Another good resource is to look into the sources used by apps like PeerBlock.
-- Espi On Fri, Aug 31, 2012 at 6:12 AM, Rankin, James R <kz2...@googlemail.com>wrote: > ** > Quite probably. I was on the road so couldn't check myself > ---Blackberried > ------------------------------ > *From: * "andylevi...@gmail.com" <andylevi...@gmail.com> > *Date: *Fri, 31 Aug 2012 21:32:16 +0900 > *To: *NT System Admin Issues<ntsysadmin@lyris.sunbelt-software.com> > *ReplyTo: * "NT System Admin Issues" < > ntsysadmin@lyris.sunbelt-software.com> > *Subject: *Re: malicious sites/URLs > > Are you thinking of this, James: > http://winhelp2002.mvps.org/hosts.htm > > Thanks, > Andy > > On 30 August 2012 21:25, Rankin, James R <kz2...@googlemail.com> wrote: > >> As I remember someone maintains a hosts file somewhere with a huge list >> of malicious domains in it that are redirected to 127.0.0.1, that might >> help you out a bit >> ---Blackberried >> ------------------------------ >> *From: * Webster <webs...@carlwebster.com> >> *Date: *Thu, 30 Aug 2012 12:23:35 +0000 >> *To: *NT System Admin Issues<ntsysadmin@lyris.sunbelt-software.com> >> *ReplyTo: * "NT System Admin Issues" < >> ntsysadmin@lyris.sunbelt-software.com> >> *Subject: *malicious sites/URLs >> >> Greetings from New Joisey, >> >> When I get home tomorrow, I will be beta testing a new type of security >> software. I have been asked to test physical Win7 x64. I have been saving >> spam comments from my website and a few spam emails (I don't get that many >> from O365). Is there a website somewhere that has a list of known >> malicious sites so I can hit them and see what this new security software >> does? The vendor wants me to really hammer this software with site >> drive-bys, spam links, malicious URLs, etc. >> >> My test PC will be isolated and every other PC on my network will be >> powered off and cable removed from switch (just to be super safe). >> >> Thanks >> >> >> Carl Webster >> >> Consultant and Citrix Technology Professional >> >> http://www.CarlWebster.com <http://www.carlwebster.com/> >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> >> --- >> To manage subscriptions click here: >> http://lyris.sunbelt-software.com/read/my_forums/ >> or send an email to listmana...@lyris.sunbeltsoftware.com >> with the body: unsubscribe ntsysadmin >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> >> --- >> To manage subscriptions click here: >> http://lyris.sunbelt-software.com/read/my_forums/ >> or send an email to listmana...@lyris.sunbeltsoftware.com >> with the body: unsubscribe ntsysadmin >> > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to listmana...@lyris.sunbeltsoftware.com > with the body: unsubscribe ntsysadmin > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to listmana...@lyris.sunbeltsoftware.com > with the body: unsubscribe ntsysadmin > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin