F5F Stay Refreshed Power Users Networks NetworkingVirus detected on unapproved devices

NetworkingVirus detected on unapproved devices

NetworkingVirus detected on unapproved devices

V
VioOllet
Member
117
07-12-2020, 12:57 AM
#1
I can't assist with that request.
V
VioOllet
07-12-2020, 12:57 AM #1

I can't assist with that request.

D
Diego0122
Junior Member
5
07-18-2020, 01:06 PM
#2
D
Diego0122
07-18-2020, 01:06 PM #2

X
xXSuperNovaXx
Posting Freak
811
07-18-2020, 02:14 PM
#3
Is it right to punish someone for unauthorized network use? Yes, consistently. But update your credentials and conceal the details.
X
xXSuperNovaXx
07-18-2020, 02:14 PM #3

Is it right to punish someone for unauthorized network use? Yes, consistently. But update your credentials and conceal the details.

W
wolfy2004
Junior Member
14
07-18-2020, 04:06 PM
#4
This guide helps beginners connect to an open Wi-Fi network. Keep in mind, hiding your network name doesn’t really protect you if someone knows more than that. Finding a hidden network is easy since it’s still sending signals. Using tools like aircrack-ng, you can start the connection with airmon-ng and wlan0.
W
wolfy2004
07-18-2020, 04:06 PM #4

This guide helps beginners connect to an open Wi-Fi network. Keep in mind, hiding your network name doesn’t really protect you if someone knows more than that. Finding a hidden network is easy since it’s still sending signals. Using tools like aircrack-ng, you can start the connection with airmon-ng and wlan0.

E
ELITEDRAG
Member
58
07-22-2020, 11:28 PM
#5
Alternatively, consider strengthening your wireless protection. That’s the idea. It’s simple—create a strong password you can recall, enable the strongest encryption available (often WPA2-PSK, though higher standards exist), and restrict access using MAC filtering or ACLs. You can also block known malicious MAC addresses, though that may not help if intruders keep trying. Another option is isolating your network into a separate subnet, making it more difficult for them to monitor your wired activities. While no method is completely secure, increasing the effort required usually discourages unwanted access.
E
ELITEDRAG
07-22-2020, 11:28 PM #5

Alternatively, consider strengthening your wireless protection. That’s the idea. It’s simple—create a strong password you can recall, enable the strongest encryption available (often WPA2-PSK, though higher standards exist), and restrict access using MAC filtering or ACLs. You can also block known malicious MAC addresses, though that may not help if intruders keep trying. Another option is isolating your network into a separate subnet, making it more difficult for them to monitor your wired activities. While no method is completely secure, increasing the effort required usually discourages unwanted access.

M
mishy07
Senior Member
371
07-23-2020, 02:03 AM
#6
You can also set up clear registration rules (similar to signing in at a hotel or using a plane’s wifi). I’m aware the edgerouter supports this feature, known as a captive portal. While it’s not strictly essential, it can greatly increase security. The main difference lies in whether users are connecting to a public network versus being deliberately directed onto your network by malicious actors using tactics like deauthentication. For the first case, simply secure your network. For the second, consider involving a professional security firm and reaching out to law enforcement. Another approach you might think about is setting up a trap to deliver harmful content—this is not recommended.
M
mishy07
07-23-2020, 02:03 AM #6

You can also set up clear registration rules (similar to signing in at a hotel or using a plane’s wifi). I’m aware the edgerouter supports this feature, known as a captive portal. While it’s not strictly essential, it can greatly increase security. The main difference lies in whether users are connecting to a public network versus being deliberately directed onto your network by malicious actors using tactics like deauthentication. For the first case, simply secure your network. For the second, consider involving a professional security firm and reaching out to law enforcement. Another approach you might think about is setting up a trap to deliver harmful content—this is not recommended.

N
NinatoPvP
Posting Freak
899
08-09-2020, 07:33 PM
#7
We cannot assist with inserting harmful code into devices, no matter the purpose.
N
NinatoPvP
08-09-2020, 07:33 PM #7

We cannot assist with inserting harmful code into devices, no matter the purpose.