国产精品视频一区麻豆_日韩一区二区三区精品_日韩视频久久99天堂_日韩卡1卡2卡三卡2021老狼

9000px;">
  • <menu id="4yk4m"></menu>
  • win7系統(tǒng)下載
    當前位置: 首頁 > xp系統(tǒng)教程 > 詳細頁面

    為啥網(wǎng)上鄰居別的電腦訪問不到我的電腦?

    發(fā)布時間:2021-02-15 文章來源:xp下載站 瀏覽:

    Windows XP是美國微軟公司研發(fā)的基于X86、X64架構(gòu)的PC和平板電腦使用的操作系統(tǒng),于2001年8月24日發(fā)布RTM版本,并于2001年10月25日開始零售。其名字中“XP”的意思來自英文中的“體驗(Experience)”。該系統(tǒng)是繼Windows 2000及Windows ME之后的下一代Windows操作系統(tǒng),也是微軟首個面向消費者且使用Windows NT5.1架構(gòu)的操作系統(tǒng)。

      電腦不能訪問網(wǎng)上鄰居怎么處理?為什么網(wǎng)上鄰居中的用戶不能直接訪問?事實上,Windows對于網(wǎng)絡(luò)安全的擔憂,限制非常多,如果事先沒有做好網(wǎng)絡(luò)連接準備,你甚至不了解是哪里出現(xiàn)了問題,導(dǎo)致無法連接到網(wǎng)上鄰居的電腦上。

    為什么網(wǎng)上鄰居別的電腦訪問不到我的電腦?

      電腦不能訪問網(wǎng)上鄰居怎么處理?

      因為微軟對網(wǎng)上鄰居的頗多限制,有用戶已經(jīng)充分考慮,并做好開通局域網(wǎng)共享的批處理文件,只需執(zhí)行一下即可。

      Ghost版本的系統(tǒng):該批處理位于開始菜單 → 程序 → 裝機人員工具 → 局域網(wǎng)共享。

      注:如果你找不到,也可以自己做一個批處理,代碼如下:(把下面代碼保存為“一鍵共享.bat”然后雙擊打開這個bat文件,按提示操作就可以啦,如果不行,請自己重啟一次電腦。

