\\192.168.0.138 登陆不上需要密码解决方法

本文介绍如何通过组策略编辑器禁用Windows系统的Guest账号,并详细解释了操作步骤,包括修改安全选项和用户权利分配。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

禁用Guest帐号
开始 -> 运行 -> gpedit.msc -> 计算机配置 -> windows设置 -> 本地策略 -> 安全选项 -> 帐户:来宾帐户状态 启用 使用空白密码的本地帐户 启用。
开始 -> 运行 -> gpedit.msc -> 计算机配置 -> windows设置 -> 本地策略 -> 用户权利分配 -> 删除"拒绝从网络访问这台计算机"中的guest用户。
我重新尝试了以下,这次给你,帮我挑选重要的部分。358.449321 192.168.152.1 192.168.152.129 TCP 66 5084+22 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=128 SACK_PERM 36 8.449587 192.168.152.129 192.168.152.1 TCP 66 22+5084 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 378.449788 192.168.152.1 192.168.152.129 TCP 54 5084+22 [ACK] Seq=1 Ack=1 Win=4194304 Len=0 38 8.453286 192.168.152.129 192.168.152.1 SSHv2 96 Server: Protocol (SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10) 398.460645 192.168.152.1 192.168.152.129 SSHv2 80 Client: Protocol (SSH-2.0-FileZilla_3.67.0) 408.460666 192.168.152.1 192.168.152.129 SSHv2 1430 Client: Key Exchange Init 418.460762 192.168.152.129 192.168.152.1 TCP 60 22→5084 [ACK] Seq=43 Ack=27 Win=64256 Len=0 428.460788 192.168.152.129 192.168.152.1 TCP 60 22+5084 [ACK] Seq=43 Ack=1403 Win=64128 Len=0 438.461232 192.168.152.129 192.168.152.1 SSHv2 1030 Server: Key Exchange Init 448.462300 192.168.152.1 192.168.152.129 SSHv2 102 Client: Elliptic Curve Diffie-Hellman Key Exchange Init 458.464752 192.168.152.129 192.168.152.1 SSHv2 346 Server: Elliptic Curve Diffie-Hellman Key Exchange Reply, New Keys, Encrypted packet (len=84) 468.506012 192.168.152.1 192.168.152.129 TCP 54 5084+22 [ACK] Seq=1451 Ack=1311 Win=4192896 Len=0 5112.626046 192.168.152.1 192.168.152.129 SSHv2 122 Client: New Keys, Encrypted packet (len=52) 5212.626460 192.168.152.129 192.168.152.1 SSHv2 106 Server: Encrypted packet (len=52) 5312.631276 192.168.152.1 192.168.152.129 SSHv2 122 Client: Encrypted packet (len=68) 5412.631920 192.168.152.129 192.168.152.1 SSHv2 106 Server: Encrypted packet (len=52) 5512.632475 192.168.152.1 192.168.152.129 SSHv2 302 Client: Encrypted packet (len=248) 56 12.637222 192.168.152.129 192.168.152.1 SSHv2 90 Server: Encrypted packet (len=36) 5712.638270 192.168.152.1 192.168.152.129 SSHv2 106 Client: Encrypted packet (len=52) 5812.684687 192.168.152.129 192.168.152.1 TCP 60 22→5084 [ACK] Seq=1451 Ack=1887 Win=64128 Len=0 5912.718923 192.168.152.129 192.168.152.1 SSHv2 1002 Server: Encrypted packet (len=948) 6012.772646 192.168.152.1 192.168.152.129 TCP 54 5084+22 [ACK] Seq=1887 Ack=2399 Win=4194304 Len=0 6112.773179 192.168.152.129 192.168.152.1 SSHv2 106 Server: Encrypted packet (len=52) 6212.773835 192.168.152.1 192.168.152.129 SSHv2 190 Client: Encrypted packet (len=136) 6312.774311 192.168.152.129 192.168.152.1 TCP 60 22+5084 [ACK] Seq=2451 Ack=2023 Win=64128 Len=0 6412.775231 192.168.152.129 192.168.152.1 SSHv2 126 Server: Encrypted packet (len=72) 6512.775691 192.168.152.1 192.168.152.129 SSHv2 106 Client: Encrypted packet (len=52) 6612.779794 192.168.152.129 192.168.152.1 SSHv2 250 Server: Encrypted packet (len=196) 6712.780242 192.168.152.1 192.168.152.129 SSHv2 106 Client: Encrypted packet (len=52) 