How to get a free internet access? How to secure the Internet through a Wi-Fi router? Butt router type TP-Link.

In order to get around the security of connecting with the Internet one or more cars computer system, it is necessary to rob it of a perfect fit. At this point, vikoristovuyutsya or nalashtuvannya router, or special. software security.

you need

  • Software security Tmeter.

Instruction

  • The shards of setting up a router for a coristuvach are even more collaborative tasks, as you can bring up unbearable nasledkiv, use programs for managing traffic in local networks.

    Among the current software propositions, you can see a few products: BWMeter and Tmeter. The functions of these programs are similar, but another option may be different - the program is completely cost-free.

  • For the exchange of security data, filter by IP-address, as for the leather machine it is individual. To search for all IPs for assigning filters, run the Tmeter program. At the head window, sequentially enter the following elements: "Configuration" and "Set filters".
  • Let's press the "Change" button for re-editing the file. Create new file Edit: for this, press the "Add" button, go to "Add" and put a sign next to the "Master-Filter" row. Then put a checkmark on the item "Turn on the exchange of swedkost" and put the required value, for example, 1 Mbit.
  • For the most part, security access to the Internet is important, and it also has a number of other options, which also allow you to charge a fee for slowing down traffic. As a butt of the varto, indicate the option “Singing traffic growth, which is good”, tobto. if you reach it, be it sumi, it will automatically block access.
  • For all the shortcomings of the program, do not forget about the minuses. For example, the administration of a measure transfers constant control and enforcement of what is being shown on computers of all the measure. If the administrator's computer turns out to be incompetent or irritable, then the control over the fence will be completely broken. That's why a lot of professionals are happy to create a router itself and only then win a special software security.
  • Porada added 3 serpna 2011 Porada 2: How to get rid of the security of the Internet tariff plan koristuvach, as well as the interest in the channel of the provider company. For the obviousness of a large number of computers, connected by a local network, you may need to reduce the speed of the Internet to one or a few koristuvachs.

    you need

    • - Personal computers;
    • - router;
    • - Internet access.

    Instruction

  • Get in global network a special program recognized for bandwidth control and security of the network service when working on the Internet - SoftPerfect Bandwidth Manager.
  • Install qiu program on the computer.
  • Go to the admin panel of the SoftPerfect Bandwidth Manager program and activate the menu.
  • Write down the new settings on the lists of two seen on the screen. In the first table Download policy list, specify the IP address personal computer, for which the security of the Internet will be surrounded.
  • Then enter the port, as well as the speed itself (the maximum and minimum allowable values). In the other table Upload policy list write the shipping rate.
  • Save all the changes made that will speed up the speed of the Internet.
  • Translate the new speed of the Internet by speeding up with a special online service.
  • To restore respect computer technology! An incompetent person is not only unable to reduce the security of the Internet, but it’s possible to improve everything, through which you will become twisted at the global network, or, if it’s stronger, it’s impossible. Korisna porada SoftPerfect Bandwidth Manager is not the only program that can help you reduce the speed of the Internet: a global network can get a few such effective programs, for the help of which you can close the speed of the Internet to a specific core of a local network. Until then, it is possible to reduce the speed of the Internet by using the modems. For this, it is necessary to go to the internal setup of the modem and install the exchange on the LAN port. How to urinate the security of the Internet - a version for others Evaluate the article!

    At the same time, on a few outbuildings, it is important to spread the supply of money evenly. Such a situation is blamed, if most of the access to the border is available to one of the coristuvachiv, it makes it impossible to normally use the Internet for all others. It may be the case if you play online or download a movie, but in the end, speed drops.

    If you are a koristuvach, you can freely check the speed of your Internet

    To this varto nobility, how to spread it її equally, or to be quick for okremih outbuildings. There are those if the access point is created behind the help of a router or a router.

    All advances are made through the adjustment of the router. Їх can be found in the browser - we drive in our IP in the address bar and after pressing the Enter key a menu will appear.


    We select DHCP, then select the DHCP Server item and check the box next to Enable. Connecting to the Line Type row - here it is necessary to select the connection method to the line. Dali go down to two rows below - Egress Bandwidth and Ingress Bandwidth. Here we write the speed of transmission, as the provider hopes, but in Kbits.

