adsense header

hi,

i would like to put an adsense banner next to the logo at header. I tried the banner module but the banner is rolling.

i there any way to do it. Where i have to put the code at header.html?????

thank you

Quote · 19 May 2010

Hello you can put your banner into templates/base/_sub_header.html

PS: If possible do not write me personally, please try to ask on the forum first
Quote · 19 May 2010

thanks for the reply

but i dont know well the structure and i dont know where to put it, if i want to adjuct it next to logo.

couls you please show us where to be put?

Quote · 19 May 2010

Hi

I don't know if this is the correct way in regards to how "Boonex" would prefer, but it worked for me at HomebodyPersonals.com, which I'm now in the process of building up.

Before doing this, encase your Adsense code in a DIV tag with the style tag set at float:right; and top-margin:12px; for a 468x60 spot. If needed, just view my source code. This is for the default template with the stock logo of 309x60 on the left. If and when you move to another template, you will need to change these.

Once you have your Adsense code encased, paste it between the <div class="sys_ml_wrapper"> and <bx_injection:injection_logo_before /> tags found near the top in your _sub_header.html template file as mentioned above. You do not need to remove any tags, just remember that you can not use the built in banner feature of Dolphin for this banner position afterward without further changes as it will break the header layout. This should be considered quick and dirty.

Hope this helps

Quote · 21 May 2010

and how can I insert adsense in a html block?

Quote · 21 May 2010

For a sidebar block I recommend downloading and installing Deanos Tools...

http://www.boonex.com/unity/extensions/entry/Deanos_Tools_Dolphin_7_0_Version

Once downloaded and installed as per the included instructions, create a PHP block and echo your adsense code, making sure you escape all quotes in your adsense code. You may also want to encase your adsense code in a div tag so that you can adjust your margins.

For example, I gave my php block the language key _Adsense2 and named it Advertisements. Escaping all quotes (") with a backward slash (\"), I surrounded my adsense code with a div tag style of margin-left:10px; to offset the display slightly.

I wasted a couple hours looking around inside the code with the thought of hard coding a solution. Since I'm not up to speed yet with the complexity of Dolphin, having only installed it yesterday, I decided a different approach was the way to go. As it turns out, this is a much cleaner solution. If you make mistakes, you can delete or edit them inside Deanos Tools, so no worries here.

Hope this helps. If you need a more explicit example, just let me know. Enjoy!

Quote · 22 May 2010

dolphin shows me a security attack message.

I tried to write it manually to prove that character is the error, and just by typing <Hello> show message security attack Cry

Quote · 22 May 2010

I have know clue where that came from. Other than a couple parsing errors I received on my first attempts due to my own mistakes and a case of fuzzy brain, I received no security warnings whatsoever. Maybe someone else could shed some light on this. All that is required is that the rules of PHP be followed. It should be noted that the <?php and closing ?> statements are not required with Deanos Tools, these are already stated within the module, so all that's needed is the php content.

An alternative would be to create an include statement that is pointed at an html file, this way no escapes are required. This would give you the ability to edit the content in a more traditional manner, which may be easier to manage all around. Example...

include('/home/samplepath/templates/custom/adsense.html');

Sorry, I need to assume that I'm writing for newbies since this will be read by many. I also don't know anyone here, and the number of messages posted is not always indicative of experience. Please take all I post with a grain of salt if this is stuff you already know.

Bottom line is that I'm not sure where the security message came from and hope someone else will shed some light on this. I'm using all of the solutions I posted here and all are working without problems for me.

Quote · 22 May 2010

dolphin shows me a security attack message.

I tried to write it manually to prove that character is the error, and just by typing <Hello> show message security attack Cry

Are you still running dolphin 7.0.0?
If you upgraded to 7.0.1 you should not see a security messages because the phpids security has been shut off by default in the latest version due to problems with it, so make sure it's shut off.

If your running dolphin 7.0.0 go to admin->Settings->Advanced Settings->Other.
If your running dolphin 7.0.1 go to admin->Settings->Advanced Settings->Security.


Set these 2 settings to a value of -1  Thats negative 1.

Total security impact threshold to send report:
Total security impact threshold to send report and block aggressor:



That will get rid of your security warning messages.

https://www.deanbassett.com
Quote · 22 May 2010

Hello
I want to put a banner on the side but with Manage banners I realized that with the small screens in does not appear well.
See image.
Can you help me?

