【軟體】Proxomitron Ver 4.5 - 第2頁 - PCZONE 討論區

返回   PCZONE 討論區 > ▲ -- 電 腦 軟 體 討 論 區 > -- 網 路 軟 體 討 論 二 版 (網路其他軟體)


PCZONE 討論區



通知

-- 網 路 軟 體 討 論 二 版 (網路其他軟體) 包括檔案傳輸和下載、網頁搜尋、網路工具、聊天、多媒體、架站軟體、線上字典等的疑難解答。

風中的羽翼

看不懂英文你可以到下面的中文網站看,只是這個網站好久沒更新了
http://www.geocities.com/acejackwu/index.htm
雖然是舊網站,但基本過濾語法和使用說明都是通用的
只是可能缺少新的過濾語法而已....

回覆
風中的羽翼

下面是我曾經碰到的 E-mail 炸彈
以下是我寫的攔下規則

語法:
[Patterns]

Name = "Kill Img Mailto"
Active = TRUE
Bounds = "<img\s*>"
Limit = 128
Match = "\0 src=$AV(mailto:\w) \1"
Replace = "<font color="#FF0000" size="1">Kill Img Mailto</font>"
回覆
風中的羽翼

這是一個 Content-Type: Fix MIME types based on URL (In) 的修正規則
簡單的說,這個規則是用來修正 MIME Content Types 錯誤的
因為有些架 Server 的人,可能很迷糊,或是基於某些原因,而造成使用者的困擾
所以此規則會自動以 FixMIME.txt 來參照修正

引用:

[Blocklists]
List.FixMIME = "..\Lists\FixMIME.txt"

[HTTP headers]
In = TRUE
Out = FALSE
Key = "Content-Type: Fix MIME types based on URL (In)"
URL = "$RESP(200)([^/?]+/)+[^?#]++.$LST(FixMIME)(^?)"
Match = "(^$TST(MIME)) \1"
Replace = "$GET(MIME)$LOG(wRESP $DTM(c): Content-Type: Fix MIME types based on URI: media-type= \1)"
引用:

# NoAddURL
#
# Proxomitron4.5 URL killfile: $LST(MIME-List)
#
# This blocklist is for use with the "Content-Type: Fix MIME types based on URL" header filter, which matches URL extensions to their proper MIME types.
#
###########################################################

##### text/*
asc $SET(MIME=text/plain)
css $SET(MIME=text/css)
etx $SET(MIME=text/x-setext)
hdm(l|) $SET(MIME=text/x-hdml)
htm(l|) $SET(MIME=text/html)
jad $SET(MIME=text/vnd.sun.j2me.app-descriptor)
js $SET(MIME=text/javascript)
mrl $SET(MIME=text/x-mrml)
r3t $SET(MIME=text/vnd.rn-realtext3d)
rt $SET(MIME=text/vnd.rn-realtext)
rtf $SET(MIME=text/rtf)
rtx $SET(MIME=text/richtext)
sgm(l|) $SET(MIME=text/sgml)
shtm(l|) $SET(MIME=text/html)
spc $SET(MIME=text/x-speech)
talk $SET(MIME=text/x-speech)
tsv $SET(MIME=text/tab-separated-values)
txt $SET(MIME=text/plain)
wml $SET(MIME=text/vnd.wap.wml)
wmls $SET(MIME=text/vnd.wap.wmlscript)
xml $SET(MIME=text/xml)
xsl $SET(MIME=text/xml)
xul $SET(MIME=text/xul)

##### image/*
bmp $SET(MIME=image/bmp)
cal $SET(MIME=image/x-cals)
cod $SET(MIME=image/cis-cod)
dcx $SET(MIME=image/x-dcx)
djv $SET(MIME=image/vnd.djvu)
djvu $SET(MIME=image/vnd.djvu)
dwg $SET(MIME=image/vnd)
dxf $SET(MIME=image/x-dxf)
eri $SET(MIME=image/x-eri)
fh4 $SET(MIME=image/x-freehand)
fh5 $SET(MIME=image/x-freehand)
fhc $SET(MIME=image/x-freehand)
fif $SET(MIME=image/fif)
fpx $SET(MIME=image/x-fpx)
gif $SET(MIME=image/gif)
ico $SET(MIME=image/x-icon)
ief $SET(MIME=image/ief)
ifm $SET(MIME=image/gif)
ifs $SET(MIME=image/ifs)
j2k $SET(MIME=image/j2k)
jpe $SET(MIME=image/jpeg)
jpeg $SET(MIME=image/jpeg)
jpg $SET(MIME=image/jpeg)
jpz $SET(MIME=image/jpeg)
mil $SET(MIME=image/x-cals)
pbm $SET(MIME=image/x-portable-bitmap)
pcx $SET(MIME=image/x-pcx)
pda $SET(MIME=image/x-pda)
pgm $SET(MIME=image/x-portable-graymap)
pict $SET(MIME=image/x-pict)
png $SET(MIME=image/png)
pnm $SET(MIME=image/x-portable-anymap)
ppm $SET(MIME=image/x-portable-pixmap)
qti(f|) $SET(MIME=image/x-quicktime)
ras $SET(MIME=image/x-cmu-raster)
rf $SET(MIME=image/vnd.rn-realflash)
rgb $SET(MIME=image/x-rgb)
rp $SET(MIME=image/vnd.rn-realpix)
svf $SET(MIME=image/vnd)
svg $SET(MIME=image/svg-xml)
svh $SET(MIME=image/svh)
tif $SET(MIME=image/tiff)
tiff $SET(MIME=image/tiff)
wbmp $SET(MIME=image/vnd.wap.wbmp)
wi $SET(MIME=image/wavelet)
wpng $SET(MIME=image/x-up-wpng)
xbm $SET(MIME=image/x-xbitmap)
xpm $SET(MIME=image/x-xpixmap)
xwd $SET(MIME=image/x-xwindowdump)

