After opening the P2P terminator and then opening the Xunyou, why does it have no effect but is stil

Updated on Game 2024-06-16
13 answers
  1. Anonymous users2024-02-12

    Xunyou acceleration relies on the local network to accelerate the principle, if the local network is too poor, the acceleration effect will not be ideal. After all, P2P is only a speed limiting software, which cannot be compared with the routing speed limiting function, but it will affect the computer of the local LAN, for example, others can open PPS to open P2P can relatively control and seize some network resources, but because the network first passes through the hardware router and then passes through the local machine and another computer on the LAN, so to control the upload and ** speed, it is best to carry out it on a router with the setting of upload and **. Open P2P in the local or the same LAN may be reported by Xunyou as data upload and ** exception handling, Xunyou is based on the local network, as long as it is not too bad, it can be accelerated through the various acceleration points distributed by Xunyou, relatively the best in the acceleration software, because it is a charging model, must be considered for the sake of players.

    The acceleration return time value of each acceleration point is different, so you can choose a faster point to accelerate again. Some ISPs (network providers: such as China Unicom, Tietong, Mobile, Great Wall Broadband, Pearl River Broadband, etc.) network conditions are not ideal, it is recommended not to pull the same network cable with others, choose China Telecom (South) or China Netcom (North) network.

  2. Anonymous users2024-02-11

    The Xunyou resources you chose are not good, and the latency is too high!!

  3. Anonymous users2024-02-10

    Dear users, you need to start Xunyou and start acceleration first, and then start the game to have the acceleration effect.

    Please try again.

  4. Anonymous users2024-02-09

    Later, another person opened PPS, and the acceleration of Xunyou had no effect. I use P2P Terminator to limit the third machine's downside to 80k Xunyou acceleration or invalid How to get it? There is no installation of a virtual network card without it is invalid.

  5. Anonymous users2024-02-08

    Is there a virtual network card installed If not, it will be invalid Look at the task manager, in addition to the local connection broadband connection, there is no more There is no more is not installed If you want to install it, Xunyou selects the connection mode three to accelerate, and it will prompt whether to install the virtual network card.

  6. Anonymous users2024-02-07

    Nowadays, P2P software is very widespread, and there are many anti-P2P ones, in fact, they limit the Internet speed mainly by camouflaging ARP, as long as others implement ARP binding, you are useless. It's normal for P2P to have ads, and others won't give you free access to it. The length of use basically has no effect.,If someone else does something inside, it's not necessarily.。

    It's best to discuss the use of the network with others, and if you really encounter an unreasonable one, you can stop his computer directly from the route. It is better not to pull the net cable with such people.

  7. Anonymous users2024-02-06

    The LAN management software itself does not contain virus language, so make sure that no malicious programs are embedded.

  8. Anonymous users2024-02-05

    From the official website, it shouldn't be lsd lz is asking about the commonly used p2p p2p itself with ads or something, but there is a virus in the wood.

  9. Anonymous users2024-02-04

    Dear users, hello:

    Some of the so-called cracked versions of P2P Terminator will have a lot of problems with poor settings, it is recommended not to use them, if you want to allocate bandwidth reasonably in the mu, it is recommended to use the router with the first pass function of Xiangshen.

  10. Anonymous users2024-02-03

    Now there are a lot of antivirus software that report P2P to the virus.,I don't know if my little sister uses the latest version of P2P.,I used to think P2P Terminator was easy to use.,I've been using it.,But now it's 360 reported to the virus., I went to find the latest version.,I think it's pretty much the same.,It's easy to use.,If not.,I'm Q37344560,But I think you use P2P to limit your friend's Internet speed.,So you can't bear it.,Watch them watch a movie and get stuck again., I used to limit the Internet speed of my classmates in the dormitory because I was playing online games at that time, and when they watched a movie, my online game was stuck and disconnected, but I was angry, but now it's okay, I basically don't use P2P, and I use P2P to make them find out how embarrassing it is!

  11. Anonymous users2024-02-02

    Little sister, a lot of software is a virus, but the classification is different.

    It is recommended not to try it casually

  12. Anonymous users2024-02-01

    In fact, it doesn't matter if it's blocked, don't worry, it can be unsealed Generally it is blocked for one year, two years and three years, and it can be unsealed here permanently; 3480丿4531丿00 Just move your fingers. There is also the kind of unsealed hanging, such as perspective self-aiming without recoil, etc. Our belief is to unseal and unseal unseal.

  13. Anonymous users2024-01-31

    Dear users, please manually change the acceleration mode in Advanced Settings - Acceleration Mode, and select the node with 0 missing package at the top of the list to try. If you still can't travel weakly, please log in to the **Guidance System:

    Ask someone to review your analysis for you.

    Thank you for your support.

Related questions
9 answers2024-06-16

Because P2P will continue to send packets in the network to query the network status. This way everyone will be slow. Plus now the software is developed. >>>More

6 answers2024-06-16

Currently, ARP spoofing, skulls, CAM attacks, IP spoofing, fake IPs, fake MACs, etc >>>More

5 answers2024-06-16

Maybe you have banned yourself, and the system can't bring it up.

2 answers2024-06-16

The IP address is used to represent the initiator and receiver of the communication, but when the data is really sent to which destination, the MAC address must be found according to the IP address, and the data can be delivered according to the MAC address in order to really send the data. Therefore, to confirm which IP is owned by which MAC address, you have to maintain a table, which is the ARP table The principle of ARP spoofing is to continuously send the ARP spoofing packet "I am a gateway" to the host in the local area network, so that there will be a record of "gateway IP --- attacker MAC" in the ARP cache table of the deceived host. Because the attacker's host has sent packets to the spoofed host, the ARP cache table of the spoofed host will have the record "Attacker's IP - Attacker's MAC". >>>More

28 answers2024-06-16

Definitely useful, I also have someone here who is using P2P control, I have no problem after turning on 360ARP. First of all, I will tell you how P2P controls other people's Internet speed, P2P is mainly an ARP attack that limits other people's Internet speed by hypocritically or tampering with ARP. If you install 360ARP, you can prevent others from using it to control your Internet speed, even if others turn on P2P, they can't control your Internet speed.