MDGx HOSTS Files, Guides + Tools (original) (raw)

MDGx MAX Speed WinDOwS

HOSTS Files, Guides + Tools

[work in progress... ;)]

Contents: MDGx HOSTS Files + Tools[work in progress... ;)] HOSTS Guide IMPORTANT: NOTE 1 : Windows XP/newer ! NOTE 2 : DNS Client Service NOTE 3 : Local Server NOTE 4 : Disable HOSTS Entry NOTE 5 : Internet Explorer HOSTS Usage HOSTS + Ad/Malware/Popup Blocking Links

MDGx.com safety ➜ Norton Google Blacklight IsLegitSite VirusTotal urlscan.io ScamAdviser MXToolbox False+
MDGx.com stats ➜ WOT About Us SSL T WEBrate ScamVoid WebStatsDomain sur.ly

MDGx HOSTS Files + Tools

[work in progress... ;)]

MDGx HOSTS Files | HOSTS Tools MDGx HOSTS Installers | MDGx HOSTS Archive

The HOSTS file can be used to block adware, spyware, malware, viruses, trojans, worms + popups in all your ftp/web browsers and internet/network tools by denying access to a list of internet domains/servers/web sites.
Here are my HOSTS files with> 150000 host name entries:

WARNING:

Some of the web sites listed in my HOSTS file will
attempt to INFECT/SPY on your computer(s)/device(s)
with malware/spyware if you ACCESS/ENABLE them!

UPDATES:

MDGx HOSTS Files = Automated EXE Installers :

Download + install 1 of these 2 automated/unattended installers executables:

MDGx HOSTS Files = ZIP Archive :

Download HOSTS.ZIP [1.3 MB, ZIPped] + extract its files.
You need an unZIPping tool to extract files from ZIP archives [mostly free(ware)].
HOSTS.ZIP contains 2 HOSTS files:

  1. Use 1 of the included DOS style BATch files:
    • HOSTS0.BAT = backs up your original HOSTS (if any) to HOSTS.ORI and then copies HOSTS0 (renamed as HOSTS) to:
      * %windir% = Windows 3.1x/9x
      * %windir%\SYSTEM32\DRIVERS\ETC = Windows NTx

    %windir% = usually C:\WINDOWS [3.1x/9x + 2000/newer] or C:\WINNT[NT/2000].

    • HOSTS127.BAT = backs up your original HOSTS (if any) to HOSTS.ORI and then copies HOSTS127 (renamed as HOSTS) to:
      * %windir% = Windows 3.1x/9x
      * %windir%\SYSTEM32\DRIVERS\ETC = Windows NTx

    %windir% = usually C:\WINDOWS [3.1x/9x + 2000/newer] or C:\WINNT [NT/2000].

  2. Or if you prefer to do this by hand:
    You MUST rename either HOSTS0 [faster] or HOSTS127 [slower: will take longer to process with large number of HOSTS entries] to HOSTS (no file extension):
    • Right-click on the one you want in Windows Explorer (%windir%\EXPLORER.EXE), File Manager [FM = %windir%\WINFILE.EXE (Win3.1x/9x) or %windir%\SYSTEM32\WINFILE.EXE (WinNT/2000/XP/2003/Vista/newer)] or similar tool select Rename type HOSTS (case insensitive = upper case works same as lower case).
    • Or run one of these DOS commands from within the directory/folder where they reside:REN HOSTS0 HOSTSor:REN HOSTS127 HOSTS
      After that, copy this newHOSTS file (overwritting the existing one, if any) to:
    • %windir% = Windows 3.1x/9x
    • %windir%\SYSTEM32\DRIVERS\ETC = Windows NTx
      %windir% = usually C:\WINDOWS [3.1x/9x + 2000/newer] or C:\WINNT [NT/2000].
      If using Windows NTx you may also need to copy this new HOSTS file (overwritting the existing one, if any) to %windir%\SYSTEM32\DLLCACHE .IMPORTANT:
      Windows 2000/newer users may need to disable System Restore [Windows File Protection (WFP)] or do this BEFORE installing HOSTS.
      Follow these EXACT steps to install HOSTS on Windows 2000/newer (Windows XP used here as example):
    1. You MUST disable System Restore: open Control Panel System System Restore tab check the "Turn off System Restore on all drives" box click OK reboot.
    2. Install HOSTS.
    3. To reenable System Restore: open Control Panel System System Restore tab UNcheck the "Turn off System Restore on all drives" box click OK reboot.
      It is recommended to•FIRST• backup your original HOSTS file (if any). HOSTS.ZIP also contains HOSTS.HTM, which you can run to display MDGx HOSTS Files, Guides + Tools (this web page).
Useful HOSTS tools I recommend [100% free(ware)] :