    How to transfer Mbit to Kbitu? Just multiply the Mbit value by 1024, for example, 10 * 1024 = 10240.

    Then we choose in the settings of the Bandwidth Control, the tab under the name Rules list. Here the addresses are indicated, on the way the exchange of services of the connection to the border is expanded. We click on Add new, and now the next fields are filled up:

    • We see Enable.
    • In the IP Range row, enter the address range. Stars take their meaning? On the very cob, if in the settings of the router we confirmed the Enable option, at the bottom behind the locks, the addresses are indicated, which we can transfer here.
    • The Port Range row can be left unfinished, at the end of Max Bandwidth we write the maximum possible width for other outbuildings connected to your line. Re-insurance for the authorities, for example, if you have 10 Mb / s, then you can set the exchange rate up to 3 Mb / s.


    After filling in all the rows, Save is pressed, the router is changed, and as a result, the Internet supply for these outbuildings will be fenced, the IP addresses of which are included in the destination range. Tobto you will be given all the security at the full obligation, and reshta coristuvachіv otrimaє її at the boundaries you have established. Qi parameters can be easily corrected or removed if necessary.

    Internet security for specific outbuildings

    In this situation, it is necessary to change, if the distribution rate changes for the occupied possession, like a victorious lace. It is also necessary to use yoga itself in the installations, in order to put less security access to the border.

    What is necessary for whom?

    We start again through the browser and have our IP connected to the connection. Select the DHCP section, the Address Reservation tab. When pressing the Add new button, we can identify a specific attachment in the router, for which we can access. Ale for tskogo spochat it is necessary to remember the row with the MAC address.

    How to know yoga?

    1. As before, the possession was already connected to your router, at the DHCP distribution, select DHCP Clients List - here you can find the addresses of all the attachments, like a victorious access point.
    2. Yakshcho koristuvach did not connect to the merezhі, to find out the address of the yogo I will add, it is necessary to go to Total Commander type in ipconfig /all. As a result, you will be given the parameters of the adapter, and the parameter we need to specify is in the "Physical address" row.

    Also, if we have filled in the first row, we enter the IP address into our own investigation, select the Enable row, which you can see, select the change. Now robimo revantaging the router and wondering what to change - go to the DHCP Clients List, de you can add attachments to the address that is assigned to you.

    In order to add something to the list for sharing access, select the Adjust Bandwidth Control menu, the Rules List tab, and then click again on the creation of a new item (Add new). As always, we select the Enable item, and in the IP Range row, it is possible to assign us an address earlier to change Wi-Fi security- Connection for koristuvach. Dali, write maximum speed submitting a bill in the Max Bandwidth(Kbps) section, taking the change.


    Can you stay wifi access for the sake of having some kind of possession, like vicorist your merezha

    Later, we have provided access to the Internet for the attached building. Similarly, you can link other correspondents to an address to speed up access to your account. To change the settings so that all settings work, go to the Bandwidth Control Rules List and check all the chinn rules.

    What robiti, if you get a pardon?

    Sometimes, when you create an exchange, you can win a win, which you indicate that the rule is to superechit reshti, before the creation of the vines. Therefore, it is necessary to see them for the correct operation of the router.

    Obkhіd rules how to obmezhennya that yak їх niknuti

    The one who wants to win your Internet in full access, can simply change his IP, continuing to win all the available speed. If you want to keep yourself safe, you can again close access to the border to other coristuvachas, so that the stench could not connect to the Wi-Fi point.

    Again, you can change the parameters of your possession: select the Wireless section and the MAC Filtering tab. The first task is to add your attachments here. To click on "Add new" and write your MAC address, description - you can write "Administrator", traditionally select Enable from the list.

    Only now we close access to decide.

    For the same tab, select the “Allow the stations specified…” row, which means that the connection to the link is more accessible to those who have the MAC address in the list. If you want to allow access to a few more outbuildings, you can add them to the list - as if you wanted to, we already explained.

    Important! Forward us, add your computer to the list, otherwise block access to everyone without a blame - you and yourself.

