Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
----- Original Message ----- From: "Scott Prive" <scottprive at earthlink.net> To: <ron.peterson at yellowbank.com>; "Bill Horne" <bill at horne.net> Cc: "BLU Discussion List" <discuss at blu.org> Sent: Saturday, March 08, 2003 3:40 PM Subject: Re: Is there a Proxomitron clone for Linux? > > ----- Original Message ----- > From: <ron.peterson at yellowbank.com> > To: "Bill Horne" <bill at horne.net> > Cc: "BLU Discussion List" <discuss at blu.org> > Sent: Saturday, March 08, 2003 2:51 PM > Subject: Re: Is there a Proxomitron clone for Linux? > > > > On Sat, Mar 08, 2003 at 01:04:56AM -0500, Bill Horne wrote: > > > I've had good results using The Proxomitron ad-blocker on my windoze > box, > > > and would like to get an equivalent filter for Linux. > > > > > > Please pass along your opinions about how I can best eliminate pop-ups, > > > animated GIF's, etc. All suggestions welcome. > > > > Mozilla allows to disable javascript from opening unrequested windows. > > > > As for animated gifs, one solution is to use a caching dns server setup > > to send dns queries for the domains hosting the ads into the abyss. Two > > steps: (1) configure your dns server to be authoritative for the > > domains, (2) configure your resolv.conf to use localhost for name > > lookups. If you're using a dhcp client to set resolv.conf, you'll > > likely need to edit the client's config to manually override the > > nameserver setting. > > > > I have a named.conf based on debian stable's bind9 config at home that > > looks like so: > > [snip] > > That's a good idea, and here are a couple of alternatives: > > 1) apply the same host spoofing to your hosts file (Windows has one, also). > 2) Use Mozilla's "block all images from this server" feature. > > Note that all three of these methods are ineffective when the ads are hosted > on a "regular" server (you can block/spoof fine, but you eliminate > legitimate images as well). > > For these types of ads, you must use some kind of ad-blocking proxy, where > the proxy has some list (or pattern match) on ad-related images. This is how > squid_redirect works... it is a collaboratively-maintained list of regex > patterns, allow-exceptions and deny-exceptions. My Linux firewall/web/Mailman server is a 486 with 48MB of ram and 2GB of HD. Squid would be way too much for the machine, which has only 300 MB of spare disk. I will, however, poison the hosts file as suggested: please pass along your hosts files, and thanks in advance. Thanks for the info on Mozilla: I didn't think to check that, given the similarity to Netscape. Serves me right for putting the chicken before the egg ;-). Bill
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |