The rookie has learned to easily invade the personal computer in 13 steps. (1)

  

This fast food is specially prepared for network novices who have never entered the other computer through the network. The main software used is the famous domestic Trojan Ice River 2.2. So, if you have used Glacier 2.2, you don't have to follow us. Other interested network novices, Let's go
First Steps

Download the necessary tools. No. 1 software is the port scanning tool "Network Assassin II", No. 2 software is the control end of the famous domestic Trojan Ice River 2.2.

After downloading and decompressing, follow me for the second step!

Second Step

Running No.1 software, the first one is “Network Assassin II Registration Wizard”, ignore it, click “late (Q)” to enter the main interface of Network Assassin II.

Step 3

Select "Toolbox (U)" - "Host Finder (H)" in the main interface of Network Assassin II, and enter "Search Internet Host" interface.

Step 4

After entering the “Search Internet Hosting” interface, the “Start Address” field is filled with XXX.XXX.0.0, where XXX.XXX is selected by yourself. For example, you can choose 61.128. Or choose 61.200, etc., the "end address" column is filled with XXX.XXX.255.255, where XXX.XXX is selected as before. The "Port" column is filled in 7626, and the other columns remain the default.

Okay, the above setting is to search for a computer with glaciers from XXX.XXX.0.0 to XXX.XXX.255.255. Do you check it again? If everything is ok, click "Start Search".

Step 5

Check if the "Total Progress" and "Segment Progress" are moving. If you are not moving, it must be the IP address is set incorrectly, please check carefully. If both progress is moving, huh, you will be half successful, at least you will use Network Assassin II to scan a computer with a port open on the Internet. The next thing you have to do is to wait quietly. It takes patience to learn hacking software. After about 20-30 minutes, there should be a record in the bottom record bar (in general, there should be 5 or 6 records). Each record represents a computer found in the glacial Trojan, with the computer's IP address in front and the 7626 (glacial Trojan port).

Step 6 Click "Stop Search", but don't quit the program, and use it in the twelfth step. Run the No. 2 software glaciers and enter the main interface of the glaciers. Select "File [F]" - "Add Host [A]" to enter the Add Host window.

Step 7 In the "Add Host" window, enter the first IP address searched in the fifth step in the "Display Name". When the IP address is filled in the "Display Name", "Host" The address is automatically filled in with the same IP. "Access Password" is not filled in, "Listen Port" keeps the default 7626.

Okay, check if the IP is filled in. If it is OK, click "OK". In the "File Manager" of the main interface of the glacier, the IP address just filled in appears.

The eighth step

This step and the next step are the most important, please read it carefully! In the main interface of Glacier, click "My Computer" in "File Manager", this Your own hard disk partition will appear in the box to the right of the "File Manager". For example, if your hard drive is divided into four zones, the box to the right of the "File Manager" will appear C:, D:, E:, F: from top to bottom, if your hard drive is divided into two In the district, C:, D: will appear.

The ninth step

Click on the first IP address you just entered in the "File Manager", wait a moment (about 10-30 seconds when the network speed is slow), at " The hard disk partition of the other computer will appear in the box to the right of the file manager. see it? See it? Oh, congratulations, you have successfully entered the other party's computer!!!!!

Copyright © Windows knowledge All Rights Reserved