DATA DOCTORS

How to find out if anyone else is connecting to your Wi-Fi

Aug 15, 2020, 4:05 AM
(Piqsels Photo)...
(Piqsels Photo)
(Piqsels Photo)

Q: Is there a simple way to see what is connected to my wireless network?

A: Making sure that unauthorized devices aren’t connecting to your Wi-Fi network is an essential process to ensure your network is secure.

If an outsider gains access to your Wi-Fi network, they can potentially gain access to your devices and the sensitive data stored on them, but there are a variety of ways to see what’s connecting.

Router control panel

The best way to see what’s connecting to your network is through the admin interface that’s built into every router.

In order to use it, you’ll need the admin username and password, which on most newer routers is printed on a label on the router itself.

Many routers also offer mobile apps that you can install on your smartphone to access and manage it.

If you have an older router, you can look up the default username and password for just about any brand and model as long as no one has changed it from the default.

As a last resort, you can use the physical reset option for your router to return everything to factory defaults.

This process is usually executed by using a paperclip to push a small button in a pinhole on the router that is generally labeled as “Reset.”

You can also do a Google search for “factory reset (brand and model)” for the exact instructions for your router.

Once you’ve gained access to the settings interface, you should see an option for “Attached Devices,” which will list out every device connected to the router.

The information listed may seem a bit confusing, but if you click on each item, the additional details will help you determine what the device is and whether it’s one of yours or not.

A less technical option

If you weren’t able to find an app for your router or couldn’t access it through the admin portal, you can use the Fing app or desktop program to see what’s on your network.

Once you have the app installed, make sure your device is connected to your Wi-Fi network, then run a scan to produce a list of connected devices.

A simple way to see if you should be concerned about an unauthorized device is by counting the number of devices you know are connecting – including the router itself – and compare it to the list.

You can drill down on each device to get helpful information such as the brand of the device, the operating system that it’s running and how long it’s been connected to your network.

If you can’t figure out what something is, go to the “Network details” section and look for the Mac vendor entry.

If you do a Google search using the Mac vendor information, you should be able to find the products that the company makes and whether it’s one of yours or not.

Needless to say, if you determine that an unauthorized device has connected to your network, make sure you change the Wi-Fi password in your router and reconnect all your devices with the new password.

Data Doctors

...
Ken Colburn, Data Doctors

Here are some tips on how to speed up slow starting computers

Here are some ways you can identify and solve potential issues that may be causing your computer to start up slower than normal.
6 days ago
(AP Photo/Jenny Kane, File)...
Data Doctors

An explanation of how new credit cards have information stolen

If you've ever wondered how people can crack a new credit card, here's a rundown and a brief explanation on what thieves could be doing.
13 days ago
(Pexels Photo)...
Ken Colburn, Data Doctors

Here are the differences between Google Chrome and Microsoft Edge

Half of the United States uses Google Chrome as a default browser, but here are the key differences between Chrome and Microsoft Edge.
20 days ago
(Pexels Photo)...
Data Doctors

Tips on how and when to use the iPhone screen recording feature

Here are some tips on when and how to use the the screen recording feature located on the dropdown bar on your iPhone.
27 days ago
In this photo illustration a spam 'Phishing' email is displayed on a laptop screen on March 21,2022...
Data Doctors

Tips and tools to detect and avoid computer phishing scams

Far and away, the method of choice for compromising users is through sophisticated phishing messages in email, via text messaging and through social media accounts.
1 month ago
(Pexels Photo)...
Data Doctors

Tips for helping the elderly spot and avoid phishing emails

Here are things you should look out for and avoid if you are helping someone detect phishing emails on their mobile devices.
1 month ago

Sponsored Articles

(Desert Institute for Spine Care photo)...
DESERT INSTITUTE FOR SPINE CARE

Why DISC is world renowned for back and neck pain treatments

Fifty percent of Americans and 90% of people at least 50 years old have some level of degenerative disc disease.
...
Quantum Fiber

How high-speed fiber internet can improve everyday life

Quantum Fiber supplies unlimited data with speeds up to 940 mbps, enough to share 4K videos with coworkers 20 times faster than a cable.
...
Children’s Cancer Network

Children’s Cancer Network celebrates cancer-fighting superheroes, raises funds during September’s Childhood Cancer Awareness Month

Jace Hyduchak was like most other kids in his kindergarten class: He loved to play basketball, dress up like his favorite superheroes and jump as high as his pint-sized body would take him on his backyard trampoline.
How to find out if anyone else is connecting to your Wi-Fi