Rubbing the net may have been discovered after a while and then rubbing what is wrong 15

Updated on number 2024-05-04
12 answers
  1. Anonymous users2024-02-09

    If it's an expert, you'll definitely check the connected users and diaries on the network on a regular basis.

    If it is discovered, he will set the route, such as hiding the SSID, or setting the MAC address and IP address range to prevent the network from being rubbed.

    However, the average person does not know much about this knowledge.

  2. Anonymous users2024-02-08

    If people find out, they will definitely change the password. As for whether it will be found by others, depending on his level, it is easy to find out your IP address with anti-hacking software. Then go to your local ISP service provider and you will be able to find your address.

    If you use an IP to rub the Internet, the other party will naturally know that it is you. If he doesn't understand that, it doesn't matter.

    But this kind of thing is better to do less, it's not necessary, why worry about it all day long for a few dollars. Be a man but seek peace of mind. Don't take the evil for granted. Besides, how can you walk by the river without getting your shoes wet? In the long run, there will always be a day to catch you.

  3. Anonymous users2024-02-07

    If the net is discovered, the landlord can directly change another signal, or reconnect the signal, and then crack it again. In fact, people rarely rub the net nowadays to be discovered, because the current rubbing network cards can hide their own information, I ball 69086 behind is 9654 can show the landlord how to hide the rubbing network information, if the landlord is worried about being discovered, you can directly change a rubbing network card.

  4. Anonymous users2024-02-06

    Rubbing the Internet can reduce the Internet expenses of Internet users, and it is an economical way to access the Internet. Is it a crime to rub the net? Here's a closer look.

    "Rubbing the Internet" is illegal, and "rubbing the Internet" refers to using your own computer's wireless network card to connect to other people's wireless routers to surf the Internet, rather than accessing the Internet through regular lines. Rubbing the Internet can reduce the Internet expenses of Internet users, and it is an economical way to access the Internet. Legally speaking, "rubbing the Internet" has been suspected of infringing on the resources of broadband companies and paying users.

    In accordance with Article 59 of China's "Telecommunications Management Regulations", stealing other people's telecommunication lines, copying others' telecommunication numbers, and using telecommunications facilities or code numbers that are known to be stolen or copied are acts that disrupt the order of the telecommunications market, and the public security organs may pursue their corresponding legal responsibilities accordingly. At the same time, rubbing the Internet may touch on the "three crimes" 1. Article 286 of the Criminal Law of the Criminal Law: Whoever violates state regulations by deleting, modifying, adding, or interfering with the functions of a computer information system, causing the computer information system to fail to operate normally, and the consequences are serious, shall be sentenced to fixed-term imprisonment of not more than five years or criminal detention; where the consequences are especially serious, the sentence is to be five or more years imprisonment.

    2. Article 285 of the Criminal Law on the Crime of Illegal Intrusion into Computer Information Systems: Whoever violates state regulations by intruding into computer information and amusement systems in the fields of state affairs, national defense construction, and cutting-edge science and technology shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention. Violating state provisions by invading computer information systems other than those provided for in the preceding paragraph or employing other technical means to obtain data stored, dismantled, or transmitted in that computer information system, or by illegally controlling the computer information system, and the circumstances are serious, a sentence of up to three years imprisonment or short-term detention and/or a fine is to be given; where the circumstances are especially serious, the sentence is between three and seven years imprisonment and a concurrent fine.

    3. Article 264 of the Criminal Law on the crime of theft: Whoever steals public or private property, and the amount is relatively large or the theft is repeated, shall be sentenced to fixed-term imprisonment of not more than three years, short-term detention or controlled release, and/or a fine; where the amount is huge or there are other serious circumstances, Lu Tanliang is to be sentenced to between three and ten years imprisonment and a concurrent fine; where the amount is especially huge or there are other especially serious circumstances, a sentence of 10 or more years imprisonment or indefinite imprisonment is to be given, and a concurrent fine or confiscation of property.

  5. Anonymous users2024-02-05

    Hehe, it looks like I'm still a little overwhelmed when I just went abroad. Because what you said is not very clear, I can only give the following suggestions.

