Home >

How To Stealth In LAN

2008/11/8 10:48:00 22

How To Stealth In LAN

As we all know, it is hard to guard against domestic police. In the LAN, we can clearly see which computers are online.

So many people use these intranet computers to attack.

In order to avoid such harassment, we can stealth our computer in the network. Here we introduce some common methods.

First, the DOS command is hidden.

The net command is one of the most widely used network commands. It also plays an important role in the computer in the hidden LAN.

After studying its parameters, we found that the net config server can be used.

Enter "net config server /?" in DOS to enter the vehicle, check its sub parameters, and find "/HIDDEN:{YES NO} NO}". After seeing it clearly, it will be able to operate.

Under the command prompt, enter "net config server /hidden:yes" to return, so that network stealth can be realized.

If you want to resume recovery, you only need to run the net config server /hidden:no command again.

Two. Unload sharing

Viewing the computer in the LAN is because we install the file sharing protocol and printer sharing protocol in Microsoft network, so it can also achieve the hidden purpose by unloading it.

Right click the "network neighbor" icon, select "properties" in the menu, right-click the local connection to open the property window in the open network connection window, then select "Microsoft network file and printer sharing" item in the General tab, click the uninstall button, uninstall and restart the computer.

It should be noted that although this method is quite thorough, local shared folders and printers will fail completely.

Three, registry hidden

The registry is an all powerful housekeeper, and here is no exception.

In the run window, enter "Regedit" and enter.

Locate the "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" in the open registry, then double-click the "DWORD" key value on the right side of the Hidden, change its value to 1, and restart the computer after modification, so that the stealth computer can be achieved.

Four. Stealth in group policy

Although this method can not be invisible, it can prohibit others from visiting our computer.

In the "run", enter "gpedit.msc" and enter, open the Group Policy Editor, locate "computer configuration > Windows Settings > security settings: local policy to user rights assignment", then double-click the "access to the computer from the network" on the right side, then select all the users and groups and click the delete button, so the final effect is the same as the network stealth.

Having grasped these four measures, we no longer need to suffer from internal harassment.

 

  • Related reading

Word中文章字数的统计方法

Market network
|
2008/11/7 10:40:00
31

Formatting Skills In Word

Market network
|
2008/11/7 10:39:00
19

Revision Techniques In Word

Market network
|
2008/11/7 10:38:00
25

Word中的字体替换技巧

Market network
|
2008/11/7 10:37:00
30

How To Make Wireless Internet More Secure?

Market network
|
2008/11/7 10:35:00
23
Read the next article

How To Make The Thunder Look Down Without Looking At The Card?

How to make the Thunder look down without looking at the card?