Who are spying on your computer?

Source: Internet
Author: User

When you find that the hard drive lights suddenly flash, do you want to know who accessed your computer? What are they doing on your computer? Let's unveil the mystery on the visitor's head.

1. in Windows 98/me

You can use the network monitor provided by Windows 98/me to view who is using resources on your computer. You can add shared folders or disconnect users from your computer or specified files.

Install

Open Control Panel and select add or deleteProgram→ Windows Installer tab, select "System Tools" in the "components" list box, click the "details" button below, and then select the "Network Monitor" check box, click OK to complete the installation. The shortcut for the installed network monitor is in "Start> program> System Tools.

There are three ways to view visitors and their access resources:

One is to view by connection. Press "show user" on the toolbar. On the left of "network monitor", basic information such as the user, computer name, number of opened files, and access time that have been connected to your computer is displayed. Select a connection on the left, and the files and folders opened by the connection are displayed on the right.

Second, view by shared folder. Press the "show Shared Folders" button on the toolbar. The shared folder is displayed on the left of the "Network Monitor" main interface, and a folder is selected, the name of the computer connected to the shared folder and Its opened files are displayed on the right.

Third, you can view the opened files. Press the show shared folder button on the toolbar to display the list of files opened by visitors and the computer name of the person who opens the files.

Block access from malicious users

When you discover that visitors are spying on sensitive files, you can immediately stop them from accessing the files. There are also three methods:

First, directly close the files opened by visitors. Click "show Shared Folders" on the toolbar, select the file to close, click "manage" on the menu bar, and select "Close file.

The second is to disconnect the visitor. Click "show user" on the toolbar, select malicious visitors, click "manage" on the menu bar, and select "Disconnect user.

Third, stop sharing or use a password to restrict access permissions of visitors. Click the "show Shared Folders" button on the toolbar, select the folder to be managed, click "manage" on the menu bar, and select "stop sharing" to cancel sharing of the folder; if you do not want to stop sharing and restrict user access, you can select "shared folder attributes" to add a password for the shared file to restrict access by unauthorized users. Note that after you set the password, you must disconnect the connected user before the password can take effect.

2. in Windows 2000/XP

In Windows 2000/XP, network monitor no longer monitors access to the local machine and visitor access information, but the visitor's every action is still under Windows monitoring. Click Start> Settings> control panel, double-click Administrative Tools, double-click computer management, and double-click shared folder in the directory tree on the right ", there are three options: "sharing", "session", and "Open File ".

Share: displays the shared resources of the current system. You can create and set the share and its permissions here.

Session: displays the username, IP address, number of files opened, and access time of the Current Visitor. Right-click the user name to disconnect malicious visitors. If the other party uses Windows 2000/XP, it can send a messenger message to the other party to notify the other party about the resources they share.

Open File: displays all visitors and Their opened files. If you do not want the other party to browse your files, right-click the file and close one or all open files in the pop-up menu.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.