Do you know that the password typed on a PC/Laptop keyboard for accessing social networking websites can be traced and used by somebody else? This becomes a more scary picture when it comes to Net Banking. Accessing the Net Banking account and typing in passwords by using the physical keyboard of the PC and not using the on-screen keyboard of cyber connectivity, cyber threat is also imminent. A hacker may be sitting in his home and be able to access another person’s computer remotely through the internet. Recently, a worldwide ransomware attack “WannaCry” took down the IT industry. Moreover, there is also a threat from the people with whom we share our passwords. They can easily log into our computers, misuse the confidential information saved on the PC and then use it to their own advantage. Hence, accessing other person’s computer, in today’s world, is not a tough task. This makes it essential to learn a bit about the computer and keep a few important tricks up your sleeves when you sense something fishy happening in the PC.
Firstly, there are two ways of accessing another person’s computer – remotely and physically. Checking to see how your PC was compromised remotely by another hacker is extremely difficult and best left to cybersecurity departments. But, it can be known easily about when and what files were in use when somebody else was using a computer by actually working and typing on it. That is when it was physically compromised.
The first thing to observe is that some files might have been in use and be running in the background. For this, open Windows Task Manager by pressing Ctrl + Alt + Del. After that, go to Processes tab in the dialog box that appears. Go through the list of files that are running in the background. If you see one of the confidential files up and running in the Processes tab of Task Manager, then it means that the computer was used by someone else and the confidential file is longer a secret.
However, there are many people who are coders and hacking geniuses and generally don’t leave a trail behind. So, what is the solution in such a case? Well! there’s a way to fi
First press Windows key + R or just simply Click on Start > Run
Now type cmd in the dialog box and press Enter to open the command prompt
A command prompt window will open up
Now type eventvwr.msc and press Enter
Wait for a few seconds
After that Event Viewer window will open up
All logs are archived and reviewed, we are using System Log to fulfill our purpose.
This will show you all the detail of your PC which happened recently. Therefore, after doing the above steps, you will surely get the detailed report of your PC.
These are some of the steps in one can know as to when and which all files were in use or were run by somebody else. However, it is best to remain alert and never disclose your passwords to anyone. After all, you never know!!