The HOSTS file is used by Windows to map domain names to IP addresses. When resolving a domain name, the HOSTS file is checked before your service provider’s DNS servers are queried.
A malicious object can surreptitiously write an entry to your HOSTS file to transparently point a trusted domain name (such as www.enigmasoftware.com) to a malicious server that is in no way affiliated with the actual domain name. This opens the door for phishing activities and other confidence scams and seriously compromises the security on your PC. Fortunately, SpyHunter 3.5 and later versions offer a tool to prevent this from occurring.
Within the Network Sentry panel, SpyHunter displays the contents of your Windows HOSTS file.
To turn HOSTS File Protection on, just check the “Activate HOSTS File Monitor” checkbox.
Once HOSTS File Protection is activated, SpyHunter will monitor your HOSTS file at a preset interval for any additions, deletions, or modifications. When SpyHunter discovers a change in the HOSTS file, it will alert you with a dialog window, displayed below.
The “Entries Removed” and “Entries Added” panels will show you anything that has been added to or removed from your HOSTS file.
If unauthorized changes have been made to your HOSTS file, you can cancel the changes by clicking the “Restore” button. If you actually intended to modify your HOSTS file (or gave an application permission to do so), click the “Ignore” button to allow the changes to remain in your HOSTS file.
If you would like to leave the changes in your HOSTS file for the present time, but would like to review them again later, just check the “Remind later” checkbox and then click the “Ignore” button. You will be reminded again in the future to verify the changes to your HOSTS file.