MTNL Broadband is injecting ads on your computer pretending it's a feature

^lol...you dont know how rude mtnl people can be themselves...even the GM,agm of broadband.They said we will not change your port.

Coz everytime there is any problem they change the port and it gets fixed......for a few months..now they said we wont change the port...you can fuck off (did not literally say that )....also they said internet is working na ?If internet works for 1 minute in a day,they deem it working.
 
they said internet is working na ?If internet works for 1 minute in a day,they deem it working.
Exactly, and according to them even if adsl light glow for 1 min that means internet is working in blazing fast speed no matter either u able to surf net or not,well what can we expect from a department which have only Senior Citizens as there employees or ghutke wale bhaiya ji who even don't know sh*t about cable/speed.
 
So MTNL has upgraded its technology and from the looks of it is not using Adphonso anymore. Got the following popup today.

9Vg1cXq.png


Now MTNL doesn't wrap up your webpage in an iframe. Instead it inserts the code cleverly as if it is part of the webpage you are accessing. If you try to view Page source, you won't find any MTNL inserted code. The insertion is dynamic. They are reading the pages and inserting it with proper css so that it appears as a popup and doesn't mess with the layout.

Whoa. Aww. Such concern. No more page code messups. Freaking idiots. Fucking morons.

Itna dimaag apni service improve karne me lagate toh kahan se kahan pahunch jaate.

This was the code I found

Code:
<div id="__BULLETIN__bdiv" style="position: absolute; z-index: 999999999; visibility: visible; top: 45px; right: 20px; display: block; transition: top 0s ease 0s;"><style>   img.scalable {        max-width : 100%;        height: auto;    }</style><a href="http://mtnldelhi.in/app.jpg" target="_blank" id="__BULLETIN__bdivButton">      <img frameborder="0" scrolling="no" src="http://203.94.243.40/bg/app.jpg" style="height: 528px;" id="__BULLETIN__bdivImage" title=" ">   </a>         <div style="overflow:hidden; position:absolute; right:0; top:0; z-index:9999999999;"><a href="#" id="__BULLETIN__button0"><img border="0" src="http://203.94.243.40/bg/CloseButton.png" class="scalable" name="button0" id="__BULLETIN__button0i"></a>
         </div></div>
 
I think it is still Adphonso but they are now using MTNL servers. With GreaseMonkey you can only block the appearance of code that has already been added to your web pages.

What MTNL is doing is called man-in-the-middle attack. They have added themselves in the middle of your computer and web servers and modify the web page code as and when they want.

-- dead tinypic image removed --

Fortunately, they cannot inject the code inside HTTPS pages. So the only workaround is to use a VPN proxy server that allows HTTPS for all the internet traffic.
 
stupids keeps showing me 800 off offer on new connection ad :mad: or that governance day
 

Back