Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks.


Red Hat and Fedora RPMs

RPMs can be installed with rpm -Uvh privoxy-3.0.12-1.rpm, and will use /etc/privoxy for the location of configuration files.

Note that on Red Hat, Privoxy will not be automatically started on system boot. You will need to enable that using chkconfig, ntsysv, or similar methods.

If you have problems with failed dependencies, try rebuilding the SRC RPM: rpm –rebuild privoxy-3.0.12-1.src.rpm. This will use your locally installed libraries and RPM version.

Also note that if you have a Junkbuster RPM installed on your system, you need to remove it first, because the packages conflict. Otherwise, RPM will try to remove Junkbuster automatically if found, before installing Privoxy.

Debian and Ubuntu

DEBs can be installed with apt-get install privoxy, and will use /etc/privoxy for the location of configuration files.


Just double-click the installer, which will guide you through the installation process. You will find the configuration files in the same directory as you installed Privoxy in.

Version 3.0.5 beta introduced full Windows service functionality. On Windows only, the Privoxy program has two new command line arguments to install and uninstall Privoxy as a service.



After invoking Privoxy with –install, you will need to bring up the Windows service console to assign the user you want Privoxy to run under, and whether or not you want it to run whenever the system starts. You can start the Windows services console with the following command: services.msc. If you do not take the manual step of modifying Privoxy’s service settings, it will not start. Note too that you will need to give Privoxy a user account that actually exists, or it will not be permitted to write to its log and configuration files.

More Details Visit:

Post By Editor (2,827 Posts)

Website: →