?
Solved

Info in Hosts file

Posted on 2007-11-22
6
Medium Priority
?
1,442 Views
Last Modified: 2013-11-15
Hi,
Why does Spybot fill your hosts file with hundreds of URLs?
Surely that's a big no no.
John
0
Comment
Question by:jasonbournecia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 47

Expert Comment

by:rpggamergirl
ID: 20337290
Some pc users prefer to block unwanted sites using a hosts file, like using WinHelp2002 hosts, or Spybot S&D hosts.
http://www.mvps.org/winhelp2002/hosts.htm

You don't have to use Spybot S&D Hosts list, just remove it. I only use Spybot's immunize feature.
0
 

Author Comment

by:jasonbournecia
ID: 20339309
Thanks for your response rpggamergirl, I always thought the only address in the host file should be the local machine 127.0.0.1.
In the page you linked, it has the example 127.0.0.1 ad.doubleclick.net. In my naivety, I thought this would point your localhost at ad.doubleclick.net. Are you saying it doesnt?
John
0
 
LVL 47

Accepted Solution

by:
rpggamergirl earned 200 total points
ID: 20340773
>>In the page you linked, it has the example 127.0.0.1 ad.doubleclick.net. In my naivety, I thought this would point your localhost at ad.doubleclick.net. Are you saying it doesnt?<<

127.0.0.1 ad.doubleclick.net

No it doesn't, it means the site is blocked.
The above line in your hosts file means that as.doubleclick.net is blocked.
127.0.0.1 is your home address or a loop address, so any line in your hosts file preceeded with that loop address 127.0.0.1 will never connect to that site.

If you want to block a certain website using your hosts file just add a line in your hosts file after a 127.0.0.1 and save, as in --> 127.0.0.1 name of the site here


0
When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

 

Author Closing Comment

by:jasonbournecia
ID: 31410575
Thanks rpggamergirl, something new to add to my tiny knowledge base
John
0
 

Author Comment

by:jasonbournecia
ID: 20356983
Thanks rpggamergirl, you've help tremendously. One last thing

Because the file says 127.0.0.1       localhost, if using 127.0.0.1 blahblah.website blocks blahblah,
how come 127.0.0.1  localhost doesnt block localhost from 127.0.0.1?
John
0
 
LVL 47

Expert Comment

by:rpggamergirl
ID: 20357305
>>how come 127.0.0.1  localhost doesnt block localhost from 127.0.0.1?<<

127.0.0.1 localhost
The above line means localhost is 127.0.0.1...when the hosts file is read, that line tells your pc that the localhost' numerical address is 127.0.0.1

So an entry like the one below always loops back to your pc(localhost).
127.0.0.1 badsite.com
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

All of the resources available today make learning a new digital media easier than ever-- if you know where to begin. This is a clear, simple guide to a few of the basic digital art mediums and how to begin learning them on your own.
IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question