It may be hard to imagine, but just 20 years ago, the internet was nothing more than a novelty – a way for incredibly smart college professors and researchers to share information, and for a few people to network across the World Wide Web. (WWW)
Now, a lot of transformation has taken place. Technology has become cheaper and easier to use. Internet has certainly gone through this transformation too. One of the most recent advancements in digital communication is Wireless Internet Fidelity. (WiFi)
Found in coffee shops, libraries, some homes, airports, organizations, towns and even universities throughout the world, WiFi has made using the internet almost as common as using your cellular phone. Unfortunately, unsavory activities inevitably find a way into even the most benign settings like the internet.
As the technology grows, so are the con artists. They have become sophisticated. Some will pinch your bandwidth even from your house if they live nearby and if you have a router to allow for multiple wireless internet access. How to catch these wireless internet thieves is becoming easy nowadays.
If you’re suddenly having problems with your internet performance, especially at the same time each day, it’s a red flag that someone is piggybacking of your wireless connection and it’s time for you to diagnose your WiFi network. What’s worse, these wireless squatters can even steal information off your computer or infect machines on your network with a virus.
The first and simple thing you can do is check out your wireless network connection and see if it’s secure. When you install your router, you’re given the option of setting a Wireless Encryption Protocol (WEP) key.
Basically this is a password protected method for you to log on to your wireless network. If you don’t have one, you’re operating an open network. That means anyone within range can use your wireless internet network for free.
In other words, your internet is free for all and unless you are feeling sufficiently philanthropic, you should do something. Your bills could be growing every month yet you have not added the number of gadgets that access the internet.
Even if you have a WEP key, that doesn't necessarily mean your neighbor hasn't bypassed it. To determine if he or she is logging onto your wireless network, you can do so by checking your wireless network log.
The exact steps vary depending on your computer’s operating system, but in general, if you look at your network and see more devices connected than you have allowed on your network, then you have WiFi thieves.
Internet monitoring software is also a viable option. Most wireless routers come with a monitoring programme of some sort, and that should tell you if more than one IP address is accessing your wireless network. Navigate to the Dynamic Host Configuration Protocol (DHCP) client table, or in the case of Netgear routers, the “attached devices” list, and see if there’s a computer there that doesn't have your permission to be there.
Once found, you can direct your wireless router to block it and thus cut off your pilfering neighbor once and for all. In addition, monitoring software makes it easy to see what is going on with your wireless connection.
Another way to check if someone is pinching your WiFi is to turn all the hardwired network connections and check if the lights are blinking on your router. If after doing so your router still has some blinking light, you need to investigate ad find the squatters on your wireless internet network. Always remember to stay safe online.
E-mail was nothing like it is today. The primitive e-mail system found at universities or even through accounts offered with the first Internet Service Providers (ISPs) were often difficult to use and tortoise slow.
Now, a lot of transformation has taken place. Technology has become cheaper and easier to use. Internet has certainly gone through this transformation too. One of the most recent advancements in digital communication is Wireless Internet Fidelity. (WiFi)
Found in coffee shops, libraries, some homes, airports, organizations, towns and even universities throughout the world, WiFi has made using the internet almost as common as using your cellular phone. Unfortunately, unsavory activities inevitably find a way into even the most benign settings like the internet.
As the technology grows, so are the con artists. They have become sophisticated. Some will pinch your bandwidth even from your house if they live nearby and if you have a router to allow for multiple wireless internet access. How to catch these wireless internet thieves is becoming easy nowadays.
If you’re suddenly having problems with your internet performance, especially at the same time each day, it’s a red flag that someone is piggybacking of your wireless connection and it’s time for you to diagnose your WiFi network. What’s worse, these wireless squatters can even steal information off your computer or infect machines on your network with a virus.
The first and simple thing you can do is check out your wireless network connection and see if it’s secure. When you install your router, you’re given the option of setting a Wireless Encryption Protocol (WEP) key.
Basically this is a password protected method for you to log on to your wireless network. If you don’t have one, you’re operating an open network. That means anyone within range can use your wireless internet network for free.
In other words, your internet is free for all and unless you are feeling sufficiently philanthropic, you should do something. Your bills could be growing every month yet you have not added the number of gadgets that access the internet.
Even if you have a WEP key, that doesn't necessarily mean your neighbor hasn't bypassed it. To determine if he or she is logging onto your wireless network, you can do so by checking your wireless network log.
The exact steps vary depending on your computer’s operating system, but in general, if you look at your network and see more devices connected than you have allowed on your network, then you have WiFi thieves.
A WEP key is an absolute must for any wireless network; however, even those are vulnerable. While WEP protection will stop people sniffing your internet, it may not stop a more determined user. In that case, you can use a security protocol such as WiFi Protected Access. (WPA)
Internet monitoring software is also a viable option. Most wireless routers come with a monitoring programme of some sort, and that should tell you if more than one IP address is accessing your wireless network. Navigate to the Dynamic Host Configuration Protocol (DHCP) client table, or in the case of Netgear routers, the “attached devices” list, and see if there’s a computer there that doesn't have your permission to be there.
Once found, you can direct your wireless router to block it and thus cut off your pilfering neighbor once and for all. In addition, monitoring software makes it easy to see what is going on with your wireless connection.
Another way to check if someone is pinching your WiFi is to turn all the hardwired network connections and check if the lights are blinking on your router. If after doing so your router still has some blinking light, you need to investigate ad find the squatters on your wireless internet network. Always remember to stay safe online.