693:
in this category). These hosts run the gamut of all the way from that comparatively innocuous random ad server all the way to hosts that can do serious damage to your system even if you aren't logged on as an
Administrator on Windows. When you do this you map them to 127.0.0.1. Optionally, on MS Windows you can use 0.0.0.0 (don't try this address with non-MS Windows systems - it doesn't work). These hosts could use JavaScript, Java, or any of another number of things to do their web exploits. Sometimes they use tracking cookies. Some of the Porn sites are backed by organized crime, and if you go to their sites they will blackmail you depending on your position within a given community. But you can't block all of the Porn on the Internet with a hosts file. It is impossible. There are at least well over 500,000 and perhaps more than a million Porn sites on the Internet now. What we have provided to block that many porn sites at hostsfile.org is a PAC proxy filter. BadHosts is the blocking hosts file. It does block some Porn that is not in this category, but there are just about as many porn hosts in the blocking hosts file that are in this category. Many on-line gambling and casino sites are in countries without extradition treaties to the United States or other European countries and many of them are far from reputable. Many on-line gambling sites also have ties to organized crime. Keep that in mind when you go to them. You may be safe going to bodog.com and betus.com, but you are 5-20 times more likely to have problems with Gambling sites on the Internet than with all of the sites on the Internet. Spies can go all the way from being a nuisance to being a severe security compromise. Insisting that people can't block these bad sites with entries in a blocking hosts file borders on being criminal. What method do you propose to block them with if they don't use this method? Even if you use a Macintosh or a Linux system don't snicker. I was thinking of removing the MS Windows exploit hosts from our Unix / Linux file. Most of them aren't using Active-X so much any more and are instead using Java, JavaScript, Flash Player, or something else to inject their payload. Guess what? The exploits work just as well on Linux or Macintosh even though you are protected from the Windows binaries. Many times the binary is just an extra kicker and what is really doing the malfeasance is the JavaScript itself. I kept coming up with so many hosts that do the same thing on Linux / Macintosh / Unix I just finally left all of them in. What few I have that are Microsoft specific I can put up with on Linux or other Unix-like systems. Most of the hosts in the MVPS Hosts file do NOT block ad servers just because they are ad servers. They block hosts that are doing one or more things wrong. Many can do damage even on more highly protected Unix-like systems and they can all certainly spy on you. How bad is the situation? Organized crime has taken over a lot of these hosts. BadHosts and MVPS Hosts files blocks the ones that we can find. There are many others we don't find. But why shouldn't people be allowed to block these hosts? The days of just slapping on some antivirus on MS Windows and calling that protection good enough are long gone. I have observed as many as several dozen worms knocking on Symantec's firewall with a Windows machine directly connected to a high speed Internet connection, and they did it in less than two minutes for the connection. I have gone as long as almost a year before some of the Trojans I discovered were recognized as such by the AV companies. I and others submit the malware to them, but there is so much malware now that nobody can keep up with all of them any more. You need much more than just an AV package now. Blocking hosts file entries are good ways to block these bad hosts.
669:
very deep and goes back to the 1970s when there were very few hosts on the
Internet, and nothing but hosts files were used. The only restrictions specified in the RFCs is that you have an IP address associated with one or more host names. If you feel the entire discussion for the hosts file itself is inappropriate for what should be in the Knowledge (XXG), that is for the top levels of the Knowledge (XXG) management to decide. In that case you should submit your reasons for this page to be cut to them, not to me. I have no control over that decision. I think if they do cut it though, they will be doing a great disservice to thousands of people. Similarly, cutting the links even though they may not agree with the Knowledge (XXG) guidelines isn't a good idea either. There is also the chance you are one of the ad serving people and reject it because it is driving money out of your pocket. In that case I can understand your objection. Do a Google / Yahoo / MSN search for hostsfile.org (BadHosts). You will have less than two pages of links. You want to know why? Because the hosts files at that site don't specifically block ads. We may block ad-sites, but not specifically because that is all they do. They have to do something in addition to that to get included. They also block some Porn hosts and some on-line Gambling hosts. The reason you have so few links to that site is because the very nature of putting that file on your machine begins to hide you and stop the spying. I did notice that the Knowledge (XXG) hosts file page was not one of those links. You will get the same effect with the MVPS hosts file. We are unlinking ourselves out of existence by stopping the spies. The BadHosts hosts file at hostsfile.org is a super-set of the MVPS hosts file. How do I know? I am the one that creates and maintains the hosts file at hostsfile.org. I submit all badly behaving hosts to the author of the MVPS hosts file and let him decide about inclusion. He does not have an exclusive on that information. I will provide that information to anybody who makes a blocking hosts file that requests it. Some of the things the hosts out there can do to you can be pretty bad. If you consider what we are doing is wrong I would contend that allowing people to be spied on or their machines infected is an even greater crime.
677:
on-line printers, and any other servers you have on the LAN. It is usually much more convenient to refer to the HP Printer as HP_MODEL rather than by IP address. Further, the way
Microsoft forces you to not be able to change the name of an IPP print server and gives the IPP printers the names unknown, unknown1, etc., forces you to name them. If you name them then you get unknown:hpdj930c, and unknown1:pagepro13502 for example. Without those names in the hosts file you would instead get unknown:192.168.1.121 and unknown1:192.168.1.123 for example. So making hosts file entries is the only way those printers will get a name. The name may look goofy, but that is the best you will ever get. Servers should NOT DHCP their IP addresses. You want to fix where they are at. Also, if you wish to have direct communication between two client hosts on the LAN, then you will want them to stop using DHCP, and assign them static IP addresses as well. You will also probably want to add all of these hosts to the hosts file so they can be referred to by name instead of IP address. All of this needs to be hid from the outside world. Relevant entries added to all of the hosts file on the LAN is a fast, easy way to do that. Trying to create inner / outer DNS servers is usually well beyond the technical expertise of most people. Adding these hosts to a hosts file is a much easier way to do this.
697:
entries for other programs that do the same thing. IMO, there is almost no legitimate reason for a DNS queries every few seconds if that is all you are going to do. ZoneAlarm was doing it every five seconds. That doesn't sound so bad until you consider that there are several million PCs that are using the ZoneAlarm firewall. I assume it is being done to prevent cache server poisoning, but I am pretty sure there are ISPs that are pretty unhappy about all of those unnecessary DNS query packets. Further, it is dubious just how much that protects against DNS cache server poisoning. Further, DNS cache server poisoning isn't nearly as big as problem as people think it is, but even if it is the TTL (Time To Live) for a host prevents a queries of the the other DNS parent servers until the TTL expires. A whole bunch of extra queries won't change that TTL and cause the bad entry to be flushed out and replaced by the correct one any faster just because there are more of them. Install WireShark (formerly
Ethereal) on your systems and you may be amazed how many packets are being shoved out by your machine when you are sitting there doing nothing. You will also be getting a first rate sniffer of what is being broadcast unless you use hubs instead of switches. If you use hubs, you will see all the network traffic on your network.
589:
entries in the user's Run or RunOnce or other Run registry keys to where the malware is installed. Vista has done nothing that prevents this from happening either. These LOCAL things that only apply to one user are easy to do. Macintosh and Linux systems have some well defined local user folders as well, and copying a trojan and key logger into their local binaries folder (for example ~/bin for Linux) and altering their startup scripts for their shell to make sure it is running when the user logs in can do just as effective a job of reading keyboard strokes as the key-loggers on
Microsoft Windows. In short, least privileges will NOT protect against this type of exploit. Even worse the potential exists on all platforms. Many if not most sites are already halfway there because they already identify your OS and your browser including all plugins. All that is left is to exploit say, Java to shove the malware into place and make sure it is automatically started. The only reason it hasn't been done yet on Macintosh and Linux is because of the small numbers of machines running those operating systems. That is going to change.
530:
least to 'sensitive' things) completely. Now if someone somehow does obtain access to your computer (stolen, accessed locally while you're away, remotely connected, etc.) they find nothing but mundane and uninteresting (and above all HARMLESS) junk. Use that EEPROM like a key and plug it in ONLY when you need that private data. Clear the cache and temp folders after each use of the key. These keys are pretty cheap compared to both losing a notebook AND realizing that your tax records and every login to every bank and credit account are on it, too. If you leave out the MP3s and terabyte of 'videos' you downloaded, a 2GB EEPROM will store anything of significance for most people, and can be hidden much more safely, securely and readily than other media. Mine's even water resistant (or you could keep it in a 'zip-lock' bag.) The computer isn't the important thing, the data on it is what you're worried about. There are additional steps for the extra-paranoid, but that would be one long article.
701:
wrong, tasteful ads that are associated with what you are looking for are appropriate. You can use something like AdBlock Plus in
Firefox on all platforms, or something like AdMuncher with all browsers on MS Windows only. If you want to block ads on all Operating Systems and with almost all browsers a PAC (Proxy Auto Configuration) filter may be your best get. John Loverso makes a good PAC ad blocker but it is woefully out of date ever since he shifted to using AdBlock Plus instead. I can tell you that many sites will block you if you use AdBlock Plus though. They detect it is there. So far they can't catch either a PAC filter or Ad Muncher. They may be able to discover the PAC filter, but finding the Ad Muncher is very difficult and a blocking hosts file is impossible to detect. Just because you and I don't agree that this is a proper use for entries in a hosts file is NOT going to stop others from using it in this manner.
1256:
the cache. DNS Cache was intended to be a quick and easy fix to reduce the number of DNS lookups and
Microsoft thought it would never store more than a few thousand host names. A better solution for speeding things up would have been to tell people to put entries of hosts they go to all the time into the hosts file. Every time the OS loads, it should check to see if the Hosts file has been altered to create an on disk btree for fast retrieval of names. Using an ipconfig with the /dnsflush option could be used to force the re-reading and creating. Even if you have several thousand entries in the hosts file, it is much quicker to look on average at 1/2 of the hosts in the hosts file to find what you need than to send a request to a DNS server and wait for the reply. But a btree would would be so much better you can't believe it.
1267:
was changed and automatically reloading things itself. My suggestion is that if you use a blocking hosts file, set your Anti-Spyware software to monitor but not alter the hosts file without your consent. If it makes any changes it should make them in a copy and put off reloading the Cache only after all the alterations are done. It should not remove any entries for "127.0.0.1" or "0.0.0.0" unless that is what is used to keep what ever is bad going. If the Anti-Spyware software automatically removes blocking entries, I would either have the Anti-Spyware not monitor the hosts file any more, or replace it with better Anti-Spyware software that treads more softly.
665:
localhost or a Fully
Qualified Domain Name (FQDN). Why you are pairing what IP with what host(s) is up to you unless you are doing it to commit fraud. If you are making changes to somebody else's hosts file without their permission or consent and it is to redirect them from say Google to a Porn Host, then it is obvious what you are doing is unethical, illegal, and undesirable. Any other reason as long as it isn't any of those three is permissible according to the RFCs (the documents that specify what you can and can't do). I must state right off that the MVPS hosts file, and the BadHosts hosts file (a super-set of the MVPS hosts file) DO NOT BLOCK ADS!
498:
extremely limited administrative capabilities which give you an extreme radio-button selection of "Omnipotent: Screw Me At Will" or "Somewhat Less
Omnipotent: Screw Me Somewhat Less". If you do software development work, you'll need to run a 'Workstation' or 'Server' version of Windows to have the sort of control you need. For most casual users (and kids) a 'User' level account settings will be sufficient for virtually any normal use, though the default 'user' account still allows too much. The question to ask yourself is "$ 50 extra for the 'Workstation' version, or $ 500 over the next few years buying junk to 'scan' your computer that doesn't work?"
526:
unplugged, powered off and disconnected the rest of the time. Store the USB drive somewhere separate from your computer (in case of fire, water damage, etc., there will be better chance that ONE hard disk will survive.) If you have a safe backup, there's nothing at all that can happen to your computer that will harm the backed up copies as well. Various vendors make backup software that makes the process incremental and painless (i.e. after the first backup, a weekly backup will usually take a minute or two), but you can just use XCOPY (or ROBOCOPY or 'rsync') to do it if you're comfortable with command line tools.
705:
legitimate per the RFCs. So why you are putting an entry into your own hosts file is up to you unless you are doing it to commit fraud. Frequently, bad sites can substitute porn sites for things like Google in your hosts file and that is fraudulent, but that is going in the opposite direction - it is allowing the bad hosts in. They can also substitute do-nothing sites for things like your anti-virus update servers and your anti-spy servers so your protection doesn't get updated. But that is somebody else doing that, not you. There is a new term for that - it is called a
Pornado (rhymes with Tornado).
1193:
possible and spent more time in DOS than the windowing system when I was using it. You'll still *see* the casing, it only affects how much typing you need to do at the command prompt and allows for the duplicated but differently cased names (which I never thought was a good thing but it matches the behavior of displaying the case to begin with more accurately). Similarly 8.3 filename creation has been optional for a long time now and is mostly irrelevant since none of the 16 bit software that might choke on a long file name will run on the 64 bit windows versions most people are running. --
522:
new and don't have an 'Administrator' password written down anywhere). Set a password on it you'll remember, and write it down anyway and file that away where you can definitely find it. It doesn't have to be the 'Administrator' account. Just an account with 'Administrator' privileges. ONLY after making that administrator account (or at least verifying you can log in as 'Administrator') should you lower your privileges to a 'safe' level. Then make sure your productivity software and toys still work. If some downloaded toy complains, uninstall it and find another one.
681:
packets. A look up in the hosts file is infinitely faster even if you have a huge hosts file. We were up to over 40,000 hosts before DNS finally was created and even with the slow machines we had at the time, it was pretty fast. I have done tests of over 70,000 hosts in a hosts file and the look up in the hosts file was still faster than doing a DNS query. So if you go to certain hosts over and over and they almost never change their IP address, stick them in the hosts file. Just be sure to do DNS queries every so often to make sure the IP address doesn't change.
617:. You can run IE, Firefox, or any other program at all, without admin privileges, even if you're running as an admin user. It removes the admin privileges from that instance of your browser (or whatever), which may not be a cure-all, but it would surely prevent some types of harm. You just make a shortcut to the lower-privileged version. Note: If you use this, you still have to use your original (full-privilege) version of IE to get MS Updates. They won't work without admin privileges. Again, I'm a dummy, so apologies if any of the terminology isn't correct.
746:
to %SystemRoot%\system32\drivers\etc\hosts blocks the relevant added host on both XP machines. Is this some anomaly that happened right after SP2 and went away or what? I would say that since it works to block a host on XP with the file name I just gave you, you are better off removing this comment altogether. How many people do you know who are running XP frozen at SP2 with no additional patches if that is what caused it to be moved to the I386 folder? Actually, I believe this is just a backup of your hosts file that existed pre-SP2.
1539:
the hosts file, but I assume Spybot found adware or something on the listed site. Until the reference desk explained it, I was worried that the site did some unauthorized change to my computer and was worried if the site did other things to my computer. Others may wonder how or why the site is listed when running that command, and can see that having such sites listed was by Spybot (or similar program) to protect the computer. If someone else has a better image, that might be fine, but something to illustrate this is helpful. --
577:
away from using IE? But Linux, Mac OS-X, and the various BSDs can have just as many problems when it comes to JavaScript, Java, and Flash Player exploits. Macintosh is also susceptible to any exploits that use QuickTime player since that is available for the Macintosh (but not for Linux). There is also no difference when it comes to tracking cookies. They are just as bad on all platforms. Although I and others have created a PAC file, nothing blocks things colder than a blocking hosts file.
685:
server which you know by name, but you but can't get the correct IP address any more because you either can't get to the Primary, Secondary, and Tertiary DNS servers or you don't trust them any more because you suspect they have DNS cache server poisoning. The cache server poisoning doesn't happen all that often, but smaller DNS servers can and do die occasionally. Looking up a temporary replacement in the hosts file is a fast and efficient way to get you going again.
2240:
interesting to some, but is entirely how-to and depends on the service and the software that uses the name lookup. The same creative use can be accomplished by using other name services. We don't include this stuff in the DNS or NIS articles either, as far as I recall. But if it is of interest, you are free to write an article about misuse, abuse, or creative use of name services, if you have reliable references to support the material.
673:
to discuss either, then remove this page from the Knowledge (XXG) entirely. My contention as somebody who has constructed several huge network management systems is that there are quite a few reasons for a hosts file to still exist and possible uses for it. Here are some of the reasons for adding a host to the hosts file but by no means all of them. You may or may not agree with some of them, but that is just a personal opinion
2425:), vs. mere 7-10ms access of the HOSTS file from harddisk (or faster once the hosts file is cached into memory either by the local kernelmode diskcache subsystem in modern operating systems, or when using smaller hosts files, as larger files aren't good with the local DNS clientside cache service in Windows (which has a flaw in it with them due to a fix-size buffer/array/list/queue in use, noted here for work-arounds vs. it
84:
53:
176:
2456:
turned off (plus electricity as well as a bonus by NOT running a service that you do not need & that malfunctions with larger HOSTS files in the 1st place - the kernelmode local diskcache subsystem in ANY modern Operating System will then cache the HOSTS file, like it does ANY FILE (& just like the DNS local clientside cache service, albeit minus the "lags" it introduces with larger HOSTS files))... apk
2554:
2386:
2267:
copied its original content from this article. Claiming a source credit for simply formatting the information into a wiki table is not a valid reason for a citation, as the claimed source is using the identical software and formatting tools created by Knowledge (XXG). Furthermore, the claimed source's owner or creator is engaging itself in promoting the source here, which is a violation of
502:
house (or office) having privileges to download something they see on a pop-up ad and click "Yes" when it prompts to install... unless you LIKE doing full virus scans weekly and having half a dozen 'protect me' kludges scanning everything on your computer all the time, slowing everything to a crawl, and then re-installing Windows every few months because the damage adds up.
22:
152:
1968:"6. Running a local web server can expose a system to increased external attacks; doing so for this purpose is questionable. Furthermore, a local web server may well be used for other purposes so configuring it to reject unwanted ad requests while fulfilling its primary purpose may be troublesome and the added load may be undesirable."
2593:
sites/servers/hosts-domains) - An even smaller & faster blocking address format is possible on Windows 2000 & XP (Server 2003 also) in using 0 as the blocking IP address (this was also possible on VISTA until 12/08/2009 MS "Patch Tuesday" but is no longer possible on versions of Windows after VISTA (7/Server 2008)).... apk
514:
their "Program Files" folder, or modifying system-level registry entries will fail - and this is what Microsoft has made all users into 'Administrators' to enable, so the software based on their earlier, even more flawed non-security model can all still work, while leaving the door wide open for everything else.
565:
that fact changes there is nothing you or I or anybody else can do about it. But more to the point, what does any of the previous have to do with a hosts file? If you are saying that by just dropping my privileges that is all that is required, you are a fool. Read my last point and you will understand why.
581:
has removed it. The only hosts that are in my BadHosts file that aren't in the MVPS hosts file are Porn and Casino sites that fall through our PAC filter. I send on all bad sites to the author of that file. It was very distressing for you people to ignore the big three once you started listing things.
2450:
DWORD Value (type) MaxNegativeCacheTtl Next right-click on the MaxCacheTtl entry (right pane) and select: Modify and change the value to 1 The MaxNegativeCacheTtl entry should already have a value of 0 (leave it that way - see screenshot) Close Regedit and reboot ... As usual you should always backup
2315:
then later copied Knowledge (XXG)'s table into lunarsoft's wiki (without attribution). I originally cited his wiki at the time, but would say it should now be removed because the source itself has changed to effectively be a mirror of Knowledge (XXG). Knowledge (XXG) cannot act as a cite for itself.
1255:
Where should I begin here? "DNS Client" is a service that is provided on Windows 2000, Windows XP, and Windows 2003 Server. I have yet to look at Vista, but assume it is the same. "DNS Client" attempts to read all of the hosts file entries, but if there are too many, it can't read all of them into
745:
That is strange. I am running XP Home and XP Pro fully patched. I also have W2K partially patched up to but not including their malware crap which hoses that OS because it caused so many problems. I no longer use W2K for serious work any more though. Both XP are patched up-to-date. Adding an entry
692:
To block hosts you want nothing to do with. These hosts I am referring to may or may not not be ad-servers. If they are being blocked though, they are not being specifically blocked for putting out ads unless they use a random function to pick the ad (that is the minimum needed to include ad servers
684:
Put your DNS servers in the hosts file. This can include other DNS servers other than your Primary and Secondary DNS servers in case your main DNS servers either conk out or suffer from DNS cache server poisoning. Why? Here we come to a chicken versus egg problem. You are trying to access the DNS
672:
As I see it, a discussion of the hosts file without saying something about why it still exists (theoretically, DNS could completely replace it if the localhost entry was translated by all network aware applications), and what can potentially be added to the hosts file is pointless. If you don't want
580:
4. The one hosts file I wished was listed that isn't is Camelon's. When you people started putting in links I was very distressed that you didn't point to the MVPS hosts file, Camelon's, and HPHosts. Almost all of the others are deriving from those three. At one time MVPS was in there and somebody
576:
3. Don't assume that Linux, Mac OS-X, et al, don't have problems with web sites. They do. They are of course protected from Windows binaries. Active-X is an Internet Explorer problem and can be avoided by the use of any other browser on Windows. But how many MS Windows users have you tried to pry
568:
1. For better or worse, the Microsoft Windows OS sometimes makes it very difficult to do things with restricted accounts, most notably in updating anti-virus, anti-spy and other things. This is because of the heritage of Windows coming from a single user environment as opposed to a multiple user and
517:
If you need to do something, it takes only a minute to log off and log in as 'Administrator' (or type 'su' to become root) and do what needed to be done (usually install a driver or piece of software, occasionally give your 'user' account an extra privilege to enable something), then log back in with
3317:
is all I can say to any of it. In any case, the first documented use of hosts for anti-advertisement purposes that I can find dates (very unsurprisingly) to the defunct fravia.org / searchlores.org's anti-advertisement section where it was published in June, 1999, and had existed somewhat longer
3039:
Can someone help me. What is the host file supposed to contain? My XP seems to have two hostss files, one with just a couple of entries and the number beginning with 127, another with a few hundred names all with 0.0.0.0. This one is from 2014. Should it be kept or removed? Should it be updated? The
2420:
This is possible using the local HOSTS file also - This is known as "hardcoding" an IP-address-to-HOST/DOMAIN name. Doing so locally results in far faster resolutions of hosts/domain names to IP addresses, since this typically takes 30-hundreds of milliseconds response from remote DNS Servers (which
2338:
The table says that on 64-bit Windows, the location is "%SystemRoot%\SysWOW64\drivers\etc\". I've got a couple of 64-bit Windows systems here (Windows Server 2008 Standard, Windows Vista Ultimate, both 64-bit), and neither one has an "etc" folder in %SystemRoot%\SysWOW64\drivers\. I know it's what
2188:
which mostly deleted text I didn't write, but also deleted my entry near the end. This is not an OS-specific issue, although there were references to common unix software (unix being commonly used as gateways). Should such a note be added again, but with a reference to a book on network security?
1857:
Each link should be considered on its merits, using the following guidelines. As the number of external links in an article grows longer, assessment should become stricter. When in doubt about the appropriateness of adding new links, make a suggestion on the article's talkpage and discuss with other
1003:
I don't know the actual page you are referring to. Technically it would be better to drop this from this article altogether since once ether and MAC addresses are introduced you enter discussions of ARP and RARP. Other than to say that IP address maps to closest MAC address (or MAC address of port
771:
I agree with you. I can't understand the warnings about the links pointing to commercial sites. As far as I know, none of the sites is commercial. The hpHosts, BadHosts, and many of the other hosts files are covered by a Creative Commons license that is so similar to the GPL that they may as well
696:
To tame down impolite programs that do meaningless DNS queries every few seconds. The BadHosts hosts file for Windows at hostsfile.org has some for the ZoneAlarm hosts associated with the ZoneAlarm Firewall commented out. People can uncomment those entries with that particular program or add other
688:
To make sure you go to hosts that are critical and you don't want to depend on DNS to get you there. This is being done for security reasons. It can be done to guard against cache server poisoning, but an equally valid way of doing that is to access a hidden host that doesn't have a DNS entry. Yes,
680:
There is an extreme latency in asking a DNS server for an IP address. After all, the query turns into at least one UDP (User Datagram Protocol packet) out to the DNS server and one UDP packet back. In reality, most browsers query repeatedly so you end up with at least four up to who knows how many
592:
In conclusion, I have nothing against the principle of least privileges. It SHOULD be done! But depending on it as a panacea that will cure all the problems is extremely naive. Also, shifting to using Mac OS-X, Linux, or one of BSDs will only get you so far. I think we should put up the code for
529:
And one last security tip: Put your most sensitive, sacred, personal things on an EEPROM (USB or whatever memory card format - Back that up, too!) Put all of your sensitive website links and passwords in a file on that stick, too. Clear those automatically entered passwords out of your browser (at
513:
All well written software that 'behaves' will run fine with user privileges. Software that attempts to do more than the 'user' has privileges to do will fail to modify 'important' files, and (if written well) tell the user why. Older software that makes very dumb assumptions about keeping files in
2839:
and other articles discussing filenames is just plain old normal. I would take an expert's advice on the matter: er, mine. But barring that, I simply pointed to corroborating evidence assuming you might not be familiar with technical manuals and reference works that discuss files. Any old copy of a
2206:
I think all of these recipes of secondary use of the hosts file amounted to how-to advice and original research, which is not within WP scope. I don't know what important info you refer to, but if it is to point out that hosts file based methods are not network-wide, then I'd say such trivia is not
1936:
clearly goes against the idea that you need to dual license any contributions of yours to wikipedia. It will probably be acceptable to mention on the talk page that you have some work which you feel will help the article and is available under the CC-BY-SA so others can choose whether to import it.
