Recently, I have a shared local area network, and there is a problem. Some can't solve it. Some still have to study:
1. Slow speed: If the network is normal, it is only a slow speed of accessing the network. So many other users occupy over-bandwidth (such as download);
Use P2P terminations to limit local area network users, including: uplink, downstream speed, open download, etc., can solve some basic problems.
There is a certain problem in the use of the software, which is not very complete for other users (it is still good for downloaded user restrictions); now I heard that there is anti-P2P software, which day will be written.
2, break network: There is now a serious problem is that the time is always broken, which makes people feel the network instability. At present, my solution, several methods that cannot be referred to: restart the machine, automatically get the IP to manually set, manually set Go to automatically obtain IP; sometimes the network is passed, sometimes it is not, don't know why? However, there is a discovery: When I use a special IP, IP conflicts will appear (see other user IP is different), it should be that someone attacks my machine (some way is constantly prompting IP conflict, some way is broken Network), if it is an attack, what do I solve? I also heard that another statement is that the network is because the route is poisonous, or my machine is poisonous, my machine is poisonous, or my machine has the possibility of breaking the network. Because I have to restore the system, I have justified the system, and I have such problems soon, it is possible, there is no absolute. . . Now looking for real reasons, true solutions, find it back.
There is another saying that when using software such as BT, P2P, it may be controlled by people, or the problem of router.
Now basically eliminate the use of PPS, because it has not been lost, but it is half a night.
I have implemented a series of methods:
A, a temporary method: Install FireWall, seal the vulnerability (user password, shared disk, etc.), prohibit PING, prohibiting other machines from accessing the machine through the network, and then observe the network Isn't there?
B, Net Config Server / Hidden: YES hides online neighbor in my machine (but others can also connect to my machine, just can't see me in the network neighbors, one leaflet)
C, install the anti-P2P terminator software to try.