How can I tell if someone has been using my laptop?


How can I check to see if someone has been using my laptop when I’ve left it unattended? It’s running Windows 7, if that helps. Thanks.

Topic: Security
Answer this Question


3 total
Vote Up (15)

It's not a good idea to leave your laptop unattended. You should also consider using a login password for it as well, preferably a strong one. Nobody should be using your laptop without your permission and a login/screensaver password would help prevent them from doing so in your absence.

Vote Up (13)

The easiest way is to simply go to Windows Start and select Recent Items. Unless the person thought to erase recent items, you should be able to see if anyone was poking around. You can also check the recent activity on any of your browsers to see if websites that you have not accessed are in there. 


A more certain way is to check Windows Logs. Go to Control Panel>Admin Tool>Computer Management, then click on “Windows Logs” on the left side of the window. Choose the Security log and you can see a log of all log-on, log-off events (among other things), and you can check for activity during those times you are certain that you were not on the machine.   

Eugen Cocalea
Vote Up (11)

Install a trap on the keyboard that will close the lid of the laptop if it doesn't recognize you. If you come back and find the keyboard littered with severed fingers, someone has been using your laptop.

Ask a question

Join Now or Sign In to ask a question.
Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday.
The TOR Project thinks it has figured out how the author of a canceled Black Hat talk cracked its software to mask the source of Internet traffic, and it is working on a patch.
Businesses wanting the security of BlackBerry Enterprise Service 10 without the complexity of managing it onsite can now buy it as a hosted service from six BlackBerry partners.
A ransomware threat that encrypts files stored on the SD memory cards of Android devices has been updated to target English-speaking users with FBI-themed alerts.
A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday.
A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools.
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased interest in secure communications.
Researchers have concluded that those billions of connected devices could help save lives in the event of disaster, even one that knocks out the Internet
Goodwill Industries International said Monday federal authorities are investigating a possible payment card breach at its U.S.-based retail outlets.

White Papers & Webcasts

Webcast On Demand

Transform Your IT Service Management

Sponsor: EasyVista

See more White Papers | Webcasts

Join us: