XP SP2), if you are using some kind of Unix flavour,
+>), if you are using a Unix flavor,
sending the output of "uname -a"
9.1. License
9.2. History
$Id: developer-manual.sgml,v 2.9 2006/09/14 02:30:07 hal9 Exp $
Please note that this document is constantly evolving. This copy represents - the state at the release of version 3.0.5. + the state at the release of version 3.0.6. You can find the latest version of the this manual at
debchange -v 3.0.5-BETA-1 "New upstream version"debchange -v 3.0.6-stable-1 "New upstream version"
"Complicated" is in the eye of the beholder. Those that are + familiar with some of the underlying concepts, such as regular expression + syntax, take to it like a fish takes to water. Also, software that tries + hard to be "user friendly", often lacks sophistication and + flexibility. There is always that trade-off there between power vs. + easy-of-use. Furthermore, anyone is welcome to contribute ideas and + implementations to enhance Privoxy. +
The default configuration shouldn't impact the usability of any of these services. - It will, however, make all cookiesfragile } + # Gmail is ... mail.google.com3.8. What's the difference between the +>3.9. What's the difference between the "Cautious"3.9. Why can I change the configuration +>3.10. Why can I change the configuration with a browser? Does that not raise security issues?
It may seem strange that regular users can edit the config files with their @@ -650,9 +678,9 @@ CLASS="SECT2" >
By default, 3.12. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.
3.13. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.
The replacement for blocked images can be controlled with the Remember that , is an educated guess. While we hope that the standard configuration
is rather smart, it will make occasional mistakes. The checkerboard image is visually
- decent, but it shows you that and where images were blocked, which can be very
+ decent, and it shows you where images have been blocked, which can be very
helpful in case some navigation aid or otherwise innocent image was
erroneously blocked. It is recommended for new users so they can
This happens when the banners are not embedded in the HTML code of the
@@ -973,7 +1001,7 @@ CLASS="SECT2"
>3.15. Can Privoxy run as a service
+>3.16. Can Privoxy run as a service
on Win2K/NT/XP? Yes. Version 3.0.5 introduces full 3.16. How can I make Privoxy work with other
+>3.17. How can I make Privoxy work with other
proxies like Squid or Tor? This can be done and is often useful to combine the benefits of
@@ -1042,7 +1070,7 @@ CLASS="SECT2"
>3.17. Can I just set Privoxy to use port 80
+>3.18. Can I just set Privoxy to use port 80
and thus avoid individual browser configuration? No, its more complicated than that. This only works with special kinds
@@ -1058,7 +1086,7 @@ CLASS="SECT2"
>3.18. Can Privoxy run as a 3.19. Can Privoxy run as a "transparent" proxy?Privoxy currently does not have this ability,
- though it may be added in a future release. Transparent proxies require
+ though it may be added in a future release. Transparent proxies require
special handling of the request headers beyond what
Privoxy is now capable of. Chaining User Manual 3.20. How can I have separate rules just for HTML mail?3.21. How can I have separate rules just for HTML mail? The short answer is, you can't. 3.21. I sometimes notice cookies sneaking through. How?3.22. I sometimes notice cookies sneaking through. How? 3.22. Are all cookies bad? Why?3.23. Are all cookies bad? Why? No, in fact there are many beneficial uses of
3.23. How can I allow permanent cookies for my trusted sites?3.24. How can I allow permanent cookies for my trusted sites? There are several actions that relate to cookies. The default behavior is to
allow only 3.24. Can I have separate configurations for different users?3.25. Can I have separate configurations for different users? Each instance of Privoxy, each with
- a unique listen-address and configuration path, and then
+ a unique
+ listen-address
+ configuration setting, and configuration path, and then
each of these can have their own configurations. Think of it as per-port
configuration. 3.25. Can I set-up Privoxy as a whitelist of
+>3.26. Can I set-up Privoxy as a whitelist of
"good" sites? Sure. There are a couple of things you can do for simple whitelisting.
+> Sure. There are a couple of things you can do for simple white-listing.
Here's one real easy one: Ad blocking is hard-coded into the default configuration files. It has been
- assumed that everyone using Ad blocking is achieved through a complex application of various Privoxy
+ actions. These
+ actions are deployed against simple images, banners, flash animations,
+ text pages, JavaScript, pop-ups and pop-unders, etc., so its not as simple as
+ just turning one or two actions off. The various actions that make up
+ Privoxy is interested in this feature. If you want
- to do without this, there are several approaches you can take: You can
- manually undo the many block rules in ad blocking are hard-coded into the default configuration files. It
+ has been assumed that everyone using Privoxy is interested in this
+ particular feature.
+ If you want to do without this, there are several approaches you can take:
+ You can manually undo the many block rules in
+ default.action. Or
- even easier, just create your own . Or even easier, just create your own
+ default.action file
- from scratch without the many ad blocking rules, and corresponding exceptions.
- Or lastly, if you are not concerned about the additional blocks that are
- done for privacy reasons, you can very easily over-ride
- file from scratch without the many ad
+ blocking rules, and corresponding exceptions. Or lastly, if you are not
+ concerned about the additional blocks that are done for privacy reasons, you
+ can very easily over-ride all blocking with the following very simple rule in
- blocking with the
+ following very simple rule in your user.action:
@@ -1467,8 +1516,7 @@ HREF="../user-manual/actions-file.html#BLOCK"
TARGET="_top"
>-block }
- / # UN-Block *all* URLs
- 3.13. Why would anybody want to see a checkerboard pattern?
3.14. Why would anybody want to see a checkerboard pattern?3.14. I see some images being replaced by a text
+>3.15. I see some images being replaced by a text
instead of the checkerboard image. Why and how do I get rid of this?
3.26. How can I turn off ad-blocking?3.27. How can I turn off ad-blocking?
-filter{banners-by-size}
All the template pages are installed in a sub-directory appropriately named: - templates. These are specialized text files utilized - by Privoxy "templates" are specialized text files utilized by + Privoxy and can easily be modified using any text editor. Knowing something - about HTML will of course be helpful. You cannot rename any of these files, - or create completely new templates, that is not possible. But you can change - the page content to whatever you like. Be forewarned that these files are - subject to being overwritten during upgrades, so be sure to save any - customizations.
for various purposes and can easily be modified using any text + editor. All the template pages are installed in a sub-directory appropriately + named: templates. Knowing something about HTML syntax + will of course be helpful. You cannot rename any of these files, or create + completely new templates, that is not possible. But you can change the page + content to whatever you like. Be forewarned that these files are subject to + being overwritten during upgrades, so be sure to save any customizations.Editing the template page (see above) may dissuade some users, but this - method is easily circumvented. Where you want this level of control, you should - build Editing the BLOCKED template page (see above) may dissuade some users, but + this method is easily circumvented. Where you need this level of control, you + should build Privoxy from source, and enable various features that are - available as compile-time options. You should use +> from source, and enable various features that are + available as compile-time options. You should configure as follows:
the sources as follows:
./configure --disable-toggle --disable-editor --disable-force -./configure --disable-toggle --disable-editor --disable-force |
+ Yes, ad blocking is but one possible use. There are many, many ways Privoxy + can be used to sanitize and customize web browsing.
Though outdated, Junkbusters Corporation-derived software under the same name led to confusion.
There are also potential legal complications from the continued use of the +> There are also potential legal complications from our use of the Junkbuster1.6. How does Privoxy differ +>1.7. How does Privoxy differ from the old Junkbuster?
Web page content filtering (removes banners based on size,
+> Web page filtering (text replacements, removes banners based on size,
invisible "web-bugs", JavaScript and HTML annoyances, pop-up windows, etc.)
+>, JavaScript and HTML annoyances,
+ pop-up windows, header manipulation, etc.)
Actually, it's a black art ;-) And yes, it is always possible to have a broad
@@ -645,9 +663,9 @@ CLASS="SECT2"
> No, not really. The default installation should give you a good starting
@@ -657,9 +675,20 @@ CLASS="emphasis"
CLASS="EMPHASIS"
>most1.8. Can Privoxy make mistakes?
