How to know if you get used to the computer. How to find out when a person has come into contact, and how to seize the hour of recovery.

Tsikavist, as we know, is an unchangeable human tragedy. So today we’ll talk about something new. I have to ask the same questions more than once: how to find out if I was using my computer if I didn’t have any instructions. The most useful thing is to keep a log on your computer that records the work of your PC, including a record of turning on your computer or laptop. I think that since you didn’t put food on, you also felt the need to know that you used the computer on your day and that you yourself worked on it.

To ensure that we are fully aware of this issue in the future, I am planning to write an entire article on this topic. As soon as the computer turns on, the entry to the “log” is published. It will display all the operations that take place on the computer. In more scientific terms, the entry “log podoy” is created. Here will be the date and hour of the operation that will be carried out. Moreover, a record of running processes of the operating system is kept.

How do you know who used the computer?

To understand this, you must open the magazine. For whom we go to “start”, we write the phrase “Perspective of the day” in the rhyme row. We open the knowledge file.



In the window that has opened, you need to know in the menu "Win Log"dows”, and then “system”.

You will find a list of the same as presented in the table. Here you will find the name of the category, the time and date when this topic was displayed, and the code of the category and category is also displayed here.

Having looked at the table, you will see if the computer was stolen or if it was hidden. If I have considered the rest of my understanding, I have not used a computer during my employment.


Thank you, this simple method will easily and simply allow you to understand whether your computer was turned on without you. Well, if someone is hacking your computer without your knowledge, I recommend that you put a password on the cloud account, so that no one will be able to hack your PC without your knowledge. That's all. What are you doing with us!

There are a lot of koristuvachs who can look at the history of what you have done on your computer and what you have done on your computer. The entire history is saved in logs on the computer or in the browser. It’s impossible to isolate completely new statistics, but it’s still possible to get the information.

Review of remaining documents

You can look at which documents were recently opened in a special folder for this purpose. The English won is called " Recent» or “Recent documents”.

In order to work, you need to carry out a number of manipulations with the “Start” button. Right-click on the “Start” menu and click on “ Powerful».

Then open the “Start Menu” tab and click the “” button Nalashtuvati" Check the boxes next to “Save and display a list of recently opened documents from the Start menu”, “Save and display a list of items recently opened in the Start menu”.

Then, in the customized menu, click on the “recent documents” value so that you can check the box.

Now open the Start menu with the left mouse button and you will see the “recent documents” tab. By clicking on them, you can see which documents are currently open on your PC.

History of expansion

In addition, you can view the remaining documents you have looked at on your computer, similar history can be found about this activity on the global Internet. These are the ones who cheat on the browser.

To see where you went on the Internet, you need to click on three vertical points at the top right corner of the browser.

The procedure for all surveys is identical; the details may be different in the interface. More details about viewing history in all current browsers can be found in our statistics.

This is also the main function of Google tracking the activities of a merchant. In order to access it, you need to set up your Google browser under your cloud account so that history data is displayed and saved there. Then, after about an hour, if you want to look at what you did, log in to your Google account. Find the tab " My activities", go to "Program and web search". Here you can find out what was in your account account on your smartphone or on your computer – just like you registered.

Utilities launch history

The history of utility launches can be obtained using additional special programs and in the journal. The rest will be looked at later. And you can also learn the history from a special dad.

Almost all programs can be found on drive C. Go to the Program Files or Program Files (x86) folder. Find the folder with the utility, for example Google Chrome. Right-click on the compiled file to launch it come to the authorities.

The window will show the opening time, change the time you can still access the file.

There is an even simpler way to find out what file is being added to:



ExecutedProgrammlist

Using a program like ExecutedProgramslist, you can view a list of utilities and file packages that are running on your computer, and you can also view activities on your computer. Install this utility and run it. Then scan your computer.

Software displays all utilities that are running. By right-clicking on one of the programs in the window, you can save the elements you have seen.

With these programs you will receive the following information:

  • File name.
  • Change the hour.
  • It's time to open.
  • It's time to launch.
  • File size.
  • File attribute.
  • Expanded.
  • Software version
  • Company name.

