this mid-range realme falls to 168 euros

What do I do if my WiFi is stolen? So you have to configure it


Prevent your neighbors from stealing your Wi-Fi: this is all you need to know to have a totally secure network.

That you steal the Wi-Fi connection it is not a pleasant thing. The fact that other people use your bandwidth implies loss of speed in the network, and security problems since the rest of the connected people could access the content stored on your devices.

That is why it is very important maintain a high level of security in our Wi-Fi network. In this guide, we explain everything you need to know to maintain a totally secure Wi-Fi network and safe from strangers.

Wi-Fi router

You can configure your Wi-Fi router to prevent neighbors from stealing your connection.

Can they enter my WiFi or my router without my permission?

Unfortunately, yes, other people can connect to your Wi-Fi network without your permission.

In case your network is not encrypted, any user of a device with a Wi-Fi connection will be able to connect.

Once they have connected, they will not only occupy a good part of the network's width, thus reducing the speed of the connection; could also spy on your conversations, accessing the private files of the devices connected to the network or even infecting your computers with viruses.

But that's not all: if they access your network, they could also have router access, thus having the option of modifying the network parameters and other settings of the router itself.

How can I enter my router's configuration?

The best way to prevent WiFi from being stolen is to correctly configure the network, using the different security systems offered by the router.

For this, you will have to access the configuration panel that all routers have.

Although each router has its own configuration panel with specific settings, the way to access it will always be the same. For this, you just need to have on hand a computer or a mobile with a web browser.

When you have the necessary tools, the first thing you should do is know the IP address of your router. It's as easy as following these steps:

  1. On your computer, you must open a command window (CMD on Windows, or Terminal on MacOS and Linux).
  2. Enter the command "ipconfig" on Windows, or "ifconfig" on Linux or MacOS. No quotes in both cases.
  3. Now, write down the address that appears accompanied by the title "Default Gateway", or similar.

You already have the IP adress with which you are going to access the router configuration. The next step is to enter that address in the browser's search bar to access the router's configuration page. Once inside, you will see a page similar to the one in the image below these lines:

Router configuration page

The configuration page of a ZTE router.

You will see that you must enter a username and password. If you have never accessed the configuration, the credentials are most likely "admin" and "admin", "1234" and "1234" or a combination of both for username and password respectively. This information varies depending on the manufacturer of the router. There are some web pages that contain the credentials most used by the main router manufacturers.

When you have accessed the router, you can make a multitude of changes and adjustments to your Wi-Fi network, or to the router itself. Something recommendable is change the password to access the router so that only you know, so that no one who connects to the network can modify the parameters of the gateway to the network.

How do I know which devices are connected to my WiFi?

In some cases, when you access the router's configuration page, you will see a list of the devices that are connected to the network, along with their IP addresses and the unique MAC address that identifies them.

However, there is an even simpler and faster way to see who has connected to our Wi-Fi network.

Just use a mobile app like Fing, which allows view a list of each and every device connected to the network in real time. This app will give us information about each device such as your manufacturer and model, the IP address, or the MAC address.

How do I make them?

Now you know who has connected to your WiFi network. Therefore, it is time to kick out intruders and get everything back to normal.

For block people stealing Wi-Fi and prevent them from connecting to our network, one of the most useful techniques is the call "" MAC Filtering. This consists of prevent access to specific devices based on your hardware address.

Practically all routers They include among their options the possibility of activating MAC filtering. And although it can be a somewhat tedious process, the truth is that it is one of the most effective ways to prevent our Wi-Fi from being stolen.

To activate and use the MAC filtering of your router, these are the steps you should follow:

  1. Open your router's configuration page in your browser.
  2. Go to the section "Wi-Fi Networks", "Networks" or similar.
  3. Now, look for the option "Access Control list", "Mac Filtering", "MAC Filtering" or similar.
  4. Enter the MAC addresses of the devices you want to block or admit –you can find them through an app like Fing–, and add them to the blocked list.

Thus, you will have created a "black list" of devices that they won't be able to reconnect to your Wi-Fi network Unless you decide to remove your address from that list.

How to prevent my WiFi from being stolen

View WiFi passwords on Android

The Wi-Fi connection icon on an Android mobile.

The above solution is useful when Wi-Fi has already been stolen when getting access to your network, but it will always be better prevent intruders from connecting.

If you think your connection hasn't been stolen yet, but that they might sooner or later, here are some things you should do to avoid it.

Use a more secure password

This should be the first step right after setting up a new Wi-Fi network: Access the Wi-Fi settings, and change the default password for a more secure one.

Although the default passwords for routers are not exactly easy to remember, there are databases that contain default passwords some of the more popular routers, which other people can use to steal your WiFi.

Keep in mind that if you have one 2.5 and 5 GHz Wi-Fi network, You will have to change password independently for each network. In both cases, you can do it within the Wi-Fi network settings from the router's configuration page.

Change router password

This way you can change the password of your Wi-Fi router.

Turn off WPS

The function WPS o Wifi Protected Setup allows easily connect to our network by pressing a button on the router and entering a PIN on the device to be connected, without the need to enter the password.

The problem is that it is a mechanism with a weak security system, since it is not difficult find out the PIN and establish a connection to the network. Therefore, the smartest thing to do is completely disable the WPS function from the router settings.

To do it, simply go to the Wi-Fi networks section router configuration, and deactivate that option called WPS .

Hide the network name (SSID)

Your neighbors won't be able to connect to a network that doesn't exist. So completely hiding your network can be a great way to avoid intruders.

Hiding the SSID –The name of the network–, it will not appear in the WiFi networks search menus of their mobiles or computers, and therefore they will never know that these networks exist.

Even so, both the people with whom you want to share your WiFi network and yourself can continue to connect to the network, since you will know his name.

In the network connection from the router settings, you will see a option called "Hide SSID" or similar. If you activate it, the network will no longer appear in searches, and to connect you will have to enter your exact name.

Hide Wi-Fi network SSID

If you hide the SSID for your network, your neighbors won't know it exists.

If you've made it this far, you probably already have one intrusion proof WiFi network. As you can see, configuring the network safely will not take you long, but you will get rid of the headaches that having unwanted neighbors occupying bandwidth and having access to your private information.