1538:
image is useful in explaining about hosts files and their contents. Through asking at the reference desk, I found out that Spybot - Search & Destroy populated my hosts file. (not me) Maybe the caption can be modified to explain about Spybot. I don't understand how Spybot chooses what to list in
1270:
In conclusion, if you use a blocking hosts file on most modern Microsoft Windows operating systems, you must turn off the DNS Cache service. It is all I have found that works. You may be able to get by with a smaller hosts file, but even with it, things work much better if you just turn DNS Cache
1266:
Several years back Spybot Search & Destroy started removing my blocking entries and before long the CPU was maxed! The reason why is that it was reloading the DNS Cache after every host removal. I never did find whether it was Spybot doing a ipconfig /flushdns or the OS detecting that the file
1054:
Congratulations for your excellent document (far better than the French one)! I just wanted to say Funkytoad had to change the name of his tool from 'Hoster 3.1' to 'HostsXpert v4.0' (with a new version) as after years, he realized Hoster was already used for another program... link doesn't change!
887:
Again, it depends on what software is accessing the Internet, so restarting a browser (or opening a new tab) may in fact be sufficient for all intents and purposes, but on the other hand, it could also result in “mysterious” circumstances with mixed results where one part seems to be picking up the
881:
It depends on what is accessing the network. Most programs will need to be closed and restarted to pick up the changes. Because of this, most core OS components will usually require a full reboot to pick up the changes (logging out and back in will only work for components like the shell). Advanced
572:
2. The other reason is that Microsoft's NTFS system is rather primitive since it didn't have the idea of file ownership. If IBM had followed their own OS / 400 (then AS / 400) people, OpenVMS, or Unix in designing the HPFS which NTFS descended from, many of the present day problems could have been
2701:
I have read a number of technical and service manuals... both printed and on the WWW. There are many which utilize different font faces for different contextual parts of a manual. For example an error message might be boxed and annotated, a dangerous point in a procedure might be preempted with an
2239:
Objectively, the only thing that there is to understand about the hosts file is that it is a name resolution facility for IP. That is the only purpose it has and once you understand that, everything else falls in place. What creative things one does with a name service function beyond this, may be
2027:
Does that key really works? I made a couple of checks, and it appears that the key works on Windows 2000, but is ignored on Windows XP and Windows Vista (the path to the hosts file on XP/Vista seems to be hardcoded into the dnsapi.dll module, which is used by both Dnscache (aka DNS Client) service
1931:
In addition, while wikipedia has now moved to dual licensing, you still should not import CC-BY-SA 3.0 content of your own. It may be acceptable to import some CC-BY-SA 3.0 or weaker licensed content from external websites but this needs to be done carefully and properly (e.g. make sure you ensure
1215:
I've heard different views detailing the "DNS Client" service on Windows XP (and I assume other versions of Windows with that service). It's not that Windows "ignores" the HOSTS file, but it tries to load the _complete_ HOSTS file into this "cache", resulting in web surfing/domain name resolution
1140:
Under the Location heading, I changed the name of the file from "HOSTS" to "hosts", reversing the change that 4.225.172.115 made on 3 August 2006; the rationale being that on Unix-like systems, file names are case sensitive and for them the file is named "hosts". On Windows, the names are not case
1082:
So I changed the part "Bluetack, B.I.S.S Hosts Manager" into "Kimberly's Hosts Manager" and added the comment " – Freeware Microsoft Windows hosts file manager, on the forum B.I.S.S-Bluetack Internet Security Solutions" ipl001 September 21, 2007 7:15p Paris Time (Gérard Mélone from Paris, France)
700:
To block ads. The MVPS hosts file and the BadHosts hosts file don't specifically block ads! HPHosts and other blocking hosts files originally had that as their main purpose. But most of the blocking hosts files have moved beyond just blocking ads. If you ask me, unless the host is doing something
588:
6. Least privileges only go so far in protecting a system. On Windows there is nothing to prevent people from doing an infection locally. By that I mean that they can put their malicious code either in the user's Start folder, or a link pointing to where it is in the user's Start folder, or make
533:
The EEPROM its self can even be encrypted - but don't count on that encryption protecting data from authorities. If that's a concern, get a tiny-sized one for a digital camera (most cameras have a USB cord and can be read like a hard disk) that you can bite down on and crush if it's a question of
521:
It should be noted that if you're going to make your current account into 'user', that you'd better make an 'Administrator' enabled one FIRST. I have never met a common Windows user with 'spyware' and 'virus' problems who knows their Administrator account password (many PCs ship to the user brand
501:
Most of the garbage that vendors dump on the market to 'protect' users from these 'threats' is nothing more than a patchwork of bandaids cobbled together over the root (sic) problem of excessive login privileges for routine work/entertainment use. Believe me, you really don't want everyone in the
3292:
I'm unsure how something that came out in 2011 is recent, but Chrome otherwise falls under the Unix category for the file location. The rest you'll have to Google, because just editing it isn't going to help. It probably doesn't deserve its own category, only the rootfs behavior is non-standard
2266:
A dispute seems to exist over the origin and attribution of the location table in this article. I examined the history of the section and the claimed source wiki. Based on this I found that the content of the table existed well before the claimed source existed, and that the claimed source likely
1388:
The syntax is described as per comments in the default hosts file on our Windows XP Media Center system, and the syntax on Linux is more elaborate. That is, under linux a host address can definitely be followed by more than one whitespace separated name, but I think a FQN should come first and is
1262:
You cannot turn off DNS Cache if you use IPSEC and several other services. Having said that, the only way around this problem if you are using a blocking hosts file is to just turn off the "DNS Client" service. You are better setting it to "Manual" for startup first though. So far, there is no
676:
For a LAN hidden behind a firewall that does NAT (Network Address Translation). The LAN is technically not part of the Internet at large, and merging that network with the Internet's DNS servers usually isn't practicable. But you do need to have the machines talking to one or more file servers,
668:
I don't know what your objections to a hosts file being used to block adservers is. If it is because you feel it is not in compliance with the RFCs for what a hosts file is to be used for I am going to tell you that you are wrong. I don't know how much you know but my knowledge of networking is
564:
0. Please sign your name to stand behind these statements! I am a creator of one of the blocking hosts files, and it defends more than just Microsoft Windows systems. I work almost 85% of the time using Linux, not MS-Windows. It is just a fact of life that most people are using Windows. Until
2455:
THE WORK-AROUND I HAVE FOUND THAT WORKS BEST WITH LARGER HOSTS FILES is to simply shut down the local DNS clientside cache for DNS via services.msc (setting its startup type to disabled) with larger HOSTS files. This saves CPU cycles, RAM, & other forms of I/O used by said service once it is
2184:
Twice I added a note about the important difference between a local host file and a network-wide filtering policy. Unfortunately both were eventually reverted by Kbrose. I am asking why a section on filtering exists, if it cannot be complete with a mention of its important caveats. The latest
1975:
They appear to be someone's own statements, and were most probably intended to be helpful. However, please know that as an encyclopedia article, all significant statements in the article should be sourced, and the "References" section is the place to put those sources and/or links to them. These
525:
Oh, and just a reminder: BACK UP YOUR DOCUMENTS/PICTURES/ETC. A USB2 hard disk big enough to back everything up, and fast enough to do it relatively quickly is dirt cheap compared to the time needed to re-create it all. Best practice is to plug the USB drive in to perform backups, and leave it
497:
Generally, the whole spyware/malware/virus problem boils down to Microsoft's unique insistance on making it 'convenient' for ignorant users by making them log on as 'Administrator' (root) by default. It doesn't help that the 'Home' version of Windows XP that's shipped in most consumer boxes has
333:
When you use the 0.0.0.0 method it doesnt try connect anywhere. But if you use 127.0.0.1 it actually tries to connect to a service on your computer which makes it take longer and use up more resources. Also you might run a webserver that it ask for invalid requests. Therefore it is better to use
1192:
NTFS stores case info but whether it requires operations to be case sensitive is controlled by per-drive or per-directory flags. Just like VFAT long file names, except I can't recall for the life of me whether you could enable case sensitivity on Windows 95 because I moved to NT 4.0 as soon as
664:
The comments from here on are made by hhhobbit. Who made the previous comments? Please say who you are and what purposes you feel a hosts file is for. To me the only reason for a hosts file is to pair an IP Address with one or more Host Names per line. The host name can be either simple like
2645:
When you mention the file location for the HOSTS file, you mention "%SystemRoot%" for Windows. Not everyone knows what this is, and not everyone knows it's suppose to be in the "Windows" directory. This needs some clarification as it has confused me on two separate occasions when I read this
1285:
I do not believe that real ad sites should be used as examples in a negative way such as this. It is unfair to single these companies out on such a highly trafficked and is not Neutral. Instead, I think there should be a section on host file syntax before the 'Ad Filtering' section. The syntax
1561:. Showing an image of a DNS lookup citing a website that has had a long history of apparent conflict between them and wikipedia has no place on the wikipedia. If the justification for an image is what you can put into a caption, then the image is not needed, just put the text in the article.
1286:
section should use the officially sanctioned 'example.com' address. The 'Ad Filtering' section should not show examples, but keep the explanation on how and why it is done. One of the external links could be to a site that provides lists of hostnames to add to your host file. These lists are
704:
These are just some of the reasons you will still use a hosts file. You can object to any or all of them from a personal level, but unless I missed something you cannot use the RFCs governing what you can do with the hosts file to shoot down any of these reasons. ALL of these reasons are
505:
When just editing documents, emailing, browsing the web, etc., a 'user' account (one with limited privileges to change files in a designated place - for windows it might be their subfolder in 'Documents And Settings' and for Unix/Linux users it might be their home folder) is very adequate.
509:
In general, one should only log on with admin/root privileges when deliberately making changes to the system (installing/removing devices and software, adding/editing accounts, that sort of thing). Generally one shouldn't engage in any 'risky' download/browsing behavior while logged in as
1416:
It may not matter because you are correct about all versions of Windows. They can only handle one hostname per IP on each line. I have not looked at OpenVMS lately, but I think it is similar to Linux which means that you can have one or more hostnames per line. Linux is the same as Unix.
1156:
Also, the reason you see the filename in lowercase on Windows is likely due to how the file-system and shell operate. They have been designed such that filenames that are entirely in uppercase will be displayed as all lowercase. It is a backwards-compatibility hack that hearkens back to
2592:
This is analogous to a DNS "blackhole" and does NOT loop back to the host computer loopback address of 127.0.0.1 as noted above (and the use of 0.0.0.0 also parses faster since it is smaller by 2 characters per line than 127.0.0.1 does in hosts file entries for blocking known malicious
772:
be the same thing. If you see some that have an all rights reserved and a (C) copyright protection, by all means remove the links. The PAC filter that goes with the BadHosts file IS covered by the GPL. Therefore, I think the warning that the links are commercial needs to be removed.
1237:"Windows XP SP2, and perhaps other versions, appears to ignore the hosts file in certain circumstances if the "DNS Client" service is running. If this happens, one workaround is to stop and disable the service. It is not known whether there are better ways to workaround this quirk."
584:
5. Encryption of a disk is absolutely useless until the machine is shut down. Separate file encryption does have merit, but only as long as you don't have a key-logger on your system. If they are on your system and stole your keys and know your pass-phrase, they are home free.
2221:
Bizarre what people think is or is not relevant. I discovered wikipedia via this page many moons ago. The chunk Kbrose removed was actually the bit I used to deal with my HOSTS file after moving to win7 a month back... I don't see it as a "how to" but as an integral part of
1420:
The same address can appear on as many lines as necessary. But do not do that on a Network Management system. By that I mean do not do it on systems running something like HP Openview or Sun NetManager. But by the time you do that, you will be running a Squid proxy server.
1369:
add-on for Firefox. It now has capacity to block I-frames. Blocking scripts and I-frames keeps most ads out. I have near-zero tech knowledge (please keep that in mind if you respond!), but these simple solutions, plus the MVPS Hosts filter, have been very effective. Regards,
3321:
Also added some info from a malwarebytes blog about something that replaces a dns lib and forces an alternate hosts file to be loaded so the original appears unaffected, which is kinda a bass-ackwards way to go about it if you're already modifying the DNS libs but whatever.
1364:
I find the original AdBlock very easy to use and economical of resources. No external file needed. Whenever you see a new ad, just right-click and add its domain to the "Filter" list. A block-list is quickly built up, after which very few new ads appear. Also, use the free
1556:
As explained in the article, the Hosts file is a text file. You don't need an image to show text. You don't need an image to show how to do a DNS lookup, which is what your image showed. Discussing DNS lookups really isn't even that appropriate here, just point them to
787:
I've never found it necessary to restart a Windows machine for changes to the hosts file to take affect, in fact this is one of the few instances I know of where a restart after a change like this isn't necessary. I've used w9x and w2k, not certain about other versions.
1078:
I fixed the part regarding "Bluetack, B.I.S.S Hosts Manager" because the author should be quoted: it's Kimberly an MS-MVP Windows Security and a friend of mine; there was no text in front of the line; B. is after Bluetack and I guess I made it clearer (link unchanged).
404:
What does that have to do with 0.0.0.0? 0.0.0.0 has NO meaning on Linux, FreeBSD, or Mac OS-X and causes problems on those operating systems. The added benefit of using 127.0.0.1 is that the top phttpd (Pseudo HTTP Daemon) and Homer log what is being stopped and why.
1507:
Sadly, PPP is correct; the hosts-file format does not support wildcards. And obviously it is impossible to add every potential domain and subdomain you might want to redirect and/or block to it. In that case, you would have to resort to running a local DNS server like
2765:
which introduced many code tags. I suspect the word "hosts" appears too often for a special font to be desirable, and it could be argued that "the hosts file" should not have a special font. I don't think I've seen this issue at Knowledge (XXG) and do not know if
1251:
When you have DNS Cache turned on, it is assumed that all of the hosts files entries have been read into the cache. Therefore the order of lookup is DNS Cache first, DNS query second. If you turn off DNS Cache, then the order is hosts file first, DNS second.
1216:
taking very long to work, since it has to go through so many entries. And well, look at the external links, many of those HOSTS files are greater than 1-2MBs, so having to search through every entry, for every DNS lookup makes Internet sites to seem slow. --
2488:
Use of hardcoded IP addresses to host/domain names can help circumvent attack & exploit by DNS poisoned DNS servers (via using hardcodes of sites you often visit, for example, as noted above for speed) - once more, this link has a good read on that also
1990:
255.0.0.0 and 255.255.255.0 should not be used, as these adresses are not by definition invalid. so i'm not suprised that there is no proper footnotes for that.... just type them into your browser and it tries to connect - and thats what should be avoided.
3318:
on the messageboards before being posted to the main site. The MVPS list is supposed to have been around since 1998 (according to itself, at least) which pre-dates that article but I'm unable to find any references / links to it from before ~2002ish.
1392:
I do not know (yet) if more than one name is valid under Windows XP - hasn't worked at all for me but maybe this is not the reason. I started by copying my linux hosts file to windows, which I thought is what I used to do on Windows 95 and 98. So...
1902:
I also still remain unclear of the function of the link to your forum. If you are citing then please use the correct wiki markup and link to your wiki. In which case, why is there a link to your forum? It is not the source of the content.
1433:
Could we have some comment on multiple names on the same ip address line eg "127.0.0.1 localhost localhost.localdomain" or "127.0.0.1 localhost.localdomain localhost" and whether the 127.0.0.1 line should ever include the actual hostname ?
1488:
No, there is no 'wildcard' in hosts. Your example would only lead googlesyndication.com to 127.0.0.1 and not any subdomain. If you want subdomains to be redirected to 127.0.0.1 too then you will need to specify each and every one of them.
2470:
Hosts can very noticeably speed up internet websurfing by blocking out banner ad content which also frees up bandwidth, and gets a websurfer more for his money paid. A good read by Mr. Oliver Day of SECURITYFOCUS.COM on that note is here
2274:
There appears no reason to cite the source here. The information in the table is furthermore not a unique intellectual creation of the claimed source, it is simply a compilation of commonly available technical facts of operating systems.
1018:
This article also needs a section about hosts file that can be downloaded and installed on user systems. Would be great to have direct links to site that maintain hosts files of known/acknowledged malware sites, adult content sites, etc.
1965:"5. Using the loopback address can be problematic as it redirects requests to the local machine which may be running a web server for a different purpose. Consequently, using an invalid address, like 0.0.0.0 or 255.255.255.0 is safer."
240:
hmm, i just noticed something. why is this page titled "Host file"? But, in the Windows environment, it's referred to as a "HOSTS file". And is a file called "HOSTS" which resides in the C:\Windows\System32\drivers\etc directory.
1004:
going out of subnet) and its similarity of host name to IP address, all similarity ends there. I would limit the scope of a hosts file discussion to NOT include lower network layer protocols since that is a different subject.
593:
what was at the mostannoyingwebpage.org. It trapped you with nothing but JavaScript, and it is getting more and more frequent that the JavaScript exploits work just as well on the Mac and Linux systems as they do on Windows.
2988:, which explains use in command lines, is closest we've got in the MOS and I would argue that this is in agreement with what I've said above. It's fine when a file is identified as used on a command line, but otherwise no.
1854:* Is the site content accessible to the reader? * Is the site content proper in the context of the article (useful, tasteful, informative, factual, etc.)? * Is the link functional and likely to remain functional?
2122:
2803:
markup is primarily for examples of code, placed in a distinct section of the article, not in the middle of paragraphs of normal text. And I would argue that single mentions of "host file" or "hosts" do not qualify as
215:
o Fix the crappy formatting, spelling errors, etc o Fix all the technical ambiguity, remove OS prejudices, etc. o Move chunks of the article into a more appropriate article, such as "Hosts_File_Filtering" or something
2435:
If you find after a period of time that your browser seems sluggish with the DNS Client service enabled you can manually flush the DNS cache Close all browser windows ... open a "Command Prompt" from the Start Menu :
2979:
is to ensure consistency across all of Knowledge (XXG), and stop articles drifting off into their own inconsistent formats. So yes, it does take a lot to convince me that there's a special case for over-riding
3368:
2983:
There is obviously a difference between changing font when detailing a file path and name as it would be used on a computer, and mentions of the file within normal text. Currently I would suggest that
1263:
other work-around for the problem. If you must have DNS Client for IPSEC or other services, don't use a blocking hosts file. Use a proxy server instead and load all of the stuff into it.
161:
63:
760:
As much as it is helpful to state any product name that would relate to Hosts File, I do not believe it is required as it is a form of advertising, unless someone can prove me wrong...
1976:
footnotes, if properly sourced, might properly belong in the article itself. If unsourced, Knowledge (XXG) policy would require their removal. Appreciate if the author(s) source them.
791:
Perhaps the page can be changed to reflect this, I'd do it but I've never edited any pages here before, and perhaps independent confirmation for other Windows versions is necessary.
518:
your user account. Some software even prompts for the 'Administrator' (or root) password and does this step for you, granting temporary permission to do what you launched it to do.
2581:
Any modern antispyware or antivirus will detect malicious hosts or domains in a HOSTS file. Spybot Search and Destroy is an example thereof, & yet again, that's noted here also
569:
multi-logged on environment. Just do a "ps -eadf | more" or "ps -gaux | more" on some Unix systems. You will see more than one and more than the extra one being all root on them.
721:
The article says you need a work around for XP sp2. this is not true. MS moved the real Hosts file to the windows\I386 directory, edit that one instead, restart, and your done.
3388:
3363:
1451:
redirect all communication attempts to any/all hosts within the googlesyndication.com domain to the local host so that they would not need their own specific entries, such as:
166:
2746:. My edits are consistent with the types of articles I have seen published here, and I am hardly a novice at the subject matter or the use of formatting in Knowledge (XXG).
2025:%SystemRoot%\system32\drivers\etc\ by default. Actual location defined in Registry key \HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\DataBasePath.
2802:
suggest that this should be avoided. All that should used is italics and bolding, so adding additional styling makes reading harder and is confusing. The <code: -->
1396:
What are the rules on different OSes and versions of them? Can an address ever appear on more than one line (with different names)? Is the Linux syntax the Unix syntax?
3106:
373:
Why is it better? 0.0.0.0 doesn't connect anywhere. 127.0.0.1 does. If I run a web server that has a virtual host with the same domain name, it would serve the request.
1442:
I can't find an authoritative source as to whether or not a wildcard can be used as a hosts entry, or if simply entering a host's root domain would act as a wildcard.
2719:. It is no different than italicizing the name of a ship or book title to distinguish it. The context of a HOSTS file is such that it refers to a file located in a
1512:. It would be a little more complex to configure than a hosts file, but it would give more control and allow for wildcards and other more fine-tuned configuration.
1141:
sensitive, so "hosts" should work there as well. FWIW, every Windows system I've examined displays the name in lowercase anyway, so I can't imagine any objection. —
1225:
After making a change to the hosts files, you will need to flush the DNS client cache, otherwise the change will not take effect immediately. ipconfig /flushdns
2672:
I looked at this article to find the location of the "hosts" file. It has a section on that topic, with a chart listing the location for Windows 7, which I use.
3358:
1621:
If it is to appear on the article because "When you take information from any source you cite where it came from", it should be as a cite, not an external link.
1022:
You already have the number one blocking hosts file on the Internet which is MVPHosts. The number two blocking hosts file which is HPHosts is available here:
491:
It reads like an advertisement... actually, it IS an advertisement for some 'Windows Defender' rubbish. I hope they're paying Knowledge (XXG) for that space.
142:
3353:
2827:
You have been on Knowledge (XXG) that long and you need something sanctioned? What more blessing do you need than a common, ordinary, typical use of the
132:
3054:
1) Knowledge (XXG) is not a help site. 2) There is only one "hosts." file. It doesn't have an extension. If you see a ".txt" file then it is ignored. •
339:
246:
3383:
3373:
1234:
I added a line to reflect the above and removed the lines below since I believe this is a "better way". Not sure if I should have removed it though.
190:
290:
I've marked this with a move template, but since I don't feel it's a controversial move, I am not starting a vote. If anyone feels strongly enough
634:
The purpose of the HOSTS file is clear, and it's not for ad filtering. It would be more accurate to classify these techniques as something else.
108:
2446:
Run (type) regedit Navigate to the following location: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters Click Edit : -->
1932:
proper attribution) and you should seek help unless your sure of what you're doing. However importing your own content or when you have a clear
3040:
reason I am asking is because your description of this file is not clear to someone like me, who is educated but not acustomed to computerese.
956:
1599:
3277:
2598:
2531:
650:
550:
1895:
Sorry, but you cannot dictate which additional licences apply to which Knowledge (XXG) content. Knowledge (XXG) is (currently) GFDL. If
3090:
Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a
928:
seems to discuss it. Perhaps somebody with better understanding of Windows/WINS networking could distill into something for the article?
3348:
3041:
2682:
2653:
2631:
when it has been removed. You might want to consider creating an account, so that other editors can contact you directly. Thanks. --
424:
259:
2798:
that I know of that suggests text within paragraphs in the article body may switch font in order to emphasis or stylise words. Indeed,
3378:
2346:
2190:
2153:
1971:"7. On some Windows machines, the "DNS Client" service may need to be stopped in order for changes to the hosts file to take effect."
833:
737:
91:
58:
3330:
3298:
2510:
also (where DNS block out sites one may wish to visit despite such blocking): Yet again, a good read on that note is here once more
2007:
1476:
1198:
2307:. I completely replaced the location list at the time, due to incompatible licensing of the content copied from lunarsoft's wiki.
185:
67:
689:
I know, that is security through obscurity, but that in conjunction with other safe-guards can give you that extra security edge.
1981:
1758:
instead. I also still seek your response to my concerns about your forum as a conflict of interest and a questionable source. --
1124:
1413:
Did you make sure your hosts file that was copied was converted from just LF to CR+LF when you copied it from Linux to Windows?
3398:
33:
3393:
1744:
1332:
AdBlock itself is still GNU, but the Filterset.G is COPYRIGHTED. Therefore "AdBlock Plus" will work better for most people.
1181:
2706:
heading, and code of any language will generally be written in a uni-spaced (Monospace) font or type style reminiscent of a
1862:
Also, I did not add the link. Espoo did which is the correct thing to do when using someone elses work. In addition, I have
2713:
Since HOSTS is a filename, I believe in our reference work we should annotate it as filenames often are: with a <tt: -->
2442:
A better Win7/Vista workaround would be to add two Registry entries to control the amount of time the DNS cache is saved.
1158:
3017:. Particularly in instances where it is not the file itself being discussed, but the concept, contents, function or use.
1899:
is protected by a Creative Commons license then it cannot also be GFDL and should be removed. Shall I do it or will you?
3326:
3294:
2675:
However, there is no "hosts" file in the directory this article says. The closest thing is a file named "lmhosts.sam".
2207:
notable. If you would like to remove all these filter mechanism that are not the intent of this facility, please do so.
1194:
1098:
471:
395:
in it. That so much of it is written as a 'how-to' makes it difficult to reword otherwise, but I'll take a stab at it.
3246:
3081:
392:
2925:
2888:
2527:
HOSTS can help avoid DNS request logs if you hardcode in favorites into it (for 'security/anonymity' purposes)... apk
1977:
1750:
I also ask you again read about use of cites and external links. You continue to claim that "your" content from your
1747:. If the text that has been copied from your wiki is licensed under CC it should be removed as a copyright violation.
1592:. They perform different functions, are used differently on the page and have different policies regarding their use.
1371:
1349:
This is the best PAC filter covered under GNU license. It works on all Operating Systems and in all modern browsers.
618:
1835:
488:
The 'help' in the section is Windows-only. Of course, Windows IS the main enabler of malicious requests everywhere.
3325:
I'm honestly amazed people are still using this method given the other options, but that's neither here nor there.
534:"Lost data or prison?" It's a lot harder to recover data from a mashed or fried chip than a disk of whatever type.
3313:
I normally don't feel the need to visit a talk page for an article that appears to just need a few references, but
1248:
You can have "DNS Cache" or a blocking hosts file, but not both! Well, you may get away with a really small file.
1108:
There use to be an entire section of downloadable host files. what happened to it and why can't we have it back?
352:
2869:
2560:
2392:
212:
Added a history section to provide background on hosts files origins and uses. On my to-do list for this article:
2942:
file or perhaps a Microsoft Windows file. The most common formatting for filenames seems to be a toss-up between
2879:
2432:
Possible Workaround for using the MVPS HOSTS file and leaving the DNS Client service enabled (set to: Automatic)
1558:
303:
280:
2033:
3281:
3270:
It would be good to add that recent OS to the table. If it is not possible, that would be good to know, also.
2624:
on how to tune your hosts file, or how to use it to aid your computer's security, or any other "how to" guide.
952:
494:
Maybe as a guideline, any "help" in an article of this sort should link to an article about computer security.
3256:
3091:
2602:
2535:
1535:
646:
546:
39:
3045:
2657:
1915:
I have now replaced your licensed content and cited your wiki correctly. I removed the link to the forum as
1055:
In my opinion, it would be good not to give the version number so as we'll be always up to date with it! ;-)
428:
2742:
in some article revisions... but I guess there is at least one person who didn't care for the <code: -->
2686:
829:
733:
318:
255:
3273:
3135:
2678:
2649:
2342:
2029:
2003:
1995:
1656:
from my website, it's plagiarism not to credit my work. Proper research would should this was added around
1464:
1169:
1112:
1086:
944:
821:
725:
638:
538:
2762:
2350:
2194:
2149:
2043:
Unfortunately, that was, and still is the case; that registry entry is only valid up until Windows 2000.
948:
104:
2788:
642:
542:
1680:
taught to credit/cite our sources, no matter what the source was and the amount of information used. --
1665:
1472:
1217:
882:
users may be able to restart services, drivers, etc., but most average users will simply need to reboot.
107:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
3154:
2621:
825:
795:
729:
475:
421:
So 0.0.0.0 should work fine on Windows 10 and Windows 7? What about Android, iPhone, Symbian S60v3...?
2421:
have also been subject to "DNS Poisoning" redirects for exploit over time and many recently also, per
1999:
1468:
1402:
1094:
446:
3143:
3139:
1120:
1116:
220:
2985:
1821:
1240:
1226:
21:
2854:
1942:
383:
867:
3210:
3061:
2963:
2921:
2884:
2779:
2751:
2731:. Please notice that these articles tend to use the "teletype" markup extensively for filenames.
2545:
Edit request on 24 December 2011 - Why are MY LEGITIMATE FACTS ON HOSTS FILES BEING BLOCKED? apk
2482:
Custom HOSTS files help for reliability of site access & for added security vs. DNS poisoning
2377:
Edit request on 24 December 2011 - Why are MY LEGITIMATE FACTS ON HOSTS FILES BEING BLOCKED? apk
2063:
1517:
1307:
1297:
1177:
1090:
1068:
995:
902:
334:
0.0.0.0 than 127.0.0.1 as you want to kill the connection not to loop it back to your computer.
313:
251:
3020:
Perhaps there is a need for guidelines making specific reference to mentions of file names. --
2037:
921:
file. How does this relate to the hosts file? Does Windows attempt to synchronize these at all?
2339:
the linked support.microsoft.com page says, but that doesn't mean it's necessarily true. Â :-)
817:
strange, I have always had to restart for any changes to take effect in w9x, w2000, and xp pro
3021:
2816:
2771:
2632:
2317:
2144:
2053:
file on a data partition instead of the system drive, and I vaguely recall trying to hack the
1920:
1904:
1759:
1711:
1639:
1566:
365:
1916:
1828:
1707:
1589:
3191:
3115:
2280:
2245:
2212:
2169:
2086:
1885:
1726:
1685:
1614:
396:
2976:
2955:
2812:
2795:
2767:
2268:
1933:
3168:
2612:
Thank you for coming to the talk page to discuss this. Your additions have been removed (
2291:
2227:
2049:(I actually grappled with this issue for a while many years ago so that I could store the
1754:
requires citing, yet still you refuse to do this, adding an External Link instead to your
845:
I usually restart the internet browser for changes, but I don't restart the whole computer
3229:
2439:
Command Prompt (type) ipconfig /flushdns (press Enter) Then close the Command Prompt ...
2123:"Ignored (Hosts/TCP/IP) DatabasePath registry value. (answers & discussion welcomed)"
1814:
1703:
1606:
1585:
614:
1738:
2707:
1938:
1545:
348:
1807:
1595:
1389:
presumably considered the "primary" name in some sense - the rest probably "aliases".
3342:
3204:
3055:
2959:
2775:
2747:
2617:
2059:
1513:
1494:
1425:
1353:
1272:
1173:
1045:
1005:
992:
898:
807:
773:
747:
708:
610:
596:
406:
299:
276:
219:
In general, my aim is to make this NOT look like a freaking IT tech support forum. --
2373:
because DEC's OSs were most popular. The intro should say conventional name. - Eric
1669:
1624:
However, it does not qualify as a reliable source, and should not be used as a cite.
1320:
3159:
3125:
2916:
2836:
2808:
2724:
2451:
your Registry before editing ... see Regedit Help under "Exporting Registry files"
1745:
The GFDL is not compatible with the Creative Commons Attribution-ShareAlike license
1562:
929:
1306:
I went ahead and added the syntax section and removed the 'Ad Filtering' Examples.
866:
command works too... Also it works even with the DHCP Client service running. See
474:
have a feature to "lock" the hosts file", as Spybot is not commercial software. --
382:
BTW, this page is becoming more of a technical manual than an encylopedia entry.--
1851:
There are several things that should be considered when adding an external link.
3187:
3111:
2728:
2720:
2312:
2276:
2241:
2208:
2165:
2104:
2057:
file, but eventually I ended up having to abandon it and leave it where it was.)
1881:
1722:
1721:
Read the Creative Commons license, my work is protected and requires credit. --
1681:
1628:
1328:
Number one for Firefox - Some have tried putting it into Netscape (not advised)
1162:
848:
763:
267:
Just to say that on Linux, most distributions (all?) use /etc/hosts; a move to
175:
83:
52:
3255:
Subsequent comments should be made in a new section on this talk page or in a
3225:
2799:
2582:
2511:
2490:
2472:
1661:
1025:
988:
872:
268:
234:
2143:
Article read "%SystemRoot%\system32\drivers\etc\ (see note)" - which note? --
452:
from the article as it a) isn't relevant and b) seems to be an exaggeration.
2845:
1540:
467:
453:
344:
230:
100:
2811:
then I'd suggest that article is wrong. But I'm happy to be shown where in
1937:
Alternatively if you are the sole author then consider just dual licensing
1399:
Anyway, the current Syntax section is over-simplified or Windows specific.
1335:
The following ad blocker will work with all browsers on Microsoft Windows:
1329:
925:
917:
I think the Windows Quirks section of this article should also discuss the
2105:"TCP/IP and NetBT configuration parameters for Windows 2000 or Windows NT"
1957:
The following footnotes, which are numbered 5, 6, and 7, respectively, in
1792:, taken straight from Knowledge (XXG)'s page. All of the following relate.
804:
I agree, I've also never needed to restart the computer to reflect changes
3233:
1635:
For these reasons I do not believe this EL should remain on the article.
1490:
1142:
510:
admin/root. Log off and back on again as a 'user' as soon as you finish.
295:
272:
96:
2426:
1074:
ipl_001 May 1, 2007 6:50p Paris Time (GĂ©rard MĂ©lone from Paris, France)
1058:
So, I suggest the following fix in 'Applications to Manage Hosts Files'
2991:
Constant switching of styling in the article body at every mention of "
2422:
978:
918:
2226:
the HOSTS file. The IP's posting looked reasonably relevant to me. --
1631:
who states on their user page that they run the forum being linked to.
1509:
1044:
I added the HPHosts and Bad Hosts entries to the Hosts section today.
2906:
972:
3334:
3302:
3285:
3236:
3216:
3195:
3172:
3119:
3067:
3049:
3026:
2967:
2821:
2783:
2755:
2690:
2661:
2637:
2606:
2539:
2354:
2322:
2298:
2284:
2249:
2234:
2216:
2198:
2173:
2158:
2067:
2011:
1985:
1946:
1925:
1909:
1889:
1764:
1730:
1716:
1689:
1650:
Considering I did all of the original work for the segment that was
1644:
1570:
1550:
1521:
1498:
1480:
1428:
1405:
1374:
1356:
1346:
1310:
1300:
1275:
1243:
1229:
1220:
1202:
1185:
1145:
1128:
1102:
1071:
1048:
1008:
998:
960:
932:
906:
851:
810:
798:
776:
766:
750:
711:
654:
621:
599:
478:
456:
432:
409:
399:
386:
368:
356:
323:
307:
284:
223:
151:
893:
Saying to reboot is just a generic, catch-all step—for pretty much
2958:
to include this common formatting, and let's improve the article.
2844:
manual would likely demonstrate this. (Please see for example the
982:
2616:
times now) because they are not suitable. Knowledge (XXG) is an
1961:, do not cite any sources nor contain any links to verify them.
2939:
2929:
2892:
2841:
2589:
The use of 0.0.0.0 circumvents the possible "threat" noted above
1789:
1325:
I removed the link. Here are some better ones for you to have:
613:
was over my head, but one helpful (free) tool for us dummies is
3182:: The current name makes it clear that the name of the file is
1293:
Fair to competing agencies by attempting to be all-encompassing
868:
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q180094
2548:
2414:
Custom HOSTS files can speed up of resolutions of IP addresses
2380:
1844:
1039:
15:
1664:
and my article was created on July 25, 2006. It was added to
2904:
These sources include local operating system files (such as
2867:
These sources include local operating system files (such as
2335:
I know Knowledge (XXG) isn't a tech support channel, but...
1036:
987:
What the heck is it? (Previously "hosts" was a redirect to "
174:
150:
364:
Most websites say it's better to use the 127.0.0.1 method--
3138:. This file is commonly referred to as the "hosts file".
1668:
on 16:42, July 31, 2007 which is again, protected by the
1338:
938:
3130:
2628:
2308:
2290:
Additionally there does appear to be some COI maybe. --
2186:
1958:
1366:
1065:
free application to arrange, and edit your hosts file.
3369:
C-Class Computer networking articles of Mid-importance
2521:
Custom HOSTS files help Anonymity vs. DNS request logs
2028:
and winsock). Could someone confirm this behavior ? --
3245:
The above discussion is preserved as an archive of a
3203:- it should be "hosts (file)" with the () parens - •
2857:, shows that the hosts file should be wrapped around
1605:
Adding an external link to your own forum is a clear
605:
Removing the admin privileges from the browser itself
2861:, so I will quote it here from the first paragraph:
2789:
Knowledge (XXG) is not a technical or service manual
2507:
2445:
Flush the existing DNS cache (see above) Start : -->
1874:
is protected by the Creative Commons license, which
1438:
Can a wildcard be used for an entry in a hosts file?
95:, a collaborative effort to improve the coverage of
3094:. No further edits should be made to this section.
