How to disable upload ports! Urgent! Urgent! Urgent!

Updated on technology 2024-03-25
14 answers
  1. Anonymous users2024-02-07

    This is the confusion faced by many intranet employees in many companies, and there may be only one solution at present, that is, to recruit ** jump.

    But it can't solve all your problems, just go to the Internet to find the best tool and use it.

  2. Anonymous users2024-02-06

    The simple thing is to find the network management to modify the permissions, and the complicated thing is to crack it yourself.

  3. Anonymous users2024-02-05

    Modify your permissions, the company computer is added to the domain, and all game ports are blocked.

  4. Anonymous users2024-02-04

    Upstairs, the landlord's problem is that port 21 is banned, if you use port mapping software, then you have to set it on the gateway, if you can set it on the gateway, that is, you have the authority to set the gateway, if you have the permission to set the gateway, why do you need to use port mapping software so troublesome, just open the 21 port will save trouble?

    Therefore, like the landlord, it is estimated that there is more than 21 ports that have been blocked, and it is best to use FTP and use virtual port software, and encapsulate the data communicated by other ports such as 21 from port 80. For example, http tunnel, green channel software, etc., specifically search on the Internet, there are a lot of them.

  5. Anonymous users2024-02-03

    Change the FTP port to a different port number in the management tool, and then map!

  6. Anonymous users2024-02-02

    Get a port mapping software! Change the FTP default port to something else.。。。

  7. Anonymous users2024-02-01

    It's the routing that closes port 21, you can change the port number of FTP.

  8. Anonymous users2024-01-31

    With a 360 internet speed monitor, the software is turned on and the one is banned.

  9. Anonymous users2024-01-30

    My QQ can chat directly on the web page

  10. Anonymous users2024-01-29

    Purchased your own Wi-Fi configuration.

  11. Anonymous users2024-01-28

    QQ is inherently illegal on the company. QQ is used sparingly. Use more bad ones.

  12. Anonymous users2024-01-27

    In the device manager under Windows, disable all serial bus controllers, and then set the password of the administrator user View original post" for adoption.

  13. Anonymous users2024-01-26

    There is an option for upload restriction in the Thunderbolt configuration.

    As a user of P2P resources, I want to maintain a certain amount of uploads, and if everyone doesn't upload, no one will be able to get down, right?

  14. Anonymous users2024-01-25

    Trusted zones are generally used in LAN environments. To avoid the inconvenience caused by the firewall, you can add LAN users who can be fully trusted to the trusted zone of the machine.

    So, if you add LAN users to the trusted zone, it means that you trust these users completely, and the firewall will not filter the packets sent by these users' machines, even if they are virus.

    I want to completely release the communication between this IP segment machine and the machine;

    You can do the following:

    Open the main interface of Rising Personal Firewall Settings Details Settings Rule Settings Trusted Zone;

    On the right, click the Add button;

    The Browse button after the local address is used to allow the user to select when the network card of the machine has multiple IP addresses, or when the machine has multiple network cards corresponding to multiple IP addresses.

    After the rule is added, all three trusted zone services are selected by default. The instructions are as follows: Zhongshen.

    Allow ping in and out: Allow users in the trusted area to ping the machine, which is generally used to test network connectivity.

    LAN Drops Sensitive Ports of the Other Party: Whether the firewall blocks the communication between the machine in the trusted zone and the machine through the sensitive port. If it is checked, it will not be blocked.

    LAN Off-Permission Sensitive Ports: Whether the firewall blocks the traffic between the machine that leases the trusted zone and the sensitive ports of the machine. If it is checked, it will not be blocked.

    Sensitive ports: 135 139 137 138 445, etc.

    The machine will be added to the trusted area of the machine only when it is fully trusted, so all three items are checked by default. This ensures the two-way communication between the trusted zone user and the machine to the greatest extent. When you do need to make minor adjustments, you need to make adjustments through the above three items.

Related questions
6 answers2024-03-25

For banking business, it should be https web page, not only the problem of opening port 443 in the firewall, you can refer to the following methods for https not to open: (note that it is an XP system). >>>More

6 answers2024-03-25

Introduce yourself first, and then explain the purpose of joining the student council. How do you do it in the student council,......I believe that with everyone's efforts, the Student Union will get better and better! But remember not to laugh when you speak, and to be serious in your expression, so that people will think that you have a bit of character or temperament! >>>More

9 answers2024-03-25

Perfect aloe vera gel is good, you can try it.

4 answers2024-03-25

I'll write in detail and remember the plus.

Medium Maximize and minimize button evaporation: >>>More

17 answers2024-03-25

Due to the hot and humid weather, or when the season changes, the washed clothes are easy to grow mold spots, especially white clothes, once they have mold spots, it is a very depressing thing. >>>More