For us, computers are an important part of everyday life, which is why we don’t skimp on them apply methods that keep our computer safe, but there will always be a factor that can fail and we are ourselves, and carelessness is the cause. As soon as this happens anyone can sneak into our computer, and do who knows what things; when we suspect this activity not allowed by us.
In this case we can have a tool, at hand that can help us in this case, and is that we can know what activities the PC performs in our absence, and thus know whether or not someone enters our desk and what activity I do; This article is based on how to conduct research, with what we have at hand, let’s see how to achieve this research.
How can I see the activity history on my PC?
To perform this research from the same computer, without having to resort to external programs which is not necessary, we must know that the Windows 10 operating systemhas a tool for this that we need to access the event viewer, which is integrated between the functions of the system, it is used to see what has changed and what processes have made the computer.
Among these options offered by this useful monitoring tool, is to see in detail the records of the programs and also the recent elements, that modifications have had or that processes in these have been executed, in our absence we can check this by the hour in the sequence of the time.
How do you protect your computer from being accessed?
There are many ways to keep your computer protected, and preventing them from getting into it is crucial keep all our files and information as we wish. For this there are ways that would somehow become classic or common to apply, such as account protection and generate security systems for the device.
In any case we can make use of techniques and security schemes created by ourselves as it would be, create a remote access that allows us, in case of leaving the computer only to be able to have access to this one and to execute orders how to log out remotely, thus having control over it without the need to be present.
As for account protection, it is very good to know that we have several options, including the use of account limitations, as it is also possible to access other computers through the same network that is being used. we can also use the password prompt method to access the files and also to make changes to them.
The latter will be of great help at all times; because for anything the intruder would have to enter passwords that he does not know. We must also check that the activity history is activated.
As for the security of the device, itself we can talk about executing administrative policies. Generate announcements or alerts when something goes wrong or the user is blocked from entering incorrect passwords once, and ask for verification; Either way, we can schedule the device to shut down as soon as some idle time has elapsed. We should also know how to disable the remote desktop in Windows, as this can be a vulnerability.
What is the way to check the records?
To access this we will proceed through the Run window, for this we press the “Windows + R” keys, in the box we proceed to copy “eventvwr” and the event viewer will run. Now go to the “Windows Logs” section, then go to “Security” and then click on “Filter current log” and locate the log “ID 4624” which refers to the login from here we can see what happened in our absence.
We can access the program registry through the run window by pressing “Windows + R” copying in the “regedit” box. Following this a window will open where we will select the registry editor, in this we will see the installed programs and their functions performed, in this we must be careful because the slightest modification can affect the system.
Of recent elements
To see which items have been run recently we can access through the shortcut “Ctrl + Alt + Delete” doing this will display a screen like the login screen then we will proceed to choose the “Task Manager” and then we will proceed to make a view of the programs that are running and those that have already been opened and closed in the History tab of applications ”