How To Stealth In LAN
As we all know, it is hard to guard against domestic police. In the LAN, we can clearly see which computers are online. So many people use these intranet computers to attack. In order to avoid such harassment, we can stealth our computer in the network. Here we introduce some common methods.
First, the DOS command is hidden.
The net command is one of the most widely used network commands. It also plays an important role in the computer in the hidden LAN.
After studying its parameters, we found that the net config server can be used.
Enter "net config server /?" in DOS to enter the vehicle, check its sub parameters, and find "/HIDDEN:{YES NO} NO}". After seeing it clearly, it will be able to operate.
Under the command prompt, enter "net config server /hidden:yes" to return, so that network stealth can be realized.
If you want to resume recovery, you only need to run the net config server /hidden:no command again.
Two. Unload sharing
Viewing the computer in the LAN is because we install the file sharing protocol and printer sharing protocol in Microsoft network, so it can also achieve the hidden purpose by unloading it.
Right click the "network neighbor" icon, select "properties" in the menu, right-click the local connection to open the property window in the open network connection window, then select "Microsoft network file and printer sharing" item in the General tab, click the uninstall button, uninstall and restart the computer.
It should be noted that although this method is quite thorough, local shared folders and printers will fail completely.
Three, registry hidden
The registry is an all powerful housekeeper, and here is no exception.
In the run window, enter "Regedit" and enter.
Locate the "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" in the open registry, then double-click the "DWORD" key value on the right side of the Hidden, change its value to 1, and restart the computer after modification, so that the stealth computer can be achieved.
Four. Stealth in group policy
Although this method can not be invisible, it can prohibit others from visiting our computer.
In the "run", enter "gpedit.msc" and enter, open the Group Policy Editor, locate "computer configuration > Windows Settings > security settings: local policy to user rights assignment", then double-click the "access to the computer from the network" on the right side, then select all the users and groups and click the delete button, so the final effect is the same as the network stealth.
Having grasped these four measures, we no longer need to suffer from internal harassment.
- Related reading
- Professional market | 2010 Guangdong Dongguan Textile Accessories And Yarn Exhibition Unveiled In Dongguan
- Market trend | This Year, The First "Gate" Fell &Nbsp, And The Deposit Reserve Ratio Rose To A New High Of 19%.
- Professional market | Xinjiang Will Vigorously Develop The Tourism Industry Around The "Silk Road"
- Boss interview | The Four Venture, The Boss Of The County Opens A Restaurant.
- Help you make money | The Right Way To Make Money In Small Businesses
- effective communication | Customers Need Your Compliments.
- Document Writing | 18 Kinds Of Wu Yi In Advertising Copywriting
- Information Release of Exhibition | A Common Stage For China'S "Milan Shoe Show"
- Internet Marketing | Brand Development Rules In The Internet Age
- Marketing manual | Feng Xiaogang VS Jiang Wen: Who Knows Better About Marketing?
- Clothing Enterprises: The More The Franchisees Really, The Better?
- Viewing Post 80'S Management From The Experiment Of White Mice
- Nearly 90% Failures In Olympic Marketing Of Local Brands
- Fang Xingdong: Internet Clothing PPG Does Not Have The Listing Conditions.
- From Wahaha Children'S Clothing To See The Dilemma Of Children'S Wear Brand Extension
- Clothing B2C Walks Down The Altar, After Sale Service Becomes "Bottleneck"
- Developers: The Breakthrough Way Of "Property Right" Shops
- Look At The Brand From The Child'S Crying And Parents' Eyes.
- 孔繁任:品牌與運動
- China's Brand Growth Is A Game In The International Market.