Simple and efficient local ad blocking throughout the network.
- You don't have to install any browser extensions or applications, you just use the tools of your operating system.
- You update the list of DNS to be blocked with a single stroke.
- Opensource.
- Just bash.
maza update
sudo maza start
maza stop
maza status
- bash 4.0 or higher
- curl
Then you do this.
curl -o maza https://raw.githubusercontent.com/tanrax/maza-ad-blocking/master/maza
chmod +x maza
sudo mv maza /usr/local/bin
Unfortunately the hosts file does not support sub-domains (wildcards), which is necessary to correctly filter all DNS. You will need to install locally a server for that purpose, Maza supports the Dnsmasq format. Here's an example for OSX.
brew install dnsmasq
Edit the file.
/usr/local/etc/dnsmasq.conf
Add the following lines.
conf-file=(your user path)/.maza/dnsmasq.conf
Start DNSMASQ.
sudo brew services stop dnsmasq
sudo brew services start dnsmasq
Delete the list of OSX DNS servers and add the 3 addresses. The first one will be your local server, and the other 2 belong to OpenDNS, which you can use any other.
127.0.0.1
208.67.222.222
208.67.220.220
Refresh your DNS cache
sudo dscacheutil -flushcache; sudo killall -HUP mDNSResponder
Add in confiigure file: /usr/local/etc/dnsmasq.conf
no-resolv
server=208.67.222.222
server=208.67.220.220
If you want all your .localhost
domains, for example, point to localhost add in confiigure file: /usr/local/etc/dnsmasq.conf
address=/.localhost/127.0.0.1
- Only compatible with Linux and OSX operating systems.
- Remember to make a backup copy of
/etc/hosts
in case of unforeseen circumstances, neither the project nor its author will be responsible for any possible repercussions derived from not carrying out this action.