Linksys wireless validating identity problem

16-Jun-2016 16:54 by 6 Comments

Linksys wireless validating identity problem

I see the new 3.1 client is out and we are currently testing it for production.

When it comes to ensuring safety and responsibility on the Internet, proper education and a policy of mutual trust and respect are the best policies. The web is a vast playground of debauchery and anthropological horrors, and it’s a teenager’s prerogative to peer occasionally over the Gates of Mordor into the land of shadows.

[Note: If you have a NETGEAR router, the steps will probably be similar, but may vary slightly.

If you have another router, such as a Linksys, Belkin, ASUS, or D-Link router, the steps will look entirely different.

But I’m willing to bet you can achieve the same outcome by poking around If that doesn’t work, open and type ipconfig /all and look for the field that reads default gateway.

The problem is that a quick Google search reveals a dozen workarounds for even the most expensive parental censoring spy tools.

Making matters worse, by installing the software on their machine, you’re immediately tipping your hand by revealing that [A] you are watching them and [B] which tool you are using.

The better way to do things is to take a page out of the government’s book and surreptitiously and warrantlessly monitor all Internet traffic that goes out of your house.

This process is better because it prevents them from using a browser with an If only there were some gateway that stood between your house and the World Wide Web…oh wait, there is. In this tutorial, I’ll show you how to retrieve the web traffic log from a NETGEAR WPN824v2 router and how to block individual websites for selected computers in your house—all without installing a single piece of software on your kid’s computer.

From porn and bomb-building guides to Facebook and Twitter, the Internet is a vast cornucopia of potentially hazardous material.

For the most part, I’m of the opinion that a little bit of minor mischief is harmless, and perhaps even character building, as long as they come out relatively unscathed.

But if you’re interested in sheltering your child, there’s an equally lavish smorgasbord of parental control and net nannying tools at your disposal.

The logical route for today’s concerned, yet lazy, parent, is to shell out hundreds of bucks for some off-the-shelf piece of software that they can install on their kid’s computer.