How do you know that someone steals your Wi -Fi network and how it stops?|TechnologyBrigade newspaper
There is no doubt that you have heard this warning for years, "It is very important to secure your home network with strong safety measures for the Wi-Fi wireless network, with a strong password," but what if the banned occurred?How do you make sure that your network is stolen?What can you do?
كيف تعرف أن شخصا ما يسرق شبكة واي فاي الخاصة بك؟If you are worried that someone may steal your Wi -Fi network, there are some tools available to you to find out.
The first method: Check the ROUTER Network Distribution Store lamps
The easiest way to see if an unauthorized person uses your Wi -Fi network is to look at your distributor, but this method does not succeed unless you can separate all your wireless devices from the Internet completely.If you have many devices (such as smart home appliances) that use this network, you can move directly to the second method.
If you can inventory all the devices on your Wi -Fi network on the one hand, remove them and put them in the event of non -connection, either stop them or set them to safety mode, then see the status lights on the Wi -Fi router.
With the absence of devices that use the Wi -Fi network, the lights should not flash, and if not, it is possible that another person is connected to your network.
The second method: Use network verification applications
There are a lot of applications available in your mobile app store that re -checks your network and provides a list of all connected devices.
You can search in the application store for the right options, but there is one reliable application called "WiFi Guard", which is available for both iOS and Android.This app gives you a list of all connected devices that you can wipe in light to see if there are any devices that you cannot recognize.
A number of devices will be identified with names that are easy to understand, such as the mobile computer, the phone and some smart home appliances, but some of them may be reported as a "unknown device", which is relatively unhelpful when trying to determine whether it is your device itself or it is a deviceAn intruder as it appears in the picture below.
استخدم تطبيق جهاز الموزع الخاص بكIf you have a relatively modern Wi -Fi (router) device, it is possible that it works with a mobile application, in fact, you may have formed the distributor from the start using the application.If so, you can start the application on your phone and search for a network, register or list of connected devices that the customer application may call.
Each device is different from the other, so you will need to search and explore through the device manufacturer's website.If you succeed in finding a list of connected devices by applying the distributor, then you can select the exotic devices as shown in the following picture.
قم بتسجيل الدخول إلى لوحة تحكم المشرف الخاصة بكIf none of these other options are fruitful, your last (often and most sophisticated options) is to log in to the official in your distributor in your web browser.To do this, you will need to know:
After logging into the supervisor control panel, look for a network map, user log or customer list as mentioned earlier.Each router is different from the other, so you will need to explore it to find it.
كيفية طرد شخص ما من شبكتكIf you find an unauthorized device on your home network, there are two simple ways to get rid of it:
If you see an unauthorized agent in the router's mobile application or the official control panel, specify the device.You should see one of these options: Block (BLOCK), Ban, or the EJCT Device as shown in the picture.
Instead of banning devices one by one, you can get rid of all devices from the network once (including your own devices) by changing the Wi -Fi password.If you are not already using a password, you must definitely run the network safety and add a password now.
Even if you already have a password, if someone uses your network and does not know how to arrive, you should change your password and make it stronger.If your network provides multiple types of safety, move to a safer system, such as the transfer from "WPA", or from "WPA2-TKIP" to "WPA2" to "WPA-TKIP" to "WWA2-AES (WPA2-AES).