Are thieves
stealing your internet?
This one is not so much a tutorial as it is an
advisory and is directed to those of you connecting to the internet wirelessly. Keep in mind as you read this, that the term
wireless internet includes cell based mifi/wifi connections AND home networks
connected to a router. Your PC may be
connected to your router with an Ethernet cable but your network is still a
wireless network.
Do you sometimes notice your internet connection slower than normal? It’s possible that you’re sharing it with others and not knowing it. It might be one of your neighbors tapping into your internet bandwidth or a malicious hacker has tapped into your wifi? There are many casual bandwidth thieves who find an open network and think they can borrow it. If they find one that is password protected they go on and find one that isn't. If you haven’t bothered to assign a wifi access password (security key), the front door to your network is wide open. Also, you need to have changed your router’s default password. Since all routers come from the manufacturer with default passwords set, anyone with the tiniest bit of computer knowledge can change anything in your router configuration they want to. I can say this as a fact—Of every home I have entered to work on a computer, 90% of them have either NOT changed the default password of their router or are running an unprotected, no password access network. (Or both of the above) I think this is because when you connect a router it automatically works as is so many people just leave it that way rather than taking time to set it up protected. This is bad business.
A malicious cyber-thief is another matter. He is not out to just use your internet service but to steal
your information which he may use or sell. He can hack into your network's computers, steal your information or use your service for illegal reasons. Anything done on your network can be traced back to you when the real culprit has done his dirty deed and moved on. This sort
of thief is skilled and can access your network easily. That is why your network password should be strong enough that it is very difficult to crack.
The following is an excerpt from ttp://askbobrankin.com/is_someone_stealing_my_wifi.html?pcp that explains it better than I can.
"Windows and Apple computers have built-in utilities that show
what devices are connected to your network. You can use these tools to look for
unknown computers that should not be connecting to your network. Obviously, the
first step is to know what devices are authorized. Each authorized computer should
be assigned a computer name that you can recognize easily, i.e., “Jane’s PC” or
“Billy-iPod”. Other devices, such as printers, will have built-in names such as
“HP Model 8600;” you should be familiar with what you own and how it is
identified on your network.
Here’s how to detect who
is connected to your wireless network.
If you are using Windows 7 or Windows 8 it’s pretty easy.(and I
believe Vista, as well, although I do not have a Vista computer to verify this) In Windows
7, click the Start button and type “network” in the search box. Double-click on
the word “Network” which should be the first item in the search results. A
three-part display of connected devices will appear: computers, media devices,
and network infrastructure. “Computers” will include PCs, smartphones, and
tablets. “Media devices” include printers, gaming consoles, smart TVs, and the
like. “Network infrastructure” includes your router and the modem to which it
connects, typically labeled “Internet gateway device.” Note that for some
reason, connected iPods and smartphones do not show up here. An unauthorized
device will probably be among the “computers” listed, but if (for example) you
see an Xbox that doesn’t belong to you, you obviously have an interloper. Apple
OS X computers have a similar utility. You can access it via Finder > Go
> Network.
Your router’s
configuration program provides a better view of ALL devices connected to your
network. By logging into your router, you can see a list of devices that
currently have IP addresses assigned to them. Consult your router’s
documentation (or Google it) to learn how to access this list. Devices that may
appear in this list include desktop and laptop computers, tablets and ebook
readers, iPods, smartphones, wireless printers,
streaming devices such as Roku or AppleTV, gaming consoles, and television
set-top boxes. Many routers also store logs of past connections, which you can
peruse to see what devices connected when you weren’t looking. If you don't
know how to login to your router, or you don't know the password, ask your
Internet Service Provider for help, or read the documentation that came with
your router. "
No comments:
Post a Comment