Of course, the performance of any operating system has its own subtleties and nuances, and this is especially true for everything related to the Internet. And a file such as hosts in Windows 8 is no exception.

Purpose

To understand how to edit hosts in Windows 8, you first need to understand why such a file is needed at all and what it is responsible for.

Like most everything that exists, the Internet is far from what it seems to the average user at first glance. The average owner of a personal computer or laptop is used to opening a browser, entering a query in the search bar and receiving the information found or the necessary Internet page. But in fact, the PC had to do much more work than the user noticed.

As soon as the desired query or address has been entered, the system turns to one important tool - the DNS server. It is responsible for determining and issuing IP addresses to websites and plays the role of a kind of buffer between a certain personal computer with its operating system and the Internet page. Once the request has been sent and the necessary information has been received, the connection to the website server and direct downloading begins.

The hosts file in Windows 8 plays the role of a protective membrane through which specified IP addresses are passed and unknown ones are cut off.

It has local significance and its own original copy is created on each device with an operating system from Microsoft. And, despite the fact that in most cases it has the same parameters, anyone can change them at their own discretion, of course, with the appropriate knowledge and skills.

It is through this file that you can prohibit connections to certain servers, which will allow you to deny access to content that is undesirable for the user. Also, editing it can be used as “parental control”.

Setting details

Before describing where in Windows 8 it is located hosts file, the nuances associated with it should be described.

The first thing worth mentioning is that this file is the most common target for virus and spyware. The malicious program tries to make changes and add new entries that allow you to connect not to the desired website, but to a pre-prepared one that will sabotage your PC. The effect will depend on the intended purpose of the virus, its type and the tools at its disposal. Thus, the owner of the device may not even realize that he did not go to the VKontakte page, but to a completely different server, since the address bar will contain the words “vk.com”.

The hosts file, due to its importance, is under the protection of a service such as Windows Defender, which does not allow you to make adjustments to it or add new entries.

When installing third-party antivirus software this service is disabled, and control over the hosts is exercised by the newly installed utility. The degree of control decreases as third party application is more tolerant of working with local data.

If necessary, the user can remove Defender custody of this file, but this should only be done by experienced users who understand what this can lead to. To do this, you need to open Windows Defender, go to the “Settings” tab, and then select the file of interest in the block of excluded files and locations, which is located at: C:WindowsSystem32Driversetchosts.

Hosts adjustment

At the preparatory stage, you will have to perform one small but very important action, without which further manipulations simply do not make sense. Editing the required object is impossible if:

  • Windows Defender protection was not removed. All changes simply will not function, since operating system will refuse to make adjustments and keep them.
  • No third party antivirus was installed software. It has noticeably fewer tools in the environment than the native Defender, and therefore its control will be less soft. This, in turn, will allow the PC owner to adjust the file in the key he needs and save the changes.

Having finished with the preparatory stage, you can move on to the main procedure.

First of all, you need to launch standard Notepad or any other simple text editor.

As soon as the corresponding window is displayed on the monitor screen, select the “File” tab in the upper right corner, and then the “Open” position and follow the previously mentioned address.

Once the file is open, you can start making new parameters. To do this, you need to go down to the end of the entries and, on a new line, add first your local IP, and then the Internet address of the resource itself. The local IP address has a general meaning and in standard form looks like this: 127.0.0.1.

Once the data is entered, all that remains is to save the changes and check the results of the work.

Hosts file in Windows 8: Video

1. What are hosts for?

The task system file hosts is the storage of a list of domains (web addresses like site.ru) of various sites and their IP addresses. Thus, in the process of working with the Internet, domains are converted into their IP addresses and vice versa. Each outgoing request to open a particular Internet site is, in fact, a request to convert a domain to an IP address. This query is performed by the Internet DNS service. From the technical side of the Internet veil, there are no web addresses in literal expression like site.ru. They are used for the convenience of web surfing by users and reflect the essence of the site's themes. Designed to facilitate the exchange of data between different parts of the network, the DNS service converts domains into specific sets of numbers, also known as the IP addresses of each individual site.

