HostsShield preventing users from entering malicious, untrusted or potentially dangerous websites.
Speed the loading of web pages by not having to wait for these ads, annoying banners, hit counters, etc. to load.
Block most major parasites, hijackers and unwanted Adware/Spyware programs!
This is done by adding a list of known malicious entries to the Windows hosts file.
Protecting Your Privacy using the Windows Hosts File
The hosts file helps a network program find a host on a network, but it can hide a host from network programs as well. For example, if you wanted to block access to a specific network host, you can place the host's domain name in your hosts file with the IP address of 127.0.0.1. Each time a network program referenced the name of the host, the program is redirected back to the local computer. The network connection request will then result in an “unable to connected” error, thus preventing the computer from connecting to the host.
-The hosts file can effectively block any program that attempts to connect to a network hosts using the host's domain name. The computer is protected by blocking its access to malicious network hosts. Here are a few examples of how a host file protects your computer and your privacy on the Internet:
The DNS information in your address resolution queries can be used to determine what network hosts you may be connecting to, such as Web sites you are visiting, file servers you are downloading from, and peer-to-peer file sharing networks that you are using. By placing the hosts you frequently visits–or the hosts you may not want others to know that you visit–in your hosts file, you prevent DNS queries for these hosts from being sent on to the public network and possibly being logged.
Making Internet Access Just a Little Bit Faster
When you enter a domain name in a network-aware program, such as a Web browser or FTP client, that name must be first be converted (or resolved ) to an IP address before it can be used to connect with a network host. You might think that a DNS query message is always sent to resolve every domain name. However, the TCP/IP stack actually looks for the domain name first in the hosts file.
It is much faster to resolve a domain name locally from the hosts file than it is to send a DNS request to a server over the network–even if the hosts file contains many thousands of domain names and addresses. Therefore, a typical “hack” to improve network performance is to place commonly used domain names and their associated IP address in the hosts file, thus removing the need to create DNS network traffic.
Using a hosts file can also speed up network access for programs (especially Web browsers) by preventing network connections. A Web page may have dozens of scripted elements, each of which are downloaded from a Web server, and usually over separate network connections. A typical commercial Web site will have many scripts for detecting who you are, what you are looking at, and presenting content for rendering by your Web browser.
If specific scripts running on the page in your Web browser can be prevented from communicating with the servers, your Web browser would load the page much more quickly. Well, faster loading Web pages at the sacrifice of viewing a few pop-up windows and advertisement is something else you can expect when you use a hosts file.
NOTE: The security software might show malware warning message when you try to download or run HostsShield. Please ignore the message, its a false positive. Since this tool tries to modify system hosts file, the security software incorrectly detects it as suspicious item. The software is absolutely safe to use.