    Now, with your Internet, you can use your Internet only to earn more from the list, and for a fee, there will be more internships.

    Checking the set parameters

    If you want to switch, what parameters you have set are working, for which you need special sites, where you can change the speed of the Internet. Know їх dosit just for help poke systems whatever browser.

    Exchange of WI-Fi security is a procedure that takes a little time, but gives an excellent result. As the Internet is used to greet a small number of people, their technique may have different parameters, so the installation of a sing-sweetness for the skin can allow them to share evenly and avoid problems with a quick access.

    It is not uncommon for a situation, if one connection to the Internet, at the same time, a lot of people win. For example, this is most often seen with a sleepy home access. Through the course of time, it is brought to stick with a natural consequence - the problem of low speed.

    In fact, everything looks like this. Let's assume that there are two computers that, at the same time, have one connection to the same time. operating system, then maybe all the resources for the channel will be taken away by that computer, which creates more power and/or initiates it first. Talking my simple If you turn on the download of the file for an additional torrent client, then another short-term reader can be satisfied with reading texts and rewriting the mail. And from yakscho to enter then problem you can easily cheat. Moreover, the shvidko is simple. In addition, rozumіyuchi, as a means of securing the security of the Internet, as a whole it is possible to organize the distribution of traffic to a large number of koristuvachs, paying for the services of the provider. Axis so knowing can give profits.

    How to secure the security of the Internet

    Later, there are two ways to get rid of traffic: software and hardware. Moreover, the first one is divided into two groups: in the wake of the operational system and for help third-party addenda. As the first, so and the other way allows you to get around the security of the Internet, a number of characteristic fig. Thus, it is practical to store hardware in view of the computational capabilities of the components of a computer, which can be effectively implemented with old systems. Then another gnuchkіshiy at nalashtuvannі and vіdnosno cheap (though not the rule). Choose to lie down with the help of koristuvach, smart practice with outbuildings/programs and financial feasibility. Before speech, the appearance of Internet traffic is easy to build in both directions.

    Hardware method

    For yoga implementation, you need a special attachment - a router. Prices for budget models pochinayutsya $ 10-15, scho rob їh cіkavoy proposition. If it's not rich enough, then you can register a unique IP address on the skin computer. If so, you need to go into your settings (the address for the browser is indicated in the instructions or on the sticker) and select “DHCP - Reservation address” from the list. Here it is necessary to add a skin computer, indicating unique MAC addresses that IP (you can check with the authorities After the router is re-vanquished, then check the “DHCP client list” - all computers connected to the network can be seen. To now set the internet security for the skin IP address, you need to go to “Bandwidth control - List of rules”. Here it is necessary to add the address and register the download and the instructions.

    It is also recommended to adjust the MAC-address filtering in the rota-less mode, which will allow you to secure the connection in order to completely remove the security, be a kind of short-haired one, to change the ID of the card card in your side.


    Programming method

    In this case, the priority should be given to special programs (and not to Windows Solutions for QoS). Can you install local proxy server HandyCache is the kind of exchange in the new. It’s not enough to be able to fix the measure in such a rank, so that the computer repair will allow access through one - the main one, on which the proxy is installed. Also, you can see the program Traffic Shaper XP. Vaughn allows you to set up an exchange for swedishness. After setting up on the skin computer, you can switch to a single connection.

    Some blame the need to exchange the security of the Internet connection on home computer. It is often necessary, if a few machines are combined in local measure. In order to make the offending machines approximately the same as those of the robots in the merezh, it is necessary to change the installation of the Internet. Changes are carried out either on the router itself (I will add what I distribute), or from the stoppage of special programs.

    It is necessary to take it to respect, that changing the parameters of the router is a busy task. When an unacknowledged person is brought in, you can bring up to negligible consequences, I’ll build a job at the robot, it’s easier for him to get stuck special programs, which allow you to carry traffic at the local border.

    Otzhe, let’s figure it out, how to get around the security of the Internet on the computer, let’s forgive and accessible way.

