Skip to main content

How to Create Wi Fi Hotspot on Windows 7/ 8/ 8.1/10 Using CMD (Command Prompt)



Instructions below will show you how to turn a computer into a WiFi hotspot without using a third-party software that may likely eat up memory even after it is closed. Any machine running Windows XP and up, including Windows 7/ 8/ 8.1/10 Preview, will work using commands below.

What You Should Do :

Step 1: Hit the Start button, and type "Command Prompt" or "cmd" on the search box. If your computer is based on Windows 8, you'll need to press the keyboard's Windows logo key to switch to the system's Modern UI Style and type "Command Prompt" or "cmd." Run Command Prompt with admin rights. To do that, right-click on the Command Prompt icon and select "Run as administrator."

step 2: Type "netsh wlan show drivers" (without the quotation marks) in Command Prompt to check whether or not your computer supports a hosted network. The "Hosted network supported" field should indicate "Yes" if your unit supports WiFi sharing. If it says "No," you'll have to download the corresponding driver for your WiFi adapter first before proceeding.


Step 3: To create a hotspot, type "netsh wlan set hostednetwork mode=allow ssid=yournetworkname key=yournetworkpassword," and hit Enter on your keyboard. 

Remember, "ssid" refers to the WiFi hotspot's name while "key" is said network's password. You can also use the aforementioned command to change the hotspot's name and password.


Step 4: To get the hotspot up and running, type "netsh wlan start hostednetwork." Make sure your computer's WiFi adapter is also switched on, or the hotspot won't work at all.


Step 5: To stop wifi hotspot Just input 
netsh wlan stop hostednetwork
in CMD.
the WIFI is close.


Comments

Popular posts from this blog

      HAVIJ Adv. SQL Injection Tool 1.17 Cracked ➝Havij PRO (SQL Injection) : is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software, user can perform back-end database fingerprinting, retrieve DBMS login names and password hashes, dump tables and columns, fetch data from the database, execute SQL statements against the server, and even access the underlying file system and execute operating system shell commands. The distinctive power of Havij that differentiates it from similar tools lies in its unique methods of injection. The success rate of attack on vulnerable targets using Havij is above 95%. The user friendly GUI (Graphical User Interface) of Havij and its automated configuration and heuristic detections make it easy to use for everyone even amateurs. Havij PRO Supported Databases W...
CREDIT CARD DORKS This is some of the Latest Carding dorks. If you are new here, then take a look at the next (first) post. inurl:".php?cat="+intext:"Paypal"+site:UK inurl:".php?cat="+intext:"/Buy Now/"+site:.net inurl:".php?cid="+intext:"online+betting" inurl:".php?id=" intext:"View cart" inurl:".php?id=" intext:"Buy Now" inurl:".php?id=" intext:"add to cart" inurl:".php?id=" intext:"shopping" inurl:".php?id=" intext:"boutique" inurl:".php?id=" intext:"/store/" inurl:".php?id=" intext:"/shop/" inurl:".php?id=" intext:"toys" inurl:".php?cid=" inurl:".php?cid=" intext:"shopping" inurl:".php?cid=" intext:"add to cart" inurl:".php?cid=" intext:"Buy Now" inurl:".php?cid=" intext:...

Google Tricks, Tips And Hacks 2017 (Best 36+)

Google Tricks, Tips And Hacks 2017 (Best 36+) Google has rather become the face of the internet. While it was just a search engine back in the day, Google has grown a lot. This is because Google owns popular services like gmail, YouTube and also the most popular mobile OS which is Android. Therefore, anyone cannot use the internet without Google.                                                                                                                                                                                         ...