I'm currently stuck in a used bedroom infested with flies at the time of writing this.
My parents have decided to block internet whenever I try to move my PC back upstairs. Asking them wouldn't work out because it usually falls on deaf ears.
A few days ago, they moved it without my knowledge, and I noticed that my folding table was gone from my bedroom.
I'm planning to set it back up again, but they might turn my internet off when they catch me. I'm trying to get a few ideas and create a plan to move my PC back upstairs.
I found a few tutorials on getting through parental controls, but the tutorials are done on Windows and parental controls are set up using TP-Link.
Depending on the type of flies, an open container with apple cider vinegar (not white vinegar) and a drop or so of dish soap will lure flies in and they will drown. It helps with smaller flies.
it's setup to only allow whitelisted devices, in this case you're fucked, only option is to pretend to be some whitelisted device
it's a blacklist, in this case changing your mac address will make you appear to be a new device, anyone monitoring the device list could see the unknown device appear
I know nobody likes a know-it-all. But FYI: The current suggestion is to call these allowlist and blocklist. I'm not sure how they're called on the router. The terms have been out there for a few years already.
One question that I have though is where does it end? The word blacklist from an etymology standpoint has got bothing to do with race. So where do we disregard the historical context of the meaning of words because people take it out of context and it makes them feel uneasy?
I am not saying that I am against using blocklist instead of blacklist. I am just asking. Where does the history anfd usage behind the term supercede the out of context hurt feelings?
Wow. Just wow. I'm deliberately not replying to any single comment. I didn't know this is such an emotionally charged topic. And I don't like it.
I know the relation to 'race' and that being the cause for people arguing about it a few years ago. But isn't it a better term? If I want to block something with my firewall... I'm putting it on the blocklist (or deny-list). If I want to allow something... It's on the allowlist. Forgive me, maybe I'm a nerd and I don't care so much about the etymology. Why bring in (random) colors? Can I please use the term because I think it fits better?
And the discussion immediately shifting to connector genders... Well. Yeah I get it, it's a funny subject. And comparing something with protruding parts to a penis is funny. Also for me... But you people immediately having trouble with the terms, (rightfully) bringing in hermaphroditic connectors. And there being several disctinct/binary ones but with ambiguities so that it's more convention than protruding bits in case of electronics... It just shows naming connector sides that way is a stupid idea. It get's you most of the way but after that, it just confuses people and stops describing anything useful. I'm a bit unsure about this. Because it's one of the few accepted penis jokes you can make at work or a conference (at least innuendo). And I don't want to lose all of them. But it has never been a good 'analogy' in the sense that it is a good descriptive way to name connectors.
As a parent myself I often have to pause my kids internet because modern games and social media are addictive. I tell my kids it’s time to get off (because bed time, family activity, meals, etc etc) and they’re stuck in that “just one more” mind set. They can’t see that they’re addicted and we need some way to break the connection. We give them 30 minute warnings and remind them all the way down to zero and they still won’t shut down. If the parents are enforcing public usage it’s likely because the kid has been caught behaving inappropriately in private.
To the OP, maybe instead of trying to get around your parents rules, listen to them and understand why. Show some responsibility and they might start to trust you.
It sorta depends on exactly how the blocking works but it’s most likely by MAC address. You can spoof this address through windows I believe, which will make the network view you as a different system.
My interpretation is that the parents are manually putting blocks in place after the device is moved. Of course if that’s the case and they’re actively managing this, you can get around it but they’ll notice eventually either way.
Without knowing more specifics it’s hard to say. If it’s over a wireless network, using consumer grade equipment, Mac filtering is the option most people have out of the box. They can enable/disable it from a phone if they’re using TP-Links app.
Anything else involves VLANs and firewall rules, and if that’s the case OP is out of their depth
This is what we in the business call a "skill issue."
There are ways around it, yes. But none of them are plug-and-play unless you're lucky, and a reliable solution will require a combination of technical ability, stealth and social engineering.
What I would personally do is buy a device that can connected to wifi and hotspot at the same time. This can be a raspberry pi or a wifi router range extender.
I would set the name and MAC address to match a device that is constantly connected, a smart TV or Alexa maybe.
Then I would use this device connect to the internet.
Everything works as usual and for those who monitor the network via Router settings, nothing looks different.
Have fun pulling risky moves and maybe also learn something out of it.
One of these is $40 USD, and can be configured to provide a VPN for all through-traffic. They're small, portable, discrete, and cheap. I love these devices. The slightly more expensive model gives you WiFi 6. They were designed as portable bridges for insecure locations, creating a private LAN; they are powered by USB-C, so could be run off a laptop.
Deliberately duplicate a mac address, and worse, deliberately pick a device that's definitely going to be online in the same network segment?
At first I thought you were either trolling or profoundly ignorant.
Then I remembered that wifi is CSMA, and thought, hang on... is this actually a genius idea? Has this user come up with a hack that no-one else knows about? So I tried it.
I think you are missing my point. The "pretending" device connects to router, while the "original" device connects to the pretending device. The 2 interfaces that share the same MAC don't connect to the same network.
The user also conncets to the pretending device. to hide their access to the router.
Wait, what's a "used" bedroom? Why do you have a fly infestation in your room? Do you often leave food there or something? Sounds like it needs to be cleaned thoroughly.
Check if the password and user name is the default for the model. Google the model or see if there is a sticker on it.
There is usually a factory reset button. Again Google how to do that for your model. Then you can log in with the default password. It will also reset every other setting too so if you lack the knowledge to reconfigure everything else they will notice.
If either of your parents is better than you at IT I advise against trying. They will notice.
I don't know how old you are or how much money you have to spend on this.
I don't know shit about tech. If I had to find a workaround, I'd buy my own portable modem and keep it secret.
Caveats of this method: you may need to be of a certain age to purchase one. (Perhaps second hand....? You will still need a card for it though). Second issue with this is, how much data are you going to use? This may not work if you are planning on gaming. But if you just need to browse the web discreetly, it will be good enough.