Hello, eDexter and a custom hosts file is one fairly lightweight solution. Of course, one could just go with the custom hosts file, but, hey, eDexter lets you replace banners, which has a higher fun quotient. :)
Regards, Aryeh Goretsky At 07:59 AM 11/13/2007, you wrote:
From: Peter Evans <[EMAIL PROTECTED]> Precedence: list MIME-Version: 1.0 To: [email protected] References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> In-Reply-To: <[EMAIL PROTECTED]> Date: Tue, 13 Nov 2007 15:33:32 +0900 Message-ID: <[EMAIL PROTECTED]> Content-Type: text/plain; charset=us-ascii Subject: Re: [funsec] Some Ad Networks Are Bad News Message: 1 Larry Seltzer ([EMAIL PROTECTED]) wrote: > So we still don't really know how they're penetrating the ad networks? Money. I bet blipvert companies don't vet the adverts, they just say "X by Y pixels, so many bytes or less" There used to be something called webwasher from seimens that did a good job of removing blipverts. http://www.securecomputing.com/index.cfm?skey=22&lang=en I think thats it, but I can't find the thing, it was a simple local proxy that ate blipvert requests. Or you could install firefox and deal with its awe inspiring flabby performance and droolies. > > http://ad.doubleclick.net/click;h=v8/3609/0/0/%2a/q;137016197;0-0;0;84 > > 02494;3030-160/90;22613468/22631351/2;;~okv=;pos=top;zdid=a219243;zdty > > pe=commentary;zdaudience=creativeprofessional;pagetype=article2;zdtopi > > c1=securityopinions;tile=2;sz=160x90;~sscs=%3fhttp://clk.atdmt.com/MRT > > /go/zffdvity0180000043mrt/direct/01/ ^^-- competing for the obfusculated URL of the week are we? p
_______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
