Now a lot of computer experts in order to prevent the computer to be invaded will choose their own computer IP hidden, to prevent the leakage of privacy, what method can hide their own computer IP? Yes, and now let's study together.
First step:
With local security policy, first turn on IP Security policy by entering Secpol.msc in "Run" in the Win7 flagship or by opening the IP Security policy in the Control Panel
Right-click the IP Security policy that you just added, on the local machine, select Create IP Security Policy, click Next, and then enter a policy description, such as "noping." Click Next, select the Activate Default response rule option, and then click Next. Start setting the authentication method, select the "This string is used to protect the key exchange (preshared key)" option, and then casually enter some characters (these characters are also used below). When you click Next, you are prompted to complete the IP Security policy, confirming that the Edit properties check box is selected, and clicking the Finish button opens its Properties dialog box.
Step Two:
Configure security Policy Click the Add button, and in the Open Security Rule Wizard, click Next to make the tunnel finalization setting, where this rule does not specify a tunnel. Click Next and select all network connections to ensure that all computers are not pinging. Click Next to set the authentication method, as above select the third option "This string is used to protect the key exchange (preshared key)" and fill in the same content as just now. Click Next, and in the Open window, click the Add button to open the IP Filter List window. Click "Add", click Next to set the source address to my IP address, click Next, set the destination address to any IP address, click Next, select the Protocol as ICMP, and now click Finish and close to return. At this point, you can see the filter you just created in the IP filter list, select it, click Next, select the filter action as the Require Security setting option, and then click Finish, turn off, and save the related settings back to the governance console
Step three: Assigning security policies
Finally, just right-click the configured "No ping" policy in the Console root node and select the Assign command to make the configuration effective. With the above settings, when other computers ping the computer again, they are no longer connected. But if you ping the local computer, you can still connect.
Hide your computer in your online neighborhood
To edit your registry:
Set the value of hidden under hkey_local_machinesystemcurrentcontrolsetserviceslanmanserverparameters from 0 to 1, which is the DWORD type.