Free Essay

Wifi Set Up on Pc

In:

Submitted By daslimo
Words 536
Pages 3
Instructions:
Checking for compatibility of host Windows 8 PC/tablet: * First of all, go to Start Screen and type ‘cmd’. You would be showed the ‘Command Prompt’ in results. Right click on it or swipe down on its tile to bring the app bar. You would see the option to ‘Run as administrator’ in app bar on bottom. Press it.

* You would be asked; ‘Do you want to allow the following program to make changes to this computer’. Press ‘Yes’. * Your ‘Command Prompt’ will open. Here type the following. netsh wlan show drivers

* Press ‘Enter’ to execute the command. You would be showed a complete list of your internet properties. Search for ‘Hosted network support’. * If it’s ‘Yes’ then, you are good to go otherwise, you will have to upgrade your Wi-Fi card.
Tip: Don’t close the Command Prompt as you will be needing it in the next steps.
Now, when you have fulfilled the above simple requirements, you can proceed to the setup of that virtual Wi-Fi router (hotspot). Just follow the instructions below to create a virtual Wi-Fi router (hotspot) on your Windows 8 PC/tablet.
Creating a virtual Wi-Fi router (hotspot) * If, you have the Command Prompt open, simply type in the following netsh wlan set hostednetwork mode=allow ssid=<enter_network_name_here> key=<enter_password_here> * Here, <enter_network_name_here> would be replaced with your desired name e.g. Windows8CoreVirtual and <enter_password_here> would be replaced with the password e.g. 987654321.

* Once you have entered the correct Wi-Fi name and password, press ‘Enter’. * Your virtual Wi-Fi router (hotspot) would be created. * Now, we need to activate it. Simply type the following in the command prompt netsh wlan start hostednetwork

* Your virtual router would be started. * That’s all!
Now, you will want to connect other devices to that virtual Wi-Fi router (hotspot). Simply follow the instructions below but, before that, you will have to enable the internet sharing.
Enabling the internet connection sharing for virtual Wi-Fi router. * First of all, go to Start Screen and type ‘Network and Sharing’. Select ‘Settings’ from the right filters and press ‘Network and Sharing’.

* Your ‘Network and Sharing Center’ window will open in desktop. Here select ‘Change adapter settings’ from the left column.

* Here you will see the complete list of adapters in your PC/tablet. Here select the connection type you are using e.g. a Wi-Fi network or a Ethernet etc by right clicking it and selecting ‘Properties‘ or selecting ‘Change settings for this connection’ from the menu ribbon above. * A pop-up window would open. Here navigate to ‘Sharing’ tab and check the ‘Allow other network users to connect through this computer’s internet connection’ and select ‘Local Area Connection* 13’ from the drop down list.

* Press ‘Ok’ and you are good to go.
Connecting other devices to that network.
Connecting to this new virtual router (hotspot) is simple and similar to connecting to a real Wi-Fi network. Simply go the network settings on your Windows PC/tablet or phone and select this network from the settings. Enter the password and Bingo! You are connected to internet connection without an actual Wi-Fi connection.

Similar Documents

Premium Essay

Evil Twin

...Evil Twin Wi-Fi Attacks NT1110: Computer Structure and Logic October 23, 2013 Abstract What is the “Evil Twin”? Evil Twin is a type of Wi-Fi attack, it is a home-made wireless access point that masquerades as a legitimate hot spot with a very strong signal in efforts to gather personal or corporate information. With this, the overall goal of this report is to educate the public on how to protect themselves. Additionally in this disadvantages and advantages will be discussed along with the effects on consumers and the future. According to Dr. Phil Nobles, a wireless Internet and cybercrime expert at Cranfield University, said: this is how the evil twin works. "So-called 'evil twin' hotspots present a hidden danger for Web users. In essence, users think they've logged on to a wireless hotspot connection when in fact they've been tricked to connect to the attacker's unauthorized base station. The latter jams the connection to a legitimate base station by sending a stronger signal within close proximity to the wireless client -- thereby turning itself into an 'evil twin. Cybercriminals don't have to be that clever to carry out such an attack. Because wireless networks are based on radio signals they can be easily detected by unauthorized users tuning into the same frequency." The Disadvantage of Evil Twins The Evil Twins a Menace to Wireless Security > Mobile, (by Jack M German Tech News World 06/04/09). Once the wireless...

