ps: i must correct myself... in this successfull szenario is ublock deactivated, it dont work with activated ublock and "strict blocking for this page is off"
New cosmetic filter to foil specific inline script tags -- one more tool in uBlock Origin's arsenal against bloat. Syntax of this new cosmetic filter is:
example.com##script:contains(...)
Where ... is a plain string or a regular expression. If ... is a string in between / like /.../, the string is treated as a literal javascript regular expression, otherwise it is treated as a plain string.
Caveats of current implementation:
The filter must apply to a specific hostname or entity. Generic script tag filters will be rejected.
Another example: explosm.net##script:contains(/^__durl=/) for http://explosm.net/.
Blocking inline script tags for that site would prevent site-defacing ads from appearing, but this is a broad approach which can result in other useful functionality on the site being disabled as well. The new script tag cosmetic filter syntax allows a more refined approach by blocking one or more specific inline script tags on a page. Blocking all inline script is preferred if this does not lead to the site losing useful functionalities. But if this happens, a specific script tag filter is the solution.
Ich habe mal den ersten Link aus unserer Datenbank überprüft.
Unter www.bilder-upload.eu/thumb/f8abcf-1409116740.jpg findet sich z.B. noch immer Linux-Schadsoftware anstatt eines Bildes. Somit hat der Eintrag in unserer Blocklist seine Berechtigung.
Warum sollten wir bilder-upload.eu von der Liste entfernen, wenn noch immer eine Bedrohung davon ausgeht?
Hello there,
I oncecheckedthe first linkin our data base.
Underwww.bilder-upload.eu/thumb/f8abcf-1409116740.jpgbe found, for example,stillLinuxmalicious softwareinsteadof an image.Thus, theentryhas its placeinourblocklist.
Why should webilder-upload.euremove from the list,ifstillpose athreat tothem?
Basically they're stating that because bilder (while seemingly popular amongst European) does not have a good practice of making sure uploads are what they say and that malware domains has in the past and continues to find embedded malware in the images.
You may wish to look into more reputable picture upload sites
Many upload sites contain malware in uploads even those which are popular. Can't imagine why scanning the servers with anti-malware/anti-virus doesn't eliminate the infected files then again maybe they don't scan.
Many upload sites contain malware in uploads even those which are popular. Can't imagine why scanning the servers with anti-malware/anti-virus doesn't eliminate the infected files then again maybe they don't scan.
That's my guess, is that malwaredomains decided that either bilder is, accidentally or purposely, not scanning or uses poor scanning software. And that, when contacted about malware (as I assume is done by a reputable hosts provider), were unresponsive/took no action.