Skip to main content

How to Find Who is Connected to Your WiFi Network

WPA and WPA2 security protocols that is used to protect WiFi networks are extremely robust. These protections, in theory, prevent hackers and unauthorized people from gaining access to wireless network or viewing traffic sent over them, provided the end users chooses strong passwords. But new hardware and modern techniques have made password cracking within an acceptable timeframe a possibility. For instance, a PC running a single AMD Radeon HD7970 GPU can try on average an astounding 8.2 billion password combinations each second, depending on the algorithm used to scramble them. For those who can’t afford $500 GPUs, there are services such as Cloud Cracker where anybody can get a WiFi password cracked for just $17 and under an hour. Our passwords were never been so vulnerable.

So how do you know if your password is compromised, or whether your neighbour is stealing your WiFi? Try out these two tools.

Wireless Network Watcher

Wireless Network Watcher is a small utility from Nirsoft that scans your wireless network and displays the list of all computers and devices that are currently connected to your network. For every computer or device that is connected to your network, the software provides the IP address, MAC address, the company that manufactured the network card, and optionally the computer name.

wireless-network-watcher

You can also export the connected devices list into html/xml/csv/text file, or copy the list to the clipboard and then paste into Excel or other spreadsheet application.

There is an option to make Wireless Network Watcher periodically perform background scans to see if any new devices have joined the network. If new devices are found the software will sound a short beep to alert the user.

SoftPerfect WiFi Guard

This is another free application that scans your WiFi network at regular intervals pinging IP addresses for replies. If a connected device is found the programs alerts the user of the intruder. If the device is known to you, there is an option to mark it so. This way the program won’t alert you when it finds the device in future.

SoftPerfect WiFi Guard provides less information than Wireless Network Watcher about connected devices but is enough for most purposes.

softperfect-wifi-guard

Comments

Popular posts from this blog

How to Record CPU and Memory Usage Over Time in Windows?

Whenever the computer is lagging or some application is taking too long to respond, we usually fire up task manager and look under the Performance tab or under Processes to check on processor utilization or the amount of free memory available. The task manager is ideal for real-time analysis of CPU and memory utilization. It even displays a short history of CPU utilization in the form of a graph. You get a small time-window, about 30 seconds or so, depending on how large the viewing area is.

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

Diagram 101: Different Types of Diagrams and When To Use Them

Diagrams are a great way to visualize information and convey meaning. The problem is that there’s too many different types of diagrams, so it can be hard to know which ones you should use in any given situation. To help you out, we’ve created this diagram that lays out the 7 most common types of diagrams and when they’re best used: