How and when we find out if someone has used your computer

Hi friends, in today's tutorial we will see how can we find out when and if someone uses your computer.
For this we use a portable application (no installation required) called WinLogOnView that gives us the login information that had log on our computer.
WinLogOnView gives us information about:
- Logon ID
- The username with which you logged in
- The domain
- Computer name
- day, month, year and time at which you logged in (Logon Time)
- day, month, year and time at which the delegation was made (Logoff Time)
- how long the user has been logged in, practically the time the computer was turned on
WinLogOnView is a very useful app for parents who wish to supervise children using the application they may make a child's idea of ​​time spent at the computer and can decide whether to impose restrictions on its use. Also with the help of WinLogOnView parents can find out if offspring observed time restricting computer use because why not admit it, children are very playful and sometimes we tend to lie.
WinLogOnView is a useful application only parents but everyone has doubts and wants to check if someone is using your computer or laptop in his absence.
Among the interesting features of this application and we find:
- the possibility to export the report in an HTML file
- you can find information about the logs made on other remote computers, the condition being to have the Remote Desktop function active on the respective computers for which you want to find out the information.
- you can scan the Windows hard drive of any computer or laptop to find out information about the latest logins and their usage period.
The manufacturer's page you can download and Romanian language for this application has been translated by Nicolae Oprea.
That said, I invite you to Aveda izionati tutorial exactly how and when we can find out if someone uses the computer in our absence.
DOWNLOAD WinLogOnView


Adrian: Hungry for information and knowledge, I like everything related to the technical field and I share my knowledge with great pleasure. Those who give themselves to others will lose themselves but usefully, leaving something useful to others. Enjoying this privilege, I will never say "I don't know", but "I don't know yet"!

View Comments (36)

  • Thanks for the tutorial ... I have my own computer and sometimes my younger siblings come in, and they don't really recognize if it's working or not, so they licked their mouths :))

  • Hello, and sorry to post this comment in a box just not appropriate!
    I would like to buy a home / office laptop and I was thinking about "Lenovo 15.6 '' Essential B590 laptop, Intel® Pentium® B980 2.4GHz processor, 8GB, 1TB, GeForce 610M 1GB, Black" but I'm a little skeptical, I heard like that lid, the part with the display is not exactly resistant, a guy in the comments saying something like "Fragile lid, it bends very easily and the display can crack". Now I ask you for advice on this, what do you think and other laptops are the same, if they are not still worth buying with this money, should I have problems with this?
    Thank you for your help!

  • I saw some lenovo. have a slight tinge of recycled materials but they sure are strong even if they seem made of cheap materials. now you know how it is, it depends how much you care. I would take my lenovo.

  • Salut.As like to know if an application is a program or something to see if I or my provaiderului restrictions from net.Merci fain

  • I prefer a good keylogger, besides the information of this application, the keylogger shows you almost everything that happened to you while you were away from it: the games played, the Internet pages accessed (very important to find out the "field" of interest of the child), what was typed on the chat or in the browser, even the passwords used. You have captures in text and jpg format, you can set to send reports to your e-mail address, etc.
    Do you older tutorial about kgb free, which is more useful than this app.

  • Hello. It doesn't show anything to me. I was in Control Panel - Administrative Tools - Event Viewer - Security and only one thing appears:
    __________________________________________________________________________________
    Details
    Product: Windows Operating System
    ID: 517
    Source: Security
    Version: 5.0
    Component: Security Event Log
    Symbolic Name: SE_AUDITID_AUDIT_LOG_CLEARED
    Message: The audit log was cleared
    Primary User Name:% 1
    Primary Domain:% 2
    Primary Logon ID:% 3
    Client User Name:% 4
    Client Domain:% 5
    Client Logon ID:% 6

    Explanation
    This event record indicates That the audit log has been cleared. This event is always Recorded, regardless of the audit policy. It is Recorded Even if auditing is Turned off. The audit log SHOULD be saved in a file Before deleting. The practice of always saving copies of audit logs is good for catching fraudulent users. A fraudulent user with sufficient privileges CAN delete the audit log as a way of erasing evidence of tampering with the computer systems and files. Lack of a backed-up audit log Unauthorized year Will help trace user. Once deleted, lost UNLESS year audit log is a copy was made and saved Before deleting.
    __________________________________________________________________________________
    What to do events occur?

  • Adrian, I wish I do, if possible, to do a tutorial about a program that shows who uses the internet on our router.

    • you can see who is using your internet if you go to the rotator settings at the default address 192.168.1.1 and there you look for information about wifi and who should be connected to it and you can block their ip or even your mac

      • see Mac intruder (so can only filter to block from router) must see him exactly when connected. ip router assign it when you connected (if not set to allocate a specific IP for a Mac). put a better security. are tutorials router security.

Related Post

This website uses cookies.