The hosts file has priority over the DNS system. Before accessing this Internet service, browsers first check their cache, then receive information about the correspondence of IP addresses to domains, which is contained in the hosts file of the Windows operating system. And only after this the request goes to DNS.

Some users make changes to the “hosts” in order to speed up the loading of their favorite sites. If you specify in it for individual sites the correspondence of IP addresses to their domains, you can get slightly faster access to these sites, since they will load in the browser window, bypassing the stage of sending a request and receiving data from the DNS service. But this method of optimizing Internet access is not necessary, since there is a browser cache with the highest access priority.

The need for intervention to change the contents of this file arises when it is edited by malware without the user’s knowledge. Hosts file - vulnerable Windows place, it is of particular interest to malware creators. By replacing the original system hosts file with its analogue, but with a ready-made list of false correspondences of IP addresses to their domains, Internet fraudsters thus implement a redirection mechanism that is beneficial to them. If we add a false correspondence of the IP address to the domain into the “hosts”, replacing the real IP address, for example, of some social network with the IP address of, say, a site with paid porn content, then every time we try to get into the social network we will actually end up on a porn site. But this is not the worst example of scammers manipulating hosts. Things will be much more difficult with filling out forms on phishing sites. In order to fish out confidential user data, for example, accounts in financial and online payment systems, logins and passwords for them, Internet fraudsters can replace individual web pages of these online systems with their own web pages, specially created for fraudulent purposes. Substitution of file data with redirection to another site is also used as a dishonest way to promote sites, to block social network pages and extort money for unblocking money, to block access to antivirus web resources software products etc.

Making changes to hosts is also practiced for the purpose of locally blocking access to certain sites. For example, within the framework of parental control.

Below we will look at how the processes of making changes to hosts are carried out in order to edit it to block individual sites, as well as to correct it in the event of replacing the content with malware. But first, of course, let’s find the file itself, open it and look at its original contents.

2. Path to the hosts file and opening it

To access hosts, you must have administrator rights. It is located in the Windows system directory along the path:

C:\Windows\System32\drivers\etc

You can also open this path with the command %systemroot%\system32\drivers\etc in the Run dialog box

To open a file, call on it context menu, select “Open with” (just “Open” for Windows 7) and from the list of offered programs select the standard Windows notepad or any third-party notepad, if one is present in the system (Notepad++, AkelPad, etc.).

If along the specified path (subject to the display parameter being set) hidden folders and files in Explorer) there is no “hosts” file, this is a clear consequence of the tricks of malware that has penetrated the computer. Viruses and Trojans can sometimes move it to another location on the computer.

3. Contents of hosts

After opening hosts, we will see its contents in the form of informational information about the essence of this file. Of the correspondence between IP addresses and their domains, only one working record should be present in the original edition of the file contents (without user intervention, without malware tricks). This is a disabled mapping of the current computer's IP address to the value "localhost", the local host. The hash sign at the beginning of the line means that the prescribed correspondence does not affect anything, but simply exists in the prospect of being used or as a template.

4. Blocking access to individual sites using the hosts file

Editing “hosts” is one of the many ways to block access to individual sites. Compared to the blocking mechanisms offered by standard Windows parental controls and third party programs, editing hosts is simple and in a fast way restrictions on access to sites.

To block access to a specific site, first clear the cache of the browsers used on the computer, then in the hosts open in notepad below the existing entries, enter a redirection from unwanted sites to the local host like this:

127.0.0.1 site1.ru

127.0.0.1 site2.ru

127.0.0.1 site3.ru

Those. in each match, after the local IP address 127.0.0.1, we add the domains of unwanted sites separated by a space. After editing the contents of the file, click the menu “File” - “Save As”.

It will not be possible to save the newly created file directly along the path where it is located in the system directory. First, this file must be saved in any non-system folder (for example, in the “Documents” folder) as a regular text TXT file called “hosts”.

After saving, select this file, press the rename key F2, delete the “.txt” extension (along with the period) and press Enter.

We confirm the action.