##### application/*
123 $SET(MIME=application/vnd.lotus-1-2-3)
aab $SET(MIME=application/x-authoware-bin)
aam $SET(MIME=application/x-authoware-map)
aas $SET(MIME=application/x-authoware-seg)
ai $SET(MIME=application/postscript)
amc $SET(MIME=application/x-mpeg)
asd $SET(MIME=application/astound)
asn $SET(MIME=application/astound)
avb $SET(MIME=application/octet-stream)
bcpio $SET(MIME=application/x-bcpio)
bin $SET(MIME=application/octet-stream)
bld $SET(MIME=application/bld)
bld2 $SET(MIME=application/bld2)
bpk $SET(MIME=application/octet-stream)
bz2 $SET(MIME=application/x-bzip2)
ccn $SET(MIME=application/x-cnc)
cco $SET(MIME=application/x-cocoa)
cdf $SET(MIME=application/x-netcdf)
class $SET(MIME=application/octet-stream)
clp $SET(MIME=application/x-msclip)
cmx $SET(MIME=application/x-cmx)
co $SET(MIME=application/x-cult3d-object)
cpio $SET(MIME=application/x-cpio)
cpt $SET(MIME=application/mac-compactpro)
crd $SET(MIME=application/x-mscardfile)
csh $SET(MIME=application/x-csh)
dcr $SET(MIME=application/x-director)
dir $SET(MIME=application/x-director)
dll $SET(MIME=application/octet-stream)
dmg $SET(MIME=application/octet-stream)
dms $SET(MIME=application/octet-stream)
doc $SET(MIME=application/msword)
dot $SET(MIME=application/x-dot)
dvi $SET(MIME=application/x-dvi)
dxr $SET(MIME=application/x-director)
ebk $SET(MIME=application/x-expandedbook)
eps $SET(MIME=application/postscript)
etc $SET(MIME=application/x-earthtime)
evy $SET(MIME=application/x-envoy)
exe $SET(MIME=application/octet-stream)
#ez $SET(MIME=application/andrew-inset)
fm $SET(MIME=application/x-maker)
gca $SET(MIME=application/x-gca-compressed)
gps $SET(MIME=application/x-gps)
gtar $SET(MIME=application/x-gtar)
gz $SET(MIME=application/x-gzip)
hdf $SET(MIME=application/x-hdf)
hlp $SET(MIME=application/winhlp)
hqx $SET(MIME=application/mac-binhex40)
ins $SET(MIME=application/x-NET-Install)
ipx $SET(MIME=application/x-ipix)
jam $SET(MIME=application/x-jam)
jar $SET(MIME=application/java-archive)
jnlp $SET(MIME=application/x-java-jnlp-file)
jwc $SET(MIME=application/jwc)
kjx $SET(MIME=application/x-kjx)
latex $SET(MIME=application/x-latex)
lcc $SET(MIME=application/fastman)
lcl $SET(MIME=application/x-digitalloca)
lcr $SET(MIME=application/x-digitalloca)
lgh $SET(MIME=application/lgh)
lha $SET(MIME=application/octet-stream)
lzh $SET(MIME=application/lzh)
m13 $SET(MIME=application/x-msmediaview)
m14 $SET(MIME=application/x-msmediaview)
man $SET(MIME=application/x-troff-man)
mbd $SET(MIME=application/mbedlet)
mct $SET(MIME=application/x-mascot)
mdb $SET(MIME=application/x-msaccess)
me $SET(MIME=application/x-troff-me)
mi $SET(MIME=application/x-mif)
mif $SET(MIME=application/x-mif)
mmf $SET(MIME=application/x-smaf)
mny $SET(MIME=application/x-msmoney)
moc(ha|) $SET(MIME=application/x-mocha)
mof $SET(MIME=application/x-yumekara)
mpp $SET(MIME=application/vnd.ms-project)
mps $SET(MIME=application/x-mapserver)
mrm $SET(MIME=application/x-mrm)
ms $SET(MIME=application/x-troff-ms)
mts $SET(MIME=application/metastream)
mtx $SET(MIME=application/metastream)
mtz $SET(MIME=application/metastream)
mzv $SET(MIME=application/metastream)
nar $SET(MIME=application/zip)
nc $SET(MIME=application/x-netcdf)
nif $SET(MIME=application/x-nif)
nmz $SET(MIME=application/x-scream)
npx $SET(MIME=application/x-netfpx)
nva $SET(MIME=application/x-neva1)
oda $SET(MIME=application/oda)
oom $SET(MIME=application/x-AtlasMate-Plugin)
pan $SET(MIME=application/x-pan)
pdf $SET(MIME=application/pdf)
pfr $SET(MIME=application/font-tdpfr)
pgn $SET(MIME=application/x-chess-pgn)
pm $SET(MIME=application/x-perl)
pmd $SET(MIME=application/x-pmd)
pot $SET(MIME=application/vnd.ms-powerpoint)
pps $SET(MIME=application/vnd.ms-powerpoint)
ppt $SET(MIME=application/vnd.ms-powerpoint)
pqf $SET(MIME=application/x-cprplayer)
pqi $SET(MIME=application/cprplayer)
prc $SET(MIME=application/x-prc)
proxy $SET(MIME=application/x-ns-proxy-autoconfig)
ps $SET(MIME=application/postscript)
ptlk $SET(MIME=application/listenup)
pub $SET(MIME=application/x-mspublisher)
rar $SET(MIME=application/x-rar-compressed)
rdf $SET(MIME=application/rdf+xml)
rlf $SET(MIME=application/x-richlink)
rnx $SET(MIME=application/vnd.rn-realplayer)
roff $SET(MIME=application/x-troff)
rtg $SET(MIME=application/metastream)
rwc $SET(MIME=application/x-rogerwilco)
sca $SET(MIME=application/x-supercard)
scd $SET(MIME=application/x-msschedule)
sdf $SET(MIME=application/e-score)
sea $SET(MIME=application/x-stuffit)
sh $SET(MIME=application/x-sh)
shar $SET(MIME=application/x-shar)
shw $SET(MIME=application/presentations)
sit $SET(MIME=application/x-stuffit)
skd $SET(MIME=application/x-Koan)
skm $SET(MIME=application/x-koan)
skp $SET(MIME=application/x-Koan)
skt $SET(MIME=application/x-koan)
slc $SET(MIME=application/x-salsa)
smi(l|) $SET(MIME=application/smil)
smp $SET(MIME=application/studiom)
so $SET(MIME=application/octet-stream)
spl $SET(MIME=application/x-futuresplash)
spr $SET(MIME=application/x-sprite)
sprite $SET(MIME=application/x-sprite)
spt $SET(MIME=application/x-spt)
src $SET(MIME=application/x-wais-source)
sv4cpio $SET(MIME=application/x-sv4cpio)
sv4crc $SET(MIME=application/x-sv4crc)
swf $SET(MIME=application/x-shockwave-flash)
t(r|) $SET(MIME=application/x-troff)
tad $SET(MIME=application/octet-stream)
tar $SET(MIME=application/x-tar)
taz $SET(MIME=application/x-tar)
tbp $SET(MIME=application/x-timbuktu)
tbt $SET(MIME=application/timbuktu)
tcl $SET(MIME=application/x-tcl)
tex $SET(MIME=application/x-tex)
texi(nfo|) $SET(MIME=application/x-texinfo)
tgz $SET(MIME=application/x-tar)
tki(ned|) $SET(MIME=application/x-tkined)
toc $SET(MIME=application/toc)
trm $SET(MIME=application/x-msterminal)
ttz $SET(MIME=application/t-time)
ustar $SET(MIME=application/x-ustar)
vcd $SET(MIME=application/x-cdlink)
vmi $SET(MIME=application/x-dreamcast-vms-info)
vms $SET(MIME=application/x-dreamcast-vms)
wbxml $SET(MIME=application/vnd.wap.wbxml)
wmf $SET(MIME=application/x-msmetafile)
wmlc $SET(MIME=application/vnd.wap.wmlc)
wmlsc $SET(MIME=application/vnd.wap.wmlscriptc)
wri $SET(MIME=application/x-mswrite)
wxl $SET(MIME=application/x-wxl)
xdm(a|) $SET(MIME=application/x-xdma)
xdw $SET(MIME=application/vnd.fujixerox.docuworks)
x-gzip $SET(MIME=application/x-gzip)
xht(m(l|)|) $SET(MIME=application/xhtml+xml)
xla $SET(MIME=application/vnd.ms-excel)
xlc $SET(MIME=application/vnd.ms-excel)
xll $SET(MIME=application/x-excel)
xlm $SET(MIME=application/vnd.ms-excel)
xls $SET(MIME=application/vnd.ms-excel)
xlt $SET(MIME=application/vnd.ms-excel)
xlw $SET(MIME=application/vnd.ms-excel)
xpi $SET(MIME=application/x-xpinstall)
yz1 $SET(MIME=application/x-yz1)
z $SET(MIME=application/x-compress)
zac $SET(MIME=application/x-zaurus-zac)
zip $SET(MIME=application/zip)
(^$URL(http://wind.prohosting.com/proxmine/cgi-bin/uploader/))