1735:Every edit page on Knowledge (XXG) clearly states;
561:All of this advice is useful with some exceptions.
391:Agree completely. The article has an awful lot of
3259:. No further edits should be made to this section.
2185:revert can be seen as an "OS-specific cleanup" at
1581:In relation to the content of the External links;
2506:HOSTS files also can be used to circumvent DNSBL
1596:Forum posts are normally not acceptable for cites
1321:http://www.intermute.com/products/adsubtract.html
445:(Note that ZoneAlarm may itself be spyware. See
3293:regarding this file and that's another article.
3186:, i.e. a proper name, not just some hosts file.
2744:version. I meant the latter version: <tt: -->
2642:\-----HOSTS file location clarification-------\
2189:Or will this still be a wasted effort? Thanks,
1737:"Do not copy text from other websites without a
2585:by Mr. Oliver Day of SECURITYFOCUS.COM ... apk
2514:by Mr. Oliver Day of SECURITYFOCUS.COM ... apk
2493:by Mr. Oliver Day of SECURITYFOCUS.COM ... apk
2475:by Mr. Oliver Day of SECURITYFOCUS.COM ... apk
2448:DWORD Value (type) MaxCacheTtl Click Edit : -->
2848:command and for more examples of <code: -->
2627:You'll see how this has been explained on the
1806:To ensure that the content of articles can be
1317:AdSubtract was discontinued on 15th Sep 2006.
294:the move, please feel free to start a vote. --
2271:and other WP policies regarding self-citing.
1410:Jimwrightbell, I have the following for you:
631:"One use of the hosts file is ad filtering."
8:
1676:at the bottom of my wiki. In school we were
1163:| stylistic design choice made in Windows 95
3389:C-Class software articles of Low-importance
3364:Mid-importance Computer networking articles
2583:http://www.securityfocus.com/columnists/491
2512:http://www.securityfocus.com/columnists/491
2491:http://www.securityfocus.com/columnists/491
2473:http://www.securityfocus.com/columnists/491
2423:http://en.wikipedia.org/DNS_cache_poisoning
2303:We went through all this over a year ago.
2180:Caveats of using the hosts file as a filter
1026:http://hphosts.mysteryfcm.co.uk/?s=Download
3271:
3080:The following is a closed discussion of a
2500:Custom HOSTS files help security vs. DNSBL
2464:Custom HOSTS files can speed up websurfing
1014:Add section about downloadable hosts files
47:
2018:
1741:-compatible license. It will be deleted."
1457:127.0.0.1 pagead2.googlesyndication.com
1030:Nobody has added this so I am adding it.
1454:127.0.0.1 pagead.googlesyndication.com
1330:https://addons.mozilla.org/firefox/1865/
2850:, in this case around code structures)
2365:The intro says the traditional name is
2078:
49:
19:
1868:stated on more than one occasion that
1658:Revision as of 23:46, 9 September 2007
971:Please help clarify the entry in the "
2835:font style? The usage at places like
2646:article and forgot where it was at.
2427:http://winhelp2002.mvps.org/hosts.htm
941:, you will find something incommen.
117:Knowledge (XXG):WikiProject Computing
7:
3359:C-Class Computer networking articles
3099:The result of the move request was:
2019:Windows 'DataBasePath' registry path
1424:Did that answer all your questions?
981:, the term ether is associated with
89:This article is within the scope of
2938:So the article is about a specific
2304:
1161:(it is only laterally related to a
939:this is another wonderful imagehost
38:It is of interest to the following
3232:in the field, with lowercase h. —
1448:127.0.0.1 googlesyndication.com
1151:That’s a perfectly valid argument.
466:Changed "Commercial software like
14:
3354:Mid-importance Computing articles
1919:. Hope this resolves things. --
1817:and to reduce editorial disputes.
1347:http://www.hostsfile.org/pac.html
3384:Low-importance software articles
3374:All Computer networking articles
2552:
2384:
82:
51:
20:
1808:checked by any reader or editor
1788:To address your concerns about
1445:For example, would this entry:
137:This article has been rated as
3146:) 14:19, 12 October 2016 (UTC)
3073:Requested move 12 October 2016
2954:. Take your pick, rewrite the
2691:15:12, 12 September 2012 (UTC)
1836:credibility of Knowledge (XXG)
1696:An External Link is not a cite
1129:20:42, 15 September 2009 (UTC)
1103:17:21, 21 September 2007 (UTC)
888:changes, but not another part.
433:10:00, 17 September 2018 (UTC)
120:Template:WikiProject Computing
1:
2662:08:30, 31 December 2011 (UTC)
2638:13:18, 24 December 2011 (UTC)
2607:03:55, 24 December 2011 (UTC)
2540:03:54, 24 December 2011 (UTC)
2508:http://en.wikipedia.org/DNSBL
2323:23:16, 1 September 2010 (UTC)
2299:21:09, 1 September 2010 (UTC)
2285:18:42, 1 September 2010 (UTC)
1613:So in regards to the link to
1429:13:13, 14 February 2007 (UTC)
1375:01:31, 15 November 2007 (UTC)
1357:12:51, 14 February 2007 (UTC)
1311:01:52, 13 December 2006 (UTC)
1301:01:04, 13 December 2006 (UTC)
1203:05:03, 24 November 2023 (UTC)
1049:22:54, 14 February 2007 (UTC)
794:- JM 16:11 AEST 28/06/2006 --
622:03:56, 15 November 2007 (UTC)
472:Spybot - Search & Destroy
183:This article is supported by
159:This article is supported by
111:and see a list of open tasks.
3286:02:53, 8 February 2018 (UTC)
3266:Location of file on ChromeOS
3237:16:06, 16 October 2016 (UTC)
3217:18:32, 12 October 2016 (UTC)
3196:15:23, 12 October 2016 (UTC)
3173:01:59, 20 October 2016 (UTC)
3120:21:50, 30 October 2016 (UTC)
3068:03:15, 9 February 2016 (UTC)
3050:19:37, 8 February 2016 (UTC)
2355:21:26, 26 October 2010 (UTC)
1947:04:44, 25 January 2010 (UTC)
1571:15:46, 30 January 2009 (UTC)
1551:15:11, 30 January 2009 (UTC)
1406:21:51, 4 February 2007 (UTC)
1244:16:00, 1 February 2007 (UTC)
1230:15:45, 1 February 2007 (UTC)
1009:17:36, 28 January 2007 (UTC)
926:This article at tek-tips.com
751:17:19, 28 January 2007 (UTC)
740:) 16:18, 13:11, 24 June 2006
357:16:32, 5 December 2005 (UTC)
324:08:37, 16 January 2006 (UTC)
308:13:56, 12 January 2006 (UTC)
285:08:43, 12 January 2006 (UTC)
2926:Network Information Service
2889:Network Information Service
2697:Formatting and edit warring
2575:to reactivate your request.
2563:has been answered. Set the
2407:to reactivate your request.
2395:has been answered. Set the
2250:16:45, 24 August 2010 (UTC)
2235:07:55, 24 August 2010 (UTC)
2217:23:26, 23 August 2010 (UTC)
2199:22:00, 23 August 2010 (UTC)
2174:14:20, 19 August 2010 (UTC)
2159:14:08, 19 August 2010 (UTC)
2038:08:54, 10 August 2009 (UTC)
2012:18:52, 3 January 2010 (UTC)
1221:02:34, 29 August 2006 (UTC)
1146:18:15, 22 August 2006 (UTC)
1040:http://www.securemecca.com/
3415:
3349:C-Class Computing articles
3335:10:59, 5 August 2018 (UTC)
3303:11:08, 5 August 2018 (UTC)
2807:If this is what's done on
2331:Location on 64-bit Windows
1813:To show that your edit is
479:12:25, 16 April 2006 (UTC)
224:15:07, 4 August 2006 (UTC)
143:project's importance scale
3379:C-Class software articles
3027:13:05, 18 June 2014 (UTC)
2968:07:38, 18 June 2014 (UTC)
2822:10:01, 17 June 2014 (UTC)
2784:10:33, 16 June 2014 (UTC)
2756:08:04, 16 June 2014 (UTC)
2715:, which looks like this:
2361:improper traditional name
1609:and strongly discouraged.
1499:20:15, 18 July 2009 (UTC)
1481:15:38, 14 July 2007 (UTC)
1276:11:40, 24 June 2007 (UTC)
1037:http://www.hostsfile.org/
999:17:38, 17 July 2006 (UTC)
852:20:49, 15 July 2006 (UTC)
811:14:43, 30 June 2006 (UTC)
799:06:13, 28 June 2006 (UTC)
777:10:24, 24 June 2007 (UTC)
767:05:43, 25 June 2006 (UTC)
712:02:43, 15 June 2007 (UTC)
655:15:18, 23 June 2006 (UTC)
600:09:56, 24 June 2007 (UTC)
457:21:10, 3 April 2006 (UTC)
410:17:31, 12 June 2007 (UTC)
400:06:19, 25 June 2006 (UTC)
271:would make sense to me --
182:
158:
136:
77:
46:
3252:Please do not modify it.
3087:Please do not modify it.
2794:There is nothing in the
2770:has an opinion. Perhaps
2068:03:10, 4 June 2016 (UTC)
1986:09:59, 8 July 2009 (UTC)
1926:17:10, 26 May 2009 (UTC)
1910:17:14, 24 May 2009 (UTC)
1890:23:55, 23 May 2009 (UTC)
1765:23:27, 23 May 2009 (UTC)
1731:15:42, 23 May 2009 (UTC)
1717:10:29, 23 May 2009 (UTC)
1690:23:08, 22 May 2009 (UTC)
1670:Creative Commons license
1645:11:07, 18 May 2009 (UTC)
1536:File:Hostsfile-entry.jpg
1522:02:56, 4 June 2016 (UTC)
1186:02:49, 4 June 2016 (UTC)
961:19:34, 5 July 2008 (UTC)
933:14:54, 5 July 2006 (UTC)
907:02:33, 4 June 2016 (UTC)
756:Advertising in article??
387:18:37, 20 May 2006 (UTC)
3327:A Shortfall Of Gravitas
3295:A Shortfall Of Gravitas
2950:, with a smattering of
2774:would like to comment.
2429:see below next)... apk
2369:. Back in 1981, it was
1195:A Shortfall Of Gravitas
1072:16:51, 1 May 2007 (UTC)
975:" disambiguation page:
369:06:46, 5 May 2006 (UTC)
3399:All Computing articles
2815:this is sanctioned. --
1978:Unimaginative Username
1860:
1841:
1829:additional information
1822:plagiarism and copying
1372:Unimaginative Username
1159:long filenames on vFAT
782:Restart under Windows?
619:Unimaginative Username
262:) 18:55, 12 July 2005.
208:Improving this Article
179:
155:
105:information technology
28:This article is rated
3394:All Software articles
1849:
1815:not original research
1803:
1627:It is being added by
1598:because they are not
1339:http://admuncher.com/
609:The above article by
178:
162:Networking task force
154:
92:WikiProject Computing
32:on Knowledge (XXG)'s
3228:is the overwhelming
2305:See discussion above
2023:The article states:
1880:work in my wiki. --
1702:the links provided;
1694:For the third time;
1607:conflict of interest
836:) 23:50, 2 July 2006
553:) 16:18, 24 May 2006
342:comment was added by
249:comment was added by
186:WikiProject Software
2960:I like to saw logs!
2855:Name Service Switch
2748:I like to saw logs!
2743:HOSTS</code: -->
2629:page's edit history
1953:Unsourced footnotes
1827:To help users find
1820:To avoid claims of
1352:Henry Hertz Hobbit
229:Proposed move from
2998:
2922:Domain Name System
2885:Domain Name System
2849:code</code: -->
2734:I have twice used
2437:All Programs : -->
1211:dns client service
717:a better way in XP
180:
156:
123:Computing articles
34:content assessment
3288:
3276:comment added by
3175:
3110:
3107:non-admin closure
3006:
2996:
2975:The point of the
2745:HOSTS</tt: -->
2714:HOSTS</tt: -->
2681:comment added by
2652:comment added by
2579:
2578:
2438:Accessories : -->
2411:
2410:
2345:comment added by
2157:
2058:
2015:
1998:comment added by
1615:Lunarsoft's forum
1549:
1484:
1467:comment added by
1343:King Of The PAC:
1290:Far more complete
1189:
1172:comment added by
1132:
1115:comment added by
1105:
1089:comment added by
963:
947:comment added by
838:
824:comment added by
742:
728:comment added by
658:
641:comment added by
555:
541:comment added by
438:Zonealarm spyware
360:
263:
205:
204:
201:
200:
197:
196:
3406:
3254:
3213:
3207:
3165:
3162:
3157:
3147:
3133:
3104:
3089:
3064:
3058:
3024:
3004:
2945:
2830:
2819:
2737:
2693:
2664:
2635:
2570:
2566:
2556:
2555:
2549:
2402:
2398:
2388:
2387:
2381:
2357:
2320:
2294:
2230:
2147:
2131:
2130:
2119:
2113:
2112:
2101:
2095:
2094:
2083:
2048:
2030:Gynvael Coldwind
2014:
1992:
1923:
1907:
1762:
1714:
1642:
1543:
1483:
1461:
1188:
1166:
1136:hosts, not HOSTS
1131:
1109:
1084:
942:
837:
818:
741:
722:
657:
635:
554:
535:
484:The ROOT Problem
335:
316:
242:
125:
124:
121:
118:
115:
86:
79:
78:
73:
70:
55:
48:
31:
25:
24:
16:
3414:
3413:
3409:
3408:
3407:
3405:
3404:
3403:
3339:
3338:
3311:
3268:
3263:
3250:
3211:
3205:
3163:
3160:
3155:
3129:
3085:
3075:
3062:
3056:
3037:
3022:
3016:
3002:
2999:, incongruous,
2943:
2828:
2817:
2796:manual of style
2735:
2699:
2676:
2670:
2647:
2633:
2568:
2564:
2553:
2547:
2400:
2396:
2385:
2379:
2363:
2340:
2333:
2318:
2292:
2264:
2228:
2182:
2141:
2136:
2135:
2134:
2121:
2120:
2116:
2103:
2102:
2098:
2085:
2084:
2080:
2021:
1993:
1955:
1921:
1917:a link to avoid
1905:
1834:To improve the
1760:
1712:
1640:
1579:
1532:
1530:Hostsfile Image
1462:
1440:
1386:
1283:
1213:
1167:
1138:
1110:
1066:
1016:
969:
949:Blackjackdoctor
915:
819:
784:
758:
723:
719:
636:
629:
607:
536:
486:
464:
450:
440:
331:
314:
238:
221:Jeff The Riffer
217:
210:
122:
119:
116:
113:
112:
71:
61:
29:
12:
11:
5:
3412:
3410:
3402:
3401:
3396:
3391:
3386:
3381:
3376:
3371:
3366:
3361:
3356:
3351:
3341:
3340:
3310:
3307:
3306:
3305:
3278:96.237.100.193
3267:
3264:
3262:
3261:
3247:requested move
3241:
3240:
3239:
3219:
3198:
3123:
3097:
3096:
3082:requested move
3076:
3074:
3071:
3036:
3033:
3032:
3031:
3030:
3029:
3018:
3014:
3009:
3000:
2994:
2989:
2981:
2949:
2936:
2935:
2934:
2933:
2919:
2913:
2909:
2899:
2898:
2897:
2896:
2882:
2876:
2872:
2860:
2853:This article,
2834:
2825:
2824:
2805:
2792:
2786:
2741:
2718:
2708:teletypewriter
2698:
2695:
2669:
2666:
2611:
2599:74.106.199.117
2597:
2595:
2594:
2590:
2577:
2576:
2557:
2546:
2543:
2532:74.106.199.117
2530:
2525:
2524:
2522:
2504:
2503:
2501:
2486:
2485:
2483:
2468:
2467:
2465:
2458:
2457:
2418:
2417:
2415:
2409:
2408:
2389:
2378:
2375:
2362:
2359:
2332:
2329:
2328:
2327:
2326:
2325:
2263:
2262:Location table
2260:
2259:
2258:
2257:
2256:
2255:
2254:
2253:
2252:
2181:
2178:
2177:
2176:
2140:
2137:
2133:
2132:
2127:TechNet Forums
2114:
2096:
2087:"DatabasePath"
2077:
2076:
2072:
2071:
2070:
2056:
2052:
2045:
2044:
2020:
2017:
1974:
1964:
1954:
1951:
1950:
1949:
1913:
1912:
1900:
1845:external links
1840:
1839:
1832:
1825:
1818:
1811:
1802:
1801:
1800:
1799:
1798:
1797:
1796:
1795:
1794:
1793:
1776:
1774:
1773:
1772:
1771:
1770:
1769:
1768:
1767:
1748:
1704:External Links
1633:
1632:
1625:
1622:
1611:
1610:
1603:
1593:
1586:External links
1578:
1577:External Links
1575:
1574:
1573:
1534:I believe the
1531:
1528:
1527:
1526:
1525:
1524:
1502:
1501:
1439:
1436:
1385:
1382:
1381:
1380:
1379:
1378:
1377:
1315:
1314:
1313:
1295:
1294:
1291:
1282:
1279:
1212:
1209:
1208:
1207:
1206:
1205:
1153:
1152:
1137:
1134:
1076:
1061:* Funkytoad's
1060:
1052:
1015:
1012:
968:
965:
936:
935:
914:
911:
910:
909:
890:
889:
884:
883:
878:
877:
876:
875:
870:
865:
857:
856:
855:
854:
846:
840:
839:
814:
813:
805:
785:
783:
780:
757:
754:
718:
715:
643:70.173.102.192
628:
625:
606:
603:
543:72.154.159.144
485:
482:
463:
460:
444:
439:
436:
419:
418:
417:
416:
415:
414:
413:
412:
377:
376:
375:
374:
338:The preceding
330:
327:
288:
287:
245:The preceding
237:
227:
214:
209:
206:
203:
202:
199:
198:
195:
194:
191:Low-importance
181:
171:
170:
167:Mid-importance
157:
147:
146:
139:Mid-importance
135:
129:
128:
126:
109:the discussion
87:
75:
74:
72:Mid‑importance
56:
44:
43:
37:
26:
13:
10:
9:
6:
4:
3:
2:
3411:
3400:
3397:
3395:
3392:
3390:
3387:
3385:
3382:
3380:
3377:
3375:
3372:
3370:
3367:
3365:
3362:
3360:
3357:
3355:
3352:
3350:
3347:
3346:
3344:
3337:
3336:
3332:
3328:
3323:
3319:
3316:
3308:
3304:
3300:
3296:
3291:
3290:
3289:
3287:
3283:
3279:
3275:
3265:
3260:
3258:
3253:
3248:
3243:
3242:
3238:
3235:
3231:
3227:
3223:
3220:
3218:
3214:
3208:
3202:
3199:
3197:
3193:
3189:
3185:
3181:
3178:
3177:
3176:
3174:
3170:
3166:
3158:
3153:
3152:
3145:
3141:
3137:
3136:WP:NATURALDIS
3132:
3127:
3122:
3121:
3117:
3113:
3108:
3102:
3095:
3093:
3088:
3083:
3078:
3077:
3072:
3070:
3069:
3065:
3059:
3052:
3051:
3047:
3043:
3042:74.12.126.155
3034:
3028:
3025:
3019:
3012:
3007:
3003:inexplicable
2992:
2990:
2987:
2982:
2978:
2974:
2973:
2972:
2971:
2970:
2969:
2965:
2961:
2957:
2953:
2947:
2941:
2931:
2927:
2923:
2918:
2915:
2911:
2908:
2905:
2903:
2902:
2901:
2900:
2894:
2890:
2886:
2881:
2878:
2874:
2871:
2868:
2866:
2865:
2864:
2863:
2862:
2858:
2856:
2851:
2847:
2843:
2838:
2832:
2823:
2820:
2814:
2810:
2806:
2801:
2797:
2793:
2790:
2787:
2785:
2781:
2777:
2773:
2769:
2764:
2761:The issue is
2760:
2759:
2758:
2757:
2753:
2749:
2739:
2732:
2730:
2726:
2722:
2716:
2711:
2709:
2705:
2696:
2694:
2692:
2688:
2684:
2683:50.131.14.250
2680:
2673:
2667:
2665:
2663:
2659:
2655:
2654:98.244.51.203
2651:
2643:
2640:
2639:
2636:
2630:
2625:
2623:
2619:
2618:encyclopaedia
2615:
2609:
2608:
2604:
2600:
2591:
2588:
2587:
2586:
2584:
2574:
2571:parameter to
2562:
2558:
2551:
2550:
2544:
2542:
2541:
2537:
2533:
2528:
2523:
2520:
2519:
2518:
2515:
2513:
2509:
2502:
2499:
2498:
2497:
2494:
2492:
2484:
2481:
2480:
2479:
2476:
2474:
2466:
2463:
2462:
2461:
2454:
2453:
2452:
2443:
2440:
2433:
2430:
2428:
2424:
2416:
2413:
2412:
2406:
2403:parameter to
2394:
2390:
2383:
2382:
2376:
2374:
2372:
2368:
2360:
2358:
2356:
2352:
2348:
2344:
2336:
2330:
2324:
2321:
2314:
2310:
2309:See edit here
2306:
2302:
2301:
2300:
2297:
2295:
2289:
2288:
2287:
2286:
2282:
2278:
2272:
2270:
2261:
2251:
2247:
2243:
2238:
2237:
2236:
2233:
2231:
2225:
2224:understanding
2220:
2219:
2218:
2214:
2210:
2205:
2204:
2203:
2202:
2201:
2200:
2196:
2192:
2187:
2179:
2175:
2171:
2167:
2163:
2162:
2161:
2160:
2155:
2151:
2146:
2138:
2128:
2124:
2118:
2115:
2110:
2106:
2100:
2097:
2092:
2088:
2082:
2079:
2075:
2069:
2065:
2061:
2054:
2050:
2047:
2046:
2042:
2041:
2040:
2039:
2035:
2031:
2026:
2016:
2013:
2009:
2005:
2001:
1997:
1988:
1987:
1983:
1979:
1972:
1969:
1966:
1962:
1960:
1952:
1948:
1944:
1940:
1935:
1930:
1929:
1928:
1927:
1924:
1918:
1911:
1908:
1901:
1898:
1894:
1893:
1892:
1891:
1887:
1883:
1879:
1878:
1873:
1872:
1867:
1866:
1859:
1855:
1852:
1848:
1846:
1837:
1833:
1831:on the topic.
