Turn Computer into Router
Most Relevant Content
Internet Connection Sharing Ethernet to Ethernet
Windows is the most popular operating system to any computer user. It is said that no computer user cannot go a single a day without windows operating system. Windows has a lot of default internet features which help to connect our computer to internet as well as it provides internet connection sharing facility. With Internet Connection Sharing (ICS) feature, you can turn your laptop into Wi-Fi hotspot or turn your desktop into a router to share your broadband connection with your family members or friends. So, if you wish to turn your computer into an internet router with internet connection sharing feature, keep reading this article where I will is show you how to share your broadband internet connection with others by turning your computer into a router. System Requirements If you want to turn your desktop computer into an internet gateway or router so that you can share your broadband internet connection with your family members or friends, you have to have below system information. Otherwise, you cannot turn your computer into a network router. Desktop computer which has two network card integrated. Windows operating system installed (windows 7, windows 8 or windows 10). 7 Easy Steps to Turn a Desktop [...]
- »
Install MikroTik RouterOS on PC | June 13, 2016
MikroTik is a popular and mostly used router worldwide because of having a lot of networking functionalities and its cheap price. If we buy a MikroTik Routerboard (like MikroTik Routerboard 450G, MikroTik Routerboard 1100 AH etc.), we will find a machine where MikroTik RouterOS is prebuilt but the machine contains limited processing resources such as limited RAM and limited processor core. So, our network could be slow if you use a MikroTik RouterBoard for maintaining a large network. On the [...]
- »
Turn Computer into Wi-Fi Hotspot | September 17, 2015
Internet Connection Sharing is an awesome feature in windows operating system. Using this feature, you can turn your computer which has wireless network card integrated into Wi-Fi hotspot and share your internet connection with your friends or family members. Generally, each laptop has a wireless network card integrated by default. So, if you are a laptop user, you can turn your laptop into Wi-Fi hotspot so easily. If you are a Desktop user, you can also turn your desktop as [...]
- »
MikroTik DNS Client and Caching DNS Server Configuration | April 7, 2019
Domain Name Server (DNS) is an essential part in a computer network. Today web communication cannot imagine without DNS. DNS is a client server protocol where DNS Client requests for the domain name resolution and DNS Server response on it. MikroTik Router has both DNS Client and DNS Server features. The DNS Client is used to resolve domain name to IP address from a DNS Server. On the other hand, the DNS Server feature provides domain name resolution for the [...]
- »
Restrict Internet Access Based on MAC Address in MikroTik | February 4, 2017
MikroTik router has a lot of features by which a network administrator can design his network as he likes. As a network administrator, sometimes you may need to allow internet access some specific devices. If other devices try to access internet, they will be rejected by your router. For example, say, you have configured a simple network like below diagram. In this network, you have configured WAN, LAN, Gateway, DNS and NAT. Also you have created queue rules for limiting [...]
- »
MikroTik EoIP Tunnel for Bridging LANs over the Internet | April 22, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) that is used to create a site to site VPN tunnel. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]
- »
Managing Disk Partition with the parted Tool in CentOS 7 | March 2, 2019
As a system administrator, sometimes you may require to manage partitions of your CentOS/Red Hat Linux Operating System. Partition management is always a risky task. But there are some useful tools those are so helpful to manage CentOS/Red Hat Linux disk partition easily. In my previous article, I discussed how to manage CentOS/Red Hat 7 HDD partitions with the fdisk utility. The fdisk tool is only eligible to manage MBR partition table. But GPT partition table is now becoming more [...]
- »
OpenVPN Configuration over Port 443 on Ubuntu Linux | June 20, 2022
OpenVPN provides a secure and encrypted VPN tunnel across public network. Unlike PPTP and L2TP VPN Services which can be blocked, OpenVPN can highly be customized and even can be run over so popular TCP Port 443. So, OpenVPN cannot easily be blocked. OpenVPN uses SSL/TLS Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across public network. OpenVPN Server can easily install on Ubuntu Server. Installing OpenVPN Server on Ubuntu Server, we can connect Windows, [...]
- »
DNS Server Configuration on CentOS 7 (Caching DNS with BIND) | June 24, 2019
DNS (Domain Name System) Server is an essential part to any computer network. Today web communication cannot imagine without DNS Server. DNS is a client server protocol where DNS Client requests for the domain name resolution and DNS Server response on it. Every network should have a DNS Server because local DNS Server improves network performance by caching DNS information and serving DNS request locally. DNS Server can be configured either Windows or Linux operating system. In this article, I [...]
- »
HTTP vs. HTTPS: The Impact Of Using SSL Certificates | November 29, 2021
Google and cybersecurity experts continue to make clarion calls to web admins and website owners to switch from HTTP to HTTPS. But is there any difference between the two other than the extra āSā at the end of HTTPS? Not everyone understands the differences between HTTP and HTTPS and why the difference is so significant. In this post, we will discuss the differences between HTTP and HTTPS, the reasons why you need to switch from HTTP to HTTPS, and the [...]
More Similar Content
You May Also Like