ComputersOS

HOSTS file (Windows 7): content, destination, recovery

Few users working with the "seven" and surfing the Internet can guess the true meaning of the HOSTS file (Windows 7). The content of it will be shown a little later, but for now let us dwell a little on the theory.

HOSTS file: why is it needed?

In general, if someone paid attention, the file itself is located in the directory etc, if you sequentially move through the tree from the Windows folder, through System32 to the drivers directory on the system disk. Not all, however, go into such a jungle system, by and large, this is not necessary. On the other hand, if you pay attention, the object itself does not have an extension, although, in fact, it is an ordinary text document.

But let's take a closer look at the Windows 7 HOSTS file . Its content is that it is this object that is responsible in the system for the relationship between the host names (sites, nodes, etc.) and the definition of their IP addresses to ensure the end user access to the resource. Roughly speaking, we do not need to register combinations consisting of numbers in the browser, and only resource names can be specified.

And one more small clarification about the HOSTS file (Windows 7). Its content can vary. Depending on what changes were made, it can help to block certain sites, speed up access to some resources, or, on the contrary, play a cruel joke, redirecting the user to questionable sites. However, first look at the original file.

HOSTS file (Windows 7): content

So, first, try to open this object. I must say that if you use the standard double-click method, nothing happens, because, as mentioned above, this object does not have an extension. In addition, the file can be hidden, so you should first select the hidden objects display in the view menu. But the system will offer several applications for opening. Choose the simplest - standard "Notepad" and look at the contents of the HOSTS file (Windows 7). Before us, something incomprehensible: descriptive text, some examples and a string indicating the local IP (# 127.0.0.1 localhost). It should be so.

Attention! Below the line indicating the reserved local address there should be nothing at all, unless, of course, the user does not want any resource to be blocked!

In general, everything that is above localhost refers to the allowed resources. All that is lower - to the blocked. It is not difficult to guess that many viruses, in particular programs that spread spam or advertise (Malware, Adware, etc.) independently edit the contents of this file. So it turns out that when a single resource is requested, the user receives a redirect (redirection) completely to another.

Restore the default HOSTS file in Windows 7

The original file we reviewed. Now let's analyze the modified content. To fix it, you can take the contents of the "clean" file for the "seven" from another computer or from the Internet, copy it, then paste it into the original and save it.

But there is one problem. The fact is that sometimes after removing all unnecessary to save the file, like the original, it does not work (the system simply does not allow it to be done).

What should I do in this case? First, delete the original completely (Shift + Del), bypassing the "Trash". Then use the right click on the empty space inside the etc directory and create a new file with the same name, but do not specify the extension. Now we insert the necessary content into it and save the object. After that, there you also need to find the lmhosts.sam file and delete it, as mentioned earlier.

It's all done. That in the first, that in the second case it is mandatory to reboot the system. Only then everything will work as expected. And, of course, editing should be done exclusively with the rights of the administrator.

The result

In general, very brief information about the HOST file was given here. If you look at the question of blocking some unwanted resources or, conversely, permissions to visit them with speedy access, editing should be done exclusively by hand and according to certain rules. Here you need to remember that the key role of the separator is played by a string indicating the reserved local IP. Well, then, as they say, the matter of technology. By the way, the technique described above will also help if the content of the object has been changed due to the impact of virus programs.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.delachieve.com. Theme powered by WordPress.