Categories
IT Tricks Random

How to identify your computer is accessed and used theft

[ad_1]

The computer is a place to store many private data as well as important documents. When you are not using the computer or away from home, how to check if the computer is accessed without your permission? Please follow the article below.

Related posts

  • How to see whether Zalo is being read or not
  • Tips against computer screen peeking
  • Identification of faulty hardware
  • How to lock iPhone, iPad remotely when it is lost or stolen
  • Software that blocks wifi, prohibits wifi access of users of laptops and phones


When you use your computer for many important purposes, you should set a computer password to ensure your computer’s safety from unauthorized access by strangers. If you do not want to set a complicated password, you can check the accessed computer to detect strangers using the computer in time.

INSTRUCTIONS ON CHECKING A COMPUTER ACCESSORY

Method 1. Using Windows Event Viewer

Windows Event Viewer is a tool available on all versions of Windows operating systems to help you check the computer’s login history. You can use this tool to filter and check your computer for unauthorized intrusion.

Press Windows + R to open the dialog box Tremor later type eventvwr.msc and press Enter to open the Windows Event Viewer window.

Check the imported computer

On the Windows Event Viewer window double-click the item Windows Logs and choose Security. Here you will see login sessions on your computer.

Check the imported computer

You can double-click any login session for more complete information such as any account login. Thereby detecting a stranger using the computer in time if there is a suspicious login session.

Check the imported computer

Method 2. Show last logged-in session

This will help your computer display details of the most recent login session, help you detect strangers logging on to your computer when you’re away from home.

Open a Run window (Windows + R) and type regedit.

Check the imported computer

On the window Registry Editor navigate to the directory System follow the path: HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Policies System. Then right-click on the System folder, select New -> DWORD (32-bit) value and name that value. DisplayLastLogonInfo.

Check the imported computer

Double click the newly created value, set the value in the box Value data was first.

Check the imported computer

After the setup is complete, when you log in the computer will display the most recent login attempts and any failed login attempts.

Method 3. Enable Logon Auditing to check login activity

This way will help you check the computer being accessed through the number of successful and failed login attempts on your computer. Note that Logon Auditing mode is only enabled on Windows 7/8 / 8.1 / 10 Professional operating systems. Other versions cannot activate this mode.

Continue to open the Run window (Windows + R) and type gpedit.msc

Check the imported computer

On the window Local Group Policy Editor find the key Audit Policy follow the path: Local Computer Policy => Computer Configuration => Windows Settings => Security Settings => Local Policies => Audit Policy and
Double-click the Audit account logon events value.

Check the imported computer

In the dialog box Audit account logon events Properties ticks 2 values Success and Failure to display the number of successful and failed login attempts on your computer account then click OK to finish.

Check the imported computer

https://thuthuat.taimienphi.vn/cach-nhan-biet-may-tinh-cua-ban-bi-truy-cap-va-su-dung-21799n.aspx
Above is a way to help you detect and check the accessed computer, thereby helping you to prevent fraudsters from entering and stealing your data. In addition to checking and securing your computer, you should also secure your Facebook account because Facebook is the largest social network on the planet containing hundreds of millions of data and personal information, so Facebook is prey. lucrative hackers all over the world.

.

[ad_2]

Leave a Reply

Your email address will not be published. Required fields are marked *