"Jim Byrd" <jrbyrd@spamlesscomcast.net> wrote in
news:w1cxb.231441$mZ5.1747211@attbi_s54:

> Hi Giel - The attached .zip file contains a .vbs script which will do
> what you want. It was developed by one of the MVPs, but hasn't been
> published because he can't afford the time/effort to maintain it and
> answer questions. I just received permission from him to post it -
> thus the delay in responding to this thread. There's no Help file,
> but it's fairly self explanatory - just move a copy of your HOSTS file
> to the same folder where you unzip this and follow the direction which
> will come up when you run it. You'll need to copy the resultant
> modified HOSTS file back to where it's normally located for you. Be
> sure to rename it to HOSTS there - all caps, no extension. Use at
> your own risk.
>


That script is quite nifty, thanks. I have one question though.
The script seems to assume that each address in the hosts file is tied
to a webserver. I thought that hosts file might also have entries for
servers which maybe spyware call-home sites which could be listening on a
different port than 80 used by http. In fact they could be using UDP
instead of http or tcp. The script would assume that such entries are not
valid and remove them.

Am I making sense here or did I completely miss something as usual.

thanks,
data64