How to enter the password of someone else s computer in the local area network

Updated on technology 2024-03-23
5 answers
  1. Anonymous users2024-02-07

    Use the administrator password to make an ipc$ link, and then use the command to map the other party's hard disk or use the copy command to pass the Trojan and other things... Remotely command the other host how many times to run the Trojan, and the time should be set faster than the other party. When the time comes, you can use the Trojan to control his computer, or open the other party's 3389 service and port for remote control.

    Command: net

    use">\\ip\ipc$

    Username"user:"Password"

    netuse

    z:">\\ip\c$

    Password"user:"Username"

    You can map the other party's C disk to your own Z disk, and other disks by analogy) D:>net

    Check the host time.

    After mapping the other party's hard drive, put the Trojan file into the C drive.

    c:\>at

    The IP time of the other party.

    Trojan paths. Remotely command the opponent's computer to run the Trojan at what point and how many minutes.

  2. Anonymous users2024-02-06

    Ask the other person to change the settings.

  3. Anonymous users2024-02-05

    With the router, I can tell you that you can't view it without the routing background account and password! Yes, you can view it with the star viewer! If you use, you can go to**, a tool to get the password of the Internet account, you can find it here.

  4. Anonymous users2024-02-04

    Open the guest account of that station, you can access it without a password, my computer - right-click management - local users and groups - users - guest right-click to open. In the future, you will not need a password to access this machine in the local area network, and you will have to share the hard disk of which computer. If you want to crack the password compulsorily, the loss is generally the account:

    The administrator password is blank. Or telnet his port 23 goes in, provided that the other port is open.

    A local area network (LAN) is a group of computers that are interconnected by multiple computers in a certain area. Generally, it is within a radius of several thousand meters. LAN enables functions such as file management, application software sharing, printer sharing, scheduling within workgroups, e-mail and fax communication services, and more.

    A LAN is closed and can be made up of two computers in an office or thousands of computers in a company.

    Local area network (LAN) is a computer communication network composed of various computers, external devices and databases connected to each other within a local geographical range (such as a school, factory and institution), generally within a radius of several kilometers. It can be connected with a remote local area network, database or processing center through a data communication network or a dedicated data circuit to form a large-scale information processing system. LAN enables functions such as file management, application software sharing, printer sharing, scanner sharing, scheduling within a workgroup, e-mail and fax communication services, and more.

    LANs are strictly closed. It can consist of a few or even thousands of computers in the office. The main technical elements that determine the LAN are:

    Network topology, transmission media, and media access control methods.

    A LAN is composed of network hardware (including network servers, network workstations, network printers, network cards, network interconnection devices, etc.) and network transmission media, as well as network software.

  5. Anonymous users2024-02-03

    1. Right-click the computer icon and click [Manage].

    2. In the pop-up dialog box, select "Local Users and Groups", "Users", and "Guest".

    3. Double-click "guest" in the pop-up dialog box and remove the checkmark in front of "account disabled".

    5. Select "Local Policy" "User Rights Assignment", find and double-click [Deny access to this computer from the network] on the right.

    6. In the pop-up dialog box, select "guest" to delete.

    7. Click [Security Options] on the left side, and then find and double-click [Account: Local accounts with empty passwords are only allowed to log in to the console] on the right.

    8. If the password needs interface still pops up, enter: guest, the password is blank and do not need to be entered, check [Remember my credentials], and click [OK] to access.

Related questions
5 answers2024-03-23

Question 1: How to use LAN to transfer files? The next flying pigeon book software on the Internet. >>>More

9 answers2024-03-23

There is no need to set up a route twice. You only need to cascade the LAN port on R2 to the LAN port of R1 with a 568A and 568B network cable. >>>More

8 answers2024-03-23

LAN settings, key five points:

1.Each machine needs to be in the same network segment, that is, the firewall with the same number for the first three sets of IP needs to allow "file and printer sharing". >>>More

7 answers2024-03-23

With the gradual popularization of Internet office, the daily work of many enterprises is inseparable from the computer, because the dependence of employees on the computer is relatively strong, so it is necessary to manage the computer in the local area network, to prevent employees from chatting or doing something unrelated to work during the work period, if you want to monitor the computer in the local area network what to do? >>>More

8 answers2024-03-23

Your network architecture is a medium-sized network, don't use class C IP, change to class B, divide several VLANs, divide the office building into a VLAN, each office is divided into VLAN, and then put the OA and business system server separately into a VLAN, the default VLAN can be, easy to manage, but also can prevent ARP attacks, and then there are ARP attacks can only attack in this VLAN, will not affect the server, you can enable the routing function on the main switch, Support cross-VLAN data exchange, control the direction of data exchange through ACL, how do you usually manage the external network, you can see if you need to change it again, as for ARP detection, your VLAN should be attacked in a certain VLAN after it is divided, you can know which switch under the computer issued the ARP attack, you can then go to the corresponding switch web page through the MAC detection function to detect the attacker's MAC and IP, Even if someone manually changes the MAC and IP, the above will also be recorded, as for what you said can not find the attacker's MAC, it may be manually modified, you can find the attacker's real MAC address and IP through the MAC detection function on the web page, you can easily find out which computer is attacking, in this way, the network is safe, viruses, and human aspects are all eliminated After reading your information above, I feel that your network is a little messy, and you can apply to move the network once, Let's make a rectification and re-plan.