I despise a burglar... wireless intruder
I despise a burglar... wireless intruder
I located what appears to be the MAC address for the extender and marked it with a BAN label after enabling MAC filtering. (It’s curious how they keep “Approved” and “Blocked Devices” options.) Keep in mind, I need to turn off WPS.
MAC filtering is active. It seems I'll be safe until spoofing becomes an issue.
In the United States, accessing WiFi without authorization is against the law, even if it's not often enforced.
MAC filtering offers little benefit. Turn off WPS since it introduces risks that may reveal WPA credentials. What challenges are you encountering with the new password setup?
It varies by location within the United States regarding piggybacking practices. The legality depends on state regulations, and federal charges arise only when data is stolen. Each state sets its own rules and enforces them independently. When enforcement guidelines aren't consistent (some areas lack clear definitions), it becomes difficult to identify responsible parties. Many local agencies view piggybacking as a non-harmful offense, which reduces their focus on prosecuting it. Internet service providers tend to take action more seriously because such activities can lead to financial losses, encouraging them to report WiFi theft more effectively.
It would help to know the brand and model of the device so we can provide better support. First, connect your modem using a WIRED connection—not wireless. If you have the original factory password for the modem or router, perform a factory reset. This will erase any existing credentials. After resetting, immediately set a new password. Since these individuals often linger around your home without much activity, act swiftly; they’ll likely follow once they realize their Wi-Fi access is gone. Once the password is updated, disable WPS and enable MAC address filtering, blocking all non-authorized devices. Remove any stickers with login details, even if you changed the password—this reduces their ability to attempt entry. If you encounter them unexpectedly, a firm end table can be effective. This approach should prevent further access attempts. People like this need to be addressed and prevented.
Apologies for the delay. They were correct when I was making adjustments. After starting the "extender," I stopped noticing new devices (once I began using it, I saved their MAC addresses to the blocked list). With MAC filtering active, it prevents me from changing passwords (though it states it can't use WPA with MAC filtering enabled). I think the simplest solution is to switch to a wired connection, which I would really like to do. The modem model is a PACE 5268AC FXN. There are individuals across various backgrounds and careers who are willing to help with fixes.