How to tell if someone uses my count at home when I'm not home?

Original title: who was on my computer.

Probably a stupid question, but I've never had to ask before.  How to tell if someone uses my count at home when I'm not home?

You can examine (eventwvr.exe) Event Viewer system log. He recorded each logon.

Tags: Windows

Similar Questions

  • How to tell if someone uses remote adjustment to control the use of my computer?

    How to tell if someone uses remote adjustment to control the use of my computer?

    * original title - monitoring computer use *.

    Hello

    Why do you think that someone is watching your computer use? One would have to have
    loaded tracking software (trojan) on your computer or have access to the source of the network
    you use, such as cable, on your leg of it and have very sophisticated equipment.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
    RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker
    (SFC.exe) program generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    =======================================

    For extreme cases:

    Norton Power Eraser - eliminates deeply embedded and difficult to remove crimeware
    This traditional antivirus analysis does not always detect. Because the Norton Power Eraser
    uses aggressive methods to detect these threats, there is a risk that it can select some
    legitimate programs for removal. You should use this tool very carefully and only after
    you have exhausted other options.
    http://us.Norton.com/support/DIY/index.jsp

    ================================

    If you are in North America, you can call 866-727-2338 to get infections of virus and spyware. Seehttp://www.microsoft.com/protect/support/default.mspx for more details. For international information, check your subsidiary local Support site.

    I hope this helps.

  • How to tell if someone is remotely access our home computer (s) and storing hidden files and/or access our emails and accounts?

    I think my computer (s) have been used to store hidden files / emails and unauthorized activity distance without our knowledge... We have problems of browser and see all kinds of strange activity and files which are not ours in folders on the list of recent documents that contain garbled code... How to join us at the heart of what happens or not to be a problem with security problems... (IT SEEMS to COME through OUR OUTLOOK EXPRESS WE HAVE EVER PUT UPWARDS or USE of e-mail > response will be GREATLY appreciated as we are unable to pay for assistance online live...) Thank you! Roberta!

    A short list includes...

    IP alias addresses

    Identities with the user's alias opens a session

    Activity on and off our drive c: with text records distorts

    the use of our accounts of outlook express and hotmail etc etc...

    First of all, download and install Malwarebytes from the link below. Once installed a dialog window with two boxes with checkmarks in them is displayed. Make sure both boxes are checked. We need to launch Malwarebytes, and the other is to be updated. Once updated Malwarebytes opens. On the "Scanner"tab check the box for a fast analysis." Start the scan. At the end of the analysis, follow the prompts to remove whatever it is detected. Display the results of the analysis in your answer to receive the next step.

    Malwarebytes.org

    How to use Malwarebytes

  • How to tell if someone is using your identity after phone call scam

    I got one of these calls, but unfortunately worries me now that I may have something that I regret? Please indicate how to get out of this?  He seems to know what he was talking about too? Thank you

    * original title - how do you know if people are using your identity? *

    Your post is rather vague, but it seems you've been had by a scam, there are much of what we can do here to help you.  If you gave them your credit card information, you can call your company and credit card fraud report and have the card cancelled.

    John

  • How to tell if someone is using my network or internet connection w / my password

    Ok.. So I let my old neighbour use my network providing him with my router username and password of my network. Now his family of very strange... possibly use their computers to connect and play games on Facebook and emails. They have no internet so it must be on my network. fix? Can I use mngr. to view the process and from that task? Help, please... I know I was taking a chance here, but I have confidence in him.

    Thank you kindly

    Sunday, September 14, 2014 02:11:07 + 0000, Slamina wrote:

    * OK... So I let my old neighbour use my network providing him with my router username and password of my network.

    Always a bad thing to do, in my opinion.

    Now his family of very strange... possibly use their computers to connect and play games on Facebook and emails. They have no internet so it must be on my network. fix?

    They could also use some other wi - fi router, but you are probably
    correct that it is yours.

    Can I use mngr. to view the process and from that task? Help, please... I know I was taking a chance here, but I trusted to him.*

    If I were you, I would simply change the password of the router. Do not
    worrying about if they used it, stop using it more.

  • How to tell if someone in my house, it's stealing my internet

    I believe that someone in my house, it's stealing my internet. How will I know? I don't know too much about spyware. I see if spyware is on my computer? Or is spy software on the other computer in our House? Or on two computers... I have a lap top the other computer at home is a pc

    Thank you very much.

    slasm

    Hello

    Carefully check for malware: it's search for Trojan horses, recorders of striking and other methods.
    For more information about security, see the following message after you below.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.  (Vista is similar - to use XP RUN instead of start - search)

    Start - type this in the search box-> find COMMAND at the top and RIGHT CLICK – RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to fix the system files of Windows 7 with the System File Checker
    http://www.SevenForums.com/tutorials/1538-SFC-SCANNOW-Command-System-File-Checker.html

    How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
    generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Also run CheckDisk, so we cannot exclude as much as possible of the corruption.

    How to run check disk in Windows 7
    http://www.SevenForums.com/tutorials/433-disk-check.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    I hope this helps.

