Who's using my network?

B

Bill W

Is there a way (via log files on PC or router, etc.) to determine if someone
has attempted to login to a wireless network or if they have actually logged
into and are using a wireless network? I'm asking for my daughter who has a
Netgear WGT624 router with an in-house wired XP desktop computer and a
wireless Vista laptop. Even though it is a secured router, she does not
know if her husband may have given the encryption key/password to neighbors
who are now using their service. Her husband wants to be the good ole boy
and would offer access to their service without any regard for the
consequences. She doesn't even care to identify who might be using the
service, she just wants to know if they are. Thanks for your help.
 
S

Sooner Al [MVP]

Bill W said:
Is there a way (via log files on PC or router, etc.) to determine if
someone has attempted to login to a wireless network or if they have
actually logged into and are using a wireless network? I'm asking for
my daughter who has a Netgear WGT624 router with an in-house wired XP
desktop computer and a wireless Vista laptop. Even though it is a
secured router, she does not know if her husband may have given the
encryption key/password to neighbors who are now using their service.
Her husband wants to be the good ole boy and would offer access to
their service without any regard for the consequences. She doesn't
even care to identify who might be using the service, she just wants
to know if they are. Thanks for your help.

AirSnare is an option...

http://home.comcast.net/~jay.deboer/airsnare/

--

Al Jarvi (MS-MVP Windows - Desktop User Experience)

Please post *ALL* questions and replies to the news group for the
mutual benefit of all of us...
The MS-MVP Program - http://mvp.support.microsoft.com
This posting is provided "AS IS" with no warranties, and confers no
rights...
How to ask a question
http://support.microsoft.com/KB/555375
 
S

Sooner Al [MVP]

Sooner Al said:
AirSnare is an option...

http://home.comcast.net/~jay.deboer/airsnare/

--

Al Jarvi (MS-MVP Windows - Desktop User Experience)

Please post *ALL* questions and replies to the news group for the
mutual benefit of all of us...
The MS-MVP Program - http://mvp.support.microsoft.com
This posting is provided "AS IS" with no warranties, and confers no
rights...
How to ask a question
http://support.microsoft.com/KB/555375

I forgot to add that you can run AirSnare on the wired desktop. Its
based on trusted MAC addresses. FWIW here is a snap shot of AirSnare
running on my network a few years ago.

http://www.dslreports.com/speak/slideshow/15126079?c=944869&ret=L2ZvcnVtL3JlbWFyaywxNTEyNjA3OQ==

Note that the desktop PC Ashtabula was no longer on my network due to an
untimely death when the AirSnare snapshot was taken.

In the screen shot my old Buffalo WBR-G54 Broadband Router shows up
twice, once for its wired LAN NIC (added manually to the safe list) and
once for its wireless LAN NIC. My wife's desktop (wired at the time) was
added manually, ie. Norman. My laptop and iPAQ PocketPC, both wireless
also show up. You need to identify every device's MAC address on your
network including your wireless/wired router.

Additionally some folks also use Look @ LAN...

http://www.lookatlan.com/

--

Al Jarvi (MS-MVP Windows - Desktop User Experience)

Please post *ALL* questions and replies to the news group for the
mutual benefit of all of us...
The MS-MVP Program - http://mvp.support.microsoft.com
This posting is provided "AS IS" with no warranties, and confers no
rights...
How to ask a question
http://support.microsoft.com/KB/555375
 
M

Michael Walraven

On my WGT624 I can determine if a computer IS attached. Under Maintenance,
Attached devices is list of wired and wireless devices that are currently
attached. (I don't think there is any way on this router to determine what
has been attached in the past).

Under Advanced, Wireless settings, Setup Access list, the user can restrict
wireless access to specific devices by MAC (media access code, a unique
number for each wireless card/device). Any wireless device not on this list
will not be accepted by the modem.

Michael
 
J

Jack \(MVP-Networking\).

Hi
What you are asking for is a useless exercise.
If your network is Not secured and some one logs On there is Nothing you can
do about it. In many cases it could be a neighbor that is Not even aware
that his Wireless logged to you. Otherwise if it involves some illegal
activity and you need to call the police.
As long as you keep your Network Open without security it would keep going
On few times a day.
Secure you Wireless with WPA or WPA2 and No one would connect.
Jack (MS, MVP-Networking)
 
D

daleeh

Jack,

The original poster stated that the router is secured but that the key
may have been given out to neighbors by an over-accomodating husband.
It might help if posters read the original posts and fully understand
them (or at least try) before posting a potentially insulting comment.
The request is for some way to determine if anyone is in fact
piggybacking on the connection--either with the key or by hacking in.

Some routers have logging capabilities--I'm not sure if this one does,
but if so, that would be a possible route.

Also, as stated by someone previously, using MAC access restrictions
is a good way to lock things down!

Dale
 
S

Sooner Al [MVP]

pooch said:
Or you could just change the encryption key problem solved!!

Absolutely a solution, but the real problem appears to be a domestic
issue...:)

--

Al Jarvi (MS-MVP Windows - Desktop User Experience)

Please post *ALL* questions and replies to the news group for the
mutual benefit of all of us...
The MS-MVP Program - http://mvp.support.microsoft.com
This posting is provided "AS IS" with no warranties, and confers no
rights...
How to ask a question
http://support.microsoft.com/KB/555375
 
J

Jack \(MVP-Networking\).

Hi daleeh.
Thank you for indicating the mistake that I made.
In any case technically speaking the answer is the basically the same, there
is No point to play Wireless detective.
The Password should be changed and the issue (which is a domestic issue and
does not relate really to technology) should be resolved and its domestic
interpersonal level.
Jack (MS, MVP-Networking)

Jack,

The original poster stated that the router is secured but that the key
may have been given out to neighbors by an over-accomodating husband.
It might help if posters read the original posts and fully understand
them (or at least try) before posting a potentially insulting comment.
The request is for some way to determine if anyone is in fact
piggybacking on the connection--either with the key or by hacking in.

Some routers have logging capabilities--I'm not sure if this one does,
but if so, that would be a possible route.

Also, as stated by someone previously, using MAC access restrictions
is a good way to lock things down!

Dale
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top