- Home
- » Internet
- » Wireless Internet & Network Hardware
- » Wireless Internet Routers
- » How to Detect a Wireless Intruder
- Cheap Wireless Broadband
Get High Speed Wireless Broadband Starting At $9/Mo For 24 Months.
- www.FloridaSecurityCompanies.com” class=”title”>Get 4 Quotes for Security
Compare Florida Home Security Quotes: Miami, Tampa, Orlando, more
www.FloridaSecurityCompanies.com” class=”baseurl url”>www.FloridaSecurityCompanies.com
- www.Groupon.com/Naples” class=”title”>Naples Coupons
1 ridiculously huge coupon a day. Like doing Naples at 90% off!
www.Groupon.com/Naples” class=”baseurl url”>www.Groupon.com/Naples
- www.PhoneStealth.com/CellPhoneSpy” class=”title”>Spy on All Cell Phones
Read Text Messages – Cell Phone Spy Undetectable! Great for Parents.
www.PhoneStealth.com/CellPhoneSpy” class=”baseurl url”>www.PhoneStealth.com/CellPhoneSpy
- www.PalisadeSystems.com” class=”title”>Prevent Data Loss
Palisade solutions help protect confidential information.
www.PalisadeSystems.com” clas
s=”baseurl url”>www.PalisadeSystems.com
Related Topics
How to Detect a Wireless Intruder
Modern wireless routers can
be vulnerable to intruders, either intentionally or accidentally. Many
wireless devices automatically seek out and connect to the strongest
signal, so it is possible that a neighbor may be connected to your
router without his realizing it. Intentional intrusions can range from
relatively benign “bandwidth borrowers” to more serious attacks aimed at
theft of identity or personal information. The best defense is strong
and frequently changed passwords on your router, wireless encryption and
monitoring of connected devices.
- Difficulty:
- Moderate
Instructions
things you’ll need:
- Admin password to your router (see manufacturer’s documentation)
- Browser software (e.g. Firefox, Internet Explorer)
-
MAC Address Method
-
1
Determine the Media Access
Controller address of every authorized wireless device on your network.
These devices include printers, laptops, desktops, hand-held devices and any other device which attaches to your network in a wireless mode.Each wireless card or embedded controller in these devices has a
unique address that identifies it to the network. No two legitimate
devices will ever have the same MAC address.Windows and MAC computers have this information in the control panel for your wireless network device. For other devices, check the manufacturer’s instructions for how to locate this address.
The address will be a 12-character field, with each character being a hexadecimal character (0-9 and A-F).
-
2
Log on to your router as an
administrator. Most routers can be addressed by typing 192.168.0.1 into
any browser. Supply the correct administrator user name and password.Check your documentation if you have never changed these from their default values.
-
3
Find the menu option for
attached wireless devices. This will vary depending on the router
manufacturer, so check the user manuals. -
4
Compare the MAC address for each
device listed by the router as being connected with the list of MAC
addresses for devices that you expect to be connected. Any MAC address
for an unexpected device may be an intruder. -
5
Configure your router to only
accept connections from known MAC addresses. Most routers offer this
feature. Check with your user documentation for instructions.
Other Warning Signs
-
1
Be alert for any suspicious activity on your network. Most often you will notice this by a slowdown of your network connection speed.
-
2
Check your router logs for a
record of devices connecting and disconnecting from your network. The
procedure to access these logs is different depending on the router
manufacturer, so check with the user documentation.These logs typically show connections by MAC address, so be aware of any unexpected addresses.
-
3
Install software on your network
to monitor intrusions. More sophisticated intruders may have the
capability to “spoof” MAC addresses, meaning they can set their own MAC
address to appear to be a device which legitimately connects to your
network.
-
1
- Intrusion PreventionWatchGuard.com/Intrusion+Prevention
Intrusion Prevention Appliances. Compare Brands By Price/Performance
- www.Niksun.com” class=”title”>Intrusion Detection (IDS)www.Niksun.com” class=”baseurl url”>www.Niksun.com
Signature & Anomaly-based Intrusion Detection! Fewer false positives.
- www.FrontPointSecurity.com” class=”title”>5-Star Rated Home Alarmswww.FrontPointSecurity.com” class=”baseurl url”>www.FrontPointSecurity.com
Our customers love us! Find out why Safer, smarter, simpler security.
- Wireless Vulnerabilitiesvulnerability.scan.qualys.com
Is your wireless network secure? free Network Vulnerability Scan.
References
Copyright © 1999-2011 Demand Media, Inc.
Use of this web site constitutes acceptance of the eHow Terms of Use and Privacy Policy. en-US