Page 2 of 2 FirstFirst 12
Results 17 to 18 of 18

Thread: News - Windows 8 hosts won't block Doubleclick ads or Facebook

  1. #17
    Gentoo Ricer
    Join Date
    Jan 2005
    Location
    Galway
    Posts
    11,048
    Thanks
    1,016
    Thanked
    944 times in 704 posts
    • aidanjt's system
      • Motherboard:
      • Asus Strix Z370-G
      • CPU:
      • Intel i7-8700K
      • Memory:
      • 2x8GB Corsiar LPX 3000C15
      • Storage:
      • 500GB Samsung 960 EVO
      • Graphics card(s):
      • EVGA GTX 970 SC ACX 2.0
      • PSU:
      • EVGA G3 750W
      • Case:
      • Fractal Design Define C Mini
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • Asus MG279Q
      • Internet:
      • 240mbps Virgin Cable

    Re: News - Windows 8 hosts won't block Doubleclick ads or Facebook

    Quote Originally Posted by howdee View Post
    One more reason to use 0.0.0.0 "black hole" redirects instead of 127.0.0.1 loop-back address on systems that support this. It's also a lot faster (since that address doesn't exist) and uses less resources as it won't try to establish a connection to localhost firing all kinds of network aware events and running locally installed software. Many users are running web servers and/or update services listening on specific ports and 127.0.0.1 redirects would try to establish a connection with these services. Too many connections to localhost without specifying a port number can create all kinds of problems, including extremely long log files and random system crashes if certain advanced SYN Flood or DDoS detectors are installed and block incoming ports on a network loop-back address as a result of too many requests. Do try however, if your system supports 0.0.0.0 redirects before using them with all DNS targets you'd like to block with specific redirects in your HOST file! Cheers!
    I doubt it only removes HOST entries for loopback, that wouldn't do anything to prevent malware redirecting social media sites, online banking sites, etc. to fake online servers and harvest account credentials.
    Quote Originally Posted by Agent View Post
    ...every time Creative bring out a new card range their advertising makes it sound like they have discovered a way to insert a thousand Chuck Norris super dwarfs in your ears...

  2. #18
    Not a good person scaryjim's Avatar
    Join Date
    Jan 2009
    Location
    Gateshead
    Posts
    15,196
    Thanks
    1,231
    Thanked
    2,291 times in 1,874 posts
    • scaryjim's system
      • Motherboard:
      • Dell Inspiron
      • CPU:
      • Core i5 8250U
      • Memory:
      • 2x 4GB DDR4 2666
      • Storage:
      • 128GB M.2 SSD + 1TB HDD
      • Graphics card(s):
      • Radeon R5 230
      • PSU:
      • Battery/Dell brick
      • Case:
      • Dell Inspiron 5570
      • Operating System:
      • Windows 10
      • Monitor(s):
      • 15" 1080p laptop panel

    Re: News - Windows 8 hosts won't block Doubleclick ads or Facebook

    Quote Originally Posted by watercooled View Post
    Just because it points to 127.0.0.1 doesn't mean it's legit, in theory the malware could host its own web server locally, especially if the writers knew localhost entries remain untouched.
    More to the point, genuine malware uses localhost redirects to prevent software updates. I've cleaned a couple of machines where the anti-virus had caught/cleaned the infection, but not before dozens of HOSTS entries were added pointing all major anti-virus update domains to 127.0.0.1. One of those machines hadn't had virus updates for 18 months when I looked at it...

Page 2 of 2 FirstFirst 12

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •