Your system is under ARP attack

Updated on technology 2024-05-25
8 answers
  1. Anonymous users2024-02-11

    360ARP Firewall is officially released.

    Version: Size: 195k

    360ARP Firewall Product Introduction.

    Friendly reminder: If you are not a LAN user, it is recommended not to use the software. At the same time, the official version of 360ARP firewall needs to be used with 360 Security Guard and above.

    360ARP Firewall is completely free to use, and the official version of 360ARP Firewall has included all the features of other similar paid ARP firewalls on the market today.

    1. The kernel layer intercepts local and external ARP attacks in both directions, and detects and kills ARP Trojans in a timely manner.

    Directly intercept all local and external ARP attacks at the system kernel layer, and provide accurate tracking and timely detection and killing of local ARP Trojan viruses to maintain the network.

    Smooth network and secure communication. With kernel interception technology, the running speed of the machine is not affected in any way.

    2. Accurately track the IP address of the attack source, so that the network management can query the attack source in time.

    After an external ARP attack is intercepted, you can use the Trace IP address on the interception page to accurately locate the attack source in the LAN, so that the NMS can query it in a timely manner.

    Attack sources within the LAN to solve problems in a timely manner.

    3. Intercept DNS spoofing, gateway spoofing, IP conflict and other attacks.

    On the basis of the previous version, it adds the interception of DNS spoofing, IP conflict attacks and other forms of attacks, multi-directional interception, and comprehensively solves the frequent problems in the LAN.

    Disconnection issues. 4. The local process whitelist can be customized.

    Dial-up clients can log in to the LAN and customize the process whitelist, which is more secure.

    5. You can choose whether to prompt or not, which is convenient for Internet café users.

    It's up to you whether to display the blocking notification, which is designed for Internet café users, and automatically blocks ARP attacks without interruption, allowing you to surf the Internet safely and without interruption.

    6. New interface, new feeling.

    A new interface with a fresh and unified style with 360 Security Guard.

  2. Anonymous users2024-02-10

    If it is displayed, it proves that it has been stopped.

    Don't be afraid. However, there are so many ARP Trojans, there is a problem with the firewall.

    Go for 360 Security Guard and 360 Security Deposit Box, and turn on all the protections, so that the 360ARP Firewall will be automatically enabled, which is very useful.

    In addition, patching with 360 and filling the system vulnerabilities should solve the problem.

  3. Anonymous users2024-02-09

    I have also been attacked n times.

    I have a 360 Qihoo with ARP interception. But people use very powerful software to keep attacking, and 360 has no choice.

    Hehe, if someone attacks you again, just pull out the network cable. Unless people keep looking at you, you can just unplug the cable. It's better to install a piece of software, see who attacks you, and go straight to the house to find him.

  4. Anonymous users2024-02-08

    It's okay, you know it all, what to be afraid of.

    He attacked to death, didn't you stop it, what are you afraid of, if his attack is effective, you can still surf the Internet. It's okay.

  5. Anonymous users2024-02-07

    ARP attack is an attack technique against Ethernet Address Resolution Protocol (ARP). This type of attack allows an attacker to obtain data packets on a LAN and even tamper with them, and can make it impossible for a specific computer or all computers on the network to connect properly. You install a 360 security guard, the ARP firewall of the 360 Trojan protection wall is very powerful, it can effectively prevent ARP attacks, this default is off, you open it yourself, it's on the line, it's very effective, I wish you a successful solution.

  6. Anonymous users2024-02-06

    Install a Trojan firewall such as 360, there will be the other party's MAC, address and IP address in the 360 firewall list, trace the other party's MAC address, enter the route and add this MAC address to the MAC filter list, he will not be able to access the Internet, I hope it can help you.

  7. Anonymous users2024-02-05

    Virus troublemaker.

    Install anti-virus software Fen Killer.

    Be careful to sail the ship of ten thousand years.

  8. Anonymous users2024-02-04

    This question is not new, search on the Internet, there is a way.

Related questions
17 answers2024-05-25

Simple Turn off all the machines (billing is also included) Only the host is left, anyway, only the host is left The road oil is also turned off Antivirus It's best to kill dos kill It's OK after that's not If it's not, you install a machine and then ghost ghost to other machines This is to reinstall the system Oh But it's also very fast Generally what games are on the d e disk It's okay It's okay to see more It is recommended to install a restore card It's not easy to crack Good management No matter how not afraid of viruses Restore card is the kind of hardware ha.

8 answers2024-05-25

Your network architecture is a medium-sized network, don't use class C IP, change to class B, divide several VLANs, divide the office building into a VLAN, each office is divided into VLAN, and then put the OA and business system server separately into a VLAN, the default VLAN can be, easy to manage, but also can prevent ARP attacks, and then there are ARP attacks can only attack in this VLAN, will not affect the server, you can enable the routing function on the main switch, Support cross-VLAN data exchange, control the direction of data exchange through ACL, how do you usually manage the external network, you can see if you need to change it again, as for ARP detection, your VLAN should be attacked in a certain VLAN after it is divided, you can know which switch under the computer issued the ARP attack, you can then go to the corresponding switch web page through the MAC detection function to detect the attacker's MAC and IP, Even if someone manually changes the MAC and IP, the above will also be recorded, as for what you said can not find the attacker's MAC, it may be manually modified, you can find the attacker's real MAC address and IP through the MAC detection function on the web page, you can easily find out which computer is attacking, in this way, the network is safe, viruses, and human aspects are all eliminated After reading your information above, I feel that your network is a little messy, and you can apply to move the network once, Let's make a rectification and re-plan.

3 answers2024-05-25

ARP Buster establishes a real address resolution table in the whole network and distributes it to each managed network node. By filtering each packet at the NIC driver layer, it can not only identify and prohibit ARP spoofing, but also accurately locate which IP node, process, and login are the source of ARP spoofing, thus completely solving the problem of ARP attacks. Intelligent network - ARP Buster Solution: >>>More

11 answers2024-05-25

Massage helps to recover, but also pay attention to the child's eye habits and hygiene, and at the same time can supplement the child with some algae oil, vitamins, etc., which is more conducive to recovery. >>>More

7 answers2024-05-25

In this case, it may be caused by the incompatibility of the Security Guard software, you can try to remove some Security Guard software on your phone to solve the problem, the specific steps are as follows: >>>More