Before you connect to a public Wi-Fi network, give it some serious thought. You never really know who else is parked on the network when you’re doing it in public places like coffee shops or airports.
Here is what you need to keep an eye out for.
What do you do when you have visitors over? Stop disclosing your password to everyone. Instead of allowing everyone’s smartphones to access your principal network, take the time to set up a guest network, which will just take a few minutes.
If you keep an eye on who logs into your network, you should feel more secure in your own home. It is not as difficult as it may sound, and there is no cost involved.
Test out my free email newsletter on the latest tech news; it’s been trusted by over 400,000 individuals just like you.
There is a mobile application for it.
Back in the day, the only way to see what was on your network was to log in to your router through a web browser. Only then could you see what was there. That is still functional (more on that is below), but the vast majority of cellular providers now allow you to accomplish that using an app.
Visit the website of your Internet service provider (ISP) to locate the official app, download it to your mobile device, and then log in using the credentials provided by your ISP.
They each have skills that are somewhat unique to themselves. For instance, the Cox Panoramic Wifi App enables you to examine and arrange connected devices, modify your Wi-Fi name and password, solve connection problems, and do much more.
Another useful feature is the ability to cut off internet access to specified devices from any location. This might be useful in the event that you come across an unfamiliar gadget or if your children are staying up late to play video games.
Do you want to keep tabs on what your children are up to on the internet? This is the method.
Make use of the internet interface provided by your router.
If there isn’t an app available, or if you don’t want to bother installing one, this straightforward method will show you who and what is accessing your network. You may access the most recent information on which devices are connected to your network by logging into your router. Due to the fact that this is a universal feature, the majority of models will support it.
To begin, you will need the Internet Protocol (IP) address of your computer.
The way to locate it is as follows.
Once you have it, go to the address bar at the top of your browser and type in the IP address. After that, you will be able to log in using the predefined username and password for your router, or you can use the default information if you have never changed it.
When you have successfully logged in, look for a list that either says DHCP Client or Connected Devices. You’ll then be presented with a list of all the devices currently connected to your network.
A word of advice: do you see anything that you don’t recognize? You should immediately change your Wi-Fi password and only reconnect the devices you can rely on. Although it is a time-consuming process, it is definitely worthwhile. You also have the option of manually removing particular devices from the list of connected electronics. Search for the command that allows you to delete, block, or remove things.
The internet lagging is annoying: here are some solutions to repair it right now.
Dive deeper into your network
You may get an even more detailed view of everything that’s connected to your internet with third-party applications.
The Windows version of Wireless Network Watcher does a scan of your local area network (LAN) and displays the IP address, Media Access Control (MAC) address, name, and manufacturer of each computer, tablet, and smartphone that it finds on your local LAN.
Please take note that every machine has its own distinct IP address, also known as an Internet Protocol Address. There are also addresses assigned to some computer hardware components. They are referred to as MACs, which stands for Media Access Control.
The moment you start up Wireless Network Watcher, a list including all of the discovered devices will appear before your eyes. You should be able to identify the various devices that have been linked. If you’re using an iPhone and an Amazon Echo, for instance, you might see other products manufactured by Apple and Amazon Technologies.
Here you may get detailed instructions on how to download and make use of the resource.
Try out Who Is On My Wi-Fi if you have a Mac computer. In the event that some of the linked devices are not immediately obvious to you, you will need to do some investigating in order to identify them. Check out the product description as well as the manufacturers.
Don’t panic if you don’t identify a gadget. Check to see which of your electronics, such as your TVs, tablets, laptops, and cellphones, can connect to the Wi-Fi network. Because there is a lot to go through, you should go through the list of devices slowly and carefully. Anything connected to it that you do not recognize should raise red flags.
Follow these methods to check if there are unauthorized users on your network:
Try out Acrylic’s Wi-Fi Analyzer if you’re looking for something that packs a little bit more of a punch. You can get information on up to five different devices using the free version. If you want a comprehensive view of what’s going on, you’ll need to upgrade to the paid version. You can purchase a license for a lifetime for approximately $100, or you can pay $45 annually to do so.
In addition to that, it may assist you in managing passwords, monitoring the traffic on your network, and more. Acrylic is an excellent corporate solution and a reliable alternative for everyone who works with more than one network.
Take these electronic items away as well.
While it is imperative that you remove unknown users from your network, you should also focus your attention on those in your immediate environment:
Remove any electronics that you aren’t currently making use of, such as obsolete phones and speakers, laptops and gaming consoles, tablets, and tablets.
Remove from the party any visitors whom you haven’t seen in a long. When you invite guests over the next time, give them access to your guest network rather than your primary one so that they may stay connected.
To find out how to configure this, tap or click here, then scroll down to the number four option.
In order for a technician to properly diagnose an issue or configure a new system or device, they may need access to your network. For the purpose of configuring the sprinkler zones, for instance, a technician could want access to your Wi-Fi network. Take away their tool as soon as they have done doing their duties.
If you go through a split, it’s a good idea to get rid of all of your ex’s electronic gadgets as well as any shared ones.
Maintain your level of technological savvy.
My podcast, which has a lot of listeners, is named “Kim Komando Today.” It’s a good half an hour of news about technology, helpful hints, and people just like you calling in with questions about technology from all across the country. Look for it in the podcast directory of wherever you get your shows. Click on the link provided below to watch the most recent episode at your leisure.
The TikTok car theft debacle, AI-powered Microsoft Office, and Google Maps gas savings are this week’s featured podcasts.
Plus, is your auto data for sale? You can find out what information your car is sharing about you by using a free tool. I offer some suggestions to a father who wants to keep an eye on what his child does on the iPad. A wacky dating site that bases matches on “hotness,” tips for standing out in video conversations, and how to protect your privacy before selling off your old phone are discussed.