Teach you to limit the use of your computer to surf the Internet

Updated on technology 2024-03-15
15 answers
  1. Anonymous users2024-02-06

    Need more detailed information, whether you want others not to even touch your machine!

  2. Anonymous users2024-02-05

    Right-click on my computer - Manage - Local user group - User - Administrator or your own name - Right-click to set a password - Continue - Enter the password twice (you must remember it yourself) - OK

    In this way, there is a password when you boot up, and if someone wants to use your computer, you have to use the password to enter, of course, there is a way to crack it, but it's troublesome, if the people around you are not computer masters, that's enough. It's best to use the password in English with numbers, so that the chance of being cracked will be reduced!

  3. Anonymous users2024-02-04

    Encrypt! Don't log in to your computer automatically.

    Create a different username to log in, so that you can restrict the permission to manage other people's computers.

  4. Anonymous users2024-02-03

    Just can't access the Internet That's very simple: change the administrator password and create a VIP user.

  5. Anonymous users2024-02-02

    If you want others to use your computer and are not allowed to access the Internet, you can create another user and set its permissions to be OK!! Just let someone else use that user.

  6. Anonymous users2024-02-01

    If you are an administrator of a Wi-Fi router, you can prevent others from connecting to your wireless network on your computer by following these steps:1Open your router management page.

    Enter the IP address of the router in the browser and press the enter key to log in with the username and password. 2.Go to the router settings page, select options such as "Wireless Settings" or "Wireless Security", and find options such as "Access Control" or "MAC Address Filtering".

    3.Enable "Access Control" or "MAC Address Filtering" so that only allowed devices can connect to your network. In general, the router allows all devices to connect by default.

    4.In the Access Control or MAC Address Filtering section, add the MAC address of the device to which you want to disable. 5.

    Save your settings to disable connected devices and will no longer be able to connect to your wireless network.

  7. Anonymous users2024-01-31

    It should be possible to use an ISA or a managed router or switch, but the software ISA is better to use.

    There is a prohibition policy setting in the software, which can fully realize the requirement that you can only browse the web and send emails.

  8. Anonymous users2024-01-30

    Buying a good router can generally restrict Internet access, what time, and what** can be restricted. There is also the possibility of next software to restrict the Internet. For example, it is used by network management.

  9. Anonymous users2024-01-29

    The security of cyber limbs has become the focus of everyone's attention. Since the IP protocol was not designed with too much security in mind, problems such as attacks or theft of confidential data often occurred in early networks. In order to enhance the security of the network, the IP Security (IPsec) protocol was developed.

    The Windows 2000 XP 2003 operating system also provides support for the IPsec protocol, which is what we usually refer to"IPsec security policy"Features, although the features it provides are not very perfect, but as long as you customize it reasonably, it can be very effective in enhancing network security.

    My computer - Control Panel - Management Tools - Local Security Policy - IP Security Policy, this is the tool provided by Windows to configure IP management, I only talk about how to prohibit others from ping my host.

    There are four steps:

    1. Establish a no-ping rule.

    2. Establish prohibitive and permissible rules.

    3. Tie these two rules together.

    4. Assignment Details:

    1. Right-click IP Security Policy - Manage IP Filter Table and Filter Operations - IP Filter List - Add: Name: Ping; Description:

    ping;(Check.)"Use the Add Wizard"-Add-Next: Specify the source as "Any IP Address", the destination as "My IP Address", the type of proposal (ICMP), and the next step until it is completed, close this dialog.

    2. Manage IP filter table and filter operation - Manage filter operation - add (check.)"Use the Add Wizard"- Next: name: refuse; Description: refuse--next--block-next-until the hood or world is complete.

    Unactivate Default Response Rule - Next: Checked"attributes"-Finish. And then"The ping attribute is disabled"On-Add (Check.)"Use the Add Wizard"- Next until"Authentication method", select the third item, and enter the shared string - Next:

    4. Right-click"No ping"--Assign.

    This time, an IP policy that prohibits others from ping their own machines is complete.

    The above is just a small IP filter. You can make other IP strategies on your own, four steps to group pure.

  10. Anonymous users2024-01-28

    1. Obtain the IP and MAC addresses of all users in the LAN.

    How to get your own computer IP and Mac: win+r, enter cmd, use"ipconfig /all"View.

    2. Log in to the broadband router.

    Open IE, and the input is generally this. The login window will appear.

    admin password: admin (this is the default).

    After logging in, the broadband router settings page will appear.

    3. Only allow your own computer to access the Internet.

    1. Settings page - DHCP server - static address assignment - bind your IP address to MAC address (enter and save it).

    2. Settings page - Security Settings - Firewall Settings - Select Turn on Firewall, Turn on IP Address Filtering, Turn on MAC Address Filtering - Select"Any packets that do not comply with the set IP address filtering rules are prohibited from passing through this router"with"Only the Stuffy Car MAC addresses that have been enabled in the MAC address list are allowed to access the Internet"。

    3. Settings page - Security Settings - IP address filtering - Add new entries - Fill in your IP address and select to make all entries effective.