Words: 1288 - Pages: 6

Premium Essay

Comptia Sims Questions

...SIMS are Valid. All the SIM SIM#1 - Bluetooth,IR and Wifi range and usage SIM#2 - The connector type matchup: VGA, DVI, HDMI,S-Video, Composite, Serial. SIM#3 - Identify which encryption types belong to which wireless security protocols. SIM#4 - Match up parts for a Home Theater PC, Thick Client PC and Gaming PC. SIM#5 - Identify motherboard components. SIM#6 - Build a gaming PC and a virtualization PC using a collection of computer components. SIM#7 - Configure SOHO with maximum encryption SIM#8 - SOHO Setup at Library SIM#9 - Build PCs SIMs Thick Client PC --- 250W, Intel i3, Shared Video, Windows 7 32-bit Pro, 2GB DDR3 Ram, 250GB HDD Gaming PC --- 900W/800W, Intel i5, Dual 1GB DDR5 PCIe x16, Cooling Case, 8GB DDR3 Ram, 250 SSD Home Theater PC --- psu: 250w/HTPC, cpu: amd phenom, video: 1gb ddr5, special component: tv tuner, ram: 4gb ddr3, hdd: 1 tb hdd Bluetooth: 100m, Cell phone headset Infrared: 1KM, WAP List of 4 Wi-Fi encryption and match with the technology it uses. The list is as followed Open WEP WPA WPA-CCMP and the list of choices are as followed None RC4 DES 3DES AES Open---None WEP----RC4 WPA----RC4 WPA-CCMP(WPA2)---AES. 1) Set up a router for a library. Other commenters have already talked about this and given tips. The only thing that tripped me up is that the third tab contains a field for entering an administrator password for the router, in addition to the regular router password that...

Words: 842 - Pages: 4

Free Essay

Home Networking

...data is very easy. Princeton did a study of low level tech hackers can access the most well protected computer (Roberton, 2008). The most popular tools the hackers use are Back door remote administrative programs and Denial of Service (DoS) Back door remote works through an uploaded exe file on a website that seems to be trusted. This software is usually spread between pcs. The infected pc communicates with someone via email at a work computer. The infected pc infects the work pc and the virus spread. This is similar to the situation at JP Morgan Chase. The hackers where able to get through via an employee. The FBI is involved because as the writers says the attempted hacking should have stopped but they believe other holes in the system were left unprotected (Goldstein, 2014). The type of breach at Chase was a simple backdoor process which gained the hacker’s access to approximately 90 servers. The breach was discovered but it also uncovered a vulnerability in the infrastructure of a large bank that has challenges protecting their servers on a day to day basis (Krebs, 2014) Denial of Service causes your pc to crash or become busy processing useless data, it ignores the breach going on. This is what happened with Home Depot and Target. The Malware was...

Words: 1203 - Pages: 5

Premium Essay

Securing the Wireless Soho Network

...Office (SOHO) network set up is a simple task when using “Off The Shelf” equipment and the default configuration. Sadly it is not as secure as one would like. Using the default configuration leaves the network open to would be hackers, hijackers and the next door neighbor looking to get some free internet. Today we are going to discuss the equipment used to build our SOHO and then how to step outside of the box and ensuring that we are secure. Our small businesses has a total of 5 employees working out of a converted basement. We use Verizon FIOS for our ISP using a Actiontec Wireless Broadband Router (GigE), 5 laptops, 1 PC and 1 wireless printer. . Router The backbone of our SOHO network is the Actiontec Wireless Broadband Router (GigE) model number MI424WR (GigE). Out of the box it "support very high speed Internet service." with "speeds up to 1000 Mbps wired (with the Gigabit Ethernet interface) and 300 Mbps wireless” using a 802.11b/g/n chipset. It comes prebuilt with an Enterprise level security including; customizable firewall, stateful packet inspection, Denial of Service (DoS) protection, content filtering, intrusion detection, WPA and WEP WIFI encryption. . Physical Network Configuration Our SOHO networks physical layout is pretty standard. Outside of the building is the Fiber Optic line that feeds into the Optical Network Terminal (ONT) for the building. From there a coaxial cable runs to the Actiontec Wireless Broadband Router (GigE). The 1 PC is “wired” to the...

Words: 881 - Pages: 4

Premium Essay

Ccna Labs

...Phase 1: Identifying Requirements, Putting the Network Together Scenario NuggetLabs Industries is growing significantly. Due to space limitations, five employees currently share single cubicles…at the same time. While this is great for team building, these space limitations are now impacting business productivity. NuggetLabs has now leased an additional office building roughly 20Km from their headquarters location. While this office will eventually connect to the HQ office, it will initially be set up independently. NuggetLabs Industries has heard rumors of your ninja-like network consultation skills and has agreed to pay you an excessive amount of money to design and build their network infrastructure. Gathering Information To help guide this initial configuration, you‘ve assembled a list of requirements based on various meetings with management. * The new office will initially house 75 employees, each with their own Cisco IP Phone and PC. This office may eventually scale to 200 employees over 5 years. * The Windows admins are planning to install a new pair of redundant servers at the new office. They plan to manage all the IP addresses for DHCP on these servers and are waiting for you to tell them what IP address range they should use. * Windows admins: Jeff Service - (602) 555-1293, Mike Pack (480) 555-9382. * The new office is a two story building with the Main Distribution Frame (MDF) in the northwest corner of the first floor. Because of...

Words: 4941 - Pages: 20

Free Essay

Rwt1 Task 1

...Table of Contents Executive Summary 3 Introduction 4 Research Findings 5 Apple iPad 5 Toshiba Excite™ 13 6 Samsung Galaxy Note II 6 Recommendations 7 Conclusion 7 References 8 Executive Summary For a large company, with a large sales department, with many remote employees, three different technologies that have emerged within the last five years were looked at to compare features, usability, and size. I also looked at was how easy or difficult each device would be to set up, as well as how secure each device would be for employees to use. The devices were compared to find which device would be best to have each employee use. The Apple iPad is practical for small businesses because it can be set up for fewer users and it easy to use, as well as compact, which makes it easy to transport form office to office or from home to home for remote employees. Unfortunately, for large companies, the Apple iPad can be difficult to set up for multiple users on a single iPad. Setting up devices for each work station can be very costly, as it requires its own hardware for each workstation. The iPad runs faster with the A6X chip, which launches the applications faster and makes the device run faster. The device can support a wide range of virtual private networks, which makes the device secure. The Toshiba Excite 13 Tablet is a little bigger than the iPad, which can make it harder to transport, but easier to use when at home or in the office. It is about the size of a...

Words: 2606 - Pages: 11

Premium Essay

Mr Jaaapp

...more flexibility, than share memory sticks/floppy drives. You can share many different files ie photos, music, documents • Printer Sharing- Once is connected to the networks, you can easily set up all of the computers to share one printer. This save a lot of money, because instead of buying a printer per one pc, you can have one printer for each pc. • Internet connection sharing- It saves a lot of money with costs of speed internet. Many users can connect to the one network- which means you don’t have to pay twice or even more for the internet. However you may notice, that the Internet connection slows down, when there are many people that share the network at the same time. In Summary, you can store any kind of information at the network at one PC, and then you can retrieve it from different pc, that is connected to this network. Network Topology: The best network topology for small business in nowadays is star topology. The star topology looks like this : I would strongly recommend you to use this topology as it has many different advantages. It is very simple to add different devices, if the company expands in the future. It happens from time to time, that there is a cable failure- by using star topology, one failure cable does not bring down the entire network, but only pc/device that using this cable. Star topology, has a lot of support in nowadays, as it is the most common topology. It can be easily upgraded to faster speeds, which is very important, when...

Words: 482 - Pages: 2

Free Essay

Small Network Proposal

...price is relatively small and the client will find that this system is easy to operate and it is simple to administer to. Also this small server is designed to make adding drives or peripherals a minimal effort. Obviously the space saving design will make it ideal for a small office. This server is also reliable and it's also is expandable. Its error checking and correction (ECC) memory minimizes the likelihood of memory corruption. This server comes with AMD Turion™ II Neo N40L processor (1.5 GHz, 15W, 2MB) and being RAID 0 and 1, it prevents data loss and ensures around the clock reliability. The server contains 2 (two) HP 500GB 3G SATA 7.2K rpm LFF (3.5-inch) Non-hot Plug Midline Hard Drives. It also can also support up to four LFF SATA pluggable hard disks and up to 8 GB of RAM. The SATA hard drive portfolio is categorized into two categories; Entry (ETY) and Midline (MDL) hard drives. Entry and Midline SATA hard drives provide the best price advantage for lower workload...

