What are the functions of Longhorn Network Monitor?

Updated on technology 2024-04-04
2 answers
  1. Anonymous users2024-02-07

    Running the main program of the network law enforcement officer on any machine in the LAN can penetrate the firewall, monitor and record the online status of the entire LAN users in real time, limit the IP and time period used by each user when going online, and kick illegal users off the LAN. The software is suitable for LAN administrators because it cannot monitor or manage machines outside the gateway or router.

    In the network enforcement officer, if you want to restrict a machine from accessing the Internet, you only need to click "Permissions" in the "NIC" menu, select the specified NIC number, or click the row where the NIC is located in the user list, and select "Permissions" from the right-click menu to restrict the user's permissions. For unregistered NICs, you can limit the NIC from going online as follows: Set all known users (registered) and change the default permission of the NIC to Prohibit NIC to prevent all unknown NICs from going online.

    The principle is to send a fake gateway IP address to the attacked computer through ARP spoofing, so that it cannot find the real MAC address of the gateway, so that it can be forbidden to surf the Internet.

    1. Check the machine traffic: For the client within the scope of the network law enforcement officer's monitoring, in the main interface, click the client's network card, and then check the "machine status" to see the machine's traffic. Like the Sniffer software, the Cyber Enforcement Officer can view the data traffic of the clients in the network, but the Cyber Enforcement Officer is not as convenient and intuitive as the Sniffer traffic display.

    2. Intelligent monitoring: After running the network law enforcement officer software, you can restrict some machines from accessing the Internet through the "permission" in the "network card" menu, which is easy to be used by troublemakers to sabotage. After the cyber enforcement software is installed and run on the machine, the machine icon is red in the cyber enforcement software, and other normal machines are light green (as shown in Figure 3).

    Red indicates that the machine is in cyber promiscuity mode, which makes it easy to find the machine running the cyber enforcer's software, so that the saboteur can be found. However, when monitoring manually, we must pay attention to the fact that our machine is also installed with the network law enforcement officer software, and the machine is also in network chaos mode, so don't clear yourself out.

    If a troublemaker is found in the network, the Cyber Enforcement Officer's monitoring function will automatically alert you. The "Security" option can be found in the Cyber Enforcement Officer's "Settings" menu, setting the IP of the management machine, and the machine will automatically sound when there is a saboteur in the network. This intelligent monitoring function greatly facilitates the monitoring of some troublemakers who use cyber law enforcement officers.

  2. Anonymous users2024-02-06

    Then you go to Dott to get the next anti-P2P terminator, you have to install the horns on the server, install the server, and install the client on your computer to achieve monitoring!

Related questions
4 answers2024-04-04

1. Collaborative business.

Collaboration refers to the full integration of logistics and information flow. The establishment of the enterprise financial network system provides favorable conditions for collaborative business, and fundamentally promotes the coordination of finance and business, including collaboration with internal business, such as online procurement, online sales, online attendance, etc. In this business process, the required financial information is sent to the financial system for processing, storage and processing, and the relevant data generated is sent to the business department, so as to ensure that the financial and business collaboration is carried out. >>>More

9 answers2024-04-04

What are the functions of human bones?

3 answers2024-04-04

1. Camera continuous shooting: Open the camera app of Apple 7, then select the photo mode, and press the shutter button to complete continuous shooting. Note that the Apple 7 does not have a portrait camera, because its rear is a single camera, and only the Apple 7plus is a dual camera. >>>More

7 answers2024-04-04

Lighting: life (street lamp), study (desk lamp), room lighting (incandescent lamp), carry lamps (flashlights) to beautify the environment: such as neon lights, landscape lights. >>>More

8 answers2024-04-04

Active Directory is a directory service for Windows Standard Server, Windows Enterprise Server, and Windows Datacenter Server. Active Directory services are one of the central components of the Windows Server 2000 operating system platform. >>>More