...Radiating the light for others to see.

Lifestyle

How to see and block Wi-Fi thieves


MASKED MAN
When the Wi-Fi connection on your Android device is running slow, it could be that someone is using it without your permission.  Here’s how to find out exactly who you’re sharing your Wi-Fi network with, and how to block intruders off it forever.

 Make sure you’re connected to the Wi-Fi network you wish to monitor. Next, download the Fing network tools from Google Play Store.

Once you’ve downloaded the app, open it, and you will see the name of your network on the home screen, along with the Refresh and Settings buttons. To see all the devices connected to your Wi-Fi network, tap Refresh.

This process could take a few minutes, but afterwards you will see a list of devices, along with an indicator that tells you if it’s a smartphone or PC.


Tap any device on your network to bring up a list of options for interacting with that device. These include sending pings or Wake on LAN signals, and you can even log when those devices connect and disconnect from the network.

How to block trespassing devices

If one of the devices connected to your network is unfamiliar or suspicious, you can block it forever. Fing shows you the Media Access Control address of each device connected to your network (the number will follow this format and be made up of numbers and letters: ‘xx:xx:xx:xx:xx:xx’). Make a note of this number.

On the computer that is connected to your router, enter your router Internet Protocol into the browser, then enter your router login details on the next page.

Once logged into your router, find the Security options (its location varies between routers and may be located under Advanced Settings)

In Security, click MAC Filtering, then Add Device

Enter the MAC address of the device you want to ban in the MAC field, give it a name if there is such an option, then click Apply, Save or OK
While you’re logged into your router, it might also be worth changing your Wi-Fi password, since it is possible your last one may have been compromised.

Photo: computer-networking.wonderhowto.com

About Unknown

0 comments:

Post a Comment

Powered by Blogger.