  • How to tell if someone answered me in the Apple community?

    Hi, I'm new to the community of Apple, and I just asked a few questions here. However, I have not received an email or notifications on all the answers to my messages. I checked my messages manually, then I discovered someone answered me. So, should I manually check my posts to see if anyone responded? What happens if someone answered me on my response to their questions? This seems very awkward for me.

    In addition, I checked my preference, there is no option on the e-mail responses to me.

    You should be automatically 'after' any thread you posted in; If this is not the case, for some reason, make sure to click on the 'monitoring' in the upper right:

    Once you follow the thread, check in your preferences that you have turned on email notifications. Click your name (upper-left), and then click Preferences. Make sure that everything you want to be alerted on is set on "on".

    Make sure yours is on (mine is off):

  • How to tell windows to use the hardware embedded product key when it changes on Windows 8

    I just did a clean install of Windows 8 on a laptop that I bought with Windows pre-installed on it. For this I used a windows key, I bought last year and that I currently use on another computer.

    What I want to do is to change my product key and get Windows 8 to use the one built into the motherboard instead of the one that I had to enter during installation.
    Any suggestion?
    Thank you!

    The key embedded can be used only with the support of recovery of the manufacturers. You can not use with retail media.

  • I think that someone other than me has synchronized my computer. How to tell if someone has access to my activity?

    I think my computer is "hidden." There are Web sites that I have not visited at all, including the Mozilla developers, who appear as previously visited. In addition, whenever I load a page, it seems to load twice, as if another copy is running in the background. Help, please.

    The Firefox sync system don't live synchronization of all of the Web site that you visit on another device. That means, the problem with your sites Web appearing to load twice is more than likely not caused by the synchronization system.

    For added security, please change the password for your Firefox sync account to make sure that nobody can access it.

    It seems to me that you have an infection on your computer. You can try these free programs to search for malicious software that work with your existing anti-virus software:

    Microsoft Security Essentials is a good permanent antivirus for Windows 7/Vista/XP, if you do not already have one. Windows 8 already has integrated antivirus.

    Please let me know if the scans detect something.

  • How to tell the script that I want to save unsaved files, but not to replace the old?

    Hello world

    I had this script

    docs var = app.documents.

    for (var i = docs.length - 1; i > = 0; i--) {}

    If (.saved docs [i] == false) {}

    docs [i] except (new File("~/Desktop/Document.indd'));

    docs [i]. Close();

    }

    else {}

    docs [i]. Close (SaveOptions.Yes);

    }

    }

    Close and save files

    But if I have two files or more, I want to save the files as Doc1, Doc2...

    the new file will never replace the old

    Can someone tell me how I can do?

    Thank you

    Respect of

    Teetan

    Hello

    The 4th line change as below:

            docs[i].save(new File("~/Desktop/Doc" + (i+1) + ".indd"));
    

    Vandy

  • How to talk with someone about the warranty on my Microsoft keyboard is not working

    When you use numbers and enter 332, numbers appear in the form. Try the number 7 and you get a succession of numbers you have not entered.

    This keyboard is less than a year and is under warranty. How can I get a replacement?

    Hello

    I moved your post to the appropriate forum where moderators can better address your problem.

    Thank you!

  • Q -? How do I view and use LR on my laptop when remote desktop?

    Is there a way to display my LR catalog (in the applications on the desktop) on the remote laptop?

    Simply to optimize any free time to processing in LR, when you are away from the office.

    I've heard that apple products can "communicate" with each other, don't know what this means?

    (Presume would need to use a function of cloud (who have never used or understand at the mo).)

    LR is located in Applications on iMac desktop mid 2011, 1 TB, 16 GB Ram, 2.7 GHz intel core i5, updated to OSX 10.11.4,

    USB - 2, x2Thunderbolt @ 10 Gbps.

    Desktop PC only backed up by Time machine > from the hard disk.

    Photo of indexed and stored on separate x portable hard disks 2(duplicated hard drives*), before importation > catalogue LR.

    * (Just like having security storage, counting not only on LR catalog).

    I tend to upload images through portable laptop to laptop hard drive, due to the capacity of computers faster download speed.

    Then connect hard drive on the desktop > catalogue LR, preferring the big screen for review/image processing.

    Laptop MacBook Pro mid 2015, 1 TB, 16 GB Ram, 2.8 Ghz intel core i7, OS x 10.11.4,

    X 2 USB-3, Thunderbolt @ 20 Gbit/s.

    Hi ashleyk,.

    Catalog is saved on your computer/external drive.

    Best option is updated catalog and pictures on the external drive.

    Please see these links for the means commonly used to share between two computers catalog in Lightroom

    https://photographylife.com/sharing-Lightroom-Catalog-with-multiple-computers

    http://www.hdrphotographyblog.com/tutorials/sync-Lightroom-Catalog-with-dropbox/

    Here a double wire Lightroom on two computers

    Let us know if this helps

    Assani

  • Help, please. My CD/DVD drive won't open unless I use a needle and even when he's not reading anything.

