Click here to print this page

Planning Retirement Online


Knowhow - IT and Technology Help

Knowhow is the award-winning end-to-end services brand supporting Currys PC World. Knowhow strives to better serve customers throughout the lifetime of their products and to help them get the best from their technology. Services include delivery and installation, set-up, repairs and protect.

This article series will be introducing new technologies as well as helping us enjoy and make the most of new products for years to come.

Knowhow No. 15

We all want to keep our home network safe, and the last thing we want is to discover somebody has connected and is stealing our bandwidth. The trouble is, it's not always easy to tell who's using our Wi-Fi or how we can work out how to give intruders the boot.

If you suspect someone is using your wireless internet signal without your permission, here's a simple guide to shutting down their connection.

Wireless Piggybacking – Detecting if someone else is connected to your network

The Knowhow

Wireless Piggybacking is the unauthorised use of someone else's Wi-Fi network. If someone is piggybacking on your connection, you may notice symptoms such as a slow internet connection, or frequent activity from the modem even when nobody in your home is using the network.

Some people may not be bothered by this, but you do run the risk of an unauthorised user downloading illegal material on your connection. This could cause you problems as the activity will appear to have originated from your internet address.

Spotting if someone is connected to your network isn't always obvious, although you can purchase special internet monitoring software that allows you to easily identify everything using your Wi-Fi signal.
You can view what's on your network in Windows by selecting Start, then clicking Settings, choosing Network ConnectionsMy Network Places then View Entire Network.

This will show you every device connected, but it may be hard to tell what is what as they're likely to be sorted by their internet address rather than a clear name. If you count the number of connected devices you expect to see and find there are more on the list, you may have someone piggybacking.

Securing your network
The easiest way to stop people stealing your Wi-Fi signal is to password protect it.

  • In the run section of the start menu, type cmd and press enter. A box will appear. Type ipconfigand press enter.
  • Look for the line that says Default Gateway. There will be a number next to it - make a note of this. It's likely to be or
  • Make a note of this number and then open your internet browser. Type this number directly into the address bar and press return. This will open your router's control panel.

You may need to enter a username and password. If you've never changed this and don't know what it is, it may appear in the router-s instruction book. You can also find it by entering the device's brand into the following website and looking for your model number.
Please note: the following suggestions provide the best compatibility with other wireless devices, not the optimal security settings. This is because many current devices cannot operate with more advanced security features. The level of security given here will block your system to most unauthorised users and should be enough for the average home.

  • The exact menu and option screen will differ according to the make of router. Your router's instruction booklet will give you more exact details on where each feature mentioned in this guide is located.
  • Using the administration tools, first change the username and password. This prevents someone else from altering your settings.
  • Find the section that allows you to change the SSID (Network name). Alter this to something that makes sense to you, but not something that clearly identifies where your system is located. Don't ever use your address or surname.
  • Activate a wireless security mode. At the very least, you should use WEP. This provides a basic level of protection, but most other wireless devices are compatible with it. WPA or WPA2 are more advanced, but you may find you need to "downgrade" in order to allow all your other wireless gadgets access to the network.
  • Set a password or "key" for the wireless security. You will need to enter this onto your other devices when they next connect to the network. Any time you need to add anything to your Wi-Fi connection, use this password.
  • Save your settings and your network is now protected. You can change your settings any time you want to by following the above steps again. If you ever suspect someone has guessed your security password, change it as soon as possible.

Back to Laterlife Interest Index


Bookmark This Share on Facebook Receive more like this


Latest Articles:

Gene therapy - the future of our health

scientist in lab

Gene therapy is hugely exciting. Whether it will fulfil its promise and in future years produce terrific treatments for many health problems we don’t know but at the moment, although still in its early stages, the results are very encouraging.


Art Masterclass
Spring Flowers

Step by step guide to creating a beautiful spring flowers landscape.


Listen free to uplifting joyous birdsong

Turtle dove

It is great news that we can now all enjoy natural birdsong at any time of day and night thanks to a new birdsong audio that the RSPB have put together.


Win great prizes in our current Competitions

Silver Travel

Click here to visit the competitions page.

Article Archive

The LaterLife Article Archive provides a comprehensive list of links, to all the current regular article series' as well as quick links to older articles.
Back to LaterLife Today

Visit our Pre-retirement Courses section here on laterlife or our dedicated Retirement Courses site


Advertise on