TCP/IP is the foundation of the network. For Windows systems, the so-called TCP/IP settings are mainly the network parameter settings related to the network card. In fact, this part of the content requires administrators to dig deeper. Below I will list a few typical application cases related to this, I hope to help friends who have encountered similar problems.
1. Modify MAC, you can't manage me
The staff of the planning department didn't work for the business, and finally the leaders couldn't bear it. So they ordered the network administrator Xiao Zhang to resolutely put an end to this situation. Xiao Zhang chose to bind the MAC and IP on the router, and all the hosts of the planning department were included in the "blacklist" - Internet connection was forbidden.
This is hard to beat "master" Kobayashi, he found the pony of the sales department, got the MAC address and IP address of her network card (take the MAC address, IP address method is, at the command prompt Enter ipconfig /all under the symbol). Then operate on your own computer. First, modify the MAC address of the network card. The operation steps are as follows: Select “Network and Dial-up Connection” in the control panel, select the corresponding network card and click the right mouse button, select the property, and click the “Configure” button on the “General” page of the property page. . In the configuration property page, select "Advanced", then select "Network Address" in the "Properties" column, select the input box in the "Value" column, and then enter the obtained MAC address in the input box. (Figure 1)
Then, modify the IP address as follows: Select "Internet Protocol (TCP/IP) under the "General" page of the previous NIC property page. Click on the "Properties" button below, and then set the IP address, subnet mask, etc. to the corresponding value just obtained. After the above settings are completed, Kobayashi can swim again on the Internet.
2. Port operation, refusal to scan
Xiaohu's computer is often attacked by others, and attackers often leave provocative messages on the desktop. It is hard to bear, he couldn't bear to find Xiaolin for help. After a diagnosis of Xiaolin's diagnosis, Xiaohu's computer has too many open ports, and some ports need to be closed or blocked.
(1). Shut down the port
It is convenient to close some idle ports in the Windows NT core system (Windows 2000/XP/2003), you can use the "directed shutdown specified service" "Port" (blacklist) and "Open only allow port" (whitelist) settings. Some network services of the computer will have a default port assigned by the system, some idle services will be turned off, and the corresponding ports will be closed.
Go to the "Control Panel" → "Administrative Tools" → "Services" item, turn off some unused services of the computer, and their corresponding ports are also disabled. As for "only open the way to allow ports", you can use the system's "TCP /IP filtering" function. Right click on "Local Area Connection", select "Properties", select "Internet Protocol (TCP/IP)", click the "Properties" button, then click the "Advanced" button, under the "Options" tab, select "TCP/IP Filter" and click "Properties". "Open the filter settings window. When set, "only allow" some of the basic network communication required by the system. In addition to the above methods, some ports can be disabled via IPsec. (Figure 2)
(2). Fake deception
With his own way to cure his body, Xiaolin feels helpless to export Xiao Hu I fooled the attacker and made Xiaohu’s computer a honeypot, waiting for the attacker to hook. Defnet HoneyPot is a well-known honeypot system. The virtual system is no different from the real system, but it is a trap for malicious attackers. However, this trap tricks a malicious attacker into being able to record which commands he has executed, what actions he has taken, and which malicious attack tools he has used. Through the recording of traps, you can understand the habits of attackers, grasp enough evidence of attack, and even counterattack the attacker. Using this tool to deploy a honeypot system is very simple, open the software and enter the appropriate parameters. Then it will start randomly and it will be logged if it is scanned maliciously.
u disk is an indispensable tool in our daily office, we often use it to store data, but in the proce
Every day, facing the computer, facing the same font every day, the eyes begin to appear aesthetic f
Introduction to the systems own restore function The current network security has played a pivotal r
For gamers, the mouse is an important tool in the game industry, the mouses reaction speed, mouse se
The solution to the common problems of dot matrix printers is that the
Windows XP system when booting Common process list
How to run DOS program method in Windows XP
Master share: computer protection coup not to be ignored
Win XP automatic batch file clearing machine dog virus
Several aspects to be aware of after the system is installed
How to implement Windows XP remote management function
Learn about Windows XP system contraindications to avoid system crashes
WinXP system to adjust the size of the desktop icon
How to add fonts to XP system?
Two wonderful ways to easily change the icon of the computer hard drive letter
How to set the repair computer option when pressing Win8 when Win7 starts
How to open or close the system protection function of the win8 system
Countermeasure for folder suspended animation under Win8/8.1 system
Win7 desktop icon exception solution Daquan
Microsoft officially released Windows 8 feature information summary
Trouble shutdown operation! See win8.1 how to set up easy shutdown
Where is the storage location of Miyou 3?