Found out about the Coral CDN from G's site. Thought a bit about it and then wrote some Javascript.
Basically want to redirect users that can access the Coral CDN to use the Coral CDN, and not affect those that can't.
So wrote a little 'coralize' script, linked to it through the CDN (http://adblock.mrbene.net.nyud.net:8090/coralize.js) on my About page, and let it fly.
Updated script to be:
var host = location.hostname var path = location.pathname var port = location.port if (port != "8090") { if (port != "80" && port != "") { host += "." + port; } host += ".nyud.net"; port = 8090; history.go(-1); window.location = "http://" + host + ":" + port + path; }
This version handles web sites that don't serve from port 80. Will update the site shortly.
Moved this on to it's own page, it's the whole:
if (window._AdblockFiltered) { alert("You are using Adblock to block ads") }
Try it here.
Have been thinking for ages about how to go directly from one base (like hex) to another base (like binary) without an intermediary base. The common intermediary is base 10, at least when you're not going from common, easy ones like 16 to 2.
Like if you were to go from 6 to 7.
The trick is to express the target base in the origin base. So if you're converting from base 6, you're converting to 11base6.
You don't know the relief!
First off, completely unrelated, but here's the best quick Regex primer ever.
The apartment that I live at these days only has dialup internet access. A bit slow sometimes, but very cheap and unlimited downloads. Problem is, when Limewire manages to get a good connection, everyone else suffers.
Anyways, found a great bandwidth limiting with tc and iptables doc over here, and made a few modifications.
Not much on the tc script side of things, but since we only want to affect gnutella traffic (underlying protocol for Limewire), the iptables rules were modified to look for the two most popular ports that my Limewire was binding to:
$IPTABLES -t mangle -A FORWARD -p udp -m multiport --ports 6346,6348 -j MARK --set-mark 4 $IPTABLES -t mangle -A FORWARD -p tcp -m multiport --ports 6346,6348 -j MARK --set-mark 4
Pretty useful.
The 0.5.6+ builds now contain a few modifications to the filterset that was initially included. This is the current filterset. Let me know of any irritating initial false positives.
.directresponse.com .falkag.net /(au|us)\.a1\.yimg\.com/ /[\W](blog|get|online)ads?[\W]/ /[\W](double|fast)click[\W]/ /[\W_]ads?(banner|click|flow|frame|ima?ge?|log|serv(er|e)?|stream|type|view|vert(ising|isement)?|v|js|trix|xchange|wrapper)?s?[\W\d_]/ /\.geocities.com/js_source/(ygNSLib9|pu5geo).js/ /\D(728|588|468|234|160|120)x(600?|90)\D/ /\Wservlet\W/ /banner(s|\d|id=\d*)?[\W_]/ atdmt.com
Default filter set for the most recent build:
.directresponse.com .falkag.net .googlesyndication. /[\W](blog|get|online)ads?[\W]/ /[\W](double|fast)click[\W]/ /[\W]ads?(banners?|click|flow|frame|ima?g(es?)?|log|serv(er|e)?|stream|type|view|vert(ising|isements?)?|v|js|trix|xchange|wrapper)?s?[\W\d_]/ /\.geocities.com/js_source/(ygNSLib9|pu5geo).js/ /\D(728|588|468|234|160|120)x(600?|90)\D/ /\Wservlet\W/ /banner(s|\d|id=\d*)?[\W_]/ atdmt.com us.yimg.com/a/ yimg.com/*.js
Recently "updated" to MSN Messenger 7. Got tired of ads in there. Here's what you want to do.
Get rid of tabs by adding the "DisableTabs" Dword in "HKEY_CURRENT_USER\Software\Microsoft\MSNMessenger". It should have a value of "1".
Get rid of ads by blocking access to "config.messenger.msn.com", iptables does it nicely with:
iptables t nat -I POSTROUTING -d "config.messenger.msn.com" -p tcp -dport 80 -j DROP
You could also modify your hosts file.
Yay!
Conditions added, based on the the Mozilla docs.
function install (aEvent) { var supported = /Mozilla/.test(navigator.appCodeName) && /Netscape/.test(navigator.appName); if (!supported) { if (!confirm ("Unable to begin installation.\nYour web browser is not supported.\nTry Anyway?")) { return false; }; };if (!InstallTrigger.updateEnabled()) { if (!confirm ("Unable to begin installation.\nSoftware updates are disabled.\n Try Anyway?")) { return false; }; }; { var params = { "Adblock Ghastly Whitelist Hack": { URL: aEvent.target.href, IconURL: aEvent.target.getAttribute("iconURL"), toString: function () { return this.URL; } } }; InstallTrigger.install(params); return false; } }
Here's what's going on in my blocking these days.
/(au|us)\.a1\.yimg\.com/ /[\/\&\?\.](reg)?promo(iframe|toolbar|ima?ge?s?)?[\/\=\.]/ /[\/\&\?\.]partner(s|id|2profit)?[_\/\=\.]/ /[\/\&\?\.]xxx(toolbar|ima?ge?s?)?[\/\=\.]/ /[\/\&\?](user|special)?banner(s|id|[0-9])?[\/\=\.]/ /[\/\&\?]affiliate(s|id)?[\/\=\.]/ /[\/\-]sifr[\-\_]?([a-z]*|\d*)\.js/ /[\/\.\?\_\=\-\&\d](get|se?rve?r?|blog|sky|view|text)?ad(s|se?rve?r?|client|vert(is(e|ing))?|id|\d|js|data)?(wrap(per)?|type|space|log|size|pop(p?er|up)?|end|v[\d]+|sys|-cache)?[\d\/\.\?\_\=\&]/ /\.ru/(\w[\.\-/]?)+\?(.*\=.*\&)(.*\=.*\&?)+/ /\/icon-inline.*\.gif/ /\/intellite?xt\// /\/sponsor(s|ship|[0-9]|ed(by|link)?)?[\.\/-]/ /amazon\.com\/[a-z]\/cm\?/ /domainpark\.cgi\?.+\=.+/ /dtmpub\.com\/.*\.js/ /falkag\.(de|net)/ /kanoodle\.com\/cgi-bin\/(k|c)ontext.cgi/ /overture\.com.*ctxt/ /tsgonline\.com/.*popup\.js/ 2o7.net 64.27.100.65 @@/\.runescape\.com/ @@http://gmail.google.com @@http://images.google.com adbrite.com afcyhf.com/image ar.atwola.com atdmt.com cache.directorym.com casalemedia.com/s? cnn.com/ctxtlink/ dealtime.com/scripts ebay.com/ws/eBayISAPI.dll extreme-dm.com fastclick.net ftjcfx.com/image geocities.com/js_source geocities.com/js_source/div.js google/box googleadservices.com/pagead industrybrains.com/jsinsert jmsp.net/label_v4/external maxserving.com/gen.js mediaonenetwork.net/client overture/iframe overture_news pro-market.net/engine register.com/us? rpts.net search.com/search? servedby.advertising.com specificclick.net tradedoubler.com webpdp.gator.com zedo.com