β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Detailed explanation of the connection setting method between the main control terminal and the client of shared file monitoring software and shared file permission management software :
π¦WHAT WE TALK ABOUT ?
In the case of enabling the advanced control function of the general trend to shared folder management software, that is, prohibiting copying of shared files, prohibiting sharing of shared files as local disks, prohibiting dragging and sharing of shared files, prohibiting printing of shared files, and prohibiting copying of shared file contents Requires the user's computer to run the client to the shared file management system,
> FileLockerMain.exe, in order to control the user's shared file access behavior described above. If the user is not running, the host will deny the user access to the shared file.
> However, for some reasons, users cannot connect to the management terminal normally after running FileLockerMain.exe. In this case, the following three methods can be used to solve this problem:
1οΈβ£ Make sure that the management terminal is still running. Remember to close the SharedFileMonitor on the management terminal, which will cause LAN users to be unable to access the share.
2οΈβ£Turn off the Windows firewall of the management computer. Specific method: Control Panel\System and Security\Windows Firewall
3οΈβ£If it is connected across network segments. That is, the file server where the management terminal is located is on one network segment, and the visitor is on another network segment. In this case, the IP address of the connection server needs to be manually set.
Specific method: alt+f5 calls the software hotkey (other hotkeys: alt+f6, alt+f7, alt+f8, alt+f9; if the above hotkeys are not working, you can try ctrl+f5, ctrl+f6, ctrl+ f7, ctrl+f8, ctrl+f9; if the above hotkey still does not work, you can try ctrl+alt+f5, and so on.)
4οΈβ£Then enter the default password dsz to enter, and then click "Operation Software", select "Manual Configuration", then enter the server's IP address, and then click "OK"
5οΈβ£If you are prompted to fail the test, you need to open the relevant ports from the firewall as prompted
In this case, it is usually caused by the firewall intercepting the port 19681 required by the client connection
6οΈβ£After the connection is successful, there will be a time prompt:
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Detailed explanation of the connection setting method between the main control terminal and the client of shared file monitoring software and shared file permission management software :
π¦WHAT WE TALK ABOUT ?
In the case of enabling the advanced control function of the general trend to shared folder management software, that is, prohibiting copying of shared files, prohibiting sharing of shared files as local disks, prohibiting dragging and sharing of shared files, prohibiting printing of shared files, and prohibiting copying of shared file contents Requires the user's computer to run the client to the shared file management system,
> FileLockerMain.exe, in order to control the user's shared file access behavior described above. If the user is not running, the host will deny the user access to the shared file.
> However, for some reasons, users cannot connect to the management terminal normally after running FileLockerMain.exe. In this case, the following three methods can be used to solve this problem:
Before this, you need to detect whether the management terminal can be pinged through the ping command on the client. If it can be pinged, then perform the following steps. If you can't ping, you need to solve the connection problem of the physical line first.If it can be pinged, it can be solved in the following ways.
1οΈβ£ Make sure that the management terminal is still running. Remember to close the SharedFileMonitor on the management terminal, which will cause LAN users to be unable to access the share.
2οΈβ£Turn off the Windows firewall of the management computer. Specific method: Control Panel\System and Security\Windows Firewall
3οΈβ£If it is connected across network segments. That is, the file server where the management terminal is located is on one network segment, and the visitor is on another network segment. In this case, the IP address of the connection server needs to be manually set.
Specific method: alt+f5 calls the software hotkey (other hotkeys: alt+f6, alt+f7, alt+f8, alt+f9; if the above hotkeys are not working, you can try ctrl+f5, ctrl+f6, ctrl+ f7, ctrl+f8, ctrl+f9; if the above hotkey still does not work, you can try ctrl+alt+f5, and so on.)
4οΈβ£Then enter the default password dsz to enter, and then click "Operation Software", select "Manual Configuration", then enter the server's IP address, and then click "OK"
5οΈβ£If you are prompted to fail the test, you need to open the relevant ports from the firewall as prompted
In this case, it is usually caused by the firewall intercepting the port 19681 required by the client connection
6οΈβ£After the connection is successful, there will be a time prompt:
( In this case, the shared file can be accessed normally)
@UndercodeTesting@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE SECURITY
CLONE ANY WEBSITE WITH HTTRACK.pdf
5.6 MB
Forwarded from UNDERCODE SECURITY
Content negotiation With CSRF.pdf
1.1 MB
Forwarded from UNDERCODE SECURITY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to completely kill the computer drive virus? How to avoid the computer drive virus?
2οΈβ£ This kind of virus is not intended for downloaders, so how to avoid it.
Recognize disk drive viruses
3οΈβ£The disk drive virus is not a virus in the strict sense, because it is not for downloader purposes, it is generated under the jade Windows system directory, and the main file formats are only lsass.exe and smss.exe.
π¦How to completely kill the computer drive virus? How to avoid the computer drive virus?
The Trojan Trojan has recently become a hot topic in the security field. The author of the Trojan Trojan has been updated several times, and the infection rate and destructive power are gradually increasing. So how can we completely kill these viruses. This kind of virus is not intended for downloaders, so how to avoid it. Let's study together1οΈβ£ The gradual increasing trend of the computer Internet has led to the rapid development of computer viruses now. This is undoubtedly a great blow to our normal use of computers. The new computer disk machine virus that appeared in the past few years has made many users who use the computer have a headache, so how can we completely kill such viruses.
2οΈβ£ This kind of virus is not intended for downloaders, so how to avoid it.
Recognize disk drive viruses
3οΈβ£The disk drive virus is not a virus in the strict sense, because it is not for downloader purposes, it is generated under the jade Windows system directory, and the main file formats are only lsass.exe and smss.exe.
Forwarded from UNDERCODE SECURITY
There are indeed many types of disk drive viruses. At present, more than 100 different forms have been mutated, which has led to the inability of system management tools to run.