Skip to main content

How to make your windows machine a virtual router (Hotspot) with command prompt in windows.

    One thing you should keep in mind is, we are not installing any software! We are using the windows command prompt which is integrated in every windows machine.
Step one

Open windows Command prompt with administrative privilege. That is by right clicking on the command prompt icon and clicking “run as Administrator”. 

Step two

Enter the following lines of command! Not exactly because you have to change the SSID(service set identifier) and password to suit your taste.

Setting the SSID
  • Netsh wlan set hostednetwork ssid=ICTmagazine
    NB: I choose to use ICTmagazine as my SSID(network name or identifier) you have choice to use any reasonable String characters(Number and Alphabets). Press “enter” you will have a success message “The SSID of the hosted network has been changed successfully”.
Setting the password
  • Netsh wlan set hostednetwork key=12345678
    NB: You can use any password ranging from 8 to reasonable length. Press “enter” you will have another success message “The user key passphrase of the hosted network has been changed successfully”.
Allowing the network to work
  • Netsh wlan set hostednetwork mode=allow Press “enter” you will have another success message “ hosted network mode has been set to allow”.
Starting the Virtual hotspot
  • Netsh wlan start hostednetwork Press “enter” you will have another success message “The hosted network started ”.
Terminating/Stopping
  • netsh wlan stop hostednetwork Press “enter” you will have another success message “The hosted network stopped”

    Your screen will look exactly like mine, but mind you without the ICTmagazine stuffs "laffs"

join us on Facebook: ICTmagaine BBM channel: ICTmagazine





Comments

Post a Comment

Popular posts from this blog

Powerful words from Steve Jobs on his sick bed

Powerful message. Steve Jobs’ Last Words - I reached the pinnacle of success in the business world. In others’ eyes, my life is an epitome of success. However, aside from work, I have little joy. In the end, wealth is only a fact of life that I am accustomed to. At this moment, lying on the sick bed and recalling my whole life, I realize that all the recognition and wealth that I took so much pride in, have paled and become meaningless in the face of impending death. In the darkness, I look at the green lights from the life supporting machines and hear the humming mechanical sounds, I can feel the breath of god of death drawing closer… Now I know, when we have accumulated sufficient wealth to last our lifetime, we should pursue other matters that are unrelated to wealth… Should be something that is more important: Perhaps relationships, perhaps art, perhaps a dream from younger days ... Non-stop pursuing of wealth will only turn a person into a twisted being, just l...

Introducing Microsoft Surface pro 3

Surface Pro 3      On Monday rumors was circulating the online journals regarding next surface pro tablet. Online journals and news sites  on Monday leaked image of the device was circulating, not knowing that the company will officially announce the device the next day. The surface tablet is just too much because it comes with a stylus and the screen was optimized to take a full handwriting future just like your normal paper, microsoft solve the issues users faces while using stylus to write on so many devices, where placing palm on the screen while writing result in unwanted drawings. Here we must say thank you to samsung for bringing back stylus into the mobile world in its Note series tablet and mobile phones. The awesome device comes with a slim removable keyboard for ease typing.      The surface pro 3 according to Microsoft can replace laptops, meaning normal .exe files that runs on windows pc or laptops can be installed on this sexy device. ...

Steps of Ethical Hacking

Steps of Ethical hacking Foot printing Scanning Enumeration System hacking NB: This will only be an introduction. I shall discuss the steps in details, bit by bit. Footprinting: This is the first step in hacking. This involves gathering information about the target network, firm or organization. The information collected will help the attack successful. This step is the foundation of hacking. If data collected is inaccurate the attack is likely to fail. This happens during the  passive state of the system. This steps target information that are carelessly handled or stored. Attack is as good as how accurate the information collected at this stage. Information that can be collected or extracted include IP addressing range Phone Numbers Email addressing Name spaces Employee information facility information Job information Scanning: This stage deals with studying the system during it active time. It focuses on gathering more useful information which...