Andrew's Security Filter(s) v5.62 (May 10, 2009)
|
Nov. 11, 2007, 02:28 PM
Post: #16
|
|||
|
|||
RE: Andrew's Security Filter(s) v3 (Nov. 11, 2007)
Ive added a blocklist/whitelist to the Enable [SCRIPT] Removal filter to take care of the rapidshare servers complaining about enabling java.
Now its not necessary to add each manually through the script bar. While still keeping the rest of the filters active. Fex: Code: [HTTP headers] The above needs a NoScriptBlock.txt in the list dir, and added to proxos blocklists. Then add whatever site with wildcards to the list (fex.([^/]++.|)rapidshare.com) Seems to work fine, maybe it could be done better, just putting the idea out there ![]() |
|||
Nov. 11, 2007, 07:21 PM
Post: #17
|
|||
|
|||
RE: Andrew's Security Filter(s) v3 (Nov. 11, 2007)
Great idea!
That will be a goal in the next release, adding the ability to trust or even temporarily bypass certain tags ![]() How's it running for you so far? |
|||
Nov. 11, 2007, 07:49 PM
Post: #18
|
|||
|
|||
RE: Andrew's Security Filter(s) v3 (Nov. 11, 2007)
Just super, not one problem till now.
And the javascript floater script is easy to edit if so inclined ![]() |
|||
Mar. 26, 2008, 04:33 PM
Post: #19
|
|||
|
|||
RE: Andrew's Security Filter(s) v3 (Nov. 11, 2007)
Ive been editing the filters some to include a trust scripts button instead of the trust path button.
_http://i28.tinypic.com/24n1w8k.png Everything is working ok but i need a more generic wildcard added and i need to remove the www from the blocklist added url. Id like to use ([^/]++.|) instead of [^/]++ (fex. ([^/]++.|)somesite.com not [^/]++www.somesite.com) But i cant seem to figure out the changes needed. So far ive just been using: $ADDLST(NoScriptBlock, [^/]++$GET(host)\r)\k<meta http-equiv="refresh" content="2;url=http://$GET(origlink)"> And editing manually the blocklist entries if needed. Any help much appreciated ![]() |
|||
Apr. 21, 2008, 09:39 PM
Post: #20
|
|||
|
|||
RE: Andrew's Security Filter(s) v3 (Nov. 11, 2007)
In "Andrew's Security Filter - Add Safe Host", change the first line of the replacement text to:
Code: $ADDLST(NoScriptBlock, ([^/]++.|)$GET(host)\r)\k<meta http-equiv="refresh" content="2;url=http://$GET(origlink)"> ![]() |
|||
Apr. 22, 2008, 12:01 PM
Post: #21
|
|||
|
|||
RE: Andrew's Security Filter(s) v3 (Nov. 11, 2007)
Thanks
![]() Yeah ive tried that before, and it works fine with the majority of sites, unfortunately some sites has some numbers etc in the www (fex. ww5.easyshare.com or w14.easyshare.com) so im looking to add just the ([^/]++.|)easyshare.com without the www. Hope im making myself clear, if not please let me know and ill try to elaborate more. ![]() |
|||
Apr. 23, 2008, 12:28 AM
Post: #22
|
|||
|
|||
RE: Andrew's Security Filter(s) v3 (Nov. 11, 2007)
It's working fine here
![]() ([^/]++.|)easy-share.com Can you export the filter and post it? I'll take a look. EDIT: I've updated the "Path" filter to wildcard the URL that's entered in the whitelist ![]() |
|||
Apr. 23, 2008, 09:40 AM
Post: #23
|
|||
|
|||
RE: Andrew's Security Filter(s) v3 (Apr. 22, 2008)
Much appreciated
![]() Code: [Patterns] Edit:just noticed the update. Sweet.... ill upgrade and get back, thanks again ![]() |
|||
Apr. 23, 2008, 09:50 AM
Post: #24
|
|||
|
|||
RE: Andrew's Security Filter(s) v3 (Apr. 22, 2008)
Your filter is customized, so I'll help update it for you =]
Code: [Patterns] |
|||
Apr. 23, 2008, 10:41 AM
Post: #25
|
|||
|
|||
![]() ![]() ![]() |
|||
Jun. 08, 2008, 11:53 PM
Post: #26
|
|||
|
|||
RE: Andrew's Security Filter(s) v3 (Apr. 22, 2008)
Version 4 has been released! Check the first post for more details.
|
|||
Jun. 09, 2008, 05:26 PM
Post: #27
|
|||
|
|||
RE: Andrew's Security Filter(s) v4 (June 8, 2008)
Regarding "Andrew's Security Filter v4" web filter:
It looks like theres 12 $TST() for every pass the filter can't match. Over the span of a web page, the ratio of filter misses to hits must be rather high. That's a lot of testing. Seems like something this would require fewer $TST() overall: Code: ( BTW do you have a test page set up for these filters? z12 |
|||
Jun. 09, 2008, 07:18 PM
Post: #28
|
|||
|
|||
RE: Andrew's Security Filter(s) v4 (June 8, 2008)
Thank you! I will update the filter with your optimized matching expression when I get home today. (It looks much better)
I'll also set up a test page =] |
|||
Jun. 09, 2008, 10:48 PM
Post: #29
|
|||
|
|||
RE: Andrew's Security Filter(s) v4 (June 8, 2008)
Just an FYI
Code: ### iframe tweak I was kind of wondering about the position of (^$TST(warndisplayed=yes)) Seems like no script will be injected if "yes". I'm sure it's just my unfamiliarity with the filters and not a problem. Also, is \2 used somehow? (in the body|html) Kye-U Wrote:I'll also set up a test page Cool. I was thinking of doing something like this myself. Looks like my work might already be done. ![]() z12 |
|||
Jun. 10, 2008, 04:21 AM
Post: #30
|
|||
|
|||
RE: Andrew's Security Filter(s) v5 (June 10, 2008)
I've updated the first post =]
I forgot to reuse the \2 to insert the </(body|html)> tag, and the (^$TST(warndisplayed=yes)) test was to make sure the Javascript wasn't already matched, e.g. if it already matched with </body>, I didn't want it to match again with </html>. But I had forgotten about the STOP() function! (So I have removed (^$TST(warndisplayed=yes))$SET(warndisplayed=yes) text, and also put in code to put back the </(body|html)> tag) Thanks =] The test page is here: http://prxbx.com/test/test.html I'm not sure if it's as comprehensive as you'd imagined it to be, but I included all the tags that this filter removes on that page, and tried my best to add some annoyance (some nice popups, some nice midi music in the background, perfect for a romantic dinner). Please let me know if you have any suggestions on making it a heavyduty testing page =] You've been VERY helpful ![]() |
|||
« Next Oldest | Next Newest »
|