Connection

The easiest way is to go into your router logs, dhcp logs, your wireless logs, etc.

Assuming you are using DHCP for all the clients, pc, laptops, etc ...both wired and wireless ... you should be able to identify all your machines - either by host name or MAC address. If there is something you don't recognize - that may be your neighbor.

I use LinkLogger

formatting link
to track all of my router traffic. This is not wireless specific - but tracks all activity going in and out of my router.

Reply to
riggor99999
Loading thread data ...

"Abbigail" hath wroth:

The software used is highly dependent on the make and model of your wireless router, which you didn't supply. Most rely upon the router to generate SNMP traps. See:

formatting link
formatting link
formatting link
examples.

There are also traffic sniffers. These watch the traffic in and out of your wireless, usually between your broadband modem and your router. If something new appears, they will detect it. For example:

formatting link
formatting link
are also commercial IDS (intrusion detection systems). Most are not free, but you can probably bludgeon Arpwatch into some form of IDS by detecting new IP addresses.
formatting link
you have an integrated modem/router/wireless box, a sniffer will NOT work because there's no place to sniff traffic. With a sniffer, you will also need to use a hub, not a switch to sniff the traffic.

If your wireless router supports SNMP, various MIB browses and SNMP monitoring tools can be used to count connections. I use MRTG or RRDTool to graph the traffic and number of connections.

formatting link
formatting link
are lots (and lots) of free SNMP monitoring tools available:
formatting link

Reply to
Jeff Liebermann

Jeff Liebermann hath wroth:

Ooops. I forgot about Syslog monitors. Link Logger uses Syslog, not SNMP traps. Other free syslog monitors are:

formatting link
formatting link
formatting link
(free version) More of the same:
formatting link
formatting link
with SNMP, the router or wireless access point needs to support syslog.

Reply to
Jeff Liebermann

Turn on WPA with a non-trivial passphrase, and be assured that they aren't accessing it.

Reply to
William P.N. Smith

Hi,

How would I be able to tell, if the neighbours where accessing my wireless connection, I would assume that the connection would be slower, however is it possible to tell if someone of accessing my wireless connection, is there any free software to download which could monitor this?

Regards,

Reply to
Abbigail

If he can access your WiFi, he can break into your LAN computers and steal your {identity, credit card numbers, passwords, money}. Other than that, no problems at all. Oh, wait, even an unsophisticated user can give you viruses and other malware.

Reply to
William P.N. Smith

Airsnare and it's free.

You probably wouldn't notice the speed depending on what they were doing.

Have you configured any security whatsoever? MAC filtering is not considered security.

David.

Reply to
David Taylor

Reply to
steve

What's your upstream speed and what happens to your downstream speed if your upstream is saturated? If you haven't tried it, do so then you will have answered your own question.

That's just one reason why you might care.

David.

Reply to
David Taylor

Do you have a good solicitor?

You may find that you have the responsibility for any criminal activity that takes place on that network, whether it be launching a hack attack or downloading illegal pornography.

Reply to
Rob

Reply to
steve

formatting link

Reply to
Rob

Although I do have to say that the sentence which states "the owner is ultimately responsible" could still be subject to legal attack.

Does it also therefore follow that if you leave your car unlocked and it is stolen and used for illegal purposes that the original owner is responsible for the actions that follow?

It's a weak accusation on from the CPS at best but as ever, unless properly tested, quotes like that will remain.

David.

Reply to
David Taylor

Not necessarily.

David.

Reply to
David Taylor

If a car is "taken" it is no longer possible for the owner to control it's use whereas the "network" is still under the control of it's owner and he can control it's use, wonderful things on/off switches.

Reply to
Rob

If he knows that his network has been taken. At what point does every purchaser of a home wireless box have to become fully IT trained?

What about the use of their malware infected machine for other crime purposes that aren't even related to wireless? Is the home user "responsible" because they didn't buy antivirus/malware products or regularly patch their machine?

I understand where you're coming from, I just think that it's unreasonable to expect everyone to act in the manner which the CPS seem to think is suitable. It's just not going to happen.

This is the fundamental principle of "reasonable doubt" though I don't think that it would exist for a prior kiddie p*rn offender to try that claim to doubt when caught again. As ever, it all depends on the quality (and cost) of ones legal defence.

David.

Reply to
David Taylor

I've been using Wi-Fi defense for a while. You can find it here:

formatting link
Good luck....

Reply to
Robert

I haven't had any neighbors try and log on but that may be due to the fact that I don't broadcast my SSID, have MAC filtering enabled and use WPA security.

When I have family and friends over who try and log-on using their laptops the program immediately notifies me of the attempt. It then allows me to tag them as friend or foe.

The program also allows me to use the routers built-in security to deny any traffic not tagged as friendly or pre-approved.

Reply to
Robert

In the while you have been using this software,has it detected any of your neighbours accessing your wi-fi connection?

Reply to
Steve

Sounds good,thanks.

Reply to
Steve

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.