'; var fr = document.getElementById(adID); setHash(fr, hash); fr.body = body; var doc = getFrameDocument(fr); doc.open(); doc.write(body); setTimeout(function() {closeDoc(getFrameDocument(document.getElementById(adID)))}, 2000); } function renderJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.dcdAdsH.push(holderID); document.dcdAdsI.push(adID); document.dcdAdsU.push(srcUrl); } function er_showAd() { var regex = new RegExp("externalReferrer=(.*?)(; |&|$)", "gi"); var value = regex.exec(document.cookie); if (value && value.length == 3) { var externalReferrer = value[1]; return (!FD.isInternalReferrer() || ((externalReferrer) && (externalReferrer > 0))); } return false; } function isHome() { var loc = "" + window.location; loc = loc.replace("//", ""); var tokens = loc.split("/"); if (tokens.length == 1) { return true; } else if (tokens.length == 2) { if (tokens[1].trim().length == 0) { return true; } } return false; } function checkAds(checkStrings) { var cs = checkStrings.split(","); for (var i=0;i 0 && cAd.innerHTML.indexOf(c)>0) { document.dcdAdsAI.push(cAd.hash); cAd.style.display ='none'; } } } //Check iframes if (!ie) { for (var i=0;i 0 && doc.body.innerHTML.indexOf(c)>0) { document.dcdAdsAI.push(fr.hash); fr.style.display ='none'; } } } } } if (document.dcdAdsAI.length > 0 || document.dcdAdsAG.length > 0) { var pingServerParams = "i=" var sep = ""; for (var i=0;i 0) { var pingServerUrl = "/action/pingServerAction?" + document.pingServerAdParams; var xmlHttp = null; try { xmlHttp = new XMLHttpRequest(); } catch(e) { try { xmlHttp = new ActiveXObject("Microsoft.XMLHttp"); } catch(e) { xmlHttp = null; } } if (xmlHttp != null) { xmlHttp.open( "GET", pingServerUrl, true); xmlHttp.send( null ); } } } function initAds(log) { for (var i=0;i 0) { doc.removeChild(doc.childNodes[0]); } doc.open(); doc.write(fr.body); document.dcdsAdsToClose.push(fr.id); } } else { fr.src = fr.src; } } } if (document.dcdsAdsToClose.length > 0) { setTimeout(function() {closeOpenDocuments(document.dcdsAdsToClose)}, 500); } } } var ie = isIE(); if(ie && typeof String.prototype.trim !== 'function') { String.prototype.trim = function() { return this.replace(/^s+|s+$/g, ''); } } document.dcdAdsH = new Array(); document.dcdAdsI = new Array(); document.dcdAdsU = new Array(); document.dcdAdsR = new Array(); document.dcdAdsEH = new Array(); document.dcdAdsE = new Array(); document.dcdAdsEC = new Array(); document.dcdAdsAA = new Array(); document.dcdAdsAI = new Array(); document.dcdAdsAG = new Array(); document.dcdAdsToClose = new Array(); document.igCount = 0; document.tCount = 0; var dcOrd = Math.floor(100000000*Math.random()); document.dcAdsCParams = ""; var savValue = getAdCookie("sav"); if (savValue != null && savValue.length > 2) { document.dcAdsCParams = savValue + ";"; }
Breaking News National
AAP
Around 6000 Australians are set to lose their internet access from Monday because of a virus planted by criminals during the past year, the communications watchdog says.
Australians affected by the DNSChanger malicious software (malware) will have no internet from 1400 AEST on July 9 as a temporary solution switches off, the Australian Communications and Media Authority told AAP on Friday.
DNSChanger is a form of malicious software (malware) that changes a user's domain name system (DNS) settings.
This allows criminals to direct internet users to fraudulent websites and hinder their access to the internet.
In November 2011, the Federal Bureau of Investigation (FBI) in the US closed a ring of cyber-criminals believed to be behind the spread of the DNSChanger malware across the world.
The FBI along with the internet systems consortium (ISC) set up a temporary but correct DNS solution, while internet service providers had the chance to help their customers to fix the problem.
Australians can go to http://dns-ok.gov.au/ to check if their computer is affected.
© 2012
AAP
Brought to you by
No hay comentarios:
Publicar un comentario