The bridge between gaming and data privacy
Q: Where is the hosts file?
On Windows, the hosts are somewhat hidden in a system folder of Windows. In case of repeated changes, it is recommended to create a link to the system folder.
Anyone using systems other than Windows has the possibility to find out the exact paths e.g. on Wikipedia .
Folder path hosts file Windows:
Please also note that the described procedure and the associated problems only apply to the contents of the gameindustry.eu. Other providers of hosts files and content should always be checked before use
Q: Difference between 127.0.0.1 und 0.0.0.0?
For the offered filters, - and adblock lists, the 0.0.0.0 is used for existing entries to show that a host entry is unreachable. In short: traffic from the device to the Internet and vice versa no longer takes place.
The 127.0.0.1 (localhost) as found in various lists is not used.
The address can be used as loopback traffic communication within the same host and thus fulfills a completely different function. In addition, 0.0.0.0 is a little faster in processing, takes up less space and is therefore more suitable for our purposes.
Q: How to reset the hosts file?
During a virus infestation or carelessness, the hosts may be quarantined, modified or even accidentally deleted by third-party programs.
A separate article described how to reset the hosts file.
Q: What to do if the hosts file does not apply?
There are several reasons why the hosts ignore custom rules.
- Enter Ipv4 & Ipv6 addresses into a firewall. Alternatively, block each exe file
- Check the hosts for errors. Classics are forgotten spaces or # Hash symbols
- Check the inbound and outbound Internet traffic and adjust existing rules if necessary.
Q: Does a hosts file or firewall make more sense?
What makes sense is individually dependent on the person. Both hosts files and firewalls can work together hand in hand. Everyone has to decide for themselves what is the right thing to do.
Q: What are the advantages of a hosts file?
Another advantage is that host files are used as a basis for other applications such as PI-Hole, DNSFilter or other programs, which often provide completely different ways of handling. Those who use PI-Hole can have hosts read files and benefit, for example, from a centralized protection option for all devices in their own network.
Q: What are the disadvantages of the hosts file?
The hosts file has some disadvantages that you have to calculate as a user. Which these are, as follows.
Q: How is the hosts file structured?
The syntax of the hosts file is kept simple. In principle,
For the example we use the american advertising company Rubiconproject
0.0.0.0 tap.rubiconproject.com # Mobile devices