Comments
-
I agree, either a whitelist or a shadow hosts file that replaces the hosts file when it gets changed. In fact, it would be good if you could somehow protect the hosts file from even being edited directly. Scanning once an hour still gives the opportunity for the bad guys to make changes and if they are persistent, they can…