Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

How to stop freeloaders from using your WiFi

Top tips on protecting a wireless network from unauthorized users

Article comments

Chris Beck wants to find out if there are unauthorized users on his wireless network.

If a stranger successfully gets onto your WiFi network, they may be stealing more than bandwidth. After all, they have access to your computers. Your home network should be more secure than the café's down the street.

The first thing you need to do is make sure that no one can get into that network easily. That means setting up your router to use WPA, or better, WPA-2 security.

Because I don't know what kind of router you have, I can't tell you exactly how to do that. Check your router's documentation. Generally you enter a particular IP address into a browser, which will take you to an HTML-based configuration program located inside the router's firmware.

Setting up security will require you to create a password. Make it a strong password that no one will be able to guess. But remember that you'll have to enter that password into every computer, smartphone, Blu-ray player, or other WiFi-equipped device in your home, including overnight guests' laptops. HDTVs and Blu-ray players are the worst for entering passwords - remote controls just aren't friendly for text entry.

Okay, I've told you how to control who gets access, but I didn't actually answer your question: How do you see if someone is on your network who shouldn't be?

Once again, you turn towards your router's configuration program. Somewhere in there, probably in a menu called Wireless or Status, you'll find a list of all current wireless clients. You won't be able to identify those clients at a glance, but you will be able to see how many there are. That can tell you if there's an extra.

But before you count too many and panic, think hard about what devices may be legitimately using your WiFi. When researching this article, my router told me I had five wireless clients. I could only identify four. Turns out my daughter's iPhone had WiFi turned on.

You can identify the clients you know via their MAC Address, which has nothing to do with Apple Computers (although Macs do have MAC addresses). These numbers are unique for each device that can get onto a network. You can go to each legitimate WiFi client and find its MAC address, although how to do it depends on the device. For instance, on a Windows PC, go to a Command Prompt window, type ipconfig /all, and press ENTER. The MAC address is listed as the "physical address".

If you're wondering about past freeloaders, your router's configuration program should have a log somewhere. It should also have a tool for blocking undesirable MAC addresses.


Share:

More from Techworld

More relevant IT news

Comments




Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *