This fast food is specially prepared for network novices who have never entered the other computer through the network. The main software used is the famous domestic Trojan Ice River 2.2. So, if you have used Glacier 2.2, you don't have to follow us. Other interested network novices, Let's go
First Steps
Download the necessary tools. No. 1 software is the port scanning tool "Network Assassin II", No. 2 software is the control end of the famous domestic Trojan Ice River 2.2.
After downloading and decompressing, follow me for the second step!
Second Step
Running No.1 software, the first one is “Network Assassin II Registration Wizard”, ignore it, click “late (Q)” to enter the main interface of Network Assassin II.
Step 3
Select "Toolbox (U)" - "Host Finder (H)" in the main interface of Network Assassin II, and enter "Search Internet Host" interface.
Step 4
After entering the “Search Internet Hosting” interface, the “Start Address” field is filled with XXX.XXX.0.0, where XXX.XXX is selected by yourself. For example, you can choose 61.128. Or choose 61.200, etc., the "end address" column is filled with XXX.XXX.255.255, where XXX.XXX is selected as before. The "Port" column is filled in 7626, and the other columns remain the default.
Okay, the above setting is to search for a computer with glaciers from XXX.XXX.0.0 to XXX.XXX.255.255. Do you check it again? If everything is ok, click "Start Search".
Step 5
Check if the "Total Progress" and "Segment Progress" are moving. If you are not moving, it must be the IP address is set incorrectly, please check carefully. If both progress is moving, huh, you will be half successful, at least you will use Network Assassin II to scan a computer with a port open on the Internet. The next thing you have to do is to wait quietly. It takes patience to learn hacking software. After about 20-30 minutes, there should be a record in the bottom record bar (in general, there should be 5 or 6 records). Each record represents a computer found in the glacial Trojan, with the computer's IP address in front and the 7626 (glacial Trojan port).
Step 6 Click "Stop Search", but don't quit the program, and use it in the twelfth step. Run the No. 2 software glaciers and enter the main interface of the glaciers. Select "File [F]" - "Add Host [A]" to enter the Add Host window.
Step 7 In the "Add Host" window, enter the first IP address searched in the fifth step in the "Display Name". When the IP address is filled in the "Display Name", "Host" The address is automatically filled in with the same IP. "Access Password" is not filled in, "Listen Port" keeps the default 7626.
Okay, check if the IP is filled in. If it is OK, click "OK". In the "File Manager" of the main interface of the glacier, the IP address just filled in appears.
The eighth step
This step and the next step are the most important, please read it carefully! In the main interface of Glacier, click "My Computer" in "File Manager", this Your own hard disk partition will appear in the box to the right of the "File Manager". For example, if your hard drive is divided into four zones, the box to the right of the "File Manager" will appear C:, D:, E:, F: from top to bottom, if your hard drive is divided into two In the district, C:, D: will appear.
The ninth step
Click on the first IP address you just entered in the "File Manager", wait a moment (about 10-30 seconds when the network speed is slow), at " The hard disk partition of the other computer will appear in the box to the right of the file manager. see it? See it? Oh, congratulations, you have successfully entered the other party's computer!!!!!
Speaking of Autorun.inf file, I believe that everyone is no stranger, it is widely used in CD produc
Checking and hooking in Word is a basic office skill, especially in the print publishing industry. M
According to foreign media reports, at present, computers have become an important part of our daily
As a Windows network administrator, the default management share is often used for network managemen
What should I do if the boot scroll bar scrolls more frequently? Simple method to solve
What method can I use to open an unregistered program?
How to improve the download speed of Thunder? How to make 4 times speed?
Optimization method to improve memory efficiency of Windows system (1)
XP daily application skills and experience summary (3)
Teach you to learn XP system restore function (1)
Those Windows processes that have to know
How does the XP system speed up the boot?
Play Windows XP system restore and skills
Windows XP operating system security settings
What to do after reinstalling the system to completely prevent the virus
The computer runs slowly. The maintenance method is large.
Tencent Microsoft strategic cooperation Tencent computer butler new definition Windows10 upgrade
Internet Explorer has stopped working. How to do
Skill sharing: introduction of win8 new interface (2)
Small way to make XP system have the taste of Win7
Windows 7 configuration system restore settings tips
The perfect solution for the word document in the u disk in Win7 system can not be opened
How to switch Windows 8 system normal mode and security mode