+>1.9. Can Privoxy make mistakes?
This does not sound very scientific.
1.9. Will I have to configure Privoxy
+>1.10. Will I have to configure Privoxy
before I can use it?
You do have to set up your browser to use + Privoxy (see the Installation section below).
But you will certainly run into situations where there are false positives, +> And you will certainly run into situations where there are false positives, or ads not being blocked that you may not want to see. In these cases, you would certainly benefit by customizing Privoxy lies!
You will have to tell your browser about + Yes, Privoxy - (see the Installation section below).
runs as a server already, and can easily be configured to + "serve" more than one client. See How can I set up Privoxy to act as a proxy for my LAN below. Modern browsers do indeed have In addition, a proxy is good choice if you use multiple browsers, or
- have a LAN with multiple computers. This way all the configuration
- is in one place, and you don't have to maintain a similar configuration
- for possibly many browsers.
+ have a LAN with multiple computers since Privoxy can run as a server
+ application. This way all the configuration is in one place, and you don't
+ have to maintain a similar configuration for possibly many browsers or
+ users.
The most important reason is because you have access to
1.12. Is there is a license or fee? What about a
+>1.14. Is there is a license or fee? What about a
warranty? Registration? 1.13. Can Privoxy remove spyware? Adware? Viruses?1.15. Can Privoxy remove spyware? Adware? Viruses? No. Privoxy can help prevent contact from sites
- that use such tactics with approriate configuration rules, and thus could
- conceivably prevent contamination from such sites.
1.15. I would like to help you, what can I do?1.17. I would like to help you, what can I do? Well, we Developer's Manual, at least
the pertinent sections. Once we have added you to the team, you'll have access to the CVS repository, and
- together we'll find a suitable task for you. We, of course, welcome donations and could use money for domain registering,
buying software to test 1.15.3. Software1.17.3. Software If you are a vendor of a web-related software like a browser, web server
or proxy, and would like us to ensure that $Id: faq.sgml,v 2.21 2006/10/03 14:40:51 fabiankeil Exp $ Please note that this document is a work in progress. This copy represents
- the state at the release of version 3.0.5.
+ the state at the release of version 3.0.6.
You can find the latest version of the document at Tor. Afterwards, please take the time to at least skim through the rest
+> Afterward, please take the time to at least skim through the rest
of Tor's It would be technically possible eliminate the banners in a way that frees
- their screen estate in many cases, by doing all banner blocking with filters,
- i.e. eliminating the whole image references from the HTML pages instead
- of letting them stay in, and blocking the resulting requests for the
- banners themselves. But this would consume considerable CPU resources, would likely destroy
- the layout of many web pages which rely on the banners consuming a certain
- amount of screen space, and would fail in other cases, where the screen space
- is reserved e.g. by tables anyway. Also, making the banners disappear without
- a visual trace complicates troubleshooting. So we won't support this in the default configuration, but you can of course
- define appropriate filters yourself. But, this would consume considerably more CPU resources (IOW, slow things
+ down), would likely destroy the layout of some web pages which rely on the
+ banners utilizing a certain amount of page space, and might fail in other
+ cases, where the screen space is reserved (e.g. by HTML tables for instance).
+ Also, making ads and banners disappear without any trace complicates
+ troubleshooting, and would sooner or later be problematic. The better alternative is to instead let them stay, and block the resulting
+ requests for the banners themselves as is now the case. This leaves either
+ empty space, or the familiar checkerboard pattern. So the developers won't support this in the default configuration, but you
+ can of course define appropriate filters yourself to achieve this. Bypassing a proxy, or proxying based on arbitrary criteria, is purely a browser
+ configuration issue, not a Privoxy issue. Modern browsers typically do have
+ settings for not proxying certain sites. Check your browser's help files. From the webserver's perspective, there is no difference between
@@ -1248,7 +1279,7 @@ CLASS="SECT2"
>4.21. I just downloaded a Perl script, and Privoxy
+>4.22. I just downloaded a Perl script, and Privoxy
altered it! Yikes, what is wrong! Please read above. Other references and sites of interest to 4.24. I've noticed that Privoxy changes 4.25. I've noticed that Privoxy changes "Microsoft" to
diff --git a/doc/webserver/faq/trouble.html b/doc/webserver/faq/trouble.html
index 54324730..659fec9c 100644
--- a/doc/webserver/faq/trouble.html
+++ b/doc/webserver/faq/trouble.html
@@ -81,7 +81,7 @@ CLASS="SECT2"
> Either ... Or you have a firewall that is interfering and blocking you. Solution:
- try disabling or removing the firewall as a test.