Back 2 TopHOSTS Guide IMPORTANT

HOSTS (case insensitive in Windows OSes) or hosts(usually lower case in *nix OSes) is an ASCII (plain text) file used by TCP/IP protocol for BSD/FreeBSD/Linux/Solaris/UNIX, BeOS, MacOS, OS/2, Novell Netware + Windows Operating Systems.
Acts as TCP/IP (Transport Control Protocol/Internet Protocol) host table and contains a list of address-to-name resolution mappings of numeric IP (Internet Protocol) addresses (32-bit identifiers) resolved to valid host names.
Operates as a local DNS (Domain Naming System) server by translating a UNC (Universal Naming Convention) domain name into an IP address, thus decreasing the time necessary to reach a remote server.
MS TechNet: How DNS query works.
Never map an IP to a host name already in use, for example your ISP (Internet Service Provider) name or your favorite web site(s) name(s).
Never rename this file, it must be HOSTS or hosts without extension.To properly use HOSTS in Windows 32-bit (Win32/x86) + 64-bit (Win64/x64) OSes you must make sure Enable DNS is turnedON: Control Panel Network your TCP/IP adapter name (if more than 1 must do this for ALL) TCP/IP Properties DNS Configuration tab checkEnable DNS box click Apply/OK button.Microsoft Windows Host Name Resolution over TCP/IP search order, also here [more info @ MSKB]:

  1. HOSTS file
  2. DNS server
  3. NetBIOS cache
  4. WINS server
  5. Broadcast
  6. LMHOSTS file You can view/edit your HOSTS file using Notepad or better text/ASCII editor/viewer, especially if you are using a large HOSTS file, because Notepad does NOT support files > 64 KB in Windows 9x/NT4/2000. :-(
    Each entry must be kept on its own (separate) line.
    Entries are almost always case sensitive.
    Each IP address must be placed 1st separated by at least 1 space or Tab from corresponding host (machine) name, which must be placed 2nd on the same line.
    Insert any optional comments on the same line after the host name (or on separate lines) preceded by a # symbol and followed (optionally) by at least 1 space or Tab (examples):
IPHost nameComments 102.54.94.97 rhino.acme.com source server 38.25.63.10 x.acme.com client host

This must be the 1st HOSTS line:127.0.0.1 localhostIf more than 1 localhost lines, the 1st one overrides all others.Each host name entry is limited to a maximum of 255characters (IPv4).•NEVER• rename/modify/delete/comment/remark this HOSTS line:127.0.0.1 localhostThehosts file must reside in: [%windir% = usually C:\WINDOWS (3.xx/9x + 2000/newer) or C:\WINNT (NT/2000)]

Back 2 TopIMPORTANT NOTE 1 | NOTE 2 | NOTE 3 | NOTE 4 | NOTE 5

NOTE 1 : Windows XP/newer !

WARNING:
According to this Microsoft Windows Vista/newer DNS resolver: deliberately sabotaged hosts file lookup study [also here] certain Microsoft owned servers canNOT be blocked by using a HOSTS file in Windows Vista and all newer Windows NTx OSes. They seem to be "protected" from being blocked/bypassed ("hard-wired") inside %windir%\SYSTEM32\DNSAPI.DLL [%windir% = usually C:\WINDOWS ; %windir%\SYSWOW64 instead of %windir%\SYSTEM32 on Windows NTx 64-bit (x64) OSes]. And because the DNS Resolving feature canNOT be disabled/bypassed (network + internet access are NOT possible without it), the only way I can think of to "un-protect"/bypass these Microsoft servers is to hex-edit DNSAPI.DLL and delete the "offending" entries. Even so, one must bypass System Restore (SR)/Windows File Protection (WFP) in order to replace the original file with the modded one.
An earlier version of this hard-wired list of Microsoft servers is "built" into the Windows XP SP2 + Windows XP SP3 versions of DNSAPI.DLL (Windows XP SP1 and older are not affected), and is designed to send meta + UDP feedback data to Microsoft (for example): how many and what types of media files are opened by Windows Media Player and respectively documents opened by Microsoft Office 2007/newer. The list, which contains over 500 Microsoft servers, can be viewed here.
More info.Even worse, attempting to install any of my HOSTS files [either trying to copy a HOSTS file by hand or using any of the BATch files or EXEcutables (automatic installers)] will NOT succeed [but this will soon change, as I plan to add TakeOwn.exe (Take Ownership) + (I)CaCLs.exe (Grant Permission) scripts: see BUG #2: + FIX #2: to bypass this annoyance ;)], because:

User Account Control (UAC) tweaking tools [free(ware)]:
* UAC Pass.
* TweakUAC.
* Disable UAC.

