Check the hosts file windows 7. Hosts file. How to edit the hosts file
Good afternoon. Once upon a time I wrote an article about how, in new operating systems. At that moment, I somehow didn’t think that it would be necessary to write an article about the opposite - how to restore it to “factory condition”. The thing is that some “friendly programs” (of course, these are viruses) can change it themselves and add some site useful to us, say VKontakte, Yandex, Google or something else... And after that we receive a message that this site is not available in at the moment. Of course, this is the most basic thing, checking the hosts file for extra entries, but not every beginner will guess this. It is for such people that this small instruction will be written.
Instructions
- A. Edit the current file by removing the content and filling it with the following:
# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
#space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a ‘#’ symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host# localhost name resolution is handled within DNS itself.
# 127.0.0.1 localhost
# ::1 localhost
Some terminology
DNS(English abbreviation for Domain Name System) – Domain Name Service. Establishes correspondence between numeric IP-addresses and text names.
DNS(English abbreviation for Domain Name Server) – domain name server; office computer local or Global Network, which translates computer names in domain records to .
DNS cache(resolver cache DNS) – temporary storage of previous DNS-requests on local . Reduces request execution time, reduces network and Internet traffic.
host(English) – main computer; host, any device connected to a network and using protocols TCP/IP.
IP(English) Internet Protocol) – Internet protocol; a network layer protocol from the Internet protocol suite.
IP address(English) IP address) – used to identify a node on a network and to determine routing information. Consists of the network identifier ( network ID) and host ID ( host ID).
Name Resolution(English) – domain name resolution; the process of converting a computer name to the appropriate one.
Name Resolution Service– name resolution service; in networks TCP/IP converts computer names to and vice versa.
TCP/IP(English abbreviation for Transmission Control Protocol/Internet Protocol) – information transfer control protocol, the main protocol of transport and session levels, providing reliable full-duplex streams. Designed for use in the Global Network and for combining heterogeneous networks.
URL(English abbreviation for Uniform Resource Locator) – unified index of information resource; a standardized string of characters indicating the location of a resource on the Internet.
What's happened hosts-file
hosts-file in Windows and other operating systems is used to associate (map) host names (nodes, servers, domains) with their (name resolution).
IN hosts-by default there is only one registered in the file(127.0.0.1), reserved for localhost, that is, for local.
File hosts is a common text file(without extension).
Disk address of the file hosts:
Windows 95\98\M.E. – \WINDOWS\;
Windows NT\2000\ \ \ – \Windows\System32\drivers\etc\.
When an Internet user types the address ( URL) of any site (web page) and clicks Enter:
– the user’s browser checks hosts-file, whether the entered name is the proper name of the computer ( localhost);
– if not, then the browser looks for the requested address (hostname) in the file hosts;
– if a hostname is found, the browser accesses the corresponding host, specified in hosts-file;
– if the hostname is not found in the file hosts , then the browser accesses ( DNS-cache);
– if a hostname is found in the cache, the browser accesses the corresponding host, saved in cache DNS;
– if the hostname is not found in the resolver cache DNS, the browser accesses DNS-server;
– if the requested web page (site) exists, DNS-server translates user-specified URL-address in ;
– The web browser loads the requested resource.
History of origin hosts-file
# Copyright (c) 1993-1999 Microsoft Corp.
#
#
#space.
#
#
# For example:
#
127.0.0.1 localhost
# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
#space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a "#" symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
::1 localhost
# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
#space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a "#" symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
# localhost name resolution is handled within DNS itself.
# 127.0.0.1 localhost
# ::1 localhost
Usage hosts-file
hosts-file can be used to speed up work on the Global Network and reduce traffic - due to reduced requests to DNS-server for frequently visited resources.
For example, you often download resources google.ru And google.com. Open the file hosts and after the line127.0.0.1 localhost enter lines
209.85.229.104 google.ru
74.125.232.20 google.com
This will prevent the web browser from having to contact the server DNS, and immediately establish a connection to sites google.ru And google.com.
Sometimes hosts-file is used to block unwanted resources (for example, spam and malicious software). To do this you need after the line 127.0.0.1 localhost enter string
127.0.0.1 URL_of_resource_blocked
The essence of this manipulation is that the blocked resource is mapped to127.0.0.1 which is the address local computer, – so the unwanted resource will not be loaded.
