BlogPeopleIT – Some laptop or computer users often feel anxious when they think about the possibility that someone has accessed their laptop, including the work of hackers who try to infiltrate your laptop system remotely to steal important data.
If you have a habit of leaving your laptop / computer turned on on the library desk, workplace, classroom etc. someone may think evil to copy / destroy your important data
Especially in a vocational school majoring in TKJ where students feel the most hackers, not infrequently they download malware to remotely remotely control a laptop and secretly install it on other people’s laptops to spy on it, to be honest, I’ve also done this by installing an application like a keylogger on the internet. school lab laptop hehe
But indeed at that time it was still rare for people to bring personal laptops to school while nowadays almost all vocational/high school students have personal laptops like smartphones. Therefore, in this post I will share some tips to find out that someone has accessed your laptop without permission
Knowing someone has logged into your laptop;
Why is it important to note? Our laptops contain sensitive data such as private photo/video collections, account master passwords if you organize them, automatic passwords stored in browsers, paid application licenses, privacy data of browsing history on web browsers or Google accounts. This is a clear violation of privacy and jeopardizes the security of your data. Now you have to understand that prevention is better than regret later.
1. Check recent activity on Windows
This is the first thing that is easy to do, for Windows 11 users, try clicking the start menu > recommended > more
There will appear a list of files that were last accessed, complete with a description of the date and time. If you don’t see any history, maybe this feature was accidentally turned off or deleted by a junk cleaning application
How to recognize a hazard alarm? If you see an important file has been accessed on a date-day-hour that you can’t remember, maybe someone or a hacker remotely opened the file, made a copy, edited it or read the entire contents of the file.
2. Check the event viewer log
Through the Windows Event Viewer, you can view windows usage activity, login history and so on. If you haven’t turned on your laptop/computer in the last few days but the Windows Event Viewer record shows a login history, it means that someone is suspecting that someone has accessed your device without your permission.
Here’s how to check login activity using windows, press the Windows key + R then type the command “eventvwr.msc” without quotes until the event viewer log window opens. Click the windows logs menu > security, there you will see a history of computer usage complete with date and time information
If you see an odd frequency of windows access means someone is secretly turning on the laptop device, you then use it
3. Check browsing history
You can see the browsing history in the explorer window or web browser search history. Open the explorer window then in the search column in the upper right corner, please “click” and select recent
You can see a list of keywords that were last used, if you see strange keywords like “password” or “private” maybe someone is trying to find files on your laptop / computer using these keywords without your knowledge.
The browsing history can also be viewed through the browser (chrome, mozilla firefox, palemoon, etc.) that you usually use to surf the internet. For chrome users, please click the three dots in the upper right corner > history menu > browser history, see all the sites you have visited.
For sites that seem foreign and you have never visited, pay close attention to the access date because who knows someone is using your device without permission on that day and time
Read also: HP damage detection app
4. View the list of installed programs
The computer / laptop feels slow, and a strange notification appears that is not known. Sometimes every time we install a new application, a new icon appears on the desktop screen, but someone who secretly installs a spying application can remove the icon from the desktop screen so that the original computer / laptop owner is not aware.
Whereas through the control panel window > programs > programs and features, we can see a list of all the applications installed on windows
If you see a strange program/application name that was installed recently, it is suspect that the application was intentionally installed by someone into your windows system for spying, it could also be the work of a malicious virus, bloatware of unofficial applications. The point is that you as a laptop/personal computer user must really understand the names of the programs installed on Windows and what their functions are
5. Check notes
Usually if a computer or laptop is intentionally installed with a spy application, this application will record all keyboard beats, collect information, data content, into a strange file/folder. It may be named a vault folder or a file that when opened contains all of your keyboard typing history. It is suspect that someone has managed to remotely hack your device usage and is collecting data
We are indeed encouraged to always have a good attitude towards anyone, whether it is a friend at work or a classmate at school, but we never know how everyone perceives us. There are people who seem quiet but have a very high curiosity, especially regarding sensitive matters. Even when I was in school, I once tried to forgot other people’s account passwords, hilariously, they made up a password for the question “where was your mother born..” I also answered “sidoarjo” on a whim and it turned out to be successful.
Leakage of privacy data is dangerous because it can change other people’s attitudes towards us, also if it is misused by others, the consequences are very fatal, even though their intention was initially just for fun. Hopefully what I share is useful.
This is an article on how to easily track the activities of other users on our laptops/computers to detect unauthorized access/permissions that have fatal consequences for the security of our data and secrets. Thank you so much