Back to AI Focus Mode & Automated Website Blocker

OS-Level Website Blocking (HOSTS)

Coral AI doesn't rely on easily bypassed browser extensions. It requests elevation and modifies the core Windows `etc/hosts` file.

Core Architecture

How It Works Under The Hood

The OS-Level Website Blocking (HOSTS) module is built on a highly optimized C++ and Python bridge. By bypassing standard Windows UI restrictions, Coral AI directly interfaces with system memory, native Win32 APIs, and DOM structures to achieve near-zero latency execution.

Un-bypassable Block

Routes domains like Instagram or Reddit to `127.0.0.1` at the OS network level.

Cross-Browser Enforcement

Works across Chrome, Edge, Firefox, and even desktop apps simultaneously.

Auto-Restore

Automatically restores the original network settings when the timer finishes.

Custom Blocklists

Instruct it to block specific sites like 'Block YouTube but keep StackOverflow open'.

Diagnostics

Execution Trace

~ > coral execute --module os-level-website-blocking --verbose
0.00ms [INFO] Initializing C++ memory hooks... OK
2.14ms [INFO] Bypassing UI thread restrictions... OK
5.89ms [INFO] Allocating vector buffer for LLM context...
8.22ms [WARN] Elevating privileges to Admin ring...
14.01ms >>> Execution payload delivered successfully.

Technical Specs

  • Latency< 15ms
  • RuntimeC++ / Py 3.11
  • PrivilegeRing 3 / Admin
  • Offline ModeRequires Internet

Agentic Integration

This module does not operate in isolation. It is dynamically invoked by the Coral PlannerAgent via JSON-RPC, allowing it to be chained endlessly with vision and memory modules.