How to tell if someone is using my network or internet connection w / my password

Ok.. So I let my old neighbour use my network providing him with my router username and password of my network. Now his family of very strange... possibly use their computers to connect and play games on Facebook and emails. They have no internet so it must be on my network. fix? Can I use mngr. to view the process and from that task? Help, please... I know I was taking a chance here, but I have confidence in him.

Thank you kindly

Sunday, September 14, 2014 02:11:07 + 0000, Slamina wrote:

* OK... So I let my old neighbour use my network providing him with my router username and password of my network.

Always a bad thing to do, in my opinion.

Now his family of very strange... possibly use their computers to connect and play games on Facebook and emails. They have no internet so it must be on my network. fix?

They could also use some other wi - fi router, but you are probably
correct that it is yours.

Can I use mngr. to view the process and from that task? Help, please... I know I was taking a chance here, but I trusted to him.*

If I were you, I would simply change the password of the router. Do not
worrying about if they used it, stop using it more.

Tags: Windows

Similar Questions

  • How to tell if someone is using your identity after phone call scam

    I got one of these calls, but unfortunately worries me now that I may have something that I regret? Please indicate how to get out of this?  He seems to know what he was talking about too? Thank you

    * original title - how do you know if people are using your identity? *

    Your post is rather vague, but it seems you've been had by a scam, there are much of what we can do here to help you.  If you gave them your credit card information, you can call your company and credit card fraud report and have the card cancelled.

    John

  • How to tell if someone uses remote adjustment to control the use of my computer?

    How to tell if someone uses remote adjustment to control the use of my computer?

    * original title - monitoring computer use *.

    Hello

    Why do you think that someone is watching your computer use? One would have to have
    loaded tracking software (trojan) on your computer or have access to the source of the network
    you use, such as cable, on your leg of it and have very sophisticated equipment.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
    RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker
    (SFC.exe) program generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    =======================================

    For extreme cases:

    Norton Power Eraser - eliminates deeply embedded and difficult to remove crimeware
    This traditional antivirus analysis does not always detect. Because the Norton Power Eraser
    uses aggressive methods to detect these threats, there is a risk that it can select some
    legitimate programs for removal. You should use this tool very carefully and only after
    you have exhausted other options.
    http://us.Norton.com/support/DIY/index.jsp

    ================================

    If you are in North America, you can call 866-727-2338 to get infections of virus and spyware. Seehttp://www.microsoft.com/protect/support/default.mspx for more details. For international information, check your subsidiary local Support site.

    I hope this helps.

  • How to tell if someone uses my count at home when I'm not home?

    Original title: who was on my computer.

    Probably a stupid question, but I've never had to ask before.  How to tell if someone uses my count at home when I'm not home?

    You can examine (eventwvr.exe) Event Viewer system log. He recorded each logon.

  • How will I know if I use encryption 128-bit internet explorer 9 on windows vista

    How will I know if I use encryption 128-bit Internet Explorer 9? I use Windows Vista Home Premium Service Pack 2 with a 32-bit operating system.

    Hello littleturley99,

    Open internet explorer 9 and look in the upper right of the window. You will see an icon of the House, star and a wheel of gog. Click on t he cog icon wheel, and in the drop down menu, click 'about internet explorer '. Look in the window of internet explorer for the "force encryption". This should read 256 Bit.

    This forum post is my own opinion and does not necessarily reflect the opinion or the opinion of Microsoft, its employees or other MVPS.

    John Barnett MVP: Windows XP Expert associated with: Windows Expert - consumer: www.winuser.co.uk | vistasupport.mvps.org | xphelpandsupport.mvps.org | www.silversurfer-Guide.com

  • I just bought the app for photographers creative cloud when I try finally connect with PS CC, I received an error message that says "no detected subscription. I don't really know how to solve this problem, I used my Adobe ID to connect several times

    I just bought the app for photographers creative cloud when I try finally connect with PS CC, I received an error message that says "no detected subscription. I don't really know how to solve this problem, I used my Adobe ID to connect several times and it just still the same message.

    Your subscription to cloud shows correctly on your account page?

    If you have more than one email, you will be sure that you use the right Adobe ID?

    https://www.adobe.com/account.html for subscriptions on your page from Adobe

    .