##### audio/*
aif $SET(MIME=audio/x-aiff)
aifc $SET(MIME=audio/x-aiff)
aiff $SET(MIME=audio/x-aiff)
als $SET(MIME=audio/X-Alpha5)
au $SET(MIME=audio/basic)
es $SET(MIME=audio/echospeech)
esl $SET(MIME=audio/echospeech)
imy $SET(MIME=audio/x-imy)
it $SET(MIME=audio/x-mod)
itz $SET(MIME=audio/x-mod)
kar $SET(MIME=audio/midi)
m3u $SET(MIME=audio/x-mpegurl)
mdz $SET(MIME=audio/x-mod)
mid $SET(MIME=audio/midi)
midi $SET(MIME=audio/midi)
mio $SET(MIME=audio/x-mio)
mod $SET(MIME=audio/x-mod)
mp2 $SET(MIME=audio/mpeg)
mp3 $SET(MIME=audio/x-mpeg)
mpga $SET(MIME=audio/mpeg)
pac $SET(MIME=audio/x-pac)
pae $SET(MIME=audio/x-epac)
qcp $SET(MIME=audio/vnd.qcelp)
ra $SET(MIME=audio/x-realaudio)
ram $SET(MIME=audio/x-pn-realaudio)
rm $SET(MIME=audio/x-pn-realaudio)
rpm $SET(MIME=audio/x-pn-realaudio-plugin)
s3m $SET(MIME=audio/x-mod)
s3z $SET(MIME=audio/x-mod)
smd $SET(MIME=audio/x-smd)
smz $SET(MIME=audio/x-smd)
snd $SET(MIME=audio/basic)
tsi $SET(MIME=audio/tsplayer)
vox $SET(MIME=audio/voxware)
vqe $SET(MIME=audio/x-twinvq-plugin)
vqf $SET(MIME=audio/x-twinvq)
vql $SET(MIME=audio/x-twinvq)
wav $SET(MIME=audio/x-wav)
wax $SET(MIME=audio/x-ms-wax)
wma $SET(MIME=audio/x-ms-wma)
xm $SET(MIME=audio/x-mod)
xmz $SET(MIME=audio/x-mod)

##### model/*
iges $SET(MIME=model/iges)
igs $SET(MIME=model/iges)
mesh $SET(MIME=model/mesh)
msh $SET(MIME=model/mesh)
silo $SET(MIME=model/mesh)
vrml $SET(MIME=model/vrml)
wrl $SET(MIME=model/vrml)

##### video/*
asf $SET(MIME=video/x-ms-asf)
asx $SET(MIME=video/x-ms-asf)
avi $SET(MIME=video/x-msvideo)
mov $SET(MIME=video/quicktime)
movie $SET(MIME=video/x-sgi-movie)
mp4 $SET(MIME=video/mp4 )
mpe(g|) $SET(MIME=video/mpeg)
mpg $SET(MIME=video/mpeg)
mpg4 $SET(MIME=video/mp4 )
mxu $SET(MIME=video/vnd.mpegurl)
qt $SET(MIME=video/quicktime)
wmv $SET(MIME=video/x-ms-wmv)

##### chemical/*
csm $SET(MIME=chemical/x-csml)
csml $SET(MIME=chemical/x-csml)
emb $SET(MIME=chemical/x-embl-dl-nucleotide)
embl $SET(MIME=chemical/x-embl-dl-nucleotide)
gau $SET(MIME=chemical/x-gaussian-input)
mol $SET(MIME=chemical/x-mdl-molfile)
mop $SET(MIME=chemical/x-mopac-input)
pdb $SET(MIME=chemical/x-pdb)
xyz $SET(MIME=chemical/x-xyz)
xyz $SET(MIME=chemical/x-xyz)

##### others
dwf $SET(MIME=drawing/x-dwf)
ice $SET(MIME=x-conference/x-cooltalk)
ivr $SET(MIME=i-world/i-vrml)
map $SET(MIME=magnus-internal/imagemap)
回覆
風中的羽翼

引用:
[Patterns]
Name = "PCZONE IMG TO HD"
Active = TRUE
URL = "$TYPE(htm)(www.pczone.com.tw)"
Bounds = "<img\s*>"
Limit = 256
Match = "<img \0 src=$AV(((/images)|(\w.pczone.com.tw/images))\/\1) \2"
Replace = "<img \0 src="http://local.ptron/pczone/\1" \2"
因為常常上 PCZONE ,只是有時尖峰時間開起會花點時間...
所以只好寫針對 PCZONE 寫了這個節省下載圖檔時間的規則...
簡單的說,就是先把 PCZONE 所有的圖檔全擺在自己的硬碟上
不需要你的瀏覽器去下載,雖說圖檔很小,但累計下來也是一個量...

PS:用這個規則前,請先把 PCZONE 的小圖示檔先抓回硬碟(Proxomitron 根目錄底下的 \html\pczone )上.
不然你只會看到一堆 [X] 圖,請抓放在 www.pczone.com.tw\images\ 目錄下的圖檔,放在相對的位置
回覆
風中的羽翼

Update 17 Jul: Scott was born in January 1968. He passed at the age of 36.
http://computercops.biz/article-5228-nested-0-0.html

作者英年早逝,Proxomitron 是我見過的網頁過濾軟體中最強的說
Proxomitron 的靈活性和特殊的過濾語法,到目前為止應該沒有其他軟體可以比擬吧
回覆
風中的羽翼

這是一個專門用來過濾有 AD 註釋區段類型的廣告規則
註釋區段指的是在 HTML 原始檔案內使用 <!-- --> 來區分的廣告

引用:

[Blocklists]
List.AdComment = "..\Lists\AdComment.txt"

[Patterns]
Name = "Kill AdComment"
Active = TRUE
URL = "$TYPE(htm)"
Limit = 12000
Match = "<!-[^>]++{0,32}$LST(AdComment)"
Replace = "<!-- Kill AdComment -->"
引用:

#BEGIN
BEGIN SEXALYZER COUNTER CODE: ALTERATIONS ARE PROHIBITED * END SEXALYZER COUNTER CODE -->
Begin cgiboy Access counter * End cgiboy Access counter -->
BEGIN SEXLIST * END SEXLIST * -->
begin of Sex-in-WWW Top1000*end of Sex-in-WWW Top1000 code-->
BEGIN WEBSIDESTORY CODE * END WEBSIDESTORY CODE -->
BEGIN SEXTRACKER * END SEXTRACKER * -->
Begin Asian Swap *End Asian Swap Code--->
Begin Sex Swap *Begin Sex Swap Code--->
begin of ad block * end of ad block -->
BEGIN text generated by server. PLEASE REMOVE * END text generated by server. PLEASE REMOVE -->

#START
STATS4ALL_START*STATS4ALL_END-->
Start Head Banner*End Head Banner--->
START HOME FREE HEADER CODE * END HOME FREE HEADER CODE -->
START HOME FREE FOOTER CODE * END HOME FREE FOOTER CODE -->
START aFreeGo * END aFreeGo * -->

#OTHER
BannerAD Start * BannerAD End -->
Button4AD Start * Button4AD End -->
PopupAD Start * PopupAD End -->
SpyLOG f:0111 * SpyLOG -->
HotLog * /HotLog -->
FREEHOST HEADER STARTS HERE * FREEHOST HEADER ENDS HERE -->
FREEHOST FOOTER STARTS HERE * FREEHOST FOOTER ENDS HERE -->
CGIBOY start*CGIBOY end-->
HotAccess Oregon start*HotAccess Oregon End-->
ImageReady Preload Script * End ImageReady Slices -->
St-HP-H * En-HP-H -->
St-HP-F * En-HP-F -->
PopInAds.com Advertising Code Begin * PopInAds.com Advertising Code End -->
回覆
風中的羽翼

這兩個過濾規則是一組的,是用來過濾某些惡意竄改瀏覽器或不受歡迎的 ClassIDs
注意:因為論壇表情符號的關係 被替換為
所以在複製貼入 default.cfg 時,請記得修正...

引用:

[Blocklists]
List.ClassIDs = "..\Lists\ClassIDs.txt"

[Patterns]
Name = "Kill - Specific ClassIDs - External JS Files {5.d.ex}"
Active = TRUE
URL = "$TYPE(js)|$TYPE(vbs)|$TYPE(oth)"
Limit = 64
Match = "(clsid(\("\{||ClassID="\{)$LST(ClassIDs)"
Replace = "<!-- Kill - Specific ClassIDs - External JS Files {5.d.ex} -->"

Name = "Kill - Specific ClassIDs - HTML {5.d.ex}"
Active = TRUE
URL = "$TYPE(htm)"
Bounds = "<object*(</object>|>)|$NEST(<script,</script*>)|<xml\s*</xml>"
Limit = 12000
Match = "*(clsid(\("\{||ClassID="\{)$LST(ClassIDs)*"
Replace = "<!-- Kill - Specific ClassIDs - HTML {5.d.ex} -->"
引用:

# Proxomitron4 URL killfile: $LST(ClassIDs)
# NoAddURL
#
# For use with Specific ClassID Remover
# IDs by sidki and JarC
# sidki 2002-07-12
# updated 2002-08-23 sidki
# updated 2002-12-28 SgtPepper
# updated 2003-04-30 JD5000
#
#################################################
# Unwanted Plugins
# --------------
31B7EB4E-8B4B-11D1-A789-00A0CC6651A8 $SET(9=Cult3D plugin (application/x-cult3d-object))
A2C271DF-91C3-11D5-9FA6-860301900128 $SET(9=Rich Media)
9F4D2FA2-54A1-11D1-8267-00A0C91F9CA0 $SET(9=gotobar Class)


# Adware/Trackware
# --------------
19DFB2CB-9B27-11D4-B192-0050DAB79376 $SET(9=eZula TopText.1)
C03351A4-6755-11D4-8A73-0050DA2EE1BE $SET(9=eZula TopText.2)
84B71424-B020-11D4-B198-000102C6D473 $SET(9=Spedia Surf+)
60B25924-C865-11D2-B0C1-000000000000 $SET(9=HotBar)
75D2080B-4857-4B96-9B7D-732634FBD01F $SET(9=HotBar2)
BAE85C97-2CD4-45C3-A1ED-E4CEF7C6AA52 $SET(9=BrowserToolbar)
67925165-C4B6-11D2-B9C6-0000E84F59A6 $SET(9=Brilliant Digital (application/x-bdescript))
51958169-D5E3-11D1-AA42-0000E842E40A $SET(9=Brilliant Digital (application/x-b3dmovies))


# Dialers
# ----------------------------
C771B05E-E725-4516-97A5-4CE5EB163CFB $SET(9=Active-x Dialer.1)
15C3C7A4-9676-11D3-9799-0060087190B9 $SET(9=Active-x Dialer.2)
10A1B95D-5E35-4935-8BC3-D43E81E8105E $SET(9=Active-x Dialer.3)


# http://www.guninski.com/vv2xp.html
# --------------
0006F063-0000-0000-C000-000000000046 $SET(9=Outlook View Control)


# http://online.securityfocus.com/archive/1/278786
# --------------
00022613-0000-0000-C000-000000000046 $SET(9=dosIE-doe)


# http://online.securityfocus.com/archive/1/259018
# --------------
11111111-1111-1111-1111-111111111111 $SET(9=XMLid.Exploit)
00000000-0000-0000-0000-000000000000 $SET(9=Possible Exploit)


# http://online.securityfocus.com/bid/598/exploit/
# --------------
06290BD5-48AA-11D2-8432-006008C3FBFC $SET(9=Object TLB scriptlets)


# Trojan.JS.Clid.gen
# http://online.securityfocus.com/archive/1/200109
# --------------
F935DC22-1CF0-11D0-ADB9-00C04FD58A0B $SET(9=WSH Shell Object)
F935DC26-1CF0-11D0-ADB9-00C04FD58A0B $SET(9=WSH Network Object)
0D43FE01-F093-11CF-8940-00A0C9054228 $SET(9=FileSystem Object)


# Office Web Components (OWC)
# http://sec.greymagic.com/adv/
# --------------
0002E500-0000-0000-C000-000000000046 $SET(9=Office Chart.1)
0002E556-0000-0000-C000-000000000046 $SET(9=Office Chart.2)
0002E510-0000-0000-C000-000000000046 $SET(9=Office Spreadsheet.1)
0002E551-0000-0000-C000-000000000046 $SET(9=Office Spreadsheet.2)
0002E553-0000-0000-C000-000000000046 $SET(9=Office DataSourceControl)


# http://cert.uni-stuttgart.de/archive.../msg00207.html
# --------------
25336921-03F9-11CF-8FD0-00AA00686F13 $SET(9=HTML Object)


# Microsoft Web Browser
# http://www.guninski.com/m$oxp-2.html
# --------------
8856F961-340A-11D0-A96B-00C04FD705A2 $SET(9=Microsoft Web Browser)