    1.Don't worry, it's nothing, you're a typical thief. Few people pay such attention to these issues.

    After all, there are very few people who know how to use computers. Most people only use it, and they don't know what's going on when something goes wrong. Unless the same problem arises over and over again, it will cause alarm.

    And if there is no situation such as data loss, it is generally too lazy to care. You can think about it yourself, for such a trivial matter, it takes a lot of effort to arrest people? It's not worth it.

    2.Network IP conflicts generally occur when using wired Internet access and entering a fixed IP, which will not occur when using wireless Internet access alone, unless the other party has set IP restrictions.

    3.The other party will also jump out of the same window. And the other party's computer is on at the time of the conflict.

    4.Because you're using Wi-Fi, you have to worry about this being discovered by someone with a heart. You can use a wireless network in your area.

    Hehe, you're such a good boy, it's rare to do something bad.

  6. Anonymous users2024-02-04

    This problem is more serious. It's normal to see the excitement and the conflict with the original computer. It will definitely be found in this state.

    Bear with me.

  7. Anonymous users2024-02-03

    Set up MAC address filtering, no one can use the Internet without setting a password.

    The wifi signal of the wireless router will always be connected by someone, even if the password is set, there is a brute-force cracking software can also be cracked, connect to your own wireless route, and seize the network. Here we need to use the wireless router's built-in setup tool to set up, only allow the specified computer to connect to the wireless router to prevent others from rubbing the network.

    Method steps.

    1. First log in to the wireless router management page, enter http in the browser: followed by the IP address of the router, (this address is not fixed, generally check your own default gateway is the address of the management page).

    After entering, a dialog box will pop up for you to enter the user name and password, the settings of different router manufacturers in this place are different, you can refer to the instruction manual (the general user name is admin, the password is empty or admin).

    2After entering the management page, there is a menu bar on the left, and you can find the Wireless MAC address filter option. Once clicked, the homepage will show you the wireless MAC filtering settings.

    3 General MAC address filtering function is turned off by default, we click Enable Filtering to start it. There are options below, Forbidden. and allowed.

    Generally, if we don't want others to rub the network and only allow a few people in the LAN to connect, then select Allow, and then add the allowed MAC address in the following entry.

    Once set up, our wireless network can only be used by the people who set it up.

  8. Anonymous users2024-02-02

    Yes, you can use software such as WiFi Manager to limit the rate and directly eliminate it.

  9. Anonymous users2024-02-01

    The simplest is to change the wifi password, and secondly, some routers can also set a connection blacklist.

  10. Anonymous users2024-01-31

    Set a new password and update your login password from time to time.

  11. Anonymous users2024-01-30

    Just reset your password.

  12. Anonymous users2024-01-29

    Yes, change the complex password on the router, or change it in the router settings.

Related questions
15 answers2024-05-04

If, as you say, giving money to your ex-girlfriend, is there a suitable excuse for being found out by your girlfriend? It's actually embarrassing to do that, and if that's the case, have you found a suitable reason to borrow it? Explain this problem, but you don't have to say anything, after all, you have given him money, and it was also discovered by the girl, so there is nothing to say, then you can only say euphemistically, let him pay you back more in the future, it must be said that it is not big, after all, your girlfriend must have a very good opinion on this matter, and it is not good to meet anyone who does this, if this matter is in turn your girlfriend, give him money to his ex-boyfriend, what will you think in your heart? >>>More

27 answers2024-05-04

This kind of thing is really wrong with you in the first place. I think you should find him privately and tell him what you really think, I certainly don't know what your personality is. If I were you, I would be like this : >>>More

6 answers2024-05-04

I discovered a way to distinguish between raw and hard-boiled eggs. >>>More

5 answers2024-05-04

Yes! I found a worm in the apple.

When I was a child, I stumbled upon a worm while eating an apple, and here's what happened. >>>More

2 answers2024-05-04

I have a little turtle at home, and the little turtle sleeps in the tank all day long, carrying a heavy shell on his back every day. His shell can be beautiful, square by square, each with a different green, light and dark ....... >>>More