lamina
2002-12-15, 12:04 PM
看不懂英文你可以到下面的中文網站看,只是這個網站好久沒更新了
http://www.geocities.com/acejackwu/index.htm
雖然是舊網站,但基本過濾語法和使用說明都是通用的
只是可能缺少新的過濾語法而已....
http://www.geocities.com/acejackwu/index.htm
雖然是舊網站,但基本過濾語法和使用說明都是通用的
只是可能缺少新的過濾語法而已....
lamina 2002-12-15, 12:04 PM 看不懂英文你可以到下面的中文網站看,只是這個網站好久沒更新了 http://www.geocities.com/acejackwu/index.htm 雖然是舊網站,但基本過濾語法和使用說明都是通用的 只是可能缺少新的過濾語法而已.... lamina 2003-05-27, 02:49 AM 下面是我曾經碰到的 E-mail 炸彈 以下是我寫的攔下規則 [Patterns] Name = "Kill Img Mailto" Active = TRUE Bounds = "<img\s*>" Limit = 128 Match = "\0 src=$AV(mailto:\w) \1" Replace = "<font color="#FF0000" size="1">Kill Img Mailto</font>" lamina 2004-06-08, 09:47 PM 這是一個 Content-Type: Fix MIME types based on URL (In) 的修正規則 簡單的說,這個規則是用來修正 MIME Content Types 錯誤的 因為有些架 Server 的人,可能很迷糊,或是基於某些原因,而造成使用者的困擾 所以此規則會自動以 FixMIME.txt 來參照修正 [Blocklists] List.FixMIME = "..\Lists\FixMIME.txt" [HTTP headers] In = TRUE Out = FALSE Key = "Content-Type: Fix MIME types based on URL (In)" URL = "$RESP(200)([^/?]+/)+[^?#]++.$LST(FixMIME)(^?)" Match = "(^$TST(MIME)) \1" Replace = "$GET(MIME)$LOG(wRESP $DTM(c): Content-Type: Fix MIME types based on URI: media-type= \1)" # NoAddURL # # Proxomitron4.5 URL killfile: $LST(MIME-List) # # This blocklist is for use with the "Content-Type: Fix MIME types based on URL" header filter, which matches URL extensions to their proper MIME types. # ########################################################### ##### text/* asc $SET(MIME=text/plain) css $SET(MIME=text/css) etx $SET(MIME=text/x-setext) hdm(l|) $SET(MIME=text/x-hdml) htm(l|) $SET(MIME=text/html) jad $SET(MIME=text/vnd.sun.j2me.app-descriptor) js $SET(MIME=text/javascript) mrl $SET(MIME=text/x-mrml) r3t $SET(MIME=text/vnd.rn-realtext3d) rt $SET(MIME=text/vnd.rn-realtext) rtf $SET(MIME=text/rtf) rtx $SET(MIME=text/richtext) sgm(l|) $SET(MIME=text/sgml) shtm(l|) $SET(MIME=text/html) spc $SET(MIME=text/x-speech) talk $SET(MIME=text/x-speech) tsv $SET(MIME=text/tab-separated-values) txt $SET(MIME=text/plain) wml $SET(MIME=text/vnd.wap.wml) wmls $SET(MIME=text/vnd.wap.wmlscript) xml $SET(MIME=text/xml) xsl $SET(MIME=text/xml) xul $SET(MIME=text/xul) ##### image/* bmp $SET(MIME=image/bmp) cal $SET(MIME=image/x-cals) cod $SET(MIME=image/cis-cod) dcx $SET(MIME=image/x-dcx) djv $SET(MIME=image/vnd.djvu) djvu $SET(MIME=image/vnd.djvu) dwg $SET(MIME=image/vnd) dxf $SET(MIME=image/x-dxf) eri $SET(MIME=image/x-eri) fh4 $SET(MIME=image/x-freehand) fh5 $SET(MIME=image/x-freehand) fhc $SET(MIME=image/x-freehand) fif $SET(MIME=image/fif) fpx $SET(MIME=image/x-fpx) gif $SET(MIME=image/gif) ico $SET(MIME=image/x-icon) ief $SET(MIME=image/ief) ifm $SET(MIME=image/gif) ifs $SET(MIME=image/ifs) j2k $SET(MIME=image/j2k) jpe $SET(MIME=image/jpeg) jpeg $SET(MIME=image/jpeg) jpg $SET(MIME=image/jpeg) jpz $SET(MIME=image/jpeg) mil $SET(MIME=image/x-cals) pbm $SET(MIME=image/x-portable-bitmap) pcx $SET(MIME=image/x-pcx) pda $SET(MIME=image/x-pda) pgm $SET(MIME=image/x-portable-graymap) pict $SET(MIME=image/x-pict) png $SET(MIME=image/png) pnm $SET(MIME=image/x-portable-anymap) ppm $SET(MIME=image/x-portable-pixmap) qti(f|) $SET(MIME=image/x-quicktime) ras $SET(MIME=image/x-cmu-raster) rf $SET(MIME=image/vnd.rn-realflash) rgb $SET(MIME=image/x-rgb) rp $SET(MIME=image/vnd.rn-realpix) svf $SET(MIME=image/vnd) svg $SET(MIME=image/svg-xml) svh $SET(MIME=image/svh) tif $SET(MIME=image/tiff) tiff $SET(MIME=image/tiff) wbmp $SET(MIME=image/vnd.wap.wbmp) wi $SET(MIME=image/wavelet) wpng $SET(MIME=image/x-up-wpng) xbm $SET(MIME=image/x-xbitmap) xpm $SET(MIME=image/x-xpixmap) xwd $SET(MIME=image/x-xwindowdump) ##### application/* 123 $SET(MIME=application/vnd.lotus-1-2-3) aab $SET(MIME=application/x-authoware-bin) aam $SET(MIME=application/x-authoware-map) aas $SET(MIME=application/x-authoware-seg) ai $SET(MIME=application/postscript) amc $SET(MIME=application/x-mpeg) asd $SET(MIME=application/astound) asn $SET(MIME=application/astound) avb $SET(MIME=application/octet-stream) bcpio $SET(MIME=application/x-bcpio) bin $SET(MIME=application/octet-stream) bld $SET(MIME=application/bld) bld2 $SET(MIME=application/bld2) bpk $SET(MIME=application/octet-stream) bz2 $SET(MIME=application/x-bzip2) ccn $SET(MIME=application/x-cnc) cco $SET(MIME=application/x-cocoa) cdf $SET(MIME=application/x-netcdf) class $SET(MIME=application/octet-stream) clp $SET(MIME=application/x-msclip) cmx $SET(MIME=application/x-cmx) co $SET(MIME=application/x-cult3d-object) cpio $SET(MIME=application/x-cpio) cpt $SET(MIME=application/mac-compactpro) crd $SET(MIME=application/x-mscardfile) csh $SET(MIME=application/x-csh) dcr $SET(MIME=application/x-director) dir $SET(MIME=application/x-director) dll $SET(MIME=application/octet-stream) dmg $SET(MIME=application/octet-stream) dms $SET(MIME=application/octet-stream) doc $SET(MIME=application/msword) dot $SET(MIME=application/x-dot) dvi $SET(MIME=application/x-dvi) dxr $SET(MIME=application/x-director) ebk $SET(MIME=application/x-expandedbook) eps $SET(MIME=application/postscript) etc $SET(MIME=application/x-earthtime) evy $SET(MIME=application/x-envoy) exe $SET(MIME=application/octet-stream) #ez $SET(MIME=application/andrew-inset) fm $SET(MIME=application/x-maker) gca $SET(MIME=application/x-gca-compressed) gps $SET(MIME=application/x-gps) gtar $SET(MIME=application/x-gtar) gz $SET(MIME=application/x-gzip) hdf $SET(MIME=application/x-hdf) hlp $SET(MIME=application/winhlp) hqx $SET(MIME=application/mac-binhex40) ins $SET(MIME=application/x-NET-Install) ipx $SET(MIME=application/x-ipix) jam $SET(MIME=application/x-jam) jar $SET(MIME=application/java-archive) jnlp $SET(MIME=application/x-java-jnlp-file) jwc $SET(MIME=application/jwc) kjx $SET(MIME=application/x-kjx) latex $SET(MIME=application/x-latex) lcc $SET(MIME=application/fastman) lcl $SET(MIME=application/x-digitalloca) lcr $SET(MIME=application/x-digitalloca) lgh $SET(MIME=application/lgh) lha $SET(MIME=application/octet-stream) lzh $SET(MIME=application/lzh) m13 $SET(MIME=application/x-msmediaview) m14 $SET(MIME=application/x-msmediaview) man $SET(MIME=application/x-troff-man) mbd $SET(MIME=application/mbedlet) mct $SET(MIME=application/x-mascot) mdb $SET(MIME=application/x-msaccess) me $SET(MIME=application/x-troff-me) mi $SET(MIME=application/x-mif) mif $SET(MIME=application/x-mif) mmf $SET(MIME=application/x-smaf) mny $SET(MIME=application/x-msmoney) moc(ha|) $SET(MIME=application/x-mocha) mof $SET(MIME=application/x-yumekara) mpp $SET(MIME=application/vnd.ms-project) mps $SET(MIME=application/x-mapserver) mrm $SET(MIME=application/x-mrm) ms $SET(MIME=application/x-troff-ms) mts $SET(MIME=application/metastream) mtx $SET(MIME=application/metastream) mtz $SET(MIME=application/metastream) mzv $SET(MIME=application/metastream) nar $SET(MIME=application/zip) nc $SET(MIME=application/x-netcdf) nif $SET(MIME=application/x-nif) nmz $SET(MIME=application/x-scream) npx $SET(MIME=application/x-netfpx) nva $SET(MIME=application/x-neva1) oda $SET(MIME=application/oda) oom $SET(MIME=application/x-AtlasMate-Plugin) pan $SET(MIME=application/x-pan) pdf $SET(MIME=application/pdf) pfr $SET(MIME=application/font-tdpfr) pgn $SET(MIME=application/x-chess-pgn) pm $SET(MIME=application/x-perl) pmd $SET(MIME=application/x-pmd) pot $SET(MIME=application/vnd.ms-powerpoint) pps $SET(MIME=application/vnd.ms-powerpoint) ppt $SET(MIME=application/vnd.ms-powerpoint) pqf $SET(MIME=application/x-cprplayer) pqi $SET(MIME=application/cprplayer) prc $SET(MIME=application/x-prc) proxy $SET(MIME=application/x-ns-proxy-autoconfig) ps $SET(MIME=application/postscript) ptlk $SET(MIME=application/listenup) pub $SET(MIME=application/x-mspublisher) rar $SET(MIME=application/x-rar-compressed) rdf $SET(MIME=application/rdf+xml) rlf $SET(MIME=application/x-richlink) rnx $SET(MIME=application/vnd.rn-realplayer) roff $SET(MIME=application/x-troff) rtg $SET(MIME=application/metastream) rwc $SET(MIME=application/x-rogerwilco) sca $SET(MIME=application/x-supercard) scd $SET(MIME=application/x-msschedule) sdf $SET(MIME=application/e-score) sea $SET(MIME=application/x-stuffit) sh $SET(MIME=application/x-sh) shar $SET(MIME=application/x-shar) shw $SET(MIME=application/presentations) sit $SET(MIME=application/x-stuffit) skd $SET(MIME=application/x-Koan) skm $SET(MIME=application/x-koan) skp $SET(MIME=application/x-Koan) skt $SET(MIME=application/x-koan) slc $SET(MIME=application/x-salsa) smi(l|) $SET(MIME=application/smil) smp $SET(MIME=application/studiom) so $SET(MIME=application/octet-stream) spl $SET(MIME=application/x-futuresplash) spr $SET(MIME=application/x-sprite) sprite $SET(MIME=application/x-sprite) spt $SET(MIME=application/x-spt) src $SET(MIME=application/x-wais-source) sv4cpio $SET(MIME=application/x-sv4cpio) sv4crc $SET(MIME=application/x-sv4crc) swf $SET(MIME=application/x-shockwave-flash) t(r|) $SET(MIME=application/x-troff) tad $SET(MIME=application/octet-stream) tar $SET(MIME=application/x-tar) taz $SET(MIME=application/x-tar) tbp $SET(MIME=application/x-timbuktu) tbt $SET(MIME=application/timbuktu) tcl $SET(MIME=application/x-tcl) tex $SET(MIME=application/x-tex) texi(nfo|) $SET(MIME=application/x-texinfo) tgz $SET(MIME=application/x-tar) tki(ned|) $SET(MIME=application/x-tkined) toc $SET(MIME=application/toc) trm $SET(MIME=application/x-msterminal) ttz $SET(MIME=application/t-time) ustar $SET(MIME=application/x-ustar) vcd $SET(MIME=application/x-cdlink) vmi $SET(MIME=application/x-dreamcast-vms-info) vms $SET(MIME=application/x-dreamcast-vms) wbxml $SET(MIME=application/vnd.wap.wbxml) wmf $SET(MIME=application/x-msmetafile) wmlc $SET(MIME=application/vnd.wap.wmlc) wmlsc $SET(MIME=application/vnd.wap.wmlscriptc) wri $SET(MIME=application/x-mswrite) wxl $SET(MIME=application/x-wxl) xdm(a|) $SET(MIME=application/x-xdma) xdw $SET(MIME=application/vnd.fujixerox.docuworks) x-gzip $SET(MIME=application/x-gzip) xht(m(l|)|) $SET(MIME=application/xhtml+xml) xla $SET(MIME=application/vnd.ms-excel) xlc $SET(MIME=application/vnd.ms-excel) xll $SET(MIME=application/x-excel) xlm $SET(MIME=application/vnd.ms-excel) xls $SET(MIME=application/vnd.ms-excel) xlt $SET(MIME=application/vnd.ms-excel) xlw $SET(MIME=application/vnd.ms-excel) xpi $SET(MIME=application/x-xpinstall) yz1 $SET(MIME=application/x-yz1) z $SET(MIME=application/x-compress) zac $SET(MIME=application/x-zaurus-zac) zip $SET(MIME=application/zip) (^$URL(http://wind.prohosting.com/proxmine/cgi-bin/uploader/)) ##### audio/* aif $SET(MIME=audio/x-aiff) aifc $SET(MIME=audio/x-aiff) aiff $SET(MIME=audio/x-aiff) als $SET(MIME=audio/X-Alpha5) au $SET(MIME=audio/basic) es $SET(MIME=audio/echospeech) esl $SET(MIME=audio/echospeech) imy $SET(MIME=audio/x-imy) it $SET(MIME=audio/x-mod) itz $SET(MIME=audio/x-mod) kar $SET(MIME=audio/midi) m3u $SET(MIME=audio/x-mpegurl) mdz $SET(MIME=audio/x-mod) mid $SET(MIME=audio/midi) midi $SET(MIME=audio/midi) mio $SET(MIME=audio/x-mio) mod $SET(MIME=audio/x-mod) mp2 $SET(MIME=audio/mpeg) mp3 $SET(MIME=audio/x-mpeg) mpga $SET(MIME=audio/mpeg) pac $SET(MIME=audio/x-pac) pae $SET(MIME=audio/x-epac) qcp $SET(MIME=audio/vnd.qcelp) ra $SET(MIME=audio/x-realaudio) ram $SET(MIME=audio/x-pn-realaudio) rm $SET(MIME=audio/x-pn-realaudio) rpm $SET(MIME=audio/x-pn-realaudio-plugin) s3m $SET(MIME=audio/x-mod) s3z $SET(MIME=audio/x-mod) smd $SET(MIME=audio/x-smd) smz $SET(MIME=audio/x-smd) snd $SET(MIME=audio/basic) tsi $SET(MIME=audio/tsplayer) vox $SET(MIME=audio/voxware) vqe $SET(MIME=audio/x-twinvq-plugin) vqf $SET(MIME=audio/x-twinvq) vql $SET(MIME=audio/x-twinvq) wav $SET(MIME=audio/x-wav) wax $SET(MIME=audio/x-ms-wax) wma $SET(MIME=audio/x-ms-wma) xm $SET(MIME=audio/x-mod) xmz $SET(MIME=audio/x-mod) ##### model/* iges $SET(MIME=model/iges) igs $SET(MIME=model/iges) mesh $SET(MIME=model/mesh) msh $SET(MIME=model/mesh) silo $SET(MIME=model/mesh) vrml $SET(MIME=model/vrml) wrl $SET(MIME=model/vrml) ##### video/* asf $SET(MIME=video/x-ms-asf) asx $SET(MIME=video/x-ms-asf) avi $SET(MIME=video/x-msvideo) mov $SET(MIME=video/quicktime) movie $SET(MIME=video/x-sgi-movie) mp4 $SET(MIME=video/mp4 ) mpe(g|) $SET(MIME=video/mpeg) mpg $SET(MIME=video/mpeg) mpg4 $SET(MIME=video/mp4 ) mxu $SET(MIME=video/vnd.mpegurl) qt $SET(MIME=video/quicktime) wmv $SET(MIME=video/x-ms-wmv) ##### chemical/* csm $SET(MIME=chemical/x-csml) csml $SET(MIME=chemical/x-csml) emb $SET(MIME=chemical/x-embl-dl-nucleotide) embl $SET(MIME=chemical/x-embl-dl-nucleotide) gau $SET(MIME=chemical/x-gaussian-input) mol $SET(MIME=chemical/x-mdl-molfile) mop $SET(MIME=chemical/x-mopac-input) pdb $SET(MIME=chemical/x-pdb) xyz $SET(MIME=chemical/x-xyz) xyz $SET(MIME=chemical/x-xyz) ##### others dwf $SET(MIME=drawing/x-dwf) ice $SET(MIME=x-conference/x-cooltalk) ivr $SET(MIME=i-world/i-vrml) map $SET(MIME=magnus-internal/imagemap) lamina 2004-06-08, 09:56 PM [Patterns] Name = "PCZONE IMG TO HD" Active = TRUE URL = "$TYPE(htm)(www.pczone.com.tw)" Bounds = "<img\s*>" Limit = 256 Match = "<img \0 src=$AV(((/images)|(\w.pczone.com.tw/images))\/\1) \2" Replace = "<img \0 src="http://local.ptron/pczone/\1" \2" 因為常常上 PCZONE ,只是有時尖峰時間開起會花點時間... 