Question about Apple MacBook Pro Laptop Computer with Intel Duo Core 15.4 Inch PC Notebook

1 Answer

Someone on my network

Hi there,

I live in an area with a lot of differnt networks and a lot of people steal network space. Thats actually cool by me, but I do worry about y security. One guy has appeared on my network list and he seems to sit there all the time. How do I control who is on the network and how do I check what they are doing?

Posted by on

Ad

1 Answer

  • Level 1:

    An expert who has achieved level 1.

    Corporal:

    An expert that hasĀ over 10 points.

    Mayor:

    An expert whose answer gotĀ voted for 2 times.

    Problem Solver:

    An expert who has answered 5 questions.

  • Contributor
  • 18 Answers

We need to first determine what type of WiFi device you have in your home because each has a little different method of creating security. It would be best to create a security code for your WiFi connection that way only the people you give the code to can have access. Keep in mind there are different types of security codes to deal with. The more basic types of security may be easier to decode by a "hacker" but allow the least amount of work by your own computer. Whereas, the more complex security means much more privacy for you but a little more work for your laptop.
There's also the suggestion of making your WiFi "name" something clever and non-guessable, connect your MacBook to it, save it as a preferred network and then disable the "radio" on your wireless router. this will allow your WiFi network to continue working, but it is not constantly broadcasting your network name to your neighbors. They will now need the actual NAME of your network PLUS the security code you've enabled.
Many remote support technology companies, including me, are able to use your Internet connection to connect to your computer and then secure and configure your WiFi device for you if you're not comfortable doing the things I've outlined.

Posted on Nov 15, 2009

Ad

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
Best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of.(from cars to computers, handyman, and even drones)
click here to download the app (for users in the US for now) and get all the help you need.
Goodluck!

Posted on Jan 02, 2017

Ad

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

Tip

How to Detect if Someone's Stealing Your WiFi


Detecting Wireless Piggybacking Okay, it's time to get down to it. Is your wireless network running slowly? Do you have intermittent losses in Internet access and you can't figure out why? Chances are, you've already detected a WiFi squatter and didn't even know it. If you regularly experience these problems, maybe you have something wrong with your wireless connection. But if you're suddenly having intermittent problems with your Internet performance, especially at the same time each day, it's a red flag that someone is piggybacking off your wireless connection and it's time for you to diagnose your WiFi network.
The first and simplest thing you can do is check out your wireless network connection and see if it's secure. When you install your router, you're given the option of setting a wireless encryption protocol (WEP) key. Basically this is a password-protected method for you to log on to your own wireless network. If you don't have one, you're operating an open network. That means anyone within range can use your wireless for free. While it's not hacking, it is debatable as to whether this is actually stealing. In any case, if you don't have a WEP key, you're vulnerable to WiFi squatting and certainly not deterring squatters.
Even if you have a WEP key, that doesn't necessarily mean your neighbor hasn't bypassed it. To determine if he or she is logging onto your wireless network, you can do so by checking your wireless network log. To do this, click your Start Menu in Microsoft Windows, then double-click My Network Places. Next, double-click View Entire Network. If there are more devices connected than you have allowed on your network, you have WiFi thieves.
A similar method to determining the status of your WiFi user list is to check your router's DHCP client table. Much like viewing your network, your DHCP client table will list the machines on your network. If the number exceeds what you've set up, you have someone stealing your WiFi.
Nobody wants to be taken advantage of. What's more, you certainly don't want illegal information flowing through your wireless network. That's why you need to take matters in your own hands. The final section will give you the power to thwart off Internet thieves and protect your wireless connection. Are you ready to fight back? Turn the page to learn how.
Stopping Digital Thieves A WEP key is an absolute must for any wireless network; however, even those are vulnerable. While WEP protection will stop the guy parking in front of your house, it may not stop a more determined user like your neighbor. In that case, you can use a security protocol such as WiFi protected access (WPA). This route is more secure but can still be hacked by a determined WiFi thief.
You can also use manual DHCP assignment. To do this, simply set your router's DHCP to the manual setting and enter in each of your computer's physical addresses. This will restrict your network to allow only those computers recognized by the router.
If the manual DHCP route isn't comfortable for your level of computer expertise, you may want to consider generating a MAC access list which usually can be created through the browser interface of the router. Unfortunately, MAC address lists can also be bypassed by savvy WiFi thieves; nevertheless, when used in conjunction with other security methods, they're probably enough on a small home network.
Internet monitoring software is also a viable option. Monitoring software will walk you through some of these methods and is user friendly for those who aren't as comfortable setting up wireless security methods. In addition, monitoring software makes it easy to see what is going on with your wireless connection. Your WiFi router may have some built-in software that will help you monitor your network. Explore the user guide and help section to see if there's a built-in application that will help.
Finally, turn off your router's SSID broadcasting. This effectively makes your network invisible. It's much harder to steal WiFi from a network that doesn't appear on anyone's radar.
Next time you suspect WiFi theft, peek out the front window and see if an unfamiliar car is parked in front of or close to your home. If so, you'll probably find someone in the car sapping your Internet. It sounds simple, but it could be just that easy to determine if someone is stealing your WiFi.

on Dec 27, 2009 | Computers & Internet

1 Answer

How do i know if someone in my home is stealing my internet?


