On Sun, 22 Jan 2006 12:39:15 -0500, Peter Fraser wrote: >On my windows machines, I use the hosts file >from "http://www.mvps.org/winhelp2002/hosts.htm" >which removes a lot of junk from the internet. > >Rather than going to each machine an installing >this hosts file in \windows\system32\drivers\etc >I would rather have my firewall block these >names instead. > >Please note the blocking has to be done on the name, >not the ip address. The ip address could easily >be at some hosting site, and also be used for some >entirely valid web site. > >Does any one know how to implement this? > > dnsspoof from the dsniff package does it for me with 127.0.0.1 as the address returned for anything I don't want sending to my LAN in response to http GETs to banner ads etc. It does wild card naming which is great but take care because ads*.* matches adsl.example.com and you might want to get to the latter type of address although that quoted one is of course fictional.
>From the land "down under": Australia. Do we look <umop apisdn> from up over? Do NOT CC me - I am subscribed to the list. Replies to the sender address will fail except from the list-server.