Even though you are doing a good job of putting your hosts file up for others there are some problems.
1. You have an awful lof ot dead hosts in the file. Here is where you can download some of the dead ones for pruning:
http://www.SecureMecca.com/MalwareDomainList/DeadHosts.7zhttp://www.SecureMecca.com/MalwareDomainList/DeadHosts.zipPick your own zip poisoning. Run them through DNS again to be sure they are dead. BTW, I am miffed you didn't include moi and Airelle in your lists of bad hosts. Airelle is much better for the French connection than Camelon.
http://www.SecureMecca.conhttp://www.HostsFile.orghttp://rlwpx.free.fr/WPFF/hosts.htm(translate the last one yourself - he has buttons for Anglais and Deutsch - Je l'ai lu en Français.)
2. In regards to rogue malware sites, I have noticed that now Microsoft has entered the fray that they come and go like clockwork, usually from setup and deployment to when they pull the plug is now less than two months and frequently less than a month. Unless they really are using their DNS servers to put up fake pages for Symantec, et al, there is no percentage in blocking their DNS servers. But you almost never block the downloaders. Why don't you? As an example, errorprotector.com:
Name: errorprotector.com
Address: 127.0.0.1
Name:
www.errorprotector.comAddress: 66.244.254.63
bin.errorprotector.com canonical name = dwnld1.com.
Name: dwnld1.com
Address: 67.228.177.146
Name: dwnld1.com
Address: 67.228.177.143
Name: go.errorprotector.com
Address: 24.244.170.177
Now how a person would get to the downloader host now that the front ends are gone is a bit of a mystery, but that didn't stop me from adding two rules to our PAC filter due to the fact that several of the people have banded together to put their downloads all on this one host (which I can't see anything good coming from):
BadNetworks[i++] = "67.228.177.143, 255.255.255.255"; // dwnld1.com_1 - 2008-11-13
BadNetworks[i++] = "67.228.177.146, 255.255.255.255"; // dwnld1.com_2 - 2008-11-13
But you really do need to block the download hosts themselves. This is just one of many downloaders but it is a biggie:
[hhhobbit@gandalf Hosts]$ grep 067.228.177.143 IP2Host.txt
067.228.177.143 archive.easydownloadsoft.com 2008-08-15
067.228.177.143 bin.errorprotector.com 2008-09-21
067.228.177.143 bsa.safetydownload.com 2008-09-21
067.228.177.143 cdn.bestdownloadsoft.com 2008-10-15
067.228.177.143 cdn.downloadcontrol.com 2008-10-15
067.228.177.143 cdn.drivecleaner.com 2008-09-21
067.228.177.143 download-es.com 2008-08-15
067.228.177.143 download.antimalwareguard.com 2008-08-15
067.228.177.143 download.cdn.errorsafe.com 2008-10-30
067.228.177.143 download.cdn.winsoftware.com 2008-10-15
067.228.177.143 download.errorinspector.com 2008-09-21
067.228.177.143 download.errorsafe.com 2008-09-21
067.228.177.143 download.installprovider.com 2008-09-21
067.228.177.143 download.pcsupercharger.com 2008-08-15
067.228.177.143 download.registrydoctor2008.com 2008-10-15
067.228.177.143 download.sysprotect.com 2008-09-21
067.228.177.143 download.systemdoctor.com 2008-09-21
067.228.177.143 dwnld1.com 2008-10-15
067.228.177.143 files.drivecleaner.com 2008-09-21
067.228.177.143 premium.bestguardownload.com 2008-10-15
067.228.177.143 sec.storageguardsoft.com 2008-09-21
067.228.177.143 setup.cryptdrive.com 2008-09-21
067.228.177.143 software.protectdownloads.com 2008-09-21
[hhhobbit@gandalf Hosts]$ grep 067.228.177.146 IP2Host.txt
067.228.177.146 archive.easydownloadsoft.com 2008-08-15
067.228.177.146 bin.errorprotector.com 2008-09-21
067.228.177.146 bsa.safetydownload.com 2008-09-21
067.228.177.146 cdn.bestdownloadsoft.com 2008-10-15
067.228.177.146 cdn.downloadcontrol.com 2008-10-15
067.228.177.146 cdn.drivecleaner.com 2008-09-21
067.228.177.146 download-es.com 2008-08-15
067.228.177.146 download.antimalwareguard.com 2008-08-15
067.228.177.146 download.cdn.errorsafe.com 2008-10-30
067.228.177.146 download.cdn.winsoftware.com 2008-10-15
067.228.177.146 download.errorinspector.com 2008-09-21
067.228.177.146 download.errorsafe.com 2008-09-21
067.228.177.146 download.installprovider.com 2008-09-21
067.228.177.146 download.pcsupercharger.com 2008-08-15
067.228.177.146 download.registrydoctor2008.com 2008-10-15
067.228.177.146 download.sysprotect.com 2008-09-21
067.228.177.146 download.systemdoctor.com 2008-09-21
067.228.177.146 dwnld1.com 2008-10-15
067.228.177.146 files.drivecleaner.com 2008-09-21
067.228.177.146 premium.bestguardownload.com 2008-10-15
067.228.177.146 sec.storageguardsoft.com 2008-09-21
067.228.177.146 setup.cryptdrive.com 2008-09-21
067.228.177.146 software.protectdownloads.com 2008-09-21
And that is after a substantial amount of pruning of the ones no longer mapped to these IP addresses that used to be at that IP address (almost done - I used to have five times this number of download hosts).
3. There is a better way to block the China and Russia problems (as long as you use a PAC filter):
BadDomains[i++] = ".cn"; // YOUR CHOICE - MalWare
// BadDomains[i++] = ".ru"; // YOUR CHOICE - MalWare
and I am considering Hong Kong after the recent bad reports (not there yet):
// BadDomains[i++] = ".hk"; // YOUR CHOICE - MalWare
Russia is probably going to be activated (but deactivated for me - done with a "// "). If you never go to those countries servers, hey what difference does it make? You have just stopped all the drive-by (okay, browse-by) hijack downloads in these countries unless they go by IP address. I can also stop China by IP address for most of them. OTOH, I should give ".fi", ".se", ".no", and ".dk" a GoodDomains status for being almost as clean as ".gov" and ".edu" sites (they already have that status). Well, maybe Denmark is going too far.
4. Well, I just thought you may want to look into making your host lists a little more complete and up to date. I am selfish in asking you to do this though. I am using frequency counts of patterns in your hosts to block by pattern. So prune away with what I have given you. I imagine I am going to still have a high frequency count with what I have identified so far. Most of them are, drum roll please, pornography terms.
5. Oh yes, I do occasionally post some lists of hosts for MVPHosts and others at my blog:
http://SecureMecca.BlogSpot.comYou may find a little teaser there now and again that is useful. Most of it now concerns trackers and ad pushers now that I have replaced the block of Pornography with a block of Ads (not done yet). But as a Linux user (99.99% of the time), the trackers are a much bigger security problem for me than the malware pushers (so far - crossing fingers).