FYI:
Other important issues you should be aware of if using Windows Vista/2008/7:

NOTE 2 : DNS Client Service

In Windows 2000/newer DNS Client service [already started (Automatic) by default on most computers] loads the entire contents of the existing HOSTS file (if any) into the DNS cache, which may slow down the computer, especially if using a (•very•) large HOSTS file, like mine.
You have 2 choices here:

  1. One way is to stop and/or disable DNS Client service: Start button Run... box type services.msc click OK or press Enter open DNS Client General tab set to Manual (if needed) or Disabled (if not needed) Stop (if running) click OK or press Enter reboot.
    To set DNS Client to Manual (if needed), run these 2 commands from a DOS console or a batch file:SC CONFIG DNSCache START= demand
    and:
    SC STOP DNSCache
    or:
    NET STOP DNSCacheTo set DNS Client to Disabled (if not needed), run these 2 commands from a DOS console or a batch file:SC CONFIG DNSCache START= disabled
    and:
    SC STOP DNSCache
    or:
    NET STOP DNSCacheTo determine if you need to have DNS Client service enabled: Start button Run... box type services.msc click OK or press Enter open DNS Client Status column should state Started (if needed) or should be empty (if not needed).
    More info:
  2. The other way is to force the DNS cache (if DNS Client service is active) to (re)read the entire list of servers from your HOSTS file by running this command from a DOS console or a batch file:IPCONFIG /flushdnsMore info @ MSKB Q314850. In case you are running ANYnetwork/server on your local computer, you •MUST• edit your HOSTS file using Notepad or better text/ASCII editor/viewer and change ALL 127.0.0.1 entries (except the 127.0.0.1 localhost line) to read 0 (or 0.0.0.0).
    Restart or log back into your network/server when done.
    Otherwise you might get a huge number of login popup prompts while trying to access the local server/network, because localhost is always located at the 127.0.0.1 IP address.
NOTE 4 : Disable HOSTS Entry

In case you cannot access an internet site/server, and if your web browser/e-mail client/ftp client/network tool returns a message/page/screen similar to (depending on the web browser/client/tool used):

  1. first exit/close all instances of all open internet/web/ftp/e-mail/network tools (if any),
  2. then delete/remove or comment/remark the entire line containing the respective server: edit your HOSTS file using Notepad or better text/ASCII editor/viewer and place a # symbol in front of that line
  3. and then restart your web browser/e-mail client/ftp client/network tool and access that same internet site/server once again.
NOTE 5 : Internet Explorer

In case Internet Explorer web browser does NOT allow you to save a web page, and you get this error message (or similar):

"Error Saving Web Page
This Web page could not be saved"

this may be due to 1 or more0 (0.0.0.0 abbreviated) or 127.0.0.1 entry/entries into your HOSTS file associated with 1 or more of the internet site(s)/server(s) you are trying to save that web page from.
To temporarily access that/those particular internet site(s)/server(s) and be able to save it/them properly as web page:

  1. Copy & paste that URL name from the Internet Explorer URL address box: highlight the entire URL line right-click on it select Copy.
  2. Close/exit that particular Internet Explorer instance.
  3. Rename to any other name or move to any other valid location your HOSTS file.
  4. Restart Internet Explorer.
  5. Highlight the entire URL address box right-click on it select Paste press Enter.
  6. Now save your web page again.
  7. Close/exit that particular Internet Explorer instance.
  8. Rename BACK to the original name or move BACK to the original location your HOSTS file.
  9. Restart Internet Explorer. This is because webmasters sometimes include server-side code to access more than 1 web site/server from within the same web page.You can automate some of the steps above by using these 2 DOS style BATch files [%windir% = usually C:\WINDOWS (Win9x + Win2000/newer) or C:\WINNT (WinNT4/2000)]:

Back 2 TopHOSTS Usage DNS Accelerator | Ad/Malware/Popup Blocker

HOSTS as DNS accelerator :

Retrieve the IP address of any known host name by running ping (example):ping microsoft.comwhich returns this screen:Pinging microsoft.com [207.46.130.108] with 32 bytes of data...Then add this IP followed by its host name to your HOSTS file (example):207.46.130.108 microsoft.com # MicrosoftPING.EXE is installed by default by all Windows 32-bit (Win32/x86) + 64-bit (Win64/x64) OSes in %windir% [Windows 9x OSes] or %windir%\SYSTEM32 [Windows NTx OSes].
Run:pingby itself to display all available command line parameters.Some internet/network servers use dynamic IP addresses, meaning the numbers change periodically or every time you try to access them. Therefore you may need to ping the same server more than once at different times, and then add ALL IP numbers found for that server, followed by its host/web site name (see example above) on separate lines into your HOSTS file.

