How to detect when your wifi network is stolen

TipsMake.com - It will be difficult for you to imagine, but just back 20 years ago, you can easily see that the Internet is only in people's dreams. It only serves high intellectuals, researchers to share information with some people through the newly developed service back then, the World Wide Web. Email is not the same as today. The first email system was found at universities and even accounts issued through ISPs such as Prodigy and America Online were often difficult to use.

Going back to 2009, we will see a lot of things have changed. To this day, you can access the Internet in just a minute. The Internet is no longer a serious problem. These changes happen very quickly and often go in a better direction. In addition, technology is getting cheaper and easier to use. Accordingly, the Internet is also entangled with these changes. The latest change in telecommunications digital communications is the emergence of WiFi wireless networks. It's easy to find in cafes, libraries and airports around the world, WiFi has made Internet use easier, like the use of mobile phones flourished within the past few decades. . However, the bad guys accidentally or intentionally found a way to gain unauthorized access to the Internet.

The following article will help you find out if someone is using a WiFi network without your permission or when you want to learn how to determine if your judgment is correct. Whenever a user steals your WiFi network, they will slow down the connection, and even they can steal information from your computer or harm your computer via a network of viruses. . Therefore, this article will equip you with instructions to counter this theft. Let's start by looking at what constitutes your WiFi network. From there, you can manage the network you are paying for more easily.

How to detect your Wi-Fi network is stolen

  1. Is it illegal to use WiFi network theft?
  2. How to see who is using your Wi-Fi
  3. How to lock your Wi-Fi
  4. More advanced security for routers

Is it illegal to use WiFi network theft?

How to detect when your wifi network is stolen Picture 1

The Michigan Court recently treated a man, demanding that he pay for the unauthorized use of a café's WiFi network in his car when he parked nearby. The man checked his email and accessed the Internet before being arrested and accused of using the network illegally. However, thanks to good personalities and at the same time not aware that this is illegal work, as well as the owner of the café did not know it was illegal. But, this case has laid the foundation for those who use unauthorized networks in Michigan to be convicted as illegal.

Before you can find out if someone is using your wireless connection, it is very important to know some basic things about computer networks. Let's find out some parts of the wireless network, this will help you determine when your home WiFi network has problems.

A wireless network includes a broadband connection from DSL, cable or satellite modem. You can attach a modem to a wireless router, a device that provides signals and creates a network.

It is a LAN (local computer network). LAN is where you install your computer's peripherals such as a monitor, laptop computer or printer. Your router needs to have a dynamic host client protocol (DHCP). In essence, the DHCP Protocol is designed to reduce configuration time for TCP / IP networks by automatically assigning IP addresses to customers each time they enter the network.

Each device has its own MAC address (Media Access Control - the real address of a network device, also known as physical address). This address is assigned by the manufacturer, but can be changed by the user if they know how to edit. Your router will use these addresses to assign to each computer on your network a network protocol or IP address. The MAC address or IP address is really handy when you look for ways to detect if someone is using your WiFi network illegally.

If you feel confused by some computer terminology in the post, don't worry. The most important thing is that you know how to check your WiFi connection.

How to see who is using your Wi-Fi

How to detect when your wifi network is stolen Picture 2

It's easy to click a person out of your Wi-Fi network, but it's hard to detect 'intruders'. You won't even notice your Wi-Fi network has unauthorized users, so often skip the Wi-Fi off before going to sleep.

Those who deliberately infiltrate your network will of course bring a lot of trouble. Excessive network abuse can slow down the overall traffic of the network and even create the opportunity for malicious software to display sensitive files on the computer or the appearance of websites. Child porn or terrorism. And that could be the reason why you are being touched by the police.

Follow the security rules well and regularly monitor the access logs of your router to minimize the risk of your network being illegally compromised. To see who is using your Wi-Fi, follow these steps:

1. Log in to the router.

2. Find DHCP settings , the "attached devices" area or the part with the same name.

3. Take a look at the list of connected devices and isolate your non-owned devices.

The instructions above seem a bit vague. The reason is that each router of different vendors will have different steps. On most routers, you will find a connected device table that displays all devices that DHCP 'hires' an IP address, meaning that the list shows devices currently using the specified IP address. by your router.

All devices on that list are connected to your network (via cable or via Wi-Fi). You may not know if a specific connection is via Wi-Fi, but you will be able to use this information to see which device is accessing your Wi-Fi.

For example, suppose you have a phone, Chromecast, laptop, PlayStation and printer connected to Wi-Fi. A total of 5 devices. But the list you see in the router shows up to 7 devices. The best thing to do at this point is to turn off Wi-Fi on all your gadgets, unplug or turn them off to see which utilities are still in the list.

Everything you see in the list after turning off your network device is devices that are accessing your Wi-Fi network illegally.

Some routers will display the name of the connected device to use, so the list may include names like "Chromecast living room", "Android of Jack" and "Mary's iPod". If you don't know who Jack is, chances are he's a neighbor stealing your Wi-Fi.

For some ways to check who is using your other Wi-Fi, please refer to the article: How to check who is using Wifi Temple, your home WiFi theft.

How to lock your Wi-Fi

Block someone from your Wi-Fi network quite easily. You can do this by changing the Wi-Fi password to something safer, then encrypting network traffic with WPA or WPA2 encryption.

  1. Upgrade Wi-Fi security from WEP to WPA2

The moment the router requests a new password that the connected devices do not know, all unsatisfactory devices will be disconnected from the network and no longer able to use your Internet connection.