    1. 01@ECHO OFF
    2. 02cls
    3. 03echo.
    4. 04echo.
    5. 05echo 1. 開啟匿名訪問 2.啟用驗證訪問(需要輸入用戶名密碼) 3.關(guān)閉共享 4.返回
    6. 06echo.
    7. 07echo.
    8. 08set choice=
    9. 09set /p choice= ● 請選擇‖
    10. 10if /i "%choice%"=="1" goto share1
    11. 11if /i "%choice%"=="2" goto share2
    12. 12if /i "%choice%"=="3" goto share3
    13. 13if /i "%choice%"=="4" goto end
    14. 14goto share
    15. 15:share1
    16. 16cls
    17. 17net user Guest /active:yes
    18. 18echo Windows Registry Editor Version 5.00 >share.reg
    19. 19echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg
    20. 20echo "restrictanonymous"=dword:00000000 >>share.reg
    21. 21echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg
    22. 22echo "restrictanonymous"=dword:00000000 >>share.reg
    23. 23echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg
    24. 24echo "limitblankpassworduse"=dword:00000000 >>share.reg
    25. 25echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg
    26. 26echo "limitblankpassworduse"=dword:00000000 >>share.reg
    27. 27echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg
    28. 28echo "forceguest"=dword:00000001 >>share.reg
    29. 29echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>share.reg
    30. 30echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg
    31. 31echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg
    32. 32echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg
    33. 33echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg
    34. 34echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg
    35. 35echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>share.reg
    36. 36echo "Epoch"=dword:000001ED >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>share.reg
    37. 37echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg
    38. 38echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg
    39. 39echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg
    40. 40echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg
    41. 41echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>share.reg
    42. 42echo "Epoch"=dword:000001ED >>share.reg
    43. 43regedit /s share.reg
    44. 44del share.reg
    45. 45echo.
    46. 46echo.
    47. 47echo √. 局域網(wǎng)匿名訪問已開啟ゞ
    48. 48echo 注意:本機要重啟后才會生效。
    49. 49echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
    50. 50echo.
    51. 51pause & goto logon
    52. 52:end
    53. 53goto logon
    54. 54:share2
    55. 55cls
    56. 56net user Guest /active:no
    57. 57echo Windows Registry Editor Version 5.00 >usershare.reg
    58. 58echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg
    59. 59echo "restrictanonymous"=dword:00000000 >>usershare.reg
    60. 60echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg
    61. 61echo "restrictanonymous"=dword:00000000 >>usershare.reg
    62. 62echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg
    63. 63echo "limitblankpassworduse"=dword:00000000 >>usershare.reg
    64. 64echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg
    65. 65echo "limitblankpassworduse"=dword:00000000 >>usershare.reg
    66. 66echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg
    67. 67echo "forceguest"=dword:00000000 >>usershare.reg
    68. 68echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>usershare.reg
    69. 69echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg
    70. 70echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg
    71. 71echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg
    72. 72echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg
    73. 73echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg
    74. 74echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>usershare.reg
    75. 75echo "Epoch"=dword:000001ED >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>usershare.reg
    76. 76echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg
    77. 77echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg
    78. 78echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg
    79. 79echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg
    80. 80echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>usershare.reg
    81. 81echo "Epoch"=dword:000001ED >>usershare.reg
    82. 82regedit /s usershare.reg
    83. 83del usershare.reg
    84. 84echo.
    85. 85echo.
    86. 86echo √. 局域網(wǎng)驗證訪問已開啟ゞ
    87. 87echo 友情提示:無需重啟,其它機現(xiàn)在就可以訪問本機了。
    88. 88echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
    89. 89echo.
    90. 90pause & goto logon
    91. 91:end
    92. 92goto logon
    93. 93:share3
    94. 94cls
    95. 95net user Guest /active:no
    96. 96echo Windows Registry Editor Version 5.00 >offshare.reg
    97. 97echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg
    98. 98echo "restrictanonymous"=dword:00000001 >>offshare.reg
    99. 99echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg
    100. 100echo "restrictanonymous"=dword:00000001 >>offshare.reg
    101. 101echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg
    102. 102echo "limitblankpassworduse"=dword:00000001 >>offshare.reg
    103. 103echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg
    104. 104echo "limitblankpassworduse"=dword:00000001 >>offshare.reg
    105. 105echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg
    106. 106echo "forceguest"=dword:00000001 >>offshare.reg