Free Dating Site on: http://coolonweb.com
Quote · 22 May 2010

I have version 7.01 and deanos tools 1.5

This is the mail that sends the security attack :

Total impact: 35
Affected tags: xss, csrf, id, rfe, lfi, sqli

Variable: POST.phpcode | Value: echo &lt;script type=\&quot;text/javascript\&quot;&gt;&lt;!--
google_ad_client = \&quot;pub-xxxxxxxxxxxxxxx\&quot;;
/* 300x250, creado 7/05/10 */
google_ad_slot = \&quot;0191136416\&quot;;
google_ad_width = 300;
google_ad_height = 250;
//--&gt;
&lt;/script&gt;
&lt;script type=\&quot;text/javascript\&quot;
src=\&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js\&quot;&gt;
&lt;/script&gt;\';
Impact: 35 | Tags: xss, csrf, id, rfe, lfi, sqli
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35
Description: Detects comments to exploit firefox' faulty rendering and proprietary opera attacks | Tags: xss, csrf, id | ID: 36
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38
Description: Detects classic SQL injection probings 2/2 | Tags: sqli, id, lfi | ID: 43
Description: Detects code injection attempts 3/3 | Tags: id, rfe, lfi | ID: 60

Quote · 22 May 2010

I have version 7.01 and deanos tools 1.5

This is the mail that sends the security attack :

Total impact: 35
Affected tags: xss, csrf, id, rfe, lfi, sqli

Variable: POST.phpcode | Value: echo &lt;script type=\&quot;text/javascript\&quot;&gt;&lt;!--
google_ad_client = \&quot;pub-xxxxxxxxxxxxxxx\&quot;;
/* 300x250, creado 7/05/10 */
google_ad_slot = \&quot;0191136416\&quot;;
google_ad_width = 300;
google_ad_height = 250;
//--&gt;
&lt;/script&gt;
&lt;script type=\&quot;text/javascript\&quot;
src=\&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js\&quot;&gt;
&lt;/script&gt;\';
Impact: 35 | Tags: xss, csrf, id, rfe, lfi, sqli
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35
Description: Detects comments to exploit firefox' faulty rendering and proprietary opera attacks | Tags: xss, csrf, id | ID: 36
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38
Description: Detects classic SQL injection probings 2/2 | Tags: sqli, id, lfi | ID: 43
Description: Detects code injection attempts 3/3 | Tags: id, rfe, lfi | ID: 60

Look up at my last post. The instructions to shut off those security messages is there.

https://www.deanbassett.com
Quote · 22 May 2010

I have set these values - 1 before you write the post, do you have any idea because not working well?

Quote · 22 May 2010

Once the values have been set to -1 it should not happen. So yours is not working, and that would be the first case i have heard of.

I am going to play a hunch here.

When you typed -1 in your last post, your typed it as - 1 which means you put a space between the - and the 1. If you did that in the admin settings then that could explain it.

But i don't see how the system would have let you type it that way and accept it.

So, verify it.

Then try manually deleting default_filter.cache from the tmp folder on the server.

This is the first case i have seen where -1 did not shut the filters off. So if rechecking and removing that tmp file does not fix it, then i do not know where to go from there. As i said, i have not ever seen that happen before. So someone else would have to come up with a explination for that.



https://www.deanbassett.com
Quote · 22 May 2010

Turns out i was wrong. Those settings are under other for both 7.0.0 and 7.0.1 so it may be possible the wrong settings have been changed.

Under other change

Total security impact threshold to send report:
Total security impact threshold to send report and block aggressor:

Both at -1


Under security if you canged any values there.

IP Blacklist system mode (1 - total block, 2 - login block): should be set to 1

And

IP List Type (1 - all allowed except listed, 2 - all blocked except listed, 0 - disabled):  should be set to 0


https://www.deanbassett.com
Quote · 23 May 2010

follow your instructions at the bottom of the letter and the result is the same.

I can only think that I am wrong entering the code.

so as I am inserting adsense :

echo '<script type="text/javascript"><!--
google_ad_client = "pub-xxxxxxxxxxxxx";
/* 300x250, creado 7/05/10 */
google_ad_slot = "0191136416";
google_ad_width = 300;
google_ad_height = 250;
//-->
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>';

inserted into deanos tools 1.5 php block

Quote · 23 May 2010

No. With the security setting off, you should not get any security warnings at all. The code you enter would not matter. It's obvious your copy of dolphin is broken. It's ignoring those security settings.

Anyhow. The tools are not the best way to use php blocks.

You could try this mod which provides a easier way to enter and edit php blocks.


http://www.boonex.com/unity/extensions/entry/Add_PHP_Block_to_Page_Builders_


You should also start another topic on those security warnings. They should not occure, anywhere once they are disabled.

You might also want to post some big forum posts and large blogs. The best way to test is to write something large in microsoft word and copy and paste it into a fourm or blog post. A copy and paste from microsoft word almost always triggers a security warning.

https://www.deanbassett.com
Quote · 23 May 2010

Hello
I want to put a banner on the side but right with Manage banners I realized that with the small screens in does not appear well.
See image.
Can you help me?

Free Dating Site on: http://coolonweb.com
Quote · 23 May 2010

your have reason deano

When you paste something blogs shown alert security

How can I fix this?

Quote · 28 May 2010
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.