How do I know if someone accesses my computer

is there a way to determine if a person has access to my computer?  XP, THAT IS TO SAY 8

Just a few weird things underway, history in IE, etc.

Hello

1. do you have an anti-virus software is installed on your computer?
2 have you made changes on the computer before this problem?
3. have you ever seen someone access your computer remotely?
 
The weird changes see you on the computer could be due to infections on your computer...
 
 
Method 1: Run a virus with Microsoft Safety scanner scan and verify.
http://www.Microsoft.com/security/scanner/en-us/default.aspx
Note: Before performing safety analysis make a backup of important data.

 
Method 2: You can check the event viewer to view the event logs.
Procedure to view and manage event logs in Event Viewer in Windows XP
http://support.Microsoft.com/kb/308427

Tags: Windows

Similar Questions

  • How can I know if someone is trying to hack into my system?

    Original title: Hackers

    How can I know if someone is trying to hack into my system?

    If you see something strange, like move your mouse, you windows open randomly. In some cases, you may not notice anything.

    I suggest to do some checking, first run Windows Update and install all updates, if your system is outdated, it is easier to get hacked.

    Other than Windows, you must ensure that other applications on your PC are updated such as Java, Flash Player, and if any application asked for the update, please do.

    Make sure, of course, install Anti-Malware software and update it.

    Run a full system scan with:

    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    If it detects any threat, you can click on it to read more, some threats are associated with hackers, as spyware that spy on your PC.

  • need help on history, recycle bin and cookies: how will I know what someone has done on my laptop?

    I would like to learn more about history on my computer vista laptop microsoft and more on maybe the trash and or cookies. For example, someone else used my laptop last night and delete everything that he was looking at or for then how can I know what it was?

    Assuming that it has not been removed, you can view the history of visited web sites by clicking on the Favorites button, click the history tab.

    The only things in the trash are files or folders that have been removed from the system (no evidence they have been read or something like that).

    Cookies will not tell you anything either because they are terms in the code and you can not tell what web site they belong - no good for tracking not web history (and they apply only to the history of the web).

    You can view the Start / recent items to display some of the files which were recently seen (assuming that the list has not been removed).  That may help some.  You can also go to C:\Users\\Recent for a longer list of recently accessed files (as long as you know the user name).

    There is actually very little that you can do with hindsight to see what anyone seen or done on your computer.

    If you want to implement such a procedure, use the Parental http://windows.microsoft.com/en-US/windows-vista/Set-up-Parental-Controls control and activity reports control Parentalhttp://windows.microsoft.com/en-us/windows-vista/Set-up-Parental-Controls-activity-reports.  Do this for each account you want to track.  Then you can check what you wish now that you could check.

    I hope this helps.

    Good luck!

    Lorien - MCSA/MCSE/network + / has + - if this post solves your problem, please click the 'Mark as answer' or 'Useful' button at the top of this message. Marking a post as answer, or relatively useful, you help others find the answer more quickly.

  • How will I know if someone reads my emails

    I discovered that my son is reading my emails. How can I stop this?

    I have moved your question to the topic of Windows/security box. Set up a login ID and password under Windows if you mean that he has access to your email on your computer.

    If, however, you make reference to a Hotmail account, change your password at http://account.live.com

    If you use a different e-mail account, change the password by the provider settings.

    -steve

  • How do I know what is my laptop computer motherboard? That windows has an app?

    Hello.

    Is there a way to know what is the motherboard in my laptop?

    I have PCWizard 2010 and can install in there, but I was wondering if a windows application or command is there too. I looked in directxdiag, but I found nothing.

    Is it the same in XP?

    Thank you.

    There is no such tool included in Windows.

    Run this tool:

    http://www.CPUID.com/softwares/CPU-z.html

    to see what motherboard you have.

    "A programmer is just a tool that converts the caffeine in code" Deputy CLIP - http://www.winvistaside.de/

  • someone was able to access my laptop remotely today, how would I know if they let any virus or spyware on it.

    someone was able to access my laptop remotely today, how would I know if they let any virus or spyware on it. I have norton 360 virus protection that has not detected any viruses. IM worried about using my computer to stuff order online where they can steal my credit card details / number while im using it

    Hello

    How do you know that someone will access your computer from outside? Allow access and do you
    you know who it was?

    Here is some information that should help you:

    Was it a SCAM phone call that initiated the connection distance:

    Avoid scams to phone for tech support
    http://www.Microsoft.com/security/online-privacy/avoid-phone-scams.aspx

    Its a total scam. Uninstall their software and then perform a system restore before you install.
    Change all your sensitive passwords at all sites - e-mail, Bank, credit cards and others. (Do not
    on the computer compromise and it would be better to do it on the phone or in person.)

