How to access the secondary router?

How to access the secondary router? In order to strengthen the wireless network signal, a secondary router is installed. How to access the secondary router? Now let’s take a look at the access method of router secondary router.

How to access the secondary router?

  1. Open the router interface and enter the user password to login to the router.
  2. Select advanced settings in the router interface.
  3. Next, select the LAN port setting option in the intranet settings.
  4.  Set the IP address of LAN port to, as shown in the following figure.
  5. Right-click the network icon on the desktop and select the properties window.
  6.  In the network and shared center window, choose the option of changing adapter settings.
  7. After opening the local connection properties window, select the TCP/IPv4 option.
  8.  In the TCP/IPv4 property window, select the following IP address and enter the IP address, subnet mask and gateway as shown in the following figure.
  9.  Enter the web address in the browser, and you can access the secondary routing.

Above is the access method of secondary routing. I hope you like it.

How to add and delete router port mapping?

How do router port maps be added and deleted? How do routers add port maps when they want to add them? Let’s take a look at how to add and delete port maps for routers. For those who need it, please refer to the following

In order to set up port mapping, routers must fix IP address before port mapping. DDNS is optional or not. Finally, it is selected. In order to map successfully, port mapping is used to set up micro-servers for ordinary broadband users, so that users can enter DDNS-bound domain names or real IP to access the intranet. Let’s take a look at the detailed setup process.

Step by step to solve the problem

  1. Double-click the desktop browser shortcut to open the browser.
  2. Enter the router management address and return.
    Tips: Address management is usually checked at the bottom label of the router!
  3. Enter the administrator password that just started to configure the routing settings, and click OK.
  4. Open the virtual server in application management and click the entry button under the virtual server.
  5. Click Add Virtual Server and fill in the information at this time. Common servers can not be checked. External ports are the ports that external users need to access, while internal ports are the ports that actually connect to the host. The two ports are best the same.
  6. Fill in the IP address of the fixed host and click Save to save the virtual server.
    Tips: If it is not fixed, please check the reference of setting static IP in the introduction. The external and internal port number is 3389, which is generally used for remote connection.
  7. To close the virtual server, delete the port mapping
    These are the router port mapping tutorials, I hope you like them.

What’s the reason for the red light on the optical fiber modem?

What’s the reason for the red light on the optical fiber modem? The red light of optical modem is always on. What’s the reason? How to solve it? Now let’s take a look at the detailed tutorial. It’s very simple. Need friends can refer to it.

Optical Fiber Modem is a modem. It is found that optical fiber modem always lights up red. How to solve this problem? Now let’s take a look at the detailed tutorial.

Step by step solve the problem

  1. The first case when the red light is turned on is that the line is broken. The open line can be buried and see where it is broken.
  2.  Call the master at once.
  3. The fibre optic cable is broken and cannot be connected by itself. Special machines are required.
  4.  If the home’s optical fiber modem has been used for a long time, the probability of the optical fiber modem’s failure is relatively high, you can ask the master to come to the door for detection.
  5. If it breaks down, buy it again in the business hall. The quality guarantee period of the optical fiber modem is one year.
  6. Construction near home may have broken the main line.
  7.  Only wait for professionals to rush repairs, and ask your neighbor’s house to determine if it’s a piece of broken network.
  8. Generally, optical fibers can’t bend, they are all in small circles.
  9. Can you bury along the line where there are bends, where there are bends, geographically straightforward.
  10. When the cleaning is loose, check the back interface. If it’s loose, it’s easy to insert it.

How to Access Secondary Routing in First-Level Router

How does the first-level router access the second-level router? How can a router Ping the devices of a primary router through a secondary router? Now let’s take a look at the detailed tutorial, which can be consulted by friends who need it.

Generally, we are two-level router Ping through one-level router, but if one-level router Ping through two-level router equipment, need to set the router, how to set it? See below for detailed illustrations and texts.

Setting up a secondary router

  1. Enter router address in browser, user name and password in login interface, login router.
  2. In the router interface, choose the option of setting up the Internet.
  3. In the Internet settings window, set the WAN port to connect to static IP, and input the parameters in the following options.
  4. Click Advanced Settings Options and select Intranet Settings Options.
  5. Select the LAN port settings, and set the LAN port IP to be different from the primary router.

Ping Secondary router

  1. At the same time, press the Win+R key on the keyboard.
  2. In the run window, enter CMD and click OK.
  3. After the Ping command, enter the IP of the device under the secondary router.
  4. After clicking the Enter key, you can ping through the devices under the secondary router.

How to Avoid and Solve DNS Hijacking

Although we often go online, not everyone knows the mechanism behind opening a web page. There are many links in Web browsing, and there are many opportunities to be hijacked, among which DNS is very easy to be manipulated.

Since entering the network era, people’s lives have become more and more colorful, but there are also many more worries. For example, the vast masses of garbage and abyss that appear from time to time in the information ocean are extremely defensible.

What I’m talking about here is that in the process of surfing the Internet, a web page with a good end suddenly becomes a full-screen advertisement; or the pages that could normally be visited suddenly can’t be opened, but software like QQ can login normally. What is the cause of this? In fact, these disturbing anomalies mean that you may be the victim of DNS hijacking and poisoning.

What exactly is DNS?

Although we often go online, not everyone knows the mechanism behind opening a web page. Click the mouse, the web page is presented in front of us, how familiar with the operation, but behind this familiar operation, there is a set of interlocking processes. From the user clicking on the mouse, knocking on the return, to the web page display, the information will first be sent through the browser, then routed, then DNS will resolve the domain name into IP, after finding the server, the server will send the content to the user, then routed and forwarded the data, and finally the browser will present the content to the user. Depending on the actual situation, there may be more barriers in this process, such as firewalls, proxy servers and so on.

In this process, whether there are betrayers in any link such as browser, routing, DNS, server, etc., it may lead to the inaccessibility of web pages. Perhaps DNS is the most tampered with. DNS is the domain name system, which plays a role in resolving domain names into IP addresses. We can access a website by connecting to the IP address of the server of the website. DNS plays a role in resolving “” into “” IP address, so that you can connect to the server of this address to visit the website.

There are too many factors that can affect DNS in the process of Internet access, such as your PC settings, router settings, operator settings and so on. Once DNS makes mistakes, it will not be able to parse the domain name into the correct IP address, and we naturally can not access the correct page. Therefore, if you find that you can’t open a web page, but the network software that connects directly to IP such as QQ can work properly, then DNS is a very doubtful reason.

What are the consequences of DNS errors?

DNS can be influenced by too many factors, so many stakeholders will do something about it. For example, DNS hijacking is a very common means of advertising. Normally, if you don’t set up a DNS server in particular, the DNS server will be provided by the operator. In principle, the DNS servers provided by operators should be used to provide you with IP jumps correctly, but the personality of many operators’DNS servers is not impressive. Often you can see what pages the operator will jump you to, such as a set of online meals, or even a situation where you enter A shopping network but are jumped to competitor B. This is called DNS hijacking.

Avoiding the loss of DNS hijacking

In fact, DNS hijacking is not a new thing, nor can it be prevented. Baidu’s black incident once again reveals the vulnerability of the global DNS system, and shows that if Internet manufacturers only have security plans for their own information systems, they will not be able to quickly respond to comprehensive and complex threats. Therefore, it is necessary for us to prepare a website monitoring tool to help ourselves monitor the website. For example: IIS7 website monitoring tool.

The advantage of IIS7 website monitoring is that it can monitor the website 24 hours a day, detect whether the website has been hijacked, hijacked after the invasion, by the wall, in which areas can not be opened, and so on. In the process of monitoring, once the website is abnormal, it will send an email notification immediately, so that we can deal with the problem in time and avoid the loss caused by DNS hijacking.

DNS Hijacking Solution

For some unknown reasons, automatic repair is unsuccessful in very few cases. It is recommended that you modify it manually. At the same time, in order to avoid being attacked again, even if the repair is successful, users can modify the login username and password of the router according to 360 or Tencent computer stewardship prompts. The modification method is illustrated with the TP-link router commonly used by users as an example (other brand routers are similar to this method).

Manually modify DNS

  1. Enter: in the address bar (try: if the page cannot be displayed).
  2. Fill in the user name and password of your router and click OK.
  3. In the “DHCP Server-DHCP” service, fill in the main DNS server for a more reliable address, the standby DNS server for, click save.

Modifying Router Password

  1. Enter: in the address bar (try: if the page cannot be displayed).
  2. Fill in the user name and password of your router. The initial user name of the router is admin, and the password is admin. If you have changed it, fill in the modified user name and password and click “OK”.
  3. After filling in correctly, it will enter the router password modification page, and the modification can be completed in the system tool – modifying the login password page (the original user name and password are the same as those in 2).

How to Turn Off Network Sharing on Windows

This article teaches you how to stop sharing files and Internet connections on Windows PC.

Disable network file sharing

  1. Press Win + S to open the Windows search bar. Using this method prevents other people on the network from accessing files on your computer.
  2. Type “control panel“. A list of results will appear. Then, click “control panel“.
  3. Click Network and Sharing Center.
  4. Click Change advanced sharing settings. It’s the third link from the top of the left column.
  5. Click the network profile that says “(current profile)” at the end.
  6. Select Turn off file and printer sharing.
  7. Click Save changes.