所以只好寫針對 PCZONE 寫了這個節省下載圖檔時間的規則... 簡單的說,就是先把 PCZONE 所有的圖檔全擺在自己的硬碟上 不需要你的瀏覽器去下載,雖說圖檔很小,但累計下來也是一個量... PS:用這個規則前,請先把 PCZONE 的小圖示檔先抓回硬碟(Proxomitron 根目錄底下的 \html\pczone )上. 不然你只會看到一堆 [X] 圖,請抓放在 www.pczone.com.tw\images\ 目錄下的圖檔,放在相對的位置 lamina 2004-07-23, 12:08 PM Update 17 Jul: Scott was born in January 1968. He passed at the age of 36. http://computercops.biz/article-5228-nested-0-0.html 作者英年早逝,Proxomitron 是我見過的網頁過濾軟體中最強的說 Proxomitron 的靈活性和特殊的過濾語法,到目前為止應該沒有其他軟體可以比擬吧 lamina 2004-07-23, 03:29 PM 這是一個專門用來過濾有 AD 註釋區段類型的廣告規則 註釋區段指的是在 HTML 原始檔案內使用 <!-- --> 來區分的廣告 [Blocklists] List.AdComment = "..\Lists\AdComment.txt" [Patterns] Name = "Kill AdComment" Active = TRUE URL = "$TYPE(htm)" Limit = 12000 Match = "<!-[^>]++{0,32}$LST(AdComment)" Replace = "<!-- Kill AdComment -->" #BEGIN BEGIN SEXALYZER COUNTER CODE: ALTERATIONS ARE PROHIBITED * END SEXALYZER COUNTER CODE --> Begin cgiboy Access counter * End cgiboy Access counter --> BEGIN SEXLIST * END SEXLIST * --> begin of Sex-in-WWW Top1000*end of Sex-in-WWW Top1000 code--> BEGIN WEBSIDESTORY CODE * END WEBSIDESTORY CODE --> BEGIN SEXTRACKER * END SEXTRACKER * --> Begin Asian Swap *End Asian Swap Code---> Begin Sex Swap *Begin Sex Swap Code---> begin of ad block * end of ad block --> BEGIN text generated by server. PLEASE REMOVE * END text generated by server. PLEASE REMOVE --> #START STATS4ALL_START*STATS4ALL_END--> Start Head Banner*End Head Banner---> START HOME FREE HEADER CODE * END HOME FREE HEADER CODE --> START HOME FREE FOOTER CODE * END HOME FREE FOOTER CODE --> START aFreeGo * END aFreeGo * --> #OTHER BannerAD Start * BannerAD End --> Button4AD Start * Button4AD End --> PopupAD Start * PopupAD End --> SpyLOG f:0111 * SpyLOG --> HotLog * /HotLog --> FREEHOST HEADER STARTS HERE * FREEHOST HEADER ENDS HERE --> FREEHOST FOOTER STARTS HERE * FREEHOST FOOTER ENDS HERE --> CGIBOY start*CGIBOY end--> HotAccess Oregon start*HotAccess Oregon End--> ImageReady Preload Script * End ImageReady Slices --> St-HP-H * En-HP-H --> St-HP-F * En-HP-F --> PopInAds.com Advertising Code Begin * PopInAds.com Advertising Code End --> lamina 2004-07-23, 03:50 PM 這兩個過濾規則是一組的,是用來過濾某些惡意竄改瀏覽器或不受歡迎的 ClassIDs 注意:因為論壇表情符號的關係 http://myweb.hinet.net/home1/lamina/smile.gif 被替換為 http://www.pczone.com.tw/images/smilies/smile.gif 所以在複製貼入 default.cfg 時,請記得修正... [Blocklists] List.ClassIDs = "..\Lists\ClassIDs.txt" [Patterns] Name = "Kill - Specific ClassIDs - External JS Files {5.d.ex}" Active = TRUE URL = "$TYPE(js)|$TYPE(vbs)|$TYPE(oth)" Limit = 64 Match = "(clsid(\("\{|:)|ClassID="\{)$LST(ClassIDs)" Replace = "<!-- Kill - Specific ClassIDs - External JS Files {5.d.ex} -->" Name = "Kill - Specific ClassIDs - HTML {5.d.ex}" Active = TRUE URL = "$TYPE(htm)" Bounds = "<object*(</object>|>)|$NEST(<script,</script*>)|<xml\s*</xml>" Limit = 12000 Match = "*(clsid(\("\{|:)|ClassID="\{)$LST(ClassIDs)*" Replace = "<!-- Kill - Specific ClassIDs - HTML {5.d.ex} -->" # Proxomitron4 URL killfile: $LST(ClassIDs) # NoAddURL # # For use with Specific ClassID Remover # IDs by sidki and JarC # sidki 2002-07-12 # updated 2002-08-23 sidki # updated 2002-12-28 SgtPepper # updated 2003-04-30 JD5000 # ################################################# # Unwanted Plugins # -------------- 31B7EB4E-8B4B-11D1-A789-00A0CC6651A8 $SET(9=Cult3D plugin (application/x-cult3d-object)) A2C271DF-91C3-11D5-9FA6-860301900128 $SET(9=Rich Media) 9F4D2FA2-54A1-11D1-8267-00A0C91F9CA0 $SET(9=gotobar Class) # Adware/Trackware # -------------- 19DFB2CB-9B27-11D4-B192-0050DAB79376 $SET(9=eZula TopText.1) C03351A4-6755-11D4-8A73-0050DA2EE1BE $SET(9=eZula TopText.2) 84B71424-B020-11D4-B198-000102C6D473 $SET(9=Spedia Surf+) 60B25924-C865-11D2-B0C1-000000000000 $SET(9=HotBar) 75D2080B-4857-4B96-9B7D-732634FBD01F $SET(9=HotBar2) BAE85C97-2CD4-45C3-A1ED-E4CEF7C6AA52 $SET(9=BrowserToolbar) 