What to do against those tiny little 1 pixel devils that track ye, and embedded cannot be stopped even by NoScript, I guess. Well there is a line of code you can insert as a general filter (expression) inside your FF or Flock AdBlockPlus. Open this up and insert this line:
It is a general rule to tackle the following three:
/track*.(gif|js|cgi|php|asp|jsp)?/
/stat*.(gif|js|cgi|php|asp|jsp)?/
/count*.(gif|js|cgi|php|asp|jsp)?/
Like to hear how it works for ye all, rule by courtesy of Lou Cipher (2005).
I thought the string looked strange as other filters in my FF adblock plus begin with an * on trying to Add a Filter, copying in the string without the * causes a pop-up, see image.
So should this have an * at the start of the string (or should it be a regular expression as indicated in the pop-up) ?
Thanks, we will see what it can do though it is possible to block images by size (1x1) in my firewall, so that too should be able to block these tracking transparent gifs, etc.
Good creative thinking, could be if the coder tried to find a general expression for these three undesirables, it might even work there (from our point of view, as you see what I mean, not from the point of the trackers and profilers).
Tried to combine the Anonymization proxy toolbar with httProxy add-on (the first comes as a toolbar), and Switch Proxy. Not bad, my friend, not bad at all.
The difficulty with these webbugs (it is a pity that Bugnosis was never brought out for Firefox or Flock as an extension, why has no-one ever try to think of porting it outside the IE 5 and upwards for the Mozilla typed browser?) is that they try some 20 ways to connect (embedded, third party cookies, etc.etc.). Then there is a javascript like urchin.js (Google for instance has it) that gets out in a way it was not intended for javascript by the developers (there is some info on the workings on the Net, but not a lot of people to explain to the full what it does combined with http, but it is very helpful in building up your personal clickstream. Yahoo at the Flock startpage also has urchin.js. and there are more of these javascripts that profile the searcher etc.
When you have script installed they can read what extensions you have in FF in what versions, geolocation, and what have ye. The only chance you have is working Torpark with NoScript and Privoxy, but then your ISP know all your ins and outs before and after firing up Torpark. It is a bit better when you surf from a USB stick with for instance PocketFlock where all your browsing data are cleared on closing up the browser or you use Stealther and Distrust while using the browser.
But I think we need some general expressions to circumvent the nasty and hidden tracking code, because the Internet is like the Sea, ever changing and evolving, when you block one ‘rotter’ a dozen others have been opened up.