How can I tell if someone has been using my laptop?

cuetip

How can I check to see if someone has been using my laptop when I’ve left it unattended? It’s running Windows 7, if that helps. Thanks.

Topic: Security
Answer this Question

Answers

3 total
jimlynch
Vote Up (15)

It's not a good idea to leave your laptop unattended. You should also consider using a login password for it as well, preferably a strong one. Nobody should be using your laptop without your permission and a login/screensaver password would help prevent them from doing so in your absence.

jack12
Vote Up (13)

The easiest way is to simply go to Windows Start and select Recent Items. Unless the person thought to erase recent items, you should be able to see if anyone was poking around. You can also check the recent activity on any of your browsers to see if websites that you have not accessed are in there. 

 

A more certain way is to check Windows Logs. Go to Control Panel>Admin Tool>Computer Management, then click on “Windows Logs” on the left side of the window. Choose the Security log and you can see a log of all log-on, log-off events (among other things), and you can check for activity during those times you are certain that you were not on the machine.   

Eugen Cocalea
Vote Up (11)

Install a trap on the keyboard that will close the lid of the laptop if it doesn't recognize you. If you come back and find the keyboard littered with severed fingers, someone has been using your laptop.

Ask a question

Join Now or Sign In to ask a question.
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.
Symantec's Endpoint Protection product has three zero-day flaws that could allow a logged-in user to move to a higher access level on a computer, according to a penetration testing and training company.
Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- the killer feature for the enterprise.
Today's hotels are unfortunately vulnerable to types of attempted fraud. Here's how to keep data safe when you travel.
U.S. Senator Patrick Leahy has introduced a new version of a bill to rein in the National Security Agency's bulk collection of U.S. phone records in an effort to strengthen legislation that passed the House of Representatives this year.
The IT infrastructure of the National Research Council of Canada was recently compromised by highly sophisticated Chinese state-sponsored hackers, the Canadian government said Tuesday.
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
U.S. and EU privacy and consumer groups called on privacy regulators to stop Facebook's plans to gather the Internet browsing patterns of its users while they visit other sites.
A configuration problem in Facebook's popular Instagram application for Apple devices could allow a hacker to hijack a person's account if they're both on the same public Wi-Fi network.
Questions abound over sites authenticating users via identities established through social networks, Yahoo Ponemon Institute survey shows.
randomness