How to know if someone enters my PC and what programs they opened without permission

Windows has a powerful tool to know the activities that are carried out on the computer. The installation or uninstallation of applications or the execution of certain services can be detected by the event viewer. If you wonder how to know if someone enters my PC and what programs they opened without permission? , This article is for you.

How to know if someone enters my PC and what programs they opened without permission?

The event viewer is an instrument that shows the actions that take place on any computer. In this sense, it is possible to visualize at what times of the day the computer was turned on, when the system was used, and the tasks that someone else could have executed without your permission.

Certainly the best thing to avoid these circumstances is to put a password to your PC in Windows , but in case you have not done so, the event viewer can help you see information in more detail.

Next, we present relevant information about the use of the event viewer and how you can take advantage of this tool to find out if they are using your equipment without permission.

What is the event viewer?

The event viewer or Event Viewer is a Windows administrative tool that allows you to obtain information about all the activities that have been carried out on the computer.

Information thief

Procedure to know if someone enters my PC

If you want to find out the processes that have been executed on your PC without permission, it is advisable that you use the “Event Viewer” tool that is available in Windows 10 and is very easy to use.

Access the Windows event viewer

To open the Windows system event viewer , you must go to the taskbar and in the option “Search in Windows” (identified with a magnifying glass icon) write “View event logs”. There, you can select the “Event Viewer” application.

Another way to access the Windows event viewer

There is another way to access the Windows event viewer through a special command. From the option “Search Windows” type eventvwr.msc and you will immediately see the “Event Viewer” window.

Use the event viewer

Once you have entered the event viewer, you must locate “Windows Logs”. Press the option + to display the folder and choose “System”. To the right of the panel you will see a long list of entries. Therefore, you must filter the information to access the content that interests you.

Filter information with the event viewer

In the right corner of the panel, you will find a section called “Actions”. Look for the option “Filter current record” located in the “System” tab. Then, a new window will open and in “All Event IDs” you must write: 1, 12, 13, 42.

Office multiple screens

Interpret the event ids to know if someone enters the PC

Event id 1 identifies when the computer came out of the “sleep” state. Event id 12 is related to when the computer started, while event 13 refers to when we shut down the computer and, finally, event 42 specifies when the computer went into “sleep” or “hibernation”.

Each event contains the date, time, and type of event that the system has logged. In this way, you will be able to deduce if it was you who was using the equipment at a certain moment or not.

 Procedure to find out which programs were opened without permission

To find out if someone has been installing, uninstalling or using programs without permission, you must go back to “Windows Logs” from the event viewer. When unfolding the folder, choose “Applications”. On the right side of the panel, select “Create custom view” where you will see the entries according to the date and the records you want to filter.

With the above information you will be able to see the movements and actions carried out on your computer when you were not using it. In fact, you can even know the time and date that the PC was turned on and off , something very useful to be aware of and protect your information.

On the other hand, it is always good to take action. As we pointed out before, using a password or making a folder invisible in Windows 10 are among the actions that you should take into account to
protect the integrity of your information.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button