In the previous article we talked about the angry hosts file tool. It collects bad hosts lists from various sources and compiles a single one
of them to block the most of malicious hosts online. In the discussion section we pointed out to several weaknesses of the approach. In particular any
subdomain of the malicious domain is not getting blocked by the hosts file method.
In this article we describe an improvement of the angry hosts file tool which uses dnsmasq DNS caching server.
It allows to block a domain with all of its subdomains, thus the configuration file for it is smaller than the hosts file generated by the tool.
Additionally you can enjoy all the features dnsmasq provides like advanced DNS configuration and logging of DNS queries.
There are a number of providers on-line who publish hosts
files containing domain names of "bad" servers. I introduce here a
tool to make use of them efficiently. The angry hosts file tool (originally from Steven Black, merging back currently) is free and
open-source, you can get it on my github here.
The angry hosts file tool generates a hosts file for your machine, which will
block the domains from the famous bad-hosts listing web sites.
In this article we discuss first the idea behind these lists
explaining briefly the concept of domain name resolution and hosts
files. We continue to the tool introduction with the explanation of what it does exactly. Finally the discussion on
security implications plus several more related questions follows.
To increase security of your XMPP communication, potentially improve anonymity or avoid traffic filtering, it is
possible to configure your XMPP client to work with TOR.
In this article I am describing how to configure Jitsi communicator to work over a connection provided by a
TOR service on Linux. As usually I will take Ubuntu Linux as an example, but instructions often apply to other platforms as well.