+ try disabling or removing the firewall as a simple test.
More than likely this is a problem with your TCP/IP networking. ZoneAlarm has
+ been reported to cause this symptom -- even if not running! The solution is
+ to either fight the ZA configuration, or uninstall ZoneAlarm, and then find
+ something better behaved in its place. Other personal firewall type products
+ may cause similar type problems if not configured correctly.
+ If the ad had been displayed before you added its URL, it will probably be
@@ -151,8 +171,7 @@ still getting through. How?Privoxy
- will not be in the picture. The best thing to do is try flushing the browser's
- caches. And then try again. If this doesn't help, you probably have an error in the rule you
applied. Try pasting the full URL of the offending ad into http://config.privoxy.org/show-url-info
and see if it really matches your new rule. Blocking ads is like blocking
- spam: a lot of tinkering is required to stay ahead of the game. Below is a slightly modified real-life log snippet that originates with one
+ requested URL: www.example.com (name of site was changed
+ for this example, the number of requests is real). You can see in this the
+ complexity of what goes into making up this one "page". There
+ are eight different domains involved here, with thirty two separate URLs
+ requested in all, making up all manner of images, Shockwave Flash,
+ JavaScript, CSS stylesheets, scripts, and other related content. Some of this
+ content is obviously "good" or "bad", but not all.
+ Many of the more questionable looking requests, are going to outside domains
+ that seem to be identifying themselves with suspicious looking names, making
+ our job a little easier. Privoxy has "crunched" (meaning caught
+ and BLOCKED) quite a few items in this example, but perhaps missed a few as well. Despite 12 out of 32 requests being blocked, the page looked, and seemed to
+ behave perfectly "normal" (minus some ads, of course). First verify that it is indeed a If still a problem, go to If the problem went away, we know we have a configuration related problem.
+ Now go to http://config.privoxy.org/show-url-info
- and paste the full URL of the page in question into the prompt. See which actions
- are being applied to the URL, and which matches in which actions files are
- responsible for that. Now, armed with this information, go to required You can now either look for a section which disables the actions that
you suspect to cause the problem and add a pattern for your site there,
@@ -240,6 +363,9 @@ TARGET="_top"
>actions tutorial
with general configuration information and examples. As a last resort, you can always see if your browser has a setting that will
+ bypass the proxy setting for selective sites. Modern browsers can do this. This is a quirk that effects the installation of
@@ -303,7 +429,7 @@ CLASS="SECT2"
>5.5. I cannot connect to any FTP sites. Privoxy
+>5.6. I cannot connect to any FTP sites. Privoxy
is blocking me. 5.6. In Mac OSX, I can't configure Microsoft Internet Explorer to use
+>5.7. In Mac OSX, I can't configure Microsoft Internet Explorer to use
Privoxy as the HTTP proxy. Microsoft Internet Explorer (in versions like 5.1) respects system-wide
@@ -399,7 +525,7 @@ CLASS="SECT2"
>5.7. In Mac OSX, I dragged the Privoxy folder to the trash in order to
+>5.8. In Mac OSX, I dragged the Privoxy folder to the trash in order to
uninstall it. Now the finder tells me I don't have sufficient privileges to
empty the trash. 5.8. In Mac OSX Panther (10.3), images often fail to load and/or I
+>5.9. In Mac OSX Panther (10.3), images often fail to load and/or I
experience random delays in page loading. I'm using
5.9. I get a completely blank page at one site. 5.10. I get a completely blank page at one site. "View Source"
@@ -524,22 +650,6 @@ CLASS="SECT2"
> More than likely this is a problem with your TCP/IP networking. ZoneAlarm has
- been reported to cause this symptom -- even if not running. The solution is
- to either fight the ZA configuration, or uninstall ZoneAlarm, and then find
- something better behaved in its place. Other personal firewall type products
- may cause similar type problems if not configured correctly.
