{"id":238,"date":"2010-03-02T19:12:50","date_gmt":"2010-03-03T00:12:50","guid":{"rendered":"http:\/\/zitstif.no-ip.org\/?p=238"},"modified":"2010-03-02T19:19:27","modified_gmt":"2010-03-03T00:19:27","slug":"protecting-end-users-by-black-listing-domain-names","status":"publish","type":"post","link":"http:\/\/zitstif.no-ip.org\/?p=238","title":{"rendered":"Protecting end users by black listing domain names"},"content":{"rendered":"<p>One of the many programs that I use for Windows to help prevent and remove malware is <a title=\"http:\/\/www.safer-networking.org\/\" href=\"http:\/\/www.safer-networking.org\/\" target=\"_blank\">SpyBot S&amp;D<\/a>.\u00a0 One of the methods that SpyBot S&amp;D utilizes, is by editing the hosts file, which for Windows is located at (usually):<\/p>\n<p>C:\\WINDOWS\\system32\\drivers\\etc\\hosts<\/p>\n<p>About a year ago, I was monkeying around with my hosts file and noticed all the entries put by SpyBot S&amp;D. I thought to myself, &#8220;What a wonderful idea.&#8221; For those of you who aren&#8217;t familiar with the hosts file, please take a gander at this:<\/p>\n<p><a title=\"http:\/\/en.wikipedia.org\/wiki\/Hosts_file\" href=\"http:\/\/en.wikipedia.org\/wiki\/Hosts_file\" target=\"_blank\">http:\/\/en.wikipedia.org\/wiki\/Hosts_file<\/a><\/p>\n<p>Ergo, I compiled (well I used quite a bit of from the hosts file that was edited under Windows by SpyBot S&#038;D)a list of offending domains that are usually associated with scams, malware, and\/or other nefarious things and put it on my website. I felt that end users who use Linux or even Mac OS X could benefit from editing their hosts file in such a way. Here&#8217;s the hosts file:<\/p>\n<p><a title=\"http:\/\/zitstif.no-ip.org\/THELIST.txt\" href=\"http:\/\/zitstif.no-ip.org\/THELIST.txt\" target=\"_blank\">http:\/\/zitstif.no-ip.org\/THELIST.txt<\/a><a title=\"http:\/\/zitstif.no-ip.org\/THELIST.txt\" href=\"http:\/\/zitstif.no-ip.org\/THELIST.txt\" target=\"_blank\"><\/a><br \/>\nMD5sum: 7ec6a57b82d53359c3bcff54d0b1cc62<\/p>\n<p>For *nix end users, if you want to append THELIST.txt on the fly over the Internet via bash shell, give this a try and verify your results as root:<\/p>\n<pre lang=\"bash\">printf \"GET \/THELIST.txt HTTP\/1.0\\n\\r\\n\" | nc -vv zitstif.no-ip.org 80 2>&1 | egrep -v 'HTTP|Apache|Date:|ETag:|Accept-Ranges:|Content-|Connection:|Modified:|Connection'\u00a0 >> \/etc\/hosts\r\n<\/pre>\n<p>By doing this, you&#8217;ll protect your end users by making the blacklisted domain names unavailable to them. This may not be perfect, but this is one of the many ways you can help prevent identity theft for your end users or even yourself.<\/p>\n<p>More to come.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the many programs that I use for Windows to help prevent and remove malware is SpyBot S&amp;D.\u00a0 One of the methods that SpyBot S&amp;D utilizes, is by editing the hosts file, which for Windows is located at (usually): C:\\WINDOWS\\system32\\drivers\\etc\\hosts About a year ago, I was monkeying around with my hosts file and noticed &hellip; <a href=\"http:\/\/zitstif.no-ip.org\/?p=238\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Protecting end users by black listing domain names<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[77,72,75,74,76,82,81,80,78,73,79],"class_list":["post-238","post","type-post","status-publish","format-standard","hentry","category-posts","tag-etchosts","tag-adware","tag-blacklist","tag-domain-names","tag-hosts-file","tag-identity-theft","tag-identity-theft-prevention","tag-linux-security","tag-protect-end-users","tag-spyware","tag-unix-security"],"_links":{"self":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=238"}],"version-history":[{"count":7,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/238\/revisions"}],"predecessor-version":[{"id":242,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/238\/revisions\/242"}],"wp:attachment":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=238"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}