-
Don't use anti-P2P. It's useless.
Cyber scissorhands. Most are toxic. But it works. Use this to cut off his net. After the disconnection, he can only send packets on his side. No packets were received. That's what I use.
There's another way...
If you know the router password, you can go to Security Settings———Firewall Settings——— turn on the Firewall Master Switch - go down - turn on MAC address filtering - click on Allow only set MAC addresses to access the Internet- Save.
Underneath the firewall settings there is a MAC address filter. Click on. Enter your MAC address and save.
All right. Now only you can access the Internet. (What is a Mac?)
Answer: Click on the local connection --- the dot support---the top one is your Mac) (how to enter the router?) A:
Similarly, the local connection --- supported --- have a default gateway. Write it down. Then open a web page.
admin password: admin is in and then follow the above to do it)
And finally, I want you to use the Internet Scissorhands, which is a bit more ruthless, and cut it directly, but of course you have to be careful not to worry about your default network, so you won't be able to access the Internet yourself. The software I also use is toxic, and I admit it.
-
Color Shadow does not restrict P2P. It is recommended not to install any terminator, you have to discuss with the landlord, recommend one that will use routing, and restrict P2P from the settings,
-
Landlord,It is recommended that you use the Kingsoft APR firewall.,I'm also using this.,It's very good.,As for P2P,You can go to the next anti-P2P terminator on the Internet.,Use it to kill the P2P of the LAN directly.。。。
-
I can tell you for sure that the person who controls you is no longer using software based on the principle of ARP such as P2P Terminator to control you.
The person controlling you must not be using ARP-based software, such as Skiller, so that your ARP firewall is useless.
As long as the control software is based on the ARP principle, Caiying is effective.
At the moment, there is no solution to skiller, unless your router is a little more advanced, there is no way.
-
It's useless, I used the color shadow ARP firewall + 360ARP firewall + Rising firewall, it's still a continuous attack, the light prompts that there is an ARP attack, but it can't be blocked, and the network speed is terrible.
Later, I bought an immune security gateway, this device can solve it, and you can see which computer is attacking in the monitoring interface, and intercept it directly on the computer. Now that the network is stable, the P2P terminators they use are ineffective.
-
I think mine is also controlled, it's really slow, how to solve it???
-
My situation is exactly the same, if the problem is solved, please let me know, thank you!
-
There is ARP spoofing on your LAN. A desktop firewall doesn't prevent you from spoofing the gateway. That's why the firewall is turned on and it prompts ARP spoofing.
Now the only way to solve ARP is to manage each terminal. Eliminate every possible source of attack.
Landlords can take a look at Thrivin's immune network solution.
-
Try a different ARP firewall.
For example, the Shell ARP Firewall.
-
If you don't run Color, you can't do it.
-
I've heard this for a long time, and the ARP Personal Firewall is also very flawed:
1. It cannot guarantee that the bound gateway must be correct. If ARP spoofing has occurred in a network and someone is forging the gateway, then the ARP personal firewall will bind the wrong gateway, which is extremely risky. Even if the configuration does not default to the prompt, users who lack network knowledge may be at a loss.
2. ARP is a problem in the network, ARP can not only forge the gateway, but also intercept data, is a "double-headed monster". Doing ARP protection on personal endpoints, regardless of the gateway end, is not a complete approach in itself. The role of ARP Personal Firewall is to prevent your data from being stolen, and the entire network problems, such as disconnection, stuck, etc., ARP Personal Firewall is powerless.
As a result, ARP Personal Firewall does not provide a reliable guarantee. Most importantly, it is a measure that has nothing to do with network stability, it is personal, not networked.
Network problems must also be solved from the root of the problem, the root of the network problem lies in the computer's network card, only from the network card to do interception, do restrictions to ensure your network security stability.
Our company uses a patrol immunity gateway, which can intercept virus attacks directly from the network card, and can also monitor the Internet access status of each computer, and accurately locate and alarm if there is an abnormal situation.
-
ARP firewalls can't prevent the latest P2P?? That's all done by LAN people! Go directly to him to solve the problem Or fight poison with poison Don't think about it Rouen This is called cracking down on people who lack morality!
-
The only way to completely solve the ARP attack is the immune router and the "patrol" immune network solution of Xinquanxiang Company, because it is restricted from the network card through its own private protocol in the NAT process of the gateway, and the terminal ARP is guarded binding, locking the real gateway, plus the functions of group prevention and group control and network-wide linkage, so as to make the intranet a safe and stable network without ARP attacks!
-
In this case, you should be attacked, it is recommended that you use 360 Security Guard to open all its firewalls to prevent this attack, and at the same time use 360's Trojan Horse Detection and Killing function to scan and kill viruses all over the disk, I hope my answer is helpful to you.
-
Color shadows. Detectable.
Defense. Limited effect.
-
Because the P2P terminator achieves the purpose of spoofing by disguising itself as the MAC address of the gateway, as long as we bind the IP and MAC address of the gateway, the P2P terminator can be invalidated, thus breaking through its limitation. In the runtime, enter arp—s gateway IP address gateway MAC address, for example:
arp—s 60 183 187 254 00—0f—m3—2f—49—c2 (mac address is a 12-bit hexadecimal number).
Software such as cyber guards and cyber law enforcement officers use similar methods to P2P terminators to throttle traffic, so the same methods can be used to prevent P2P terminator attacks.
You can install 360 antivirus software to protect against P2P attacks.
-
Coloraise ARP doesn't do much for P2P terminators.
I've used color shadows and I've used P2P
-
You use P2P itself is a kind of ARP, just turn off one of them, and you can't attack and defend at the same time.
-
P2P is actually employing Trojans as a means of doing so.
-
The principle of P2P terminator is to impersonate the gateway, and other users in the LAN want to access the external network, of course, through the gateway, and now through your host, and the firewall rejects these requests, so that your network speed is fast. Don't worry, but I recommend using Jusheng Network Management Cracked Edition + Fengyun Firewall. Hope it helps.
-
Able to report: in the use of xx speed limiting software.
-
Hello friends, then you can use all the protection programs in 360 to check it, and follow the above tips to open all the programs that can be opened and those that can be disabled! Make sure your PC and the network are safe!
Historical significance. Tang.
The characteristics of this kind of handicraft, it has the characteristics of the exchange of Chinese and Western languages, this shape is a chicken head vessel, from the current research it was the Western Regions countries and even the Middle East. >>>More
In the current state, the IP on the right of the MAC's gateway is your IP address and the physical address of your machine. If it's a LAN, it's your gateway on top, "Host."'Physical address. ARP attacks are generally impersonating someone else to attack you - the attack shown ** - your gateway! >>>More
Can I get in on the router? Enter in the address bar.
The account password is generally not changed is admin (both are) my own router brand is tp-link, and the setting is to enter. >>>More
Landlord,Hello,I'm also LenovoY470,I bought it in June,And then**11GBGTA4,A comparison of cards,And some of the pictures are still transparent,Some of the pictures don't even have the floor。 >>>More
I bought Nicai i8,The quality of Nicai mobile phone is not very good,**Put it there,It must still be usable! I suspect that what they buy is not Nicai, Nicai is sold in stores and TV, and many of them are fake on the Internet....There are ...... of any Nietzsche clay colorThe ads are certainly a bit fake, but the phone isn't a brick ...... eitherIt is better than other mobile phones in the same segment ...... domestic productionI've been using my Nicai for more than a year and I fell badly, except that the headphones were broken by me and the battery was drummed, nothing was a big deal!