Due to the weakness of Internet passwords, it is common for neighbors and unauthorized persons to connect to networks they do not own. This can be a problem for both the bandwidth and the data we send that can be analyzed and recorded by these people. We must have control over the people who connect to our router and, in case of detecting suspicious activity, we must carry out different protection tasks.
One of the programs that we can use to analyze our WiFi network in search of unauthorized devices and intruders connected to it is WiFi Guard. This free application is very simple to use and it will allow us to have control over everything that happens in our wireless network.
The main functions of this application are:
- Real-time detection of connected devices.
- Detection of the type of firewall used by these devices.
- Schedule analysis in search of new unauthorized devices.
- Schedule alerts in case of detecting unauthorized devices.
The first thing we must do is download the latest available version from its main website. We can choose the portable version of the program or install it manually. The portable is much more practical and we avoid having to install a package in our system, so we are going to use this one.
Once we execute the program we will see the main window of this one.
Here we must click on the "Search" button so that the program begins to explore our entire network in search of devices connected to it at this time. Once the analysis is finished, you will return the results in a similar way to the following in your main window.
The green devices are those that the program manages to identify correctly and consider trusted devices. In our case, the router and our computer have detected us as trusted devices. Those marked in red are not identified by the program and we must specify if they are our devices or may be intruders.
If we double click on one of them it will show us more information about it and it will give us the possibility to mark the device as "known" and write a description of it.
Once we identify all the devices we will see something similar to the following.
With this we will only have to run the program regularly in search of new unauthorized devices or programming automatic network analysis that will warn us if any unauthorized devices are connected to our network without our permission.