I really don t understand how to set up P2P Terminator

Updated on amusement 2024-06-16
2 answers
  1. Anonymous users2024-02-12

    Again, it's a question to ask this. So I repeated this. Helped that person solve it before. I sent 20 points. You can do what I say.

    First of all, after the installation is opened, it is correct: Options-Advanced Settings-Network Card Settings (pull to your network card below and your route, IP gateway, etc.) will appear. Then go to the advanced settings - select the time plan settings - new, enter the name casually, the following is the schedule, generally select all, right-click - select all - OK.

    Then turn it off and then enter the advanced settings - control the rule - enter the name, please select a time plan for the rule and choose the name of the time you just set - and then the next step, here is the speed you want to limit the uplink ** of others. You can set as much as you want, but it can't be less than 10kb. Then the next step, the P2P limit is all selected.

    Instant Limit Whatever you want, it's best not to choose. can't do too much, don't even give Q to others. Next, don't add, move on to the next step, and ignore it.

    And then it's done. That's it. Next, point scan the network.

    To scan it out of someone else's computer. If you sweep it out, it's OK. Then select the IP you want to control (someone else's computer) and tick it, right-click:

    Specify the rule for the selected host, and then select the control rule you just set. So you can control it. You can also disconnect the network and other functions, which are available when you select the IP right-click.

    It's simple. Don't overdo it, though.

  2. Anonymous users2024-02-11

    1. Right-click on the executable program, and select Run as administrator in the pop-up menu

    2. Select the "Yes" button in the pop-up dialog box "User Account Control".

    3. The first time you use it, a dialog box will pop up "You have not set the local network environment", click "OK":

    4. First of all, in the "Network Environment Settings", directly click the "Intelligent Detection Network Environment" and the "Intelligent Selection and Control Network NIC" button below

    5. If the IP address and NIC information listed below is your current NIC information, it means correct. Otherwise, the NIC is not selected correctly and you need to select it correctly

    6. After the settings are set, click "OK" directly to save the settings and exit, and exit the terminator and restart the computer;

    7. Open P2P Terminator again, click "Options", and select "Control Rule Settings".

    11. After setting the restriction rules, click the "OK" button to save the settings and exit.

    13. Then, select the device that needs to be restricted, check the previous checkmark, and click the "Specify Rule to Primary" button in the upper right corner, as shown in the figure above;

    15. Finally, click the "Start Control" button to start the speed limit

    It's not difficult to use P2P Terminator, look at the picture above, the network management is clear at a glance, does it solve the problem of how to use P2P Terminator? If you still have any questions about the use of P2P Terminator, please let us know.

Related questions
9 answers2024-06-16

Because P2P will continue to send packets in the network to query the network status. This way everyone will be slow. Plus now the software is developed. >>>More

6 answers2024-06-16

Currently, ARP spoofing, skulls, CAM attacks, IP spoofing, fake IPs, fake MACs, etc >>>More

2 answers2024-06-16

The IP address is used to represent the initiator and receiver of the communication, but when the data is really sent to which destination, the MAC address must be found according to the IP address, and the data can be delivered according to the MAC address in order to really send the data. Therefore, to confirm which IP is owned by which MAC address, you have to maintain a table, which is the ARP table The principle of ARP spoofing is to continuously send the ARP spoofing packet "I am a gateway" to the host in the local area network, so that there will be a record of "gateway IP --- attacker MAC" in the ARP cache table of the deceived host. Because the attacker's host has sent packets to the spoofed host, the ARP cache table of the spoofed host will have the record "Attacker's IP - Attacker's MAC". >>>More

28 answers2024-06-16

Definitely useful, I also have someone here who is using P2P control, I have no problem after turning on 360ARP. First of all, I will tell you how P2P controls other people's Internet speed, P2P is mainly an ARP attack that limits other people's Internet speed by hypocritically or tampering with ARP. If you install 360ARP, you can prevent others from using it to control your Internet speed, even if others turn on P2P, they can't control your Internet speed.

3 answers2024-06-16

First of all, after the installation is opened, it is correct: Options-Advanced Settings-Network Card Settings (pull to your network card below and your route, IP gateway, etc.) will appear. Then go to the advanced settings - select the time plan settings - new, enter the name casually, the following is the schedule, generally select all, right-click - select all - OK. >>>More