We copy the newly created file, after which we go to the folder along the path of the original hosts file, which is indicated in paragraph 1 of the article. Before inserting the newly created hosts file, you need to decide what to do with this file in its current edition. As an alternative to deleting, you can use the same F2 key to rename the current file, adding a postscript to the name in the form serial number, date or other nuances. It will be something like backup copy hosts with some current settings, which you can always return to by giving the file the original name without a postscript.

We confirm the insertion of the new file with administrator rights.

After all these steps, the sites included in the blocking list will not open in any browser on the system.

In the future, to temporarily remove the lock, so as not to delete entire records, you must insert a pound sign at the beginning of the line of each individual match and save the hosts file as indicated above.

It is not recommended to create a huge list of blocked sites (more than a hundred) in hosts, so as not to slow down the operation of your computer with the Internet. When blocking large-scale web projects such as social networks, you must also take into account that they may be accessible not by one domain, but on several.

5. How to fix the hosts file

If, when you try to visit the desired site, some other one opens instead, or a message appears demanding money for unblocking a social network account, it’s time to fix the hosts. First, of course, you need to clean your computer from viruses and other malware. Only after this can you begin to correct the file. Fixing hosts means that you need to return its contents to its original state. There are several ways to do this.

One way to fix it is to manually remove strings of false matches between IP addresses and domains that were introduced by malware. Having opened the file in Notepad, we leave only the default matches, as indicated in the screenshot, and delete all other lines.

And save the file as indicated in the previous paragraph of the article.

Entries with false matches may be hidden outside the view of the standard notepad window, so you need to view the entire document by scrolling down to the very bottom.

Another option for fixing a file is to completely replace the existing content with the original text content. The source text of the file can be copied on the Microsoft support site, where options for different versions and editions of Windows are presented in separate blocks:

In the case of Windows 10, a variant of the source text of the hosts file for Windows 8.1 is used.

We copy the original contents of the file on the website, in Notepad press Ctrl+A to select the entire text of the document, then Ctrl+V to paste. We save the file as indicated in the third paragraph of the article.

If the file in the path specified in the first paragraph of this article is missing, it must be created there after neutralizing the malware. Open in notepad new document, paste copied on the site Microsoft support source text, save the file and place it in the system directory where it should be.

Finally, last method file corrections are automatic. True, it is only available for Windows 7 and earlier versions of the system. By following the link above, on the Microsoft support website in the “Easy fix” block, download the Fix it utility.

We launch it, agree to the license terms, click “Next”.

We wait for its completion and close it.

Reboot the computer.

The utility will automatically correct hosts and return its contents to its original state, including restoring the file if it was not found along the installation path due to malware tricks.

Have a great day!

For everyone who has problems with this file!!! The file was checked by Kaspersky, Nod 32, Doctor Web antiviruses - everything is clean! Download the file, unzip it, copy it to the Windows/system32/drivers/etc directory (if Windows asks for permission to replace files, we agree; if it writes an error that you are not an Administrator, try replacing the file using the Total Commander program) and enjoy life. The file is suitable for all latest operating systems:
The file is required mainly for VKontakte users who cannot open any sites, as well as for those who cannot access anti-virus sites or update anti-viruses. Description of the file. Downloading is completely free, without annoying SMS. An article on how to create a hosts file yourself, the article can help you solve your problem.
Also, one of the users provided us with his host file so that you can use it.It blocks all malicious and advertising sites that can harm your computer. We express our gratitude to the user Diman8369 for providing such a file.

Creating and editing a host file in Windows XP

Windows 7, 8, 8.1 and 10


About 8 thousand computers per day are infected with Trojan Hosts

The Doctor Web company reported increasing cases of websites being hacked in order to download malicious programs of the Trojan.Hosts family to users’ computers. The scale of this threat became almost epidemic in early 2013. The peak of the distribution of Trojan.Hosts occurred in January and mid-February, when about 9,500 cases of infection were recorded on user computers every day. In March, Trojan.Hosts infect about 8,000 computers per day.


