Im not saying remove known bad url's but the best example is the ATI/AMD driver downloads that are blocked by this hosts file currently, that server may have hosted adds, of could even host them now, but unless they are malitous in some way, removing htem has no real down side as it allows people to download their drivers without spending alot of time editing a hosts file.
Tell you what:I can remove ->
a248.e.akamai.netBUT, not ALL of the rest of the akamai.net servers
, such as via an entry like:
0 akamai.net... &, for the the EXACT + INSIGHTFUL reasons (good ones) that mckenak stated... he did make an EXCELLENT point.
(That's ALL I ever stated, because mckenak was correct, that most akamai.net entries ARE adbanner servers).
I don't BLOCKOUT all of wordpress, via the root domain name, via an entry like this:
That'd be the ONLY way to do a blocking of its other "sub-domains" or parts of them, like www.wordpress.com
OR ashen.wordpress.com... via a HOSTS file.
i checked a bunch of the entrys that where blocked NONE WHERE BAD they where ALL SAFE yet the file had a stack of them in it........
What made you think they are safe, ASH? Did you check the script tags yourself?? If you're relyng on AntiVirus &/or AntiSpyware ALONE, to do THAT, for YOU???
----Top security suites fail exploit testshttp://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9117042&intsrc=news_ts_headPERTINENT EXCERPT:
"They don't focus on detecting vulnerabilities, they focus on detecting the payload," Kristensen said. "But the problem with detecting the payload is that you're always behind [the hackers]. It's easy for the bad guys to create a new payload that's not detected by the scanning mechanisms and current signatures."
----Why popular antivirus apps 'do not work':http://www.zdnet.com.au/blogs/securifythis/soa/Why-popular-antivirus-apps-do-not-work-/0,139033343,139264249,00.htmPERTINENT EXCERPT:
"AV companies continue to refine their products and most will tell you they stopped relying on purely signature-based systems many years ago. These days they use all sorts of clever methods to try and detect suspicious behaviour but the problem is that malware authors are also very clever. Very, very clever."
----Take a GOOD read from the URL(s) above (& it's part of the WHY of why being "script kiddie tool reliant" solely, can be a downfall & sense of false security - also, additionally help prove that "layered security" is the way, & not only for 'trendy/fad' reasons either)...
How does or would an entry like:
fishman.wordpress.com has a gif thats detected as malware(positive or false
positive) it gets blocked so their system is to block all *.wordpress.com entrys they can find so ashen.wordpress.com and wilee.wordpress.com and darknova.wordpress.com would all be added to the list dispite none of them having any malware or adds on them.
fishman.wordpress.comDo a blockout of:
(From a HOSTS file entry)
Answer the question above... & tell me that, vs. your example NOW, and your last one from techfiles.com above also...
Your examples are what I am operating on...
I.E.-> You said "I meant" but, Do you KNOW what you're trying to say/are you expressing yourself well in this exchange on this note, today?
See - @ times, I know you don't spell well, so giving you the benefit of the doubt here on this one as well (albeit, this is a case of DICTION & PROSE, not spellng, this time from you, possibly)...
the fact that one of your sorces takes the scatter shot approch is why i get annoyed, they dont just block stuff thats malitious, they block everthing in the same domain range.
Again: HOW SO?
E.G.-> Blocking www.techfiles.com
DOES NOT BLOCK OUT EVERYTHING FROM THE PARENT ROOT DOMAIN OF techfiles.com
NOT sure in THIS case, but most of the time? It's been a REAL "problem child"...
Is that WHY I had to tell you how to structure/restructure the 1st HOSTS file of yours that you posted here, & sent me also as an attachment, & I had to then tell you to remove the leading # symbols you had in yours that invalidated ALL of its internal entries??
See below in my P.S. too... you're making ANOTHER mistake in regards to how HOSTS files work there below, also...
P.S.=> Ash - per the above? You DON'T understand how HOSTS files work, @ least, in part it seems... because, this next statement of YOURS, evidences my statement for me, just based on what you said:
HOSTS files don't use WILDCARDS... IE restricted zones, Opera FILTER.INI, & IP Security Policies can though... apk