And so the program was launched about the skin.

LastActivityView

This utility collects information and displays it in its log, which can display virtually the entire history of the computer.

  • Copying the text typed on the keyboard.
  • Enable any actions on the computer.
  • Access to instant messengers and screenshots for scrolling through tasks.
  • Prihovane stezhenya.

Nedoliky:

  • Functionality is limited in the catless version.

Install the program, run the installer and after installation, go to the setup window. This contribution explains all the points that will be necessary for working with the utility.

The interface is simple and intuitive for a beginner.

NeoSpy

Another paid tool for monitoring your PC, which allows you to record activities on your computer.

  • Saving collected information.
  • Be careful at the computer and the actions of the koristuvach.
  • Simple and user-friendly interface.

Nedoliky:

  • There are no versions for smartphones.
  • The full version is paid.

Install the program, and then launch setup. All parameters, including previous utilities, are explained in detail.

To start when the computer is warmed up, you must check the box " Run at startupWindows».

You can also adjust the restrictions for opening and closing the window, and automatically take a screenshot at the hour the window is opened. Everyone is trying to get a help badge at the official offices.

Snitch

At the forefront, the solution is not dependent on computer resources, which allows you to monitor the actions of the client on weak PCs.

  • I work without access to the Internet.
  • Prihovany mode is set.
  • Does not require computer resources.

Nedoliky:


Before the first vikoristannyam, it’s not necessary to fix it. All parameters set in the settings allow you to carry out more detailed steps. Everything is installed.

Once again, for your sake, welcome! It will immediately be recognized if the computer or laptop gets stuck or gets stuck. This possibility will be even worse for fathers who have prevented their children from turning on the computer. With this bag, you can easily check your child’s restlessness without installing additional software.

Additional information: If you want a special program for verification, just download the additional software.

Croc 1:
We need to open the window first Keruvannya by computer. On the desktop, right-click on the icon My computer then select the item Management.

Croc 2:
Now it will open again at the end, where you need to select the item Look at it again And click on the new one or click on the green arrow and the sub-items will open.

You can choose another option, for which you just need to enter the following text in the search row in the Start menu: Look at it again And the same result will appear before you.

In this window you can view all the information. The log table is displayed in the center - it records all the fields that were accessed from the computer. The skin has its own code for an hour. You can find out if your computer is stuck in your bag by simply looking at the table hour after hour. For example, let’s take the rest of the picture above, the date is indicated there: 02/14/2014 and the hour 21:36, which means at that hour the computer was running. Since your sons blocked the computer on February 14, 2014, you can simply marvel at the entries on that number.

You can also manually enchant the program. Vaughn expands without cost and pratsyuvatime without limitation.

To realize that your personal computer is still turned on is even unacceptable. At the same time, any person begins to become interested in who has earned it, and who has lost it. You can find out about the power supply by going through the details of the Windows system section.

The Windows operating system collects a large amount of information about all kinds of people. For example, this includes information about turning on and off the PC, remaining changes to installed files and programs, the hour to open any programs, and much more.

To find out the date and time you last turned on your computer, you need to check the Windows security log. For whom:

  1. Go to the "Start" menu, then to the "Control Panel".

  2. Go to the “Administration” tab, having previously set the “Large icons” value in the “View” mode.

  3. There you need to know the item “Use a computer” and select it.

  4. With the bear's deep left clicks, open the section “Perspective of the day.”

  5. In the “View View” section, select “Windows Logs”. Ix file: log of installation, system, add-ons and safety. For now, we need the remaining safety log.

  6. Now look for information about your last exit from the system. Everything after this is a record of the actions of third parties, right up to the time of logging into the system.

How to find out which activities have been logged on your computer while you're at it

In order to find out what programs were launched on the PC:

Krok 1. It is necessary to check the supplement log. Vin goes to that list of magazines, supposedly a safety magazine.

Croc 2 The program log saves data about all programs that were launched during the session. Check the time you launch programs and log in/out from the system so as not to confuse your activities with those of third parties. For clarity, you can sort log entries by hour.