- In any case, v. 3.0.5 includes various improvements to help
+> In any case, newer versions include various improvements to help
Privoxy It's probably due to compression. It is a common practice for web servers to
+ send their content "compressed" in order to speed things up, and
+ then let the browser "uncompress" them. Privoxy does not (yet)
+ support compression. But we can force the web server to bend to our will ;-)
+ So for filtering, make sure you have prevent-compression
+ turned ON!
@@ -327,10 +339,6 @@ automatically.
-This is a BETA version of Privoxy. Not
-all features are well tested.
-
-
Please see the User Manual on how to contact the
developers, for feature requests, reporting problems, and other questions.
@@ -388,7 +396,6 @@ the Privoxy developer manual.
Hal Burgiss
Ian Cummings
- Félix Rauch
Roland Rosenfeld
@@ -457,6 +464,6 @@ USA
This document was created by
man2html,
using the manual pages.1.15.1. Would you like to participate?
1.17.1. Would you like to participate?2.5. I just installed Privoxy. Is there anything
special I have to do now?
Privoxy
as a proxy by specifying the correct proxy address and port number
- in the appropriate configuration area for the browser. See below.
- You should also flush your browser's memory and disk cache to get rid of any
+ in the appropriate configuration area for the browser. See
+ the User Manual for more
+ details. You should also flush your browser's memory and disk cache to get rid of any
cached junk items, and remove any stored
Privoxy
- is running, or the equivalent hostname. Port assignment would be
- same as above. Note that 192.168.1.1.
+ Port assignment would be same as above. Note that
+ Privoxy doesn't
- listen on any LAN interfaces by default.
+> doesn't listen on any LAN interfaces by
+ default.
4.1. How much does Privoxy slow my browsing down? This
has to add extra time to browsing.
Privoxy, http://example.com/show-proxy-args and http://i.j.b/,
are no longer supported. If you still use such an old version, you should really consider
- upgrading to 3.0.5.4.8. Can Privoxy guarantee I am anonymous?
4.9. A test site says I am not using a Proxy.
4.11. Might some things break because header information or
content is being altered?
4.12. Can Privoxy act as a
4.13. What about as a firewall? Can Privoxy protect me?
4.14. I have large empty spaces / a checkerboard pattern now where
ads used to be. Why?
4.15. How can Privoxy filter Secure (HTTPS) URLs?
4.16. Privoxy runs as a "middle-man" in
- the interaction between your browser and web sites.
4.19. How can I tell Privoxy to totally ignore certain sites?
5.1. I cannot connect to any websites. Or, I am getting
"connection refused" message with every web page. Why?
5.2. Why am I getting a 503 Error (WSAECONNREFUSED) on every page?
5.2. I just added a new rule, but the steenkin ad is
+>5.3. I just added a new rule, but the steenkin ad is
still getting through. How?
Request: www.example.com/
+Request: www.example.com/favicon.ico
+Request: img.example.com/main.css
+Request: img.example.com/sr.js
+Request: example.betamarker.com/example.html
+Request: www.lik-sang.com/Banners/bestsellers/skyscraper.php?likref=BSellers
+Request: img.example.com/pb.png
+Request: www.google-analytics.com/urchin.js crunch!
+Request: www.advertising-department.com/ats/switch.ps.php?26856 crunch!
+Request: img.example.com/p.gif
+Request: www.popuptraffic.com/assign.php?l=example&mode=behind crunch!
+Request: www.popuptraffic.com/scripts/popup.php?hid=5c3cf&tmpl=PBa.tmpl crunch!
+Request: www.popuptraffic.com/assign.php?l=example crunch!
