20 50 How to get into someone else s computer in a branch

Updated on society 2024-04-03
28 answers
  1. Anonymous users2024-02-07

    The most simple and primitive, you can open him through the online neighbor on your computer, you will see all the computers in your company's local area network, you look for the IP of the machine you want to see, if he does not set a user password, you can see what you want, I suggest that you still set a user login password for your computer, in that case, people have to work hard to see the things on your computer, and those who don't understand the computer will never see the things on your computer.

  2. Anonymous users2024-02-06

    1. Pretend to go to someone else's computer to use the computer.

    2. Set the hard disks C, D, E, and F of other people's computers to be shared, and merge them"Can be modified"

    3. "Right-click" on someone else's computer to view the name of their computer.

  3. Anonymous users2024-02-05

    You can be taught not to be looked at by others.

    First: Make your computer password more complicated.

    Second: Turn off all default sharing.

    Third: Turn off the Sever service in the service.

    It should be difficult for others to see your profile.

  4. Anonymous users2024-02-04

    I don't tell you if I know.

    This kind of thing is not worth advocating.

  5. Anonymous users2024-02-03

    The good ones don't teach, and all the bad ones are handed over to you ...

    Don't get something that someone sends you.

    Like the people above said to do well, it should be almost...

  6. Anonymous users2024-02-02

    It may be that your computer has default sharing turned on.

  7. Anonymous users2024-02-01

    If you want to copy the resources on other computers, you can use the following methods: share the data you want to copy, open the guest account of this computer, and then run it on your own computer: The other party's IP, for example. Then you can go to the other person's computer and copy the file.

  8. Anonymous users2024-01-31

    With a trojan, remote control, to radmin huigezi on the rise ancient these are OK.

  9. Anonymous users2024-01-30

    2.Log in to the client with an account that has been verified by email, and you will see a page that displays a 6-digit connection**.

    3.Have the customer (controlled party) log in** and enter the 6-digit connection** as told by the customer service (controlling party). Remote connectivity is possible.

    Customers do not need to pre-install the client software, which is very convenient and easy to operate. This 6-digit ** is a one-time and will show a different ** every time, which is very safe.

    4.Provide remote assistance to others with mouse and keyboard control, drawing presentation, file transfer, chat and more.

    Request a free trial today.

  10. Anonymous users2024-01-29

    Borrow flowers to offer Buddha.,Try it (this is the first thing to set up open remote control permissions on other people's computers):

  11. Anonymous users2024-01-28

    You can use QQ to display IP software. It takes a lot to invade someone. For example: Port 3389 intrusion. Or with remote monitoring software and the like, which is a very esoteric subject. You need to go to study before you can use it.

  12. Anonymous users2024-01-27

    Ask them to give you access to your computer.

    After clicking Run, a rectangular input window will pop up, we fill in [cmd] into the input box, and press confirm.

    At this time, a black window will pop up, we type [ipconfig all] in this window and click the [entel] enter key on the keyboard to confirm.

    We find the name [IPv4 Address], and after it is the IP address of the machine.

  13. Anonymous users2024-01-26

    There are two reasons** have been turned off, and then your computer or router has been blocked, you can tell me what yours is**, I will introduce you to the same.

  14. Anonymous users2024-01-25

    Replace com with hk or tw suffix.

  15. Anonymous users2024-01-24

    Put the back one. com for it. HK or. TW or something like that.

  16. Anonymous users2024-01-23

    Bounty points You help someone solve a problem and someone else pays you.

  17. Anonymous users2024-01-22

    20 points, plus different bounty points, it is possible.

  18. Anonymous users2024-01-21

    I don't know, you can give it a rating.

  19. Anonymous users2024-01-20

    Method steps.

    1 9 Step by Step Reading.

    Connect your laptop and computer at home to the same router.

    2 9 (1) Share intranet access files.

    Find the folder that needs to be accessed over the private network, right-click and select the Properties option.

    3 9 In the Folder Properties window, select the Share tab.

    4 9 In the Share tab, select Advanced Sharing Options.

    5 9 Select the Share this folder option, you can change the folder in the share nameIn the 6 9 permission option to display in the intranet, you can select the permission of other computers in the intranet to access the folder.

    7 9 (2) Access other computers on the intranet.

    Turn on any computer and double-click the network icon on the desktop.

    8 9 In the network window that opens, select the network option and you can see all the computers in the intranet.

    9 9 Double-click the computer you want to access, and you can access the folder shared on the intranet.

  20. Anonymous users2024-01-19

    Unable to connect.

    In this case, if you want to access the company's intranet, you must open remote VPN access permissions by the company's operation and maintenance personnel, and then you can access the company's intranet through a VPN from a private computer.