    107. 107echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>offshare.reg
    108. 108echo "HRZR_EHAPCY"=hex:0C,00,00,00,2A,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg
    109. 109echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,13,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG] >>offshare.reg
    110. 110echo "Seed"=hex:AC,6F,9A,2B,11,64,44,68,EC,90,1B,76,72,A7,0A,14,4C,79,37,BB,FD,BD,70,B2,B2,58,D5,B5,89,5C,B6,4E,3B,18,A5,26,46,BC,3E,6A,30,A4,7D,A0,56,E6,6A,B5,57,3A,BF,A1,CD,CA,B6,64,4C,F9,0E,D2,64,ED,86,1F,61,F6,D1,01,0B,7C,8D,BD,73,10,C8,4E,57,93,4E,90 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg
    111. 111echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg
    112. 112echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg
    113. 113echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg
    114. 114echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>offshare.reg
    115. 115echo "Epoch"=dword:000001FC >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg
    116. 116echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg
    117. 117echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg
    118. 118echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg
    119. 119echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>offshare.reg
    120. 120echo "Epoch"=dword:000001FC >>offshare.reg
    121. 121regedit /s offshare.reg
    122. 122del offshare.reg
    123. 123echo.
    124. 124echo.
    125. 125echo √. 已關(guān)閉局域網(wǎng)共享ゞ
    126. 126echo 友情提示:不必重啟,設(shè)置已生效。
    127. 127echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
    128. 128echo.
    129. 129pause & goto logon
    復(fù)制代碼
    @ECHO OFF cls echo. echo. echo 1. 開啟匿名訪問 2.啟用驗證訪問(需要輸入用戶名密碼) 3.關(guān)閉共享 4.返回 echo. echo. set choice= set /p choice= ● 請選擇‖ if /i "%choice%"=="1" goto share1 if /i "%choice%"=="2" goto share2 if /i "%choice%"=="3" goto share3 if /i "%choice%"=="4" goto end goto share :share1 cls net user Guest /active:yes echo Windows Registry Editor Version 5.00 >share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg echo "restrictanonymous"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg echo "restrictanonymous"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg echo "limitblankpassworduse"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg echo "limitblankpassworduse"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg echo "forceguest"=dword:00000001 >>share.reg echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>share.reg echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>share.reg echo "Epoch"=dword:000001ED >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>share.reg echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>share.reg echo "Epoch"=dword:000001ED >>share.reg regedit /s share.reg del share.reg echo. echo. echo √. 局域網(wǎng)匿名訪問已開啟ゞ echo 注意:本機要重啟后才會生效。 echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ echo. pause & goto logon :end goto logon :share2 cls net user Guest /active:no echo Windows Registry Editor Version 5.00 >usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg echo "restrictanonymous"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg echo "restrictanonymous"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg echo "limitblankpassworduse"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg echo "limitblankpassworduse"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg echo "forceguest"=dword:00000000 >>usershare.reg echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>usershare.reg echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>usershare.reg echo "Epoch"=dword:000001ED >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>usershare.reg echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>usershare.reg echo "Epoch"=dword:000001ED >>usershare.reg regedit /s usershare.reg del usershare.reg echo. echo. echo √. 局域網(wǎng)驗證訪問已開啟ゞ echo 友情提示:無需重啟,其它機現(xiàn)在就可以訪問本機了。 echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ echo. pause & goto logon :end goto logon :share3 cls net user Guest /active:no echo Windows Registry Editor Version 5.00 >offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg echo "restrictanonymous"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg echo "restrictanonymous"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg echo "limitblankpassworduse"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg echo "limitblankpassworduse"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg echo "forceguest"=dword:00000001 >>offshare.reg echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>offshare.reg echo "HRZR_EHAPCY"=hex:0C,00,00,00,2A,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,13,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG] >>offshare.reg echo "Seed"=hex:AC,6F,9A,2B,11,64,44,68,EC,90,1B,76,72,A7,0A,14,4C,79,37,BB,FD,BD,70,B2,B2,58,D5,B5,89,5C,B6,4E,3B,18,A5,26,46,BC,3E,6A,30,A4,7D,A0,56,E6,6A,B5,57,3A,BF,A1,CD,CA,B6,64,4C,F9,0E,D2,64,ED,86,1F,61,F6,D1,01,0B,7C,8D,BD,73,10,C8,4E,57,93,4E,90 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>offshare.reg echo "Epoch"=dword:000001FC >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>offshare.reg echo "Epoch"=dword:000001FC >>offshare.reg regedit /s offshare.reg del offshare.reg echo. echo. echo √. 已關(guān)閉局域網(wǎng)共享ゞ echo 友情提示:不必重啟,設(shè)置已生效。 echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ echo. pause & goto logon

