how to make my pc a wifi hotspot
Most Relevant Content
Turn Computer into Wi-Fi Hotspot
Internet Connection Sharing is an awesome feature in windows operating system. Using this feature, you can turn your computer which has wireless network card integrated into Wi-Fi hotspot and share your internet connection with your friends or family members. Generally, each laptop has a wireless network card integrated by default. So, if you are a laptop user, you can turn your laptop into Wi-Fi hotspot so easily. If you are a Desktop user, you can also turn your desktop as a Wi-Fi hotspot if you integrate a wireless network adapter in your desktop. Wi-Fi hotspot in windows operating system can be created with windows command or third party software tool. If you wish to turn your computer into Wi-Fi hotspot, keep reading this article and learn how to turn your computer into a Wi-Fi router with windows command or using third party software tool. Wi-Fi Hotspot with Windows Command If you have a laptop or a desktop which has wireless network card integrated and windows operating system installed, you can turn your computer into a Wi-Fi hotspot by applying some windows command and you can share your internet connection with your friends or family members. To turn your computer into [...]
- »
WiFi Station Setup in MikroTik Wireless Router | November 27, 2019
MikroTik Wireless Router is capable of working as a WiFi Client. So, if any ISP provides WiFi connection for their clients, MikroTik Wireless Router can be used to connect to that ISP SSID by configuring wireless station mode. MikroTik WiFi station mode finds available SSID and connects with permitted SSID. This wireless connection can be used as wireless WAN connection and configuring LAN, multiple devices can get internet over this wireless WAN connection. In my previous article, I discussed how [...]
- »
MikroTik Bandwidth Management using Simple Queue | September 3, 2015
MikroTik is one of the most popular routers in computer networking. It is said that no office or ISP company cannot go a single day without MikroTik Router. MikroTik Router is also a popular router to a network administrator because MikroTik Router is easily maintainable with graphical user interface software named winbox than other routers. A lot of services are available in MikroTik router to run a network smoothly. Among these services, Bandwidth Management Service is the most popular service in [...]
- »
MikroTik Multiple SSID with Separate LAN and DHCP Server | October 30, 2019
One of the most amazing features of MikroTik Wireless Router is creating Multiple SSID (Virtual AP) on a physical wireless interface. So, creating a Guest WiFi AP with separate LAN block, SSID and DHCP Server is so easy using MikroTik WiFi AP Router. In the previous article, I discussed how to configure MikroTik WiFi Access Point on physical wireless interface with DHCP Server using hAP Lite (RB941-2nD) Wireless Router. In this article I will discuss how to configure a Virtual [...]
- »
Restrict Internet Access Based on MAC Address in MikroTik | February 4, 2017
MikroTik router has a lot of features by which a network administrator can design his network as he likes. As a network administrator, sometimes you may need to allow internet access some specific devices. If other devices try to access internet, they will be rejected by your router. For example, say, you have configured a simple network like below diagram. In this network, you have configured WAN, LAN, Gateway, DNS and NAT. Also you have created queue rules for limiting [...]
- »
How to Block VPN Access with MikroTik Router | May 14, 2019
Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so [...]
- »
Red Hat/CentOS 7 Linux Installation (Minimal Packages) | April 18, 2017
Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally [...]
- »
MikroTik SSTP VPN Server Configuration with Windows 10 | April 27, 2020
VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. Secure Socket Tunneling Protocol (SSTP) transports PPP tunnel over TLS channel. SSTP uses TLS channel over TCP port 443. So, SSTP VPN can virtually pass through all firewalls and proxy servers. Because of using TLS [...]
- »
MikroTik PPPoE Server with Radius User Authentication | December 17, 2017
MikroTik PPPoE Server is popularly used in ISP Companies. Almost all Local ISP Companies use PPPoE service to manage their client’s connection. So, PPPoE Server Configuration places an important role in MikroTik RouterOS. MikroTik PPPoE Server configuration with local user database has been discussed in my previous article that is enough to manage PPPoE users for a single RouterOS. But if you have more than one RouterOS in your network or you need to manage your users remotely and more [...]
- »
Apache2 Web Server HTTPS Configuration on Ubuntu Server | August 15, 2021
Data transmission between web server and web client over port 80 (HTTP) is not encrypted. So, any middle man between web server and web client can view transmitted data and can steal secret information. To overcome this limitation, HTTPS Protocol over port 443 has been introduced. HTTPS is a secure web server that is configured with SSL/TLS certificate. TLS (Transport Layer Security) and its predecessor SSL (Secure Sockets Layer) are web protocols used to wrap normal traffic in a protected, [...]
More Similar Content
You May Also Like