    If Yes

    Some general information for a subscription of cloud

    Cloud programs don't use serial... numbers you, connect you to your cloud account paying to download & install & activate... you may need to sign out of the cloud and restart your computer and log into the cloud for things to work

    Sign out of your account of cloud... Restart your computer... Connect to your paid account of cloud

    -Connect using http://helpx.adobe.com/x-productkb/policy-pricing/account-password-sign-faq.html

    -http://helpx.adobe.com/creative-cloud/kb/sign-in-out-creative-cloud-desktop-app.html

    -http://helpx.adobe.com/x-productkb/policy-pricing/activation-network-issues.html

    -http://helpx.adobe.com/creative-suite/kb/trial--1-launch.html

    -ID help https://helpx.adobe.com/contact.html?step=ZNA_id-signing_stillNeedHelp

    -http://helpx.adobe.com/creative-cloud/kb/license-this-software.html

    .

    If no

    This is an open forum, Adobe support... you need Adobe personnel to help

    Adobe contact information - http://helpx.adobe.com/contact.html

    Chat/phone: Mon - Fri 05:00-19:00 (US Pacific Time)<=== note="" days="" and="">

    -Select your product and what you need help with

    -Click on the blue box "still need help? Contact us. "

  • I can use my laptop with internet connection by cable, but cannot configure the wireless connection.

    Wireless Internet

    can use my laptop with internet cable is plugged in, but I am unable to set up a Wi - Fi connection, even though two other laptops in the House are Wi - Fi. Tried the convenience store who said there is a button on the front of the laptop that I push to turn on wireless on, tried that, but nothing is. I have an Acer Travelmate 2410, can someone help me?

    Hi Karldawkins,

    What operating system is installed on the computer?

    As the error message clearly indicates that the wireless switch is disabled on the computer. I suggest you consult the manual of the laptop and try to turn on the wireless switch.

    If you still experience the problem, then I suggest you to contact Acer support to enable the wireless switch.
    http://support.Acer.com/us/en/default.aspx

  • Someone at - it help him? Internet connection but can't browse the web. HP G7035EA

    Hi, grateful if someone can advise...

    We have a HP G37035EA laptop with windows vista V6 s-pack 2 that we have had since nine for about 2-3 years.

    All of a sudden he is will not let us go online.  My mother I believe is an update of somesort - she doesn't remember, but it would have been one automated that pop up and since then it has not worked.  When you try to go online, he said; Internet Explorer cannot display this webpage.  It's IE V8.

    The internet connection works without a doubt, we can make the HP updates, updates microsoft etc. and I plugged another laptop to our router which works perfectly, either with a cable or wireless, but this laptop is not less we surf the net so be it.   We talked at length with Sky that host our broadband services and they have not been able to make it work.

    All advice appreciated.

    Thank you

    JO

    Hi Jo,.

    Given the description of the malicious software on your laptop, I highly recommend a restore factory, preferably using your recovery disks.  Two Trojan horses is known for download and install other malware and future versions of Trojan.Vundo may also install rootkits that will prove extremely difficult to remove - I believe strongly that there is still malicious software on your laptop, and I believe it is directly related to your problem to access Web sites, even if your internet connection seems fine.

    Using your recovery disks to reinstall the operating system will all be first to format the hard drive - all - clear before reinstalling the operating system.

    You will probably need to back up personal files before doing so, but make sure that they are carefully analyzed on a "PC Clean" before I be reloaded on your laptop - make sure that your laptop has all its security software installed before reloading the saved files.

    Let me know if you have any questions in this regard.

    Best wishes

    DP - K

  • How to prevent the download of the images (when the internet connection is bad)

    In ancient times, it was possible to download only the text, no images, in order to speed up downloading of Web pages. Now I can't find the 'switch' to do this. My problem is that sometimes - when I'm on the (German) campaign - internet connection is so bad that the download takes a long time or fails completely.
    I use firefox with ubuntu 39.0...

    This option is no longer available in the standard options, but it still exists in the advanced configuration. 'Text only' value, enter "subject: config" in the URL bar, accept the warning, search for "permissions.default.image" and change the value of 1 (default) 2. To restore the display of images, even to change the value from 2 to 1.

  • How to install dot net framework 3.5 without an internet connection in Windows 8 Professional 64-bit

    Please help I am having the problem to install dot net framework 3.5 in my PC. I do not have a fast internet connection s I can't download it from the internet. Please help me by using DISM was also flop because it showed me that an error always comes after 68.5% completion...

    Please help me I have a lot of problems because many things are not working due to net framework 3.5...

    .NET framework is already included in Windows 8.

    Enable (turn on or off features) Windows 8 Net Framework 3.5 (included .NET 2.0 and 3.0)

    http://blogs.technet.com/b/Aviraj/archive/2012/08/04/Windows-8-enable-NET-Framework-3-5-includes-NET-2-0-and-3-0-i-e-NetFx3-feature-in-online-amp-offline-mode.aspx

    J W Stuart: http://www.pagestart.com

  • How to tell if someone in my house, it's stealing my internet

    I believe that someone in my house, it's stealing my internet. How will I know? I don't know too much about spyware. I see if spyware is on my computer? Or is spy software on the other computer in our House? Or on two computers... I have a lap top the other computer at home is a pc

    Thank you very much.

    slasm

    Hello

    Carefully check for malware: it's search for Trojan horses, recorders of striking and other methods.
    For more information about security, see the following message after you below.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.  (Vista is similar - to use XP RUN instead of start - search)

    Start - type this in the search box-> find COMMAND at the top and RIGHT CLICK – RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to fix the system files of Windows 7 with the System File Checker
    http://www.SevenForums.com/tutorials/1538-SFC-SCANNOW-Command-System-File-Checker.html

    How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
    generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Also run CheckDisk, so we cannot exclude as much as possible of the corruption.

    How to run check disk in Windows 7
    http://www.SevenForums.com/tutorials/433-disk-check.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    I hope this helps.

  • How to tell if someone is remotely access our home computer (s) and storing hidden files and/or access our emails and accounts?

    I think my computer (s) have been used to store hidden files / emails and unauthorized activity distance without our knowledge... We have problems of browser and see all kinds of strange activity and files which are not ours in folders on the list of recent documents that contain garbled code... How to join us at the heart of what happens or not to be a problem with security problems... (IT SEEMS to COME through OUR OUTLOOK EXPRESS WE HAVE EVER PUT UPWARDS or USE of e-mail > response will be GREATLY appreciated as we are unable to pay for assistance online live...) Thank you! Roberta!

    A short list includes...

    IP alias addresses

    Identities with the user's alias opens a session

    Activity on and off our drive c: with text records distorts

    the use of our accounts of outlook express and hotmail etc etc...

    First of all, download and install Malwarebytes from the link below. Once installed a dialog window with two boxes with checkmarks in them is displayed. Make sure both boxes are checked. We need to launch Malwarebytes, and the other is to be updated. Once updated Malwarebytes opens. On the "Scanner"tab check the box for a fast analysis." Start the scan. At the end of the analysis, follow the prompts to remove whatever it is detected. Display the results of the analysis in your answer to receive the next step.

    Malwarebytes.org

    How to use Malwarebytes

  • How to tell if someone answered me in the Apple community?

    Hi, I'm new to the community of Apple, and I just asked a few questions here. However, I have not received an email or notifications on all the answers to my messages. I checked my messages manually, then I discovered someone answered me. So, should I manually check my posts to see if anyone responded? What happens if someone answered me on my response to their questions? This seems very awkward for me.

    In addition, I checked my preference, there is no option on the e-mail responses to me.

    You should be automatically 'after' any thread you posted in; If this is not the case, for some reason, make sure to click on the 'monitoring' in the upper right:

    Once you follow the thread, check in your preferences that you have turned on email notifications. Click your name (upper-left), and then click Preferences. Make sure that everything you want to be alerted on is set on "on".

    Make sure yours is on (mine is off):

  • How to tell - allow a site using Flash Player, when I accidentally approved it?

    I hosted a site run Adobe Flash Player and then I clicked on do not forget instead of this time exclusively. How can I remove the site from Firefox remembering site. There must be a list somewhere in Firefox where I can remove the Web site. Thank you

    1. go on the site.
    2. click the icon that looks like a Lego block. It is located to the left of the address bar.
    3. click on Plugin block.

  • How can I stop someone from using my apple ID and phone number to FaceTime on iPad?

    How to prevent a unknown user talk on FaceTime with my Apple and the phone number?

    The first question is: How did get your ID and password? Did you give anyone access?

Maybe you are looking for