Edge Computing - Intranet service access based on Cpolar

Recap

The computing power of the laptop is pretty good. I don’t usually bring a computer with me to work. It’s inhumane to leave it in the room to collect dust, so I use the idle computing power of the laptop through intranet penetration. AI painting has been quite fun recently, but Baidu’s Wen Xinyiyan It is not only a shell artifact but also has a lot of restrictions. Although I don’t have any bad intentions, I feel disgusted by being restrained by the so-called procedural justice. If I don’t want to use shell tools, I might as well make one myself. I’ll get through the network first;

Practical steps

1. Account registration

Cpolar website: https://www.cpolar.com/

2. Installation and deployment

2.a View help

.\cpolar.exe help

2.b Mapping service

.\cpolar.exe http xxxx

2.c Remote login

# 查看远程密钥: C:\Users\rain/.cpolar/cpolar.yml
.\cpolar.exe start-all

Open another machine:

Note: If remote login is disabled, refer to https://zhuanlan.zhihu.com/p/600706130;

Summarize

At this point, the intranet penetration based on Cpolar is completed. You can happily use server resources and expose the notebook's services to the public network. However, you need to be careful during use and pay attention to privacy and security protection;

Guess you like

Origin blog.csdn.net/weixin_36532747/article/details/131085625