How and when we find out if someone has used your computer

How and when we find out if someone has used your computer
4.5 (101) 90.69%

Hi friends, in today's tutorial we will see how can we find out when and if someone uses your computer.
For this we use a portable application (no installation required) called WinLogOnView that gives us the login information that had log on our computer.
WinLogOnView gives us information about:
- Logon ID
- Name of the user who made the log
- Field
- Name's Computer
- Day, month, year and time to do logging (Logon Time)
- Day, month, year and time to do logoff (Logoff Time)
- How long was utilizatorl logged practically during the computer started
WinLogOnView is a very useful app for parents who wish to supervise children using the application they may make a child's idea of ​​time spent at the computer and can decide whether to impose restrictions on its use. Also with the help of WinLogOnView parents can find out if offspring observed time restricting computer use because why not admit it, children are very playful and sometimes we tend to lie.
WinLogOnView is a useful application only parents but everyone has doubts and wants to check if someone is using your computer or laptop in his absence.
Among the interesting features of this application and we find:
- Ability to export the report to a HTML file
- You can find information about logins made on remote computers, the condition being that you enable Remote Desktop on those computers for which you want to find information.
- You can scan the hard drive of any Windows PC or laptop to find information about the last logins and during their use.
The manufacturer's page you can download and Romanian language for this application has been translated by Nicolae Oprea.
That said, I invite you to Aveda izionati tutorial exactly how and when we can find out if someone uses the computer in our absence.
DOWNLOAD WinLogOnView


Get the Flash Player to see the video.


Related Tutorials



about Adrian

Flemish information and knowledge, I like everything about art and share my knowledge with great pleasure. Those who give themselves to others will lose themselves but usefully, leaving something useful fellows. I enjoying this privilege, I will never say "do not know" but "not yet know"!

Comments

  1. Thanks for the tutorial ... I have my own computer and sometimes it happens to longer enter my younger brothers, and they do not recognize if you go or not, so they licked bot :))

  2. Cosmin said

    Hello, and sorry to post this comment in a box just not appropriate!
    I would like to buy a laptop for home / office and thinking about "Laptop Lenovo 15.6" Essential B590, Intel ® Pentium ® B980 2.4GHz, 8GB, 1TB, GeForce 610M 1GB, Black "but I'm a tad skeptical, I heard that cover, side diplay the resistance is not just a guy comments saying something like "cap fragile and bend easily display can crack." Now ask advice about it, what do you have other laptops are the same, if not still be worth buying at this money, should I worry about it?
    Thank you for your help!

  3. Matthew said

    I saw some lenovo. have a slight tinge of recycled materials but they sure are strong even if they seem made of cheap materials. now you know how it is, it depends how much you care. I would take my lenovo.

  4. Salut.As like to know if an application is a program or something to see if I or my provaiderului restrictions from net.Merci fain

  5. Prefer a good keylogger, besides information about this application, keylogger software shows you everything that happened to your step while you were away from him: games played, websites accessed (very important to find "the" interest of child), what browser typed in chat or even passwords. You get caught in jpg format and text, you can set to send you reports by e-mail, etc..
    Do you older tutorial about kgb free, which is more useful than this app.

  6. Welcome. When I do not show anything. I was in Control Panel - Administrative Tools - Event Viewer - Security and occurs one thing:
    __________________________________________________________________________________
    Details
    Product: Windows Operating System
    ID: 517
    Source: Security
    Version: 5.0
    Component: Security Event Log
    Symbolic Name: SE_AUDITID_AUDIT_LOG_CLEARED
    Message: The audit log was cleared
    Primary User Name:% 1
    Primary Domain:% 2
    Primary Logon ID:% 3
    Client User Name:% 4
    Client Domain:% 5
    Client Logon ID:% 6

    Explanation
    This event record indicates That the audit log has been cleared. This event is always Recorded, regardless of the audit policy. It is Recorded Even if auditing is Turned off. The audit log SHOULD be saved in a file Before deleting. The practice of always saving copies of audit logs is good for catching fraudulent users. A fraudulent user with sufficient privileges CAN delete the audit log as a way of erasing evidence of tampering with the computer systems and files. Lack of a backed-up audit log Unauthorized year Will help trace user. Once deleted, lost UNLESS year audit log is a copy was made and saved Before deleting.
    __________________________________________________________________________________
    What to do events occur?