Increase your respect! If the robot was running in Windows with elevated rights, all logs could be completely cleared.

What else should you do to increase your respect?

Browser history

To find out which sites you have visited or accessed on the Internet without your permission, you need to check your browser history. It is explained below how to know the history of the publication in the most advanced browsers.

Google Chrome

Write “chrome://history/” in the address bar, or open the history using the additional key Cntrl+H.

Opera


Mozilla Firefox


Influence from browsers

Be sure to check the Vantage folder for new unknown files and programs. For whom:


Remaining changes to files

Reviewing changes in files will allow you to see in more detail what kind of activity was carried out on the PC.

Krok 1. Open the menu of commands by pressing the Win+R keys.

Croc 2 In the window, write “Recent” and press the enter key.

Croc 3 The open window will display all changes to the files. Take a look at them.

Note! However, once you clear this folder, you can now look at the files on your OS disk, sorting them by date of change.

Launching programs

You can also find out what programs are running on your day. For whom should you sign these actions:

Krok 1. Open "Explorer".

Croc 2 Select drive C: and open it with the left click of the bear.

Croc 3 Find and open the “Program Files” folder.

Krok 4. Search for "*.exe".

Krok 5. In the “View” tab, go to the “Table” parameter.

Krok 6 Then, using the right mouse button, press the name of any item, for example, “Date of change.”

Krok 7. Select the “Report” column with the left mouse click and find and select “Access date” in the list of parameters.

Now, having sorted by access date, you can see the remaining programs that are running.

Verifying your computer using the “Audit” policy

Enabling “Audit” can allow you to log in to everyone who logs into the system not only locally, but also in remote mode.

Krok 1. In the command line that opens under Win+R, write gpedit.msc.

Croc 2 Select “Computer Configuration” by clicking the left mouse button.

Krok 4. Open the “Security Settings” directory.

Krok 5. After this “Local Policies” and “Audit Policy”.

Krok 6 Now select the top “System Login Audit” and check the “Success Audit” and “Vidmovy Audit” icons and set these settings.

Now the system keeps track of all system starts, cloud records that were included before the OS, as well as the date and hour. You can see this in the security log, which was previously described.

Methods to protect your computer from being hacked by third parties

Obviously, the most obvious way is. However, it turned out that if anyone else has to use a computer, it is possible to create another one. This is to limit other people's access to certain functions and programs.

Video - How can I find out if my computer has been hacked while I'm working?


I love you, dear readers! I recently received an email from a merchant. Koristuvach asked me this: Workers during my work hours?

In other words, if you keep a computer, some kind of journal, in which you would record all the financial transactions that you do on the computer.

To report on this topic, I decided to write a post on this topic. When you turn on the computer, then from that moment the recording of the actions that you follow on the computer begins. More precisely, it appears that a “log file” is created, which indicates the date and hour of a specific operation, and also records the running processes of the operating system.

How can I find out who touched my computer?

Well, let's see this magazine. Click on “Start” and enter a search in the row - “Review of the day.”

As a result, the “View Now” window will open, in which we will need to go to the “Windows Logs => System” option.

At the next window, the category window will open, which will form a table, where, as you see, the date and hour, as well as the category code, will be displayed.

By looking at this table, you can determine if the computer has become dark or dark. For example, on the 9th of spring I plugged in the computer and started turning it on already on the 10th of spring. So, in my work with a computer, no one has ever used a computer.

The axis can be changed in this simple way if your computer is connected. And dear readers, do you know any other ways to ensure that your computer is turned on during your work? Radium is almost in the comments.

That's all for now. Now you will be in the know How do you know if you hit the computer? .

We'll let you know in the future =>

Dear readers, if after reading this article you have received a comment, or if you would like to add more information about the topic of this article or the entire Internet resource in general, then you can use the form of a comment. Also ask your diet, propositions, and wishes.

Well, on today's day, everything that I want to tell you about in today's issue. I can't believe that you have found useful and useful information in this article. Well, in my opinion, I check your nutrition, advice and propositions for this article and the entire site as a whole