Editing rules hosts-file
1. Each element must be on a separate line.
2. must begin at the first position of the line and must be followed (on the same line) by its corresponding hostname.
3. and hostname must be separated by at least one space.
4. Comments must be preceded by the symbol # .
5. If comments are used in domain name matching strings, they must follow the host name and be separated by # .
Usage hosts-file by virus writers
Attackers have long chosen hosts-file, – with its help the real addresses of web resources are replaced on the infected one. After this, the web browser redirects the user to sites with malicious software, or, for example, blocks access to the sites of antivirus manufacturers.
Malicious disguises modification hosts-file as follows:
– to make it difficult to detect lines added by a virus, they are written to the end of the file - after a large empty area formed as a result of repeated line translations;
– after that to the original hosts-the file is assigned an attribute Hidden(default hidden files and the folders are not visible);
– a false one is created hosts- a file that, unlike a real file hosts(without extension) has extension .txt(by default, extensions are not displayed for registered file types):
hosts-file: how to eliminate the consequences of a virus attack
Open hosts-file (if the virus installed the fileattribute Hidden, will be required in Folder properties enable option Show hidden files and folders) ;
– a window will appear Windows with a message "The following file could not be opened...";
– set the switch Selecting a program from the list manually –> OK;
- in the window Program selection in scrollable list Programs highlight Notepad –> OK;
– file hosts will open in Notepad;
– delete all lines except 127.0.0.1 localhost;
– save hosts-file.
Valery Sidorov
Host is a system text file designed to translate domain names into specified network addresses, or IPs. It is a kind of special network add-on, but can be used for both good and malicious purposes. There is a certain category of viruses that modify the hosts file in order to block access to certain web resources (for example, to off-site antivirus companies) or redirect the user to malicious or advertising pages.
Behavior and symptoms of “hosts” viruses
Viruses, like their other “relatives,” penetrate through infected program installers, special loading scripts on web pages, and other hacker tricks. Quite often, the installation of an “infection” is disguised as system errors. A window appears on the screen with a message that an error allegedly occurred when executing a script or command. The puzzled user, confused, presses “OK” (there are no other buttons!) and personally opens the “doors” to the malware into the operating system. The file called hosts is instantly modified, and a series of troubles begin for the user...
In appearance, the system works stably - it does not slow down, does not freeze. But as soon as the user opens a web browser, all the “illnesses” creep out. And they manifest themselves as follows:
- when you try to access a social network or some other popular Internet resource, the error “Page is unavailable” appears;
- the domain (name) of the site does not correspond to reality: for example, when typing vk.com in the address bar, a page opens with many advertising banners or another site that has nothing to do with the social network.
Many users, seeing one of these pictures on the screen, do not attach any importance to it. They calm themselves down with thoughts like “something happened on their server”, “the Internet is bad today” and stuff like that...
Well, if so. What if the file is infected? Then the problem will not disappear by itself in an hour or ten. You need to act: remove viral modifications from the hosts, in other words, give it its previous appearance.
Treating the hosts file
How to find it and what program to open it with?
Before you remove the hosts virus, you must first get to it. Open the directories sequentially in the specified order (for Windows 7 and XP):
Drive C (or other drive on which the OS is located) → Windows → System32 → drivers → etc
It is in the “etc” directory that host is located. But don’t rush to remove it from your computer! It is not removed, but treated, and easily. And then, perhaps, it will serve you well more than once or twice (see the last chapter of this article).
Host has no extension, but contains text information. Therefore, it can be easily opened with the Notepad system application and, accordingly, restored in the appropriate way.
Let's do this.
1. While in the “etc” folder, click on the hosts file right click.
2. Select “Open” or “Open with” from the context menu.
3. In the list of programs that can open the file, click “Notepad” and click “OK”.
Notepad will display contents of hosts. It must be viewed, analyzed and all virus add-ons removed.
How to check?
In a clean, that is, in a “healthy” hosts, there is nothing else except the lines starting with the “#” symbol. With only rare exceptions, when some trusted programs leave their settings in it.