Words: 2210 - Pages: 9

Premium Essay

I Dont Know

...: 2 mbps To check Your Connection Speed go to Site http://speed.ncr.airtelbroadband.in First Level Troubleshooting If your Internet not working please restart your computer & off / on the modem and wait 2 min. then start. [pic] [pic] Beetel 220BX / 110BX / Wifi Router (Check your modem LED status) 1. Red LED showing power: - If light not glowing checks your power plug and modem adaptor. 2. Yellow LED-showing Link: - If light is not glowing check the RJ11 cable, Splitter connection and phone line (if line phone dead contact to phone dept.) (SPLITTER CONNECTION) [pic] 3. Green LED showing data transfer: - If this light not blinking please on / off the modem. 4. Last Green LED showing computer to modem connectivity: -If light not display check USB / LAN cable. (In XP you can enable the LAN/USB connection) Errors in modem/ Run time Error Please Switch Off and Switch on Modem / PC Power Dynamic IP For Internet Connection IP - 192.168.1.2 To 254 Subnet - 255.255.255.0 Gateway -...

Words: 778 - Pages: 4

Premium Essay

Voip as a Bew Trend

...VoIP as a New Trend Student Name University Name Professor Name 06/20/2010 There is a new trend that has taken the networking technology to the next level. It all started in the 90’s looking for a less expensive way to make phone calls across the world. Both residential and commercial customers have been looking for a cheaper way to make local and international calls. This new revolution is called Voice over Internet Protocol (VoIP). If I had to put this in plain terms, this technology allows voice traffic to be transmitted over the Internet. VoIP is a new application of Internet Protocols (IP) that enables the conversion of voice communications into data packets and then these packets are transmitted via an IP network such as the Internet. “VoIP services convert your voice into a digital signal that travels over the Internet”. (fcc.gov) Similar to using your analog phone system and going through a Public Switched Telephone Network (PSTN), now you will be using a digital phone and going through the Internet. All you need to get the ball rolling and to be part of this new trend is a decent Internet connection at home and you could say goodbye to that plain old analog telephone line forever. Most cable companies are offering service bundles that include cable television, Internet access and telephone services. These companies are transitioning from the telephone analog system to the VoIP systems. A lot of costumers are switching over to VoIP for the simple reason of saving...

Words: 3242 - Pages: 13

Free Essay

Paper Needed to Join Website

...Indledning Indledning Tillykke med denne notebook-pc – den perfekt konstruerede notebook-pc. Denne splinternye udsøgte bærbare computer vil give dig en fornøjelig og professionel oplevelse med at bruge computeren. Vi er stolte over at kunne fortælle vores brugere, at denne notebook-pc er helt igennem testet og lever op til vores uovertrufne pålidelighed og kundetilfredshed. Udpakning Pak først forsendelsen ud og tjek alle delene omhyggeligt. Kontakt øjeblikkeligt din lokale forhandler, hvis nogle af de indeholdte dele er beskadigede eller mangler. Gem også æsken og anden emballage, hvis du skulle få brug for at sende apparatet i fremtiden. Pakken skal indeholde følgende dele: Notebook Hurtig installationsguide AC/DC adapter og AC strømledning Taske (valgfri) All-in-one applikationsdisk, der indeholder de komplette udgaver af brugermanualen, styreprogrammer, hjælpeprogrammer og valgfri gendannelsesfunktion, mv. 2 Produktoversigt Dette afsnit giver en beskrivelse af den bærbare computers grundlæggende aspekter. Det vil hjælpe dig at lære mere om denne bærbare computers udseende, inden du bruger den. Vær opmærksom på, at den bærbare computer som er vist i dette afsnit kan variere fra den, som brugeren købte. Set ovenfra Figuren der viser notebook'en set ovenfra og beskrivelsen vist nedenfor, vil føre dig frem til de primære betjeningsfunktioner på din notebook. Figurerne vist her er kun til reference. 3 Indledning 1. Videokamera ...

Words: 1670 - Pages: 7

Free Essay

Somery of the Fall

...CompTIA A+ Certification Exam Objectives EXAM NUMBER: 220-901 About the Exam Candidates are encouraged to use this document to help prepare for CompTIA A+ 220-901. In order to receive the CompTIA A+ certification, you must pass two exams: 220-901 and 220-902. CompTIA A+ 220-901 measures the necessary skills for an entry-level IT professional. Successful candidates will have the knowledge required to: • Assemble components based on customer requirements • Install, configure and maintain devices, PCs and software for end users • Understand the basics of networking and security/forensics • Properly and safely diagnose, resolve and document common hardware and software issues • Apply troubleshooting skills • Provide appropriate customer support • Understand the basics of virtualization, desktop imaging and deployment These content examples are meant to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination. EXAM ACCREDITATION CompTIA A+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives. EXAM DEVELOPMENT CompTIA exams result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an entry-level IT professional. CompTIA AUTHORIZED MATERIALS USE POLICY CompTIA Certifications, LLC is not affiliated with and does not authorize, endorse or condone...

Words: 4474 - Pages: 18

Free Essay

Wireless Technology

...running head: WIRELESS TECHNOLOGY Wireless technology Justin Armstrong Dr. Biswajit Panja CIS 505 March 4, 2012 Objectives 1. Compare the pros and cons of 3GL and 4GL technology to determine the best uses of 3GL and 4GL technology in today’s applications. 2. Describe how an enterprise would use 3G, 4G, WAN, and WIMAX to improve business. Explain why they would use one (1) solution over the remaining three (3). 3. Analyze the changes in 4GL technology since the printing of the textbook in 2009 and identify those of importance for a user of 4GL technology. 4. Take a position on the following statement, “Wireless application protocol is a necessity for wireless communication organizations and their users.” Then, explain your position with supporting evidence. Compare the pros and cons of 3GL and 4GL technology to determine the best uses of 3GL and 4GL technology in today’s applications. So what are the benefits or otherwise of using a 3GL over a 4GL and vice versa. For me it certainly depends on all the usual factors that drive any technology decision. Cost of product, support, flexibility, the human factor, tool lifecycle, vendor direction and target platforms being a few that come to mind instantaneously. (Dare, 2008) The pros of 3GL * 3GL’s are quicker to react to emerging markets and development trends: Generally the suppliers of these 3GL tools are inventing the future. They don’t often agree with each other but they certainly have the...

Words: 1538 - Pages: 7

Free Essay

The Difference Between Cracking a Wep and a Wpa Network Passkey and How to Protect Yourself from It

...newer and more improved algorithm. When WPAv2 was finally released, many devices began to be created to be compatible with the AES algorithm WPAv2 uses. There still have not been any major hacks or attacks on a WPAv2-AES network that would cause the Wi-Fi alliance look into using another algorithm a replacement. WPAv1 is too easy to hack so it is not recommended and WPAv1 is now susceptible to multiple types of attacks. There are several different ways you can help to protect yourself and your information. Verify your spam in your e-mail to make sure a file accidentally was not forwarded to spam. There are also others to improve your security. The length of your passkey is very important in security, as well as keeping an up-to-date anti-virus and staying up-to-date on all the latest hacks, cracks, and technology are critical for your protection. N. Justin Bernard Network Security Term Paper November 13, 2012 The difference between cracking a WEP and a WPA network passkey and how to protect yourself from it In today’s always evolving and improving technology world, there are always loopholes, weaknesses, and gaps. I will discuss one of the primary weaknesses in network security,...

Words: 3607 - Pages: 15

Premium Essay

How to Make a Wifi Antenna Out of a Pringles Can

...How To Make A WiFi Antenna Out of A Pringles Can Wi-Fi has completely changed the way we browse the net and use the internet in our day to day life. The complete comfort of accessing internet at better speeds is achieved through Wi-Fi networks. This article explains how to make a WiFi antenna out of a Pringles can, which you can use to boost your Wi-Fi network speeds. Here is the procedure : What is Cantenna? In order to boost your Wi-Fi internet network speed, you need to make an arrangement and fix it on the roof of your home. This equipment is built with the help of tin cans and it acts like an antenna. Thus, it is called a “˜Can’tenna. Here are a few advantages that you can get by installing a cantenna on your roof top.  As it acts like an extra antenna, the range of your Wi-Fi network also increases, thus enabling more data transfer speeds and more mobility.  It is proven that cantennas have more gain than the normal commercial antennas.  Automatically detects Wi-Fi hot spots.  Building one such antenna is really cheap and affordable. A cantenna is very much essential if you love mobility. Arranging a cantenna helps you to connect to the internet on your PC, laptop or Wi-Fi-enabled mobile handsets without the need for any wires. The speed at which you can access the internet is also reliable. You can play online role-playing games which would otherwise not be possible on any other modes ofwireless connectivity options like GPRS. To add up spice, building your...

Words: 1119 - Pages: 5