Internet cafe hosts, saying that you will not be allowed to access the Internet if you do not want to access the Internet

Source: Internet
Author: User

Author: pchoer QQ: 3582582 Source: http://www.pchoer.com

Today, I went online at this Internet cafe. As usual, I opened some hacker sites to see articles and news. But a guy next to me doesn't know if there is a problem with his mind. He's always looking at my screen. what I hate most is that this guy is really annoying! I plan to teach him a lesson! It's not easy to misunderstand. I mean the lesson is on the Internet. Well, it's a good boy in implementation. Well, if you want to teach him a lesson, you have to change the camera first, otherwise, it will be troublesome for him to see it.
Okay! With a hidden machine, you can start pulling bad things. Here we will talk about the use of a "Network law enforcement officer" LAN management software to make a computer in an Internet cafe unable to access the Internet. Haha ~~~ Have you heard this! In this way, there is a sense of Network Management! Now, download the tool and install it!
First, let's take a look at the introduction of the software by the author of the cyber law enforcement officer:
"Network law enforcement officer" is a LAN Management auxiliary software that uses the underlying network protocol, it can penetrate the firewalls of various clients to monitor each host in the network (in this article, the host refers to various computers, switches, and other network devices with IP addresses) and identify users by using network card numbers (MAC, high reliability; the software itself occupies less network resources and has no adverse impact on the network.
The software does not need to run on a specified server. Running on any host in the network can effectively monitor the networks connected to all hosts (Multi-network segment monitoring is supported). The main functions are as follows:
I. Real-time recording of online users and archiving for future reference
Any host on the network will be detected and recorded by the software in real time, including its Nic number, IP address used, launch time, And deprecation time. This information is automatically and permanently saved, queries can be performed based on various conditions and fuzzy queries are supported. With this function, the administrator can know at any time whether or not a host is started, how long it takes to start up, and which IP address and host name are used; or the boot history of any host.
Ii. Automatic Detection of unregistered host access and alarm
After the Administrator completes registration or the software automatically detects all valid hosts, you can set in the software to reject all unregistered hosts from accessing the network. Once a host is not registered for access, the software will automatically record its MAC, IP, host name, online/offline period, and other information permanently, alarms can also be triggered by sound, sending messages to a specified host, or according to administrator settings, automatic control measures such as IP conflicts, isolation from key hosts, and isolation from all other hosts in the network are adopted for this host.
3. Restrict the IP addresses of hosts to prevent IP address theft
The administrator can specify an IP address or segment of IP address for each host. When the host uses an IP address out of the range, the software determines it as \ "invalid user \\\", the system automatically uses the method specified by the Administrator in advance to control the host, and records its MAC, IP, and host name for a long time for future reference. Administrators can specify management methods for illegal users, such as IP conflicts, isolation from key hosts, and isolation from all other hosts.
4. specifying the connection time period for each host
The administrator can specify the time period during which each host can be connected to the network or cannot be connected to the network (two time periods can be specified, for example, you can connect to the network from to and from to every day) and specify whether each user is allowed to connect to the network on every Saturday and Sunday. If a user violates the regulations, the software determines it as an illegal user, automatically records it and manages it in the way specified by the Administrator in advance. Management methods can also be used for IP conflicts, isolation from key hosts, and isolation from all other hosts.
In short, the main function of the software is to monitor the entire LAN in real time and automatically manage illegal users based on the permissions assigned by the Administrator to each host, illegal users can be isolated from some hosts in the network or the entire network. No matter what firewall the hosts in the LAN are running, they cannot evade monitoring and do not trigger firewall warnings, which improves network security. The Administrator only needs to set the permissions of each host and the management mode after the permissions are violated to implement some specific functions, for example, prohibit some hosts from accessing the Internet at the specified time period or completely prohibit some hosts from accessing the Internet, protect key hosts in the network, and only allow access from specified hosts.

Haha ~~ There are so many features ~ And it's good! I don't know how to use it. Okay! Not to mention anything. First, let the just changing people not be able to access the Internet first, open the robocop.exe in the installation folder, this is the main program to pull! A "select monitoring range" dialog box is displayed. In this case, enter the IP address of your machine. Generally, enter the IP address segment 192.168.0.1-192.168.0.255. Here is the IP address segment 192.168.1.1-192.168.1.255. 1
Others will be detected by themselves. After that, click "OK ". At this time, the interface will show all the machines in the internet cafe except for our one. You can determine the nature of the Host Based on the host name in "domain/Host Name". Generally, the host name is "server" or the name of the Internet cafe is the host of the Internet cafe, and the other is the host number. In the "status" column, yellow indicates that the host is started, and gray indicates that the host is shut down. In the "Lock" column, there are three icons, which indicate that we have not reduced it, And I indicates that the network of the machine and key hosts is disconnected, the Cross indicates that the network between the sub-host and all sub-hosts is disconnected. 2

Key hosts are generally set as hosts in Internet cafes. Click "key host" and add it to it. After adding the key host, you can see the key host we just added in "specified key host. 3

After that, click "OK ". What about later? Now we can implement our plan. First look at the number of the guy's machine, then his corresponding IP address is generally 192.168.0.xx. Select this host -- "right-click", and 2 will pop up. We will select 3rd "disconnect this user from all users", and then "OK ". This is what we will see on the interface that the "Lock" column of this machine is a Red Cross. "" Network management, how can I disconnect my host !! "Haha ~ In less than a minute, this guy is called. At this moment, my heart is really nervous and secretly happy !! Easy! In this way, we can fix it. Of course, you can also choose 2nd "disconnect and change the connection between users and key hosts", so that the network administrator does not know why it is pulled, this is called "Let him not know how to die ". Haha ~~~ In fact, this software has other good functions. You can study it by yourself, so I will not talk much about it !! This is just a small feature. I wish you all a pleasant learning experience!

 


 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.