Step by step guide to share internet connection

Most Relevant Content

  • Internet Connection Sharing Ethernet to Ethernet

    Windows is the most popular operating system to any computer user. It is said that no computer user cannot go a single a day without windows operating system. Windows has a lot of default internet features which help to connect our computer to internet as well as it provides internet connection sharing facility. With Internet Connection Sharing (ICS) feature, you can turn your laptop into Wi-Fi hotspot or turn your desktop into a router to share your broadband connection with your family members or friends. So, if you wish to turn your computer into an internet router with internet connection sharing feature, keep reading this article where I will is show you how to share your broadband internet connection with others by turning your computer into a router. System Requirements If you want to turn your desktop computer into an internet gateway or router so that you can share your broadband internet connection with your family members or friends, you have to have below system information. Otherwise, you cannot turn your computer into a network router. Desktop computer which has two network card integrated. Windows operating system installed (windows 7, windows 8 or windows 10). 7 Easy Steps to Turn a Desktop [...]

    READ MORE »

  • More Similar Content

  • »

    How to Use Old Router as Range Extender to Boost WiFi Signal |   October 7, 2019

    WiFi is a technology to turn wired internet into WiFi internet and used in every home and office. Wireless internet gives you the freedom to use the internet without sitting in a single place. It is also true that speed performance drop in Wi-fi due to weak signal or interference. Sometimes laying a physical wired connection in every room is not possible. So Wi-Fi range extender setup helps you to boost signal strength. Instead of buying a new range extender [...]

    READ MORE »

  • »

    MikroTik Site to Site EoIP Tunnel with IPsec |   March 21, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) tunnel that is used to create a site to site VPN. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]

    READ MORE »

  • You May Also Like

  • »

    How to Block VPN Access with MikroTik Router |   May 14, 2019

    Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so [...]

    READ MORE »

  • »

    How to Clear Google Chrome History |   August 20, 2015

    Google Chrome is one of the most popular web browsers to online users. It provides a lot of features which help to use this browser smoothly and securely. Google Chrome history is one of the useful features in Google Chrome which helpfully caches or remembers a lot of browsing information specially username and password or login credential of your important web account when you visit various websites in internet. If you are the only user of your desktop or laptop, [...]

    READ MORE »

  • »

    MikroTik Hotspot with Bandwidth Limitation and Prepaid Billing System |   January 14, 2018

    Say, you are a network administrator and want to establish a network that will have user bandwidth package management facility with prepaid billing system as well as partner advertisement facility. Then, MikroTik Hotspot Server Configuration with MikroTik User Manager Radius Server will be a wise decision. Because, MikroTik User Manager Radius Server is a user authentication, authorization and accounting application that will give facility to manage user bandwidth package with prepaid billing system. On the other hand, you can easily [...]

    READ MORE »

  • »

    LVM Management in CentOS/Red Hat 7 Linux |   March 15, 2019

    LVM (Logical Volume Manager) is the recommended partition method for CentOS/Red Hat 7 Linux. Specially, if we work on Mail Server, File Server, FTP Server, Web Proxy Server or any application where disk space changes frequently, the LVM partition is mandatory in this case. In my previous article, I discussed how to install CentOS 7.5 with LVM partitioning. If you are new here or CentOS 7 is not yet installed, I will suggest you to follow my previous article and [...]

    READ MORE »

  • »

    MikroTik User Manager Installation and Basic Configuration |   December 15, 2019

    MikroTik User Manager is a RADIUS application developed by MikroTik team and can be used without charge. User Manager is used for authentication, authorization and accounting of MikroTik RouterOS, PPPoE, Hotspot, DHCP and Wireless users. Although User Manager Package is developed by MikroTik it will not be found in RouterOS by default. So, we have to install User Manager Package manually if we wish to use this RADIUS application. User Manager can be installed on MikroTik RouterBOARD, MikroTik CHR or [...]

    READ MORE »

  • »

    MikroTik IPIP Tunnel with IPsec (Site to Site VPN) |   March 18, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides IPIP tunnel that is used to create a site to site VPN. IPIP tunnel is a simple protocol that encapsulates IP packets in IP to make a tunnel between two routers. To encapsulate [...]

    READ MORE »

  • »

    MikroTik WebProxy Log Analyzer Configuration |   August 30, 2016

    MikroTik RouterOS generally logs various system events and status information. Logs are mainly saved in router’s memory (RAM) or disk. MikroTik logs can also be sent by email or even can be sent to a remote syslog server. All logs those are saved in router’s local memory can be viewed from Log menu. Any log entry that is saved in local memory contains time and date when event occurred, topics that this message belongs to and message itself. But local [...]

    READ MORE »