Let’s see how to find out if someone uses our Wi-Fi network without authorization and stealing your Internet connection .
To find out if your neighbor or some stranger connects to the Wi-Fi network without permission, thereby slowing down the speed of our connection, we must try and identify all devices connected to the wireless modem router. The fastest way to identify intruders is to access our modem router and try from the menu clients connected or connected devices in the wireless section to display the list of connected devices.
Alternatively we can use WiFi Guard , a network scanner capable of displaying computer, smartphone but also televisions Internet or Xbox wirelessly connected to a Wi-Fi.
Free WiFi Guard is in Italian and is available in 64-bit and 32-bit for Windows 8 / 8.1, Windows 7, Windows Vista, Windows XP and Linux. The Mac version is free of charge.
START WIFI GUARD
Connect WiFi Guard .
At the bottom of the page, under Downloads , select the version to use based on the operating system of your computer.
WiFi Guard is available for Windows, Mac and Linux. If you’re using Windows can also choose Windows: Portable Edition , a portable version that requires no installation on the operating system.
We click Download WiFi Guard .
When the download execute the installation file.
We select the installation language and we click on Ok .
SELECT THE WIRELESS NETWORK CARD (IF NECESSARY)
If our computer has two or more network adapters will open the dialog box Settings .
tab Essential we click the arrow under Network Adapter .
We select the network card wireless list and we click on OK . Warning : the wireless network card can be recognized in the list by the word wi-fi or wireless . If the list displays two or more wireless network cards and we do not know which one to choose and maintain a selezioniamone scanning with WiFi Guard. If the scan is not done we click on Settings in the main WiFi Guard.tab Essential select another wireless network card (under Network Adapter ) and we click on OK . We repeat the scan with WiFi Guard.
SCAN THE WI-FI NETWORK TO IDENTIFY DEVICES
EXAMINE THE NETWORK
In the main WiFi Guard do click Scan Now .
WiFi will be scanned to detect all network devices.
At the end of the scanning process will see the list of all dispositi connected to the WiFi network. Warning: repeat scan in the following days because an intruder could not be connected when we examined the network .
HOW TO READ THE RESULTS
If the only devices have detected the bullet green means that no outsider is connected to our WiFi network.
But we see as indentificare any other devices appear in the list with a passion red .
During the first scan of the network WiFi Guard is able to recognize automatically only our computer and our modem router. If the program detects other computers, smart phones, televisions or Internet Xbox will alert us with the following message: WiFi Guard found (n) devices not recognized!
All these devices will be initially identified by a red dot .
To see if these devices belong to us or not do it this way. spegnamo all devices connected to your WiFi network ( computer ,smartphone , Internet TV , Xbox , etc. ) except the computer you’re scanning the modem and router. In the Main WiFi Guard do click Examine Now to scan again. If listed, in addition to the computer and the modem router with the green dot, are still detected one or more devices it means that some stranger is connected to our wireless network Wi -fi.
RECOGNIZE OUR DEVICES
Now we have to tell WiFi Guard what our devices. In this way in subsequent scans they will be automatically recognized and identified by a green dot.
If we are not able to identify devices using the information provided in the column manufacturer or by their IP address , we can do it this way. spegnamo all devices connected to the network WiFi ( computer , smartphone , internet television , Xbox ,etc ). We turn on one device at a time and repeat scanning WiFi . WiFi Guard will alert us to have found a device not recognized (our device that we just turned on). In the list of devices do double-click on the red dot. In the window Propertiesselect the check box I know this computer or display device . In Commentary we type the name of the device that we just turned to be able to recognize in the main WiFi Guard. I click OK . We repeat this procedure for other devices.
INTERPRETING THE OBSERVED
IP address : indicates the IP address (Internet Protocol Address) of the devices.
The IP address is a numeric label that is assigned to each device connected to a computer network to uniquely identify it. MAC address : indicates the address MAC of found devices. The MAC address (Media Access Control) is an alphanumeric code that is assigned by the manufacturer to every network interface to identify it uniquely. RTT indicates the ping time (ping time) that is the time that the remote device took to respond. Name : is the name of the computer or device found. Information : contains information about the discovered device. Manufacturer : indicates the manufacturer of the device detected.
CHANGE THE INTAKES SEPARATED BY TIME BETWEEN SCANS AND SUBSEQUENT
WiFi Guard automatically performs a scan of Wi-Fi per 30 minutes .
If we want to change the time between a scan and the next we must open WiFi Guard.
We click on Settings .
In the Scan options , in Examine every network (minutes ): choose how many minutes each scan (0 to 60 minutes).
I click OK .
WHAT IF SOMEONE STEALS THE FREE WI-FI
If we found a device that does not mean we know that someone steals your connection and is using our Wi-Fi network without permission.
So let’s see what are the counter moves to implement. Caution : all these changes must be made in the control panel of our modem wireless router. • We use an access password for the Wi-Fi network. First of all we verify that our Wi-Fi network is protected by a password. Otherwise we set a password for access. • We change the password to access the Wi-Fi network . If our Wi-Fi network is protected by a password to access it is possible that someone has identified. Change the login password. • We use a secure password . We do not use the password 12345678 , the word password , our date of birth, our phone number or any other information due to our person. A strong password should be at least caretteri eight alphanumeric, must contain lowercase and uppercase letters and at least one punctuation mark. It must not contain a word or a meaningful sentence. • We change the login password periodically .