    The most popular software products

    Similar programs are often called traffic inspectors:

    • BWMeter
    • NetBalancer
    • SoftPerfect Bandwidth Manager
    • Traffic Shaper XP
    • NetLimiter
    • Tmeter


    Moreover, the rest can be known in the measure absolutely without cost. Then, download the selected program in the least (for a fee). Unpack and install it on your computer. Let's respectfully get to know the admin panel, bring the menu to the menu.

    Algorithm dіy for the exchange of dryness

    • Victory filtering for the IP address. For whom to run one of the above programs.
    • According to your needs, enter the following items: "Configuration", "Set filters".
    • Press the "change" button, which will cause the file to be updated before re-editing.


    • Model a new custom file by clicking the "Add" button.
    • Turn around again until the settings are adjusted, check the box next to the “master filter” item.
    • Find the item “enable the exchange of speed”, select the required speed (for example, 5 Mbit) and put a “tick”.

    For the correct operation of the computer and the Internet, it is necessary to pay attention to a number of other parameters. For example, use the option "Singing description of the reduced traffic". When this parameter is reached, access to the Internet is blocked, or the speed is reduced to a minimum.


    Remember that it is best to trust the operation to be carried out by people who know computer technology. An incompetent person can cause significant damage to your computer, make it difficult to access the Internet, “miss” the adjustment, which will cause the wrong robot to attach.

    As you have already done it yourself, you should carefully read the instructions for the work and the video. If you have enough knowledge, try to get it at the internal settings of your router and then install the security clearance to access the Internet on a singing machine.

    The availability of the Internet to lie due to the fact that the operator's services are occupied. To that rich cіkavo, how to secure the security of the Internet for ensuring the most efficient distribution of resources. Tse allow to connect up to one outbuilding of a kilka of coristuvachiv, ensuring their constant necessary throughput building and, apparently, swidkistyu. You can add on swidkіst, upovіlnyuyuchi chi skoryuyuchi її. For whom it is necessary to speed up with an instrumental set, which will help to change the speed of traffic. The butt of such software productє Tmeter.

    Pochatkovі diї

    If you don't know how to secure the security of the Internet for a helper product, we can help. To change traffic savings, it is necessary to filter for IP addresses. To know all the IP addresses (for assigning the same filters), you need to enable the Tmeter security software. At the main menu of the program, it is necessary to know that you can enter such menu elements, such as "Configuration" and "Filter set". Then click on the "Change" button, which gives you the ability to edit files, then follow the creation of a new file to fix. For whom, in the patches, press on the line “Meister-filter”. After selecting the menu "Sweetness exchange" and insert the necessary value there.

    Optional exchange of dryness

    How to encircle the security of the Internet, let's enclose the introduction of its meaning? There are some options that can block traffic. For example, use the option “Rozmіr spozhivannogo trafіku”, so if only a small amount of traffic is reached, access to the Internet is automatically blocked. However, this option may have a minus. Merezhevy control is guilty of perevіryati kom'yuteri in merezhі and all diї, yakі in them vykonuyutsya. Cream of that, at that moment, if head computer not pratsyuvati or vin vymkneniy, nalashtuvannya fencing control will be destroyed. For this reason, the programs can be installed on the Internet on the computer for the help of setting up a router, and then you can connect and special programs.

    Exchange of security for the help of a router

    How to secure the security of the Internet for all outbuildings, how to work through routers? The butt will be the router of the company TP-Link. Give an extension for the exchange of security and vikoristovuyut IP-addresses. Tsim is engaged in the DHCP service. In order to revise, it won’t work, you need to enter the address: 192.168.0.1 or 192.168.1.1 in the address bar of the browser, as the address for testing the day, then we will show up with a login and password to get into the setup. Login and password: admin. At the settings, go to the DHCP tab. If there is a "Uvіmkneno" standing there, then the service is uvimkneno. In the settings of this type of routers, there is a menu, which means that you need to set up the Bandwidth Control security. You need to go to the new one at the Line Type branch, select the type of connection. For the Egress Bandwidth field, enter the largest bandwidth (better to enter the one given by the provider). At the offensive field Ingress Bandwidth - the maximum entrance speed. In order to secure the Internet access on the computer, the Protocol menu selects the security for a specific protocol.