Link to home
Start Free TrialLog in
Avatar of brgdotnet
brgdotnetFlag for United States of America

asked on

How to tell if someone other than myself logged into my pc. Or when it occured.

Hello, I am a software developer, myself and another software developer on our team have found that our source code has been tampered with/(changed/broken) without our consent. I honestly think it is our manager, who is an interesting character with very passive agressive tendencies. I really don't care who is tampering with the code, and I don't want to get anyone fired. I just want this crap to stop. My guess is that someone has our login credentials and is logging into our machines and making the code changes. We have what seems to be a secure software repository for checking in and out our code. However somehow the code is still getting hacked.

So here is my question. We are on Windows 7 OS. Is their a way for me to tell when someone besides myself logged into my PC? Or at least see when the last time my pc was logged into? This is a smaller company and I know that at times the System administration staff probably needs to log into our pcs without our consent. So I fully expect others to log into our PCs. I just need to know if their is a way for me to access the login/logout history of my PC.
SOLUTION
Avatar of Rob Miners
Rob Miners
Flag of Australia image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
ASKER CERTIFIED SOLUTION
Avatar of Pramod Ubhe
Pramod Ubhe
Flag of India image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of brgdotnet

ASKER

Thanks everyone so much for your help.
Your welcome :)
Hi.

Also think of offline attacks. If I start my win8togo usb installation, I won't get logged anywhere but I can modify your code as well. To stop that, encryption would be needed.
Also make sure that no one has administrative access but the support personnel. If someone else had, he could quite easily circumvent most protective measures.