Log into your home router and check the devices connected to your network. If you can't identify all the MAC addresses listed then someone may be connected to your network unlawfully. Kick them.

May 10, 2011 | Computers & Internet

1 Answer

Yes


NOTES
Facebook allows visitors to the network site to create accounts from which makes available social networking. The new account establishment phase requires providing petinent details to secure network spaces as belong to an entity. The new account holder is provided password to acuire accessisibility to the shared network spaces. Also, the username is provided with the password to identify the account holder as an entity from several entities on the network. Both usernames and passwords are required to logon into the facebook site to achieve vast experiences. Once loged in the facebook site, the account holder has the spaces available to store details from written texts, motion picture to videos as personal data collection banks. facebook members have the options of linking with several members with familier requirements eithe social friends establishments. For example, facebook provides the chat pages that first requires to invite persons that are on the facebook site to become chat consigns. Once invitation messages were acquired from the members that found interest, chat displays are acheivable where each member that recognoses the others users identifycations simply text messages to each others accounts. facebook also has the advertisemnt links that allows the members to gather resources on the network either as admiration logos or simply links that attaches to members site spaces to achieve effective networking browsing. Alternatelly, facebok allows networking spaces that has several functions. For example, the photo storage areas allows to place images of significant occasions for referencing by members found common either as friends, family or business associates. Also, eahc member on facebook has the video storage area to paste store and display motion pictures capable of live telecasts once acheived.

NOTES
Facebook is multimedia enabled network site requiring for computer systems to be provided with compartible components to achieve experiecnes. For example, recent computers have the builtin structure components to achieve audio, video multimedia experiences only requirng adjustments to suit the facebook requests. The several motion media displayed on facebook from various computers of various compartibilities may require to occasionaly install requisite programs to achieve viewer experience. Also, the several media types displayeable on the facebook sites maybe found least displayble on computers that have been regulated to least display unfamiliar media due to malware situations or privacy conditions. Once facebook, the social networking capacities becomes bountiful only requirng regular updates and adjustments to the systems display features to achievd experiences.

Feb 04, 2011 | Facebook Social Network

1 Answer

I find that I have an available network with a good signal, however my system will not connect.


Hi, unless it is your network, you should not be connecting to it.
But the reason you can't is because you can see it doesn't mean you can connect to it because of the security, unless you know the WPA Passphrase key you cannot connect.
Now if it is your own network you will have to log on to your router to find out and alter any settings yourself.
But if you are trying to hack into a network, it is very illegal and could/will land you in a lot of trouble if you were caught.
You wouldn't like it if someone connected to your network and decided to use your internet and may be even watch what you were buying and steal your credit card details
But at the end of the day don't worry if you can see another network, all it means is that there router is broadcasting there name, which can be turned off in the router settings.
If it is to connect to your network, i will gladly help you out.

Sorry to go on.

Regards - Anthony

Jan 30, 2010 | Computers & Internet

1 Answer

LG km710 NETWORK PROBLEM


hi, thanks for links, but I didnt find anything..phone is actually already unlocked, problem is only with network..but there are some stuff in menu connected with t-mobile, my home network, like, there is an icon for t-mobile internet and so..so I guess it was able to recognise a sim card, but on display there is still "no network" instead of t-mobile..:(

Sep 16, 2009 | LG KM710 Cell Phone

3 Answers

Network key


Its like a password thats needed to connect to a wireless connection, this is only needed if you have a wireless connection

Jan 14, 2009 | Dell Inspiron 1150 Notebook

1 Answer

Wireless, someone stealing it


You should set up one of the wireless security methods supported by your router. By using WEP or WPA security, you can encrypt the communication between your computer and the router so no one else will have access to it. The users manual and setup software that came with your router should be able to guide you through this process.

Even after you set up the security features on your router, your computer will still be aware of other nearby networks...they will show up in your list of available networks...but outsiders will not be able to access your computer or router.

Good luck...and I hope this is helpful!

Jan 12, 2008 | Compex NetPassage 26G / iWavePort WLU54G...

2 Answers

Hi, I need Someones help with my xbox live


i read that xbox live was going to be down tonight for maitenence
so thats probably it

Nov 13, 2007 | Microsoft Xbox 360 Console

4 Answers

Failing network


you cannot enane your network if its failing to connect unless you install your own cell Sorry man

May 12, 2006 | Nokia 2115i

Not finding what you are looking for?
Apple MacBook Pro Laptop Computer with Intel Duo Core 15.4 Inch PC Notebook Logo

91 people viewed this question

Ask a Question

Usually answered in minutes!

Top Apple Computers & Internet Experts

Paul Carew

Level 3 Expert

2584 Answers

Martin Buck
Martin Buck

Level 2 Expert

85 Answers

Paul Bade

Level 3 Expert

1583 Answers

Are you an Apple Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...