Mysterious Mediacom

It’s been about a month since the first customer reported seeing ads for Mediacom VOIP phone service on sites that don’t normally have huge banner ads. Mediacom employees claimed to know nothing about it, so customers were left to investigate.

I now kind of regret clicking the “Opt Out” button, as I’m really curious to know what the company’s plans are for this technology. But Mediacom seems to be incredibly nervous about the subject — they’re refused comment both to customers and to journalists, and no more information appears to be forthcoming.

The off-the-record claims made by those supposedly in the know was that this was a test by Mediacom’s marketing department, performed without proper authorization. That claim feels a bit shaky though, as the marketing landing page is still up — as of today, that is, and the ad injection Javascript is still available.


         // Copyright 2007-2009 PerfTech, Inc.
document.writeln('<script type="text/javascript" src="' + webServer + '/bg/manager.js"></script>');

function Bulletin(tags)
{

            if (nesting(tags)) return;

   document.open();
   document.writeln('</pre>
<div id="bdiv" style="visibility: hidden;">');
 document.writeln('<!-- Save for Web Slices (5671 PerfTech Phone Banner-5) -->');
 document.writeln('
'); document.writeln(''); document.writeln('');document.writeln(''); document.writeln(''); document.writeln('');document.writeln(''); document.writeln(''); document.writeln('');document.writeln('');document.writeln(''); document.writeln(''); document.writeln(''); document.writeln('');document.writeln('');document.writeln('');document.writeln('');document.writeln(''); document.writeln(''); document.writeln('
<table id="Table_01" width="720" border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td rowspan="2" colspan="3">');
 document.writeln(' <a href="http://www.getmediacomtoday.com/phoneup.html" target="_blank"><img src="' + webServer + webFilesDir + '5671-PerfTech-Phone-Banner-5_01.jpg" alt="" width="699" height="116" border="0" /></a></td>
<td>');
makeButton("Close_X", "Close", "", "5671-PerfTech-Phone-Banner-5_02.jpg");
 document.writeln('</td>
</tr>
<tr>
<td>');
 document.writeln(' <img src="' + webServer + webFilesDir + '5671-PerfTech-Phone-Banner-5_03.jpg" alt="" width="21" height="92" border="0" /></td>
</tr>
<tr>
<td>');
 document.writeln(' <img src="' + webServer + webFilesDir + '5671-PerfTech-Phone-Banner-5_04.jpg" alt="" width="566" height="28" border="0" /></td>
<td>');
 document.writeln(' ');
makeButton("No_thanks", "Cgi", "ack", "5671-PerfTech-Phone-Banner-5_05.jpg");
 document.writeln('</td>
<td colspan="2">');
 document.writeln(' ');
makeButton("Opt Out Tab", "Cgi", "optout", "5671-PerfTech-Phone-Banner-5_06.jpg");
 document.writeln('</td>
</tr>
<tr>
<td>');
 document.writeln(' <img src="' + webServer + webFilesDir + 'spacer.gif" alt="" width="566" height="0" border="0" /></td>
<td>');
 document.writeln(' <img src="' + webServer + webFilesDir + 'spacer.gif" alt="" width="83" height="0" border="0" /></td>
<td>');
 document.writeln(' <img src="' + webServer + webFilesDir + 'spacer.gif" alt="" width="50" height="0" border="0" /></td>
<td>');
 document.writeln(' <img src="' + webServer + webFilesDir + 'spacer.gif" alt="" width="21" height="0" border="0" /></td>
</tr>
</tbody>
</table>
');
 document.writeln('<!-- End Save for Web Slices -->');
 document.writeln('</div>
<pre>
');
   document.writeln('</pre>
<iframe id="oiframe" name="oiframe" frameborder="0" scrolling="auto" width="100%" height="0"></iframe>
<pre>');
   document.close();
}

Note the table-based image slices. Adorable. They’re still online, too. The inference from Mediacom’s monthlong silence is obvious: this is something they are really, really interested in. They realize their customers hate it, but they’re betting they’ll be able to force us to live with it eventually. Realistically, this sad little piece of outdated code is probably the future of home internet service.

One thought on “Mysterious Mediacom

  1. Couldn’t this be worked around with some browser settings or a little bit of greasemonkey/userscripting? Not that it would stop them from injecting it in the first place.

    Like

Comments are closed.