Connect with us


Soft Router — Soft Routering



Soft Router

Soft router refers to the use of desktop or server with software to form a routing solution, mainly relying on software settings to achieve the function of the router;

while hard routing is a unique hardware device, including processor, power supply, embedded software, providing Router function set.

According to the different operations used, it can be divided into software routers based on windows platform and Linux/bsd platform.

The more common software firewalls based on Windows platform are ISA Server, Winroute Firewall, Xiaocao Internet behavior management soft router, etc.

Some of these software are commercialized, and usually charge differently according to the number of authorized users.

The cost of purchasing a genuine software firewall is undoubtedly a big expense for many small and medium-sized enterprises, and software firewalls based on Unix/Linux platforms Software firewalls are constantly being introduced.

Most of these software firewalls are free. Common ones include:

  • ClearOS,
  • pfSense,
  • RouterOS,
  • OpenWRT
  • m0n0Wall,
  • SmoothWall,
  • Ipcop,
  • CoyoteLinux, etc.

The common feature of these systems is that they generally have low hardware requirements, and even only need a computer, a hard disk, and two network cards to install a very professional software firewall.

This is for many people who have eliminated low-end computers. That means to take an obsolete computer, install a set of free firewall software, and DIY a professional firewall.

Such a system itself also includes NAT functionality and enables broadband sharing.

In other words, this free firewall is actually an excellent broadband router, which is very exciting.

But such free soft routing is usually for survival or to cause dissatisfied users due to excessive advertising.

Features of soft Routering

1. Powerful firewall function:

Support two to seven layers of firewall rules, real-time monitoring of abnormal network behavior, timely detection and timely prohibition.

2. Effective bandwidth management:

Optimize the network, allocate network bandwidth reasonably, effectively prevent network congestion, and ensure smooth network transmission as much as possible.

3. Email security:

Email backup, email antivirus, and spam filtering ensure the safety of external contacts.

4. Effectively resist various cyber threats:

Effectively manage the online behaviors of Internet users, formulate corresponding access strategies, reduce the security risks faced by the network, and ensure the security of the network.

5. Multiple access methods:

Multiple access methods such as routing, gateway, and parallel connection reduce the impact on the network.

Without changing the network environment, it is convenient to realize the management of the original network.

6. Avoid legal risks:

Effectively shield illegal websites and block the illegal surfing behaviour of Internet users.

7. Friendly management interface:

The easy-to-use WEB way of management can realize management and control without installing any client software.

8. Improve work efficiency:

Control some people’s online chat, games and other behaviors to improve work efficiency.

9. Reduce network management costs:

Existing hardware can be used. It also supports functions such as gateways, firewalls, routers, IDS, content monitoring, etc., which can fully meet the general network security and management needs without purchasing other network security equipment.

Effectively solve the contradiction of small and medium-sized network users on the one hand for network security and network management, on the other hand, they cannot invest too much in purchasing expensive various professional equipment. Using RedCat NSS is free.

Function of soft routing

1. Operating platform: WindowsXP, Windows2003, Windows Vista, Windows2008, Windows7.

2. Designed for high-end applications, supporting the need to go online from dozens of machines to thousands of machines at the same time.

3. Support bandwidth consolidation and load balancing of up to 127 external network outlet lines. Support single network card to realize multi-outlet NAT, which can realize bandwidth superposition.

4. The world’s first object-oriented full 3D operation interface (any ordinary graphics card can be used), intuitively display the Internet status of all machines.

5. Anti-ARP attack, flood DDOS attack, etc. No client installation is required.

6. Intelligent bandwidth allocation, which can dynamically allocate bandwidth according to the number of Internet machines and bandwidth conditions. 2MADSL can support 15-20 machines to surf the Internet at the same time.

Advantages and disadvantages of soft routing


1. Good price controllability:

The soft router usually uses an ordinary computer to act as, the computer can be from a very old PC to an advanced PC/serial server, and the configuration cost is controlled according to user needs.

If you configure an ordinary linux router, it can be achieved by using a second-hand computer with poor performance.

To achieve a large amount of equipment and more functions, you can also add better hardware equipment according to user needs.

2. Multi-purpose:

The second advantage of using soft routing is that the purchased machine will not be wasted, because the soft routing itself is a computer, even if it is not needed to configure the soft routing in the future, it can also be used for other purposes.

And because the hardware router is a dedicated device, it can be said to be dedicated for a special fee.

