Technology in terms you understand. Sign up for the Confident Computing newsletter for weekly solutions to make your life easier. Click here and get The Ask Leo! Guide to Staying Safe on the Internet — FREE Edition as my thank you for subscribing!

I’m Using Someone Else’s Internet Connection – Am I at Risk?


If I use a wired internet connection provided by my colleague is there any way for him or anyone connected to that same modem to watch the files in my laptop or if they can see my laptop while I’m using the internet like Skype or Gmail?

The short answer is: absolutely yes.

You are very right to be concerned. This is a topic I touch on from time to time, and it’s worth discussing a little bit more, since the risks are very easy to overlook.

Become a Patron of Ask Leo! and go ad-free!

Can they access the files on your machine?

I can only say maybe.

First, you want to make sure that you have your firewall turned on. This will prevent the majority of truly malicious accesses due to malware and the like, but you also need to make sure that Windows file sharing is turned off.

Depending on your version of Windows, this can be easy as a simple change to the firewall settings. For example, in Windows 7, make sure that your network is classified as public, and that network discovery and file sharing are both turned off in the Windows firewall settings for public networks.

If file sharing is turned on, it’s possible for someone to actually view the contents of your hard disk and the files on it.

Later versions of Windows tend to default to some more secure settings, but the worst-case scenario is that it’s possible to see everything.

Can they see what you’re doing on the Internet?


Network connection plug RJ-45The setup you’re working with is very, very much like operating your computer in an open Wi-Fi hotspot. Anyone connected to the network could potentially see your unencrypted data. Even when the connection is encrypted they can still see what sites you are visiting, just not the data you exchange with those sites.

The solutions here then are exactly the same as when you’re using an open Wi-Fi hotspot.

Use https whenever available. In particular, make sure that anything truly sensitive like email or banking is only done via an https connection. And if you need more protection than that, start using a VPN service, which will encrypt everything you do between your computer and the VPN service’s server; meaning that no one in-between can see much of anything.

Realize who your ISP is

I’ve long said that your ISP can see everything you do. Most of them aren’t interested, but the point is the technology is set up so that the person providing your internet service can see pretty much whatever it is you’re doing, and that amounts to everything I’ve just talked about.

But think about it for a minute. What does ISP stand for? It stands for Internet Service Provider.

In this case, your colleague is providing your Internet service. They’re your ISP. With enough technical smarts, yes, he could indeed see what you are up to unless what you are up to is encrypted. And other people sharing that same connection potentially could also, depending on how things are set up.

Do this

Subscribe to Confident Computing! Less frustration and more confidence, solutions, answers, and tips in your inbox every week.

I'll see you there!

6 comments on “I’m Using Someone Else’s Internet Connection – Am I at Risk?”

  1. I am concerned. My partner stole my identity. Opened many accounts on my name and one credit card made himself card holder and primary email and phone so I never knew about it. Spent 14,190.53 on nothing. I will skip all the depressing details and get to my question.
    My dad gave me a home computer, I was on my partners wifi, I didn’t know at the time that he could access my computer which makes sense now why he was so adamant about me using it instead paying for my own wifi and he install something in back of the tower. I know I’m green as grass!
    Well I had about 300 photos of proof in a folder on my desktop called “Evidence” so I could get them off my phone. I was in properties of a particular item and saw a new user account was added I didn’t recognize and it was a long number like S-1-5-21-267131998-(plus 2 more rows of numbers) Anyway as soon as I saw it… it switched all by itself to something like Nir Soft or BATCH or New User can’t remeber. Few days later my computer dies and I find my folder in his One Drive but he changed the name of the folder, got rid of all my subfolders and changed the properties because they all had no info so doesn’t look like they came from my iPhone 5c which he also jailbroke. Did he create a Home group to access my folder because he says “I don’t even know how to do that.”
    I know he is lying how can I prove it?

  2. I use a wireless network provided by my landlord recently I have had some concerns about it’s safety and if they are in fact “watching” my web activity. I’m not doing anything wrong but I really don’t like the idea of anyone tracking me. I use a vpn win 10 firewall and use ghostry how safe am I? Can the owner of the router see everywhere I go? How can I ensure a safe connection that can’t “follow” where I go?

  3. If I am using my Chrome but its connected to another person’s internet in the house. How do I view websites and such without the other people knowing what sites I go to?


Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.