To hack websites, attackers use the FTP protocol, connecting to resources using previously stolen logins and passwords. Then a special command interpreter (shell) is loaded onto the hacked site, using which the .htacess file is modified, and a malicious script is placed on the site.

As a result, when visiting an infected site, the script gives the visitor a web page containing links to various malicious applications. In particular, this is how Trojans from the Trojan.Hosts family have recently begun to spread widely.

The main purpose of the Trojan.Hosts family of malware is to modify the hosts file, located in the Windows system folder and responsible for translating network addresses of sites. As a result of malicious actions, when trying to go to one of the popular Internet resources, the user of the infected computer is redirected to a web page belonging to the attackers.

What is the Hosts file for?
The purpose of this system file is to assign certain website addresses to a specific IP.
This file is very popular with all kinds of viruses and malware in order to write their data into it or simply replace it.
The result of these actions may be signs of “insertion” of a site into browsers, which will ask to send an SMS when opening the browser, or blocking of various sites, at the discretion of the creators of the virus.

Where is the hosts file in windows?
For different versions of Windows OS, the location of the hosts file is slightly different:

Windows 95/98/ME: WINDOWS\hosts
Windows NT/2000: WINNT\system32\drivers\etc\hosts
Windows XP/2003/Vista/Seven(7)/8: WINDOWS\system32\drivers\etc\hosts


Moreover, the ending hosts, it already is final file, not a folder. He doesn't have it.

What it should look like correct file hosts?
The "contents" of the hosts file are also slightly different for different windows versions, but not really. It is "written" in English why it is needed and how to make exceptions with one example. All lines starting with a # sign mean that they are commented out and do not affect the file.
Contents of the original hosts file for Windows XP:


#

#




#space.
#


#
# For example:
#



127.0.0.1 localhost


Contents of the original hosts file for Windows Vista:

# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
#space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a "#" symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost::1 localhost


Contents of the original hosts file for Windows 7:

# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
#space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a "#" symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
# localhost name resolution is handle within DNS itself.
# 127.0.0.1 localhost
# ::1 localhost


Contents of the original hosts file for Windows 8:

# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
#space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a "#" symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

# localhost name resolution is handled within DNS itself.
# 127.0.0.1 localhost
# ::1 localhost


As you can see, the contents of the host file for different versions Windows, there are no special differences.

How to open and edit the hosts file?
The hosts file can be found in standard Windows Notepad.
This is probably the most interesting part of the article.
First of all, you need to understand why change this file at all? Yes, in order to deny access to certain sites. Thus, by changing this file and having entered the site address into it, the user will not be able to access it through any .
In order to change the hosts file, it is advisable to open it as administrator () by right-clicking on the file and selecting "Run as administrator". Or open Notepad this way and open the file in it.

For quick action, you can simply click the Start button and select Run ( win+r) () and enter in the line:

notepad %windir%\system32\drivers\etc\hosts



As a result, this file will open in Notepad.

In order to block access to the site(let's assume it will be test.ru), you just need to add a line with this site at the very bottom:

127.0.0.1 test.ru


As a result, the file will have the following content:

# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
#space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a "#" symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

# This HOSTS file created by Dr.Web Anti-rootkit API

# 127.0.0.1 localhost
# ::1 localhost
127.0.0.1 test.ru


Each new site that you want to block must be started on a new line and entered, not forgetting the local IP address 127.0.0.1

Also, to edit the hosts file, there is a program HOSTS EDITOR, which you can download and read the description from.
The principle of its operation is that it helps to edit the hosts file.
From the screenshot below the principle of its operation is clear; everything is done in a couple of clicks. Adding is done by clicking on +.


After editing, do not forget to click on the save button (2 button "Save changes" to the left of the "+" button).

