May 29, 2012

How Can You Search What Devices are Connected to Your Home Wireless Internet Connection

People who have wireless connections often complain that they suspect someone else is using their Wi-Fi because the internet speed connection stays low. They are anxious to know ways to find out if someone is really stealing the bandwidth of their Wi-Fi. So, how can they find it out and what measures can they take to stop it, right away? High speed internet providers in my area also offer the best solution for such problems.  

Unfortunately, if someone is accessing your Wi-Fi, chances are that they might also be able to access some of your folders. However, this depends on the security measures that you use. Moreover, if someone is using your Wi-Fi connection for illegal business, it might be equally dangerous to you as well. In this article, we will help you find if your Wi-Fi is really being stolen and how you can put an end to it.


1. Low Tech Method 

Your wireless router will have indicator lights which show hardwired network connections, internet connectivity, and any wireless activity. Now to know if someone is really using your Wi-Fi connection, shut your all wireless devices and see if the light still blinks. The only issue doing this is that you still might have other Wi-Fi devices such as gaming console or television left to unplug, and also it does not give out much information. This method can mainly be used to confirm your suspicion at a given moment.

 2. Network Admin Method

The administrative console of your router can help you explore more about your wireless network and make changes to security settings. In order to log into the console, simply go to the IP address of your router. This address can be found on Windows by clicking Win+R. Now, type CMD and ipconfig in your window and find “Default Gateway” IP address. If you use Mac, open Network Preference pane and get the IP address mentioned next to Router.

Next, type the IP in the browser window. You will be asked to provide your login details of the router. The router documentation will be having your login details only if you did not change your default settings. This process will typically ask you for admin and password fields. You must change your login information when you enter the router console for security. Hackers always look for such chances to get into the router consoles.

Each router is different. When you log into your router, immediately look out for connected devices. It can be known as “My Network” (Verizon routers) or “Attached devices” (Netgear). It must give you a detailed list of MAC addresses, IP addresses and all device names if they are detectable. Compare all connected devices to the gear and look out for unwanted users.


3. Detective Method: Using Network Monitoring Software Tool

It is extremely beneficial to be able to get into the network admin panel. Here you can easily view logs and change settings; however, you might also want to go through advanced network auditing and this is where MoocherHunter comes handy. MoochHunter is a part of the Organizational Systems Wireless Auditor (OSWA). According to the description of the software, it can easily geo-locate wireless hackers by sending traffic across the network.

This software also does not run in Windows as executable, but rather needs to be burned on to a CD to boot on the computer. This software is quite well known to be able to detect if anyone is using your Wi-Fi network. It is a great way to learn how hackers and other users try to get into your system.


4. Enhance Your Wi-Fi Security

If you use WPA2 or even WPA, your system is secure enough. If you have completed all the required steps, but the browser still seems very slow, you should think about speeding up the browser. If you use WEP or your connection is not encrypted, your system can be easily cracked by anyone looking for connections. If you do not know which encryption is being used in your network, go to wireless connection properties which will recognize it immediately. High speed internet providers in my area provide enhance Wi-Fi security solutions as well.

Remember, you should continue using WPA2 encryption whether you discovered someone using your Wifi connection or not, and manage other router setup essentials. If you still want to continue using open wireless network; get a new, secured wireless network and open the unsecured network only for guests and WEP devices only upon need.

Search Term :


kim said...

know what? i'm having this trouble right now.. i'm paying for the internet connection and some of my neighbors are enjoying it (maybe even) more than i do, lol!

Indra said...

betul sekali itu !

hadeh....gk mudeng aq Bu....:D haha

  © Blogger template 'A Click Apart' by 2008

Back to TOP