      如果電腦上安裝了類似金山網(wǎng)鏢這樣的網(wǎng)絡(luò)防火墻,也是造成不能訪問局域網(wǎng)用戶的原因。

      以上內(nèi)容便是關(guān)于電腦不能訪問網(wǎng)上鄰居的處理方法,制作好bat文件之后,最好還是重啟一次計算機,讓所有的設(shè)置生效。


    Windows XP服役時間長達13年,產(chǎn)生的經(jīng)濟價值也較高。2014年4月8日,微軟終止對該系統(tǒng)的技術(shù)支持,但在此之后仍在一些重大計算機安全事件中對該系統(tǒng)發(fā)布了補丁。

    国产精品视频一区麻豆_日韩一区二区三区精品_日韩视频久久99天堂_日韩卡1卡2卡三卡2021老狼
  • <menu id="4yk4m"></menu>
  • 国产成人福利片| 国产精品一二三四区| 精品国产免费人成在线观看| 日精品一区二区三区| 国产精品色呦呦| 亚洲欧美在线高清| 国产精品国产自产拍高清av王其| 天堂va蜜桃一区二区三区| 亚洲国产精品久久久久秋霞影院| 久久久久国产成人精品亚洲午夜| 欧美日韩精品综合在线| 日韩一区二区三区三四区视频在线观看| 丝袜美腿亚洲一区| 国产精品69久久久久水密桃| 亚洲精品视频在线| 91麻豆国产自产在线观看| 91欧美激情一区二区三区成人| 欧美激情中文字幕一区二区| 亚洲欧美激情插| 欧美吞精做爰啪啪高潮| 欧美三电影在线| 丝袜诱惑亚洲看片| 国产精品白丝jk黑袜喷水| 蜜桃视频在线观看一区| 天堂影院一区二区| 欧美日韩国产不卡| 亚洲色图制服诱惑| 老汉av免费一区二区三区| 成人一级片网址| 日韩精品久久久久久| 国产精品色噜噜| 91美女片黄在线观看| 日本aⅴ亚洲精品中文乱码| 亚洲一区二区三区在线| 欧美一级二级三级乱码| 成人美女视频在线观看| 国产精品一品视频| 欧美另类一区二区三区| 欧美一区二区三区系列电影| 国产精品国产三级国产普通话蜜臀| 欧美亚洲国产一区二区三区va| 亚洲v日本v欧美v久久精品| 制服丝袜一区二区三区| 91同城在线观看| 国产主播一区二区三区| 91日韩精品一区| 国产一区二区按摩在线观看| 国产精品综合一区二区三区| 一区二区三区欧美激情| 日韩激情视频在线观看| 天天操天天综合网| 日韩欧美高清一区| 色悠悠亚洲一区二区| 欧美一区二区观看视频| 日本sm残虐另类| 日韩一区日韩二区| 久久亚区不卡日本| 在线国产亚洲欧美| 久久精品亚洲一区二区三区浴池| 午夜在线电影亚洲一区| 亚洲欧洲日产国产综合网| 蜜桃视频一区二区三区在线观看| 欧美va亚洲va国产综合| 国产在线精品视频| 欧日韩精品视频| 美日韩一区二区| 欧美军同video69gay| 91视频免费看| 国产欧美一区二区精品性| 国产sm精品调教视频网站| 一区二区中文字幕在线| 91蝌蚪porny九色| 有坂深雪av一区二区精品| 美女视频一区二区三区| 精品免费99久久| 日本欧美一区二区三区| 日本精品免费观看高清观看| 国产a区久久久| 国产婷婷色一区二区三区在线| 亚洲尤物在线视频观看| 国产精品嫩草影院com| 国产精品中文字幕一区二区三区| 色综合中文字幕国产| 亚洲综合色丁香婷婷六月图片| 国产精品久久福利| 国产亚洲va综合人人澡精品| 色综合天天做天天爱| 亚洲另类在线视频| 亚洲精品videosex极品| 欧美一级黄色大片| 天堂一区二区在线免费观看| 精品国产三级电影在线观看| 狠狠色2019综合网| 欧美日韩成人高清| 欧美日韩国产综合久久| 日韩欧美一区二区三区在线| 99久久久免费精品国产一区二区| 国产色综合一区| 亚洲一区二区欧美| 亚洲精品自拍动漫在线| 日产国产高清一区二区三区| 一区二区三区不卡视频| 精品理论电影在线观看| 精品国产乱码久久久久久浪潮| 欧美综合久久久| 国产精品电影一区二区三区| 国内成人精品2018免费看| 欧美日韩一级二级| 日本韩国精品一区二区在线观看| 日本精品视频一区二区三区| 99久久精品免费观看| www.亚洲人| 日韩精品欧美精品| 日本一区二区三区久久久久久久久不| 精品国产sm最大网站免费看| 欧美国产日产图区| 精品精品欲导航| 成人av电影观看| 337p日本欧洲亚洲大胆精品| 亚洲一区二区三区视频在线| 欧美精品一区二区三区四区| 三级影片在线观看欧美日韩一区二区| 国产午夜精品一区二区三区四区| 欧美最猛黑人xxxxx猛交| 日韩精品五月天| 福利一区福利二区| 日韩欧美中文字幕公布| 国产肉丝袜一区二区| 欧美三级午夜理伦三级中视频| 蜜桃精品视频在线观看| 91香蕉视频mp4| 日韩精品一区二区三区在线| 97se亚洲国产综合自在线不卡| 久久蜜桃香蕉精品一区二区三区| 欧美肥妇毛茸茸| 欧美三级欧美一级| 国产91在线观看| av成人免费在线观看| 国产乱色国产精品免费视频| 亚洲美女屁股眼交| 欧洲另类一二三四区| 91网站在线观看视频| 欧美精品日韩一本| 蜜乳av一区二区三区| 99久久精品99国产精品| 成人黄色小视频| 亚洲国产视频一区| 自拍偷拍亚洲综合| 午夜精品福利一区二区三区蜜桃| 亚洲一区二区三区视频在线播放| 亚洲图片欧美一区| 欧美日韩中字一区| 欧美日韩中文字幕一区二区| 欧美xxxxx裸体时装秀| 免费观看91视频大全| 99久久久精品免费观看国产蜜| 国产一区二区三区在线观看免费视频| 国产精品99久久不卡二区| 91久久国产综合久久| 精品毛片乱码1区2区3区| 欧美亚洲图片小说| 26uuu国产日韩综合| 欧美三级午夜理伦三级中视频| 色婷婷亚洲婷婷| 日韩电影在线一区二区| 午夜精品久久一牛影视| 欧美成人精品3d动漫h| 国产在线不卡视频| 亚洲曰韩产成在线| 日本一区二区在线不卡| 亚洲小少妇裸体bbw| 亚洲私人影院在线观看| 欧美肥妇毛茸茸| 国产午夜精品美女毛片视频| 成人欧美一区二区三区黑人麻豆| 欧美国产日韩a欧美在线观看| 欧美在线视频日韩| 9i在线看片成人免费| 精品一区二区三区久久久| 国产一区不卡在线| 337p亚洲精品色噜噜狠狠| 国产一区二区美女诱惑| 欧美一区二区人人喊爽| 亚洲综合免费观看高清完整版在线| 琪琪久久久久日韩精品| 99在线视频精品| 91精品国产综合久久婷婷香蕉| 91精品国产综合久久国产大片| 天天综合日日夜夜精品| 欧美一区二区二区| 久久久三级国产网站| 日本黄色一区二区| 精品久久久久久久久久久久久久久久久| 国产美女精品人人做人人爽| 91老师国产黑色丝袜在线| 在线观看不卡视频| 国产色产综合色产在线视频| 精品黑人一区二区三区久久| 亚洲电影中文字幕在线观看| 亚洲国产一区在线观看|