Quote:
he could pull his router's system logs (if the defense can get access to them, which is unlikely in some jurisdictions), point to the fact that "someone else" was logged in via wifi
|
There is no way to determine if a machine connected to your wifi is the legitimate machine you think it is or is someone spoofing that machine by looking at logs. That is how she/he got onto the network in the first place - impersonating the legitimate machine so that the router could not determine it was an imposter.
About the only way to tell is to turn off the legitimate machine and see if the connect goes away.