Posted By admin Posted On

Enhancing Your Hosts File Can Kill Net Bugs and Spyware and adware!

Look in your home windows listing in your PC for a file known as “HOSTS” (not “HOSTS.bak” or “HOSTS.SAM”, simply plain “HOSTS” w/o any extension on it). Open this file in notepad so you may edit it. Please remember that some variations of Home windows preserve the HOSTS file buried someplace deep underneath the system or system32 listing so that you might need to carry out a “discover file” search to find it in your machine 강남호스트바.

On this file you will notice a line that accommodates an IP deal with adopted by the phrase “localhost”. It ought to look one thing like this –

127.0.0.1 localhost

Now, on a brand new line, merely copy the identical IP deal with adopted by a tab spacing and put within the area for “didtheyreadit.com”. You must now have an entry that appears one thing like this –

127.0.0.1 didtheyreadit.com

Save the file and that is it. What’s going to now occur is that as an alternative of going out on the web to seek out the area identify “didtheyreadit.com”, this entry in your HOSTS file will drive your machine into pondering that this area resides by yourself machine. Unable to seek out something significant when it makes the search, it should simply surrender attempting and you should have stopped the bug useless in its tracks. No fuss, no muss.

This trick additionally works for different purposes that attain out throughout the web and report your actions to servers. One instance could be when you have been to be a person of DAP (Obtain Accelerator Plus) which fits out throughout the web to retrieve advert pictures to show inside the program. Merely replace your HOSTS file with the deal with that DAP is attempting to connect with and assign it to your localhost IP and presto, no extra adverts within the software. (effectively, nearly no extra as a result of DAP saves a duplicate of those adverts in your laborious drive and you’ll have to delete them as effectively to fully eradicate them)

Just about all you must do for any such software like that is to determine the area that it’s attempting to connect with on the web and also you now have the power to kill its actions as you see match. Works for adware, adware, you identify it.

One other use for this trick is if you’re a webmaster. I usually wind up getting a brand new account that already has a web site going however they need me to redo the location and host it on considered one of my servers and cancel the account the place they’re. In an effort to not need to shut down their current account whereas I’m growing their new web site, I’ll create an account for his or her new web site on my server and modify the HOSTS file on my pc in order that their area identify factors to the IP deal with of my server. This manner I can have a non-public connection to their new web site’s location for growth functions and after I have to drop by the shopper’s workplace to indicate them the progress of their new web site, I merely modify the HOSTS file (briefly after all) on their machine they usually can view their new web site as effectively.

One last observe and that’s that usually a trojan or virus will rewrite your HOSTS file in order that sure domains will seem there in an try to hijack your browsing actions. For instance you might even see an entry in it for Google.com related to an IP deal with. That is possible there to hijack your makes an attempt to connect with Google and steer you to the IP deal with within the HOSTS file as an alternative.

It’s a good suggestion to often test your HOSTS file to forestall your self from turning into a sufferer of phishing. For instance, think about a trojan or activeX part contaminated your machine and put in an entry in your HOSTS file that redirected your connection to PayPal’s login web page to a spoof web page that appears identical to PayPal’s web page. The deal with bar on the prime of your browser is unchanged however you aren’t at the actual PayPal web site. As a substitute, whenever you enter your login particulars, pondering that you’re logging into your account, you’re as an alternative submitting your knowledge to some hackers machine in China someplace. Scary, is not it?

A intelligent individual may get round this to some extent by making a batch file that rewrites your HOSTS file with a clean legitimate copy each time your begin your machine.