Penetrate, so that you are no longer limited within the constraints within the network remote control [computer network] [3389]

Penetration within the network , i.e., NAT traversal, network connection term, when the LAN is a computer, a computer network and the external network node is connected to the communication needs, and sometimes does not occur within the network through support. That port mapping , allowing the computer to find outside the network computer in the network, improving download speed. Whether within the network penetration or other types of network penetration, network penetration are unified approach to research and resolve.

problem:

Now most people, work on the computer. However, the family is WIFI, can not use the computer with the remote tools.

Using local tools, it has been very slow, and subject to many restrictions. I would like to put forward a penetration to resolve.

To solve the problem: the use of tools to solve penetration

Recommended tool: I use the network cloud to wear. 1M can apply for free use. White whore on the line.

https://xiaomy.net/index.html

 

 

 

1 download. This is a very nice free installation [version]

 

2, if there is no account can open [a] registered

3, add the tunnel

1, the machine will check the ip address

Under CMD command, enter ipconfig

2, add the tunnel ip and port

 

3, has been successfully enabled

4, the effect of the presentation can be connected to [normal]

 

It later in the company, or other places at any time of the remote home computer [white] prostitution is cool

There are now web controllers, very easy to use

 

Guess you like

Origin www.cnblogs.com/heian99/p/12075515.html