Internet access problems on two computers!! Questions about computer networks!

Updated on technology 2024-04-10
8 answers
  1. Anonymous users2024-02-07

    Brother: Two computers dial-up to the Internet.

    Not with a switch.

    You should use a router (you can choose a four-port one).

    The specific steps are:

    The cat knows how to connect.

    The ** line that comes in--- the cat --- the router --- the computer (so you have to set up the router, and the router setting is very simple.)

    Or depending on the brand of the router you choose, the address is different, and there will be instructions on the router manual.

    After entering, the username admin password admin (default) setting wizard, under normal circumstances, you don't need to worry about other settings, you just need to set your broadband number in it.

    After the routing dial-up is successful, the IP on your machine generally does not need to be set, and the IP can be obtained automatically.

    This way you can get online.

    Enough details, brother, give points.

  2. Anonymous users2024-02-06

    Two people use one dial-up, and you want to use a router.

  3. Anonymous users2024-02-05

    I guess it's a matter of the network provider. For example, Netcom's home broadband does not allow two machines to use the same line of Internet access, but you can go to the Internet ** a cracked Netcom dial-up client, so that you can access the Internet together.

  4. Anonymous users2024-02-04

    Your only 50 points, give it to me!

  5. Anonymous users2024-02-03

    This is the reason why your local connection IP address is not set!

    You change the IP to try!

  6. Anonymous users2024-02-02

    ADSL dial-up internet, right?

    You need a router, connect the two computers with network cables to route, simply configure it, fill in your ADSL account and password and it can be dialed, and the instructions for routing generally write the installation method. Then fill in the IP addresses of your two machines, or simply use the automatic IP acquisition.

    Good luck.

  7. Anonymous users2024-02-01

    Prevent IIS

    IIS intrusion: IIS intrusion is generally a port or stealing a legitimate username for intrusion, solution: IIS security can start from the following four aspects.

    1.Check the IP

    Or a domain name. 2.Check the authentication.

    3.Home directory permissions.

    It is recommended to use PKI for permissions

    Encryption of IIS data.

    telnet

    The intrusion is also done by stealing your computer's legitimate username, and it is recommended to use telnet as little as possible for remote connections. It is best not to open port 3389. If you really want to connect to telnet.

    Other software can be used instead of telnet

    For example, linux.

    SSH is pretty good.

    Intrusion detection system: There are two types.

    Host-based intrusion detection.

    and network-based intrusion detection, but when it comes to basic policies, I use snort as an example, the working principle of intrusion detection system and antivirus software is similar, and many intrusion policies are integrated in the intrusion detection system, and the system itself is integrated by monitoring data packets to alarm.

    The firewall consists of:1A packet-filtering firewall (which works at the network layer) is equivalent to ACL2 of a router** type firewall (application layer firewall) mainly filters protocols and ports3Stateful inspection firewalls (network layer) are evolved from packet-filtering firewalls.

  8. Anonymous users2024-01-31

    The intruder uses the tool to step on the point, first determine the possible vulnerability page of the BBS, and after testing, it is found that it is not possible.

    intrude, and then turn to the server's.

    Intrusion, the use of sidenote special programs or specific programs for ** invasion, get the primary webshell, and then access the folder to invade the BBS system to modify the home page, because it is based on the space IIS log analysis, so it is not clear.

    Which page is exploited by the intruder.

    Invading! However, the data collection has been completed, and the hacking of BBS has been determined.

    The IP address of the intruder, as well as the Trojan horse used, also left a large number of intrusion records. **。

Related questions
12 answers2024-04-10

There are three main aspects that commonly affect computer security. >>>More

3 answers2024-04-10

The content of Computer Networks and Communications covers the basic concepts, principles, technologies and applications of computer networks and data communications, and reflects the latest progress of data communication and computer network technology. It mainly includes computer network overview, data communication basics, network architecture, local area network, communication network and wide area network, network interconnection technology, Internet, network operating system, network management and security technology, network comprehensive experiment, etc. >>>More

8 answers2024-04-10

Generally, the computer network is called Ye Zheng to do the business network. A communication network is called a transport network. >>>More

13 answers2024-04-10

Try changing the physical address of the network card.

4 answers2024-04-10

I don't know how many of them are, but there must be such a thing as http.