# http://www.doxdesk.com/parasite/
# --------------
FFEEDDCC-BBAA-9988-7766-554433221100 $SET(9=(control))
F414C260-6AC0-11CF-B6D1-00AA00BBBB58 $SET(9=(control))
06DFEDAA-6196-11D5-BFC8-00508B4A487D $SET(9=7FaSSt)
910E7499-6311-4843-8EB0-0100A7955A1F $SET(9=Aornum)
72F81209-6C73-4DE7-A3DC-408A8BD472FB $SET(9=BargainBuddy/Versn)
868B015F-3515-44DB-B0AD-182CD058985E $SET(9=BrowserToolbar)
3E8A1971-45A5-45EE-828B-8C78431C0BD4 $SET(9=Bulla)
AB4DD0F0-38DA-4F48-AAFE-7DE7323BB6B2 $SET(9=ClickTheButton)
B83FC273-3522-4CC6-92EC-75CC86678DA4 $SET(9=CnsMin)
1B0E7716-898E-48CC-9690-4E338E8DE1D3 $SET(9=CnsMin)
4EDBBAEA-F509-49F6-94D1-ECEC4BE5B686 $SET(9=CnsMin)
8D898B17-976D-44c1-84E6-AF38842AC9EC $SET(9=CnsMin)
AD7FAFB0-16D6-40C3-AF27-585D6E6453FD $SET(9=Comload)
9346A6BB-1ED0-4174-AFB4-13CD4EC0AA40 $SET(9=CommonName)
CEB29DA4-7AFA-4F24-B3CD-17351D590DF0 $SET(9=DialerOffline)
CCE83E45-30B2-4BAE-B1F5-25D128D27A43 $SET(9=ezCyberSearch)
00000EF1-34E3-4633-87C6-1AA7A44296DA $SET(9=FavoriteMan)
000000F1-34E3-4633-87C6-1AA7A44296DA $SET(9=FavoriteMan/FOne)
D6862A22-1DD6-11D3-BB7C-444553540000 $SET(9=InetSpeak/BHO42602)
C389F2CF-26ED-11D5-A212-004005F6FEB6 $SET(9=InetSpeak/eBoom)
07C0D34D-11D7-43F7-832B-C6BB41726F5F $SET(9=lop/AYB)
014DA6C1-189F-421a-88CD-07CFE51CFF10 $SET(9=MySearch)
DD770A75-CE18-11D5-98D8-00E018981B9E $SET(9=NewDotNet/A)
A0BD4FF5-D828-11D3-9EB5-00600837E6EE $SET(9=NowBox)
0CEF79D8-D373-11D3-A7D3-00062962BF17 $SET(9=Onflow)
FEE7FD53-3356-4D4D-8978-2C4AE3A7E109 $SET(9=SaveNow/Download)
FC327B3F-377B-4CB7-8B61-27CD69816BC3 $SET(9=SaveNow/Db)
6C413541-29A1-4FFE-894C-9D68313C9F73 $SET(9=SearchitBar)
0835121F-6472-43BD-8A40-D9221FF1C4CE $SET(9=SideStep)
E3F7205F-2AE0-4BF0-816B-2D24A5F20EC7 $SET(9=StripPlayer)
C776136E-FDB9-4F4B-837D-90593FB5A3FA $SET(9=SuperBar)
3D7247E8-5DB8-11D4-8A72-0050DA2EE1BE $SET(9=TopText)
53CBEE82-D747-11D3-9ED0-005004189684 $SET(9=UCmore)
B5E60A66-0C51-4894-8DF8-CBDF4E478D58 $SET(9=Wazam)


