Parano, paranoia, paranoiac....
These terms are can be a little hard but for some, it
is surely justified. That it is within the framework family
or professional, considerable people look at, change parameters,
farfouillent without being authorized there and it is
completely normal to counter this kind of behavior and
to know what occurs in your absence.
files were lately read ?
To know if files have were opened, go in start then select
the order Documents, the list of the open files will be
You have also the possibility of going to see the files
read in C: Recent Windows/or C: Windows/temp. But think
before starting from empty the history of the PC well
not to confuse with the files which you opened you even.
my file has you it modified ?
It is very easy to know if a file A were modified. Select
the icon of the file then made a right click top and select
the Propertys order. A new window is posted then and dates
it from the last modification of the file appears in the
field: Modified it.
You can also see whether other files have modified summers,
to see even created. Go in the function Search (To start/Shearch)
and find the files created or modified by using the Options
function of research. Either you can choose between files
created, modified files or files reached for the last
time. Choose the desired dates and click on advanced Options
and check off Search in the under-files, thus you will
which time my PC has T it opened and closed ?
If you think that somebody uses your PC at the time of
your absences, use Win-log. This program indicates to
you in the form of report/ratio the date and the hour
of all the openings and closings of the PC. It is enough
that the software is with the starting of the computer
for all to note.
in detail the operations which were carried out on your
- To know what occurred on the PC when you miss, install
the program Espion 2002. It records with regular intervals
of the captures of screens, thus you will be able to know
when a site prohibits was seen or if your children or
employees play plays or make other things instead of working.
- Spector takes the same step but is a little more powerful.
It can make captures until one a second and preserves
them in levels of gray 4 bits. His cousin eBlaster allows
in addition to sending the captures of screen by e-mails
towards a given address.
- You can use the software Boss Everyware Manager which,
enables him to know in detail the operations carried out
on your computer. Thus, you will be able to know in detail
all the operations carried out on your PC at the time
of your absences.
- There is finally the super detective: Omniquad Detective.
to prohibit the access to certain personal files ?
There are several means to prohibit the access to certain
files. You can the crypter or use the steganography (see
the file encoding).
You can also hide them:
The fact of crypter the files which must remain confidential
is undoubtedly effective, but that always gives the chip
to the ear. Hide Folder makes it possible of a simple
short cut keyboard to mask or contrary to revealing the
files and repertories of your choice. Once the software
installed and your definite password (keep preciously
if not you lose all), it will be enough to slip of the
documents on the principal window. Put only the personal
files which must be hidden but not files or files of Windows,
bus there, that risks bugger and to generate serious complications.
sites have were visited ?
To see which sites one were seen, either you in Internet
Will explore and look at the History, or you go in C:
Windows/Temporary Internet Files and you will be able
to see, amongst other things, the viewed images. If the
history were emptied, look in the fire wall if there are
still the trace of the sites or the cookies or other java
scripts etc... which were blocked. If all were cleaned,
it is enough to go to open the Logs related to by-fire
to check blockings. The sites will be named by their IP
addresses and the hour of the visits will be noted with
the second meadows.
For a research more effective and less constraining, use
Omniquad Detective which is surprisingly powerful for
him to find the traces is saying unobtrusive hard disk.
to prohibit the plays ?
Either you look at everywhere on the hard disk if such
or such application is a play, or you use a software adapted
for that. Let us take Antigame Plus. It is a hunter of
plays, it seeks on the computer or on the network the
occurrences of the plays and blocks them or removes them.
It is to better camouflage them if you are not sure of
the personnel which surrounds you. It is enough to use
the TweakUI software and to strip the readers concerned
in the mitre Working station, thus, nobody will find them.
to restrict the use of Internet ?
Test the software of parental control, it is stupid but
certain software is particularly good. It is the case
of Kids Control. It prohibits the access to the equivocal
sites, records the history of the visited sites and records
the keys typed on the keyboard.
For those which want some a little more, there is VigiWin.
It is a software of protection of PC. It controls the
menu to start, the Bar of task, the Control panel, the
access to the programs, protects the files, the repertories
to prohibit the access to your PC ?
- To prohibit the access of your PC use METZ Lock which
makes it possible to entirely block the PC by a password.
Without this password, it is impossible to carry out the
least operation on your PC. Thus, during the starting
of your PC or by activating a precise icon before your
departure, a black screen appears with a dialog box requiring
of you to seize the password.
- Prohibited the Wincog software that an other person
can use the PC. It is simple, if the person does not give
the good password in the five attempts, it extinguishes
to keep the configuration of the PC ?
To prevent that the configuration of the PC is not changed,
use MenUp. MenUp has a module of safety which restricts
the access to the only programs indicated by the administrator.
It is enough to slip/deposit the short cuts of the software
or files etc... in the MenUp window. With the restarting,
the interface changes and only the icons of the selected
programs are accessible and the start menu disappears.
to control a remote PC ?
If you often move or that you have need for a reason or
another to take a remote PC, you have only to use Netmeeting
3. Of course, so that a computer can be controlled remotely,
it is necessary that it is connected to Internet and that
it is equipped with the software.
To make so that the PC is controlled, open Netmeeting,
outward journey in tools and choose Partage of remote
office, there you choose Activate the division of the
remote office. close the program, made a right click and
choose Partage of remote office and click on Activate
the division of the remote office.
On the second PC, open Netmeeting and click on carry out
the call, seize address IP of the distant computer notch
on Require the security of the call. And here is, the
PC is under control. In the same register: software VNC
(Virtual Network Computing) is the software which is indisputably
most powerful: PC Anywhere.
How to interdir the access of
the PC in day before ?
Make a right click on the Desk and choose Propertys. In
the monitor mitre of day before notch the protect box
by password. Thus nobody will be able to work on the PC
without this motb of master key.
to lock the access to the PC ?
You must create a special diskette containing an access
key. Without it it is impossible to start the PC. Create
the diskette in Démarrer then on Exécuter.
Type syskey, in the window which appears, click on up
to date then select the save as option the key of starting
on diskette. Then insert a virgin diskette in your reader
then click on button OK.
To remove this protection and to return to the former
situation, renew the preceding operation but, this time,
select the save option locally the key of starting in
the key window of starting. Insert the key diskette when
the PC requires it of you then click on OK.