67925165-C4B6-11D2-B9C6-0000E84F59A6 $SET(9=Brilliant Digital (application/x-bdescript)) 51958169-D5E3-11D1-AA42-0000E842E40A $SET(9=Brilliant Digital (application/x-b3dmovies)) # Dialers # ---------------------------- C771B05E-E725-4516-97A5-4CE5EB163CFB $SET(9=Active-x Dialer.1) 15C3C7A4-9676-11D3-9799-0060087190B9 $SET(9=Active-x Dialer.2) 10A1B95D-5E35-4935-8BC3-D43E81E8105E $SET(9=Active-x Dialer.3) # http://www.guninski.com/vv2xp.html # -------------- 0006F063-0000-0000-C000-000000000046 $SET(9=Outlook View Control) # http://online.securityfocus.com/archive/1/278786 # -------------- 00022613-0000-0000-C000-000000000046 $SET(9=dosIE-doe) # http://online.securityfocus.com/archive/1/259018 # -------------- 11111111-1111-1111-1111-111111111111 $SET(9=XMLid.Exploit) 00000000-0000-0000-0000-000000000000 $SET(9=Possible Exploit) # http://online.securityfocus.com/bid/598/exploit/ # -------------- 06290BD5-48AA-11D2-8432-006008C3FBFC $SET(9=Object TLB scriptlets) # Trojan.JS.Clid.gen # http://online.securityfocus.com/archive/1/200109 # -------------- F935DC22-1CF0-11D0-ADB9-00C04FD58A0B $SET(9=WSH Shell Object) F935DC26-1CF0-11D0-ADB9-00C04FD58A0B $SET(9=WSH Network Object) 0D43FE01-F093-11CF-8940-00A0C9054228 $SET(9=FileSystem Object) # Office Web Components (OWC) # http://sec.greymagic.com/adv/ # -------------- 0002E500-0000-0000-C000-000000000046 $SET(9=Office Chart.1) 0002E556-0000-0000-C000-000000000046 $SET(9=Office Chart.2) 0002E510-0000-0000-C000-000000000046 $SET(9=Office Spreadsheet.1) 0002E551-0000-0000-C000-000000000046 $SET(9=Office Spreadsheet.2) 0002E553-0000-0000-C000-000000000046 $SET(9=Office DataSourceControl) # http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00207.html # -------------- 25336921-03F9-11CF-8FD0-00AA00686F13 $SET(9=HTML Object) # Microsoft Web Browser # http://www.guninski.com/m$oxp-2.html # -------------- 8856F961-340A-11D0-A96B-00C04FD705A2 $SET(9=Microsoft Web Browser) # http://www.doxdesk.com/parasite/ # -------------- FFEEDDCC-BBAA-9988-7766-554433221100 $SET(9=(control)) F414C260-6AC0-11CF-B6D1-00AA00BBBB58 $SET(9=(control)) 06DFEDAA-6196-11D5-BFC8-00508B4A487D $SET(9=7FaSSt) 910E7499-6311-4843-8EB0-0100A7955A1F $SET(9=Aornum) 72F81209-6C73-4DE7-A3DC-408A8BD472FB $SET(9=BargainBuddy/Versn) 868B015F-3515-44DB-B0AD-182CD058985E $SET(9=BrowserToolbar) 3E8A1971-45A5-45EE-828B-8C78431C0BD4 $SET(9=Bulla) AB4DD0F0-38DA-4F48-AAFE-7DE7323BB6B2 $SET(9=ClickTheButton) B83FC273-3522-4CC6-92EC-75CC86678DA4 $SET(9=CnsMin) 1B0E7716-898E-48CC-9690-4E338E8DE1D3 $SET(9=CnsMin) 4EDBBAEA-F509-49F6-94D1-ECEC4BE5B686 $SET(9=CnsMin) 8D898B17-976D-44c1-84E6-AF38842AC9EC $SET(9=CnsMin) AD7FAFB0-16D6-40C3-AF27-585D6E6453FD $SET(9=Comload) 9346A6BB-1ED0-4174-AFB4-13CD4EC0AA40 $SET(9=CommonName) CEB29DA4-7AFA-4F24-B3CD-17351D590DF0 $SET(9=DialerOffline) CCE83E45-30B2-4BAE-B1F5-25D128D27A43 $SET(9=ezCyberSearch) 00000EF1-34E3-4633-87C6-1AA7A44296DA $SET(9=FavoriteMan) 000000F1-34E3-4633-87C6-1AA7A44296DA $SET(9=FavoriteMan/FOne) D6862A22-1DD6-11D3-BB7C-444553540000 $SET(9=InetSpeak/BHO42602) C389F2CF-26ED-11D5-A212-004005F6FEB6 $SET(9=InetSpeak/eBoom) 07C0D34D-11D7-43F7-832B-C6BB41726F5F $SET(9=lop/AYB) 014DA6C1-189F-421a-88CD-07CFE51CFF10 $SET(9=MySearch) DD770A75-CE18-11D5-98D8-00E018981B9E $SET(9=NewDotNet/A) A0BD4FF5-D828-11D3-9EB5-00600837E6EE $SET(9=NowBox) 0CEF79D8-D373-11D3-A7D3-00062962BF17 $SET(9=Onflow) FEE7FD53-3356-4D4D-8978-2C4AE3A7E109 $SET(9=SaveNow/Download) FC327B3F-377B-4CB7-8B61-27CD69816BC3 $SET(9=SaveNow/Db) 6C413541-29A1-4FFE-894C-9D68313C9F73 $SET(9=SearchitBar) 0835121F-6472-43BD-8A40-D9221FF1C4CE $SET(9=SideStep) E3F7205F-2AE0-4BF0-816B-2D24A5F20EC7 $SET(9=StripPlayer) C776136E-FDB9-4F4B-837D-90593FB5A3FA $SET(9=SuperBar) 3D7247E8-5DB8-11D4-8A72-0050DA2EE1BE $SET(9=TopText) 53CBEE82-D747-11D3-9ED0-005004189684 $SET(9=UCmore) B5E60A66-0C51-4894-8DF8-CBDF4E478D58 $SET(9=Wazam) # From SpyBot CLSIDs list # -------------- 00000000-5eb9-11d5-9d45-009027c14662 $SET(9=VX2 Respondmiter, Blackstone Transponder) 00000000-d9e3-4bc6-a0bd-3d0ca4be5271 $SET(9=Porn popups) 0000001D-BA9B-11D2-BDF1-0090272A6D78 $SET(9=Surfmonkey) 0000026A-8230-4DD4-BE4F-6889D1E74167 $SET(9=Transponder) 001DAE60-95C0-11d3-924E-009027950886 $SET(9=YBIOCtrlClass - Yahoo!) 0A68C5A2-64AE-4415-88A2-6542304A4745 $SET(9=Huntbar) D6E66235-7AA6-44ED-A06C-6F2033B1D993 $SET(9=Huntbar) 0FC817C2-3B45-11D4-8340-0050DA825906 $SET(9=Deltaclick) 139D88E5-C372-469D-B4C5-1FE00852AB9B $SET(9=FavoriteMan) 1678F7E1-C422-11D0-AD7D-00400515CAAA $SET(9=Comet Cursor) 1E1B2879-88FF-11D2-8D96-D7ACAC95951F $SET(9=Commonname toolbar) 1E6F1D6A-1F20-11D4-8859-00A0CCE26836 $SET(9=SVA PLayer) 206E52E0-D52E-11D4-AD54-0000E86C26F6 $SET(9=Fresh Devices) 243B17DE-77C7-46BF-B94B-0B5F309A0E64 $SET(9=Microsoft Money) 2662BDD7-05D6-408F-B241-FF98FACE6054 $SET(9=Xupiter toolbar) 2E12B523-3D4C-4FAC-9B04-0376A8F5E879 $SET(9=InetSpeak) 2F4F8CC3-FF89-11D1-9F63-0020182D7E20 $SET(9=eSafe Protect) 3750BFA3-1392-4AF3-AF86-9D2D4776E5A4 $SET(9=Burnaby Module > e-card_viewer > porn popups) 40ac4d2d-491d-11d4-aaf2-0008c75dcd2b $SET(9=WurldMedia related) 4A2AACF3-ADF6-11D5-98A9-00E018981B9E $SET(9=NewDotNet) 58359010-BF36-11D3-99A2-0050DA2EE1BE $SET(9=Ezula) 5843A29E-1246-11D4-BA8C-0050DA707ACD $SET(9=Gratisware - CrsHOClass) 5998B08E-CFAC-11D5-822A-0050048E6E38 $SET(9=JimmySurf) 6085FB5B-C281-4B9C-8E5D-D2792EA30D2F $SET(9=Win32/Aspam.Trojan) 665ACD90-4541-4836-9FE4-062386BB8F05 $SET(9=FlashTrack, Ftapp) 6ACD11BD-4CA0-4283-A8D8-872B9BA289B6 $SET(9=eAcceleration StopSign) 7011471D-3F74-498E-88E1-C0491200312D $SET(9=FriendGreetings E-Card foistware) 72EFCEB7-436E-11D3-93ED-0008C7396667 $SET(9=DigitalMe toolbar) 730F2451-A3FE-4A72-938C-FC8A74F15978 $SET(9=IGN Keywords) 760A9DDE-1433-4A7C-8189-D6735BB5D3DD $SET(9=EZSearch bar) 7DAAC7DE-9EF0-4FF0-BFA5-AFF3E899054C $SET(9=Tweak Master) 82B98006-7A56-11D2-A26F-00C04F962769 $SET(9=Flyswat) 85A702BA-EA8F-4B83-AA07-07A5186ACD7E $SET(9=MediaLoads Enhanced.) A28C2A31-3AB0-4118-922F-F6B3184F5495 $SET(9=BonziBuddy) A586BE00-52AC-11D3-A075-E51A86A6C62B $SET(9=ParentPresent - PP Browser) A6250FB8-2206-499E-A7AA-E1EC437E71C0 $SET(9=Huntbar) A6475E6B-3C2E-4B1F-82FD-8F1C0B1D8AD0 $SET(9=Commonname toolbar) B195B3B3-8A05-11D3-97A4-0004ACA6948E $SET(9=Hotbar) C1D458F1-B97C-11D5-B3DF-00B0D0A5B433 $SET(9=WaveExpress/TvTonic: TV/Web browser software) C4D99500-4C77-11D4-93B7-0040950570BA $SET(9=eBoom Search Bar) C7ade150-743d-11d4-8141-00e029626f6a $SET(9=associated with NetPal, Transponder, and FavoriteMan) C82B55F0-60E0-478C-BC55-E4E22F11301D $SET(9=Unknown, possible porn popups.) C900B400-CDFE-11D3-976A-00E02913A9E0 $SET(9=WebHancer) CBB0A6A0-8430-11D4-814D-0050047090B1 $SET(9=Surfs... ) CE31A1F7-3D90-4874-8FBE-A5D97F8BC8F1 $SET(9=Bargain Buddy) D14641FA-445B-448E-9994-209f7AF15641 $SET(9=WurldMedia) D44B5436-B3E4-4595-B0E9-106690E70A58 $SET(9=Lop.com) D5C778F1-CF13-4E70-ADF0-45A953E7CB8B $SET(9=Network Essentials) DD41D66E-CE4F-11D2-8DA9-00A0249EABF4 $SET(9=FormWhiz) E0B9B5FE-B66E-4FB0-A1D9-726F0E743CFD $SET(9=Divago Surfairy) E6B64F67-B100-4636-8D51-D113E1F5FF93 $SET(9=ContentSaver Offline Browser) EAE191BA-FB87-40CA-80D2-D639A2595150 $SET(9=IE Middle Clicker ) EBBFE27C-BDF0-11D2-BBE5-00609419F467 $SET(9=Aureate/Radiate) ED8DB0FD-D8F4-4b2c-BB5B-9EF040FE104D $SET(9=UCmore toolbar ) FDD3B846-8D59-4ffb-8758-209B6AD74ACC $SET(9=Microsoft Money ) FFFFFEF0-5B30-21D4-945D-000000000000 $SET(9=Stardownload) 20A03A4C-9FAF-45D5-A5C2-B6C49774E03C $SET(9=Hijacker FreeScratchAndWin) BD11A280-2E73-11CF-B6CF-00AA00A74DAE $SET(9=SMS Dialer) 093CAF40-3BA6-4071-A050-E830CBDC6480 $SET(9=TrustToolbar) EB6AFDAB-E16D-430B-A5EE-0408A12289DC $SET(9=DownloadWare) A27CFCAE-9351-4D74-BFFC-21EB19693D8C $SET(9=Xupiter (Browserwise variant)) 11BF0E2B-4229-4ADC-9C11-1C6968731018 $SET(9=Dialer VLoading) AB1E62EB-3DE3-428F-A417-64AB3C9B6CF0 $SET(9=Dialer eConnect) E8EDB60C-951E-4130-93DC-FAF1AD25F8E7 $SET(9=Dialer MoneyTree) FC87A650-207D-4392-A6A1-82ADBC56FA64 $SET(9=Dialer MoneyTree) 1D2DCA0D-B30F-40AD-9690-087105F214EC $SET(9=Dialer NoCreditCard) 765E6B09-6832-4738-BDBE-25F226BA2AB0 $SET(9=QcBar) D6FC35D1-04AB-4D40-94CF-2E5AE4D0F8D2 $SET(9=QcBar) DA9A0B1E-9B7B-11D3-B8A4-00C04F79641C $SET(9=Dialer All-In-One Telcom) 00000012-890E-4AAC-AFD9-000000000000 $SET(9=Dialer C2.lop / Central24 / MoneyTree) 0D4312E2-5E4D-4A27-A9D8-043E43904277 $SET(9=C2.lop) 018B7EC3-EECA-11D3-8E71-0000E82C6C0D $SET(9=Dialer C2.lop / Central24) 8699D723-6DC6-47D3-B55C-489BA006B917 $SET(9=Dialer WebInstall) F0AA2376-F073-4E57-86E8-0238F99087C7 $SET(9=Hijacker Rapidblaster) 669695BC-A811-4A9D-8CDF-BA8C795F261E $SET(9=Hijacker 7Search) B8875BFE-B021-11D4-BFA8-00508B8E9BD3 $SET(9=Hijacker 7Search) 9DBAFCCF-592F-FFFF-FFFF-00608CEC297B $SET(9=Bargain Buddy) F17EDBC0-3EB2-11D3-AB74-00A0C9A522F2 $SET(9=GoHip) 69FD62B1-0216-4C31-8D55-840ED86B7C8F $SET(9=HotBar) B2C03E2E-2219-4FF9-810A-540ACA63F8D9 $SET(9=MarketScore) B8AB2281-447F-482B-86E9-1F0ED5973637 $SET(9=ezCyberSearch) A4A435CF-3583-11D4-91BD-0048546A1450 $SET(9=ACXInstall) F20AE630-6DE2-43CA-A988-7CD40C36EF0B $SET(9=CashToolbar) 15589FA1-C456-11CE-BF01-00AA0055595A $SET(9=NetSource101) D0B0C04A-DC73-4A91-9307-41F3E36579BF $SET(9=PopUp Network) 05CE4481-8015-11D3-9811-C4DA9F000000 $SET(9=TopMoxie) 11111111-1111-1111-1111-111111111111 $SET(9=VX2/a NetPal) DD521A1D-1F98-11D4-9676-00E018981B9E $SET(9=NewNet) 3717DF55-0396-463D-98B7-647C7DC6898A $SET(9=Search-Explorer) D14D6793-9B65-11D3-80B6-00500487BDBA $SET(9=Comet Cursor) 6656B666-992F-4D74-8588-8CA69E97D90C $SET(9=CommonName) 8A05273A-2EA5-42DE-AA75-59EA7D9D50D7 $SET(9=Huntbar) 70522FA2-4656-11D5-B0E9-0050DAC24E8F $SET(9=Aornum) 9C813B33-52A2-466D-8C51-EB4189C1FF98 $SET(9=Aornum) 0837121A-6472-43BD-8A40-D9221FF1C4CE $SET(9=SideStep) BD11A280-2E73-11CF-B6CF-00AA00A74DAF $SET(9=Bonzi Buddy) 8522F9B3-38C5-4AA4-AE40-7401F1BBC851 $SET(9=Dialer StiffyCash/XXXDial/SexPass) A45F39DC-3608-4237-8F0E-139F1BC49464 $SET(9=Dialer) 7DD896A9-7AEB-430F-955B-CD125604FDCB $SET(9=DailyWinner) 74D05D43-3236-11D4-BDCD-00C04F9A3B61 $SET(9=Trend Micro Antivirus online scanner) CA0B9B6D-C2AF-11D3-B376-0800460222F0 $SET(9=iWon toolbar) E7D2588A-7FB5-47DC-8830-832605661009 $SET(9=Live Collaboration) 1DA3C4AB-E6B6-47A6-B0F3-1BD81524B51B $SET(9=ActiveWorldsDownload Control) 11260943-421B-11D0-8EAC-0000C07D88CF $SET(9=iPIX ActiveX Control) BF985246-09BF-11D2-BE62-006097DF57F6 $SET(9=SimCityX Control) E344ADA2-75B6-4E7E-B221-0A04FD5B0165 $SET(9=MaxisPublishX Control) C81B5180-AFD1-41A3-97E1-99E8D254DB98 $SET(9=CSS Web Installer Class) EFCF25F1-C8F9-4C53-A03D-68D5C19225D0 $SET(9=Dialer Wonderland) 57E69D5A-6539-4D7D-9637-775DE8A385B4 $SET(9=Xupiter) 499DB658-1909-420B-931A-4A8CAEFD232F $SET(9=ASpam.Trojan/Drvman Variant) A47693D1-7E2A-4DE3-9907-310C5D310B5F $SET(9=PerMedia / FriendGreetings) 00000012-890E-4AAC-AFD9-EFF6954A34DD $SET(9=AdBreak) 8CDC6A46-08AB-435B-A3FA-7CC00E74EC9F $SET(9=PerMedia / FriendGreetings) 36372A5F-1436-4A70-B808-59F6DFD36658 $SET(9=PerMedia / FriendGreetings) 5C015AA7-3392-4044-90CC-8E95019CFFF1 $SET(9=QcBar) 268CBA84-25AE-4D38-89FE-E7606A6460E3 $SET(9=Comet Cursor (Shop)) 23DDAE8C-6A79-4D62-80AA-E95D89CB9811 $SET(9=SearchExplorer) 69550BE2-9A78-11D2-BA91-00600827878D $SET(9=Tinybar) 69555BE2-9A78-11D2-BA91-00600827878D $SET(9=Tinybar) 99B0B113-6F25-49C9-8ECF-2FDDD3EDFF6A $SET(9=FreeScratchAndwin) EC788B03-A743-4274-AC9E-DB4F2A03F515 $SET(9=SearchAndBrowse) 5DD7B3BE-FDEC-4563-B038-FF80F2345B89 $SET(9=FreeScratchAndWin) 8869786C-8E72-45DC-911D-AB3416AC1DF1 $SET(9=DownloadReceiver) F9765480-72D1-11D4-A75A-004F49045A87 $SET(9=eXactSearch) 59450DB0-341D-4436-B380-B8377D8B6796 $SET(9=Huntbar) 02C20140-76F8-4763-83D5-B660107B7A90 $SET(9=OnlineDialer (MaConnect)) E44151C8-0C6C-4A7D-B677-4FCC9552E957 $SET(9=OnlineDialer (BelCall)) 91DF007C-2F7F-4731-BE1F-38C1C13CEB8B $SET(9=OnlineDialer (SunInfo)) A76066C9-941B-4209-9D96-0AC80501100D $SET(9=INetSpeak/Iexplorr) 53E10C2C-43B2-4657-BA29-AAE179E7D35C $SET(9=HighTraffic) A7798D6C-C6B5-4F26-9363-F7CDBBFFA607 $SET(9=Gigex SpeedDelivery) 1000026A-8230-4DD4-BE4F-6889D1E74167 $SET(9=Transponder) 50A28604-52F2-11D6-8F0F-5254AB11D5C2 $SET(9=Dialer) FFFF0001-0002-101A-A3C9-08002B2F49FB $SET(9=Dialer) 8E4C16F3-45C8-4B24-99E6-F55082B7C4F1 $SET(9=Unstable IE toolbar from i-lookup.com) 61D029AC-972B-49FE-A155-962DFA0A37BB $SET(9=Unstable IE toolbar from i-lookup.com) 9EB320CE-BE1D-4304-A081-4B4665414BEF $SET(9=www mt-download com MediaTicketsInstaller) lamina 2004-07-23, 04:08 PM 這個過濾規則是用來讓你的滑鼠右鍵正常工作的 他會自動加入一段解開鎖滑鼠右鍵的語法 就因為這段語法,他就會讓原本鎖滑鼠右鍵語法失效 [Patterns] Name = "Allow - Right Mouse Clicks {2.d.se}" Active = TRUE URL = "$TYPE(htm)" Limit = 16 Match = "<end>" Replace = "\r\n<!