moretzprogramming wrote:
technoboy10 wrote:
Cool. Is there any way to make a fake domain that redirects to a real one?
Actually, you probably could. Just use some redirect code(there's one somewhere at w3schools.com), and put it at the IP address that you set the fake domain to use. It will redirect you to the real domain.
Okay.
Offline
technoboy10 wrote:
Cool. Is there any way to make a fake domain that redirects to a real one?
Yes.
If you have Windows, open up Command Prompt and type in "ping www.google.co.uk"
It will show up with the IP of www.google.co.uk - What you do is enter "[websiteip] [tab] [customhostname]" in the hosts file.
Or you could download my program and only type [ip] and [customhostname]
Offline
DigiTechs wrote:
technoboy10 wrote:
Cool. Is there any way to make a fake domain that redirects to a real one?
Yes.
If you have Windows, open up Command Prompt and type in "ping www.google.co.uk"
It will show up with the IP of www.google.co.uk - What you do is enter "[websiteip] [tab] [customhostname]" in the hosts file.
Or you could download my program and only type [ip] and [customhostname]
The ping command also works on Unix systems. Okay, that makes sense.
Offline
laser314 wrote:
My hosts file in windows only has comments in it.
That's because nothing has added anything to it.
Mine, on the other hand, looks somthing like this:
# Copyright (c) 1993-2009 Microsoft Corp. # # This is a sample HOSTS file used by Microsoft TCP/IP for Windows. # # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. # The IP address and the host name should be separated by at least one # space. # # Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a '#' symbol. # # For example: # # 102.54.94.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host # localhost name resolution is handled within DNS itself. # 127.0.0.1 localhost # ::1 localhost # Start of entries inserted by Spybot - Search & Destroy [VERY LONG LIST OF 127.0.0.1 [site] CUT OUT!] # This list is Copyright 2000-2008 Safer Networking Limited # End of entries inserted by Spybot - Search & Destroy 69.164.193.192 lstc.com 96.127.188.39 dragonthunder.com 192.168.0.1 router.int 18.85.28.105 scratch.com
It's pretty long in reality, as I have an anti-spyware program called "Spybot Search & Destroy"
Offline