But when it happened virus attack, you need to be especially vigilant.
- The line with the IP address and domain name of the site (VK.com, ok.ru, etc.) redirects to another site.
- The line starting with 127.0.0.1 blocks access to the site.
If any are found, they definitely need to be removed.
How to clean?
1. While holding left button mouse, select with the cursor all entries made by the virus.
2. Right-click on the entries. Click "Delete" in the menu.
3. Save the file for the changed settings to take effect. At the top of the Notepad window, click: File → Save.
4. Close Notepad. Reboot your OS. Open your browser and check access to sites.
Additional measures and prevention
Unfortunately, it may also happen that the virus can nullify all your efforts to clean the hosts (the sites will still not open). But, nevertheless, you should not give up.
Additionally, perform the following procedure:
1. Check the disk partitions (the system partition is required!) using the healing utility Dr.Web CureIt!, Free Anti-Malware or Virus Removal Tool (Kaspersky).
Preset in Scan Settings antivirus program check boot sectors (MBR), memory, identify rootkits and enable high level detection (detection) of viruses.
2. Update the signature database of the main antivirus that constantly protects your PC from malware intrusions. Also check its basic settings.
For example, Avira antivirus pays special attention to hosts protection. In its settings panel there is a special setting “protect host file”.
How is hosts useful?
Hosts is included in the group of user settings and is indispensable when solving the following tasks:
Blocking network connection - software application - server/site
Many programs periodically access their “native” resources to update and send data. This mode of operation is not always convenient for the user: traffic is wasted, page loading is slow, and there is no control over data loading.
Bypassing everything software settings and firewall rules, you can restrict access to them directly in hosts by adding the following line:
Controlling visits to web resources
Similarly, access to certain sites is blocked: pornographic, dubious, social networks, etc. It all depends on the purpose of the restriction - parental controls, office or educational PCs.
The host has priority over DNS servers (services that assign IP addresses to domain names), so the PC will initially follow its instructions when creating network connection.
Keep an eye on the host file, configure it correctly, and everything will be “OK” with your PC. Have fun using the Internet!
Few users working with the "seven" and surfing the Internet are aware of true meaning HOSTS file (Windows 7). Its content will be shown a little later, but for now let’s dwell a little on the theory.
why is it needed?
In general, if anyone paid attention, the file itself is located in the etc directory, if you sequentially move along the tree from Windows folders, via System32 to the drivers directory on system disk. Not everyone, however, goes into such a thicket of the system; by and large, this is not necessary. On the other hand, if you pay attention, the object itself does not have an extension, although, in fact, it is an ordinary text document.
But let's take a closer look at Windows 7. Its content is that it is this object that is responsible in the system for the relationship between host names (sites, nodes, etc.) and determining their IP addresses to provide the end user with access to the resource. Roughly speaking, we do not need to enter combinations consisting of numbers in the browser, but we can only specify the names of resources.
And one more small clarification about the HOSTS file (Windows 7). Its content may change. Depending on what changes have been made, this can help block certain sites, speed up access to certain resources, or, on the contrary, can play a cruel joke by redirecting the user to dubious sites. However, first let's look at original file.
(Windows 7): Contents
So, first, let's try to open. It must be said that if you use the standard double-click method, nothing will work, because, as mentioned above, this object does not have an extension. In addition, the file may be hidden, so you should first select show hidden objects in the view menu. But the system will offer several applications to open. We choose the simplest thing - standard Notepad and look at the contents of the HOSTS file (Windows 7). Before us is something incomprehensible: descriptive text, some examples and a line indicating the local IP (# 127.0.0.1 localhost). That's how it should be.
Attention! Below is a line indicating reserved local address there should be nothing at all, unless, of course, the user wants some resource to be blocked!
In general, everything above localhost is allowed resources. Everything below is blocked. It is not difficult to guess that many viruses, in particular programs that distribute spam or advertising (Malware, Adware, etc.) independently edit the contents of this file. So it turns out that when requesting one resource, the user receives a redirect (redirection) to a completely different one.
Default HOSTS in Windows 7
We reviewed the original file. Now let's look at the changed content. To correct it, you can take the contents of a “clean” file for the “seven” from another computer or from the Internet, copy it, then paste it into the original and save it.
