Another good resource is to look into the sources used by apps like
PeerBlock.

--
Espi




On Fri, Aug 31, 2012 at 6:12 AM, Rankin, James R <kz2...@googlemail.com>wrote:

> **
> Quite probably. I was on the road so couldn't check myself
> ---Blackberried
> ------------------------------
> *From: * "andylevi...@gmail.com" <andylevi...@gmail.com>
> *Date: *Fri, 31 Aug 2012 21:32:16 +0900
> *To: *NT System Admin Issues<ntsysadmin@lyris.sunbelt-software.com>
> *ReplyTo: * "NT System Admin Issues" <
> ntsysadmin@lyris.sunbelt-software.com>
> *Subject: *Re: malicious sites/URLs
>
> Are you thinking of this, James:
> http://winhelp2002.mvps.org/hosts.htm
>
> Thanks,
> Andy
>
> On 30 August 2012 21:25, Rankin, James R <kz2...@googlemail.com> wrote:
>
>> As I remember someone maintains a hosts file somewhere with a huge list
>> of malicious domains in it that are redirected to 127.0.0.1, that might
>> help you out a bit
>> ---Blackberried
>> ------------------------------
>> *From: * Webster <webs...@carlwebster.com>
>> *Date: *Thu, 30 Aug 2012 12:23:35 +0000
>> *To: *NT System Admin Issues<ntsysadmin@lyris.sunbelt-software.com>
>> *ReplyTo: * "NT System Admin Issues" <
>> ntsysadmin@lyris.sunbelt-software.com>
>> *Subject: *malicious sites/URLs
>>
>> Greetings from New Joisey,
>>
>>  When I get home tomorrow, I will be beta testing a new type of security
>> software.  I have been asked to test physical Win7 x64.  I have been saving
>> spam comments from my website and a few spam emails (I don't get that many
>> from O365).  Is there a website somewhere that has a list of known
>> malicious sites so I can hit them and see what this new security software
>> does?  The vendor wants me to really hammer this software with site
>> drive-bys, spam links, malicious URLs, etc.
>>
>>  My test PC will be isolated and every other PC on my network will be
>> powered off and cable removed from switch (just to be super safe).
>>
>>  Thanks
>>
>>
>>   Carl Webster
>>
>> Consultant and Citrix Technology Professional
>>
>> http://www.CarlWebster.com <http://www.carlwebster.com/>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to