Save files online
Most Relevant Content
Free Online File Storage and File Sharing with Google Drive
Google Drive is a popular free online file storage and file sharing service by Google. Google Drive provides 15 GB free online storage where anyone can store or backup any kinds of file. That means, you can store your document file, picture, audio, video or any kinds of file into Google Drive and can read, write or download any file when you want. You can also share your stored file with your friends using Google Drive. But you are only eligible to use Google’s free online file storage and file sharing service if you have a Google Account. So, you must create a Google or Gmail account before using Google Drive. If you don’t have a Google account yet, visit my article about How to Create a Google or Gmail Account Successfully which will guide you properly for creating a gmail account. In this article, I will show how to store your important files into Google Drive and how to share your saved files with your friends. How to Use Google Drive Google offers you 15 GB free storage for storing your mails and files if you create a Google account. If you already have a Google/Gmail account, follow below steps [...]
- »
How to Get Free SSL Certificate from ZeroSSL | June 13, 2020
SSL/TLS certificate is an essential part in today internet communication. Online communication cannot imagine without SSL/TLS certificate. SSL/TLS certificate makes online communication secure by encrypting data transmitted over public internet. So, most of the applications (Web, Email and VPN services) those transmit data over public internet use SSL/TLS certificate to secure communication. SSL/TLS certificate requires to be signed by Certificate Authority (CA). It is possible to create self-signed certificate with SSL certificate creation tools such as OpenSSL. Some router venders [...]
- »
MikroTik Hotspot Login by MAC Cookie Configuration | July 10, 2020
MAC Cookie is a newly introduced Hotspot feature in MikroTik Router. MAC Cookie is specially designed to improve accessibility for smartphones, laptop and other mobile devices. MAC Cookie is not a basic login method rather it is an extension of basic Hotspot login method such as HTTP CHAP, HTTP PAP and HTTPS. So, when MAC Cookie is used with these basic Hotspot login methods, it improves the Hotspot user accessibility. In my previous article, I discussed MikroTik Hotspot basic configuration [...]
- »
MikroTik Hotspot Setup with Radius Server (User Manager) | January 6, 2018
Hotspot is one of the most popular services in MikroTik Router. It is popularly used in Hotel and Restaurant, Railway Station or Airport, School or University Campus and so on. Even ISP network and office network also use MikroTik Hotspot for authenticating network clients/users. Hotspot user can be managed with Hotspot’s local user database or with a Radius Server. Radius Server gives facility to manage Hotspot user’s bandwidth and accounting easily and centrally. So, Hotspot setup with Radius Server can [...]
- »
How to Secure MikroTik RouterOS Login Users | February 19, 2021
MikroTik RouterOS is a bridge between WAN and LAN. So, it is mandatory to apply RouterOS login user security policy. Otherwise, RouterOS may so insecure.
- »
MikroTik PPPoE Server Configuration with freeRADIUS Server | January 20, 2019
PPPoE Service is one of the most popular services in MikroTik Router. It is specially used by the local ISP provider for the simplicity of client connection. MikroTik PPPoE Service accepts user or client authentication and authorization both MikroTik local user database and RADIUS user database. RADIUS Server provides an efficient way to manage user authentication, authorization and accounting. FreeRADIUS is a high performance RADIUS suite that provides user authentication, authorization and accounting facility for a number of network devices [...]
- »
How to Block Free Proxy Access with MikroTik Router | May 21, 2019
Proxy Server is an alternative to VPN that breaks blocking firewall of a network. If any user uses free web proxy server with web browser, the web request is processed by the proxy server. So, blocking firewall rule is not applied on the proxy enabled PC. For this, system administrators should be careful enough to block free proxy servers along with blocking VPN access. In my previous article, I discussed how to block VPN access with MikroTik Firewall. In this [...]
- »
How to Create Free SSL/TLS Certificate with OpenSSL | July 23, 2021
SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]
- »
Internet Content Filtering in MikroTik Router using OpenDNS | August 22, 2024
Internet content is always not safe for our work or home network. We always face malware, phishing and adult content which are harmful for office or home internet. Using web content filtering software, we can easily get rid of this harmful content. OpenDNS is a cloud-based internet content filtering solution that helps to keep our office or home internet free from malware, virus and adult content. Configuring Free OpenDNS Home Internet feature with our Home WiFi Router, we can easily [...]
- »
What Are the 7 Layers of OSI Model and How Do They Work | October 5, 2021
The OSI Model stands for Open Systems Interconnection Model, a conceptualized framework used to describe the seven layers of a telecommunication system or network. It was established as an international standard in the year 1984 by the International Organization for Standardization. This model helps visualize how networks operate and is still used today to figure out and solve network problems, such as by a web development company. In this article, we will talk about the 7 layers of the OSI [...]
More Similar Content
You May Also Like