-
Install an ARP firewall and you're good to go. 360 has a free one.
Method (1) First install an ARP firewall, whatever you want, turn on the interception of external ARP attacks and IP address conflicts, when you find that the firewall prompts someone to send ARP spoofing packets, modify your IP address to the attacker's IP, at this time, the ARP firewall prompts IP address conflict (normal), at this time, wait, your computer at most keeps prompting IP conflicts, and the CPU utilization rate of the other computer's P2P software will suddenly reach 98% (P2P software bug, Once the network fails, the CPU utilization will increase dramatically), resulting in a fake crash, at this time, the other party either forcibly closes the P2P software, or hard restarts, there is no other way, so that your purpose is achieved, is it better than using the "anti-P2P terminator"?
If someone else opens P2P again, you will give him an IP address conflict, or directly use his IP, I think a person's patience is moderate, when he fakes the computer several times, he will experience the problem of P2P software, and will no longer use P2P to control others.
Method (2) is that after you use the anti-P2P terminator software, he also opens the P2P terminator software, so you are restricted again! Therefore, you also want to ** a P2P terminator software (preferably the enterprise version, because the permissions are relatively large), and return it to others in its own way! Also limit it back to him!
Then he won't be pulling! If you drag it again, you can also disconnect his network cable and see how he surfs the Internet? See if he's still cheap?
Ha ha..
-
I haven't used that route either, but if you want to see who controls you, then you can do this, start -- run ---cmd---arp -a,, so you can see who controls your computer, there's an IP in it, that's correct, but if there's two, except for the gateway one, that's the one that's controlling you
-
Tools Raw materials.
Router computer.
Method steps.
1. First, enter the router address and log in to the main interface of the router.
2. Click [Behavior Management] at the top (different models of routers have different names).
3. Click [Behavior Recognition] in the pop-up menu.
5. Save and add the entire IP range to prohibit some people from using it.
-
1. First, enter the router address, log in, and enter the main interface of the router.
2. Find [Behavior Management] or [Internet Behavior Management] Different models of routers may have different names.
3. Click [Behavior Recognition] in the menuEnter the interface.
-
Limit the P2P function that comes with the router, generally there is no such function in the router of about 100 yuan, and more than 200 will have. In the settings, you can find out for yourself, and each brand is different. And some can also restrict Thunderbolt, Express, BT and so on.
-
The router doesn't have this feature. P2P is "PC spoofing PC".
-
You're talking about speed limits, right? It depends on whether your route has this feature.
-
Tools Raw materials.
Router computer.
Method steps.
1. First, enter the router address and log in to the main interface of the router.
2. Click [Simple Behavior Management] at the top (different types of routers have different names).
3. Click [Behavior Recognition] in the pop-up menu.
5. Save and add the entire IP range to prohibit some people from using it.
360"ARP Firewall"Please "turn on" or try a router that can control the speed of the Internet with a program. >>>More
Definitely useful, I also have someone here who is using P2P control, I have no problem after turning on 360ARP. First of all, I will tell you how P2P controls other people's Internet speed, P2P is mainly an ARP attack that limits other people's Internet speed by hypocritically or tampering with ARP. If you install 360ARP, you can prevent others from using it to control your Internet speed, even if others turn on P2P, they can't control your Internet speed.
3m, the theoretical **speed is 384k, 10 machines, the average **speed of each machine is only, this is still a theoretical number, and the actual may be smaller. How is it possible that every machine can watch movies, it is estimated that there are 5 people watching movies at the same time, and others will not be able to open the web page. Talk about QQ,I don't have much bandwidth.,It's okay to limit them to 10K.。。。 >>>More
Mode 1: The most basic fund deposit model.
The third-party payment institution opens a large payment account for the online loan platform, and the lender's money directly enters the large payment account, and the transaction information is recorded by the platform itself. >>>More
1. PWM control is also known as pulse width modulation.
2. The pulse width modulation mode is an analog control square spine pants type, which uses the digital output of the microprocessor to control the analog circuit, and modulates the bias of the transistor base or MOS tube gate according to the change of the corresponding load, so as to realize the change of the on-time of the transistor or MOS tube, so as to realize the change of the output of the switching regulated power supply. >>>More