  7. In Windows Event Viewer details can be found at Windows Logs - Security - Task Category - Logon

  8. Adrian, I wish I do, if possible, to do a tutorial about a program that shows who uses the internet on our router.

    • nor24o said

      you can see who uses the internet if you Roter apple in settings default address 192.168.1.1 and there looking information should appear WiFi and who's connected on it and you can block your ip or mac mail

      • cristi said

        see Mac intruder (so can only filter to block from router) must see him exactly when connected. ip router assign it when you connected (if not set to allocate a specific IP for a Mac). put a better security. are tutorials router security.

  9. This app goes in XP?

  10. Adrian Gudus said

    avnik: This application goes in XP?

    Unfortunately no works on Windows XP

  11. flaviu said

    I want to make a tutorial with "Faronics Deep Freeze" version that you desire! and please do as soon as possible! ve you do? Everyone asks for this software! please answer me this time! not as you usually do not respond! ve so you make a tutorial?

    • You've heard the saying that "talk sweet, bring more"? And you have to start with: "Please", blah, blah ... and accurately help you in some salt. Give lu nentu Goagea seek "deep freeze tutorial" to see what gems Addicted tutorials on Deep Freeze. He almost forgot, the end had to put a "Thank you" in advance. Be a big boy, the country groan ...

  12. Anderson said

    Hello, I have a problem with an HP laptop go very hard, in memtest to have speed cache L1 Replace 20000 MB / s has 3800 MB / s, and so instead of a 2 L18000 MB / s has 3500 MB / s And also in AIDA64 the motherboard and again to Motherboard Chipset Bus Properties does not appear at all, and in you for memtest to C when the Display Configuration SPD Date (9) SMBus Controller says not known why so? speed and low latency are sorry 200 ns. From what I can be changed in memtest sees CPU speed and not 1 2.6 MB ghz. I think you have something to clock speed CPU and I say that I knew nothing else. What do you advise?

  13. Costelina said

    Anderson says:
    July 8 2013 from 19: 05

    Hello, I have a problem with an HP laptop go very hard, in memtest to have speed cache L1 Replace 20000 MB / s has 3800 MB / s, and so instead of a 2 L18000 MB / s has 3500 MB / s And also in AIDA64 the motherboard and again to Motherboard Chipset Bus Properties does not appear at all, and in you for memtest to C when the Display Configuration SPD Date (9) SMBus Controller says not known why so? speed and low latency are sorry 200 ns. From what I can be changed in memtest sees CPU speed and not 1 2.6 MB ghz. I think you have something to clock speed CPU and I say that I knew nothing else. What do you advise?
    if you change the CPU then you have to keep in mind the same RAM to A frequent Aiva
    or how did you say FSB
    then you must make sure that you have properly installed CPU Coolers especially as you put and thermal compound
    leptopuri know that some just do not show some information after that neither the BIOS nor Windows
    nor Everest or Aida
    You do not know how else to say and I want to find out more

    • anderson said

      No straw DC's CPU GHz Celeron 2.00 sees ok just go on low speed cache is bad, and I put it on the PC and look good at the speed values ​​and a cache 20000 Mb / s and the laptop placed 3000 and sees something Mb / s dc That looks like and that's not the same. Some say it's the charger but I do not. Does Ali chipset + You Rs200mb and hard work still has 385mb / s memory speed in memtest even an athlon to 1.8 has 400mb / s and only has mean latency 1 300 pentium-400ns and he's had 4ns p100 somewhere.

  14. Adrian, use Curr Ports ... when you start your PC, this app shows me f many, many reports that go toward locations in China, USA, Netherlands, Hide IP Germania.Eu know u do that ... and are confused, tell me please, these reports could be the result of a Key Logger slipped into my PC? Cookie or just the result of those activities?
    You can send a picture of my monitor these reports tell me your opinion?
    Whatever your decision, I thank you and apologize for the inconvenience! ....

  15. Adrian Gudus said

    dorelAdrian, use Curr Ports ... when you start your PC, this app shows me f many, which goes toward multerapoarte locations in China, USA, Netherlands, Hide IP Germania.Eu know u do that ... and are confused, tell me please, these reports could be the result of a Key Logger slipped into my PC? Cookie or just the result of those activities? You can send a picture of my monitor these reports tell me your opinion? Whatever your decision, I thank you and apologize for the inconvenience! ....

