Updating etc hosts
Updating etc hosts - whos dating tyler perry
The hosts file is a computer file used by an operating system to map hostnames to IP addresses.
In modern operating systems, the hosts file remains an alternative name resolution mechanism, configurable often as part of facilities such as the Name Service Switch as either the primary method or as a fallback method.The hosts file is one of several system facilities that assists in addressing network nodes in a computer network.It is a common part of an operating system's Internet Protocol (IP) implementation, and serves the function of translating human-friendly hostnames into numeric protocol addresses, called IP addresses, that identify and locate a host in an IP network.In some operating systems, the contents of the hosts file is used preferentially to other name resolution methods, such as the Domain Name System (DNS), but many systems implement name service switches, e.g., for Linux and Unix, to provide customization.Unlike remote DNS resolvers, the hosts file is under the direct control of the local computer's administrator.The hosts file contains lines of text consisting of an IP address in the first text field followed by one or more host names.
Each field is separated by white space – tabs are often preferred for historical reasons, but spaces are also used.Comment lines may be included; they are indicated by a hash character (#) in the first position of such lines. For example, a typical hosts file may contain the following: This example only contains entries for the loopback addresses of the system and their host names, a typical default content of the hosts file.The example illustrates that an IP address may have multiple host names (localhost and loopback), and that a host name may be mapped to both IPv4 and IPv6 IP addresses.The location of the hosts file in the file system hierarchy varies by operating system. The ARPANET, the predecessor of the Internet, had no distributed host name database.Each network node maintained its own map of the network nodes as needed and assigned them names that were memorable to the users of the system.There was no method for ensuring that all references to a given node in a network were using the same name, nor was there a way to read the hosts file of another computer to automatically obtain a copy.