Jump to content
Sign in to follow this  
Followers 0

Remote Access / Foul Play

1 post in this topic

Recommended Posts



Does anyone know what a log entry for a "remote desktop access" would look like?


I have been looking through my friend's OS X logs because he thinks someone was remotely accessing his computer to put files on it and to send emails from his computer. So far I have gone through hundreds of printed pages of logs but found nothing that looked "out of the ordinary or unusual."


If you were looking for some sort of outside access into a computer, what log messages would you look for?



I appreciate you taking the time to read my thread.

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.