Why did I use the Color Shadow Firewall and others could still control my internet speed?

Updated on technology 2024-04-17
19 answers
  1. Anonymous users2024-02-07

    Can I get in on the router? Enter in the address bar.

    The account password is generally not changed is admin (both are) my own router brand is tp-link, and the setting is to enter.

    Router settings, point security settings, put there in MAC address filtering.

    Fill in that guy's MAC address, filter out his MAC address, can't access the Internet, it's equivalent to disconnecting his network cable! I'll put him when I'm happy enough.

    The MAC address is removed if your router address password account is changed.

    Or something, press the reset button of the router for about five seconds, and recess it a little.

    that, which will revert to the default settings. Hope it helps.

    This advantage lies in the fake sex that puts him on the network cable. But his computer didn't show that the network cable was disconnected.

  2. Anonymous users2024-02-06

    Turn on the ARP monitoring function to see who got you, and you can prevent attacks.

  3. Anonymous users2024-02-05

    It can only be that the machine will not be attacked by ARP, if the other party attacks the gateway, and the gateway is not released, it will still be affected.

  4. Anonymous users2024-02-04

    Due to the precautionary principle, the two will conflict, and it is recommended that LZ uninstall 360

  5. Anonymous users2024-02-03

    Hello!

    First of all, the firewall is only used to filter the information connection between the local computer and the external network, and cannot avoid the traffic control of the Jusheng network management

    It's the most reliable method I've ever used, and I haven't tried many other tricks, but none of them will be reliable.

    Good luck!

  6. Anonymous users2024-02-02

    With a 360 firewall, the PAR attack inside.

  7. Anonymous users2024-02-01

    ...Internet scissor hands, so that he can't get on the Internet Hehe (don't blame me for his life).

  8. Anonymous users2024-01-31

    It doesn't have to be the rate limit done on the route.

    You try it this way, and look at the speed if only your computer is connected to the network. If the speed is still limited, it means that it is limited by the network itself, which may be on the route or a dedicated AC management device.

    Routing rate limiting generally has a page such as Network Management Bandwidth Control, go in to see if your IP is within the managed range.

    If the speed is normal at this time, then it means that there is a network management in the form of ARP spoofing in the LAN, and try to do an ip-MAC binding, which should be able to recover.

  9. Anonymous users2024-01-30

    Actually, it's hard to answer this one, but to put it simply, you can refer to it, there are many software to control the Internet speed. It can also be done when a router. Some companies are on behavior management software.

    Even if you get into the router, it won't work. Unless the network administrator enters the server to make changes. If it is controlled by a router as said.

    Of course, there are options. Find out.

  10. Anonymous users2024-01-29

    There are two types of rate limiting, one is to limit the speed of the router's port. One is to throttle the IP address. If it is the first type, it is useful to change the line. The second one is useless, and you need to change the IP.

    It is recommended to go to someone else's computer to see if the Internet speed is faster than your own. You will know if you are subject to a speed limit.

  11. Anonymous users2024-01-28

    It is recommended that you use an ARP firewall.

    We used it in the dormitory, and it worked very well.

    If you are attacked, you can know it, and it is basically effectively stopped.

    360 Security Guard has an ARP firewall.

    In addition, there is a firewall called ARP Firewall, which is also used by many people.

  12. Anonymous users2024-01-27

    The first floor is right, a physical gateway speed limit, a virtual gateway speed limit, if it is a virtual gateway speed limit, like a P2P terminator, Jusheng network management! It works with ARP firewall, if it is a physical gateway speed limit, it is useless, you have to go into the router settings to change! There is also a switch port speed limit, there are only a few of you, and it is estimated that it is not a large switch, so it will not be a switch speed limit!

  13. Anonymous users2024-01-26

    It's the person who uses a router with you, right, you don't want the other party to use this router, if not, you can pull the network cable from the new one yourself, so convenient, if it's still inconvenient, then can you log in to the router you use? If you can log in, you can change the settings inside, but if you can't log in to the router, then there is no way.

  14. Anonymous users2024-01-25

    I think the router is definitely not in your house, don't play, all day long, you fix me, I fix you, it's boring, go to the router to see where the output network cable is, cut it out, can't tell the difference, just cut off Liu's own one, or cut the broadband of the ** business, everyone rests together, and then pull one yourself.

  15. Anonymous users2024-01-24

    Well, there's a broadband connection at the bottom right, right-click, and you can fix it at the point.

  16. Anonymous users2024-01-23

    There is no such software at the moment, but it is recommended that you use P2P to directly control the speed of other people's Internet speeds, hehe.

  17. Anonymous users2024-01-22

    Are you using routing? That means there is nothing that can be done. Unless you restrict someone else's on the route yourself. Or talk to him. It's all routed, and it's too cheap for that person to restrict you!

  18. Anonymous users2024-01-21

    I sent you the truth in the form of a message.

    I used to be just like you.

    Now he's off the internet.

  19. Anonymous users2024-01-20

    No, it prevents software like P2P terminators from attacking your network.

Related questions
9 answers2024-04-17

Historical significance. Tang.

The characteristics of this kind of handicraft, it has the characteristics of the exchange of Chinese and Western languages, this shape is a chicken head vessel, from the current research it was the Western Regions countries and even the Middle East. >>>More

23 answers2024-04-17

When transporting the refrigerator, lifting upside down or tilting excessively, the lubricating oil will flow into the refrigeration system above the compressor and motor, which will hinder the circulation of Freon in the refrigeration system and affect the normal operation of the refrigeration system. Another point is that if the refrigerator is placed upside down, it will cause the decoupling of the shock absorbing spring in the compressor, and the refrigerator will not be able to operate normally. >>>More

10 answers2024-04-17

This is the background evaluation that can be used if the conditions are met1You just do your best, and you will open it if you meet the conditions, add more Alipay friends with high credit, submit more complete information, and it is best to submit a credit card. 2. >>>More

5 answers2024-04-17

It may be that your network line is not in good condition! There is a phenomenon of disconnection, forming a network of suspended animation! It is recommended to correct the error corresponding time! Or increase the network buffering time! Hope it helps! This type of death is called suspended animation.

15 answers2024-04-17

Isn't the footprint unbearable? Try the following and see again: >>>More