Friday, June 29, 2012

Top 5 tips to prevent anyone from stealing your WiFi

Top 5 tips to prevent anyone from stealing your WiFi | iYogi Top 5 body { background-image:url(http://top5.iyogi.com/wp-content/themes/swagger/images/backgrounds/bg-none.png); background-position:center top;background-repeat:no-repeat;}#page-highlight {display:none;} /*only looks good with light bg, so just don't show it*/#top-menu-shadow {background:none;} /*still want the height of the element, just don't show it*/ } .section-wrapper {border:1px solid #202020;}.section-wrapper .section {background:#464646 url(http://top5.iyogi.com/wp-content/themes/swagger/images/section-bullet-2.png) no-repeat 6px 9px;color:#EEE;}.section-wrapper a.more {background:#5E5E5E url(http://top5.iyogi.com/wp-content/themes/swagger/images/arrows-more.png) no-repeat 9px 12px;}.section-wrapper a.more:hover {background:#666 url(http://top5.iyogi.com/wp-content/themes/swagger/images/arrows-more.png) no-repeat 9px 12px;}.sidebar .widget .section-wrapper {border-top:1px solid #828282;}   About UsColumnistsGet Involved USA AMERICA CANADA USA EUROPE Finland Greece France Italy Spain UK OCEANIA AUSTRALIA MORE IYOGI SITES Windows ® 8 Support by iYogiMicrosoft ® Office 2010 Support by iYogiPrinters SupportAntivirus SupportRouter SupportBrowser SupportDell ® Support by iYogiHP Support by iYogiMicrosoft ® Support by iYogiAcer ® Support by iYogiASUS ® Support by iYogiToshiba ® Support by iYogiFujitsu ® Support by iYogiSamsung ® Support by iYogiLenovo ® Support by iYogiSony ® Support by iYogiEmail Support      

        GadgetsMobileAppsSocial MediaWorkplaceInfographicsVideosMiscellania   Random Article  
   

Smartphone apps Top 5 SEO apps for smartphones Top 5 tips to become a social media darling Top 5 tips to become a social media darling Hacker alert 5 simple tips to protect your computer from hackers Apple iOS 5 Make the most of Apple’s iOS 5 in 5 simple ways mobile marketing 5 mobile marketing questions for business owners shutterstock_79029379 5 top tips to recycling your old mobile phone the internet.jpg What happens on the Internet every minute Tweet Pin It   Top 5 tips to prevent anyone from stealing your WiFi 0 Posted June 20, 2012 by kshitiz.sharma in Gadgets Wi-Fi theft Is someone is stealing your WiFi?

Is your Wi-Fi very slow? Do you have outages of your WiFi every now and then and don’t know why? Does this happen at the same time every day? If your answer to all these questions is “yes” then maybe you have a Wi-Fi squatter. Do note however, that if you experience these problems very often, then something could be wrong with your Wi-Fi connection. So do get that checked, just to be clear.

Guard your WiFi network against squattersDo you use a WEP key?

First of all, check your WiFi connection to see if it’s secure. When you install the router you are offered the option of setting a wireless encrypted protocol (WEP) key. This means that you are setting a password-protected network which only legitimate users have access to. If you choose not to have one, it means you are operating an open network. This means anyone within range can use your Wi-Fi freely. So first of all, ensure you have a WEP key that guards access to your network.

Check your WiFi log

Two, you need to check for is whether someone is bypassing your WEP key and gaining access. Check your wireless networking log. This is a step that could change depending on the computer you own. If it shows that more devices are connected than you have allowed on your network, clearly, there is an intruder.

Tally the number of devices

Another way to check the status of your WiFi network is to check your router’s DCHP client table. This will reveal the devices connected to your network. If there are more machines connected than you have allowed, you can be sure you have WiFi thieves.

More ways to stop WiFi theftTry WPA security protocol

There are more stringent security measures to stop the more determined thieves.Using a security protocol such as WiFi protected access (WPA) is another measure.

Use manual DHCP assignment

The next DIY measure you can look at is manual DHP assignment. What this means is simply setting your DHCP assignment to manual and then entering each devices physical location manually.

Generate a MAC access list

Another step you can take, especially if you are not at ease with manual DCHP assignment is to look at generating a Media Access Control (MAC) access list. So what’s a MAC address? The Mac addresses are what your router uses to assign an Internet Protocol (IP) address or location to each of the devices on your network. MAC addresses are assigned by the manufacturer but can be changed if you know how. The MAC address list can be created through the browser interface of your router and should be easier to handle. While it is also easier for a persistent thief to bypass, it should be enough for a small home network, when used in tandem with other security measures.

Use monitoring software

The next level of protection can be undertaken by using an Internet monitoring software. Your WiFi router may have some software features that will help you monitor the network.

Turn off SSID broadcasting

Last but not least turn off your router’s SSID broadcasting. This means that you network is now invisible. Less chances of being hacked into!

Spot the car!

Of course, nothing beats the ‘sight test’. Just look out of the window and see if an unfamiliar car is parked in front of close to your home. If it is, there’s your Internet thief, leaching away your Wi-Fi connection. Sounds straight out of Hollywood? Well, this isn’t fiction but fact!

Image by Clive Darr
DHCP, DHCP client, featured, how to prevent anyone from stealing your Wi-Fi, MAC list, Media Access Control, Media Access Control list, Monitoring software, preventing Wi-Fi theft, SSID broadcasting, Stealing your Wi-Fi, WEP key, Wi-Fi log, Wi-Fi theft, Wireless Encrypted Protocol, WPA, WPA security protocol About the Author kshitiz.sharma  
Kshitij of deceptive calm and measured tread writes on many things. A versatile writer with a friendly conversational style that others try hard for but can rarely achieve, gaming and automobile technology make up his daily fix. Drag race driver, rally driver and speed junkie, every move is a love song to cars. More articles by kshitiz.sharma »
Related:   Gadgets
Hacker alert5 simple tips to protect your computer from hackers iPod accessoriesTop 5 must have car iPod accessories Top 5 travel gadgets to take with you on a tripTop 5 travel gadgets to take with you on a trip
Xbox 360Top 5 gaming consoles today In car gadgetsTop 5 car gadgets every car must have Improve Wi-Fi signal when travelling5 ways to improve Wi-Fi signal while travelling

0 Comments

Be the first to comment!
Leave a Response Cancel replyName (required)Email (required)Website
Comment

Popular Recent Comments Tags
Top 5 things the new iPad can do that the old can't Top 5 things the new iPad can do that the old can’t
wordpress logos 5 reasons why your blog should be smartphone friendly
5 social media mistakes you might be making and how you can solve them 5 social media mistakes your brand is making and their solutions
WWDC 2012 logo Apple iOS 6: 10 expectations from the WWDC
iPhone 5 Apple iPhone 5: Features, specs and schematics surface
the cloud iCloud explained in 5 simple steps
Pinterest to impress your future employer 5 ways Pinterest can impress your future employer
  shutterstock_79029379 5 top tips to recycling your old mobile phone
mobile marketing 5 mobile marketing questions for business owners
the internet.jpg What happens on the Internet every minute
samsung galaxy s3 5 must watch videos for the new Galaxy S 3 owners
Hacker alert 5 simple tips to protect your computer from hackers
Smartphone apps Top 5 SEO apps for smartphones
Wi-Fi theft Top 5 tips to prevent anyone from stealing your WiFi
  "Thanks and good blog." - outsourcing Romania "DzK5Ii Muchos Gracias for your article post.Much thanks again. Keep writing." - Cheap Social Bookmarking Service "Nice post at Top 5 things the new iPad can do that the old can't | iYogi Top 5. I was checking constantly t..." - dududukkkkkkk "This is the precise Top 5 things the new iPad can do that the old can't | iYogi Top 5 journal for anyone wh..." - fkawau "I hear that apple s going to go against ford in a car competition." - Betsy Jackman "Top 5 things the new iPad can do that the old can't | iYogi Top 5 I was suggested this web site by my cousi..." - dududukkkkkkk "This is a good posting, I was wondering if I could use this write-up on my website, I will link it back to ..." - dr dre beats   androidappAppleApple iOSApple iPadApple iPhoneApple iPhone 4SAppsEditor's PickfeaturedGoogleinfographiciOSiPadiPhonePCsmartphonesocial mediaspotlightTechnology Subscribe Via Email 

Catch the latest Top5s from the universe of Technology


InfographicsSocial MediaVideos Miscellania
the internet.jpg What happens on the Internet every minute
Lies about media The Big Six decide what you should watch, see or hear
Top 5 lessons to become a smarter digital marketer Top 5 lessons to become a smarter digital marketer
free wi-fi Is using free Wi-Fi really safe? [infographic]
facebook IPO Facebook IPO vs Google: where do they stand [infographic]
  Top 5 tips to become a social media darling Top 5 tips to become a social media darling
Facebook smartphone 5 reasons Facebook should make a phone…wait what?
Pinterest to impress your future employer 5 ways Pinterest can impress your future employer
wordpress logos 5 reasons why your blog should be smartphone friendly
5 social media mistakes you might be making and how you can solve them 5 social media mistakes your brand is making and their solutions
  samsung galaxy s3 5 must watch videos for the new Galaxy S 3 owners
guide to evernote A video tutorial to Evernote
Apple is gearing up for quite a year ahead with the launch of iOS 6 and iPhone 5 Apple news and rumors you ought to know
the cloud iCloud explained in 5 simple steps
plug in hybrid Top 5 automotive technologies that’ll change the game
  shutterstock_79029379 5 top tips to recycling your old mobile phone
mobile device malware Top 5 mobile and online malware to watch out for
Hacker profile Top 5 hackers and their fates
iPhone 5 Apple iPhone 5: Features, specs and schematics surface
shutterstock_96526669 Top startups today and what we can learn from them
  RSS News from the tech universeSony, Panasonic Agree to TV Tie-Up - Wall Street JournalSamsung: Galaxy S III sales to hit 10 mln in July - The Associated PressThe New York Times Brings All Its Content to Flipboard -- and Its Pay Wall, Too - TechCrunchFujitsu bigwig: Microsoft's doing us a favour with Surface either way - RegisterGoogle TV service launches in UK - BBC NewsAsus Transformer Pad Infinity TF700 review: Infinite potential, limited OS support - CNETInvestment Banks Seek Business in Patent Deals as M&A Work Slows - Bloomberg
Sitemap Copyright © 2012 iYogi Top 5, All Rights Reserved.   top

View the original article here

0 comments:

Post a Comment

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More