Sunday, May 26, 2013


                                   Are thieves stealing your internet?

 
This one is not so much a tutorial as it is an advisory and is directed to those of you connecting to the internet wirelessly.  Keep in mind as you read this, that the term wireless internet includes cell based mifi/wifi connections AND home networks connected to a router.  Your PC may be connected to your router with an Ethernet cable but your network is still a wireless network.

Do you sometimes notice your internet connection slower than normal? It’s possible that you’re sharing it with others and not knowing it. It might be one of your neighbors tapping into your internet bandwidth or a malicious hacker has tapped into your wifi?  There are many casual   bandwidth thieves who find an open network and think they can borrow it. If they find one that is password protected they go on and find one that isn't. If you haven’t bothered to assign a wifi access password (security key), the front door to your network is wide open.  Also, you need to have changed your router’s default password.  Since all routers come from the manufacturer with default passwords set, anyone with the tiniest bit of computer knowledge can change anything in your router configuration they want to.  I can say this as a fact—Of every home I have entered to work on a computer, 90% of them have either NOT changed the default password of their router or are running an unprotected, no password access network. (Or both of the above) I think this is because when you connect a router  it automatically works as is so many people just leave it that way rather than taking time to set it up protected. This is bad business.

A malicious cyber-thief is another matter. He is not out to just use your internet service but to steal your information which he may use or sell. He can hack into your network's computers, steal your information or use your service for illegal reasons.  Anything done on your network can be traced back to you when the real culprit has done his dirty deed and moved on.  This sort of thief is skilled and can access your network easily.  That is why your network password should be strong enough that it is very difficult to crack.
 
The following is an excerpt from ttp://askbobrankin.com/is_someone_stealing_my_wifi.html?pcp that explains it better than I can.
 
"Windows and Apple computers have built-in utilities that show what devices are connected to your network. You can use these tools to look for unknown computers that should not be connecting to your network. Obviously, the first step is to know what devices are authorized. Each authorized computer should be assigned a computer name that you can recognize easily, i.e., “Jane’s PC” or “Billy-iPod”. Other devices, such as printers, will have built-in names such as “HP Model 8600;” you should be familiar with what you own and how it is identified on your network. 
 
Here’s how to detect  who is connected to your wireless network.

If you are using Windows 7 or Windows 8 it’s pretty easy.(and I believe Vista, as well, although I do not have a Vista computer to verify this)  In Windows 7, click the Start button and type “network” in the search box. Double-click on the word “Network” which should be the first item in the search results. A three-part display of connected devices will appear: computers, media devices, and network infrastructure. “Computers” will include PCs, smartphones, and tablets. “Media devices” include printers, gaming consoles, smart TVs, and the like. “Network infrastructure” includes your router and the modem to which it connects, typically labeled “Internet gateway device.” Note that for some reason, connected iPods and smartphones do not show up here. An unauthorized device will probably be among the “computers” listed, but if (for example) you see an Xbox that doesn’t belong to you, you obviously have an interloper. Apple OS X computers have a similar utility. You can access it via Finder > Go > Network.
 
Your router’s configuration program provides a better view of ALL devices connected to your network. By logging into your router, you can see a list of devices that currently have IP addresses assigned to them. Consult your router’s documentation (or Google it) to learn how to access this list. Devices that may appear in this list include desktop and laptop computers, tablets and ebook readers, iPods, smartphones, wireless printers, streaming devices such as Roku or AppleTV, gaming consoles, and television set-top boxes. Many routers also store logs of past connections, which you can peruse to see what devices connected when you weren’t looking. If you don't know how to login to your router, or you don't know the password, ask your Internet Service Provider for help, or read the documentation that came with your router. "

 Folks, keep in mind that if you have an unprotected wireless router and you have your computer plugged into it with an Ethernet cable, thieves can still come in the back door and access your PC.

 
If you do not know how to access your router’s configuration page, seek help in getting your network set up as it should be.  Don’t leave yourself wide open to your neighbors or a cybercriminal looking to steal your information.