Quote:
Originally Posted by teh603
So here's a question- have you spoofed his hostname? If not, then he could pull his router's system logs (if the defense can get access to them, which is unlikely in some jurisdictions), point to the fact that "someone else" was logged in via wifi and was downloading the torrents, and when none of his hardware has that hostname he arguably gets off.
|
One of the problems with router logs is that the cheaper the router is (like most people own), the less comprehensive the logs are. Some only keep the DHCP client list - machines that are currently attached. And even if he has invested in a router that maintains historical logs, much of the memory is volatile and will disappear when power is lost to the router.