Position: Home page » Computing » I invited a friend, but I didn't get any computing power

I invited a friend, but I didn't get any computing power

Publish: 2021-05-11 10:53:04
1.

Introction to nugget brush Diamond:

nugget diamond can be obtained through mining and trading. It is strictly forbidden to use external swipe in the game. Once cheating is found, there will be severe punishment

first of all, you need to find a cave, whether it's a natural cave or a hole g by others. You can start your mining journey with torches and manuscripts (including diamond manuscripts)

until you find an underground lava pool (rather than a surface lava pool, which is easily confused with the one generated at sea level), it indicates that you are looking for diamonds at the right depth

in addition, there is a bug card diamond, you can try it

first of all, prepare a private storage box with a number of diamonds

put the diamonds in the private storage box, then turn off the wireless network, and take the diamonds out in the moment of turning off. When you log in again, you will find the diamonds you put in your backpack, while the diamonds in the private storage box are still there

this bug is very easy to use at this stage, but it's also unbalanced, so it's best for players not to brush diamonds in this way, otherwise they will lose the fun of the game

2. Invite friends, first you need friends to download the software, and then fill in your invitation code. It will not take effect if it is not filled in. then. And sign in. You can get all the money by signing in for three days in a row. Well, I just invited one a few days ago. No problem. It should be your own problem. It's not the system, is it? The system is very normal recently. Except no wechat withdrawal, everything is good
3. NetMeeting, remote desktop sharing
however, it's difficult to keep the other party's screen off, unless you use software such as Trojans and hackers.
4. Install the third-party software, such as PcAnyWhere, remote, on the two machines, and open the controlled end to simulate the screen and file transmission. System log off, restart can be shut down can not be controlled, ha ha.
5. On the one hand, we can use the existing network devices of LAN, such as router, switch and firewall; On the other hand, we can also use the special network behavior management software, LAN control Internet software, computer monitoring software and so on

method 1, router settings

if we want to prohibit the computer from accessing the Internet, we can directly use & quot; in the router; MAC address filtering & quot; Functions, such as setting & quot; Only specific MAC addresses are allowed to access the Internet;, In this way, we can add the MAC address of the computer that is allowed to access the Internet inside the company. In addition, all other computers will not be able to access the Internet; Of course, if you don't add any MAC address, it means that all computers in the LAN can't access the Internet

at the same time, the router can also control the computer's online behavior, such as forbidding P2P download, forbidding stock speculation, forbidding playing games, etc

method 2: deploy the computer monitoring software

search the computer monitoring software on the network. For the more common China Science and technology security enterprise, network manager, etc., download the installation package of China Science and technology security enterprise information security management software from the download station, extract and obtain the installation package. The installation package includes the management end and the controlled end. The controlled end is installed on the employee's computer, and the management end is installed on the manager's computer, It can control the Internet behavior of employees' computers, including forbidding employees to visit certain websites

no matter which method is adopted, it can achieve the purpose of effective Internet access control, but compared with the router, it is more simple and direct to manage the operation setting of computer Internet access through special network monitoring software. Enterprises and institutions can choose which method to adopt according to their own needs.
6. You can learn about the domain shield software, which supports remote viewing of various clients, remote operation, and viewing real-time desktop to meet your needs
7. You can use P2P terminator
P2P terminator is a network management software specially used to control P2P traffic in LAN. It can control a variety of popular P2P protocols. At present, it can control BitTorrent protocol, Bai Xiaba protocol, poco protocol, kamun protocol and PP protocol. The software can control most of the client software based on the above protocols,
8. First, through your firewall, define host object address translation access control before fire prevention, then you need to open the corresponding control software occupation port on the firewall (such as VNC, PcAnyWhere, etc.)
then, install the corresponding control software on the machine you need to control in your LAN
finally, There are many ways to realize the remote control of local area network:
1. The remote control function of the system (necessary conditions: IP address of the controlled party, system user name, password, and port 3389 on the fire wall)

2 VNC remote control software (necessary condition: IP address of the controlled party, vnc client password, and corresponding port of the igniting wall is opened, 5900 by default)

3. PcAnyWhere remote control software (necessary condition: IP address of the controlled party, PcAnyWhere client password, and corresponding port of the igniting wall is opened)

or use gray pigeon directly
9. Yes, this is telnet remote control, but you don't need to install 2003 and 2000. XP also has remote control function. You have a remote option on my computer properties of the machine to be controlled. See. You check the "allow users to connect to this computer remotely" option
note that this function requires the other party to have a password to enter. In other words, the administrator of the machine you want to control must have a password
you set the IP address of your machine and this machine to a network segment
there are two ways to run:
1. Enter mstsc.exe in the start menu, and a dialog box "Remote Desktop Connection" will pop up
2. It is in the start - all programs - Accessories - Communication - Remote Desktop connection
just input the IP address of the computer you want to log in to in it!!!
10.

At the same time, there are many servers that need to use batch remote desktop management. At present, the easy to use is IIS7 batch management tool, face-to-face installation and batch management

Server administrators usually manage hundreds or thousands of servers, including server system management and key equipment maintenance, user management of server system, disk and data management, and IP address management, Good server administrators usually use a batch management software to rece their workload, such as IIS7 remote desktop, which is used by most server administrators

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750