Solved

How do I find out what my internet usage for 'uploads' is represented by and if someone is using my wireless connection?

Posted on 2011-09-25
9
329 Views
Last Modified: 2012-05-12
My internet usage has recently blown out and after contacting my service provider, it appears that my 'uploads' were incredibly high for a couple of days this month. We actually had visitors on these days and I'm wondering if they used my wireless internet connection.

Therefore I have 2 questions:

1. Is there anyway of finding out if someone has used your wireless internet connection? ie a log of some sort AND

2. Is there anyway of finding out what has been 'uploaded' using your internet connection.

Many thanks in advance,


0
Comment
Question by:spectrum17
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 2
9 Comments
 
LVL 6

Expert Comment

by:ckivml
ID: 36597238
if it is a home connection.. try to check your ADSL Router.. it will tell you the how many clients are registered at your ADSL Wireless router only if it is not cleared..

and check your router has any logs.. there is no other way for you to check..  but your ISP can get the report..

0
 

Author Comment

by:spectrum17
ID: 36597244
Thanks ckivml,

How do I check the ADSL router? I'm running Windows 7.
0
 
LVL 9

Expert Comment

by:raysonlee
ID: 36597329
If you haven't set any security protection on your wireless network, it's very likely that someone can use it without your permission. It doesn't really matter whether they do that intentionally or just their PC got virus / spamware. So what you have to do is to protect your wireless network immediately.

You can enable MAC filter in your wireless router to allow "known" devices connect to it only. Usually router has a web administration interface. Just type the IP address (e.g. http://192.168.1.1) of your default gateway and see whether you get a login prompt. Refer to the manual of router for details or search the user guide from Internet.
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 
LVL 6

Expert Comment

by:ckivml
ID: 36597382
go to run type cmd

enter

in command prompt type ipconfig /all

enter

you can see your ip information

in that you can find a default gateway ip.. usually it will either 192.168.1.1 or 192.168.1.254 it can be anything

take that ip.. go to your Internet explorer type that ip for eg : http://192.168.1.1
then it may ask you user name and password if you have any security.. default username and password is differ depends on router brand. .







 on the router
0
 

Author Comment

by:spectrum17
ID: 36597400
When I go into the router address on the internet I don't get a login prompt.

How do I set up the security on the router? or on my computer wireless settings?

Screen dumps would be good as I am a complete novice in this area!!

0
 
LVL 9

Expert Comment

by:raysonlee
ID: 36597915
what's the model of your wireless router?
0
 

Author Comment

by:spectrum17
ID: 36598005
thomson TG782T
0
 
LVL 6

Accepted Solution

by:
ckivml earned 500 total points
ID: 36598219
you can find below link to know how you can go to wireless settings in your router

http://help.telstra.com/app/answers/detail/a_id/16221/~/adsl-wifi---thomson-tg782t---changing-the-wifi-channel
0
 

Author Closing Comment

by:spectrum17
ID: 36598288
thank you
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question