Index:
UPDATED ✅ Do you need to make your Wi-Fi invisible and thus prevent your Internet connection from being stolen? ⭐ ENTER HERE ⭐ and discover how to do it ✅ EASY and FAST ✅
If we are tired of being robbed of the Internet signal and due to this we have a very slow browsing connection, there are different alternatives that our router offers us to strengthen the security of entering WiFi.
One of those tools is make router signal invisible. With this we will achieve many benefits that we will analyze in this article.
In addition, we will focus on steps we will have to perform to configure the router and in each of the councils that we must keep in mind for an efficient setup. Finally, We will show if it is true that by configuring the signal invisibly we lose navigation speed.
Why would I have to make my WiFi signal invisible? Benefits
Making the WiFi signal invisible is nothing more than hiding the broadcast of the SSID. Namely, the devices that are close to our router will not be able to detect the signal of our wireless network.
This is due to the configuration that we can make directly on the router. In this way it becomes very difficult to crack the password and sneak into the network, since password cracking applications cannot intercept the signal.
Based on the last paragraph, we will demonstrate the most important advantages of this tool offered by the router:
Reduces the possibility of hacking
People who want to access our wireless network must enter through an 8-digit number that replaces the password. In order to perform this task, intruders perform a massive check on these PINsuntil it matches one that it has in its database and the corresponding router.
When we make the WiFi signal invisible, it is very difficult for these people to be able to carry out this massive PIN attack task since, by not being able to intercept the signal, the programs they use cannot efficiently carry out their task.
Increase our privacy
We seldom take this matter into account.. When someone hacks our WiFi, this person has access to the devices that are part of the wireless network, being able to access confidential information or data that would put our privacy at risk.
Therefore, when we make the Wi-Fi signal invisible, we are also protecting our security.
Nobody will ask us for the password
Using this configuration alternative we will avoid personal commitments where the people who come to our house ask us for access to WiFi. We will also avoid compromising situations with neighbors who are often the ones disclose our access password.
Only authorized devices will be able to access
It is true that this is the main purpose of the setting to make the WiFi signal invisible, but what we want to demonstrate is that we will have absolute control of the devices that access the network since, as we will see later, to connect you need to enter the name of the network plus the password.
Therefore, by having the SSID intervened we will also have access to it monitored due to the double control it requires.
Steps to configure your router and hide the Wi-Fi signal easily and quickly
The steps required to configure the router are as follows:
We get router IP
We can get these data from the box the router came in or of some label that is attached behind it. Another alternative is search the Internet what is the default IP address that brings the brand of our router.
What we want to show you are not the previous alternatives, but through the use of a command that allows us to use Windows.
For that, we will make this guide:
- We squeeze “Windows + R”.
- We write the command “cmd” and we give “Enter”.
- A black DOS window will appear.
- We will immediately write “ipconfig” and we click on “Enter”.
- It will show us a series of data such as the subnet mask, the MAC address and the “Default Gateway”.
- We copy the numbers of this last option and we will write it in the next step.
We enter the router interface
At this stage we will do this process:
- Once we have copied the Default Gateway We write it in the address bar.
- The router configuration access window will appear in the browser, so we will have to type the username and password.
If we have never changed this data, according to each device brand, the username and password is “admin” for each of the fields.
We select the “Wireless” option
Once inside the control panel we will follow these instructions:
- We’re going to “Wireless”on some other devices it may be listed as Network or WiFi.
- We look for the option “SSID Broadcast”.
- We deactivate it.
- We click on “To accept”.
We check the configuration
To check that we have carried out these processes correctly, we will have to enter with our mobile device and click on the WiFi iconas long as we have this option enabled.
At this moment we will get a list with all the wireless networks available around us, so ours shouldn’t be on that list.
To enter we will:
- Click on our mobile at “Add a network manually”.
- We manually write the name that we gave to the WiFi signal.
- We enter the password.
- We click on “To accept”.
If we have done all the steps correctly, we should be within our network whose signal is invisible.
Will it affect the speed of my Internet to make the wireless network invisible?
Internet connection speed is related in the first place, with the service that we have contracted with our operator and secondly, by the level of occupation that the channels of the frequency of our router have.
Let us remember that a modern router device works with two frequencies, one of 2.4 GHz and the other 5 Ghz. The first has 13 channels while the highest frequency has 22 channels with a much wider band so data travels more efficiently.
I mean, with everything we’ve talked about, speed has nothing to do with the SSID broadcast settingbut with the number of devices that transit through each of the channels of the respective frequency and the service provided by the operator.
Tips to configure your router so that nobody connects to your network without authorization and improve your security
In addition to making the Wi-Fi signal of our network invisible, we can perform other tasks that will allow us to be more efficient with respect to the security of the router.
To shield our router and prevent anyone from connecting, we will need to take into account the following aspects:
Change password encryption protocols
Encryption security protocols are those procedures or parameters that allow a more or less secure connection according to the integral parts they have in the connection process and data privacy.
In this way we recommend using passwords with WPA2 or WPA encryptionwhere the possibility of accessing the router by entering PINs, according to the MAC address, will be very difficult to succeed.
Filter by MAC address
This tool allows us to make a selection of the selected devices through the identification of the network card introduced by the manufacturer, that is, the MAC address.
To be able to filter by MAC we will have to follow the following steps:
- We select the option “Wireless”.
- We’re going to “Filter by MAC”.
- We activate this option.
- We enter all the devices that will be authorized to enter the network.
- We click on “Add”.
- We squeeze “To accept”.
Reduce signal range
We have the possibility of reducing the signal range of our WiFi network, which will help to some extent to reduce the possibility of intercepting the signal.
Although it is true that this is not a specific measure, but it will benefit from being used together with other aspects that we have mentioned.
To make this configuration we go to Windows:
- Control Panel
- Device administrator
- Network Adapters
- Advanced Options
- Potency of transmission
- We choose the range
- To accept
Change factory password
A very simple and concrete security measure is change the factory default password immediately when we receive the router device. This will prevent third parties from carrying out, through applications, attacks on the router and decipher the password to enter the wireless network.
Perform audits with third-party apps
Third-party applications will help us control the entry of intruders because they will carry out work in a systematic and programmed manner in the audit of these. There are different applications that we can install on our mobile device or on the computer.
We recommend you “Who uses my Wi-Fi? Network Tool”.
With this kind of tools we can immediately expel intruders. It also allows us get connection history of the different devices.
networks