"...You should be able to log in to your router and see precisely what devices are (or were) connected to your router in the recent past..." That was his answer, in the middle of his post.
To reduce the stealing of bandwidth:
One could go to using MAC addresses, however, this process also can be overrun by a way-above-average hacker. But, here too, the average person will not take the time and energy to shift through and try the many many combinations of possible MAC addresses to hack through any particular wireless. Once MAC addresses are written in stone, there are a few free utilities that can monitor for and alert for unauthorized attempts of usage within the wireless - I think.
Edited by RolandJS, 20 December 2015 - 01:11 AM.
"Take care of thy backups and thy restores shall take care of thee." -- Ben Franklin revisited.
Backup, backup, backup! -- Lady Fitzgerald (w7forums)
Clone or Image often! Backup... -- RockE (WSL)
"I heard Spock finally got colander!" "I believe the word is Kolinahr." "Oh."