-
2.To determine where the other party is surfing the Internet, open a DOS window and type tracert The information reflected in lines 4 and 5 is the location of the other party's Internet access. 3.
To get the name of the other computer, open a dos window and type nbtstat -a The first line is the name of the other computer, the second line is the working group of the other computer, and the third line is the description of the other computer. 4There is a file name in the windows directory, rename it to lmhosts, delete its contents, and write the other party's IP and computer name into the file in the following format: Computer name 5
Open the dos window and type nbtstat -r 6Enter the name of the other party's computer in Start-Find-Computer, and click on the other computer. Please do not use the above methods indiscriminately, I am not responsible for the trouble you cause by using the above methods, please be cautious.
The best way to deal with the attacks above is to hide your IP address.
-
Simple ha,I'm also a rookie,You use a port scanning software,Search on the Internet,There are a lot,Fill in the IP,Analyze the port of this IP host,If you open 3389, log in with the 3389 login,Use the account administrator password to log in,Or the account is new The password is empty to try,If you don't open 3389,Open 23,445You can use telnet IP for DOS invasion。
-
If you just want to see QQ's chat history, there is a QQ chat history viewer or QQ offline login on the Internet.
-
Tools Raw materials: computer, win10 system.
Through the IP address of the computer, one computer can be used remotely from the other computer, and the two computer rock molds must be in the same local area network.
Here's how to set it up remotely:
1. On the desktop of the computer being remotely controlled, right-click "My Sun Bureau's Computer", click "Properties", and then click "Remote Settings".
2. After that, a window pops up, click "Allow remote connection to this computer", click OK.
3. In the lower left corner of the computer settings--account-login option, set a password for this computer account, and use it when you connect to this computer remotely.
4. In the network icon in the lower right corner of the computer, find the network sharing center, open the network connection, and double-click the left mouse button in "Ethernet" to open the details, and find the IP address of the computer.
5. In the case of ensuring that the two computers are the same LAN, the controlling computer opens the "Run" in the lower left corner of the computer and enters the "mstsc" command.
6. Next, a small window will pop up, enter the IP address of the computer on which the IP is controlled.
7. Finally, enter the password of the controlled end and the set one, and you can remotely enter the desktop of the computer of the controlled end through IP to achieve remote control. <>
-
1. According to 360 or other similar firewalls or security guards, enter the security protection center LAN protection, turn on or enable, prohibit ping and other operations.
2. If you are not at ease, you can change the IP address, generally like the LAN can change the value behind the IP address; Broadband virtual dial-up Internet access is also a dynamically assigned IP address, which is not fixed.
3. You can also turn off "Remote Assistance" through the "Properties" of "My Computer".
4. Set the password for computer login, it is best to set the password of the highest user of the system "administrator", and set the password of "guest". Delete the rest that you don't use.
-
Install a firewall. For example, Kingsoft ARP, Kingsoft Net Dart, Kingsoft Net Shield. There is a free version of it.
Kaspersky (built-in firewall; It is recommended that you pay after installation and become the official version; Very powerful).
In addition, the so-called hacker is a scare, at most a rookie who understands some cracking techniques and can operate several remote attack software. Kaspersky's firewall can't be breached. A real hacker doesn't have the time at all, and he doesn't care about ordinary netizens, unless you are a celebrity, or a core member of a super company, or you are a hacker yourself.
A real hacker, without saying anything, directly locates your IP, takes advantage of the loophole in the firewall to come in, remotely controls your computer, or takes away the data he wants, or directly crashes your system.
-
Are you the kind of person who swears on the Internet, and if so, then you deserve it. If not, then what are you afraid of, and what can not be done to you.
-
1.He should use QQ to show IP, you can see which IP you use, where, etc., this doesn't mean anything, don't be afraid first.
2.The easiest thing is to don't plug in the network cable, he can't attack you or anything, but this is not realistic You always have to go online, don't accept files and ** casually.
3.Patch your system and install anti-virus software This is important, and it's basically fine. Add a password to the username of the computer login, close the guest user, and change the password of the administrator.
Add complexity to passwords, such as punctuation, capitalization, numbers, etc.
-
1. Click Start-Run, enter the IP here to represent the computer sharing the file).
2. After you are sure, you can share all the shared content on the computer, and you can directly access the computer, as shown in the figure below.
-
To do this, click Start > Run> Enter IP
For example, the computer you want to access has an IP address.
Just enter"\\"Just press enter.
-
Method 1: Press the key combination win+r
2. Enter the IP address in the Occurrence Amount dialog box.
3. Hit enter
Method 2: 1. Press the key combination win+e
2. Turn on the computer and enter the IP address in the address bar.
3. Hit enter
Method 3: 1. Double-click to open the browser.
2. Enter the IP address in the address bar of your browser.
3. Hit enter
-
Enter the IP in Run (Windows Logo Button + R), or enter the IP in the address bar of your browser, My Computer, or Internet Neighbors, and press Enter.
-
Turn off the firewall, and in Start-Run-Enter " and the IP address of the host you want to access.
-
Enter the IP address in the Start Run section.
To be precise, it's not one computer and one IP.
It should be related to the network card, if your computer motherboard is connected to two network cards, then, when the two network cards are connected, the computer should be two IPs. >>>More
Everyone's requirements are different, the accessories selected are also different, at least the CPU selection is very different, the average person can use Intel, stable, more power-saving, like to play games, especially 3D games, generally choose AMD, now choose 4800+ dual-core boxed cost-effective, the motherboard according to their own funds as much as possible to choose a good point, large factory large board type, hard disk on the top 160G7200 rpm, memory general Kingston DDR2 677 1G 1G 1 or 2, There are many types of graphics cards to choose from depending on whether to play large games, generally 7300GT is enough, otherwise it is 8600 or even higher, optical drive is generally *** or *** burning, the chassis depends on the preferences, the power supply is selected, 400W or so, the monitor is based on funds, it is recommended to 19 widescreen LCD, the mouse and keyboard are used according to the habits, the speaker is generally selected Edifier, the medium one is good CPU AMD Athlon64 X2 4400+ AM2 (65nm box) 420 Motherboard ASUS M2N-SLI 699 Memory Kingston 2GB DDR2 667 255 HDD Seagate 160G 8M(Serial Port 5 Years Box) 355 Graphics Card Colorful Yicai 8600GT-GD2 CF**Edition 512M 699 Optical Drive Taipower Goddess Health Series 18x***-ROM 159 LCD Samsung 943nw 1599 Chassis Jinhetian Hurricane II 8197 225 Power Supply Huntkey Wide King 2 Generation (Version) 328 Total amount: 4739 yuan. >>>More
Generally, this IP address refers to the IP address assigned to you by the operator, if it is a computer connected to broadband Internet access, this computer has an IP address, but if it is a router to share the Internet with multiple computers, then the multiple computers have only one public IP address.
Stand-alone games are not interesting, right, online games, and the configuration of the deluxe point is E8400 9800GTX+ 250GB hard disk. >>>More
CPU: Intel Core 2 Duo E7400 (Box) 760 yuan.
Motherboard: Spartak Kuroshio BI-500 memory only supports 667 and 800 499 yuan. >>>More