How to tell if someone is spying on your computer

Do you suspect that your computer is not as you left it? Here are 4 ways to tell if someone is spying on your computer!

snooping, pc

Has anyone secretly used your computer? What have they looked at? Your laptop is not where you left off. Your office is a mess. Almost everything you do leaves a mark on the computer. You just have to know where to go to find these items.

Knowing where to look can drastically reduce the time it takes to find the culprit. See how to find out if someone was on your computer without your permission.

1. How to see which files were opened on your computer

Most users should know how to view your recently opened files. By checking them, you can see if anyone else has opened any file without your knowledge.

Windows introduced this feature as an easy way to reopen files you've worked on or looked at. It's especially handy if you do secretarial or general file work . Αλλά μπορείτε επίσης να χρησιμοποιήσετε αυτήν τη δυνατότητα για να ελέγξετε εάν κάποιος άλλος έχει in your files.

Just open File Explorer and go to "Quick Access" or press Windows + E. In Quick Access you can see what is open, so look for anything you have not opened.

quick access

Alternatively, you can check the files that have been opened in individual applications from their menu. Several of them allow you to view the "Recent" files. For example, if you think someone has violated a PowerPoint presentation you did, check out "Recent" in this program.

2. How to check recently modified files

Anyone can delete recent activity from your machine, just left-clicking on "Quick Access> Options> Clear File Explorer History". If your recent activity has been deleted, this is at least a sign that someone has used your computer.

But how do you know which folders are open?

Go to File Explorer, mark one of your disks on the left, e.g. C: and then in the search box on the top right modification date: (if you have English write datemodified :) and press Enter.

datemodified

You can do a more specific search, by date range, by clicking "Search" from the main menu of File Explorer and then opening a drop-down menu in the "Modification Date" section, located in the upper left corner of your window. By clicking on "Today" you will understand what changed today, but you can also go back a whole year.

You will see a list of files that have been accessed, but only if something has changed. Hopefully you are lucky enough that your computer automatically saved an item while the spy had it open. Check the times listed and limit them for when you were away from your device.

3. Check your browser history

Everyone knows that you can easily delete your browsing history from your browser. But if someone used your computer in a hurry, they may have forgotten this step.

Google it has the largest market share, so it's very likely that whoever spied on your computer used it. Click on the vertical dots in the upper right corner and then on record and see if something goes wrong.

However, don't rule out the others browsing. If your computer has Edge, press Ctrl + H at the same time to go to history. Firefox users should click on the menu, followed by History > Manage History.

4. How to access Windows 10 login events

You want to know if someone else has access to your computer, but the simple methods have not yet worked. Fortunately, you can delve deeper into your computer for further information.

Windows 10 automatically detects login events, which means that they mark every time you log in to your device. So how do you control that? And once you find the log, how do you interpret all these weird codes that seem to make no sense?

Search for “Event Viewer” and click on the application. Go to “Windows Logs > Security”. You will see a long list of activities, most of which will not make much sense to you, if you know Windows IDs well.

event viewer windows

What to look out for is Event ID "4624", which is logged as "Logon". "4672" means "Special Logon", which you can see in conjunction with a standard connection. This indicates a management connection. "4634" appears when an account logs out of your computer.

It may be difficult to locate these codes, but you can restrict them using the "Find λειτουργία" function in the "Actions" menu on the right.

If you know you were away from your computer at some point, you can either scroll through the log or use Filters. Go to "Actions> Filter current log…", then use the drop-down menu under "Logged".

Click on any individual log file to learn more details, including the account you are logged in to. This is useful if you think someone has used your computer but not your system.

How to enable login control in Windows 10 Pro

The Home version of Windows 10 checks connections by default. However, the Pro version may require some correction.

Access the Group Policy Editor by simultaneously pressing the Win + R keys and typing "gpedit.msc" the execution window that will appear. Then go to Computer Settings> Windows Settings> Security Settings> Local Policies> Control Policy> Connection Controls.

You must select "Success" and "Failure" to record successful and unsuccessful connection attempts.

gpedit logo

After doing this, you can perform future checks using the aforementioned method through the Event Viewer.

How to stop others from using your computer

How can you stop others from accessing your computer? If it's a work computer, you may have to wonder why it bothers you, but if it's your property, it's your right.

The most important thing is to create a strong password for your account. Make sure it is not predictable. Do not write it anywhere. And every time you leave your office, press Win + L. It is one of the best ways to lock your computer and make sure that no one can spy on your activities.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.
snooping, pc

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).