F5F Stay Refreshed Power Users Networks I despise a burglar... wireless intruder

I despise a burglar... wireless intruder

I despise a burglar... wireless intruder

Pages (3): Previous 1 2 3 Next
P
PAT_Oliwier
Junior Member
41
03-09-2020, 03:36 PM
#11
I located what appears to be the MAC address for the extender and marked it with a BAN label after enabling MAC filtering. (It’s curious how they keep “Approved” and “Blocked Devices” options.) Keep in mind, I need to turn off WPS.
P
PAT_Oliwier
03-09-2020, 03:36 PM #11

I located what appears to be the MAC address for the extender and marked it with a BAN label after enabling MAC filtering. (It’s curious how they keep “Approved” and “Blocked Devices” options.) Keep in mind, I need to turn off WPS.

M
mr_siko_games
Member
185
03-09-2020, 09:59 PM
#12
MAC filtering is active. It seems I'll be safe until spoofing becomes an issue.
M
mr_siko_games
03-09-2020, 09:59 PM #12

MAC filtering is active. It seems I'll be safe until spoofing becomes an issue.

B
BjornIronMan
Junior Member
48
03-10-2020, 12:28 AM
#13
In the United States, accessing WiFi without authorization is against the law, even if it's not often enforced.
B
BjornIronMan
03-10-2020, 12:28 AM #13

In the United States, accessing WiFi without authorization is against the law, even if it's not often enforced.

X
xSuperfly1
Junior Member
20
03-10-2020, 04:37 AM
#14
MAC filtering offers little benefit. Turn off WPS since it introduces risks that may reveal WPA credentials. What challenges are you encountering with the new password setup?
X
xSuperfly1
03-10-2020, 04:37 AM #14

MAC filtering offers little benefit. Turn off WPS since it introduces risks that may reveal WPA credentials. What challenges are you encountering with the new password setup?

B
Brek_
Member
249
03-13-2020, 04:28 PM
#15
It varies by location within the United States regarding piggybacking practices. The legality depends on state regulations, and federal charges arise only when data is stolen. Each state sets its own rules and enforces them independently. When enforcement guidelines aren't consistent (some areas lack clear definitions), it becomes difficult to identify responsible parties. Many local agencies view piggybacking as a non-harmful offense, which reduces their focus on prosecuting it. Internet service providers tend to take action more seriously because such activities can lead to financial losses, encouraging them to report WiFi theft more effectively.
B
Brek_
03-13-2020, 04:28 PM #15

It varies by location within the United States regarding piggybacking practices. The legality depends on state regulations, and federal charges arise only when data is stolen. Each state sets its own rules and enforces them independently. When enforcement guidelines aren't consistent (some areas lack clear definitions), it becomes difficult to identify responsible parties. Many local agencies view piggybacking as a non-harmful offense, which reduces their focus on prosecuting it. Internet service providers tend to take action more seriously because such activities can lead to financial losses, encouraging them to report WiFi theft more effectively.

A
AlongCameBen
Member
68
03-18-2020, 04:54 AM
#16
It would help to know the brand and model of the device so we can provide better support. First, connect your modem using a WIRED connection—not wireless. If you have the original factory password for the modem or router, perform a factory reset. This will erase any existing credentials. After resetting, immediately set a new password. Since these individuals often linger around your home without much activity, act swiftly; they’ll likely follow once they realize their Wi-Fi access is gone. Once the password is updated, disable WPS and enable MAC address filtering, blocking all non-authorized devices. Remove any stickers with login details, even if you changed the password—this reduces their ability to attempt entry. If you encounter them unexpectedly, a firm end table can be effective. This approach should prevent further access attempts. People like this need to be addressed and prevented.
A
AlongCameBen
03-18-2020, 04:54 AM #16

It would help to know the brand and model of the device so we can provide better support. First, connect your modem using a WIRED connection—not wireless. If you have the original factory password for the modem or router, perform a factory reset. This will erase any existing credentials. After resetting, immediately set a new password. Since these individuals often linger around your home without much activity, act swiftly; they’ll likely follow once they realize their Wi-Fi access is gone. Once the password is updated, disable WPS and enable MAC address filtering, blocking all non-authorized devices. Remove any stickers with login details, even if you changed the password—this reduces their ability to attempt entry. If you encounter them unexpectedly, a firm end table can be effective. This approach should prevent further access attempts. People like this need to be addressed and prevented.

G
Gotten75
Member
129
03-18-2020, 11:32 AM
#17
macchanger -a vi:ct:im:ma:cl:ol wlan0 Bypassed. MAC addresses are visible in plain text and can be easily detected.
G
Gotten75
03-18-2020, 11:32 AM #17

macchanger -a vi:ct:im:ma:cl:ol wlan0 Bypassed. MAC addresses are visible in plain text and can be easily detected.

M
maisymoon
Member
223
03-19-2020, 12:36 PM
#18
The simplest method to disrupt their access is to connect your network and turn off Wi-Fi.
M
maisymoon
03-19-2020, 12:36 PM #18

The simplest method to disrupt their access is to connect your network and turn off Wi-Fi.

S
Sannetjhuuux
Senior Member
257
03-21-2020, 11:43 PM
#19
You can simply do it right and keep the ease.
S
Sannetjhuuux
03-21-2020, 11:43 PM #19

You can simply do it right and keep the ease.

J
JR_GAMER07
Posting Freak
915
03-22-2020, 12:59 AM
#20
Apologies for the delay. They were correct when I was making adjustments. After starting the "extender," I stopped noticing new devices (once I began using it, I saved their MAC addresses to the blocked list). With MAC filtering active, it prevents me from changing passwords (though it states it can't use WPA with MAC filtering enabled). I think the simplest solution is to switch to a wired connection, which I would really like to do. The modem model is a PACE 5268AC FXN. There are individuals across various backgrounds and careers who are willing to help with fixes.
J
JR_GAMER07
03-22-2020, 12:59 AM #20

Apologies for the delay. They were correct when I was making adjustments. After starting the "extender," I stopped noticing new devices (once I began using it, I saved their MAC addresses to the blocked list). With MAC filtering active, it prevents me from changing passwords (though it states it can't use WPA with MAC filtering enabled). I think the simplest solution is to switch to a wired connection, which I would really like to do. The modem model is a PACE 5268AC FXN. There are individuals across various backgrounds and careers who are willing to help with fixes.

Pages (3): Previous 1 2 3 Next