This is some information on the localhost .
It is why I think the # ,Hash tag or pound sign whichever is your preference to call it should not be in front of the localhost in the hosts file . Specifically the text in bold.
The information I read was from a article at this site :
This is part of it :
127.0.0.1 â€“ What Are its Uses and Why is it Important?
127.0.0.1 is the loopback Internet protocol (IP) address also referred to as the â€œlocalhost.â€ The address is used to establish an IP connection to the same machine or computer being used by the end-user. The same convention is defined for computerâ€™s that support IPv6 addressing using the connotation of ::1. Establishing a connection using the address 127.0.0.1 is the most common practice; however, using any IP address in the range of 127...* will function in the same or similar manner. The loopback construct gives a computer or device capable of networking the capability to validate or establish the IP stack on the machine.
How Does the Internet Protocol Work?
The Internet Protocol (IP) is a set of rules that ensure there is a standardized method to address and communicate between computers and other network devices. Besides governing the method of addressing, the IP protocol also standardizes the manner or method that data packets are sent to, delivered, and where applicable acknowledged across the Internet and local networks. Internet Protocol version 4 (or IPv4) is the fourth revision of the protocol and is There’s no place like 127.0.0.1the most widely deployed throughout the world. IETF RFC 791, which was finalized in September of 1981, is the current definition of the protocol. IPv4 is slowly being replaced by IPv6, but itâ€™s adoption is still in infancy. IPv4 is considered to be a connectionless protocol designed to be used on Ethernet-based networks. The protocol does not guarantee delivery, data integrity, or proper data sequencing; instead, relying on the Transmission Control Protocol (TCP) to handle these concerns.
How Does 127.0.0.1 Work?
Establishing a network connection to the 127.0.0.1 loopback address is accomplished in the same manner as establishing one with any remote computer or device on the network. The primary difference is that the connection avoids using the local network interface hardware. System administrators and application developers commonly use 127.0.0.1 to test applications. When establishing an IPv4 connection with 127.0.0.1 will normally be assigned subnet mask 255.0.0.1. [B]If any public switch, router, or gateway receives a packet addressed to the loopback IP address, it is required to drop the packet without logging the information. As a result, if a data packet is delivered outside of the localhost, by design it will not accidently arrive at a computer which will try to answer it. This aspect of the loopback helps ensure network security is maintained, since most computers will answer packets addressed to their respective loopback address which may also unexpectedly activate other services on a machine by responding to a stray data packet.[/B]
What is the Domain Name System?
Human beings are not able to easily remember IP addresses or number well. Plain language web addresses; however, are much easier to use, but require a method to resolve to the actual address of the remote computer or server. As a result, the Domain Name System (DNS), was developed to help direct local and Internet traffic to the appropriate destination by performing real-time look-ups of Internet address with other DNS servers located on the Internet. Before a local computer will send a DNS request to the DNS server for the local network; however, it will perform a check of the locally stored Hosts file first to save time and network resources. The hosts file contains pairings of IP addresses along with one or more host names and is updated frequently based on predefined conditions on the local computer. Before the invention of DNS, there was a single Hosts file that was shared across the network. This was found to not pass the test of scalability; however, when multiple networks started to get connected together which resulted in the development of the DNS system in use today.
How is 127.0.0.1 Used in the Hosts File?
Whenever a computer user tries to access a website or remote computer by name, the computer checks the locally stored Hosts file for domain name resolution before sending a request to the Domain Name Server (DNS). The 127.0.0.1 IP address is commonly found in the Hosts file on computers assigned to the plain English address, â€œlocalhost.â€ It is also used by computer malware to assign legitimate websites to the localhost to prevent the end-user from seeking legitimate computer security assistance with malware infection. This type of change has most commonly been associated with many of the computer scareware packages that have been deployed across the Internet through maliciously infected websites, Trojan horse viruses, and infected email attachments. Some computer administrators, and interested students, can modify the hosts file to prevent access to undesirable websites; however, is not the preferred method as the end-user (or administrator) now becomes responsible for removing the entry when required. Examples of host file entries:
What is a Special Use IP Address?
A special use IP address is one that has been assigned by the Internet Assigned Numbers Authority (IANA) and is reserved for a specific reason or purpose. The IANAâ€™s authority to delineate these addresses comes from the IETF to make assignments in support of the Internet Standards Process. The IANA defines special use IP addresses for IPv4 in RFC 3330: Special-Use IPv4 Addresses and for IPV6 in RFC 3513: Internet Protocol Version 6 (IPv6) . RFC 3330 was the first specification to collect the various one-off definitions for special use IP addresses such as 127.0.0.1 that had been defined over the years in a central location. Based on these lessons learned, all of the special user IPv6 addresses were included in RFC 3513 from the beginning. The IANA does state in RFC 3330 that the Internet does not protect against the abuse of special IP addresses such as 127.0.0.1. The organization also goes on to recommend that if all data packets from a reserved address are assumed to have originated from the same computerâ€™s subnet that all border routers should filter reserved packets that do not originate from the same device since there have been instances of attacks mounted based on the use of one or more of these special addresses.
