Language Selection

English French German Italian Portuguese Spanish

Pop-Up Ads Shed Blocks, Tackle Consumers

Filed under
Security

There was a time not so long ago when you could barely open a Web site without being buried with pop-up ads -- unwanted windows advertising everything and anything up to and including the kitchen sink.

They existed for one very good reason: Annoying as they were, they worked.

Then, the Web browser makers got wise to the ways of pop-up ads, and enabled people to block them. Even Microsoft Corp., which was way behind the curve on this one, finally added the ability to stop most common pop-up ads to Internet Explorer with its Service Pack 2 update to Windows XP.

Unfortunately, that wasn't the end of pop-up ads.
Now advertisers have begun figuring out new ways to evade pop-up restrictions, and companies with goods and services to sell have been more than happy to place ads via these new channels, resulting in unpleasant surprises for users of such pop-up-blocking browsers as IE, Firefox, Safari and Opera.

This new crop of intrusive ads comes in two forms. One, pop-unders, appear behind the page you're viewing instead of in front of it. While that saves you from having your Web experience disrupted by a series of Viagra ads exploding in front of your nose, it still leaves you with an ad in front of your face when you close a browser window.

These pop-unders make it through pop-blockers by slightly changing how they create new windows, although they rely on the same basic JavaScript Web code used by traditional pop-ups.

(JavaScript also routinely used to provide legitimate Web site functions; blocking it entirely would render some sites unusable.)

A second kind is not launched with JavaScript code, but from components of a page created using Macromedia Flash. This technology allows Web designers to include things like interactive menus or games, but, like JavaScript, can also be deployed to create and present ads.

Why do companies go to the extra trouble of putting a pop-up or pop-under ad in front of users who, by choosing a pop-up-blocking browser, obviously don't want them?

Because people respond to them anyway, say companies that buy these types of ads.
"They work," said Susan Wade, spokesperson for Herndon-based Network Solutions Inc. "While they're only a small part of our media mix, they do help."

If online ads get too annoying, they will backfire on advertisers. But it's not clear yet if the latest proliferation of pop-ups has reached that point.

Full Story.

More in Tux Machines

Real-time enabled Sitara SoC shows up on a COM

Variscite unveiled a Linux-friendly, SODIMM-style COM based on TI’s Sitara AM437x, supporting the updated SoC’s quad-core Programmable Real-time Unit (PRU). The VAR-SOM-AM43 is the first computer-on-module we’ve seen to use the Texas Instruments Sitara AM437x, a single-core Cortex-A9 system-on-chip that clocks to 1GHz. Last month, Adeneo announced an Android 4.4 BSP for TI’s Sitara AM437x development platform. Variscite is supporting its VAR-SOM-AM43 with a Yocto Linux, and soon, Android-ready hardware/software development kit of its own, which includes a VAR-AM43 CustomBoard development board, touchscreens, cables, and more Read more

High-end 'upstream' Linux laptop plans to ship in April

They said in working up hardware, they carefully designed the laptop "chip by chip" to work with open source software. The 4.4-pound laptop runs Linux. This is a GNU-based distribution, more specifically, the Trisquel GNU/Linux, "the strictest of distributions and strips all binary blobs from the Linux kernel." At the same time, they said laptop owners, if they want, can easily install anything less strict, such as Debian and Ubuntu. The machine has a 15.6" display in either 1920x1080 or 3840x2160 with a 60Hz refresh rate, 720p camera and HD Audio. It has a CD/DVD ROM drive. They used Intel Iris Pro Graphics 5200. It has a 48 Wh lithium polymer battery with about eight hours of usage. Read more

Android essentials: 13 apps I can't live without

We spend a lot of time talking about Lollipop and OS-level issues with Android -- but you know what's just as important as the operating system on your phone or tablet? The apps that surround it. The right apps can make your device easier and more enjoyable to use. They can give it powers you didn't know were possible. They can make it feel like your own custom-tailored gadget -- whether you've been using it for two minutes or for two years. Read more

GHOST, a critical Linux security hole, is revealed

Researchers at cloud security company Qualys have discovered a major security hole, GHOST (CVE-2015-0235), in the Linux GNU C Library (glbibc). This vulnerability enables hackers to remotely take control of systems without even knowing any system IDs or passwords. Qualys alerted the major Linux distributors about the security hole quickly and most have now released patches for it. Josh Bressers, manager of the Red Hat product security team said in an interview that, "Red Hat got word of this about a week ago. Updates to fix GHOST on Red Hat Enterprise Linux (RHEL) 5, 6, and 7 are now available via the Red Hat Network." This hole exists in any Linux system that was built with glibc-2.2, which was released on November 10, 2000. Qualys found that the bug had actually been patched with a minor bug fix released on May 21, 2013 between the releases of glibc-2.17 and glibc-2.18. Read more