D
DelJo63
Bleeping Computer site has a nice tutorial on the host file and how it relates to
DNS processing. Location (Macintosh, Linux, Windows), contents, and usage is explained.
With all the *$&%^ advertising servers, the article also explains how special entries in the host file
defeats access to adverts AND known sites with infected content.
I might I that under the paragraph Block Spyware/Ad Networks
there should be comments on misuse of contents! We have seen entries like
is a technique to hijack that site and could be used to phish the access to a bogus look-alike
Controlling the contents of your host file is manditory!
tutorial with downloads
DNS processing. Location (Macintosh, Linux, Windows), contents, and usage is explained.
With all the *$&%^ advertising servers, the article also explains how special entries in the host file
defeats access to adverts AND known sites with infected content.
I might I that under the paragraph Block Spyware/Ad Networks
there should be comments on misuse of contents! We have seen entries like
1.1.1.1 www.grisoft.com
which is the AVG home page. This entry (and any others which contain the url of a valid site but a bogus ip address)is a technique to hijack that site and could be used to phish the access to a bogus look-alike
Controlling the contents of your host file is manditory!
tutorial with downloads