+Request: www.lik-sang.com/Banners/best_sellers/best_sellers.css
+Request: www.adtrak.net/adx.js crunch!
+Request: img.example.com/hbg.gif
+Request: img.example.com/example.jpg
+Request: img.example.com/mt.png
+Request: img.example.com/mm.png
+Request: img.example.com/mb.png
+Request: www.popuptraffic.com/scripts/popup.php?hid=a71b91fa5&tmpl=Ua.tmp crunch!
+Request: www.example.com/tracker.js
+Request: www.lik-sang.com/Banners/best_sellers/lsi_head.gif
+Request: www.adtrak.net/adjs.php?n=020548130&what=zone:61 crunch!
+Request: www.adtrak.net/adjs.php?n=463594413&what=zone:58&source=Ua crunch!
+Request: www.lik-sang.com/Banners/best_sellers/bottomani.swf
+Request: mmm.elitemediagroup.net/install.php?allowpop=no&popupmincook=0&allowsp2=1 crunch!
+Request: www.example.com/tracker.js?screen=1400x1050&win=962x693
+Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=61 crunch!
+Request: 66.70.21.80/scripts/click.php?hid=5c3cf599a9efd0320d26&si
+Request: 66.70.21.80/img/pixel.gif
+Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=58&source=Ua&block=86400 crunch!
+Request: 66.70.21.80/scripts/click.php?hid=a71b9f6504b0c5681fa5&si=Ua
5.10. Why am I getting a 503 Error (WSAECONNREFUSED) on every page?
5.11. My logs show many HOSTS
file. If this file has been changed from the original, try reverting it to
- see if that helps. Make sure what ever name(s) are used for the local system,
+ see if that helps. Make sure whatever name(s) are used for the local system,
that they resolve both ways.
5.20. Why do my filters work on some sites but not on others?
PRIVOXY
-Section: (1)
Updated: 21 September 2006
Index
+Section: (1)
Updated: 13 November 2006
Index
@@ -186,8 +186,8 @@ configuration might look like:
+filter{refresh-tags} \
-filter{unsolicited-popups} \
-filter{all-popups} \
-+filter{img-reorder} \
-+filter{banners-by-size} \
+-filter{img-reorder} \
+-filter{banners-by-size} \
-filter{banners-by-link} \
+filter{webbugs} \
-filter{tiny-textforms} \
@@ -200,6 +200,14 @@ configuration might look like:
-filter{crude-parental} \
+filter{ie-exploits} \
-filter{site-specifics} \
+-filter{google} \
+-filter{yahoo} \
+-filter{msn} \
+-filter{blogspot} \
+-filter{xml-to-html} \
+-filter{html-to-xml} \
+-filter{no-ping} \
+-filter{hide-tor-exit-notation} \
-filter-client-headers \
-filter-server-headers \
-force-text-mode \
@@ -227,28 +235,32 @@ configuration might look like:
/ # '/' Match *all* URL patterns
- # Block, and treat these URL patterns as if they were 'images'.
- # We would expect these to be ads.
- { +block-as-image }
- .ad.doubleclick.net
- .a[0-9].yimg.com/(?:(?!/i/).)*$
- ad.*.doubleclick.net
-
# Block all URLs that match these patterns
{ +block }
- ad*.
+ ad.
+ ad[sv].
.*ads.
banner?.
/.*count(er)?\.(pl|cgi|exe|dll|asp|php[34]?)
.hitbox.com
media./.*(ads|banner)
+ # Block, and treat these URL patterns as if they were 'images'.
+ # We would expect these to be ads.
+ { +block-as-image }
+ .ad.doubleclick.net
+ .a[0-9].yimg.com/(?:(?!/i/).)*$
+ ad.*.doubleclick.net
+
# Make exceptions for these harmless ones that would be
# caught by our +block patterns just above.
{ -block }
adsl.
+ adobe.
advice.
.*downloads.
+ # uploads or downloads
+ /.*loads
-Time: 01:21:32 GMT, September 22, 2006
+Time: 01:57:58 GMT, November 14, 2006