Jump to content

Remote Access / Foul Play


1 post in this topic

Recommended Posts

Hello,

 

Does anyone know what a log entry for a "remote desktop access" would look like?

 

I have been looking through my friend's OS X logs because he thinks someone was remotely accessing his computer to put files on it and to send emails from his computer. So far I have gone through hundreds of printed pages of logs but found nothing that looked "out of the ordinary or unusual."

 

If you were looking for some sort of outside access into a computer, what log messages would you look for?

 

 

I appreciate you taking the time to read my thread.

Link to comment
Share on other sites

 Share

×
×
  • Create New...