Quote:
Originally Posted by Saaf_laandon_mo
Were the people found guilty of hijacking bandwidth caught in the process? Just wondering how you'd prove it after you've downloaded a file and closed the internet connection
|
The router should keep a log of MAC addresses that have connected to it. If the MAC address of the wifi card in the suspect's laptop matches something in the router log, I'd imagine it's goodnight, Vienna.