Skip to main content

How to Detect if Someone's Stealing Your WiFi !!!

#The Scenerio :

It may be hard to imagine, but just a mere 20 years ago, the Internet was nothing more than a novelty. Today's laptops and mobile devices give us access to friends and endless entertainment practically anywhere via WiFi, 3G and 4G technologies.
*What's another name for Wi-Fi?
802.11 networking
Wi-Fi is also referred to as 802.11 networking. No matter what you call it, it's pretty flexible as far as Internet connections go: It requires no wires.


#Understanding WIFI :

A wireless network is comprised of a broadband Internet connection from a DSL(Digital Subscriber Line), cable or satellite modem. You attach the modem to the wireless router, which distributes the signal and creates a network.


*A wireless network uses ___ waves to transmit signals.
radio
Like cell phones, TVs and radios, a wireless network uses radio waves to transmit signals. Communication across wireless networks is pretty comparable to two-way radio communication.


#The Problem:

Is your wireless network running slowly? Do you have intermittent losses in Internet access and you can't figure out why? 

*What device sends and receives radio signals in a wireless network?
router
Your computer, smartphone and other gadgets communicate with the wireless router using radio signals.

#The Solution:

First, take a breath. In all likelihood, no one is stealing your Internet.Tons of things could cause a slow connection. Your Internet service provider might be having issues or is overloaded with traffic. Your WiFi router might be experiencing interference from other electronics, or simply be having trouble penetrating the walls and furniture of your home to get a wireless signal to your computer.

 #1 The Password !

There's only one thing you need to prevent 99.9 percent of wireless squatters from using your Internet connection: a password.

*At what frequencies do Wi-Fi radios make transmissions?
2.4 GHz or 5 GHz
Wi-Fi radios transmit signals at 2.4 GHz or 5 GHz. These high frequencies allow the signal to carry more data.

#2 The Address 

With WPA2 security enabled, it's unlikely anyone will ever piggyback on your network. But there's an easy way to spot squatters: Since every device connected to your network has a unique IP address and MAC address, you can easily see a list of connected devices -- often listed as "clients" -- on one of the settings pages for your wireless router.

*Which short-range wireless standard is used for Wireless Personal Area Networks (WPANs)?
802.15
The wireless standard used for WPANs is 802.15 -- it's also commonly used for Bluetooth technology.


#3 Invisible!!

Want to make absolutely sure no one's going to figure out your password and worm their way onto your network? You have a few options. Your router can hide its SSID, meaning it won't show up for anyone searching for connectable networks. The address will have to be entered manually. You can also set up a wireless MAC filter to "whitelist" devices you own, disabling access for anyone else.

*You can change the settings on your wireless router through a Web interface. One option you can change is channel. What channel do routers use by default?

6
Routers use channel 6 by default -- if you live in an apartment complex and your neighbors are using this same channel, you can sometimes get some interference. In addition to changing the channel, other settings you may wish to change include the name of your network and your router's security options.


#The Truth:

Smartphones changed everything, didn't they? A few short years ago, we hoarded WiFi like a precious commodity.Well, once we got smartphones with omnipresent data connections, we calmed down a bit. WiFi is now so ubiquitous that you don't have to worry too much about you neighbors leeching off of you -- they've probably got WiFi, too. We don't need to find hotspots when we've got 3G and 4G on our phones.

Comments

Popular posts from this blog

Unbelievable Logo Success Stories

Chameleon -  The letters of the word are made into a chameleon Turn -  T and U are inverted and attached TTW -  Shadows of T's make W Pencil -  I and L makes the pencil Ant -  The letters make the ant Black Dog -  The two words make a dog Elephant -  E,L and E make the face of an elephant Kiss -  K and I are represented as male and female Melt -  Letters are getting melted as we move further Steps -  E is denoted as steps. Elefont -  Trunk of elephant is embedded in E Wildlife Outdoor Expo -  The letters of "wildlife" denoted the wildlife Book camp -  Books made the tents Fit -  I is included between F and T Bird -  B represents a bird Eighteen Parkway -  18 is represented as I and G Battery -  Battery symbol is included between two T's Resources:-Quora.com

CARTOONS THAT MAKE YOU MISS YOUR CHILDHOOD!!!

CARTOONS YOU CAN'T FORGET Today in the era of networking and technology , kids are deprieved of the fun cartoons which we watched as kids. Well i don't need a smartphone when i was 8 for entertainment. Back then Cartoons  are our sad kicker , our stress remover and our biggest entertainer . Here's a list of tv cartoons, which we can't forget  1. TOM AND JERRY It was a classic tv cartoon, one of the best of all time. This was the ultimate cat and mouse fight. From being the cutest individuals, to eating cheese, or Tom trying to get into Jerry’s little house, the dog which lived outside, hitting each other on the head with a sauce pan or Jerry drinking the magical tonic and becoming huge, Tom trying every single means to catch Jerry, their dream world and the running around that they did still makes me laugh. The swimming pool episodes and the beach episodes were the best they had. I still remember, the laugh they had after troubling each ot...

VIRTUAL REALITY ON SMART PHONES

Have you ever thought about Virtual Reality, well you must have listened about it in Sci-fi movies, Now have you ever thought how to get your hands on this advance technology. Most of us don't know that one can get it for 30$ , yes really for 30$ and know what, you can experience it on your smartphone. Its commonly known as VR headsets. Today many well known companies are working on it and call it by different names such as, FACEBOOK [ Oculus rift]  GOOGLE [Google cardboard] SAMSUNG[gear vr] SONY [PS VR] and almost 50 more. Want to know how it actually works??? Well if you thought that vr works on a technology far advance than your thoughts , then dont worry VR actually works on two simple concepts 1. Creating a wide view 2. Head tracking VR headsets use either two feeds sent to one display or two LCD displays, one per eye. There are also lenses which are placed between your eyes and the pixels which is why the devices are often call...