Open LAN Share (access to the local computer without verification can enter). cmd
Copy Code code as follows:
@ ECHO off
@ ECHO.
@ ECHO. Description
@ ECHO--------------------------------------------------------------------
@ ECHO After this batch is executed, some of the following settings are made:
@ ECHO 1, anonymous enumeration that allows SAM accounts and shares (the system is disabled by default, as the original system allows).
@ ECHO 2, native account if the blank password, allow other machines to access the local computer.
@ ECHO 3, Windows Firewall: Allows file and printer sharing.
@ ECHO 4, sharing mode: Local user authenticated as guest.
@ ECHO 5, Guest account: Enabled.
@ ECHO--------------------------------------------------------------------
@ ECHO.
@ ECHO is shared so that no other machine can access the computer without losing the user name and password. For example, the family
@ ECHO LAN, each one of them can be trusted, use this method.
@ ECHO.
@ ECHO no matter which sharing method is used, sharing is only convenient for internal use, when using the router to surf the internet,
@ ECHO Extranet cannot access your machine and will be invaded without fear of sharing. You just remember, single dialing
@ ECHO When surfing the Internet, do not open the sharing on it.
@ ECHO--------------------------------------------------------------------
@ ECHO.
PAUSE
REGEDIT/S open LAN Share (access to this machine without authentication can enter). reg
NET user Guest/active:yes
Cls
@ ECHO.
@ ECHO--------------------------------------------------------------------
@ ECHO operation completed.
@ ECHO Note: This confidential will not take effect until it is restarted.
@ ECHO.
The default share for each partition of the @ ECHO hard disk is still not open. If you need to open,
@ ECHO Please find the registry file in this directory and double-click Import.
@ ECHO--------------------------------------------------------------------
@ ECHO.
@ ECHO knotty Problem Supplemental:
@ ECHO If the previous share was shared by a local user who was authenticated as himself,
@ ECHO now changes to guest authentication and then accesses the folder, and an error pops up: "Unable to access, you
@ ECHO does not have permission to use network resources. " The solution is to cancel the original share on the folder property, but
After the @ ECHO is shared again, it's OK.
@ ECHO--------------------------------------------------------------------
PAUSE
, author of the special edition of GHOSTXP_SP2 computer company.
Open LAN Share (access to the local computer without verification can enter). reg
Copy Code code as follows:
Windows Registry Editor Version 5.00
[Hkey_local_machine\system\controlset001\control\lsa]
"RestrictAnonymous" =dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa]
"RestrictAnonymous" =dword:00000000
; The above two lines are located in the system: Local Security Policy-security option-Network access: Do not allow SAM accounts and shares
; An anonymous enumeration. The system defaults are: deactivated.
; Explanation: Operating system default: Use the ipc$ channel to establish a null connection, anonymous to cite how many accounts the machine. Obviously
; There is a certain safety hazard. This system has been set to disallow null connections. In order to improve the security of stand-alone dial-up Internet.
; The negative effect is that the LAN cannot exchange visits. You have to change it before you can solve it.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa]
"Limitblankpassworduse" =dword:00000000
[Hkey_local_machine\system\controlset001\control\lsa]
"Limitblankpassworduse" =dword:00000000
; The location of the above two lines in the system is: Local Security policy--security option--account: Local account with blank password
; Only console logons are allowed. The system defaults are: Enabled.
; Explanation: Many people's accounts are not password-coded. In this way, when another computer on the local area network accesses this machine, it will eject the error message:
; Logon failure: User account limit ..... This is a security policy of the XP system that prevents people from taking advantage of your blank password
; Go to your computer. If you feel indifferent and do not have to do these limitations, set it to: deactivated.
[hkey_current_user\software\microsoft\windows\currentversion\explorer\userassist\{75048700- Ef1f-11d0-9888-006097deacf9}\count]
"Hrzr_ehapcy" =hex:0c,00,00,00,26,00,00,00,f0,fb,e5,52,64,95,c6,01
"Hrzr_ehapcy:" P:\JVAQBJF\flfgrz32\sverjnyy.pcy ", JVAQBJF Firewall" =HEX:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6, 01
[Hkey_local_machine\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\ Globallyopenports\list]
"445:tcp" = "445:tcp:localsubnet:enabled: @xpsp2res. dll,-22005"
"137:UDP" = "137:udp:localsubnet:enabled: @xpsp2res. dll,-22001"
"138:UDP" = "138:udp:localsubnet:enabled: @xpsp2res. dll,-22002"
"139:tcp" = "139:tcp:localsubnet:enabled: @xpsp2res. dll,-22004"
[Hkey_local_machine\system\currentcontrolset\services\sharedaccess\epoch]
"Epoch" =dword:000001ed
[Hkey_local_machine\system\controlset001\control\print\providers]
"Logontime" =hex:e8,31,8e,4f,64,95,c6,01
[Hkey_local_machine\system\controlset001\services\sharedaccess\parameters\firewallpolicy\standardprofile\ Globallyopenports\list]
"445:tcp" = "445:tcp:localsubnet:enabled: @xpsp2res. dll,-22005"
"137:UDP" = "137:udp:localsubnet:enabled: @xpsp2res. dll,-22001"
"138:UDP" = "138:udp:localsubnet:enabled: @xpsp2res. dll,-22002"
"139:tcp" = "139:tcp:localsubnet:enabled: @xpsp2res. dll,-22004"
[Hkey_local_machine\system\controlset001\services\sharedaccess\epoch]
"Epoch" =dword:000001ed
; The above values correspond to the position in the system: Control Panel-Firewall-exception-file and printer sharing. System default: Not selected.
; Explanation: All the policies are set up, the LAN is still inaccessible, prompting: You do not have the right to use network resources, find
; Not to the network path! Oh, it's so furious! In fact, XP also has a checkpoint, is the firewall, must go through
; The firewall allows you to do so.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa]
"ForceGuest" =dword:00000001
; The above numerical corresponding position in the system is: Control Panel--management tools--local security policy--local policy--security options,
; Network access: Sharing and security mode for local accounts: Guest only-local users authenticate as guest. At this time, when the LAN
; When other machines access this machine, the dialog box will not pop up and you can enter directly. In a fully trusted area such as a home network,
; It is recommended that this approach be used.
, written by the author of the GHOSTXP_SP2 Computer Company Special Edition. Thank you for your use.