The radical action is to “lock it forever” for the intruder without changing the Wi-Fi key

the Hackers on Wi-Fi networks Not only can it slow down the internet system, but it also represents a security vulnerability It leaves a lot of data on networked computers vulnerable. That’s why so many people want it Delete accounts “forever” from your Internet Without many complications such as changing the password. This is possible and Step by step It’s very simple.

If that’s what you’re looking for Forever prevent the device from connecting to a Wi-Fi network without changing the switchThe most radical and effective measure is to block the device’s MAC address from the router.

The process that needs to be done is called MAC blocking (MAC filtering/access control). This is a unique address that each device has. If the router is activated Mac filter The device’s MAC has been added to the blacklist, so this device will not be able to connect even if it knows the password.


1

Access the router panel

The person managing the network must enter the router’s configuration panel. Typically, this is done from the browser by entering the computer’s IP address (for example, 192.168.0.1 also 192.168.1.1) and authenticate using administration credentials.


2

Look for the access control feature

Within the configuration menu, you must select the corresponding option, which can be called Wireless – MAC filtering, Access controlalso Advanced security According to the manufacturer.


3

Activate block list

Once you reach the appropriate section, filter mode is enabled and the option is selected. black list also religious So the list acts as a lock (not an exclusive permission).


4

Specify the MAC of the device you want to block

You must specify the MAC address of the device you want to block. This MAC is usually seen in the list of devices connected to the router; From there it is copied or selected to add to the block list.


5

Add MAC and save changes

With the MAC already entered into the block list, changes to the router configuration are saved and, if necessary, the device is rebooted so that the new rule is applied.

Safety warning and other conditions