View Single Post
Old 05-07-2012, 09:39 PM   #188
keeska
Connoisseur
keeska has learned how to buy an e-book online
 
Posts: 59
Karma: 98
Join Date: Apr 2009
Location: Sedona, AZ
Device: Sony T1, Nexus 7, Kindle Fire HD, Samsung Note 3
Quote:
he could pull his router's system logs (if the defense can get access to them, which is unlikely in some jurisdictions), point to the fact that "someone else" was logged in via wifi
There is no way to determine if a machine connected to your wifi is the legitimate machine you think it is or is someone spoofing that machine by looking at logs. That is how she/he got onto the network in the first place - impersonating the legitimate machine so that the router could not determine it was an imposter.

About the only way to tell is to turn off the legitimate machine and see if the connect goes away.
keeska is offline   Reply With Quote