当前位置:首页 > 资讯 > WinXP教程

为什么网上邻居别的电脑访问不到我的电脑?

更新时间:2019-11-9 14:52:47 浏览次数:

纯净系统之家 www.xitongzhijia.vip

电脑不能访问网上邻居怎么处理?为什么网上邻居中的用户不能直接访问?事实上,Windows对于网络安全的担忧,限制非常多,如果事先没有做好网络连接准备,你甚至不了解是哪里出现了问题,导致无法连接到网上邻居的电脑上。

  电脑不能访问网上邻居怎么处理?

  因为微软对网上邻居的颇多限制,有用户已经充分考虑,并做好开通局域网共享的批处理文件,只需执行一下即可。

  Ghost版本的系统:该批处理位于开始菜单 → 程序 → 装机人员工具 → 局域网共享。

  注:如果你找不到,也可以自己做一个批处理,代码如下:(把下面代码保存为“一键共享.bat”然后双击打开这个bat文件,按提示操作就可以啦,如果不行,请自己重启一次电脑!)

  1. 01@ECHO OFF

  2. 02cls

  3. 03echo.

  4. 04echo.

  5. 05echo 1. 开启匿名访问 2.启用验证访问(需要输入用户名密码) 3.关闭共享 4.返回

  6. 06echo.

  7. 07echo.

  8. 08set choice=

  9. 09set /p choice= ● 请选择‖

  10. 10if /i "%choice%"=="1" goto share1

  11. 11if /i "%choice%"=="2" goto share2

  12. 12if /i "%choice%"=="3" goto share3

  13. 13if /i "%choice%"=="4" goto end

  14. 14goto share

  15. 15:share1

  16. 16cls

  17. 17net user Guest /active:yes

  18. 18echo Windows Registry Editor Version 5.00 >share.reg

  19. 19echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg

  20. 20echo "restrictanonymous"=dword:00000000 >>share.reg

  21. 21echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg

  22. 22echo "restrictanonymous"=dword:00000000 >>share.reg

  23. 23echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg

  24. 24echo "limitblankpassworduse"=dword:00000000 >>share.reg

  25. 25echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>share.reg

  26. 26echo "limitblankpassworduse"=dword:00000000 >>share.reg

  27. 27echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>share.reg

  28. 28echo "forceguest"=dword:00000001 >>share.reg

  29. 29echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>share.reg

  30. 30echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg

  31. 31echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg

  32. 32echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg

  33. 33echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg

  34. 34echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg

  35. 35echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>share.reg

  36. 36echo "Epoch"=dword:000001ED >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>share.reg

  37. 37echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>share.reg

  38. 38echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>share.reg

  39. 39echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>share.reg

  40. 40echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>share.reg

  41. 41echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>share.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>share.reg

  42. 42echo "Epoch"=dword:000001ED >>share.reg

  43. 43regedit /s share.reg

  44. 44del share.reg

  45. 45echo.

  46. 46echo.

  47. 47echo √. 局域网匿名访问已开启ゞ

  48. 48echo 注意:本机要重启后才会生效。

  49. 49echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁

  50. 50echo.

  51. 51pause & goto logon

  52. 52:end

  53. 53goto logon

  54. 54:share2

  55. 55cls

  56. 56net user Guest /active:no

  57. 57echo Windows Registry Editor Version 5.00 >usershare.reg

  58. 58echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg

  59. 59echo "restrictanonymous"=dword:00000000 >>usershare.reg

  60. 60echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg

  61. 61echo "restrictanonymous"=dword:00000000 >>usershare.reg

  62. 62echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg

  63. 63echo "limitblankpassworduse"=dword:00000000 >>usershare.reg

  64. 64echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>usershare.reg

  65. 65echo "limitblankpassworduse"=dword:00000000 >>usershare.reg

  66. 66echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>usershare.reg

  67. 67echo "forceguest"=dword:00000000 >>usershare.reg

  68. 68echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>usershare.reg

  69. 69echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg

  70. 70echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg

  71. 71echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg

  72. 72echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg

  73. 73echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg

  74. 74echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>usershare.reg

  75. 75echo "Epoch"=dword:000001ED >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Providers] >>usershare.reg

