我来说说为什么网上邻居别的电脑访问不到我的电脑。

电脑不能访问网上邻居怎么处理?为什么网上邻居中的用户不能直接访问?事实上,Windows对于网络安全的担忧,限制非常多,如果事先没有做好网络连接准备,你甚至不了解是哪里出现了问题,导致无法连接到网上邻居的电脑上。

为什么网上邻居别的电脑访问不到我的电脑?

电脑不能访问网上邻居怎么处理?

因为微软对网上邻居的颇多限制,有用户已经充分考虑,并做好开通局域网共享的批处理文件,只需执行一下即可。

Ghost版本的系统:该批处理位于开始菜单 → 程序 → 装机人员工具 → 局域网共享。

注:如果你找不到,也可以自己做一个批处理,代码如下:(把下面代码保存为“一键共享.bat”然后双击打开这个bat文件,按提示操作就可以啦,如果不行,请自己重启一次电脑!)

  1. 01@ECHO OFF
  2. 02cls
  3. 03echo.
  4. 04echo.
  5. 05echo 1. 开启匿名访问 2.启用验证访问(需要输入用户名密码) 3.关闭共享 4.返回
  6. 06echo.
  7. 07echo.
  8. 08set choice=
  9. 09set /p choice= ● 请选择‖
  10. 10if /i "%choice%"=="1" goto share1
  11. 11if /i "%choice%"=="2" goto share2
  12. 12if /i "%choice%"=="3" goto share3
  13. 13if /i "%choice%"=="4" goto end
  14. 14goto share
  15. 15:share1
  16. 16cls
  17. 17net user Guest /active:yes
  18. 18echo Windows Registry Editor Version 5.00 >share.reg
  19. 19echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>share.reg
  20. 20echo "restrictanonymous"=dword:00000000 >>share.reg
  21. 21echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>share.reg
  22. 22echo "restrictanonymous"=dword:00000000 >>share.reg
  23. 23echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>share.reg
  24. 24echo "limitblankpassworduse"=dword:00000000 >>share.reg
  25. 25echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>share.reg
  26. 26echo "limitblankpassworduse"=dword:00000000 >>share.reg
  27. 27echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>share.reg
  28. 28echo "forceguest"=dword:00000001 >>share.reg
  29. 29echo [HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\UserAssist\\{75048700-EF1F-11D0-9888-006097DEACF9}\\Count] >>share.reg
  30. 30echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg
  31. 31echo "HRZR_EHAPCY:"P:\\JVAQBJF\\flfgrz32\\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>share.reg
  32. 32echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg
  33. 33echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg
  34. 34echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg
  35. 35echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Epoch] >>share.reg
  36. 36echo "Epoch"=dword:000001ED >>share.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Print\\Providers] >>share.reg
  37. 37echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>share.reg
  38. 38echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg
  39. 39echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg
  40. 40echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg
  41. 41echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Epoch] >>share.reg
  42. 42echo "Epoch"=dword:000001ED >>share.reg
  43. 43regedit /s share.reg
  44. 44del share.reg
  45. 45echo.
  46. 46echo.
  47. 47echo √. 局域网匿名访问已开启ゞ
  48. 48echo 注意:本机要重启后才会生效。
  49. 49echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
  50. 50echo.
  51. 51pause & goto logon
  52. 52:end
  53. 53goto logon
  54. 54:share2
  55. 55cls
  56. 56net user Guest /active:no
  57. 57echo Windows Registry Editor Version 5.00 >usershare.reg
  58. 58echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>usershare.reg
  59. 59echo "restrictanonymous"=dword:00000000 >>usershare.reg
  60. 60echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>usershare.reg
  61. 61echo "restrictanonymous"=dword:00000000 >>usershare.reg
  62. 62echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>usershare.reg
  63. 63echo "limitblankpassworduse"=dword:00000000 >>usershare.reg
  64. 64echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>usershare.reg
  65. 65echo "limitblankpassworduse"=dword:00000000 >>usershare.reg
  66. 66echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>usershare.reg
  67. 67echo "forceguest"=dword:00000000 >>usershare.reg
  68. 68echo [HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\UserAssist\\{75048700-EF1F-11D0-9888-006097DEACF9}\\Count] >>usershare.reg
  69. 69echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg
  70. 70echo "HRZR_EHAPCY:"P:\\JVAQBJF\\flfgrz32\\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>usershare.reg
  71. 71echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg
  72. 72echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg
  73. 73echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg
  74. 74echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Epoch] >>usershare.reg
  75. 75echo "Epoch"=dword:000001ED >>usershare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Print\\Providers] >>usershare.reg
  76. 76echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>usershare.reg
  77. 77echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg
  78. 78echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg
  79. 79echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg
  80. 80echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Epoch] >>usershare.reg
  81. 81echo "Epoch"=dword:000001ED >>usershare.reg
  82. 82regedit /s usershare.reg
  83. 83del usershare.reg
  84. 84echo.
  85. 85echo.
  86. 86echo √. 局域网验证访问已开启ゞ
  87. 87echo 友情提示:无需重启,其它机现在就可以访问本机了。
  88. 88echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
  89. 89echo.
  90. 90pause & goto logon
  91. 91:end
  92. 92goto logon
  93. 93:share3
  94. 94cls
  95. 95net user Guest /active:no
  96. 96echo Windows Registry Editor Version 5.00 >offshare.reg
  97. 97echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>offshare.reg
  98. 98echo "restrictanonymous"=dword:00000001 >>offshare.reg
  99. 99echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>offshare.reg
  100. 100echo "restrictanonymous"=dword:00000001 >>offshare.reg
  101. 101echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>offshare.reg
  102. 102echo "limitblankpassworduse"=dword:00000001 >>offshare.reg
  103. 103echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>offshare.reg
  104. 104echo "limitblankpassworduse"=dword:00000001 >>offshare.reg
  105. 105echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>offshare.reg
  106. 106echo "forceguest"=dword:00000001 >>offshare.reg
  107. 107echo [HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\UserAssist\\{75048700-EF1F-11D0-9888-006097DEACF9}\\Count] >>offshare.reg
  108. 108echo "HRZR_EHAPCY"=hex:0C,00,00,00,2A,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg
  109. 109echo "HRZR_EHAPCY:"P:\\JVAQBJF\\flfgrz32\\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,13,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo [HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\RNG] >>offshare.reg
  110. 110echo "Seed"=hex:AC,6F,9A,2B,11,64,44,68,EC,90,1B,76,72,A7,0A,14,4C,79,37,BB,FD,BD,70,B2,B2,58,D5,B5,89,5C,B6,4E,3B,18,A5,26,46,BC,3E,6A,30,A4,7D,A0,56,E6,6A,B5,57,3A,BF,A1,CD,CA,B6,64,4C,F9,0E,D2,64,ED,86,1F,61,F6,D1,01,0B,7C,8D,BD,73,10,C8,4E,57,93,4E,90 >>offshare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>offshare.reg
  111. 111echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg
  112. 112echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg
  113. 113echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg
  114. 114echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Epoch] >>offshare.reg
  115. 115echo "Epoch"=dword:000001FC >>offshare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>offshare.reg
  116. 116echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg
  117. 117echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg
  118. 118echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg
  119. 119echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Epoch] >>offshare.reg
  120. 120echo "Epoch"=dword:000001FC >>offshare.reg
  121. 121regedit /s offshare.reg
  122. 122del offshare.reg
  123. 123echo.
  124. 124echo.
  125. 125echo √. 已关闭局域网共享ゞ
  126. 126echo 友情提示:不必重启,设置已生效。
  127. 127echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
  128. 128echo.
  129. 129pause & goto logon

复制代码

@ECHO OFF
cls
echo.
echo.
echo 1. 开启匿名访问 2.启用验证访问(需要输入用户名密码) 3.关闭共享 4.返回
echo.
echo.
set choice=
set /p choice= ● 请选择‖
if /i "%choice%"=="1" goto share1
if /i "%choice%"=="2" goto share2
if /i "%choice%"=="3" goto share3
if /i "%choice%"=="4" goto end
goto share
:share1
cls
net user Guest /active:yes
echo Windows Registry Editor Version 5.00 >share.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>share.reg
echo "restrictanonymous"=dword:00000000 >>share.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>share.reg
echo "restrictanonymous"=dword:00000000 >>share.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>share.reg
echo "limitblankpassworduse"=dword:00000000 >>share.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>share.reg
echo "limitblankpassworduse"=dword:00000000 >>share.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>share.reg
echo "forceguest"=dword:00000001 >>share.reg
echo [HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\UserAssist\\{75048700-EF1F-11D0-9888-006097DEACF9}\\Count] >>share.reg
echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg
echo "HRZR_EHAPCY:"P:\\JVAQBJF\\flfgrz32\\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>share.reg
echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg
echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg
echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg
echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Epoch] >>share.reg
echo "Epoch"=dword:000001ED >>share.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Print\\Providers] >>share.reg
echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>share.reg
echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg
echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg
echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg
echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Epoch] >>share.reg
echo "Epoch"=dword:000001ED >>share.reg
regedit /s share.reg
del share.reg
echo.
echo.
echo √. 局域网匿名访问已开启ゞ
echo 注意:本机要重启后才会生效。
echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
echo.
pause & goto logon
:end
goto logon
:share2
cls
net user Guest /active:no
echo Windows Registry Editor Version 5.00 >usershare.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>usershare.reg
echo "restrictanonymous"=dword:00000000 >>usershare.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>usershare.reg
echo "restrictanonymous"=dword:00000000 >>usershare.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>usershare.reg
echo "limitblankpassworduse"=dword:00000000 >>usershare.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>usershare.reg
echo "limitblankpassworduse"=dword:00000000 >>usershare.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>usershare.reg
echo "forceguest"=dword:00000000 >>usershare.reg
echo [HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\UserAssist\\{75048700-EF1F-11D0-9888-006097DEACF9}\\Count] >>usershare.reg
echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg
echo "HRZR_EHAPCY:"P:\\JVAQBJF\\flfgrz32\\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>usershare.reg
echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg
echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg
echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg
echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Epoch] >>usershare.reg
echo "Epoch"=dword:000001ED >>usershare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Print\\Providers] >>usershare.reg
echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>usershare.reg
echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg
echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg
echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg
echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Epoch] >>usershare.reg
echo "Epoch"=dword:000001ED >>usershare.reg
regedit /s usershare.reg
del usershare.reg
echo.
echo.
echo √. 局域网验证访问已开启ゞ
echo 友情提示:无需重启,其它机现在就可以访问本机了。
echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
echo.
pause & goto logon
:end
goto logon
:share3
cls
net user Guest /active:no
echo Windows Registry Editor Version 5.00 >offshare.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>offshare.reg
echo "restrictanonymous"=dword:00000001 >>offshare.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>offshare.reg
echo "restrictanonymous"=dword:00000001 >>offshare.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>offshare.reg
echo "limitblankpassworduse"=dword:00000001 >>offshare.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa] >>offshare.reg
echo "limitblankpassworduse"=dword:00000001 >>offshare.reg
echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] >>offshare.reg
echo "forceguest"=dword:00000001 >>offshare.reg
echo [HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\UserAssist\\{75048700-EF1F-11D0-9888-006097DEACF9}\\Count] >>offshare.reg
echo "HRZR_EHAPCY"=hex:0C,00,00,00,2A,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg
echo "HRZR_EHAPCY:"P:\\JVAQBJF\\flfgrz32\\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,13,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo [HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\RNG] >>offshare.reg
echo "Seed"=hex:AC,6F,9A,2B,11,64,44,68,EC,90,1B,76,72,A7,0A,14,4C,79,37,BB,FD,BD,70,B2,B2,58,D5,B5,89,5C,B6,4E,3B,18,A5,26,46,BC,3E,6A,30,A4,7D,A0,56,E6,6A,B5,57,3A,BF,A1,CD,CA,B6,64,4C,F9,0E,D2,64,ED,86,1F,61,F6,D1,01,0B,7C,8D,BD,73,10,C8,4E,57,93,4E,90 >>offshare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>offshare.reg
echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg
echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg
echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg
echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Epoch] >>offshare.reg
echo "Epoch"=dword:000001FC >>offshare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\GloballyOpenPorts\\List] >>offshare.reg
echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg
echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg
echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg
echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Epoch] >>offshare.reg
echo "Epoch"=dword:000001FC >>offshare.reg
regedit /s offshare.reg
del offshare.reg
echo.
echo.
echo √. 已关闭局域网共享ゞ
echo 友情提示:不必重启,设置已生效。
echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁
echo.
pause & goto logon

如果电脑上安装了类似金山网镖这样的网络防火墙,也是造成不能访问局域网用户的原因。

以上内容便是关于电脑不能访问网上邻居的处理方法,制作好bat文件之后,最好还是重启一次计算机,让所有的设置生效。

本文来自网络投稿,来自作者春天。不代表酷牛网立场,如若转载,请注明出处:https://www.xukn.com/1385054.html

(0)
上一篇 2019-05-06
下一篇 2019-05-06

相关推荐