Browse Definitions :
Definition

pop-up blocker (pop-up killer)

A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser. Pop-up blockers work in a number of ways: some close the window before it appears, some disable the command that calls the pop-up, and some alter the window's source HTML. One problem with pop-up blockers has been that they cannot always differentiate between an unwanted pop-up window and one that is user-requested. Programs that can consistently do so are sometimes referred to as intelligent pop-up blockers.

To circumvent pop-up blockers, some frustrated marketers are turning to products that detect their presence and convert pop-ups to other formats, such as floating ads (which appear over a user-requested Web page and display for a specified time period before disappearing again). According to Joe Apprendi of Falk eSolutions, whose company offers such a product, up to 30% of paid ad impressions are blocked by browser software. Users may not appreciate the floating ad any more than they did the pop-up version, but they aren't likely to have a program installed to prevent its display.

Free pop-up blockers, such as STOPzilla and Panicware, are readily available for download. Both the Google and Yahoo toolbars include the ability to block pop-ups; that capacity is also enabled by default in Microsoft's XP Service Pack Two (SP2) settings for Internet Explorer.

This was last updated in September 2005

Continue Reading About pop-up blocker (pop-up killer)

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • whaling attack (whaling phishing)

    A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets...

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close