-
My computer! Properties can be viewed for the computer name.
-
Look at the online neighbors, working groups.
What do you want to do?
You try installing the NetBios protocol, and all the other protocols are installed.
-
This has to be in a computer group first, right? Or just look at the traffic history and look up the IP
-
You give his computer working group a name, and then you use the same name as him, restart the computer, and it's OK, I believe you are also a computer player, you should be able to put it, right-click on my computer, click on the properties, there is a computer name on it, and then change the name of the working group to the same as him, and then OK, restart, click on the online neighbor after getting up, and then check the team computer is OK, you can see his computer name.
-
**A computer scanning and management system in the Linyang domain, through the IP address to scan the computers that have joined the domain, computer name, IP address address, user name, power on and off time, boot items, etc., as many as 200 scan items, but can not get the password information you want, you can try it.
-
First of all, know the other party's IP open port, and then blast it.
-
Right-click on my computer, select Properties, computer name, there you have it, if you are on the network, open the online neighbor, view the workgroup computer, you can see, but generally don't know whose it is, hehe, unless someone tells you in advance or you trespass.
-
1. Tell you that a command can not only find out the username but also see the working group it belongs to, that is: nbtstat -s -a ip.
2. You can find a LAN management software, the computer name and IP in the entire LAN are there, and the login password is not visible.
-
The command is ping -a ip or domain name.
You can enter ping ?See how ping is used:
Usage: ping [-t] [a] [n count] [l size] [f] [i ttl] [v tos].
r count] [s count] [j host-list] |k host-list]]
w timeout] [r] [s srcaddr] [4] [6] target_name
Option: -t ping the specified host until it stops.
To view the statistics and continue—type control-break;
To stop - type control-c.
a Resolves the address to the hostname.
n count the number of echo requests to send.
l size The size of the sending buffer.
f Set the "Do Not Fragment" flag in the packet (IPv4 only).
i ttl time to live.
V TOS Service Type (IPv4 only.) This setting is no longer deprecated, and.
There is no effect on the type of service field in the IP header).
r count records the route of the count hop (IPv4 only).
The timestamp of the s count hop (IPv4 only).
j host-list loose source route with host list (IPv4 only).
k host-list with a strict source route with the host list (IPv4 only).
w timeout The timeout (in milliseconds) for each reply.
r also tests the reverse route with the route header (IPv6 only).
s srcaddr to use the source address.
4 Enforce the use of IPv4.
6 IPv6 is enforced.
-
In principle, ping -a is fine. But. It's as if the other party or oneself has to turn on one of the services in the service. to get it. ·· Which one is exactly. Sorry hah. Forgotten birds. ··
-
nbtstat -a ip
Get the computer name, workgroup, MAC address, the following figure, my computer is, the IP to be obtained must be a host;
-
You are either the nbtstat -a ip or the tracert ip
-
So how to get it.
No way, right?
Read in a minute. Principles of Computer Composition.
360TimeProtect time protection tool.
Thanks to MJ0011 for delivery. >>>More
How to get administrator privileges in win7.
Novices should first learn how to operate a computer, including the use of a familiar keyboard and mouse, and then learn to type, and then learn to use the operating system proficiently. >>>More
1. Machine language 1, advantages: it can be directly recognized and executed by the computer, so the program written in machine language is the most efficient. 2. Disadvantages: >>>More