3. Flexible function selection:

Different software routers can provide different functions, such as PPP/PPPOE dial-up Internet access and management software, NAT network address forwarding function, IPFW interconnection protocol firewall management program, DHCP dynamic IP configuration protocol program and management software, DNS, VPN virtual private Common functions such as network, HTTP and FTP services, web authentication, traffic restriction, and restriction of illegal broadband users to surf the Internet can all be implemented on the soft router, which is very flexible and convenient.

For hard routers, each device has a specific function.

Although different products provide different functions, as long as one of them is selected, the selected router function is basically fixed.

You cannot add or delete arbitrarily. You can only choose to open or restrict the use of a certain part of the function.

Of course, the current hardware router manufacturers generally completely concentrate the functions in a router product, and customers can use it according to their own needs.


1. Complex configuration:

A good soft router, such as RouterOS, is developed by a foreign organization and used as a router system.

The software itself is relatively good, but because it is developed abroad, its software is based on the English interface and the configuration is quite complicated.

RouterOS There are so many configuration parameters, the complexity and the full English configuration interface is far from an ordinary user.

Professional technicians also need to refer to the configuration manual when configuring the soft router.

Even with the help of the manual, they cannot fully control it, and can only try and explore continuously by themselves.

2. Too much power consumption:

PC is a power-hungry thing, and mainstream PCs are about 250-400W per hour.

The monthly power consumption of a computer: if it is 300W per hour × 24 hours a day × 30 days a month = 216KW, that is, 216 kWh, then a year is 2592 kWh.

If there is a monitor, plus the monitor (80-100W/h), then the money spent on electricity bills every year is considerable.

3. The hardware is not stable enough:

As we all know, the PC architecture is designed for personal use. In all respects, it is not suitable for the role of a server in harsh environments.

A PC and various accessories are produced by different manufacturers, although they are based on certain Standardized production, but its compatibility is not necessarily guaranteed.

Even if it is experienced personnel equipped with a relatively perfect PC, how about its performance?

The owner of an Internet cafe, as a person who uses computers every day, should know the most in his heart. Basically, PCs are not able to adapt to the ability to work 24 hours a day, 365 days a year, otherwise, what are the servers doing?

The user directly buys a high-end PC to be the server, isn’t it more cost-effective? Not to mention that many soft routers use old hosts, and their performance is problematic.

4. Software update is not timely:

Since the excellent soft routing vendors are basically foreign, and the domestic network environment changes, they cannot perceive it in time.

It is often that a problem has occurred for a long time before there are corresponding update measures, such as viruses, attacks, etc. , And many customers are even using free versions or pirated versions, and they cannot get timely support from manufacturers.

This is determined by the soft routing system.




Spongegirl Case: solving the viral sensation’s mystery




Spongegirl Case

Introduction to the Spongegirl Case

Welcome to the intriguing world of the Spongegirl Case! A viral sensation that has captured the attention of millions, this mystery surrounding Spongegirl’s identity has left internet sleuths scratching their heads. Join us as we dive deep into the origins of Spongegirl, unraveling clues, exploring possible suspects and motives, and ultimately aiming to solve this captivating enigma. Get ready for a thrilling ride as we embark on a quest to uncover the truth behind one of the most talked-about mysteries in cyberspace!

The Origins of Spongegirl

In the vast ocean of the internet, a quirky character known as Spongegirl emerged, captivating audiences worldwide with her whimsical charm. The origins of Spongegirl trace back to a talented artist who first brought her to life through colorful illustrations and witty captions.

Her endearing personality quickly resonated with online users, leading to a viral sensation that spread like wildfire across social media platforms. Fans were drawn to Spongegirl’s relatable humor and infectious positivity, making her an instant hit among both young and old alike.

As Spongegirl’s popularity soared, speculation surrounding her true identity began to swirl. Was she based on a real person or purely a figment of imagination? The mystery only added to her allure, sparking curiosity and intrigue among eager followers.

Despite the enigma shrouding Spongegirl’s creation, one thing remained clear – she had become an internet phenomenon unlike any other. Her legacy continues to thrive in the digital realm, spreading joy and laughter wherever she goes.

The Viral Sensation

The Spongegirl phenomenon took the internet by storm, captivating audiences worldwide with her quirky videos and infectious energy. Her unique blend of humor and relatability resonated with viewers of all ages, sparking a viral sensation unlike anything seen before.

