Who's On My Wifi – Really do you know who is using your WiFi?
Here is a simple question - Is there someone or some device you don't know on your wireless network right now? I mean think about it. Right now, at your home or office, is there someone who has connected their laptop, cell phone, tablet, camera…etc to your network that shouldn't be on there?
You'd probably say, no, I have encryption on the wireless, and if you were so inclined, you might check the router's DHCP list to see who's currently on there.
OK, got it.
Was an intruder on your network last week? How many customers use your WiFi?
How about 2 weeks ago?
Or 2 months ago?
How about next week, while you're on vacation, and someone drives up to your house, cracks the encryption and does some illegal browsing, downloading, uploading?
Would you know about it?
The answer is probably no.
You see, the current solutions to WiFi security are all about prevention and prevention like a burglar alarm is a great start to protect your home. But just like a lock can be picked or broken, Wireless Encryption methods like WEP and WPA2 can also be cracked given enough time.
Once cracked your network can be used for criminal and malacious activity!
Want to have a Free Tool that will let you see who is on your WiFi and alert you to changes? Read on -
The most common current solutions for detecting intruders on a network are to manually check the router DHCP list at the time that you're thinking about it or perhaps some router logs after the fact. Because these are manual processes, they are prone to be neglected, missed, or just ignored until something bad has occurred. And then it's often too late.
Who's On My Wifi monitoring solution, the industry and community needs an automated, proactive solution for detecting unknown devices on your WiFi. So download the software, load and run. When the software is configured and setup, it runs a scan in the background on an always on Windows desktop or Windows Server, and every few minutes it scans the network, looking for new devices. No matter how an unknown device got onto your network, it records the intrusion and based on your preferences alerts you to the intrusion as well. It knows the device is an intruder because during setup the software asks you to tag the devices that are currently on your network. If during its future scans it sees a device that hasn't previously been tagged by you as OK or Known, it's considered an intruder and you'll be notified.
Originally Who's On My Wifi was designed to solve the problem of detecting employees bringing their home laptops on the corporate LAN, but we've found that people have many uses for the home, school and corporations. Rogue users must be identified and stopped!
From a technology stand point, using non-routable ARP (Address Resolution Protocol – used to resolve network layer addresses (IP) into link layer address (MAC)) based scanning to detect devices, give each device a digital signature based on certain criteria and then compares the known digital signatures to new devices detected during each scan. You can also name the devices so you always know what device is on the network. If the signature doesn't exist, it's an assumed intruder. If you are in the Network Security space, think of this as a simplified NAC (Network Address Control) solution that doesn't do anything based on policies and runs on isolated software.
All of the technical details aside, we've tried to build an easy to use program that only requires a basic understanding of computer networks to get setup. This makes it perfect for small to medium sized businesses and homes that don't have the larger IT security and logging budgets of Enterprises.
We offer the Windows software for free. That gives you detection and local alerts of intruders. We also offer an optional Online Service that adds things like historical point in time reporting of devices and real-time notifications. (Text message notifications on intrusions/changes will be out by the end of January for US customers).
We're also still a young company, and if there are ways that you'd like to see us improve the software, please let us know. We're currently working on a router plugin edition that works directly on any of the Open Source routers like Tomato and DD-WRT. We've also recently added Android and iPhone apps for less expensive hardware options to detect intruders. Coming soon we will be adding Wireless Access Point detection to our scans and logs.
With Who's On My WiFi was designed to make it easy to detect intruders on your home or small business WiFi network as soon as they occur.
So check out this awesome free tool at http://www.whoisonmywifi.com
Editors comments – Another super thing about this cool software is that for once you can easily identify and verify the inventory of who/what is on your network.
I teach Cyber Safety classes for parents and I highly recommend parents use this to monitor who is on their WiFi. This also emphasizes a super reason to shut down your WiFi when you are not at home or asleep.
Your WiFi device has 4 setting areas that you can use for your protection –
1) WPA2 password – make it long and difficult. Nothing to do with your name, dog, cat, kids, birthdates…etc – NEVER SHARE or put on social media!
2) SSID – do not broadcast
3) MAC address filter – Only allow known MAC addresses on your WiFi
4) Time of Day settings – If you are at work from 8 to 5, then set the time schedule for your WiFi to be OFF, if you go to bed at Midnight – set the schedule to turn it off, If you go on vacation or for a few days – Turn the access point off.
Also – Do Not allow for rogue hotspots in your home or business.
Some Basic Cyber Safety ideas for your WiFi access point.
Author - John Kerber, Technical Co-Founder of Who Is On My Wifi - A lifelong computer enthusiast, John has 10 years of experience in IT, Development and Management, including eight years in the financial sector. John is a geek in the truest sense of the word with an eye for market opportunities. Prior to Who Is On My Wifi, John developed a social network platform, human resource system and various network administration tools.