If a shared file is transferred on the company computer in the home area network, will there be a re

Updated on technology 2024-06-15
35 answers
  1. Anonymous users2024-02-12

    The computer on which the file is uploaded is a laptop.

    This computer was taken home. So, where did the transferred files go? Is it another computer at home or a "cloud space"?

    If you upload a file to another computer at home, you will not see it from the company's LAN when you go back to the company. Because your home computer is not a member (user) of the company's LAN, even if your home computer is connected to the "WAN", it is only that the computer can access the ** connected in the WAN, but cannot access your company's LAN.

    You can access the "extranet", access the "cloud space", and you will be able to see this file.

    If machines in a LAN share copies of files with each other, the server will certainly not record it. It's just that the switch can record the network traffic transmitted directly by the two machines.

    Basically, it has no effect on your copy. Don't worry, it's best to copy after work or during everyone's break at noon. After all, internal transmission affects network speed.

    Know. Viewing someone else's shared file on a computer will leave a note on someone else's computer.

    yinhaikai

    If we are backward, we must fight it, and science and technology will develop life.

    Concern. Became the 199th fan.

    Generally, there will be no traces, unless the computer that shared the file has enabled the sharing audit function.

    There will be logs, and your computer and the computer you access will leave logs, which can be found in the logs, but generally no one will check that the main control chip of the U disk does not have a log function, and it is impossible to check whether it is copied. Find the computer you need to view, double-click and click on it, and then you can see all the shared files he has shared, and there is a tube icon.

    Share files. File sharing refers to actively sharing one's own computer files on a network.

    Generally, file sharing uses the P2P model, where the file itself is stored on the user's own personal computer. Most of the people who participate in file sharing also share files provided by other users. At times, these two actions are linked.

  2. Anonymous users2024-02-11

    There will be logs, and there will be logs on your computer and the computer you access.

  3. Anonymous users2024-02-10

    You can check it in the log, but generally no one checks it!!

  4. Anonymous users2024-02-09

    It can detect your access, but the data is encrypted, so the content cannot be seen, and your IP can be detected, whether it is a guset or administrator, you can be found.

  5. Anonymous users2024-02-08

    There are route records, which can be queried.

    Guests can connect to a local area network.

    Your actions are written to the route log.

  6. Anonymous users2024-02-07

    It should be that there is no error logging or something, and the general view server is a view, and you can go to the event viewer to take a look.

    Click on "Start Settings Control Panel", click on "Administrative Tools". Then double-click the Event Viewer

    All the running data is there.

  7. Anonymous users2024-02-06

    This monitoring is very easy, and you can work with peace of mind!

  8. Anonymous users2024-02-05

    You shouldn't be able to see the information in the file you uploaded, but the uploaded information will be recorded.

  9. Anonymous users2024-02-04

    will not be monitored.

    1, just like scanning ** and songs in KTV, the mobile phone is connected to the KTV provided by the wireless network, and the mobile phone is quite a domain during this time, scanning two-dimensional ** is equivalent to authentication information, and this time can be in the song.

    Similarly, when a computer enters the domain, enter the specified account to log in to the computer and connect to the company's wifi, and you can access everything on the company's intranet, just like connecting to a VPN.

    2. Computers that join the LAN will not be monitored, and can only be viewed by other computers after sharing files, which is just a convenient way for employees to send files between them.

  10. Anonymous users2024-02-03

    If the company installs Domain Shield, the company will install the controlled end of Domain Shield on the computer, and after the controlled end is installed on the computer used by the employee, it can record all the Internet behavior of the employee.

  11. Anonymous users2024-02-02

    You can operate the computer at home without the Internet, and it will definitely not be monitored.

    If the company's monitoring server cannot be connected to the Internet, it cannot monitor and take out the company's computer.

    If the company's monitoring server does set up a monitoring extranet, it may theoretically be able to monitor, but this is illegal.

  12. Anonymous users2024-02-01

    If the monitoring software has been installed in the computer, after leaving the company's LAN, the monitoring is still effective, but the monitoring data is stored on the local disk, once connected to the company's LAN, the offline monitoring data is automatically transmitted to the server.

    If you do not have a monitor installed, you will not be monitored by the LAN server after leaving the LAN.

  13. Anonymous users2024-01-31

    No. Cameras are required to be monitored.

  14. Anonymous users2024-01-30

    It's just joined the domain, is there any monitoring software installed for you?

    Fool around.

  15. Anonymous users2024-01-29

    Look at how your company monitors you, the landlord doesn't know what to say, so I don't know how to do it.

  16. Anonymous users2024-01-28

    In principle, you can't see it, because if you have enabled the LAN sharing function, you won't have to worry about files being viewed or copied on other subcomputers. If you don't want people to see it, you won't share resources on the LAN.

    PS: There are 4 types of resource sharing on the LAN, file sharing, equipment sharing, Internet sharing, and program sharing.

    Enable file sharing within the LAN.

  17. Anonymous users2024-01-27

    Let's take a look at other people's methods and learn together!

    First of all, you have the internet connection installed!

    Then open a folder and find the tool in the menu bar Folder Options View using Simple File Sharing.

    Tick it off! Right-click on Neighbors, Properties, select the Verify option in Connection Properties, and check all three.

    Open the Control Panel, open Administrative Tools, and then open Local Security Settings. Select "User Rights Assignment" in "Local Security Policy", there is "Access this computer from the network" on the right, right-click, Properties, add guest, OK. Also at the bottom there is a "deny access to this computer from the network", or right-click the attribute, and then delete the guest.

    In addition, select "Security Options" in "Local Security Policy", and on the right there is a "Local Account's Security Mode", and change its attributes to the "classic" one.

    And of course, don't forget to share the printer.

    Sometimes a dialog box will appear, asking for an account password or something, you can set a simple password for guest and enter yourpcname guest in the account

    To explain, it's your computer's name guest).

    Enter your password there, try to make it easy for everyone to remember, and then check the remember my password option, and you don't need to enter it in the future. It's safer that way.

    That's all I know, that's how the computer sharing connection problem in our dormitory is solved, and I hope it can help you solve it.

  18. Anonymous users2024-01-26

    In my experience, it doesn't affect his computer much, just read its hard drive, and his computer doesn't add processes.

  19. Anonymous users2024-01-25

    He won't see it, but his hard drive will keep spinning, running the program will get a little stuck, and the experienced will feel that something is wrong.

  20. Anonymous users2024-01-24

    It's usually invisible, but because the hard drive is working, if you copy a larger file, it will slow down significantly!

  21. Anonymous users2024-01-23

    Our company is also a local area network. It is often necessary to copy files to each other. There was no redundancy in the process

    If you want to copy something bigger, the other party's computer will be stuck. Network latency. Such.

  22. Anonymous users2024-01-22

    You can do it all. But there's one thing, how your sharing can be accessible to others, which in itself is a serious security issue.

    It's like when you leave money on the road and don't want anyone else to take it. Then ask for a camera to see who took your money.

    Therefore, it is recommended to find an IT service company, which should be professional to help you re-plan your IT architecture, do an integration, and solve security and management problems.

    For small and medium-sized enterprises, the cost is not high.

  23. Anonymous users2024-01-21

    Probably not, I know no. Unless there is relevant professional software.

  24. Anonymous users2024-01-20

    This will not be discovered, first of all, you have unplugged the network cable, and it is disconnected from your company's internal LAN, and it is impossible for the company's network management to monitor the behavior of the intranet through routers (or switches, firewalls) and other devices. In addition, if you replace the hard drive, you will not find any traces of data being read by the hard drive, so don't worry.

  25. Anonymous users2024-01-19

    Because it is not through the company intranet, the access history will not be discovered.

    However, the company's network administrator should be able to detect that the computer is not connected to the intranet during this time.

  26. Anonymous users2024-01-18

    No, your own hard disk is even the system is changed, and the network cable is also unplugged, and the logs left behind will definitely not be found on the hard disk you brought because it has nothing to do with the company's network and computer The hard disk is not changed, in fact, it's okay, as long as you clear your logs It's just that if you don't get caught red-handed, you will never find it But you have to have a wireless network card, otherwise how do you connect to the mobile phone hotspot Hehe

  27. Anonymous users2024-01-17

    ...As long as you use a fixed IP, you can monitor, if you don't have a domain, you won't be monitored, and you don't need to change the hard disk.

  28. Anonymous users2024-01-16

    If you can't find it, you will only be found after passing through the router.

  29. Anonymous users2024-01-15

    If you dial the network cable, you won't be detected.

  30. Anonymous users2024-01-14

    If you dial the network cable, your computer is equivalent to losing contact (in fact, you only need to go to the network card settings to disable the network card), and then you use your own mobile phone to surf the Internet, which is equivalent to free activity.

    For example, the road you go to work on is Highway 1, and then Traffic Police A is responsible for Highway 1, and today you don't take Highway 1, and you take Highway 2 instead, then this is beyond the scope of traffic police A's supervision (just an analogy);

    In fact, the network cable you connect to passes through the company's server, which can record every ** you access (this network cable is within its regulatory scope), but under normal circumstances, if it is not the company's internal data loss, or the above arrangement, the network management will not always pay attention to your access**, but as long as you access through the company's network, the company's server will record. So you'd better be cautious!

  31. Anonymous users2024-01-13

    This is completely possible, through routers, switches, etc., you can monitor the Internet access records of the access device, or install monitoring software such as iMonitor EAM to fully monitor the computer. Many enterprises, especially IT, have used monitoring software, in order to protect company information and prevent employees from doing their jobs during work, the software will only be installed on the company's computer, and the private computer must be authorized by the employee, otherwise it is illegal. If you have private messages during work, you can just use your mobile phone to read them with traffic.

  32. Anonymous users2024-01-12

    Yes, but generally more formal companies don't do that. It's hard to say for a small company.

  33. Anonymous users2024-01-11

    As long as it is connected to the company's local area network, the Internet access record can be found in the network center.

  34. Anonymous users2024-01-10

    Install a monitoring software, you can do anything, I installed it for our company, and you can see the chat content.

  35. Anonymous users2024-01-09

    LAN sniffing, people who don't have a certain foundation in computer networks can't do this.

Related questions
6 answers2024-06-15

You can buy a router with MAC address management, which can set which addresses can be connected to the external network, which can be connected to the internal network, and those that can be connected to the external network can also be set to the internal network. Then the computer is set to share, you need to do an FTP that is a file sharing server, as for what you said, "every machine boots up without entering the user name and my password, automatically log in" You don't need to set a password in the user name. The switch does not need to be configured, you just need to set up the router, Cisco router is only used by those who do particularly large servers, that is, Internet cafes will not use Cisco, you go to buy an enterprise-level router, when you buy it, you have to tell the merchant your needs to him, he will recommend it to you, I suggest that it is best to buy a router for Internet cafes. >>>More

5 answers2024-06-15

Method 1: First, make sure that the printer has been installed on computer A and that it is shared. >>>More

4 answers2024-06-15

XP seems to have that function.

Start Remote Assistance: >>>More

13 answers2024-06-15

You see how several other computers in your LAN access the Internet. If it's through a router. You can check their DNS and IP. >>>More

17 answers2024-06-15

Turn off the firewall, share the folder, and you'll generally be able to access it. >>>More