brgdotnet
asked on
How to tell if someone other than myself logged into my pc. Or when it occured.
Hello, I am a software developer, myself and another software developer on our team have found that our source code has been tampered with/(changed/broken) without our consent. I honestly think it is our manager, who is an interesting character with very passive agressive tendencies. I really don't care who is tampering with the code, and I don't want to get anyone fired. I just want this crap to stop. My guess is that someone has our login credentials and is logging into our machines and making the code changes. We have what seems to be a secure software repository for checking in and out our code. However somehow the code is still getting hacked.
So here is my question. We are on Windows 7 OS. Is their a way for me to tell when someone besides myself logged into my PC? Or at least see when the last time my pc was logged into? This is a smaller company and I know that at times the System administration staff probably needs to log into our pcs without our consent. So I fully expect others to log into our PCs. I just need to know if their is a way for me to access the login/logout history of my PC.
So here is my question. We are on Windows 7 OS. Is their a way for me to tell when someone besides myself logged into my PC? Or at least see when the last time my pc was logged into? This is a smaller company and I know that at times the System administration staff probably needs to log into our pcs without our consent. So I fully expect others to log into our PCs. I just need to know if their is a way for me to access the login/logout history of my PC.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Your welcome :)
Hi.
Also think of offline attacks. If I start my win8togo usb installation, I won't get logged anywhere but I can modify your code as well. To stop that, encryption would be needed.
Also make sure that no one has administrative access but the support personnel. If someone else had, he could quite easily circumvent most protective measures.
Also think of offline attacks. If I start my win8togo usb installation, I won't get logged anywhere but I can modify your code as well. To stop that, encryption would be needed.
Also make sure that no one has administrative access but the support personnel. If someone else had, he could quite easily circumvent most protective measures.
ASKER