delete all board cookies ?

Gawd I wish tracking belligerent and/or reckless drivers was as easy as it is to track people though their cookies.
 
I wonder how too. I'm getting worried. Is it possible that ES is one of the bad sites that snoops around for IP addresses. Isn't that illegal?

So glad you're investigating this. I hope you'll get to the bottom of this and share with everyone. Thanks for your effort.
 
SamTexas said:
I wonder how too. I'm getting worried. Is it possible that ES is one of the bad sites that snoops around for IP addresses. Isn't that illegal?

So glad you're investigating this. I hope you'll get to the bottom of this and share with everyone. Thanks for your effort.

I got logged out so the cookies are need to stay logged in ?

There are computer programs that are snooping around on E.S.

E.S. is getting snooped on. :)

I would not be too worried unless you are up to something you should not be ?

Not much we can do about it. I have some new tools I am learning how to use to study how websites work.

This is a good site to study.
 
A good way to learn about this forum is to make your own PHP forum. I did it. It's free. Evil Demons got into my forum and went crazy. Guy from the server company called me and told me to delete the whole thing. One interesting thing that I was able to see was the city, town, and country of every member who joined my forum.

Go here to see a screen shot of my forum on the day that I killed it. http://voltev.com/forum/
 
You can view everyone (or bot) that ever came to your forum by reverse-IP lookup. No science there; just plain lookup table.

It becomes more challenging though when one wishes to block those addresses: Individuals (and many bots) are easy to trap, but countries are a whole 'nother matter and require a lot of time and energy and diligence.

WARNING: If you are not a developer and can't read HTML - STOP HERE!!! You'll just get confused and mess up your system.

The best way to block ips on the client (with a Windows OS; I can't speak for others) is by manipulating the Hosts file which is located at:

<windows drive>/System32/drivers/etc/hosts

Note that there is no extension for the "hosts" file, however you can open and edit it using Notepad with Admin rights:
Navigate to Start|All Programs|Accessories|Notepad and Right-click on the application. Select "Run as administrator" then open the file (need to switch to "All files (*.*)") and select "hosts".

Mine presently looks very much like this:

Code:
# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
#      102.54.94.97     rhino.acme.com          # source server
#       38.25.63.10     x.acme.com              # x client host

# localhost name resolution is handled within DNS itself.
#	127.0.0.1       localhost
#	::1             localhost
127.0.0.1       1and1.com
127.0.0.1       a.rad.msn.com
127.0.0.1       ad.doubleclick.net
127.0.0.1       ad.fed.adecn.com
127.0.0.1       adclick.g.doubleclick.net
127.0.0.1       adition.com
127.0.0.1       adpredictive.com
127.0.0.1       Ads.msn.com
127.0.0.1       ads.nwsource.com
127.0.0.1       ads.pulse360.com
127.0.0.1       ads2.msads.net
127.0.0.1       adshuffle.com
127.0.0.1       adnxs.com
127.0.0.1       ad.yabuka.com
127.0.0.1       content.pulse360.com
127.0.0.1       adbrite.com
127.0.0.1       adsyndication.msn.com
127.0.0.1       advertising.com
127.0.0.1       atdmt.com
127.0.0.1       b.ads2.msads.net
127.0.0.1       burstnet.com
127.0.0.1       click.pulse360.com
127.0.0.1       clickbooth.com
127.0.0.1       cpcserve.clickbooth.com
127.0.0.1       jmp.clickbooth.com
127.0.0.1       clickserv2.sitescout.com
127.0.0.1       clk.atdmt.com
127.0.0.1       content.pulse360.com
127.0.0.1       criteo.com
127.0.0.1       doubleclick.net
127.0.0.1       dspads.sitescout.netdna-cdn.com
127.0.0.1       g.msn.com
127.0.0.1       googleads.g.doubleclick.net
127.0.0.1       googlesyndication.com
127.0.0.1       legolas-media.com
127.0.0.1       lucidmedia.com
127.0.0.1       local.ads.nwsource.com
127.0.0.1       m.adnxs.com
127.0.0.1       match.com
127.0.0.1       mathtag.com
127.0.0.1       media.contextweb.com
127.0.0.1       media.match.com
127.0.0.1       media6degrees.com
127.0.0.1       mf.sitescout.com
127.0.0.1       mfcdn.s3.amazonaws.com
127.0.0.1       msads.net
127.0.0.1       msnbc.pgpartner.com
127.0.0.1       nbcudigitaladops.com
127.0.0.1       netdna-cdn.com
127.0.0.1       orbengine.com
127.0.0.1       pagead2.googlesyndication.com
127.0.0.1       pixel.quantserve.com
127.0.0.1       pubmatic.com
127.0.0.1       pulse360.com
127.0.0.1       pulsemgr.com
127.0.0.1       quantserve.com
127.0.0.1       r1-ads.ace.advertising.com
127.0.0.1       rad.msn.com
127.0.0.1       relestar.com
127.0.0.1       ru4.com
127.0.0.1       s0.2mdn.net
127.0.0.1       serving-sys.com
127.0.0.1       sitescout.com
127.0.0.1       tag.admeld.com
127.0.0.1       this.content.served.by.adshuffle.com
127.0.0.1       triggit.com
127.0.0.1       tubemogul.com
127.0.0.1       turn.com
127.0.0.1       uac.advertising.com
127.0.0.1       view.atdmt.com
127.0.0.1       web.adblade.com
127.0.0.1       yieldmanager.net
127.0.0.1       zedo.com

The concept is simple:
127.0.0.1 routes back to your machine which is trusted. The hosts file allows you to map wayward ips as you wish. Pesky advertisers I route to a null and void address.

Before you begin, rename your old hosts to "hosts.save" or "hosts.old" or "hosts.bak" (whatever you wish). After you save the hosts file, kill all browser instances. Go into your browser and clear the cache, clean up your hard drive and remove all temp files; be thorough as you wish. Reboot if you want. Open a new browser instance and go to a known pesky advertising site - like NBCNEWS.com (which I like to read but really hate the low-brow advertising). If successful - most advertising will show up blank. :mrgreen:

This solution will not solve every issue, and it also requires maintenance. There are sites on the Internet dedicated to maintaining hosts files; I stopped a long time ago and just rolled my own. You too can do this using Internet Explorer by selecting "F12" which enabled the Developers Tools for IE. If you don't have this capability then search Google with the expression "internet explorer developer tools"; the downloadable toolbar is here.

I enjoy hunting down bad behaving advertisers; it's a game to me :twisted:

With the Dev toolbar, select "Find" and highlight the pesky advertiser; it might be buried/nested within other elements. I can't teach you how to do this - which it why it helps if you can really read HTML. No BS... you can really #$%^& your system up pretty easily so be careful. You want to find the source of the ad and it might be inflected by JS which is another language you'll need to know like the backside of your partner in crime. Follow it through and find the domain name or the IP addy. Test the address/domain to be sure it's the critter responsible. If successful, add it to your hosts file as indicated in the example provided.

The host file is just one tool in the folio.

We can also block domains, addresses, and countries from our domain. That's another story. Buy me a virtual pint and I'll spill the details. Be sure to tip the bartender; he has a family too :wink:

<slurp coffee, slurp some more> KF
 
I forgot to add that with the hosts file – we can also redirect particular incoming ips to different addresses instead of LOCALHOST.

For example, let’s say you work for MangyOrwell.Com that lurks on everything that you do. Like 99.98% of red-blooded humans you browse the web in your copious free time cos your job is pure tripe. You go to Amazon looking for that special deal. The boot-licking toady Sys Admin can obscure your activity by mapping Amazon.com to an internal ip that resolves as “getBack2WorkULazyPhuktard.htm” with an embedded wave file that plays a sound like that of a taskmaster cracking a cat-o-nine-tails dipped in brine at your shredded back, chained as you are with war drums pounding to the oar of a sinking ship…

But I digress.

The power to control YOUR fate is right in front of you. Everything that comes to your door is observable more easily than THEY (including thyn, those, & them) can observe.

Be proactive. :wink:

Katy bar the door, KF
 
Back
Top