# From SpyBot CLSIDs list
# --------------
00000000-5eb9-11d5-9d45-009027c14662 $SET(9=VX2 Respondmiter, Blackstone Transponder)
00000000-d9e3-4bc6-a0bd-3d0ca4be5271 $SET(9=Porn popups)
0000001D-BA9B-11D2-BDF1-0090272A6D78 $SET(9=Surfmonkey)
0000026A-8230-4DD4-BE4F-6889D1E74167 $SET(9=Transponder)
001DAE60-95C0-11d3-924E-009027950886 $SET(9=YBIOCtrlClass - Yahoo!)
0A68C5A2-64AE-4415-88A2-6542304A4745 $SET(9=Huntbar)
D6E66235-7AA6-44ED-A06C-6F2033B1D993 $SET(9=Huntbar)
0FC817C2-3B45-11D4-8340-0050DA825906 $SET(9=Deltaclick)
139D88E5-C372-469D-B4C5-1FE00852AB9B $SET(9=FavoriteMan)
1678F7E1-C422-11D0-AD7D-00400515CAAA $SET(9=Comet Cursor)
1E1B2879-88FF-11D2-8D96-D7ACAC95951F $SET(9=Commonname toolbar)
1E6F1D6A-1F20-11D4-8859-00A0CCE26836 $SET(9=SVA PLayer)
206E52E0-D52E-11D4-AD54-0000E86C26F6 $SET(9=Fresh Devices)
243B17DE-77C7-46BF-B94B-0B5F309A0E64 $SET(9=Microsoft Money)
2662BDD7-05D6-408F-B241-FF98FACE6054 $SET(9=Xupiter toolbar)
2E12B523-3D4C-4FAC-9B04-0376A8F5E879 $SET(9=InetSpeak)
2F4F8CC3-FF89-11D1-9F63-0020182D7E20 $SET(9=eSafe Protect)
3750BFA3-1392-4AF3-AF86-9D2D4776E5A4 $SET(9=Burnaby Module > e-card_viewer > porn popups)
40ac4d2d-491d-11d4-aaf2-0008c75dcd2b $SET(9=WurldMedia related)
4A2AACF3-ADF6-11D5-98A9-00E018981B9E $SET(9=NewDotNet)
58359010-BF36-11D3-99A2-0050DA2EE1BE $SET(9=Ezula)
5843A29E-1246-11D4-BA8C-0050DA707ACD $SET(9=Gratisware - CrsHOClass)
5998B08E-CFAC-11D5-822A-0050048E6E38 $SET(9=JimmySurf)
6085FB5B-C281-4B9C-8E5D-D2792EA30D2F $SET(9=Win32/Aspam.Trojan)
665ACD90-4541-4836-9FE4-062386BB8F05 $SET(9=FlashTrack, Ftapp)
6ACD11BD-4CA0-4283-A8D8-872B9BA289B6 $SET(9=eAcceleration StopSign)
7011471D-3F74-498E-88E1-C0491200312D $SET(9=FriendGreetings E-Card foistware)
72EFCEB7-436E-11D3-93ED-0008C7396667 $SET(9=DigitalMe toolbar)
730F2451-A3FE-4A72-938C-FC8A74F15978 $SET(9=IGN Keywords)
760A9DDE-1433-4A7C-8189-D6735BB5D3DD $SET(9=EZSearch bar)
7DAAC7DE-9EF0-4FF0-BFA5-AFF3E899054C $SET(9=Tweak Master)
82B98006-7A56-11D2-A26F-00C04F962769 $SET(9=Flyswat)
85A702BA-EA8F-4B83-AA07-07A5186ACD7E $SET(9=MediaLoads Enhanced.)
A28C2A31-3AB0-4118-922F-F6B3184F5495 $SET(9=BonziBuddy)
A586BE00-52AC-11D3-A075-E51A86A6C62B $SET(9=ParentPresent - PP Browser)
A6250FB8-2206-499E-A7AA-E1EC437E71C0 $SET(9=Huntbar)
A6475E6B-3C2E-4B1F-82FD-8F1C0B1D8AD0 $SET(9=Commonname toolbar)
B195B3B3-8A05-11D3-97A4-0004ACA6948E $SET(9=Hotbar)
C1D458F1-B97C-11D5-B3DF-00B0D0A5B433 $SET(9=WaveExpress/TvTonic: TV/Web browser software)
C4D99500-4C77-11D4-93B7-0040950570BA $SET(9=eBoom Search Bar)
C7ade150-743d-11d4-8141-00e029626f6a $SET(9=associated with NetPal, Transponder, and FavoriteMan)
C82B55F0-60E0-478C-BC55-E4E22F11301D $SET(9=Unknown, possible porn popups.)
C900B400-CDFE-11D3-976A-00E02913A9E0 $SET(9=WebHancer)
CBB0A6A0-8430-11D4-814D-0050047090B1 $SET(9=Surfs... )
CE31A1F7-3D90-4874-8FBE-A5D97F8BC8F1 $SET(9=Bargain Buddy)
D14641FA-445B-448E-9994-209f7AF15641 $SET(9=WurldMedia)
D44B5436-B3E4-4595-B0E9-106690E70A58 $SET(9=Lop.com)
D5C778F1-CF13-4E70-ADF0-45A953E7CB8B $SET(9=Network Essentials)
DD41D66E-CE4F-11D2-8DA9-00A0249EABF4 $SET(9=FormWhiz)
E0B9B5FE-B66E-4FB0-A1D9-726F0E743CFD $SET(9=Divago Surfairy)
E6B64F67-B100-4636-8D51-D113E1F5FF93 $SET(9=ContentSaver Offline Browser)
EAE191BA-FB87-40CA-80D2-D639A2595150 $SET(9=IE Middle Clicker )
EBBFE27C-BDF0-11D2-BBE5-00609419F467 $SET(9=Aureate/Radiate)
ED8DB0FD-D8F4-4b2c-BB5B-9EF040FE104D $SET(9=UCmore toolbar )
FDD3B846-8D59-4ffb-8758-209B6AD74ACC $SET(9=Microsoft Money )
FFFFFEF0-5B30-21D4-945D-000000000000 $SET(9=Stardownload)
20A03A4C-9FAF-45D5-A5C2-B6C49774E03C $SET(9=Hijacker FreeScratchAndWin)
BD11A280-2E73-11CF-B6CF-00AA00A74DAE $SET(9=SMS Dialer)
093CAF40-3BA6-4071-A050-E830CBDC6480 $SET(9=TrustToolbar)
EB6AFDAB-E16D-430B-A5EE-0408A12289DC $SET(9=DownloadWare)
A27CFCAE-9351-4D74-BFFC-21EB19693D8C $SET(9=Xupiter (Browserwise variant))
11BF0E2B-4229-4ADC-9C11-1C6968731018 $SET(9=Dialer VLoading)
AB1E62EB-3DE3-428F-A417-64AB3C9B6CF0 $SET(9=Dialer eConnect)
E8EDB60C-951E-4130-93DC-FAF1AD25F8E7 $SET(9=Dialer MoneyTree)
FC87A650-207D-4392-A6A1-82ADBC56FA64 $SET(9=Dialer MoneyTree)
1D2DCA0D-B30F-40AD-9690-087105F214EC $SET(9=Dialer NoCreditCard)
765E6B09-6832-4738-BDBE-25F226BA2AB0 $SET(9=QcBar)
D6FC35D1-04AB-4D40-94CF-2E5AE4D0F8D2 $SET(9=QcBar)
DA9A0B1E-9B7B-11D3-B8A4-00C04F79641C $SET(9=Dialer All-In-One Telcom)
00000012-890E-4AAC-AFD9-000000000000 $SET(9=Dialer C2.lop / Central24 / MoneyTree)
0D4312E2-5E4D-4A27-A9D8-043E43904277 $SET(9=C2.lop)
018B7EC3-EECA-11D3-8E71-0000E82C6C0D $SET(9=Dialer C2.lop / Central24)
8699D723-6DC6-47D3-B55C-489BA006B917 $SET(9=Dialer WebInstall)
F0AA2376-F073-4E57-86E8-0238F99087C7 $SET(9=Hijacker Rapidblaster)
669695BC-A811-4A9D-8CDF-BA8C795F261E $SET(9=Hijacker 7Search)
B8875BFE-B021-11D4-BFA8-00508B8E9BD3 $SET(9=Hijacker 7Search)
9DBAFCCF-592F-FFFF-FFFF-00608CEC297B $SET(9=Bargain Buddy)
F17EDBC0-3EB2-11D3-AB74-00A0C9A522F2 $SET(9=GoHip)
69FD62B1-0216-4C31-8D55-840ED86B7C8F $SET(9=HotBar)
B2C03E2E-2219-4FF9-810A-540ACA63F8D9 $SET(9=MarketScore)
B8AB2281-447F-482B-86E9-1F0ED5973637 $SET(9=ezCyberSearch)
A4A435CF-3583-11D4-91BD-0048546A1450 $SET(9=ACXInstall)
F20AE630-6DE2-43CA-A988-7CD40C36EF0B $SET(9=CashToolbar)
15589FA1-C456-11CE-BF01-00AA0055595A $SET(9=NetSource101)
D0B0C04A-DC73-4A91-9307-41F3E36579BF $SET(9=PopUp Network)
05CE4481-8015-11D3-9811-C4DA9F000000 $SET(9=TopMoxie)
11111111-1111-1111-1111-111111111111 $SET(9=VX2/a NetPal)
DD521A1D-1F98-11D4-9676-00E018981B9E $SET(9=NewNet)
3717DF55-0396-463D-98B7-647C7DC6898A $SET(9=Search-Explorer)
D14D6793-9B65-11D3-80B6-00500487BDBA $SET(9=Comet Cursor)
6656B666-992F-4D74-8588-8CA69E97D90C $SET(9=CommonName)
8A05273A-2EA5-42DE-AA75-59EA7D9D50D7 $SET(9=Huntbar)
70522FA2-4656-11D5-B0E9-0050DAC24E8F $SET(9=Aornum)
9C813B33-52A2-466D-8C51-EB4189C1FF98 $SET(9=Aornum)
0837121A-6472-43BD-8A40-D9221FF1C4CE $SET(9=SideStep)
BD11A280-2E73-11CF-B6CF-00AA00A74DAF $SET(9=Bonzi Buddy)
8522F9B3-38C5-4AA4-AE40-7401F1BBC851 $SET(9=Dialer StiffyCash/XXXDial/SexPass)
A45F39DC-3608-4237-8F0E-139F1BC49464 $SET(9=Dialer)
7DD896A9-7AEB-430F-955B-CD125604FDCB $SET(9=DailyWinner)
74D05D43-3236-11D4-BDCD-00C04F9A3B61 $SET(9=Trend Micro Antivirus online scanner)
CA0B9B6D-C2AF-11D3-B376-0800460222F0 $SET(9=iWon toolbar)
E7D2588A-7FB5-47DC-8830-832605661009 $SET(9=Live Collaboration)
1DA3C4AB-E6B6-47A6-B0F3-1BD81524B51B $SET(9=ActiveWorldsDownload Control)
11260943-421B-11D0-8EAC-0000C07D88CF $SET(9=iPIX ActiveX Control)
BF985246-09BF-11D2-BE62-006097DF57F6 $SET(9=SimCityX Control)
E344ADA2-75B6-4E7E-B221-0A04FD5B0165 $SET(9=MaxisPublishX Control)
C81B5180-AFD1-41A3-97E1-99E8D254DB98 $SET(9=CSS Web Installer Class)
EFCF25F1-C8F9-4C53-A03D-68D5C19225D0 $SET(9=Dialer Wonderland)
57E69D5A-6539-4D7D-9637-775DE8A385B4 $SET(9=Xupiter)
499DB658-1909-420B-931A-4A8CAEFD232F $SET(9=ASpam.Trojan/Drvman Variant)
A47693D1-7E2A-4DE3-9907-310C5D310B5F $SET(9=PerMedia / FriendGreetings)
00000012-890E-4AAC-AFD9-EFF6954A34DD $SET(9=AdBreak)
8CDC6A46-08AB-435B-A3FA-7CC00E74EC9F $SET(9=PerMedia / FriendGreetings)
36372A5F-1436-4A70-B808-59F6DFD36658 $SET(9=PerMedia / FriendGreetings)
5C015AA7-3392-4044-90CC-8E95019CFFF1 $SET(9=QcBar)
268CBA84-25AE-4D38-89FE-E7606A6460E3 $SET(9=Comet Cursor (Shop))
23DDAE8C-6A79-4D62-80AA-E95D89CB9811 $SET(9=SearchExplorer)
69550BE2-9A78-11D2-BA91-00600827878D $SET(9=Tinybar)
69555BE2-9A78-11D2-BA91-00600827878D $SET(9=Tinybar)
99B0B113-6F25-49C9-8ECF-2FDDD3EDFF6A $SET(9=FreeScratchAndwin)
EC788B03-A743-4274-AC9E-DB4F2A03F515 $SET(9=SearchAndBrowse)
5DD7B3BE-FDEC-4563-B038-FF80F2345B89 $SET(9=FreeScratchAndWin)
8869786C-8E72-45DC-911D-AB3416AC1DF1 $SET(9=DownloadReceiver)
F9765480-72D1-11D4-A75A-004F49045A87 $SET(9=eXactSearch)
59450DB0-341D-4436-B380-B8377D8B6796 $SET(9=Huntbar)
02C20140-76F8-4763-83D5-B660107B7A90 $SET(9=OnlineDialer (MaConnect))
E44151C8-0C6C-4A7D-B677-4FCC9552E957 $SET(9=OnlineDialer (BelCall))
91DF007C-2F7F-4731-BE1F-38C1C13CEB8B $SET(9=OnlineDialer (SunInfo))
A76066C9-941B-4209-9D96-0AC80501100D $SET(9=INetSpeak/Iexplorr)
53E10C2C-43B2-4657-BA29-AAE179E7D35C $SET(9=HighTraffic)
A7798D6C-C6B5-4F26-9363-F7CDBBFFA607 $SET(9=Gigex SpeedDelivery)
1000026A-8230-4DD4-BE4F-6889D1E74167 $SET(9=Transponder)
50A28604-52F2-11D6-8F0F-5254AB11D5C2 $SET(9=Dialer)
FFFF0001-0002-101A-A3C9-08002B2F49FB $SET(9=Dialer)
8E4C16F3-45C8-4B24-99E6-F55082B7C4F1 $SET(9=Unstable IE toolbar from i-lookup.com)
61D029AC-972B-49FE-A155-962DFA0A37BB $SET(9=Unstable IE toolbar from i-lookup.com)
9EB320CE-BE1D-4304-A081-4B4665414BEF $SET(9=www mt-download com MediaTicketsInstaller)
回覆
風中的羽翼