Special IP Address Summary Table
Address Block Present Use
0.0.0.0/8 â€œThisâ€ Network
10.0.0.0/8 Private-Use Networks
184.108.40.206/8 Public-Data Networks
220.127.116.11/8 Cable Television Networks
18.104.22.168/8 Reserved, subject to allocation
22.214.171.124/16 Reserved, subject to allocation
169.254.0.0/16 Link Local
172.16.0.0/12 Private-Use Networks
126.96.36.199/16 Reserved, subject to allocation
192.0.0.0/24 Reserved but subject to allocation
188.8.131.52/24 6to4 Relay Anycast
192.168.0.0/16 Private-Use Networks
198.18.0.0/15 Network Interconnect Device Benchmark Testing
184.108.40.206/24 Reserved, subject to allocation
220.127.116.11/4 Multicast, commonly used in multiplayer simulations and gaming and for video distribution.
240.0.0.0/4 Reserved for Future Use
What Are the Common Uses for 127.0.0.1?
A common technique to verify that a computerâ€™s networking equipment, operating system, and TCP/IP implementation are working correctly is to send a ping request to 127.0.0.1. Based on the results of the test, administrators or computer users can troubleshoot network connectivity issues. Application developers also make use of the loopback address to test basic network functionality when developing a program or application component prior to going â€œliveâ€ on a network or the Internet with testing or deployment.
Some of the â€œlighterâ€ uses of the loopback address are to trick computer security or computer science students into attempting to crack, probe, or test network speed by using the 127.0.0.1 address. There are also a number of variations on the â€œWorldâ€™s Worst Hackerâ€ found across the Internet. In these stories (which at least a few are likely based on true stories), fellow hackers urge â€œnewbiesâ€ or a â€œless-than-knowledgeableâ€ hacker to infect, hack, or conduct a DOS or DDOS attack against the 127.0.0.1 address. In the more humorous stories, the hacker succeeds in infecting or deleting information from his or her own computer to the amusement of those watching.
Where is 127.0.0.1 Defined?
RFC 1700, published by the Internet Engineering Task Force (IETF) was the first document to reserve the 127.0.0.0/8 address block for loopback purposes. IETF document, RFC 3330, then further described the usage of the IPv4 address block 127.0.0.0/8 for loopback purposes. These definitions were later updated exclusively through the IANA and continue to be excluded for assignment by Regional Internet Registries or the IANA.
What is IPv6?
As the number of people and devices that use the Internet has grown, the demand for addresses has continued to grow exponentially. Internet Protocol Version 6, IPv6, is the next generation protocol that is designed to ultimately replace IPv4 and is slowly being adopted in education and research circles. The Internet Engineering Task Force (IETF) developed IPv6 to accommodate the increasing number of devices and users accessing the Internet and to help address some of the fundamental security shortcomings in the IPv4 implementation. IPv6 accommodates a greater number of addresses by using bigger numbers to create IP addresses. Under the IPv4 addressing convention, an address is 32 bits in length that allows for approximately 4.3 billion unique addresses. IPv6; however, uses a 128 bit address that permits up to 340 trillion, trillion IP addresses.
What Are the Advantages of IPv6?
Besides the significant increase in total numbers of IP addresses, IPv6 also offers networking advantages over IPv4. The new protocol allows devices to detect and use services of IPv6 enabled networks without requiring action by the end-user. It also significantly reduces the need for Network Address Translation (NAT) which is used on IPv4 to allow a number of clients to share a single IP address. A number of research projects based on the underlying IPv6 technology are underway as part of the Internet 2 project led by a non-profit U.S. networking consortium comprised of education communities, industry, and government. With more than 280 members, the Internet 2 Network currently connects more than 60,000 institutions and provides a next-generation optical network that can meet high-performance demand requirements for research and education.
What is the Equivalent of 127.0.0.1 in IPv6?
::1 or in longhand, 0:0:0:0:0:0:0:1 is the loopback address in the IPv6 protocol. The loopback address in IPv6 performs a similar function as in IPv4 by allowing a node to send a data packet to itself. It cannot be assigned to any physical interface on the computer and is considered to have a â€œlink-localâ€ scope. The ::1 address is not allowed to be used as a source address in IPv6 packets that are sent outside of a single node. If they are, an IPv6 router is not allowed to forward the data packet. If a packet with this address is received on an interface, it must also be dropped. The loopback, â€œunspecified addresses,â€ and the IPv6 addresses that have embedded IPv4 addresses are assigned out of the 0000 0000 binary prefix space.