Computers should be manufactured or physically built with multiple wireless adapters, and have an OS that supports multiple wireless adapters, such as for the use of multiple Internet gateways through multiple wireless networks, or for connecting local wireless devices to another wireless network – which would be a Personal Area Network (PAN) with Wi-Fi, and additionally have Wi-Fi adapters that can also function as PANs at the same time. Having multiple wireless networks would also be useful to setup bridges between different devices, including with Virtual Local Area Networks (VLANs), which would allow secure tunneling of data between servers and laptops, for an instance, through a dedicated wireless bridge, that would not be available through other wireless networks in the same building or in the same wireless service area. Additionally, multiple wireless adapters would allow for any number of wireless adapters to be used to access the Internet, such as through multiple Internet Service Providers (ISPs), such as AT&T or Verizon through Wi-Fi services available on 5G towers, however also to have any number of wireless adapters available to use for Intranet purposes, even different hardware for different Intranets, such as for buildings that have multiple internal networks on different Intranets, that are not accessible through each other.
Having different levels of security on different wireless adapters in Microsoft Windows is critical to ensure that the Windows Firewall, and a Global Cyber Security Suite of software ensures that different network adapters cannot talk to each other, if configured with this security, by default, even. Additionally, having a Global Cyber Security Suite to secure the operating system and all hardware, as well, ensures that Internet and Intranet traffic is controlled to the point that it is not damaging to internal projects on laptops or desktops or mobile devices, while still allowing services to be offered from servers that utilize multiple wireless or wired network adapters, by allowing only specific services to be accessed over certain physical hardware, not just IP addresses, themselves. Multiple adapters may have similar subnets in use, for an example, so configuring services just for a specific IP address or IP subnet range through a network firewall appliance software suite on the computer system may not be enough to secure the system from network intrusions, if there are, for an example, multiple networks that use the 192.168.0.0 or 10.0.0.0 subnet ranges.
There should also be additional hardware card slots on laptops, to ensure that additional multi-function cards can be inserted, such as by saving specific configurations with specific network hardware, to be able to just plug into multiple wireless networks at a specific location, and then disconnecting completely from the hardware interfaces and software settings, and then having the option to use a different hardware card at a different location. Additionally, hardware cards, and even embedded hardware, should have the option to use a configuration system that embeds its self in a tiny storage device, similar to a SIM card, that can just be changed out for Wi-Fi network settings, especially for secured Wi-Fi networks that use complicated and sophisticated technologies, or require the use of a small USB-C device plugged into the hardware card or networked device to configure the network settings for a specific network site. This could allow the same hardware, or even the same removable hardware wireless network card, to be reused in multiple locations, however the physical configurations could be significantly modified based on the hardware settings based on the physical location, with a login script that works based off an encrypted network login device, such as a USB-C device, that configures the network settings, automatically, even based on any type of network hardware that is in the physical computer system that the USB-C device is plugged into. Additionally, there could be a biometric level of security added to network login scripts, in the hardware, such as a retina scan, or a neural scan, or a fingerprint scan, or a DNA scan, or a password prompt, or the requirement of a specific computer system for the USB-C device to work, or a RFID card or magnetic card swipe.