This repository provides a pre-configured hosts file that blocks popular remote desktop software domains. By blocking these domains, you can protect users—especially those who might be susceptible to online scams—from inadvertently downloading or using remote desktop applications that allow scammers to gain unauthorized access to their systems.
Remote desktop software like TeamViewer, AnyDesk, LogMeIn, and others can be extremely useful for IT professionals, remote support, and collaboration. However, these same tools are frequently used by scammers to:
- Trick users into believing there's an issue with their computer.
- Gain remote control of the system.
- Steal personal information or install malware.
Many scam techniques involve social engineering, where scammers convince users to download a remote desktop application and provide access under false pretenses. Once access is granted, scammers can steal sensitive information such as passwords, banking details, or even install ransomware.
By blocking the domains of these applications at the hosts file level, you prevent the software from being downloaded or used on the system, adding an extra layer of protection.
There are multiple ways to block access to unwanted domains, such as:
- Using a DNS server or Pi-Hole to block traffic to certain domains.
- Editing the hosts file to prevent your system from resolving specific domains.
While both approaches are valid, editing the hosts file is often the simplest and most direct approach, especially for individual users or small networks. Here’s why:
Setting up a Pi-Hole or DNS server requires additional hardware, configuration, and maintenance. Editing the hosts file, however, is a built-in feature available on all major operating systems (Windows, macOS, and Linux), making it a lightweight and easy solution.
By directly modifying the hosts file, you have complete control over which domains are blocked. You can easily add, remove, or modify entries without having to maintain a separate network device.
Once configured, you can apply strict permissions to the hosts file, ensuring that only authorized users (such as an administrator) can modify it. This prevents unauthorized changes, making it difficult for malware or bad actors to undo the protection.
- Clone or download the repository, which includes the hosts file with pre-configured blocked domains for various remote desktop software.
- Windows: The hosts file is located at
C:\Windows\System32\drivers\etc\hosts. - macOS/Linux: The hosts file is located at
/etc/hosts.
-
Open the hosts file using a text editor with administrator privileges. For example:
- Windows: Open Notepad as an administrator and navigate to the file.
- macOS/Linux: Use
sudoto edit the file in a terminal, e.g.,sudo nano /etc/hosts.
-
Append the contents of the downloaded hosts file to the system’s existing hosts file.
-
Save the changes.
After editing the hosts file, it might be required to flush your system’s DNS cache to apply the changes:
- Windows: Run
ipconfig /flushdnsin Command Prompt. - macOS: Run
sudo killall -HUP mDNSResponderin Terminal. - Linux: Run
sudo systemd-resolve --flush-cachesor restart the network service withsudo service network-manager restart.
While antivirus software is an essential part of security, it may not always prevent the installation or usage of remote desktop applications, as these tools are not inherently malicious. Editing the hosts file provides an additional layer of protection by blocking access to the software itself.
The provided hosts file blocks most popular remote desktop software commonly used by scammers. However, new remote desktop tools are constantly being developed. We recommend periodically reviewing the hosts file to add new entries or keep it updated by checking for updates in this repository.
Yes, you can. If you need to use specific remote desktop software for legitimate reasons, you can easily edit the hosts file to remove the block on that particular software’s domains.
If you know of additional domains used by remote desktop applications or other software that should be blocked, feel free to submit a pull request or open an issue. Contributions are welcome to help improve the effectiveness of this protection.
Blocking these domains only prevents access to remote desktop applications based on the domains listed. It does not provide foolproof security against all forms of attacks. Ensure you maintain other layers of protection such as antivirus software, firewalls, and safe browsing habits.
By following this guide and utilizing the provided hosts file, you can help protect yourself, friends, family, or clients from falling victim to increasingly prevalent remote access scams.
Stay safe!