But there is one problem. The fact is that sometimes, after removing everything unnecessary, it is not possible to save the file as the original (the system simply does not allow this to be done).
What to do in this case? First, delete the original completely (Shift + Del), bypassing the Trash. Then we right-click on the empty space inside the etc directory and create a new file with the same name, but do not specify the extension. Now we insert the necessary content into it and save the object. After this, you need to find the lmhosts.sam file there and delete it, as indicated earlier.
That's it, it's done. In both the first and second cases, a system reboot is required. Only then will everything work as expected. And, of course, editing should be done exclusively with administrator rights.
Bottom line
In general, there have been very brief information about the HOST file. If you look at the issues of blocking some unwanted resources or, on the contrary, allowing access to them with faster access, editing must be done exclusively manually and according to certain rules. Here you need to remember that the key role of the separator is played by the line indicating the reserved local IP. Well, then, as they say, it’s a matter of technique. By the way, the above technique will also help if the contents of the object have been changed due to the influence of virus programs.
Hello, dear readers of the blog site. Today I want to talk about something quite simple in its design, like Hosts file.
What is noteworthy is that it lives on almost all operating systems (and therefore all computers of Internet users), from Linux to Windows 7. Another distinctive property of it is that it does not have an extension, but this is due precisely to the fact that it works it should be in any OS, which means it must be universal.
But this is not the main thing. Although he is a relic of the past, there are still a lot of ways to use Hosts both for good purposes and not so good. For example, viruses and virus writers love it very much and often use it either to replace official sites with their phishing duplicates, or to block the ability to update your antivirus program.
However network equipment IP specialists are needed and nothing else. Therefore, a list of correspondence between the host name and its IP address () was manually generated. This list was called named Hosts and sent to all nodes local network. Everything was great until the moment when it was no longer possible to use this method due to the huge number of records contained in this file. Sending it out has become problematic.
In this regard, we decided to approach this issue differently, namely, to place on the Internet an entire (domain name system) that would store all these correspondence tables and user computers would contact the nearest one with the question of what kind of IP-ish corresponds to the Vasya.ru domain.
At the same time, everyone happily forgot about the Hosts file, but it still existed in all operating systems, except that its content was extremely meager. Usually there was and is still present only one entry:
127.0.0.1 localhost
For some reason, this IP address (more precisely the range 127.0.0.1 - 127.255.255.255) was chosen to designate the local host (private IP), i.e. the very computer you are sitting at (literally localhost - “this computer”). But, really, this is all for the old IPv4 (fourth version).
And in IPv6, which is now coming into use (due to the fact that it is embedded in previous version the number of addresses is no longer enough for everyone) such an entry will look a little different:
::1 localhost
But the essence is the same. Because Now both standards for specifying an IP address are still used or can be used, then in the Hosts file Usually both of these lines are present. True, there can be any kind of billboard written above them (depending on the OS used), but all those lines contain at the beginning the hash symbol # (hash), which means that these lines are comments and should not be taken into account.
On my old lady Windows Vista The Hosts file now looks like this:
# Copyright (c) 1993-1999 Microsoft Corp. # # This is a sample HOSTS file used by Microsoft TCP/IP for Windows. # # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. # The IP address and the host name should be separated by at least one # space. # # Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a "#" symbol. # # For example: # # 102.54.94.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host # This HOSTS file created by Dr.Web Anti-rootkit API 127.0.0.1 localhost:: 1 localhost
Recording syntax very simple - first indicate the IP address, and then, through any number of spaces (tab characters), enter the name of the host (computer, node or domain). A separate line is used for each entry of this kind.
Here the main question arises: what place does Hosts currently take in the process of establishing a correspondence between the domain names entered in the browser and the IP addresses that are hidden behind these domains? Well, as it turned out, it occupies a very important place, namely the first one. But first things first.
So, you enter Url address () into the address bar of your browser, or follow a link from your browser bookmarks, or from any web page open in it. In any case, the browser receives from you the path to the document you want to see.
In any case, there will be a presence in Urla domain name the site on which the document you are interested in is located (the site in our example). However, this domain corresponds to a very specific server (maybe virtual) where this very site is hosted. And this server must have must be an IP address, so that it is visible on the network and can be accessed.
Your browser cannot know which IP corresponds to the domain name contained in the Url (well, unless you have enabled caching of DNS records in this very browser and you have previously visited this node). Therefore he addresses first For clarification, refer specifically to the Hosts file on your computer.
If this domain is not found there (and the corresponding IP), then the browser will begin to torture DNS record caching service from Windows. If you previously accessed this domain and not much time has passed since then, then the DNS cache will give the browser this same IP address. The browser will receive it and open the document you requested.
If there are no records for this domain in the cache, then the browser will send a request to the nearest DNS server (most likely it will be your server) and receive the required information from it. True, in this case there may be a slight delay in opening the web page you requested, but with modern Internet speeds this will be practically unnoticeable.
And this happens with absolutely any request to open a document from the Internet from your computer. Do you get it? Empty Hosts does not create any problems, but if you fill it out, and even with malicious intent, it may turn out that you enter the password for your Yandex wallet not on the official website of this payment system, and on a phishing resource with a similar design (see).
How can this be? Well, no one is safe from virus infection (), and a virus can easily add the IP address of a phishing resource to Hosts and assign it the domain name money.yandex.ru, for example. This is where the danger lies.
On a fake site social network they may intercept the passwords you enter, they may demand an entrance fee, or something else more creative. The saddest thing is that it is impossible to notice the substitution, because the correct domain name will appear in the address bar of the browser.
Where is the Hosts file located and how can I remove virus entries from it?
On the other side remove changes made by the virus even an absolute noob in computers can use the Host file. Usually the problem is to find where this file is located.
In old Windows versions, like XP or 2000, it was open to everyone and lived in system folders at the following address:
Windows\System32\drivers\etc\
You won’t believe it, but he lives at the same address in both Windows 7 and Vista, but everything is somewhat more complicated there, because following the path:
C:\Windows\System32\drivers\
You won't find any etc folders there. The developers decided that ordinary mortals should not touch this file to avoid problems.
However, the hosts file in windows 7 and vista still exists, you just need to look for it, having received Administrator rights. Personally, I never even tried to figure out all this nonsense with rights, but I found a very simple way for myself to get around this limitation.
So, go to the “Start” button menu - “All Programs” and find the “Accessories” folder there. There are shortcuts inside it, among which it’s easy to see “Notepad”. Right-click on it and from the appeared context menu choose "Run as Administrator":
Well, actually, half the battle is done. Now in notepad, select “File” - “Open” from the top menu. In a standard Windows Explorer window, find the desired folder etc (inside the Windows\System32\drivers\ directory), select “All files” from the drop-down list in the lower right corner and watch with happy eyes the appearance of this top-secret file:
It will be exactly without expansion, and the rest will be rubbish, it seems hosts.txt, viruses are very often created to distract your attention and ultimately confuse you. For a real file, they set the “Hidden” attribute, which can be checked or unchecked by simply right-clicking on the file and selecting the very bottom “Properties” item:
And because in Windows, by default, extensions are not displayed for registered file types (that’s why they did this - I don’t understand), then the user finds hosts.txt without seeing either its extension, or the fact that there is another hosts in the same folder, but it is hidden from his eyes.
Making changes to the fake, he still achieves nothing, begins to tear out his hair, wring his hands and goes to the store to buy a new laptop in order to finally get into his favorite Contact, which the virus blocked on the old computer. Ahhh, horror.
Although, of course, the user may be advanced and enable the display of hidden and system files. In Windows Vista, to do this, go to “Control Panel” - “Folder Options” - “View” tab and move the checkbox to the line “Show hidden folders and files." By the way, it would be better to uncheck the “Hide extensions...” line above:
Eat a very simple way to open this file. It will be enough to press the Win + R key combination on your keyboard (or select “Run” from the “Start” button menu), then enter the following line in the window that opens and press Enter:
Notepad %windir%\system32\drivers\etc\hosts
But that's not the point. We still found where this secret (for Windows 7 and vista) file is located, and we must carefully examine it for possible abuse. If the initial examination of the patient does not reveal any pathologies, then look to the page scroll area in Notepad.
