网站首页/xp系统列表/内容

为啥网上邻居别的电脑访问不到我的电脑?

xp系统2019-02-01阅读
Windows XP是美国微软公司研发的基于X86、X64架构的PC和平板电脑使用的操作系统,于2001年8月24日发布RTM版本,并于2001年10月25日开始零售。其名字中“XP”的意思来自英文中的“体验(Experience)”。该系统是继Windows 2000及Windows ME之后的下一代Windows操作系统,也是微软首个面向消费者且使用Windows NT5.1架构的操作系统。

  电脑不能访问网上邻居怎么处理?为什么网上邻居中的用户不能直接访问?事实上,Windows对于网络安全的担忧,限制非常多,如果事先没有做好网络连接准备,你甚至不了解是哪里出现了问题,导致无法连接到网上邻居的电脑上。

为什么网上邻居别的电脑访问不到我的电脑?

  电脑不能访问网上邻居怎么处理?

  因为微软对网上邻居的颇多限制,有用户已经充分考虑,并做好开通局域网共享的批处理文件,只需执行一下即可。

  Ghost版本的系统:该批处理位于开始菜单 → 程序 → 装机人员工具 → 局域网共享。

  注:如果你找不到,也可以自己做一个批处理,代码如下:(把下面代码保存为“一键共享.bat”然后双击打开这个bat文件,按提示操作就可以啦,如果不行,请自己重启一次电脑!)

