P2P Terminator 4 07 How to use 30

Updated on amusement 2024-05-05
3 answers
  1. Anonymous users2024-02-09

    First of all, after the installation is opened, it is correct: Options-Advanced Settings-Network Card Settings (pull to your network card below and your route, IP gateway, etc.) will appear. Then go to the advanced settings - select the time plan settings - new, enter the name casually, the following is the schedule, generally select all, right-click - select all - OK.

    Then turn it off and then enter the advanced settings - control the rule - enter the name, please select a time plan for the rule and choose the name of the time you just set - and then the next step, here is the speed you want to limit the uplink ** of others. You can set as much as you want, but it can't be less than 10kb. Then the next step, the P2P limit is all selected.

    Instant Limit Whatever you want, it's best not to choose. can't do too much, don't even give Q to others. Next, don't add, move on to the next step, and ignore it.

    And then it's done. That's it. Next, point scan the network.

    To scan it out of someone else's computer. If you sweep it out, it's OK. Then select the IP you want to control (someone else's computer) and tick it, right-click:

    Specify the rule for the selected host, and then select the control rule you just set. So you can control it. You can also disconnect the network and other functions, which are available when you select the IP right-click.

    It's simple. But don't do it too much.

  2. Anonymous users2024-02-08

    First of all, you go to P2P Terminator and set your network card in the advanced options of the system settings. This one has to be set, and the rest is up to you.

    Then you need to make a time plan, as the name suggests, which is what time period you need to control. Again, the timing is in the system settings.

    Finally, you have to set up control rules, you can limit bandwidth, you can also restrict some P2P** software, you can also restrict some web chat tools, if these are all set, you can scan the network first, and then you will see that there are those machines using the same network, and then enable control, right-click on the one that is not your IP address, (your machine name will be displayed as the control machine).

    To set a rule for the selected host, a dialog box will pop up, select the control rule you just set.

    If you want to restore him, you just need to stop the control.

    Actually, I really want to go to the picture, but I don't know why I just can't get it.

  3. Anonymous users2024-02-07

    Anti-P2P has this software on the Internet, and of course you can also use 360 ARP Firewall, which is very easy to use!

Related questions
9 answers2024-05-05

Because P2P will continue to send packets in the network to query the network status. This way everyone will be slow. Plus now the software is developed. >>>More

28 answers2024-05-05

Definitely useful, I also have someone here who is using P2P control, I have no problem after turning on 360ARP. First of all, I will tell you how P2P controls other people's Internet speed, P2P is mainly an ARP attack that limits other people's Internet speed by hypocritically or tampering with ARP. If you install 360ARP, you can prevent others from using it to control your Internet speed, even if others turn on P2P, they can't control your Internet speed.

2 answers2024-05-05

The IP address is used to represent the initiator and receiver of the communication, but when the data is really sent to which destination, the MAC address must be found according to the IP address, and the data can be delivered according to the MAC address in order to really send the data. Therefore, to confirm which IP is owned by which MAC address, you have to maintain a table, which is the ARP table The principle of ARP spoofing is to continuously send the ARP spoofing packet "I am a gateway" to the host in the local area network, so that there will be a record of "gateway IP --- attacker MAC" in the ARP cache table of the deceived host. Because the attacker's host has sent packets to the spoofed host, the ARP cache table of the spoofed host will have the record "Attacker's IP - Attacker's MAC". >>>More

2 answers2024-05-05

That's how the ARP virus came about

3 answers2024-05-05

The P2P mode occupies a lot of bandwidth, like the current BT**, Thunderbolt, Electric Mule, Electric Snail, etc., P2P Terminator is to limit the bandwidth of this ** method or turn it off directly, in order to ensure the need for normal Internet bandwidth.