DNS解析时会先查找本地电脑中的HOSTS文件(Hosts文件就在C:\WINDOWS\system32\drivers\etc中),当HOSTS文件中没有时再向公网上的DNS服务器查询,所以,一般的dns劫持都是修改HOSTS文件,把它改回来就行.当然,前提是要先把病毒一类的给清除.
改正方法:先找到HOSTS文件,把他的只读等属性去掉,删除,用记事本重建一个,把附件里的内容复制进去,保存为HOSTS(无扩展名)即可.
还有一种情况,就是电信运营商进行的DNS劫持,在你正常访问DNS服务器的情况下,转到他们自己的服务器上,那种是没办法的
附:HOSTS文件内容
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost