 rudnickePremium join:2004-10-23 Rantoul, IL kudos:3 | [IL] WTF? Popups from MediaCom???? So I open my browser this afternoon, and on top of the Google page is an add for a cell phone plan. It has two buttons, one of them said Opt Out. I clicked it thinking it was just another Google ad. Low and behold, it took me to a MediaCom page stating that I had opted out of future advertisements.
Is MC running that new deep packet inspection hardware that pushed behaviour based ads?
If so, I'm dropping them like a lead balloon. -- One Big Ass Mistake America |
|
 burner50Proud Union THUGPremium,VIP join:2002-06-05 kudos:1 | This is VERY interesting...
I'm not on a Mediacom Connection ATM, but given the amount of ads on their "helper" page that they were redirecting hijacked DNS queries to, It really wouldn't surprise me. -- I'm tired of killing stupid people just trying to do my job and go home! |
|
 | reply to rudnicke I'd said it's very disturbing if that's the case. I have not seen this on my Mediacom connection.
I just went to that general preference page (the one that is broken; where you suppose to be able to opt out of the redirects and typos) and it did not have any additional options or changes to reflect what you've described. Unless it's accessed via a different link? But then again, I've not seen what you're describing. |
|
 1 edit | reply to rudnicke
Re: [IL] WTF? Popups from MediaCom????I came to this site to complain about this exact problem. At first I thought Google had placed an ad on their website for their Google Voice Service. If you click the ad you get taken to: http://www.getmediacomtoday.com/phoneup.htmlIf you click either No Thanks or Opt out you get taken to: http://97.64.255.1:8080/cgi-bin/ackhttp://97.64.255.1:8080/cgi-bin/optoutI even took a screencap: » i.imgur.com/6490O.pngIt looks like it adds some scripts to add the banner and all that: <noscript><meta http-equiv="refresh" content="0;URL=http://97.64.255.1:8080/cgi-bin/noscript.pl?policy=14&category=Marketing+Messages&"></noscript>
<script type="text/javascript">var version=2; var webServer="http://97.64.255.1:8080";</script>
<noscript><frameset><frame src="http://97.64.255.1:8080/cgi-bin/noscript.pl?policy=14&category=Marketing+Messages&"></frameset></noscript>
http://97.64.255.1:8080/bg/PhoneUp.2.11/index.jshttp://97.64.255.1:8080/bg/manager.jshttp://97.64.255.1:8080/bg/bulletin.jsIs it even legal to inject your own code into other people's websites? |
|
 mnt join:2004-10-03 Baldwin, AL 2 edits | reply to rudnicke This is outrageous. I saw this for the first time today when visiting apple.com
»cl.ly/2V1P461s3y1A113k1P3D
Mediacom injecting their own advertising into my web browser is way, way, way over the line. As I understand it, I pay Mediacom to deliver internet service to my home. If Mediacom begins using that paid service for their own financial benefit, I think a significant reduction in my monthly bill is in order. As it stands, this is like the equivalent of Mediacom inserting their own ads onto HBO and Showtime.
The fact that I've had to opt-out of Mediacom's 404 hijacking over, and over, and over again makes me feel particularly sick about this latest trick. |
|
|
|
 jg0 join:2010-07-21 Dubuque, IA | reply to Turbocpe I got this same exact ad today. I am using OpenDNS and very disappointed. If Qwest was more than 1.5 Mbps at my location I would be placing an order. |
|
 rudnickePremium join:2004-10-23 Rantoul, IL kudos:3 | reply to mnt Whew!!! I'm not crazy!!!
That is the exact same ad I saw pop up on Google. -- One Big Ass Mistake America |
|
 cemig join:2007-01-17 Spring Valley, MN | reply to rudnicke Any network hardware designed to inject Javascript into third-party web pages is a colossally stupid idea for an ISP. Just think of what will happen when (not if) someone hacks into the injection server and adds a bulletin containing malicious code. Is Mediacom really ready to handle the backlash from their entire subscriber base becoming infected by a marketing gimmick? There are plenty of spammers out there that would love to be able to infect an entire ISP at a time. |
|
 | said by cemig:Any network hardware designed to inject Javascript into third-party web pages is a colossally stupid idea for an ISP. Just think of what will happen when (not if) someone hacks into the injection server and adds a bulletin containing malicious code. Is Mediacom really ready to handle the backlash from their entire subscriber base becoming infected by a marketing gimmick? There are plenty of spammers out there that would love to be able to infect an entire ISP at a time. Excellent point. Mediacom's history has shown they've had some issues with "technology" (i.e., DNS, Opt Out of Typos and Redirects, etc.,) so doubts about Mediacom's ability to be trusted with something like this would appear to be valid. |
|
 danawhitakerSpace...The Final FrontierPremium join:2002-03-02 Urbandale, IA | reply to rudnicke Hmm. I'm not disbelieving, but I haven't seen this. Just to be sure that it wasn't adblocking that was interfering (I use Chrome with Adblocker and Flashblock) I tried Internet Explorer, which I never use, and doesn't use any adblocking. I didn't see anything on Google or Apple. What can I do to replicate this problem? -- You're watching Sports Night on CSC so stick around... |
|
 cemig join:2007-01-17 Spring Valley, MN | The hardware behind this appears to be the PerfTech bulletin system. If you're not on a network selected to get the bulletin, you won't get it. Let's hope that Mediacom is just test driving the hardware before buying. Enough customer backlash might kill the deal. |
|
 | reply to danawhitaker said by danawhitaker:Hmm. I'm not disbelieving, but I haven't seen this. Just to be sure that it wasn't adblocking that was interfering (I use Chrome with Adblocker and Flashblock) I tried Internet Explorer, which I never use, and doesn't use any adblocking. I didn't see anything on Google or Apple. What can I do to replicate this problem? I'm not seeing this myself and I checked the source page to see if it was simply being blocked.
It would appear it may be testing the waters per market. |
|
 mnt join:2004-10-03 Baldwin, AL | reply to jg0 My options are 1.5 Mbps DSL or Mediacom, too. I've lived through years of slow speeds, frequent disconnects, and terrible customer service. But this is the first thing that's got me considering giving up on Mediacom completely and going back to DSL. Once they start futzing with the content I choose to download, I've lost all trust for an ISP. |
|
 | reply to Turbocpe said by Turbocpe:said by cemig:Any network hardware designed to inject Javascript into third-party web pages is a colossally stupid idea for an ISP. Just think of what will happen when (not if) someone hacks into the injection server and adds a bulletin containing malicious code. Is Mediacom really ready to handle the backlash from their entire subscriber base becoming infected by a marketing gimmick? There are plenty of spammers out there that would love to be able to infect an entire ISP at a time. Excellent point. Mediacom's history has shown they've had some issues with "technology" (i.e., DNS, Opt Out of Typos and Redirects, etc.,) so doubts about Mediacom's ability to be trusted with something like this would appear to be valid. I saw this ad with Adblock Plus on Firefox. |
|
 beachintechThere's sand in my tool bagPremium join:2008-01-06 kudos:5 | reply to rudnicke If I were you, I would be switching ISP's.... |
|
 mnt join:2004-10-03 Baldwin, AL | reply to rudnicke The silence from Mediacom on this issue is telling. |
|
 k9iua6 join:2004-05-23 Dubuque, IA | reply to rudnicke Okay, this thread still has me confused. I only use Firefox at home, which has AdBlock Plus installed, so don't see most adverts, and haven't for years, and so am unused to who many web sites are providing ads these days. So reading this thread, I can't tell what is happening...
These Mediacom ads are coming up when you go to Google? How do you know this isn't Google inserting these ads based on their ability to see what network you are on? It sounds like Google doing just what Google does with providing advertising. Otherwise how do you know it is Mediacom modifying the webpage coming to you? And for the other person who mentioned AdBlock - is AdBlock not stopping these advertisements, or are you saying that you see them being trapped by AdBlock? |
|
 cemig join:2007-01-17 Spring Valley, MN | It doesn't matter what browser you are using. This technology works by intercepting a web page and inserting it's own little bit of javascript into the HTML. Unless you have an AdBlock rule in place for the server pointed to by the javascript, it will get through.
We know that this is being done by Mediacom because the javascript is being served from a Mediacom IP address (97.64.255.1 resolves to 97-64-255-1.client.mchsi.com, what seems to be a dynamic IP). We also know that it has appeared over apple.com (for mnt) in addition to a Google page for others.
The system in place to send these ads appears to be this: »www.perftech.com/bulletin_system.html I base this on the comments I read in the javascript files referenced by ekztal.
Nothing short of NoScript would be able to reliably block this sort of ISP tampering with the HTML. |
|
 k9iua6 join:2004-05-23 Dubuque, IA | Okay, thank you, Cemig, for providing the first post in this thread with enough explanation and clarity for me (and I presume others) to understand what is happening.
Since it seems to me that no FCC or other Federal regulatory agency prevents this from happening, we can complain, but in the end we won't be able to avoid this happening, regardless of what ISP we run to. it is indeed sad. As long as the internet is a commercial enterprise, this stuff is likely to happen, unfortunately, to try to wrestle income from someone or other how ever they can get it.
I do have NoScript running on one my oldest, slowest computers just so it can be usable. Unfortunately too many websites now unnecessarily rely on Javascript and other codes just to provide information, which in itself, in my opinion, is killing the useful of the internet for its bloat in web page size and slowness. |
|