Carter Edstrom: Use a hotspot control package on your router. You simply assign a username and password for each user, if the user abuses the regulations, you just terminate the users connection. It really works and is easy to use.Although designed for wifi, they can also control the ethernet side of a router as well.There are several free hotspot systems available just search for Free Hotspot Software.here is one sample http://www.publicip.net/You can also get routers with that functionality built in, for instance the AirEpoch HGW210 Hotspot router has full usercontrol built into the router itself. http://www.wlanparts.com/product/HGW210-E/AIREPOCH...You can use DD-WRT firmware if your router supports it, it too has user management built in.http://dd-wrt.comAdd- If you don't want to add control software, you can use MAC filtering, however, in most cases to get MAC filters to work a router reboot is required. A router reboot will cause everyone to disconnect while ! the router is being reset....Show more
Brice Greczkowski: Yes there is a way , you will need to know the name of the computer.from your computer simply :-start , run , SHUTDOWN -iit will ask you for the computer name - select add put the name in and click ok.this will logoff the computer from your network...Show more
Jonathon Labonne: There are software available for managing your computer shop, one is cyber cafe pro, and cafe suit, you can use these for managing your computer shop.http://cafesuite.net/http://www.cybercafepro.com/...Show more
Lindsey Zanardi: get inside the router setup by typing 192.168.1 this shows the number of people connected here u can disssconnect the unwanted person
Kassie Kay: hi Barring access is a problem on a live lan, apart from unplugging. how about a firewall that restricts use. i would guess this is regular visitor and he is taking advantage of your network. the best option is password protection, unless its a member! of staff then they should be made aware of a policy such as n! o porn on equipment etc. a manager needs policies to protect the system and the company....Show more
No comments:
Post a Comment