Results 1 to 8 of 8

Thread: Doubleclick cookies

Hybrid View

  1. #1
    YK Guest

    Re: Doubleclick cookies

    Vanguard wrote:
    > SpywareBlaster adds a list of domain in IE under Tools -> Internet
    > Options -> Privacy where you click Edit to see which are listed as
    > Always Allow and Always Block. SpywareBlaster adds domains with the
    > Always Block attribute.


    I always wondered how they got there. Thanks.

    I use IE-SPYAD, WinPatrol Free and CookieCop2 V2.2.
    http://www.staff.uiuc.edu/~ehowes/resource.htm#IESPYAD updated usually
    weekly.
    http://www.winpatrol.com
    CookieCop2 is a PCMagazine utility but is subscription based now.

    I guess Cookie management could have its own topic so thanks for this good
    explanation.

    > Note that Doubleclick has several domains. If you want to deny any
    > connects Doubleclick, you can define rules in your firewall to block
    > connections to them. You could try blocking on a URL rule with
    > ".doubleclick." and hope that it only blocks connections to domains
    > with that in the domain portion of the URL, but it would also block
    > something like "http://somewhere.com/somepath/my.doubleclick.jpg".
    > So I block on (and showing some other common polluters):
    >
    > atdmt.com
    > doubleclick.com
    > doubleclick.net
    > doubleclick.us
    > doubleclick.org
    > fastclick.biz
    > fastclick.com
    > fastclick.net
    > hitbox.com
    > websidestory.com
    > x10.com
    >
    > I add these under the Parental Control section in Norton Internet
    > Security. If you have another firewall and you are using these in a
    > URL block then prefix them with a period and postfix a trailing
    > slash, like ".doubleclick.com/", just to help ensure you specify a
    > domain and not some path under it. If your firewall allows you to
    > specify regular expressions then maybe something like
    > "*.doubleclick.*/" or "//*.doubleclick.*/" would be usable (you might
    > have to escape the slash character and have to use
    > "////*.doubleclick.*//").
    >
    > I actually wanted to use the URL blocking in my router so other hosts
    > on my intranet wouldn't end up connecting to those sites. Alas my
    > router doesn't allow many entries in its URL block list nor do they
    > allow wildcarding. Once the domain or URL blocking is enabled in the
    > firewall, a good check is to visit http://www.cheaptickets.com/ which
    > makes extensive use of Doubleclick. The links might still display on
    > the page (unless you have ad blocking also enabled) but when you click
    > on them you get a "page not found" or a default page from your
    > firewall noting the block.
    >
    > Using a firewall to block connects to Doubleclick will not prevent a
    > web site from writing cookies that can be used by Doubleclick. My
    > understanding is that scripts are used to write and read cookies, so
    > if scripting is disabled then a new cookie cannot be written and an
    > old cookie cannot be read. But so many legitimate web sites use
    > scripts that you usually find that you want to leave it enabled. So
    > blocking the cookie using Always Block in IE is another way to keep
    > clean. However, using the cookie Always Block only works for the user
    > that is logged on at the time this list is updated, so other users
    > logging onto the same host won't be protected unless they also run
    > SpywareBlaster (and include the cookie immunizations). The cookie
    > allow/block list gets saved in the registry under
    > HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Internet
    > Settings\P3P\History"; blocked domains have a value of 5 while allowed
    > domains gets a value of 1. Since this is a user registry hive, each
    > user has a different instance of this registry key so each user must
    > run SpywareBlaster to add the blocked cookie domains.
    >
    > I use PopUp Cop to eliminate popup windows (rather than disabling
    > javascript). It has has "dynamic" cookie management. You can use
    > products like Cookie Wall and others to manage cookies but you end up
    > periodically having to check and do the deletes yourself, or you end
    > up having to leave a constantly running background program to monitor
    > cookies and delete any not on a whitelist. PopUp Cop's cookie
    > management also uses a whitelist; domains you list will not have their
    > cookies deleted while all others get purged. It effectively forces
    > all non-whitelisted cookies to be per-session cookies. Even
    > per-session cookies sometimes don't get deleted when you exit IE, but
    > PopUp Cop will make sure they get deleted. Since PopUp Cop is only
    > active when IE is loaded, and since that's the only time you need
    > cookie management, it works when it is appropriate rather than
    > leaving some program always running in the background. You can also
    > choose to ignore cookies from domains in the Trusted security zone;
    > if the sites are trusted then presumably you trust their cookies.
    > However, I still leave IE configured to accept 1st party cookies,
    > BLOCK 3rd party cookies, and allow per-sesion cookies. A legit
    > domain shouldn't have to use 3rd party cookies. Another option is to
    > not delete cookies in IE's Always Allow list. So not only can you
    > specify which domains in PopUp Cop to keep their cookies but you
    > don't end up obviating IE's own Always Allow list. Domains can be
    > wildcarded in PopUp Cop's cookie manager so you can use something
    > like "*.domain.tld" and not have to worry if the cookie is for the
    > domain or for a subdomain. Rather than disable some functionality of
    > a site that needs cookies during that session, they can write and
    > read their cookie but it won't be there after I exit the last
    > instance of IE.
    >
    > "Ken Russell" <rusty@theseams.com.au> wrote in message
    > news:3f84d777$0$14559$afc38c87@news.optusnet.com.a u...
    >> Spybot will remove existing cookies. To prevent them from
    >> re-infecting, use Spyware Blaster
    >> http://www.javacoolsoftware.com/spywareblaster.html
    >>
    >> Ken Russell
    >>
    >> "George Weischadle" <gweischadle@earthlink.net> wrote in message
    >> news:6l4hb.3710$dn6.1847@newsread4.news.pas.earthl ink.net...
    >>> I just cleaned and immunized my PC using Spybot. Went online
    >>> again, ran a check, and found Doubleclick cookies present. Does
    >>> immunization just prevent these cookies from doing their nasty
    >>> deed, or is it supposed to prevent them from being written again to
    >>> the hard drive? Sorry if this is a dumb question - I'm a newbie
    >>> here ... )
    >>>
    >>> George



