Hello,

eDexter and a custom hosts file is one fairly lightweight solution.  Of
course, one could just go with the custom hosts file, but, hey, eDexter
lets you replace banners, which has a higher fun quotient. :)

Regards,

Aryeh Goretsky



At 07:59 AM 11/13/2007, you wrote:

From: Peter Evans <[EMAIL PROTECTED]>
Precedence: list
MIME-Version: 1.0
To: [email protected]
References: <[EMAIL PROTECTED]>
        <[EMAIL PROTECTED]>
        <[EMAIL PROTECTED]>
        <[EMAIL PROTECTED]>
        <[EMAIL PROTECTED]>
In-Reply-To: <[EMAIL PROTECTED]>
Date: Tue, 13 Nov 2007 15:33:32 +0900
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=us-ascii
Subject: Re: [funsec] Some Ad Networks Are Bad News
Message: 1

Larry Seltzer ([EMAIL PROTECTED]) wrote:
> So we still don't really know how they're penetrating the ad networks?

        Money. I bet blipvert companies don't vet the adverts, they just
        say "X by Y pixels, so many bytes or less"


        There used to be something called webwasher from seimens that did
        a good job of removing blipverts.
        http://www.securecomputing.com/index.cfm?skey=22&lang=en
        I think thats it, but I can't find the thing, it was a simple local
        proxy that ate blipvert requests.

        Or you could install firefox and deal with its awe inspiring
        flabby performance and droolies.


> > http://ad.doubleclick.net/click;h=v8/3609/0/0/%2a/q;137016197;0-0;0;84
> > 02494;3030-160/90;22613468/22631351/2;;~okv=;pos=top;zdid=a219243;zdty
> > pe=commentary;zdaudience=creativeprofessional;pagetype=article2;zdtopi
> > c1=securityopinions;tile=2;sz=160x90;~sscs=%3fhttp://clk.atdmt.com/MRT
> > /go/zffdvity0180000043mrt/direct/01/

        ^^-- competing for the obfusculated URL of the week are we?

        p

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to