How to get computing power from other computers
Publish: 2021-05-06 04:21:53
1. If others don't agree, it's the same as stealing
if others agree, you can set up file sharing.
if others agree, you can set up file sharing.
2. Connect it. It should be
3. Direct installation program, you can't the program installed on other computers directly, you can't find the registry!
4. The first setting opens a folder point tool_ Folder Options_ View_ Find & quot; Using simple file sharing (recommended) & quot; Check in the front.
start at the second set point_ Settings_ Control panel_ Manage templates_ Local security policy_ Local strategy_ Access to this computer is denied from the network_ Delete the guest user.
start from the third set point_ Settings_ Control panel_ Management tools_ Services_ Server service found_ Right click Properties_ Click start_ Set to automatic.
if you are prompted for a password, you can see: my computer right-click management_ Local users and groups_ Users_ The guest user right-click to remove the disabled hook of the account, and then confirm. Right click to set the user's password, and do not enter it twice.
in addition, do not add permission and password when setting the shared folder
start at the second set point_ Settings_ Control panel_ Manage templates_ Local security policy_ Local strategy_ Access to this computer is denied from the network_ Delete the guest user.
start from the third set point_ Settings_ Control panel_ Management tools_ Services_ Server service found_ Right click Properties_ Click start_ Set to automatic.
if you are prompted for a password, you can see: my computer right-click management_ Local users and groups_ Users_ The guest user right-click to remove the disabled hook of the account, and then confirm. Right click to set the user's password, and do not enter it twice.
in addition, do not add permission and password when setting the shared folder
5. You may have copied a shortcut or a file, but you need to export the registry information. It's better to find the installation package and install it on your own computer. Simple and paste is not applicable to all software, their own search on the network a similar software. Genuine software is a registered information, not casual use, is to pay, or find cracking tools. Level 2 computer examination should have a preliminary understanding of the knowledge of disassembly, you can use your knowledge to decompile the software, crack the registration code, and install. But don't spread. The spread for profit violates the intellectual property law.
6. First of all, to see what other people's computers are doing, there are several conditions. 1. Computers are your property or the property of your company; 2. After the computer is approved by the user, you can use the "Qiyou computer monitoring and management" software to achieve monitoring
function introction:
1. Remote file management (direct operation of files and data in the hard disk of the controlled computer)
2. Browsing website monitoring (monitoring records of all web pages visited, online records)
3. Chat content monitoring (QQ, MSN, Skype, Feixin, Tradelink, etc.)
4. Email monitoring (monitoring SMTP, POP3, web mail)
5. Program operation monitoring (monitoring all program operation records)
6. File operation monitoring (monitoring all file operation records)
7. Screen monitoring (screen recording of the controlled computer)
8. Real time alarm of dangerous operation (U disk operation, file , User defined alarm)
9. Real time on-site monitoring (real-time monitoring of staff computer desktop)
10. Multi screen real-time monitoring (up to 16 screens can be monitored at the same time)
11. Hardware asset management (control and management of hardware devices)
12. Software asset management (control and management of software devices)
13. Program operation control (setting restrictions are not allowed) Some program running)
14. Website access control (setting allowed / forbidden websites)
15. Port control (blocking each port of the computer)
16. Remote control (remote shutdown and restart the computer, Management of staff computer task manager, etc.)
17. Monitoring statistics report (Statistics of the use of staff computer programs)
18. Alarm log (monitoring and recording the alarm records of each staff)
function introction:
1. Remote file management (direct operation of files and data in the hard disk of the controlled computer)
2. Browsing website monitoring (monitoring records of all web pages visited, online records)
3. Chat content monitoring (QQ, MSN, Skype, Feixin, Tradelink, etc.)
4. Email monitoring (monitoring SMTP, POP3, web mail)
5. Program operation monitoring (monitoring all program operation records)
6. File operation monitoring (monitoring all file operation records)
7. Screen monitoring (screen recording of the controlled computer)
8. Real time alarm of dangerous operation (U disk operation, file , User defined alarm)
9. Real time on-site monitoring (real-time monitoring of staff computer desktop)
10. Multi screen real-time monitoring (up to 16 screens can be monitored at the same time)
11. Hardware asset management (control and management of hardware devices)
12. Software asset management (control and management of software devices)
13. Program operation control (setting restrictions are not allowed) Some program running)
14. Website access control (setting allowed / forbidden websites)
15. Port control (blocking each port of the computer)
16. Remote control (remote shutdown and restart the computer, Management of staff computer task manager, etc.)
17. Monitoring statistics report (Statistics of the use of staff computer programs)
18. Alarm log (monitoring and recording the alarm records of each staff)
7. Have LAN scanning software, can analyze, or your LAN installed monitoring software
8. You can use the intelligent backup function of the optimization master to back up the program on the original computer. The optimization master will scan the items related to the program, including the items in the registry. Then, you can restore them in your computer. However, some of them can't be backed up, especially those that need to be registered. Those are associated with the machine code, so it's invalid to change the machine
9. Find a port lander. Generally, you know that his IP can first find someone or use gray pigeon to attack his system. After that, you can use the 3389 port which is automatically changed after the system is attacked to enter his system desktop. After that, you can do whatever you want. If you don't attack, the ports of some systems are not the same, so you can't find out. There are also DOS login modes, such as If you have his DOS identification code, you can back up all his system Windows files to you after entering. Basically, all the data are obtained
10. Copy the fonts folder in windows to the folder on your machine
Hot content
