How to Use a Laptop as a Wireless Hub for Internet Sharing

by Matthew Burley
Image courtesy of Microsoft.

Wired and wireless networks both allow users to share resources among all of their network devices. Unfortunately, a wired network is only accessible to devices with the proper hardware, making it impossible for wireless-only devices to connect to the network. Laptop computers present a solution to this dilemma, as they possess both wired and wireless network capabilities. The laptop user can create their own wireless network, which wireless devices can then connect to on their own.

Step 1

Click "Start" in the lower-left corner of the screen, then click the "Control Panel" option in the right column of the Start Menu.

Step 2

Select the "Network and Internet" option in the center of the window.

Step 3

Click the "Network and Sharing Center" option at the top of the window.

Step 4

Select the "Set up a new connection or network" option in the center of the window.

Step 5

Scroll to the bottom of the window and select "Set up a wireless ad hoc (computer to computer) network," then click "Next" twice.

Step 6

Type a name for your wireless network.

Step 7

Click the drop-down menu next to "Security type" and choose the "WPA2-Personal" option. If you don't have a "WPA2" option, select the "WPA" option. If you don't have a "WPA" option, select the "WEP" option. These are all different modes of wireless security, but vary in the difficulty with which their keys can be "cracked."

Step 8

Create a key your wireless devices will need to enter in order to connect to the wireless network. The key should be a minimum of eight characters. Strong passwords will be more than eight characters and include both letters and numbers.

Step 9

Check the box next to "Save this network", then click "Next."

Click "Turn on Internet connection sharing" at the bottom of the window, then click "Close."


  • Setting up security measures, such as a security key, is very important when using your laptop as a wireless hub, particularly in a public location. Users with malicious intent could easily access an unsecured wireless network and view your files and personal information.

About the Author

Matthew Burley has been a writer of online content since 2005. You can view many of his articles on Burley holds a Bachelor of Science in political science from Arizona State and a Master of Science in computer information systems from the University of Phoenix.

More Articles