-
I don't know if you have used the previous version, now the latest version of P2P Terminator Edition.
First open the software, there are system settings in it (it should automatically pop up for the first time).
Please select the network card linked to the network segment to be controlled (click on the drop-down order, it is your network card), click, and then you can automatically see the following pair of data (if you have used the old version, this cannot be explained).
Let's talk about the control rules. In the system settings on the left, time plan setting - add - name - time (you want to control the small period of the network) and then control the rule setting - add - name - time (that is, the time period you just set) - uplink, downlink speed - control specific items (many, ordinary web pages, qq, msn, pplive, p2p**, etc.) and then it's OK.
The main page of the software scans the machine You can brush out a lot of machines, and then you can control it all to see who doesn't like it (right-click to make a rule for the selected machine ---just put the rule you just made).
See all the machines that are brushed out and used with you on the same road, your own machine name is the control machine, and the others can be fully controlled (just tick the front).
Uplink, the minimum downlink is 10k, and then depending on how much bandwidth you have, just control it yourself.
-
--- the lower left corner of the computer to start --- all programs---P2P installation package--- demo**--- you open it and it's OK,**will teach you,Anyone who says it,You must be difficult to accept Understand If you don't understand, you can find me +363225876
-
There's an explanation on this site, and I've used to refer to it.
-
Friend, the computer appears: [The memory cannot be written], this is a conflict between the "software" you installed and the "memory" in the computer!
1。If there is [Trojan horse or virus] interference in the computer, **"360 Security Guard" and "360 Antivirus Dual Engine Edition" or "Kingsoft Guard" and "Kingsoft Poison", it is recommended to "scan" viruses and Trojans to patch the "high-risk" and "important" [system vulnerabilities] on the computer!
2。[Suspicious Startup Item], **"360 System First Aid Kit", or open the "360 System First Aid Kit" in the 360 Security Guard, [Kill Trojan], start first aid, and restart the computer after guessing the infiltration! After booting up, [File Recovery Area], click on:
Suspicious startup items and trojans, delete files completely!
Again: [System Repair], select all, fix it now! [Network Repair] to start the repair. Restart your computer!
Kingsoft First Aid Kit], check [Extended Scan], scan immediately, after completion, deal with it immediately, and restart the computer!
3。Your "** device", or "chat software", or "Internet Explorer", or "game" [program is unstable], or "the version is too old"! It is recommended to uninstall, ** the new one, or upgrade it to the [latest version]!
Internet Explorer, and beta software are not recommended to upgrade!
4。That is, you have installed two or more similar software (such as: two ** devices, two QQ, or multiple browsers, multiple anti-virus software, multiple online games, etc.)! Together, they are [incompatible], remove the "redundant" one!
5。You can find [Force Uninstall Software on Computer] in the "Start" menu in the lower left corner of your computer, and find the excess one to uninstall! After unloading, "strong cleaning" (unload when you see it, don't unload the useful ones)! When you're done, restart your computer!
6。No more, start menu, run Big, enter cmd, press Enter, and enter [Copy] in the command prompt:
for %1 in (%windir%\system32\*.ocx) do regsvr32 /s %1
Paste, press enter, and when you're done, type:
for %1 in (%windir%\system32\*.dll) do /s %1
Enter! Until screen scrolling stops, restart your computer!
7。Restart the computer, after booting up the computer brand, press "F8", enter the "Safe Mode", and select the cursor: [Last correct setting], press Enter, Enter, and see how it works!
8。If you really can't do it: [One-click restore the system or reinstall the system]!
-
I don't have it installed right now and I've got you a copy of the information.
Generally, you can install an ARP firewall Isn't there an ARP firewall in the simple 360 guard?
Anti-P2P terminator.
P2P Terminator uses ARP sniffing and ARP spoofing methods, so the basic way to crack P2P Terminator is to use ARP attack method, which can be summarized as follows:
1.Use a VLAN
As long as your PC and P2P Terminator software are not in the same VLAN, he can't do anything about you.
2.Use a two-way IP MAC binding.
Bind the MAC address of your egress router on the PC, the P2P terminator software can't ARP spoofing you, and naturally it can't control you, but it's just the MAC of the PC bound router
It's not safe yet, because P2P terminator software can spoof routes, so the best solution is to use a PC, which binds on a two-way IP MAC on the route, that is, on the PC
Bind the MAC address of the outgoing route, bind the IP and MAC address of the PC on the route, so that the route needs to support IP MAC binding, such as the Hiper router.
3.Use IP MAC address theft + IP MAC binding.
You simply change your MAC address and IP address to the same IP and MAC as the one running the P2P terminator software, and see how he manages it, this is a lose-lose solution, and there must be some tricks in the change, otherwise it will report an IP conflict. You have to change the MAC address first, and then change the IP, so that Windows doesn't report IP conflicts (Windows is stupid))) This step is not finished, it is better that you bind the MAC address of the route on the PC, so that the P2P terminator spoofs the route in vain.
XP system: Just use the arp command to bind your own mac and route mac, such as: arp your own ip your own mac
ARP Router IP Route MAC
It's best to bind them.,I've tried.,If you only bind routes.,If there's an IP conflict, you can't go up.,Others can still t you go offline.。 If you bind yourself, you can also access the Internet even if the IP conflicts.
9x 2000 will require software.
However, I have installed this software on the XP system, and I can clearly see who wants to take you offline or want to restrict you.
It is recommended to replace the XP
As long as the above is set, the P2P terminator is scrapped, and the XP system enters in the cmd state: arp -a
If the last state of the routing IP address and its own IP address is static, then the binding is successful.
arp -d
It's also a good idea to enter it before binding and delete the illegal binding.
P2P is the abbreviation of peer-to-peer (peer-to-peer), also known as "peer-to-peer". "Peer-to-peer" technology is a new technology in the network that relies on the computing power and bandwidth of the participants in the network, rather than clustering the dependencies on a small number of servers. P2P is also the abbreviation of Point to Point in English. >>>More
Personally, I think it's reliable and safe. There are three reasons for this >>>More
In investment and financial management, security should come first, and it is particularly important to choose a safe and reliable platform. For P2P newcomers, it is best to comprehensively choose a platform based on factors such as platform qualifications, platform background, risk control, income scope, and fund custody. In addition, it is better to diversify your investments, and you can choose several good platforms to diversify your investments and reduce your risk. >>>More
Huawei mobile phones come with a "service" app, find a nearby service store, go directly to the Huawei after-sales service center of the first class, let professional personnel test it for you, and they will give you a solution. >>>More
1。Check that the speaker jack is correct! Insert the green one! >>>More