-
The computer on which the file is uploaded is a laptop.
This computer was taken home. So, where did the transferred files go? Is it another computer at home or a "cloud space"?
If you upload a file to another computer at home, you will not see it from the company's LAN when you go back to the company. Because your home computer is not a member (user) of the company's LAN, even if your home computer is connected to the "WAN", it is only that the computer can access the ** connected in the WAN, but cannot access your company's LAN.
You can access the "extranet", access the "cloud space", and you will be able to see this file.
If machines in a LAN share copies of files with each other, the server will certainly not record it. It's just that the switch can record the network traffic transmitted directly by the two machines.
Basically, it has no effect on your copy. Don't worry, it's best to copy after work or during everyone's break at noon. After all, internal transmission affects network speed.
Know. Viewing someone else's shared file on a computer will leave a note on someone else's computer.
yinhaikai
If we are backward, we must fight it, and science and technology will develop life.
Concern. Became the 199th fan.
Generally, there will be no traces, unless the computer that shared the file has enabled the sharing audit function.
There will be logs, and your computer and the computer you access will leave logs, which can be found in the logs, but generally no one will check that the main control chip of the U disk does not have a log function, and it is impossible to check whether it is copied. Find the computer you need to view, double-click and click on it, and then you can see all the shared files he has shared, and there is a tube icon.
Share files. File sharing refers to actively sharing one's own computer files on a network.
Generally, file sharing uses the P2P model, where the file itself is stored on the user's own personal computer. Most of the people who participate in file sharing also share files provided by other users. At times, these two actions are linked.
-
There will be logs, and there will be logs on your computer and the computer you access.
-
You can check it in the log, but generally no one checks it!!
-
It can detect your access, but the data is encrypted, so the content cannot be seen, and your IP can be detected, whether it is a guset or administrator, you can be found.
-
There are route records, which can be queried.
Guests can connect to a local area network.
Your actions are written to the route log.
-
It should be that there is no error logging or something, and the general view server is a view, and you can go to the event viewer to take a look.
Click on "Start Settings Control Panel", click on "Administrative Tools". Then double-click the Event Viewer
All the running data is there.
-
This monitoring is very easy, and you can work with peace of mind!
-
You shouldn't be able to see the information in the file you uploaded, but the uploaded information will be recorded.
-
will not be monitored.
1, just like scanning ** and songs in KTV, the mobile phone is connected to the KTV provided by the wireless network, and the mobile phone is quite a domain during this time, scanning two-dimensional ** is equivalent to authentication information, and this time can be in the song.
Similarly, when a computer enters the domain, enter the specified account to log in to the computer and connect to the company's wifi, and you can access everything on the company's intranet, just like connecting to a VPN.
2. Computers that join the LAN will not be monitored, and can only be viewed by other computers after sharing files, which is just a convenient way for employees to send files between them.
-
If the company installs Domain Shield, the company will install the controlled end of Domain Shield on the computer, and after the controlled end is installed on the computer used by the employee, it can record all the Internet behavior of the employee.
-
You can operate the computer at home without the Internet, and it will definitely not be monitored.
If the company's monitoring server cannot be connected to the Internet, it cannot monitor and take out the company's computer.
If the company's monitoring server does set up a monitoring extranet, it may theoretically be able to monitor, but this is illegal.
-
If the monitoring software has been installed in the computer, after leaving the company's LAN, the monitoring is still effective, but the monitoring data is stored on the local disk, once connected to the company's LAN, the offline monitoring data is automatically transmitted to the server.
If you do not have a monitor installed, you will not be monitored by the LAN server after leaving the LAN.
-
No. Cameras are required to be monitored.
-
It's just joined the domain, is there any monitoring software installed for you?
Fool around.
-
Look at how your company monitors you, the landlord doesn't know what to say, so I don't know how to do it.
-
In principle, you can't see it, because if you have enabled the LAN sharing function, you won't have to worry about files being viewed or copied on other subcomputers. If you don't want people to see it, you won't share resources on the LAN.
PS: There are 4 types of resource sharing on the LAN, file sharing, equipment sharing, Internet sharing, and program sharing.
Enable file sharing within the LAN.
-
Let's take a look at other people's methods and learn together!
First of all, you have the internet connection installed!
Then open a folder and find the tool in the menu bar Folder Options View using Simple File Sharing.
Tick it off! Right-click on Neighbors, Properties, select the Verify option in Connection Properties, and check all three.
Open the Control Panel, open Administrative Tools, and then open Local Security Settings. Select "User Rights Assignment" in "Local Security Policy", there is "Access this computer from the network" on the right, right-click, Properties, add guest, OK. Also at the bottom there is a "deny access to this computer from the network", or right-click the attribute, and then delete the guest.
In addition, select "Security Options" in "Local Security Policy", and on the right there is a "Local Account's Security Mode", and change its attributes to the "classic" one.
