
05-05-2005, 09:24 AM
Its not really hacking, its piggy-backing. the difference is they dont have to do anything to get in, just sit with in range. And KTOG you didnt say anything about how long it was up prior. Check priority of computer. This will help determine if youre being leeched off of. If you are, change the security settings. Check the manual for help on this. The main one you should use should be limiting the number of IP addresses the network will have, and or add the IP of the machine to the Allow List
|