• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

Here’s how to use the HOST file to block ads

Myantispyware team November 19, 2005    

1. Determine the location of your HOST file:

Windows XP = C:\WINDOWS\SYSTEM32\DRIVERS\ETC

Windows 2K = C:\WINNT\SYSTEM32\DRIVERS\ETC

Windows 98, Me = C :windows\hosts

Macintosh: Mac System Folder or Preferences folder. (eg., Macintosh HD:System Folder:Preferences:Hosts)

2. Backup your HOST file – It’s a good idea to save your original HOST file in a safe location on your computer in case you encounter problems.

3. Download the HOST file – Download the HOST file* from PestPatrol* and save it on your computer. Copy the HOST file to:

Windows XP = C:\WINDOWS\SYSTEM32\DRIVERS\ETC

Windows 2K = C:\WINNT\SYSTEM32\DRIVERS\ETC

Windows 98, Me = C :windows\hosts

Macintosh: Mac System Folder or Preferences folder. (eg., Macintosh HD:System Folder:Preferences:Hosts

4. Locking the HOSTS File – After updating your host file, you might want to make it “read only”. Some malware programs will attempt to add their own entries or overwrite your HOSTS file. Remember to remove the read only status before updating the file or the update will not be accepted. To make your HOST file “read only”:

1. Right click the HOST file
2. Select Properties
3. Under the General tab check Read Only

Please note: In some cases a large HOST file tends to slow down the computer. This usually only happens in W2, but may occur in XP. Here is what to do if this is an issue for you: Open My Computer, Control Panel, Administrative Tools, Services – Scroll down to “DNS Client”, Right-click and select: Properties – Click the drop-down arrow for “Startup type” – Select: Manual, click Apply\Ok and restart.

Tips Tutorials - HowTo

 Previous Post

Immunize Yourself Against Sony’s Dangerous Uninstaller

Next Post 

IE-SPYAD: Restricted Sites List for Internet Explorer

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

Leave a Reply Cancel reply

New Guides

STDEI GLP 1 Review, Stdei GLP-1 Weight Loss Oral Solution Scam
scam alert
GOTEEX.com Review: Promo Code Scams Exposed
Olygee Cooling Ace Review, Don’t Be Fooled by False Promises and Misleading Ads
Suzuki Moorai Robot Dog Vehicle Real or a Scam, What You Need to Know
Liketonline Cooling Ace Review, Scam or Legit? What You Need to Know

Follow Us

Search

Useful Guides

How to reset Internet Explorer settings to default
Tech Support Scam
Remove Tech Support Scam pop-up virus [Microsoft & Apple Scam]
Managed by your organization chrome virus
Chrome Managed by your organization malware removal guide
browser redirect virus
How to remove Browser redirect virus [Chrome, Firefox, IE, Edge]
Best free malware removal tools
Best Free Malware Removal Tools 2025

Recent Guides

Immunize Yourself Against Sony’s Dangerous Uninstaller
Trick or treat: AIM worm delivers backdoor, rootkit and adware
what a rootkit is ?
Grab the cleaner – How to use Microsoft AntiSpyware
How to install and use the Windows XP Recovery Console

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.