How to identify and prevent programs from phoning home

Networking monitoring can be an eye opener in regards to network connections of programs that run on a computer system.

I started to monitor network connections closely recently and decided to take a closer look at some popular programs installed on a Windows test machine to check if they’d phone home automatically.

The program I’m using for the monitoring is Fiddler, but programs like Wireshark should work as well.

I set up Fiddler and started to monitor the program’s output while launching and using programs such as Bandizip, Steam or Firefox.

mod apk

Some network connections are required obviously. When I enter an address in the Firefox address bar for instance, I want that connection to be made.

But there are connections that are not initiated by the user. Some may still be necessary or wanted by the user, a check for updates for instance. If you monitor the connections closely however, you may notice some that you don’t consider essential or required at all.

bandizip connection

If you take the popular archive program Bandizip for instance. It checks for updates by default but also connects to on first start as well.

While you can disable the update check in the program options, you cannot disable the ping to Analytics and the setting of a cookie on the system.

Dealing with unwanted connections

Once you have identified an unwanted connection on your system, you need to find a way to deal with it. You may have several options at your disposal, for instance by creating a new rule in a software or hardware firewall to block the domain.

One of the easier options is to use the Hosts file that every version of Windows ships with. Let me walk you through the steps of blocking the Bandizip Analytics domain from connecting to your system.

  1. Open File Explorer on your system. You may do so with the shortcut Windows-E, or by clicking on its icon in the taskbar.
  2. Navigate to c:windowssystem32driversetc.
  3. Copy the hosts file to your desktop. This needs to be done as you cannot edit it directly in the directory.
  4. Right-click on the hosts file on the desktop and select edit. Use Notepad or another plain text editor to do so.
  5. Add the line at the top.
  6. Add the link
  7. Save the document afterwards.
  8. Copy it back to the c:windowssystem32driversetc and confirm the replacing of it.

This blocks connections to by mapping it to the address instead of its original IP address.

Why and not Because it is faster.

Closing Words

It takes time to monitor and identify unwanted connections on a system. A firewall may help with that if it is configured to prompt whenever a new connection is established for the first time.


Article Name

How to identify and prevent programs from phoning home


Martin Brinkmann


Find out how to identify programs that establish background Internet connections on Windows, and how to prevent them from doing so.

About Martin Brinkmann

Martin Brinkmann is a journalist from Germany who founded Ghacks Technology News Back in 2005. He is passionate about all things tech and knows the Internet and computers like the back of his hand. You can follow Martin on Facebook, Twitter or Google+

You are here: Home > Windows > How to identify and prevent programs from phoning home

This entry passed through the Full-Text RSS service – if this is your content and you’re reading it on someone else’s site, please read the FAQ at