-- Allow - Right Mouse Clicks {2.d.se} -->" "\r\n<script language="javascript">" "function clearEventPROXO(a)" "{" " if (!a)" " return;" " a.onmousedown = null;" " a.onselect = null;" " a.oncontextmenu = null;" " a.onselectstart = null;" " a.ondragstart = null;" "}" " clearEventPROXO(document);" " clearEventPROXO(document.body);" " clearEventPROXO(window);" " for (i = 0; i < window.parent.frames.length; i++)" " clearEventPROXO(window.parent.frames[i]);" "</script>\r\n" "$STOP()" lamina 2004-07-26, 12:13 AM http://www.geocities.com/acejackwu/index.htm 這個網站掛了,沒辦法,趁空閒時自己翻了一部分 也許有辭不達意或錯誤的情形,有疑問者請參考 help\Matching Rules.html *:此星號表示可以過濾任何字元字串。例如:"foo*bar" 可以是 "foobar"、"fooma babar"、甚至也可以是 "foo goat bat bison bar"。基本上這個星號,可以是任何字串。 ?:此問號表示可以過濾任何單一字元,無論這個字元是什麼。例如:"?oat" 可以是 "boat"、"goat" 或是 "<oat" [abc...]:此中括號代表可以過濾任何單一字元。"[" 和 "]" 之中也可以使用 "-" 符號來表示區間:"[A-Z]" 將會過濾 "A" 到 "Z" 之間的任何字元。"[0-9]" 可以過濾任何單一數字。假如第一個字元是 "^" 符號,那麼代表的則是 不包含 在其內的字元:"[^0-9abc]" 不是任何數字、也不是 "a"、"b" 和 "c"。 [#n:n]:數字區間的過濾。這個可以用來檢查 HTML 標籤的數值。例如:檢查一個介於 100 到 150 的數字,可以使得 "[#100:150]"。假如第二個數字是星號 "*" 那麼將代表無限大,"[#40:*]" 將會是代表著大於等於 40 的數字。而小於等於 40 可以寫成 "[#0:40]"。 " "空格的過濾。它可以過濾任何數量的空格和和定位鍵(tab)。使用此空格來過濾時,兩項之間可以有空格或是沒有空格。例如: "<tag value>" 可以過濾成 "<tag value>" 或是 "<tag value>" 甚至是 "<tagvalue>"。 \s:反斜線s:有點類似上一個介紹的空格,也可以過濾數個空格和定位鍵(tab),但是卻必須至少要有一個讓它過濾。例如:"<tag\s>" 可以是 "<tag >" 或 "<tag >" 但卻不可以是 "<tag>"。 \w:反斜線w:單字的過濾。它可以過濾沒有空格的任何字元。基本上它和 "\s" 是相對的,但是在某些時候,它也可以和 "*" 有些類似。不同的地方,就是在碰到空格或 ">" (HTML 的結束標籤)時,它將會停止動作。它方便利用於標籤和網址的時候。 \t:明確地過濾一個定位(tab)字元。 \r:明確地過濾一個回車(carriage return)字元。 \n:明確地過濾一個換行(newline)字元。 \0-9:反斜線加數字 0-9:儲存變數。這是 Proxomitrons 的一個關鍵過濾規則。它過濾的方式就像 "*" 字元一樣,但是它會把過濾的內容儲存到變數內。這些儲存了原始 HTML 部分資料的變數,可以拿來再使用或是變更標籤的某一部份。例如:變更背景 <body ... > 標籤,你可以使用... Matching(過濾):<body \1 background="*" \2 > Replace(取代):<body \1 background="mybackground.gif" \2 > 如此,介於 body 和 background 之間的不管是什麼部分,將會原封不動地被放入變數 \1 內,而 \2 的部份亦同,另外 background 的參數部份,因為有 * 過濾符號,所以不管其內是什麼,將會被 mybackground.gif 取代。 更複雜的過濾方式,也可直接放入 \0-9 變數內,例如兩者之間沒有空格的過濾格式 "(foo*bar)\1" 括號內的東西將會全部被放入變數內。 \#:反斜線# 的動作很類似 \0 到 \9,除此之外,它每一次都會將資料置入取代堆疊。例如:\# 第一次過濾 "foo" 然後再過濾 "bar",這時取代堆疊就有兩個資料。接下來你可以用 "\@" 把取代堆疊內一次捉取出來成 "foobar"。 |:使用垂直線(vertical bar)代表 "OR" 功能。例如:"foo|bar" 可以是 "foo" 或 "bar" 兩者之一。 &:使用 And 符號(Ampersand)代表 "AND" 功能。例如:"*foo&*bar" 可以是 "foo bar" 或 "bar foo" 但卻不能是 "foo foo"。注意星號 "*" 的使用,像下面的方式 "height" 常常伴隨著 "width" 就需要用到 AND 功能。 <img src="picture" height=60 width=200> 也可能是這樣... <img width=200 height=60 src="picture"> 所以要過濾就要... <img (*src="picture" & *height=60 & *width=200)*> &&:兩個 & (AND-AND)的功能有點類似單一個 "&" 但又有一點差異 - 第二個 & 的部分會精確地限制過濾第一個部分... (<img * > && \1 ) ...這個 "\1" 的動作方式就像是 "*" 一樣,其中並且過濾了 "<img ...>" 標籤。\1 將取得 "<img ...>" 之外的資料。 ( ... ):使用小括號可以建立子表示式。例如:"foo(bar|bear|goat)" 可以是 "foobar"、"foobear" 甚至是 "foogoat"。巢狀式也可以使用,如:"foo(bar|(black|brown|puce) bear|goat)" 可以是 "foobar"、"fooblackbear"、"foobrownbear" ....等等。也可以和 "[...]" 搭配使用,假如在 "(" 之後的第一個字元是 "^",那表示將是不包括的意思。例如:"(^foo|bar)" 可是任何東西,但卻不能是 "foo" 或 "bar"。 +:加號表示連續重複的字元。例如:"a+" 可能是 "a"、"aa" 或 "aaaa"。複雜一點的如: [abc]+ 可以是 "a"、"b"、"c" 或 "ababccba" ([a-z]&[^n])+ 可以是 "a" 到 "z" 但不能是 "n" (foo)+ 可以是 "foo"、"foofoo"、"foofoofoo" ++:兩個加號的動作有點像單一個加號,但是它會注意到之後的東西(它可以看見並且指出來)。它會循環到它發現到相配的過濾規則。 {n,n}: "+" 或 "++" 都可以搭配使用大括號。這可以控制最小和最大的重複過濾次數。例如:"[a]+{4,10}" 可以過濾 4 到 10 個的 "A's" 而 "[C]+{20}" 可以精確過濾 20 個 "C's"。星號 "*" 表示 "無限" 的意思,例如:"[D]+{10,*}" 可以過濾 10 到更多的 "D's"。 \:反斜線可以使用在某些跳脫字元上,例如:過濾左括號 "\(",或過濾反斜線 "\\" =:等號不只是過濾等號而已,包括等號前後的空格都可以過濾。例如:foo="bar" 可以是 foo= "bar" 或 foo = "bar" ":它可以過濾雙引號或是單引號,例如: " * " 可以是... "oh happy mongoose" ...或... 'oh happy mengeese' ':單引號會企圖過濾出對稱的結尾引號,可以是單引號或是雙引號。 單包含著雙:href=" javascript:window.open( ' bison.html ' ); " 或... 雙包含著單:href=' javascript:window.open( " bison.html " ); ' 可以這樣過濾 href=( " * ' ) - 簡單的使用雙引號去過濾最初的引號,並且以單引號作結尾。這裡有些限制:在開始 & 結束之時,都必須在同一個子表示式區間內 - 意指必須要在相同的巢狀區間內。例如.... " some text ' 可以動作... ( " some text ' ) 可以動作... " ( some text | other text) ' 可以動作... " ( some text ' ) 不能動作... lamina 2004-07-26, 02:07 PM 同樣,有疑問者請參考 help\Matching Rules.html 的最底部的部分 \u:目前網頁的網址。 \k:刪除目前的連線:在使用 HTTP headers 時相當有用,可以斷開被過濾網頁的讀取和一些特殊的網址。 \h:主機名稱的網址。 \p:路徑部分的網址。 \q:包含問號字串的網址。(跟隨在 "?" 之後的東西) \a:包含錨點字串的網址。(跟隨在 "#" 之後的東西) \d:目錄位置的 "file://" 網址格式。 \x:包含網址的前綴命令,假如你有設定的話。 |