How to solve the problem of an attack on an emergency computer? I m dying

Updated on healthy 2024-04-05
16 answers
  1. Anonymous users2024-02-07

    Hide your IP with **.

  2. Anonymous users2024-02-06

    There is no complete solution to the problem of ARP spoofing, and there is no company in the world that has a complete solution, which is the same as DDoS attacks! There are only temporary solutions.

    Solution 1: Find a tool to hide data packets on the Internet and search for it yourself, but it is generally in English or pirated, and the antivirus software will default to the virus! See for yourself!

    Regular ones can use 360 security guards, which have their own ARP firewalls, as well as Rising firewalls, and Skynet firewalls.

    Solution 2: Bind your own IP address and MAC address.

    Enter arp -a

    Then you can see the IP and MAC

    Then enter the ARP IP address and MAC address.

    Basically, the IP is bound

    Remember to manually set the IP on the campus network

    I want to believe that you are a smart person, and you should go to the library to find relevant materials yourself! Hehe, let's go to the library and read books for two days! ^_

  3. Anonymous users2024-02-05

    Use antiarp this firewall.

    The MAC address of 4 is 0022aa0022aa).

    2) Write a batch file with the following contents:

    echo off

    arp -d

    arp -s 00-22-aa-00-22-aa: Change the gateway IP address and MAC address in the file to your own gateway IP address and MAC address.

    Drag this batch software into "Windows--Start--Program--Start".

  4. Anonymous users2024-02-04

    If the computer technology is good, catch it back and kill the other party, which is the most ruthless.

    If the computer technology is not good, it is easiest to transfer through the route. (Although it can be broken if the other party is very powerful, but it is enough to deal with attack software and small hackers).

  5. Anonymous users2024-02-03

    The best way is to modify the physical address of the network card, this deception virus seems to be able to remember the network card address, as long as it has been hit, it will always be there in the future, and I have seen it in school before.

  6. Anonymous users2024-02-02

    It's so serious, it's okay not to go online these days.

  7. Anonymous users2024-02-01

    Try Rising Firewall 2008's ARP Spoofing Defense.

  8. Anonymous users2024-01-31

    Willing to spend some money to buy a hardware firewall!! If you don't want to spend money, reinstall the IP!

  9. Anonymous users2024-01-30

    LAN is not something you can do alone.

    If you find a school network administrator, you must have other people's machines clean.

    You prevented it, but the virus was not cleared, and it still didn't work.

    Maybe you won't be disconnected, but it's just as fast.

  10. Anonymous users2024-01-29

    It's a bit difficult, check which IP often appears, and then block his IP and prohibit him from accessing you. A lot of software has this feature.

  11. Anonymous users2024-01-28

    Is it because someone inside you has been poisoned, so you will keep arp attacks! Current protection methods for individual users:

    First of all, it should be clear that ARP attacks can only be carried out within the local area network, and home users without a router do not need to consider it.

    1.Install the ARP firewall.

    Nowadays, most of the security slide assistance software has a built-in ARP firewall, the famous one is 360 Security Guard (built-in).

    2.Install anti-virus software.

    Antivirus software such as 360 can effectively prevent ARP viruses from entering the machine.

    3.How to deal with poisoning that has already been poisoned.

    Because the network speed will slow down after poisoning, the killing software will fail. The system should be protected with antivirus software installed after a special antivirus.

  12. Anonymous users2024-01-27

    1. It may not be a network attack, it may just be a virus Trojan horse. The easiest way is to disconnect from the network, then redo the system, format the hard drive, whether it is a virus or a Trojan horse, there is nowhere to hide. You're not a leader, there's no reason, and people will attack you.

    The possibility of being hacked is very small for the average person.

    2. Network congestion and packet drop may be due to the unobstructed line, check the data transmission of the network cable and interface, and swap the interface and network cable to see the problem. If it is a wireless router, it is recommended to change the password or use a wired router, because the wireless route is easily stolen by neighbors and causes network congestion.

    3. It's okay to use Rising Rising, Kaba or Norton is not popular in China.

    4. The ARP LAN protection prompt can be turned off, which is too annoying to turn on. If someone really wants to invade you, you can do it like someone else, and there is no impermeable wall. Firewalls are not necessary for home computers, antivirus software is the key.

