How To Protect Your Wifi From Being Hack By Your Neighbors
How many Wi-Fi signals do you have nearby? If you live on the terrace, 10 SSIDs can be seen. How about the block of an apartment? Wi-Fi signals are broadcast in and out of the building. In fact, your internet speed is likely to be negatively affected by this wireless signal cacophony.
There’s also another problem here. If you broadcast your Wi-Fi SSID to the surrounding houses and your security is lackluster, your internet may be stolen. You’re locking them out here.
These people live in your region or may just move into so they can do’ drive-by-leaching.’ They have no difficulty comparing to your wireless network and wasting your bandwidth while you pay the bill. Websites are even committed to obtaining open wireless access points.
Some leeches also sprinkle graffiti or use chalk near an accessible wireless access point to mark or watch the site so that others know where wireless access is available free of charge. Warchalkers use codes and symbols to show the SSID name, available bandwidth, encryption, etc.
Use WPA2 Encryption on Your Wireless Router:
If you have not already done so, refer to the manual of your wireless router and allow WPA2 encryption on your wireless router. You may have encryption activated already, but you can use outdated and vulnerable WEP encryption.
Even the most novice hacker can easily hack WEP in less than a minute or two using free internet tools. Turn on the encryption of WPA2 and set a strong network password.
Hide Your Wireless Network by Changing Its Default Name (SSID):
Your SSID is your wireless network’s name. This name should always be changed from its default manufacturer set, which is usually the router’s brand name (e.g. Linksys, Netgear, D-link, etc.).
Modifying the name helps prevent hackers and leeches from finding specific router brand vulnerabilities. If hackers know the brand name, they can find a feat to use against it (if there is one). The brand name also helps you determine the router’s default admin password (if you haven’t changed it).
Make the SSID random and seek to make it as long as you’re at ease. The longer the SSID, the greater it will help stop hackers from using Rainbow Table attacks to crack wireless encryption.
Check Your Router for Suspect Guests:
Your first call port is the router. If a neighbor steals your precious bandwidth, your router will show up. Unfortunately, not every router contains this information or gives it access. Log in to your router directly into your browser by typing its IP address.
This can be achieved by typing 192.168.0.1, 192.168.1.1, or 192.168.1.254 for the vast majority of routers. The IP address of the router is sometimes printed on the router itself, together with the login username and password.
Search a part called Attached Accessories or Device List once logged in. This section appears in Status > Wireless on a router flashed with DD-WRT. Check the connected devices once you find the page. I can take every device into account. You have an intruder if you can’t. The device should be removed, deleted or blocked from connecting to your router.
Change the Admin Password :
Your router arrived with a username and password for admin by default. This should be the first things you need to change to some other name. Many websites allow you to search by router model for default login credentials. This is clearly a risk, so change your admin password through the web page of your router.
Turn Off the ‘Allow Admin via Wireless’ Feature:
Turn off the “allow admin through wireless ” feature on your router as an extra precaution against hackers. This will help prevent the control of your wireless router by a wireless hacker. Turning this off tells your router to only allow router management from a computer directly connected to an Ethernet cable.
This means they would have to be in your house to access your router’s admin console. Once you hide that very network, then your neighbors won’t get an open ride anymore and you may have sufficient bandwidth to stream an HD movie without stuttering and arranging all’ blocky’ for a change.
Turn Off WPS :
Another potential vulnerability to gain access to your internet is the Wi-Fi Protected Setup( WPS). If you use a PIN to validate new connections, WPS is sensitive to an online brute- force attack. The problem arises from the processing of the PIN.
About the author
Ankit Srivastava is a Google Certified Sr. Digital Marketing Strategist, Professional Blogger and Entrepreneur from New Delhi. He has already written many articles and blogs on various topics. Read more