Creation of a system port management software

Updated on technology 2024-02-08
16 answers
  1. Anonymous users2024-02-05

    If it is a Linux host, put the IP address of the host you want to access into the hosts file, and put the corresponding IP address into and as needed to achieve your purpose.

  2. Anonymous users2024-02-04

    Halo: You can install a firewall for this, and you don't need to write your own programs.

    Also, if you're renting a web host outside, this feature comes all with its own.

  3. Anonymous users2024-02-03

    Isn't this the whitelisting feature of the firewall?

  4. Anonymous users2024-02-02

    Send me a copy by the way.

    200 points were posted, and points were given.

  5. Anonymous users2024-02-01

    Do you know how hackers hack into other people's systems? Two conditions. First, you need to open one of the ports 135, 139, 445, 3389, 4899, etc. on the other host.

    Second, you need to know the username and password of the other party. An invasion can only be carried out if these two points are known. So it's too much trouble for you to close the ports one by one.

    If you don't feel safe, set a very strong password. This way, even if you open the port, others will not be able to hack in without knowing the username and password.

    administrator does not need to cancel. Just disable it. This is built into the system.

    The main role is that it can be used to repair the system later. When you re-establish an account. He was hidden.

    It will only be displayed if you enter safe mode. The method is to right-click on the icon of my computer - Manage - Local Users and Master - Select Administrator to disable it.

  6. Anonymous users2024-01-31

    2. This is how the administrator's authority is canceled. If it is the home version, there is a possibility that this feature is not available. Please install the pro version of XP

  7. Anonymous users2024-01-30

    Two conditions: First, the other host needs to open one of the ports 135, 139, 445, 3389, 4899, etc.

    Second, you need to know the username and password of the other party.

  8. Anonymous users2024-01-29

    Alas, I said you are simply making a fuss, just plug the loopholes. Just add an antivirus.

  9. Anonymous users2024-01-28

    It is recommended to use the user permission level to handle whether you can see the entrance of the internal management system and whether you can enter the internal management system without using a port. It's too insecure to just use ports to deal with whether you can get into the management system. Security is low. Did you hear the requirements wrong?

  10. Anonymous users2024-01-27

    Add a link, you need the company's account password to log in.

  11. Anonymous users2024-01-26

    360 Security Guard.

    360 can't close ports, you can close them from the router or set an IP security policy under Win7 to filter out these ports.

  12. Anonymous users2024-01-25

    Super Rock Dan Bunny can close the process, view the port and cannot close the port.

    Find a rough disturbance next to the banquet.

  13. Anonymous users2024-01-24

    Firewalls have this feature.

  14. Anonymous users2024-01-23

    All kinds of programming knowledge is required! VB, C++, C can do it all!

    Generally, there are software companies that will make it, and the general cost is 600-700 yuan!

    You can also learn it on your own, buy a book, and learn it. It's basically going to be done in a month!

    The database can be used with Office

    access!

    The theory is the same, just change the internal design!

  15. Anonymous users2024-01-22

    Port Manager) green version.

  16. Anonymous users2024-01-21

    The first is to use a reasonable data structure (structure) to achieve this.

    In the second clause, the addition and deletion functions can be selected as file operations or linked list operations, and the confirmation prompt can be used using the MessageBox API

    Article 3 Not much to say.

    Article 4 Explain that Article 2 should adopt the former (you can set the main title or ID for the event to name the corresponding file for easy search).

    Article 5 ...If it's a ** Wang Hu staring at the document, I can't help it, and if I insist on coming, I will draw it with GDI or OGL.

Related questions
11 answers2024-02-08

It's completely possible, but after installation, to fix the XP's boot information, go to the XP's recovery console (boot the system with XP CD), enter FixBoot at the prompt, and then press Enter; Then enter copy x: c: also enter (x is the actual drive letter), and finally enter copy x: >>>More

24 answers2024-02-08

Ten years of life and death, Hengyuanxiang, sheep and sheep. Thousands of miles of lonely graves, laundry detergent with strange strength. Even if you don't know each other, supplement vitamin C, Shierkang. >>>More

6 answers2024-02-08

First of all, whether you are an interesting woman or an interesting man, you must learn to read. People who read books are really interesting. I once knew a girl who came from a scholarly family, her parents were both university professors, and she started reading from a few years old until she was in her twenties, and every night when she went home and washed up, she had to read for two hours, and she took out a book from her bag to read in her free time. >>>More

9 answers2024-02-08

But think about it the other way, what else can he do for you besides buying breakfast and cooking red bean soup. Can he accompany you home during the New Year's holiday, can he give you a hug when you wake up from a dream in the middle of the night, can he give you a home, can he raise the children with you, think about it, don't go to youth to gamble, because you can't afford to gamble, youth is only once, don't do things that you regret, don't forget, even if you can turn positive, can you guarantee that there will not be a little four, when the time comes, you don't even have his position to accuse him, he will say that you are also a third party.

3 answers2024-02-08

A boy always teaches a girl a big truth, probably because he is interested in or has a good impression of this girl. He hopes to demonstrate his wisdom and knowledge by teaching her great truths, and hopes to win her respect and appreciation. He may also think that the girl needs to listen to these great truths to help her grow and improve. >>>More