You can also change this file for good purposes, for example speed up site loading.
How does this work?
When you access the site, you see it domain name, which has letters. But all sites on the Internet have an IP address, and names are already assigned using DNS. I won’t go into details of this process; that’s not what the article is about. But here you need to know that the hosts file has priority when accessing sites, and only after it does a request to DNS occur.
In order to speed up the loading of a site, you need to know its IP address and domain.
The IP address of a site can be found using various services, for example or.
A domain is the name of a website.
For example, let's speed up the loading of this site where you are reading an article by explicitly specifying the IP address and domain to the file.
Then the added line will be:

91.218.228.14 website


This speeds up page loading in a couple of seconds, and sometimes can give access if standard means You cannot access the site.

Still possible redirect to another site using hosts file.
To do this, you need to know the IP address of the site and its domain (as in the case described above), then the added line will be like this:

91.218.228.14 test.ru


And now, after entering test.ru into the address bar of your browser, you will be redirected to the site specified in the IP address..

If you want clean hosts file, then you can do this by simply deleting the content and inserting the original text from the description above (under spoilers).

Some nuances in the hosts file:

  • Always make sure you have a scroll bar on the side and always scroll the window to the bottom. This is due to the fact that some viruses are registered in an area hidden outside the window.
  • In some cases, usually if you can’t save the file, you need to log in account Administrator.
  • Sometimes, due to viruses, this file may be hidden. Read the article.
  • The two methods described (redirection and acceleration) may not produce the desired result. The fact is that several sites can be located on one IP address, this is especially true for external IP addresses provided by services.
  • Due to the fact that viruses love this file, its attributes can be changed to Hidden And Read-only.
  • Check the file attributes if the hosts file cannot be saved.

    Thus, you can easily and free of charge block access to sites in Windows by editing the hosts file.

  • What is a file hosts where it is located in the operating room Windows system 8 (8.1) and how to edit it?

    What is a hosts file?

    hosts is a file in text format containing a database domain names, which are broadcast in network addresses.

    A bit of useful information:

    Domain name is a set of characters in a human-readable form that defines the address of a network resource, for example, a website, email etc. For example, my site is on the domain website.

    Network address or IP address is the unique address of an individual node in computer network. IP addresses can be static or dynamic. For example, in the IPv4 protocol version, the IP address could be: 192.168.0.1 or 46.42.60.167.

    So, in relation to personal computer, file hosts stores IP addresses of domain names on the local machine.
    The file can be edited manually if necessary, but with administrator rights.
    Various malicious programs also like to make changes to this file.

    In the Windows operating system (XP, Vista, 7, 8, etc.) the file hosts is located in the directory:

    C:\Windows\System32\drivers\etc\hosts

    How the hosts file works

    When a user types the URL of a site in the browser search bar and presses the Enter key, the web browser does the following:

    • Checks in hosts file whether the entered name is the computer's own name (localhost);
    • If not, then the browser looks for the requested address (hostname) in the file hosts;
    • If a hostname is found, the browser contacts the corresponding IP address specified in hosts file;
    • If the hostname is not found in the file hosts, then the browser accesses the DNS resolver cache (DNS cache);
    • If a hostname is found in the cache, the browser looks up the IP address stored in the DNS cache for that host;
    • If the hostname is not found in the DNS resolver cache, the browser contacts the DNS server;
    • If the requested web page (site) exists, the DNS server translates the user-specified URL into an IP address;
    • The Web browser downloads the requested resource.

    How to open the hosts file?

    Find and open file hosts in Windows 8 it's not difficult. You can walk along the entire path, as they say, manually. Open drive C, go to Windows folder... and so on.
    For convenient searching, it is recommended to use Windows Explorer, because file managers(For example, Total Commander) for some reason they don’t see him. To call Explorer, you need to press the Start button or the Windows key or the key combination Ctrl+Esc. Copied file address hosts you need to paste into the search field:

    You can just as easily use the Run window (Windows+R):

    You can turn to the third option. Hover your mouse over the upper or lower right corner of the screen, calling up the vertical menu, and click on Search:

    This file is nominally a text file, but does not have the usual extension .txt, so the operating system will offer options for opening it. In the window that appears, find and select Notebook, or better yet, Notepad++:

    For example in a text editor Notepad++ The hosts file for Windows 8 will look like this:

    I tried to translate the contents of the file and this is what I got. Please read carefully, as the contents of this file contain basic filling rules hosts.

    # Copyright (c) 1993-2009 Microsoft Corporation.
    #
    # This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
    #
    # This file contains mappings of IP addresses to hostnames.
    # Each entry should be stored on a separate line.
    # IP address must be in the first column, followed by the corresponding hostname.
    # The IP address and hostname must be separated by at least one space.
    #
    # In addition, comments can be inserted into lines (such as this line),
    # they must follow the node name and are separated from it by a '#' character.
    #
    # For example:
    #
    # 102.54.94.97 rhino.acme.com # origin server
    # 38.25.63.10 x.acme.com # x client host

    # Localhost name resolution is processed within DNS itself.
    # 127.0.0.1 localhost
    # :: 1 localhost

    The key in this file are only the last two lines, everything else is nothing more than technical description informational in nature. These two entries are identical. The first entry is the original IPv4, and the second is the localhost in IPv6.

    File hosts can be used to speed up the Internet and reduce the amount of traffic. This is achieved by reducing queries to the DNS server for resources frequently visited by the user. For example, if you use every day search engines Yandex and Google (sites http://yandex.ru And http://google.ru respectively), then it makes sense in the file hosts below line 127.0.0.1 localhost add the following lines:

    93.158.134.11 yandex.ru

    209.85.229.104 google.ru

    This is what it will look like in the file hosts:

    This will allow your Internet browser not to contact the DNS server, but to immediately establish a connection to sites yandex.ru And google.ru.

    The Hosts file is sometimes used by a computer administrator to block unwanted web resources. To do this you need after the line 127.0.0.1 localhost add a line or several lines:

    127.0.0.1 address of blocked resource-1

    127.0.0.1 address of blocked resource-2

    127.0.0.1 address of blocked resource-3

    For example:

    Impact of malware

    As we already said, a request to a file hosts happens first, and then to DNS servers. It is known that the contents hosts file can be controlled by the computer administrator, and when certain conditions are created, unfortunately quite often, malware can also have an impact.

    What are the attackers' goals?

    • Blocking access to well-known and popular sites;
    • Redirecting the user to other sites (advertising, phishing pages).

    As a result, an attacker and fraudster can gain access to your data (logins and passwords), cause some damage by taking possession of your information, or worse, money.
    If when checking hosts file on your computer is no different from the standard file, which means there are no problems.

    But malware can add to the file hosts additional entries that are highly undesirable. Always pay attention to the entries after these lines:

    # 127.0.0.1 localhost
    # ::1 localhost

    Typically, malicious code is executed after a program downloaded from the Internet is launched. At this point, changes are automatically made to the browser shortcut properties and quite often additional lines are added to the file hosts.

    To block a resource, approximately the following lines are entered:

    127.0.0.1 Resource URL

    This is the same as what we discussed in the Limitations section..., only it will be fulfilled malware. And you will not be able to visit this web page because it is blocked on your computer.

    To redirect to another site in a file hosts something like this is added:

    157.15.215.69 Resource URL

    In this case, after entering the URL of the required resource in the browser, the user will be redirected to a completely different site, the purpose of which can only be guessed at.

    By restore I mean returning to the original or default state.
    In fact, the entire standard hosts is the last two lines, everything else, as you already know, is a simple description.


    It must be remembered that apart from these entries, nothing else should be present in the file. Everything unnecessary should be deleted immediately, of course, if you yourself did not add anything to the file hosts.
    After making changes, save the file.
    You can use a standard file hosts for Windows 7, 8 and replace the damaged one in the C:\Windows\System32\drivers\etc\ folder.

    If the following steps fail:

    • There may be a permissions issue. Need to run text editor with administrator rights and through the menu File → Open, find the hosts file and edit.
    • It is advisable to disable antivirus protection in real time. Many modern antiviruses prevent you from making changes to the file hosts.
    • Enable the display of extensions for registered file types, hidden files, and system files.

    There are no more words. All! All the best and brightness to you! Bye. L.M.


    Close