New Bigpoint Security?

04/17/2013 15:12 iDJ Jesus#1
Question answered

#closerequest
04/17/2013 15:14 hawk799#2
WEIRD
04/17/2013 15:25 «Ice.Shock™#3
Well I think they want legit game no bots, no cheats, no hacks etc.. I want it too ;p

Next time post in Darkorbit Talk for small questions.

#CloseRequest.
04/17/2013 15:26 iontzel222#4
^_^ is your account banned?
04/17/2013 15:31 iDJ Jesus#5
Quote:
Originally Posted by iontzel222 View Post
^_^ is your account banned?
no, its still working fine, I've been playing manually since last week

Quote:
Originally Posted by «Ice.Shock™ View Post
Well I think they want legit game no bots, no cheats, no hacks etc.. I want it too ;p
Next time post in Darkorbit Talk for small questions.
#CloseRequest.
This is part of informing the people here
Theres no point in closing it yet, as there are still many other possibilities about what this could be
04/17/2013 15:34 DynamiteTNT#6
mhh ... pbdo and kbot need a long time to update so could it be ...
04/17/2013 16:21 Benjwg#7
Quote:
Originally Posted by iDJ Jesus View Post
Hello,

I logged in manually today since bots are down, and after a couple of minutes I was logged out and this was in the url

[Only registered and activated users can see links. Click Here To Register...]

It took me back to my home page, though the url is the interesting part.

I'm not sure what it is, but addineye makes it sound like they are now watching my account, either backpage or in game page, could this be a new part of the stopping a bot, and watching how the account moves?

What do you guys think?
If its because of the /eyeblaster/addineyeV2.html at the end of the url

Click ---> [Only registered and activated users can see links. Click Here To Register...]

Should give you the info you seek.
04/17/2013 16:27 aha232#8
This JavaScript uses JQuery (which our CMS provider includes on every page anyway). It checks to see if the error page exists in an iframe (top != self), and then it grabs the raw html for every html element on the parent page that should contain an ad.

That data is wrapped into an object, and posted to a simple php script that would write a log of every value posted to it to a file.

In the end, I received a log file with a high likelihood that the offending ad code was within. I was able to do a quick grep on the file and discovered the ad with an iframe pointing toward "/eyeblaster/addineyev2.html"

I hope this helps someone else out there!

have found my own answer, and I'll share it here for the rare event another Web Developer is trying in vain to pinpoint an ad doing this same thing to them.

The offending digital ad was coming in with an iframe that was pointed toward "/eyeblaster/addineyev2.html" I used this knowledge, and coded the following javascript to gather information about the page that contained the iframe (ie the page with the ad on it).

if(top != self) {
$.post("/ad_diagnose/log.php", {
a: $('#ad-div-one', top.document).html(),
b: $('#ad-div-two', top.document).html(),
c: $('#ad-div-three', top.document).html(),
d: $('#ad-div-four', top.document).html(),
e: $('#ad-div-five', top.document).html(),

basickly poo coders using iframes adds
website has basicly been iframed through a flash code, use a iframe breaker code
04/17/2013 16:51 daswoll56#9
I hope bots are back online soon ^^

@Iceshock

Why do you want a game with no cheats no hacks/bots?
This idiot game is just way to expensive, people who dont want to pay thousands of dollars into a stupid game they cant play without bots^^
I like the game more with bots so everybody gets stronger without spending thousands of dollars -.-''
If darkorbit stop all bots than they should make this game cheaper ..
04/17/2013 17:10 Benjwg#10
Quote:
Originally Posted by aha232 View Post
This JavaScript uses JQuery (which our CMS provider includes on every page anyway). It checks to see if the error page exists in an iframe (top != self), and then it grabs the raw html for every html element on the parent page that should contain an ad.

That data is wrapped into an object, and posted to a simple php script that would write a log of every value posted to it to a file.

In the end, I received a log file with a high likelihood that the offending ad code was within. I was able to do a quick grep on the file and discovered the ad with an iframe pointing toward "/eyeblaster/addineyev2.html"

I hope this helps someone else out there!

have found my own answer, and I'll share it here for the rare event another Web Developer is trying in vain to pinpoint an ad doing this same thing to them.

The offending digital ad was coming in with an iframe that was pointed toward "/eyeblaster/addineyev2.html" I used this knowledge, and coded the following javascript to gather information about the page that contained the iframe (ie the page with the ad on it).

if(top != self) {
$.post("/ad_diagnose/log.php", {
a: $('#ad-div-one', top.document).html(),
b: $('#ad-div-two', top.document).html(),
c: $('#ad-div-three', top.document).html(),
d: $('#ad-div-four', top.document).html(),
e: $('#ad-div-five', top.document).html(),

basickly poo coders using iframes adds
website has basicly been iframed through a flash code, use a iframe breaker code
Dude wtf...

You have clicked on the link I provided and just copy and pasted everything as if it was your own words.... LOL!
04/17/2013 17:55 Arby#11
#closed