If you notice that your Internet connection is slower than usual, unstable, or not working as usual, It is possible that someone is stealing your WiFi.
If you notice that your Internet connection is slower than usual, unstable, or not working as usual, It is possible that someone is stealing your WiFi.
Once you access the settings, look for the section Wireless network o WiFi. In this section you will find a list of all the devices that are connected to your network. If you see one you don’t recognize, it may be an intruder.
Once identified, it is time to take measures to expel them once and for all, and here we share three foolproof methods to do so.
Change your WiFi password
To protect your connection from intruders, we recommend changing your network password regularly. This is the safest method, but above all effective.
If you have already detected someone who connected without your permission, changing the password will prevent them from doing so again. To do so, follow these steps:
- Enter the Router configuration.
- Locate the section Wireless network o WiFi.
- Look for the option Change password and write it in the corresponding fields.
- The name of the options varies from one router to another.
- Finally, save the changes.
Filter the MAC address
Another way of restrict access to your WiFi network is to use MAC filtering. This feature allows you to select which devices can connect to your wireless network, based on their unique identifier called MAC address.
To configure this feature, do the following:
- Within the configuration of your router go to the section Settings and select WiFi MAC Filterthe name may vary, but basically it is something similar.
- Enable the filter MAC addresses.
- In Device name There will be a list with all the devices connected to your network, and the MAC address will appear among them.
- Write the MAC address of the device you want to block in the indicated space.
- Save the changes.
Remove the WiFi network from the intruder’s device
This is the most complicated step of all, but just as effective. If you have access to the intruder’s device, you can wipe his computer’s network, this way he will need the password to connect again.