-
First try if you go back to the house first, open P2P, and wait until they come back so that the web page won't open, which means that they don't have P2P Terminator installed, you can install a little limit their host speed.
If you don't have a speed as soon as they come back, consider that they have installed a P2P Terminator, and then you can go to ** Anti-P2P Terminator! (If you can understand Chinese, you can do it).
You can specify the maximum uplink and downlink bandwidth for hosts in the LAN, which can effectively prevent all hosts in the network from being able to access the Internet normally due to the abuse of individual hosts**. You can choose which P2P software you want to block, and assign the rules to the appropriate hosts, so that those hosts can no longer use the P2P software.
Chat tool management.
Web page management.
You can flexibly choose which chat tool you need to block according to your management needs, and the software currently supports the management of QQ, MSN, Bubble, UC and Feixin. You can set the rules when the host accesses www**, the software supports blacklist, whitelist, and you can also block the host that opens ** without permission.
Custom rules.
Custom time periods.
The software's management of hosts is configured as rules, and you can create, control, and assign rules to one host, or you can assign the same rule to multiple hosts. You can define the time frame for the rule to take effect, so that you can assign different control rules during normal working hours and off-hours to achieve more user-friendly management.
Daily traffic statistics.
Host scans and notes.
The software can count the daily traffic of each controlled host and display it in the host list. You can also query the historical daily traffic. The software can scan all hosts in the local network that are powered on and connected to the network, and you can add notes to each host for future network management.
-
Use the QoS inside the router to limit their traffic.
-
The computer uses the streaming book to monitor the InternetAs long as your phone has GPRS turned on, which is the "data" that is usually displayed on your phone, your phone is a WiFi hotspot at this time, like a router.
Computer's settings. First of all, confirm that your computer has installed a wireless network card, and now notebooks and tablets generally have, and to ensure that the driver of the wireless network card is enabled, if you can't find any wireless network, it means that your computer wireless network card driver is not enabled, you can right-click my computer win7 under the "computer" - management - device manager - network interface card, the network card that is not enabled right click to enable. As shown in Fig.
You can now click on the small network icon in the lower right corner of the computer desktop state tour,See if there is a new network called Andriodap,If so, click on the connection,Enter the password you just set,You can access the Internet when connected,The following two are win7 and xp two wireless connection diagrams under the system:
-
2. Click on the Traffic Firewall option.
-
3. If you are using 360, you can try its own flow control software, in the 360 security guard function encyclopedia, there is "360 traffic monitoring" You can also limit your own ** speed by limiting the upload speed, which is also good!
Hope you find the method that works for you!
-
I have a tutorial here, you can look at the mobile phone to connect to the computer to surf the Internet, the tutorial is as follows.
Your problem should be caused by the deactivation of some services on your computer, please enable the deactivated services, and then start these services You can click Start, press the right mouse button on my computer, and then click Manage. Double-click Services & Apps, then double-click Services. Press the right mouse button on telephony once and click on the content. >>>More
You look at the back of your route.,There's a **.,Like mine, you can see a login page after entering the password After entering, click on the setup wizard You put your Internet password back in.,That's it
There is one of the most effective solutions in our computer room. It is to pull the cord as soon as it is attacked. Do it a few more times. The customer will be very autonomous to call ** to tell you that I was attacked to pull the cord handle...
Listen to you, you should use the dial number. You should use the cat directly on the net. No routing, only you are using your network cable? >>>More
In fact, it's very simple, don't be so troublesome, if you change the network environment, directly delete all the connection methods of the network connection, let the wireless network automatically find a new connection, it will definitely find the connection of your wireless route (here does not rule out that your neighbors have wireless routes, if there is a possibility to find several connections), but this premise is that your wireless route must be set up. >>>More