To protect your Wi-Fi network from illegal intruders, avoid using weak passwords and changing network names (often abbreviated as SSID), then turn off the SSID broadcast feature. All of these steps help make the entire network seem offline for most external users.

To learn more about how to secure your Wi-Fi network, please refer to the article: How to secure your home wireless network.

More advanced security for routers

How to detect when your wifi network is stolen Picture 3

There is no way to make a home network completely 'immune' to a professional hacker, possessing superior tools and skills. But if you take appropriate security measures, less experienced hackers will have to give up, reducing the risk of your network being compromised.

Although it is not directly related to the router setup, you should turn off the File and Printer Sharing feature in Windows. If a hacker has access to your network and all of your files, as well as your device, are easily detected from within your home network, the risk of your data being compromised will increase significantly. The "deep protection" method means that you use different levels of security access instead of just relying on a single measure.

Start by performing MAC address filtering on your router so that only the MAC addresses you specify (those that belong to your device) are allowed to connect. This approach is not entirely useful because it is very easy to fake MAC addresses, but at least it adds an additional protection step and will probably prevent some "fuzzy" hackers.

Similarly, limit the DHCP address to the exact number of devices you frequently use, to prevent any new device from being allowed to obtain an IP address even if they have broken the Wi-password. Your Fi.

Most important : Turn off Wi-Fi Protected Setup (WPS) setting. WPS allows direct pairing of devices with your router. However, the problem is that WPS is famous for being unsafe. Routers that support WPS are often attacked in just a few minutes, by following online instructions based on free software available easily.

Strong passwords, network encryption, WPS and SSID broadcasting are disabled as basic security steps for the router. So, if all these measures are applied, your router will be able to resist most unauthorized 'visits' from bad neighborhood neighbors.

If you live in a rural area, these basic precautions are considered sufficient. Because to hack into your Wi-Fi network, hackers must be within the Wi-Fi range of an average of 300 feet (more than 90 meters) compared to the router. If your home is 500 feet (150 meters) away and the nearest neighbor is a quarter of a mile away, your Wi-Fi capability is hacked very low.

But if you live in a crowded urban area, or the distance from your home to a neighbor is too close (for example, in a dormitory), the risk will increase significantly. Advanced technologies to perform brute-force attacks on home Wi-Fi routers have long been available as open source, downloadable free tools. Software like Reaver will easily pass strong defensive classes without too much trouble, so you must periodically check the router's DCHP allocation tables to verify inappropriate access.

Set the periodic check of the router control panel to your to-do list. Look for unauthorized devices. If you use strong security measures but continue to be attacked regularly, contact your Internet service provider for assistance. Successful invasion is a sign of a problem with your ISP.

See more:

  1. When detecting someone using Wifi temple, do the following to prevent
  2. How to block nearby Wi-Fi networks from appearing on Windows
  3. Instructions for use and security of Wifi network
5 ★ | 1 Vote

May be interested

  • How to hack your own WiFi networkHow to hack your own WiFi network
    one way to increase your understanding of wifi security is to try to hack the network. but you absolutely should not intrude on the company or neighbor's network.
  • Secure WiFi in enterprise environment from basic stepsSecure WiFi in enterprise environment from basic steps
    wifi is an entry-point (an entry point) that hackers can use to infiltrate your network without stepping into your company's headquarters, because wireless networks are more vulnerable to eavesdropping than wired networks. this makes network administrators more diligent in the security of wifi networks.
  • How to hide WiFi network in Windows 10How to hide WiFi network in Windows 10
    wifi is quite popular today. wherever you are, there are many overlapping wifi networks. windows allows you to hide any wifi network you don't want to see in the network menu. here is how you can do it in windows 10.
  • How to see whether the Wi-Fi network is strong or weak on AndroidHow to see whether the Wi-Fi network is strong or weak on Android
    check for strong or weak wi-fi waves is a simple way to help you know how fast their internet access is, thereby choosing a stable network connection, avoiding lag when surfing facebook, reading newspapers , watch movies, ... this is especially useful in case you use public wi-fi, there are too many wi-fi hotspots around.
  • This is why you should plug in the network cable when playing games instead of using wifiThis is why you should plug in the network cable when playing games instead of using wifi
    although wifi technology has made great progress, it is still inferior to the stability network.
  • 7 things affect the speed of WiFi network7 things affect the speed of WiFi network
    wifi network slow? a study by epitiro, a uk-based research firm, found that customers lost an average of 30% of the data rate their broadband connection provided when they used a home wifi connection.
  • Wi-Fi security is better than hiding the SSIDWi-Fi security is better than hiding the SSID
    hiding the ssid will make your wi-fi network safer with the risk of unauthorized intrusion. this article will show you how to hide wifi networks, discuss security issues when hiding this network.
  • Free access to WiFi across the countryFree access to WiFi across the country
    currently there are many locations across the country that have free wifi coverage. users can fully access these locations, login to wifi via the provided password.
  • How to add or delete a Wifi network on Mac OS XHow to add or delete a Wifi network on Mac OS X
    if you want to add or delete a wifi network for any reason. for other operating systems, adding or deleting a wifi network is too simple. what about mac os x? together refer to the article below.
  • How to set up WiFi network to play LAN gamesHow to set up WiFi network to play LAN games
    are you stuck in the house but want to play video games with friends? if everyone lives near each other, such as in the same building, you can do this using wifi.