OK. There are two main ways that adblockers work. One is designed to stop pop-up/pop-under adverts, by intercepting the javascipt call that opens the pop-up window.
Some of them allow you to build a database of the people you will/won't accept pop-up's from.
Now, the nasty ad-blocking method - an explanation requires delving back into the dim dark past of the Internet...
In the early days, there were only a very small number of computers ("hosts") actually connected together via the Internet. So few, that each computer kept a list of ALL the other computers out there in a special file called "hosts". In Unix, it was stored in the location /etc/hosts. This file was updated regularly and sent to everyone who had a computer connected.
All it had in it was a list of host names, and the IP number they were using.
As the number of computers connected increased, this file updating became a chore, and the DNS was born. This allowed people to find the IP number of a host buy asking special computers ("name servers") what the IP number of a computer was.
Even though the DNS has exploded in growth, the "hosts" file still exists and is supported in most (I presume) computers that connect to the Internet. This includes Windows, Apple Mac and Linux.
Now, here's the rub. Most systems are configured so that they check entries in the hosts file BEFORE checking the DNS. So if a hostname appears in the hosts file, the IP # assigned to it in there will be used, ignoring what the DNS would say.
OK. So there exists a method to kill off a website, or divert it to a different location. If you managed to convince people to download a "poisoned" hosts file, you could divert all those users traffic destined to hotmail.com, aol.com, msn.com etc to an IP number of your choice. Luckily, it's a bit difficult to convince people to download a hosts file, and generally hen thye type in msn.com and get to your site instead, they're going to be a little peeved.
So along comes the famous file-sharing network Kazaa, which has been downloaded over 160 million times (just from the cNet download site alone). This software finances it's network by popping up ads. Some people get upset about this, so a Russian company released "Kazaa Lite" which does everything Kazaa does, but is stipped of the ad-display function.
Unfortunately, Kazaa Lite also distributes a poisoned hosts file, and this is installed by Kazaa Lite.
This poisoned host file contains a huge number of host names (domain names) together with the IP address 127.0.0.1
127.0.0.1 is a special IP address known as a "loopback" address. 127.0.0.1 points to your own local computer, no matter who you are. https://127.0.0.1 will display the web server running on your local machine (if one is running) or will just display nothing. Try it - you may find you have a web server running on your computer you didn't know was there!
Now, this hosts file supplied by Kazaa Lite contains the domain/host names of just about every known banner advert serving network on the planet. Commission Junction is listed. Befree is listed. Linkshare is listed.
All those banner ad networks are directed to the IP number 127.0.0.1
This means that when the person's browser asks for an image from a banner network, instead of the DNS telling the browser to get the banner from the correct host on the Internet, the browser asks for it from https://127.0.0.1 - the image doesn't exist at that location, so the banner never shows up.
This is all well and good, if all you want is to stop banners from appearing. The MAJOR problem occurs when you realise that almost ALL of these networks server their banner images from the same hostname as their main website. So if you have a textlink to one of these revenue networks, people with the poisoned hosts file on their computer CANNOT VISIT THAT SITE VIA THE TEXT LINK.
Even if the person has stopped using Kazaa Lite, even if they're de-installed the Kazaa Lite software, the hosts file remains and you will not see ANY revenue from that person when they try to get to blocked sponsors via your website.
Try to imagine just how many computers out there now have a poisoned hosts file on their computer. Try to imagine how much revenue you are losing because of it.
Even worse, it's not only Kazaa Lite that is installing poisoned hosts files. Even "pestpatrol", supposedly a scumware detector, installs a hosts file that blocks legitimate revenue networks.
Now, take a look at a couple of these poisoned host files, ad see if any of your networks or sponsors are listed: You'll need to download and unzip these files, but it's safe as long as you don't move thm into the exact location on your machine that the system expects that file to be.
https://www.kazaalite.com/ (listed as "Host file v1.29 - Blocks ad's and spyware")
https://www.pestpatrol.com/Support/Ho..._Block_Ads.asp contains handy instructions on how to block banner ads, including where the hosts file is located on most computers - the hosts file they recommend is at https://www.pestpatrol.com/Downloads/Misc/hosts
Unfortunately, short of going around and deleting all these poisoned hosts files from every infected computer on the planet, there is little we can do. There is no known way to detect when someone has a poisoned hosts file installed. I'm working on a possible detect javascript, but it's not working yet. :^(
The only way to fix this problem is to convince the ad netwrks and sponsors to stop sering adverts fromthe same domain as they host their website (or take clickthoughs) from.
If they leave their ad servers on the host/domain name that is included in the poisoned hosts file, but MOVE their main website or clickthrough servers to a different name, all this wasted traffic will return.
Commission Junction (the biggest affiliate aggregator?) is working on doing this right now.
Most of the rest don't even realise there's a problem. If you look in those hosts files and find one of your sponsors listed, EMAIL THEM, and tell them they have a problem. Point them to this thread if they don't understand what you're on about (a common problem, I'm afraid).