


In addition, they usually offer a scan of your local network in which they often also detect equipment connected by network cable. They can carry out Man in the Middle attacks or perpetrate some infraction and the person responsible in the first instance would be us.įor those who want to get a little less complicated, we have a wide variety of programs for Windows that analyze the network in search of who is connecting to your Wi-Fi.Loss of bandwidth of our connection in favor of the intruder.In the event that we do not carry out periodic reviews of any kind, we can face several types of problems: In that sense, you have to take into account that you enter through the browser by entering your gateway, then you enter your credentials and, finally, look for the corresponding section. The problem is that, due to lack of knowledge or laziness, in the end we do not end up carrying out these types of reviews. Here, we easily and precisely see the connected devices, their connection speed, the band used and more.