這個過濾規則是用來讓你的滑鼠右鍵正常工作的
他會自動加入一段解開鎖滑鼠右鍵的語法
就因為這段語法,他就會讓原本鎖滑鼠右鍵語法失效

引用:

[Patterns]
Name = "Allow - Right Mouse Clicks {2.d.se}"
Active = TRUE
URL = "$TYPE(htm)"
Limit = 16
Match = "<end>"
Replace = "\r\n<!-- Allow - Right Mouse Clicks {2.d.se} -->"
"\r\n<script language="javascript">"
"function clearEventPROXO(a)"
"{"
" if (!a)"
" return;"
" a.onmousedown = null;"
" a.onselect = null;"
" a.oncontextmenu = null;"
" a.onselectstart = null;"
" a.ondragstart = null;"
"}"
" clearEventPROXO(document);"
" clearEventPROXO(document.body);"
" clearEventPROXO(window);"
" for (i = 0; i < window.parent.frames.length; i++)"
" clearEventPROXO(window.parent.frames[i]);"
"</script>\r\n"
"$STOP()"
回覆
風中的羽翼

引用:
http://www.geocities.com/acejackwu/index.htm
這個網站掛了,沒辦法,趁空閒時自己翻了一部分
也許有辭不達意或錯誤的情形,有疑問者請參考 help\Matching Rules.html



*:此星號表示可以過濾任何字元字串。例如:"foo*bar" 可以是 "foobar"、"fooma babar"、甚至也可以是 "foo goat bat bison bar"。基本上這個星號,可以是任何字串。

?:此問號表示可以過濾任何單一字元,無論這個字元是什麼。例如:"?oat" 可以是 "boat"、"goat" 或是 "<oat"

[abc...]:此中括號代表可以過濾任何單一字元。"[" 和 "]" 之中也可以使用 "-" 符號來表示區間:"[A-Z]" 將會過濾 "A" 到 "Z" 之間的任何字元。"[0-9]" 可以過濾任何單一數字。假如第一個字元是 "^" 符號,那麼代表的則是 不包含 在其內的字元:"[^0-9abc]" 不是任何數字、也不是 "a"、"b" 和 "c"。

[#n:n]:數字區間的過濾。這個可以用來檢查 HTML 標籤的數值。例如:檢查一個介於 100 到 150 的數字,可以使得 "[#100:150]"。假如第二個數字是星號 "*" 那麼將代表無限大,"[#40:*]" 將會是代表著大於等於 40 的數字。而小於等於 40 可以寫成 "[#0:40]"。

" "空格的過濾。它可以過濾任何數量的空格和和定位鍵(tab)。使用此空格來過濾時,兩項之間可以有空格或是沒有空格。例如:
"<tag value>" 可以過濾成 "<tag value>" 或是 "<tag&nbsp;&nbsp;&nbsp;value>" 甚至是 "<tagvalue>"。

\s:反斜線s:有點類似上一個介紹的空格,也可以過濾數個空格和定位鍵(tab),但是卻必須至少要有一個讓它過濾。例如:"<tag\s>" 可以是 "<tag >" 或 "<tag&nbsp;&nbsp;&nbsp;>" 但卻不可以是 "<tag>"。

\w:反斜線w:單字的過濾。它可以過濾沒有空格的任何字元。基本上它和 "\s" 是相對的,但是在某些時候,它也可以和 "*" 有些類似。不同的地方,就是在碰到空格或 ">" (HTML 的結束標籤)時,它將會停止動作。它方便利用於標籤和網址的時候。

\t:明確地過濾一個定位(tab)字元。

\r:明確地過濾一個回車(carriage return)字元。

\n:明確地過濾一個換行(newline)字元。

\0-9:反斜線加數字 0-9:儲存變數。這是 Proxomitrons 的一個關鍵過濾規則。它過濾的方式就像 "*" 字元一樣,但是它會把過濾的內容儲存到變數內。這些儲存了原始 HTML 部分資料的變數,可以拿來再使用或是變更標籤的某一部份。例如:變更背景 <body ... > 標籤,你可以使用...