6812.781183 192.168.152.129 192.168.152.1 SSHv2 154 Server: Encrypted packet (len=100) 6912.784393 192.168.152.1 192.168.152.129 SSHv2 122 Client: Encrypted packet (len=68) 7012.784806 192.168.152.129 192.168.152.1 SSHv2 154 Server: Encrypted packet (len=100) 71 12.785042 192.168.152.1 192.168.152.129 SSHv2 122 Client: Encrypted packet (len=68) 7212.785300 192.168.152.129 192.168.152.1 SSHv2 106 Server: Encrypted packet (len=52) 7312.785485 192.168.152.1 192.168.152.129 SSHv2 262 Client: Encrypted packet (len=208) 7412.786108 192.168.152.129 192.168.152.1 SSHv2 1514 Server: Encrypted packet (len=1460) 7512.786118 192.168.152.129 192.168.152.1 SSHv2 1514 Server: Encrypted packet (len=1460) 7612.786123 192.168.152.129 192.168.152.1 SSHv2 1514 Server: Encrypted packet (len=1460) 7712.786195 192.168.152.129 192.168.152.1 SSHv2 1294 Server: Encrypted packet (len=1240) 7812.786302 192.168.152.1 192.168.152.129 TCP 54 5084 + 22 [ACK] Seq=2471 Ack=8591 Win=4194304 Len=0 7912.786687 192.168.152.1 192.168.152.129 SSHv2 106 Client: Encrypted packet (len=52) 8012.786924 192.168.152.129 192.168.152.1 SSHv2 122 Server: Encrypted packet (len=68) 81 12.787077 192.168.152.1 192.168.152.129 SSHv2 106 Client: Encrypted packet (len=52) 8212.787272 192.168.152.129 192.168.152.1 SSHv2 122 Server: Encrypted packet (len=68) 8312.833875 192.168.152.1 192.168.152.129 TCP 54 5084→22 [ACK] Seq=2575 Ack=8727 Win=4194048 Len=0 8817.938517 192.168.152.1 192.168.152.129 SSHv2 138 Client: Encrypted packet (len=84) 8917.939830 192.168.152.129 192.168.152.1 SSHv2 170 Server: Encrypted packet (len=116) 9017.940484 192.168.152.1 192.168.152.129 SSHv2 138 Client: Encrypted packet (len=84) 9117.941532 192.168.152.129 192.168.152.1 SSHv2 106 Server: Encrypted packet (len=52) 9217.941919 192.168.152.1 192.168.152.129 SSHv2 106 Client: Encrypted packet (len=52) 9317.942719 192.168.152.129 192.168.152.1 SSHv2 122 Server: Encrypted packet (len=68) 9417.943565 192.168.152.1 192.168.152.129 SSHv2 138 Client: Encrypted packet (len=84) 9517.943717 192.168.152.129 192.168.152.1 SSHv2 170 Server: Encrypted packet (len=116) 9617.943819 192.168.152.1 192.168.152.129 SSHv2 138 Client: Encrypted packet (len=84) 9717.944092 192.168.152.129 192.168.152.1 SSHv2 106 Server: Encrypted packet (len=52) 9817.944187 192.168.152.1 192.168.152.129 SSHv2 262 Client: Encrypted packet (len=208) 9917.944789 192.168.152.129 192.168.152.1 SSHv2 1130 Server: Encrypted packet (len=1076) 10017.945162 192.168.152.1 192.168.152.129 SSHv2 106 Client: Encrypted packet (len=52) 10117.945582 192.168.152.129 192.168.152.1 SSHv2 122 Server: Encrypted packet (len=68) 10217.945801 192.168.152.1 192.168.152.129 SSHv2 106 Client: Encrypted packet (len=52) 10317.946044 192.168.152.129 192.168.152.1 SSHv2 122 Server: Encrypted packet (len=68) 10417.992702 192.168.152.1 192.168.152.129 TCP 54 5084→22 [ACK] Seq=3275 Ack=10343 Win=4194048 Len=0 16131.203698 192.168.152.1 192.168.152.129 TCP 66 5096+22 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=128 SACK_PERM 16231.203961 192.168.152.129 192.168.152.1 TCP 66 22+5096 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 16331.204115 192.168.152.1 192.168.152.129 TCP 54 5096→22 [ACK] Seq=1 Ack=1 Win=4194304 Len=0 16431.207082 192.168.152.129 192.168.152.1 SSHv2 96 Server: Protocol (SSH-2.0-0penSSH_7.2p2 Ubuntu-4ubuntu2.10) 16531.212889 192.168.152.1 192.168.152.129 SSHv2 80 Client: Protocol(SSH-2.0-FileZilla_3.67.0) 16631.212911 192.168.152.1 192.168.152.129 SSHv2 1430 Client: Key Exchange Init 16731.213208 192.168.152.129 192.168.152.1 TCP 60 22→5096 [ACK] Seq=43 Ack=27 Win=64256 Len=0 16831.213244 192.168.152.129 192.168.152.1 TCP 60 22→5096 [ACK] Seq=43 Ack=1403 Win=64128 Len=0 16931.213669 192.168.152.129 192.168.152.1 SSHv2 1030 Server: Key Exchange Init 17031.214715 192.168.152.1 192.168.152.129 SSHv2 102 Client: Elliptic Curve Diffie-Hellman Key Exchange Init 17131.217145 192.168.152.129 192.168.152.1 SSHv2 346 Server: Elliptic Curve Diffie-Hellman Key Exchange Reply, New Keys, Encrypted packet (len=84) 17231.222031 192.168.152.1 192.168.152.129 SSHv2 122 Client: New Keys, Encrypted packet (len=52) 173 31.222170 192.168.152.129 192.168.152.1 SSHv2 106 Server: Encrypted packet (len=52) 17431.224872 192.168.152.1 192.168.152.129 SSHv2 122 Client: Encrypted packet (len=68) 17531.225393 192.168.152.129 192.168.152.1 SSHv2 106 Server: Encrypted packet (len=52) 17631.225650 192.168.152.1 192.168.152.129 SSHv2 302 Client: Encrypted packet (len=248) 17731.228903 192.168.152.129 192.168.152.1 SSHv2 90 Server: Encrypted packet (len=36) 17831.229611 192.168.152.1 192.168.152.129 SSHv2 106 Client: Encrypted packet (len=52) 17931.271743 192.168.152.129 192.168.152.1 TCP 60 22+5096 [ACK] Seq=1451 Ack=1887 Win=64128 Len=0 18031.312150 192.168.152.129 192.168.152.1 SSHv2 1002 Server: Encrypted packet (len=948) 181 31.363670 192.168.152.1 192.168.152.129 TCP 54 5096→22 [ACK] Seq=1887 Ack=2399 Win=4194304 Len=0 182 31.364171 192.168.152.129 192.168.152.1 SSHv2 106 Server: Encrypted packet (len=52) 18331.364747 192.168.152.1 192.168.152.129 SSHv2 190 Client: Encrypted packet (len=136) 18431.365098 192.168.152.129 192.168.152.1 TCP 60 22+5096 [ACK] Seq=2451 Ack=2023 Win=64128 Len=0 18531.366170 192.168.152.129 192.168.152.1 SSHv2 126 Server: Encrypted packet (len=72) 18631.366783 192.168.152.1 192.168.152.129 SSHv2 106 Client: Encrypted packet (len=52) 186到213均为SShV2, 21331.384052 192.168.152.129 192.168.152.1 SSHv2 122 Server: Encrypted packet (len=68) 21431.438648 192.168.152.1 192.168.152.129 TCP 54 5096+22 [ACK] Seq=3147 Ack=4867 Win=4194048 Len=0 22039.206480 192.168.152.1 192.168.152.129 SSHv2 90 Client: Encrypted packet (len=36) 22139.206955 192.168.152.129 192.168.152.1 SSHv2 178 Server: Encrypted packet (len=124) 22239.207853 192.168.152.1 192.168.152.129 SSHv2 90 Client: Encrypted packet (len=36) 22339.208163 192.168.152.129 192.168.152.1 SSHv2 178 Server: Encrypted packet (len=124) L 22439.208565 192.168.152.1 192.168.152.129 TCP 54 5096→22 [RST, ACK] Seq=3183 Ack=4991 Win=0 Len=0 22539.212342 192.168.152.1 192.168.152.129 ТСP 54 5084+22 [RST, ACK] Seq=3311 Ack=10467 Win=0 Len=0
最新发布
08-20
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值