Skip to content

TwidsDev/Basic-RemoteDesktop-Block

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

Block Remote Desktop Software via Hosts File

This repository provides a pre-configured hosts file that blocks popular remote desktop software domains. By blocking these domains, you can protect users—especially those who might be susceptible to online scams—from inadvertently downloading or using remote desktop applications that allow scammers to gain unauthorized access to their systems.

Why Block Remote Desktop Software?

Remote desktop software like TeamViewer, AnyDesk, LogMeIn, and others can be extremely useful for IT professionals, remote support, and collaboration. However, these same tools are frequently used by scammers to:

  • Trick users into believing there's an issue with their computer.
  • Gain remote control of the system.
  • Steal personal information or install malware.

Many scam techniques involve social engineering, where scammers convince users to download a remote desktop application and provide access under false pretenses. Once access is granted, scammers can steal sensitive information such as passwords, banking details, or even install ransomware.

By blocking the domains of these applications at the hosts file level, you prevent the software from being downloaded or used on the system, adding an extra layer of protection.

Why Use a Hosts File to Block Domains?

There are multiple ways to block access to unwanted domains, such as:

  1. Using a DNS server or Pi-Hole to block traffic to certain domains.
  2. Editing the hosts file to prevent your system from resolving specific domains.

While both approaches are valid, editing the hosts file is often the simplest and most direct approach, especially for individual users or small networks. Here’s why:

1. No External Hardware Required

Setting up a Pi-Hole or DNS server requires additional hardware, configuration, and maintenance. Editing the hosts file, however, is a built-in feature available on all major operating systems (Windows, macOS, and Linux), making it a lightweight and easy solution.

2. Fine-grained Control

By directly modifying the hosts file, you have complete control over which domains are blocked. You can easily add, remove, or modify entries without having to maintain a separate network device.

3. Restrictive Access for Security

Once configured, you can apply strict permissions to the hosts file, ensuring that only authorized users (such as an administrator) can modify it. This prevents unauthorized changes, making it difficult for malware or bad actors to undo the protection.

How to Use This Hosts File

1. Download and Open the Hosts File

  • Clone or download the repository, which includes the hosts file with pre-configured blocked domains for various remote desktop software.

2. Locate Your System’s Hosts File

  • Windows: The hosts file is located at C:\Windows\System32\drivers\etc\hosts.
  • macOS/Linux: The hosts file is located at /etc/hosts.

3. Edit the Hosts File

  1. Open the hosts file using a text editor with administrator privileges. For example:

    • Windows: Open Notepad as an administrator and navigate to the file.
    • macOS/Linux: Use sudo to edit the file in a terminal, e.g., sudo nano /etc/hosts.
  2. Append the contents of the downloaded hosts file to the system’s existing hosts file.

  3. Save the changes.

4. Flush DNS Cache

After editing the hosts file, it might be required to flush your system’s DNS cache to apply the changes:

  • Windows: Run ipconfig /flushdns in Command Prompt.
  • macOS: Run sudo killall -HUP mDNSResponder in Terminal.
  • Linux: Run sudo systemd-resolve --flush-caches or restart the network service with sudo service network-manager restart.

Frequently Asked Questions

Why not just use antivirus software?

While antivirus software is an essential part of security, it may not always prevent the installation or usage of remote desktop applications, as these tools are not inherently malicious. Editing the hosts file provides an additional layer of protection by blocking access to the software itself.

Can this hosts file block new remote desktop software?

The provided hosts file blocks most popular remote desktop software commonly used by scammers. However, new remote desktop tools are constantly being developed. We recommend periodically reviewing the hosts file to add new entries or keep it updated by checking for updates in this repository.

Can I still use remote desktop software if I need it for legitimate purposes?

Yes, you can. If you need to use specific remote desktop software for legitimate reasons, you can easily edit the hosts file to remove the block on that particular software’s domains.

Contributing

If you know of additional domains used by remote desktop applications or other software that should be blocked, feel free to submit a pull request or open an issue. Contributions are welcome to help improve the effectiveness of this protection.

Disclaimer

Blocking these domains only prevents access to remote desktop applications based on the domains listed. It does not provide foolproof security against all forms of attacks. Ensure you maintain other layers of protection such as antivirus software, firewalls, and safe browsing habits.


By following this guide and utilizing the provided hosts file, you can help protect yourself, friends, family, or clients from falling victim to increasingly prevalent remote access scams.

Stay safe!

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published