Detecting Wireless Piggybacking
With WPA2 security enabled, it's unlikely anyone will ever piggyback on your network. But there's an easy way to spot squatters: Since every device connected to your network has a unique IP address and MAC address, you can easily see a list of connected devices -- often listed as "clients" -- on one of the settings pages for your wireless router. Many devices broadcast an ID because they've been named by their owners, so if you see "John's Laptop" connected to your network and you don't have a John in the house, you've found trouble! Even if a device doesn't show a name in the router's client list, you can count the number of devices connected and compare to the number of devices you know should be there to see if the numbers are off.
Want to make absolutely sure no one's going to figure out your password and worm their way onto your network? You have a few options. Your router can hide its SSID, meaning it won't show up for anyone searching for connectable networks. The address will have to be entered manually. You can also set up a wireless MAC filter to "whitelist" devices you own, disabling access for anyone else. Of course, this makes it a bit tougher for welcome guests, such as friends, to get online at your house.
Internet monitoring software is also an option. For example, free utility AirSnare will alert you when unfamiliar MAC addresses log onto your network. But with a secure connection, you shouldn't have to worry about that. The truth is, WiFi is not a precious commodity like it once was. You can get it at practically any coffee shop. Millions of us carry around smartphones with always-on data connections. To some degree, that makes WiFi access a faster, cheaper option of Internet access, but it's not always the most convenient one.
As long as your network is passworded, only a hacker using specialized software is going to get past your security. Technology site Ars Technica has detailed how a $2500 program called Silica can be used in conjunction with Web sites containing dictionaries of millions of words to connect to a secured network and crack its password [source: Ars Technica]. But there's still an easy way to stop even serious hackers in their tracks: Use a better password. The longer and harder to guess, the safer your network will be.
With a strong password, you shouldn't ever have to worry about keeping tabs on who connects to your network. Piggybackers will have to find someone else to mooch off of.
Smartphones changed everything, didn't they? A few short years ago, we hoarded WiFi like a precious commodity. Your neighbors might steal it! Criminals might park outside your house and download illegal files on your network! Sounds horrifying, doesn't it? Well, once we got smartphones with omnipresent data connections, we calmed down a bit. WiFi is now so ubiquitous that you don't have to worry too much about you neighbors leeching off of you -- they've probably got WiFi, too. We don't need to find hotspots when we've got 3G and 4G on our phones. Updating this article, it was amazing to see how much our Internet access has changed in a few short years. And wireless security is a lot better, too -- the article's old mentions of WEP felt archaic in a much more secure WPA2 world. In a few years, someone will no doubt look back on my update revision and say "WPA2? How quaint!"
- Air Snare. "Intrusion detection software for Windows." (April 19, 2009) http://home.comcast.net/~jay.deboer/airsnare/index.html
- Broida, Rick. "Stop Internet poachers from stealing your WiFi." PC World. Jan. 27, 2009. (April 18, 2009) http://www.networkworld.com/news/2009/012709-stop-internet-poachers-from-stealing.html
- Leary, Alex. "WiFi cloaks a new breed of intruder." St. Petersburg Times. July 4, 2005. (April 20, 2009) http://www.sptimes.com/2005/07/04/State/Wi_Fi_cloaks_a_new_br.shtml
- MonsterGuide.net. "How to tell if someone is stealing your WiFi." Feb. 26, 2009. (April 19, 2009) http://monsterguide.net/how-to-tell-if-someone-is-stealing-your-WiFi
- Musil, Steven. "Michigan man dodges prison in WiFi theft." CNET.com. May 22, 2007. (April 17, 2009) http://news.cnet..com/8301-10784_3-9722006-7.html
- The TCP/IP Guide. "TCP/IP dynamic host configuration protocol (DHCP)." (April 18, 2009) http://www.tcpipguide.com/free/t_TCPIPDynamicHostConfigurationProtocolDHCP.htm