There is a good chance that is what happened. To get around DHCP reservation, some people will just static to 192.168.1.101 and try to get in. If you are getting 1.101 from DHCP, there is your conflict. Use WPA2 encryption, MAC filtering, and change your network and subnet mask. Go with something like a 192.168.37.128 network with a 28 bit. It throws them off a little.
Good call, Headstand. Changing factory defaults is always inline with networking best practices. It would behoove of you to heed Headstand's advice if you believe that your personal home network may be the target of someone else's bad intentions.
Also dont broadcast your SSID and change default username and password. Use a strong password with upper and lowercase letters, numbers, and special characters. Something like this: P@$$w0rd
Also dont broadcast your SSID and change default username and password. Use a strong password with upper and lowercase letters, numbers, and special characters. Something like this: P@$$w0rd
Good info. I can't believe I forgot to say turn off SSID broadcast. Every network I set up, I have to do that. Boss would be mad if he knew I forgot that.
Also, on the password part, what badboyeee said is 100% correct, but don't use that actual password. That is around #3 on our security team's list of passwords they use when trying to crack into people's accounts.
Yes it could also be a DHCP fluke. So set IP address manually, or do an ipconfig /renew , or right click on the bottom right corner where the network connection icon is and do a "repair", or reset the whole router/switch. Those are easy tricks that may work.
Also, on the password part, what badboyeee said is 100% correct, but don't use that actual password. That is around #3 on our security team's list of passwords they use when trying to crack into people's accounts.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.