HOSTS as ad, malware + popup blocker :

The HOSTS file is only a primitive anti-adware, anti-spyware, anti-malware + anti-popup blocking tool.
But it can be used to successfully block adware, spyware, malware, viruses, trojans, worms, zombies + popups in all your web browsers by preventing an entire list of internet domains/servers/web sites from accessing your local computer(s).
Be aware that the HOSTS file can be easily deleted, modified, renamed, moved etc by malware/spyware to include malware/spying/rogue/phishing/virus/trojan/zombie servers or/and to remove/disable malware servers in the background, without user's knowledge.STRONGLY RECOMMENDED:
Install + run a dedicated firewall, anti-spyware + anti-virus tools in order to monitor for, detect and remove any potential malware/spyware.Block (deny access to and from) any host (force that server to default to localhost IP) by preceding its name with 0.0.0.0 (null = can be abbreviated to 0) or 127.0.0.1 (localhost = loopback). This example:0.0.0.0 microsoft.comor abbreviated to (faster):0 microsoft.comor [slower: will take longer to process with large number of HOSTS entries]:127.0.0.1 microsoft.comdenies access to and from microsoft.com domain name.
See MDGx HOSTS files for a list of blocked servers.
Rename all your HOSTS file 0.0.0.0 (or abbreviated to 0) instances to 127.0.0.1 (or the other way around) if too slow or if not working.•NEVER• rename/modify/delete/comment/remark this HOSTS line:127.0.0.1 localhostSurf the internet safely... ;)

Back 2 TopHOSTS + Ad/Malware/Popup Blocking Links

HOSTS Guides + Free(ware) Tools on the Internet :
Wikipedia: Hosts (file)Host Name ResolutionMDGx: Map Your HOSTSMDGx: The Magic HOSTS FileOjatex's Ad MAD pageHaGeZi's DNS Blocklists + HOSTSNoTracking BlocklistsBlocklist Curated Hosts FileStevenBlack HOSTSURL haus Malicious URL blocklist HOSTSURL haus abuse HOSTSHostessHosts Mechanic1Hosts DNS blocklists: mini, Lite, Pro + ExtraHosts File to Make The Internet Not Suck (as much): 127.0.0.1Hosts File to Make The Internet Not Suck (as much): 0.0.0.0Edit HOSTS in Windows 11Edit HOSTS in Windows 10Edit HOSTS in Windows 8/8.1Edit HOSTS in Windows 7/7 SP1Lock, Manage, Edit HOSTS in Windows 7/newerOpen and Edit HOSTS in Windows 8.1Modifying Your HOSTS FileCombined Windows Privacy (CWP) UtilitiesFastNet99HOSTS Resolution Editor (HRE)HostsMan HostsServerHostsXpertBlueLife Hosts EditorHomerHosts AdministratorHostswitchAdBinMSKB: Microsoft TCP/IP Host Name Resolution OrderMS TechNet: HOSTS + LMHOSTS Files for Windows 98/MEMSKB: You cannot modify HOSTS or LMHOSTS in Windows VistaAd Blocking with ad server hostnames + IP addressesAd Blocking Links: ad server lists (mostly hosts files)Mozilla: Ad BlockingBlocking Unwanted Parasites with HOSTSHosts File FAQHOSTS File - The Single Best + Easiest Privacy ToolHOSTS Files + UtilitiesHOSTS File ProjectI-BlockList ListsThe CAMELEON ProjectBadHosts FileHosts Files: Accelerate + Secure Internet Navigation (French)Bust Banner Ads with Browser Proxy Auto ConfigurationMDGx: FREE Firewalls, Anti-Spyware + Internet MonitorsMDGx: Internet Security + Traffic ResourcesMDGx: Networking + Security Tools on the InternetMDGx: No Ads Thank You!MDGx: Proxy Ad Blocker

Back 2 TopBack!