    As you probably noticed from our tutorials when driving their installation almost all have the option "Send anonymous statistical data" (send anonymous statistical data). When you open the computer all applications start their background service or check for new versions of software or send anonymous statistical data by the manufacturer.

  16. Costelina said

    Anderson says:

    July 9 2013 from 14: 41

    No straw DC's CPU GHz Celeron 2.00 sees ok just go on low speed cache is bad, and I put it on the PC and look good at the speed values ​​and a cache 20000 Mb / s and the laptop placed 3000 and sees something Mb / s dc That looks like and that's not the same. Some say it's the charger but I do not. Does Ali chipset + You Rs200mb and hard work still has 385mb / s memory speed in memtest even an athlon to 1.8 has 400mb / s and only has mean latency 1 300 pentium-400ns and he's had 4ns p100 somewhere.

    and my cpu from leptop has the same soket the PC and I do know that I can change them
    but do not do one because I'm afraid to burn something and then the pc cpu consuming more
    as one in leptop for hair as you say but not the same thing

  17. flaviu said

    ANDU stop biting inoala put the milk that they could stay in the pot and never quit!

  18. Mary TranceAddicted said

    Hi, please post the settings for account security is needed for facebook facebook again changed the rules on the website. Thank you!

  19. Hello! Thanks for the article!! Staying with some friends and I noticed sometimes my pc was accessed by someone more even Virus! You apply your method and I hope I will not have problems!

  20. A very good and effective tutorial.
    Keep going!

  21. Hi,
    There is a program that shows how long was an employee on the internet ...? The employer is able to track the PC's that are employed?
    Thank you

    • Adrian Gudus said

      The employer can restrict employees' access to various social networking sites by different methods but in no case is beautiful, ethical, moral to spy on employees, collect logs, violates the right to privacy and if anyone finds out that you do this job, I get ugly!

      • Mon ami, do you ask the employer you want privacy on a PC that is not yours and you're using (in theory) only in the interest of the company.

        Congratulations on the site!

  22. Dear Adrian,
    I gave remote access of knowledge (computer) to install a program.Crezi I can now see that my activities on the computer?

  23. Very good tutorialul.Am used winlogonview.

  24. Hello! Do you know and how you can learn all the details of all components of the PC .. I mean, you can find out how many hours was used motherboard, video card, processor, ram, how long they were used in their acquisition so far ? I want a somewhat soft if you know of something like "Hard Disk Sentinel" As I look out there, how many starts / stops had many hours of afost used etc ... you know something like that and the processor or motherboard? Thank you!

  25. Hi, please help me with some information. I bought a laptop from someone, tell me please, that one can know now everything in my computer? For a piece of time, I can read emails from another id de mess. Thank you!

    • Adrian Gudus said

      If that has installed a keylogger, yes, the one from whom you bought can receive logs (history / records) with what you do on that laptop. That unless you formatted the hard drive and have reinstalled Windows (which is recommended to do when buying a laptop from another owner)
      The problem with Yahoo mail has been explained and discussed in two other older tutorials here on the site.
      Find the search box at the top right "we do when we can not log into yahoo messenger" and then search "how do we prevent loss account yahoo"

  26. I have a computer with Norton installed in activation code, etc ... The point is that tonight especially after I get on Facebook or other sites ... .of normal hourly roughly can not use the mouse by 2-3 cam minute ... .sageata locks the screen and hard drive like crazy ... hard ... it .lucreaza the original Windows XP sp3 ... and we all stopped updating ...
    They are controlled elsewhere? ... .How Can I solve this problem? ... Thank you.

  27. Nicolae Avram said

    Hello, too much knowledge of English and I'm not even in a too cognizant of computer (beginner) just because I wanted to know if someone logs on my laptop, etc. An app downloaded WinLogview (remember you the Adrian) and indeed is super useful only as I look on each line beginning with: Logon ID etc and the last is Logon Type and as he puts Interactive (2) ...... .we interactive 2 know what put accolade. I think that would be about 2 computers while logged ?? I say this because I feel as if chased by the police or what do I know ??? And another thing, when I login to Facebook and go to go to option for see where I (I) log and I appear quite another county to at least 5-6 hundreds of kilometers away from where I am ... . It is normal or? Thank you in advance

Viewpoint

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.