Solved

Remove a rogue PC from Home Network

Posted on 2010-11-27
9
840 Views
Last Modified: 2013-11-12
Hi I am running a laptop with Windows 7 and there is a rogue (probably neighbors) pc connected to my home wireless network when i view using the network option. How do i remove them from the wireless network?
0
Comment
Question by:gerrymac1943
9 Comments
 
LVL 1

Accepted Solution

by:
YvesLacombe earned 167 total points
ID: 34223505
1) Change your WPA/WPA2 password and reboot the router.

[Assuming you have any Wireless security enabled (you may not have)].

Don't use WEP, it's child's play to crack.

Make sure you use WPA or WPA2.

Use a password you wouldn't find in the dictionary, make it as complex as reasonable.

WPA/WPA2 cracking programs are dictionary-based.  So the more complex your password is, the less likely it is someone will regain access to it.

2) Dial down the transmission strength of the router to limit it to your premises.

-- Yves
0
 
LVL 10

Assisted Solution

by:Wolfhere
Wolfhere earned 166 total points
ID: 34223518
Change your Passphrase (wpa or wpa2) to something with special characters. You would use WPA personal or WPA2 Personal. You will have to get into your wireless router (probably 192.168.1.1) with a web browser. Dependent on what the make is...user may be admin and password is admin or password. or no Admin user name with the password. While you are in there changing the 'Wireless' Security, change your admin password. And if you have the option, do not broadcast your SSID (id of your wireless network). As for your passphrase, make it something you can remember, but replace the a with @, s with $, l with ! ..etc. Longer the better. You will have to fix your laptop or wireless device to connect even though the wireless access point does not broadcast, plug in the SSID manually and your new passphrase. DO NOT DO ENTERPRISE security.
0
 
LVL 12

Expert Comment

by:HappyCactus
ID: 34224883
You could also enable MAC address filtering; but the primary solution is to change the cryptographic key as suggested by the comments above.
0
 
LVL 3

Expert Comment

by:ngcmos
ID: 34227894
the easiest way would be to do the MAC address filtering
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 
LVL 8

Expert Comment

by:inbox788
ID: 34228119
Are you sure it's a rogue pc? What are you seeing? Is it impacting your performance. Don't forget to rule out other potential devices you might have connected. Is there off chance you also have wired connection on same computer, another router, use VOIP, wireless printer, etc.?
0
 
LVL 44

Expert Comment

by:Darr247
ID: 34362085
What brand/model/version of wireless router or AP do you have?

Are you certain the rogue device is not a wireless printer, tivo, or something else actually on your premises that you may have overlooked?
0
 

Author Comment

by:gerrymac1943
ID: 34465261
the device has a name which looks like a surname
0
 
LVL 44

Assisted Solution

by:Darr247
Darr247 earned 167 total points
ID: 34467520
As suggested by the first reply, use WPA2/AES if possible, and at least use a secure passphrase consisting of numbers, mixed-case letters and symbols (!@#$%^ et cetera).

We can't really suggest how to remove the rogue client from your network otherwise, without knowing the brand/model/version of wireless router or AP you have, as previously requested.
0
 

Author Closing Comment

by:gerrymac1943
ID: 34489847
excellent thanks
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
EIGRP Summary 2 45
Deploy 2 certificates to wireless clients 2 27
PEAP authentication 7 26
2 Gateways (bandwidth) - One domain 7 47
Read about achieving the basic levels of HRIS security in the workplace.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now