Receive up to $504 promo credit ($180 w/Welcome Unlimited, $360 w/ 5G Start, or $504 w/5G Do More, 5G Play More, 5G Get More or One Unlimited for iPhone plan (Welcome Unlimited and One Unlimited for iPhone plans can't be mixed w/other Unlimited plans; all lines on the account req'd on respective plans)) when you add a new smartphone line with your own 4G/5G smartphone on an eligible postpaid plan between 2/10/23 and 4/5/23. Promo credit applied over 36 months; promo credits end if eligibility requirements are no longer met.
$699.99 (128 GB only) device payment purchase or full retail purchase w/ new smartphone line on One Unlimited for iPhone (all lines on account req'd on plan), 5G Start, 5G Do More, 5G Play More or 5G Get More plan req'd. Less $699.99 promo credit applied over 36 mos.; promo credit ends if eligibility req’s are no longer met; 0% APR.
I recently received a copyright infringment notice. I live in an apartment building where many users share the same wireless router. I asked everybody about the content downloaded and nobody is confessing who downloaded the material. I have blocked the p2p websites on my router so I am unsure how the content was downloaded. Is there anyway that I can check on the router setting page which user is surfing what websites or using how much bandwidth to track who downloaded the content?
Further, even though you have something blocked in the router a savvy user can get around that block with a VPN or other approaches.
You may want t to limit WiFi access to only those people you can trust.
You may want to consider asking the tenants to get their own connection. Although this approach is not as friendly, it saves your account from the liability occurred from Copyright Infringement.
Otherwise, if you are providing the connection, you are best running traffic through a web filter that will be able to restrict services that are common for pirated materials. Someone determined will be able to get around the filter, although a properly set up one will require a proxy or a VPN with encryption to bypass. Utilize non-intrusive logging as well (bandwidth monitoring per client, traffic type percentages, etc). At that point, If a copyright infringement notice manages to come your way (eg: VPN or proxy provider was subpoena'd to get your IP), you can use these logs to help pinpoint the troublesome user and boot them off.