ARP in the Internet caf .,A few machines can t get on the Internet.,Ask the master to solve it.。。

Updated on technology 2024-02-09
14 answers
  1. Anonymous users2024-02-05

    Monitor which machine in the LAN keeps sending data out for a continuous period of time, usually the poisoned machine, and the others are puppets.

  2. Anonymous users2024-02-04

    Generally, ARP attacks are characterized by the fact that the infected machine can access the Internet normally, but other machines in the same network segment cannot access the Internet normally.

    Solution: 1 Replace the LAN switch with a device that can isolate Layer 2 broadcasting, and enable port isolation for each user port, so as to avoid the poisoning machine from interfering with other machines to access the Internet, the disadvantage is that some protocols in the LAN can not work, such as not sharing files with each other, sharing printers, etc.

    2 Use the arp -a command to query the ARP cache information of the local machine, if the MAC address of the gateway is incorrect, it means that the MAC is the MAC of the poisoned machine, find the machine, and kill it. But now that there are new variants, and the Mac is also fake, this method can't solve it.

    3 Your own machine is also poisoned by arp, so you can go online, quack...

  3. Anonymous users2024-02-03

    It's simple, install an ARP firewall, and it's easy to get done.

  4. Anonymous users2024-02-02

    If it is an ARP attack, it cannot be solved by software alone, and many people think that ARP firewall will do. Isn't this the same as shutting down your computer for a year and starving the virus to death? There is no way to solve it, ARP is a normal protocol attack launched from the bottom by exploiting the inherent vulnerabilities of the Ethernet protocol, and the only way to solve it is to intercept ...... from the network cardUpgrade the immune network, genetically bound terminal network card, strictly control and audit the identity, strictly verify the packet of any data sent, ensure your network security and stability, and directly intercept malicious protocol data from the terminal network card....

  5. Anonymous users2024-02-01

    Hello friend, you are several families use one network, that is, the router is used to access the Internet. They can attack your computer and control your internet speed. All you have to do is turn on 360 Guard. will stop ARP attacks. I hope my answer is helpful to you.

  6. Anonymous users2024-01-31

    It's better for you to install a software to prevent ARP attacks, you try the ARP firewall in the 360 Security Guard Trojan Firewall, this is turned off by default, you turn it on, this still works.

  7. Anonymous users2024-01-30

    Install a Comodo Firewall. I think it's pretty good.

  8. Anonymous users2024-01-29

    Just go to the Internet and find an ARP firewall.

    Very practical. That's what we're doing in our Internet café.

  9. Anonymous users2024-01-28

    Installing an ARP firewall works very well.

  10. Anonymous users2024-01-27

    The machines in the Internet café have hardware restoration or software restoration, even if the ARP virus is hit, as long as the machine is restarted, it can be restored to a non-toxic state.

    Anonymous 5-21 10:01

    Other answers. 1. The network used by the Internet café is a dedicated line, and the cost of optical broadband is several thousand a month, and the stability must be good.

    2. Regular Internet cafes all use management software, and the software has a drive firewall and restore function, so as to eliminate internal virus Trojans. At the same time, the routers and main switches used are also set up with corresponding security specifications, and there are basically no or very few virus and Trojan attacks.

    Hundreds of years and contemporary, good times, thousands of years, new and new, Vientiane renewed.

  11. Anonymous users2024-01-26

    It must be someone who has a professional network manager.

  12. Anonymous users2024-01-25

    Not all webmasters eat dry food.

  13. Anonymous users2024-01-24

    No? It's just that you didn't find out! In fact, the battle against hackers is very powerful!

  14. Anonymous users2024-01-23

    There is a network manager who maintains the computer host, of course not.

Related questions
13 answers2024-02-09

Install a 360ARP firewall and you're good to go!

19 answers2024-02-09

Definition of walking: Moving beyond the allowable range with the ball is walking The rules stipulate that you can catch the ball in the air, and the two feet will land on the ground successively, with the foot that lands first as the pivot foot Both feet land on the ground at the same time, and both feet can be the pivot foot (the foot that moves later is the pivot foot) Lifting the pivot foot can pass and shoot, but not dribbling When lifting the pivot to call passing or shooting, the pivot foot cannot touch the ground before the ball leaves the hand When the dribbling begins, the ball must leave the hand first, and then the pivot foot can be lifted Violating the above regulations is walking. >>>More

10 answers2024-02-09

It is poisoned, it is recommended to use Huangshan.

I'm searching for it. >>>More

11 answers2024-02-09

In fact, U is a unit that represents the external dimensions of a server. >>>More

11 answers2024-02-09

You can use the right-click management tool to enter the friend Zheng Xiangxing to restore the good shirt. Here's how it works: >>>More