  1. 01@ECHO OFF
  2. 02cls
  3. 03echo.
  4. 04echo.
  5. 05echo 1. 开启匿名访问 2.启用验证访问(需要输入用户名密码) 3.关闭共享 4.返回
  6. 06echo.
  7. 07echo.
  8. 08set choice=
  9. 09set /p choice= ● 请选择‖
  10. 10if /i "%choice%"=="1" goto share1
  11. 11if /i "%choice%"=="2" goto share2
  12. 12if /i "%choice%"=="3" goto share3
  13. 13if /i "%choice%"=="4" goto end
  14. 14goto share
  15. 15:share1
  16. 16cls
  17. 17net user Guest /active:yes
  18. 18echo Windows Registry Editor Version 5.00 >share.reg
  19. 19echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg
  20. 20echo "restrictanonymous"=dword:00000000 >>share.reg
  21. 21echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg
  22. 22echo "restrictanonymous"=dword:00000000 >>share.reg
  23. 23echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg
  24. 24echo "limitblankpassworduse"=dword:00000000 >>share.reg
  25. 25echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg
  26. 26echo "limitblankpassworduse"=dword:00000000 >>share.reg
  27. 27echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg
  28. 28echo "forceguest"=dword:00000001 >>share.reg
  29. 29echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>share.reg
  30. 30echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg
  31. 31echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg
  32. 32echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg
  33. 33echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg
  34. 34echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg
  35. 35echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>share.reg
  36. 36echo "Epoch"=dword:000001ED >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>share.reg
  37. 37echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg
  38. 38echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg
  39. 39echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg
  40. 40echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg
  41. 41echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>share.reg
  42. 42echo "Epoch"=dword:000001ED >>share.reg
  43. 43regedit /s share.reg
  44. 44del share.reg
  45. 45echo.
  46. 46echo.
  47. 47echo √. 局域网匿名访问已开启ゞ
  48. 48echo 注意:本机要重启后才会生效。
  49. 49echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
  50. 50echo.
  51. 51pause & goto logon
  52. 52:end
  53. 53goto logon
  54. 54:share2
  55. 55cls
  56. 56net user Guest /active:no
  57. 57echo Windows Registry Editor Version 5.00 >usershare.reg
  58. 58echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg
  59. 59echo "restrictanonymous"=dword:00000000 >>usershare.reg
  60. 60echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg
  61. 61echo "restrictanonymous"=dword:00000000 >>usershare.reg
  62. 62echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg
  63. 63echo "limitblankpassworduse"=dword:00000000 >>usershare.reg
  64. 64echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg
  65. 65echo "limitblankpassworduse"=dword:00000000 >>usershare.reg
  66. 66echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg
  67. 67echo "forceguest"=dword:00000000 >>usershare.reg
  68. 68echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>usershare.reg
  69. 69echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg
  70. 70echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg
  71. 71echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg
  72. 72echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg
  73. 73echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg
  74. 74echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>usershare.reg
  75. 75echo "Epoch"=dword:000001ED >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>usershare.reg
  76. 76echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg
  77. 77echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg
  78. 78echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg
  79. 79echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg
  80. 80echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>usershare.reg
  81. 81echo "Epoch"=dword:000001ED >>usershare.reg
  82. 82regedit /s usershare.reg
  83. 83del usershare.reg
  84. 84echo.
  85. 85echo.
  86. 86echo √. 局域网验证访问已开启ゞ
  87. 87echo 友情提示:无需重启,其它机现在就可以访问本机了。
  88. 88echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
  89. 89echo.
  90. 90pause & goto logon
  91. 91:end
  92. 92goto logon
  93. 93:share3
  94. 94cls
  95. 95net user Guest /active:no
  96. 96echo Windows Registry Editor Version 5.00 >offshare.reg
  97. 97echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg
  98. 98echo "restrictanonymous"=dword:00000001 >>offshare.reg
  99. 99echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg
  100. 100echo "restrictanonymous"=dword:00000001 >>offshare.reg
  101. 101echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg
  102. 102echo "limitblankpassworduse"=dword:00000001 >>offshare.reg
  103. 103echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg
  104. 104echo "limitblankpassworduse"=dword:00000001 >>offshare.reg
  105. 105echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg
  106. 106echo "forceguest"=dword:00000001 >>offshare.reg
  107. 107echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>offshare.reg
  108. 108echo "HRZR_EHAPCY"=hex:0C,00,00,00,2A,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg
  109. 109echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,13,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG] >>offshare.reg
  110. 110echo "Seed"=hex:AC,6F,9A,2B,11,64,44,68,EC,90,1B,76,72,A7,0A,14,4C,79,37,BB,FD,BD,70,B2,B2,58,D5,B5,89,5C,B6,4E,3B,18,A5,26,46,BC,3E,6A,30,A4,7D,A0,56,E6,6A,B5,57,3A,BF,A1,CD,CA,B6,64,4C,F9,0E,D2,64,ED,86,1F,61,F6,D1,01,0B,7C,8D,BD,73,10,C8,4E,57,93,4E,90 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg
  111. 111echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg
  112. 112echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg
  113. 113echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg
  114. 114echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>offshare.reg
  115. 115echo "Epoch"=dword:000001FC >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg
  116. 116echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg
  117. 117echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg
  118. 118echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg
  119. 119echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>offshare.reg
  120. 120echo "Epoch"=dword:000001FC >>offshare.reg
  121. 121regedit /s offshare.reg
  122. 122del offshare.reg
  123. 123echo.
  124. 124echo.
  125. 125echo √. 已关闭局域网共享ゞ
  126. 126echo 友情提示:不必重启,设置已生效。
  127. 127echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
  128. 128echo.
  129. 129pause & goto logon
复制代码
@ECHO OFF cls echo. echo. echo 1. 开启匿名访问 2.启用验证访问(需要输入用户名密码) 3.关闭共享 4.返回 echo. echo. set choice= set /p choice= ● 请选择‖ if /i "%choice%"=="1" goto share1 if /i "%choice%"=="2" goto share2 if /i "%choice%"=="3" goto share3 if /i "%choice%"=="4" goto end goto share :share1 cls net user Guest /active:yes echo Windows Registry Editor Version 5.00 >share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg echo "restrictanonymous"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg echo "restrictanonymous"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg echo "limitblankpassworduse"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg echo "limitblankpassworduse"=dword:00000000 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg echo "forceguest"=dword:00000001 >>share.reg echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>share.reg echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>share.reg echo "Epoch"=dword:000001ED >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>share.reg echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>share.reg echo "Epoch"=dword:000001ED >>share.reg regedit /s share.reg del share.reg echo. echo. echo √. 局域网匿名访问已开启ゞ echo 注意:本机要重启后才会生效。 echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ echo. pause & goto logon :end goto logon :share2 cls net user Guest /active:no echo Windows Registry Editor Version 5.00 >usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg echo "restrictanonymous"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg echo "restrictanonymous"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg echo "limitblankpassworduse"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg echo "limitblankpassworduse"=dword:00000000 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg echo "forceguest"=dword:00000000 >>usershare.reg echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>usershare.reg echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>usershare.reg echo "Epoch"=dword:000001ED >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>usershare.reg echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>usershare.reg echo "Epoch"=dword:000001ED >>usershare.reg regedit /s usershare.reg del usershare.reg echo. echo. echo √. 局域网验证访问已开启ゞ echo 友情提示:无需重启,其它机现在就可以访问本机了。 echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ echo. pause & goto logon :end goto logon :share3 cls net user Guest /active:no echo Windows Registry Editor Version 5.00 >offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg echo "restrictanonymous"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg echo "restrictanonymous"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg echo "limitblankpassworduse"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg echo "limitblankpassworduse"=dword:00000001 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg echo "forceguest"=dword:00000001 >>offshare.reg echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>offshare.reg echo "HRZR_EHAPCY"=hex:0C,00,00,00,2A,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,13,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG] >>offshare.reg echo "Seed"=hex:AC,6F,9A,2B,11,64,44,68,EC,90,1B,76,72,A7,0A,14,4C,79,37,BB,FD,BD,70,B2,B2,58,D5,B5,89,5C,B6,4E,3B,18,A5,26,46,BC,3E,6A,30,A4,7D,A0,56,E6,6A,B5,57,3A,BF,A1,CD,CA,B6,64,4C,F9,0E,D2,64,ED,86,1F,61,F6,D1,01,0B,7C,8D,BD,73,10,C8,4E,57,93,4E,90 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>offshare.reg echo "Epoch"=dword:000001FC >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>offshare.reg echo "Epoch"=dword:000001FC >>offshare.reg regedit /s offshare.reg del offshare.reg echo. echo. echo √. 已关闭局域网共享ゞ echo 友情提示:不必重启,设置已生效。 echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ echo. pause & goto logon

  如果电脑上安装了类似金山网镖这样的网络防火墙,也是造成不能访问局域网用户的原因。

  以上内容便是关于电脑不能访问网上邻居的处理方法,制作好bat文件之后,最好还是重启一次计算机,让所有的设置生效。


Windows XP服役时间长达13年,产生的经济价值也较高。2014年4月8日,微软终止对该系统的技术支持,但在此之后仍在一些重大计算机安全事件中对该系统发布了补丁。

相关阅读