Adobe’s latest Creative Cloud update is editing system hosts files behind the scenes. It’s not stealing data, but it needs admin rights and has corporate security tools lighting up. Full details here.
Probably making sure that the sweet telemetry reaches their server after the URL got included in some blocklist. Solves nothing as who included the URL, now will include the IP address.
If you’re using any DNS based blockers and the IP is in the hosts file it will still resolve, right? To block IP you would have to setup some completely different solution like a firewall.
No, a machine won’t even contact the pihole if it finds the address in its hosts file. Hosts is step 0 for DNS, so if it finds something there it doesn’t even bother with contacting an external server (like a pihole).
Probably making sure that the sweet telemetry reaches their server after the URL got included in some blocklist. Solves nothing as who included the URL, now will include the IP address.
If you’re using any DNS based blockers and the IP is in the hosts file it will still resolve, right? To block IP you would have to setup some completely different solution like a firewall.
Right, it won’t ask the DNS server to resolve it, the solution requires a much more expensive blocking on firewall
Unless you run a pihole server
No, a machine won’t even contact the pihole if it finds the address in its hosts file. Hosts is step 0 for DNS, so if it finds something there it doesn’t even bother with contacting an external server (like a pihole).