how to keep mooches and spies off your wi-fi network and out of your files
They have no malice.
They just need to find a signal that is not protected to sign in. Why not?
It\'s free and no one will even know.
If you steal some broadband and watch Netflix, your neighbors won\'t mind, will they?
But criminals also like insecure Wi-
They are indeed harmful.
They use your network to attack your gadgets and steal your personal information.
They download illegal files through your router, making you vulnerable to police investigations.
To make matters worse, the intruder will slow down your connection, causing buffering and making it more difficult for you to complete your online tasks.
Still, it may not cause a pokey connection.
Click here to make three router adjustments to speed up your Wi-Fi.
\"War driving\" has been going on for many years.
Hackers look around for unprotected Wi-
The network they can use.
How do you prevent this random attack?
Here are some tips for protecting Wi.
A Fi router for unauthorized riders.
View the connected gadgetsTime to view your network.
First, you need to log in to the management console of the router.
Basically, you are \"logged in\" to your router as if you were logged in to any computer.
Each router has a different approach, so please check the manual for specific instructions. (
If you no longer have a manual, please check the manufacturer\'s website.
Or click here to visit a great site with thousands of manuals including routers. )
Make sure your device is connected to the router via wireless or cable.
Open the browser and enter the IP address of the router, which is a set of numbers and its default value depends on the manufacturer of the router.
The common IP address is 192. 168. 1. 1, 192. 168. 0. 1 or 192. 168. 2. 1.
Check which gadgets are displayed to connect to the DHCP client list or additional device section of the router.
Typically, they are listed by IP address, MAC address, and/or name.
Once you \'ve looked into the list of gadgets for this connection, find out what belongs to you.
You should identify the name of your main computer and your tablet or smartphone should have the name of the manufacturer or model.
If you can\'t understand the list, or you can\'t recognize certain devices, just turn each gadget off one by one.
You can also disable Wi-for each gadget-Fi.
Write down these network details for tracking purposes, or take photos quickly using your smartphone for later reference.
If you turn everything off and still see unknown gadgets, you know you have a culprit.
Now, there\'s a simpler way: you can use a free program called wireless network observer that gives you a list of gadgets connected to your Wi-Fi network.
You can start it quickly whenever you want to check or open it directlyTime monitoring. Easy.
Encrypt your connection, you may find an intruder, or you may not.
You can protect your Wi anyway-Fi connection (
And your profile)
By encrypting your connection.
Each router on the market offers multiple encryption options.
One type to avoid is \"WEP\", which is outdated and easy to avoid.
Instead, look for any encryption that starts with \"WPA2\" and most recently \"WPA2-PSK AES.
\"The WPA2 encryption series should protect your router from any operation-of-the-mill hacker.
For more detailed instructions on protecting Wi, click here-
Your network may have been encrypted, but the outside world is still accessing your Wi-Fi.
If so, change your password immediately.
You can also reset the router to factory settings (
Check the manual)
Set up your Wi-
Fi Signal starting from zero.
This will mean changing the default password, enabling encryption, and selecting the new network name (SSID)
And turn off any remote management features.
Keep in mind that if you change your encrypted password, you must also update your password on all devices.
Even WPA2 encryption is not perfect.
Network security experts have recently discovered a huge Wi-
Fi hacker called KRACK
Click here to learn how to protect your network from this new attack.
Friends and family always want to use your Wi-Fi.
They politely ask, holding the phone in their hands, because they hate to burn their data plans when they can use your connection.
Use the \"guest network\" of the router instead of giving them your real password.
\"This feature allows you to share an Internet connection with your guests while isolating them from your main network to prevent them from seeing your shared files and services.
To avoid confusion with the main network, set up the guest network using a different SSID and password.
While guests can use the guest network, maintain the same level of security as your main network.
This means developing a powerful password and limiting access to shared files and devices.
Make sure local access is set to off, which will prevent guests from tampering with your system.
Would you like a really cool tip?
You don\'t need to say your password at all.
This is a way to share network passwords using QR codes.
Turning off remote management \"remote management\" is a feature that allows you to log in to your router and manage it over the Internet.
If you call tech support, you may go through something like this: a distant technician talks to you on the phone, operates your computer, like he sits next to you
Remote Management is a convenient tool, especially when you need to solve a problem, it will make your computer vulnerable to hacker attacks.
Turn this off unless you absolutely need it.
You can find it under router settings, usually under the heading \"remote management.
You can always open it again if needed.
The last thing you need is to invite strangers to join your family network.
What\'s your problem?
Call my national radio station and click here to find it on your local radio station.
You can listen to Kim komshow on your phone, tablet or computer.
From buy advice to digital life questions, check out my free podcast here.
WestStar Multimedia Entertainment copyright 2017.
All rights reserved.
Get to know all the latest technologies on the country\'s largest weekend radio talk Show, Kim komshow.
From smartphones and tablets to online privacy and data hacking, Kim answers calls and advises on today\'s digital lifestyle.
For her daily tips, free newsletters, etc, please visit her website at Komando. com.