    As I have said on the subject my CD/DVD drive does not open and it will not read. My computer sees the problem but has no solutions. That I am, I expected to do?

    Hello

    Step 1: Please do all the same underneath if you did some before as is often total
    a process that solves the problem.

    Try this - Panel - Device Manager - CD/DVD - double click on the device - driver tab.
    Click on update drivers (this will probably do nothing) - RIGHT click ON the drive - uninstall.
    RESTART this will refresh the default driver stack. Even if the reader does not appear to continue
    below.

    Then, work your way through these - don't forget the drive might be bad, could be a coward
    cable or slight corrosion on the contacts (usually for a laptop) and other issues.

    Your CD or DVD drive is missing or is not recognized by Windows or other programs
    http://support.microsoft.com/kb/314060 - a Mr Fixit

    Try this fix manually if the Fixit 314060 does not work
    http://www.pchell.com/hardware/cd_drive_error_code_39.shtml

    Your CD or DVD drive is missing or is not recognized by Windows or other programs-
    a Mr Fixit
    http://support.Microsoft.com/kb/982116

    The CD drive or the DVD drive does not work as expected on a computer that you upgraded to
    for Windows Vista
    http://support.Microsoft.com/kb/929461

    When you insert a CD or a DVD, Windows Vista may not recognize the disc
    http://support.Microsoft.com/kb/939052

    Your CD or DVD drive cannot read or write media - A Mr Fixit
    http://support.Microsoft.com/GP/cd_dvd_drive_problems

    CD/DVD drive does not appear in Windows Vista, or you receive this error in Windows
    Vista installation after booting from the DVD (AHCI)
    http://support.Microsoft.com/kb/952951
    Drive CD - R or CD - RW Drive is not recognized as a recordable device
    http://support.Microsoft.com/kb/316529/

    Hardware devices not detected or not working - A Mr Fixit
    http://support.Microsoft.com/GP/hardware_device_problems

    Another possibility is that the cables are loose. Remove ALL power, then make sure that the cables in both
    ends. Remove and replace, do not just tight. For laptops, you can often clean power and
    contacts data with a pencil eraser.

    Some DVD players do not use the Windows default drivers so check with the manufacturer of system and
    manufacturer of device to see if there is a firmware or drivers for your drive if necessary.

    ===============================

    Step 2: You have disc problems as the CD/DVD is actually 4 discs in 1 case (CD & DVD
    Burn and CD and DVD read). So it is not unusual for 1 or 2 operational so that other parts
    do it right.

    Did you follow the Troubleshooting Guide for the reader who still does not work? There are
    the entries in registry that the troubleshooter does not solve and those who "might" be the cause.

    Check with your Maker system and a device for the two possible firmware updates and
    the correct registry entries for your car.

    Here are the keys that I of course are those in question - for the subkeys of the CD/DVD drive
    as there will be other subkeys in these keys. Do not forget to ask specific keys involved as well as
    the parameters.

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\IDE

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Hardware Profiles\0001\System\CurrentControlSet\Enum\IDE

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\ {4D36E965-E325-11CE-BFC1-08002BE10318}

    -----------------------------------------------------------------------

    You can probably find more info here and maybe even the exact registry for your CD/DVD settings
    drive from someone with the same model.

    Forums - a lot of expert real help
    http://Club.myce.com/

    CD/DVD units
    http://www.myce.com/storage/

    Use DevManView to locate the CD/DVD in the registry (be careful and do a prior Restore Point)
    nothing change) - find the DevManView device and then make a right click on it free in RegEdit.

    DevManView - free - an alternative to the standard Windows Device Manager, which displays all the
    devices and their properties in flat table, instead of the tree viewer
    http://www.NirSoft.NET/utils/device_manager_view.html

    I hope this helps.

  • Lenovo y510p using a lot of RAM when it should not

    I just had the y510p the other day, installed windows 7 64 bit and it has loaded with pilots and after installing all the car windows updates (which is almost a day of the tool) and now it seems he uses around 35% of the 8 GB RAM and comes with SLI disabled and all it remains out. Any idea what could be the cause? Looking at the Task Manager I could sum up a total of about 1 GB used but it always seems like about 3 GB used

    Yes, those look normal to me. You use 1.6 GB of ram right now which is pretty standard for Windows.

  • How is it possible to clone a virtual machine cluster when data warehouses not presented in source and destination

    I did not know that on ESX 3.5, in order to afin de vivre live clone a virtual machine from one ESX host to another, source and destination stores had to be available. However, I'm currently cloning a virtual machine to a host in a datacenter and cluster to one host in a different data center, but the destination store is not available at the source host and visa versa.

    How is that possible?  This is a new feature of vSphere?

    That seems to work on the console port. See this thread: http://communities.vmware.com/message/1475721#1475721

    AWo

    VCP 3 & 4

    Author @ vmwire.net

    \[:o]===\[o:]

    = You want to have this ad as a ringtone on your mobile phone? =

    = Send 'Assignment' to 911 for only $999999,99! =

Maybe you are looking for