Solved

Co-Worker is Snooping.

Posted on 2008-11-03
5
533 Views
Last Modified: 2012-05-05
Is there a piece of software I can run to catch a snooping co-worker on my computer?  I'm thinking of a program that can be activated when I leave my computer on for the night and come back the next day.

Thanks.
0
Comment
Question by:orthodoxkohen
5 Comments
 

Expert Comment

by:SafetyHelmet
Comment Utility
If you are running Windows, you don't need any extra software. Right click on "My Computer" and select "Manage". Expand the Event Viewer folder and left click on "Security". Find the time and date range you are curious about, and look for logon/logoff events by the username. If it says you logged on as yourself, you now have proof someone is using your account for accessing your PC!
0
 

Author Comment

by:orthodoxkohen
Comment Utility
I'm looking for someone snooping without logging in or out.  If say I leave my computer on but not logged off?

Thanks
0
 
LVL 10

Expert Comment

by:fm250
Comment Utility
>>>not logged off!!
You can clik on the windows key with L to lock the computer if you don't want to log off.
But if you are leaving your computer on then some programas like AV and other may use the system under your name and can't then say the difference if somebody or the system is using it.
It would be hard to leave your computer on and logged on to it and want to minoter who is on it. get you a webcam then.
0
 
LVL 1

Accepted Solution

by:
skyjumperdude earned 125 total points
Comment Utility
Try a keyboard logger...

http://www.kmint21.com/keylogger/

Anything that is typed will display.. if they were running any searches.. basic but may find what you are looking for.

or this..

http://www.freedownloadscenter.com/Utilities/Misc__Utilities/Beyond_Keylogger.html
0
 

Author Comment

by:orthodoxkohen
Comment Utility
Looking for something that will log programs accessed and mouse activity and such.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

There are three types of ISA client that can be configured - these can be individual clients or multiples of a client on each PC or server SecureNAT. A SecureNAT client for ISA server is a client machine, work station or server, that has its defa…
In all versions of ISA Server and the current version of FTMG, the default https protocol uses TCP port 443 and 563 only. This cannot be changed within the ISA or FTMG GUI and must be completed from a Windows cmd prompt on the ISA Server itself. …
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now