How can I block a unknown user to access my home network on windows 7?

I discovered an access device to my network which does not belong there. I can't access, so I can't really do anything to the extent of the see who it is. I thought it was just someone leeches off my wifi hotspot, but when I turned off wifi, they log. When I try to access this unknown, my computer tells me that, basically, the unit is not there. How can I put an end to unwanted access to my network guests? I think it would be not possible, given that the network requires a password to gain access. I did not the password to anyone except those authorized, and yet, here I have a device owned by a person named "Griff" connected to my network.

I have already been burned by leechers unauthorized hiding behind my IP and downloading illegal or pirated content. I don't want this headache yet. How can I stop this?


Here's my view of what has been published. Disabling the SSID broadcast will stop that casual leechers. #2 will not accomplish all that it's someone who connect to your network. #3 is a given... you need to change your password and #4 is probably your best choice, but I would like to change it, so that only the mac addresses you specify can connect to the network.

I hope this helps.

Tags: Windows

Similar Questions

  • How can I tell if a user has access or was denied access to

    How will I know if a user has access or denied access to DBMS_LDAP without actually running the package.

    If access is denied how to grant and revoke access?

    Help, please!

    Thanks in advance.

    Published by: user12027903 on October 19, 2010 11:42

    Just check inside the DBA_TAB_PRIVS data dictionary you can get the details.

    Thank you

  • How can I create an another user to access the HR schema data

    I am new to Oracle and just downloaded the: 10 x e. I have connected as human resources and was able to modify data in tables.
    I created another user, then say ABC, when connected as SYS. But then I could not access the tables and the data even in human resources.

    I learned that every user has its own schema, but how do I create an another user to access the same tables, and the data I see in the Oracle DB?

    Log in as a user of the system (or sys as sysdba) and:
    create user identified by ;
    Grant connect, create session ;

    To see objects to a different schema from the database user must then obtain the privilege:

    Grant select on hr. à ;

  • How can I block a VPN user ' ing in while AD is used for authentication

    We currently use Active Directory to authenticate via IPsec VPN.

    Employee was let go... then his account AD has been disabled

    However, there an other AD username and password which cannot be disabled because it

    is used under other services

    Our entire society is in a group policy

    My question I would block her access to the network. ?

    No, you will not have to configure a new group strategy. Everything you have to do is to create a create a saying political dap that if a user comes with this attribute radius or ldap (username in your case) apply to a certain policy (complete) for her. Rest all users, since they do not match this criterion, they'll hit the dap default policy which you alow them normally without applying any policy for them.

  • How can I get rid of the part of the home page of windows xp pro?

    A friend built my computer. I gave him my window xp pro and office xp pro disc to load. He came back to me with something first page added to windows and office. Nothing works well. My friend is no longer in the city.

    How can I get rid of the first page?

    Please do not ask me to describe how many problems he created, the different functions of office and windows that don't work or material he refuses simply recognize or leave work as my camera. I'm so tired to uninstall and reinstall.

    Thank you

    Hope is not * that * long!  You are welcome...

  • How can I block unknown number or call number Caller ID?

    How can I block unknown number or call number Caller ID? A madman who got hold of my number and do not stop calling me. It is ruining my business that I only work with a mobile phone number. I get unknown calls 400 per day and none causing business that my phone is busy all the time. Samsung has this feature, but I refuse to believe that Apple isn't a solution for this problem.

    Asking again not you will get a different answer.

    You can not. your carrier may offer blocking of anonymous calls. Contact with them.

    Better yet, contact the police. This is harassment. They can trace the source of the calls. If they are from one person, it is a criminal offence.

  • How can I block the users access to microsoft office?

    How can I block the users access to microsoft office?

    You must set "" permission to run on each of the Microsoft Office programs (word.exe, excel.exe, powerpnt.exe, etc.) such that the group 'Administrators' and the SYSTEM is allowed to run.  To do this, you do a right click on the .exe file, select 'Properties', then click on the 'Security' tab and change security as you wish.

    If you do not have a 'Security' tab, then it is because you have XP Home Edition, or if you have XP Pro with active Simple file sharing.  For XP Home, you must boot mode safe (repeatedly tap F8 at startup key) and login as an administrator to access this tab.  For XP Pro, follow the instructions in the following article:

    "How to disable the file sharing simple and how to set permissions on a shared folder in Windows XP"
      <> >


  • more than one user connects to pc (windows7). How can I block access to my media

    more than one user connects to pc (windows7). How can I block access to my media

    Original title: media sharing options?

    Hi Gabe,

    I appreciate the efforts that you put to publish the query on this forum.

    It would be better if you can provide additional information related to this query:

    Who are the media that you are trying to secure on the computer? Is it related to any multimedia files or folders?

    If you try to get the files or folders, you can use the Windows 7 encryption method to do:

    Please get back to us with more information to help you better.

  • How can I block a folder so that no one but myself can access

    How can I block an o s documents folder only myself can I access

    Password-protect your user account.

  • How can I block specific people from my computer and emails?

    How can I block emails specofic?

    Hi jackelbon,

    · What mail client do you use?

    You can block messages from specific ID, marking them as spam in the e-mail client or by creating a filter so that messages skip the Inbox and are deleted or sent to the trash.

    If you use outlook express to work with emails, then user or by creating passwords for the user account that cannot be restricted by creating another account. Check out the link that gives you information about the types of accounts of user below:

    You can also check out the link below: use Windows Live OneCare Family Safety to help protect your family online:

    Online safety and privacy education:

    With regard to:

    Samhrutha G S - Microsoft technical support.

    Visit our Microsoft answers feedback Forum and let us know what you think.

  • How can I block others access to my wireless router?

    I have performance slow and even lose connections.  I have Comcast and they have suggested that it is 'noisy' of what they see on their end.  The technology said that he receives many complaints from users of wireless router.


    Quote: "How can I block others access to my wireless router?

    By setting up the wireless router security encryption.

    Of the weaker for wireless security, more strong capacity is.

    No security
    Switch Off SSID (even has No Security. SSID can be sniffed easily even if it is turned off)
    MAC Filtering___ (Band Aid if nothing else is available, MAC number can be easily Spoofed).
    WEP64___ (Easy, "Break" by knowledgeable people).
    WEP128___ (a little more difficult to activate, but "Piraté" too).

    The three above are not considered safe.
    Safe starts here at WPA.

    WPA-PSK__(Very Hard to Break).

    WPA-AES__(Not functionally Breakable)

    WPA2___ (not functionally breakable).

    Note 1: WPA - AES the current interpretation level entry of WPA2.

    Note 2: If you use WinXP SP3 bellows and not updated, you need to download
    the WPA2 Microsoft's fix.

    Documentation of your devices (router wireless and computer wireless card) must indicate the type of security that is available with your wireless hardware.

    All devices MUST be set to the same level of security using the same password.
    Therefore, security must be set according to what is the best possible one of the wireless devices.

    I.e. even if most of your system may be able to be configured to the maximum with WPA2, but a device is able to be configured for maximum of the WEP Protocol, to the whole system must be configured to WEP.

    If you need more security and a device (such as a wireless card that can only do WEP) is now better security for the entire network, replace with a better device.

  • How can I block e-mail from specific senders?

    I'm tired of searching on a large number of emails in my spam folder. A large part of the enamel comes from the sender even. How can I block e-mail from specific senders?

    Junk e-mail is automatically deleted after 30 days > iCloud: manage junk e-mail

  • How can you transfer favorites among users. My original user no longer works?

    How can you transfer favorites among users. My original user no longer works?
    I had to create another profile.

    Firefox made regular bookmark backups, so that you can restore the backup from your old profile to the new. Although, I suppose that the user is unable to connect, you always have access to its files.

    First of all, make sure that Windows allows you to see the hidden files and folders. This article has the steps if necessary:

    Then, down the old profile and copy out a few last backups to a more convenient location. You'll look here:


    File names include a data and County bookmark as well as random characters. I suggest you copy the last two at your new desktop or documents folder.

    In Firefox, you can restore the backup file by following the steps in this article: restore bookmarks from a backup or move them to another computer. Use the option "Choose file" to find backups in your office or documents, as appropriate.

    Note: You could bookmark that something already in Firefox, but those that are not merged, they are replaced, so if they are essential, you can export your current bookmarks to HTML format, which can be imported from non-destructively after restoring. See:


    And if it is interesting to find other old data: recovery of data from an old profile

  • How can I remove "the folder/Users/user/to/mygame doesn't exist." Terminal. Rises every time I launch Terminal.

    How can I remove "the folder/Users/user/to/mygame doesn't exist." Terminal. Rises every time I launch Terminal. I am a novice. Thank you very much.

    1. Please select from the menu bar Terminal

    ▹ terminal preferences... ▹ Profiles ▹ Shell

    If the run command box is checked, uncheck it or enter the command to run automatically (if any), each opening of a Terminal window. Note: this is not how you define a default shell.

    2. If step 1 does not resolve the problem, see below.

    Back up all data.


    New Shell command ▹

    in the Terminal menu bar. Uncheck the box marked

    Run the command inside a shell

    If it is enabled.

    Copy and paste the following line into the text box that appears, and then press return:

    /bin/mkdir disabled_shell_files

    Close the Terminal window that opens. Repeat with this line:

    /bin/mv .profile .bash_history .bash_profile .bashrc .inputrc disabled_shell_files

    History Shell and former initialization files will be saved in a directory named "disabled_shell_files" at the top level of your home directory. It is normal that some of these files do not exist, and therefore, you will get error "no file".

    Close the window and open a new test.

    You may already know that files with name starting in '. ' are not visible in the Finder by default. So, if you open the folder that you created in the Finder, it will appear as empty, even if it is not. If you need to recover a portion of the data in the files of the shell, use a shell such as nano-based text editor (1). Make sure that you're not recreating the problem. Otherwise, you can delete the folder.

  • How can I block a message from accidental deletion?

    How can I block a message from accidental deletion?

    The safest way is to not use the Inbox for long term storage. Make folders for your important and warden messages and move them out of the Inbox, and in these cases. This also prevents your Inbox for this purpose, so that it has been designed.

Maybe you are looking for

  • Firewall left for weeks, should I worry?

    I forgot to turn on my firewall weeks, should I worry? I have a password manager (1password) on the mac, which 275 passwords in it. I'm just worried for nothing or I should change each password just in case my mac has been compromised? (no account se

  • Sierra Wireless EM7345 can not download

    Hey crew, Try to download the drivers for Sierra Wireless EM7345 LTE 4 G driver for win7 64-bit: and get the page not found https://support.Lenovo

  • REG: Web Site should support with IE 6 or less

    I have been academic website developed and hosted with success... but it would be running and support all browsers except IE 6.5 What do I do?

  • Need big help for my N WRT120

    Hello I need help I have connect my router normally, but now the custom router internet gives... When I connect my computer directly to the internet modem it work but when I connect with the router, it won't work I tried to restore default, there's n

  • The period mapping Source in FDMEE

    HelloI use a custom as a source for myFDMEE SQL database and stuck in some requests, I was wondering if anyone can suggest?1. for the mapping of the time, I need to have a calendar (period) pre-defined in SQL? If Yes, how can I do this?2 - Data (Jan