How can I tell if someone is accessing my router?

1 Answer

Answer :

The router logs will tell you. Why is it unsecured? At least turn MAC address limiting on.

Related questions

Description : Why am I getting the message "Application has been blocked from accessing Graphics hardware"? (cont.)

Last Answer : answer:Is a pop-blocker on? Also, try opening it in a different browser.

Description : Mac Question: Is someone accessing my computer?

Last Answer : You were on a network and what you saw was the shared access to other computers on that network. You should not have been at risk, unless you have enabled sharing on your own computer. Even ... the box are not so easily accessible for other computers on the same network, unless it is intentional.

Description : Can someone recommend an excellent wireless router?

Last Answer : CISCO.

Description : What are the risks of someone highjacking your wireless router signal?

Last Answer : They steal your bandwidth and can make pages load slow and crappy.

Description : I have linksys router for some reason i can only get online with one computer? Can someone tell me what to do to get more than 1 computer online?

Last Answer : answer:You need to go into the router's setup menu and make sure you have DHCP enabled. You also want to set the maximum number of DHCP clients to something at least equal to the number of computers ... prompt and typing: PING 192.168.1.1 That is the base address assigned to the router by default.

Description : Do you see lot of ads while accessing this site?

Last Answer : I stay logged in on both desktop and mobile but if you are not or not a member, you will see ads. It’s some of the revenue.

Description : Why am I getting an "Internal Server Error" when I'm accessing ask-public on my laptop?

Last Answer : It’s not just you. See every other recent meta question from lately. We are having server problems.

Description : What else is a problem for smartphones other than accessing links?

Last Answer : Typing in the rain.

Description : What are some of the most useless security questions you've been prompted to give the answers to when accessing an online account?

Last Answer : answer:Some of the security questions asked by my AT&T account involved some really obscure crap to which I never gave any thought. E.g., what style are your favorite shoes, or what color are your father’s favorite socks?

Description : I have problems accessing folders shared on the network on a Win7 machine from a virtual WinXP machine. What can I do to fix it?

Last Answer : My system is run from XP then to a D-link router to a Windows 7 laptop.and I send folders by internet. Not exactly your problem but it works. If those folders are in an earlier Office on the XP you ... at all. I do love my favorite solution for most computer problems I call my son to come over. :-)

Description : What is the difference between http and https when accessing Google Reader?

Last Answer : https is encrypted both ways. Portions of a page can be encrypted and not others, but your browser should (or at least can be set up to) warn you if that’s the case.

Description : Laleema Chakradhar wants a broadband connection for accessing her mails and staying informed about the latest -Technology

Last Answer : VSNL, Airtel etc.

Description : How can you block an IP address from accessing your website?

Last Answer : There is a lot of ways to do this but I prefer to use a security plugin that's called wordfence. Not only you can block an IP Address but you can even block a whole country, just a ... , a tablet address etc. So many options using wordfence. Hope this answers your question. Best Regards, Nesim

Description : How much is a wireless air card for accessing the internet from my laptop?

Last Answer : Typically the price for a wireless aircard ranges between twenty and sixty dollars depending upon the range. This is a great feature to have and is really convenient! Good luck!

Description : Communications between Tomcat and the Web browser accessing the ePO console is accomplished using ________ traffic through port __________.?

Last Answer : 8080

Description : What is backup? 1) Adding more components to your network 2) Protecting data by copying it from the original source to a different destination 3) Filtering old data from the new data 4) Accessing data on tape 5) None of these

Last Answer : Answer :2

Description : The method of accessing the I/O devices by repeatedly checking the status flags is_________ A. Memory-mapped I/O B. Program-controlled I/O C. I/O mapped D. None of the Above

Last Answer : B. Program-controlled I/O

Description : Explain Connect by Prior ?in a session before accessing next value ?

Last Answer : Retrieves rows in hierarchical order.e.g. select empno, ename from emp where.

Description : What is ROWID ?in a session before accessing next value ?

Last Answer : ROWID is a pseudo column attached to each row of a table. It is 18 character long, blockno, rownumber are the components of ROWID.

Description : What are the usage of SAVEPOINTS ?value in a session before accessing next value ?

Last Answer : SAVEPOINTS are used to subdivide a transaction into smaller parts. It enables rolling back part of a transaction. Maximum of five save points are allowed.

