Appreciate this information.. But curious looking into the source page how did you determine that the directory to block is /adimage? I couldn't see anything mentioning adimage at all in the source. Even page info did not show any reference to the /adimage folder.
molitar wrote:how did you determine that the directory to block is /adimage?
ABP has this tool for analysis: http://adblockplus.org/images/71.png
It basically tells use when there are certain javascript files we can block. Or it can tell us what ABP is currently blocking if we want to know which items we want to unblock. Depending on the sites, doing either of these above can prevent detection tricks like this one.
It is initiated by Ctrl+Shift+V
molitar wrote:how did you determine that the directory to block is /adimage?
ABP has this tool for analysis: http://adblockplus.org/images/71.png
It basically tells use when there are certain javascript files we can block. Or it can tell us what ABP is currently blocking if we want to know which items we want to unblock. Depending on the sites, doing either of these above can prevent detection tricks like this one.
It is initiated by Ctrl+Shift+V
Excellent.. thanks for that tip.. I see how it works now trying it out myself.
molitar wrote:I couldn't see anything mentioning adimage at all in the source.
I played a bit with that site just now. It looks like they have the code in external script files, so instead of whitelisting, you can also block this file:
molitar wrote:I couldn't see anything mentioning adimage at all in the source.
I played a bit with that site just now. It looks like they have the code in external script files, so instead of whitelisting, you can also block this file:
I have a site here that does the same but does not include a .js file, which can easily be blocked. They include it in the code of every specific .php file.
<script type='text/javascript'>
jQuery(function() {
var scripts = document.getElementsByTagName("script");
for(var i = 0; i < scripts.length; i++)
var script = scripts[i];
if (script && ((script.getAttribute("src") != null &&
script.getAttribute("src").match("http://m-serving.com")) ||
script.style.display == "none")) {
parent.location.href = "http://www.bold.dk/beklager.php";
}
}
});
</script>
How would I go about blocking this? NoScript does the trick but also blocks the poorly programmed dropdown menu used by this site (http://bold.dk). I would like to just be able to filter out the above mentioned specific script but I can't find a way.
Magnethead wrote:
How would I go about blocking this?
I would like to know this as well. There is a major media blowup about adblocking in Denmark right now, and several major sites are using the hack mentioned to exclude users with adblocker. Would love to provide people with a better solution than using no-script.