News Archive

SecureLab Home

Security Links

Site Search

Download Archive

About SecureLab


BlackICE PC Protection Windows® 98, XP Home, XP Pro, 2000 Pro, Me, NT 4.0 Workstation BlackICE PC Protection Guards and secures Against: Theft of personal identity, passwords or credit card info and more Hackers using your PC to launch attacks against other PC users Computer downtime and system crashes PREVENTS destructive applications like worms and Trojans from ever starting REPORTS attempted attacks and identifies intruders SECURES any Internet connection, including dial-up, DSL, or cable modem BlackICE PC Protection is Powerful and Easy-to-UseBlackICE teams a personal firewall with an advanced intrusion detection system to constantly watch your Internet connection for suspicious behavior. BlackICE PC Protection now features Application Protection, an exciting new feature designed to shield your PCs, laptops and workstations from hijack by an attacker, and protects you from Trojan horse applications, worms and other destructive threats. BlackICE's Application Protection quickly and invisibly defeats dangerous programs that attackers deliver through instant messaging, email, or even your Web browser! BlackICE stops these destructive programs before they do harm-like damaging your PC or launching email attacks against your friends and co-workers. BlackICE automatically detects and blocks attacks through a comprehensive inspection of all inbound and outbound information to your computer. And BlackICE PC Protection is constantly working to secure your dial-up, DSL, and cable modem from hackers 24 hours a day, every day of the year. Key Features BlackICE PC Protection offers: Professional-strength protection from hackers for your home PC An advanced Intrusion Detection System (IDS) Plus a Firewall! Easy installation and "out-of-the-box" protection means you're instantly protected.


How to disable Verisign's Sitefinder URL Redirection Service on your internet connection:
On September 15, 2003, Verisign unilaterally installed a redirection service for misspelled or mistyped domain names.  They did this without ICANN approval and continue to run this "service" even after ICANN directed them to stop (read more here)

Posted September 29, 2003
10:43 p.m. EST


Our recommendation to stop this domain from loading, is to add the following line in your HOSTS file. The HOSTS file can be found in the WINDOWS folder on Win9x systems, and can typically be found under the SYSTEM32/DRIVERS folder on WinNT / Win2000 / and WinXP systems.  You can easily find the file by searching for the file HOSTS (no file extension) and opening with a text editor.

Here is what your might see when you open the file using notepad:


# Copyright (c) 1993-1999 Microsoft Corp.
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
# For example:
# # source server
# # x client host     localhost


The line in bold is the line to add.  Now save the file.  This will essentially cause your browser to look in the wrong place for the Verisign site resulting in the domain being blocked on your computer.

For more information on this technique, see this PCMagazine article.

Back up your HOSTS file if necessary, SecureLab assumes no liability, implicit or implied for the use of this technique. Use at your own risk.



SecureLab Site Map: Home | Security Links | File Download | Site Search | PC Security | News Archive | About SecureLab

News Archive: 2002 News Archive | 2001 News Archive | 2000 News Archive | 1999 News Archive

SecureLab, Computer Network Security - Copyright ©1998, 1999, 2000, 2001, 2002, 2003 - All Rights Reserved.
The opinions expressed by listed hyperlinks, are not necessarily those of SecureLab