PC Tutorials How to Know if Someone Has Entered and Used my PC For those who have a PC with an Internet connection the fact …

For those who have a PC with an Internet connection, the fact of imagining that they may be victims of a hacker causes fear. You hear many stories in which a person with bad intentions can somehow access your files, your personal data and cause a lot of damage.

Others fear that their bank passwords and other personal data may be known. There is also the possibility for them to view your personal photos and videos. So let’s see How can I know if someone has entered my computer.

Procedure to know if someone has entered my computer

To begin with, we must understand that although we have the security of an antivirus and have some of our social networks, bank pages and other resources under passwords, it is likely that people will access them.

It is also possible that a person can access directly to our computer to carry out some activities in it without us noticing it. So the first thing we need to identify is the target of these intruders.

What Files Can The Intruder Check On Your PC

When our computer is in any way violated by an intruder or hacker, it is necessary that we take into account that they want specific data from our computer.

Among the data to which could you want to access the intruder are the data that is stored on our computer to enter personal accounts, such as passwords for social networks or bank accounts and credit cards, among other things.

There is also the possibility that the intruder want to install some program on your computer with other intentions, such as being able to listen to your conversations, and see the emails you write and receive.

In these cases we can say that there is no “perfect crime”, since generally all the actions carried out by a person on your computer can leave a “mark”, it is only a matter of what know what to look for and where to look for it. Next, let’s talk about those “footprints”.

Check the Event Logs on your Computer

Everything that happens on your computer, whether it has a Microsoft, Apple or Linux operating system is recorded in a file. Alone we must locate it and review the activities that have been made on your computer.

In the case of the Windows operating system, in most versions so far there is the possibility of reviewing its events in the “Control Panel“, Then go to”Management tools”And there we will find the Events viewer”.

In this event viewer you can see the time and day when the events occur different administrative or usage events inside your computer. Although it may seem a bit tedious to review each event, looking at the times and days will give you a lot of useful information.

On Linux and Mac you can also get this option to review the events that have been happening on your computer. In the case of Linux this is located at / var / log directory logging in as superuser. Mac is similar too.

Search the logs in specific programs

Some programs on our computer have the peculiarity of save activity log that are carried out so we must review them directly. One of them is Internet browsers. There we find search history, chat and browsing history.

If a person other than us enters the computer and uses the browser, it is only a matter of searching the history and everything that was done is recorded there.

The Internet Router also has a record of web pages and other activities, so if we know the password we can consult these records.

Detect if USB devices have been connected to our computer

Another way to know if someone has entered our computer is detecting that a USB device has been connected. This is very important, as there is a possibility that files have been copied from our computer.

To detect if USB devices have been connected to our computer, a USB device detection program that are available on the Internet. These tools are very useful and easy to download and install.

Detect Remote Access Applications on your Computer

There is a possibility that someone installs malware on your computer that collects your data as passwords. To avoid it we must have a good updated antivirus.

If we suspect that our computer has a program of this type installed, we should review it. It is possible that it slows down or that its behavior is different, this due to the execution of this malicious program.

To detect it use the tool Task Manager. With it you can see if there are any suspicious programs on your computer. To open this manager you can do it by pressing the Ctrl + Alt + delete keys.

There you will see the programs that are running at the moment. If you see any strange program you must cancel it. Obviously, to know how to identify it, you must know what the applications that are normally activated on your computer.

If you take these tips into account, you can have more security on your computer and prevent a person from using your computer without you being aware of it.