And of course, don't forget to share the printer.
Sometimes a dialog box will appear, asking for an account password or something, you can set a simple password for guest and enter yourpcname guest in the account
To explain, it's your computer's name guest).
Enter your password there, try to make it easy for everyone to remember, and then check the remember my password option, and you don't need to enter it in the future. It's safer that way.
That's all I know, that's how the computer sharing connection problem in our dormitory is solved, and I hope it can help you solve it.
-
In my experience, it doesn't affect his computer much, just read its hard drive, and his computer doesn't add processes.
-
He won't see it, but his hard drive will keep spinning, running the program will get a little stuck, and the experienced will feel that something is wrong.
-
It's usually invisible, but because the hard drive is working, if you copy a larger file, it will slow down significantly!
-
Our company is also a local area network. It is often necessary to copy files to each other. There was no redundancy in the process
If you want to copy something bigger, the other party's computer will be stuck. Network latency. Such.
-
You can do it all. But there's one thing, how your sharing can be accessible to others, which in itself is a serious security issue.
It's like when you leave money on the road and don't want anyone else to take it. Then ask for a camera to see who took your money.
Therefore, it is recommended to find an IT service company, which should be professional to help you re-plan your IT architecture, do an integration, and solve security and management problems.
For small and medium-sized enterprises, the cost is not high.
-
Probably not, I know no. Unless there is relevant professional software.
-
This will not be discovered, first of all, you have unplugged the network cable, and it is disconnected from your company's internal LAN, and it is impossible for the company's network management to monitor the behavior of the intranet through routers (or switches, firewalls) and other devices. In addition, if you replace the hard drive, you will not find any traces of data being read by the hard drive, so don't worry.
-
Because it is not through the company intranet, the access history will not be discovered.
However, the company's network administrator should be able to detect that the computer is not connected to the intranet during this time.
-
No, your own hard disk is even the system is changed, and the network cable is also unplugged, and the logs left behind will definitely not be found on the hard disk you brought because it has nothing to do with the company's network and computer The hard disk is not changed, in fact, it's okay, as long as you clear your logs It's just that if you don't get caught red-handed, you will never find it But you have to have a wireless network card, otherwise how do you connect to the mobile phone hotspot Hehe
-
...As long as you use a fixed IP, you can monitor, if you don't have a domain, you won't be monitored, and you don't need to change the hard disk.
-
If you can't find it, you will only be found after passing through the router.
-
If you dial the network cable, you won't be detected.
-
If you dial the network cable, your computer is equivalent to losing contact (in fact, you only need to go to the network card settings to disable the network card), and then you use your own mobile phone to surf the Internet, which is equivalent to free activity.
For example, the road you go to work on is Highway 1, and then Traffic Police A is responsible for Highway 1, and today you don't take Highway 1, and you take Highway 2 instead, then this is beyond the scope of traffic police A's supervision (just an analogy);
In fact, the network cable you connect to passes through the company's server, which can record every ** you access (this network cable is within its regulatory scope), but under normal circumstances, if it is not the company's internal data loss, or the above arrangement, the network management will not always pay attention to your access**, but as long as you access through the company's network, the company's server will record. So you'd better be cautious!
-
This is completely possible, through routers, switches, etc., you can monitor the Internet access records of the access device, or install monitoring software such as iMonitor EAM to fully monitor the computer. Many enterprises, especially IT, have used monitoring software, in order to protect company information and prevent employees from doing their jobs during work, the software will only be installed on the company's computer, and the private computer must be authorized by the employee, otherwise it is illegal. If you have private messages during work, you can just use your mobile phone to read them with traffic.
-
Yes, but generally more formal companies don't do that. It's hard to say for a small company.
-
As long as it is connected to the company's local area network, the Internet access record can be found in the network center.
-
Install a monitoring software, you can do anything, I installed it for our company, and you can see the chat content.
-
LAN sniffing, people who don't have a certain foundation in computer networks can't do this.
You can buy a router with MAC address management, which can set which addresses can be connected to the external network, which can be connected to the internal network, and those that can be connected to the external network can also be set to the internal network. Then the computer is set to share, you need to do an FTP that is a file sharing server, as for what you said, "every machine boots up without entering the user name and my password, automatically log in" You don't need to set a password in the user name. The switch does not need to be configured, you just need to set up the router, Cisco router is only used by those who do particularly large servers, that is, Internet cafes will not use Cisco, you go to buy an enterprise-level router, when you buy it, you have to tell the merchant your needs to him, he will recommend it to you, I suggest that it is best to buy a router for Internet cafes. >>>More
Method 1: First, make sure that the printer has been installed on computer A and that it is shared. >>>More
XP seems to have that function.
Start Remote Assistance: >>>More
You see how several other computers in your LAN access the Internet. If it's through a router. You can check their DNS and IP. >>>More
Turn off the firewall, share the folder, and you'll generally be able to access it. >>>More