When we shut down the computer, there is often a prompt that "there is a computer connected to your computer, if it is disabled, data will be interrupted", especially in the LAN. In fact, this is because others are accessing shared resources on their computers through the network! In the face of such bad actions, can we just make a fuss! Of course not. Let's cut off the Black Hand behind it.
I. doscommand Method
Open the "run" window in the "Start" menu and enter "cmd" to enter the Command Prompt window. First, check whether a user is illegally connected to the local machine. Enter "net use" in the command prompt and press Enter. Someone is connected to the local device. In "remote", you can see which computer is connected. First, record the IP address as evidence, and then we need to close the connection. Enter "net use \ 10.10.22.8IPC $/del" at the command prompt. After you press enter, the system will prompt that the device has been deleted. In actual application, replace "\ 10.10.22.8IPC $" in the command with the actual name (figure 1 ). Of course, if there are many connected tasks, we can also delete them at a time, just replace the preceding DELETE command with "net use */del.
Ii. Direct Management
Using the net use Command makes many cainiao friends feel inconvenient. In fact, the system also has such a management tool, which allows us to check who has accessed the computer.
Right-click "my computer" on the desktop, select "manage" in the pop-up menu, and select "shared folder" under "System Tools" on the left side of the Open Computer Management window ". In this case, you only need to enable the "session" option, and the user connected to the local machine will be displayed on the right. In this case, to disconnect the user, right-click the session and select the "close session" command in the pop-up menu. In addition, we can also directly close open files, select Open files under shared folder, right-click the file to be closed on the right, select the "Close opened files" command in the pop-up menu (figure 2 ).
In fact, From the security perspective, we should also open "share" under "shared folder", right-click some unnecessary shared connections, and select "stop sharing ", in this way, even if the other party connects to our computer, they cannot directly view the contents of the computer, which is much safer.