<address id="rjzdp"></address>
    <sub id="rjzdp"><listing id="rjzdp"><meter id="rjzdp"></meter></listing></sub>

            <address id="rjzdp"><nobr id="rjzdp"><th id="rjzdp"></th></nobr></address>

            <em id="rjzdp"><span id="rjzdp"></span></em>

                  win7系統下載
                  當前位置: 首頁 > xp系統教程 > 詳細頁面

                  為啥網上鄰居別的電腦訪問不到我的電腦?

                  發布時間:2021-02-15 文章來源:xp下載站 瀏覽:

                  Windows XP是美國微軟公司研發的基于X86、X64架構的PC和平板電腦使用的操作系統,于2001年8月24日發布RTM版本,并于2001年10月25日開始零售。其名字中“XP”的意思來自英文中的“體驗(Experience)”。該系統是繼Windows 2000及Windows ME之后的下一代Windows操作系統,也是微軟首個面向消費者且使用Windows NT5.1架構的操作系統。

                    電腦不能訪問網上鄰居怎么處理?為什么網上鄰居中的用戶不能直接訪問?事實上,Windows對于網絡安全的擔憂,限制非常多,如果事先沒有做好網絡連接準備,你甚至不了解是哪里出現了問題,導致無法連接到網上鄰居的電腦上。

                  為什么網上鄰居別的電腦訪問不到我的電腦?

                    電腦不能訪問網上鄰居怎么處理?

                    因為微軟對網上鄰居的頗多限制,有用戶已經充分考慮,并做好開通局域網共享的批處理文件,只需執行一下即可。

                    Ghost版本的系統:該批處理位于開始菜單 → 程序 → 裝機人員工具 → 局域網共享。

                    注:如果你找不到,也可以自己做一個批處理,代碼如下:(把下面代碼保存為“一鍵共享.bat”然后雙擊打開這個bat文件,按提示操作就可以啦,如果不行,請自己重啟一次電腦!)

                  1. 01@ECHO OFF
                  2. 02cls
                  3. 03echo.
                  4. 04echo.
                  5. 05echo 1. 開啟匿名訪問 2.啟用驗證訪問(需要輸入用戶名密碼) 3.關閉共享 4.返回
                  6. 06echo.
                  7. 07echo.
                  8. 08set choice=
                  9. 09set /p choice= ● 請選擇‖
                  10. 10if /i "%choice%"=="1" goto share1
                  11. 11if /i "%choice%"=="2" goto share2
                  12. 12if /i "%choice%"=="3" goto share3
                  13. 13if /i "%choice%"=="4" goto end
                  14. 14goto share
                  15. 15:share1
                  16. 16cls
                  17. 17net user Guest /active:yes
                  18. 18echo Windows Registry Editor Version 5.00 >share.reg
                  19. 19echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg
                  20. 20echo "restrictanonymous"=dword:00000000 >>share.reg
                  21. 21echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg
                  22. 22echo "restrictanonymous"=dword:00000000 >>share.reg
                  23. 23echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg
                  24. 24echo "limitblankpassworduse"=dword:00000000 >>share.reg
                  25. 25echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg
                  26. 26echo "limitblankpassworduse"=dword:00000000 >>share.reg
                  27. 27echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg
                  28. 28echo "forceguest"=dword:00000001 >>share.reg
                  29. 29echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>share.reg
                  30. 30echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg
                  31. 31echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg
                  32. 32echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg
                  33. 33echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg
                  34. 34echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg
                  35. 35echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>share.reg
                  36. 36echo "Epoch"=dword:000001ED >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>share.reg
                  37. 37echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg
                  38. 38echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg
                  39. 39echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg
                  40. 40echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg
                  41. 41echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>share.reg
                  42. 42echo "Epoch"=dword:000001ED >>share.reg
                  43. 43regedit /s share.reg
                  44. 44del share.reg
                  45. 45echo.
                  46. 46echo.
                  47. 47echo √. 局域網匿名訪問已開啟ゞ
                  48. 48echo 注意:本機要重啟后才會生效。
                  49. 49echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
                  50. 50echo.
                  51. 51pause & goto logon
                  52. 52:end
                  53. 53goto logon
                  54. 54:share2
                  55. 55cls
                  56. 56net user Guest /active:no
                  57. 57echo Windows Registry Editor Version 5.00 >usershare.reg
                  58. 58echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg
                  59. 59echo "restrictanonymous"=dword:00000000 >>usershare.reg
                  60. 60echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg
                  61. 61echo "restrictanonymous"=dword:00000000 >>usershare.reg
                  62. 62echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg
                  63. 63echo "limitblankpassworduse"=dword:00000000 >>usershare.reg
                  64. 64echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg
                  65. 65echo "limitblankpassworduse"=dword:00000000 >>usershare.reg
                  66. 66echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg
                  67. 67echo "forceguest"=dword:00000000 >>usershare.reg
                  68. 68echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>usershare.reg
                  69. 69echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg
                  70. 70echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg
                  71. 71echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg
                  72. 72echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg
                  73. 73echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg
                  74. 74echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>usershare.reg
                  75. 75echo "Epoch"=dword:000001ED >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>usershare.reg
                  76. 76echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg
                  77. 77echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg
                  78. 78echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg
                  79. 79echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg
                  80. 80echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>usershare.reg
                  81. 81echo "Epoch"=dword:000001ED >>usershare.reg
                  82. 82regedit /s usershare.reg
                  83. 83del usershare.reg
                  84. 84echo.
                  85. 85echo.
                  86. 86echo √. 局域網驗證訪問已開啟ゞ
                  87. 87echo 友情提示:無需重啟,其它機現在就可以訪問本機了。
                  88. 88echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
                  89. 89echo.
                  90. 90pause & goto logon
                  91. 91:end
                  92. 92goto logon
                  93. 93:share3
                  94. 94cls
                  95. 95net user Guest /active:no
                  96. 96echo Windows Registry Editor Version 5.00 >offshare.reg
                  97. 97echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg
                  98. 98echo "restrictanonymous"=dword:00000001 >>offshare.reg
                  99. 99echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg
                  100. 100echo "restrictanonymous"=dword:00000001 >>offshare.reg
                  101. 101echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg
                  102. 102echo "limitblankpassworduse"=dword:00000001 >>offshare.reg
                  103. 103echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg
                  104. 104echo "limitblankpassworduse"=dword:00000001 >>offshare.reg
                  105. 105echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg
                  106. 106echo "forceguest"=dword:00000001 >>offshare.reg
                  107. 107echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>offshare.reg
                  108. 108echo "HRZR_EHAPCY"=hex:0C,00,00,00,2A,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg
                  109. 109echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,13,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG] >>offshare.reg
                  110. 110echo "Seed"=hex:AC,6F,9A,2B,11,64,44,68,EC,90,1B,76,72,A7,0A,14,4C,79,37,BB,FD,BD,70,B2,B2,58,D5,B5,89,5C,B6,4E,3B,18,A5,26,46,BC,3E,6A,30,A4,7D,A0,56,E6,6A,B5,57,3A,BF,A1,CD,CA,B6,64,4C,F9,0E,D2,64,ED,86,1F,61,F6,D1,01,0B,7C,8D,BD,73,10,C8,4E,57,93,4E,90 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg
                  111. 111echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg
                  112. 112echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg
                  113. 113echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg
                  114. 114echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>offshare.reg
                  115. 115echo "Epoch"=dword:000001FC >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg
                  116. 116echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg
                  117. 117echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg
                  118. 118echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg
                  119. 119echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>offshare.reg
                  120. 120echo "Epoch"=dword:000001FC >>offshare.reg
                  121. 121regedit /s offshare.reg
                  122. 122del offshare.reg
                  123. 123echo.
                  124. 124echo.
                  125. 125echo √. 已關閉局域網共享ゞ
                  126. 126echo 友情提示:不必重啟,設置已生效。
                  127. 127echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
                  128. 128echo.
                  129. 129pause & goto logon
                  復制代碼
                  @ECHO OFF cls echo. echo. echo 1. 開啟匿名訪問 2.啟用驗證訪問(需要輸入用戶名密碼) 3.關閉共享 4.返回 echo. echo. set choice= set /p choice= ● 請選擇‖ if /i "%choice%"=="1" goto share1 if /i "%choice%"=="2" goto share2 if /i "%choice%"=="3" goto share3 if /i "%choice%"=="4" goto end goto share :share1 cls net user Guest /active:yes echo Windows Registry Editor Version 5.00 >share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg echo "restrictanonymous"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg echo "restrictanonymous"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg echo "limitblankpassworduse"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg echo "limitblankpassworduse"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg echo "forceguest"=dword:00000001 >>share.reg echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>share.reg echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>share.reg echo "Epoch"=dword:000001ED >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>share.reg echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>share.reg echo "Epoch"=dword:000001ED >>share.reg regedit /s share.reg del share.reg echo. echo. echo √. 局域網匿名訪問已開啟ゞ echo 注意:本機要重啟后才會生效。 echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ echo. pause & goto logon :end goto logon :share2 cls net user Guest /active:no echo Windows Registry Editor Version 5.00 >usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg echo "restrictanonymous"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg echo "restrictanonymous"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg echo "limitblankpassworduse"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg echo "limitblankpassworduse"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg echo "forceguest"=dword:00000000 >>usershare.reg echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>usershare.reg echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>usershare.reg echo "Epoch"=dword:000001ED >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>usershare.reg echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>usershare.reg echo "Epoch"=dword:000001ED >>usershare.reg regedit /s usershare.reg del usershare.reg echo. echo. echo √. 局域網驗證訪問已開啟ゞ echo 友情提示:無需重啟,其它機現在就可以訪問本機了。 echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ echo. pause & goto logon :end goto logon :share3 cls net user Guest /active:no echo Windows Registry Editor Version 5.00 >offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg echo "restrictanonymous"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg echo "restrictanonymous"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg echo "limitblankpassworduse"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg echo "limitblankpassworduse"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg echo "forceguest"=dword:00000001 >>offshare.reg echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>offshare.reg echo "HRZR_EHAPCY"=hex:0C,00,00,00,2A,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墻"=hex:0C,00,00,00,13,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG] >>offshare.reg echo "Seed"=hex:AC,6F,9A,2B,11,64,44,68,EC,90,1B,76,72,A7,0A,14,4C,79,37,BB,FD,BD,70,B2,B2,58,D5,B5,89,5C,B6,4E,3B,18,A5,26,46,BC,3E,6A,30,A4,7D,A0,56,E6,6A,B5,57,3A,BF,A1,CD,CA,B6,64,4C,F9,0E,D2,64,ED,86,1F,61,F6,D1,01,0B,7C,8D,BD,73,10,C8,4E,57,93,4E,90 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>offshare.reg echo "Epoch"=dword:000001FC >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>offshare.reg echo "Epoch"=dword:000001FC >>offshare.reg regedit /s offshare.reg del offshare.reg echo. echo. echo √. 已關閉局域網共享ゞ echo 友情提示:不必重啟,設置已生效。 echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ echo. pause & goto logon

                    如果電腦上安裝了類似金山網鏢這樣的網絡防火墻,也是造成不能訪問局域網用戶的原因。

                    以上內容便是關于電腦不能訪問網上鄰居的處理方法,制作好bat文件之后,最好還是重啟一次計算機,讓所有的設置生效。


                  Windows XP服役時間長達13年,產生的經濟價值也較高。2014年4月8日,微軟終止對該系統的技術支持,但在此之后仍在一些重大計算機安全事件中對該系統發布了補丁。

                  国产色视频网免费_亚洲精品无码人妻无码_麻豆床传媒_国产在线无码视频一区二区三区

                    <address id="rjzdp"></address>
                    <sub id="rjzdp"><listing id="rjzdp"><meter id="rjzdp"></meter></listing></sub>

                            <address id="rjzdp"><nobr id="rjzdp"><th id="rjzdp"></th></nobr></address>

                            <em id="rjzdp"><span id="rjzdp"></span></em>

                                  >