If you are using WEP or few securities, they can use it with unanalyzable kid companionate applications to fly on. Also you could materialize at the transportation log but that is not trustworthy since of that kid affable MAC spoofer. And why not use the any semiofficial networking tract. Here more obtuse advice granted on the site to detect the other users on your router. My proffer is that go with plain kid couthy travail which will aid you a lot for your trouble.