Sometimes the virus makes its entries after several hundred empty lines, thereby reducing the risk of your detection. If there is no scroll bar, then everything is great, but if there is, then use it and bring your Hosts to the form it should have from birth, i.e. It will be enough to have just two lines in it (no one needs comments):
127.0.0.1 localhost::1 localhost
Well, if spoofing addresses in this file it is quite simple to represent, for example it might look like this:
127.0.0.1 localhost::1 localhost 77.88.21.3 site
How, in this case, is it carried out? blocking certain sites through Hosts? Well, just assign the private IP address 127.0.0.1 to the domain that needs to be blocked, for example, like this:
127.0.0.1 localhost::1 localhost 127.0.0.1 vk.com 127.0.0.1 odnoklassniki.ru
The smart browser finds this match and tries to get the desired document (web page) from your own computer, which, naturally, it fails and about which it will immediately inform you. By the way, this good way block your children’s access to sites that you think they should not visit. Of course, you will still need to create a list of such sites or get them from somewhere, but if you wish, you can try.
As I already mentioned, in ancient times, when the Internet was still slow for most users, to speed up the opening of sites, they registered their IP names in Hosts. Another thing is that these same resources periodically changed their hosting and, along with it, their IP addresses. And the user, having forgotten about what he did six months ago to speed up the Internet, tries in vain to understand why his favorite resources are not available to him.
How to use Hosts when moving a website to a new hosting?
Well, and finally, I would like to talk about how, by making changes to the Hosts file, you can work with a site that has moved to a new hosting even before everyone DNS servers x a new entry will be written (assigning a new IP address to your domain). The method is very simple but effective.
So, you change hoster. Naturally, the IP address of your site also changes. How will people find out about this on the Internet? Everything is correct, using a network of DNS servers. By the way, you will take the first and most important step yourself by going to the control panel of your registrar and registering there the addresses of the NS servers of your new hoster.
It is from them that the new DNS will spread throughout the Internet. But this process is lengthy and in the worst case scenario it can take a couple of days. During this time, the site should be available on both the new and old hosting, so that users from all over the world would not be deprived of the opportunity to view it.
However, you yourself will be interested to know how your resource actually feels with the new hoster? Check the operation of all plugins and other things. Do you really have to wait from several hours to two days? After all, this is unbearable.
Firstly, you can try resetting the DNS cache on your own computer, because it may prevent you from seeing your resource on the new hosting if external DNS servers have already received new entry. How to do this? Again, everything is very simple. Press the Win+R key combination on your keyboard (or select “Run” from the Start button menu), then enter in the window that opens:
A very scary window called Command Prompt will open, where you will need to paste this command:
Ipconfig /flushdns
The regular paste buttons in the Command Prompt window don't work, so just right-click in the Command Prompt window and select Paste.
After that, click on “Enter”, the DNS cache will be cleared on your computer and you can try to open your site again. By the way, there may be a DNS cache in the browser itself, so clear it, or refresh the window while holding down the Shift button on the keyboard.
By the way, if you are interested, you can view the contents of the DNS cache by entering command line the following command:
Ipconfig /displaydns
Does the site still open on the old hosting? No problem. We find the Hosts file using the method described just above and add just one line to it:
109.120.169.66 website
Where 109.120.169.66 - it will be IP address of your new hosting, and then the domain name of your site will follow. All. While the rest of the world is admiring your resource on the old hosting, you have the opportunity to correct possible problems on the engine that has already been transferred to the new hosting. The thing is wonderful and I always use it.
Good luck to you! See you soon on the pages of the blog site
You might be interested
What is DNS and how DNS servers ensure the Internet works VPS from NeoServer - become the owner of your virtual universe
How to make a backup and restore from backup copy, as well as the nuances of transferring a site (Joomla, WordPress) to a new hosting
Buying a domain (domain name) using the example of the Reghouse registrar
Local server Denwer - how to create a website on a computer - installation, configuration and removal of Denver
cPanel - creating and working with databases, adding subdomains and multidomains, as well as their parking
What are domains, hosting, DNS servers and IP addresses
FileZilla - where to download for free and how to learn to use the popular one FTP client Filezilla
Transferring a site to a new Infobox hosting, choosing between regular and VPS, as well as working with the hoster’s control panel