![]() | ![]() ![]() | ![]() |
In Windows systems, the Hosts file simply called "hosts" with no file extension can generally be found in the directory:
The directory where Windows looks for the Hosts file can be changed as a means for throwing malware off the track. The directory where Windows looks for the Hosts file is contained in this Registry key:
During my discussion with Leo I mentioned my own Hosts file. Here's its current contents:
The other domains and machine names in the file are places I don't want my web browser or other software inside my machine venturing for any reason. Many of these names may look familiar, and you would probably find web browser third-party tracking cookies bearing these domain names if you were to look into most PCs.
Preventing Windows and your web browser from going where you'd rather not have them go is a cool enough trick, and so easy to do with no software to install, that many people have invested a lot of time, effort and resources into creating and maintaining comprehensive Hosts files. Just take a browser through THIS typical "full feature" Internet site blocking Hosts file:
As you can see, that file is being served from the GRC server, but it is not being actively maintained. So if you are interested in beefing up your system with a similarly comprehensive Hosts file, I hope you'll check out the MVPS.ORG site where you can find the latest version of that file and a lot of other great information and resources about Windows Hosts files: Wikipedia:![]() | Gibson Research Corporation is owned and operated by Steve Gibson. The contents of this page are Copyright (c) 2022 Gibson Research Corporation. SpinRite, ShieldsUP, NanoProbe, and any other indicated trademarks are registered trademarks of Gibson Research Corporation, Laguna Hills, CA, USA. GRC's web and customer privacy policy. |
Last Edit: May 04, 2013 at 18:12 (3,681.47 days ago) | Viewed 2 times per day |