Description : How to access the current value and next value from a sequence ? Is it possible to access the current value in a session before accessing next value ?

Last Answer : Sequence name CURRVAL, Sequence name NEXTVAL.It is not possible. Only if you access next value in the session, current value can be accessed.

Description : What is the fastest way of accessing a row in a table ?

Last Answer : Using ROWID.CONSTRAINTS

Description : A method of multiple accessing where a given RF channel bandwidth is divided inot smaller frequency band. A. CDMA B. ANIK-D C. TDMA D. FDMA

Last Answer : D. FDMA

Description : Do you need to instantiate a class before accessing a Shared (static) member? Why or why not?

Last Answer : Because a Shared (static) member belongs to the type rather than to any instance of the type, you can access the member without first creating an instance of the type.

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : The service access points in Session Layer are called ________________ A. Accessing point B. activation point C. Session Service Access Points D. both a and b

Last Answer : C. Session Service Access Points

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : A modem is not needed when accessing the internet through: a) LAN b) Cable c) Wi - Fi d) None of These

Last Answer : a) LAN

Description : ______ a document means the file is transferred from another computer to your computer a) Uploading b) Really Simple Syndication c) Accessing d) Downloading e) None of these

Last Answer : b) Really Simple Syndication

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : Which of the following is true about cloud computing? A. Cloud computing is platform dependent B. Cloud Computing makes our business applications mobile and collaborative. C. Cloud Computing provides us means of accessing the applications as utilities over computer only. D. All of the above

Last Answer : Cloud Computing makes our business applications mobile and collaborative.

Description : Cloud Computing refers to? A. accessing the hardware B. configuring the hardware C. manipulating the hardware D. All of the above

Last Answer : All of the above

Description : Which of the following is a means for accessing human researchers or consultants to help solve problems on a contractual or temporary basis? a) Amazon Elastic MapReduce b) Amazon Mechanical Turk c) Amazon DevPay d) Multi-Factor Authentication

Last Answer : Amazon Mechanical Turk

Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : Program-controlled I/O

Description : Accessing a third-party REST service inside a Spring application. a) RestTemplate Class b) ViewResolver c) InternalViewResolver d) View

Last Answer : RestTemplate Class

Description : To publish a REST service with Spring. a) publishing an application’s data as a REST service b) accessing data from third-party REST services c) none of the mentioned d) all of the mentioned

Last Answer : all of the mentioned

Description : Very large sustainable reading and writing bandwidth, mostly continuous accessing instead of random accessing. The programming interface is similar to that of the POSIX file system accessing interface. This is ... : Google File System c) HDFS: Hadoop Distributes File System d) None of the above

Last Answer : GFS: Google File System

Description : Which of the following is true about cloud computing? a) Cloud computing is platform dependent b) Cloud Computing makes our business applications mobile and collaborative c) Cloud Computing provides us means of accessing the applications as utilities over computer only d) All of the above

Last Answer : Cloud Computing makes our business applications mobile and collaborative

Description : Why is direct accessing of data a big advantage over the sequential accessing of data?

Last Answer : It gives us fast, immediate access to specific data without having to examine each and every record from the beginning.

Description : The necessary steps carried out to perform the operation of accessing either memory or I/O Device, constitute a ___________________ a) fetch operation b) execute operation c) machine cycle

Last Answer : c) machine cycle

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : Digital Forensics entails _____. A. Accessing the system's directories viewing mode and navigating through the various systems files and folders B. Undeleting and recovering lost ... identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Last Answer : D. The identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)

Last Answer : (D) (a), (b), (c) and (d) 

Description : DBMS provides the facility of accessing data from a database through (A) DDL (B) DML (C) DBA (D) Schema 

Last Answer : (B) DML

Description : Which application is used for accessing the information on internet ? (1) operating system (2) web browzer (3) microsoft word (4) system software

Last Answer : the answer is web browser

Description : The technique of collecting information about an object from a distance without making physical contact with it is (1) Remote sensing (2) Remote control (3) Remote accessing (4) Space shuttle

Last Answer : Remote sensing

Description : What is the size of memory which can be accessed by direct accessing in 8085 microprocessor? A) 64 kB B) 4 kB C) 128 kB D) 128 MB 

Last Answer : What is the size of memory which can be accessed by direct accessing in 8085 microprocessor? A) 64 kB B) 4 kB C) 128 kB D) 128 MB