A new Adblock Blocker is used on http://www.spiegel.de/ - and of course with giant pictures in the header...
<div class="QYlWuRNoE"><img src="http://cdn1.spiegel.de/images/image-371 ... jpg"></div>
The filename of the pic and the name of the css class change randomly.
Any suggestions?
www.spiegel.de
Re: www.spiegel.de
see if works
Code: Select all
spiegel.de##.top-poster
spiegel.de###content-main > DIV:first-child
Re: www.spiegel.de
Seems to work, but only as long the div is the first element in the html structure. THX!
Follow up question:
Is adblockplus able to determine the header data of the files?
All images are send with the same CDN domain, but real content pictures hava a responsive header with "Server:Footprint Distributor V4.10" and ad-pictures have "Server:BMTCDN/5.2.3" and also show "X-Powered-By: bemitho technologies GmbH"
Follow up question:
Is adblockplus able to determine the header data of the files?
All images are send with the same CDN domain, but real content pictures hava a responsive header with "Server:Footprint Distributor V4.10" and ad-pictures have "Server:BMTCDN/5.2.3" and also show "X-Powered-By: bemitho technologies GmbH"
Re: www.spiegel.de
you can add also
for the headers:
the ABP goal is to block the ads, so if are blocked ==> wont be able to analyze any header / property
Code: Select all
spiegel.de##IMG[src^="http://cdn1.spiegel.de/images/image-"]
the ABP goal is to block the ads, so if are blocked ==> wont be able to analyze any header / property
Re: www.spiegel.de
Code: Select all
||cdn1.spiegel.de/images/image-*.jpg$subdocument
I only need this in Chrome with block. In Firefox Nightly no ads show up at all; maybe it handles Javascript injected through iframes slightly differently.