|
|
possible security risk
I would like to point out that it is a possible security risk to install an /etc/hosts file that you download from somewhere unless you are careful to look at the contents of that file to be sure that it is only doing what it advertises.
possible security risk
Hayne wrote:
I would like to point out that it is a possible security risk to install an /etc/hosts file that you download from somewhere unless you are careful to look at the contents of that file to be sure that it is only doing what it advertises. Excellent point! But you can use the shell to easily confirm that no rogue entries exist in /etc/hosts. The following shell command will display any lines in /etc/hosts which do not start with sites which point to either 127.0.0.1, 0.0.0.0 or start with a comment.
grep -v "^127.0.0.1|^0.0.0.0|^#.*" /etc/hosts | more
If any lines are output, you can easily check to see if they are valid or rogue entries.
possible security risk
This worked for me:
grep -v -e "^127.0.0.1" -e "^0.0.0.0" -e "^#" -e "^\s*$"
|
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.10 seconds |
|