  76. 76echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>usershare.reg

  77. 77echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" >>usershare.reg

  78. 78echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" >>usershare.reg

  79. 79echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" >>usershare.reg

  80. 80echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" >>usershare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>usershare.reg

  81. 81echo "Epoch"=dword:000001ED >>usershare.reg

  82. 82regedit /s usershare.reg

  83. 83del usershare.reg

  84. 84echo.

  85. 85echo.

  86. 86echo √. 局域网验证访问已开启ゞ

  87. 87echo 友情提示:无需重启,其它机现在就可以访问本机了。

  88. 88echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁

  89. 89echo.

  90. 90pause & goto logon

  91. 91:end

  92. 92goto logon

  93. 93:share3

  94. 94cls

  95. 95net user Guest /active:no

  96. 96echo Windows Registry Editor Version 5.00 >offshare.reg

  97. 97echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg

  98. 98echo "restrictanonymous"=dword:00000001 >>offshare.reg

  99. 99echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg

  100. 100echo "restrictanonymous"=dword:00000001 >>offshare.reg

  101. 101echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg

  102. 102echo "limitblankpassworduse"=dword:00000001 >>offshare.reg

  103. 103echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] >>offshare.reg

  104. 104echo "limitblankpassworduse"=dword:00000001 >>offshare.reg

  105. 105echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] >>offshare.reg

  106. 106echo "forceguest"=dword:00000001 >>offshare.reg

  107. 107echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count] >>offshare.reg

  108. 108echo "HRZR_EHAPCY"=hex:0C,00,00,00,2A,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg

  109. 109echo "HRZR_EHAPCY:"P:\JVAQBJF\flfgrz32\sverjnyy.pcy",Jvaqbjf 防火墙"=hex:0C,00,00,00,13,00,00,00,90,AF,A4,87,A4,95,C6,01 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG] >>offshare.reg

  110. 110echo "Seed"=hex:AC,6F,9A,2B,11,64,44,68,EC,90,1B,76,72,A7,0A,14,4C,79,37,BB,FD,BD,70,B2,B2,58,D5,B5,89,5C,B6,4E,3B,18,A5,26,46,BC,3E,6A,30,A4,7D,A0,56,E6,6A,B5,57,3A,BF,A1,CD,CA,B6,64,4C,F9,0E,D2,64,ED,86,1F,61,F6,D1,01,0B,7C,8D,BD,73,10,C8,4E,57,93,4E,90 >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg

  111. 111echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg

  112. 112echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg

  113. 113echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg

  114. 114echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch] >>offshare.reg

  115. 115echo "Epoch"=dword:000001FC >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List] >>offshare.reg

  116. 116echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005" >>offshare.reg

  117. 117echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001" >>offshare.reg

  118. 118echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002" >>offshare.reg

  119. 119echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004" >>offshare.reg echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch] >>offshare.reg

  120. 120echo "Epoch"=dword:000001FC >>offshare.reg

  121. 121regedit /s offshare.reg

  122. 122del offshare.reg

  123. 123echo.

  124. 124echo.

  125. 125echo √. 已关闭局域网共享ゞ

  126. 126echo 友情提示:不必重启,设置已生效。

  127. 127echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁

  128. 128echo.

  129. 129pause & goto logon

复制代码

  如果电脑上安装了类似金山网镖这样的网络防火墙,也是造成不能访问局域网用户的原因。

  以上内容便是关于电脑不能访问网上邻居的处理方法,制作好bat文件之后,最好还是重启一次计算机,让所有的设置生效。


推荐使用 U大仙U盘启动工具

最新列表

最热列表

友情链接 纯净系统之家 系统之家 纯净版系统 2345系统 Win7纯净版系统 Win10纯净版系统 一键重装系统 U大仙U盘启动工具