<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Double underline ads in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665715#M41700</link>
    <description>Thanks Patrick; I'll give it a try.</description>
    <pubDate>Thu, 29 Jul 2010 15:02:38 GMT</pubDate>
    <dc:creator>Vernon Brown_4</dc:creator>
    <dc:date>2010-07-29T15:02:38Z</dc:date>
    <item>
      <title>Double underline ads</title>
      <link>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665706#M41691</link>
      <description>Web pages served out by my web server have double underline links added to text on the pages. I researched and found that Vibrant Media created the technology and that intellitext.com and kontera.com serve out the spam ads so linked.&lt;BR /&gt;&lt;BR /&gt;I'm running Apache web server and named on the internet, but do local access through 192.168.1.xxx type links. The links appear on the thus served out.  &lt;BR /&gt;&lt;BR /&gt;Has my server been hacked?  &lt;BR /&gt;&lt;BR /&gt;I've looked at running processes and don't see anything unusual. I rebooted the server.&lt;BR /&gt;&lt;BR /&gt;My concern is that my server may be serving out spam ads.</description>
      <pubDate>Sat, 24 Jul 2010 15:03:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665706#M41691</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2010-07-24T15:03:08Z</dc:date>
    </item>
    <item>
      <title>Re: Double underline ads</title>
      <link>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665707#M41692</link>
      <description>Update:&lt;BR /&gt;&lt;BR /&gt;I unpluged my router from the DSL modem. My Apache server still serves out local pages. The ad links are gone.&lt;BR /&gt;&lt;BR /&gt;I pluged my router back in to the DSL modem. Double underline ads then appear on my own pages served out from my own local server.&lt;BR /&gt;</description>
      <pubDate>Sat, 24 Jul 2010 17:51:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665707#M41692</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2010-07-24T17:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: Double underline ads</title>
      <link>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665708#M41693</link>
      <description>As far as I understand, those ads are based on small piece of HTML included on the page source, that tells the browser to load from intellitxt.com the javascript that adds the advertisements to the content. So it is the client browser that does most of the work.&lt;BR /&gt;&lt;BR /&gt;The code is normally at the end of the HTML file, just before the  tag. It should look somewhat like this:&lt;BR /&gt;&lt;BR /&gt;&amp;lt; !-- start Vibrant IntelliTXT script section -- &amp;gt;&lt;BR /&gt;&amp;lt; script type="text/javascript" src="&lt;A href="http://yourdomain.us.intellitxt.com/intellitxt/front.asp?ipid=1234" target="_blank"&gt;http://yourdomain.us.intellitxt.com/intellitxt/front.asp?ipid=1234&lt;/A&gt;"&amp;gt;&amp;lt; /script &amp;gt;&lt;BR /&gt;&amp;lt; !-- end Vibrant IntelliTXT script section-- &amp;gt;&lt;BR /&gt;&lt;BR /&gt;See the Vibrant Media's instructions for implementing IntelliText:&lt;BR /&gt;&lt;A href="http://www.vibrantmedia.com/publishers/implementation.asp" target="_blank"&gt;http://www.vibrantmedia.com/publishers/implementation.asp&lt;/A&gt;&lt;BR /&gt;(For removal, simply reverse the instructions.)&lt;BR /&gt;&lt;BR /&gt;Ask your web content designer (or whoever makes the decisions about the web content) if this is intentional and appropriate.&lt;BR /&gt;&lt;BR /&gt;Counter-arguments:&lt;BR /&gt;&lt;BR /&gt;- The intellitext.com/kontera.com maintainers can get information about the usage patterns of your internal website, through the referrer information passed by the client browser when fetching the ads. This can be considered an information leak.&lt;BR /&gt;&lt;BR /&gt;- Who gets the revenue from this ad campaign? (If this is the web content designer's own idea, does the money go straight into his/her pocket?)&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Sat, 24 Jul 2010 18:04:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665708#M41693</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2010-07-24T18:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: Double underline ads</title>
      <link>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665709#M41694</link>
      <description>Thanks, that's good to know. However, I wrote the html code for web pages that I see the ads on. I'll check the pages to see if they were somehow hacked.</description>
      <pubDate>Sat, 24 Jul 2010 19:20:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665709#M41694</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2010-07-24T19:20:44Z</dc:date>
    </item>
    <item>
      <title>Re: Double underline ads</title>
      <link>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665710#M41695</link>
      <description>I looked at the web page source html of a page that I see the ads on. I didn't find any thing extra in it.&lt;BR /&gt;&lt;BR /&gt;I'll write a test page that's very short and see how that works.</description>
      <pubDate>Sat, 24 Jul 2010 19:49:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665710#M41695</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2010-07-24T19:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: Double underline ads</title>
      <link>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665711#M41696</link>
      <description>Update:&lt;BR /&gt;&lt;BR /&gt;I think I know what may be happening. I suspect that after viewing a page that has the code that summons the java script, the script stays active in the computer memory.&lt;BR /&gt;&lt;BR /&gt;Subsequent pages that do not have the java summoning code are never-the-less, text linked.&lt;BR /&gt;</description>
      <pubDate>Sat, 24 Jul 2010 20:54:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665711#M41696</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2010-07-24T20:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: Double underline ads</title>
      <link>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665712#M41697</link>
      <description>Update:&lt;BR /&gt;&lt;BR /&gt;I discovered unusual activity by my name server, named. It's purpose is to serve my local non-routed network.&lt;BR /&gt;&lt;BR /&gt;About every three seconds it sends a packet even though no local requests are made to it.&lt;BR /&gt;&lt;BR /&gt;My logs show no activity from IntelliTEXT.&lt;BR /&gt;&lt;BR /&gt;Does anyone know of spam activity involving compromise of name server and double underline ads on text?</description>
      <pubDate>Wed, 28 Jul 2010 14:56:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665712#M41697</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2010-07-28T14:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: Double underline ads</title>
      <link>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665713#M41698</link>
      <description>Update:&lt;BR /&gt;&lt;BR /&gt;Shut down name server and use HOSTS file for local network nameserver. Double underline ads are gone.&lt;BR /&gt;&lt;BR /&gt;Just as a heads up. There is a spamer who uses named to send double underline link spam.&lt;BR /&gt;&lt;BR /&gt;Will configure named to run in chroot jail, but doubt that this will help. The compromise to named seems to be overflow of the named input buffer.&lt;BR /&gt;&lt;BR /&gt;Does anyone know of a packet sniffer that can capture packets going to the bind port 53?</description>
      <pubDate>Thu, 29 Jul 2010 10:56:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665713#M41698</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2010-07-29T10:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: Double underline ads</title>
      <link>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665714#M41699</link>
      <description>Wireshark should be able to catch these.</description>
      <pubDate>Thu, 29 Jul 2010 14:35:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665714#M41699</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2010-07-29T14:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: Double underline ads</title>
      <link>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665715#M41700</link>
      <description>Thanks Patrick; I'll give it a try.</description>
      <pubDate>Thu, 29 Jul 2010 15:02:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/double-underline-ads/m-p/4665715#M41700</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2010-07-29T15:02:38Z</dc:date>
    </item>
  </channel>
</rss>

