Are you concerned about who is using your computer behind your back? You should be very concerned because unauthorized users can log into your computer and use it for all sorts of malicious purposes. For instance, if you happen to be a very unfortunate person, an unauthorized user can utilize your computer to commit numerous mischievous actions such as accessing illicit websites, downloading illegal material, and making fraudulent transactions. If the person is just a passersby that temporarily used your computer, authorities would initially think that you are responsible, since you are the owner.
Perhaps you are a parent, and you want to check if your children are really respecting their curfew. Knowing when they log in would definitely help you to know if your children are faithful. Fortunately, it is really easy to check who has been logging into your computer. This article shows you different ways to check who has logged into your computer.
Windows Event Viewer
As its names implies, the Windows Event Viewer is a utility that allows you to check various events or activities that take place in your computer. From a login to a software installation, many events are recorded.
To run the Windows Event Viewer, right-click the bottom-left corner of the screen and select “Run.”
&lt;img alt=”Check computer logins_run” src=”http://i0.wp.com/imagecdn5.maketecheasier.com/2013/05/Check_computer_logins_run.png” data-recalc-dims=”1″ /&gt;
In the text field, type “
eventvwr” and click “OK.” This launches the Windows Event Viewer utility.
&lt;img alt=”Check computer logins eventvwr” src=”http://i1.wp.com/imagecdn5.maketecheasier.com/2013/05/Check_computer_logins_eventvwr.png” data-recalc-dims=”1″ /&gt;
Move the cursor to the left pane and click the drop-down arrow by the “Windows Log” folder. Next, click the “System” icon.
&lt;img alt=”Check who logged into your computer” src=”http://i2.wp.com/imagecdn5.maketecheasier.com/2013/05/Check_computer_logins_system.png” data-recalc-dims=”1″ /&gt;
The “Source” column shows the type events that occurred in your computer. The “Date and Time” column shows when these even occurred. Under the “Source” column, look for the “Power-Troubleshooter” and “Winlogon” events. “Power-Troubleshooter” event and “Winlogon” are when user logs in to your computer. A “Power-Troubleshooter” event is always shortly followed by a “Winlogon.” By using this, you can determine when a user has logged in.
&lt;img alt=”Check computer logins power-troubleshooter” src=”http://i1.wp.com/imagecdn5.maketecheasier.com/2013/05/Check_computer_logins_power-troubleshooter.png” data-recalc-dims=”1″ /&gt;
Other Ways to Expose Trespassers
While the Windows Event Viewer is effective for determining when users log in, it is not good at showing you precisely what they did.
Check your browsing history. Since people often use computers to browse the Web, check your browsing history. Your browsing history shows when different sites were visited.
&lt;img alt=”Check computer logins internet history” src=”http://i1.wp.com/imagecdn5.maketecheasier.com/2013/05/Check_computer_logins_internet_history.png” data-recalc-dims=”1″ /&gt;
Search for recent documents. Microsoft Office and other word processing applications allow you to check recent documents. If you see a new document that you have never created or modified, it likely means that someone else has been using your computer.
&lt;img alt=”Check computer logins recent files” src=”http://i1.wp.com/imagecdn5.maketecheasier.com/2013/05/Check_computer_logins_recent_files.jpg” data-recalc-dims=”1″ /&gt;
Look for recently added software. By accessing “Programs Features” from the Control Panel, you can see when each program has been installed. If you see a new programs that you have never installed, it likely means that someone else has been using your computer.
&lt;img alt=”Check computer logins added programs” src=”http://i0.wp.com/imagecdn5.maketecheasier.com/2013/05/Check_computer_logins_added-programs.png” data-recalc-dims=”1″ /&gt;
Is it Really That Important to Know Who Logged In?
Yes, it is important. Depending on your situation, you may have to do so regularly. For example, someone may have cracked your password, and you may not even be aware of it if you don’t regularly check who is logging in. This is an essential feature for parents, office administrators, and security enforcers. By using the Windows Event User, you can catch trespassers and take administrative action immediately.