    If it is remotely connected to the company's intranet through QQ, etc., then this can only be regarded as a "public network", not an intranet in the actual sense.

  21. Anonymous users2024-01-18

    If it's a legitimate way, the software you said should have a username and login password, similar to enterprise management software, this kind of software has a user management page, there will be an option to restrict login after your login, generally remove the restriction login, you will be allowed to log in externally, otherwise you can't. If the above methods can't be realized, you need an IP conversion software, which is similar to **, this software will convert your real IP into your company's internal IP, that is to say, it is the dynamic IP of the same network segment, so that you can log in.

  22. Anonymous users2024-01-17

    There are n situations, provided that you are indeed the right way, you can use the formula of the computer, then install a remote control software on the company's computer, this is the most direct way!

  23. Anonymous users2024-01-16

    Be careful, don't get the company computer poisoned,,, otherwise the network administrator will find out what bad things you have done.

  24. Anonymous users2024-01-15

    It may be that someone else is not sharing, so you can't see it, and if someone else is sharing it, you can definitely see it. Right-click on "My Computer" - Properties - Remote - to allow users to remotely connect to this computer and click on the checkmark, other people's computers do not click on this item, you will definitely not see it, try it!

  25. Anonymous users2024-01-14

    Try this and save it all. bat document to try it.

    echo off

    color 1b

    title Enable LAN sharing.

    echo.echo.Description.

    echo --

    echo 1, allow SAM accounts and shared anonymous enumerations (allowed by the original system, disabled by this system).

    echo 2, if the password of the local account is empty, other machines are allowed to access the machine.

    Echo 3, Windows Firewall: Allows file and printer sharing.

    echo 4. Sharing method: local user guest authentication.

    echo 5, guest account: Enabled.

    echo.echo uses this sharing method, so that other devices can access the machine without having to enter a username and password. Take, for example, the family.

    Echo LAN, each other can be trusted, please use this way.

    echo.No matter which sharing method is used, sharing is only convenient for internal use, and when you use a router to surf the Internet, the Echo external network cannot access your machine, so you don't have to worry about being invaded if you share it. All you need to remember is stand-alone dialing.

    When your Echo surfs the Internet, don't turn on sharing.

    echo --

    pauseregedit s to enable LAN sharing (access to the machine can be entered without authentication).reg

    net user guest /active:yes

    cls echo.

    echo --

    The echo operation is complete.

    Echo Note: The unit will not take effect until it is restarted.

    echo.The default sharing for partitions of the Echo drive is still not turned on. If you need to open it, echo Please go to this directory to find the registry file and double-click to import it.

    echo --

    echo.echo Troubleshooting Supplement:

    echo If you shared a folder when you previously shared it as "local user authenticates to yourself", echo now changes to guest authentication and then accesses the folder, and the error pops up: "Inaccessible, you."

    Echo does not have permission to use network resources. The workaround is to cancel the original shared properties of the folder, and then again.

    echo times to share, and that's it.

    echo --

    pause

  26. Anonymous users2024-01-13

    If it is an antivirus software, the upgraded firewall may cause some files to be blocked by default, first see if all users' guest is disabled by default, and then try to debug the firewall after viewing all computers in the domain network!

  27. Anonymous users2024-01-12

    How many computers do you have on your LAN? Is there a server? You'll have to explain.

  28. Anonymous users2024-01-11

    If you add 50 points, then it's free.,The first way is to go directly to the network administrator and say that you have some files or something on that machine, please open and share.。 The second is to use software to break the limitations, but only at a certain level.

Related questions
7 answers2024-04-03

Both are well-known in the industry. Pulian has done a good job in marketing, and Gongjin has a relatively complete talent training system and pays attention to the value of talents, but it is not fully reflected through marketing. Like a school recruitment, the design of Pulian is obviously taller than Gongjin, but it does not mean that Gongjin is bad, maybe because of different focuses.

7 answers2024-04-03

Construction industry, academic qualifications are mainly used for evaluation titles, what you learn in school is just the basics, you can learn Chinese to enter the China Railway shows that it is very dramatic, you must have confidence in yourself, there is a certain theoretical basis for graduation from architecture majors, some practical things are easier to get started, school learning is teacher-guided learning, and the growth in work is to be good at thinking and comparing. So even if it's not a major, read a little book, it is recommended to take a look at the 03g book, understand the drawings, understand some mandatory specifications, and there is no problem.

7 answers2024-04-03

There are 7 points, 6 points, and it is best to have 7 points of delicious points, and you can directly check the Internet.

6 answers2024-04-03

Don't get into this kind of company. I have a little advice.

10 answers2024-04-03

Xuzhou's has run away. Don't choose.