    You can even restore your system to factory fresh to make sure their software violates not
    your security. (Ways to re - install Windows Clean - removing everything on the backup drive so all the data
    before hand.)

    It is also possible that they consulted Bank, passwords and information of credit card on your computer. If
    in order to check for malicious software as shown below. Change your passwords. Contact the Bank and credit
    phone card companies. Do the same for any investment or other sensitive professionals or personal
    accounts that may have been violated.

    ====================================================================
    ====================================================================

    In the United States, you can contact the FBI, Attorney general, the police authorities and consumer
    Watch groups. Arm yourself with knowledge.

    No, Microsoft wouldn't you not solicited. Or they would know if errors exist on your
    computer. So that's the fraud or scams to get your money or worse to steal your identity.

    Do not fall for the fake phone Tech Support
    http://blogs.msdn.com/b/securitytipstalk/archive/2010/03/09/Don-t-fall-for-phony-phone-tech-support.aspx

    Avoid scams that use the Microsoft name fraudulently - Microsoft is not unsolicited
    phone calls to help you fix your computer
    http://www.Microsoft.com/protect/fraud/phishing/msName.aspx

    Scams and hoaxes
    http://support.Microsoft.com/contactus/cu_sc_virsec_master?ws=support#tab3

    Microsoft Support Center consumer
    https://consumersecuritysupport.Microsoft.com/default.aspx?altbrand=true&SD=GN&ln=en-us&St=1&wfxredirect=1&gssnb=1

    Microsoft technical support
    http://support.Microsoft.com/contactus/?ws=support#TAB0

    Microsoft - contact technical support
    http://Windows.Microsoft.com/en-us/Windows/help/contact-support

    ===========================================================
    ===========================================================

    Follow these steps carefully:

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be more difficult to detect as the
    cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Start - type this in the search box-> find COMMAND at the top and RIGHT CLICK – RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to fix the system files of Windows 7 with the System File Checker
    http://www.SevenForums.com/tutorials/1538-SFC-SCANNOW-Command-System-File-Checker.html

    How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
    generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Also run CheckDisk, so we cannot exclude as much as possible of the corruption.

    How to run check disk in Windows 7
    http://www.SevenForums.com/tutorials/433-disk-check.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    ======================================

    If necessary AFTER THAT you are sure that the machine is clean of any malware.

    How to do a repair of trouble Windows 7 installation (it's for Windows 7 and there are similar procedures
    for Vista if necessary.)
    http://www.SevenForums.com/tutorials/3413-repair-install.html

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle=""><- mark="" twain="" said="" it="">

  • How to know if someone has responded to your message?

    How do you know when someone has replied to your message?

    Do you have an email if you have been set up for this with the old forum?


  • How to know if someone copied a file on a USB?

    If you have a person who you think access to your USB key, how do you know if they copied a file from your USB key on his computer?

    Hello

    Unfortunately, there is no way we would know that someone has copied contacts from the flash drive on your computer.

  • How to know if someone has tried to determine or to derive my password?

    I came across a link under Favorites called how to bypass the administrator password.  I am the administrator and I has not implemented the link.  I would like to know if anyone has tried to compromise my means of access.  There are 3 users, and I'm the only one with a password.   Thank you.

    Hi johnnysboy,

    There is no way of knowing if someone is connected to your user account.

  • If I block someone on iphone 6s, can they still leave a voicemail? If so, how will I know? Y at - it an icon?  Would I be able to listen to it?

    If I block someone on iphone 6s, can they still leave a voicemail? If so, how will I know? Y at - it an icon?  Would I be able to listen to it?

    When callers are blocked, they are sent directly to your voicemail. They can leave a message. You can still hear none of these messages by going to voicemail in the phone app and then type in blocked messages. They are separated from the other voice mail message so that don't accidentally read you them if you don't want to.

  • create dvd Windows will not import the mp4, how to get around it, someone knows?

    create dvd Windows will not import the mp4, how to get around it, someone knows?

    It must convert your mp4 to WMV format video, and then add the wmv in Windows DVD Maker.

    There are other formats supported by Windows, but I chose WMV format because it is the most reliable and foolproof format for Windows.

    You can google for a free video converter. No need to buy one, unless you are a 'huge' in the making of films and others.

    I use Prism video converter. It's free.

    I'm not fan of movie maker. Prism is what I need it to do.

    http://Prism-video-converter.en.softonic.com/

  • How will I know where all the reports of users has access

    Hi gurus,

    We use the Hyperion Financial Reporting 9.3.1 & we have 80 reports & 750 users. How will I know where all the reports of users has access. Where can I find this information. I checked the SSP, it only shows the provisioing details, but not the name of the report. I also checked the Essbase.sec but no use. Where can I get the info. Kindly help me.


    Kind regards
    Kris...

    There is no tool of Hyperion to display easily groups and security filters.

    But it really depends on how you set up your security model.

    Normally, you add users into groups and assign these groups to essbase and reports (via the BEEP groups) cubes, so you can check reports have access to correct group and the users are in a good group.

    There is a security tool to export available here, hosted by Applied Olap, and underground work Olap-based:
    http://www.appliedolap.com/free-tools/Advanced-Security-Manager

    Best regards, Iain

  • How do I know what toner cartridge to replace if do not have access to the status of supplies?

    With the help of color Laserjet Pro 200 M276nw MFP and the need to replace at least 1 color cartridges.  How can I know which?  After reviewing other assignments, it is said to check the status of supplies or go to the configuration of the control panel system.  Well, I don't have any application from HP on my laptop.  So I tried to reconfigure the installation to see if that would lead me to the status of supplies - but I stopped after that it first required me to connect a USB cable btwn the printer and the laptop (when I'm already actively using the wireless setting).  Help!

    The SAP is the built-in webserver, built into the printer.  To find this you need the printer IP address (something like 192.168.1.11).  Enter the IP address of your browser and it will open the built-in Web server.  The homepage of the SAP will be different tabs to get to other pages of EWS.

    You should be able to find the IP address of the façade, or by printing a Network Setup page.

  • How can I know which files are accessed more so I can move them to another drive

    My C drive is constantly busy and is indexed to 100% much of the time.  My swap file is on my S drive and its activity is very low. How can I know what is causing all the readers of the activity on my C drive so I can move some things my S, or other?

    I realize it is not easier to simply move the files, I might have to reinstall some applications or other things. But for now, I don't know what are the files or applications, roll to the top of the activity on my C drive.

    You can use performance monitor. Type perfmon in the "Search" box and press "Enter."

    Open the drive section by clicking on the arrow

    To identify individual files in more detail, you will need the Windows Performance Toolkit

    http://msdn.Microsoft.com/en-us/performance/cc709422

    http://msdn.Microsoft.com/en-us/performance/cc825801

    Download as part of the WIndows SDK from here:

    http://www.Microsoft.com/downloads/dlx/en-us/listdetailsview.aspx?FamilyId=6b6c21d2-2006-4AFA-9702-529fa782d63b

    Select this option for components you need.

    There is a video on the use of the tool here: http://channel9.msdn.com/Events/PDC/PDC09/CL16

    At a glance, use Process Explorer to identify the source of the e/s:

    http://TechNet.Microsoft.com/en-us/Sysinternals/bb896653

    On the file menu, click "show details for all processes."

    On the view menu, click on "Select columns" and check the deltas of reading and writing.

    You can also use the process monitor:

    http://TechNet.Microsoft.com/en-us/Sysinternals/bb896645

    This will show you the operations of individual files so the amount of data will be huge. If a Visual inspection reveals anything, you can export the data to a csv file and use a spreadsheet to a total activity for each file.

  • HOW TO FILTER DATA IN MICROSOFT ACCESS

    HOW TO FILTER DATA IN MICROSOFT ACCESS BASED ON THE DATE AND TIME AND GIVE THE RESULT IN A TABLE?

    I need a few examples of files, can someone help me please?

    Fix your keyboard. If it has not been broken, be a little more polite and stop screaming.

    Research, are thousands of examples on the web related to the jet and sql database. This is a very basic select statement. Access to a query wizard that can then show the sql code. If you don't know how to design a query in access, you need a Basic for this tutorial. No question of LabVIEW here.

Maybe you are looking for

  • Clear the cache of the browser does not work

    It's on a new phone Nexus 5. I tried to use the supplied Chrome browser and was disappointed to find that empty the cache (for Chrome or Android settings/applications), did not work. Old Web sites visited and tabs were still present at the start-up.

  • localhost problem

    Good day everyone. For the moment, I am unable to access www.apple.com. Whenever I try to access the site, it brings me to the html page "it works!" Please give me steps on how to restore the files to the Web server in my mac. Thank you.

  • When you visit adobe website flash plugin crash page appears

    When I visit the website it freezes for a while and adobe flash plugin has crashed appear that technology it will have on all the videos I have open in tabs, the problem started this week

  • Satellite A210-128: I want to change the 320 GB HARD drive 7200 RPM

    Hallo all Can someoane help me with this little problem?I have a portable satellite A210-128 with a hard drive of 250 G 4200 RPM (* slowest *)... I want to change the hard drive with a hdd 2.5 "Western Digital 320 G 7200 RPM (* speed *). Question:1.

  • light stays on too long

    my phone stays on too long. I can adjust the light turns off after a period of non-use? iPhone 6 more.