-
If it is a Linux host, put the IP address of the host you want to access into the hosts file, and put the corresponding IP address into and as needed to achieve your purpose.
-
Halo: You can install a firewall for this, and you don't need to write your own programs.
Also, if you're renting a web host outside, this feature comes all with its own.
-
Isn't this the whitelisting feature of the firewall?
-
Send me a copy by the way.
200 points were posted, and points were given.
-
Do you know how hackers hack into other people's systems? Two conditions. First, you need to open one of the ports 135, 139, 445, 3389, 4899, etc. on the other host.
Second, you need to know the username and password of the other party. An invasion can only be carried out if these two points are known. So it's too much trouble for you to close the ports one by one.
If you don't feel safe, set a very strong password. This way, even if you open the port, others will not be able to hack in without knowing the username and password.
administrator does not need to cancel. Just disable it. This is built into the system.
The main role is that it can be used to repair the system later. When you re-establish an account. He was hidden.
It will only be displayed if you enter safe mode. The method is to right-click on the icon of my computer - Manage - Local Users and Master - Select Administrator to disable it.
-
2. This is how the administrator's authority is canceled. If it is the home version, there is a possibility that this feature is not available. Please install the pro version of XP
-
Two conditions: First, the other host needs to open one of the ports 135, 139, 445, 3389, 4899, etc.
Second, you need to know the username and password of the other party.
-
Alas, I said you are simply making a fuss, just plug the loopholes. Just add an antivirus.
-
It is recommended to use the user permission level to handle whether you can see the entrance of the internal management system and whether you can enter the internal management system without using a port. It's too insecure to just use ports to deal with whether you can get into the management system. Security is low. Did you hear the requirements wrong?
-
Add a link, you need the company's account password to log in.
-
360 Security Guard.
360 can't close ports, you can close them from the router or set an IP security policy under Win7 to filter out these ports.
-
Super Rock Dan Bunny can close the process, view the port and cannot close the port.
Find a rough disturbance next to the banquet.
-
Firewalls have this feature.
-
All kinds of programming knowledge is required! VB, C++, C can do it all!
Generally, there are software companies that will make it, and the general cost is 600-700 yuan!
You can also learn it on your own, buy a book, and learn it. It's basically going to be done in a month!
The database can be used with Office
access!
The theory is the same, just change the internal design!
-
Port Manager) green version.
-
The first is to use a reasonable data structure (structure) to achieve this.
In the second clause, the addition and deletion functions can be selected as file operations or linked list operations, and the confirmation prompt can be used using the MessageBox API
Article 3 Not much to say.
Article 4 Explain that Article 2 should adopt the former (you can set the main title or ID for the event to name the corresponding file for easy search).
Article 5 ...If it's a ** Wang Hu staring at the document, I can't help it, and if I insist on coming, I will draw it with GDI or OGL.
It's completely possible, but after installation, to fix the XP's boot information, go to the XP's recovery console (boot the system with XP CD), enter FixBoot at the prompt, and then press Enter; Then enter copy x: c: also enter (x is the actual drive letter), and finally enter copy x: >>>More
Ten years of life and death, Hengyuanxiang, sheep and sheep. Thousands of miles of lonely graves, laundry detergent with strange strength. Even if you don't know each other, supplement vitamin C, Shierkang. >>>More
First of all, whether you are an interesting woman or an interesting man, you must learn to read. People who read books are really interesting. I once knew a girl who came from a scholarly family, her parents were both university professors, and she started reading from a few years old until she was in her twenties, and every night when she went home and washed up, she had to read for two hours, and she took out a book from her bag to read in her free time. >>>More
But think about it the other way, what else can he do for you besides buying breakfast and cooking red bean soup. Can he accompany you home during the New Year's holiday, can he give you a hug when you wake up from a dream in the middle of the night, can he give you a home, can he raise the children with you, think about it, don't go to youth to gamble, because you can't afford to gamble, youth is only once, don't do things that you regret, don't forget, even if you can turn positive, can you guarantee that there will not be a little four, when the time comes, you don't even have his position to accuse him, he will say that you are also a third party.
A boy always teaches a girl a big truth, probably because he is interested in or has a good impression of this girl. He hopes to demonstrate his wisdom and knowledge by teaching her great truths, and hopes to win her respect and appreciation. He may also think that the girl needs to listen to these great truths to help her grow and improve. >>>More