Dilbert Nuked
Like many bloggers, I've toyed with monetizing my blog... though not in any serious way. All the advertising I've ever done is because advertising have gone out of their way to contact me. Within the last week, I was contacted by a new advertiser (very nice folks, actually) and decided to try their flash-based ads.
You hated it. Auto-playing flash-based ads with audio that can't be stopped is apparently not the way to keep your readership happy. Who knew? Hey...I screwed up. I apologize. The lure of easy advertising dollars perhaps financing my next toy blinded me to the annoyance these ads caused you. I have used and will continue to use BlogAds and I'm proud to represent both the Conservative and Military advertising hives, and encourage you to advertise with them. I've recently partnered with the VAMortgageCenter.com, have always run my share of Google Ads, and have a tip jar for those inclined to use it. But I'll accept no more auto-playing flash ads with unstoppable audio. That was a bad decision on my part. I won't do that again.
Posted by: Confederate Yankee at 03:34 PM
Comments
Posted by: Whiskey Bravo at July 30, 2010 03:48 PM (rRDJl)
Posted by: Wrella at July 30, 2010 04:35 PM (THOGN)
Posted by: flenser at July 30, 2010 05:21 PM (jMbKZ)
Flash's security record[54] has caused several security experts to recommend to not install Flash or to block it[55]. The US-CERT recommends to block Flash using NoScript[56]. Charlie Miller recommended "not to install Flash"[57] at the computer security conference CanSecWest. As of May 17, 2010, The Flash Player has 77 CVE entries[58], 34 of which have been ranked with a high severity (leading to arbitrary code execution), and 40 ranked medium. In February 2010, Adobe officially apologized[59] for not fixing a known vulnerability for over 1 year. In June 2010 Adobe announced a "critical vulnerability" in recent versions, saying there are reports that this vulnerability is being actively exploited in the wild against both Adobe Flash Player, and Adobe Reader and Acrobat.[60][61]
Symantec's Internet Security Threat Report[62] states that a remote code execution in Adobe Reader and Flash Player[63] was the second most attacked vulnerability in 2009. The same report also recommends to employ browser add-ons wherever possible to disable Adobe Flash Player when visiting untrusted sites. McAfee predicts that Adobe software, especially Reader and Flash, will be the primary target for attacks in 2010[64]. Adobe applications had already become the most popular client-software targets for attackers during the last quarter of 2009[65].
Posted by: flenser at July 30, 2010 05:28 PM (jMbKZ)
Posted by: Neo at July 30, 2010 05:41 PM (tE8FB)
Posted by: scp at July 30, 2010 05:43 PM (KyDET)
Maybe the kids hid it. Yea. That's the ticket!
Nice sight BTW. But it is pricey! I hope it works out for you.
Posted by: RoyK at July 30, 2010 06:06 PM (KOYh5)
Yes, the EoTech is spendy, but has a pretty solid record. I'd probably be just as happy with either this Bushnell or this one among red-dots, and if I go more traditional, this Millet scope.
Now, if I can just find ads that earn $ without annoying you guys...
Posted by: Confederate Yankee at July 30, 2010 07:27 PM (CwGYU)
I think we should all remember to hit the tip jar occasionally. After all, time is money and we all know you spend a lot valuable time here You're appreciated, as I've reading you since we fought the "Swift Boat Kerry" wars in 2004.
RiverRat Tom
Posted by: RiverRat at July 30, 2010 07:49 PM (Jwh9R)
Posted by: mixitup at July 30, 2010 10:10 PM (Z21cb)
You tried something that didn't work.
Then you responded to readers who read you for free, and you fixed it.
No problem.
Now, if you'd had some loathsome, distracting, content-obscuring POPUPS that I'd had to expend time and clicks killing, well then we'd a had a problem. But, I wouldn't have dumped you, I'd a come lookin' for you with a coffee cup full of whoop-ass -- but you didn't.
=)
Just good old American entrepreneurial trying, testing, and perfecting was going on, folks. Works for me.
Posted by: Bill Smith at July 30, 2010 10:44 PM (yusoH)
Posted by: mockmook at July 31, 2010 09:45 AM (5ssRl)
Posted by: Clayton in Mississippi at July 31, 2010 10:06 AM (tlaeS)
Posted by: inspectorudy at July 31, 2010 11:00 AM (KOOZL)
"registry cleaner" (all those are vapourware, many are spyware).
"local labour union" (on a conservative blog?).
Green card "assistence" services (most of them are fraudulent).
Out of 10 Google ads, the only 2 that seem legit are a blood bank (and that one's missspelled, so I have my doubts) and an ad by Monsterboard to use them for searching contract workers.
Posted by: J.T. Wenting at August 01, 2010 05:20 AM (hrLyN)
Posted by: henry at August 02, 2010 09:40 AM (yAzWq)
Posted by: Chinahand206 at August 02, 2010 11:32 AM (/K/5c)
Processing 0.0, elapsed 0.0122 seconds.
18 queries taking 0.0089 seconds, 25 records returned.
Page size 11 kb.
Powered by Minx 0.8 beta.