Matching(過濾):<body \1 background="*" \2 >

Replace(取代):<body \1 background="mybackground.gif" \2 >

如此,介於 body 和 background 之間的不管是什麼部分,將會原封不動地被放入變數 \1 內,而 \2 的部份亦同,另外 background 的參數部份,因為有 * 過濾符號,所以不管其內是什麼,將會被 mybackground.gif 取代。

更複雜的過濾方式,也可直接放入 \0-9 變數內,例如兩者之間沒有空格的過濾格式 "(foo*bar)\1" 括號內的東西將會全部被放入變數內。

\#:反斜線# 的動作很類似 \0 到 \9,除此之外,它每一次都會將資料置入取代堆疊。例如:\# 第一次過濾 "foo" 然後再過濾 "bar",這時取代堆疊就有兩個資料。接下來你可以用 "\@" 把取代堆疊內一次捉取出來成 "foobar"。

|:使用垂直線(vertical bar)代表 "OR" 功能。例如:"foo|bar" 可以是 "foo" 或 "bar" 兩者之一。

&:使用 And 符號(Ampersand)代表 "AND" 功能。例如:"*foo&*bar" 可以是 "foo bar" 或 "bar foo" 但卻不能是 "foo foo"。注意星號 "*" 的使用,像下面的方式 "height" 常常伴隨著 "width" 就需要用到 AND 功能。

<img src="picture" height=60 width=200>

也可能是這樣...

<img width=200 height=60 src="picture">

所以要過濾就要...

<img (*src="picture" & *height=60 & *width=200)*>

&&:兩個 & (AND-AND)的功能有點類似單一個 "&" 但又有一點差異 - 第二個 & 的部分會精確地限制過濾第一個部分...

(<img * > && \1 ) ...這個 "\1" 的動作方式就像是 "*" 一樣,其中並且過濾了 "<img ...>" 標籤。\1 將取得 "<img ...>" 之外的資料。

( ... ):使用小括號可以建立子表示式。例如:"foo(bar|bear|goat)" 可以是 "foobar"、"foobear" 甚至是 "foogoat"。巢狀式也可以使用,如:"foo(bar|(black|brown|puce) bear|goat)" 可以是 "foobar"、"fooblackbear"、"foobrownbear" ....等等。也可以和 "[...]" 搭配使用,假如在 "(" 之後的第一個字元是 "^",那表示將是不包括的意思。例如:"(^foo|bar)" 可是任何東西,但卻不能是 "foo" 或 "bar"。

+:加號表示連續重複的字元。例如:"a+" 可能是 "a"、"aa" 或 "aaaa"。複雜一點的如:

[abc]+ 可以是 "a"、"b"、"c" 或 "ababccba"

([a-z]&[^n])+ 可以是 "a" 到 "z" 但不能是 "n"

(foo)+ 可以是 "foo"、"foofoo"、"foofoofoo"

++:兩個加號的動作有點像單一個加號,但是它會注意到之後的東西(它可以看見並且指出來)。它會循環到它發現到相配的過濾規則。

{n,n}: "+" 或 "++" 都可以搭配使用大括號。這可以控制最小和最大的重複過濾次數。例如:"[a]+{4,10}" 可以過濾 4 到 10 個的 "A's" 而 "[C]+{20}" 可以精確過濾 20 個 "C's"。星號 "*" 表示 "無限" 的意思,例如:"[D]+{10,*}" 可以過濾 10 到更多的 "D's"。

\:反斜線可以使用在某些跳脫字元上,例如:過濾左括號 "\(",或過濾反斜線 "\\"

=:等號不只是過濾等號而已,包括等號前後的空格都可以過濾。例如:foo="bar" 可以是 foo= "bar"foo = "bar"

":它可以過濾雙引號或是單引號,例如: " * " 可以是...

"oh happy mongoose" ...或... 'oh happy mengeese'

':單引號會企圖過濾出對稱的結尾引號,可以是單引號或是雙引號。

單包含著雙:href=" javascript:window.open( ' bison.html ' ); " 或...

雙包含著單:href=' javascript:window.open( " bison.html " ); '

可以這樣過濾 href=( " * ' ) - 簡單的使用雙引號去過濾最初的引號,並且以單引號作結尾。這裡有些限制:在開始 & 結束之時,都必須在同一個子表示式區間內 - 意指必須要在相同的巢狀區間內。例如....

" some text ' 可以動作...

( " some text ' ) 可以動作...

" ( some text | other text) ' 可以動作...

" ( some text ' ) 不能動作...
回覆
風中的羽翼

同樣,有疑問者請參考 help\Matching Rules.html 的最底部的部分


\u:目前網頁的網址。
\k:刪除目前的連線:在使用 HTTP headers 時相當有用,可以斷開被過濾網頁的讀取和一些特殊的網址。
\h:主機名稱的網址。
\p:路徑部分的網址。
\q:包含問號字串的網址。(跟隨在 "?" 之後的東西)
\a:包含錨點字串的網址。(跟隨在 "#" 之後的東西)
\d:目錄位置的 "file://" 網址格式。
\x:包含網址的前綴命令,假如你有設定的話。




回覆
主題工具


類似的主題
主題 主題作者 討論版 回覆 最後發表
【轉貼】SoftEther(虛擬網卡) Ver 1.0 even -- 網 路 技 術 版 136 2008-01-20 05:18 PM
【求助】『FrontPage 伺服器擴充程』如何更新成 Ver 5.0 ~GG~ -- OFFICE 相 關 軟 體 討 論 版 0 2005-03-28 12:57 PM
【軟體】PSPad Ver 4.3.0 lamina -- 其 他 軟 體 討 論 版 9 2004-07-20 04:57 PM
【軟體】SoftEther Ver 1.0 琥珀 -- 其 他 軟 體 討 論 版 3 2004-03-30 01:07 PM
【軟體】Wink ver 1.0 lamina -- 其 他 軟 體 討 論 版 3 2004-02-14 10:33 AM






 XML   RSS 2.0   RSS 
本站使用 vBulletin 合法版權程式
站務信箱 : [email protected]

本論壇所有文章僅代表留言者個人意見,並不代表本站之立場,討論區以「即時留言」方式運作,故無法完全監察所有即時留言,若您發現文章可能有異議,請 email :[email protected] 處理。