To use the net command under the CMD window:
1, use net usage to view the current network connection first. (for example, the resources we have found are: \\192.168.1.201\IPC$)
2, use net use\\192.168.1.201\ipc$/del Delete the connection that needs to change password. (The path here is based on the network connection you see above, there may be more than one)
3, use net use\\192.168.1.201 User: New username to establish new connection. You will be required to enter the password after the connection is established.
Here's a better way to do this
The code is as follows |
Copy Code |
Windows Registry Editor Version 5.00[hkey_local_machine\system\controlset001\control\lsa] "RestrictAnonymous" =dword : 00000000[hkey_local_machine\system\currentcontrolset\control\lsa] "RestrictAnonymous" =dword:00000000; |
The above two lines are located in the system: Local Security Policy-security options-Network access: Do not allow SAM accounts and shares; An anonymous enumeration. The system defaults are: deactivated.; Explanation: Operating system default: Use the ipc$ channel to establish a null connection, anonymous to cite how many accounts the machine. Obviously There is a certain safety hazard. This system has been set to disallow null connections. In order to improve the security of single dial Internet. The negative effect is that the LAN cannot exchange visits. You have to change it before you can solve it.
The code is as follows |
Copy Code |
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] "Limitblankpassworduse" =dword:00000000[HKEY_LOCAL_ MACHINE\SYSTEM\CONTROLSET001\CONTROL\LSA] "Limitblankpassworduse" =dword:00000000; |
The location of the above two lines in the system is: Local Security policy--security option--account: Local account with blank password; Only console logons are allowed. The system defaults are: Enabled.; Explanation: Many people's accounts are not password-coded. In this way, when other computers in the local area network access this machine, will be pop-up error prompts:; Logon failure: User account limit ..... This is a security policy of the XP system, which prevents others from taking advantage of your blank password; Go to your computer. If you feel indifferent and do not have to do these limitations, set it to: deactivated.
code is as follows |
copy code |
[hkey_current_user\software\microsoft\windows\currentversion\explorer\userassist\{75048700- Ef1f-11d0-9888-006097deacf9}\count] "Hrzr_ehapcy" =hex:0c,00,00,00,26,00,00,00,f0,fb,e5,52,64,95,c6,01 "HRZR_ Ehapcy: "P:\JVAQBJF\flfgrz32\sverjnyy.pcy", JVAQBJF Firewall "=hex:0c,00,00,00,08,00,00,00,f0,fb,e5,52,64,95,c6,01[hkey _local_ Machine\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\globallyopenports\list ] "445:tcp" = "445:tcp:localsubnet:enabled: @xpsp2res. dll,-22005" "137:udp" = "137:udp:localsubnet:enabled:@ xpsp2res.dll,-22001 "" 138:udp "=" 138:udp:localsubnet:enabled: @xpsp2res. dll,-22002 "139:tcp" = "139:tcp:localsubnet : Enabled: @xpsp2res. dll,-22004 "[Hkey_local_machine\system\currentcontrolset\services\sharedaccess\epoch]" Epoch " =dword:000001ed[hkey_local_machine\system\controlset001\control\print\providers] "LogonTime" =hex:E8,31,8E,4F, 64,95,c6,01[hkey_local_ Machine\system\controlset001\services\sharedaccess\parameters\firewallpolicy\standardprofile\globallyopenports\lisT] "445:tcp" = "445:tcp:localsubnet:enabled: @xpsp2res. dll,-22005" "137:udp" = "137:udp:localsubnet:enabled:@ xpsp2res.dll,-22001 "" 138:udp "=" 138:udp:localsubnet:enabled: @xpsp2res. dll,-22002 "139:tcp" = "139:tcp:localsubnet : Enabled: @xpsp2res. dll,-22004 "[Hkey_local_machine\system\controlset001\services\sharedaccess\epoch]" Epoch "= dword:000001ed; |
The above values correspond to the position in the system: Control Panel-Firewall-exception-file and printer sharing. System default: Not selected.; Explanation: All the strategies are set up, the LAN still cannot access, prompting: You do not have the right to use network resources, find; Not to the network path! Oh, it's so furious! In fact, XP also has a checkpoint, is the firewall, must go through; The firewall allows you to do so.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] "ForceGuest" =dword:00000000;
The above numerical corresponding position in the system is: Control Panel--management tools--local security policy--local policy--security options; Network access: Sharing and security mode for local accounts: Classic-Local users authenticate themselves. At this time, when the LAN; When the other machine accesses this machine, it will pop up the dialog box and need to fill in the correct username and password to allow access. this way; is safe. Recommended use. Then you need to allow the account to log on to your computer, such as the administrator