Thursday, April 9, 21:22
Home dummies How to Remove Spam From Your Wi-Fi

How to Remove Spam From Your Wi-Fi

If you give someone your Wi-Fi password then it has unlimited access and can also access your network with all its devices. Today we will see how we can exclude him after his legal visit.

Did your neighbor ask for the Wi-Fi code to make an emergency connection while his own was broken? Did you share your password with your visitors to send a photo or just connect to the internet? In such a request, for the sake of courtesy, you cannot refuse to provide your Wi-Fi code to anyone who requests it in person.

But what happens after your visitor leaves or generally when the need to have a third party disappears? If you do nothing it will be able to use your network each time it is near you or even be able to share it online.

There are several applications for mobile phones in which anyone can sign up for a network password, for the benefit of everyone who has downloaded this application. If any of you own one, you will find that passwords from home Wi-Fi are also circulating in the list of nearby known networks.

- Advertisement -

So let's see what you can and should do.

Option 1: Change the Wi-Fi code
The easiest and safest method. Just change the Wi-Fi network password on your router. This will forcibly disconnect all devices from your Wi-Fi network, even yours. You'll need to reconnect to the Wi-Fi network by entering the new password on all your devices. Anyone who doesn't have your new password won't be able to sign in.

Let's be honest: If you have multiple devices, reconnecting them will be painful. But it's also the only real, dumb method that works. Even if you blacklist your device for a router so that it can't reconnect, having a Wi-Fi password could connect to a new device. And, even if you don't remember your password, there are ways to recover stored Wi-Fi passwords on Windows computers, even on smartphones. In particular, Xiaomi phones exchange Wi-Fi codes without accessing the root of the device, simply by means of a QR code.

To change the password, you need to access your router's configuration settings, usually through a browser. When connected, you can change the name of your Wi-Fi network even if you are already in it.

The way you connect to your router's settings, as well as the password reset menu, are fundamentally different for each brand and model of router. And to find out how to connect to your router, the best thing to do is read the official manufacturer's instructions. Look in the instructions for a section called "Wireless" or "Wi-Fi" or something similar. Alternatively you can do a Google search for these instructions. There are usually up to illustrative videos.

Of course, all this assumes that you have set a router password! When you access it, make sure that you have Secure Encryption (WPA2) enabled and that you have set a strong password. If you leave it unencrypted, that is, if it is an open Wi-Fi network, anyone can connect.

RELEVANT: How many types of Wi-Fi are there.

Option 2: Use MAC Address Filtering on your Router
Some routers have access control features that can manage which devices are allowed to connect. Each wireless device has a unique MAC address. Some routers allow you to have a "black list" (ban list) that can contain one or more MAC addresses. Some routers allow you to set a "white list" of approved devices and thus prevent all other devices from being connected.


Not all routers have this option. Even if you can use it, it is not completely safe. Someone with a Wi-Fi password can change the MAC address of their device to match an approved one (even if you have a whitelist).

For all these reasons, we recommend that you do not use MAC address filtering.

But, if you just want to temporarily throw out a device, for example your children's device, and don't worry if they eventually manage to overcome the blockage, this could be a good method.

You will need to look in your router settings to see if it supports this. For example, on some Netgear routers, this is called “wireless card access list”(Wireless card access list). To other Netgear routers like the Nighthawk, the access control feature enables Wi-Fi connectivity and simply blocks internet access.

Each router brand has its own menu and capabilities, so you should consult its official utility.

RELEVANT: Secure your Wi-Fi: Measures and countermeasures for everyone

Option 3: Use a Guest Network
If you need to give a visitor access to your Wi-Fi network, you can make this process much easier for you by creating a Wi-Fi visitor network on your router. The visitor network is a separate access network. For example, you could have a "Home Base" network and another one called "Home Base - Guest". You will not give your visitors access to your main network.

Many routers offer this feature by calling it as a "guest network" or "guest access" in their settings. Your visitor network may have a separate password. If you need to change it, you can simply change the network visitor password without changing your master network password and disconnecting your own devices.

Visitor networks can often be "isolated" from your main network. Visitor devices will not have access to shared files on your computers or other resources connected to the network.

Once again, you will need to look at your router settings to see if it has a "guest" feature. However, guest networks are much more common on routers than black or white access control lists.

If you can access the device that is connected to your Wi-Fi
In the unlikely event that you have access to someone's device that has not set a password or cannot stop you, you can remove the saved password. For example, you can tell an iPhone to forget the network or erase the saved Wi-Fi code.

We understand that accessing data on a device requires first of all its user not to know how to protect it and so may not even be able to know how to reconnect to your Wi-Fi. On the other hand, it requires you to be very good at either hacking techniques or your router capabilities, so you don't even read us, since this article is aimed at dummies.

Apps that block people from Wi-Fi
Search the web for this topic and you'll discover various users recommending software such as Netcut or JamWifi, which can send packets to other devices that are connected to your Wi-Fi network, telling them to disconnect.

These software tools basically perform a Wi-Fi license removal attack, requiring the device's Wi-Fi to restart.

This is not a serious solution. Even after a device is banned, the device will still try to connect. This is why some tools can continuously send "deauth" packages if you turn on your computer.

It is not a logical and sure way to permanently remove someone from your network and force them to stay disconnected forever.

In a world without fences and walls, who needs Gates and Windows


Please enter your comment!
Please enter your name here


loopfs: Could it be the new Linux file system?

Linux supports several file systems, such as EXT4, F2FS, Btrfs and XFS. These systems are sufficient when ...

Research: Teenagers prefer iPhones to Samsung phones

According to research conducted every six months in order to record the habits of teenagers, young people do not choose Samsung phones ....

Bill Gates: Schools open in the fall and the economy collapses

Bill Gates believes schools will be able to open in the fall, he told Becky Quick on CNBC.

OTE Group Telecommunications Museum: Educational programs and entertainment activities from home for children aged 4-12 and the whole family

Educational programs and entertainment activities for children and families, in which they can participate from home, are offered by the Group's Telecommunications Museum ...

Microsoft: The April 2020 update for Office has been released

Microsoft released the non-security updates of April 2020 for Microsoft Office, which include corrections for errors as well as improvements ...

Tesla's new Cheetah mode offers top performance

The new Cheetah mode in the Tesla S model pushes the electric car from 0 to 100 km / h faster than ...

Tails 4.5: The new, safer version has been released!

Tails 4.5: The new, safer version has been released - Tails, is a live operating system based on ...

Windows 10 feature helps to delete useless files and apps

Windows 10 will make it easier to delete useless files and apps by displaying them in a list.

Cloudflare: Stops using Google's reCAPTCHA!

Cloudflare has announced that it will stop using Google's reCAPTCHA and switch to a new bot detector that ...

Google Stadia Pro is available for free for two months! Time for video games!

The situation we are experiencing lately due to corona, is one of the most difficult situations of ...