how to get google as default search engine

Most Relevant Content

  • Setting Google as Default Search Engine

    Google is one of the most popular search engines to any online user. It is said that no online user cannot go a single day without Google search engine. Google search statistics shows that over 40,000 search queries are processed every second by Google. If you have any query about any subject, just type in Google search box and Google will show you billion of results related to your search query within less than a second. So, usually you will want to search your any query with Google search engine. Generally, your web browser supports multiple search engines to provide you best search query result. Google is not set your default search engine in your browser sometimes. You have to set Google as your default search engine manually. If you want to set Google as your default search engine in your browser, keep reading this article where I will show you How to set Google as Default Search Engine in your favorite  browser.  Setting Google as Default Search Engine in Google Chrome Google Chrome is one of the most popular web browsers to online users. It is also a product of Google. So, default search engine of Google Chrome browser is set [...]

    READ MORE »

  • You May Also Like

  • »

    How to Block Tor Browser with MikroTik Router |   June 12, 2019

    Tor Browser is an alternative to VPN and Web Proxy that breaks blocking firewall rule. If any user installs and uses Tor Browser, he/she can hide the public IP address of router and can unblock blocked websites applied on a network. So, administrators should block Tor Nodes along with other blocking firewall rule. In my previous article, I discussed how to block VPN and Proxy access with MikroTik Router and in this article I will discuss how to block Tor [...]

    READ MORE »

  • »

    CentOS 7 Partition Management with fdisk Utility |   February 11, 2019

    CentOS or Red Hat Linux is a popular server operating system to the system administrators. Almost all the system admins or IT guys who play with mail server, file server, proxy server and so on are so known with CentOS or Red Hat Linux and cannot go a single day without this operating system. The guys who are also wish to be a system admin should be familiar with CentOS or Red Hat operating system. In my previous article, I [...]

    READ MORE »

  • »

    CentOS 7.5 Installation with GUI and LVM Partition |   March 7, 2019

    Red Hat/CentOS Linux is a popular server operating system. Specially who work on mail server, web server, web proxy server, ftp server and file server are so familiar with the Red Hat/CentOS Linux. In my previous article, I discussed how to install CentOS 7.5 Linux step by step with the standard partition. But if you want to work on mail server, web proxy server, ftp server, file server or any other application where disk space changes frequently, the standard partitioning [...]

    READ MORE »

  • »

    MikroTik OpenVPN Setup with Windows Client |   April 2, 2018

    VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. MikroTik OpenVPN Server provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. OpenVPN uses SSL Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across [...]

    READ MORE »

  • »

    How to Prevent Simultaneous User Login in MikroTik Hotspot |   November 10, 2020

    MikroTik Hotspot is a user based internet access system. Most of the user authentication and authorization can be controlled with MikroTik Hotspot. But sometimes some users misuse user based authentication system. Misusing simultaneous login is one of them. Usually we provide one username and password for a user and we expect he/she will use this username and password from only one device at a time. But it is also possible to use same username and password in multiple devices at [...]

    READ MORE »

  • »

    MikroTik IPIP Tunnel with IPsec (Site to Site VPN) |   March 18, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides IPIP tunnel that is used to create a site to site VPN. IPIP tunnel is a simple protocol that encapsulates IP packets in IP to make a tunnel between two routers. To encapsulate [...]

    READ MORE »

  • »

    FreeRADIUS MySQL Database GUI with phpMyAdmin on CentOS 7 |   January 30, 2019

    FreeRADIUS is a high performance RADIUS Server that accepts a large number of networking devices as RADIUS Client including MikroTik Router. MySQL is one of the best user sources for freeRADIUS server. In my previous article, I discussed how to install freeRADIUS server on CentOS 7 and how to integrate MySQL module with freeRADIUS server. I also discussed how to create user group and profile in MySQL database server and authenticate MikroTik PPPoE client with MySQL database user. I used [...]

    READ MORE »

  • »

    How to Assign VMware ESXi License Key |   December 4, 2021

    No doubt VMware is the pioneer in virtualization world. VMware can be used either premium or free based on licensing. In the previous article, I discussed how to install VMware ESXi on a physical server or machine and then I also discussed how to get VMware ESXi free license from VMware website. Getting VMware ESXi license key either premium or free, we may sometimes get confused how to assign the license key in VMware ESXi host. So, in this article [...]

    READ MORE »

  • »

    MikroTik Firewall Basic Concept |   October 6, 2017

    MikroTik Firewall functions as a network security tool for preventing unauthorized access to networks as well as provides Network Address Translation functionality. So, a network administrator who is using MikroTik Router in his network cannot go a single day without MikroTik Firewall. Actually, the main duty of a MikroTik administrator is to maintain Firewall properly along with Bandwidth management after completing MikroTik Router basic configuration. So, a MikroTik administrator should have enough knowledge on MikroTik Firewall and so this article [...]

    READ MORE »