  2. #2
    Chuck Guest

    Re: Doubleclick cookies

    On Thu, 09 Oct 2003 16:18:07 GMT, "YK" <YKnot@home.invalid> wrote:

    >Vanguard wrote:
    >> SpywareBlaster adds a list of domain in IE under Tools -> Internet
    >> Options -> Privacy where you click Edit to see which are listed as
    >> Always Allow and Always Block. SpywareBlaster adds domains with the
    >> Always Block attribute.

    >
    >I always wondered how they got there. Thanks.
    >
    >I use IE-SPYAD, WinPatrol Free and CookieCop2 V2.2.
    >http://www.staff.uiuc.edu/~ehowes/resource.htm#IESPYAD updated usually
    >weekly.
    >http://www.winpatrol.com
    >CookieCop2 is a PCMagazine utility but is subscription based now.
    >

    Analogx CookieWall (
    http://www.analogx.com/contents/download/network.htm ) is free. Other
    products like it too.

    I use AdAware, Spybot, and HijackThis regularly. I also check my
    browsers for vulnerabilities:
    http://www.jasons-toolbox.com/BrowserSecurity/
    http://bcheck.scanit.be/bcheck/index.php
    https://testzone.secunia.com/browser_checker/


    Chuck
    I hate spam - PLEASE get rid of the spam before emailing me!
    Paranoia comes from experience - and is not necessarily a bad thing.

  3. #3
    Jay T. Blocksom Guest

    Re: Doubleclick cookies

    On 9 Oct 2003 11:59:05 -0500, in <alt.privacy.spyware>, Chuck
    <cacrollthespam@yahoo.com> wrote:
    >

    [snip]

    > Analogx CookieWall (
    > http://www.[REDACTED].htm ) is free.

    [snip]

    It's also written and distributed by a sociopathic loon who *deliberately*
    plants open-proxy trojans on unsuspecting users' systems.

    <http://groups.google.com/groups?q=AnalogX+group:news.admin.net-abuse.email&hl=en&lr=&ie=UTF-8&sa=G&scoring=d>

    --

    Jay T. Blocksom
    --------------------------------
    Appropriate Technology, Inc.
    usenet01[at]appropriate-tech.net


    "They that can give up essential liberty to obtain a little temporary
    safety deserve neither liberty nor safety."
    -- Benjamin Franklin, Historical Review of Pennsylvania, 1759.

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    NOTE: E-Mail address in "From:" line is INVALID! Remove +SPAMBLOCK to mail.
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Unsolicited advertising sent to this E-Mail address is expressly prohibited
    under USC Title 47, Section 227. Violators are subject to charge of up to
    $1,500 per incident or treble actual costs, whichever is greater.
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •