The system's network will inevitably have a variety of problems, and quickly and efficiently solve network failures has become a topic of concern for our system users. After the system masters repeatedly scrutinized and summarized the solution specifically for network failure, now I will share this secret with you.
Using the Sc command to solve the problem that the service window cannot be opened
In order to prevent illegal users from attacking the local system or peeking local important private information through the hidden sharing enabled by the local workstation system by default, we often The service list window of the local system will be opened, and the property setting interface of the server service will be entered, and the server service will be stopped by the manual method, thereby achieving the purpose of closing the local system to hide the sharing.
However, sometimes, no matter how we operate, we can't enter the property setting interface of the Server service. So we can't disable the system to disable the shared service by deactivating the Server service. So, Can't we close the hidden share on the local workstation if the service window can't be opened?
The answer is no! We can use the built-in Sc command on the Windows workstation to subtly the workstation system. The Server service in the stop is stopped, so that all the hidden sharing of the system can be closed at one time. The following is the specific implementation steps of the method:
First log in to the local workstation system as the system administrator, click the click In the system desktop, click the “Start” and “Run” menu option to open the system running box of the local workstation, enter the string command “cmd”, click the Enter key, and enter the MS-DOS work. window.
In the MS-DOS window command prompt, execute the "scconfiglanmanserverstart=disabled" string command. When the system prompts for success, we can easily enter the server service's property setting interface. The system service server is stopped. At this time, when we look at the hidden shared resources of the system, we will see that all hidden shared resources are deleted at one time, so that illegal users cannot implement local workstations through hidden sharing. Security attack.
We didnt partition the hard disk in our newly purchased computer, so we have to format and partition
Recently, many users are reporting that when the computer is installed with a printer, there is a ph
Recently, many users are reflecting the phenomenon that the computer time cannot be synchronized or
Nowadays, no matter whether it is work or life, it is inseparable from the Internet. Many people cla
Counting the five invisible viruses in the webpage
How does Tencent QQ view the pictures that the other party withdrew?
Quickly use the registry, junk files go without trace
Sharing the setting of the optical drive as the first method of starting
The system is being attacked? Use VPS server to prevent
How to set Thunder as the default download software?
How to solve the problem that the computer resolution cannot be adjusted?
How to view the hidden partition of the u disk?
IE browser always appears no response how to solve?
New measures to protect network security: turn off unnecessary ports
How to set up the computer time switch machine?
Windows XP SP2 installation failure 2
Clear Windows 7 to automatically track the games that users have played
Sharing to create a refreshing system Not known XP desktop text skills
Windows netstat view port, process occupancy
What should I do if the Win10 Explorer is automatically refreshed?
Windows7 command PC is unstoppable the most popular genuine
How to change (set) computer sleep time in Win7 Ultimate system
Win7 system can not recognize the solution that u disk needs to restart the computer to recognize