How can I remove this intruder from my network...???

Discussion in 'Hardware' started by Sh@dow, Feb 9, 2010.

  1. Sh@dow

    Sh@dow Private E-2

    Hey Guys,

    I think I have an intruder...

    I'm running Win 7 with Norton 360 Security, wireless modem/router broadband cable.

    See attached for screenshot to see what I mean.

    When I right click on it, it only allows me to see its "my documents" and to create shortcut.

    How can I remove it? How can I prevent it from connecting to my pc in the future? I thought Norton 360 firewall managed all that???

    Any help would be much appreciated

    Thanks

    Shads
     

    Attached Files:

    Last edited: Feb 9, 2010
  2. collinsl

    collinsl MajorGeek

    Okay, so you are sure there are only supposed to be 2 computers on the network?

    What kind of wireless security are you using at the moment?

    Are any of the computers connected wirelessly?
     
  3. Sh@dow

    Sh@dow Private E-2

    definitely only 2. I've had this set up for at least 4 months now and never had more than 2 pcs there.

    I'm using the SSID key and WPA para security.

    No computers are connected wirelessly to the network. I often use my laptop on this network wirelessly but this time it was in my bag switched off and plus it has no shared folders so it wouldn't show up. Not to mention that's not its name.

    I guess if he didn't have any shared folders I wouldn't have noticed it.
     
  4. Michael York

    Michael York Norton Authorized Support Team

    Hi Sh@dow,

    This is Mike from the Norton Authorized Support Team.

    There is a feature in the Norton Firewall portion of Norton 360 called the "Network Map" which is used to set the "Trust" level of the devices on your network. This will allow you to exclude unknown devices. Please follow the steps in the document below which describes how to assign the correct "Trust" settings and other access features to known devices and to remove unknown devices.

    Configuring Network Security Map in Norton 360 Version 3.0

    I would also suggest that you revisit your wireless security configuration to make sure that your security is configured properly.

    Thanks,
    Mike


     
  5. Sh@dow

    Sh@dow Private E-2

    wow that's one neat feature - thank you Mike.

    the unauthorised pc has since left so I can't test it out but will keep an eye out.

    In the mean time I might set up a trust level to prevent any future attacks.

    Thanks again for everyone's help!

    Shads
     
  6. Michael York

    Michael York Norton Authorized Support Team

    Hi Sh@dow,

    I'm glad I could help you out. Even if the rogue device is no longer showing up in Windows, I would strongly suggest that you configure the Network Map feature to allow access only to the devices that you currently have on your network.

    Thanks,
    Mike


     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds