Now there's a whole lot of wifi cracking software, and there are all kinds of people to the personal WiFi password to rub the network, resulting in a variety of our speed of slow, the computer also because of the speed of the problem and change card, then I teach you a way, in addition to the WiFi plus password, I introduced for the MAC address limit method, The equivalent of a second encryption of WiFi, but this method requires the owner of the WiFi router to agree to access the Internet, or break the password is not even wifi.
Tools/raw Materials
Routers, computers, Web pages, and networks
Method/Step
Connecting the router and network cable, and connected to the Internet, we turn on the computer and open the Web page after entering.
In the Web page to enter our router account password, and into the already set up the router system inside, open the wireless parameters into the MAC address filter, we have to determine the MAC address filtering function is off state, so that in the following host State to see our own computer or mobile phone and other MAC address, Although I can find the MAC address in my mobile phone, I don't specify how to look at my mobile phone MAC address in detail.
We then look at the host state of the wireless parameters, as shown in My computer, after turning off the MAC address filtering function to connect 5 Mac, enable the state for our own router to connect the main computer, copy or record our own MAC address.
Back to the MAC address status page, the use of our MAC address to add new items, add into the project, description can be filled in the form of notes, the other does not change, added items will appear in the latest column.
After the addition, we open the Filter function item, and according to the effect we want to choose to allow or prohibit the list of effective rules of the MAC address to access our network. Set the rules after the password cracked is not connected to WiFi, need to go through the Mac entry filter verification can be, this step must be routed through the set.
If the above steps are prohibited, entries in the state allowed in the list can be connected to WiFi with a password, and the status-disabled entries and the users who are not in the entry are not connected. If you choose to allow, the list of state-invalidated entries and users who are not in the entry can use the password to connect to WiFi, and the status allowed entries are not connected. So we can choose who can connect Wi-Fi, who can't connect WiFi, choose when to open the password connection, when to open the password connection, and WiFi to be the master of our own.