Disabling Internet Connection Sharing

  1. Press Win + S to open the Windows search bar. Using this method prevents other people on the network from accessing files on your computer.
  2. Type “control panel“. A list of results will appear. Then, click “control panel“.
  3. Click Network and Sharing Center.
  4. Click Change adapter settings. It is the second link on the top of the left column. This will open the list of saved network connections.
  5. Right click the current connection. Look for the name of the connection you have just seen. A pop-up menu will appear.
  6. Click Properties. You will see the connection property dialog window.
  7. Click the Sharing tab. It’s on the right of the networking.
  8. Remove the check mark from “Allow other network users to connect through this computer’s internet connection.” If the box is empty, there is no need to make any changes.
  9. Click OK. It is at the bottom of the dialog window. Now you have disabled network connection sharing, and no other person on the network can connect to Internet through this computer.

How to Secure Your Wireless Home Network

This article will show you how to set up a router to prevent unauthorized access to your wireless home network. You can do this by setting up the panel on the router. Keep in mind that the management panel of each brand’s router is different, which means that you’ll most likely need to find the changed settings.

Don’t tell people your network password

In doing so, you may not seem very friendly, but you can help them set up the wireless password. Don’t let them enter wireless passwords.

Put the router at home

In addition to making your router coverage more balanced, this will also restrict the router from exceeding the family’s scope. This means that potential network intruders will not be able to sit outside your home and still connect to the network.

Disconnect the router when you don’t use it

If you plan to leave your home for a weekend or longer, please unplug the router and modem. This is not only a security precaution, but also an active security measure that prevents any potential attacker from connecting to your Internet when you can’t stop it.

Use a boring network name

This may sound silly, but changing the smart Wi-Fi network name to a boring network name reduces its chances of being picked as a potential target. You can use the manufacturer and its number of the router (e.g., “Belkin-5030”) .

Disable the network sharing of the computer

You will often use network sharing at work, but it is best not to share your computer at home. It will make your computer a weak link in network security.

  1. Windows – Follow these instructions.
  2. Mac – Click the Apple menu Image titled Macapple1.png , click System Preferences…, click Sharing, and uncheck the “File Sharing” box.


Virtual Private Networks (VPNs) hide your network activity in the process by booting your network traffic through one or more exception servers. VPNs don’t necessarily protect your network because they hide it, but this is usually enough to prevent attacks and reduce the likelihood of future attacks.

Use the new technology router

Like any technology, routers will lose value in a few years, especially in the security sector. As network threats continue to update and develop, a new router will be better secure than a three or four-year router.

How to log in TP-Link wireless router

The management page of TP-Link router is built in internal web server, and does not require internet access. However, it needs your device to connect to the TP-Link router. This connection can be wired or wireless, so you can log on to the management page from desktop computers, phones, tablet computers, iPad and so on.

The low version of the web browser may lead to the compatibility issues of the device based Web – based interface (management page), such as inability to log in to the interface, display incomplete functions, and so on.

Wired or wireless

If you connect to the TP-Link wireless network by wireless connection. Find the wireless network from the WiFi list on the device (TP-LINK_xxxxxx, which is printed on the router label by default), and connect it to the wireless password (the default password is also printed on the router’s label).

If you choose a wired connection, you can connect to the LAN port on the back of the TP-Link router with Ethernet cable.

Log into TP-Link router

Open a web browser (such as Safari, Google Chrome, or Internet Explorer). At the top of the address bar window, enter If you can not open it, try or Different routers have different default access addresses. Please find it on the bottom label of the product.

Username and password

Enter the username and password in the login page. The default user name and password for the TP-Link device are admin. If you do not change the username and password of the router, you can enter admin. The letters of all usernames and passwords are lowercase. If you forget the username or password you are logged in, please find the reset button / hole and reset it to the factory default settings.

Do you want to know your own IP address? Please click What is my IP address?

restore webcam system

About a week ago, my friend asked me for help. He got it working and then opened settings, changed the contrast to try and make a better picture, but the screen it stuck gray. So he wants to restore his webcam to manufactory setting, and gets a better picture.

What is the make and model of the laptop?

1. Find the model of the laptop.
2. Download and install the Webcam software utility from the laptop manufacturer’s website, then try to reset the Webcam settings.
3. Your best way is to refer the user manual provided with your laptop for setup and Webcam settings instructions.
4. You may check with the laptop manufacturer for more help.

If you have the same question, I would suggest you to uninstall and reinstall the web cam from the control panel > add or remove programs.. then it would go smooth.