1830:
1826:
1823:
1819:
1816:
1812:
1809:
1805:
1804:
1791:
1787:
1786:
1785:
1784:
1783:
1782:
1781:
1780:
1779:
1778:
1777:
1766:
1763:
1757:
1753:
1749:
1746:
1742:
1740:
1734:
1733:
1732:
1728:
1724:
1720:
1719:
1718:
1715:
1709:
1705:
1701:
1697:
1693:
1692:
1691:
1687:
1683:
1679:
1675:
1671:
1667:
1663:
1659:
1655:
1654:
1649:
1648:
1647:
1646:
1643:
1636:
1630:
1626:
1623:
1620:
1619:
1618:
1616:
1608:
1604:
1601:
1597:
1594:
1591:
1587:
1584:
1583:
1582:
1576:
1572:
1568:
1564:
1560:
1555:
1554:
1553:
1552:
1547:
1542:
1537:
1529:
1523:
1519:
1515:
1511:
1506:
1505:
1504:
1503:
1500:
1496:
1492:
1487:
1486:
1485:
1482:
1478:
1474:
1470:
1466:
1458:
1455:
1452:
1449:
1446:
1443:
1437:
1435:
1431:
1430:
1427:
1422:
1418:
1414:
1411:
1408:
1407:
1404:
1400:
1397:
1394:
1390:
1383:
1376:
1373:
1368:
1363:
1362:
1361:
1360:
1359:
1358:
1355:
1350:
1348:
1344:
1341:
1340:
1336:
1333:
1331:
1326:
1323:
1322:
1318:
1312:
1309:
1305:
1304:
1303:
1302:
1299:
1292:
1289:
1288:
1287:
1280:
1278:
1277:
1274:
1268:
1264:
1261:
1257:
1253:
1249:
1246:
1245:
1242:
1238:
1235:
1232:
1231:
1228:
1223:
1222:
1219:
1218:70.152.196.25
1210:
1204:
1200:
1196:
1191:
1190:
1187:
1183:
1179:
1175:
1171:
1164:
1160:
1155:
1154:
1150:
1149:
1148:
1147:
1144:
1135:
1133:
1130:
1126:
1122:
1118:
1114:
1106:
1104:
1100:
1096:
1092:
1088:
1080:
1075:
1073:
1070:
1064:
1059:
1056:
1051:
1050:
1047:
1042:
1041:
1038:
1034:
1031:
1028:
1027:
1023:
1020:
1013:
1011:
1010:
1007:
1001:
1000:
997:
994:
990:
986:
984:
980:
977:"in internet
974:
966:
964:
962:
958:
954:
950:
946:
940:
934:
931:
927:
924:
923:
922:
920:
912:
908:
904:
900:
896:
892:
891:
886:
885:
880:
879:
874:
871:
869:
863:
861:
860:
859:
858:
853:
850:
847:
844:
843:
842:
841:
835:
831:
827:
823:
816:
815:
812:
809:
806:
803:
802:
801:
800:
797:
792:
789:
781:
779:
778:
775:
769:
768:
765:
761:
755:
753:
752:
749:
743:
739:
735:
731:
727:
716:
714:
713:
710:
706:
702:
698:
694:
690:
686:
682:
678:
674:
670:
666:
662:
659:
656:
652:
648:
644:
640:
632:
626:
624:
623:
620:
616:
612:
604:
602:
601:
598:
594:
590:
586:
582:
578:
574:
570:
566:
562:
559:
556:
552:
548:
544:
540:
531:
527:
523:
519:
515:
511:
507:
503:
499:
495:
492:
489:
483:
481:
480:
477:
473:
469:
461:
459:
458:
455:
448:
443:
437:
435:
434:
430:
426:
425:91.155.23.138
422:
411:
408:
403:
402:
401:
398:
394:
393:second-person
390:
389:
388:
385:
381:
380:
379:
378:
372:
371:
370:
367:
363:
362:
361:
358:
354:
350:
346:
343:
341:
328:
326:
325:
322:
321:
317:
315:Nightstallion
310:
309:
305:
301:
297:
293:
286:
282:
278:
274:
270:
266:
265:
264:
261:
257:
253:
252:24.110.231.35
250:
248:
236:
232:
228:
226:
225:
222:
213:
207:
192:
189:(assessed as
188:
187:
177:
173:
172:
168:
165:(assessed as
164:
163:
153:
149:
148:
144:
140:
134:
131:
130:
127:
110:
106:
102:
98:
94:
93:
88:
85:
81:
80:
76:
69:
65:
60:
57:
54:
50:
45:
41:
35:
27:
23:
18:
17:
3324:
3320:
3314:
3312:
3272:— Preceding
3269:
3251:
3244:
3221:
3200:
3183:
3179:
3150:
3149:
3126:Hosts (file)
3124:
3101:No consensus
3100:
3098:
3086:
3079:
3053:
3038:
3023:Escape Orbit
3010:
2951:
2937:
2852:
2837:AUTOEXEC.BAT
2826:
2818:Escape Orbit
2809:AUTOEXEC.BAT
2772:Escape Orbit
2733:
2725:AUTOEXEC.BAT
2712:
2703:
2700:
2677:— Preceding
2674:
2671:
2648:— Preceding
2644:
2641:
2634:Escape Orbit
2626:
2622:not a manual
2613:
2610:
2596:
2580:
2572:
2561:edit request
2529:
2526:
2516:
2505:
2495:
2487:
2477:
2469:
2459:
2444:
2441:
2434:
2431:
2419:
2404:
2393:edit request
2370:
2366:
2364:
2347:216.163.72.2
2337:
2334:
2319:Escape Orbit
2296:
2273:
2265:
2232:
2223:
2191:66.11.179.30
2183:
2145:Chuunen Baka
2142:
2126:
2117:
2111:. Microsoft.
2108:
2099:
2093:. Microsoft.
2090:
2081:
2073:
2024:
2022:
1989:
1973:
1970:
1967:
1963:
1959:this version
1956:
1922:Escape Orbit
1914:
1906:Escape Orbit
1896:
1876:
1875:
1870:
1869:
1864:
1863:
1861:
1856:
1853:
1850:
1842:
1775:
1761:Escape Orbit
1755:
1751:
1736:
1713:Escape Orbit
1699:
1695:
1677:
1673:
1657:
1652:
1651:
1641:Escape Orbit
1637:
1634:
1612:
1580:
1533:
1459:
1456:
1453:
1450:
1447:
1444:
1441:
1432:
1423:
1419:
1415:
1412:
1409:
1401:
1398:
1395:
1391:
1387:
1351:
1345:
1342:
1337:
1334:
1327:
1324:
1319:
1316:
1296:
1284:
1281:Ad Filtering
1269:
1265:
1259:
1258:
1254:
1250:
1247:
1239:
1236:
1233:
1224:
1214:
1168:— Preceding
1139:
1107:
1081:
1077:
1067:
1062:
1057:
1053:
1043:
1035:
1032:
1029:
1024:
1021:
1017:
1002:
976:
970:
937:
916:
894:
826:24.91.171.16
796:203.76.47.17
793:
790:
786:
770:
762:
759:
744:
730:24.91.171.16
720:
707:
703:
699:
695:
691:
687:
683:
679:
675:
671:
667:
663:
660:
633:
630:
615:DropMyRights
608:
595:
591:
587:
583:
579:
575:
571:
567:
563:
560:
557:
532:
528:
524:
520:
516:
512:
508:
504:
500:
496:
493:
490:
487:
476:80.61.118.43
465:
451:
447:this article
441:
423:
420:
337:
332:
319:
311:
291:
289:
244:
239:
218:
211:
184:
160:
138:
90:
40:WikiProjects
3309:Added Cites
3257:move review
3092:move review
2928:(NIS), and
2924:(DNS), the
2907:/etc/passwd
2891:(NIS), and
2887:(DNS), the
2870:/etc/passwd
2738:instead of
2729:Autorun.inf
2721:file system
2668:Basic error
2341:—Preceding
2000:Swandersleb
1994:—Preceding
1629:User:Tarun.
1469:65.93.89.28
1463:—Preceding
1403:Jimwrightbe
1111:—Preceding
1085:—Preceding
943:—Preceding
820:—Preceding
724:—Preceding
637:—Preceding
537:—Preceding
397:The Monster
3343:Categories
3226:hosts file
3151:Relisting.
3140:nyuszika7h
3131:Hosts file
3015:legibility
3011:interferes
3008:needlessly
2986:WP:MOSCOMM
2917:/etc/hosts
2912:/etc/group
2880:/etc/hosts
2875:/etc/group
2800:MOS:MARKUP
2723:, just as
2565:|answered=
2397:|answered=
2074:References
2055:dnsapi.dll
1698:. Please
1662:User:Espoo
1117:Traisjames
1063:HostsXpert
989:hosts file
895:everything
864:nbtstat -R
462:Rephrasing
442:I removed
269:Hosts file
235:Hosts file
64:Networking
3103:to move.
2846:Dd_(Unix)
2763:this edit
2620:. It is
2449:New : -->
2447:New : -->
2371:HOSTS.TXT
2139:See note?
1939:Nil Einne
1897:your work
1858:editors.
1672:which is
1241:Mikeburns
1227:Mikeburns
1033:BadHosts
573:avoided.
468:ZoneAlarm
231:Host file
114:Computing
101:computing
97:computers
59:Computing
3274:unsigned
3206:Sbmeirow
3057:Sbmeirow
2948:teletype
2859:teletype
2833:teletype
2776:Johnuniq
2679:unsigned
2650:unsigned
2343:unsigned
2154:contribs
2060:Synetech
2008:contribs
1996:unsigned
1877:includes
1843:And for
1600:reliable
1588:are not
1514:Synetech
1510:DeadWood
1477:contribs
1465:unsigned
1426:hhhobbit
1367:NoScript
1354:hhhobbit
1273:hhhobbit
1260:WARNING!
1182:contribs
1174:Synetech
1170:unsigned
1125:contribs
1113:unsigned
1099:contribs
1087:unsigned
1046:hhhobbit
1006:hhhobbit
957:contribs
945:unsigned
899:Synetech
834:contribs
822:unsigned
808:Acrilico
774:hhhobbit
748:hhhobbit
738:contribs
726:unsigned
709:hhhobbit
651:contribs
639:unsigned
611:hhhobbit
597:hhhobbit
551:contribs
539:unsigned
407:hhhobbit
384:Avochelm
353:contribs
340:unsigned
312:Moved. —
260:contribs
247:unsigned
68:Software
3222:Support
3001:largely
2952:italics
2920:), the
2883:), the
2702:italic
2109:TechNet
2091:TechNet
1871:my work
1865:clearly
1666:my wiki
1563:Wrs1864
979:routing
930:Dharris
919:lmhosts
913:lmhosts
329:0.0.0.0
292:against
141:on the
30:C-class
3201:Oppose
3188:Kbrose
3180:Oppose
3169:en-2.5
3134:– Per
3112:Fuortu
2977:WP:MOS
2956:WP:MOS
2914:, and
2877:, and
2813:WP:MOS
2768:WP:MOS
2704:Danger
2614:twenty
2277:Kbrose
2269:WP:COI
2242:Kbrose
2209:Kbrose
2166:Kbrose
2164:Fixed
1934:WP:COI
1882:Tarun.
1790:citing
1756:forum
1723:Tarun.
1682:Tarun.
1678:always
1674:always
1653:copied
1384:Syntax
1308:Loplin
1298:Loplin
1091:Ipl001
1069:Ipl001
973:aether
849:Reeves
764:Reeves
627:"Use"?
366:Andeee
103:, and
36:scale.
3230:WP:CN
3184:hosts
3164:hotch
3013:with
2995:" is
2993:hosts
2804:code.
2740:HOSTS
2736:HOSTS
2717:HOSTS
2569:|ans=
2559:This
2401:|ans=
2391:This
2367:hosts
2313:Tarun
2293:Herby
2229:Herby
2051:hosts
1752:wiki
1708:Cites
1700:read
1590:cites
1271:off.
993:mikka
991:") `'
983:hosts
967:Ether
873:Benad
3331:talk
3299:talk
3282:talk
3212:Talk
3192:talk
3144:talk
3116:talk
3063:Talk
3046:talk
3035:Help
2997:ugly
2964:talk
2946:and
2944:code
2940:UNIX
2930:LDAP
2893:LDAP
2842:UNIX
2829:code
2780:talk
2752:talk
2727:and
2687:talk
2658:talk
2603:talk
2536:talk
2517:---
2496:---
2478:---
2460:---
2351:talk
2281:talk
2246:talk
2213:talk
2195:talk
2170:talk
2150:talk
2064:talk
2034:talk
2004:talk
1982:talk
1943:talk
1886:talk
1739:GFDL
1727:talk
1710:. --
1686:talk
1617:.
1567:talk
1546:talk
1541:Aude
1518:talk
1495:talk
1473:talk
1460:???
1199:talk
1178:talk
1165:).
1121:talk
1095:talk
953:talk
903:talk
862:The
830:talk
734:talk
661:---
647:talk
558:---
547:talk
470:and
454:Sum0
429:talk
349:talk
345:Frap
256:talk
3315:wow
3249:.
3234:JFG
3171:).
3005:and
2980:it.
2831:or
2567:or
2436:-->
2399:or
2316:--
1743:.
1660:by
1559:dig
1491:PPP
1143:Ksn
996:(t)
449:.)
320:(?)
296:Lox
273:Lox
233:to
133:Mid
3345::
3333:)
3301:)
3284:)
3224:–
3215:•
3209:•
3194:)
3161:Tb
3148:--
3128:→
3118:)
3084:.
3066:•
3060:•
3048:)
2966:)
2932:.
2910:,
2873:,
2782:)
2754:)
2710:.
2689:)
2660:)
2605:)
2573:no
2538:)
2405:no
2353:)
2311:.
2283:)
2248:)
2215:)
2197:)
2172:)
2152:•
2125:.
2107:.
2089:.
2066:)
2036:)
2010:)
2006:•
1984:)
1945:)
1903:--
1888:)
1847::
1729:)
1706:,
1688:)
1638:--
1569:)
1520:)
1497:)
1479:)
1475:•
1201:)
1184:)
1180:•
1127:)
1123:•
1101:)
1097:•
959:)
955:•
905:)
897:.
832:•
736:•
653:)
649:•
549:•
431:)
355:)
351:•
306:)
283:)
258:•
193:).
169:).
99:,
66:/
62::
3329:(
3297:(
3280:(
3190:(
3167:(
3156:©
3142:(
3114:(
3109:)
3105:(
3044:(
2962:(
2895:.
2791:.
2778:(
2750:(
2685:(
2656:(
2601:(
2534:(
2349:(
2279:(
2244:(
2211:(
2193:(
2168:(
2156:)
2148:(
2129:.
2062:(
2032:(
2002:(
1980:(
1941:(
1884:(
1838:.
1824:.
1810:.
1725:(
1684:(
1602:.
1565:(
1548:)
1544:(
1516:(
1493:(
1471:(
1197:(
1176:(
1119:(
1093:(
985:"
951:(
901:(
828:(
732:(
645:(
545:(
427:(
359:.
347:(
336:—
304:c
302:,
300:t
298:(
281:c
279:,
277:t
275:(
254:(
243:—
145:.
42::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.