• 1
  • 10
  • 11
  • 12
  • 4
  • 5
  • 6
  • 7
  • 8
  • malware_clean
  • si-award-clean
  • users_excellent


Untitled Document



HostsShield preventing users from entering malicious, untrusted or potentially dangerous websites.

Speed the loading of web pages by not having to wait for these ads, annoying banners, hit counters, etc. to load.

Block most major parasites, hijackers and unwanted Adware/Spyware programs!

This is done by adding a list of known malicious entries to the Windows hosts file.

Protecting Your Privacy using the Windows Hosts File

The hosts file helps a network program find a host on a network, but it can hide a host from network programs as well. For example, if you wanted to block access to a specific network host, you can place the host's domain name in your hosts file with the IP address of Each time a network program referenced the name of the host, the program is redirected back to the local computer. The network connection request will then result in an “unable to connected” error, thus preventing the computer from connecting to the host.

-The hosts file can effectively block any program that attempts to connect to a network hosts using the host's domain name. The computer is protected by blocking its access to malicious network hosts. Here are a few examples of how a host file protects your computer and your privacy on the Internet:
-Blocking Web sites that contain objectionable content
-Blocking certain pop-up advertising programs and traps
-Preventing the user from visiting known phishing Web sites
-Preventing some Web browser-based exploits which redirect the browser to malicious Web sites
-Preventing the user from visiting Web sites that are known to provide or install Spyware, Adware, or other malicious programs
-Preventing Spyware and Adware already installed on the computer from “phoning home” and reporting the user's private information
-Preventing Web bugs embedded in spam email from “phoning home” to log when and where the user read the email
-Using a hosts file in place of DNS also help to insure privacy. Each DNS query must travel across a network where it could possibly be “sniffed” and logged by other programs. The administrator of the DNS server has the ability to log all DNS requests from specific IP addresses (such as your Internet router), but network routers and other hosts on the network will also be able to log your DNS traffic as well.

The DNS information in your address resolution queries can be used to determine what network hosts you may be connecting to, such as Web sites you are visiting, file servers you are downloading from, and peer-to-peer file sharing networks that you are using. By placing the hosts you frequently visits–or the hosts you may not want others to know that you visit–in your hosts file, you prevent DNS queries for these hosts from being sent on to the public network and possibly being logged.

Making Internet Access Just a Little Bit Faster

When you enter a domain name in a network-aware program, such as a Web browser or FTP client, that name must be first be converted (or resolved ) to an IP address before it can be used to connect with a network host. You might think that a DNS query message is always sent to resolve every domain name. However, the TCP/IP stack actually looks for the domain name first in the hosts file.

It is much faster to resolve a domain name locally from the hosts file than it is to send a DNS request to a server over the network–even if the hosts file contains many thousands of domain names and addresses. Therefore, a typical “hack” to improve network performance is to place commonly used domain names and their associated IP address in the hosts file, thus removing the need to create DNS network traffic.

Using a hosts file can also speed up network access for programs (especially Web browsers) by preventing network connections. A Web page may have dozens of scripted elements, each of which are downloaded from a Web server, and usually over separate network connections. A typical commercial Web site will have many scripts for detecting who you are, what you are looking at, and presenting content for rendering by your Web browser.

If specific scripts running on the page in your Web browser can be prevented from communicating with the servers, your Web browser would load the page much more quickly. Well, faster loading Web pages at the sacrifice of viewing a few pop-up windows and advertisement is something else you can expect when you use a hosts file.


NOTE: The security software might show malware warning message when you try to download or run HostsShield. Please ignore the message, its a false positive. Since this tool tries to modify system hosts file, the security software incorrectly detects it as suspicious item. The software is absolutely safe to use.


X-Proxy v6.1.0.14 disponible para download.

Nueva versión de X-Proxy disponible para download.


- La base de datos de Hosts Shield ha sido actualizada.

- La base de datos de Hijacker Home Page Scan ha sido actualizada

- La base de datos de (IP-País) ha sido actualizada.

- Añadido boton Home en Proxy Checker.

Las actualizaciones serán aplicadas cuando ejecute su X-Proxy!


  1. El dia 01/09/2018 X-Proxy no tendrá opción para usuarios donantes y tendrá todas sus opciones totalmente abiertas.

  2. El numero máximo de proxies a comprobar para usuarios no donantes fue removido, pero el numero máximo de proxies descargados para su posterior comprobación esta limitado a 300.