A
Anonymous Bob
Count = 15,114
http://www.mvps.org/winhelp2002/
http://www.mvps.org/winhelp2002/
Anonymous said:Count = 15,114
http://www.mvps.org/winhelp2002/
VanguardLH said:I don't use pre-compiled hosts lists. However, at this high a count for
entries in a *text* file (which isn't cached and isn't a database file
to provide, for example, for quicker searches through a binary tree),
I'm wondering how the use of such a huge list will impact the
performance of the web browser.
They now have 82 entries where "doubleclick" appears in the domain
portion of the hostname. Does that mean Doubleclick now has 30 more
hosts for controlling their content than before (when I saw 52 listed)?
Not necessarily. Could mean that the author(s) for the list simply
found some more hosts that already existed that he/she didn't know about
before. Does Doubleclick actually have all 82 hosts actively handling
their content (i.e., those hosts exist). Not necessarily. I'm not sure
that once a host gets listed in the MVP hosts list that it ever gets
removed even after that host no longer exists.
From their site, "In many cases using a well designed HOSTS file can
speed the loading of web pages by not having to wait for these ads,
annoying banners, hit counters, etc. to load." Okay, but after what
point in creating an ever increasingly large list does the list itself
end up slowing down the serial local lookup through a text file more
than the ad that it might block in a web page?
Fine. That's your choice to make.
I'm not clear how this replies to the OP's wondering outloud if the use
of a huge HOSTS file effects browser performance. There was some
problem with with IE8 and users of a HOSTS file early on, although I
don't recall if the size of the list was the issue.
Gene
Anonymous said:The primary purpose of the hosts file has evolved over the years and now is
used to block malicious sites.
VanguardLH said:When did ads become malware? Most the folks that I've read their posts
that are using the hosts file are using it to block ads. You actually
know of Doubleclick spreading malware?
Anonymous said:Please give my respects to Sandi.
VanguardLH said:Sandi?
Bill said:Infected banner ads have been, in the fairly recent past, a significant
source of malware. I don't know whether the providers have cleaned up their
act, but I've seen an infected banner ad at an entirely legitimate site at
some point in the last two years.
My understanding is that the hosts file also may list hosts whose entire
content is malware--the places where links in spam email take you, for
example.
I'll say parenthetically that I don't use the hosts file myself, and I don't
know the answer about the performance issue--but I suspect that it is
manageable. I guess if my office had been using the hosts file two years
ago, we might never have seen the virus alert from that infected banner ad.
And, if our antivirus vendor (Microsoft) had not been on the ball, we might
also have not seen that alert--and been infected!
On a side note, and unlike the manual method described in another post
which would be an impossible task for a human, is there a utility that
can take this text list of hostnames to check if a DNS lookup actually
returns a non-error result? That is, is there a speedy utility that
could validate this list to eliminate non-functional lookups? This
would also serve to show if this list is bloated and by how much with
superfluous entries.
There is a new study on the honeynet site, titled Know Your Enemy: Malicious
Web Servers. While the study is interesting, there isn't anything
particularly new about it. The methodology was very similar to other studies
in this area (the Google Ghost in the browser - warning, PDF - study or the
Microsoft HoneyMonkey project<) - essentially it was a set of virtual
machines running unpatched versions of the OS which were directed to the
malicious links and any changes in them (created files, processes, etc) were
recorded.
The most interesting part (for me) however was the Defense Evaluation /
Blacklisting part. When applied on their dataset the very famous hosts file
maintained by winhelp2002 blocked all infections, although it contained only
a minority (12%) of the domains. This means that the majority of bad code
out there are redirectors and that these lists managed to include (at least
until now) the true sources of the infections. This is a very interesting
and it shows that while the number of different points of contact with
malicious intent on the Internet increases very rapidly, their variation
doesn't quite as rapidly and blacklisting technologies are still effective
(and by the same logic, AV systems can still be effective).
<snip>When I saw the 15K count for entries in the hosts file, it just popped
into my mind to wonder about the performance impact of such a huge list
that is a serially read text file might have on the web browser. It
would be an effect that might be interesting if known or measurable. It
could be that its impact would be so miniscule, like a 0.1 second or
less, that no one would care (yet). Or it could be something that
noticeably impacts the web browser (like a huge number of entries in the
Restricted Sites security zone significantly impacts IE8's performance).
VanguardLH said:Anonymous said:Count = 15,114
http://www.mvps.org/winhelp2002/
I don't use pre-compiled hosts lists. However, at this high a count for
entries in a *text* file (which isn't cached and isn't a database file
to provide, for example, for quicker searches through a binary tree),
I'm wondering how the use of such a huge list will impact the
performance of the web browser.
I remember looking at the MVP hosts file a couple years ago. Back then
there were 52 entries for DoubleClick alone. The hosts file is just
that: it lists hosts. It doesn't list domains so each blocked *host*
must be specified (i.e., host.domain.tld, not domain.tld). Since anyone
can rename their own host in their own nameserver, and since some
nameservers are configured to return the same IP address for a
particular host no matter what hostname is specified, it seems an
ever-changing or untargetable method of identifying unwanted hosts.
Not the above URL does not show you to a download link for the MVP
version of the hosts file (other entities also have pre-compiled hosts
lists where you relinquish control to someone else who has deemed a site
as something bad). The download is there but somewhat hidden. Click on
the circled "There's no place like 127.0.0.1" (to the left of the ad
promo for the PW site [who think alt.comp.freeware is their special-
interest newsgroup]). I have no idea why the MVP site doesn't make very
obvious a link to their hosts file. It's at:
http://www.mvps.org/winhelp2002/hosts.txt
They now have 82 entries where "doubleclick" appears in the domain
portion of the hostname. Does that mean Doubleclick now has 30 more
hosts for controlling their content than before (when I saw 52 listed)?
Not necessarily. Could mean that the author(s) for the list simply
found some more hosts that already existed that he/she didn't know about
before. Does Doubleclick actually have all 82 hosts actively handling
their content (i.e., those hosts exist). Not necessarily. I'm not sure
that once a host gets listed in the MVP hosts list that it ever gets
removed even after that host no longer exists.
From their site, "In many cases using a well designed HOSTS file can
speed the loading of web pages by not having to wait for these ads,
annoying banners, hit counters, etc. to load." Okay, but after what
point in creating an ever increasingly large list does the list itself
end up slowing down the serial local lookup through a text file more
than the ad that it might block in a web page?
TruXterTech said:The hosts file is only scanned the moment you open the web browser. I use
mvp's hosts file and I recommend it in all of my blogs. I do not want to
force you to see what i see but next time you get malware that hijacks your
machine, install mvps hosts and watch how easy it becomes to rescue your
machine.
yes it blocks advertisements and it says that is what it does. it is illegal
to accuse a program designer of embedding a virus. so i will hint that mvp's
hosts file, does more than block adverts.
1PW said:Hello:
Then just as a hint, where do you suppose someone should look for
something that does more in the mvps.org zip file (hosts.zip)?
Thank you.
NNTP posted. Not web posted.