Results 1 to 8 of 8

Thread: Hosts-file hosts check

Hybrid View

  1. #1
    data64 Guest

    Re: Hosts-file hosts check

    "Jim Byrd" <jrbyrd@spamlesscomcast.net> wrote in
    news:w1cxb.231441$mZ5.1747211@attbi_s54:

    > Hi Giel - The attached .zip file contains a .vbs script which will do
    > what you want. It was developed by one of the MVPs, but hasn't been
    > published because he can't afford the time/effort to maintain it and
    > answer questions. I just received permission from him to post it -
    > thus the delay in responding to this thread. There's no Help file,
    > but it's fairly self explanatory - just move a copy of your HOSTS file
    > to the same folder where you unzip this and follow the direction which
    > will come up when you run it. You'll need to copy the resultant
    > modified HOSTS file back to where it's normally located for you. Be
    > sure to rename it to HOSTS there - all caps, no extension. Use at
    > your own risk.
    >


    That script is quite nifty, thanks. I have one question though.
    The script seems to assume that each address in the hosts file is tied
    to a webserver. I thought that hosts file might also have entries for
    servers which maybe spyware call-home sites which could be listening on a
    different port than 80 used by http. In fact they could be using UDP
    instead of http or tcp. The script would assume that such entries are not
    valid and remove them.

    Am I making sense here or did I completely miss something as usual.

    thanks,
    data64

  2. #2
    Jim Byrd Guest

    Re: Hosts-file hosts check

    Hi Data - I can't provide any more information than is given in the script
    itself. It will have to speak for itself - it does what it does, and you'll
    just have to experiment and see if that's useful to your needs.

    --
    Please respond in the same thread.
    Regards, Jim Byrd, MS-MVP



    In news:Xns943FE26D7C2AFData64Bigfootcom@130.133.1.4,
    data64 <me@privacy.net> typed:
    > "Jim Byrd" <jrbyrd@spamlesscomcast.net> wrote in
    > news:w1cxb.231441$mZ5.1747211@attbi_s54:
    >
    >> Hi Giel - The attached .zip file contains a .vbs script which will do
    >> what you want. It was developed by one of the MVPs, but hasn't been
    >> published because he can't afford the time/effort to maintain it and
    >> answer questions. I just received permission from him to post it -
    >> thus the delay in responding to this thread. There's no Help file,
    >> but it's fairly self explanatory - just move a copy of your HOSTS file
    >> to the same folder where you unzip this and follow the direction which
    >> will come up when you run it. You'll need to copy the resultant
    >> modified HOSTS file back to where it's normally located for you. Be
    >> sure to rename it to HOSTS there - all caps, no extension. Use at
    >> your own risk.
    >>

    >
    > That script is quite nifty, thanks. I have one question though.
    > The script seems to assume that each address in the hosts file is tied
    > to a webserver. I thought that hosts file might also have entries for
    > servers which maybe spyware call-home sites which could be listening on a
    > different port than 80 used by http. In fact they could be using UDP
    > instead of http or tcp. The script would assume that such entries are not
    > valid and remove them.
    >
    > Am I making sense here or did I completely miss something as usual.
    >
    > thanks,
    > data64




Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •