P2P Terminator limits the Internet speed, and the P2P Terminator controls the Internet speed

Updated on amusement 2024-02-08
9 answers
  1. Anonymous users2024-02-05

    Because P2P will continue to send packets in the network to query the network status. This way everyone will be slow. Plus now the software is developed.

    There is also anti-P2P software that appears. You're on. They will also open anti-P2P.

    It's better for everyone to value harmony. Consulted. It's good for everyone.

  2. Anonymous users2024-02-04

    I don't know if you'll use it, you don't limit yourself! System Settings-Time Rules-Specify Rules-System Information-Network Hosts-Scan the Network-Select the Machines You Want to Restrict-Right-click to confirm that you are on the same network unit! And whether someone else has opened the firewall!

    When using him, it has a certain effect on the network, and others may not be able to find your shared files and printing devices (the printing device is directly connected to your computing) through his machineYou calculate the amount of their usage you can limit yourself, it's hard to give you an exact limit of how much, you look at it yourself! Don't just ignore others if you can access the Internet yourself?

  3. Anonymous users2024-02-03

    Don't use versions. When I use it, I can't get on the Internet, and it's better to use the 2 o'clock version.

  4. Anonymous users2024-02-02

    ARP spoofing: All of his traffic is going through the gateway, but you trick him through arp and he thinks you're the gateway, and he's going to send all the traffic to you, and then you send it to the gateway, so you can control his speed.

  5. Anonymous users2024-02-01

    The nemesis of P2Pover is the ARP Firewall. P2Pover is actually an ARP virus. The principle is to fake the gateway to deceive other computers that you are the gateway, send the data packet to your computer, transit it through your computer, and then send it to the real gateway.

    Because his packet goes through your computer, you say, what else can't you do?? The ARP firewall clearly tells the computer with the ARP firewall not to believe **, the real gateway is**, so his data packets don't go through you, what else can you do.

  6. Anonymous users2024-01-31

    Haha,It's so simple.,Today my computer is too.,Restricted by the owner of the route.,Deliberately play me! Just give me 10kb!Then I defeated him a minute later, the way is to open the 360 security guard Trojan firewall, and then turn on the ARP firewall at the bottom, if your landlord does use software such as limiting the Internet speed to control your computer, then 360 will immediately pop up with a disguised IP, just click OK to block, hehe, I'm like this today.

  7. Anonymous users2024-01-30

    Don't know what the landlord is using to limit your internet speed.

    If you do something on the router, you have no choice but to find a landlord.

    Maybe it's the P2P or something that other tenants have made on their computers, and my house is suffering from it, and I will be cut off from the Internet at 8 or 9 o'clock in the evening.

    Finally, it's network scissors, anti-p2p, color wing firewall, polysheng network management, messy software, and a bunch of software, and finally I can't get on the Internet.

  8. Anonymous users2024-01-29

    An intranet can only open one software such as P2P!!

  9. Anonymous users2024-01-28

    Use a VLAN

    As long as your PC and P2P terminator software are not in the same VLAN, he can't do anything about you.

    Use two-way IP MAC binding to bind the MAC address of your exit router on the PC, the P2P terminator software can't ARP spoofing you, and naturally it can't care about you, but it's just the MAC of the PC bound router

    It's not safe yet, because P2P terminator software can spoof routing, so the best solution is to use a PC, routing a two-way IP on MAC binding, that is, on PC

    bind the MAC address of the outgoing route, and bind the IP and MAC address of the PC to the route, so that the route must support IP MAC binding, such as the Hiper router. 3.

    Use IP MAC address theft + IP MAC binding simply you change your MAC address and IP address to the same IP and MAC as the person running the P2P terminator software, see how he manages, this is a lose-lose solution, there must be some tips in the change, otherwise it will report IP conflicts.

    You have to change the MAC address first, and then change the IP, so that Windows doesn't report IP conflicts (Windows is stupid))) It's not enough to do this, it's best that you bind the MAC address of the route on your PC, so that the P2P terminator spoofs the route is in vain.

Related questions
6 answers2024-02-08

Fault description: The pressure sensor voltage of the diesel exhaust gas treatment device (DPF) is too high; >>>More

10 answers2024-02-08

This board is a bit old, probably PT890 chipset, you can go on E2200, or E4 and E6 series, E5 and E7 series are not supported, and if it is AGP and PCIe support at the same time, AGP is recommended, because PCIe only has 4X speed. >>>More