    4. Settings page -- Security Settings -- MAC address filtering -- Add new entries -- Fill in your MAC address and select Make All Entries Effective.

    After setting it up in this way, no one can go to the external network except you, but it can be accessed normally within the local area network.

    Fourth, do not allow a certain computer to access the Internet.

    1. Settings page - Security Settings - Firewall Settings - Select Turn on Firewall and Turn on MAC Address Filtering -"Disable enabled MAC addresses from the Enabled MAC address list from accessing the Internet"。

    2. Settings page - Security Settings - MAC address filtering - Add new entry - Fill in the MAC address of the computer that is prohibited from surfing the Internet, and select to make the entry effective.

    After this setting, computers that are prohibited from accessing the Internet will not be able to access the Internet, but they can be accessed normally within the local area network.

  11. Anonymous users2024-01-27

    Except for the administrator, no one else can restrict you, if others use some ARP software such as P2P and the like, just install a 360.

  12. Anonymous users2024-01-26

    If you're not the first network administrator, it's really hard to solve. Sanga.

    Unless you can remotely log in to the other party's gateway or switch, enter the username and password, and then cancel the restriction and do what you want.

  13. Anonymous users2024-01-25

    It depends on how the other party restricts your computer and your access to your computer.

    For example, if the other party just installs the LAN management software, you can install a 360+ change IP address.

    If the other party uses router restrictions, that is, the method of the gateway restrictions, change the IP If the other party uses the **restriction method, cancel** + change the IP Note: The above methods may not be effective, and the specific situation should be treated specifically, but you can give it a try!

  14. Anonymous users2024-01-24

    1) If it is a problem with the broadband itself, first directly connect the broadband network cable to test, if it is a broadband problem, contact the broadband customer service to solve it.

    2) If it's a problem with the router, if it can be used originally, it can't be used for the time being, my own practice is to roll high and disconnect the power supply of the router when plugging it in, and I'll take a look. In there is a factory reset, it can be used from the new settings (this is under the premise of the correct physical connection, sometimes caused by the router's slow or failed IP address search, not that the router is broken).

    If it can't always be solved, it is recommended to call the customer service of the router, they have **** guidance, I encounter problems that I can't solve, it is very useful to consult the advice they give, and they will give correct suggestions for your settings or operations.

    3) If you turn off the wireless switch, turn it on, if it is a wireless connection with software, it is normal for the software to be difficult to use and often have problems, there is no better way, use a router. In addition, it is caused by the network card driver is not or is not suitable, and whether there is a problem with the network cable interface or network cable.

    4) If it is caused by a system problem, it is recommended to restore the system or reinstall it.

    I practice mobile phone or other computer can access the Internet, not necessarily your computer can access the Internet, the method look at the above, if you have any questions, ask me.

    5) If you have any questions, please ask me.

  15. Anonymous users2024-01-23

    There are two solutions:

    Mutual will be used.

    2. Replace your router, and replace it with one that can bind MAC traffic, about 400+, and no one will affect anyone in this round, but no one can play well. Not recommended.

    In the end, Tong Hao is not the way to go: install an ARP firewall to prevent the management software from controlling you, and you can do whatever you want and get them stuck. But the likely consequence of friends is that either you die or they die, and everything we use here to use kitchen knives and fists is caused by this, and it is strongly not recommended.

Related questions
12 answers2024-03-15

I'm also using dnf monthly, and this g is not bad, but you have to be skillful with this. This g is not available 24 hours a day.,Sometimes when you use this g, it will fall off as soon as you enter the map.,Sometimes it will fall off after brushing for a while.,Sometimes it just doesn't drop.,So you have to find a time period.,Most of them are in the morning (8:00-11:.] >>>More

8 answers2024-03-15

Risk 1: The "borrowing a name to buy a car" agreement is not protected by law >>>More

14 answers2024-03-15

1. If it is used for oneself and for non-profit purposes, it is not an infringement. >>>More

14 answers2024-03-15

You can complain to the construction department and request the demolition of the building or structure because of its violation of regulations; If you think about it from the perspective of civil disputes, then you can file a lawsuit in court to request a lawsuit for the infringement of your right of way by its construction, etc., and you can consult a local lawyer for a litigation plan.

2 answers2024-03-15

Unforgettable, unforgettable.

Idioms with no words: elusive, self-deprecating and boring, listless, obliterated, toothless and unforgotten, heartless and lungless, the whole army is annihilated, left in the green mountains, not afraid of no firewood, no teeth unforgettable, endless, eight characters have not seen a skim, there is no match, there is no eight characters, no light, no weight, no skin and no face, no world, no oblivion, no world, no oblivion, no energy, no sound, no mouth, no arrow, no head, no face, no gold drinking feathers, no crows, no roots, no evidence, no blade, no sharp storage, no flat shoulder, two heads collapsed, there is no mouth and no tongue, no essence collapsed, no ambition, no head cup case, no essence and no color, no investigation and no profit, less head and no tail, no crow is quiet, no tooth is difficult, no root is not grounded, the blade is not profitable, no up and no down, no way, no sky, no glory and no sorrow. >>>More