Cannot block website usings Hosts file in Windows 7


Recommended Posts

in Windows XP and Vista, you can go into your c:\windows\system32\drivers\etc\ directory and add websites in the Hosts file to block them from being accessed by any windows browser. But in Windows 7 it still opens the websites despite me adding them to the Hosts file.

is there a different way website blocking works in Windows 7?

Thanks

Try to see if it directly is ignoring the hosts file or just something with the browser.

1. Change a site in the hosts file and redirect it to '127.0.0.1'

2. Open Command prompt and try these commands 'ipconfig /flushdns' and then 'ping <website you blocked>'

If all is correct it should return 127.0.0.1

  ThreeLies said:
Try to see if it directly is ignoring the hosts file or just something with the browser.

1. Change a site in the hosts file and redirect it to '127.0.0.1'

2. Open Command prompt and try these commands 'ipconfig /flushdns' and then 'ping <website you blocked>'

If all is correct it should return 127.0.0.1

thats the thing, for example if i added www.website.com into the hosts file and ping it. it times out. but even after i close the browser and come back , it still goes to www.website.com in the browser

but yes, it seems to be ignoring the Hosts file

  maash said:
thats the thing, for example if i added www.website.com into the hosts file and ping it. it times out. but even after i close the browser and come back , it still goes to www.website.com in the browser

but yes, it seems to be ignoring the Hosts file

Did you try clearing your browser's cache?

Also, if I recall, the hosts file does not support wildcards, so a list like this:

www.blockdesite.com
forums.blockedsite.com
www1.blockdesite.com
www.blockedsite.org

must have a separate entry.

  • 6 months later...

i also find the hosts file is not working in win7 rtm, i have 'shortcut' in there

192.168.2.1 router

to allow me to just type router in the address bar to connect to my router admin page. works fine in xpsp3. does not work in win7.

added a few real addresses to speed up dns lookups, they also were not recognised. i tried adding them to the similar lmhosts file. that worked. it appears win7 is indeed ignoring the hosts file.

lmhosts (no extension) lives in the same dir. as hosts. slightly different syntax allows directives, see lmhosts.sam.

it indicates lmhosts is parsed only AFTER dynamic lookups fail. wonder if hosts behavior has similarly been changed.

i'd prefer it to work the old way as in all pre-win7 microsoft os's all the way back.

See if making the edit to hosts and then rebooting makes any difference. While experimenting with the DNS settings for my domain, I had to reboot before certain changes were 'seen' by Windows 7. Cleared DNS cache and browser cache, even tried a different browser, no change until I rebooted.

  • 1 year later...

I have been banging my head for hours on this and I think I have found the answer. For whatever reason Microsoft has decided that a tab in between your ip and hostname in the host file will not work in Windows 7. Try taking out the tab and using a space instead. Microsoft sucks!!!

  On 15/04/2011 at 15:59, BudMan said:

Nonsense - tab clearly still works.. Not sure what you were doing wrong, but tab is just fine.

post-14624-0-51925700-1302883141.jpg

If I take the tab out it works if it is in it doesn't. Not nonsense. If you are having problems I suggest you try it. It takes 2 seconds and if it doesn't work you are out 2 seconds.

This is not the best way to block a website. Any person over 13 with half a brain can bypass this method.

Unless you manage to block all search engine like Google, Yahoo, Bing etc. This method is only useful for folks that are not computer illiterate.

All right enough of my of topic nonsense...

Like other have said. After making change to the host file. Clear your DNS and restart and see if it works.

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • How in the world does the tow truck driver not know someone is back there?
    • Microsoft shares "immediate remediation" script if you deleted this Windows system folder by Sayan Sen Following the Windows 11/10 Patch Tuesday updates for April 2025, users began noticing a new and mysterious "inetpub" folder in the C: directory. What added to the intrigue was that the folder seemed empty for many people, and thus it was assumed that it could be malicious. As such, many users even proceeded to delete the folder. However, as it turns out, Microsoft later confirmed that this folder was indeed part of the April Patch as it was delivered against the CVE-2025-21204 escalation of privilege security vulnerability. Curiously, a security researcher found that interpub itself could also in turn help threat actors permanently block Windows security updates, although, according to the tech giant, it is only categorized as a "moderate" severity at the moment, something that does not require immediate servicing. As such, Microsoft insists that inetpub must not be deleted "irrespective of whether Internet Information Services (IIS) is active." The company shared a new PowerShell script to restore the folder in case you deleted it, adding that it requires "immediate remediation." This reminds us of the recent Defender definition updates that were released for Windows image files against Lumma. In its MSRC advisory, Microsoft cautioned: "For systems with KB5055528 installed but %systemroot%\inetpub directory deleted, immediate remediation is required. If the inetpub directory has been deleted, you need to run the remediation script Set-InetpubFolderAcl.ps1. This script will: Recreate the inetpub directory if it has been deleted. Ensure that the directory permissions are correctly configured to prevent unauthorized access and potential vulnerabilities related to CVE-2025-21204. Update ACLs for the DeviceHealthAttestation directory, if it exists. This directory was created on certain Server versions by the February 2025 security updates. The script will update the ACLs for the DeviceHealthAttestation directory to ensure it is secure." To get the script, users can head over to this page on Microsoft's official PowerShell Gallery website. It should be run with elevated privileges. The page also provides some additional instructions if needed.
  • Recent Achievements

    • Mentor
      Karlston went up a rank
      Mentor
    • One Month Later
      EdwardFranciscoVilla earned a badge
      One Month Later
    • One Month Later
      MoyaM earned a badge
      One Month Later
    • One Month Later
      qology earned a badge
      One Month Later
    • One Year In
      Frinco90 earned a badge
      One Year In
  • Popular Contributors

    1. 1
      +primortal
      489
    2. 2
      snowy owl
      258
    3. 3
      +FloatingFatMan
      253
    4. 4
      ATLien_0
      217
    5. 5
      Xenon
      152
  • Tell a friend

    Love Neowin? Tell a friend!