On Sun, 22 Jan 2006 12:39:15 -0500, Peter Fraser wrote:

>On my windows machines, I use the hosts file
>from "http://www.mvps.org/winhelp2002/hosts.htm";
>which removes a lot of junk from the internet.
>
>Rather than going to each machine an installing
>this hosts file in \windows\system32\drivers\etc
>I would rather have my firewall block these
>names instead.
>
>Please note the blocking has to be done on the name,
>not the ip address. The ip address could easily
>be at some hosting site, and also be used for some
>entirely valid web site.
>
>Does any one know how to implement this?
>
>
dnsspoof from the dsniff package does it for me with 127.0.0.1 as the
address returned for anything I don't want sending to my LAN in
response to http GETs to banner ads etc.
It does wild card naming which is great but take care because ads*.*
matches adsl.example.com and you might want to get to the latter type
of address although that quoted one is of course fictional.

>From the land "down under": Australia.
Do we look <umop apisdn> from up over?

Do NOT CC me - I am subscribed to the list.
Replies to the sender address will fail except from the list-server.

Reply via email to