Jumat, 25 September 2015

How to Enable and Use Wi-Fi Calling on an iPhone

How-To Geek Newsletter
Did You Know?

Violet Jessop was an early 20th century stewardess/nurse with a particularly curious distinction: she was on the Olympic, the Titanic, and the Britannic. She survived the collision of the Olympic with another ship and the sinking of the latter two vessels.

Geek Trivia

The English Word Panic Traces Its Roots Back To?
Spanish Sailors →
The Greek God of Nature →
18th Century English Medicine →
The French Revolution →


Advertisement
Download The Bully Boss Strikes Again!
The editors of Business Management Daily asked administrative assistants to weigh in with the craziest things their bosses had ever asked them to do. They expected to hear about killer hours, volatile tempers and perfectionist demands. They didn't anticipate the things you'll find in this report! Click here to download
Thoughts from the Geek

This is a daily column written by Lowell Heddings, the founder and owner of How-To Geek. If you prefer, you can read this column in a web browser instead.

The_Fake_Traffic_Schemes_That_Are_Rotting_the_Internet_-_Bloomberg_Business

The Fake Traffic Schemes That Are Rotting the Internet

Late that year he and a half-dozen or so colleagues gathered in a New York conference room for a presentation on the performance of the online ads. They were stunned. Digital's return on investment was around 2 to 1, a $2 increase in revenue for every $1 of ad spending, compared with at least 6 to 1 for TV. The most startling finding: Only 20 percent of the campaign's "ad impressions"—ads that appear on a computer or smartphone screen—were even seen by actual people.

… Increasingly, digital ad viewers aren't human. A study done last year in conjunction with the Association of National Advertisers embedded billions of digital ads with code designed to determine who or what was seeing them. Eleven percent of display ads and almost a quarter of video ads were "viewed" by software, not people. According to the ANA study, which was conducted by the security firm White Ops and is titled The Bot Baseline: Fraud In Digital Advertising, fake traffic will cost advertisers $6.3 billion this year.

The level of fraud online is just absolutely staggering. Even the largest websites from the biggest household name publishers that you can imagine are often supplementing their numbers with low-quality or completely fake traffic — everything from clickbait to click scams that open the wrong thing, to malware-controlled botnets that are browsing the web pretending to be humans. If Skynet ever becomes real, it will probably evolve out of the online advertising system and enslave humanity to make them watch ads.

We spoke to a security researcher that investigates malware for ad fraud research, and he told us that tons of publishers are buying traffic from middle-men — low quality marketing agencies that promise they can help you get visitors to your site for a very small amount of money. You might pay $1 for 1000 visitors, and as long as you can make more than $1 from ads, you can just crank up the funnel to make even more — if you could get $5 for every thousand “visitors”, you’re making $4 for every $1 you spend. It’s not hard to see how this can be attractive to publishers that lack integrity.

The problem, he said, is that many of these middle-men are then buying traffic on the underground from botnet operators, who pay other people to get their malware installed on people’s computers so they can control tens or hundreds of millions of computers. The botnets are specially designed for ad fraud — they open a hidden browser in a sandbox and even hijack your sound card drivers to allow them to mute the sound from their hidden browser while making it look like your computer isn’t doing anything.

Many of the publishers that are paying for this traffic are just running junky websites for arbitrage that nobody in their right mind would ever view, but a whole lot more of them are using the botnet for fraud to solve a different problem entirely: readers that always click to skip video ads. Most adult websites these days have video ads that pay a lot of money, and almost every adult website is very popular — but nobody wants to sit through the high-paying video ads. So the people that operate these sites pay the middle-men who pay the botnet operators to have malware pretend to be a reader and browse around their sites without skipping the video ads. So they can collect more money.

As I mentioned the other day, online advertising is slowly dying, and all of the automation is one of the reasons why. When robots determine which ads get shown to which visitors, the only people seeing the ads will be the robots.


Geek Comic
2015-09-25-(no-ethics-to-be-found)
Today's Tech Term

Obfuscated URL

An Obfuscated URL (a.k.a. Hyperlink Trick) is a type of phishing attack where a “false” web address created to imitate an original/legitimate URL has been concealed or obscured in an attempt to trick users into clicking on it.

The obfuscation can take the forms of a slight variation in the spelling of a brand name (i.e. PayPal to PayPals) or embedding the link in “friendly” looking clickable text.

The “false” address often leads to an identical (or nearly identical) website where it is hoped users will divulge login or personal information.

What We're Reading from Around the Web

How to Find Out Exact Package Names for Applications in Linux

The Ubuntu Software Center allows you to easily add and remove programs in Ubuntu. However, each Linux distribution has a different graphical method for adding and removing software. If you prefer using the keyboard, you can install and uninstall software using the command line.

Read This Article →


How to Enable and Use Wi-Fi Calling on an iPhone

Wi-Fi calling allows your iPhone to place and receive phone calls and text messages over a Wi-Fi network. If you have a weak cellular signal but a solid Wi-Fi signal, your iPhone will automatically switch over and route calls and texts via Wi-Fi.

Read This Article →


How Can a Battery be Dead Even Though it was Fully Charged the Day Before?

When you have a rather new laptop, the last thing you want to experience is a problem with the battery. But what do you do if it happens? Today’s SuperUser Q&A post offers up some advice for a frustrated reader.

Read This Article →


How to Use Your Mac Keyboard's Top Row as Regular Function Keys

Mac keyboards are fairly renowned for their simple but elegant functionality. Not only are they highly customizable, but OS X contains an option that let you use the function (fn) key to access the actual function keys (F1, F2, etc.).

Read This Article →


How to Enable and Use iCloud Drive on Your iPhone or iPad

Apple’s iCloud Drive normally just works in the background on an iPhone or iPad. iOS 9 makes iCloud more accessible and useful, providing a new iCloud Drive app that lets you browse, view, and manage all the files stored in iCloud Drive.

Read This Article →


Advertisement
Download Maximize Your Memory (FREE eBook valued at $14.99) Available for a limited time!
Learn how to read faster and retain more, never forget names or number and improve your score on tests. Click here to download

Tidak ada komentar:

Posting Komentar