-
Brother: Two computers dial-up to the Internet.
Not with a switch.
You should use a router (you can choose a four-port one).
The specific steps are:
The cat knows how to connect.
The ** line that comes in--- the cat --- the router --- the computer (so you have to set up the router, and the router setting is very simple.)
Or depending on the brand of the router you choose, the address is different, and there will be instructions on the router manual.
After entering, the username admin password admin (default) setting wizard, under normal circumstances, you don't need to worry about other settings, you just need to set your broadband number in it.
After the routing dial-up is successful, the IP on your machine generally does not need to be set, and the IP can be obtained automatically.
This way you can get online.
Enough details, brother, give points.
-
Two people use one dial-up, and you want to use a router.
-
I guess it's a matter of the network provider. For example, Netcom's home broadband does not allow two machines to use the same line of Internet access, but you can go to the Internet ** a cracked Netcom dial-up client, so that you can access the Internet together.
-
Your only 50 points, give it to me!
-
This is the reason why your local connection IP address is not set!
You change the IP to try!
-
ADSL dial-up internet, right?
You need a router, connect the two computers with network cables to route, simply configure it, fill in your ADSL account and password and it can be dialed, and the instructions for routing generally write the installation method. Then fill in the IP addresses of your two machines, or simply use the automatic IP acquisition.
Good luck.
-
Prevent IIS
IIS intrusion: IIS intrusion is generally a port or stealing a legitimate username for intrusion, solution: IIS security can start from the following four aspects.
1.Check the IP
Or a domain name. 2.Check the authentication.
3.Home directory permissions.
It is recommended to use PKI for permissions
Encryption of IIS data.
telnet
The intrusion is also done by stealing your computer's legitimate username, and it is recommended to use telnet as little as possible for remote connections. It is best not to open port 3389. If you really want to connect to telnet.
Other software can be used instead of telnet
For example, linux.
SSH is pretty good.
Intrusion detection system: There are two types.
Host-based intrusion detection.
and network-based intrusion detection, but when it comes to basic policies, I use snort as an example, the working principle of intrusion detection system and antivirus software is similar, and many intrusion policies are integrated in the intrusion detection system, and the system itself is integrated by monitoring data packets to alarm.
The firewall consists of:1A packet-filtering firewall (which works at the network layer) is equivalent to ACL2 of a router** type firewall (application layer firewall) mainly filters protocols and ports3Stateful inspection firewalls (network layer) are evolved from packet-filtering firewalls.
-
The intruder uses the tool to step on the point, first determine the possible vulnerability page of the BBS, and after testing, it is found that it is not possible.
intrude, and then turn to the server's.
Intrusion, the use of sidenote special programs or specific programs for ** invasion, get the primary webshell, and then access the folder to invade the BBS system to modify the home page, because it is based on the space IIS log analysis, so it is not clear.
Which page is exploited by the intruder.
Invading! However, the data collection has been completed, and the hacking of BBS has been determined.
The IP address of the intruder, as well as the Trojan horse used, also left a large number of intrusion records. **。
There are three main aspects that commonly affect computer security. >>>More
The content of Computer Networks and Communications covers the basic concepts, principles, technologies and applications of computer networks and data communications, and reflects the latest progress of data communication and computer network technology. It mainly includes computer network overview, data communication basics, network architecture, local area network, communication network and wide area network, network interconnection technology, Internet, network operating system, network management and security technology, network comprehensive experiment, etc. >>>More
Generally, the computer network is called Ye Zheng to do the business network. A communication network is called a transport network. >>>More
Try changing the physical address of the network card.
I don't know how many of them are, but there must be such a thing as http.