From her humble beginnings as a small-town girl with big dreams to her sudden rise to fame on social media platforms, Spongegirl’s journey was nothing short of extraordinary. Fans couldn’t get enough of her witty one-liners and spontaneous dance routines that seemed to transcend language barriers.

As Spongegirl’s popularity grew, so did the mystery surrounding her true identity. Speculations ran rampant online, with fans eagerly piecing together clues in hopes of uncovering the person behind the iconic character. Was she an aspiring comedian hiding in plain sight? A marketing genius orchestrating a carefully crafted persona? The possibilities were endless.

Despite numerous theories circulating on forums and social media threads, the enigma of Spongegirl remained unsolved. As eager sleuths continued their quest for answers, one thing was certain – the impact of this viral sensation would forever leave its mark on pop culture history.

The Mystery Surrounding Spongegirl’s Identity

The enigma surrounding Spongegirl’s identity has captivated the internet, sparking endless debates and theories. Who is she? Where did she come from? These questions linger in the minds of her fans and followers, adding to the allure of this viral sensation.

Some believe Spongegirl is a regular person catapulted into fame by chance, while others speculate that she might be a well-known figure incognito. The mystery deepens as more clues surface, leading to further confusion and intrigue among online sleuths.

Her distinctive voice and mannerisms have been scrutinized for any hints or giveaways about her true persona. Yet, despite all efforts to unmask her, Spongegirl remains an enigma shrouded in secrecy.

As the speculation continues to swirl around her identity, one thing remains certain – Spongegirl’s mystique only adds to her appeal and ensures that the fascination with solving this mystery will endure for some time to come.

YOU MAY LIKE: Why MP3 Juice Download is the Perfect Tool for Music Lovers

Clues and Speculations

The Spongegirl Case has generated a whirlwind of speculation and theories surrounding the identity of the mysterious viral sensation. Online sleuths have been combing through every clue, analyzing every detail for any hint that could lead to uncovering who is behind the iconic character.

Some believe that Spongegirl’s origins lie in an underground art collective, while others suspect a well-known artist might be pulling the strings behind the scenes. The distinctive style and quirky humor fuel further speculations about possible motives and inspirations behind Spongegirl’s creation.

Cryptic messages hidden in videos, obscure references scattered throughout social media posts – each clue adds another layer to this enigmatic puzzle. As armchair detectives dissect every frame and pixel, new theories emerge, expanding the web of intrigue around Spongegirl.

Who holds the key to unlocking this mystery? Only time will tell as we continue our quest for answers in this captivating investigation.

Possible Suspects and Motives

As the investigation into the Spongegirl Case deepens, various suspects have emerged with potential motives for creating the viral sensation. One possible suspect could be a disgruntled former employee of a popular animation studio seeking revenge for being let go. Their motive may stem from a desire to expose alleged mistreatment within the industry through an unconventional medium.

Another theory suggests that an underground artist looking to make a statement about society’s obsession with social media fame might be behind Spongegirl’s creation. This individual’s motive could revolve around critiquing the superficiality of online personas and their impact on real-life interactions.

Alternatively, some speculate that Spongegirl could be part of a guerrilla marketing campaign orchestrated by a savvy brand or company aiming to generate buzz and intrigue among internet users. The motive in this scenario would be purely commercial, leveraging shock value to capture attention and drive engagement.

The range of possible suspects and motives in this case is vast, leaving investigators with a challenging task ahead as they piece together clues and unravel the mystery surrounding Spongegirl’s origins.

Solving the Case: Uncovering the Truth

The time had come to peel back the layers of mystery shrouding Spongegirl. With a team of dedicated investigators combing through digital footprints and eyewitness accounts, every lead was followed meticulously. The truth seemed like a distant mirage, but they pressed on, fueled by determination.

Piecing together fragmented clues brought them closer to unveiling the enigmatic persona behind Spongegirl. The suspects list dwindled as alibis were verified and motives dissected with precision. A breakthrough moment created ripples of excitement within the investigative unit.

As pieces of the puzzle fell into place, it became evident that the truth was stranger than fiction. Uncovering the identity of Spongegirl sent shockwaves through cyberspace and left netizens in awe. The veil lifted, revealing a story that captivated minds across borders.

The exhaustive journey to solve the case shed light on hidden truths and showcased the power of collective effort in unraveling mysteries that defy logic.

READ MORE: Your Path to Mindful Living Starts Here

Impact and Aftermath of the Investigation

The impact of the Spongegirl case investigation reverberated throughout social media, captivating audiences worldwide. As the mystery unfolded, discussions and theories flooded online platforms, sparking curiosity and intrigue among netizens. The sudden surge in interest not only boosted engagement but also shed light on the power of viral sensations in today’s digital age.

After the investigation concluded, a sense of closure swept over followers who had been eagerly following every twist and turn of the perplexing case. While some were satisfied with the outcome, others found themselves grappling with unanswered questions and lingering uncertainties surrounding Spongegirl’s true identity.

The aftermath of the investigation left a lasting impression on both supporters and Skeptics alike. It served as a reminder of our collective fascination with internet mysteries. And our insatiable appetite for uncovering the truth behind enigmatic figures that capture our imagination.


As we come to the end of this intriguing journey into the Spongegirl Case. One thing is certain – mysteries have a way of captivating our imagination and fueling our curiosity. The quest for truth can lead us down unexpected paths. Uncovering hidden secrets and shedding light on the unknown.

In every investigation, there are twists and turns that keep us on the edge of our seats, eager to unravel the enigma at hand. The thrill of discovering new clues and piecing together fragments of information is what makes delving into a mystery so exhilarating.

While we may not have all the answers in this case, one thing is clear.  It’s not always about finding closure but rather embracing the thrill of the chase. The journey itself can be just as rewarding as reaching a definitive conclusion.

So let us continue to explore new mysteries, embrace uncertainty. And revel in the excitement of unraveling secrets yet to be discovered. After all, life is full of unanswered questions waiting to be explored.


1. Who is Spongegirl?
Spongegirl is a viral sensation who gained popularity on social media platforms for her unique content and mysterious identity.

2. What are the origins of Spongegirl?
The origins of Spongegirl remain shrouded in mystery. With speculations ranging from a marketing stunt to an art project gone viral.

3. How did Spongegirl become a viral sensation?
Spongegirl’s quirky videos and enigmatic persona captured the attention of internet users, leading to widespread sharing and speculation about her true identity.

4. What clues have emerged regarding Spongegirl’s identity?
Various clues, such as location tags in her videos and similarities to known personalities, have fueled theories about who Spongegirl might be.

5. Who are the possible suspects behind Spongegirl’s persona?
Numerous individuals have been speculated to be behind the mask of Spongegirl, but none have been definitively proven as the true creator.

6. What motives could someone have for creating Spongegirl?
Possible motives include seeking fame or attention, conducting a social experiment, or simply enjoying anonymity while producing creative content.

7. How can we solve the mystery of Spongegirl’s identity?
By carefully analyzing all available clues and conducting thorough investigations into potential leads. It may be possible to uncover the truth behind Spongegirl’s persona.

8. What impact has the investigation had on those involved?
The investigation into Spongegirl has sparked curiosity among internet users and generated discussions about online anonymity and authenticity in digital culture.

9. Will we ever know who Spongegirl truly is?
While there is no guarantee that the mystery of Spongegirl will ever be solved conclusively unless she decides revealed herself publicly,

10.What lessons can we learn from the sponge girl case ?
The sponge girl case teaches us valuable lessons about online privacy. The power of viral content ,and our fascination with mysteries.



Continue Reading


Goscript: The Go language specification for Rust implementations





Goscript: The Go language specification for Rust implementations

The Anaconda developers recently released PyScript , a framework that lets developers remix Python code in HTML, which some call “JSP for Python”.

In fact, PyScript uses WebAssembly under the hood because it is built on Pyodide, which consists of a CPython 3.8 interpreter compiled to WebAssembly, allowing Python to be run in a web browser.

Coincidentally, the developers adopted the same idea to make Go also run smoothly on the browser.

The website supports running Go code directly on the browser side.

This is a Go playground. The bottom layer uses Goscript and is implemented through WASM.

Goscript is an unofficial implementation of the Go language specification, used for inlining or encapsulation of Rust projects , providing an easier way to encapsulate and call the underlying Rust code.

Like Lua is to Redis/WoW, or Python is to NumPy.

Goscript contains six projects:

  • parser:  Turn the source code into an AST, ported from the official Go code.
  • type checker: Based on AST for type deduction and type checking, it is also ported from Go official code.
  • codegen: Generate bytecode based on AST and type information.
  • vm: Run the bytecode.
  • std: Official library, ported from Go official library.
  • engine: Contains the native part of the official library, plus simple packaging.

Goscript implements almost all features of Go (pre 1.18, so generics are not included), and some official libraries have been ported. Check out the relevant test cases that have passed /tests .

Goscript project code:


Continue Reading


2022 Best Free VoIP SIP Softphone (PBX extension) on Android phone




free sip account

2022 Best Free VoIP SIP Softphone (PBX extension) on Android phone.

free sip account: There are many free SIP softphone in the past, but a few still keeps free in the Google play after one decade.

We have tested below free version of VoIP softphones ( Trust us! Don’t waste time to test others), which could be installed from Google Play on your Android phone.

  • Grandstream Wave Lite ( GS Wave in the past)
  • Zoiper
  • Linphone

Grandstream wave lite

  • Free
  • Free G729, G722 and Opus codec
  • Multi-account
  • Support SIP message
  • Support both Android or iPhone
  • Support “Internal intercom” with hand-free
  • Support the paging (force to turn on the speaker of Android phone when paging)
  • No Push Notification
  • Zoiper:
  • Free version with only one SIP account
  • Paid G729, G722 and Opus codec
  • Support SIP message
  • Paid Push Notification
  • Support both Android and iPhone


  • Free
  • Multi-account
  • Free G729, G722 and Opus codec
  • Support SIP message
  • Support Android only
  • Push Notification not working

Softphone recommended: Grandstream Wave lite

Grandstream is the famous company providing many VoIP products.

It’s surprised they can provide this free softphone with powerful functions , which usually need to pay or upgrade paid version in other softphone.

As Grandstream Wave lite in Android phone can always run the background, it could make your Android phone as a replacement of regular Desktop IP phone in office.

In contrast, Grandstream Wave lite in iPhone is always killed by OS when iPhone begins to sleep. Meanwhile, auto-answer or intercom/paging only works when iPhone wakes.

Highlights of Grandstream Wave lite:

  • Totally Free: No in-app purchase.
  • Free G729, G722 and Opus codec: very useful when cellphone singal is so good
  • Support SIP message:  This function is almost same as cellphone text message, but you may not receive text message from some banks or government institutes, like verification via text message.
  • Support Video call and meeting
  • Support “Internal intercom” with hand-free:  need to turn on this function on PBX (FreePBX)

2022 Best Free VoIP SIP Softphone (PBX extension) on Android phone


  • Support the paging (force to turn on the speaker of Android phone when paging)
    • Setting  ➡  Account setting  ➡  Edit Account  ➡  Auto Answer
    • Auto Answer: Change “No” to “Enable Intercom/Paging
    • Bluetooth speaker: You can connect android phone with a Bluetooth speaker for louder sounds when paging, but this Bluetooth speaker need to support phone voice.You can used old Android and Raspberry Pi to build home intercom/paging system


A Free Intercom/Paging system with Raspberry pi and old Android phones

Tips about SIP Softphone on Android Phone:

Low bandwidth codec:

As Smart phone use Wireless network connection either WiFi or 4G/5G, but might not be stable enough in places with poor signal. G729, G722 or Opus codec is recommended!

However, G729 is old technology, which may increase CPU’s load. The voice is actually lossy due to compressed too much.

Opus becomes popular recently years because it’s with ultra-low bandwidth, low CPU load and high-quality voice, so set Opus as the 1st priority if possible.

Text message

Many softphones support SIP message, which could be as alternative of  cell phone’s text message, but some institutions like banks or government don’t send a versification text message to a VoIP phone number.

Push Notification

Either iPhone or Android will kill the app in the background  to reduce energy consumption.  If the softphone was killed after display turned off some time, you couldn’t receive an incoming call.

Fortunately, software could be woken up via push notification, which replays on Apple or Google notification server and will increase developer’s costs. This is why free softphone usually doesn’t come with push notification.

Moreover,  phone consumes less power if using push notification.

However, Softphone on Android phone could be run in the background always, just consumes a little more power, so Push Notification is not a must on Android phone. 

Energy Consumption

UDP or TCP protocol

SIP softphone usually uses either UDP or TCP protocol to connect PBX server. TCP consumes less energy.

UDP is default in most softphones, so you need to change UDP to TCP in setting if your PBX server supports TCP protocol.

Keep softphone running in background?

At present, only Android phone allows software or other apps working in background always.

iPhone seems to allow it in a little more time, but still kill softphone in background after display is turn off  long time.


2022 Best Free VoIP SIP Softphone (PBX extension) on Android phone

This article is not sponsored by anyone. Just share our experience with interested one.

Continue Reading

Trending News

Copyright © 2023-24. Cos Fone. Developed By Imran Javed Awan.