    5. Check the heat dissipation of the host, the hardware problem of the calculator can also lead to the network is not smooth.

  13. Anonymous users2024-01-26

    Let's reset the network and router.

  14. Anonymous users2024-01-25

    Due to the various ways of transmission of computer viruses, and usually have a certain degree of concealment, first of all, we should improve the awareness of computer virus prevention, and pay attention to the following points in the process of using computers:

    First; Try not to use pirated or unknown software.

    Second; Back up hard drive pilots and master boot sector data, and back up important data frequently.

    Third; Develop a good habit of frequently using anti-virus software to destroy the base and check the hard disk and every foreign disk.

    Fourth; Antivirus software should be updated regularly, preferably at intervals of no more than a week.

    Fifth; Real-time monitoring antivirus software is installed, but it's not a one-and-done solution, as antivirus software doesn't work against all viruses, and viruses update quickly.

    Sixth; Pay attention to all kinds of abnormal phenomena on the computer at any time, and once found, you should immediately check it carefully with antivirus software. Antivirus software is an effective tool to prevent virus infection, and you should try to have as many sets of antivirus software as possible, because each antivirus software has its own characteristics.

    Seventh; Some viruses are transmitted primarily through e-mail and are known as "mail viruses". They are usually spread through the method of "attachment" in the email, and if you run the virus program in the attachment, you will infect your front computer. So, don't easily open the attached file in a letter from a stranger.

    It is recommended that you better kill the virus in safe mode, when restarting the computer, press and hold F8 to enter the safe mode of the computer, the following is the free version, pay attention to upgrade the virus database of the antivirus software in time.

    Defendio

    Added detection and killing of a large number of new threats, which can quickly kill Trojan software, Chinese Simplified Green Free Edition.

    Trojan Killer 2008 build 0801

    Trojan Killer is an anti-hacker killing Trojan tool, which can detect and kill 8122 kinds of international Trojans, 1053 kinds of password stealing Trojans, guaranteed to detect and kill legendary password stealing Trojans, OICQ parasitic Trojans, glacial file association Trojans, password solvators, miracle shooters and other game password mailing Trojans, built-in Trojan firewalls, any fiber liquid and any hacker program tries to send password emails, all need iparmor confirmation, not only can kill Trojans, but also can reverse check hacker passwords.

  15. Anonymous users2024-01-24

    It's okay to turn off the Tihuai Town Dispatch.,Only the antivirus software with garbage will shout there:"I helped you intercept an attack.,I helped you intercept an attack.,I helped you intercept a lead attack" It seems that some attacks are very remarkable.,It's the IP of the local IIS how can it attack,,Strange,

  16. Anonymous users2024-01-23

    The silver upstairs is all Xiaobai's attack in Jinshan Net Dart shows that your network is unstable When you try to connect with the front laugh, it will appear You can ignore it, but if it appears often, it may be a virus.

Related questions
11 answers2024-04-05

Something is wrong with the system!

It is recommended to reinstall the system: buy a system disk, insert the disk after booting, and then restart the computer, the interface of the system disk will be displayed on the computer screen, choose to install the system directly into the first partition (C disk), wait for 10 minutes, and install it. >>>More

15 answers2024-04-05

As long as you turn on the automatic update, there is no system vulnerability, do not access the malicious**, do not mess up the mess, hackers also take you every way, hacking also has to have vulnerabilities in your computer, the computer is slow, it may be that there is too much garbage in your computer, clean it up with 360, it will work, and it is necessary to reinstall the system after a long time.

7 answers2024-04-05

ARP Power Strike. It is a LAN attack. ARP spoofing attack launched by poisoning any computer in the first LAN. >>>More

8 answers2024-04-05

You add my mailbox, and I'll send you a good firewall, which is free forever. >>>More

5 answers2024-04-05

For users who dial-up to the Internet and do not have firewalls and anti-virus software, what happens when the Internet is hacked? What are the consequences? Is it possible that hackers can no longer monitor the computer after it goes offline? >>>More