Website Refuses Ad-Blocked Browsers
Website Refuses Ad-Blocked Browsers
I have not ever known a site refuse an ad-blocked browser before, this is new on me!!
see for yourself!! after a few seconds, you get what is in the screenshot.
http://sepecat.info/b/
here is the screen shot:
and the link to his hmepage is
http://sepecat.info/ , which strangely links back to the first link in this post, and you get the same thing again
see for yourself!! after a few seconds, you get what is in the screenshot.
http://sepecat.info/b/
here is the screen shot:
and the link to his hmepage is
http://sepecat.info/ , which strangely links back to the first link in this post, and you get the same thing again
You can use this whitelist while browsing on the site:
Code: Select all
@@http://pagead2.googlesyndication.com/pagead/show_ads.js
Wow .. look .. it's the old 'unbeatable' Danny Carlton anti-adblocking code . The failure of that code caused a very angry Danny Carlton to instead block ALL Firefox users. What an internet news story THAT was last summer
I removed the fix from the EasyList after Danny gave up because I didn't think that anyone would ever try to use that script again. Guess I was wrong.
Unless that script tries to make a comeback, I will leave things as they are.
I removed the fix from the EasyList after Danny gave up because I didn't think that anyone would ever try to use that script again. Guess I was wrong.
Unless that script tries to make a comeback, I will leave things as they are.
Last edited by rick752 on Thu May 22, 2008 5:36 am, edited 1 time in total.
@Ares2: Something like that should do:
Code: Select all
// ==UserScript==
// @name sepecat.info Anti-Anti-Adblocker
// @namespace http://adblockplus.org/forum/viewtopic.php?t=2441
// @description Disables the anti-adblocking script on sepecat.info
// @include http://sepecat.info/*
// ==/UserScript==
window.addEventListener("load", function() {
unsafeWindow.reklama = function(){}
}, false);
Last edited by Wladimir Palant on Thu May 22, 2008 4:05 pm, edited 1 time in total.
I think it should look more like this:
when just setting unsafeWindow.reklama, the site could use a property setter to access the GM_* functions.
Code: Select all
// ==UserScript==
// @name sepecat.info Anti-Anti-Adblocker
// @namespace http://adblockplus.org/forum/viewtopic.php?t=2441
// @description Disables the anti-adblocking script on sepecat.info
// @include http://sepecat.info/*
// ==/UserScript==
location.href = "javascript:window.reklama = function(){}";
the official greasemonkey wiki says that unsafeWindow *is* unsafe and recommends using location.href: http://wiki.greasespot.net/UnsafeWindow
As far as I know, setting location.href to a javascript uri doesn't have any side effects... it just executes the script, like a javascript: link or a bookmarklet.
There's also a lengthy read on that topic here:
http://www.oreillynet.com/pub/a/network ... falls.html
Maybe XPCSafeJSObjectWrappers are a solution for this problem, but only in Firefox 3.
As far as I know, setting location.href to a javascript uri doesn't have any side effects... it just executes the script, like a javascript: link or a bookmarklet.
There's also a lengthy read on that topic here:
http://www.oreillynet.com/pub/a/network ... falls.html
Maybe XPCSafeJSObjectWrappers are a solution for this problem, but only in Firefox 3.
Setting window location to a JavaScript URL aborts all loading that is still in progress, stops animated GIFs and probably also clears all timeouts set by JavaScript. So the side-effects are rather numerous. But if one doesn't care, using this approach should indeed be safer, at least with respect to potential not yet discovered security holes in the browser.
@Ares2: Should be:
Code: Select all
location.href = "javascript:void(window.reklama = function(){})";
Yes, now it works.Wladimir Palant wrote:@Ares2: Should be:Code: Select all
location.href = "javascript:void(window.reklama = function(){})";
Correct me if I'm wrong but these scripts work for every function x using window.location = "url" ?