Skip to main content

Fixing ads.txt error in AdSense for your websites hosted on Blogger

We were recently approved to setup Google Adsense for a few websites. I was so ecstatic because I hadn't been able to get this going for a while due to some accounting errors. I assume there was a time duration where that token expires and am now glad to be able use this product. During the setup on our blogger sites, I ran into some technical errors pointed at fixing ads.txt otherwise it may impact ad revenue, i.e. "earnings at risk you need to fix some ads.txt file issues to avoid severe impact to your revenue".  To summarize the steps needed to enable Google Adsense on your site, you would simply need to do the following:  1) Create an ads.txt file in the root of your Blogger site like example.com/ads.txt by going to Settings > Moentization > Enable custom ads.txt slider;  2) Add your publisher ID to the ads.txt file in Blogger using string "google.com, pub-0000000000000000, DIRECT, f08c47fec0942fa0" where pub-0000000000000000 is your personal publisher

Cleaning Code-Injection Malware on Thanksgiving Weekend

I just finished removing a code-injected malware that blacklisted a website with security providers like Google and Symantec, and it had to be on this Thanksgiving Long Weekend. Nothing makes me more sick that having to deal with this type of cleanup but it has to be done. Our whole household is already sick with cough and flu so this adds to the fun.

I noticed the infection by constant emails from my service provider that my quota was getting exceeded. I know the site is popular but couldn’t be that popular. When I tried to get to the site using Google Chrome browser, I received a ominous red splash screen letting me know that there is malware on the site and that I should only continue if I understood the risks. Fortunately, I had the site registered with Google Webmaster Tools and was able to get a sample of the suspicious code injection. I also ran http://killmalware.com/, http://www.siteadvisor.com/sites/aminsolutions.com, and http://sitecheck.sucuri.net/ against the website to advise me what other sites see as a baseline prior to cleaning up the malware. This is what I had to do, without too much detail so that the hackers aren’t wise to the exact solutions:

• Put the site into maintenance mode, displaying a friendly reminder to clients that this is scheduled;
• If using CMS, update the platform to the latest version, including all security patches;
• Register the website with Google Webmaster Tools to have it tell you what and possibly where the code-injection malware is on the site;
• Search the web site’s file system for the sample malware code snippet returned by Google Webmaster Tools. Sometimes, it is easier to use Notepad++ to search through contents of every file so do this after downloading a copy of the entire web site locally to your computer. If hosted on the cloud, use your favorite FTP client like CoreFTP to download the contents;
• After finding the code-injected malware, remove the malicious code;
• Make sure you prevent future code-injections by following Google’s write-up here https://support.google.com/webmasters/answer/3024344. Specifically look for malicious code that’s obfuscated to avoid detection, e.g. eval (base64 decode);
• Get Google Webmaster Tools to re-review the site to ensure the malware has been removed. Make sure you configure the preferences to email you of any future malware attacks on the site;
• Run http://killmalware.com/, http://www.siteadvisor.com/sites/aminsolutions.com, and http://sitecheck.sucuri.net/ against the website to ensure it passes all the tests.
• After tests pass, deactivate maintenance mode on the website to open it back up to customers.

Gobble gobble gobble. That’s how you serve this turkey to dinner.

Comments

Popular posts from this blog

60 Days of Udacity: A Bertelsmann Technology Scholarship in AI

I applied and was recently awarded the Bertelsmann Technology scholarship where a group of students take part in an Artificial Intelligence track made up of 5 parts to be completed in 3.5 months.    As part of taking the class, we have to take part in a slack channel where we post our daily studies for 60 days reflecting on what we have learned. This is a transcription of those 60 days. The public github wiki is located here https://github.com/chromilo/udacity-bertelsmann-scholarship/wiki  Day 1:  I am in p3  (Datasets) doing the xray annotation project. I have created the appen job using the "Image Categorization" template. I uploaded the xray image data and modified the CML to make the  questions specific to checking for pnemonia. Also updated the Examples section. I am still working out the usage of conditional only-if in checkboxes to determine what other smarts to include when annotators go through the page. Created one Question so far and will continue working on the ot

Unable to get to computer BIOS because monitor goes to sleep at startup?

I just enrolled in a course that requires running virtual machines on my Windows 10 Pro computer using VirtualBox. I couldn't start the virtual machines because of this error "The native API dll was not found (C:\WINDOWS\system32\WinHvPlatform.dll)". After doing some troubleshooting, I found this to mean that the hardware acceleration settings required by the CPU to support virtualization are currently disabled in my computer BIOS. I had to enable virtualization on my CPU chipset (VT-x/AMD-V).  Seems easy enough, right? I rebooted my computer and was expecting to see the memory counter and options to get into the BIOS. It must have been so quick that it took me straight to Windows 10 login prompt right away. I tried again and as usual I am immediately back to Windows 10 login. Each time I reboot, there is a box that says my monitor is going to sleep and does not wake again until presented with Windows 10 login prompt. I can hear the disk and fans spinning during startup,

One of the more underappreciated AWS service

The most under-appreciated AWS service is the AWS Certificate Manager (ACM). This service provides SSL/TLS certificate for your custom domain as long as you subscribe to any ACM-integrated service like Elastic Cache or Cloudfront.  I had been using Wordpress to host my website https://aminsolutions.com for some time on a free web hosting provider. In order to provide SSL/TLS web encryption, I would have to buy a public certificate from an SSL provider and have that in front of my Wordpress content management web site. I found there were many limitations with that including installation of a public certificate on a free webhost subscription.  I would have had to start a paid web host subscription and in order to install a paid public certificate on a Wordpress website that wasn't getting a lot of hits. Regardless, it had to be secured via SSL web encryption so this is where AWS Cloudfront came in. Using AWS Cloudfront integrated with ACM, I can get a free public SSL web certificate